Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for realizing locking of user number by wireless terminal device, unlocking method and device

A technology for wireless terminals and user numbers, applied in the field of communication security, can solve the problems of cumbersome use methods, easy to crack, low security, inconvenience, etc., and achieve the effect of simple and convenient unlocking process and strong implementation flexibility.

Inactive Publication Date: 2009-12-30
ZTE CORP
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to restrict the use of wireless terminal devices, the following methods are generally adopted: lock the network, and use wireless terminal devices to bind Mobile Country Code (hereinafter referred to as MCC) and Mobile Network Code (Mobile Network Code, hereinafter referred to as MNC for short), this wireless terminal device has a one-to-many relationship with the SIM card, even if the user loses the wireless terminal device, this wireless terminal device can also be used with other SIM cards in the network, and the security is obviously not guaranteed
[0004] In order to limit the scope of use of wireless terminal equipment, there is also a method of binding wireless terminal equipment to a user cell (CELL ID). Inconvenience to users
There is another method, that is, the method of machine-card interlocking. Write the International Mobile Equipment Identity (IMEI) number of the device into the SIM card to realize the one-to-one correspondence between the wireless terminal device and the SIM card, but the lock The card mechanism is simple and easy to crack. If the user changes the SIM card, the wireless terminal device must be locked again, otherwise it cannot be used again.
[0005] In the method of locking the network and locking the card in addition, before the wireless terminal is sold, the operator locks all the wireless terminals one by one, and stores the unlocking code and the key in the wireless terminal device, the key and the unlocking code and the wireless terminal. The terminal devices have a one-to-one correspondence. Not only is the network locking process more cumbersome, but also the security of key storage is not high, and it is easy to leak
[0006] The above methods may be cumbersome and inconvenient to use, or have the problem of easy cracking and low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing locking of user number by wireless terminal device, unlocking method and device
  • Method for realizing locking of user number by wireless terminal device, unlocking method and device
  • Method for realizing locking of user number by wireless terminal device, unlocking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The specific implementation of a method and device for realizing locking of a user number by a wireless terminal device provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0070] First, a method for realizing locking of a user number by a wireless terminal device provided by an embodiment of the present invention is described in detail.

[0071] Such as figure 1 As shown, the embodiment of the present invention provides a method for a wireless terminal device to lock a user number. Before the wireless terminal device is powered on and enters the initialization state, the following steps are performed:

[0072] S101. Determine whether a SIM card is inserted into the wireless terminal device. If yes, execute S102. If not, execute step S112.

[0073] S102. Determine whether the inserted SIM card is a test SIM card, if yes, execute step S111, otherwise, continue to execute step S103.

[0074] This step S102 is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing locking of a user number by a wireless terminal device, an unlocking method and a device. The method for realizing the locking of the user number by the wireless terminal device comprises the following steps: reading IMEI of the wireless terminal device and the current user number which is stored in an inserted SIM card and pre-distributed to the wireless terminal device; calculating a first mapped value between the IMEI and the user number; reading IMSI of the SIM card, and calculating a second mapped value between the user number and the IMSI; comparing the calculated first mapped value and the second mapped value, the mapped value between the IMEI pre-stored by the wireless terminal device and the user number and the mapped value between the IMSI and the user number; and when the comparison results are consistent, permitting the wireless terminal device to be used. The invention establishes a binding relation between the wireless terminal device and the user number, has high safety, and is simple and convenient to use.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a method for realizing locking of a user number by a wireless terminal device, an unlocking method and a device thereof. Background technique [0002] With the global popularity of 3G networks and the intensification of competition among operators, wireless terminal devices (Wireless Terminal Device) are more customized by operators. Considering the needs of operators and user safety, wireless terminal devices The binding restriction function of is particularly important. [0003] Typical wireless terminal equipment includes wireless USB MODEM, wireless data card, mobile phone and so on. In order to restrict the use of wireless terminal devices, the following methods are generally adopted: lock the network, and use wireless terminal devices to bind Mobile Country Code (hereinafter referred to as MCC) and Mobile Network Code (Mobile Network Code, hereinafter referred to as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W8/18H04W12/00H04W12/48
CPCH04W8/183
Inventor 王科平车忠辉宋欣郑宏涛胡乐申段明艳
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products