Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for realizing wireless terminal equipment locking user number, unlocking method and device

A wireless terminal and user number technology, applied in the field of communication security, can solve the problems of cumbersome usage methods, easy cracking, low security, cumbersome network locking process, etc., and achieve the effect of simple and convenient unlocking process and strong implementation flexibility

Inactive Publication Date: 2011-12-07
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to restrict the use of wireless terminal devices, the following methods are generally adopted: lock the network, and use wireless terminal devices to bind Mobile Country Code (hereinafter referred to as MCC) and Mobile Network Code (Mobile Network Code, hereinafter referred to as MNC for short), this wireless terminal device has a one-to-many relationship with the SIM card, even if the user loses the wireless terminal device, this wireless terminal device can also be used with other SIM cards in the network, and the security is obviously not guaranteed
[0004] In order to limit the scope of use of wireless terminal equipment, there is also a method of binding wireless terminal equipment to a user cell (CELL ID). Inconvenience to users
There is also a method, that is, the method of machine-card interlocking, in which the International Mobile Equipment Identity (IMEI) number of the device is written in the SIM card to realize the one-to-one correspondence between the wireless terminal device and the SIM card, but The card lock mechanism is simple and easy to crack. If the user changes the SIM card, the wireless terminal device must be locked again, otherwise it cannot be used again.
[0005] In the method of locking the network and locking the card in addition, before the wireless terminal is sold, the operator locks all the wireless terminals one by one, and stores the unlocking code and the key in the wireless terminal device, the key and the unlocking code and the wireless terminal. The terminal devices have a one-to-one correspondence. Not only is the network locking process more cumbersome, but also the security of key storage is not high, and it is easy to leak
[0006] The above methods may be cumbersome and inconvenient to use, or have the problem of easy cracking and low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing wireless terminal equipment locking user number, unlocking method and device
  • Method for realizing wireless terminal equipment locking user number, unlocking method and device
  • Method for realizing wireless terminal equipment locking user number, unlocking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The specific implementation of a method and device for realizing locking of a user number by a wireless terminal device provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0060] First, a method for realizing locking of a user number by a wireless terminal device provided by an embodiment of the present invention is described in detail.

[0061] Such as figure 1 As shown, the embodiment of the present invention provides a method for a wireless terminal device to lock a user number. Before the wireless terminal device is powered on and enters the initialization state, the following steps are performed:

[0062] S101. Determine whether a SIM card is inserted into the wireless terminal device. If yes, execute S102. If not, execute step S112.

[0063] S102. Determine whether the inserted SIM card is a test SIM card, if yes, execute step S111, otherwise, continue to execute step S103.

[0064] This step S102 is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, unlocking method and device for realizing the locking of the user number of the wireless terminal equipment. The method for realizing the locking of the user number of the wireless terminal equipment provided by the invention includes: reading the IMEI of the wireless terminal equipment and the currently inserted SIM The user number pre-assigned to the wireless terminal device stored in the card; calculate the first mapping value between the two; read the IMSI of the SIM card, and calculate the second mapping value between the user number and the IMSI; the calculated The first mapping value and the second mapping value are respectively compared with the mapping value of the IMEI and the user number and the mapping value of the IMSI and the user number stored in advance by the wireless terminal device; when the comparison results are consistent, the wireless terminal device is allowed to be use. The invention establishes a binding relationship between the wireless terminal equipment and the user number, has high security, and is simple and convenient to use.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a method for realizing locking of a user number by a wireless terminal device, an unlocking method and a device thereof. Background technique [0002] With the global popularity of 3G networks and the intensification of competition among operators, wireless terminal devices (Wireless Terminal Device) are more customized by operators. Considering the needs of operators and user safety, wireless terminal devices The binding restriction function of is particularly important. [0003] Typical wireless terminal equipment includes wireless USB MODEM, wireless data card, mobile phone and so on. In order to restrict the use of wireless terminal devices, the following methods are generally adopted: lock the network, and use wireless terminal devices to bind Mobile Country Code (hereinafter referred to as MCC) and Mobile Network Code (Mobile Network Code, hereinafter referred to as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/18H04W12/00H04W12/48
CPCH04W8/183
Inventor 王科平车忠辉宋欣郑宏涛胡乐申段明艳
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products