Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing network and card locking function of terminal and terminal

A terminal and functional technology, which is applied in the field of realizing the function of terminal card lock and card lock, can solve the problems of algorithm loopholes, tampering programs, and low security of card lock card function, so as to achieve the effect of improving confidentiality and protecting interests

Inactive Publication Date: 2011-06-22
ZTE CORP
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, operators generally adopt the method of software encryption to realize the function of terminal network lock and card lock, but this method has the following defects: because the functions of network lock and card lock are based on software, and no matter how powerful the algorithm is, there may be loopholes , therefore, hackers will take advantage of the loopholes in the encryption software to tamper with the program arbitrarily
In this case, no matter how powerful the encryption algorithm established on the terminal software is, it will lose the meaning of encryption; that is to say, the security of the network lock card lock function realized by software encryption method is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing network and card locking function of terminal and terminal
  • Method for realizing network and card locking function of terminal and terminal
  • Method for realizing network and card locking function of terminal and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The basic idea of ​​the present invention is: an encryption chip and its peripheral circuits are set on the main board of the terminal, and the encryption chip reads the SIM card information after the terminal is turned on, and judges whether the read SIM card information is consistent with the stored information of the operator. The SIM card information is the same, and when it is determined that the read SIM card information is different from the stored SIM card information, the network lock card lock protection function of the terminal is activated.

[0029] Wherein, in the process of judging whether the read SIM card information is the same as the stored SIM card information specified by the operator, when it is determined that the read SIM card information is the same as the stored SIM card information, the terminal will enter the normal state. working status.

[0030] In the present invention, the SIM card information includes: Mobile Country Code (MCC), Mobile Ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing a network and card locking function of a terminal, which comprises that: an encryption chip is arranged on a mainboard of the terminal; and the encryption chip reads subscriber identity module (SIM) card information after the terminal is started, judges whether the read SIM card information is the same as the SIM card information specified by an operator and stored per se or not, and enables the network and card locking protection function of the terminal when determining the read SIM card information is different from the stored SIM card information. Simultaneously, the invention also discloses the terminal capable of realizing the network and card locking function. By the method and the terminal, the condition of low confidentiality of the software-based network and card locking function of the terminal can be avoided, and the confidentiality of the network and card locking function of the terminal is improved.

Description

technical field [0001] The invention relates to network lock card lock technology in mobile communication, in particular to a method and terminal for realizing the network lock card lock function of a terminal. Background technique [0002] With the development of mobile communication technology, the terminal market is developing faster and faster, and the competition among mobile operators is becoming more and more fierce. In order to attract more users, various mobile operators have launched many preferential activities, such as: selling the terminal to the user at a price lower than the terminal production cost, or selling the network card at a low price or even giving it to the user for free, which requires the terminal It has the function of locking the network and locking the card, so as not to bring huge losses to the operator. The so-called locked network means that the terminal can only be used on a specific network of a certain operator, but not on the network pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W8/18H04W88/02
CPCH04W8/205
Inventor 林华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products