Identification method of mobile terminal user legalness

A technology of a mobile terminal and a verification method, which is applied in the verification field of a wireless communication network, can solve the problems such as the mobile terminal being easily stolen and robbed, achieves the purpose of preventing thieves from robbing the mobile terminal, solves the problem of being easily stolen and has a simple and reliable implementation method. Effect

Active Publication Date: 2008-01-16
南通誉力智能装备有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the main purpose of the present invention is to provide a method for verifying the legitimacy of mobile terminal users, which can fundamentally solve the problem that mobile terminals are easily stolen, and the implementation method is simple and reliable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method of mobile terminal user legalness
  • Identification method of mobile terminal user legalness
  • Identification method of mobile terminal user legalness

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0045] Fig. 1 shows the general flowchart of the present invention. As shown in FIG. 1 , first at step 101 , the corresponding relationship between the mobile terminal and the SIM card is established in advance.

[0046] In step 102, after the mobile terminal is turned on, it is judged whether the current mobile terminal and the SIM card meet the pre-established correspondence. If yes, it indicates that the identity of the mobile terminal user is legal. At this time, the mobile terminal can log in or connect to the network normally, and the user can use the mobile terminal to perform any operations; otherwise, it indicates that the identity of the mobile terminal user is illegal, and the mobile terminal can stop responding to user operations at this time , and exit the network and cease providing service.

[0047] The overall process of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a verification method for mobile terminal user validation contains presetting the coincidence relation between mobile terminal and user, verifying mobile terminal user validation by judging whether the current mobile terminal and user satisfying preset coincidence relation. Said invention can stop providing communication service or directly lock the mobile terminal of illegal user by verifying mobile user validation, so to avoid the illegal use of mobile terminal.

Description

technical field [0001] The invention relates to a verification technology of a wireless communication network, in particular to a method for verifying the legitimacy of a mobile terminal user. Background technique [0002] Most of the current mobile terminals use the machine-card separation method, that is, the mobile terminal itself and the user card used to verify the wireless network user information are two independent parts, and they can be combined during use. Current subscriber cards are mainly Subscriber Identity Module (SIM) cards used in the Global System for Mobile Communications (GSM) system. This method has many outstanding advantages. For example, if a user wants to change a mobile terminal, he only needs to buy a new mobile terminal and insert the original SIM card into the new mobile terminal. In this way, since the user's information does not need Therefore, the user does not need to go through any procedures for replacing the mobile terminal with the commu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/32H04L9/32H04W12/06
Inventor 王正伟董永健
Owner 南通誉力智能装备有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products