Method of identifying legalness of mobile terminal user
A mobile terminal and legitimacy technology, applied in the direction of user identity/authority verification, security devices, electrical components, etc., can solve the problem that mobile terminals are easy to be stolen, achieve easy to be stolen, simple implementation, and prevent theft Grab the effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0047] figure 1 A general flowchart of the invention is shown. Such as figure 1 As shown, first in step 101, an identification information that can be stored permanently without power supply is set in the mobile terminal, and personalized information corresponding to the identification information is stored. The identification information can be any combination of characters with an unlimited number of digits, preferably using numeric characters, and when the mobile terminal has no power supply, the identification information will still be stored in the mobile terminal and will not be lost.
[0048] In step 102, in the user subscription information of the HLR, the corresponding relationship between the user subscription information and the identification information set in the mobile terminal is added.
[0049] In step 103, after the mobil...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 