Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of identifying legalness of mobile terminal user

A mobile terminal and legitimacy technology, applied in the direction of user identity/authority verification, security devices, electrical components, etc., can solve the problem that mobile terminals are easy to be stolen, achieve easy to be stolen, simple implementation, and prevent theft Grab the effect

Active Publication Date: 2008-05-14
南通雷拓电子有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the main purpose of the present invention is to provide a method for verifying the legitimacy of mobile terminal users, which can fundamentally solve the problem that mobile terminals are easily stolen, and the implementation method is simple and reliable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of identifying legalness of mobile terminal user
  • Method of identifying legalness of mobile terminal user
  • Method of identifying legalness of mobile terminal user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0047] figure 1 A general flowchart of the invention is shown. Such as figure 1 As shown, first in step 101, an identification information that can be stored permanently without power supply is set in the mobile terminal, and personalized information corresponding to the identification information is stored. The identification information can be any combination of characters with an unlimited number of digits, preferably using numeric characters, and when the mobile terminal has no power supply, the identification information will still be stored in the mobile terminal and will not be lost.

[0048] In step 102, in the user subscription information of the HLR, the corresponding relationship between the user subscription information and the identification information set in the mobile terminal is added.

[0049] In step 103, after the mobil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a verification method for mobile terminal user validation contains presetting a identification information for verifying mobile terminal user validation and storing individuation information corresponding the identification information, prestoring the coincidence relation between user contract sign information and identification corresponding mobile terminal in verification equipment, when mobile terminal logging communication, verifying mobile terminal user validation by judging whether the verification information of individuation information is coincidence with that in identification. Said invention can stop providing communication service or directly lock the mobile terminal of illegal user by verifying mobile user validation, so as to avoid the illegal use of mobile terminal.

Description

technical field [0001] The invention relates to a verification technology of a wireless communication network, in particular to a method for verifying the legitimacy of a mobile terminal user. Background technique [0002] Most of the current mobile terminals use the machine-card separation method, that is, the mobile terminal itself and the user card used to verify the wireless network user information are two independent parts, and they can be combined during use. Current subscriber cards are mainly Subscriber Identity Module (SIM) cards used in the Global System for Mobile Communications (GSM) system. This method has many outstanding advantages. For example, if a user wants to change a mobile terminal, he only needs to buy a new mobile terminal and insert the original SIM card into the new mobile terminal. In this way, since the user's information does not need Therefore, the user does not need to go through any procedures for replacing the mobile terminal with the commu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q7/32H04L9/32H04W12/02H04W12/03H04W12/06
Inventor 王正伟郭平
Owner 南通雷拓电子有限公司