Locking method and unlocking method

An unlocking and non-locking technology, applied in the field of communications, can solve the problems of complicated mobile phone hardware design and increased cost, and achieve the effect of solving after-sales maintenance problems, preventing illegal rewriting, and guaranteeing legitimate rights and interests.

Inactive Publication Date: 2007-08-29
ZTE CORP
View PDF0 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this will inevitably complicate the hardwa...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Locking method and unlocking method
  • Locking method and unlocking method
  • Locking method and unlocking method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0024] To complete the network lock, card lock and unlocking functions of the present invention, both hardware and software need to be processed together. The hardware aspect will be described below with reference to FIG. 1 .

[0025] Fig. 1 is the view according to the related hardware design that locking method of the present invention will use, as shown in Fig. 1, in hardware design, need to connect a GPIO (general purpose input and output) pin of mobile phone main control chip 102 to flash104 On the WP# pin, at the same time, connect a resistor 106 (its resistance value is selected according to the specific situation, generally about 100K ohms) to the ground lev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The locking method includes following steps: step S202, storing symbol of locking type in specific area of memory device of mobile terminal in advance; step S204, after first time to use mobile terminal, and detecting SIM card of mobile terminal successfully, reading IMEI number of mobile terminal in specific area, and symbol of locking type, and then based on read symbol of locking type to carry out corresponding process. Thus, it is convenient for operation manager to carry out operation of locking network, locking cards for centralized purchased handsets. Using specific network and specific SIM cards can operate the locked handsets, or other SIM cards will not make locked handsets work. The locked information is stored in write protection area of protected flash so as to protect the locked information from rewriting unlawfully. Based on requirement, locked handsets can be unlocked in order to solve maintenance issue after sale.

Description

technical field [0001] The present invention relates to the field of communications, and more specifically, to a method for locking a mobile terminal through a network lock or a SIM card (subscriber identity model, called a customer identification module, also called a smart card, or a subscriber identity card) and a method for locking a mobile terminal. A method for unlocking a device locked according to this locking method. Background technique [0002] At present, in order to develop users, many GSM (global system for mobile communication, known as Global System for Mobile Communications) network operators mostly adopt preferential policies such as recharging mobile phones to buy mobile phones at low prices or even get mobile phones for free. If this kind of subsidized mobile phone is sold at a high price, the operator needs to restrict the network access of this mobile phone. For example, if the network of China Mobile is locked, the card of China Unicom cannot be used; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/32H04M1/66G06F12/14G06K19/073H04W8/18H04W8/20
Inventor 曹明赵薇李凯
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products