Anti-symmetric algorithmic based mobile terminal security lock network locking card protection and unlocking method

An asymmetric algorithm and mobile terminal technology, applied in the direction of public key for secure communication, radio/inductive link selection arrangement, user identity/authority verification, etc., can solve problems such as difficult implementation of complex solutions and easy cracking of solutions, etc. Achieve the effect of easy implementation, easy implementation and expansion, and cost saving

Inactive Publication Date: 2007-09-26
ZTE CORP
View PDF0 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide a mobile terminal security card lock protection and unlocking method based on an asymmetric algorithm, so as to solve the problem that the simple solution in the existing network lock card technology is easy to crack and the complex solution is difficult to implement. Shortcomings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-symmetric algorithmic based mobile terminal security lock network locking card protection and unlocking method
  • Anti-symmetric algorithmic based mobile terminal security lock network locking card protection and unlocking method
  • Anti-symmetric algorithmic based mobile terminal security lock network locking card protection and unlocking method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to solve the disadvantages of the traditional technical solutions, the present invention further elaborates a method for protecting and unlocking mobile terminal security lock network lock card protection and unlocking based on asymmetric algorithm through the following specific examples, and the specific implementation methods are described in detail below , but not as a limitation of the present invention.

[0038] The embodiments of the present invention use the storage conditions of ordinary mobile phones without adding special storage hardware or encryption hardware under the hardware conditions of the existing mobile terminal, that is, the mobile phone itself, thereby providing a safe, effective, easy-to-implement, feasible and highly secure Lock network lock card security mobile phone solution. The method proposed in this solution can be implemented on the two kinds of FLASH mentioned in the background art, so there is no need to consider the difference ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile terminal safe lock network lock card protecting and unlocking method based on the asymmetrical algorism that includes: the mobile terminal safe lock network lock card protecting method based on the asymmetrical algorism and the mobile terminal safe lock network lock card unlocking method based on the asymmetrical algorism. The invention solves the disadvantages of easy to be decrypted and the complex schedule hard to realize those existed in the present locking network locking card technique.

Description

technical field [0001] The invention relates to an efficient and safe method for preventing illegal cracking and normal use of a mobile phone in a mobile communication terminal, in particular to a method for protecting and unlocking a mobile terminal safety lock network lock card based on an asymmetric algorithm. Background technique [0002] With the global popularity of 3G networks and the intensification of competition among operators, in addition to the traditional sales channels of manufacturers, most mobile phones are customized by operators and sold to end users at low prices with large-scale subsidies. At this time, the network lock and card lock function for a specific operator in the mobile phone is particularly important. The network lock and card lock function of the mobile phone is mainly based on the requirements of the operator. The customized mobile phone can only be used under a specific network with a specific SIM / USIM card, so as to maintain the interests ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04Q7/32
Inventor 胡红雷史幸川
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products