Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless terminal and method for mutual locking and unlocking with user recognition card

A user identification card and wireless terminal technology, which is applied in the field of wireless terminals and their interlocking and unlocking with user identification cards, can solve the problems of complicated implementation process of machine-card interlocking and unlocking and the inability of wireless terminals to be unlocked, and achieves the realization of machine-card interlocking and unlocking. The locking process is flexible and simple, avoiding the inflexible unlocking method, and the machine-card interlocking process is more effective

Inactive Publication Date: 2012-04-18
ZTE CORP
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two disadvantages of this method: one is that the user identification card needs to be inserted into the wireless terminal before the machine-card interlock operation, that is to say, the corresponding user must be prepared when the machine-card interlock operation is to be performed on the wireless terminal. Identification card; the second is to insert the corresponding user identification card into the wireless terminal when unlocking. If the user identification card cannot be obtained, the wireless terminal cannot be unlocked.
Therefore, the realization process of machine-card interlock and unlocking is more complicated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless terminal and method for mutual locking and unlocking with user recognition card
  • Wireless terminal and method for mutual locking and unlocking with user recognition card
  • Wireless terminal and method for mutual locking and unlocking with user recognition card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The technical solution of the present invention will be described in more detail below with reference to the drawings and embodiments.

[0052]The invention provides a method for interlocking a wireless terminal and a user identification card, and an unlocking method. The basic idea of ​​the present invention is: first add the processing code of the machine-card interlocking in the wireless terminal and set the machine-card interlocking flag; when interlocking is required, input information through the keyboard, or through the Software, or operate the wireless terminal through the CDMA (Code Division Multiple Access) air interface, etc., so that the wireless terminal enters the interlock state, as long as there is a user identification card in the wireless terminal when it is started next time, and this user If the identification card is in the "PIN (Personal Identification Number) Code Prohibited State", then the wireless terminal and the user identification card will ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a wireless terminal and a method that realizes the interlock and unlock between wireless terminal users and user identification cards. The described wireless terminal includes interlocked judgment module, the interlocking implementation module; the above mentioned interlocking could be descripted as follows. When wireless terminals boot, if the wireless terminals and user identification card is judged in the state of interlocking, the wireless terminal would generate a random number, set this random number as a new personal identification code, then write into the user identification card, and stored in the wireless terminal. The unlocking of ireless terminals includes: generating unlocking code and inputting it into wireless terminals; entering non-interlocked state if unlock code is judged correct by wireless terminals. The unlocking of users identification card includes: changes user identification card or personal identification numbers. The presentinvention realizes the 'automatic' interlocked function of the card in the true sense, and the wireless terminal and user identification card independent during unlocking , so they have a high degreeof freedom of unlocking, effectively avoid the flexible shortcomings of unlocking other card interlocking methods after interlocking.

Description

technical field [0001] The invention relates to a wireless terminal, in particular to a wireless terminal and a method for interlocking and unlocking the wireless terminal and a user identification card. Background technique [0002] At present, more and more operators are launching low-cost wireless terminals, and some new marketing methods have emerged, such as free mobile phones with pre-stored credit. In order to ensure that users use the network within a fixed period of time, thereby recovering the cost, the method of "machine-card interlocking" can be used to achieve this purpose. The fixed wireless terminal and the user identification card are locked. After locking, the wireless terminal Only the corresponding user identification card can be used, and then the corresponding unlocking operation can be performed. [0003] At present, the way to achieve machine-card interlocking is that a wireless terminal is locked corresponding to a user identification card. After loc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W88/02H04L9/32H04W8/18
Inventor 李希鹏文永明
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products