Method and apparatus for implementing terminal network locking
A terminal and network locking technology, which is applied in the directions of unauthorized/fraudulent telephone prevention, telephone communication, access restriction, etc., to achieve the effect of low cost investment, simple design, and easy implementation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0030] figure 1 It is a structural diagram of a device for realizing terminal network locking in a specific embodiment of the present invention, including:
[0031] A user interface (UI, User Interface) module 101 is set in a computer or other processor device, and this module further includes:
[0032] The connection judging unit 1011 is configured to send a handshake message to the terminal device 102 after determining that the computer to which it belongs establishes a connection with the terminal device 102, and determine whether to communicate with the terminal device 102 after receiving a handshake response message returned by the terminal device 102. The link is normal;
[0033] Service card state judging unit 1012, is used for sending service card state inquiry message to terminal equipment 102, receives and analyzes the service card...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 