Authentication method for limiting mobile phone without using by others

A technology for users and mobile phones, which is applied in the field of authentication where users restrict others from illegally using mobile phones. It can solve the problems of reducing password security, restrictions, and high cost of system transformation, so as to meet individual needs, reduce the frequency of use, and reduce construction costs. Effect

Active Publication Date: 2011-07-20
CHINA MOBILE GROUP SICHUAN
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the frequent use of mobile phones, it is against the principle of convenience to use the mobile phone to enter the password every time it is turned on or locked and unlocked. Therefore, although most mobile phones provide this function, there are not many users who actually use it.
On the other hand, frequently entering the mobile phone password will greatly reduce the security of the password. When the user simply sets the mobile phone password to be the same as other passwords (such as passbooks, access control, etc.), the password theft may cause more damage to the user than the mobile phone is stolen. grab bigger losses
Due to these two reasons, the existing technology cannot really meet the user's requirements for prohibiting the mobile phone from being illegally used by others. Bear the losses caused by the illegal use of mobile phones
[0003] At present, there are also technologies that use mobile phone IMEI to restrict illegal mobile phone access to the network, such as EIR technology, but EIR only provides how to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method for limiting mobile phone without using by others
  • Authentication method for limiting mobile phone without using by others

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] As shown in Figure 1, an authentication method for a user to restrict others from illegally using a mobile phone, the processing flow is as follows:

[0024] A. In the process of providing communication services to users, the business support system collects mobile phone numbers, corresponding mobile phone IMEI, usage time and related user information;

[0025] B. Save the user information collected in step A to the BOSS system;

[0026] C. When a user initiates to restrict the use of a mobile phone, the operator judges whether the user who initiates the restriction of mobile phone use has the right to perform this operation according to the information saved in step B;

[0027] D. When the relevant proof provided by the user is consistent with the user information saved in step B, the user has the right to restrict operations, and the operator will restrict the mobile phones that are required to be restricted according to the user's requirements.

[0028] The business...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method for a user to prevent others from using the mobile telephone of the user illegally. The method is characterized in that the steps are as follows: in the process of providing the communication service for the user, all the phone number, the corresponding IMEI of the mobile telephone, the service time and the related user information are collected by a service supporting system, and then the collected user information is stored in a BOSS system; when the user sends the request of preventing others from using the mobile telephone, an operator judges whether the user has the right to do the operation according to the stored information; if the related certificate provided by the user accords with the stored user information, the user has the right to do the operation of preventing other from using the mobile telephone and the operator provides the corresponding limitation for the mobile telephone according to the request of the user. The invention guarantees the convenience of the user using the mobile telephone and the security of a password and fully meets the individual requirement of the user; the construction cost is low and the invention can be used on a large scale; the sharing of the password of the phone number and that of the mobile telephone is realized, which reduces the inconvenience of memorizing a plurality of passwords; the invention can also prevent the mobile telephone of the user from being stolen or being used illegally after the mobile telephone is stolen.

Description

technical field [0001] The invention relates to the field of communication device use right authentication, in particular to an authentication method for a user to restrict others from illegally using a mobile phone. Background technique [0002] Along with popularizing and using of mobile phone, the purposes of mobile phone are more and more extensive, and it is also more and more important in people's life. As mobile phones penetrate into daily office, finance, payment, electronic identification, home automation control and other fields, users have higher and higher requirements for prohibiting the illegal use of mobile phones by others. At present, the main technology to prevent mobile phones from being illegally used by others is to authenticate users on the mobile phone side through special passwords for mobile phones, such as setting the power-on password of the mobile phone, locking and unlocking passwords, etc. Due to the frequent use of mobile phones, it is against...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W88/02
Inventor 曾健庞琳王林苏伟杰刘三苏张超胡鹏徐苛杰李玥毅
Owner CHINA MOBILE GROUP SICHUAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products