Authentication method and system for mobile communication terminal

A mobile communication terminal and authentication technology, applied in the field of wireless communication, to achieve the effect of reducing the loss of mobile phones, preventing theft of mobile phones or mobile phone cards, and preventing theft

Inactive Publication Date: 2008-10-15
TECHFAITH WIRELESS TECH BEIJING
View PDF1 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Another object of the present invention is to provide an authentication system for a mobile communication terminal, which solves the problem that an illegal user can still use a stolen mobile phone after reprogramming the stolen mobile phone through the communication between the mobile phone and the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system for mobile communication terminal
  • Authentication method and system for mobile communication terminal
  • Authentication method and system for mobile communication terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Figure 1 shows a schematic diagram of an authentication system for a mobile communication terminal according to Embodiment 1 of the present invention. figure 2 Shown is a structural block diagram of an authentication system for a mobile communication terminal according to Embodiment 1 of the present invention, in which a mobile communication terminal (a mobile phone in this embodiment) 101 communicates with an authentication server 102 through a wireless communication network 103, wherein the The mobile communication terminal of Embodiment 1 includes a radio frequency unit, a baseband circuit, an MCU control circuit, a keyboard, and a display. The mobile communication terminal also includes: an authentication information generating unit 104 for obtaining a mobile communication terminal identity, a SIM card identity, and a user password , Generate authentication information; the authentication information sending unit 105 is used to send the above authentication information...

Embodiment 2

[0046] Figure 6 Shown is a structural block diagram of an authentication system for a mobile communication terminal according to Embodiment 2 of the present invention. The mobile communication terminal includes a radio frequency unit, a baseband circuit, an MCU control circuit, a keyboard, and a display. The mobile communication terminal also includes: identification code acquisition Unit 301, used to obtain the IMEI of the mobile communication terminal as the mobile communication terminal identifier, and the IMSI of the SIM card as the SIM card identifier; the user password input unit 302, used to input the user password; the authentication information sending unit 303, used to The above-mentioned mobile communication terminal identifier, SIM card identifier, and user password are sent to the authentication server as authentication information for authentication; the authentication execution unit 306 is configured to receive the authentication result performed by the above-ment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method of a mobile communication terminal and a system thereof. The authentication method of the invention comprises the steps that: the identifier of the mobile communication terminal, an SIM card identifier and password for a subscriber are first obtained to generate authentication information; the generated authentication information is then sent to an authentication server which carries out the authentication to the authentication information to obtain the authentication result; the authentication result is finally sent back to the mobile communication terminal; the mobile communication terminal judges whether the authentication is successful or not according to the authentication result and the mobile communication terminal can be normally operated when the authentication is successful. In the method of the invention, when the subscriber changes the SIM card of a mobile phone, the authentication of a legal subscriber can be accomplished on the server and an illegal subscriber still fails to use the mobile phone normally even the phone re-burns records. Therefore, the authentication method of the invention can prevent the situations such as the stealing of mobile phones or phone cards, which results in that the mobile phone can be avoided being stolen.

Description

Technical field [0001] The present invention relates to the field of wireless communication technology, in particular to terminal equipment in a wireless network, and in particular to an authentication method and system for a mobile communication terminal. Background technique [0002] At present, with the continuous development of digital technology, various digital electronic products are increasingly attracting users' attention with their powerful functions and fast and convenient operations. [0003] For example, when consumers choose a mobile phone, in addition to focusing on its personalized and stylish appearance, the powerful functions and ease of operation of the mobile phone are also an important factor that determines consumers' choice of mobile phones. [0004] With the enhancement of the functions of mobile phones, users are increasingly relying on mobile phones. Many important information and files are stored in mobile phones or carry out various business activities...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04Q7/32
Inventor 陈军
Owner TECHFAITH WIRELESS TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products