Method realizing binding mobile terminal to user

A mobile terminal, user binding technology, applied in instruments, inductive record carriers, computing, etc., can solve the problem that the user identification card cannot be used

Inactive Publication Date: 2008-10-22
ZTE CORP
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, the operator usually requires the mobile terminal to lock the network, that is, the customized mobile terminal can only use the subs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method realizing binding mobile terminal to user
  • Method realizing binding mobile terminal to user
  • Method realizing binding mobile terminal to user

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0032] figure 2 Shown is a schematic flow diagram of applying the method of the present invention to realize the network locking function of the mobile terminal, including the following steps:

[0033] Step 101, setting lock network parameters in the NFC analog front-end chip of the mobile terminal, that is, setting the feature information of the subscriber identification card issued by the operator that is allowed to use;

[0034] The characteristic information of the subscriber identification card set here is information that can be used to distinguish certain types of subscriber identification cards. In this embodiment, the characteristic information that can distinguish the subscriber identification cards issued by a certain operator is set. The setting may be performed by a network operator or a mobile terminal manufacturer before the mobile terminal is provided to users. The network lock parameter (that is, the characteristic information of the subscriber identificatio...

no. 2 example

[0044] image 3 Shown is a schematic flow chart of implementing the anti-theft function of the mobile terminal by applying the method of the present invention, including the following steps:

[0045] Step 201, setting anti-theft parameters in the NFC analog front-end chip of the mobile terminal, that is, setting the feature information of the subscriber identification card used by the mobile terminal holder;

[0046] The anti-theft parameter may use the IMSI of the subscriber identity card. IMSI assigns a unique international mobile subscriber identity code to each mobile terminal user. This code is valid in all locations in the network including roaming areas, and can identify a unique subscriber identity card; and the IMSI written into the subscriber identity card cannot modified. IMSI consists of the following 3 pieces of information: the MCC, MNC and MSIN (Mobile Subscriber Identification Number) of the operator to which the card belongs are used to uniquely identify mob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing the binding of a mobile terminal and a user. The method comprises the following steps of (a) setting up allowable characteristic information of a user identification card in the close-range wireless communication NFC analog front end chip of the mobile terminal supporting enhancement type close-range wireless communication eNFC; (b) the NFC analog front end chip reading the characteristic information of the user identification card currently used by the mobile terminal when the mobile terminal is on, and then comparing with the preset characteristic information of the user identification card; (c) the NFC analog front end chip continuing to power or stopping powering the user identification card currently used by the mobile terminal according to the comparison results. The method binds the mobile terminal and the user identification card, thereby enabling the mobile terminal to work normally only on the condition that the allowable user identification card is inserted, and consequently enabling the mobile terminal to have the function of network lock or theft protection.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to a method for realizing binding between a mobile terminal and a user. Background technique [0002] IC cards (Integrated Circuit Cards), especially non-contact IC cards, have been widely used in fields such as public transport, access control, and small-amount electronic payments after years of development. At the same time, after more than 20 years of rapid development, mobile phones have basically been popularized among residents, bringing great convenience to people's work and life. Mobile phones are becoming more and more powerful, and there is a tendency to integrate more functions. The combination of mobile phone and non-contact IC card technology, and the application of mobile phone in the field of electronic payment will further expand the scope of use of mobile phones, bring convenience to people's life, and have broad application prospects. At present, a mobil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/32G06K7/00H04M1/72448
Inventor 马景旺
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products