Network locking method and terminal

A network lock and terminal technology, applied in the field of network lock methods and terminals, can solve problems such as complex management, and achieve the effect of convenient testers and simple lock network management

Active Publication Date: 2009-02-18
HUAWEI DEVICE CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The unlocking method and terminal provided by the embodiment of the present invention solve the problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network locking method and terminal
  • Network locking method and terminal
  • Network locking method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The network locking method and terminal provided by the embodiments of the present invention solve the problems in the prior art that special software is needed to realize network locking and the management is complicated, and it is easy to implement and easy to use for users or testers. It will be described in detail below in conjunction with the accompanying drawings.

[0019] figure 1 It is a schematic flow diagram of a network locking method according to an embodiment of the present invention, the method comprising:

[0020] 101. Determine whether there is a network lock file in the temporary folder, if not, judge whether there is the network lock file in the special folder;

[0021] 102. If there is the network lock file in the special folder, judge whether the network lock flag in the network lock file is set,

[0022] 103. If the bit is set, execute the network lock according to the network lock information in the network lock file.

[0023] In the above steps...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lock net method and terminal for solving problem that lock net in prior art requires dedicated software and complex operations. The method includes steps of: judging whether there is lock net files in temporary internet files, if not, judging whether there is lock net files in special files; if so, judging whether the lock net mark in the lock net files is set, if so, executing the lock net according to lock net information in the lock net files. Correspondingly, the invention further provides a terminal that implements the method. The embodiment of the invention realizes to execute the lock net according to lock net file through setting temporary internet files and special files in the terminal, which is prone to realize and convenient for users or test personnel.

Description

technical field [0001] The invention relates to the field of mobile communication applications, in particular to a network locking method and a terminal. Background technique [0002] In order to control the mobile phone, the mobile phone network operator needs to use the mobile phone network lock to control the mobile phone to be used only in a specific network. This technology is called network lock. In order to enable the mobile phone user to modify the network used after using the mobile phone for a period of time, it is necessary to remove the network lock restriction to the mobile phone. [0003] In the prior art, a certain address bit in the memory of the mobile phone is determined as the network lock identification bit, and after the network lock number is burned to the mobile phone through the network lock software, the network lock identification position is set. After the network lock flag is set, the mobile phone will no longer respond to the operation of burnin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04Q7/32
Inventor 王锋
Owner HUAWEI DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products