Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data card and method, equipment, system for using equipment binding

A technology of data cards and devices, applied in the field of network communication, can solve the problem of no data card theft and other problems

Active Publication Date: 2013-01-02
HONOR DEVICE CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] There is no method to prevent the data card from being stolen in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data card and method, equipment, system for using equipment binding
  • Data card and method, equipment, system for using equipment binding
  • Data card and method, equipment, system for using equipment binding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] see figure 1 , which is a flowchart of the first embodiment of the method based on the present invention.

[0026] This embodiment describes in detail the method for binding a data card to a device.

[0027] S101: When checking that the binding function is activated by the use device, send a binding request to the use device.

[0028] When the data card is used for the first time, the binding file in the data card is empty. When the data card is inserted into the device, the data card automatically detects that the binding file is empty, and prompts whether to activate the binding function. When the binding function is selected, the data card sends a binding request to the device.

[0029] It should be noted that when the data card detects that the binding function is not activated, the data card will not write the binding flag into the binding file. Every time the data card is used in the future, if it is detected that there is a non-use binding flag in the binding ...

Embodiment 2

[0043] see figure 2 , which is a flowchart of the second embodiment of the method based on the present invention.

[0044] The embodiment of the present invention describes in detail the method for controlling the binding of the data card and the device after the data card is bound to the device.

[0045] S201: Send a binding identifier verification request to the using device.

[0046] S202: Receive the binding identifier sent by the device.

[0047] The binding identifier may include the IMEI of the device and / or the password set by the device.

[0048] S203: When it is judged that the binding identifier sent by the user device is consistent with the binding identifier stored in the binding file, allow the user device to use.

[0049] It should be noted that multiple IMEIs of devices may be stored in the binding file of the data card. After the data card obtains the IMEI of the used device, it calls out the used IMEI in the binding file and compares it with the obtained...

Embodiment 3

[0059] see image 3 , which is a flowchart of the third embodiment of the method based on the present invention.

[0060] The method for binding the control data card to the device when the device is illegal will be described in detail below.

[0061] S301: When detecting that the binding identifier sent by the user device is inconsistent with the binding identifier stored in the binding file, the data card sends a binding identifier verification error message to the user device; or when the user device does not send an error message to the data card When the identifier is bound, the data card sends prompt information to the device; at the same time, the counter is started.

[0062] S302: Use the device to pop up a password input dialog box, prompting to input the password.

[0063] It should be noted that, at this time, the user needs to manually input the password. The counter starts counting the number of times the password is manually entered.

[0064] S303: When count...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a data card and user machine binding method, apparatus and system. The methods includes the following steps: checking and sending a binding request to the user machine when the user machine activates a binding function; receiving the binding logo sent by the user machine; storing the binding logo in the user machine; and storing the binding logo sent by the user machine in a binding file. When the data card is reused, the user machine transmits the stored the binding logo to the data card. The data card detects whether the binding logo sent by the user machine is identical to the binding logo stored in the binding file, if so, the user machine is allowed to use. The method of the embodiment can effectively prevent the random use of illegal user machine to acquire data stored in the data card when the data card is lost or stolen.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method, device and system for binding a data card to a device. Background technique [0002] In the prior art, the prevention of a Subscriber Identity Module (SIM, Subscriber Identity Module) or a Universal Mobile Telecommunications System Subscriber Identity Module (USIM, Universal Mobile Telecommunications System Subscriber Identity Module) from being stolen is to bind the SIM or USIM to a portable device. [0003] However, if the user does not report the loss in time or perform other remedial measures after the portable device is stolen or lost, the stolen or lost portable device may be continued to be used, or even used for fraud and so on. Under normal circumstances, the user discovers the theft after a period of time, and may have missed the opportunity to report the loss when the portable device is lost; or feels that the process of reporting the loss or re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/675H04W88/02
Inventor 陈培德
Owner HONOR DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products