Net locking method and system
A network-locking, one-pair technology, applied in network data management, electrical components, security devices, etc., can solve the problem of inability to dynamically modify locking parameters, and achieve the effect of reducing operating costs and enhancing security.
Active Publication Date: 2009-09-16
ZTE CORP
0 Cites 8 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention discloses a net locking method and system. The method comprises: the network side processes the encryption for the network parameter to generate the cryptograph and sends the cryptograph to the terminal via the short message; the terminal stores the cryptograph and decrypts the cryptograph to obtain the plaintext; the terminal compares the network parameter of the plaintext to the terminal parameter; if the network is different from the terminal parameter, the terminal net locking fails; if the network is same as the terminal parameter the terminal net locking is successful. Thesystem comprises a cryptograph generating module, a short message sending module, a terminal memory module, a terminal decrypting module and a terminal judging module. the invention amends the net-locking parameter via the network short message to reduce the operating cost of the operator and strengthen the security of the net locking.
Application Domain
Technology Topic
Image
Examples
- Experimental program(1)
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Drainage pipe network dredging robot and dredging method thereof
Owner:CHANGSHA ZHIXUNTONG ENVIRONMENTAL PROTECTION TECH CO LTD
Navigation service searching method with speech recognition function
InactiveCN103020098ALess typingReduce operating costsSpeech analysisSpecial data processing applicationsService searchMarine navigation
Owner:TENCENT TECH (SHENZHEN) CO LTD
Self-pushed type radial horizontal well steering device
InactiveCN102704840AAvoid casing segment milling and reamingReduce operating costsDirectional drillingAutomatic control for drillingPiston cylinderHigh pressure chamber
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)
Indoor distribution system and its netting method
ActiveCN1845473AEasy to expandReduce operating costsActive radio relay systemsRadio/inductive link selection arrangementsDistribution systemOperational cost reduction
Owner:HUAWEI TECH CO LTD
Agricultural hauling vehicle and vehicle network
InactiveUS20120265412A1Reduce operating costsAvoid excessive interruptionAnalogue computers for trafficMowersAutomotive engineeringVehicle networks
Owner:CLAAS SELBSTFAHRENDE ERNTEMASCHINEN GMBH
Classification and recommendation of technical efficacy words
- Improve security
- Reduce operating costs
Apparatus, method, and medium for self-organizing multi-hop wireless access networks
InactiveUS20050152305A1Rapidly deployableImprove securityNetwork topologiesData switching by path configurationMutual authenticationAccess network
Owner:FUJITSU LTD
System and method for managing payment in transactions with a pcd
InactiveUS20130246259A1Improve securityFinancePoint-of-sale network systemsComputer securityInternet privacy
Owner:QUALCOMM INC
Mobile device with scannable image including dynamic data
ActiveUS20160042263A1Improve securityPayment architectureRecord carriers used with machinesComputer visionComputer graphics (images)
Owner:VISA INT SERVICE ASSOC