Net locking method and system

A network-locking, one-pair technology, applied in network data management, electrical components, security devices, etc., can solve the problem of inability to dynamically modify locking parameters, and achieve the effect of reducing operating costs and enhancing security.

Active Publication Date: 2009-09-16
ZTE CORP
0 Cites 8 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to overcome the problem that the traditional network locking method cannot dynamically modify the locking parameters and can only recall the terminal or issue a new term...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses a net locking method and system. The method comprises: the network side processes the encryption for the network parameter to generate the cryptograph and sends the cryptograph to the terminal via the short message; the terminal stores the cryptograph and decrypts the cryptograph to obtain the plaintext; the terminal compares the network parameter of the plaintext to the terminal parameter; if the network is different from the terminal parameter, the terminal net locking fails; if the network is same as the terminal parameter the terminal net locking is successful. Thesystem comprises a cryptograph generating module, a short message sending module, a terminal memory module, a terminal decrypting module and a terminal judging module. the invention amends the net-locking parameter via the network short message to reduce the operating cost of the operator and strengthen the security of the net locking.

Application Domain

Technology Topic

Image

  • Net locking method and system
  • Net locking method and system

Examples

  • Experimental program(1)

Example Embodiment

[0030] The following describes in detail the technical solutions of the network locking method and system of the present invention in conjunction with the accompanying drawings and specific embodiments:
[0031] figure 1 It is a flow chart of the network locking method of the present invention, and the following are the concrete steps of locking the network:
[0032] Step 1: The network side uses a private key and an asymmetric encryption algorithm to encrypt the plaintext containing the network parameters and the network lock flag to generate a ciphertext, and sends the ciphertext to the terminal through an encrypted message;
[0033] The plaintext M includes: a network parameter P and a network lock flag F,
[0034] The network parameter P is a collection of some network parameters, which includes P1, P2, P3, ... PN, and common network parameters are MCC (Mobile Country Code), MNC (Mobile Network Code), and MIN2 (Mobile Station Identification);
[0035] The network lock flag F is a 32-bit unsigned binary number, and each bit corresponds to a network parameter. If a certain position is 1, it means that the network parameter needs to be locked, and if it is set to 0, it means that the network parameter does not need to be locked.
[0036] Where x is the private key of the operator, the encryption algorithm is E, the plaintext is M, the ciphertext is m, and the encrypted message is s;
[0037] M becomes m through the asymmetric encryption algorithm E(x, M), and m becomes s through SMS encryption.
[0038] The format of the encrypted message s is: PREFIX+{content}, where {content} is the ciphertext, PREFIX is the prefix of the encrypted message, which is used to identify that the message is a network-locked message sent by the network, and PREFIX is fixed in the same network , the present embodiment PREFIX is:! @#&*^*%1@#$**.
[0039] Step 2: After receiving the encrypted message, the terminal parses out the ciphertext from the encrypted message and stores it;
[0040] After receiving the encrypted short message s, the terminal parses to obtain the ciphertext m, and the terminal stores m.
[0041] Step 3: The terminal decrypts the ciphertext using a public key and an asymmetric decryption algorithm to obtain the plaintext;
[0042] y is a public key, the decryption algorithm is D, and m obtains the plaintext M through the asymmetric decryption algorithm D(y, m).
[0043] Step 4: Find out the network parameters that need to be locked from the network parameters in the plain text through the network lock flag, and the terminal compares each of the network parameters that need to be locked with each corresponding terminal parameter one by one, if If there is a pair of parameters that are different, the terminal network lock fails, and if all the parameters of each pair are the same, the terminal network lock succeeds.
[0044] Terminal parameter P' is a collection of some terminal parameters, including P1', P2', P3'...PN'.
[0045] Assuming that the first three bits of the network lock flag F are 1, the corresponding P1, P2, and P3 in the network parameter P need to be locked, and the rest of the network parameters do not need to be locked.
[0046] Then the terminal parameters corresponding to the network parameters P1, P2, and P3 are P1', P2', and P3', and compare them one by one:
[0047] If there is a pair of different parameters, such as P1′≠P1, the network lock fails, and the terminal enters the emergency mode. In the emergency mode, the user can only dial the emergency number, but cannot use other services of the terminal;
[0048] If the network parameters to be locked are all the same as the terminal parameters, that is, P1'=P1, P2'=P2, P3'=P3, then the network is locked successfully, and the terminal enters the normal mode, in which the user can use all services provided by the terminal.
[0049] figure 2 It is a block diagram of the network lock system of the present invention, including: a network lock mark setting module, a ciphertext generation module, a short message sending module, a terminal storage module, a terminal decryption module, and a terminal judgment module.
[0050] The network lock sign setting module is used to set the network lock sign, and is set according to whether the corresponding network parameters need to be locked, and then the network lock sign and network parameters are sent together as plain text to the ciphertext generation module;
[0051] A ciphertext generating module, configured to encrypt the plaintext to generate ciphertext;
[0052] SMS sending module: used to send the ciphertext to the terminal via SMS;
[0053] Terminal storage module: used to store the downloaded ciphertext;
[0054] Terminal decryption module: used to decrypt the stored ciphertext to obtain the plaintext;
[0055] Terminal judging module: used to find out the network parameters that need to be locked from the network parameters in the plain text through the network lock flag, and compare the network parameters that need to be locked with the corresponding terminal parameters one by one. If there is a pair of parameters that are different , the terminal network lock fails, and if all the parameters of each pair are the same, the terminal network lock succeeds.
[0056]The network lock sign is a binary number of at least 1 bit. In the present embodiment, the network lock sign is a 32-bit unsigned binary number, and each bit corresponds to a network parameter. If a certain position 1 indicates that the network parameter needs to be locked, Setting it to 0 means that the network parameter does not need to be locked.
[0057] The short message sending module includes a short message encryption unit; the short message encryption unit is used to generate an encrypted short message from the ciphertext, and then send the encrypted short message to the terminal;
[0058] The encrypted SMS format is: PREFIX+{content}, where {content} is the ciphertext, PREFIX is the prefix of the encrypted SMS, which is used to identify that the SMS is a network-locked SMS sent by the network, and PREFIX is fixed in the same network. The present embodiment PREFIX is:! @#&*^*%1@#$**.
[0059] The terminal storage module includes a short message analysis unit, and the short message analysis unit is used to analyze the encrypted short message, restore the ciphertext, and then store it to restore the ciphertext, which is the prefix of the encrypted short message remove.
[0060] Using the method described in the present invention, compared with the traditional network locking method, this method supports the operator to modify the locked network parameters and parameter list through the air interface, and does not need to increase the air interface signaling, which greatly facilitates the operator's lock. Network operation, thereby reducing operating costs.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Self-pushed type radial horizontal well steering device

InactiveCN102704840AAvoid casing segment milling and reamingReduce operating costsDirectional drillingAutomatic control for drillingPiston cylinderHigh pressure chamber
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)

Agricultural hauling vehicle and vehicle network

InactiveUS20120265412A1Reduce operating costsAvoid excessive interruptionAnalogue computers for trafficMowersAutomotive engineeringVehicle networks
Owner:CLAAS SELBSTFAHRENDE ERNTEMASCHINEN GMBH

Classification and recommendation of technical efficacy words

  • Improve security
  • Reduce operating costs
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products