Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal protecting methdo and system

A terminal protection and terminal technology, applied in the field of communication, to achieve the effect of simple and convenient

Inactive Publication Date: 2009-10-07
ZTE CORP
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the above-mentioned problem that a terminal with separate machine and card can still be used after being stolen with other cards, the present invention aims to provide an improved terminal protection scheme to solve one of the above-mentioned problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal protecting methdo and system
  • Terminal protecting methdo and system
  • Terminal protecting methdo and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Functional Overview

[0032] As mentioned above, since it is currently impossible to restrict the use of a terminal that supports machine-card separation after being stolen, based on this, the present invention provides an improved terminal protection scheme to simply and conveniently solve the problem of using other cards after the terminal is stolen. Questions that can be used. The basic idea of ​​the present invention is: after the terminal (the terminal supports machine-card separation, denoted as terminal 1) is turned on, the SIM card therein judges whether the terminal 1 is consistent with the terminal where the SIM card was before, and when the judgment result is inconsistent, the SIM card Send an authentication message comprising the ESN information of the terminal 1 to the HLR, and the HLR determines the state of the terminal corresponding to the ESN information (that is, the state of the terminal 1 recorded at the HLR side) according to the authentication mess...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal protecting method and system, wherein the terminal protecting method comprises: judging wether the prior terminal of the SIM card located is in consonance with the terminal of the SIM card located before by the SIM card; if not, sending authentication information to HLR by the SIM card, wherein the authentication information comprises ESN information of prior terminal; forbiding the prior location terminal accessing network when HLR judges that the terminal corresponding to ESN information is in lost reporting state. The method and system of the invention overcomes problem that other cards are available when the terminal is stolen, and the invention can be implemented simply and conveniently.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a terminal protection method and system. Background technique [0002] figure 1 is a schematic structural diagram of a communication system in the prior art, such as figure 1 As shown, the mobile terminal (Mobile Terminal, referred to as MT) accesses the core network system through the wireless network, and the core network elements MSC (Mobile Switching Center, mobile switching center), VLR (Visitor Location Register, visitor location register), HLR (Home Location Register, Home Location Register) and AUC (Authentication Center) communicate through the NO7 signaling network, wherein MSC is used to call and connect users, VLR is used to temporarily store user subscription information, and HLR is used for permanent Save the user's subscription information and save the user's location information in real time. [0003] With the application of the specification of machine-card ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/12H04W12/126
CPCH04W12/12H04W12/06H04W12/0431H04W12/126
Inventor 林旭袁迎峰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products