Method for realizing locking of user number by wireless terminal device, unlocking method and device

A technology for wireless terminals and user numbers, applied in the field of communication security, can solve the problems of cumbersome use methods, easy to crack, low security, inconvenience, etc., and achieve the effect of simple and convenient unlocking process and strong implementation flexibility.

Inactive Publication Date: 2009-12-30
ZTE CORP
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to restrict the use of wireless terminal devices, the following methods are generally adopted: lock the network, and use wireless terminal devices to bind Mobile Country Code (hereinafter referred to as MCC) and Mobile Network Code (Mobile Network Code, hereinafter referred to as MNC for short), this wireless terminal device has a one-to-many relationship with the SIM card, even if the user loses the wireless terminal device, this wireless terminal device can also be used with other SIM cards in the network, and the security is obviously not guaranteed
[0004] In order to limit the scope of use of wireless terminal equipment, there is also a method of binding wireless terminal equipment to a user cell (CELL ID). Inconvenience to users
There is another method, that is, the method of machine-card interlocking. Write the International Mobile Equipment Identity (IMEI) number of the device i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing locking of user number by wireless terminal device, unlocking method and device
  • Method for realizing locking of user number by wireless terminal device, unlocking method and device
  • Method for realizing locking of user number by wireless terminal device, unlocking method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0069] The specific implementation manner of a method and an apparatus for implementing a wireless terminal device locking a subscriber number provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0070] First, a method for implementing a wireless terminal device to lock a user number provided by an embodiment of the present invention is described in detail.

[0071] like figure 1 As shown, the embodiment of the present invention provides a method for locking a user number of a wireless terminal device. Before the wireless terminal device is powered on and enters an initialization state, the following steps are performed:

[0072] S101. Determine whether a SIM card is inserted into the wireless terminal device, if yes, go to S102, if not, go to step S112.

[0073] S102: Determine whether the inserted SIM card is a test SIM card, if so, go to step S111; otherwise, go to step S103.

[0074] This step S102 is an optio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing locking of a user number by a wireless terminal device, an unlocking method and a device. The method for realizing the locking of the user number by the wireless terminal device comprises the following steps: reading IMEI of the wireless terminal device and the current user number which is stored in an inserted SIM card and pre-distributed to the wireless terminal device; calculating a first mapped value between the IMEI and the user number; reading IMSI of the SIM card, and calculating a second mapped value between the user number and the IMSI; comparing the calculated first mapped value and the second mapped value, the mapped value between the IMEI pre-stored by the wireless terminal device and the user number and the mapped value between the IMSI and the user number; and when the comparison results are consistent, permitting the wireless terminal device to be used. The invention establishes a binding relation between the wireless terminal device and the user number, has high safety, and is simple and convenient to use.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a method for realizing locking of a user number by a wireless terminal device, an unlocking method and a device thereof. Background technique [0002] With the global popularity of 3G networks and the intensification of competition among operators, wireless terminal devices (Wireless Terminal Device) are more customized by operators. Considering the needs of operators and user safety, wireless terminal devices The binding restriction function of is particularly important. [0003] Typical wireless terminal equipment includes wireless USB MODEM, wireless data card, mobile phone and so on. In order to restrict the use of wireless terminal devices, the following methods are generally adopted: lock the network, and use wireless terminal devices to bind Mobile Country Code (hereinafter referred to as MCC) and Mobile Network Code (Mobile Network Code, hereinafter referred to as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W8/18H04W12/00H04W12/48
CPCH04W8/183
Inventor 王科平车忠辉宋欣郑宏涛胡乐申段明艳
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products