Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for realizing interlocking of phone and card

A machine card, the only technology, applied in the field of machine card interlocking, can solve the problems of SIM card damage, PIN failure, PIN code stolen interlock function, etc., to achieve the effect of protecting rights and high confidentiality

Inactive Publication Date: 2010-05-19
ZTE CORP
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main problem is that if the user uses the SIM card with the PIN code unlocked on his non-locked mobile phone, the mobile phone will ask the user to enter the PIN, and if the user does not know the PIN, the user may continuously enter non-PIN, causing the PIN to become invalid. , as long as the user enters the PUK of the card, the PIN can be reset to break the interlock between the machine and the card
The result is: if the PIN code is stolen, the interlock function will be invalid
[0011] In another solution, the PIN code is made into a random number. If the user inserts an ordinary SIM card into a terminal with an interlock function, the terminal will forcibly enable the PIN verification of the card and enter a randomly generated PIN code, which will cause User's SIM card is damaged
Causes the SIM card that you don't want to be locked to be locked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing interlocking of phone and card
  • Method and system for realizing interlocking of phone and card
  • Method and system for realizing interlocking of phone and card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047]In order for a terminal (or called a mobile station) to access the network normally, it needs to provide information such as International Mobile Subscriber Identity (IMSI, International mobile subscriber identity), Electronic Serial Number (ESN, ElectronicSerial Number) and so on. When a terminal initiates a call, is called, sends a short message, or registers with the network to access the system, the terminal needs to be authenticated. Authentication refers to the process of exchanging information between the mobile station and the network to verify the legitimacy of the mobile station. An authentication algorithm should be used for authentication. This article uses the authentication CAVE algorithm of a CDMA mobile phone as an example to illustrate. In the CAVE authentication algorithm, this paper only involves several important parameters related to the present invention, the ESN (PESN) of the terminal, the IMSI of the card, and the RUIMID (or EUIMID) of the card, n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for realizing the interlocking of a phone and a card. The method comprises that: a terminal sends a personal ESN (or PESN) to the card; the card stores personal unique identification information in the terminal; and when the terminal performs authentication, a network performs the authentication by using the ESN (or PESN) of the terminal and the unique identification information of the card. The method of the invention realizes the fully interlocking of the phone and the card, namely, only the terminal in a corresponding relation stored in the network can use the card corresponding to the corresponding relation and the card in the corresponding relation can only be used on the terminal. The method of the invention utilizes conventional parameters of the terminal and the card, not only brings convenience to the related service development of operators so that confidentiality is relatively higher and users cannot cancel the interlocking even though knowing the interlocking principle of the phone and the card, but also protects the right of the operators to the largest extent.

Description

technical field [0001] The invention relates to machine-card interlock technology, in particular to a method and system for realizing machine-card interlock. Background technique [0002] At present, the competition in the field of mobile communication is becoming more and more fierce. In order to expand the number of users, operators will introduce various preferential policies to attract customers. For example, free mobile phones, preferential purchases, free phone bills, etc. At the same time, in order to protect their own interests, operators often require these customers who enjoy preferential policies to use the operator's network within a certain period of time or must use its network. Even the same operator may have different tariff preferential policies in different regions. For example, in some promotional activities, many mobile phones are almost free of charge. Operators do not allow users to switch networks midway, otherwise the mobile phones sold to users may...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/18H04W12/06H04W12/48
CPCH04W12/06
Inventor 王斌侯宇明
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products