Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing mobile terminal to lock network or card by utilizing driver

A mobile terminal and terminal technology, which is applied in the field of communication, can solve problems such as abnormal use, low security, and easy leakage of secrets, and achieve the effect of preventing illegal unlocking and improving security

Active Publication Date: 2014-09-10
ZTE CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has the following deficiencies: 1. It is necessary to perform a locking operation before selling, and the unlocking code and key are stored in the mobile terminal, and the key or unlocking code is in a one-to-one relationship with the terminal, so the mobile terminal must be locked one by one. Locking increases the production burden to a certain extent, locking the network is cumbersome and wastes a lot of time; 2. The locked public key and private key are kept separately, and the operation is completed through the interaction between the DIAG port and the locking software, so it is safe 3. Since the terminal is in the locked network state, but the mode is not in the working mode, and the locked network is controlled in the NV, it is easy to be cracked
This solution realizes the one-to-one correspondence between the SIM card and the terminal by writing the IMEI number of the device in the SIM card, but this solution has the following shortcomings: 1. The card locking mechanism is too simple and easy to crack, just write another one with the same IMEI number The terminal can realize the reuse of the SIM card, so there is no way to guarantee the interests of the operator; 2. After the user changes the card, the lock operation must be performed to realize the machine-card interlocking function
[0006] For example, the Chinese patent application CN200710130098.2 titled "A Wireless Terminal and Its Method for Interlocking and Unlocking It with a Subscriber Identification Card" is another solution to realize machine-card interlocking. This patent writes in the SIM card The random number thus realizes the one-to-one correspondence between the SIM card and the SIM card, but interlocking cannot be realized when the user changes the SIM card, and when the user takes the SIM card to other terminals, it cannot be used normally
[0007] The above-mentioned network locking methods only realize the network locking function on the terminal, and it is possible to crack through the exhaustive method, so to a certain extent, they are easy to crack and have poor protection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing mobile terminal to lock network or card by utilizing driver
  • Method for realizing mobile terminal to lock network or card by utilizing driver
  • Method for realizing mobile terminal to lock network or card by utilizing driver

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] This patent proposes a method of using the driver to realize network lock and card lock. Firstly, the binding relationship between the driver and the terminal is realized, that is, the driver only guarantees smooth communication with one terminal port, and the terminal can be used normally with the support of this driver, and other terminals Under this drive, hackers are prevented from cracking the terminal action because the port is unreachable; then use the terminal and the driver to double bind the country code (Mobile Country Code, hereinafter referred to as MCC) and mobile network code (Mobile Network Code, hereinafter referred to as MNC) of the user's SIM card , that is, only this type of SIM card can guarantee the normal use of the driver, thereby realizing the network lock. If the driver is bound with the International Mobile Subscriber Identification number (IMSI) of the SIM card, the card can be locked. Since the method first uses the driver to bind the termina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing a mobile terminal to lock the network or a card by utilizing a driver. The method for realizing a mobile terminal to lock the network, which comprises the following steps: binding the driver used by the mobile terminal and the terminal, and utilizing the terminal and the driver to dually bind the Mobile County Code (MCC) and Mobile Network Code (MNC) of the user SIM card. The method for realizing a mobile terminal to lock a card by utilizing a driver, which comprises the following steps: binding the driver used by the mobile terminal and the terminal, and utilizing the terminal and the driver to dually bind the Internal Mobile Subscriber Identification Code (IMSI) of the user SIM card. The method first adopts the driver to bind the terminal, and then adopts the terminal and the driver to dually bind the SIM card, thereby greatly improving security and preventing illegal unlocking to a great extent.

Description

technical field [0001] The present invention relates to the technical field of communication, and more specifically, relates to a method for realizing network locking or card locking of a mobile terminal by using a driver. Background technique [0002] With the global popularity of 3G networks and the intensification of competition among operators, the sales methods of wireless terminal devices (Wireless Terminal Device) are mostly customized by operators in addition to the sales channels of traditional manufacturers, and large-scale subsidies are low. At this time, it is particularly important for the wireless terminal equipment to bind and restrict the use of the operation network of a specific operator. However, the current network lock scheme is only implemented on the terminal, so there are disadvantages such as low protection and easy cracking. [0003] For example, the Chinese patent application No. CN200710087431 titled "Asymmetric Algorithm-Based Protection and Unl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/18
Inventor 王科平朱作义车忠辉
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products