Unlock instant, AI-driven research and patent intelligence for your innovation.

Protection method, system and mobile terminal of SIM card information

A mobile terminal and protection system technology, applied in the field of communication, can solve problems such as inconvenience and loss of mobile terminal users, and achieve the effect of protecting safety

Active Publication Date: 2013-08-14
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If mobile terminal manufacturers use operating systems such as Android and Windows Mobile to develop mobile terminal software without protecting or controlling or modifying the SIM card read-write interface, then the SIM card read-write interface is in a public state, and third parties can develop software to read and write to the SIM card. The IMSI, contacts, and short messages in the card can be read arbitrarily, so if the user downloads the above-mentioned third-party software that can read the SIM card information arbitrarily, because there are no restrictions and security protection measures, once the information is leaked, the mobile Huge loss for the end user
[0004] In summary, the existing SIM card information protection technology obviously has inconvenience and defects in actual use, so it is necessary to improve it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method, system and mobile terminal of SIM card information
  • Protection method, system and mobile terminal of SIM card information
  • Protection method, system and mobile terminal of SIM card information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] figure 1 Shown the structure of the protection system of SIM card information of the present invention, this protection system 10 can be the software unit that is applied in mobile terminal 100, hardware unit or combination unit of software and hardware, and mobile terminal 100 can be mobile phone, PDA (Personal Digital Assistant, personal digital assistant), etc. The protection system 10 mainly includes a read-write judgment module 11, an electronic signature module 12 and an authentication module 13, wherein:

[0030] The read-write judging module 11 is used to judge whether the software...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a protection method of SIM card information, comprising the following steps: read-write judgement: when the software of a mobile terminal operates, judging whether the software requests to write and read an SIM card; if yes, performing the following electronic signature step; electronic signature: adopting a first secret key to carry out electronic signature on the softwarepermitted to write and read the SIM card; authentication: judging whether the software required to write and read the SIM card has the electronic signature; if yes, adopting a second secret key corresponding to the first secret key to decrypt and authenticate the electronic signature; and reading and writing the SIM card after the electronic signature is authenticated. The invention also providesa protection system and a mobile terminal of SIM card information. The invention adopts the electronic signature protection scheme for the SIM card reading and writing of the mobile terminal so as torestrict an unauthorized party to read, revise and control the SIM card information, thus effectively protecting the safety of user information.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, system and mobile terminal for protecting SIM (Subscriber Identity Module, subscriber identification card) card information. Background technique [0002] In the prior art, when a newly purchased mobile terminal is turned on for the first time or when the mobile terminal is turned on for the first time in a new roaming location, it is necessary to obtain the IMSI (International Mobile Subscriber Identity, International Mobile Subscriber Identity) in the SIM card during the initialization process of the mobile terminal. Subscriber Identification Code) and the network interactively assigns TMSI (Temporary Mobile Subscriber Identity, Temporary Mobile Subscriber Identity). After that, in the use of the mobile terminal, if the software running in the mobile terminal does not conflict with the SIM card reading, no matter it is the original software of the mobil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04M1/725G06K17/00
Inventor 曹希彬翁建勇马建勇
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD