Method, device and system for unlocking mobile terminal by network operator

A mobile terminal, operator technology, applied in the field of communication, can solve problems such as poor security, achieve the effect of improving satisfaction, speeding up, and simplifying the unlocking process

Active Publication Date: 2011-03-23
ZTE CORP
View PDF5 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The main purpose of the present invention is to provide a method, device and system for an operator to unlock a mobile terminal, so as to at least solve the above-mentioned problem of poor security for the operator to control the unlocking of a mobile terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for unlocking mobile terminal by network operator
  • Method, device and system for unlocking mobile terminal by network operator
  • Method, device and system for unlocking mobile terminal by network operator

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] This embodiment provides a method for an operator to unlock a mobile terminal, see figure 1 , the method includes the following steps:

[0026] Step S102, the operator equipment receives an unlock request from the mobile terminal, and the unlock request carries unlock identification information;

[0027] Wherein, the operator equipment can receive the unlocking request from the mobile terminal in one of the following ways: SMS, USSD (Unstructured Supplementary Service Data, Unstructured Supplementary Service Data) or WAP (Wireless Application Protocol, Wireless Application Protocol) way.

[0028] Step S104, the operator equipment determines that the mobile terminal is allowed to unlock according to the unlock identification information, and queries the key list database pre-stored in the operator equipment according to the unlock identification information to obtain the unlock key;

[0029] The key list database pre-stored in the operator's equipment can be obtained in...

Embodiment 2

[0042] This embodiment provides a method for an operator to unlock a mobile terminal, see image 3 , the method for an operator to unlock a mobile terminal comprises the following steps:

[0043] Step S302, the user sends an unlocking request to the operator by a certain communication method, and sends the unlocking information to the operator;

[0044] Wherein, the unlocking information is some specific identification information, and these identification information can fulfill the requirement of key query required by a given locking mode. For example, for the card locking method, the unlocking information may include the International Mobile Subscriber Identity (IMEI number) of the user's mobile phone, the network control password, and the unlocking request.

[0045] The communication method between the terminal phone and the operator can be any suitable method, as long as it can meet the unlocking requirements, for example, it can be implemented by sending short messages,...

Embodiment 3

[0063] This embodiment provides an operator equipment, see Figure 5 , the carrier equipment includes:

[0064] The receiving module 52 is configured to receive an unlock request from the mobile terminal, wherein the unlock request carries unlock identification information;

[0065] The operator's equipment receives the unlocking request from the mobile terminal in one of the following ways: SMS, USSD or WAP.

[0066] The retrieval module 54 is connected to the receiving module 52, and is used to determine that the mobile terminal is allowed to unlock according to the unlocking identification information, and query the key list database pre-stored in the operator's equipment according to the unlocking identification information to obtain the unlocking key;

[0067] The sending module 56 is connected with the retrieval module 54, and is used for sending the unlocking key to the mobile terminal, so that the mobile terminal can be unlocked according to the unlocking key.

[006...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses method, device and system for unlocking a mobile terminal by network operator. The method comprises the steps of: receiving an unlocking request from a mobile terminal by an operator device, wherein the unlocking request carries unlocking identification information; determining to allow the movable terminal to unlock by the operator device according to the unlocking identification information, and inquiring a secret key lift database pre-stored in the operator device according to the unlocking identification information to obtain an unlocking secret key; and sending the unlocking secret key to the mobile terminal by the operator device to ensure that the mobile terminal carries out the unlocking according to the unlocking secret key. According to the invention, the problem of poorer safety of unlocking by the mobile terminal under the control of an operator is solved, meanwhile, the unlocking process is simplified, the speed of responding the unlocking request of the mobile terminal is quickened, and the satisfaction of using the mobile terminal by a user is improved.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method, device and system for an operator to unlock a mobile terminal. Background technique [0002] In recent years, with the rapid development of mobile phone technology, operators have put forward higher requirements for customized services. Operators often put forward lock system requirements such as network lock / lock card / lock terminal when customizing mobile terminal products. Among them, the definitions of lock network / lock card / lock terminal are as follows: [0003] Locking is a special requirement for the terminal. After the mobile terminal is locked to a specific card, it is required that the terminal can only use this specific card, and other cards cannot be used normally on this terminal. [0004] Locking the card is a special requirement for the card. When the card is locked, it is required that the card can only be used on a certain terminal and cannot be used o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/22H04W12/04H04W88/02H04W12/0431
CPCH04L63/062H04L63/0428H04W12/08H04W12/06H04L63/0876H04W8/183H04W12/04H04W8/245H04L63/083H04W12/71H04W12/082
Inventor 席春艳韩春元李学军
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products