Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and mobile terminal for security authentication of user identification card lock data

A user identification card and user identification technology, applied in security devices, electrical components, wireless communications, etc., can solve problems such as low security, malicious attacks, cracking and tampering of SIMLOCK data, and achieve the effect of improving security

Active Publication Date: 2016-05-25
HONOR DEVICE CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing method of saving SIMLOCK information, the SIMLOCK data of the operator in the memory partition is vulnerable to malicious attacks, cracked and tampered with, and the security is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and mobile terminal for security authentication of user identification card lock data
  • Method and mobile terminal for security authentication of user identification card lock data
  • Method and mobile terminal for security authentication of user identification card lock data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0018] The methods provided by the embodiments of the present invention can be applied to various mobile communication systems.

[0019] figure 1 A schematic flow diagram of an embodiment of a method for inventing user identification card lock data for security authentication, such as figure 1 As shown, the method includes:

[0020] Step 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a method for security authentication of user identification card lock data and a mobile terminal. Wherein, the method includes: physically fusing the corresponding register bits in the fuse register of the user identification card lock data corresponding to at least one operator stored in the mobile terminal code storage area, so that the user identification card lock data The corresponding register bit enables; if the data of the operator of the subscriber identification card is consistent with the subscriber identification card lock data corresponding to the enabled register bit, then the subscriber identification card lock data in the code storage area is adopted The secure boot mechanism performs security authentication. The embodiments of the present invention can protect the operator's user identification card lock data from being cracked and tampered with, and improve the security of the user identification card lock data.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of wireless communication, and in particular to a method for security authentication of user identification card lock data and a mobile terminal. Background technique [0002] The function of subscriber identity module lock (Subscriber Identity Module lock, SIMLOCK) is that the mobile phone operator restricts other operators' subscriber identity card (Subscriber Identity Module, hereinafter referred to as: SIM) card or global subscriber identity (Universal Subscriber Identity Module, hereinafter referred to as: USIM) card in the mobile phone it operates. A function used on the Internet is a way to bind the mobile phone with the operator, that is, the mobile phone with SIMLOCK information can only use the SIM card of the operator specified in SIMLOCK, otherwise it needs to enter a password to use, thus protecting Carriers perform specific services. [0003] SIMLOCK information store...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06
CPCH04W12/08H04W12/48
Inventor 朱志英
Owner HONOR DEVICE CO LTD