Check patentability & draft patents in minutes with Patsnap Eureka AI!

Mobile communication terminal authentication code preparation process

A mobile communication terminal and mobile communication technology, applied in the protection of internal/peripheral computer components, etc., can solve the problems of being easy to be imitated and easily infringed, and achieve the effects of preventing imitation, high safety, and simple preparation process

Pending Publication Date: 2016-11-02
XIAN SIYU TANGCHENG SOFTWARE
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The invention provides a preparation process of mobile communication terminal authentication code, which is used to solve the defects of easy imitation and infringement in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The technical solutions of the present invention will be further described below in conjunction with specific embodiments.

[0013] The mobile communication terminal authentication code preparation process of the present invention, the mobile communication terminal is provided with a data transmission interface, and the preparation of the authentication code includes the following steps:

[0014] 1) Set the burning control file in the removable storage device in advance;

[0015] 2) Place the mobile communication terminal into the authentication code burning process position;

[0016] 3) Insert the removable storage device into the data transmission interface of the mobile communication terminal, the mobile communication terminal reads the authentication code in the removable storage device, and burns the authentication code into the mobile communication terminal. In the communication terminal;

[0017] 4) The data storage module in the mobile communication terminal r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a process for preparing an authentication code of a mobile communication terminal. The mobile communication terminal is provided with a data transmission interface, and the preparation of the authentication code includes the following steps: 1) setting a burning control file in a removable storage device in advance; 2) ) placing the mobile communication terminal into the authentication code burning process position; 3) inserting the removable storage device into the data transmission interface of the mobile communication terminal, and the mobile communication terminal reads the removable storage device 4) the data storage module in the mobile communication terminal reads and stores the authentication code in the removable storage device, and updates the removable Control information in storage devices. The preparation process of the invention is simple, and can effectively prevent imitation and infringement; the mobile device can also be tracked and locked through the authentication code, knowing the location of the mobile device is helpful for retrieving the stolen mobile device, and has high security.

Description

technical field [0001] The invention relates to the preparation of an authentication code, in particular to a preparation process for an authentication code of a mobile communication terminal. Background technique [0002] "Authentication code" sometimes refers to "machine code", which means that some software has taken certain protection measures to prevent piracy. When the user registers, a unique identification code will be generated according to the computer software and hardware information installed by the user software, which is generally called a machine code, also called a serial number, registration application code, etc. The authentication code is an identification code given to the software by the software developer, which is similar to a person's ID number, and its function is mainly to prevent the software from being stolen by the user. This code is unique in the world, and each mobile communication device will be given a globally unique set of numbers after a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/88
Inventor 焦峰
Owner XIAN SIYU TANGCHENG SOFTWARE
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More