SIM card information protection method and device
A technology of card information and registration information, applied in the protection of internal/peripheral computer components, digital data authentication, etc., can solve the problems of SIM card information leakage and cannot be replaced at will, and achieve the effect of improving security and preventing modification.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0055] In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as there is no conflict with each other.
[0056] In this embodiment, the terminal is usually a microcomputer device with a communication function, equipped with a central processing unit, a memory, an input device, and an output device, and integrates embedded computing, control technology, artificial intelligence technology, and biometric authenticat...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


