SIM card with dual-password operation
A dual-password and secondary-password technology, applied in the field of SIM cards, can solve difficult problems and achieve the effects of avoiding attacks, good marketing prospects, and accurate verification methods
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0011] Below in conjunction with specific embodiment content of the present invention is described in detail:
[0012] This embodiment takes the mobile phone application process as an example.
[0013] The whole process is described as follows:
[0014] 1) Core data injection process:
[0015] 1. Enter the master password,
[0016] 2. Set the sending number of the secondary password in SMS format for applications installed on the mobile phone that need to use the encryption module on the mobile phone SIM card to protect the core data, and set the initial secondary password.
[0017] 3. The secondary password sends out the number and sends out the initial secondary password.
[0018] 4. The APP installed on the mobile phone changes the secondary password, and downloads the core data to the corresponding data encryption module on the SIM.
[0019] 5. Exit the state of downloading data from the SIM card to the encryption module.
[0020] Note: The downloaded core data can be...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More