Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SIM card with dual-password operation

A dual-password and secondary-password technology, applied in the field of SIM cards, can solve difficult problems and achieve the effects of avoiding attacks, good marketing prospects, and accurate verification methods

Pending Publication Date: 2018-06-08
黄策
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For various attacks on mobile network applications that are increasingly rampant, although various mobile network applications generally adopt the method of SMS secondary verification at present, for various virus software, it is easy to intercept the secondary verification SMS and break through SMS authentication. Secondary verification is the main feature of the security mechanism. For current hackers, it is no longer a difficult technical threshold

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] Below in conjunction with specific embodiment content of the present invention is described in detail:

[0012] This embodiment takes the mobile phone application process as an example.

[0013] The whole process is described as follows:

[0014] 1) Core data injection process:

[0015] 1. Enter the master password,

[0016] 2. Set the sending number of the secondary password in SMS format for applications installed on the mobile phone that need to use the encryption module on the mobile phone SIM card to protect the core data, and set the initial secondary password.

[0017] 3. The secondary password sends out the number and sends out the initial secondary password.

[0018] 4. The APP installed on the mobile phone changes the secondary password, and downloads the core data to the corresponding data encryption module on the SIM.

[0019] 5. Exit the state of downloading data from the SIM card to the encryption module.

[0020] Note: The downloaded core data can be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a novel method for protecting application core data of an information terminal including an SIM card. The method is characterized in that when an encryption model included byan SIM card is written or read, the writing or reading operation can not be carried out until two passwords including a main password and an auxiliary password are used. The encryption module can be adata storage module or a program storage module with the program download function. According to the invention, a high-efficiency and convenient application core data protection scheme of an information terminal is provided for the information terminal with an SIM card and the method scheme has the broad market promotion prospects. Among widely applied mobile phone applications, the existing popular man-machine and man-machine secondary verification mode is changed into a man-machine and machine-machine secondary verification mode, so that a reliable and accurate verification mode is provided.

Description

technical field [0001] The invention relates to a SIM card operated by double passwords. Background technique [0002] With the rapid development of mobile network applications, more and more mobile network applications are installed in the mobile phones that people carry with them. The key data of various applications in mobile phones has also become the target of various criminals. Once the key data of the application in the mobile phone is stolen, the mobile phone owner's application on his mobile phone cannot escape the fate of being attacked and stolen. [0003] For various attacks on mobile network applications that are increasingly rampant, although various mobile network applications generally adopt the method of SMS secondary verification at present, for various virus software, it is easy to intercept the secondary verification SMS and break through SMS authentication. Secondary verification is the main characteristic security mechanism, and it is no longer a diff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/18H04W12/06H04M1/67H04M1/725
CPCH04M1/67H04W8/183H04W12/06H04M1/72463
Inventor 黄策
Owner 黄策
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products