Mobile-phone binding method and system
A mobile phone and mobile phone number technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as unsatisfactory security performance and achieve the effect of improving security performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0066] like figure 1 As shown, the system for binding mobile phones in this embodiment includes an analysis module 1, an encryption chip 2, a first judgment module 3, a control module 4, a storage module 5, a data acquisition module 6, a second judgment module 7 and a message sending module 8 .
[0067] The storage module 5 is used for storing the IMSI value corresponding to the SIM card in the mobile phone whose SIM card is successfully bound.
[0068] The data acquisition module 6 is used to acquire the first IMSI value corresponding to the SIM card in the target mobile phone after the user inserts the SIM card into the mobile phone and turns it on.
[0069] The second judging module 7 is used to judge whether the first IMSI value is stored in the storage module 5 , and if not, call the message sending module 8 .
[0070] The message sending module 8 is used to send to the SIM card a reminder message to log in to the website platform to perform a binding operation, and the...
Embodiment 2
[0113] like figure 2 As shown, the method for binding a mobile phone in this embodiment is realized by the system for binding a mobile phone in Embodiment 1, and the method for binding a mobile phone in this embodiment includes:
[0114] S101. When the user performs a binding operation on the website platform through the mobile phone number corresponding to the SIM card in the target mobile phone, the binding information sent by the website platform to the SIM card;
[0115] Wherein, the binding information includes a binding command, a first random number and a first encryption result;
[0116] S102. The target mobile phone obtains a second encryption result through the encryption chip according to the parsed first random number and the key value corresponding to the encryption chip;
[0117] Wherein, both the first encrypted result and the second encrypted result are obtained by the same algorithm based on the same first random number.
[0118] S103, judging whether the f...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

