Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secondary card terminal management method and management server

A management server and management method technology, applied in the field of secondary card terminal management and secondary card terminal management server, can solve problems such as low security and poor timeliness, and achieve the effect of protecting information security and eliminating tedious work.

Active Publication Date: 2021-11-26
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF18 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention at least partly solves the problem of poor timeliness and low security in the existing way of dealing with the theft of secondary card terminals, and provides a management method and management server for secondary card terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secondary card terminal management method and management server
  • Secondary card terminal management method and management server
  • Secondary card terminal management method and management server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0036] As an embodiment of the present invention, such as image 3 As shown, a management method for a secondary card terminal 2b is provided, and the secondary card terminal 2b corresponds to a primary card terminal 2a. The management method can be executed by the management server 1 .

[0037] For ease of understanding, firstly, the network architecture where the secondary card terminal 2b is located is introduced. Of course, the method provided in this embodiment can also be applied to other types of network architectures.

[0038] The management server 1 is responsible for the signing, authorization and management of the No. 1 multi-card service. Specifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a management method and a management server of a secondary card terminal, belonging to the technical field of communication, which can at least partially solve the existing problems of safety risks and inconvenient handling for users when the secondary card terminal is stolen. The management method of the present invention includes: judging whether the secondary card terminal and the primary card terminal are currently at the same location; if not, obtaining the historical access IP address records of the primary card terminal and the secondary card terminal to obtain historical access information; querying the historical access information Whether there is an IP address currently accessed by the secondary card terminal; if not, the network access function of the secondary card terminal is locked, and a security verification request is sent to the secondary card terminal; the information to be verified sent by the secondary card terminal is received, and Perform security verification on the information to be verified; when the information to be verified passes the security verification, unlock the network access function of the secondary card terminal; when the information to be verified fails the security verification, maintain the network access function of the secondary card terminal locking.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a management method of a secondary card terminal and a management server of the secondary card terminal. Background technique [0002] Communication operators are now able to provide one-number multi-terminal services. For example, the mobile phone is used as the main card terminal, and the smart bracelet is used as the secondary card terminal, and the mobile phone and the smart bracelet share the same phone number. A specific implementation form may be that an embedded SIM card (also called an Embedded-SIM card or an eSIM card) is set in the smart bracelet. Of course, the same primary card terminal can also correspond to multiple secondary card terminals. [0003] If the secondary card terminal is stolen, the existing processing method is that the user of the primary card terminal dials a customer service number or reports the loss of the secondary card termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/18H04W12/00H04W12/06H04W64/00H04W88/06H04W12/126
CPCH04W8/18H04W64/00H04W12/06H04W88/06H04W12/40
Inventor 肖征荣王东田新雪马书惠
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products