Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for preventing illegal use of user identification module

A user identification module and illegal technology, which is applied in security devices, selection devices, user identity/authority verification, etc., to achieve the effect of preventing stolen calls, preventing illegal use, and convenient and fast use

Inactive Publication Date: 2006-06-14
DATANG MICROELECTRONICS TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a method that is convenient for users and effectively prevents the illegal use of the user identification module, so as to solve the technical problems of preventing the user identification module from being stolen and protecting the content stored in the user identification module

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for preventing illegal use of user identification module
  • Method and apparatus for preventing illegal use of user identification module
  • Method and apparatus for preventing illegal use of user identification module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Embodiments of the present invention will be further explained in detail below in conjunction with the accompanying drawings.

[0020] With the development of mobile communication technology, the basic functions of the SIM card in the GSM network or the UIM card in the CDMA network can no longer meet the diverse needs of users, and the development of smart card technology has further expanded the application tools of the user identification module. Package functionality is made possible. That is to say, STK (SIM card application tool kit, SIM APPLICATION TOOL KIT) or UTK (UIM card application tool kit, UIM APPLICATION TOOL KIT) provides means for developing new service functions of SIM card or UIM card. STK or UTK is a tool service software based on the SIM card or UIM card operating system to develop value-added services, which can be understood as the active operating system of the SIM card or UIM card derived from the passive operating system of the original SIM card...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for preventing illegal use of a user identification module, comprising presetting an anti-stealing password in the user identification module; when the user identification module is lost, the user logs in to a website provided with services for preventing the illegal use of the user identification module, and enters the lost mobile user ID Number, anti-theft password and new PIN1 code information, the server of the website will send the information to the air service management server; the air service management server will send the information to the short message service center, and the short message service center will send the information to the lost user identification module. The subscriber identification module judges whether the anti-theft password received is consistent with the preset anti-theft password. If it is consistent, modify the anti-theft password in the subscriber identification module to a new PIN1 code, set the status of the PIN1 code to be valid, and restart the mobile phone. terminal, otherwise end. The above method effectively prevents the subscriber identification module from being used illegally, avoids the phenomenon of being stolen, and more importantly, protects important information on the subscriber identification module.

Description

technical field [0001] The invention relates to a method for preventing illegal use of mobile communication equipment, in particular to a method for preventing illegal use of a subscriber identification module in a mobile terminal. Background technique [0002] Currently, due to the technological maturity and perfection of mobile communication networks (such as GSM, CDMA, etc.), mobile phones have become the most important tool for people to communicate. Simultaneously because mobile phone has characteristics such as body is light and handy, portability is strong, also makes the phenomenon that mobile phone is stolen or lost occurs from time to time, causes economic loss to the user. What's more serious is that because the user identification module of the mobile phone usually stores a lot of private information of the user, such as many other people's contact methods, the user's own schedule and some important data information, etc., if the mobile terminal or the user If t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/32H04L9/32H04W12/126
Inventor 傅宇晨穆肇骊秦预王建
Owner DATANG MICROELECTRONICS TECH CO LTD