Method and apparatus for preventing illegal use of user identification module
A user identification module and illegal technology, which is applied in security devices, selection devices, user identity/authority verification, etc., to achieve the effect of preventing stolen calls, preventing illegal use, and convenient and fast use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] Embodiments of the present invention will be further explained in detail below in conjunction with the accompanying drawings.
[0020] With the development of mobile communication technology, the basic functions of the SIM card in the GSM network or the UIM card in the CDMA network can no longer meet the diverse needs of users, and the development of smart card technology has further expanded the application tools of the user identification module. Package functionality is made possible. That is to say, STK (SIM card application tool kit, SIM APPLICATION TOOL KIT) or UTK (UIM card application tool kit, UIM APPLICATION TOOL KIT) provides means for developing new service functions of SIM card or UIM card. STK or UTK is a tool service software based on the SIM card or UIM card operating system to develop value-added services, which can be understood as the active operating system of the SIM card or UIM card derived from the passive operating system of the original SIM card...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 