Method of locking network delocking and number burglary for PHS mobile phone

A technology for locking the network and mobile phones, which is applied in the field of restricting and unblocking PHS mobile phone network access, which can solve problems such as unresolved and inability to re-enter the network for use, and achieve the effect of facilitating after-sales problems and solutions

Inactive Publication Date: 2006-11-29
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For this reason, the operator needs to restrict the network access of this subsidized mobile phone, hoping to limit the use of this mobile phone in the local network, and cannot be re-connected to the network in other places. However, there is currently no convenient and reliable method to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of locking network delocking and number burglary for PHS mobile phone
  • Method of locking network delocking and number burglary for PHS mobile phone
  • Method of locking network delocking and number burglary for PHS mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Now when the PHS mobile phone is burning the number, the general mobile phone will enter a special mode, which we call "TestMode" (called test mode or burning mode in Chinese), such as figure 1 . After entering this mode, the mobile phone software is already running. When receiving the burning software, read and write to the memory (here we refer to eeprom, Electrically Erasable & Programmable ROM, Electrically Erasable Programmable Read-Only Memory, or other storage media) When the command is issued, the mobile phone software will analyze the read and write command, and the mobile phone software will specifically read and write the memory, and then return to the state of reading and writing; in this way, the burning software can write some parameters into the mobile phone to complete Code writing work on mobile phones. In order to lock the network, we can determine an address bit of the eeprom as the network lock flag. When the mobile phone enters the number burning m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is a network locking, unlocking and number burning method for PHS cellphone, where the network locking is that: after the cellphone enters in a number burning mode, the cellphone software receives read-write instruction of the number burning software to the memory and then analyses the read-write instruction, and it uses the cellphone software to read and write the memory and uses the number burning software to write in right identification code and other number burning data and writes in the network locking sign; the unlocking is that: according to PSNUM or PSID, generating unlocking code or using the right identification code as unlocking code, and after inputting the unlocking instruction, the cellphone software analyses the unlocking instruction and judges its classification: if the unlocking code is valid, eliminate the network locking sign. The method can be adapted to two requirements of locking and unlocking network.

Description

technical field [0001] The invention belongs to the field of mobile communication, in particular to a method for restricting and releasing the restriction on PHS mobile phone network access. technical background [0002] In order to develop users, PHS operators in various places now need to carry out various promotional activities, the main of which is the price subsidy policy, such as selling mobile phones to users lower than the purchase price of mobile phones, or paying phone bills to give away mobile phones, etc. In this way, users can get mobile phones at a very low price or for free. Some PHS mobile phone sellers may obtain mobile phones at a low price from an operator in a certain area, and then sell them at a high price in other areas, thereby earning subsidies from the operator for market development. For this reason, the operator needs to restrict the network access of this subsidized mobile phone, hoping to limit the use of this mobile phone in the local network,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/32G06F12/00G06F9/30H04M1/72463H04W88/02
Inventor 徐胜海
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products