Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for guaranteeing mobile communication terminal safety

A telecommunications terminal and terminal technology, applied in wireless communication, security devices, user identity/authority verification, etc., can solve the problems of increasing mobile phone costs and users being unable to use mobile phones with family members or friends

Inactive Publication Date: 2004-04-07
DRNC HLDG INC
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] However, this method prevents the user from sharing the mobile phone, for example, the user cannot let family members or friends use his mobile phone
In addition, this requires an additional device for analyzing fingerprints, which increases the cost of the mobile phone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for guaranteeing mobile communication terminal safety
  • Method for guaranteeing mobile communication terminal safety
  • Method for guaranteeing mobile communication terminal safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The solution provided by the invention to the problem of stolen mobile phones can prevent unauthorized individuals from using the mobile phone. Accordingly, the black market trade in stolen terminals will disappear as the stolen terminals become unusable, thereby enhancing public safety.

[0037] To this end, the solution proposed by the method of the invention consists in locking the mobile phone through a security mechanism implemented by the mobile phone itself.

[0038] like figure 1 As shown, the mechanism includes: for each new (U)SIM card inserted into the terminal, an initialization step I is performed once, followed by a step II of verifying the password in subsequent use. The following description also refers to FIG. 2, which shows a simplified electronic circuit diagram of the terminal. The figure only shows the parts related to the realization of the present invention, mainly the processing unit UT, the program memory MEM, the data memory MST, the smart ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of securing the use of a mobile telecommunication terminal comprising a (U)SIM card reader includes a terminal initialization step consisting of requesting the user to enter a personal password after inserting a (U)SIM card into the terminal and storing the password in the (U)SIM card and in memory in the terminal. On the occasion of subsequent uses the password is verified either against the password stored in the card or against the password requested of the user, and operation of the terminal is disabled in the event of a mismatch. Applications include mobile telecommunication terminals.

Description

technical field [0001] The invention relates to a method for ensuring the safety of a mobile communication terminal, and also relates to a mobile terminal including a device for realizing the method. Background technique [0002] Mobile phones have become a part of our daily life. This is a real social phenomenon. There are hundreds of millions of mobile phones in use all over the world. These communication terminals usually include a microchip card called a (U)SIM card. [0003] A (U)SIM card contains information that cannot be modified by the user and that identifies the card and the user, for example, through a number consisting of the verification number (ICCid) of the integrated circuit on the card and the user's International Mobile Subscriber Identity (IMSI) identify. When applying for a mobile phone, a (U)SIM card is provided by the telecom operator. The (U)SIM card is inserted into the mobile phone, and the user activates the mobile phone by entering a personal i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W88/02
CPCH04W12/06H04L63/0853H04W84/12H04W88/02H04W12/48H04W12/082
Inventor A·吉罗东M·克罗扎C·马西
Owner DRNC HLDG INC