Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for preventing illegal use of user identification module

A user identification module and illegal technology, applied in user identity/authority verification, security devices, electrical components, etc., to prevent theft, illegal use, convenient and fast use

Active Publication Date: 2004-11-10
DATANG MICROELECTRONICS TECH CO LTD
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a method that is convenient for users and effectively prevents the illegal use of the user identification module, so as to solve the technical problems of preventing the user identification module from being stolen and protecting the content stored in the user identification module

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing illegal use of user identification module
  • Method for preventing illegal use of user identification module
  • Method for preventing illegal use of user identification module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Embodiments of the present invention will be further explained in detail below in conjunction with the accompanying drawings.

[0020] With the development of mobile communication technology, the basic functions of the SIM card in the GSM network or the UIM card in the CDMA network can no longer meet the diverse needs of users, and the development of smart card technology has further expanded the application tools of the user identification module. Package functionality is made possible. In other words, STK (SIM card application tool kit, SIM APPLICATION TOOL KIT) or UTK (UIM card application tool kit, UIMAPPLACATION TOOL KIT) provides means for developing new service functions of SIM cards or UIM cards. STK or UTK is a tool service software based on the SIM card or UIM card operating system to develop value-added services, which can be understood as the active operating system of the SIM card or UIM card derived from the passive operating system of the original SIM car...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is a method to protect a user identity module (UIM) against illegal use, including: (1) in the UIM, presetting an anti-theft code; (2) when UIM is lost, sending the anti-theft code and new PIN1 code to the UIM; (3) the UIM justifies if the received anti-theft code is consistent with the preset one: if is, modifying the PIN1 code in the UIM and setting the state of the PIN1 code as 'valid' state, restarting the mobile terminal; otherwise ending. Before UIM is lost, preset an anti-theft code; after UIM is lost, use a wireless technique to send the original anti-theft code and a new PTN1 code to a mobile terminal supporting STK / UTK function, the mobile terminal modifies the PIN1 code in the UIM and sets the PIN1 code as 'valid' state. An illegal user need input an new PIN1 code when he wants to enter, effectively protecting the UIM against illegal use and protecting the important information in the UIM.

Description

technical field [0001] The invention relates to a method for preventing illegal use of mobile communication equipment, in particular to a method for preventing illegal use of a subscriber identification module in a mobile terminal. Background technique [0002] Currently, due to the technological maturity and perfection of mobile communication networks (such as GSM, CDMA, etc.), mobile phones have become the most important tool for people to communicate. Simultaneously because mobile phone has characteristics such as body is light and handy, portability is strong, also makes the phenomenon that mobile phone is stolen or lost occurs from time to time, causes economic loss to the user. What's more serious is that because the user identification module of the mobile phone usually stores a lot of private information of the user, such as many other people's contact methods, the user's own schedule and some important data information, etc., if the mobile terminal or the user If t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04W12/126
Inventor 傅宇晨穆肇骊秦预王建
Owner DATANG MICROELECTRONICS TECH CO LTD