Method for preventing illegal use of user identification module
A user identification module and illegal technology, applied in user identity/authority verification, security devices, electrical components, etc., to prevent theft, illegal use, convenient and fast use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] Embodiments of the present invention will be further explained in detail below in conjunction with the accompanying drawings.
[0020] With the development of mobile communication technology, the basic functions of the SIM card in the GSM network or the UIM card in the CDMA network can no longer meet the diverse needs of users, and the development of smart card technology has further expanded the application tools of the user identification module. Package functionality is made possible. In other words, STK (SIM card application tool kit, SIM APPLICATION TOOL KIT) or UTK (UIM card application tool kit, UIMAPPLACATION TOOL KIT) provides means for developing new service functions of SIM cards or UIM cards. STK or UTK is a tool service software based on the SIM card or UIM card operating system to develop value-added services, which can be understood as the active operating system of the SIM card or UIM card derived from the passive operating system of the original SIM car...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 