System and method for preventing software and hardware with communication condition/function against embezzlement

A technology of communication conditions, software and hardware, applied in transmission systems, wireless communications, digital transmission systems, etc., can solve the problems of unable to track and control mobile phone numbers, difficult to operate, data outflow, etc.

Inactive Publication Date: 2006-04-26
乔超
View PDF1 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The phone is turned off when the card is first inserted, so it is impossible to check whether the card number appears for the first time
Secondly, if there is no network, or if the call to the database center is suspended, it will not be registered with the database center, and the database center will not be able to track and control the mobile phone number at this time
Moreover, this invention communicates with the database center by dialing a phone, which is expensive and unsafe (it is easily detected and terminated)
In claim 4(e) of the invention, it is written that "the database center will download the manufacturer's internal command and clear all the informatio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for preventing software and hardware with communication condition/function against embezzlement
  • System and method for preventing software and hardware with communication condition/function against embezzlement
  • System and method for preventing software and hardware with communication condition/function against embezzlement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0130] This embodiment provides an implementation of a mobile phone anti-theft, anti-counterfeiting, and anti-smuggling system and method.

[0131] The system consists of mobile phone 1, GSM network 2, mobile phone SMS service center 3, communication link 4, INTERNET network 5, PC 6, management center server 7 and WEB server 8, and its topology is as follows figure 1 shown.

[0132] The mobile phone 1 is connected with the management center server 7 through the short message channel formed by the GSM network 2, the mobile short message service center 3, the mobile short message gateway and the INTERNET network 5, so as to realize the information interaction between the mobile phone and the management center server. WEB server 8 is connected with management center server 7 through local area network. Users and after-sales service personnel can operate the PC 6 to access the management center server through the INTERNET network 5 and the WEB server, and can report the loss of t...

Embodiment 2

[0257] This embodiment provides a system and method for preventing the SIM card number of a mobile phone from being stolen.

[0258] This embodiment is realized by adding corresponding functions to the existing SIM card of the mobile phone and the server of the mobile operator. The communication mode between the existing SIM card of the mobile phone and the server of the mobile operator is not changed.

[0259] In the database of the mobile operator server, organize the card number basic information data table with the anti-theft function into a new sub-database, or add the field "whether it is an anti-theft card number" in the original data table. Then add the "last successfully dialed phone number" field in the card number basic information data table.

[0260] Use STK technology to develop the SIM card of the mobile phone, and save a character string at a specified location on it, whose value is the last successfully dialed phone number, or a specified substring in the las...

Embodiment 3

[0266] This embodiment provides an anti-piracy method for software that requires a server to provide a certain service.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The system to prevent stealing of the soft/hard ware with communication function comprises: the terminal soft/hard ware with an ID number, the server of management center to store basic and register information of every ID number, a WEB server, a client for after service with terminal soft/hard ware, and the communication network between client and servers. Wherein, the terminal hardware sends register information to management server and obtains returned ACK demand to start work. This invention can send lock demand to terminal soft/hard ware to disable opposite function and track communication number to anti false.

Description

Technical field [0001] The present invention relates to a field of preventing illegal use of software and hardware with communication conditions / functions, especially relates to a system for preventing illegal use of mobile phones, business communication, computers connected to the Internet, SIM cards of mobile phones, and computer software that need to be connected to the Internet and methods. In addition, it also relates to the field of tracking and locating illegal users of software and hardware with communication conditions / functions. Background technique [0002] With the development of economy and technology and the improvement of people's living standards, the users of personal communication equipment, personal computers, and various computer software are increasing rapidly, but the loss of personal communication equipment (especially mobile phones and PHS) and personal computers is also increasing. It's getting serious. In addition, software piracy is rampant. Due...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00G06F21/00H04W8/24H04W12/06
CPCH04W8/245H04W12/06H04W12/126
Inventor 乔超
Owner 乔超
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products