Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for locking terminal attaching region

A technology of belonging area and terminal, applied in the direction of network data management, security device, access restriction, etc., it can solve problems such as failure to consider, loss of terminal cost, high cost of subsidized terminal, etc. The effect of business development security and order, development and stability of users

Inactive Publication Date: 2006-09-13
HUAWEI TECH CO LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This process is commonly known as kitting or cross-selling. As a result, the operator’s goal of developing new users has not been achieved, and because the discounted or gifted terminal is customized by the mobile operator from the terminal manufacturer, the cost of subsidizing the terminal is relatively high. There will be a loss of certain terminal costs
[0007] In practical application, the above-mentioned scheme has the following problems: Since the set-up or cross-selling is a new problem that appears with the recent preferential activities of mobile operators, the existing technology does not take this situation into account, so it has not yet been addressed. How to lock the preferential terminal to use in the network, or ensure that the preferential terminal uses the local user card to propose an effective solution, so there is no corresponding solution to this problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for locking terminal attaching region

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0028] In general, the principle of the present invention is to pre-set the relevant information of the terminal's home area, and only when the terminal's current home area-related information is consistent with the preset terminal's home area-related information, the terminal can be used normally; otherwise, abnormal processing is performed , so that the terminal cannot operate normally or use network services. Since the solution of the present invention can limit the terminal to be used in a specified area or network, if the terminal is resold to other operator networks or used in other areas, because its new home area related information is inconsistent with the set terminal home area related information or It is because the current operator information is inco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a method for locking terminal attribute regions, which designs the information of a business man and the attribute region of a terminal in advance to judge if the terminal is in the net of the designed business man after the terminal is started and judge if the current attribute region is the designed one, the terminal can be used normally only in the designed business man information and specific region.

Description

technical field [0001] The invention relates to mobile communication, in particular to the access control technology of the mobile communication system. Background technique [0002] On a global scale, with the development of mobile communication technology, terminals, as a tool for people to communicate with each other in the modern communication society, have gradually become popular. A lot of convenience and speed. [0003] In order to identify the terminal, the International Mobile Equipment Identity (International Mobile Equipment Identity, referred to as "IMEI") is stored inside the terminal. Each terminal corresponds to a unique IMEI. The network side can judge whether the terminal is illegal through IMEI and other equipment parameters and decide Whether to provide services for it. On the network side, the identification of mobile station equipment such as a terminal is completed in an equipment identity register (Equipment Identity Register, “EIR” for short). Amon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04W8/22H04W12/08H04W12/12H04W48/02H04W48/04H04W60/00
CPCH04W8/22H04W12/08H04W48/02H04W12/12H04W60/00H04W48/04H04W12/72H04W12/126
Inventor 王正伟卢方勇
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products