System and method for preventing software and hardware with communication condition / function from being embezzled

A technology of communication conditions, software and hardware, applied in the field of communication, can solve the problems of data outflow, insecurity, and the ineffectiveness of anti-theft technology.

Inactive Publication Date: 2007-05-09
乔超
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The phone is turned off when the card is first inserted, so it is impossible to check whether the card number appears for the first time
Secondly, if there is no network, or if the call to the database center is suspended, it will not be registered with the database center, and the database center will not be able to track and control the mobile phone number at this time
Moreover, this invention communicates with the database center by dialing a phone, which is expensive and unsafe (it is easily detected and terminated)
In claim 4(e) of the invention, it is written that "the database center will download the manufacturer's internal command and clear all the information in the basic configuration program and memory of the mobile phone after obtaining the owner's consent and confirming the identity of the owner". Operation, destroyed early, the mobile phone can not be used after being retrieved, and the data will leak out later, and it is a serious security risk
[0006] In addition, some mobile phone anti-theft technologies must pre-set passwords or contact numbers, which cannot protect unused mobile phones.
Some anti-theft technologies rely on the device serial number stored in the terminal device, and the serial number is generally modifiable. Once the serial number is modified, these anti-theft technologies will lose their effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for preventing software and hardware with communication condition / function from being embezzled
  • System and method for preventing software and hardware with communication condition / function from being embezzled
  • System and method for preventing software and hardware with communication condition / function from being embezzled

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0102] This embodiment provides an implementation of a mobile phone anti-lost, anti-counterfeiting, and anti-smuggling system and method.

[0103] The system consists of mobile phone 1, GSM / CDMA network 2, mobile short message service center 3, communication link 4, INTERNET network 5, PC 6, management center server 7 and WEB server 8. Its topology is shown in Figure 1.

[0104] The mobile phone 1 is connected with the management center server 7 through the communication channel formed by the GSM / CDMA network 2, the mobile phone short message service center 3, the mobile short message gateway and the INTERNET network 5, so as to realize the information interaction between the mobile phone and the management center server. WEB server 8 is connected with management center server 7 through local area network. Users and after-sales service personnel can operate the PC 6 to access the management center server through the INTERNET network 5 and the WEB server, and can report the los...

Embodiment 2

[0228] This embodiment provides an anti-piracy method for software that requires a server to provide a certain service.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The system thereof comprises: mobile phone terminal; management service center server; WEB server; the network between after-sales services client-side and the mobile terminal; and the network between after-sales service client-side, management center server and WEB server. Each mobile terminal has an ID number, and the basic information and registration information corresponding to each ID number are saved in the management service center server. The hardware of mobile terminal sends registration information to the management service center, and works after getting a returned confirmation command.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a system and a system for preventing illegal use of software and hardware with communication conditions / functions, business communication, computers connected to the Internet, SIM cards of mobile phones, and computer software that need to be connected to the Internet. method. In addition, it also relates to the field of tracking and locating illegal users of software and hardware with communication conditions / functions. Background technique [0002] With the development of economy and technology and the improvement of people's living standards, the users of personal communication equipment, personal computers, and various computer software are increasing rapidly, but the loss of personal communication equipment (especially mobile phones and PHS) and personal computers is also increasing. It's getting serious. In addition, software piracy is rampant. Due to the r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/32H04M1/23H04W8/24H04W12/126
Inventor 乔超
Owner 乔超
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products