Method for realizing information destroying at network side

A network side, mobile communication system technology, applied in the field of information destruction on the network side, can solve problems such as loss of legitimate users

Inactive Publication Date: 2007-06-13
ZTE CORP
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of electronic technology and computer technology, the hardware performance and software functions of mobile terminals such as mobile phones have been greatly improved, and they have become powerful assistants in people's lives. Phone calls, communication records, memos, text messages, or binding with account numbers and passwords of gam

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing information destroying at network side
  • Method for realizing information destroying at network side
  • Method for realizing information destroying at network side

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further introduced below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0021] In order to ensure the information security of the mobile terminal, the server on the network side is equipped with a user identity authentication unit, which is used to confirm the ownership of the user of information resources; a user information preprocessing unit, which is used to extract the type of user terminal and various information The storage format of the source; a registration unit, which is used to realize the binding relationship between the user's SIM card and the user's mobile phone, that is, to establish the customer identification number (International Subscriber Identification Number: IMSI) and the International Mobile Equipment Identity (International Mobile Equipment Identity: IMEI) ) binding relationship; a database for storing various data information, and also inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This method applies in the net side of the mobile comm. system. The bonding info of user identification codes (IC) and the international mobile equipment IC is stored in the net side. The corresponding relation between the user IC and the service code of spare operation is also stored in the net side. This method includes the following steps. The net side (a) receives from user the request of destroying the aim mobile terminal (AMT) info; (b) confirms the user right of destroying the info; (c) searches the user IC of AMT and waits for AMT registering; (d) orientates the new user IC of AMT in HLR once finds AMT registering; (e) sends to AMT the related info destroying instruction to destroy the info. After the handset registers on the net server, once the handset is lost, the net side auto destroys all handset info.

Description

technical field [0001] The invention relates to a method for realizing information destruction on a network side, and belongs to the technical field of communication. Background technique [0002] With the continuous development of electronic technology and computer technology, the hardware performance and software functions of mobile terminals such as mobile phones have been greatly improved, and they have become powerful assistants in people's lives. Phone calls, communication records, memos, text messages, or binding with account numbers and passwords of game providers and value-added service providers, or customized call and access services that do not limit time and region, or have community entrances, building gates, etc. , house door, office door, safe, car, computer, mobile hard disk "access control" opening function, once the mobile phone is stolen or lost, the use of illegal users may bring huge losses to legal users. Contents of the invention [0003] The techn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04W8/02H04W8/24H04W12/06
Inventor 张峰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products