CN100401822C - Protection method and system for preventing fraudulent use of mobile terminal - Google Patents
Protection method and system for preventing fraudulent use of mobile terminal Download PDFInfo
- Publication number
- CN100401822C CN100401822C CNB2006101099876A CN200610109987A CN100401822C CN 100401822 C CN100401822 C CN 100401822C CN B2006101099876 A CNB2006101099876 A CN B2006101099876A CN 200610109987 A CN200610109987 A CN 200610109987A CN 100401822 C CN100401822 C CN 100401822C
- Authority
- CN
- China
- Prior art keywords
- portable terminal
- identification sequences
- mobile terminal
- fraudulent use
- sequence number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The security protection method and system described in this invention pre-save a serial number of identification in the mobile terminals. The network equipment checks the serial number of identification. If the identification is not passed, the mobile terminals are defined as illegal users, to prohibit the use of network through the mobile phones or lock them by the service provider's network when they are lost of stolen. The serial number of identification (such as 128bit summary information) is stored in the flash memory with a OTP function of one-time programming through the MD5 encryption on IMEI, which can only be written one time and has finished when the mobile phone leaves the factory. The content read out from the second time of writing is not the same one of the writing.
Description
Technical field
The present invention relates to the anti-theft technique of portable terminal, relate in particular to a kind of portable terminal and prevent stolen guard method and system after stolen.
Background technology
The convenient characteristics of the decline of mobile phone products price and product self make mobile phone become the electronic product of popularizing day by day.It is reported that whole world cellphone subscriber's total amount has surpassed 1,000,000,000 families at present, and is still presenting ever-increasing trend.The profile universal and that mobile phone self is easy to carry about with one of mobile phone is also brought some problems, as easy loss or stolen.This class problem is when causing user's direct economic loss, as free call on somebody else's expense through illegal means; The lawless person also can utilize the leak of original mobile phone software and hardware, change mobile phone " identity " identification number, as: IMEI number, thus make the lawless person escape the restriction of Radio Network System, continue to use this illegal handheld device.
At present, the technology of relevant antitheft mobile phone comprises following several:
(1) French Patent (FRP) FR2791509 provides a kind of technology by preventing from for mobile phone setting startup password illegally to use behind the hand-set from stolen.
(2) Chinese patent 200310113647.7 and 03124196.4 provides by the SIM in the mobile phone (subscriber identification module) is protected, prevent that mobile phone from losing after, the technology that SIM card is wherein illegally used.
(3) number of patent application be 03148202.3 and the patent No. be 01802972.8 patent, these two files provide mobile phone and lose the technology of reporting lost property to the authorities from the trend owner of lost property in the back.
In the above-mentioned prior art, after can not solving mobile phone and losing, stop the disabled user to continue to use this mobile phone (even change SIM card, can not allow to continue to use this mobile phone), can not stop the mobile phone IMEI number to be illegally copied or the number of changing (IMEI number is illegally copied or the number of changing is to produce one of major reason of "parallel goods" mobile phone).
Summary of the invention
The invention provides a kind of guard method and system of preventing fraudulent use of mobile terminal, the realization portable terminal is lost or is stolen, by carrier network, can lock this mobile phone, forbids that perhaps this mobile phone uses network.
Purpose of the present invention is achieved through the following technical solutions.
A kind of guard method of preventing fraudulent use of mobile terminal comprises:
A, the identification sequences number of in portable terminal, prestoring, described identification sequences number obtains after encrypting for IMEI number;
B, network equipment number carry out the legitimacy authentication to the identification sequences of described portable terminal, do not pass through for authentication, classifies described portable terminal as disabled user;
C, portable terminal encrypt by the mode number identical with obtaining identification sequences IMEI number to it, obtain sequence number of authentification;
D, portable terminal read identification sequences number, and with sequence number of authentification relatively, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
Described identification sequences number is stored in the Flash memory of portable terminal.
Described encryption method is for obtaining identification sequences number according to adopting for hardware sequence number ID number cryptographic algorithm that IMEI number is encrypted.
Described identification sequences number is stored in the Flash memory with one-off programming OTP function, and described identification sequences number is stored in the OTP district of the Flash memory with OTP function.
Described non-volatile NV district with Flash memory of one-off programming OTP function is used to preserve IMEI number.
Described step C comprises:
Portable terminal reads IMEI number from the NV district of Flash memory with OTP function, and by the mode number identical with obtaining identification sequences it is encrypted, and obtains sequence number of authentification.
Described step D comprises:
Portable terminal reads identification sequences number from the OTP district of Flash memory with OTP function, and with sequence number of authentification relatively, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
Described step B comprises:
Network equipment obtains the identification sequences number of portable terminal, and judges whether the registration sequence number of this portable terminal of preserving in this identification sequences number and the network equipment is identical, and as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.
Described step B also comprises:
The IMEI number of portable terminal is deposited in the server of network equipment as the registration sequence number.
Described step B also comprises:
For the portable terminal that is listed in the disabled user, network equipment forbids that portable terminal uses network or only allows portable terminal to receive information and do not allow portable terminal to send information.
A kind of system of preventing fraudulent use of mobile terminal comprises:
The identification sequences memory cell: be located at the portable terminal place, be used for the authentication storage sequence number, described identification sequences number obtains after encrypting for IMEI number;
Legitimacy authentication ' unit: be located in the network equipment, be used for the identification sequences of portable terminal number is carried out the legitimacy authentication, do not pass through, classify described portable terminal as disabled user for authentication;
Encrypting module: be located at the portable terminal place, be used for obtaining identification sequences number or sequence number of authentification according to adopting for hardware sequence number ID number cryptographic algorithm that IMEI number is encrypted;
Authentication module: be located at the portable terminal place, be used to contrast identification sequences number and sequence number of authentification, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
Described identification sequences memory cell comprises:
Flash memory: be used to store described identification sequences number.
Described Flash memory has the Flash memory of one-off programming OTP function, is used for described identification sequences number is stored in the OTP district.
Described legitimacy authentication ' unit comprises:
Sequence number Registration Module: be used for the IMEI number of registered mobile terminal, deposit in the server of network equipment, as the registration sequence number;
Memory cell: the registration sequence number that is used to preserve portable terminal;
Legitimacy authentication module: the identification sequences number that is used to obtain portable terminal, and whether the registration sequence number of judging this portable terminal of preserving in the memory cell of this identification sequences number and network equipment is identical, as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.
The technical scheme that provides by the invention described above as seen, in portable terminal, prestore identification sequences number of the guard method of preventing fraudulent use of mobile terminal of the present invention and system; Network system number is carried out the legitimacy authentication to the identification sequences of described portable terminal during communication, do not pass through for authentication, classify described portable terminal as disabled user, thereby when mobile phone is lost or be stolen, can forbid that this mobile phone uses network or locks this mobile phone by carrier network.IMEI number is carried out the identification sequences that obtains after the md5 encryption number be stored in the Flash memory with one-off programming OTP function, identification sequences number can only be written into once, and content is finished writing when mobile phone dispatches from the factory; From writing for the second time, the content of reading not is to be its content that writes.Authentication process by mobile phone be implemented in that mobile phone is lost or stolen after reach the purpose that prevents the number of changing.
Description of drawings
Fig. 1 is in the guard method of preventing fraudulent use of mobile terminal of the present invention putting into the mobile phone IMEI number schematic diagram of the given server of network equipment;
Fig. 2 encrypts the schematic diagram of storage in the guard method of preventing fraudulent use of mobile terminal of the present invention to the mobile phone IMEI number;
Fig. 3 is that the user asked to lock the flow chart of mobile phone after mobile phone was lost in the guard method of preventing fraudulent use of mobile terminal of the present invention;
Fig. 4 is the flow chart one of mobile telephone registration in the guard method of preventing fraudulent use of mobile terminal of the present invention;
Fig. 5 is the flowchart 2 of mobile telephone registration in the guard method of preventing fraudulent use of mobile terminal of the present invention;
Fig. 6 is the structural representation of the system of preventing fraudulent use of mobile terminal of the present invention.
Embodiment
The present invention at first relates to a kind of guard method of preventing fraudulent use of mobile terminal, specifically is the identification sequences number of prestoring in portable terminal; Network equipment number carries out the legitimacy authentication to the identification sequences of described portable terminal, do not pass through for authentication, classifies described portable terminal as disabled user.The identification sequences that prestores in portable terminal number is international travelling carriage identity recognition number IMEI number; Also can be for IMEI number is encrypted the 128bit informative abstract that the back generates, method of encrypting is to adopt cryptographic algorithm (can be MD5) that IMEI number is encrypted according to hardware sequence number ID number to obtain above-mentioned 128bit informative abstract.
Above-mentioned identification sequences number is stored in the Flash memory; Also can be stored in the Flash memory with one-off programming OTP function, and described identification sequences number (as the 128bit informative abstract) is stored in the OTP district of the Flash memory with OTP function.
Portable terminal can also carry out authentication process, and concrete grammar is a portable terminal with IMEI number by with obtaining the identification sequences mode that number (as the 128bit informative abstract) is identical it being encrypted, and obtains sequence number of authentification; Portable terminal reads identification sequences number (as the 128bit informative abstract) again, and compares with sequence number of authentification, and as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.Number be stored in situation in the Flash memory with one-off programming OTP function for identification sequences, portable terminal reads IMEI number from the NV district of Flash memory with OTP function, and, obtain sequence number of authentification by it being encrypted with obtaining the identification sequences mode that number (as the 128bit informative abstract) is identical.Portable terminal reads identification sequences number (as the 128bit informative abstract) from the OTP district of Flash memory with OTP function again, and with sequence number of authentification relatively, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
The method that network equipment number carries out the legitimacy authentication to the identification sequences of described portable terminal is that network equipment requires mobile terminal reporting identification sequences number, and whether the registration sequence number of judging this portable terminal of preserving in this identification sequences number and the network equipment is identical, as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.Certainly need IMEI number with portable terminal deposit in the server of network equipment before this as registering sequence number.And for the portable terminal that is listed in the disabled user, network equipment forbids that portable terminal uses network or only allows portable terminal to receive information and do not allow portable terminal to send information.
The guard method of a kind of preventing fraudulent use of mobile terminal of the present invention is that its specific implementation process of example is as follows with the mobile phone:
One, in portable terminal, prestore identification sequences number
Be illustrated in figure 1 as the specific EIR server of in the guard method of of the present invention kind of preventing fraudulent use of mobile terminal the unification of mobile phone IMEI number being put into network equipment; before each mobile phone dispatches from the factory the mobile phone manufacturer can be in Flash a burned unique sequence number; it is IMEI (the international travelling carriage identification of International Mobile stationEquipment Identities) number; the dealer when user buys mobile phone (also may be operator) must register on the books this IMEI number, is deposited into then in EIR (the Equipment Identity Registers equipment identity register) server of operator's appointment.
Be stored in IMEI number in the mobile phone and be the identification sequences number of mobile phone, and this registration sequence number that IMEI number in the EIR server is mobile phone that deposits in through registering.
IMEI number in the mobile phone is unusual important resource, prevent to be illegally copied, and in order to prevent to illegally copy IMEI and change IMEI number, the identification sequences of mobile phone number can be through being stored in after encrypting among the Flash with OTP (One Time Program-one-time programming) function in the mobile phone, normally obtains identification sequences number according to adopting for hardware sequence number ID number cryptographic algorithm that IMEI number is encrypted.Concrete grammar is as shown in Figure 2:
When mobile phone dispatches from the factory, according to 128bit hardware sequence number (ID number), adopt the MD5 algorithm that IMEI number is carried out ciphering process, generate the informative abstract of 128bit, then this summary is written to the OTP district of Flash, will be written to other zone (NV (non-volatile) district) of Flash for original I MEI number simultaneously.
Above the full name of MD5 is Message-Digest Algorithm 5 (message-digest algorithm 5), is to be developed jointly by Massachusetts science and engineering (MIT laboratory for computer science) and RSA data encryption company (RSA data security inc) beginning of the nineties.It is by irreversible character string mapping algorithm, the byte serial of a random length is transformed into a fixed length, unique big integer (informative abstract of 128bit), propagate afterwards in the process of this informative abstract, no matter any type of change has taken place in its content, as long as the original character string file is recomputated md5 will find that informative abstract is inequality, what can determine thus to obtain is an incorrect file.It is usually used in digital signature and account, Password Management.
Two, network equipment number carries out the legitimacy authentication to the identification sequences of described portable terminal, does not pass through for authentication, classifies described portable terminal as disabled user.
Wireless network is discerned the user identity legitimacy according to IMEI number when mobile phone power-on registration or conversation (caller or called), has only validated user just to permit using network.Be specially: network equipment obtains the identification sequences number of portable terminal, and whether the registration sequence number of judging this portable terminal of preserving in this identification sequences number and the network equipment is identical, as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.Specifically can be divided into several situations of giving.
(1), request locking mobile phone when user's mobile phone is lost or be stolen
As shown in Figure 3: the user find that mobile phone is lost or stolen after, can arrive service centre of operator, this mobile phone of request locking, the information that operator provides according to the user finds out the IMEI number of this mobile phone from the EIR server, blacklist it, this mobile phone can only be used for collection of letters breath, can not send information later on, can also forbid directly that it uses network.
(2), the start-up logging process of mobile phone
Its detailed process is as follows as shown in Figure 4:
Whether step 44, network side are searched for this IMEI number from the EIR server registered and read black and white lists;
Concrete grammar is that IMEI number and black and white lists are compared, and is legal or the disabled user with decision, if this hand-set from stolen and user have listed it in " blacklist ", is the disabled user; Otherwise be validated user.
In addition, the embodiment of the authentication process of mobile phone own is as shown in Figure 5:
Because have the Flash of OTP function, its OTP district the zone of write-once (special-purpose can only) has following characteristic:
(1) can only be programmed (writing) once, content is finished writing when mobile phone dispatches from the factory;
(2) from writing for the second time, be written to and will cause inconsistently when content in the OTP district is read out, the content of promptly reading not is to be its content that writes.
Because the above characteristic in OTP district makes:
The third party can't change existing content among the OTP, promptly can't change the 128bit informative abstract after IMEI number is encrypted; Even the third party has successfully changed original I MEI number among the NV (non-volatile), during other authentication process of mobile phone power-on startup/execution, the also inconsistent start/failed authentication that causes of fresh information clip Text that can generate owing to the informative abstract among the OTP and IMEI change back, thus reach the purpose that prevents the number of changing.
The system of a kind of preventing fraudulent use of mobile terminal of the present invention as shown in Figure 6 comprises:
Be located at portable terminal place identification sequences memory cell and the legitimacy authentication ' unit of being located in the network equipment, wherein,
The identification sequences memory cell comprises the Flash memory, is used to store described identification sequences number; Described Flash memory can adopt general memory, also can adopt the Flash memory with one-off programming OTP function, is used for described identification sequences number is stored in the OTP district.
Described system can also comprise encrypting module, is located at the portable terminal place, and encrypting module is used for obtaining identification sequences number or sequence number of authentification according to adopting for hardware sequence number ID number cryptographic algorithm that IMEI number is encrypted.
Described system can also comprise authentication module, is located at the portable terminal place, and authentication module is used to contrast identification sequences number and sequence number of authentification, and as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically
Be located at the legitimacy authentication ' unit in the network equipment, be used for the identification sequences of portable terminal number is carried out the legitimacy authentication, do not pass through, classify described portable terminal as disabled user for authentication.Comprise sequence number Registration Module, memory cell and legitimacy authentication module, wherein:
Sequence number Registration Module: be used for the IMEI number of registered mobile terminal, deposit in the server of network equipment, as the registration sequence number;
Memory cell: the registration sequence number that is used to preserve portable terminal; The present invention adopts EIR (the Equipment Identity Registers equipment identity register) server of operator's appointment.
Legitimacy authentication module: the identification sequences number that is used to obtain portable terminal, and whether the registration sequence number of judging this portable terminal of preserving in the memory cell of this identification sequences number and network equipment is identical, as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claims.
Claims (14)
1. the guard method of a preventing fraudulent use of mobile terminal is characterized in that, comprising:
A, the identification sequences number of in portable terminal, prestoring, described identification sequences number obtains after encrypting for IMEI number;
B, network equipment number carry out the legitimacy authentication to the identification sequences of described portable terminal, do not pass through for authentication, classifies described portable terminal as disabled user;
C, portable terminal encrypt by the mode number identical with obtaining identification sequences IMEI number to it, obtain sequence number of authentification;
D, portable terminal read identification sequences number, and with sequence number of authentification relatively, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
2. the guard method of preventing fraudulent use of mobile terminal according to claim 1 is characterized in that, described identification sequences number is stored in the Flash memory of portable terminal.
3. the guard method of preventing fraudulent use of mobile terminal according to claim 1 is characterized in that, described encryption method is for obtaining identification sequences number according to adopting for hardware sequence number ID number cryptographic algorithm that IMEI number is encrypted.
4. the guard method of preventing fraudulent use of mobile terminal according to claim 1; it is characterized in that; described identification sequences number is stored in the Flash memory with one-off programming OTP function, and described identification sequences number is stored in the OTP district of the Flash memory with OTP function.
5. the guard method of preventing fraudulent use of mobile terminal according to claim 4 is characterized in that, described non-volatile NV district with Flash memory of one-off programming OTP function is used to preserve IMEI number.
6. the guard method of preventing fraudulent use of mobile terminal according to claim 1 is characterized in that, described step C comprises:
Portable terminal reads IMEI number from the NV district of Flash memory with OTP function, and by the mode number identical with obtaining identification sequences it is encrypted, and obtains sequence number of authentification.
7. the guard method of preventing fraudulent use of mobile terminal according to claim 1 is characterized in that, described step D comprises:
Portable terminal reads identification sequences number from the OTP district of Flash memory with OTP function, and with sequence number of authentification relatively, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
8. the guard method of preventing fraudulent use of mobile terminal according to claim 1 is characterized in that, described step B comprises:
Network equipment obtains the identification sequences number of portable terminal, and judges whether the registration sequence number of this portable terminal of preserving in this identification sequences number and the network equipment is identical, and as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.
9. the guard method of preventing fraudulent use of mobile terminal according to claim 8 is characterized in that, described step B also comprises:
The IMEI number of portable terminal is deposited in the server of network equipment as the registration sequence number.
10. according to the guard method of claim 1 or 8 described preventing fraudulent use of mobile terminal, it is characterized in that described step B also comprises:
For the portable terminal that is listed in the disabled user, network equipment forbids that portable terminal uses network or only allows portable terminal to receive information and do not allow portable terminal to send information.
11. the system of a preventing fraudulent use of mobile terminal is characterized in that, comprising:
The identification sequences memory cell: be located at the portable terminal place, be used for the authentication storage sequence number, described identification sequences number obtains after encrypting for IMEI number;
Legitimacy authentication ' unit: be located in the network equipment, be used for the identification sequences of portable terminal number is carried out the legitimacy authentication, do not pass through, classify described portable terminal as disabled user for authentication;
Encrypting module: be located at the portable terminal place, be used for obtaining identification sequences number or sequence number of authentification according to adopting for hardware sequence number ID number cryptographic algorithm that IMEI number is encrypted;
Authentication module: be located at the portable terminal place, be used to contrast identification sequences number and sequence number of authentification, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
12. the system of preventing fraudulent use of mobile terminal according to claim 11 is characterized in that, described identification sequences memory cell comprises:
Flash memory: be used to store described identification sequences number.
13. the system of preventing fraudulent use of mobile terminal according to claim 12 is characterized in that, described Flash memory has the Flash memory of one-off programming OTP function, is used for described identification sequences number is stored in the OTP district.
14. the system of preventing fraudulent use of mobile terminal according to claim 11 is characterized in that, described legitimacy authentication ' unit comprises:
Sequence number Registration Module: be used for the IMEI number of registered mobile terminal, deposit in the server of network equipment, as the registration sequence number;
Memory cell: the registration sequence number that is used to preserve portable terminal;
Legitimacy authentication module: the identification sequences number that is used to obtain portable terminal, and whether the registration sequence number of judging this portable terminal of preserving in the memory cell of this identification sequences number and network equipment is identical, as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006101099876A CN100401822C (en) | 2006-08-25 | 2006-08-25 | Protection method and system for preventing fraudulent use of mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006101099876A CN100401822C (en) | 2006-08-25 | 2006-08-25 | Protection method and system for preventing fraudulent use of mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1913679A CN1913679A (en) | 2007-02-14 |
CN100401822C true CN100401822C (en) | 2008-07-09 |
Family
ID=37722411
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006101099876A Active CN100401822C (en) | 2006-08-25 | 2006-08-25 | Protection method and system for preventing fraudulent use of mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100401822C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150067780A1 (en) * | 2012-08-20 | 2015-03-05 | Zte Corporation | Mobile Terminal Detection Method And Mobile Terminal |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101018125B (en) * | 2007-03-02 | 2010-06-16 | 中兴通讯股份有限公司 | Radio terminal security network and card locking method based on the ellipse curve public key cipher |
CN101740111B (en) * | 2008-11-11 | 2013-11-06 | 国民技术股份有限公司 | Semiconductor memory device and method thereof for realizing safe memory of data |
WO2010057539A1 (en) | 2008-11-24 | 2010-05-27 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for aquiring an imei associated to an imsi |
CN101888448B (en) * | 2010-06-07 | 2014-03-19 | 中兴通讯股份有限公司 | Method and mobile terminal for locking network and card |
CN102026195B (en) * | 2010-12-17 | 2013-05-15 | 北京交通大学 | Method and system for mobile terminal identity authentication based on one-time password |
CN102158856B (en) * | 2011-02-21 | 2015-06-17 | 惠州Tcl移动通信有限公司 | Mobile terminal identification code authentication system and method, server and terminal |
CN102301381A (en) * | 2011-07-08 | 2011-12-28 | 华为技术有限公司 | Method and device for processing information security |
CN102711109B (en) * | 2012-06-12 | 2016-08-03 | 中国电力科学研究院 | A kind of method of mobile terminal authentication |
CN102780989A (en) * | 2012-07-06 | 2012-11-14 | 北京小米科技有限责任公司 | Method and system for preventing loss of mobile terminal |
CN105335677A (en) * | 2014-07-24 | 2016-02-17 | 小米科技有限责任公司 | Anti-theft method and device of mobile terminal |
CN104468970A (en) * | 2014-10-24 | 2015-03-25 | 宇龙计算机通信科技(深圳)有限公司 | Management method and system for lost terminal |
CN104735251A (en) * | 2015-03-17 | 2015-06-24 | 上海天奕达电子科技有限公司 | Method and device for unlocking mobile terminals |
CN106790036B (en) * | 2016-12-16 | 2019-05-07 | Oppo广东移动通信有限公司 | Information tamper-proofing method and device, server and terminal |
CN107392013A (en) * | 2017-06-12 | 2017-11-24 | 努比亚技术有限公司 | A kind of terminal safety protection method, terminal and computer-readable recording medium |
US11197147B2 (en) | 2017-08-10 | 2021-12-07 | Beijing Xiaomi Mobile Software Co., Ltd. | Unmanned aerial vehicle access method and device |
CN108156319B (en) * | 2017-12-26 | 2021-07-20 | 哈尔滨海能达科技有限公司 | Method and device for controlling terminal equipment |
CN109815750A (en) * | 2018-12-28 | 2019-05-28 | 深圳市德名利电子有限公司 | A kind of encryption method and storage device of storage device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5940773A (en) * | 1992-11-09 | 1999-08-17 | Ericsson Inc. | Access controlled terminal and method for rendering communication services |
CN1541015A (en) * | 2003-10-31 | 2004-10-27 | 大唐微电子技术有限公司 | Method and system of preventing handset from theft by using international id code of mobile facilities |
CN1722878A (en) * | 2004-07-14 | 2006-01-18 | 乐金电子(中国)研究开发中心有限公司 | Portable terminal embezzlement preventing device and its method |
-
2006
- 2006-08-25 CN CNB2006101099876A patent/CN100401822C/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5940773A (en) * | 1992-11-09 | 1999-08-17 | Ericsson Inc. | Access controlled terminal and method for rendering communication services |
CN1541015A (en) * | 2003-10-31 | 2004-10-27 | 大唐微电子技术有限公司 | Method and system of preventing handset from theft by using international id code of mobile facilities |
CN1722878A (en) * | 2004-07-14 | 2006-01-18 | 乐金电子(中国)研究开发中心有限公司 | Portable terminal embezzlement preventing device and its method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150067780A1 (en) * | 2012-08-20 | 2015-03-05 | Zte Corporation | Mobile Terminal Detection Method And Mobile Terminal |
US9292680B2 (en) * | 2012-08-20 | 2016-03-22 | Zte Corporation | Mobile terminal detection method and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN1913679A (en) | 2007-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100401822C (en) | Protection method and system for preventing fraudulent use of mobile terminal | |
KR100636111B1 (en) | Data protection method embedded in lost mobile terminal and recording medium | |
US7886355B2 (en) | Subsidy lock enabled handset device with asymmetric verification unlocking control and method thereof | |
US9210573B2 (en) | Method and apparatus for registering a computing device with a service provider | |
US7992006B2 (en) | Smart card data protection method and system thereof | |
CN101437067B (en) | Mobile terminal and method for implementing network and card locking | |
JP4996817B2 (en) | Cloning prevention method by flash operation / start-up operation combined with device | |
US20080003980A1 (en) | Subsidy-controlled handset device via a sim card using asymmetric verification and method thereof | |
CN101026834A (en) | Locking method and unlocking method | |
US20090006867A1 (en) | System, device and method for providing data availability for lost/stolen portable communication devices | |
CN101252703A (en) | Terminal data protecting method, system as well as mobile communication terminal | |
US8483661B2 (en) | Method for loading credentials into a mobile communication device such as a mobile phone | |
CN102781001A (en) | Method for encrypting built-in file of mobile terminal and mobile terminal | |
JP2001308850A (en) | Method and device for connecting to network by communication terminal device | |
US9276748B2 (en) | Data-encrypting method and decrypting method for a mobile phone | |
US20120137372A1 (en) | Apparatus and method for protecting confidential information of mobile terminal | |
CN101711023B (en) | Method and system for realizing interlocking of phone and card | |
CN100476845C (en) | Digital copyright management method | |
CN107465504A (en) | A kind of method and device for improving key safety | |
US8412270B2 (en) | Using network authentication to counter subscriber identity module card man-in-the-middle subsidy lock attack | |
JP2009182970A (en) | Protection method of mobile telephone type electrical communication terminal | |
WO2013182112A1 (en) | Method and device for protecting privacy data of mobile terminal user | |
US20060121882A1 (en) | Desktop cellular phone having a SIM card with an encrypted SIM PIN | |
CN105636043A (en) | ESIM (Embedded SIM) card authentication method, eSIM card authentication device and terminal | |
CN106453057B (en) | A kind of method and terminal for preventing short message to be stolen |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |