[go: up one dir, main page]

CN100401822C - Protection method and system for preventing fraudulent use of mobile terminal - Google Patents

Protection method and system for preventing fraudulent use of mobile terminal Download PDF

Info

Publication number
CN100401822C
CN100401822C CNB2006101099876A CN200610109987A CN100401822C CN 100401822 C CN100401822 C CN 100401822C CN B2006101099876 A CNB2006101099876 A CN B2006101099876A CN 200610109987 A CN200610109987 A CN 200610109987A CN 100401822 C CN100401822 C CN 100401822C
Authority
CN
China
Prior art keywords
portable terminal
identification sequences
mobile terminal
fraudulent use
sequence number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CNB2006101099876A
Other languages
Chinese (zh)
Other versions
CN1913679A (en
Inventor
卢红旗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2006101099876A priority Critical patent/CN100401822C/en
Publication of CN1913679A publication Critical patent/CN1913679A/en
Application granted granted Critical
Publication of CN100401822C publication Critical patent/CN100401822C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The security protection method and system described in this invention pre-save a serial number of identification in the mobile terminals. The network equipment checks the serial number of identification. If the identification is not passed, the mobile terminals are defined as illegal users, to prohibit the use of network through the mobile phones or lock them by the service provider's network when they are lost of stolen. The serial number of identification (such as 128bit summary information) is stored in the flash memory with a OTP function of one-time programming through the MD5 encryption on IMEI, which can only be written one time and has finished when the mobile phone leaves the factory. The content read out from the second time of writing is not the same one of the writing.

Description

The guard method of preventing fraudulent use of mobile terminal and system
Technical field
The present invention relates to the anti-theft technique of portable terminal, relate in particular to a kind of portable terminal and prevent stolen guard method and system after stolen.
Background technology
The convenient characteristics of the decline of mobile phone products price and product self make mobile phone become the electronic product of popularizing day by day.It is reported that whole world cellphone subscriber's total amount has surpassed 1,000,000,000 families at present, and is still presenting ever-increasing trend.The profile universal and that mobile phone self is easy to carry about with one of mobile phone is also brought some problems, as easy loss or stolen.This class problem is when causing user's direct economic loss, as free call on somebody else's expense through illegal means; The lawless person also can utilize the leak of original mobile phone software and hardware, change mobile phone " identity " identification number, as: IMEI number, thus make the lawless person escape the restriction of Radio Network System, continue to use this illegal handheld device.
At present, the technology of relevant antitheft mobile phone comprises following several:
(1) French Patent (FRP) FR2791509 provides a kind of technology by preventing from for mobile phone setting startup password illegally to use behind the hand-set from stolen.
(2) Chinese patent 200310113647.7 and 03124196.4 provides by the SIM in the mobile phone (subscriber identification module) is protected, prevent that mobile phone from losing after, the technology that SIM card is wherein illegally used.
(3) number of patent application be 03148202.3 and the patent No. be 01802972.8 patent, these two files provide mobile phone and lose the technology of reporting lost property to the authorities from the trend owner of lost property in the back.
In the above-mentioned prior art, after can not solving mobile phone and losing, stop the disabled user to continue to use this mobile phone (even change SIM card, can not allow to continue to use this mobile phone), can not stop the mobile phone IMEI number to be illegally copied or the number of changing (IMEI number is illegally copied or the number of changing is to produce one of major reason of "parallel goods" mobile phone).
Summary of the invention
The invention provides a kind of guard method and system of preventing fraudulent use of mobile terminal, the realization portable terminal is lost or is stolen, by carrier network, can lock this mobile phone, forbids that perhaps this mobile phone uses network.
Purpose of the present invention is achieved through the following technical solutions.
A kind of guard method of preventing fraudulent use of mobile terminal comprises:
A, the identification sequences number of in portable terminal, prestoring, described identification sequences number obtains after encrypting for IMEI number;
B, network equipment number carry out the legitimacy authentication to the identification sequences of described portable terminal, do not pass through for authentication, classifies described portable terminal as disabled user;
C, portable terminal encrypt by the mode number identical with obtaining identification sequences IMEI number to it, obtain sequence number of authentification;
D, portable terminal read identification sequences number, and with sequence number of authentification relatively, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
Described identification sequences number is stored in the Flash memory of portable terminal.
Described encryption method is for obtaining identification sequences number according to adopting for hardware sequence number ID number cryptographic algorithm that IMEI number is encrypted.
Described identification sequences number is stored in the Flash memory with one-off programming OTP function, and described identification sequences number is stored in the OTP district of the Flash memory with OTP function.
Described non-volatile NV district with Flash memory of one-off programming OTP function is used to preserve IMEI number.
Described step C comprises:
Portable terminal reads IMEI number from the NV district of Flash memory with OTP function, and by the mode number identical with obtaining identification sequences it is encrypted, and obtains sequence number of authentification.
Described step D comprises:
Portable terminal reads identification sequences number from the OTP district of Flash memory with OTP function, and with sequence number of authentification relatively, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
Described step B comprises:
Network equipment obtains the identification sequences number of portable terminal, and judges whether the registration sequence number of this portable terminal of preserving in this identification sequences number and the network equipment is identical, and as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.
Described step B also comprises:
The IMEI number of portable terminal is deposited in the server of network equipment as the registration sequence number.
Described step B also comprises:
For the portable terminal that is listed in the disabled user, network equipment forbids that portable terminal uses network or only allows portable terminal to receive information and do not allow portable terminal to send information.
A kind of system of preventing fraudulent use of mobile terminal comprises:
The identification sequences memory cell: be located at the portable terminal place, be used for the authentication storage sequence number, described identification sequences number obtains after encrypting for IMEI number;
Legitimacy authentication ' unit: be located in the network equipment, be used for the identification sequences of portable terminal number is carried out the legitimacy authentication, do not pass through, classify described portable terminal as disabled user for authentication;
Encrypting module: be located at the portable terminal place, be used for obtaining identification sequences number or sequence number of authentification according to adopting for hardware sequence number ID number cryptographic algorithm that IMEI number is encrypted;
Authentication module: be located at the portable terminal place, be used to contrast identification sequences number and sequence number of authentification, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
Described identification sequences memory cell comprises:
Flash memory: be used to store described identification sequences number.
Described Flash memory has the Flash memory of one-off programming OTP function, is used for described identification sequences number is stored in the OTP district.
Described legitimacy authentication ' unit comprises:
Sequence number Registration Module: be used for the IMEI number of registered mobile terminal, deposit in the server of network equipment, as the registration sequence number;
Memory cell: the registration sequence number that is used to preserve portable terminal;
Legitimacy authentication module: the identification sequences number that is used to obtain portable terminal, and whether the registration sequence number of judging this portable terminal of preserving in the memory cell of this identification sequences number and network equipment is identical, as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.
The technical scheme that provides by the invention described above as seen, in portable terminal, prestore identification sequences number of the guard method of preventing fraudulent use of mobile terminal of the present invention and system; Network system number is carried out the legitimacy authentication to the identification sequences of described portable terminal during communication, do not pass through for authentication, classify described portable terminal as disabled user, thereby when mobile phone is lost or be stolen, can forbid that this mobile phone uses network or locks this mobile phone by carrier network.IMEI number is carried out the identification sequences that obtains after the md5 encryption number be stored in the Flash memory with one-off programming OTP function, identification sequences number can only be written into once, and content is finished writing when mobile phone dispatches from the factory; From writing for the second time, the content of reading not is to be its content that writes.Authentication process by mobile phone be implemented in that mobile phone is lost or stolen after reach the purpose that prevents the number of changing.
Description of drawings
Fig. 1 is in the guard method of preventing fraudulent use of mobile terminal of the present invention putting into the mobile phone IMEI number schematic diagram of the given server of network equipment;
Fig. 2 encrypts the schematic diagram of storage in the guard method of preventing fraudulent use of mobile terminal of the present invention to the mobile phone IMEI number;
Fig. 3 is that the user asked to lock the flow chart of mobile phone after mobile phone was lost in the guard method of preventing fraudulent use of mobile terminal of the present invention;
Fig. 4 is the flow chart one of mobile telephone registration in the guard method of preventing fraudulent use of mobile terminal of the present invention;
Fig. 5 is the flowchart 2 of mobile telephone registration in the guard method of preventing fraudulent use of mobile terminal of the present invention;
Fig. 6 is the structural representation of the system of preventing fraudulent use of mobile terminal of the present invention.
Embodiment
The present invention at first relates to a kind of guard method of preventing fraudulent use of mobile terminal, specifically is the identification sequences number of prestoring in portable terminal; Network equipment number carries out the legitimacy authentication to the identification sequences of described portable terminal, do not pass through for authentication, classifies described portable terminal as disabled user.The identification sequences that prestores in portable terminal number is international travelling carriage identity recognition number IMEI number; Also can be for IMEI number is encrypted the 128bit informative abstract that the back generates, method of encrypting is to adopt cryptographic algorithm (can be MD5) that IMEI number is encrypted according to hardware sequence number ID number to obtain above-mentioned 128bit informative abstract.
Above-mentioned identification sequences number is stored in the Flash memory; Also can be stored in the Flash memory with one-off programming OTP function, and described identification sequences number (as the 128bit informative abstract) is stored in the OTP district of the Flash memory with OTP function.
Portable terminal can also carry out authentication process, and concrete grammar is a portable terminal with IMEI number by with obtaining the identification sequences mode that number (as the 128bit informative abstract) is identical it being encrypted, and obtains sequence number of authentification; Portable terminal reads identification sequences number (as the 128bit informative abstract) again, and compares with sequence number of authentification, and as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.Number be stored in situation in the Flash memory with one-off programming OTP function for identification sequences, portable terminal reads IMEI number from the NV district of Flash memory with OTP function, and, obtain sequence number of authentification by it being encrypted with obtaining the identification sequences mode that number (as the 128bit informative abstract) is identical.Portable terminal reads identification sequences number (as the 128bit informative abstract) from the OTP district of Flash memory with OTP function again, and with sequence number of authentification relatively, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
The method that network equipment number carries out the legitimacy authentication to the identification sequences of described portable terminal is that network equipment requires mobile terminal reporting identification sequences number, and whether the registration sequence number of judging this portable terminal of preserving in this identification sequences number and the network equipment is identical, as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.Certainly need IMEI number with portable terminal deposit in the server of network equipment before this as registering sequence number.And for the portable terminal that is listed in the disabled user, network equipment forbids that portable terminal uses network or only allows portable terminal to receive information and do not allow portable terminal to send information.
The guard method of a kind of preventing fraudulent use of mobile terminal of the present invention is that its specific implementation process of example is as follows with the mobile phone:
One, in portable terminal, prestore identification sequences number
Be illustrated in figure 1 as the specific EIR server of in the guard method of of the present invention kind of preventing fraudulent use of mobile terminal the unification of mobile phone IMEI number being put into network equipment; before each mobile phone dispatches from the factory the mobile phone manufacturer can be in Flash a burned unique sequence number; it is IMEI (the international travelling carriage identification of International Mobile stationEquipment Identities) number; the dealer when user buys mobile phone (also may be operator) must register on the books this IMEI number, is deposited into then in EIR (the Equipment Identity Registers equipment identity register) server of operator's appointment.
Be stored in IMEI number in the mobile phone and be the identification sequences number of mobile phone, and this registration sequence number that IMEI number in the EIR server is mobile phone that deposits in through registering.
IMEI number in the mobile phone is unusual important resource, prevent to be illegally copied, and in order to prevent to illegally copy IMEI and change IMEI number, the identification sequences of mobile phone number can be through being stored in after encrypting among the Flash with OTP (One Time Program-one-time programming) function in the mobile phone, normally obtains identification sequences number according to adopting for hardware sequence number ID number cryptographic algorithm that IMEI number is encrypted.Concrete grammar is as shown in Figure 2:
When mobile phone dispatches from the factory, according to 128bit hardware sequence number (ID number), adopt the MD5 algorithm that IMEI number is carried out ciphering process, generate the informative abstract of 128bit, then this summary is written to the OTP district of Flash, will be written to other zone (NV (non-volatile) district) of Flash for original I MEI number simultaneously.
Above the full name of MD5 is Message-Digest Algorithm 5 (message-digest algorithm 5), is to be developed jointly by Massachusetts science and engineering (MIT laboratory for computer science) and RSA data encryption company (RSA data security inc) beginning of the nineties.It is by irreversible character string mapping algorithm, the byte serial of a random length is transformed into a fixed length, unique big integer (informative abstract of 128bit), propagate afterwards in the process of this informative abstract, no matter any type of change has taken place in its content, as long as the original character string file is recomputated md5 will find that informative abstract is inequality, what can determine thus to obtain is an incorrect file.It is usually used in digital signature and account, Password Management.
Two, network equipment number carries out the legitimacy authentication to the identification sequences of described portable terminal, does not pass through for authentication, classifies described portable terminal as disabled user.
Wireless network is discerned the user identity legitimacy according to IMEI number when mobile phone power-on registration or conversation (caller or called), has only validated user just to permit using network.Be specially: network equipment obtains the identification sequences number of portable terminal, and whether the registration sequence number of judging this portable terminal of preserving in this identification sequences number and the network equipment is identical, as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.Specifically can be divided into several situations of giving.
(1), request locking mobile phone when user's mobile phone is lost or be stolen
As shown in Figure 3: the user find that mobile phone is lost or stolen after, can arrive service centre of operator, this mobile phone of request locking, the information that operator provides according to the user finds out the IMEI number of this mobile phone from the EIR server, blacklist it, this mobile phone can only be used for collection of letters breath, can not send information later on, can also forbid directly that it uses network.
(2), the start-up logging process of mobile phone
Its detailed process is as follows as shown in Figure 4:
Step 41, mobile phone power-on search network, read system message, network side require mobile phone to report IMEI number;
Step 42, mobile phone read IMEI number from the specific region of Flash;
Step 43, mobile phone are issued network side with IMEI number;
Whether step 44, network side are searched for this IMEI number from the EIR server registered and read black and white lists;
Step 45, judge whether IMEI number is legal, and execution in step 46 in this way, otherwise execution in step 47;
Concrete grammar is that IMEI number and black and white lists are compared, and is legal or the disabled user with decision, if this hand-set from stolen and user have listed it in " blacklist ", is the disabled user; Otherwise be validated user.
Step 46, the normal start-up logging flow process that continues.
Step 47, network side forbid that then this mobile telephone registration uses network.
In addition, the embodiment of the authentication process of mobile phone own is as shown in Figure 5:
Step 51, mobile phone power-on or carry out other authentication process;
Step 52, mobile phone read the unencrypted IMEI number from the NV district;
Step 53, execution md5 encryption algorithm; Adopt cryptographic algorithm MD5 that IMEI number is encrypted according to hardware sequence number ID number and obtain sequence number of authentification;
Step 54, mobile phone read encrypted IMEI informative abstract from the OTP district, just identification sequences number;
Step 55, relatively whether sequence number of authentification and identification sequences be number identical, in this way, and execution in step 56, otherwise, execution in step 57;
Step 56, normal boot-strap or finish authentication process;
Step 57, shutdown automatically.
Because have the Flash of OTP function, its OTP district the zone of write-once (special-purpose can only) has following characteristic:
(1) can only be programmed (writing) once, content is finished writing when mobile phone dispatches from the factory;
(2) from writing for the second time, be written to and will cause inconsistently when content in the OTP district is read out, the content of promptly reading not is to be its content that writes.
Because the above characteristic in OTP district makes:
The third party can't change existing content among the OTP, promptly can't change the 128bit informative abstract after IMEI number is encrypted; Even the third party has successfully changed original I MEI number among the NV (non-volatile), during other authentication process of mobile phone power-on startup/execution, the also inconsistent start/failed authentication that causes of fresh information clip Text that can generate owing to the informative abstract among the OTP and IMEI change back, thus reach the purpose that prevents the number of changing.
The system of a kind of preventing fraudulent use of mobile terminal of the present invention as shown in Figure 6 comprises:
Be located at portable terminal place identification sequences memory cell and the legitimacy authentication ' unit of being located in the network equipment, wherein,
The identification sequences memory cell comprises the Flash memory, is used to store described identification sequences number; Described Flash memory can adopt general memory, also can adopt the Flash memory with one-off programming OTP function, is used for described identification sequences number is stored in the OTP district.
Described system can also comprise encrypting module, is located at the portable terminal place, and encrypting module is used for obtaining identification sequences number or sequence number of authentification according to adopting for hardware sequence number ID number cryptographic algorithm that IMEI number is encrypted.
Described system can also comprise authentication module, is located at the portable terminal place, and authentication module is used to contrast identification sequences number and sequence number of authentification, and as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically
Be located at the legitimacy authentication ' unit in the network equipment, be used for the identification sequences of portable terminal number is carried out the legitimacy authentication, do not pass through, classify described portable terminal as disabled user for authentication.Comprise sequence number Registration Module, memory cell and legitimacy authentication module, wherein:
Sequence number Registration Module: be used for the IMEI number of registered mobile terminal, deposit in the server of network equipment, as the registration sequence number;
Memory cell: the registration sequence number that is used to preserve portable terminal; The present invention adopts EIR (the Equipment Identity Registers equipment identity register) server of operator's appointment.
Legitimacy authentication module: the identification sequences number that is used to obtain portable terminal, and whether the registration sequence number of judging this portable terminal of preserving in the memory cell of this identification sequences number and network equipment is identical, as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claims.

Claims (14)

1. the guard method of a preventing fraudulent use of mobile terminal is characterized in that, comprising:
A, the identification sequences number of in portable terminal, prestoring, described identification sequences number obtains after encrypting for IMEI number;
B, network equipment number carry out the legitimacy authentication to the identification sequences of described portable terminal, do not pass through for authentication, classifies described portable terminal as disabled user;
C, portable terminal encrypt by the mode number identical with obtaining identification sequences IMEI number to it, obtain sequence number of authentification;
D, portable terminal read identification sequences number, and with sequence number of authentification relatively, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
2. the guard method of preventing fraudulent use of mobile terminal according to claim 1 is characterized in that, described identification sequences number is stored in the Flash memory of portable terminal.
3. the guard method of preventing fraudulent use of mobile terminal according to claim 1 is characterized in that, described encryption method is for obtaining identification sequences number according to adopting for hardware sequence number ID number cryptographic algorithm that IMEI number is encrypted.
4. the guard method of preventing fraudulent use of mobile terminal according to claim 1; it is characterized in that; described identification sequences number is stored in the Flash memory with one-off programming OTP function, and described identification sequences number is stored in the OTP district of the Flash memory with OTP function.
5. the guard method of preventing fraudulent use of mobile terminal according to claim 4 is characterized in that, described non-volatile NV district with Flash memory of one-off programming OTP function is used to preserve IMEI number.
6. the guard method of preventing fraudulent use of mobile terminal according to claim 1 is characterized in that, described step C comprises:
Portable terminal reads IMEI number from the NV district of Flash memory with OTP function, and by the mode number identical with obtaining identification sequences it is encrypted, and obtains sequence number of authentification.
7. the guard method of preventing fraudulent use of mobile terminal according to claim 1 is characterized in that, described step D comprises:
Portable terminal reads identification sequences number from the OTP district of Flash memory with OTP function, and with sequence number of authentification relatively, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
8. the guard method of preventing fraudulent use of mobile terminal according to claim 1 is characterized in that, described step B comprises:
Network equipment obtains the identification sequences number of portable terminal, and judges whether the registration sequence number of this portable terminal of preserving in this identification sequences number and the network equipment is identical, and as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.
9. the guard method of preventing fraudulent use of mobile terminal according to claim 8 is characterized in that, described step B also comprises:
The IMEI number of portable terminal is deposited in the server of network equipment as the registration sequence number.
10. according to the guard method of claim 1 or 8 described preventing fraudulent use of mobile terminal, it is characterized in that described step B also comprises:
For the portable terminal that is listed in the disabled user, network equipment forbids that portable terminal uses network or only allows portable terminal to receive information and do not allow portable terminal to send information.
11. the system of a preventing fraudulent use of mobile terminal is characterized in that, comprising:
The identification sequences memory cell: be located at the portable terminal place, be used for the authentication storage sequence number, described identification sequences number obtains after encrypting for IMEI number;
Legitimacy authentication ' unit: be located in the network equipment, be used for the identification sequences of portable terminal number is carried out the legitimacy authentication, do not pass through, classify described portable terminal as disabled user for authentication;
Encrypting module: be located at the portable terminal place, be used for obtaining identification sequences number or sequence number of authentification according to adopting for hardware sequence number ID number cryptographic algorithm that IMEI number is encrypted;
Authentication module: be located at the portable terminal place, be used to contrast identification sequences number and sequence number of authentification, as identical, then portable terminal normally uses, otherwise portable terminal shuts down automatically.
12. the system of preventing fraudulent use of mobile terminal according to claim 11 is characterized in that, described identification sequences memory cell comprises:
Flash memory: be used to store described identification sequences number.
13. the system of preventing fraudulent use of mobile terminal according to claim 12 is characterized in that, described Flash memory has the Flash memory of one-off programming OTP function, is used for described identification sequences number is stored in the OTP district.
14. the system of preventing fraudulent use of mobile terminal according to claim 11 is characterized in that, described legitimacy authentication ' unit comprises:
Sequence number Registration Module: be used for the IMEI number of registered mobile terminal, deposit in the server of network equipment, as the registration sequence number;
Memory cell: the registration sequence number that is used to preserve portable terminal;
Legitimacy authentication module: the identification sequences number that is used to obtain portable terminal, and whether the registration sequence number of judging this portable terminal of preserving in the memory cell of this identification sequences number and network equipment is identical, as inequality, then the expression authentication is not passed through, and classifies described portable terminal as disabled user.
CNB2006101099876A 2006-08-25 2006-08-25 Protection method and system for preventing fraudulent use of mobile terminal Active CN100401822C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006101099876A CN100401822C (en) 2006-08-25 2006-08-25 Protection method and system for preventing fraudulent use of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006101099876A CN100401822C (en) 2006-08-25 2006-08-25 Protection method and system for preventing fraudulent use of mobile terminal

Publications (2)

Publication Number Publication Date
CN1913679A CN1913679A (en) 2007-02-14
CN100401822C true CN100401822C (en) 2008-07-09

Family

ID=37722411

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006101099876A Active CN100401822C (en) 2006-08-25 2006-08-25 Protection method and system for preventing fraudulent use of mobile terminal

Country Status (1)

Country Link
CN (1) CN100401822C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150067780A1 (en) * 2012-08-20 2015-03-05 Zte Corporation Mobile Terminal Detection Method And Mobile Terminal

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101018125B (en) * 2007-03-02 2010-06-16 中兴通讯股份有限公司 Radio terminal security network and card locking method based on the ellipse curve public key cipher
CN101740111B (en) * 2008-11-11 2013-11-06 国民技术股份有限公司 Semiconductor memory device and method thereof for realizing safe memory of data
WO2010057539A1 (en) 2008-11-24 2010-05-27 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for aquiring an imei associated to an imsi
CN101888448B (en) * 2010-06-07 2014-03-19 中兴通讯股份有限公司 Method and mobile terminal for locking network and card
CN102026195B (en) * 2010-12-17 2013-05-15 北京交通大学 Method and system for mobile terminal identity authentication based on one-time password
CN102158856B (en) * 2011-02-21 2015-06-17 惠州Tcl移动通信有限公司 Mobile terminal identification code authentication system and method, server and terminal
CN102301381A (en) * 2011-07-08 2011-12-28 华为技术有限公司 Method and device for processing information security
CN102711109B (en) * 2012-06-12 2016-08-03 中国电力科学研究院 A kind of method of mobile terminal authentication
CN102780989A (en) * 2012-07-06 2012-11-14 北京小米科技有限责任公司 Method and system for preventing loss of mobile terminal
CN105335677A (en) * 2014-07-24 2016-02-17 小米科技有限责任公司 Anti-theft method and device of mobile terminal
CN104468970A (en) * 2014-10-24 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Management method and system for lost terminal
CN104735251A (en) * 2015-03-17 2015-06-24 上海天奕达电子科技有限公司 Method and device for unlocking mobile terminals
CN106790036B (en) * 2016-12-16 2019-05-07 Oppo广东移动通信有限公司 Information tamper-proofing method and device, server and terminal
CN107392013A (en) * 2017-06-12 2017-11-24 努比亚技术有限公司 A kind of terminal safety protection method, terminal and computer-readable recording medium
US11197147B2 (en) 2017-08-10 2021-12-07 Beijing Xiaomi Mobile Software Co., Ltd. Unmanned aerial vehicle access method and device
CN108156319B (en) * 2017-12-26 2021-07-20 哈尔滨海能达科技有限公司 Method and device for controlling terminal equipment
CN109815750A (en) * 2018-12-28 2019-05-28 深圳市德名利电子有限公司 A kind of encryption method and storage device of storage device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5940773A (en) * 1992-11-09 1999-08-17 Ericsson Inc. Access controlled terminal and method for rendering communication services
CN1541015A (en) * 2003-10-31 2004-10-27 大唐微电子技术有限公司 Method and system of preventing handset from theft by using international id code of mobile facilities
CN1722878A (en) * 2004-07-14 2006-01-18 乐金电子(中国)研究开发中心有限公司 Portable terminal embezzlement preventing device and its method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5940773A (en) * 1992-11-09 1999-08-17 Ericsson Inc. Access controlled terminal and method for rendering communication services
CN1541015A (en) * 2003-10-31 2004-10-27 大唐微电子技术有限公司 Method and system of preventing handset from theft by using international id code of mobile facilities
CN1722878A (en) * 2004-07-14 2006-01-18 乐金电子(中国)研究开发中心有限公司 Portable terminal embezzlement preventing device and its method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150067780A1 (en) * 2012-08-20 2015-03-05 Zte Corporation Mobile Terminal Detection Method And Mobile Terminal
US9292680B2 (en) * 2012-08-20 2016-03-22 Zte Corporation Mobile terminal detection method and mobile terminal

Also Published As

Publication number Publication date
CN1913679A (en) 2007-02-14

Similar Documents

Publication Publication Date Title
CN100401822C (en) Protection method and system for preventing fraudulent use of mobile terminal
KR100636111B1 (en) Data protection method embedded in lost mobile terminal and recording medium
US7886355B2 (en) Subsidy lock enabled handset device with asymmetric verification unlocking control and method thereof
US9210573B2 (en) Method and apparatus for registering a computing device with a service provider
US7992006B2 (en) Smart card data protection method and system thereof
CN101437067B (en) Mobile terminal and method for implementing network and card locking
JP4996817B2 (en) Cloning prevention method by flash operation / start-up operation combined with device
US20080003980A1 (en) Subsidy-controlled handset device via a sim card using asymmetric verification and method thereof
CN101026834A (en) Locking method and unlocking method
US20090006867A1 (en) System, device and method for providing data availability for lost/stolen portable communication devices
CN101252703A (en) Terminal data protecting method, system as well as mobile communication terminal
US8483661B2 (en) Method for loading credentials into a mobile communication device such as a mobile phone
CN102781001A (en) Method for encrypting built-in file of mobile terminal and mobile terminal
JP2001308850A (en) Method and device for connecting to network by communication terminal device
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
US20120137372A1 (en) Apparatus and method for protecting confidential information of mobile terminal
CN101711023B (en) Method and system for realizing interlocking of phone and card
CN100476845C (en) Digital copyright management method
CN107465504A (en) A kind of method and device for improving key safety
US8412270B2 (en) Using network authentication to counter subscriber identity module card man-in-the-middle subsidy lock attack
JP2009182970A (en) Protection method of mobile telephone type electrical communication terminal
WO2013182112A1 (en) Method and device for protecting privacy data of mobile terminal user
US20060121882A1 (en) Desktop cellular phone having a SIM card with an encrypted SIM PIN
CN105636043A (en) ESIM (Embedded SIM) card authentication method, eSIM card authentication device and terminal
CN106453057B (en) A kind of method and terminal for preventing short message to be stolen

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant