CN115086950A - Terminal encryption method, system and storage medium - Google Patents

Terminal encryption method, system and storage medium Download PDF

Info

Publication number
CN115086950A
CN115086950A CN202110269117.XA CN202110269117A CN115086950A CN 115086950 A CN115086950 A CN 115086950A CN 202110269117 A CN202110269117 A CN 202110269117A CN 115086950 A CN115086950 A CN 115086950A
Authority
CN
China
Prior art keywords
sim card
unlocking
pin code
unique identification
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110269117.XA
Other languages
Chinese (zh)
Inventor
黄宏章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Genius Technology Co Ltd
Original Assignee
Guangdong Genius Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Genius Technology Co Ltd filed Critical Guangdong Genius Technology Co Ltd
Priority to CN202110269117.XA priority Critical patent/CN115086950A/en
Publication of CN115086950A publication Critical patent/CN115086950A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • H04W60/06De-registration or detaching

Abstract

The invention provides a terminal encryption method, a system and a storage medium, wherein the method comprises the following steps: acquiring a unique identification code of the inserted SIM card; encrypting the unique identification code through a preset encryption algorithm to obtain a corresponding PIN code; and unlocking the SIM card through the PIN code, executing a network registration process if the unlocking is successful, and forbidding the network registration if the unlocking is failed. The system acquisition module is used for acquiring the unique identification code of the inserted SIM card; the encryption module is connected with the acquisition module and used for encrypting the unique identification code through a preset encryption algorithm to acquire a corresponding PIN code; and the unlocking module is connected with the encryption module and used for unlocking the SIM card through the PIN code, executing a network registration process if the unlocking is successful, and forbidding the network registration if the unlocking is failed. According to the scheme, the SIM card can be suitable for different mobile terminals of corresponding manufacturers on the premise of ensuring the safety of the SIM card, so that the mobile terminal is higher in use flexibility.

Description

Terminal encryption method, system and storage medium
Technical Field
The present invention relates to the field of terminal encryption technologies, and in particular, to a terminal encryption method, system and storage medium.
Background
Currently, for the sake of security, mobile terminal manufacturers generally do not allow SIM cards of other manufacturers to use the network after inserting into the mobile terminals of the manufacturers, and therefore, the SIM cards need to be encrypted. The existing encryption or locking modes are two types: firstly, reading the IMSI in the SIM card and then judging whether a plurality of IMSI numbers in the SIM card meet the use condition, if so, allowing the SIM card to be used; secondly, the SIM card user or provider and the operator agree, the network can be used only if the IMEI number of the mobile terminal is uniquely matched with the IMSI number of the SIM card, and the network can not be used if other cards are inserted into the mobile terminal.
However, the existing terminal encryption method may limit the use of the SIM card. For example, when all mobile terminals of a manufacturer can only use a customized card, and a customized SIM card can be replaced and used at will on different mobile terminals of the manufacturer, the existing encryption method cannot satisfy the above scenario, which is a very common situation. Therefore, an encryption method with higher flexibility and capable of enabling the SIM card to be suitable for different mobile terminals of corresponding manufacturers on the premise of ensuring the security of the SIM card is needed.
Disclosure of Invention
The invention aims to provide a terminal encryption method, a system and a storage medium, which can ensure that an SIM card can be suitable for different mobile terminals of corresponding manufacturers on the premise of ensuring the safety of the SIM card, thereby ensuring that the mobile terminal has stronger use flexibility.
The technical scheme provided by the invention is as follows:
the invention provides a terminal encryption method, which comprises the following steps:
acquiring a unique identification code of the inserted SIM card;
encrypting the unique identification code through a preset encryption algorithm to obtain a corresponding PIN code;
and unlocking the SIM card through the PIN code, executing a network registration process if the unlocking is successful, and forbidding the network registration if the unlocking is failed.
SIM cards (Subscriber Identity modules), each SIM card having a corresponding unique identifier, such as an ICCID (integrated circuit card identifier), an IMSI (International Mobile Subscriber Identity), and the like.
After the SIM card is inserted into the mobile terminal and powered on, the unique Identification code of the SIM card is read, the unique Identification code can be encrypted through a preset encryption algorithm, so that a corresponding PIN (Personal Identification Number), namely a Personal Identification code of the SIM card, can be unlocked through the PIN, if the SIM card is successfully unlocked, a network registration process is normally executed, and if the SIM card is unsuccessfully unlocked, the network registration is forbidden, so that the encryption of the terminal equipment is realized. According to the scheme, the SIM card is locked and unlocked through the PIN code corresponding to the unique identification code, so that the SIM card can be suitable for different mobile terminals of corresponding manufacturers on the premise of ensuring the safety of the SIM card, and the mobile terminal is higher in use flexibility.
Specifically, if the mobile terminal can only use the customized SIM card, the production and decryption algorithms for the PIN code are private for the mobile terminal of the same manufacturer, and when the mobile terminal and the customized SIM card are produced, a PIN code lock may be set in advance, and the unlocking code of the PIN code lock is obtained by encrypting the unique identification code of the SIM card. Therefore, for different mobile terminals of corresponding manufacturers, the unlocking PIN code corresponding to the PIN code lock can be obtained by encrypting the unique identification code of the SIM card, so that the SIM card can be randomly replaced and used on different mobile terminals of the manufacturer, and other SIM cards cannot be subjected to network registration because the correct PIN code cannot be obtained, thereby not only ensuring the safety of the SIM card, but also improving the flexibility of the mobile terminal and the SIM card.
Further, after acquiring the unique identification code of the inserted SIM card, the method further includes:
judging whether a PIN code lock corresponding to the SIM card is opened or not;
if the key is turned on, encrypting the unique identification code through the preset encryption algorithm to obtain the PIN code, and unlocking through the PIN code;
and if the SIM card is not unlocked, automatically inputting an original PIN code corresponding to the SIM card for unlocking, and updating the unlocking PIN code of the PIN code lock after the unlocking is successful.
Specifically, after the unique identification code of the inserted SIM card is acquired, whether a PIN lock corresponding to the SIM card is unlocked or not needs to be judged, if the PIN lock is unlocked, the mobile terminal is proved to be normally used after being inserted into other SIM cards, therefore, verification needs to be carried out, the acquired unique identification code is encrypted through a preset encryption algorithm, the PIN code can be acquired, and then unlocking can be carried out through the PIN code; if the mobile terminal is not started, the mobile terminal is proved to be used for networking for the first time, the original PIN code corresponding to the SIM card can be input for unlocking, and after the unlocking is successful, the unlocking PIN code of the PIN code lock is updated, wherein the updated PIN code is obtained by encrypting the obtained unique identification code through a preset encryption algorithm by the system.
Further, before acquiring the unique identification code of the inserted SIM card, the method further includes:
and setting the PIN code lock, wherein the PIN code lock corresponds to the unique identification code of the customized SIM card.
Specifically, the PIN code lock can be set before the SIM card leaves the factory, the PIN code lock corresponds to the unique identification code of the customized SIM card, an original PIN code can be set for initial unlocking, and the unlocking PIN code obtained by encrypting the unique identification code of the SIM card is required to be used for unlocking subsequently.
Further, after the unlocking fails, the method further comprises:
encrypting the unique identification code again through the preset encryption algorithm to obtain a new PIN code, and unlocking through the new PIN code;
and if the continuous unlocking fails within the preset times, locking the SIM card.
When unlocking is carried out, if unlocking fails, unlocking can be carried out again automatically or manually, unlocking failure caused by accidents is avoided, if unlocking fails for a plurality of times continuously, if unlocking fails for three times continuously, the SIM card needs to be locked, and therefore safety of the SIM card is guaranteed.
Further, the unique identification code is ICCID data and/or IMSI data.
Further, the unlocking the SIM card through the PIN code specifically includes:
automatically sending the PIN code to the SIM card for unlocking; or
And displaying the PIN code, and sending the PIN code input by the user to the SIM card for unlocking.
Specifically, when the SIM card is unlocked, the obtained PIN code can be automatically sent for unlocking, the PIN code can also be displayed, and the user inputs the PIN code for unlocking, and the PIN code can be specifically adjusted according to the user's requirements.
In addition, the present invention also provides a terminal encryption system, comprising:
the acquisition module is used for acquiring the unique identification code of the inserted SIM card;
the encryption module is connected with the acquisition module and used for encrypting the unique identification code through a preset encryption algorithm to acquire a corresponding PIN code;
and the unlocking module is connected with the encryption module and used for unlocking the SIM card through the PIN code, executing a network registration process if the unlocking is successful, and forbidding the network registration if the unlocking is failed.
After the SIM card is inserted into the mobile terminal and powered on, the unique identification code of the SIM card can be read through the acquisition module, the unique identification code can be encrypted through the encryption module, so that a corresponding PIN (personal identification number) code is obtained, finally, the SIM card can be unlocked through the unlocking module, if the unlocking is successful, a network registration process is normally executed, and if the unlocking is failed, the network registration is forbidden, so that the encryption of the terminal equipment is realized. According to the scheme, the SIM card is locked and unlocked through the PIN code corresponding to the unique identification code, so that the SIM card can be suitable for different mobile terminals of corresponding manufacturers on the premise of ensuring the safety of the SIM card, and the mobile terminal is higher in use flexibility.
Specifically, if the mobile terminal can only use the customized SIM card, the production and decryption algorithms for the PIN code are private for the mobile terminal of the same manufacturer, and when the mobile terminal and the customized SIM card are produced, a PIN code lock may be set in advance, and the unlocking code of the PIN code lock is obtained by encrypting the unique identification code of the SIM card. Therefore, for different mobile terminals of corresponding manufacturers, the unlocking PIN code corresponding to the PIN code lock can be obtained by encrypting the unique identification code of the SIM card, so that the SIM card can be randomly replaced and used on different mobile terminals of the manufacturer, and other SIM cards cannot be subjected to network registration because the correct PIN code cannot be obtained, thereby not only ensuring the safety of the SIM card, but also improving the flexibility of the mobile terminal and the SIM card.
Further, still include:
the judging module is used for judging whether the PIN code lock corresponding to the SIM card is opened or not;
if the PIN code is started, the unique identification code is encrypted through the encryption module to obtain the PIN code, and the unlocking module is used for unlocking;
and if the SIM card is not unlocked, automatically inputting an original PIN code corresponding to the SIM card for unlocking, and updating the unlocking PIN code of the PIN code lock after the unlocking is successful.
Specifically, after the unique identification code of the inserted SIM card is acquired, whether a PIN lock corresponding to the SIM card is unlocked or not needs to be judged, if the PIN lock is unlocked, the mobile terminal is proved to be normally used after being inserted into other SIM cards, therefore, verification needs to be carried out, the acquired unique identification code is encrypted through a preset encryption algorithm, the PIN code can be acquired, and then unlocking can be carried out through the PIN code; if the mobile terminal is not started, the mobile terminal is proved to be used for networking for the first time, the original PIN code corresponding to the SIM card can be input for unlocking, and after the unlocking is successful, the unlocking PIN code of the PIN code lock is updated, wherein the updated PIN code is obtained by encrypting the obtained unique identification code through a preset encryption algorithm by the system.
Further, still include:
and the setting module is used for setting the PIN code lock, and the PIN code lock corresponds to the unique identification code of the customized SIM card.
Specifically, the PIN code lock can be set before the SIM card leaves the factory, the PIN code lock corresponds to the unique identification code of the customized SIM card, an original PIN code can be set for initial unlocking, and the unlocking PIN code obtained by encrypting the unique identification code of the SIM card is required to be used for unlocking subsequently.
In addition, the present invention also provides a storage medium, where at least one instruction is stored, and the instruction is loaded and executed by a processor to implement the operation performed by the terminal encryption method.
According to the terminal encryption method, the terminal encryption system and the storage medium provided by the invention, after the SIM card is inserted into the mobile terminal and powered on, the unique identification code can be encrypted through a preset encryption algorithm by reading the unique identification code of the SIM card, so that a corresponding PIN (personal identification number) code is obtained, the SIM card can be unlocked through the PIN code, if the unlocking is successful, a network registration process is normally executed, and if the unlocking is failed, the network registration is forbidden, so that the encryption of the terminal equipment is realized. According to the scheme, the SIM card is locked and unlocked through the PIN code corresponding to the unique identification code, so that the SIM card can be suitable for different mobile terminals of corresponding manufacturers on the premise of ensuring the safety of the SIM card, and the mobile terminal is higher in use flexibility.
Drawings
The foregoing features, technical features, advantages and embodiments of the present invention will be further explained in the following detailed description of the preferred embodiments, which is to be read in connection with the accompanying drawings.
FIG. 1 is a schematic overall flow diagram of an embodiment of the present invention;
FIG. 2 is a schematic flow diagram of one embodiment of the present invention;
FIG. 3 is a schematic flow diagram of another embodiment of the present invention;
FIG. 4 is a schematic flow chart of yet another embodiment of the present invention;
fig. 5 is a schematic system structure according to an embodiment of the present invention.
The reference numbers in the figures: 1-an acquisition module; 2-an encryption module; 3-an unlocking module; 4-a judging module; 5-setting the module.
Detailed Description
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following description will be made with reference to the accompanying drawings. It is obvious that the drawings in the following description are only some examples of the invention, and that for a person skilled in the art, other drawings and embodiments can be derived from them without inventive effort.
For the sake of simplicity, the drawings only schematically show the parts relevant to the present invention, and they do not represent the actual structure as a product. In addition, in order to make the drawings concise and understandable, components having the same structure or function in some of the drawings are only schematically illustrated or only labeled. In this document, "one" means not only "only one" but also a case of "more than one".
Example 1
An embodiment of the present invention, as shown in fig. 1, provides a terminal encryption method, including the steps of:
and S1, acquiring the unique identification code of the inserted SIM card.
Preferably, the unique identifier is ICCID data and/or IMSI data.
SIM cards (Subscriber Identity modules), each SIM card having a corresponding unique identifier, such as an ICCID (integrated circuit card identifier), an IMSI (International Mobile Subscriber Identity), and the like.
And S2, encrypting the unique identification code through a preset encryption algorithm to obtain a corresponding PIN code.
S3, unlocking the SIM card through the PIN code, executing a network registration process if the unlocking is successful, and forbidding the network registration if the unlocking is failed.
The existing encryption or locking modes are two types: firstly, reading the IMSI in the SIM card and then judging whether a plurality of IMSI numbers in the SIM card meet the use condition, if so, allowing the SIM card to be used; secondly, the SIM card user or provider and the operator agree, the network can be used only if the IMEI number of the mobile terminal is uniquely matched with the IMSI number of the SIM card, and the network can not be used if other cards are inserted into the mobile terminal.
However, the existing terminal encryption method may limit the use of the SIM card. For example, when all mobile terminals of a manufacturer can only use a customized card, and a customized SIM card can be replaced and used at will on different mobile terminals of the manufacturer, the existing encryption method cannot satisfy the above scenario, which is a very common situation.
According to the scheme, after the SIM card is inserted into the mobile terminal and powered on, the unique Identification code is read, the unique Identification code can be encrypted through a preset encryption algorithm, so that a corresponding PIN (Personal Identification Number), namely a Personal Identification code of the SIM card, can be obtained, the SIM card can be unlocked through the PIN, if the unlocking is successful, a network registration process is normally executed, and if the unlocking is failed, the network registration is forbidden, so that the encryption of the terminal equipment is realized. According to the scheme, the SIM card is locked and unlocked through the PIN code corresponding to the unique identification code, so that the SIM card can be suitable for different mobile terminals of corresponding manufacturers on the premise of ensuring the safety of the SIM card, and the mobile terminal is higher in use flexibility.
Specifically, if the mobile terminal can only use the customized SIM card, the production and decryption algorithms for the PIN code are private for the mobile terminal of the same manufacturer, and when the mobile terminal and the customized SIM card are produced, a PIN code lock may be set in advance, and the unlocking code of the PIN code lock is obtained by encrypting the unique identification code of the SIM card. Therefore, for different mobile terminals of corresponding manufacturers, the unlocking PIN code corresponding to the PIN code lock can be obtained by encrypting the unique identification code of the SIM card, so that the SIM card can be randomly replaced and used on different mobile terminals of the manufacturer, and other SIM cards cannot be subjected to network registration because the correct PIN code cannot be obtained, thereby not only ensuring the safety of the SIM card, but also improving the flexibility of the mobile terminal and the SIM card.
Example 2
An embodiment of the present invention, as shown in fig. 2 and fig. 3, provides a terminal encryption method based on embodiment 1, including the steps of:
and S1, acquiring the unique identification code of the inserted SIM card.
Preferably, the unique identifier is ICCID data and/or IMSI data.
SIM cards (Subscriber Identity modules), each SIM card having a corresponding unique identifier, such as an ICCID (integrated circuit card identifier), an IMSI (International Mobile Subscriber Identity), and the like.
Preferably, before acquiring the unique identification code of the inserted SIM card, the method further includes: and setting a PIN (personal identification number) code lock, wherein the PIN code lock corresponds to the unique identification code of the customized SIM card.
Specifically, the PIN code lock can be set before the SIM card leaves the factory, the PIN code lock corresponds to the unique identification code of the customized SIM card, an original PIN code can be set for initial unlocking, and the unlocking PIN code obtained by encrypting the unique identification code of the SIM card is required to be used for unlocking subsequently.
And S11, judging whether the PIN code lock corresponding to the SIM card is opened.
And S12, if the mobile terminal is started, encrypting the unique identification code through a preset encryption algorithm to obtain a PIN code, and unlocking through the PIN code.
Specifically, after the SIM card is inserted into the mobile terminal and powered on, the unique Identification code of the SIM card is read, and the unique Identification code can be encrypted through a preset encryption algorithm, so as to obtain a corresponding PIN Identification Number (i.e. a Personal Identification Number of the SIM card), and then the SIM card can be unlocked through the PIN code, if the unlocking is successful, the network registration process is normally executed, and if the unlocking is failed, the network registration is prohibited, so as to implement the encryption of the terminal device. According to the scheme, the SIM card is locked and unlocked through the PIN code corresponding to the unique identification code, so that the SIM card can be suitable for different mobile terminals of corresponding manufacturers on the premise of ensuring the safety of the SIM card, and the mobile terminal is higher in use flexibility.
And S13, if the SIM card is not unlocked, automatically inputting the original PIN code corresponding to the SIM card for unlocking, and updating the unlocking PIN code of the PIN code lock after the unlocking is successful.
Specifically, after the unique identification code of the inserted SIM card is acquired, whether a PIN lock corresponding to the SIM card is unlocked or not needs to be judged, if the PIN lock is unlocked, the mobile terminal is proved to be normally used after being inserted into other SIM cards, therefore, verification needs to be carried out, the acquired unique identification code is encrypted through a preset encryption algorithm, the PIN code can be acquired, and then unlocking can be carried out through the PIN code; if the mobile terminal is not started, the mobile terminal is proved to be used for networking for the first time, the original PIN code corresponding to the SIM card can be input for unlocking, and after the unlocking is successful, the unlocking PIN code of the PIN code lock is updated, wherein the updated PIN code is obtained by encrypting the obtained unique identification code through a preset encryption algorithm by the system.
Example 3
An embodiment of the present invention, as shown in fig. 4, provides a terminal encryption method, including the steps of:
and S1, acquiring the unique identification code of the inserted SIM card.
Preferably, the unique identification code is ICCID data and/or IMSI data.
SIM cards (Subscriber Identity modules), each SIM card having a corresponding unique identifier, such as an ICCID (integrated circuit card identifier), an IMSI (International Mobile Subscriber Identity), and the like.
And S2, encrypting the unique identification code through a preset encryption algorithm to obtain a corresponding PIN code.
S3, unlocking the SIM card through the PIN code, executing a network registration process if the unlocking is successful, and forbidding the network registration if the unlocking is failed.
After the SIM card is inserted into the mobile terminal and powered on, the unique Identification code can be encrypted through a preset encryption algorithm by reading the unique Identification code of the SIM card, so that a corresponding PIN (Personal Identification Number), namely a Personal Identification code of the SIM card, can be unlocked through the PIN, if the unlocking is successful, a network registration process is normally executed, and if the unlocking is failed, the network registration is prohibited, so that the encryption of the terminal equipment is realized. According to the scheme, the SIM card is locked and unlocked through the PIN code corresponding to the unique identification code, so that the SIM card can be suitable for different mobile terminals of corresponding manufacturers on the premise of ensuring the safety of the SIM card, and the mobile terminal is higher in use flexibility.
Specifically, if the mobile terminal can only use the customized SIM card, the production and decryption algorithms for the PIN code are private for the mobile terminal of the same manufacturer, and when the mobile terminal and the customized SIM card are produced, a PIN code lock may be set in advance, and the unlocking code of the PIN code lock is obtained by encrypting the unique identification code of the SIM card. Therefore, for different mobile terminals of corresponding manufacturers, the unlocking PIN code corresponding to the PIN code lock can be obtained by encrypting the unique identification code of the SIM card, so that the SIM card can be randomly replaced and used on different mobile terminals of the manufacturer, and other SIM cards cannot be subjected to network registration because the correct PIN code cannot be obtained, thereby not only ensuring the safety of the SIM card, but also improving the flexibility of the mobile terminal and the SIM card.
And S4, encrypting the unique identification code again through a preset encryption algorithm to obtain a new PIN code, and unlocking through the new PIN code.
And S5, if the continuous unlocking fails within the preset times, locking the SIM card.
When unlocking is carried out, if unlocking fails, unlocking can be carried out again automatically or manually, unlocking failure caused by accidents is avoided, if unlocking fails for a plurality of times continuously, if unlocking fails for three times continuously, the SIM card needs to be locked, and therefore safety of the SIM card is guaranteed.
Specifically, once the card is inserted into the mobile terminal, and after the unlocking step is performed, the card is inserted into another mobile terminal which is not the same as the mobile terminal of the company, the SIM card can be used only by unlocking the PIN code, but only the terminal of the company knows the encryption and decryption algorithms, and the PIN code of each SIM card is obtained by the encryption algorithm, so that the repeatability is very low, the security is very high, and it is difficult for another mobile terminal to crack the PIN code of the SIM card. If the SIM card attempts to unlock the PIN code, after 3 PIN code unlocking attempts fail, the SIM card is locked and the PIN code unlocking attempt cannot be performed, so that the security of the SIM card is further enhanced.
Preferably, the unlocking the SIM card by the PIN code specifically includes:
automatically sending a PIN code to the SIM card for unlocking; or displaying the PIN code and sending the PIN code input by the user to the SIM card for unlocking.
Specifically, when the SIM card is unlocked, the obtained PIN code can be automatically sent for unlocking, the PIN code can also be displayed, and the user inputs the PIN code for unlocking, and the PIN code can be specifically adjusted according to the user's requirements.
Example 4
In an embodiment of the present invention, as shown in fig. 5, the present invention further provides a terminal encryption system, which includes an obtaining module 1, an encryption module 2, and an unlocking module 3.
The obtaining module 1 is used for obtaining the unique identification code of the inserted SIM card.
Preferably, the unique identifier is ICCID data and/or IMSI data.
SIM cards (Subscriber Identity modules), each SIM card having a corresponding unique identifier, such as an ICCID (integrated circuit card identifier), an IMSI (International Mobile Subscriber Identity), and the like.
The encryption module 2 is connected with the acquisition module 1 and used for encrypting the unique identification code through a preset encryption algorithm to acquire a corresponding PIN code.
The unlocking module 3 is connected with the encryption module 2 and used for unlocking the SIM card through the PIN code, if the unlocking is successful, a network registration process is executed, and if the unlocking is failed, the network registration is forbidden.
The existing encryption or locking modes are two types: firstly, reading the IMSI in the SIM card and then judging whether a plurality of IMSI numbers in the SIM card meet the use condition, if so, allowing the SIM card to be used; secondly, the SIM card user or provider and the operator agree, the network can be used only if the IMEI number of the mobile terminal is uniquely matched with the IMSI number of the SIM card, and the network can not be used if other cards are inserted into the mobile terminal.
However, the existing terminal encryption method may limit the use of the SIM card. For example, when all mobile terminals of a manufacturer can only use a customized card, and a customized SIM card can be replaced and used at will on different mobile terminals of the manufacturer, the existing encryption method cannot satisfy the above scenario, which is a very common situation.
According to the scheme, after the SIM card is inserted into the mobile terminal and powered on, the unique identification code of the SIM card can be read through the acquisition module, the unique identification code can be encrypted through the encryption module, so that a corresponding PIN (personal identification number) code is obtained, finally, the SIM card can be unlocked through the unlocking module, if unlocking is successful, a network registration process is normally executed, and if unlocking is failed, network registration is forbidden, so that encryption of the terminal equipment is realized. According to the scheme, the SIM card is locked and unlocked through the PIN corresponding to the unique identification code, so that the SIM card can be suitable for different mobile terminals of corresponding manufacturers on the premise of ensuring the safety of the SIM card, and the mobile terminal is higher in use flexibility.
Specifically, if the mobile terminal can only use the customized SIM card, the production and decryption algorithms for the PIN code are private for the mobile terminal of the same manufacturer, and when the mobile terminal and the customized SIM card are produced, the PIN code lock can be set in advance, and the unlocking code of the PIN code lock is obtained by encrypting the unique identification code of the SIM card. Therefore, for different mobile terminals of corresponding manufacturers, the unlocking PIN code corresponding to the PIN code lock can be obtained by encrypting the unique identification code of the SIM card, so that the SIM card can be randomly replaced and used on different mobile terminals of the manufacturer, and other SIM cards cannot be subjected to network registration because the correct PIN code cannot be obtained, thereby not only ensuring the safety of the SIM card, but also improving the flexibility of the mobile terminal and the SIM card.
In addition, in the scheme, after the unique identification code of the inserted SIM card is acquired, whether the PIN lock corresponding to the SIM card is unlocked or not needs to be judged, if the PIN lock is unlocked, the mobile terminal is proved to be inserted into other SIM cards for normal use, therefore, verification needs to be carried out, the acquired unique identification code is encrypted through a preset encryption algorithm, the PIN code can be acquired, and then unlocking can be carried out through the PIN code; if the mobile terminal is not started, the mobile terminal is proved to be used for networking for the first time, the original PIN code corresponding to the SIM card can be input for unlocking, and after the unlocking is successful, the unlocking PIN code of the PIN code lock is updated, wherein the updated PIN code is obtained by encrypting the obtained unique identification code through a preset encryption algorithm by the system.
Example 5
As shown in fig. 5, in an embodiment 4, the terminal encryption system provided by the present invention further includes a determining module 4 and a setting module 5.
The setting module 5 is used for setting a PIN code lock, and the PIN code lock corresponds to the unique identification code of the customized SIM card.
The judging module 4 is used for judging whether the PIN code lock corresponding to the SIM card is opened.
If the mobile phone is started, the unique identification code is encrypted through the encryption module 3 to obtain a PIN code, and unlocking is carried out through the unlocking module.
And if the SIM card is not unlocked, automatically inputting the original PIN code corresponding to the SIM card for unlocking, and updating the unlocking PIN code of the PIN code lock after the unlocking is successful.
Specifically, after the unique identification code of the inserted SIM card is acquired, whether a PIN lock corresponding to the SIM card is unlocked or not needs to be judged, if the PIN lock is unlocked, the mobile terminal is proved to be normally used after being inserted into other SIM cards, therefore, verification needs to be carried out, the acquired unique identification code is encrypted through a preset encryption algorithm, the PIN code can be acquired, and then unlocking can be carried out through the PIN code; if the mobile terminal is not started, the mobile terminal is proved to be used for networking for the first time, the original PIN code corresponding to the SIM card can be input for unlocking, and after the unlocking is successful, the unlocking PIN code of the PIN code lock is updated, wherein the updated PIN code is obtained by encrypting the obtained unique identification code through a preset encryption algorithm by the system.
Preferably, during unlocking, if the unlocking fails, the unique identification code is encrypted again through a preset encryption algorithm to obtain a new PIN code, and the unlocking is performed through the new PIN code; if the continuous unlocking fails within the preset times, the SIM card is locked to ensure the safety of the SIM card.
Further preferably, the unlocking the SIM card by the PIN code specifically includes: automatically sending a PIN code to the SIM card for unlocking; or displaying the PIN code and sending the PIN code input by the user to the SIM card for unlocking.
Specifically, when the SIM card is unlocked, the PIN code obtained by automatic sending may be set for unlocking, the PIN code may also be displayed, and the user inputs the PIN code for unlocking, which may be specifically adjusted according to the user's requirements.
Example 6
In addition, the present invention further provides a storage medium, where at least one instruction is stored, and the instruction is loaded and executed by a processor to implement the operation performed by the terminal encryption method according to any one of embodiments 1 to 3. For example, the computer readable storage medium may be a read-only memory (ROM), a random-access memory (RAM), a compact disc read-only memory (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, and the like. They may be implemented in program code that is executable by a computing device such that it may be stored in a memory device and executed by the computing device, or they may be separately fabricated into various integrated circuit modules, or multiple modules or steps thereof may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
It should be noted that the above embodiments can be freely combined as necessary. The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A terminal encryption method is characterized by comprising the following steps:
acquiring a unique identification code of the inserted SIM card;
encrypting the unique identification code through a preset encryption algorithm to obtain a corresponding PIN code;
and unlocking the SIM card through the PIN code, executing a network registration process if the unlocking is successful, and forbidding the network registration if the unlocking is failed.
2. A terminal encryption method according to claim 1, after acquiring the unique identification code of the inserted SIM card, further comprising:
judging whether a PIN code lock corresponding to the SIM card is opened or not;
if the key is turned on, encrypting the unique identification code through the preset encryption algorithm to obtain the PIN code, and unlocking through the PIN code;
and if the SIM card is not unlocked, automatically inputting an original PIN code corresponding to the SIM card for unlocking, and updating the unlocking PIN code of the PIN code lock after the unlocking is successful.
3. A terminal encryption method according to claim 2, wherein before acquiring the unique identification code of the inserted SIM card, the method further comprises:
and setting the PIN code lock, wherein the PIN code lock corresponds to the unique identification code of the customized SIM card.
4. A terminal encryption method according to claim 1, characterized in that after the unlocking failure, the method further comprises:
encrypting the unique identification code again through the preset encryption algorithm to obtain a new PIN code, and unlocking through the new PIN code;
and if the continuous unlocking fails within the preset times, locking the SIM card.
5. A terminal encryption method according to claim 1, characterized in that: the unique identification code is ICCID data and/or IMSI data.
6. The terminal encryption method according to claim 1, wherein the unlocking the SIM card by the PIN code specifically comprises:
automatically sending the PIN code to the SIM card for unlocking; or
And displaying the PIN code, and sending the PIN code input by the user to the SIM card for unlocking.
7. A terminal encryption system, comprising:
the acquisition module is used for acquiring the unique identification code of the inserted SIM card;
the encryption module is connected with the acquisition module and used for encrypting the unique identification code through a preset encryption algorithm to acquire a corresponding PIN code;
and the unlocking module is connected with the encryption module and used for unlocking the SIM card through the PIN code, executing a network registration process if the unlocking is successful, and forbidding the network registration if the unlocking is failed.
8. The terminal encryption system according to claim 7, further comprising:
the judging module is used for judging whether the PIN code lock corresponding to the SIM card is opened or not;
if the unique identification code is started, the unique identification code is encrypted through the encryption module to obtain the PIN code, and the unlocking module is used for unlocking;
and if the SIM card is not unlocked, automatically inputting an original PIN code corresponding to the SIM card for unlocking, and updating the unlocking PIN code of the PIN code lock after the unlocking is successful.
9. The terminal encryption system according to claim 8, further comprising:
and the setting module is used for setting the PIN code lock, and the PIN code lock corresponds to the unique identification code of the customized SIM card.
10. A storage medium, characterized by: the storage medium has stored therein at least one instruction, which is loaded and executed by a processor to implement the operations performed by the terminal encryption method according to any one of claims 1 to 6.
CN202110269117.XA 2021-03-12 2021-03-12 Terminal encryption method, system and storage medium Pending CN115086950A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110269117.XA CN115086950A (en) 2021-03-12 2021-03-12 Terminal encryption method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110269117.XA CN115086950A (en) 2021-03-12 2021-03-12 Terminal encryption method, system and storage medium

Publications (1)

Publication Number Publication Date
CN115086950A true CN115086950A (en) 2022-09-20

Family

ID=83241304

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110269117.XA Pending CN115086950A (en) 2021-03-12 2021-03-12 Terminal encryption method, system and storage medium

Country Status (1)

Country Link
CN (1) CN115086950A (en)

Similar Documents

Publication Publication Date Title
CN108521333B (en) Login method and system for off-line authentication based on dynamic password
US5809413A (en) Over the air locking of user identity modules for mobile telephones
CN108093392B (en) Method for unlocking SIM card, mobile terminal and storage medium
EP1659810B1 (en) Updating configuration parameters in a mobile terminal
EP2530964B1 (en) Method and device for terminal network locking
US7174159B2 (en) Method of securing a mobile telecommunication terminal
US7848522B2 (en) Method for authenticating a user in a terminal, an authentication system, a terminal, and an authorization device
CN101437067B (en) Mobile terminal and method for implementing network and card locking
US20080003980A1 (en) Subsidy-controlled handset device via a sim card using asymmetric verification and method thereof
JP2004166215A (en) Method of locking mobile communication terminal
CN106230813B (en) Method for authenticating, authentication device and terminal
EP2693789A1 (en) Mobile terminal encryption method, hardware encryption device and mobile terminal
WO2010000455A1 (en) Method and device for generating a time-dependent password
CN116323304A (en) Identification method for an electric vehicle charging station
CN112073961A (en) SIM card state updating method and device, terminal and readable storage medium
CN115086950A (en) Terminal encryption method, system and storage medium
CN107105082B (en) Method for unlocking network of terminal, method and device for starting terminal
US8656457B2 (en) Controlling locking state transitions in a terminal
US20120278857A1 (en) Method for unlocking a secure device
CN107889105B (en) Verification card locking method and verification card locking system of mobile phone
CN103843378A (en) Method for binding secure device to a wireless phone
CN115843023A (en) Password retrieving method and device, electronic equipment and readable storage medium
JP6140837B2 (en) Computer system and method for safely booting a computer system
CN117560675A (en) Communication chip for mobile device, verification method and device and mobile device
CN115694940A (en) Storage method and storage device of login password and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination