CN100370743C - Interacting method for customer apparatus and network apparatus - Google Patents
Interacting method for customer apparatus and network apparatus Download PDFInfo
- Publication number
- CN100370743C CN100370743C CNB2004100481262A CN200410048126A CN100370743C CN 100370743 C CN100370743 C CN 100370743C CN B2004100481262 A CNB2004100481262 A CN B2004100481262A CN 200410048126 A CN200410048126 A CN 200410048126A CN 100370743 C CN100370743 C CN 100370743C
- Authority
- CN
- China
- Prior art keywords
- subscriber equipment
- equipment
- network
- access
- history identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention discloses an interacting method for a user device and a network device. In the method, the history identification of the user device is stored on the user device and the network device in advance; when the user device and the network device interact, the method comprises that: a. the network device obtains the history identification which is stored by the user device at present and inquires history identification of the user device, which is stored in the network device; b. the network device judges whether the history identification stored by the user device at present is the same as the history identification of the user device, which are stored by the network device, if yes, then the user device is not be cloned; if false, the user device is cloned; c. the history identification of the user device, which is stored in the network device and the user device, is updated. The method of the present invention can quickly and effectively detect whether the user device is cloned; consequently, the larger loss because of the cloning of the user device to users is avoided, the safety of a network is improved, and the legitimate benefits of users are protected.
Description
Technical field
The present invention relates to the network interaction technology, relate in particular to the exchange method of a kind of subscriber equipment and the network equipment.
Background technology
Current, along with the network interaction business development, the situation that some subscriber equipmenies are cloned has appearred, for example: when the user keeps in repair mobile phone, some lawless persons usually clone subscriber identification module (SIM) card of mobile phone, make a phone call with clone's SIM card then, all expenses are but counted on original subscriber's account number; Perhaps, utilize clone's SIM card to carry out illegal location registers, this moment is because user position information is the positional information of clone's card, so that real SIM card can't be done called.The inconvenience that this illegal act meeting causes loss economically and use for the actual user of SIM card.
For existing bank card or fiscard user, some lawless persons usually can clone user's bank card or fiscard by certain means, for example clone user's bank card in the mode of obtaining user's check sheet.The bank card of being cloned can bring potential threat to user's bank capital, in case because user's password leakage or lawless person try out user's the password of withdrawing the money, user's economy will sustain a loss so.
For existing Internet user, it is very general to utilize the Internet to carry out the way of online transaction.When carrying out network trading, need carry out network and use verification, general network method of calibration is to use user account, user cipher, and advanced any method of calibration is modes such as digital signature.But if user account, password, digital signature are leaked the clone, the user will suffer economic loss or leak some confidential information so.
Yet whether current also do not have a kind of method can be effectively and detect subscriber equipment apace and cloned, thereby make network can't ensure effective rights and interests of actual user.
Summary of the invention
Whether in view of this, main purpose of the present invention provides the exchange method of a kind of subscriber equipment and the network equipment, cloned thereby fast and effeciently detect subscriber equipment.
Further aim of the present invention is to detect after subscriber equipment cloned, and whether identify the active user is the clone user.
Further object of the present invention is that clone's subscriber equipment was lost efficacy, thereby stops to clone the rights and interests of subscriber equipment infringement real user equipment.
To achieve these goals, technical scheme of the present invention specifically is achieved in that
The exchange method of a kind of subscriber equipment and the network equipment, this method be the history identification of storage subscriber equipment on the subscriber equipment and the network equipment in advance, and when subscriber equipment and the network equipment carry out when mutual, this method comprises:
A, the network equipment obtain the current institute of subscriber equipment stored historical sign and inquire about the history identification of this subscriber equipment of self storing;
B, the network equipment judge whether the current institute of subscriber equipment stored historical sign is identical with the history identification of this subscriber equipment of self storing, if identical, judges that then subscriber equipment is not cloned, otherwise, judge that subscriber equipment is cloned;
The history identification of c, the subscriber equipment more stored in new network device and the subscriber equipment;
D, the network equipment obtain the specific identifier of subscriber equipment correspondence, and with set in advance in the network equipment, compare with the corresponding specific identifier of subscriber equipment, judge whether subscriber equipment is clone's subscriber equipment; If, execution in step e;
E, the network equipment lost efficacy described subscriber equipment by upgrading the peculiar access sign that subscriber equipment is stored.
Described history identification is: random number that the number of times of subscriber equipment access network, subscriber equipment or the network equipment produce at random or the changing value for producing according to specific rule.
The method that the network equipment described in the step a obtains subscriber equipment institute stored historical sign is:
The network equipment sends the history identification querying command to subscriber equipment, after subscriber equipment is received this history identification querying command, sends subscriber equipment institute stored historical sign to the network equipment;
Perhaps, subscriber equipment directly sends the current institute of subscriber equipment stored historical sign to the network equipment.
Described in the step c more in new network device and the subscriber equipment method of history identification be:
The network equipment upgrades the described subscriber equipment history identification stored, and the history identification after will upgrading sends to subscriber equipment, and subscriber equipment is with the history identification of current institute stored historical identification renewal after for this renewal;
Perhaps, subscriber equipment upgrades current institute stored historical sign, and the history identification after will upgrading sends to the network equipment, and the network equipment is updated to history identification after this renewal with this subscriber equipment history identification of being stored.
The method of the invention, the network equipment obtains the specific identifier of subscriber equipment correspondence described in the described steps d, and with set in advance comparing in the network equipment with the corresponding specific identifier of subscriber equipment, judge that whether subscriber equipment is that clone's subscriber equipment comprises: on the network equipment, set in advance and specific identifier that preservation is corresponding with subscriber equipment:
Network equipment prompting user imports the specific identifier of described subscriber equipment correspondence, and obtains the specific identifier of this subscriber equipment correspondence of user's input, inquires about the specific identifier of this subscriber equipment correspondence of self storing;
The network equipment judges whether the specific identifier of the subscriber equipment correspondence of being obtained is identical with the specific identifier of this subscriber equipment correspondence that inquires, if identical, judge that then this subscriber equipment is real subscriber equipment, and keeps the access state of this subscriber equipment; Otherwise, judge that this subscriber equipment is clone's subscriber equipment, and refuse this subscriber equipment access network.
Described specific identifier is that the subscriber equipment owner has or all biological characteristic or abiotic features.Described biological characteristic is fingerprint, sound or iris; The described abiotic password that is characterized as.
Before described step a, further comprise: subscriber equipment is by access authentication flow process access network;
Also comprise after the described steps d: if judge subscriber equipment is not clone's subscriber equipment, then the network equipment upgrades the peculiar access sign in the subscriber equipment, and the original peculiar access identification renewal of this subscriber equipment that self is preserved identifies process ends for this peculiar access after upgrading.
In step e, further comprise: there is sign in the network equipment in self setting and preservation and the pairing clone of the described network equipment.
After subscriber equipment passes through access authentication flow process access network, and before step a, further comprise: the network equipment judges that self whether preserving the clone corresponding with described subscriber equipment exists sign, if, judge that then subscriber equipment is cloned, and execution in step d, otherwise, the judgement subscriber equipment is not cloned execution in step a.
Described peculiar access is designated the KI in the network access authentication flow process.
The peculiar access sign of described renewal subscriber equipment comprises:
By the mode of aerial download OTA, and utilize Diffie-Hellman to upgrade the peculiar access sign of subscriber equipment.
Described network is: code division multiple access CDMA, GSM, INTERNET, banking network or IC telephone network.
Described subscriber equipment is:
Be furnished with the UIM card mobile phone, be furnished with the mobile phone of SIM card or machine card integrated mobile phone;
Perhaps be: the IC Card Telephone machine of being furnished with the IC phonecard;
Perhaps be: the equipment of preserving user account, password and key information in the internet;
Perhaps be: bank card in the financial sector and credit card.
Method of the present invention increases history identification in the subscriber equipment and the network equipment, and in each reciprocal process, upgrade this history identification, if subscriber equipment is cloned, then can cause the history identification in the subscriber equipment and the network equipment different, can fast and effeciently detect subscriber equipment in view of the above and whether be cloned; In addition, method of the present invention can identify also whether the active user is real user according to the specific identifier of subscriber equipment, and by the peculiar access sign of upgrading subscriber equipment clone's subscriber equipment is lost efficacy.By method of the present invention, can stop to have protected user's legitimate interests because subscriber equipment to the massive losses that the user causes, has been improved the fail safe of network by the clone.
Description of drawings
Fig. 1 is the flow chart of the described method of the embodiment of the invention.
Embodiment
Further specify implementation method of the present invention below in conjunction with the drawings and specific embodiments.
Core concept of the present invention is: deposit identical history identification in subscriber equipment and the network equipment, this history identification recording user equipment and the mutual each time information of the network equipment, and when each mutual, upgrade this history identification simultaneously, when customer premise equipment to access network equipment, relatively whether the history identification in the subscriber equipment is identical with network equipment stored historical sign, if identical, then do not clone subscriber equipment, otherwise, clone's subscriber equipment is arranged.
The scope of network of the present invention is very big, for example: code division multiple access CDMA, global system for mobile communications GSM, INTERNET, banking network or IC telephone network.The scope of subscriber equipment of the present invention is also very wide, for example: in the mobile network for the mobile phone of being furnished with subscriber identification module (UIM) card, be furnished with the mobile phone of SIM card or machine card integrated mobile phone; In cable network for being furnished with the IC Card Telephone machine etc. of IC phonecard; In the internet equipment of information such as user account, password and key of preserving; In financial sector various bank cards, credit card etc.
With the corresponding clone's subscriber equipment of above-mentioned subscriber equipment be: among the mobile network, be furnished with mobile phone, the mobile phone of being furnished with clone SIM card or the clone's of clone UIM card machine card integrated mobile phone; In the wired telephone network, is furnished with the IC Card Telephone machine of clone IC phonecard; In the Internet, cloned the equipment of information such as user account number, password and key; In the financial sector, bank card of being cloned or credit card etc.
The method of the invention is described as specific embodiment with the bank card that generally uses in the banking network and the exchange method of banking network below.In the present embodiment, in advance at real subscriber equipment, and the identical history identification of storage in the network equipment, and in the network equipment, be provided with and preserve a specific identifier of subscriber equipment correspondence in advance, described subscriber equipment is a bank card, and the network equipment is banking network equipment, for example automatic teller machine.As shown in Figure 1, the flow process of present embodiment comprises:
Described history identification has multiple, for example can be the counting of customer premise equipment to access network equipment, and in concrete the application, counting can be meant that the network equipment provides the number of times of certain service, for example the bank card user number of times of withdrawing the money or the number of times that queries the balance or the like; Described history identification also can be the random number that the network equipment produces, or the random number of subscriber equipment generation; Described history identification can also be according to the common agreement of the network equipment and subscriber equipment according to inserting the changing value that number of times produces by specific rule, for example the every access of the common agreement of the network equipment and subscriber equipment once just produces a new numerical value as history identification by ascending order.
, can successfully detect subscriber equipment and whether be cloned to step 104 by above step 101.In addition, whether the subscriber equipment that the network equipment also can be discerned current access is real subscriber equipment, as following steps 105 as described in the step 106:
The specific identifier that the specific identifier of subscriber equipment correspondence of the present invention has for this subscriber equipment owner or the specific identifier of setting, and this specific identifier has only the owner of this subscriber equipment to have or all, and do not allow to be kept on the subscriber equipment, must be kept on the network equipment.This specific identifier is that the user sets in advance when RT register traffic.Described specific identifier mainly contains two kinds, and a kind of is biological characteristic, such as: fingerprint, sound, iris etc.; Another kind is abiotic feature, such as: password etc.; If password can be again different passwords for different networks so, for example: if the mobile network, specific identifier can be user's a service password so; If bank system network, specific identifier can be user's the password or the like of withdrawing the money so.
The mode that the network equipment obtains the specific identifier of subscriber equipment correspondence comprises: the owner of subscriber equipment is input to the specific identifier deriving means of subscriber equipment specific identifier by the network equipment in the network equipment, for example:, then password is input to the network equipment by keyboard if the specific identifier of subscriber equipment correspondence is a password.
In addition, the specific identifier of the subscriber equipment correspondence of preserving in the network equipment can be revised, for example: after can passing through the possessory actual identity of comparison actual user equipment in network provider's service centre,, the specific identifier of subscriber equipment correspondence is made amendment such as the contrast identity card; Also can revise the specific identifier of subscriber equipment correspondence by network remote, whether the specific identifier of the subscriber equipment correspondence that promptly first verification is old is correct, if correctly, then can revise the specific identifier of subscriber equipment correspondence.
Whether the specific identifier of the subscriber equipment correspondence that step 106, network provider's determining step 105 obtain is identical with the specific identifier of this subscriber equipment correspondence of self preserving that inquires, if it is identical, judge that then current user equipment is real subscriber equipment, and keep the access state of this subscriber equipment, for this subscriber equipment provides normal service, but and execution in step 107, so that clone's subscriber equipment lost efficacy; Otherwise, judge that current user equipment for clone's subscriber equipment, refuses this subscriber equipment access network, but and execution in step 108 so that clone's subscriber equipment lost efficacy.
Whether be real subscriber equipment, the network equipment also can provide the service that clone's subscriber equipment was lost efficacy, its idiographic flow such as following steps 107 and step 108 by above-mentioned steps 105 and step 106 if can identify current user equipment:
Peculiar access sign when step 108, the network equipment are upgraded the access network that subscriber equipment stores, but do not upgrade the original peculiar access sign of this subscriber equipment of self preserving, process ends.Therefore, if clone's subscriber equipment is attempted access network once more, then in the authorizing procedure when access network, the network equipment can be because of original peculiar access sign different refuse its access networks of its peculiar access sign with the subscriber equipment of self preserving.
In addition, in this step 108, clone's subscriber equipment might be swindled Home System, for example: clone's subscriber equipment self does not upgrade peculiar access sign, but return the message of peculiar access identification renewal success to the network equipment, thereby in afterwards mutual, can continue by the authentication access network.In order to prevent to clone the subscriber equipment swindle network equipment, the method of the invention is in step 108, the network equipment upgrades the peculiar access sign that subscriber equipment is preserved, further clone's existence sign is being set self, this clone's existence is designated an additional identification, corresponding preservation with the sign of described subscriber equipment.The network equipment carries out when mutual with subscriber equipment afterwards, after authentication is passed through, judge according to the sign of subscriber equipment whether this subscriber equipment has corresponding clone to have sign, if have, then directly point out the user to import the specific identifier of subscriber equipment correspondence, obtain the specific identifier of user's input, judge according to this specific identifier whether subscriber equipment is the clone again.Can prevent to clone the legitimate rights and interests that subscriber equipment is invaded actual user so fully.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with the people of this technology in the disclosed technical scope of the present invention; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.
Claims (14)
1. the exchange method of the subscriber equipment and the network equipment is characterized in that, the history identification of storage subscriber equipment on the subscriber equipment and the network equipment in advance, and when subscriber equipment and the network equipment carry out when mutual, this method comprises:
A, the network equipment obtain the current institute of subscriber equipment stored historical sign and inquire about the history identification of this subscriber equipment of self storing;
B, the network equipment judge whether the current institute of subscriber equipment stored historical sign is identical with the history identification of this subscriber equipment of self storing, if identical, judges that then subscriber equipment is not cloned, otherwise, judge that subscriber equipment is cloned;
The history identification of c, the subscriber equipment more stored in new network device and the subscriber equipment;
D, the network equipment obtain the specific identifier of subscriber equipment correspondence, and with set in advance in the network equipment, compare with the corresponding specific identifier of subscriber equipment, judge whether subscriber equipment is clone's subscriber equipment; If, execution in step e;
E, the network equipment lost efficacy described subscriber equipment by upgrading the peculiar access sign that subscriber equipment is stored.
2. the method for claim 1 is characterized in that, described history identification is: random number that the number of times of subscriber equipment access network, subscriber equipment or the network equipment produce at random or the changing value for producing according to specific rule.
3. the method for claim 1 is characterized in that, the method that the network equipment described in the step a obtains subscriber equipment institute stored historical sign is:
The network equipment sends the history identification querying command to subscriber equipment, after subscriber equipment is received this history identification querying command, sends subscriber equipment institute stored historical sign to the network equipment;
Perhaps, subscriber equipment directly sends the current institute of subscriber equipment stored historical sign to the network equipment.
4. the method for claim 1 is characterized in that, described in the step c more in new network device and the subscriber equipment method of history identification be:
The network equipment upgrades the described subscriber equipment history identification stored, and the history identification after will upgrading sends to subscriber equipment, and subscriber equipment is with the history identification of current institute stored historical identification renewal after for this renewal;
Perhaps, subscriber equipment upgrades current institute stored historical sign, and the history identification after will upgrading sends to the network equipment, and the network equipment is updated to history identification after this renewal with this subscriber equipment history identification of being stored.
5. the method for claim 1, it is characterized in that, the network equipment obtains the specific identifier of subscriber equipment correspondence described in the described steps d, and with set in advance comparing in the network equipment with the corresponding specific identifier of subscriber equipment, judge that whether subscriber equipment is that clone's subscriber equipment comprises: on the network equipment, set in advance and specific identifier that preservation is corresponding with subscriber equipment;
Network equipment prompting user imports the specific identifier of described subscriber equipment correspondence, and obtains the specific identifier of this subscriber equipment correspondence of user's input, inquires about the specific identifier of this subscriber equipment correspondence of self storing;
The network equipment judges whether the specific identifier of the subscriber equipment correspondence of being obtained is identical with the specific identifier of this subscriber equipment correspondence that inquires, if identical, judge that then this subscriber equipment is real subscriber equipment, and keeps the access state of this subscriber equipment; Otherwise, judge that this subscriber equipment is clone's subscriber equipment, and refuse this subscriber equipment access network.
6. method as claimed in claim 5 is characterized in that, described specific identifier is that the subscriber equipment owner has or all biological characteristic or abiotic features.
7. method as claimed in claim 6 is characterized in that, described biological characteristic is fingerprint, sound or iris; The described abiotic password that is characterized as.
8. method as claimed in claim 5 is characterized in that, before described step a, further comprises: subscriber equipment is by access authentication flow process access network;
Also comprise after the described steps d: if judge subscriber equipment is not clone's subscriber equipment, then the network equipment upgrades the peculiar access sign in the subscriber equipment, and the original peculiar access identification renewal of this subscriber equipment that self is preserved identifies process ends for this peculiar access after upgrading.
9. the method for claim 1 is characterized in that, in step e, further comprises: there is sign in the network equipment in self setting and preservation and the pairing clone of the described network equipment.
10. method as claimed in claim 9, it is characterized in that, after subscriber equipment passes through access authentication flow process access network, and before step a, further comprise: the network equipment judges that self whether preserving the clone corresponding with described subscriber equipment exists sign, if, judge that then subscriber equipment is cloned, and execution in step d, otherwise, the judgement subscriber equipment is not cloned execution in step a.
11. method as claimed in claim 8 is characterized in that, described peculiar access is designated the KI in the network access authentication flow process.
12. the method for claim 1 is characterized in that, the peculiar access sign of described renewal subscriber equipment comprises:
By the mode of aerial download OTA, and utilize Diffie-Hellman to upgrade the peculiar access sign of subscriber equipment.
13. as each described method of claim 1 to 12, it is characterized in that described network is: code division multiple access CDMA, GSM, INTERNET, banking network or IC telephone network.
14., it is characterized in that described subscriber equipment is as each described method of claim 1 to 12: be furnished with the UIM card mobile phone, be furnished with the mobile phone of SIM card or machine card integrated mobile phone;
Perhaps be: the IC Card Telephone machine of being furnished with the IC phonecard;
Perhaps be: the equipment of preserving user account, password and key information in the internet;
Perhaps be: bank card in the financial sector and credit card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100481262A CN100370743C (en) | 2004-06-16 | 2004-06-16 | Interacting method for customer apparatus and network apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100481262A CN100370743C (en) | 2004-06-16 | 2004-06-16 | Interacting method for customer apparatus and network apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1710863A CN1710863A (en) | 2005-12-21 |
CN100370743C true CN100370743C (en) | 2008-02-20 |
Family
ID=35707050
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100481262A Expired - Fee Related CN100370743C (en) | 2004-06-16 | 2004-06-16 | Interacting method for customer apparatus and network apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100370743C (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106888193A (en) * | 2015-12-16 | 2017-06-23 | 中兴通讯股份有限公司 | A kind of method for authenticating user identity, device and its system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1211770A (en) * | 1998-03-27 | 1999-03-24 | 杨振宁 | Human body physiological characteristics antifake verification method correlated with identification card mobile data base |
CN1313576A (en) * | 2000-03-10 | 2001-09-19 | 刘国胜 | Method for discriminating user of card (credit card) or code to be its owner |
CN2508475Y (en) * | 2001-11-30 | 2002-08-28 | 钟庚洪 | Radio local area network type finance system device |
EP1356436A1 (en) * | 2001-02-01 | 2003-10-29 | Oh Bong Kwon | Method for preventing forgery of every kinds of lottery-ticket, exchange-ticket, certificate published by communication network and id-card, credit-card, medical insurance card with authentication code |
-
2004
- 2004-06-16 CN CNB2004100481262A patent/CN100370743C/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1211770A (en) * | 1998-03-27 | 1999-03-24 | 杨振宁 | Human body physiological characteristics antifake verification method correlated with identification card mobile data base |
CN1313576A (en) * | 2000-03-10 | 2001-09-19 | 刘国胜 | Method for discriminating user of card (credit card) or code to be its owner |
EP1356436A1 (en) * | 2001-02-01 | 2003-10-29 | Oh Bong Kwon | Method for preventing forgery of every kinds of lottery-ticket, exchange-ticket, certificate published by communication network and id-card, credit-card, medical insurance card with authentication code |
CN2508475Y (en) * | 2001-11-30 | 2002-08-28 | 钟庚洪 | Radio local area network type finance system device |
Also Published As
Publication number | Publication date |
---|---|
CN1710863A (en) | 2005-12-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101755291B (en) | Method, system and trusted service manager for securely transmitting an application to a mobile phone | |
CN101091156B (en) | System and method for providing a multi-credential authentication protocol | |
US8718602B2 (en) | Method and system for remote control of smart card | |
CN101322424B (en) | Method for issuer and chip specific diversification | |
TW201824108A (en) | Safety verification method, platform, device and system | |
CN108012268A (en) | A kind of mobile phone terminal SIM card and the method for safe handling App, medium | |
RU2536356C2 (en) | Security system for presented cards | |
CN100428820C (en) | User recognition module and method capable of realizing mobile terminal area locking | |
US20070186115A1 (en) | Dynamic Password Authentication System and Method thereof | |
US8744403B2 (en) | Method and system for remote control of a smart card | |
EP1804418A1 (en) | A dynamic password authentication system and the method thereof | |
CN101093566A (en) | Safe mobile payment system, device and method | |
CN101909279B (en) | Be applied to the method for authenticating of video monitoring of mobile phone | |
CN104038924A (en) | Method and system for achieving resource exchange information processing | |
CN102393938A (en) | On-site payment business processing method and smart card | |
WO2014072725A1 (en) | Mobile tag reader security system | |
CN101166320B (en) | A mobile phone and method for realizing mobile phone true name system based on RF recognition technology | |
KR101667005B1 (en) | Method for Providing Electronic Payment by Using Subscriber Information And Subscriber Identification Module, System, Terminal And Communication Management Apparatus Therefor | |
CN100370743C (en) | Interacting method for customer apparatus and network apparatus | |
KR101905655B1 (en) | Method for Providing Electronic Payment, System, Terminal And Communication Management Apparatus Therefor | |
CN102473218B (en) | Method for generating an identifier | |
CN100429957C (en) | Indentifying method for telecommunication smart card and terminal | |
KR101321829B1 (en) | Method and system for site visitor authentication | |
KR101786941B1 (en) | Method for Providing Electronic Payment by Using Subscriber Information And Subscriber Identification Module, System, Terminal And Communication Management Apparatus Therefor | |
CN100415032C (en) | Interaction method for mobile terminal and network side in mobile communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080220 Termination date: 20130616 |