CN101163289A - Method of limiting use region of mobile terminal - Google Patents

Method of limiting use region of mobile terminal Download PDF

Info

Publication number
CN101163289A
CN101163289A CNA2006101402074A CN200610140207A CN101163289A CN 101163289 A CN101163289 A CN 101163289A CN A2006101402074 A CNA2006101402074 A CN A2006101402074A CN 200610140207 A CN200610140207 A CN 200610140207A CN 101163289 A CN101163289 A CN 101163289A
Authority
CN
China
Prior art keywords
terminal
sim card
positional information
encrypted
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006101402074A
Other languages
Chinese (zh)
Inventor
张玉洁
余文杰
汪启军
刘通
赵薇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNA2006101402074A priority Critical patent/CN101163289A/en
Publication of CN101163289A publication Critical patent/CN101163289A/en
Pending legal-status Critical Current

Links

Images

Abstract

A method of restricting the use region of a mobile terminal includes the following steps: (1) after the terminal is powered on, the position information received from the network side can be sent to a SIM card; (2) after receiving the position information of the terminal, the SIM card checks whether the position information is received for the first time and whether the position information is legal; (3) if the position information is received for the first time and is legal, the terminal is allowed to operate, and if the position information is illegal, the terminal is required to lock until the terminal enters into the legal position; (4) if the position information is not received for the first time, the SIM card continues to judge whether the legality of the present position information is the same as the legality of the position information last time. If yes, the terminal is kept under the present state, and if no, the terminal is required to restart the SIM card.

Description

A kind of limiting mobile terminal uses the method in zone
Technical field
The present invention relates to the using method of the portable terminal in the mobile communication system, particularly a kind of limiting mobile terminal uses the method in zone.
Background technology
In existing mobile communication network, have broadcast, terminal can receive these message and obtain network related information, comprising current position area information, cell id etc.If the position changes, terminal generally need be upgraded the positional information of oneself or initiate to look for net flow process etc. again.
Existing portable terminal is generally general purpose terminal, to using geographic range and the operation commercial city that can serve function without limits.There is such demand in operator in the reality: portable terminal is limited in the legal zone of an appointment, leave this zone after, all operations relevant with network will be under an embargo, and remove nonterminal and come back to legal zone.And under the situation of not removing locking, this Terminal Type can only use the special SIM card that is complementary with it, and corresponding, such special SIM card also can only be used on the special terminal of this class under the situation of not removing locking.This requirement source is in the needs of market competition, equal common portable terminal is reduced to a wireless terminal, mate again with specific price policy, simultaneously to have network signal again good for this special terminal, but coverage dynamic-configuration, at any time can revert to advantages such as common mobile terminal, have practical value.
Summary of the invention
The objective of the invention is at the operator to terminal operator restriction with use the demand of region limits, the method that provides a kind of limiting mobile terminal to use the zone is limited in portable terminal in the legal zone of an appointment and uses.
The technical solution used in the present invention is as follows:
A kind of limiting mobile terminal uses the method in zone, comprises SIM card in the described terminal, it is characterized in that this method comprises the steps:
(1) behind the starting up of terminal, will send to SIM card from the positional information that network side receives;
(2) after SIM card receives location information of terminals, judge whether it is to receive positional information for the first time, and whether positional information is legal;
(3) if for the first time, and positional information is legal, then allows terminal to operate, if positional information is illegal, then requires terminal locking, enters legal position up to terminal;
(4) if not receiving for the first time positional information, then continue to judge whether the current location information legitimacy is identical with previous position information legitimacy,, then keep current state,, then require terminal to restart SIM card if different by terminal if identical by SIM card.
Described step (1) further can comprise the steps:
(11) behind the starting up of terminal, earlier to SIM card send can marking terminal self information, and send to one group of random number that generates by this terminal of SIM card;
(12) whether successful SIM card is encrypted the described one group of random number that receives according to the information of the described marking terminal self that receives, and return this encryption of a sign coomand mode word according to encrypted result;
(13) if the coomand mode sign that terminal receives is known this encryption success, then require SIM to send this encrypted result;
(14) SIM card returns to terminal according to the request of terminal with encrypted result;
(15) terminal is encrypted according to identical algorithms the same group of random number that sends to SIM card, and the encrypted result that this encrypted result and SIM card are returned is compared, if consistent, then by legitimate verification, allows the use of terminal; If inconsistent, then terminal is in the lock state, with the operation of limited subscriber.
In the described step (13),, then further require SIM card to send one group of random number that generates by SIM card if the coomand mode sign that terminal receives is known this encryption success;
In the described step (14), SIM card further will be somebody's turn to do the one group of random number that is generated by SIM card and return to terminal according to the request of terminal;
Described step (15) further comprises: terminal is encrypted the one group of random number that is sended over by SIM card, and encrypted result is returned SIM card; SIM card is encrypted according to the algorithm identical with terminal the same group of random number that sends to terminal, and encrypted result and the described encrypted result of being returned by terminal are compared, if consistent, then by legitimate verification, allows the use of terminal; If inconsistent, then terminal is in the lock state, with the operation of limited subscriber.
Method provided by the invention is utilized the use zone of network information limiting terminals such as positional information and cell id, can reach the machine card purpose of locking mutually by revising terminal software simultaneously, and under certain condition, can revert to general portable terminal and use.
Description of drawings
Fig. 1 is that positional information transmits and the flow chart of processing procedure in the method for the present invention
Fig. 2 is the flow chart of machine-card mutual authentication process in the method for the present invention
Fig. 3 is terminal and a card releasing process flow chart in the method for the present invention
Embodiment
For the portable terminal that uses card, both is to realize by relevant agreement alternately.In agreement, a lot of orders byte of all withing a hook at the end is used for expanded function.Method of the present invention has also made full use of this point in the communicating by letter of terminal and card, reach the purpose of carrying self-defined information.
In the terminal use, terminal all in the message that receives network side, comprises positional information etc. all the time.After the information that the terminal extraction needs, terminal sends information to SIM card by the SIM card order; SIM card judges whether that if acquisition first and current location are legal, then SIM card feeds back to terminal to judged result in order to receive positional information first after the start, and terminal can continue to carry out other routine operations; If obtain first but current location is illegal, SIM card feeds back to terminal to judged result, and terminal is by the interface prompt user, and this moment, terminal was under an embargo with the relevant function of communicating by letter.If not obtaining first, then continue to judge by SIM card whether this legitimacy of current location information is identical with the legitimacy of previous position information, if legitimacy is identical with last time, then SIM card feeds back to terminal to judged result, the legitimacy of the function that terminal is relevant with communication does not change, and continues to carry out other operations; If legitimacy and last time are inequality, then SIM card feeds back to terminal to judged result, and terminal provides informations such as interface and sound, and the legitimacy of the function that terminal is relevant with communication can change; SIM card continues to send the RESET order to terminal, and indicating terminal resends positional information, arrives " the non-positional information that sends first in start back, the positional information legitimacy is identical with last time " this state this moment.
For further satisfying the demand of operator, the present invention is before terminal is carried out the position qualification, can carry out machine-card mutual authentication earlier, under the situation of not removing locking, limit certain Terminal Type and can only use the special SIM card that is complementary with it, accordingly, the special SIM card of certain class also can only be used on certain Terminal Type under the situation of not removing locking.
Behind the starting up of terminal, at first the information that needs SIM card to handle and the information of terminal self etc. are sent to SIM card by terminal; By SIM card the information of terminal self is carried out verification then, the corresponding processing procedure of information and executing to needing SIM card to handle all feeds back to terminal to check results and information processing result by SIM card then; Terminal authenticates SIM card according to the check results and the information processing result of SIM card, and this process is the forward verification process of machine card.If authentication is passed through, the reverse verification process below continuing to carry out, otherwise it is illegal to provide the interface prompt SIM card by terminal, and the function that terminal is relevant with communication is under an embargo, and identifying procedure finishes.
In the forward identifying procedure, if with the special SIM card of terminal coupling, can in back-checking result and information processing result, need SIM card the information of terminal processes to send to terminal.Simultaneously, have only the special SIM card that uses with the terminal coupling to levy recognizing of SIM card by terminal.
Terminal to the authentication of the forward of SIM card by the back after, the corresponding processing procedure of the information and executing that requires terminal processes that terminal sends SIM card, and result fed back to SIM card.SIM card authenticates terminal according to the result of terminal feedback, and this process is the reverse verification process of machine card.SIM card feeds back to terminal to authentication result, if SIM card is passed through the authentication of terminal, SIM card is normally carried out follow-up and operation network interaction, and terminal enters normal standby mode.If SIM card is not passed through the authentication of terminal, the feedback information is given terminal, and terminal provides interface prompt, and the function that terminal is relevant with communication is under an embargo, and identifying procedure finishes.
Below in conjunction with accompanying drawing the present invention is described in further detail.
Fig. 1 is that positional information transmits and the flow chart of processing procedure in the method for the present invention, specifies as follows:
Behind 101 starting up of terminal, receive the positional information of network side, and current position information is sent to SIM card by the Envelope instruction, carry out the judgement of position legitimacy by SIM card.
After terminal positional information was received in the 102SIM clamping, the back that at first judges whether to start shooting was received positional information for the first time.
103 if positional information is received for the first time in the start back, judges further whether positional information is legal.
104 if receive for the first time but positional information is illegal, SIM card return state word 91 *, terminal is received rear interface prompting user, this moment, terminal can not be carried out the operation relevant with network, entered legal position up to terminal.
If 105 SIM card be receive for the first time and positional information legal, SIM card return state word 9000, terminal can continue operations, enters normal standby,
If 106 SIM card are not to receive for the first time and the positional information legitimacy does not change, SIM return state word 9000, terminal keeps original state constant.
If 107 SIM card are not that receive the first time and variation has taken place the positional information legitimacy, SIM card return state word 91 *
The 108SIM card continues to send active order, requires terminal to provide interface prompt and auditory tone cues etc.
109 simultaneously, and SIM card sends reset and instructs to terminal.
110 terminal fill orders restart SIM card, enter and the start first time and the illegal the same holding state in position.
Fig. 2 is the flow chart of machine card handshake procedure in the method for the present invention, specifies as follows:
Behind 201 starting up of terminal, carry out machine-card mutual authentication earlier.The terminal intercepting sends the Terminal Profile instruction of end message to SIM card, afterbody expansion in instruction, the adding terminal need send to the terminal producer and the type information of SIM card, one group of random number that while, attaching terminal generated in instruction, again amended Terminal Profile order is continued to send to SIM card, wait for the execution result of SIM card this order.
After Terminal Profile order is received in the 202SIM clamping, according to the terminal producer and the type information that carry in the order, one group of random number that terminal is sent is encrypted and (is generally adopted the 3DES-EBC algorithm, producer's information is used to select key), give terminal return command status word, simultaneously send Get Input order, require terminal to fetch one group of random number that encrypted result and SIM card need terminal encryption to SIM card to terminal.
203 terminals are carried out the forward identifying procedure.Terminal receives the coomand mode word of SIM card to Terminal Profile, if do not run succeeded, provides corresponding error prompting interface by terminal, and flow process finishes.If coomand mode word result continues the step of back for running succeeded.
After terminal is received Get Input order, send the Fetch instruction, require SIM card transmission encrypted result and SIM card to need one group of random number of terminal encryption to SIM card.
SIM card needs encrypted result and SIM card one group of random number of terminal encryption to return to terminal by the coomand mode word.
Terminal is encrypted the same group of random number that sends to SIM card, with the encrypted result contrast of encrypted result and SIM card, judges whether the SIM card encrypted result is consistent with the terminal encryption result then.
If 204 is consistent, the expression terminal is passed through the legitimate verification of SIM card, continues the step 106 of back.
If 205 is inconsistent, illustrate that SIM card is not the type of terminal-specific, can't mate, terminal is ended subsequent step simultaneously by the interface prompt user, and terminal is in the lock state the operation with limited subscriber, and flow process finishes.
One group of random number that 206 terminals are sent SIM card is carried out encryption, returns to SIM card by Terminal Response instruction, waits for the checking result of SIM card to terminal.
The 207SIM card is carried out reverse identifying procedure.SIM card is encrypted the same group of random number that sends to terminal, and the encrypted result that encrypted result and terminal are returned is compared, and judges whether the SIM card encrypted result is consistent with the encrypted result of terminal.
208 judge whether reverse authentication is passed through.
If the encrypted result of 209 SIM card encrypted result and terminal is inconsistent, be that reverse authentication is not passed through, illustrate that terminal is not the type of SIM card specialty, can't mate, SIM card allows the terminal display text give the user by the active order of DisplayText, the operation of SIM card limiting terminal simultaneously, flow process finishes.
If the encrypted result of 210 SIM card encrypted result and terminal is consistent, promptly oppositely authentication is passed through, and expression SIM passes through the legitimate verification of terminal, continues the step of back.
On the basis of execution mode, the present invention also provides some steps to improve this method in the above.
In mobile phone is stored, store a sign position, be used to judge whether terminal current region lock function is opened, if do not open, then do not carry out top machine card and shake hands and the positional information transmission, as ordinary terminal.If open, as particular terminal, the machine card above carrying out is shaken hands and the positional information transmission.Can increase operation in the man-machine interface of terminal to sign position opening and closing.For actual operation needs, can make a Personal Unlocking Key separately and generate software, cooperate release.
Fig. 3 is terminal and a card releasing process flow chart in the method for the present invention, specifies as follows:
301 clients propose the release application.
302 have the personnel of authority to import client's number by shop assistant or other, and select identification authentication mode.
303 carry out the BOSS authentication.
304 authentications are not passed through, the refusal unlocking operation.
305 authentications are passed through, and then call terminal Personal Unlocking Key generating function.
306 terminal Personal Unlocking Key generating functions are returned the terminal Personal Unlocking Key.
The release of 307SIM card.
308 insert terminal with SIM card, enter terminal release menu, read flag bit.
Whether 309 clients carry out the SIM card unlocking operation according to flag bit prompting affirmation.
310 do not confirm unlocking operation, and then terminal is refused release and provided different promptings according to flag bit.
311 confirm unlocking operation, and then the terminal notifying client imports Personal Unlocking Key and checking, and checking is by then carrying out unlocking operation, and checking is not by then refusing release.
312 terminal releases success back prompting user.

Claims (9)

1. a limiting mobile terminal uses the method in zone, comprises SIM card in the described terminal, it is characterized in that this method comprises the steps:
(1) behind the starting up of terminal, will send to SIM card from the positional information that network side receives;
(2) after SIM card receives location information of terminals, judge whether it is to receive positional information for the first time, and whether positional information is legal;
(3) if for the first time, and positional information is legal, then allows terminal to operate, if positional information is illegal, then requires terminal locking, enters legal position up to terminal;
(4) if not receiving for the first time positional information, then continue to judge whether the current location information legitimacy is identical with previous position information legitimacy,, then keep current state,, then require terminal to restart SIM card if different by terminal if identical by SIM card.
2. the method for claim 1 is characterized in that, in the described step (3), if positional information is illegal, further comprises: require the terminal notifying user.
3. the method for claim 1 is characterized in that, in the described step (4), if positional information legitimacy difference further comprises: require the terminal notifying user.
4. as claim 2 or 3 described methods, it is characterized in that, describedly require the terminal notifying user, comprise by literal interface or auditory tone cues user.
5. the method for claim 1 is characterized in that, described step (1) further comprises the steps:
(11) behind the starting up of terminal, earlier to SIM card send can marking terminal self information, and send to one group of random number that generates by this terminal of SIM card;
(12) whether successful SIM card is encrypted the described one group of random number that receives according to the information of the described marking terminal self that receives, and return this encryption of a sign coomand mode word according to encrypted result;
(13) if the coomand mode sign that terminal receives is known this encryption success, then require SIM to send this encrypted result;
(14) SIM card returns to terminal according to the request of terminal with encrypted result;
(15) terminal is encrypted according to identical algorithms the same group of random number that sends to SIM card, and the encrypted result that this encrypted result and SIM card are returned is compared, if consistent, then by legitimate verification, allows the use of terminal; If inconsistent, then terminal is in the lock state, with the operation of limited subscriber.
6. method as claimed in claim 5 is characterized in that:
In the described step (13),, then further require SIM card to send one group of random number that generates by SIM card if the coomand mode sign that terminal receives is known this encryption success;
In the described step (14), SIM card further will be somebody's turn to do the one group of random number that is generated by SIM card and return to terminal according to the request of terminal;
Described step (15) further comprises: terminal is encrypted the one group of random number that is sended over by SIM card, and encrypted result is returned SIM card; SIM card is encrypted according to the algorithm identical with terminal the same group of random number that sends to terminal, and encrypted result and the described encrypted result of being returned by terminal are compared, if consistent, then by legitimate verification, allows the use of terminal; If inconsistent, then terminal is in the lock state, with the operation of limited subscriber.
7. as claim 5 or 6 described methods, it is characterized in that, in the described step (15),, further comprise: require the terminal notifying user if comparative result is inconsistent.
8. method as claimed in claim 7 is characterized in that, describedly requires the terminal notifying user, comprises by literal interface or auditory tone cues user.
9. the method for claim 1 is characterized in that, further comprises: in mobile phone storage, store a sign position, and by man-machine interface this sign is carried out the operation of opening and closing, be used for the described method of opening and closing.
CNA2006101402074A 2006-10-09 2006-10-09 Method of limiting use region of mobile terminal Pending CN101163289A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2006101402074A CN101163289A (en) 2006-10-09 2006-10-09 Method of limiting use region of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2006101402074A CN101163289A (en) 2006-10-09 2006-10-09 Method of limiting use region of mobile terminal

Publications (1)

Publication Number Publication Date
CN101163289A true CN101163289A (en) 2008-04-16

Family

ID=39298095

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006101402074A Pending CN101163289A (en) 2006-10-09 2006-10-09 Method of limiting use region of mobile terminal

Country Status (1)

Country Link
CN (1) CN101163289A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010139170A1 (en) * 2009-06-04 2010-12-09 中兴通讯股份有限公司 Method for locking card, subscriber identity module card and mobile terminal
CN103002539A (en) * 2011-09-08 2013-03-27 昆达电脑科技(昆山)有限公司 Mobile terminal and wireless control method
CN106599641A (en) * 2016-12-13 2017-04-26 广东欧珀移动通信有限公司 Method and device for limiting terminal locking, and terminal
CN110297669A (en) * 2019-06-28 2019-10-01 北京金山安全软件有限公司 Method and device for online activation of equipment, electronic equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010139170A1 (en) * 2009-06-04 2010-12-09 中兴通讯股份有限公司 Method for locking card, subscriber identity module card and mobile terminal
CN103002539A (en) * 2011-09-08 2013-03-27 昆达电脑科技(昆山)有限公司 Mobile terminal and wireless control method
CN106599641A (en) * 2016-12-13 2017-04-26 广东欧珀移动通信有限公司 Method and device for limiting terminal locking, and terminal
CN110297669A (en) * 2019-06-28 2019-10-01 北京金山安全软件有限公司 Method and device for online activation of equipment, electronic equipment and storage medium
CN110297669B (en) * 2019-06-28 2021-05-25 北京金山安全软件有限公司 Method and device for online activation of equipment, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN101155212A (en) Method for limiting use of mobile terminal
CN101163290A (en) Method of limiting use of mobile terminal through machine-card mutual authentication
CN107079058B (en) The business of block chain node executes method, apparatus and node device
KR100506432B1 (en) Method for enabling pki functions in a smart card
US8195233B2 (en) Methods and systems for identity management in wireless devices
KR101504855B1 (en) Method for exporting on a secure server data comprised on a uicc comprised in a terminal
RU2418387C2 (en) Method to disable mobile device
RU2391796C2 (en) Limited access to functional sets of mobile terminal
US20120149331A1 (en) Method and system for remote control of smart card
US9344896B2 (en) Method and system for delivering a command to a mobile device
KR20080066956A (en) Remote activation of a user account in a telecommunication network
CN106340087A (en) Intelligent switch lock system based on intelligent mobile terminal
JP2000059440A (en) Verification of data transfer based on specific id code
JP2007235237A (en) Authentication vector generating apparatus, subscriber identity module, mobile communication system and authentication vector generating method
CN109792601B (en) Method and equipment for deleting eUICC configuration file
CN103581441A (en) Mobile terminal tracking anti-theft system and method
JP2008097263A (en) Authentication system, authentication method and service providing server
CN110730446A (en) Login method, terminal and computer storage medium
JP4716644B2 (en) Mobile communication system and apparatus constituting the system
CN101163289A (en) Method of limiting use region of mobile terminal
CN108791188B (en) Vehicle control method, device and system
CN1705263B (en) Validity verification method of mobile terminal user and mobile terminal thereof
US20120190340A1 (en) Method for binding secure device to a wireless phone
CN110191464B (en) Method and system for preventing SIM card from being stolen
JP3851781B2 (en) Wireless communication apparatus, wireless communication system, and connection authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20080416