CN101166320B - A mobile phone and method for realizing mobile phone true name system based on RF recognition technology - Google Patents
A mobile phone and method for realizing mobile phone true name system based on RF recognition technology Download PDFInfo
- Publication number
- CN101166320B CN101166320B CN200610140981A CN200610140981A CN101166320B CN 101166320 B CN101166320 B CN 101166320B CN 200610140981 A CN200610140981 A CN 200610140981A CN 200610140981 A CN200610140981 A CN 200610140981A CN 101166320 B CN101166320 B CN 101166320B
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- phonecard
- information
- veritification
- veritify
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
If user's phone card is not passed the verification for ID card yet, or is not in period of validity, mobile phone prompts user to use embedded radio frequency identification (RFID) reader to read info of ID card. Combining info of ID card with info of phone card generates info of requesting verification, and sends the said info to verifying mechanism of real name system of handset (VMRNYH). VMRNYH compares info of requesting verification with registered info of the phone card, and sends the verified result to the mobile phone. If ID verification is passed, then the mobile phone enters into normal operation mode, and writes the info of verification into specific storage area of the mobile phone; otherwise, the mobile phone enters into limited operation mode. Being able to carrying out machine-readable operation without contact, the invention raises efficiency of identification, and guarantees effective and integral implementation of real name system of handset.
Description
Technical field
The present invention relates to the mobile communication terminal of moving communicating field, relate in particular to a kind of mobile phone and method of utilizing REID to realize mobile phone identification policy.
Background technology
At present, the Ministry of Information Industry clearly represents, starts the mobile phone identification policy management work in 2006 in China.Mobile phone identification policy is meant the consumer of application mobile service (comprising Personal Handyphone System), is buying phonecard Shi Xuchi effective identity certificate, is veritified and the duplicating registration certificate is strict by operator.The purpose of mobile phone identification policy: the one, the illegal note that containment remains existing despite repeated prohibition; The 2nd, save number resource, reduce the waste of operator's channel resource; The 3rd, can reduce telephone expenses arrearage uncollectible account; The 4th, check identity information and also help newspaper after mobile phone is lost and stop, print normally carrying out of operations such as detailed charge bill, professional conversion.In addition, the realization mobile phone identification policy can effectively be hit and be utilized mobile phone to be engaged in delinquent and terrorist activity, promotes the stability and development of society.
Under existing technical conditions, there are following problems in force in mobile phone identification policy:
(1) phonecard of each operator sale overwhelming majority is sold by the agent, part agent when selling to the veritification of identity card not very strictness even do not do veritification, cause using other people identity card, false identity card even not to take place repeatedly with the phenomenon that identity card can be bought phonecard equally, have a strong impact on the enforcement of mobile phone identification policy, also be far from reaching the purpose of implementing mobile phone identification policy;
(2) certain customers may transfer other people with phonecard in use for some time, if going to the mobile operator place to carry out the identity renewal, new user can not use this phonecard in the same old way yet, this has also influenced the enforcement of mobile phone identification policy, also easily cause various legal disputes, be unfavorable for the stability and development of society.
The present invention has designed a kind of radio-frequency (RF) identification (RFID that utilizes, Radio Frequency Identification) technology realizes the mobile phone of mobile phone identification policy, and utilize this mobile phone to realize the method for its business service, to solve the problem that mobile telephone real-name runs in implementation process, the present invention mainly considers following 2 points when design:
(1) according to the planning of China Ministry of Public Security, China's second generation identity card has entered comprehensively since 2005 and has changed the stage, plans to finish in 2008 the work of changing of whole nation population more than 16 years old.Second generation identity card is the smart card that meets ISO/IEC 14443 Type B agreements, regulation according to " residential identity demonstration ", wherein stored the identity information of 9 projects of resident, having comprised: the term of validity and the issuing authority of name, sex, nationality, date of birth, address, the place where someone is permanent residents, citizenship number, my photograph, certificate.Compare with looking the first generation identity card of reading, second generation identity card is looked except reservation and is read the function because adopted the RFID technology, can also carry out non-contacting machine and read automatically, has improved recognition efficiency;
(2) carrier that uses of phonecard is mobile phone, if embedded RF (RadioFrequency on mobile phone, radio frequency) reader, with the identity card (second generation identity card that reads, for convenience, being designated hereinafter simply as identity card) partial information is bound in information and the phonecard, as IMSI (international mobile subscriber identity, International Mobile Subscriber Identity) number, and and the user profile of operator registration compare, can confirm whether mobile phone identification policy is effectively implemented.
Summary of the invention
Technical problem to be solved by this invention is, a kind of mobile phone and method of utilizing REID to realize mobile phone identification policy is provided, and realizes the system of real name of phonecard is veritified by mobile phone, guarantees the effective and full implementation of mobile phone identification policy.
The invention provides a kind of mobile phone that utilizes REID to realize mobile phone identification policy, comprising:
An embedded radio frequency discrimination RFID reader is used for read-only can not write, the sightless mode reading identity card information of user;
The system of real name information storage module, be used for the storing call card and veritify information, the user is not visible and can not changes that this information comprises that at least phonecard information, this phonecard of veritifying by identity need the time of veritification again by time, this phonecard of veritifying for the last time to described phonecard veritification information;
System of real name is veritified control module, be used for veritifying information according to the phonecard of system of real name information storage module storage, whether the phonecard that judgement is inserted veritifies by identity and before the deadline whether, if veritify also still before the deadline by identity, then mobile phone enters normal mode of operation; Otherwise, the prompting user uses embedded RFID reader reading identity card information, and read phonecard information and be sent to mobile phone identification policy in the lump and veritify mechanism's request and veritify, veritification is passed through, then mobile phone enters normal mode of operation, and veritification information write the system of real name information storage module, and do not pass through if veritify, then mobile phone will enter the limited operation pattern.
Described system of real name information storage module when upgrading mobile phone software version, is not rewritten or is covered, and is changed to the state of can writing when only needing in phonecard veritification process.
Described mobile phone veritify not by the time restricted mode that enters be: the mobile phone refusal is not for providing the business service of conversation, note, transfer of data by the phonecard of veritifying.
ID card information and phonecard informational needs that described system of real name is veritified the control module transmission satisfy the verification request that mobile phone identification policy is veritified mechanism, and wherein said phonecard information is international mobile subscriber identity IMSI.
The present invention also provides a kind of REID of utilizing based on above-mentioned mobile phone to realize the method for mobile phone identification policy, comprises the steps:
(1) mobile phone is veritified information according to the phonecard of storage inside when needs carry out the system of real name veritification, judges whether before the deadline whether the phonecard of current insertion veritified also by identity;
(2) if veritify also still before the deadline by identity, mobile phone enters normal mode of operation, and veritification information is write mobile phone system of real name information storage module, finishes to veritify;
(3), generate request veritification information in conjunction with phonecard information and be sent to mobile phone identification policy and veritify mechanism if veritify as yet or not before the deadline, mobile phone prompting user also uses embedded radio frequency discrimination RFID reader reading identity card information by identity card;
(4) mobile phone identification policy is veritified mechanism and will ask veritification information and phonecard register information to compare, and with veritification phonecard information, and will veritify the result and send to mobile phone;
(5) if this phonecard is veritified by identity, then mobile phone enters normal mode of operation, and veritification information is write mobile phone system of real name information storage module, finishes to veritify;
(6) if phonecard is not veritified by identity, then mobile phone will enter the limited operation pattern, finish to veritify.
Further, the described phonecard veritification information of mobile phone storage inside comprises in the step (1): phonecard information, this phonecard of veritifying by identity pass through the time of veritifying, the time that this phonecard need be veritified again for the last time.
Further, needing to carry out the situation that system of real name veritifies described in the step (1) comprises:
When the mobile subscriber inserts mobile phone with phonecard;
When the mobile subscriber initiatively carries out the system of real name veritification;
When the term of validity that last time, system of real name was veritified is overdue.
Further, described method further comprises:
Need the time of veritifying again and the phonecard of not veritifying for surpassing phonecard, the mobile phone refusal provides the business service that comprises conversation, note, transfer of data for this card.
Further, limited operation pattern described in the step (6) is meant that the mobile phone refusal is not for providing the business service that comprises conversation, note, transfer of data by the phonecard of veritifying.
Further, the described request veritification information in the step (3) comprises the international mobile subscriber identity IMSI of ID card information and phonecard; When mobile phone and mobile phone identification policy described in step (3) and (4) are veritified between the mechanism interactive information, carry out alternately in the mode of encrypting or do not encrypt by normal short message or multi-media SMS.
Existing relatively at present mobile phone and mobile phone identification policy business, when realizing mobile phone identification policy, the present invention has following advantage: the uniqueness and the RFID technology that have made full use of identity card, on maximum possible, guarantee the phonecard registered user and used coincideing of user, make effectively being implemented and reach re-set target of mobile phone identification policy, safeguard the dignity of national legislation, promoted national stability and development.
Description of drawings
Fig. 1 adopts mobile phone of the present invention to realize the business processing flow figure of mobile phone identification policy.
Embodiment
Below in conjunction with drawings and the specific embodiments mobile phone of the present invention and method are described in further detail.
Mobile phone of the present invention comprises:
An embedded RFID reader can read ID card information, but haves no right to change ID card information;
A system of real name information storage module, be used for the storing call card and veritify information, at least comprise that phonecard information, this phonecard of veritifying by identity need the time of veritification again by time, this phonecard of veritifying for the last time, described phonecard veritification information is that the user is not visible and can not change, the user haves no right to check, revise, and this storage area can not rewritten or cover when upgrading mobile phone software version;
System of real name is veritified control module, be used for veritifying information according to the phonecard of system of real name information storage module storage, whether the phonecard that judgement is inserted veritifies by identity and before the deadline whether, if veritify also still before the deadline by identity, then mobile phone enters normal mode of operation; Otherwise, the prompting user uses embedded RFID reader reading identity card information, and read phonecard information and be sent to mobile phone identification policy in the lump and veritify mechanism's request and veritify, veritification is passed through, then mobile phone enters normal mode of operation, and veritification information write the system of real name information storage module, and do not pass through if veritify, then mobile phone will enter the limited operation pattern.
In order to guarantee the effective and full implementation of mobile phone identification policy, the present invention has designed the method that a kind of RFID of utilization technology realizes the business service of mobile phone identification policy, Fig. 1 has shown the Business Processing process of mobile phone realization mobile phone identification policy of the present invention, may further comprise the steps:
Step 1: the mobile subscriber inserts mobile phone with phonecard, starts shooting and finishes initial work such as network registration.
Step 2: mobile phone is veritified information according to the phonecard of storage inside, if before the deadline whether whether the phonecard that judgement is inserted veritified also by identity. veritify also still before the deadline by identity, then execution in step 6, otherwise the phonecard of execution in step 3. mobile phone storage inside veritification information comprises at least: phonecard information, this phonecard of veritifying by identity need the time of veritification again by time, this phonecard of veritifying for the last time.
Whether mobile phone is veritified requiring to carry out identity the phonecard that uses first thereon, and regularly or irregularly phonecard is veritified once more,, change to confirm the phonecard user by veritifying once again after the half a year of checking as last; The user also can irregularly use mobile phone initiatively to initiate identity and veritify, and needs the time of veritification again next time thereby postpone, and to tackle some special circumstances, will give other people to act on behalf some affairs etc. in a short time as identity card.
Step 3: mobile phone prompting user also uses embedded RFID reader reading identity card information, and simultaneously, mobile phone reads phonecard information by internal circuit and software.The minimum requirements that mobile phone identification policy is veritified is satisfied in ID card information that reads and phonecard information requirements, such as, can be name, ID card No. and the IMSI of regulation, and be ID card information or the phonecard information that can read; Mobile phone is after collecting the information that needs, information is sent to mobile phone identification policy veritify mechanism's request phonecard veritification, the send mode of information can be note, multi-media SMS and the utilizable wireless communication mode of other mobile phones, and information can be selected to encrypt or cipher mode not at transport process.
Wherein, the embedded RFID reader of mobile phone can reading identity card information, but can not rewrite ID card information, and the ID card information that reads is invisible to the mobile phone user.
Step 4: after mobile phone identification policy is veritified mechanism and received request veritification information, its and phonecard register information are compared,, and will veritify the result and send to mobile phone with veritification phonecard information.If by veritifying, veritifying among the result, this phonecard will comprise the time that these phonecard needs are verified again.The send mode of veritifying the result can be note, multi-media SMS and the utilizable wireless communication mode of other mobile phones, and information can be selected to encrypt in transport process or cipher mode not.
Step 5: mobile phone is received the veritification result.If phonecard is by veritifying, then execution in step 6; If phonecard is not by veritifying then redirect execution in step 7;
Step 6: phonecard is by after veritifying, and mobile phone enters normal mode of operation, and this card provides normal service, and veritification information is write the mobile phone particular memory region, and this handling process finishes.
Mobile phone is stored following information in the invisible not revisable mode of user: phonecard information, this phonecard of veritifying by identity need the time of veritification again by time, this phonecard of veritifying for the last time, when avoiding a mobile phone to use many phonecards by turns each phonecard that inserts is again required to veritify the operation of Convenient telephone card user.This storage area can not rewritten or be covered when upgrading mobile phone software version, to prevent part phonecard user's cheating.
Step 7: if phonecard is not veritified by identity, mobile phone will enter the limited operation pattern, mobile phone will be refused to provide some service for this card, the limited operation pattern can be veritified mechanism and mobile phone production firm confirms jointly by mobile phone identification policy, professional limited as user's communication, note, transfer of data etc., this handling process finishes.
The phonecard that mobile phone does not carry out veritifying once more to exceeding the time limit, mobile phone will be refused for this phonecard provides some service, as conversation, note, transfer of data etc.
The present invention has made full use of the uniqueness and the RFID technology of identity card, on maximum possible, guarantee the phonecard registered user and used coincideing of user, make effectively being implemented and reach re-set target of mobile phone identification policy, safeguarded the dignity of national legislation, promoted national stability and development.
Claims (9)
1. mobile phone that utilizes REID to realize mobile phone identification policy is characterized in that described mobile phone comprises:
An embedded radio frequency discrimination RFID reader is used for read-only can not write, the sightless mode reading identity card information of user;
The system of real name information storage module, be used for the storing call card and veritify information, the user is not visible and can not changes described phonecard veritification information, and when upgrading mobile phone software version, do not rewritten or covered, be changed to the state of can writing when only needing in phonecard veritification process, this information comprises that at least phonecard information, this phonecard of veritifying by identity need the time of veritification again by time, this phonecard of veritifying for the last time;
System of real name is veritified control module, be used for veritifying information according to the phonecard of system of real name information storage module storage, whether the phonecard that judgement is inserted veritifies by identity and before the deadline whether, if veritify also still before the deadline by identity, then mobile phone enters normal mode of operation; Otherwise, the prompting user uses embedded RFID reader reading identity card information, and read phonecard information and be sent to mobile phone identification policy in the lump and veritify mechanism's request and veritify, veritification is passed through, then mobile phone enters normal mode of operation, and veritification information write the system of real name information storage module, and do not pass through if veritify, then mobile phone will enter the limited operation pattern.
2. mobile phone as claimed in claim 1 is characterized in that, described mobile phone veritify not by the time restricted mode that enters be: the mobile phone refusal is not for providing the business service of conversation, note, transfer of data by the phonecard of veritifying.
3. mobile phone as claimed in claim 1, it is characterized in that, ID card information and phonecard informational needs that described system of real name is veritified the control module transmission satisfy the verification request that mobile phone identification policy is veritified mechanism, and wherein said phonecard information is international mobile subscriber identity IMSI.
4. the REID of utilizing based on the described mobile phone of claim 1 realizes the method for mobile phone identification policy, it is characterized in that, comprises the steps:
(1) mobile phone is veritified information according to the phonecard of storage inside when needs carry out the system of real name veritification, judges whether before the deadline whether the phonecard of current insertion veritified also by identity;
(2) if veritify also still before the deadline by identity, mobile phone enters normal mode of operation, and veritification information is write mobile phone system of real name information storage module, finishes to veritify;
(3), generate request veritification information in conjunction with phonecard information and be sent to mobile phone identification policy and veritify mechanism if veritify as yet or not before the deadline, mobile phone prompting user also uses embedded radio frequency discrimination RFID reader reading identity card information by identity card;
(4) mobile phone identification policy is veritified mechanism and will ask veritification information and phonecard register information to compare, and with veritification phonecard information, and will veritify the result and send to mobile phone;
(5) if this phonecard is veritified by identity, then mobile phone enters normal mode of operation, and veritification information is write mobile phone system of real name information storage module, finishes to veritify;
(6) if phonecard is not veritified by identity, then mobile phone will enter the limited operation pattern, finish to veritify.
5. method as claimed in claim 4, it is characterized in that the described phonecard veritification information of mobile phone storage inside comprises in the step (1): phonecard information, this phonecard of veritifying by identity pass through the time of veritifying, the time that this phonecard need be veritified again for the last time.
6. method as claimed in claim 4 is characterized in that, the situation that needs described in the step (1) to carry out the system of real name veritification comprises:
When the mobile subscriber inserts mobile phone with phonecard;
When the mobile subscriber initiatively carries out the system of real name veritification;
When the term of validity that last time, system of real name was veritified is overdue.
7. method as claimed in claim 5 is characterized in that, described method further comprises:
Need the time of veritifying again and the phonecard of not veritifying for surpassing phonecard, the mobile phone refusal provides the business service that comprises conversation, note, transfer of data for this card.
8. method as claimed in claim 4 is characterized in that, limited operation pattern described in the step (6) is meant that the mobile phone refusal is not for providing the business service that comprises conversation, note, transfer of data by the phonecard of veritifying.
9. method as claimed in claim 4 is characterized in that:
Described request veritification information in the step (3) comprises the international mobile subscriber identity IMSI of ID card information and phonecard;
When mobile phone and mobile phone identification policy described in step (3) and (4) are veritified between the mechanism interactive information, carry out alternately in the mode of encrypting or do not encrypt by normal short message or multi-media SMS.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610140981A CN101166320B (en) | 2006-10-19 | 2006-10-19 | A mobile phone and method for realizing mobile phone true name system based on RF recognition technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610140981A CN101166320B (en) | 2006-10-19 | 2006-10-19 | A mobile phone and method for realizing mobile phone true name system based on RF recognition technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101166320A CN101166320A (en) | 2008-04-23 |
CN101166320B true CN101166320B (en) | 2010-05-12 |
Family
ID=39334739
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200610140981A Expired - Fee Related CN101166320B (en) | 2006-10-19 | 2006-10-19 | A mobile phone and method for realizing mobile phone true name system based on RF recognition technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101166320B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2940556B1 (en) * | 2008-12-23 | 2011-03-18 | Oberthur Technologies | MICROCIRCUIT CARD AND MOBILE TERMINAL COMPRISING SUCH A CARD. |
CN101867918B (en) | 2010-06-04 | 2015-06-03 | 中兴通讯股份有限公司 | Real-name system registration state acquiring method, device and terminal |
CN101909277A (en) * | 2010-06-07 | 2010-12-08 | 中兴通讯股份有限公司 | System and method for realizing real-name management and terminals |
CN102355521A (en) * | 2011-06-29 | 2012-02-15 | 深圳市五巨科技有限公司 | Mobile communication terminal and software setting method thereof |
CN102361512B (en) * | 2011-06-30 | 2013-08-07 | 华为终端有限公司 | Device, method and system for binding terminal |
CN104038615A (en) * | 2014-05-14 | 2014-09-10 | 京东方科技集团股份有限公司 | Authentication method and authentication device of communication device |
CN104866881B (en) * | 2015-06-10 | 2018-10-23 | 广州市森锐科技股份有限公司 | System of real name, which is opened an account, reads and writes card apparatus |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1441556A (en) * | 2002-02-28 | 2003-09-10 | 张其善 | Hand-held mobile radio phonetic data communication with IC card read/wirte function |
CN1547403A (en) * | 2003-12-12 | 2004-11-17 | ���пƼ���ѧ | A handset used for dynamic identity authentication |
CN1756397A (en) * | 2004-09-29 | 2006-04-05 | 杭州波导软件有限公司 | Mobile communication terminal with collecting identity data function |
-
2006
- 2006-10-19 CN CN200610140981A patent/CN101166320B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1441556A (en) * | 2002-02-28 | 2003-09-10 | 张其善 | Hand-held mobile radio phonetic data communication with IC card read/wirte function |
CN1547403A (en) * | 2003-12-12 | 2004-11-17 | ���пƼ���ѧ | A handset used for dynamic identity authentication |
CN1756397A (en) * | 2004-09-29 | 2006-04-05 | 杭州波导软件有限公司 | Mobile communication terminal with collecting identity data function |
Also Published As
Publication number | Publication date |
---|---|
CN101166320A (en) | 2008-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101894404B (en) | Method for realizing access control, terminal, access control device and access control system | |
CN101166320B (en) | A mobile phone and method for realizing mobile phone true name system based on RF recognition technology | |
EP1710692B1 (en) | Secure device, terminal device, gate device, and device | |
CN101422058B (en) | Method of securing access to a proximity communication module in a mobile terminal | |
CN102393938B (en) | On-site payment method for processing business and smart card | |
US20090281947A1 (en) | Method and system for mobile commerce | |
EP1528825A1 (en) | Method and system of replacing smart card | |
US7623845B2 (en) | System for preventing unauthorized use of a mobile phone | |
US20060175418A1 (en) | Method for providing additional service based on dual UICC | |
CN100407831C (en) | Method of intelligent mobile terminal user staged managing | |
CN101291494B (en) | Method realizing binding mobile terminal to user | |
CN102103765A (en) | Access control and information display system, method and terminal | |
US20080083827A1 (en) | Security method of dual-card assembly | |
CN101807318B (en) | Mobile communication terminal, automatic transaction device, automatic transaction system and automatic transaction method | |
JP2004310257A (en) | Non-contact ic mounted portable information terminal, transaction information transferring method and program | |
CN103297236A (en) | User identity verification and authorization system | |
CN103400184A (en) | SIM (subscriber identity module) card, mobile terminal, system and identifying method thereof | |
CN1477842B (en) | Method for preventing user's identification module from being unallovably used | |
CN104899496A (en) | Data reading method and terminal for same | |
CN101001297B (en) | Service metering system and R-W transmission device | |
CN101499153A (en) | Method and device for implementing security mobile payment | |
CN102289710A (en) | Secure digital (SD) memory card having function of subscriber identity model (SIM) card | |
JP2007507766A (en) | Method and system for providing wireless identification | |
CN101609574A (en) | Merge mobile phone and the interconnected system and the method for various non-contact cards | |
CN101621803A (en) | Method and device for managing wireless LAN authentication and privacy infrastructure (WAPI) certificate |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100512 Termination date: 20151019 |
|
EXPY | Termination of patent right or utility model |