CN101166320B - A mobile phone and method for realizing mobile phone true name system based on RF recognition technology - Google Patents

A mobile phone and method for realizing mobile phone true name system based on RF recognition technology Download PDF

Info

Publication number
CN101166320B
CN101166320B CN200610140981A CN200610140981A CN101166320B CN 101166320 B CN101166320 B CN 101166320B CN 200610140981 A CN200610140981 A CN 200610140981A CN 200610140981 A CN200610140981 A CN 200610140981A CN 101166320 B CN101166320 B CN 101166320B
Authority
CN
China
Prior art keywords
mobile phone
phonecard
information
veritification
veritify
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200610140981A
Other languages
Chinese (zh)
Other versions
CN101166320A (en
Inventor
雷海强
杨起
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN200610140981A priority Critical patent/CN101166320B/en
Publication of CN101166320A publication Critical patent/CN101166320A/en
Application granted granted Critical
Publication of CN101166320B publication Critical patent/CN101166320B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

If user's phone card is not passed the verification for ID card yet, or is not in period of validity, mobile phone prompts user to use embedded radio frequency identification (RFID) reader to read info of ID card. Combining info of ID card with info of phone card generates info of requesting verification, and sends the said info to verifying mechanism of real name system of handset (VMRNYH). VMRNYH compares info of requesting verification with registered info of the phone card, and sends the verified result to the mobile phone. If ID verification is passed, then the mobile phone enters into normal operation mode, and writes the info of verification into specific storage area of the mobile phone; otherwise, the mobile phone enters into limited operation mode. Being able to carrying out machine-readable operation without contact, the invention raises efficiency of identification, and guarantees effective and integral implementation of real name system of handset.

Description

A kind of mobile phone and method of utilizing REID to realize mobile phone identification policy
Technical field
The present invention relates to the mobile communication terminal of moving communicating field, relate in particular to a kind of mobile phone and method of utilizing REID to realize mobile phone identification policy.
Background technology
At present, the Ministry of Information Industry clearly represents, starts the mobile phone identification policy management work in 2006 in China.Mobile phone identification policy is meant the consumer of application mobile service (comprising Personal Handyphone System), is buying phonecard Shi Xuchi effective identity certificate, is veritified and the duplicating registration certificate is strict by operator.The purpose of mobile phone identification policy: the one, the illegal note that containment remains existing despite repeated prohibition; The 2nd, save number resource, reduce the waste of operator's channel resource; The 3rd, can reduce telephone expenses arrearage uncollectible account; The 4th, check identity information and also help newspaper after mobile phone is lost and stop, print normally carrying out of operations such as detailed charge bill, professional conversion.In addition, the realization mobile phone identification policy can effectively be hit and be utilized mobile phone to be engaged in delinquent and terrorist activity, promotes the stability and development of society.
Under existing technical conditions, there are following problems in force in mobile phone identification policy:
(1) phonecard of each operator sale overwhelming majority is sold by the agent, part agent when selling to the veritification of identity card not very strictness even do not do veritification, cause using other people identity card, false identity card even not to take place repeatedly with the phenomenon that identity card can be bought phonecard equally, have a strong impact on the enforcement of mobile phone identification policy, also be far from reaching the purpose of implementing mobile phone identification policy;
(2) certain customers may transfer other people with phonecard in use for some time, if going to the mobile operator place to carry out the identity renewal, new user can not use this phonecard in the same old way yet, this has also influenced the enforcement of mobile phone identification policy, also easily cause various legal disputes, be unfavorable for the stability and development of society.
The present invention has designed a kind of radio-frequency (RF) identification (RFID that utilizes, Radio Frequency Identification) technology realizes the mobile phone of mobile phone identification policy, and utilize this mobile phone to realize the method for its business service, to solve the problem that mobile telephone real-name runs in implementation process, the present invention mainly considers following 2 points when design:
(1) according to the planning of China Ministry of Public Security, China's second generation identity card has entered comprehensively since 2005 and has changed the stage, plans to finish in 2008 the work of changing of whole nation population more than 16 years old.Second generation identity card is the smart card that meets ISO/IEC 14443 Type B agreements, regulation according to " residential identity demonstration ", wherein stored the identity information of 9 projects of resident, having comprised: the term of validity and the issuing authority of name, sex, nationality, date of birth, address, the place where someone is permanent residents, citizenship number, my photograph, certificate.Compare with looking the first generation identity card of reading, second generation identity card is looked except reservation and is read the function because adopted the RFID technology, can also carry out non-contacting machine and read automatically, has improved recognition efficiency;
(2) carrier that uses of phonecard is mobile phone, if embedded RF (RadioFrequency on mobile phone, radio frequency) reader, with the identity card (second generation identity card that reads, for convenience, being designated hereinafter simply as identity card) partial information is bound in information and the phonecard, as IMSI (international mobile subscriber identity, International Mobile Subscriber Identity) number, and and the user profile of operator registration compare, can confirm whether mobile phone identification policy is effectively implemented.
Summary of the invention
Technical problem to be solved by this invention is, a kind of mobile phone and method of utilizing REID to realize mobile phone identification policy is provided, and realizes the system of real name of phonecard is veritified by mobile phone, guarantees the effective and full implementation of mobile phone identification policy.
The invention provides a kind of mobile phone that utilizes REID to realize mobile phone identification policy, comprising:
An embedded radio frequency discrimination RFID reader is used for read-only can not write, the sightless mode reading identity card information of user;
The system of real name information storage module, be used for the storing call card and veritify information, the user is not visible and can not changes that this information comprises that at least phonecard information, this phonecard of veritifying by identity need the time of veritification again by time, this phonecard of veritifying for the last time to described phonecard veritification information;
System of real name is veritified control module, be used for veritifying information according to the phonecard of system of real name information storage module storage, whether the phonecard that judgement is inserted veritifies by identity and before the deadline whether, if veritify also still before the deadline by identity, then mobile phone enters normal mode of operation; Otherwise, the prompting user uses embedded RFID reader reading identity card information, and read phonecard information and be sent to mobile phone identification policy in the lump and veritify mechanism's request and veritify, veritification is passed through, then mobile phone enters normal mode of operation, and veritification information write the system of real name information storage module, and do not pass through if veritify, then mobile phone will enter the limited operation pattern.
Described system of real name information storage module when upgrading mobile phone software version, is not rewritten or is covered, and is changed to the state of can writing when only needing in phonecard veritification process.
Described mobile phone veritify not by the time restricted mode that enters be: the mobile phone refusal is not for providing the business service of conversation, note, transfer of data by the phonecard of veritifying.
ID card information and phonecard informational needs that described system of real name is veritified the control module transmission satisfy the verification request that mobile phone identification policy is veritified mechanism, and wherein said phonecard information is international mobile subscriber identity IMSI.
The present invention also provides a kind of REID of utilizing based on above-mentioned mobile phone to realize the method for mobile phone identification policy, comprises the steps:
(1) mobile phone is veritified information according to the phonecard of storage inside when needs carry out the system of real name veritification, judges whether before the deadline whether the phonecard of current insertion veritified also by identity;
(2) if veritify also still before the deadline by identity, mobile phone enters normal mode of operation, and veritification information is write mobile phone system of real name information storage module, finishes to veritify;
(3), generate request veritification information in conjunction with phonecard information and be sent to mobile phone identification policy and veritify mechanism if veritify as yet or not before the deadline, mobile phone prompting user also uses embedded radio frequency discrimination RFID reader reading identity card information by identity card;
(4) mobile phone identification policy is veritified mechanism and will ask veritification information and phonecard register information to compare, and with veritification phonecard information, and will veritify the result and send to mobile phone;
(5) if this phonecard is veritified by identity, then mobile phone enters normal mode of operation, and veritification information is write mobile phone system of real name information storage module, finishes to veritify;
(6) if phonecard is not veritified by identity, then mobile phone will enter the limited operation pattern, finish to veritify.
Further, the described phonecard veritification information of mobile phone storage inside comprises in the step (1): phonecard information, this phonecard of veritifying by identity pass through the time of veritifying, the time that this phonecard need be veritified again for the last time.
Further, needing to carry out the situation that system of real name veritifies described in the step (1) comprises:
When the mobile subscriber inserts mobile phone with phonecard;
When the mobile subscriber initiatively carries out the system of real name veritification;
When the term of validity that last time, system of real name was veritified is overdue.
Further, described method further comprises:
Need the time of veritifying again and the phonecard of not veritifying for surpassing phonecard, the mobile phone refusal provides the business service that comprises conversation, note, transfer of data for this card.
Further, limited operation pattern described in the step (6) is meant that the mobile phone refusal is not for providing the business service that comprises conversation, note, transfer of data by the phonecard of veritifying.
Further, the described request veritification information in the step (3) comprises the international mobile subscriber identity IMSI of ID card information and phonecard; When mobile phone and mobile phone identification policy described in step (3) and (4) are veritified between the mechanism interactive information, carry out alternately in the mode of encrypting or do not encrypt by normal short message or multi-media SMS.
Existing relatively at present mobile phone and mobile phone identification policy business, when realizing mobile phone identification policy, the present invention has following advantage: the uniqueness and the RFID technology that have made full use of identity card, on maximum possible, guarantee the phonecard registered user and used coincideing of user, make effectively being implemented and reach re-set target of mobile phone identification policy, safeguard the dignity of national legislation, promoted national stability and development.
Description of drawings
Fig. 1 adopts mobile phone of the present invention to realize the business processing flow figure of mobile phone identification policy.
Embodiment
Below in conjunction with drawings and the specific embodiments mobile phone of the present invention and method are described in further detail.
Mobile phone of the present invention comprises:
An embedded RFID reader can read ID card information, but haves no right to change ID card information;
A system of real name information storage module, be used for the storing call card and veritify information, at least comprise that phonecard information, this phonecard of veritifying by identity need the time of veritification again by time, this phonecard of veritifying for the last time, described phonecard veritification information is that the user is not visible and can not change, the user haves no right to check, revise, and this storage area can not rewritten or cover when upgrading mobile phone software version;
System of real name is veritified control module, be used for veritifying information according to the phonecard of system of real name information storage module storage, whether the phonecard that judgement is inserted veritifies by identity and before the deadline whether, if veritify also still before the deadline by identity, then mobile phone enters normal mode of operation; Otherwise, the prompting user uses embedded RFID reader reading identity card information, and read phonecard information and be sent to mobile phone identification policy in the lump and veritify mechanism's request and veritify, veritification is passed through, then mobile phone enters normal mode of operation, and veritification information write the system of real name information storage module, and do not pass through if veritify, then mobile phone will enter the limited operation pattern.
In order to guarantee the effective and full implementation of mobile phone identification policy, the present invention has designed the method that a kind of RFID of utilization technology realizes the business service of mobile phone identification policy, Fig. 1 has shown the Business Processing process of mobile phone realization mobile phone identification policy of the present invention, may further comprise the steps:
Step 1: the mobile subscriber inserts mobile phone with phonecard, starts shooting and finishes initial work such as network registration.
Step 2: mobile phone is veritified information according to the phonecard of storage inside, if before the deadline whether whether the phonecard that judgement is inserted veritified also by identity. veritify also still before the deadline by identity, then execution in step 6, otherwise the phonecard of execution in step 3. mobile phone storage inside veritification information comprises at least: phonecard information, this phonecard of veritifying by identity need the time of veritification again by time, this phonecard of veritifying for the last time.
Whether mobile phone is veritified requiring to carry out identity the phonecard that uses first thereon, and regularly or irregularly phonecard is veritified once more,, change to confirm the phonecard user by veritifying once again after the half a year of checking as last; The user also can irregularly use mobile phone initiatively to initiate identity and veritify, and needs the time of veritification again next time thereby postpone, and to tackle some special circumstances, will give other people to act on behalf some affairs etc. in a short time as identity card.
Step 3: mobile phone prompting user also uses embedded RFID reader reading identity card information, and simultaneously, mobile phone reads phonecard information by internal circuit and software.The minimum requirements that mobile phone identification policy is veritified is satisfied in ID card information that reads and phonecard information requirements, such as, can be name, ID card No. and the IMSI of regulation, and be ID card information or the phonecard information that can read; Mobile phone is after collecting the information that needs, information is sent to mobile phone identification policy veritify mechanism's request phonecard veritification, the send mode of information can be note, multi-media SMS and the utilizable wireless communication mode of other mobile phones, and information can be selected to encrypt or cipher mode not at transport process.
Wherein, the embedded RFID reader of mobile phone can reading identity card information, but can not rewrite ID card information, and the ID card information that reads is invisible to the mobile phone user.
Step 4: after mobile phone identification policy is veritified mechanism and received request veritification information, its and phonecard register information are compared,, and will veritify the result and send to mobile phone with veritification phonecard information.If by veritifying, veritifying among the result, this phonecard will comprise the time that these phonecard needs are verified again.The send mode of veritifying the result can be note, multi-media SMS and the utilizable wireless communication mode of other mobile phones, and information can be selected to encrypt in transport process or cipher mode not.
Step 5: mobile phone is received the veritification result.If phonecard is by veritifying, then execution in step 6; If phonecard is not by veritifying then redirect execution in step 7;
Step 6: phonecard is by after veritifying, and mobile phone enters normal mode of operation, and this card provides normal service, and veritification information is write the mobile phone particular memory region, and this handling process finishes.
Mobile phone is stored following information in the invisible not revisable mode of user: phonecard information, this phonecard of veritifying by identity need the time of veritification again by time, this phonecard of veritifying for the last time, when avoiding a mobile phone to use many phonecards by turns each phonecard that inserts is again required to veritify the operation of Convenient telephone card user.This storage area can not rewritten or be covered when upgrading mobile phone software version, to prevent part phonecard user's cheating.
Step 7: if phonecard is not veritified by identity, mobile phone will enter the limited operation pattern, mobile phone will be refused to provide some service for this card, the limited operation pattern can be veritified mechanism and mobile phone production firm confirms jointly by mobile phone identification policy, professional limited as user's communication, note, transfer of data etc., this handling process finishes.
The phonecard that mobile phone does not carry out veritifying once more to exceeding the time limit, mobile phone will be refused for this phonecard provides some service, as conversation, note, transfer of data etc.
The present invention has made full use of the uniqueness and the RFID technology of identity card, on maximum possible, guarantee the phonecard registered user and used coincideing of user, make effectively being implemented and reach re-set target of mobile phone identification policy, safeguarded the dignity of national legislation, promoted national stability and development.

Claims (9)

1. mobile phone that utilizes REID to realize mobile phone identification policy is characterized in that described mobile phone comprises:
An embedded radio frequency discrimination RFID reader is used for read-only can not write, the sightless mode reading identity card information of user;
The system of real name information storage module, be used for the storing call card and veritify information, the user is not visible and can not changes described phonecard veritification information, and when upgrading mobile phone software version, do not rewritten or covered, be changed to the state of can writing when only needing in phonecard veritification process, this information comprises that at least phonecard information, this phonecard of veritifying by identity need the time of veritification again by time, this phonecard of veritifying for the last time;
System of real name is veritified control module, be used for veritifying information according to the phonecard of system of real name information storage module storage, whether the phonecard that judgement is inserted veritifies by identity and before the deadline whether, if veritify also still before the deadline by identity, then mobile phone enters normal mode of operation; Otherwise, the prompting user uses embedded RFID reader reading identity card information, and read phonecard information and be sent to mobile phone identification policy in the lump and veritify mechanism's request and veritify, veritification is passed through, then mobile phone enters normal mode of operation, and veritification information write the system of real name information storage module, and do not pass through if veritify, then mobile phone will enter the limited operation pattern.
2. mobile phone as claimed in claim 1 is characterized in that, described mobile phone veritify not by the time restricted mode that enters be: the mobile phone refusal is not for providing the business service of conversation, note, transfer of data by the phonecard of veritifying.
3. mobile phone as claimed in claim 1, it is characterized in that, ID card information and phonecard informational needs that described system of real name is veritified the control module transmission satisfy the verification request that mobile phone identification policy is veritified mechanism, and wherein said phonecard information is international mobile subscriber identity IMSI.
4. the REID of utilizing based on the described mobile phone of claim 1 realizes the method for mobile phone identification policy, it is characterized in that, comprises the steps:
(1) mobile phone is veritified information according to the phonecard of storage inside when needs carry out the system of real name veritification, judges whether before the deadline whether the phonecard of current insertion veritified also by identity;
(2) if veritify also still before the deadline by identity, mobile phone enters normal mode of operation, and veritification information is write mobile phone system of real name information storage module, finishes to veritify;
(3), generate request veritification information in conjunction with phonecard information and be sent to mobile phone identification policy and veritify mechanism if veritify as yet or not before the deadline, mobile phone prompting user also uses embedded radio frequency discrimination RFID reader reading identity card information by identity card;
(4) mobile phone identification policy is veritified mechanism and will ask veritification information and phonecard register information to compare, and with veritification phonecard information, and will veritify the result and send to mobile phone;
(5) if this phonecard is veritified by identity, then mobile phone enters normal mode of operation, and veritification information is write mobile phone system of real name information storage module, finishes to veritify;
(6) if phonecard is not veritified by identity, then mobile phone will enter the limited operation pattern, finish to veritify.
5. method as claimed in claim 4, it is characterized in that the described phonecard veritification information of mobile phone storage inside comprises in the step (1): phonecard information, this phonecard of veritifying by identity pass through the time of veritifying, the time that this phonecard need be veritified again for the last time.
6. method as claimed in claim 4 is characterized in that, the situation that needs described in the step (1) to carry out the system of real name veritification comprises:
When the mobile subscriber inserts mobile phone with phonecard;
When the mobile subscriber initiatively carries out the system of real name veritification;
When the term of validity that last time, system of real name was veritified is overdue.
7. method as claimed in claim 5 is characterized in that, described method further comprises:
Need the time of veritifying again and the phonecard of not veritifying for surpassing phonecard, the mobile phone refusal provides the business service that comprises conversation, note, transfer of data for this card.
8. method as claimed in claim 4 is characterized in that, limited operation pattern described in the step (6) is meant that the mobile phone refusal is not for providing the business service that comprises conversation, note, transfer of data by the phonecard of veritifying.
9. method as claimed in claim 4 is characterized in that:
Described request veritification information in the step (3) comprises the international mobile subscriber identity IMSI of ID card information and phonecard;
When mobile phone and mobile phone identification policy described in step (3) and (4) are veritified between the mechanism interactive information, carry out alternately in the mode of encrypting or do not encrypt by normal short message or multi-media SMS.
CN200610140981A 2006-10-19 2006-10-19 A mobile phone and method for realizing mobile phone true name system based on RF recognition technology Expired - Fee Related CN101166320B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200610140981A CN101166320B (en) 2006-10-19 2006-10-19 A mobile phone and method for realizing mobile phone true name system based on RF recognition technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200610140981A CN101166320B (en) 2006-10-19 2006-10-19 A mobile phone and method for realizing mobile phone true name system based on RF recognition technology

Publications (2)

Publication Number Publication Date
CN101166320A CN101166320A (en) 2008-04-23
CN101166320B true CN101166320B (en) 2010-05-12

Family

ID=39334739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200610140981A Expired - Fee Related CN101166320B (en) 2006-10-19 2006-10-19 A mobile phone and method for realizing mobile phone true name system based on RF recognition technology

Country Status (1)

Country Link
CN (1) CN101166320B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2940556B1 (en) * 2008-12-23 2011-03-18 Oberthur Technologies MICROCIRCUIT CARD AND MOBILE TERMINAL COMPRISING SUCH A CARD.
CN101867918B (en) 2010-06-04 2015-06-03 中兴通讯股份有限公司 Real-name system registration state acquiring method, device and terminal
CN101909277A (en) * 2010-06-07 2010-12-08 中兴通讯股份有限公司 System and method for realizing real-name management and terminals
CN102355521A (en) * 2011-06-29 2012-02-15 深圳市五巨科技有限公司 Mobile communication terminal and software setting method thereof
CN102361512B (en) * 2011-06-30 2013-08-07 华为终端有限公司 Device, method and system for binding terminal
CN104038615A (en) * 2014-05-14 2014-09-10 京东方科技集团股份有限公司 Authentication method and authentication device of communication device
CN104866881B (en) * 2015-06-10 2018-10-23 广州市森锐科技股份有限公司 System of real name, which is opened an account, reads and writes card apparatus

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1441556A (en) * 2002-02-28 2003-09-10 张其善 Hand-held mobile radio phonetic data communication with IC card read/wirte function
CN1547403A (en) * 2003-12-12 2004-11-17 ���пƼ���ѧ A handset used for dynamic identity authentication
CN1756397A (en) * 2004-09-29 2006-04-05 杭州波导软件有限公司 Mobile communication terminal with collecting identity data function

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1441556A (en) * 2002-02-28 2003-09-10 张其善 Hand-held mobile radio phonetic data communication with IC card read/wirte function
CN1547403A (en) * 2003-12-12 2004-11-17 ���пƼ���ѧ A handset used for dynamic identity authentication
CN1756397A (en) * 2004-09-29 2006-04-05 杭州波导软件有限公司 Mobile communication terminal with collecting identity data function

Also Published As

Publication number Publication date
CN101166320A (en) 2008-04-23

Similar Documents

Publication Publication Date Title
CN101894404B (en) Method for realizing access control, terminal, access control device and access control system
CN101166320B (en) A mobile phone and method for realizing mobile phone true name system based on RF recognition technology
EP1710692B1 (en) Secure device, terminal device, gate device, and device
CN101422058B (en) Method of securing access to a proximity communication module in a mobile terminal
CN102393938B (en) On-site payment method for processing business and smart card
US20090281947A1 (en) Method and system for mobile commerce
EP1528825A1 (en) Method and system of replacing smart card
US7623845B2 (en) System for preventing unauthorized use of a mobile phone
US20060175418A1 (en) Method for providing additional service based on dual UICC
CN100407831C (en) Method of intelligent mobile terminal user staged managing
CN101291494B (en) Method realizing binding mobile terminal to user
CN102103765A (en) Access control and information display system, method and terminal
US20080083827A1 (en) Security method of dual-card assembly
CN101807318B (en) Mobile communication terminal, automatic transaction device, automatic transaction system and automatic transaction method
JP2004310257A (en) Non-contact ic mounted portable information terminal, transaction information transferring method and program
CN103297236A (en) User identity verification and authorization system
CN103400184A (en) SIM (subscriber identity module) card, mobile terminal, system and identifying method thereof
CN1477842B (en) Method for preventing user's identification module from being unallovably used
CN104899496A (en) Data reading method and terminal for same
CN101001297B (en) Service metering system and R-W transmission device
CN101499153A (en) Method and device for implementing security mobile payment
CN102289710A (en) Secure digital (SD) memory card having function of subscriber identity model (SIM) card
JP2007507766A (en) Method and system for providing wireless identification
CN101609574A (en) Merge mobile phone and the interconnected system and the method for various non-contact cards
CN101621803A (en) Method and device for managing wireless LAN authentication and privacy infrastructure (WAPI) certificate

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100512

Termination date: 20151019

EXPY Termination of patent right or utility model