CN101287298A - Authentication method and system for mobile communication terminal - Google Patents
Authentication method and system for mobile communication terminal Download PDFInfo
- Publication number
- CN101287298A CN101287298A CNA2008101134169A CN200810113416A CN101287298A CN 101287298 A CN101287298 A CN 101287298A CN A2008101134169 A CNA2008101134169 A CN A2008101134169A CN 200810113416 A CN200810113416 A CN 200810113416A CN 101287298 A CN101287298 A CN 101287298A
- Authority
- CN
- China
- Prior art keywords
- communication terminal
- mobile communication
- authentication
- sign
- sim card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides an authentication method of a mobile communication terminal and a system thereof. The authentication method of the invention comprises the steps that: the identifier of the mobile communication terminal, an SIM card identifier and password for a subscriber are first obtained to generate authentication information; the generated authentication information is then sent to an authentication server which carries out the authentication to the authentication information to obtain the authentication result; the authentication result is finally sent back to the mobile communication terminal; the mobile communication terminal judges whether the authentication is successful or not according to the authentication result and the mobile communication terminal can be normally operated when the authentication is successful. In the method of the invention, when the subscriber changes the SIM card of a mobile phone, the authentication of a legal subscriber can be accomplished on the server and an illegal subscriber still fails to use the mobile phone normally even the phone re-burns records. Therefore, the authentication method of the invention can prevent the situations such as the stealing of mobile phones or phone cards, which results in that the mobile phone can be avoided being stolen.
Description
Technical field
The present invention is relevant for wireless communication technology field, and the terminal equipment in the wireless network is a kind of method for authenticating and system of mobile communication terminal specifically.
Background technology
At present, along with the continuous development of digital technology, various digital electronic products more and more with its strong functions and fast, operation easily attracts user's eyeball.
For example, the consumer except the outward appearance of paying attention to its personalization, fashion-orientation, strong functions that mobile phone has and simple operation also are the important factors that left and right sides consumers select mobile phone when selecting mobile phone.
And along with powerfulization of self function of mobile phone, the user more and more relies on mobile phone, a lot of important informations and file all are stored in mobile phone or carry out various business activities by mobile phone, and promptly mobile phone has been played the part of indispensable key player in people's work and life.
Yet, because mobile phone expensive, adding that huge interests order about, the lawless person is dried to have played the illegal trade such as the personal or second-hand market of reselling of pilferage mobile phone, and mobile phone holder's interests that these behaviors are badly damaged make that the mobile phone holder is hard to guard against.And losing of mobile phone not only can be brought the certain economic loss to the user, and probably be caused no small trouble to the user.
Therefore, inquire into and how to prevent hand-set from stolen, how to reduce loss behind user's lost mobile phone, how to prevent that the vital document in the mobile phone is stolen, be the problem that those skilled in the art study always.
And a kind of antitheft mobile phone technology that has disclosed at present is to adopt on mobile phone input password to come the method for authentication user, however these mobile phones behind disabled user's burning mobile phone again, will all lose efficacy, therefore can't reach antitheft purpose well.
In addition, present also the announcement has a kind of technology with SIM card and handset binding.Be about to a unique SIM card and bind with a unique mobile phone, owing to the disabled user must change SIM card after stealing mobile phone, and stolen mobile phone is bound with SIM card before, even so the disabled user stolen mobile phone and can not use.Should it can't normally be used so also can't resell, thereby reduced hand-set from stolen to a certain extent by making stolen mobile phone lose its function.
Yet, this mobile phone can only be bound with a SIM, therefore just the problem that can't use has appearred when the user need use other SIM on this mobile phone when, and it is same with existing other antitheft mobile phone technology, behind disabled user's burning mobile phone again, the original setting of mobile phone will all be lost efficacy, and therefore also can't reach antitheft purpose well.
Therefore, even just need a kind of disabled user again behind the burning mobile phone, can not make the disabled user normally use the technology of mobile phone, to reduce hand-set from stolen.
At this, " a kind of antitheft mobile phone and theft preventing method thereof " patent documentation of quoting the Chinese patent publication number and being CN1780435A is as prior art of the present invention.
Summary of the invention
The object of the present invention is to provide a kind of method for authenticating of mobile communication terminal, can effectively solve the problem that hand-set from stolen is used.
Another object of the present invention is to provide a kind of right discriminating system of mobile communication terminal, solve the problem that the disabled user still can normally use behind the burning stolen mobile phone again by communicating by letter between mobile phone and the server.
In order to realize the purpose of the invention described above, the embodiment of the invention provides a kind of method for authenticating of mobile communication terminal, and this method comprises: obtain described mobile communication terminal sign, SIM card sign and user cipher, generate authentication information; Described authentication information is carried out authentication, generate authenticating result; Carry out corresponding operation according to this authenticating result.
In order to realize another purpose of the invention described above, another embodiment of the present invention provides a kind of right discriminating system of mobile communication terminal, this system comprises mobile communication terminal and authentication server, described mobile communication terminal and described authentication server communicate by cordless communication network, described mobile communication terminal comprises: the authentication information generation unit, be used to obtain described mobile communication terminal sign, SIM card sign and user cipher, generate authentication information; Authentication information sending unit is used for that described authentication information is sent to described authentication server and carries out authentication; The authentication performance element is used to receive the authenticating result that described authentication server carries out, and carries out corresponding operation according to this authenticating result.
Among the present invention, when the user changes SIM cards of mobile phones, just can on server, finish the authentication work of validated user.Behind failed authentication, mobile phone will cut out automatically.The disabled user has obtained mobile phone like this, but can't normally use.After such mobile phone application popularization, the generation of mobile phone loss situation will be reduced to a certain extent.
And, also have the situation that validated user has many cards simultaneously in the middle of the daily life.Such user will preserve the authorization data of many combined methods by after the server authentication on server.
More existing antitheft mobile phone designs will all be lost efficacy behind disabled user's burning mobile phone again.And the present invention fully under the circumstances.Behind mobile phone burning again, all authorization datas all are kept at server end, and the disabled user still can't normally use mobile phone.
Therefore, the present invention can prevent the situation usurping mobile phone or usurp the mobile phone card, thereby has effectively prevented hand-set from stolen.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, does not constitute limitation of the invention.In the accompanying drawings:
The schematic diagram of the right discriminating system of the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 1 is.
The structured flowchart of the right discriminating system of the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 2 is.
The flow chart of the method for authenticating of the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 3 is.
One of schematic diagram when the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 4 is carries out authentication ().
Schematic diagram when the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 5 is carries out authentication (two).
The structured flowchart of the right discriminating system of the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 6 is.
The flow chart of the method for authenticating of the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 7 is.
One of schematic diagram when the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 8 is carries out authentication ().
Schematic diagram when the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 9 is carries out authentication (two).
Schematic diagram when the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 10 is carries out authentication (three).
Schematic diagram when the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 11 is carries out authentication (four).
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer,, the present invention is described in further details below in conjunction with execution mode and accompanying drawing.At this, exemplary embodiment of the present invention and explanation thereof are used to explain the present invention, but not as a limitation of the invention.
The embodiment of the invention provides a kind of right discriminating system of mobile communication terminal.The present invention is described in detail below in conjunction with accompanying drawing.
Embodiment 1
The schematic diagram of the right discriminating system of the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 1 is, the structured flowchart of the right discriminating system of the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 2 is, wherein mobile communication terminal (present embodiment is a mobile phone) 101 communicates by cordless communication network 103 and authentication server 102, wherein the mobile communication terminal of embodiments of the invention 1 comprises radio frequency unit, baseband circuit, the MCU control circuit, keyboard, display, this mobile communication terminal also comprises: authentication information generation unit 104, be used to obtain the mobile communication terminal sign, SIM card sign and user cipher generate authentication information; Authentication information sending unit 105 is used for that above-mentioned authentication information is sent to above-mentioned authentication server and carries out authentication; Authentication performance element 106 is used to receive the authenticating result that above-mentioned authentication server carries out, and carries out corresponding operation according to this authenticating result.
The flow chart of the method for authenticating of the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 3 is below describes the authentication process of the mobile communication terminal of the embodiment of the invention 1 in detail with reference to Fig. 3.
At first, the user inserts start (step S101) behind the SIM in mobile phone 101, at first the authentication information generation unit 104 of mobile phone 101 obtains sign, SIM card sign and the user cipher of mobile phone, as authentication information (step S102), wherein mobile phone 101 obtains the sign of the IMEI of mobile phone as above-mentioned mobile phone 101 automatically, the IMSI that obtains SIM card identifies as above-mentioned SIM card, and obtaining of above-mentioned user cipher is to import on mobile phone 101 by the user to finish (as shown in Figure 4).
Then, whether mobile phone 101 carries out authentication (step S103) (as shown in Figure 5) to user prompt to authentication server, when the user selects "Yes", authentication information sending unit 105 sends to above-mentioned authentication server 102 with above-mentioned authentication information and carries out authentication (step S104), and mobile phone 101 is in the odd-job pattern to user prompt user current phone when the user selects "No", will close (step S105) automatically after 1 hour.
Above-mentioned authentication server 102 carries out authentication (step S104) according to above-mentioned authentication information, judge the sign of current phone 101, whether SIM card sign and user cipher mate, promptly judge whether to be normal users (step S106)? when being judged as when not being normal users, authentication server 102 sends to mobile phone 101 with disabled user's authenticating result, make mobile phone 101 shut down automatically (step S107), when being judged as when being normal users, authentication server 102 sends to mobile phone 101 with the authenticating result of normal users, and add current authentication information on the authentication server 102 (step S108), mobile phone 101 can normally use (step S109) after receiving the authenticating result of above-mentioned normal users.
Wherein, above-mentioned authentication information is that form with note sends to authentication server 102 from mobile phone 101 by cordless communication network 103 in the embodiment of the invention 1, sends to mobile phone 101 from authentication server 102 by cordless communication network 103 and authenticating result also is a form with note.
In addition, the method for authenticating of mobile communication terminal of the present invention comprises: obtain above-mentioned mobile communication terminal sign, SIM card sign and user cipher, generate authentication information; The authentication information that generates is sent to authentication server; Above-mentioned authentication server carries out authentication to above-mentioned authentication information, generates authenticating result; The authenticating result that generates is sent back to above-mentioned mobile communication terminal; Above-mentioned mobile communication terminal judges whether the authentication success according to this authenticating result, and above-mentioned mobile communication terminal can normally use when the authentication success.
And when above-mentioned authentication was successful, above-mentioned authentication server was stored current authentication information, and above-mentioned mobile communication terminal sign, SIM card sign and user cipher are bound, and generated group binding relation; Mobile communication terminal is stored current authentication information, and above-mentioned mobile communication terminal sign, SIM card sign are bound, and generates the local authentication file.
And in the present embodiment, to judge also that before authentication whether current SIM card sign conforms to the local authentication file, makes above-mentioned mobile communication terminal normally use when being judged as when conforming to; And carry out authentication by above-mentioned authentication server when not conforming to, and when the authentication success, above-mentioned mobile communication terminal can normally be used when being judged as.
The method for authenticating of present embodiment is that server judges that whether above-mentioned mobile communication terminal sign and above-mentioned SIM card sign exist other binding relationship, are judged as failed authentication when having other binding relationships.For example under the correct situation of user cipher, if there is other binding relationship in SIM card, and mobile phone authentication success when not having other binding relationships; And mobile phone and SIM card are failed authentication when having other binding relationships simultaneously.Therefore embodiments of the invention 1 can be expanded on the basis of existing hardware facility, thereby effectively prevent hand-set from stolen under the situation that does not increase expense owing to be that form with note sends authentication information and authenticating result.
The structured flowchart of the right discriminating system of the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 6 is, wherein mobile communication terminal comprises radio frequency unit, baseband circuit, MCU control circuit, keyboard, display, this mobile communication terminal also comprises: identification code acquiring unit 30 1, the IMEI that is used to obtain mobile communication terminal identifies as mobile communication terminal, and the IMSI that obtains SIM card identifies as SIM card; User cipher input unit 302 is used to import user cipher; Authentication information sending unit 303 is used for above-mentioned mobile communication terminal sign, SIM card sign and user cipher are sent to authentication server as authentication information, carries out authentication; Authentication performance element 306 is used to receive the authenticating result that above-mentioned authentication server carries out, and carries out corresponding operation according to this authenticating result; Authentication file storage unit 304 is used to store above-mentioned mobile communication terminal sign of carrying out authentication and the corresponding relation that SIM card identifies; The sign judging unit, be used to judge that current mobile communication terminal sign and SIM card identify whether satisfies above-mentioned authentication file storage unit institute stored relation, if satisfy above-mentioned corresponding relation, then authentication performance element 306 is confirmed as normal users with the active user; And identify when not satisfying above-mentioned corresponding relation when being judged as current mobile communication terminal sign and SIM card, authentication server to above-mentioned mobile communication terminal identify, SIM card sign and user cipher carry out authentication, mobile communication terminal is judged normal users or disabled user according to the authenticating result that above-mentioned authentication server carries out authentication, when being normal users, authentication performance element 306 makes the mobile communication terminal operate as normal, when being illegal user, authentication performance element 306 sends instruction shuts down mobile communication terminal automatically.
The mobile communication terminal of present embodiment 2 comprises that also corresponding relation searches unit (not shown), it searches the corresponding relation that whether has current mobile communication terminal and SIM in above-mentioned corresponding relation, when not storing any corresponding relation, if carrying out the authenticating result of authentication according to above-mentioned authentication information is normal users, the corresponding relation of current mobile communication terminal sign of then above-mentioned authentication file storage unit 304 storages and SIM card sign, above-mentioned authentication server is preserved current authentication information.
Wherein, when in above-mentioned authentication file storage unit 304, not storing any above-mentioned corresponding relation, if carrying out the authenticating result of authentication according to above-mentioned authentication information is normal users, the corresponding relation of current mobile communication terminal sign of then above-mentioned authentication file storage unit 304 storages and SIM card sign, above-mentioned authentication server is preserved above-mentioned authentication information.
The flow chart of the method for authenticating of the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 7 is below describes the authentication process of the mobile communication terminal of the embodiment of the invention 2 in detail with reference to Fig. 7.
Step S701: at first, the user starts shooting insert SIM in mobile communication terminal after;
Step S702: when mobile communication terminal the time judges whether to exist in this locality the authentication file earlier in start, promptly judge the authentication file that whether stores on the mobile communication terminal in the past, step below when having the authentication file, continuing in this locality, when not having the authentication file, forward step S713 in this locality;
Step S703: then, do you judge that the SIM card sign of inserting conforms to the authentication file of above-mentioned this locality? step below when this SIM card sign does not conform to the authentication file of above-mentioned this locality, continuing, when this SIM card sign conforms to the authentication file of above-mentioned this locality, forward step S709 to;
Step S704: whether mobile communication terminal prompting user carries out authentication to authentication server, when the user selects "Yes", step below continuing, and when the user selected "No", mobile communication terminal prompting user current phone was in the odd-job pattern, will close automatically after 1 hour (as shown in Figure 8), the user can only carry out shirtsleeve operation to this mobile communication terminal, for example check calendar etc., and can not dial, receive calls etc., and will shut down automatically later at 1 hour.
Step S705: with way of short messages with above-mentioned mobile communication terminal identify, SIM card sign, user cipher send on the above-mentioned authentication server;
Step S706: carry out authentication by authentication server, do you judge that promptly above-mentioned mobile communication terminal sign, SIM card sign, user cipher mate? being judged as when not matching is illegal user, disabled user's authenticating result is sent to mobile communication terminal with short message mode, and mobile communication terminal will shut down after receiving this note automatically; And when coupling the time is judged as normal users, the step below continuing;
Step S707: authentication server is changed or is added new mobile phone logo, SIM card sign, the triangular authentication relation of user cipher, and the step below continuing;
Step S708: finish authentication process, mobile communication terminal can normally use (as shown in Figure 9);
Step S709: mobile communication terminal is judged, whether the authentication time of current SIM card is above 30 days, promptly apart from last time authentication whether greater than 30 days, step below when surpassing 30 days, continuing, this SIM card is judged as is normal users to mobile communication terminal when not surpassing 30 days, and the end authentication process, mobile communication terminal can normally use;
Step S710: judge that whether mobile communication terminal is at last net state, when not at last net state, finish authentication process, mobile communication terminal can carry out and the irrelevant business of service on net, step below when at last net state, continuing, the wherein said herein net state of going up is meant and can communicates by cordless communication network and wireless communication server;
Step S711: send mobile communication terminal sign, SIM card sign, user cipher to above-mentioned authentication server by network;
Step S712: carry out authentication by authentication server, do you judge that promptly above-mentioned mobile communication terminal sign, SIM card sign, user cipher mate? when not matching, being judged as is illegal user, disabled user's authenticating result is sent to mobile communication terminal with short message mode, mobile communication terminal is after receiving this note, delete the local authentication file in this authentication process, and shutdown (as shown in figure 10) automatically; And when coupling, when being judged as normal users, finishing authentication process, mobile communication terminal can normally use;
Step S713: send mobile communication terminal sign, SIM card sign, user cipher to above-mentioned authentication server with short message mode;
Step S714: authentication server judges whether mobile communication terminal sign and SIM card sign have other binding relationship, do you judge promptly whether this mobile communication terminal sign or SIM card sign bind with other SIM card or mobile communication terminal sign respectively? authentication server is preserved the authentication information in this authentication process when not having other binding relationship, finish authentication process, mobile communication terminal can normally use; And when being judged as when having binding relationship, this mobile communication terminal of mobile communication terminal prompting user with other SIM card binding, finish authentication process and shutdown (as shown in figure 11) automatically.
Among the present invention, when the user changes SIM cards of mobile phones, just can on server, finish the authentication work of validated user.Behind failed authentication, mobile phone will cut out automatically.The disabled user has obtained mobile phone like this, but can't normally use.After such mobile phone application popularization, the generation of mobile phone loss situation will be reduced to a certain extent.
And, also have the situation that validated user has many cards simultaneously in the middle of the daily life.Such user will preserve the authorization data of many combined methods by after the server authentication on server.
More existing antitheft mobile phone designs will all be lost efficacy behind disabled user's burning mobile phone again.And the present invention fully under the circumstances.Behind mobile phone burning again, all authorization datas all are kept at server end, and the disabled user still can't normally use mobile phone.
Therefore, the present invention can prevent the situation usurping mobile phone or usurp the mobile phone card, thereby has effectively prevented hand-set from stolen.
Above-described embodiment; purpose of the present invention, technical scheme and beneficial effect are further described; institute is understood that; the above only is the specific embodiment of the present invention; and be not intended to limit the scope of the invention; within the spirit and principles in the present invention all, any modification of being made, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (12)
1. the method for authenticating of a mobile communication terminal is characterized in that, described method comprises:
Obtain described mobile communication terminal sign, SIM card sign and user cipher, generate authentication information;
The authentication information that generates is sent to authentication server;
Described authentication server carries out authentication to described authentication information, generates authenticating result;
The authenticating result that generates is sent back to described mobile communication terminal;
Described mobile communication terminal judges whether the authentication success according to this authenticating result, and described mobile communication terminal can normally use when the authentication success.
2. the method for authenticating of mobile communication terminal as claimed in claim 1 is characterized in that, when described authentication is successful,
Described authentication server is stored current authentication information, and described mobile communication terminal sign, SIM card sign and user cipher are bound, and generates group binding relation;
Mobile communication terminal is stored current authentication information, and described mobile communication terminal sign, SIM card sign are bound, and generates the local authentication file.
3. the method for authenticating of mobile communication terminal as claimed in claim 2 is characterized in that, judges that whether current SIM card sign conforms to the local authentication file, makes described mobile communication terminal normally use when being judged as when conforming to.
4. the method for authenticating of mobile communication terminal as claimed in claim 3, it is characterized in that, whether judging distance authentication last time surpasses the scheduled time, as surpass this scheduled time then by as described in authentication server carry out authentication, when the authentication success, described mobile communication terminal can normally be used.
5. the method for authenticating of mobile communication terminal as claimed in claim 2, it is characterized in that, judge whether current SIM card sign conforms to the local authentication file, do not carry out authentication when being judged as when conforming to by described authentication server, and when the authentication success, described mobile communication terminal can normally be used.
6. the method for authenticating of mobile communication terminal as claimed in claim 2, it is characterized in that, described server judges that whether described mobile communication terminal sign and described SIM card sign exist other binding relationship, are judged as failed authentication when having other binding relationships.
7. the method for authenticating of mobile communication terminal as claimed in claim 1 is characterized in that, the described step of obtaining mobile communication terminal sign, SIM card sign and user cipher comprises:
The IMEI that obtains described mobile communication terminal identifies as described mobile communication terminal, and the IMSI that obtains SIM card identifies as described SIM card;
Import described user cipher.
8. the right discriminating system of a mobile communication terminal, this system comprises mobile communication terminal and authentication server, and described mobile communication terminal and described authentication server communicate by cordless communication network, it is characterized in that, and described mobile communication terminal comprises:
The authentication information generation unit is used to obtain described mobile communication terminal sign, SIM card sign and user cipher, generates authentication information;
Authentication information sending unit is used for that described authentication information is sent to described authentication server and carries out authentication;
The authentication performance element is used to receive the authenticating result that described authentication server carries out authentication, and judges whether the authentication success according to this authenticating result, when the authentication success described mobile communication terminal can normally be used.
9. the right discriminating system of mobile communication terminal as claimed in claim 8 is characterized in that,
Described server comprises: the binding relationship memory cell, and be used for when the authentication success, storing current authentication information, and described mobile communication terminal sign, SIM card sign and user cipher are bound, concern as a group binding.
10. the right discriminating system of mobile communication terminal as claimed in claim 9 is characterized in that, described authentication information generation unit comprises:
The identification code acquisition module, the IMEI that is used to obtain described mobile communication terminal identifies as described mobile communication terminal, and the IMSI that obtains SIM card identifies as described SIM card;
The password input module is used to import described user cipher.
11. the right discriminating system of mobile communication terminal as claimed in claim 8 is characterized in that, described mobile communication terminal also comprises:
The authentication file storage unit is used for storing current authentication information when the authentication success, and described mobile communication terminal sign, SIM card sign is bound, as the local authentication file;
The sign judging unit is used to judge whether current SIM card sign conforms to described local authentication file, confirms as the authentication success when conforming to.
12. the right discriminating system as any described mobile communication terminal in the claim 8 to 11 is characterized in that, described authentication information is that the form with note sends to authentication server, and described authenticating result also is that the form with note sends to mobile communication terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008101134169A CN101287298B (en) | 2008-05-29 | 2008-05-29 | Authentication method and system for mobile communication terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008101134169A CN101287298B (en) | 2008-05-29 | 2008-05-29 | Authentication method and system for mobile communication terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101287298A true CN101287298A (en) | 2008-10-15 |
CN101287298B CN101287298B (en) | 2011-06-22 |
Family
ID=40059205
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2008101134169A Expired - Fee Related CN101287298B (en) | 2008-05-29 | 2008-05-29 | Authentication method and system for mobile communication terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101287298B (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101521886B (en) * | 2009-01-21 | 2011-04-20 | 北京握奇数据系统有限公司 | Method and device for authenticating terminal and telecommunication smart card |
CN102026180A (en) * | 2009-09-15 | 2011-04-20 | 中国移动通信集团公司 | M2M transmission control method, device and system |
CN102149074A (en) * | 2011-03-16 | 2011-08-10 | 中兴通讯股份有限公司 | Method and device for locking or unlocking terminal and intelligent card |
CN102377756A (en) * | 2010-08-23 | 2012-03-14 | 中国移动通信有限公司 | Service access method and system, authentication method and system, client and authentication server |
CN102843669A (en) * | 2012-08-17 | 2012-12-26 | 中兴通讯股份有限公司 | Data access method and device |
CN102984689A (en) * | 2012-11-21 | 2013-03-20 | 东莞宇龙通信科技有限公司 | System and method for verifying mobile terminal |
CN103079187A (en) * | 2011-10-25 | 2013-05-01 | 刘艺 | Method for determining cell phone identity in IP (Internet Protocol) network |
CN103188670A (en) * | 2011-12-28 | 2013-07-03 | 希姆通信息技术(上海)有限公司 | System and method for verifying mobile terminal |
CN103281693A (en) * | 2013-05-10 | 2013-09-04 | 北京凯华网联技术有限公司 | Wireless communication authentication method, network translation equipment and terminal |
CN103765938A (en) * | 2011-09-06 | 2014-04-30 | 阿尔卡特朗讯公司 | Mobile terminal theft detection system |
CN103781058A (en) * | 2012-10-18 | 2014-05-07 | 中国电信股份有限公司 | Method and device for detecting legality of mobile terminal in CDMA network |
CN101795452B (en) * | 2009-12-24 | 2015-01-28 | 中兴通讯股份有限公司 | Method for authenticating client identification module card and terminal |
CN102056170B (en) * | 2009-11-05 | 2015-04-22 | 中国移动通信集团公司 | Mobile terminal user authentication method and system |
CN104601740A (en) * | 2014-12-22 | 2015-05-06 | 广东美的制冷设备有限公司 | Method and system for associating controlled terminal with control terminal |
CN105188046A (en) * | 2015-09-08 | 2015-12-23 | 汪吉健 | SIM-card-free mobile phone and SIM-card-free mobile phone network registration method and device |
CN105224262A (en) * | 2015-10-30 | 2016-01-06 | 深圳云聚汇数码有限公司 | Data processing method |
CN105302490A (en) * | 2015-10-30 | 2016-02-03 | 南京秦杜明视信息技术有限公司 | Data storage method |
CN105426768A (en) * | 2015-10-30 | 2016-03-23 | 深圳云聚汇数码有限公司 | Non-plaintext data storage method |
CN105577931A (en) * | 2015-12-25 | 2016-05-11 | 深圳市财富之舟科技有限公司 | International mobile equipment identifier (IMEI) code based anti-theft method |
CN105792183A (en) * | 2014-12-25 | 2016-07-20 | 宇龙计算机通信科技(深圳)有限公司 | Security protection method and device and terminal |
WO2016119343A1 (en) * | 2015-01-30 | 2016-08-04 | 北京佰才邦技术有限公司 | Data acquisition method, apparatus and system |
CN103188670B (en) * | 2011-12-28 | 2016-12-14 | 芯讯通无线科技(上海)有限公司 | Mobile terminal checking system and method |
CN106686594A (en) * | 2017-01-17 | 2017-05-17 | 北京首信科技股份有限公司 | EVDO network authentication method and device |
WO2017210934A1 (en) * | 2016-06-07 | 2017-12-14 | 宇龙计算机通信科技(深圳)有限公司 | Embedded sim card registration method, embedded sim card authentication method, and corresponding systems |
CN113286289A (en) * | 2020-01-31 | 2021-08-20 | 华为技术有限公司 | Permission confirmation method and electronic equipment |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2842059B1 (en) * | 2002-07-04 | 2004-12-24 | Cit Alcatel | METHOD FOR LOCKING A MOBILE TELECOMMUNICATION TERMINAL |
CN100484291C (en) * | 2003-05-20 | 2009-04-29 | 华为技术有限公司 | Setting method for identifying device |
CN100484329C (en) * | 2003-09-08 | 2009-04-29 | 华为技术有限公司 | A method for dynamically updating group information in cluster service |
-
2008
- 2008-05-29 CN CN2008101134169A patent/CN101287298B/en not_active Expired - Fee Related
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101521886B (en) * | 2009-01-21 | 2011-04-20 | 北京握奇数据系统有限公司 | Method and device for authenticating terminal and telecommunication smart card |
CN102026180A (en) * | 2009-09-15 | 2011-04-20 | 中国移动通信集团公司 | M2M transmission control method, device and system |
CN102056170B (en) * | 2009-11-05 | 2015-04-22 | 中国移动通信集团公司 | Mobile terminal user authentication method and system |
CN101795452B (en) * | 2009-12-24 | 2015-01-28 | 中兴通讯股份有限公司 | Method for authenticating client identification module card and terminal |
CN102377756B (en) * | 2010-08-23 | 2014-11-05 | 中国移动通信有限公司 | Service access method and system, authentication method and system, client and authentication server |
CN102377756A (en) * | 2010-08-23 | 2012-03-14 | 中国移动通信有限公司 | Service access method and system, authentication method and system, client and authentication server |
CN102149074B (en) * | 2011-03-16 | 2015-10-28 | 中兴通讯股份有限公司 | A kind of method that terminal and smart card are locked or unlock and device |
WO2012122752A1 (en) * | 2011-03-16 | 2012-09-20 | 中兴通讯股份有限公司 | Method and device for locking or unlocking terminal and smart card |
CN102149074A (en) * | 2011-03-16 | 2011-08-10 | 中兴通讯股份有限公司 | Method and device for locking or unlocking terminal and intelligent card |
US9622082B2 (en) | 2011-09-06 | 2017-04-11 | Alcatel Lucent | Mobile terminal theft detection system |
CN103765938B (en) * | 2011-09-06 | 2018-11-02 | 物源资产集团有限责任公司 | The stolen detecting system of mobile terminal |
CN103765938A (en) * | 2011-09-06 | 2014-04-30 | 阿尔卡特朗讯公司 | Mobile terminal theft detection system |
CN103079187A (en) * | 2011-10-25 | 2013-05-01 | 刘艺 | Method for determining cell phone identity in IP (Internet Protocol) network |
CN103188670A (en) * | 2011-12-28 | 2013-07-03 | 希姆通信息技术(上海)有限公司 | System and method for verifying mobile terminal |
CN103188670B (en) * | 2011-12-28 | 2016-12-14 | 芯讯通无线科技(上海)有限公司 | Mobile terminal checking system and method |
CN102843669A (en) * | 2012-08-17 | 2012-12-26 | 中兴通讯股份有限公司 | Data access method and device |
CN103781058A (en) * | 2012-10-18 | 2014-05-07 | 中国电信股份有限公司 | Method and device for detecting legality of mobile terminal in CDMA network |
CN102984689A (en) * | 2012-11-21 | 2013-03-20 | 东莞宇龙通信科技有限公司 | System and method for verifying mobile terminal |
CN102984689B (en) * | 2012-11-21 | 2017-02-15 | 东莞宇龙通信科技有限公司 | System and method for verifying mobile terminal |
CN103281693A (en) * | 2013-05-10 | 2013-09-04 | 北京凯华网联技术有限公司 | Wireless communication authentication method, network translation equipment and terminal |
CN104601740B (en) * | 2014-12-22 | 2018-04-10 | 广东美的制冷设备有限公司 | The correlating method and system of controlled terminal and control terminal |
CN104601740A (en) * | 2014-12-22 | 2015-05-06 | 广东美的制冷设备有限公司 | Method and system for associating controlled terminal with control terminal |
CN105792183A (en) * | 2014-12-25 | 2016-07-20 | 宇龙计算机通信科技(深圳)有限公司 | Security protection method and device and terminal |
WO2016119343A1 (en) * | 2015-01-30 | 2016-08-04 | 北京佰才邦技术有限公司 | Data acquisition method, apparatus and system |
CN105188046A (en) * | 2015-09-08 | 2015-12-23 | 汪吉健 | SIM-card-free mobile phone and SIM-card-free mobile phone network registration method and device |
CN105302490B (en) * | 2015-10-30 | 2018-10-09 | 四川星空奇迹科技有限公司 | Date storage method |
CN105224262A (en) * | 2015-10-30 | 2016-01-06 | 深圳云聚汇数码有限公司 | Data processing method |
CN105302490A (en) * | 2015-10-30 | 2016-02-03 | 南京秦杜明视信息技术有限公司 | Data storage method |
CN105426768A (en) * | 2015-10-30 | 2016-03-23 | 深圳云聚汇数码有限公司 | Non-plaintext data storage method |
CN105426768B (en) * | 2015-10-30 | 2019-01-08 | 深圳云聚汇数码有限公司 | Ciphertext date storage method |
CN105577931A (en) * | 2015-12-25 | 2016-05-11 | 深圳市财富之舟科技有限公司 | International mobile equipment identifier (IMEI) code based anti-theft method |
CN105577931B (en) * | 2015-12-25 | 2020-07-28 | 深圳市沃特沃德股份有限公司 | IMEI code-based anti-theft method |
WO2017210934A1 (en) * | 2016-06-07 | 2017-12-14 | 宇龙计算机通信科技(深圳)有限公司 | Embedded sim card registration method, embedded sim card authentication method, and corresponding systems |
CN106686594A (en) * | 2017-01-17 | 2017-05-17 | 北京首信科技股份有限公司 | EVDO network authentication method and device |
CN113286289A (en) * | 2020-01-31 | 2021-08-20 | 华为技术有限公司 | Permission confirmation method and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN101287298B (en) | 2011-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101287298B (en) | Authentication method and system for mobile communication terminal | |
CN101141721B (en) | Safety mobile telephone based communication custom | |
CN100559800C (en) | Honeycomb telephone device and method | |
CN102137389B (en) | Multi-card mobile terminal and method for transferring data of SIM card | |
CN100367814C (en) | Mobile communication terminal for protecting private contents and method for controlling the same | |
EP0704140B1 (en) | Telecommunications system | |
CN106340087A (en) | Intelligent switch lock system based on intelligent mobile terminal | |
CN101808151B (en) | Mobile device with enhanced telephone call information and method of using same | |
US8355699B1 (en) | Method of preventing data of mobile phone from being stolen | |
CN101155212A (en) | Method for limiting use of mobile terminal | |
CN101163290A (en) | Method of limiting use of mobile terminal through machine-card mutual authentication | |
US20030181219A1 (en) | Method of indicating unauthorized use of a mobile terminal | |
CN103188377A (en) | Anti-theft method of mobile terminal and anti-theft mobile terminal | |
CN101552988A (en) | Terminal protecting methdo and system | |
CN1882131A (en) | Method for protecting stolen handset telephone directory | |
CN102316407A (en) | Mobile phone and mobile phone stolen tracking method | |
CN101640881A (en) | Method and system for remote control and mobile terminal | |
CN101610500A (en) | Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system | |
CN101005654A (en) | Split radio telephone hand set | |
CN101296422A (en) | Data backup method, short message platform and client terminal | |
CN101330692A (en) | Mobile phone with lose-proof function and method for preventing mobile phone from losing | |
CN1984404A (en) | Method for destroying terminal information | |
CN101877739A (en) | Safe mobile phone and implementation method thereof | |
CN101895829A (en) | Method and system for retrieving FLASH data from mobile telephone, and mobile telephone | |
CN101227683B (en) | Mobile terminal, system and method for securing data information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent for invention or patent application | ||
CB03 | Change of inventor or designer information |
Inventor after: Chang Cun Inventor after: Chen Jun Inventor before: Chen Jun |
|
COR | Change of bibliographic data |
Free format text: CORRECT: INVENTOR; FROM: CHEN JUN TO: CHANG CUN CHEN JUN |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110622 Termination date: 20120529 |