CN101287298B - Authentication method and system for mobile communication terminal - Google Patents

Authentication method and system for mobile communication terminal Download PDF

Info

Publication number
CN101287298B
CN101287298B CN2008101134169A CN200810113416A CN101287298B CN 101287298 B CN101287298 B CN 101287298B CN 2008101134169 A CN2008101134169 A CN 2008101134169A CN 200810113416 A CN200810113416 A CN 200810113416A CN 101287298 B CN101287298 B CN 101287298B
Authority
CN
China
Prior art keywords
authentication
communication terminal
mobile communication
sign
sim card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2008101134169A
Other languages
Chinese (zh)
Other versions
CN101287298A (en
Inventor
常存
陈军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Techfaith Wireless Communication Technology Ltd
Original Assignee
China Techfaith Wireless Communication Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Techfaith Wireless Communication Technology Ltd filed Critical China Techfaith Wireless Communication Technology Ltd
Priority to CN2008101134169A priority Critical patent/CN101287298B/en
Publication of CN101287298A publication Critical patent/CN101287298A/en
Application granted granted Critical
Publication of CN101287298B publication Critical patent/CN101287298B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an authentication method of a mobile communication terminal and a system thereof. The authentication method of the invention comprises the steps that: the identifier of the mobile communication terminal, an SIM card identifier and password for a subscriber are first obtained to generate authentication information; the generated authentication information is then sent to an authentication server which carries out the authentication to the authentication information to obtain the authentication result; the authentication result is finally sent back to the mobile communication terminal; the mobile communication terminal judges whether the authentication is successful or not according to the authentication result and the mobile communication terminal can be normally operated when the authentication is successful. In the method of the invention, when the subscriber changes the SIM card of a mobile phone, the authentication of a legal subscriber can be accomplished on the server and an illegal subscriber still fails to use the mobile phone normally even the phone re-burns records. Therefore, the authentication method of the invention can prevent the situations such as the stealing of mobile phones or phone cards, which results in that the mobile phone can be avoided being stolen.

Description

A kind of method for authenticating of mobile communication terminal and system
Technical field
The present invention is relevant for wireless communication technology field, and the terminal equipment in the wireless network is a kind of method for authenticating and system of mobile communication terminal specifically.
Background technology
At present, along with the continuous development of digital technology, various digital electronic products more and more with its strong functions and fast, operation easily attracts user's eyeball.
For example, the consumer except the outward appearance of paying attention to its personalization, fashion-orientation, strong functions that mobile phone has and simple operation also are the important factors that left and right sides consumers select mobile phone when selecting mobile phone.
And along with powerfulization of self function of mobile phone, the user more and more relies on mobile phone, a lot of important informations and file all are stored in mobile phone or carry out various business activities by mobile phone, and promptly mobile phone has been played the part of indispensable key player in people's work and life.
Yet, because mobile phone expensive, adding that huge interests order about, the lawless person is dried to have played the illegal trade such as the personal or second-hand market of reselling of pilferage mobile phone, and mobile phone holder's interests that these behaviors are badly damaged make that the mobile phone holder is hard to guard against.And losing of mobile phone not only can be brought the certain economic loss to the user, and probably be caused no small trouble to the user.
Therefore, inquire into and how to prevent hand-set from stolen, how to reduce loss behind user's lost mobile phone, how to prevent that the vital document in the mobile phone is stolen, be the problem that those skilled in the art study always.
And a kind of antitheft mobile phone technology that has disclosed at present is to adopt on mobile phone input password to come the method for authentication user, however these mobile phones behind disabled user's burning mobile phone again, will all lose efficacy, therefore can't reach antitheft purpose well.
In addition, present also the announcement has a kind of technology with SIM card and handset binding.Be about to a unique SIM card and bind with a unique mobile phone, owing to the disabled user must change SIM card after stealing mobile phone, and stolen mobile phone is bound with SIM card before, even so the disabled user stolen mobile phone and can not use.Should it can't normally be used so also can't resell, thereby reduced hand-set from stolen to a certain extent by making stolen mobile phone lose its function.
Yet, this mobile phone can only be bound with a SIM, therefore just the problem that can't use has appearred when the user need use other SIM on this mobile phone when, and it is same with existing other antitheft mobile phone technology, behind disabled user's burning mobile phone again, the original setting of mobile phone will all be lost efficacy, and therefore also can't reach antitheft purpose well.
Therefore, even just need a kind of disabled user again behind the burning mobile phone, can not make the disabled user normally use the technology of mobile phone, to reduce hand-set from stolen.
At this, " a kind of antitheft mobile phone and theft preventing method thereof " patent documentation of quoting the Chinese patent publication number and being CN1780435A is as prior art of the present invention.
Summary of the invention
The object of the present invention is to provide a kind of method for authenticating of mobile communication terminal, can effectively solve the problem that hand-set from stolen is used.
Another object of the present invention is to provide a kind of right discriminating system of mobile communication terminal, solve the problem that the disabled user still can normally use behind the burning stolen mobile phone again by communicating by letter between mobile phone and the server.
In order to realize the purpose of the invention described above, the embodiment of the invention provides a kind of method for authenticating of mobile communication terminal, and this method comprises: obtain described mobile communication terminal sign, SIM card sign and user cipher, generate authentication information; Described authentication information is carried out authentication, generate authenticating result; Carry out corresponding operation according to this authenticating result.
In order to realize another purpose of the invention described above, another embodiment of the present invention provides a kind of right discriminating system of mobile communication terminal, this system comprises mobile communication terminal and authentication server, described mobile communication terminal and described authentication server communicate by cordless communication network, described mobile communication terminal comprises: the authentication information generation unit, be used to obtain described mobile communication terminal sign, SIM card sign and user cipher, generate authentication information; Authentication information sending unit is used for that described authentication information is sent to described authentication server and carries out authentication; The authentication performance element is used to receive the authenticating result that described authentication server carries out, and carries out corresponding operation according to this authenticating result.
Among the present invention, when the user changes SIM cards of mobile phones, just can on server, finish the authentication work of validated user.Behind failed authentication, mobile phone will cut out automatically.The disabled user has obtained mobile phone like this, but can't normally use.After such mobile phone application popularization, the generation of mobile phone loss situation will be reduced to a certain extent.
And, also have the situation that validated user has many cards simultaneously in the middle of the daily life.Such user will preserve the authorization data of many combined methods by after the server authentication on server.
More existing antitheft mobile phone designs will all be lost efficacy behind disabled user's burning mobile phone again.And the present invention fully under the circumstances.Behind mobile phone burning again, all authorization datas all are kept at server end, and the disabled user still can't normally use mobile phone.
Therefore, the present invention can prevent the situation usurping mobile phone or usurp the mobile phone card, thereby has effectively prevented hand-set from stolen.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, does not constitute limitation of the invention.In the accompanying drawings:
The schematic diagram of the right discriminating system of the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 1 is.
The structured flowchart of the right discriminating system of the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 2 is.
The flow chart of the method for authenticating of the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 3 is.
One of schematic diagram when the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 4 is carries out authentication ().
Schematic diagram when the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 5 is carries out authentication (two).
The structured flowchart of the right discriminating system of the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 6 is.
The flow chart of the method for authenticating of the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 7 is.
One of schematic diagram when the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 8 is carries out authentication ().
Schematic diagram when the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 9 is carries out authentication (two).
Schematic diagram when the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 10 is carries out authentication (three).
Schematic diagram when the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 11 is carries out authentication (four).
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer,, the present invention is described in further details below in conjunction with execution mode and accompanying drawing.At this, exemplary embodiment of the present invention and explanation thereof are used to explain the present invention, but not as a limitation of the invention.
The embodiment of the invention provides a kind of right discriminating system of mobile communication terminal.The present invention is described in detail below in conjunction with accompanying drawing.
Embodiment 1
The schematic diagram of the right discriminating system of the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 1 is, the structured flowchart of the right discriminating system of the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 2 is, wherein mobile communication terminal (present embodiment is a mobile phone) 101 communicates by cordless communication network 103 and authentication server 102, wherein the mobile communication terminal of embodiments of the invention 1 comprises radio frequency unit, baseband circuit, the MCU control circuit, keyboard, display, this mobile communication terminal also comprises: authentication information generation unit 104, be used to obtain the mobile communication terminal sign, SIM card sign and user cipher generate authentication information; Authentication information sending unit 105 is used for that above-mentioned authentication information is sent to above-mentioned authentication server and carries out authentication; Authentication performance element 106 is used to receive the authenticating result that above-mentioned authentication server carries out, and carries out corresponding operation according to this authenticating result.
The flow chart of the method for authenticating of the mobile communication terminal of the embodiment of the invention 1 that shown in Figure 3 is below describes the authentication process of the mobile communication terminal of the embodiment of the invention 1 in detail with reference to Fig. 3.
At first, the user inserts start (step S101) behind the SIM in mobile phone 101, at first the authentication information generation unit 104 of mobile phone 101 obtains sign, SIM card sign and the user cipher of mobile phone, as authentication information (step S102), wherein mobile phone 101 obtains the sign of the IMEI of mobile phone as above-mentioned mobile phone 101 automatically, the IMSI that obtains SIM card identifies as above-mentioned SIM card, and obtaining of above-mentioned user cipher is to import on mobile phone 101 by the user to finish (as shown in Figure 4).
Then, whether mobile phone 101 carries out authentication (step S103) (as shown in Figure 5) to user prompt to authentication server, when the user selects "Yes", authentication information sending unit 105 sends to above-mentioned authentication server 102 with above-mentioned authentication information and carries out authentication (step S104), and mobile phone 101 is in the odd-job pattern to user prompt user current phone when the user selects "No", will close (step S105) automatically after 1 hour.
Above-mentioned authentication server 102 carries out authentication (step S104) according to above-mentioned authentication information, judge the sign of current phone 101, whether SIM card sign and user cipher mate, promptly judge whether to be normal users (step S106)? when being judged as when not being normal users, authentication server 102 sends to mobile phone 101 with disabled user's authenticating result, make mobile phone 101 shut down automatically (step S107), when being judged as when being normal users, authentication server 102 sends to mobile phone 101 with the authenticating result of normal users, and add current authentication information on the authentication server 102 (step S108), mobile phone 101 can normally use (step S109) after receiving the authenticating result of above-mentioned normal users.
Wherein, above-mentioned authentication information is that form with note sends to authentication server 102 from mobile phone 101 by cordless communication network 103 in the embodiment of the invention 1, sends to mobile phone 101 from authentication server 102 by cordless communication network 103 and authenticating result also is a form with note.
In addition, the method for authenticating of mobile communication terminal of the present invention comprises: obtain above-mentioned mobile communication terminal sign, SIM card sign and user cipher, generate authentication information; The authentication information that generates is sent to authentication server; Above-mentioned authentication server carries out authentication to above-mentioned authentication information, generates authenticating result; The authenticating result that generates is sent back to above-mentioned mobile communication terminal; Above-mentioned mobile communication terminal judges whether the authentication success according to this authenticating result, and above-mentioned mobile communication terminal can normally use when the authentication success.
And when above-mentioned authentication was successful, above-mentioned authentication server was stored current authentication information, and above-mentioned mobile communication terminal sign, SIM card sign and user cipher are bound, and generated group binding relation; Mobile communication terminal is stored current authentication information, and above-mentioned mobile communication terminal sign, SIM card sign are bound, and generates the local authentication file.
And in the present embodiment, to judge also that before authentication whether current SIM card sign conforms to the local authentication file, makes above-mentioned mobile communication terminal normally use when being judged as when conforming to; And carry out authentication by above-mentioned authentication server when not conforming to, and when the authentication success, above-mentioned mobile communication terminal can normally be used when being judged as.
The method for authenticating of present embodiment is that server judges that whether above-mentioned mobile communication terminal sign and above-mentioned SIM card sign exist other binding relationship, are judged as failed authentication when having other binding relationships.For example under the correct situation of user cipher, if there is other binding relationship in SIM card, and mobile phone authentication success when not having other binding relationships; And mobile phone and SIM card are failed authentication when having other binding relationships simultaneously.Therefore embodiments of the invention 1 can be expanded on the basis of existing hardware facility, thereby effectively prevent hand-set from stolen under the situation that does not increase expense owing to be that form with note sends authentication information and authenticating result.
Embodiment 2
The structured flowchart of the right discriminating system of the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 6 is, wherein mobile communication terminal comprises radio frequency unit, baseband circuit, MCU control circuit, keyboard, display, this mobile communication terminal also comprises: identification code acquiring unit 301, the IMEI that is used to obtain mobile communication terminal identifies as mobile communication terminal, and the IMSI that obtains SIM card identifies as SIM card; User cipher input unit 302 is used to import user cipher; Authentication information sending unit 303 is used for above-mentioned mobile communication terminal sign, SIM card sign and user cipher are sent to authentication server as authentication information, carries out authentication; Authentication performance element 306 is used to receive the authenticating result that above-mentioned authentication server carries out, and carries out corresponding operation according to this authenticating result; Authentication file storage unit 304 is used to store above-mentioned mobile communication terminal sign of carrying out authentication and the corresponding relation that SIM card identifies; The sign judging unit, be used to judge that current mobile communication terminal sign and SIM card identify whether satisfies above-mentioned authentication file storage unit institute stored relation, if satisfy above-mentioned corresponding relation, then authentication performance element 306 is confirmed as normal users with the active user; And identify when not satisfying above-mentioned corresponding relation when being judged as current mobile communication terminal sign and SIM card, authentication server to above-mentioned mobile communication terminal identify, SIM card sign and user cipher carry out authentication, mobile communication terminal is judged normal users or disabled user according to the authenticating result that above-mentioned authentication server carries out authentication, when being normal users, authentication performance element 306 makes the mobile communication terminal operate as normal, when being illegal user, authentication performance element 306 sends instruction shuts down mobile communication terminal automatically.
The mobile communication terminal of present embodiment 2 comprises that also corresponding relation searches unit (not shown), it searches the corresponding relation that whether has current mobile communication terminal and SIM in above-mentioned corresponding relation, when not storing any corresponding relation, if carrying out the authenticating result of authentication according to above-mentioned authentication information is normal users, the corresponding relation of current mobile communication terminal sign of then above-mentioned authentication file storage unit 304 storages and SIM card sign, above-mentioned authentication server is preserved current authentication information.
Wherein, when in above-mentioned authentication file storage unit 304, not storing any above-mentioned corresponding relation, if carrying out the authenticating result of authentication according to above-mentioned authentication information is normal users, the corresponding relation of current mobile communication terminal sign of then above-mentioned authentication file storage unit 304 storages and SIM card sign, above-mentioned authentication server is preserved above-mentioned authentication information.
The flow chart of the method for authenticating of the mobile communication terminal of the embodiment of the invention 2 that shown in Figure 7 is below describes the authentication process of the mobile communication terminal of the embodiment of the invention 2 in detail with reference to Fig. 7.
Step S701: at first, the user starts shooting insert SIM in mobile communication terminal after;
Step S702: when mobile communication terminal the time judges whether to exist in this locality the authentication file earlier in start, promptly judge the authentication file that whether stores on the mobile communication terminal in the past, step below when having the authentication file, continuing in this locality, when not having the authentication file, forward step S713 in this locality;
Step S703: then, do you judge that the SIM card sign of inserting conforms to the authentication file of above-mentioned this locality? step below when this SIM card sign does not conform to the authentication file of above-mentioned this locality, continuing, when this SIM card sign conforms to the authentication file of above-mentioned this locality, forward step S709 to;
Step S704: whether mobile communication terminal prompting user carries out authentication to authentication server, when the user selects "Yes", step below continuing, and when the user selected "No", mobile communication terminal prompting user current phone was in the odd-job pattern, will close automatically after 1 hour (as shown in Figure 8), the user can only carry out shirtsleeve operation to this mobile communication terminal, for example check calendar etc., and can not dial, receive calls etc., and will shut down automatically later at 1 hour.
Step S705: with way of short messages with above-mentioned mobile communication terminal identify, SIM card sign, user cipher send on the above-mentioned authentication server;
Step S706: carry out authentication by authentication server, do you judge that promptly above-mentioned mobile communication terminal sign, SIM card sign, user cipher mate? being judged as when not matching is illegal user, disabled user's authenticating result is sent to mobile communication terminal with short message mode, and mobile communication terminal will shut down after receiving this note automatically; And when coupling the time is judged as normal users, the step below continuing;
Step S707: authentication server is changed or is added new mobile phone logo, SIM card sign, the triangular authentication relation of user cipher, and the step below continuing;
Step S708: finish authentication process, mobile communication terminal can normally use (as shown in Figure 9);
Step S709: mobile communication terminal is judged, whether the authentication time of current SIM card is above 30 days, promptly apart from last time authentication whether greater than 30 days, step below when surpassing 30 days, continuing, this SIM card is judged as is normal users to mobile communication terminal when not surpassing 30 days, and the end authentication process, mobile communication terminal can normally use;
Step S710: judge that whether mobile communication terminal is at last net state, when not at last net state, finish authentication process, mobile communication terminal can carry out and the irrelevant business of service on net, step below when at last net state, continuing, the wherein said herein net state of going up is meant and can communicates by cordless communication network and wireless communication server;
Step S711: send mobile communication terminal sign, SIM card sign, user cipher to above-mentioned authentication server by network;
Step S712: carry out authentication by authentication server, do you judge that promptly above-mentioned mobile communication terminal sign, SIM card sign, user cipher mate? when not matching, being judged as is illegal user, disabled user's authenticating result is sent to mobile communication terminal with short message mode, mobile communication terminal is after receiving this note, delete the local authentication file in this authentication process, and shutdown (as shown in figure 10) automatically; And when coupling, when being judged as normal users, finishing authentication process, mobile communication terminal can normally use;
Step S713: send mobile communication terminal sign, SIM card sign, user cipher to above-mentioned authentication server with short message mode;
Step S714: authentication server judges whether mobile communication terminal sign and SIM card sign have other binding relationship, do you judge promptly whether this mobile communication terminal sign or SIM card sign bind with other SIM card or mobile communication terminal sign respectively? authentication server is preserved the authentication information in this authentication process when not having other binding relationship, finish authentication process, mobile communication terminal can normally use; And when being judged as when having binding relationship, this mobile communication terminal of mobile communication terminal prompting user with other SIM card binding, finish authentication process and shutdown (as shown in figure 11) automatically.
Among the present invention, when the user changes SIM cards of mobile phones, just can on server, finish the authentication work of validated user.Behind failed authentication, mobile phone will cut out automatically.The disabled user has obtained mobile phone like this, but can't normally use.After such mobile phone application popularization, the generation of mobile phone loss situation will be reduced to a certain extent.
And, also have the situation that validated user has many cards simultaneously in the middle of the daily life.Such user will preserve the authorization data of many combined methods by after the server authentication on server.
More existing antitheft mobile phone designs will all be lost efficacy behind disabled user's burning mobile phone again.And the present invention fully under the circumstances.Behind mobile phone burning again, all authorization datas all are kept at server end, and the disabled user still can't normally use mobile phone.
Therefore, the present invention can prevent the situation usurping mobile phone or usurp the mobile phone card, thereby has effectively prevented hand-set from stolen.
Above-described embodiment; purpose of the present invention, technical scheme and beneficial effect are further described; institute is understood that; the above only is the specific embodiment of the present invention; and be not intended to limit the scope of the invention; within the spirit and principles in the present invention all, any modification of being made, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. the method for authenticating of a mobile communication terminal is characterized in that, described method comprises:
Obtain described mobile communication terminal sign, SIM card sign and user cipher, generate authentication information;
The authentication information that generates is sent to authentication server;
Described authentication server carries out authentication to described authentication information, generates authenticating result;
The authenticating result that generates is sent back to described mobile communication terminal;
Described mobile communication terminal judges whether the authentication success according to this authenticating result, and described mobile communication terminal can normally use when the authentication success;
Wherein when described authentication was successful, mobile communication terminal was stored current authentication information, and described mobile communication terminal sign, SIM card sign are bound, and generated the local authentication file; Judge that whether current SIM card sign conforms to the local authentication file, makes described mobile communication terminal normally use when being judged as when conforming to.
2. the method for authenticating of mobile communication terminal as claimed in claim 1 is characterized in that, when described authentication is successful,
Described authentication server is stored current authentication information, and described mobile communication terminal sign, SIM card sign and user cipher are bound, and generates group binding relation.
3. the method for authenticating of mobile communication terminal as claimed in claim 1, it is characterized in that, whether judging distance authentication last time surpasses the scheduled time, as surpass this scheduled time then by as described in authentication server carry out authentication, when the authentication success, described mobile communication terminal can normally be used.
4. the method for authenticating of mobile communication terminal as claimed in claim 1, it is characterized in that, judge whether current SIM card sign conforms to the local authentication file, do not carry out authentication when being judged as when conforming to by described authentication server, and when the authentication success, described mobile communication terminal can normally be used.
5. the method for authenticating of mobile communication terminal as claimed in claim 1, it is characterized in that, described server judges that whether described mobile communication terminal sign and described SIM card sign exist other binding relationship, are judged as failed authentication when having other binding relationships.
6. the method for authenticating of mobile communication terminal as claimed in claim 1 is characterized in that, the described step of obtaining mobile communication terminal sign, SIM card sign and user cipher comprises:
The IMEI that obtains described mobile communication terminal identifies as described mobile communication terminal, and the IMSI that obtains SIM card identifies as described SIM card;
Import described user cipher.
7. the right discriminating system of a mobile communication terminal, this system comprises mobile communication terminal and authentication server, and described mobile communication terminal and described authentication server communicate by cordless communication network, it is characterized in that, and described mobile communication terminal comprises:
The authentication information generation unit is used to obtain described mobile communication terminal sign, SIM card sign and user cipher, generates authentication information;
Authentication information sending unit is used for that described authentication information is sent to described authentication server and carries out authentication;
The authentication performance element is used to receive the authenticating result that described authentication server carries out authentication, and judges whether the authentication success according to this authenticating result, when the authentication success described mobile communication terminal can normally be used;
The authentication file storage unit is used for storing current authentication information when the authentication success, and described mobile communication terminal sign, SIM card sign is bound, as the local authentication file;
The sign judging unit is used to judge whether current SIM card sign conforms to described local authentication file, confirms as the authentication success when conforming to.
8. the right discriminating system of mobile communication terminal as claimed in claim 7 is characterized in that,
Described server comprises: the binding relationship memory cell, and be used for when the authentication success, storing current authentication information, and described mobile communication terminal sign, SIM card sign and user cipher are bound, concern as a group binding.
9. the right discriminating system of mobile communication terminal as claimed in claim 7 is characterized in that, described authentication information generation unit comprises:
The identification code acquisition module, the IMEI that is used to obtain described mobile communication terminal identifies as described mobile communication terminal, and the IMSI that obtains SIM card identifies as described SIM card;
The password input module is used to import described user cipher.
10. as the right discriminating system of any described mobile communication terminal in the claim 7 to 9, it is characterized in that described authentication information is that the form with note sends to authentication server, described authenticating result also is that the form with note sends to mobile communication terminal.
CN2008101134169A 2008-05-29 2008-05-29 Authentication method and system for mobile communication terminal Expired - Fee Related CN101287298B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101134169A CN101287298B (en) 2008-05-29 2008-05-29 Authentication method and system for mobile communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101134169A CN101287298B (en) 2008-05-29 2008-05-29 Authentication method and system for mobile communication terminal

Publications (2)

Publication Number Publication Date
CN101287298A CN101287298A (en) 2008-10-15
CN101287298B true CN101287298B (en) 2011-06-22

Family

ID=40059205

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101134169A Expired - Fee Related CN101287298B (en) 2008-05-29 2008-05-29 Authentication method and system for mobile communication terminal

Country Status (1)

Country Link
CN (1) CN101287298B (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101521886B (en) * 2009-01-21 2011-04-20 北京握奇数据系统有限公司 Method and device for authenticating terminal and telecommunication smart card
CN102026180A (en) * 2009-09-15 2011-04-20 中国移动通信集团公司 M2M transmission control method, device and system
CN102056170B (en) * 2009-11-05 2015-04-22 中国移动通信集团公司 Mobile terminal user authentication method and system
CN101795452B (en) * 2009-12-24 2015-01-28 中兴通讯股份有限公司 Method for authenticating client identification module card and terminal
CN102377756B (en) * 2010-08-23 2014-11-05 中国移动通信有限公司 Service access method and system, authentication method and system, client and authentication server
CN102149074B (en) * 2011-03-16 2015-10-28 中兴通讯股份有限公司 A kind of method that terminal and smart card are locked or unlock and device
FR2979783B1 (en) * 2011-09-06 2013-08-23 Alcatel Lucent MOBILE TERMINAL FLIGHT DETECTION SYSTEM
CN103079187A (en) * 2011-10-25 2013-05-01 刘艺 Method for determining cell phone identity in IP (Internet Protocol) network
CN102843669B (en) * 2012-08-17 2019-03-15 中兴通讯股份有限公司 Data access method and device
CN103781058A (en) * 2012-10-18 2014-05-07 中国电信股份有限公司 Method and device for detecting legality of mobile terminal in CDMA network
CN102984689B (en) * 2012-11-21 2017-02-15 东莞宇龙通信科技有限公司 System and method for verifying mobile terminal
CN103281693A (en) * 2013-05-10 2013-09-04 北京凯华网联技术有限公司 Wireless communication authentication method, network translation equipment and terminal
CN104601740B (en) * 2014-12-22 2018-04-10 广东美的制冷设备有限公司 The correlating method and system of controlled terminal and control terminal
CN105792183A (en) * 2014-12-25 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Security protection method and device and terminal
CN105992245B (en) * 2015-01-30 2019-11-08 北京佰才邦技术有限公司 Data capture method, apparatus and system
CN105188046A (en) * 2015-09-08 2015-12-23 汪吉健 SIM-card-free mobile phone and SIM-card-free mobile phone network registration method and device
CN105224262A (en) * 2015-10-30 2016-01-06 深圳云聚汇数码有限公司 Data processing method
CN105426768B (en) * 2015-10-30 2019-01-08 深圳云聚汇数码有限公司 Ciphertext date storage method
CN105302490B (en) * 2015-10-30 2018-10-09 四川星空奇迹科技有限公司 Date storage method
CN105577931B (en) * 2015-12-25 2020-07-28 深圳市沃特沃德股份有限公司 IMEI code-based anti-theft method
CN105848153A (en) * 2016-06-07 2016-08-10 宇龙计算机通信科技(深圳)有限公司 Embedded type SIM card registration method, embedded type SIM card authentication method and corresponding systems
CN106686594A (en) * 2017-01-17 2017-05-17 北京首信科技股份有限公司 EVDO network authentication method and device
CN113286289A (en) * 2020-01-31 2021-08-20 华为技术有限公司 Permission confirmation method and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1469674A (en) * 2002-07-04 2004-01-21 ���Ͽع����޹�˾ Method for locking mobile telecommunication terminal
CN1549637A (en) * 2003-05-20 2004-11-24 ��Ϊ�������޹�˾ Setting method for identifying device
CN1595999A (en) * 2003-09-08 2005-03-16 华为技术有限公司 A method for dynamically updating group information in cluster service

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1469674A (en) * 2002-07-04 2004-01-21 ���Ͽع����޹�˾ Method for locking mobile telecommunication terminal
CN1549637A (en) * 2003-05-20 2004-11-24 ��Ϊ�������޹�˾ Setting method for identifying device
CN1595999A (en) * 2003-09-08 2005-03-16 华为技术有限公司 A method for dynamically updating group information in cluster service

Also Published As

Publication number Publication date
CN101287298A (en) 2008-10-15

Similar Documents

Publication Publication Date Title
CN101287298B (en) Authentication method and system for mobile communication terminal
CN101141721B (en) Safety mobile telephone based communication custom
CN100559800C (en) Honeycomb telephone device and method
CN100367814C (en) Mobile communication terminal for protecting private contents and method for controlling the same
EP0704140B1 (en) Telecommunications system
EP1601216B1 (en) Mobile communication terminal
CN100563391C (en) The method of mobile communications terminal data protection, system and equipment
CN101808151B (en) Mobile device with enhanced telephone call information and method of using same
CN106340087A (en) Intelligent switch lock system based on intelligent mobile terminal
US8355699B1 (en) Method of preventing data of mobile phone from being stolen
CN201178476Y (en) Mobile phone without need of inserting customer recognition card
CN101409881A (en) Secrecy apparatus and method for mobile phone data
CN103188377A (en) Anti-theft method of mobile terminal and anti-theft mobile terminal
CN101552988A (en) Terminal protecting methdo and system
CN1882131A (en) Method for protecting stolen handset telephone directory
CN102316407A (en) Mobile phone and mobile phone stolen tracking method
CN101287247A (en) Method for binding mobile phone to telephone card and anti-theft method for mobile phone
CN101610500A (en) Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system
CN101005654A (en) Split radio telephone hand set
CN101296422A (en) Data backup method, short message platform and client terminal
CN101330692A (en) Mobile phone with lose-proof function and method for preventing mobile phone from losing
CN1984404A (en) Method for destroying terminal information
CN101877739A (en) Safe mobile phone and implementation method thereof
CN101895829A (en) Method and system for retrieving FLASH data from mobile telephone, and mobile telephone
CN101645878A (en) Method, system and mobile communication terminal for logging in network service

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB03 Change of inventor or designer information

Inventor after: Chang Cun

Inventor after: Chen Jun

Inventor before: Chen Jun

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: CHEN JUN TO: CHANG CUN CHEN JUN

C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110622

Termination date: 20120529