CN101370288B - Network locking method and terminal - Google Patents

Network locking method and terminal Download PDF

Info

Publication number
CN101370288B
CN101370288B CN2008101423370A CN200810142337A CN101370288B CN 101370288 B CN101370288 B CN 101370288B CN 2008101423370 A CN2008101423370 A CN 2008101423370A CN 200810142337 A CN200810142337 A CN 200810142337A CN 101370288 B CN101370288 B CN 101370288B
Authority
CN
China
Prior art keywords
lock
online article
article spare
terminal
net
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008101423370A
Other languages
Chinese (zh)
Other versions
CN101370288A (en
Inventor
王�锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Device Co Ltd
Huawei Device Shenzhen Co Ltd
Original Assignee
Huawei Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Device Co Ltd filed Critical Huawei Device Co Ltd
Priority to CN2008101423370A priority Critical patent/CN101370288B/en
Publication of CN101370288A publication Critical patent/CN101370288A/en
Application granted granted Critical
Publication of CN101370288B publication Critical patent/CN101370288B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a lock net method and terminal for solving problem that lock net in prior art requires dedicated software and complex operations. The method includes steps of: judging whether there is lock net files in temporary internet files, if not, judging whether there is lock net files in special files; if so, judging whether the lock net mark in the lock net files is set, if so, executing the lock net according to lock net information in the lock net files. Correspondingly, the invention further provides a terminal that implements the method. The embodiment of the invention realizes to execute the lock net according to lock net file through setting temporary internet files and special files in the terminal, which is prone to realize and convenient for users or test personnel.

Description

A kind of net locking method and terminal
Technical field
The present invention relates to the mobile communication application field, particularly a kind of net locking method and terminal.
Background technology
Cell phone network operator need control mobile phone with the mode of cell phone network lock and can only use in particular network in order to realize the control to mobile phone, and such technology is called the lock net.In order to make the cellphone subscriber use mobile phone can revise the network of use after a period of time, need again mobile phone is removed the network lock restriction.
Prior art is defined as locking network mark with certain address bit of mobile phone memory and knows the position, burn the lock network No. by lock net software to mobile phone after, will lock position, network mark will position.Behind the lock position, network mark will position, mobile phone no longer responds the operation of burning number, does not promptly allow the number of changing, and has so also just realized controlling the network segment of the use of mobile phone.Release regularly, some information PSNUM or PSID by mobile phone produce unlocking pin or use the right of approval sign indicating number, allow the back input comprise the instruction of unlocking pin, the mobile phone checking command is removed by the back and is locked network mark will, writes non-lock network No. then to mobile phone.
The inventor is in realizing process of the present invention, and there are the following problems at least to find prior art: the specific software that prior art lock net is conciliate locking to be needed to rely on the PC realizes that the tool management difficulty is big, and fail safe is lower.
Summary of the invention
Unlock method that the embodiment of the invention provides and terminal have solved and have realized in the prior art that the lock net need utilize the problem of specific software, complex management.
A kind of unlock method that the embodiment of the invention provides comprises:
Whether judge has lock online article spare, if do not have, judge whether described lock online article spare is arranged in the special folder in the temporary folder;
If described lock online article spare is arranged in the described special folder, judge the whether set of lock net flag bit in the described lock online article spare, if set, then according to the lock of the lock net information and executing in described lock online article spare net.
Correspondingly, the embodiment of the invention also provides a kind of terminal that realizes this unlock method, comprising:
First judge module, whether have lock online article spare, and when judgement does not have, notify second judge module if being used for temporary folder;
Described second judge module is used for the notice according to described first judge module, judges whether described lock online article spare is arranged in the special folder, if having, and notice lock net module;
Described lock net module is used for the notice according to described second judge module, judges the whether set of lock net flag bit in the described lock online article spare, if set, then according to the lock of the lock net information and executing in described lock online article spare net.
By such scheme as can be seen, unlock method that the embodiment of the invention provides and terminal by whether lock online article spare is arranged in the temporary folder, if do not have, judge whether described lock online article spare is arranged in the special folder; If in the described special folder described lock online article spare is arranged, judge the whether set of lock net flag bit in the described lock online article spare, if set, then according to the lock of the lock net information and executing in described lock online article spare net, realized easy lock net management, made things convenient for clothes or tester.
Description of drawings
Fig. 1 is the schematic flow sheet of the embodiment of the invention one net locking method;
Fig. 2 is the schematic flow sheet of the embodiment of the invention two net locking methods;
Fig. 3 is the structural representation of the embodiment of the invention three terminals;
Fig. 4 is the structural representation of the embodiment of the invention four terminals.
Embodiment
Net locking method that the embodiment of the invention provides and terminal have solved and have realized in the prior art that the lock net need utilize the problem of specific software, complex management, be easy to realize and the user with clothes or tester.Specified below in conjunction with accompanying drawing.
Fig. 1 is the schematic flow sheet of the embodiment of the invention one net locking method, and this method comprises:
101, judge whether lock online article spare is arranged,, judge whether described lock online article spare is arranged in the special folder in the temporary folder if do not have;
102, if in the described special folder described lock online article spare is arranged, judge the whether set of lock net flag bit in the described lock online article spare,
103, if set is then locked net according to the lock net information and executing in the described lock online article spare.
In the above-mentioned steps; temporary folder is a visible mutation folder in the terminal system file, and special folder is the sightless zone in the terminal system, for the fail safe that guarantees that this method is used; this zone is protected, can only be by special code interface visit.Lock net information comprises lock network No. information at least.
The net locking method that present embodiment is realized by temporary folder and special folder are set in terminal, have been finished according to lock online article spare and has been carried out the lock net, be easy to realize and the user with clothes or tester.Fig. 2 is the schematic flow sheet of the embodiment of the invention two net locking methods, and is being embodied as example explanation in mobile phone, identical among the temporary folder among the embodiment and special folder and the embodiment one.This method specifically comprises the steps:
201, starting hand-set;
202, judge whether lock online article spare is arranged in the temporary folder, if do not have, execution in step 203, if having, execution in step 209;
Lock online article spare herein can pass through a binary file, comprising lock net flag bit, lock network No. information, end of file can be added digital signature, and in this binary file, add the term of validity that two zones are used for depositing file, realize that form can be as follows:
The term of validity
Lock net flag bit
Lock network No. information
Digital signature
Digital signature herein can generate by asymmetric, irreversible algorithm.RSA Algorithm for example, pair of secret keys, one is that PKI, one are private key.Lock online article spare is produced and generated by special tool(s), be filled into the file except locking the netting index certificate in the process of making, also need will to lock netting index with private key by RSA Algorithm and it is calculated that out a digital signature, digital signature can add Miru once more and utilize the MD5 scheduling algorithm.This algorithm is bank's a kind of mode of wanting data to use at processor normally, as long as the length of key is enough, complexity is enough, and fail safe is fine.Utilize instrument to generate lock online article spare flow process and can be the input term of validity, lock net flag bit and lock network No. information, the binary file of structure calculated digital signature before these information were filled into, and at last digital signature was filled in this binary file.The instrument that generates lock online article spare has only the specific senior maintenance center of mobile-phone manufacturers or particular safety department to hold, and the demand of all lock nets, release is submitted to mobile-phone manufacturers by Virtual network operator, is generated the file of lock net by mobile-phone manufacturers.
203, judge whether lock online article spare is arranged in the special folder, if do not have, then shutdown if having, is then judged the whether set of lock net flag bit in the described lock online article spare, if set, execution in step 204 if there is not set, is carried out release;
204, according to the lock net information and executing lock net in the lock online article spare;
Lock net flag bit is used for indicating whether lock net, if this flag bit set lock net, then next mobile phone carries out the lock net operation, otherwise, then carry out unlocking operation.Lock net information comprises lock network No. information, digital signature and the term of validity.At the term of validity, be described as follows: this field, only when judging file validation, uses temporary folder.This field lost efficacy after the special folder.Because the operation of lock net generally all is the comparison secret, unfinishedly prevent that the loss of locking online article spare from causing immeasurable loss, the term of validity has been crossed this lock online article spare of this term of validity and just can not have been detected by legitimacy by being put under the temporary folder generally at 1~3 day.In case after legal detection, just be put into special area, in this time, the operation of lock net, release just comes into force, and wants to change operation, just needs to put in temporary folder the legal lock online article spare of new operation information again.
The implementation of the lock net here and the concrete operations of release and prior art is similar, repeats no more herein.
209, judge whether this lock online article spare is legal, if legal, then execution in step 210, if illegal, then delete this lock online article spare;
In order to strengthen fail safe, need also to judge whether lock online article spare is legal, be used to verify the safety zone that whether legal private key and checking algorithm are kept at mobile phone flash, this zone can only be read and can not be write.Increase this step, can prevent that the disabled user from revising lock netting index certificate without authorization.
210, whether before the deadline to judge this lock online article spare, if before the deadline, then execution in step 211, if not before the deadline, then delete this release file;
In order to guarantee to lock the timeliness of online article spare, can also increase by one and judge lock online article spare whether in effective life, concrete, can judge by the term of validity data in the lock online article spare, and can delete the lock online article spare that exceeds the term of validity.
211, with the release document copying in special folder;
After the checking by two steps before, will lock online article spare and copy to the special folder from temporary folder.
212, mobile phone restarts.
Need to prove,, will lock online article spare and copy temporary file to, then can in temporary folder, find lock online article spare, the then situation of execution in step 201-202-209-210-211-212 if before the starting hand-set of above-mentioned steps 201.When starting shooting once more, because the release file copies special folder to from temporary folder, the lock net operation of execution in step 201-202-203-204 then.After mobile phone starts once more, carry out the operation of finishing the lock net from the step of 201-202-203-204.In the lock network process of this method, except starting for the first time, other are restarted and shut down is that mobile phone is finished automatically, do not need the user to participate in, simultaneously, the operation of deletion lock online article spare is not need to point out the user, only need finish in mobile phone consistency operation system, to prevent disabled user's cracking and revising this process.
The net locking method that present embodiment is realized by temporary folder and special folder are set in terminal, have been finished according to lock online article spare and has been carried out the lock net, has increased fail safe and ageing judgement simultaneously, be easy to realize and the user with clothes or tester.
Accordingly, the embodiment of the invention also provides a kind of terminal of using above-mentioned unlock method, and this terminal comprises:
First judge module 301 is used for judging whether temporary folder has lock online article spare, and when judgement does not have, notifies second judge module;
Described second judge module 302 is used for the notice according to described first judge module 301, judges whether described lock online article spare is arranged in the special folder, if having, and notice lock net module;
Described lock net module 303 is used for the notice according to described second judge module 302, judges the whether set of lock net flag bit in the described lock online article spare, if set, then according to the lock of the lock net information and executing in described lock online article spare net.
Optionally, this terminal also comprises: separate lock module 304, be used for carrying out release when described lock net module 303 judges that described lock net flag bit does not have set.
Optionally, this terminal also comprises: authentication module 305 is used for when described first judge module 301 judges that described temporary folder has lock online article spare, judge whether described lock online article spare is legal, if legal, then copy described lock online article spare to described special folder, and restart terminal.
Optionally, the authentication module 305 of this terminal also is used for, judge that described lock online article spare is legal after, and when judging that described lock online article spare is before the deadline, copy described lock online article spare to described special folder, and restart terminal.
Optionally, this terminal also comprises: removing module 306, and be used for described authentication module 305 and judge when described lock online article spare is illegal, delete described lock online article spare.
Optionally, this terminal also comprises: download module 307, be used for described lock online article spare is downloaded to the temporary folder of terminal, and restart described terminal, notify first judge module to judge.
At the term of validity, be described as follows: this field, only when judging file validation, uses temporary folder.This field lost efficacy after the special folder.Because the operation of lock net generally all is the comparison secret, unfinishedly prevent that the loss of locking online article spare from causing immeasurable loss, the term of validity has been crossed this lock online article spare of this term of validity and just can not have been detected by legitimacy by being put under the temporary folder generally at 1~3 day.In case after legal detection, just be put into special area, in this time, the operation of lock net, release just comes into force, and wants to change operation, just needs to put in temporary folder the legal lock online article spare of new operation information again.
The network locking terminal that present embodiment is realized by temporary folder and special folder are set in terminal, have been finished according to lock online article spare and has been carried out the lock net, has increased fail safe and ageing judgement simultaneously, be easy to realize and the user with clothes or tester.
More than be explanation, in concrete implementation process, can carry out suitable improvement, to adapt to the concrete needs of concrete condition method of the present invention to the specific embodiment of the invention.Therefore be appreciated that according to the specific embodiment of the present invention just to play an exemplary role, not in order to restriction protection scope of the present invention.

Claims (10)

1. a net locking method is characterized in that, comprising:
Judge whether lock online article spare is arranged in the temporary folder;
If in the described temporary folder described lock online article spare is arranged, judge then whether described lock online article spare is legal, if it is legal, then copy described lock online article spare to special folder, and restart terminal, wherein, temporary folder is a visible mutation folder in the terminal system file, special folder is the sightless zone in the terminal system, by special code interface visit;
If do not have described lock online article spare in the described temporary folder, then judge whether described lock online article spare is arranged in the special folder, if in the described special folder described lock online article spare is arranged, judge the whether set of lock net flag bit in the described lock online article spare, if set is then according to the lock of the lock net information and executing in described lock online article spare net.
2. the method for claim 1 is characterized in that, if the lock net flag bit in the described lock online article spare does not have set, then carries out release.
3. the method for claim 1 is characterized in that: described if in the described temporary folder described lock online article spare is arranged, judge then that described lock online article spare is whether legal also to comprise;
If described lock online article spare is legal, whether before the deadline then judge described lock online article spare,
If before the deadline, then carry out describedly copying described lock online article spare to described special folder.
4. the method for claim 1 is characterized in that, if described lock online article spare is illegal, then deletes described lock online article spare.
5. as each described method of claim 1 to 4, it is characterized in that describedly judge whether have lock also to comprise before the online article spare in the temporary folder:
Described lock online article spare is downloaded to temporary folder in the terminal, restart described terminal.
6. a terminal is characterized in that, comprising:
First judge module is used for judging whether temporary folder has lock online article spare, and when judgement does not have, notifies second judge module; Wherein, described temporary folder is a visible mutation folder in the terminal system file;
Described second judge module is used for the notice according to described first judge module, judges whether described lock online article spare is arranged in the special folder, if having, and notice lock net module; Wherein, described special folder is the sightless zone in the terminal system, by special code interface visit;
Described lock net module is used for the notice according to described second judge module, judges the whether set of lock net flag bit in the described lock online article spare, if set, then according to the lock of the lock net information and executing in described lock online article spare net;
Authentication module is used for judging whether described lock online article spare is legal when described first judge module judges that described temporary folder has lock online article spare, if legal, then copy described lock online article spare to described special folder, and restarts terminal.
7. terminal as claimed in claim 6 is characterized in that, described terminal also comprises:
Separate lock module, be used for when described lock net module judges that described lock net flag bit does not have set, carry out release.
8. terminal as claimed in claim 6 is characterized in that described authentication module also is used for, judge that described lock online article spare is legal after, and when judging that described lock online article spare is before the deadline, copy described lock online article spare to described special folder, and restart terminal.
9. terminal as claimed in claim 6 is characterized in that described terminal also comprises, removing module is used for described authentication module and judges when described lock online article spare is illegal, deletes described lock online article spare.
10. as each described terminal of claim 6 to 9, it is characterized in that described terminal also comprises, download module is used for described lock online article spare is downloaded to the temporary folder of terminal, restarts described terminal, notifies first judge module to judge.
CN2008101423370A 2008-08-06 2008-08-06 Network locking method and terminal Active CN101370288B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101423370A CN101370288B (en) 2008-08-06 2008-08-06 Network locking method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101423370A CN101370288B (en) 2008-08-06 2008-08-06 Network locking method and terminal

Publications (2)

Publication Number Publication Date
CN101370288A CN101370288A (en) 2009-02-18
CN101370288B true CN101370288B (en) 2011-12-07

Family

ID=40413845

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101423370A Active CN101370288B (en) 2008-08-06 2008-08-06 Network locking method and terminal

Country Status (1)

Country Link
CN (1) CN101370288B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101888448B (en) * 2010-06-07 2014-03-19 中兴通讯股份有限公司 Method and mobile terminal for locking network and card
CN106982132A (en) * 2016-01-18 2017-07-25 中兴通讯股份有限公司 A kind of method of north direction document generation, apparatus and system
CN107889096A (en) * 2017-11-30 2018-04-06 上海诺行信息技术有限公司 A kind of method and its terminal for realizing single unblock lock network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6321079B1 (en) * 1998-03-18 2001-11-20 Nec Corporation Network operator controlled locking and unlocking mechanism for mobile telephones
CN1625280A (en) * 2003-12-04 2005-06-08 中兴通讯股份有限公司 Method of locking network delocking and number burglary for PHS mobile phone
CN101026834A (en) * 2007-01-17 2007-08-29 中兴通讯股份有限公司 Locking method and unlocking method
CN101111018A (en) * 2006-07-21 2008-01-23 中兴通讯股份有限公司 Method for implementing PHS mobile phone network locking and unlocking

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6321079B1 (en) * 1998-03-18 2001-11-20 Nec Corporation Network operator controlled locking and unlocking mechanism for mobile telephones
CN1625280A (en) * 2003-12-04 2005-06-08 中兴通讯股份有限公司 Method of locking network delocking and number burglary for PHS mobile phone
CN101111018A (en) * 2006-07-21 2008-01-23 中兴通讯股份有限公司 Method for implementing PHS mobile phone network locking and unlocking
CN101026834A (en) * 2007-01-17 2007-08-29 中兴通讯股份有限公司 Locking method and unlocking method

Also Published As

Publication number Publication date
CN101370288A (en) 2009-02-18

Similar Documents

Publication Publication Date Title
CN101662465B (en) Method and device for verifying dynamic password
US8555049B2 (en) Secure boot terminal, secure boot method, secure boot program, recording medium, and integrated circuit
CN104951701B (en) A kind of method of the terminal device booting operating system based on USB controller
CN102236764B (en) Method and monitoring system for Android system to defend against desktop information attack
TW201109969A (en) Method and system for securely updating field upgradeable units
CN110059089B (en) Data synchronization method and device, storage medium and electronic equipment
JP5569814B2 (en) Policy generation and conversion system, policy distribution system, method and program thereof
JP6479723B2 (en) Secret key management system and secret key management method
CN101916342A (en) Secure mobile storage device and method for realizing secure data exchange by using same
WO2018165920A1 (en) Security verification method and apparatus for pos machine
CN101370288B (en) Network locking method and terminal
CN104321776A (en) Offline authentication with embedded authorization attributes
CN104579663B (en) For the method for the validity for limiting digital certificate
CN102368230A (en) Mobile memory and access control method thereof as well as system
CN108460256A (en) Data guard method, mobile terminal and device
CN103023647A (en) Method for enhancing safety of secondary radar FPGA (Field Programmable Gate Array)
CN101009888A (en) Secure booting method for a mobile terminal, computer readable recording medium and mobile terminal
CN102752754A (en) Method for security certificate of user identification card locking data and mobile terminal
CN112101945B (en) Method and system for supervising block chain content
JP4338989B2 (en) Memory device
CN105787376A (en) Data security access method and apparatus
CN111726325A (en) Method for determining state of network equipment, related equipment and system
CN115729568A (en) Program burning protection method and device, burner and board card
TW200820775A (en) Protection system for display apparatus and method thereof
CN108256351A (en) Document handling method and device, storage medium and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 518129 Ministry of Intellectual Property of Bantian Huawei Base B1-3A, Longgang District, Shenzhen City, Guangdong Province

Patentee after: Huawei terminal (Shenzhen) Co.,Ltd.

Address before: 518129 Ministry of Intellectual Property of Bantian Huawei Base B1-3A, Longgang District, Shenzhen City, Guangdong Province

Patentee before: HUAWEI DEVICE Co.,Ltd.

CP01 Change in the name or title of a patent holder
TR01 Transfer of patent right

Effective date of registration: 20181214

Address after: 523808 Southern Factory Building (Phase I) Project B2 Production Plant-5, New Town Avenue, Songshan Lake High-tech Industrial Development Zone, Dongguan City, Guangdong Province

Patentee after: HUAWEI DEVICE Co.,Ltd.

Address before: 518129 Ministry of Intellectual Property of Bantian Huawei Base B1-3A, Longgang District, Shenzhen City, Guangdong Province

Patentee before: Huawei terminal (Shenzhen) Co.,Ltd.

TR01 Transfer of patent right