CN101426200A - Authentication method and terminal device for terminal management software - Google Patents

Authentication method and terminal device for terminal management software Download PDF

Info

Publication number
CN101426200A
CN101426200A CNA2008101848050A CN200810184805A CN101426200A CN 101426200 A CN101426200 A CN 101426200A CN A2008101848050 A CNA2008101848050 A CN A2008101848050A CN 200810184805 A CN200810184805 A CN 200810184805A CN 101426200 A CN101426200 A CN 101426200A
Authority
CN
China
Prior art keywords
management software
described terminal
authentication
terminal equipment
terminal management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008101848050A
Other languages
Chinese (zh)
Other versions
CN101426200B (en
Inventor
张旭辉
周晓明
舒娟媚
王晔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2008101848050A priority Critical patent/CN101426200B/en
Publication of CN101426200A publication Critical patent/CN101426200A/en
Application granted granted Critical
Publication of CN101426200B publication Critical patent/CN101426200B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention discloses an authentication method and a mobile terminal of terminal management software. The method comprises the following steps: transmitting an identification instruction to terminal management software by a terminal device; and authenticating the terminal management software by the terminal device according to the processing of feedback authentication code of terminal management software. The authentication method and mobile terminal according to the invention increase the user experience.

Description

The method for authenticating of terminal management software and terminal equipment
Technical field
The present invention relates to the communications field, in particular to a kind of method for authenticating and terminal equipment of terminal management software.
Background technology
Along with widening of terminal traffic, produced increasing custom service, on the one hand, operator need expand the personalized service of product and software, attracts customer group by improving user experience; On the other hand, need the user of non-this operator of restriction to use the product and the software of carrier customization, and then restriction or avoid disabled user's improper use and a series of harmful effects of causing.
At present, the user who limits non-a certain operator for needs uses the situation of the product and the software of carrier customization, usually handle by the lock net mode, this lock net mode only is to depend on certain concrete operator and exist, limit the software action of certain entity, for whole industry and not exclusively suitable, and this restriction behavior can not be accepted by some national telecommunication law usually.
In traditional lock net mode; comprise personal computer (Personal Computer; abbreviate PC as) side chain net and terminal equipment side chain net; the mode of these two kinds lock nets all is directly to lock net; need be according to Mobile Country Code MCC (the Mobile CountryCode of operator; abbreviate MCC as), Mobile Network Code (Mobile Network Code; abbreviate MNC as) carry out preliminary treatment; but; the performance of equipment side chain net mode is difficult to be accepted by some operator and some national telecommunication methods, therefore can adopt the lock net of PC side usually.
But the lock net of PC side is easy crack relatively, and fail safe is lower; In addition, under the situation of the method that adopts PC side chain network termination equipment, after PC side direction terminal equipment side sends check code, need to wait for the response of terminal equipment side, if this moment, terminal equipment side was busy, then the PC side will ceaselessly send check code, thereby is easy to cause that the port of terminal equipment side stops up, and then reduces user experience.
Summary of the invention
In the locking terminal device procedures, need the response of waiting facilities side at present PC side, if terminal equipment side is busy, the PC side will ceaselessly send check code, the port that causes terminal equipment side easily stops up, and then reduce the problem of user experience and propose the present invention, for this reason, the present invention aims to provide a kind of method for authenticating and terminal equipment of terminal management software, to address the above problem.
A kind of method for authenticating of terminal management software is provided according to an aspect of the present invention.
Method for authenticating according to terminal management software of the present invention comprises: terminal equipment sends the authentication instruction to terminal management software; Terminal equipment carries out authentication according to the processing of terminal management software feedback authentication code to terminal management software.
Preferably, terminal equipment carries out authentication according to the processing of the feedback authentication code of terminal management software to terminal management software and comprises: if the authentication code that terminal equipment receives from terminal management software is the predetermined authentication sign indicating number, then authentication is passed through, wherein, the predetermined authentication sign indicating number is made an appointment by terminal equipment and terminal management software; If it is not predetermined authentication sign indicating number, then failed authentication that terminal equipment does not receive from the authentication code of terminal management software or the authentication code that receives.
Preferably, terminal equipment according to the predetermined authentication mode before terminal management software sends the authentication instruction, said method also comprises: terminal equipment receives the instruction of shaking hands from terminal management software, and returns to terminal management software and to be used to indicate the response message of success of shaking hands.
Preferably, before the instruction of shaking hands of terminal equipment reception from terminal management software, said method comprises: terminal equipment inserts computer, and judge whether terminal management software is installed in the computer, if there is not the installing terminal management software, then terminal equipment is by local installation procedure installing terminal management software; Operation terminal management software.
According to another aspect of the present invention, provide a kind of terminal equipment.
Terminal equipment according to the present invention comprises: sending module is used for sending the authentication instruction to terminal management software; First receiver module is used to receive the authentication code from terminal management software; Authentication module is used for according to the authentication code of first receiver module reception or the reception operation of first receiver module terminal management software being carried out authentication.
Preferably, authentication module also comprises: judge module is used to judge whether the authentication code that first receiver module receives is the predetermined authentication sign indicating number, and wherein, the predetermined authentication sign indicating number is made an appointment by terminal equipment and terminal management software; Judging module is used for the authentication of terminal unit management software is adjudicated, wherein, if the judged result of judge module then adjudicate terminal unit management software authentication and pass through for being, otherwise, judgement terminal management software failed authentication.
Preferably, first receiver module also comprises notification module, and the reception operation that is used for not receiving authentication code in the given time reports authentication module.
Preferably, terminal equipment also comprises timer.
Preferably, terminal equipment also comprises: second receiver module is used to receive the instruction of shaking hands from terminal management software; Feedback module is used for being used to indicate the response message of success of shaking hands to terminal management software feedback.
Preferably, terminal equipment also comprises: access module is used to insert computer; Installed module is used at computer not during the installing terminal management software, by the installation procedure installing terminal management software of this locality.
By the present invention, the method of authentication is carried out in employing to terminal management software by terminal equipment, having solved present PC side needs the response of waiting facilities side in the locking terminal device procedures, if terminal equipment side is busy, the PC side will ceaselessly send check code, the port that causes terminal equipment side easily stops up, and then reduces the problem of user experience, and then has improved user experience.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart according to the method for authenticating of the terminal management software of the embodiment of the invention;
Fig. 2 is the detail flowchart according to the method for authenticating of the terminal management software of the embodiment of the invention;
Fig. 3 is the structured flowchart according to the terminal equipment of the embodiment of the invention;
Fig. 4 is the concrete structure block diagram according to the terminal equipment of the embodiment of the invention.
Embodiment
Functional overview
Consider that present PC side needs the response of waiting facilities side in the locking terminal device procedures, if terminal equipment side is busy, the PC side will ceaselessly send check code, the port that causes terminal equipment side easily stops up, and then the problem of reduction user experience, the embodiment of the invention provides a kind of authentication scheme of terminal management software, by terminal equipment terminal management software is carried out authentication, device such as connected computer of terminal equipment communicates under the situation that authentication is passed through, rather than as present mode, by the PC side to the terminal equipment authentication, as can be seen, the embodiment of the invention has designed a kind of new terminal equipment lock mode, here " locking " is different from above-mentioned " lock net ", the two implication is also inequality, here " locking " (for example means two entities, terminal equipment and terminal management software) mutual restriction, can not independently exist, can be when satisfying the lock net demand of operator, finish the verification of terminal equipment, to reach higher level business demand to its management software.
Application scenarios of the present invention needs the support of following two kinds of entities, entity one is wireless terminal device (Wireless Terminal Device), below be referred to as terminal equipment, typical terminal equipment is radio universal serial bus (Universal Serial Bus abbreviates USB as) MODEM, wireless data card etc.; In terminal equipment, can also comprise various card resources, for example, UIM card, SIM card, usim card etc. can abbreviate card apparatus as; Entity two is a terminal management software, below be referred to as user interface (User Interface, abbreviate UI as), typical UI is installed in human-computer interaction interface on notebook personal computer or the desktop computer, i.e. application program for what be used with terminal equipments such as network interface card, USB MODEM; Describe the present invention below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
Method embodiment
According to embodiments of the invention, provide the method for authenticating of a kind of terminal management software (being designated hereinafter simply as UI).At first, terminal equipment inserts computer, and judges whether UI is installed in the computer, if UI is not installed, then terminal equipment is installed UI by local installation procedure, then, the operation UI, this UI by its serial ports detect have terminal equipment after, beginning sends the instruction of shaking hands to the port of this terminal equipment, after this, terminal equipment receives the instruction of shaking hands from UI, and returns to UI and to be used to indicate the response message of success of shaking hands.Next carry out the authentication operations of terminal equipment to UI.
In addition, terminal equipment can be stored in installation procedure in local " storage medium " in advance, here " storage medium " can represent to be used to store one or more devices of data, comprises read-only memory (ROM), random-access memory (ram), magnetic RAM, magnetic core storage, magnetic disk storage medium, optical storage media, flash memory device and/or is used for the other machines computer-readable recording medium of stored information.Term " machine readable media " includes but not limited to that portable or fixed-storage device, light storage device, radio channel maybe can store, hold or carry various other media of instruction and/or data.
Fig. 1 is the flow chart according to the method for authenticating of the UI of the embodiment of the invention, and as shown in Figure 1, this method comprises following step S102 to step S104, and concrete operations are as follows:
Step S102, terminal equipment UI send the authentication instruction.
Step S104, terminal equipment carries out authentication according to the processing of the feedback authentication code of UI to UI.
Particularly, terminal equipment carries out authentication operations according to the authentication code of this UI that receives or the response that do not receive UI, comprises following two kinds of situations:
(1) if the authentication code that terminal equipment receives from UI is the predetermined authentication sign indicating number, then authentication is passed through, and wherein, the predetermined authentication sign indicating number is made an appointment by terminal equipment and UI.
(2) not predetermined authentication sign indicating number, then failed authentication if terminal equipment does not receive from the authentication code of UI or the authentication code that receives.
By this embodiment, for providing a kind of, operator finishes method to the identification of UI by terminal equipment, by terminal equipment UI is carried out authentication, can avoid present PC side in the locking terminal device procedures, to need the response of waiting facilities side, if terminal equipment side is busy, the PC side will ceaselessly send check code, causes that easily the port of terminal equipment side stops up, and then needn't pay high expense after sale for the incorrect use of netting outer user again, can reduce operator's cost after sale; Simultaneously, can avoid the function cutting problem that produces for the personalized service of yielding to sundry item in the software customized process, and the problem that causes influencing the characteristic service of software product, for operator and product supplier provide competitive advantage.
The technology by terminal equipment locking UI that the embodiment of the invention proposes needs the support of relevant serial communication protocol (for example, AT (Attention) and diagnosis response protocol agreements such as (DiagnosticResponder protocol abbreviate DIAG as)).Be example with the AT agreement temporarily herein, the specific implementation process to the embodiment of the invention is described in further detail in conjunction with the accompanying drawings.
Fig. 2 is the detail flowchart according to the method for authenticating of the UI of the embodiment of the invention, and as shown in Figure 2, terminal equipment locking UI comprises step S202 to step S220, and concrete operations are as follows:
Step S202, under normal circumstances, the user inserts PC or notebook with terminal equipment, when the user with terminal equipment with after PC, notebook are connected, terminal equipment is powered.
Step S204, the UI installation procedure of depositing in terminal equipment moves automatically, current machine (PC or notebook) is detected, judging whether to install UI, is under the situation that is, promptly in judged result, if UI installed on current machine, then proceeding to step S208, is under the situation not in judged result, proceeds to step S206.
Step S206, the UI installation procedure that is built in the terminal equipment memory block is installed UI voluntarily.
Step S208 starts UI, and preferably, UI can move automatically.
Step S210, the communication beginning, particularly, UI monitors after the terminal equipment existence by its serial ports, beginning sends the instruction of shaking hands to the terminal equipment port, and for example, UI instructs to " at " that terminal equipment sends in the AT agreement, after terminal equipment returns the success of shaking hands " OK " response message, show that communication is normal.
Step S212, send authentication instruction (promptly according to the certification policy (mode) that prior and UI appoint to UI by terminal equipment, above-mentioned step S102), this authentication instruction can send to UI in the mode of plaintext or ciphertext, with the clear-text way is example, when UI communicated by letter normally with equipment end after, terminal reported " zoper " instruction to UI.
Step S214 judges whether UI responds, that is, terminal equipment judges whether to receive the response instruction from UI, is under the situation that is in judged result, proceeds to step S216, is under the situation not in judged result, proceeds to step S220.
Step S216 judges from whether carrying correct authentication code in the response of UI, is under the situation that is in judged result, proceeds to step S218, is under the situation not in judged result, proceeds to step S220.
Step S218, UI feed back to authentication code of terminal equipment, for example: " at+zoper=1 " after carrying out " zoper " that the analyzing device side reports according to corresponding strategy; After terminal equipment receives this response instruction, judge whether the authentication code that carries in this response instruction is correct, for example, think that " at+zoper=1 " is correct (needing to make an appointment according to terminal equipment and UI) here, so, terminal equipment can be thought the legal UI that mates, allows and this UI continues mutual (communication); That is to say that if supporting UI, terminal equipment can receive one and confirm the legal response of UI (that is, above-mentioned step S104).
Step S220, if authentication code is incorrect or UI does not feed back authentication code, then terminal equipment thinks that UI is illegal (that is, illegal), forbids continuing between two entities (UI and terminal equipment) mutual.That is to say, if illegal UI, can not send or send the authentication code of a mistake, terminal equipment all will refuse to continue with it alternately (that is, above-mentioned step S104).
Step S222, terminal equipment cuts off the power supply voluntarily.
By this embodiment, realized technology by terminal equipment locking UI, go on any terminal equipment and the supporting UI thereof, be particularly suitable for the carrier customization project, terminal equipment can correctly identify corresponding with it UI, needn't worry because of terminal software and UI erroneous matching cause unnecessary unusual, the fail safe that improves software simultaneously, reach the purpose that reduces after cost, realization mechanism is simple.Compare with present this mode of PC side lock terminal equipment, on operational efficiency, also increase.
Device embodiment
According to embodiments of the invention, a kind of terminal equipment is provided, can be used to realize the method for authenticating of above-mentioned UI.Fig. 3 is the structured flowchart according to the terminal equipment of the embodiment of the invention, and as shown in Figure 3, this terminal equipment is connected to personal computer, comprises sending module 2, the first receiver modules 4, and authentication module 6 is described said structure below.
Sending module 2 is used for sending the authentication instruction to UI; First receiver module 4 is used to receive the authentication code from UI; Authentication module 6 is connected to first receiver module 4, is used for according to the authentication code of first receiver module, 4 receptions or the reception operation of first receiver module 4 UI being carried out authentication.
By this embodiment, provide the terminal equipment that UI is carried out authentication.
Fig. 4 is the concrete structure block diagram according to the terminal equipment of the embodiment of the invention, as shown in Figure 4:
Authentication module 6 also comprises: judge module 62 is used to judge whether the authentication code that first receiver module 4 receives is the predetermined authentication sign indicating number, and wherein, the predetermined authentication sign indicating number is made an appointment by terminal equipment and UI; Judging module 64 is connected to judge module 62, is used for the authentication of terminal unit management software is adjudicated, wherein, if the judged result of judge module 62 is that the authentication code that first receiver module 4 receives is the predetermined authentication sign indicating number, then adjudicates the UI authentication and pass through, otherwise, judgement UI failed authentication.
First receiver module 4 also comprises: notification module 42, the reception operation that is used for not receiving authentication code in the given time reports authentication module 6.
Preferably, terminal equipment also comprises: second receiver module 8, and feedback module 0, access module 1, installed module 3, timer 5 is described said structure below.
Timer 5 is connected to the notification module 42 of first receiver module 4, is used for the above-mentioned scheduled time is carried out timing.For example, can this length of timer be set to the above-mentioned scheduled time, when timer to constantly, notification module 42 promptly notify authentication module 6 its do not receive authentication code, timer preferably can pick up counting when terminal equipment send the authentication instruction.
Second receiver module 8 is used to receive the instruction of shaking hands from UI; Feedback module 0 is connected to second receiver module 8, is used for after second receiver module 8 receives the instruction of shaking hands, and is used to indicate the success response message of success of shaking hands to UI feedback, perhaps sends the shake hands failure response message of failure of indication.Access module 1 is used for terminal equipment is inserted computer; Installed module 3 is used for when computer is not installed UI, by the installation procedure of this locality UI is installed.Preferably, a mechanism that is used for judging or reading the UI of computer can be set, when this mechanism reads UI failure or judges and call installed module 3 when UI not being installed in the computer from computer.
Need to prove that under the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
To sum up, pass through the above embodiment of the present invention, the method of authentication is carried out in employing to UI by terminal equipment, having solved present PC side needs the response of waiting facilities side in the locking terminal device procedures, if terminal equipment side is busy, the PC side will ceaselessly send check code, causes that easily the port of terminal equipment side stops up, and then the problem of reduction user experience, and then improved user experience.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with the general calculation device, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the storage device and carry out by calculation element, perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. the method for authenticating of a terminal management software is characterized in that, described method comprises:
Terminal equipment sends the authentication instruction to terminal management software;
Described terminal equipment carries out authentication according to the processing of described terminal management software feedback authentication code to described terminal management software.
2. method according to claim 1 is characterized in that, described terminal equipment carries out authentication according to the processing of the feedback authentication code of described terminal management software to described terminal management software and comprises:
If the authentication code that described terminal equipment receives from described terminal management software is the predetermined authentication sign indicating number, then authentication is passed through, and wherein, described predetermined authentication sign indicating number is made an appointment by described terminal equipment and described terminal management software;
If it is not described predetermined authentication sign indicating number, then failed authentication that described terminal equipment does not receive from the authentication code of described terminal management software or the authentication code that receives.
3. method according to claim 1 is characterized in that, described terminal equipment according to the predetermined authentication mode before described terminal management software sends the authentication instruction, described method also comprises:
Described terminal equipment receives the instruction of shaking hands from described terminal management software, and returns to described terminal management software and to be used to indicate the response message of success of shaking hands.
4. method according to claim 3 is characterized in that, before the instruction of shaking hands of described terminal equipment reception from described terminal management software, described method comprises:
Described terminal equipment inserts computer, and judges whether described terminal management software is installed in the described computer, if described terminal management software is not installed, then described terminal equipment is installed described terminal management software by the installation procedure of this locality;
Move described terminal management software.
5. a terminal equipment is characterized in that, comprising:
Sending module is used for sending the authentication instruction to terminal management software;
First receiver module is used to receive the authentication code from described terminal management software;
Authentication module is used for according to the authentication code of described first receiver module reception or the reception operation of described first receiver module described terminal management software being carried out authentication.
6. terminal equipment according to claim 5 is characterized in that, described authentication module also comprises:
Judge module is used to judge whether the described authentication code that described first receiver module receives is the predetermined authentication sign indicating number, and wherein, described predetermined authentication sign indicating number is made an appointment by described terminal equipment and described terminal management software;
Judging module is used for the authentication of described terminal unit management software is adjudicated, wherein, if the judged result of described judge module then adjudicate described terminal unit management software authentication and pass through for being, otherwise, adjudicate described terminal management software failed authentication.
7. terminal equipment according to claim 5 is characterized in that, described first receiver module also comprises notification module, and the reception operation that is used for not receiving described authentication code in the given time reports described authentication module.
8. terminal equipment according to claim 5 is characterized in that described terminal equipment also comprises timer.
9. terminal equipment according to claim 5 is characterized in that, described terminal equipment also comprises:
Second receiver module is used to receive the instruction of shaking hands from described terminal management software;
Feedback module is used for being used to indicate the response message of success of shaking hands to described terminal management software feedback.
10. terminal equipment according to claim 5 is characterized in that, described terminal equipment also comprises:
Access module is used to insert computer;
Installed module is used for by the installation procedure of this locality described terminal management software being installed when described computer is not installed described terminal management software.
CN2008101848050A 2008-11-30 2008-11-30 Authentication method and terminal device for terminal management software Expired - Fee Related CN101426200B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101848050A CN101426200B (en) 2008-11-30 2008-11-30 Authentication method and terminal device for terminal management software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101848050A CN101426200B (en) 2008-11-30 2008-11-30 Authentication method and terminal device for terminal management software

Publications (2)

Publication Number Publication Date
CN101426200A true CN101426200A (en) 2009-05-06
CN101426200B CN101426200B (en) 2010-07-14

Family

ID=40616487

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101848050A Expired - Fee Related CN101426200B (en) 2008-11-30 2008-11-30 Authentication method and terminal device for terminal management software

Country Status (1)

Country Link
CN (1) CN101426200B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101931908A (en) * 2010-07-23 2010-12-29 中兴通讯股份有限公司 Method, device and system for acquiring service by portable equipment
CN102480724A (en) * 2010-11-30 2012-05-30 国民技术股份有限公司 Software authentication data card, software authentication system and software authentication method
CN112667973A (en) * 2020-11-30 2021-04-16 新华三技术有限公司 Method and device for activating management software of network equipment

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101931908A (en) * 2010-07-23 2010-12-29 中兴通讯股份有限公司 Method, device and system for acquiring service by portable equipment
WO2012009922A1 (en) * 2010-07-23 2012-01-26 中兴通讯股份有限公司 Method, apparatus and system for obtaining traffic service by portable device
US8522046B2 (en) 2010-07-23 2013-08-27 Zte Corporation Method, apparatus and system for acquiring service by portable device
CN101931908B (en) * 2010-07-23 2014-06-11 中兴通讯股份有限公司 Method, device and system for acquiring service by portable equipment
CN102480724A (en) * 2010-11-30 2012-05-30 国民技术股份有限公司 Software authentication data card, software authentication system and software authentication method
CN112667973A (en) * 2020-11-30 2021-04-16 新华三技术有限公司 Method and device for activating management software of network equipment
CN112667973B (en) * 2020-11-30 2023-12-26 新华三技术有限公司 Method and device for activating management software of network equipment

Also Published As

Publication number Publication date
CN101426200B (en) 2010-07-14

Similar Documents

Publication Publication Date Title
CN101932068B (en) Realize the mthods, systems and devices of machine-to-machine service
CN100542314C (en) Dual mode mobile communication terminal and auto-recognition card are also selected the method for drive pattern
CN100350767C (en) System and methods for provisioning a service for a communication device
CN104168557A (en) Upgrading method for operating systems and upgrading device for operating systems
CN101198121B (en) Authentication method for limiting mobile phone without using by others
EP2665300B1 (en) Mobile terminal and network locking method therefor
EP2040497B1 (en) Tracking mobile communication devices
CN101951595A (en) Method and system for processing OTA (Over-The-Air) Bootstrap
CN108234507A (en) Talk back equipment sharing method, talk back equipment and readable storage medium storing program for executing
EP2001256A1 (en) Portable base station device and charging method
CN107623907B (en) eSIM card network locking method, terminal and network locking authentication server
CN101426200B (en) Authentication method and terminal device for terminal management software
CN103699464A (en) Communication terminal automatically testing method and device
CN101729557A (en) Method and system for realizing resource sharing of terminal equipment
CN101711023A (en) Method and system for realizing interlocking of phone and card
CN102186159B (en) Mobile equipment and communication method of same
CN103491175A (en) Method and terminal for application program management
CN102420852B (en) Server, mobile terminal and data synchronizing method
CN101699915A (en) Mainboard, method for realizing network locking/ card locking function and mobile terminal
CN105188046A (en) SIM-card-free mobile phone and SIM-card-free mobile phone network registration method and device
CN101800985A (en) Authentication method and system, terminal, server and data downloading method and device
CN101835276B (en) Method and device for dial-in connection of mobile data terminal
CN111182536A (en) SIM card state detection method, device, network equipment and storage medium
CN103856936A (en) Method and apparatus for updating time of mobile terminal
CN101715183A (en) Network access method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20090506

Assignee: SHENZHEN ZTE MICROELECTRONICS TECHNOLOGY CO., LTD.

Assignor: ZTE Corporation

Contract record no.: 2015440020319

Denomination of invention: Authentication method and terminal device for terminal management software

Granted publication date: 20100714

License type: Common License

Record date: 20151123

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100714

Termination date: 20161130

CF01 Termination of patent right due to non-payment of annual fee