CN105574377B - Locking and unlocking method based on cell global identification code and mobile terminal - Google Patents

Locking and unlocking method based on cell global identification code and mobile terminal Download PDF

Info

Publication number
CN105574377B
CN105574377B CN201410548701.9A CN201410548701A CN105574377B CN 105574377 B CN105574377 B CN 105574377B CN 201410548701 A CN201410548701 A CN 201410548701A CN 105574377 B CN105574377 B CN 105574377B
Authority
CN
China
Prior art keywords
cell
cgi information
mobile terminal
information
locking function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410548701.9A
Other languages
Chinese (zh)
Other versions
CN105574377A (en
Inventor
胡晓宇
王军锋
颜世秦
卢夏子
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201410548701.9A priority Critical patent/CN105574377B/en
Priority to PCT/CN2014/095191 priority patent/WO2015131637A1/en
Publication of CN105574377A publication Critical patent/CN105574377A/en
Application granted granted Critical
Publication of CN105574377B publication Critical patent/CN105574377B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Abstract

A locking and unlocking method based on a cell global identification code and a mobile terminal are provided, the method comprises the following steps: the mobile terminal acquires CGI information of a current access cell, and compares the acquired CGI information with CGI information of a stored trusty cell; if the obtained CGI information is consistent with the CGI information of the trusty cell and the automatic locking function of the mobile terminal is in an activated state, the mobile terminal shields the automatic locking function; wherein the locking function comprises a screen locking function and/or an application locking function. The mobile terminal comprises an information acquisition module, an information comparison module and a locking and unlocking module so as to finish the processing. The invention is convenient for users to use and is simple and convenient to realize.

Description

Locking and unlocking method based on cell global identification code and mobile terminal
Technical Field
The present invention relates to the field of communications, and in particular, to a method for locking and unlocking a mobile terminal and a corresponding mobile terminal.
Background
The CGI (Cell Global Identity) of the digital cellular mobile communication network is used to identify the area covered by one Cell (base station/sector Cell), ensuring that each Cell in the Global area has a unique number corresponding to it, and enabling the mobile terminal to correctly identify the Identity of the current network. The CGI is composed of a Location Area Identity (LAI) and a Cell Identity (CI). Wherein the LAI includes a Mobile Country Code (MCC), a Mobile Network Code (MNC), and a Location Area Code (LAC).
The conventional screen locking modes of the mobile terminal comprise automatic screen locking and manual screen locking, the unlocking modes comprise password input unlocking, pattern unlocking, face recognition unlocking, voiceprint unlocking and the like, and the unlocking can be realized only by specific unlocking operations of a user. The inventors of the present invention have found that, for a user, it may not be desirable to lock a screen for convenient operation in some areas such as home, and for other areas, it may be desirable to lock the screen for safety and the like, and the implementation of this function should be simple and convenient, which the prior art cannot satisfy. Similar requirements also exist for applications in the mobile terminal which also have a locking and unlocking function.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a cell global identity based locking and unlocking method and a corresponding mobile terminal, which can meet the above requirements of users and is simple and convenient to implement.
In order to achieve the above object, the present invention provides a cell global identity CGI-based locking and unlocking method, including:
the mobile terminal acquires CGI information of a current access cell, and compares the acquired CGI information with CGI information of a stored trusty cell;
if the obtained CGI information is consistent with the CGI information of the trusty cell and the automatic locking function of the mobile terminal is in an activated state, the mobile terminal shields the automatic locking function;
wherein the locking function comprises a screen locking function and/or an application locking function.
Preferably, the first and second liquid crystal films are made of a polymer,
if the obtained CGI information is consistent with the CGI information of the trusted cell, further comprising: and if the current screen and/or the application program of the mobile terminal are/is locked, unlocking the current screen and/or the application program.
Preferably, the first and second liquid crystal films are made of a polymer,
after comparing the obtained CGI information with the CGI information of the stored trusted cell, the method further includes:
and if the obtained CGI information is inconsistent with the CGI information of the trusted cell and the automatic locking function of the mobile terminal is shielded, the mobile terminal cancels the shielding of the automatic locking function.
Preferably, the first and second liquid crystal films are made of a polymer,
if the obtained CGI information is consistent with the CGI information of the trusted cell, further comprising: the mobile terminal shields the manual locking function;
after comparing the obtained CGI information with the CGI information of the stored trusted cell, the method further includes:
and if the obtained CGI information is inconsistent with the CGI information of the trusted cell and the manual locking function of the mobile terminal is shielded, the mobile terminal cancels the shielding of the manual locking function.
Preferably, the first and second liquid crystal films are made of a polymer,
the mobile terminal acquires CGI information of a current access cell, and also includes the steps before comparing the acquired CGI information with the CGI information of a stored trusty cell;
and the mobile terminal takes the CGI information of the current access cell as the CGI information of the trusty cell to be stored according to the instruction which is input by the user and sets the current cell as the trusty cell.
Correspondingly, the mobile terminal provided by the invention comprises an information acquisition module, an information comparison module and a locking and unlocking module:
the information acquisition module is used for acquiring Cell Global Identity (CGI) information of a current access cell;
the information comparison module is used for comparing the obtained CGI information with the stored CGI information of the trusty cell and informing the locking and unlocking module of the comparison result;
and the locking and unlocking module is used for shielding the automatic locking function when the CGI information acquired as a result of the comparison is consistent with the CGI information of the trusted cell and the automatic locking function is in an activated state, wherein the locking function comprises a screen locking function and/or an application program locking function.
Preferably, the first and second liquid crystal films are made of a polymer,
and the locking and unlocking module further judges whether the current screen and/or the application program is locked or not when the comparison result shows that the obtained CGI information is consistent with the CGI information of the trusted cell, and unlocks the current screen and/or the application program if the current screen and/or the application program is locked.
Preferably, the first and second liquid crystal films are made of a polymer,
the locking and unlocking module is further configured to cancel shielding of the automatic locking function when the obtained CGI information is inconsistent with the CGI information of the trusted cell and the automatic locking function is shielded.
Preferably, the first and second liquid crystal films are made of a polymer,
when the obtained CGI information is consistent with the CGI information of the trusted cell, the locking and unlocking module also shields a manual locking function; and when the obtained CGI information is inconsistent with the CGI information of the trusted cell and the manual locking function is shielded, canceling the shielding of the manual locking function.
Preferably, the first and second liquid crystal films are made of a polymer,
the mobile terminal further includes: and the information storage module is used for storing the CGI information of the current access cell as the CGI information of the trusty cell according to an instruction which is input by a user and used for setting the current cell as the trusty cell.
According to the locking and unlocking method based on the CGI and the mobile terminal, when the mobile terminal enters the trusted cell, the automatic locking function is shielded, so that the operation of a user is facilitated. When entering an untrusted cell, the shield of the automatic locking function can be canceled, so as to meet the requirements in the aspects of security and the like. Namely, different locking and unlocking functions can be provided for different areas, and the realization is simple and convenient.
Drawings
FIG. 1 is a flowchart of a CGI-based locking and unlocking method according to an embodiment of the present invention;
FIG. 2 is a flowchart of a CGI-based locking and unlocking method according to a second embodiment of the present invention;
fig. 3 is a block diagram of a mobile terminal according to a third embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict.
Example one
The present embodiment relates to a locking and unlocking process when a mobile terminal enters a trusted cell, and as shown in fig. 1, the locking and unlocking method based on a CGI of the present embodiment includes:
step 110, the mobile terminal acquires the CGI information of the current access cell, and compares the acquired CGI information with the CGI information of the stored trusty cell;
the mobile terminal of the present invention includes, but is not limited to, a cellular phone. The mobile terminal can obtain the CGI information of the current cell when the mobile terminal is started and the connected cell is monitored to be switched.
The CGI information of the trusted cell stored by the mobile terminal may be obtained by the following method before this step: and the mobile terminal saves the CGI information of the current access cell as the CGI information of the trusted cell according to an instruction input by the user for setting the current cell as the trusted cell. Specifically, the mobile terminal may prompt a user whether to set the current cell as a trusted cell, the user may set the current cell as the trusted cell according to the prompt or actively, after the setting, the mobile terminal stores the CGI of the current cell as the CGI of the trusted cell, the CGI of the trusted cell that the mobile terminal sets and stores may be one or more, and the user may also delete the CGI information of the trusted cell that is set before.
In another embodiment, the user may also query the CGI information of the cell through the mobile terminal, for example, in an Android system, for a GSM network, the mobile terminal may obtain the CGI information and display it in the following manner: monitoring PhoneStateListener, rewriting onCellLocationChanged function, firstly obtaining MCC and MNC through TelephonManager, then obtaining LAC and CID through location variable, and connecting the four values of MCC, MNC, LAC and CID together to obtain the CGI value. The user may also be queried to know the CGI information of the cell by other means, such as a telecommunications department, etc. After acquiring the CGI information of the cell, the user can directly input and store the CGI information of one or more trusted cells in the mobile terminal.
Step 120, the mobile terminal determines that the obtained CGI information is consistent with the CGI information of the trusted cell;
since this embodiment is a scenario in which the mobile terminal enters the trusted cell, in this step, the mobile terminal determines that the obtained CGI information is consistent with the CGI information of the trusted cell.
In step 130, the mobile terminal determines whether the automatic locking function is in an activated state, if so, the process proceeds to step 140, and if not, the process is ended.
The locking function may be a screen locking function, may be a locking function of all or part of applications that can be locked on the mobile terminal, and may also include the above two types of locking functions.
The automatic locking function is in an activated state, for example, a user sets the screen locking function and/or the application locking function in an opened state, and when the automatic locking function is activated, corresponding parameter configurations may be provided, such as how much time the user waits for automatic locking, and the like.
Step 140, the mobile terminal shields the automatic locking function.
The shielding automatic locking function is to keep the activation state and corresponding parameters of the automatic locking function set by the user, but not to execute automatic locking. Thus, when the mobile terminal enters an untrusted cell, the shielding can be canceled, and automatic locking can be executed according to the activated automatic locking function.
Through the process, when the mobile terminal enters a trusted cell, the automatic locking function can be shielded, the user does not need to frequently unlock the mobile terminal, and the operation is more convenient. And the user experience is greatly improved. In addition, the global uniqueness of the CGI can also ensure that the CGI is used as the identification information of the cell, so that the trusted cell cannot be mistakenly identified and potential safety hazards are caused.
Optionally, after step 130, the mobile terminal further determines whether the current screen and/or the application program is locked, and unlocks the current screen and/or the application program. Therefore, the user does not need to perform unlocking operation, and the use by the user is more convenient.
Optionally, after step 130, the mobile terminal also masks the manual locking function. In a trusted cell, part of users may prefer to allow the manual locking function, and part of users may prefer not to allow the manual locking function in order to avoid the inconvenience of the user in manually locking the current cell to the trusted cell, and thus, the manual locking function is shielded in the trusted cell as an alternative of the present invention.
Example two
The present embodiment relates to a locking and unlocking process when a mobile terminal enters an untrusted cell, and as shown in fig. 2, the locking and unlocking method based on a CGI of the present embodiment includes:
step 210, the mobile terminal acquires the CGI information of the current access cell, and compares the acquired CGI information with the CGI information of the stored trusted cell;
this step is the same as step 110.
Step 220, the mobile terminal determines that the obtained CGI information is inconsistent with the CGI information of the trusted cell;
since this embodiment is a scenario in which the mobile terminal enters an untrusted cell, the mobile terminal in this step may determine that the obtained CGI information is not consistent with the CGI information of the trusted cell.
In step 230, the mobile terminal determines whether the automatic locking function is shielded, if so, the process proceeds to step 240, and if not, the process ends.
In step 240, the mobile terminal cancels the shielding of the automatic locking function.
Through the process, when the mobile terminal enters an untrusted cell, the shielding of the automatic locking function can be cancelled, so that the requirements on the aspects of safety and the like are met. Namely, different locking and unlocking functions can be provided for different areas, and the realization is simple and convenient.
In addition, if the mobile terminal blocks the manual locking function when entering a trusted cell, the mobile terminal cancels the blocking of the manual locking function after step 230.
EXAMPLE III
The embodiment provides a mobile terminal capable of implementing the method of the first embodiment and the method of the second embodiment, as shown in fig. 3, the mobile terminal includes an information obtaining module 10, an information comparing module 20, and a locking and unlocking module 30, where:
an information obtaining module 10, configured to obtain Cell Global Identity (CGI) information of a current access cell;
an information comparison module 20, configured to compare the obtained CGI information with stored CGI information of a trusted cell, and notify a locking/unlocking module of a comparison result;
and a locking and unlocking module 30, configured to shield the automatic locking function when the obtained CGI information is consistent with the CGI information of the trusted cell and the automatic locking function is in an activated state as a result of the comparison, where the locking function includes a screen locking function and/or an application locking function.
Optionally, the locking and unlocking module 30 is further configured to, when the obtained CGI information is consistent with the CGI information of the trusted cell as a result of the comparison, further determine whether the current screen and/or the application program is locked, and if so, unlock the current screen and/or the application program.
Optionally, the locking and unlocking module 30 is further configured to cancel the shielding of the automatic locking function when the obtained CGI information is inconsistent with the CGI information of the trusted cell and the automatic locking function is shielded.
Optionally, when the obtained CGI information is consistent with the CGI information of the trusted cell, the locking and unlocking module 30 further shields a manual locking function; and when the obtained CGI information is inconsistent with the CGI information of the trusted cell and the manual locking function is shielded, canceling the shielding of the manual locking function.
Optionally, the mobile terminal further includes: and the information storage module is used for storing the CGI information of the current access cell as the CGI information of the trusty cell according to an instruction which is input by a user and used for setting the current cell as the trusty cell.
It will be understood by those skilled in the art that all or part of the steps of the above methods may be implemented by instructing the relevant hardware through a program, and the program may be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, and the like. Alternatively, all or part of the steps of the foregoing embodiments may also be implemented by using one or more integrated circuits, and accordingly, each module/unit in the foregoing embodiments may be implemented in the form of hardware, and may also be implemented in the form of a software functional module. The present invention is not limited to any specific form of combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (6)

1. A locking and unlocking method based on a Cell Global Identity (CGI) comprises the following steps:
the mobile terminal acquires CGI information of a current access cell, and compares the acquired CGI information with CGI information of a stored trusty cell;
when the obtained CGI information is consistent with the CGI information of the trusty cell and the automatic locking function of the mobile terminal, including the application program locking function, is in an activated state, the mobile terminal shields the automatic locking function including the application program locking function;
when the obtained CGI information is consistent with the CGI information of the trusty cell and the application program of the mobile terminal is locked, unlocking the application program;
and when the obtained CGI information is inconsistent with the CGI information of the trusted cell and the automatic locking function of the mobile terminal including the application program locking function is shielded, the mobile terminal cancels the shielding of the automatic locking function.
2. The method of claim 1, wherein:
if the obtained CGI information is consistent with the CGI information of the trusted cell, further comprising: the mobile terminal shields the manual locking function;
after comparing the obtained CGI information with the CGI information of the stored trusted cell, the method further includes:
and if the obtained CGI information is inconsistent with the CGI information of the trusted cell and the manual locking function of the mobile terminal is shielded, the mobile terminal cancels the shielding of the manual locking function.
3. The method of claim 1, wherein:
the mobile terminal acquires CGI information of a current access cell, and also includes the steps before comparing the acquired CGI information with the CGI information of a stored trusty cell;
and the mobile terminal takes the CGI information of the current access cell as the CGI information of the trusty cell to be stored according to the instruction which is input by the user and sets the current cell as the trusty cell.
4. A mobile terminal is characterized by comprising an information acquisition module, an information comparison module and a locking and unlocking module:
the information acquisition module is used for acquiring Cell Global Identity (CGI) information of a current access cell;
the information comparison module is used for comparing the obtained CGI information with the stored CGI information of the trusty cell and informing the locking and unlocking module of the comparison result;
the locking and unlocking module is used for shielding the automatic locking function comprising the application program locking function when the CGI information obtained by the comparison result is consistent with the CGI information of the trusted cell and the automatic locking function comprising the application program locking function is in an activated state, and unlocking the application program when the CGI information obtained by the comparison result is consistent with the CGI information of the trusted cell and the application program of the mobile terminal is locked;
the locking and unlocking module is further used for canceling the shielding of the automatic locking function including the application program locking function when the obtained CGI information is inconsistent with the CGI information of the trusted cell and the automatic locking function including the application program locking function is shielded.
5. The mobile terminal of claim 4, wherein:
when the obtained CGI information is consistent with the CGI information of the trusted cell, the locking and unlocking module also shields a manual locking function; and when the obtained CGI information is inconsistent with the CGI information of the trusted cell and the manual locking function is shielded, canceling the shielding of the manual locking function.
6. The mobile terminal of claim 4, wherein:
further comprising: and the information storage module is used for storing the CGI information of the current access cell as the CGI information of the trusty cell according to an instruction which is input by a user and used for setting the current cell as the trusty cell.
CN201410548701.9A 2014-10-16 2014-10-16 Locking and unlocking method based on cell global identification code and mobile terminal Active CN105574377B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410548701.9A CN105574377B (en) 2014-10-16 2014-10-16 Locking and unlocking method based on cell global identification code and mobile terminal
PCT/CN2014/095191 WO2015131637A1 (en) 2014-10-16 2014-12-26 Locking/unlocking method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410548701.9A CN105574377B (en) 2014-10-16 2014-10-16 Locking and unlocking method based on cell global identification code and mobile terminal

Publications (2)

Publication Number Publication Date
CN105574377A CN105574377A (en) 2016-05-11
CN105574377B true CN105574377B (en) 2020-06-30

Family

ID=54054502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410548701.9A Active CN105574377B (en) 2014-10-16 2014-10-16 Locking and unlocking method based on cell global identification code and mobile terminal

Country Status (2)

Country Link
CN (1) CN105574377B (en)
WO (1) WO2015131637A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108040334B (en) * 2017-12-04 2020-04-07 Tcl移动通信科技(宁波)有限公司 Cell ID-based communication method, storage medium and mobile terminal
CN109151159A (en) * 2018-06-15 2019-01-04 Oppo广东移动通信有限公司 terminal control method, device and mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056289A (en) * 2009-10-28 2011-05-11 中国移动通信集团公司 Terminal locating method based on mobile network, system and locating information server
CN102736853A (en) * 2012-05-17 2012-10-17 北京三星通信技术研究有限公司 Screen unlocking method, screen locking method and terminal
CN103167411A (en) * 2012-08-08 2013-06-19 深圳市金立通信设备有限公司 System and method based on location based service (LBS) to achieve automatically removing and setting mobile phone passwords
CN103369511A (en) * 2012-03-28 2013-10-23 宇龙计算机通信科技(深圳)有限公司 WiFi network-based unlocking or locking method and communication terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100589645C (en) * 2007-06-18 2010-02-10 中兴通讯股份有限公司 Cell locking method for mobile terminal
CN101237706B (en) * 2008-02-27 2010-12-15 华为终端有限公司 Terminal network lock method and device
US9143923B2 (en) * 2008-11-25 2015-09-22 II Lansing Arthur Parker System and method for remote control of a mobile device
CN101668285B (en) * 2009-10-23 2013-01-16 中兴通讯股份有限公司 Subdistrict locking method for mobile terminal and mobile terminal capable of locking subdistrict

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056289A (en) * 2009-10-28 2011-05-11 中国移动通信集团公司 Terminal locating method based on mobile network, system and locating information server
CN103369511A (en) * 2012-03-28 2013-10-23 宇龙计算机通信科技(深圳)有限公司 WiFi network-based unlocking or locking method and communication terminal
CN102736853A (en) * 2012-05-17 2012-10-17 北京三星通信技术研究有限公司 Screen unlocking method, screen locking method and terminal
CN103167411A (en) * 2012-08-08 2013-06-19 深圳市金立通信设备有限公司 System and method based on location based service (LBS) to achieve automatically removing and setting mobile phone passwords

Also Published As

Publication number Publication date
WO2015131637A1 (en) 2015-09-11
CN105574377A (en) 2016-05-11

Similar Documents

Publication Publication Date Title
CN104715178B (en) Unlocking system and method of electronic device
US10932126B2 (en) Method for unlocking SIM card and mobile terminal
US20160057624A1 (en) ENFORCING SERVICE POLICIES IN EMBEDDED UICCs
CA3038884C (en) Protecting mobile devices from unauthorized device resets
EP3735011A1 (en) Multi-sim secure operational mode change
CN107145772B (en) Terminal equipment security control method and device and terminal equipment
US20200228981A1 (en) Authentication method and device
CN104640174A (en) Method and device for promoting wireless network access points
EP2919499A2 (en) Version protection method and apparatus for mobile terminals
CN105574377B (en) Locking and unlocking method based on cell global identification code and mobile terminal
CN105930749A (en) Anti-theft processing method and device for mobile terminal
EP2193676B1 (en) Mobile phone data security
CN110581921B (en) Control method and device for folding screen equipment
CN110569671A (en) Privacy protection method and related device
CN107154999B (en) Terminal and unlocking method and storage device based on environmental information
CN104462929A (en) Privacy protection method and device for mobile equipment
CN106203016A (en) A kind of terminal processing method and equipment
WO2017127019A1 (en) A system and method for remotely controlling a mobile device
CN110555302A (en) Unlocking method and device and electronic equipment
CN104735251A (en) Method and device for unlocking mobile terminals
CN105653913B (en) The method and device of user interface unlock
CN103813326A (en) Network accessing and locking method and network accessing and locking equipment for terminal
EP2520111A1 (en) Method for unlocking a secure device
CN105302426A (en) Screen unlocking implementation method and mobile terminal
KR102544365B1 (en) USIM Preventing Wrongful Use Operation Method of Thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant