CN105657818B - Register method, register device and the mobile terminal of embedded user identification module - Google Patents

Register method, register device and the mobile terminal of embedded user identification module Download PDF

Info

Publication number
CN105657818B
CN105657818B CN201610141571.6A CN201610141571A CN105657818B CN 105657818 B CN105657818 B CN 105657818B CN 201610141571 A CN201610141571 A CN 201610141571A CN 105657818 B CN105657818 B CN 105657818B
Authority
CN
China
Prior art keywords
identification module
terminal
user identification
data information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610141571.6A
Other languages
Chinese (zh)
Other versions
CN105657818A (en
Inventor
朱海锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610141571.6A priority Critical patent/CN105657818B/en
Publication of CN105657818A publication Critical patent/CN105657818A/en
Application granted granted Critical
Publication of CN105657818B publication Critical patent/CN105657818B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • H04W60/04Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration using triggered events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention proposes register method, register device and the mobile terminals of a kind of embedded user identification module, wherein, the register method of the embedded user identification module includes: when detecting that first terminal is connect with second terminal, the first authentication information of the first user is acquired, to authenticate according to first authentication information to first user;If the data information in the second terminal is loaded into the embedded user identification module of the first terminal to first subscription authentication success;The data information and the embedded user identification module are bound, the embedded user identification module to be registered in mobile communications network according to the data information.According to the technical solution of the present invention, business hall can be gone to bind eSIM card and phone number information to avoid user, so that user be made more easily to use mobile terminal.

Description

Register method, register device and the mobile terminal of embedded user identification module
Technical field
The present invention relates to technical field of mobile terminals, in particular to a kind of registration of embedded user identification module The register device and a kind of mobile terminal of method, a kind of embedded user identification module.
Background technique
Currently, the built-in eSIM card (i.e. embedded user identification module) in mobile terminal (such as mobile phone), eSIM card is just It is that traditional entity SIM card (Subscriber Identity Module, subscriber identification module) is directly embedded into movement eventually On the chip at end, it is added in equipment not as independent removable components.User can independently select operator, and An entity SIM card is no longer needed to.User can be made to switch between different operators network by way of software.eSIM Even if being embedded in mobile phone, also it is eventually a white card, needs to open and bind phone number information by operator.But It is that, when user, which wants replacement mobile terminal, is changed without phone number information, user needs business hall could be by the shifting of replacement Dynamic terminal and phone number information are bound, and have also just seriously affected the usage experience of user in this way.
Therefore, how to avoid user that business hall is gone to bind eSIM card and phone number information, to keep user more square Just become urgent problem to be solved using mobile terminal.
Summary of the invention
The present invention is based on the above problems, proposes a kind of new technical solution, can go to business hall will to avoid user ESIM card and phone number information are bound, so that user be made more easily to use mobile terminal.
In view of this, the first aspect of the present invention proposes a kind of register method of embedded user identification module, comprising: When detecting that first terminal is connect with second terminal, the first authentication information of the first user is acquired, according to first mirror Power information authenticates first user;If to first subscription authentication success, by the number in the second terminal It is believed that breath is loaded into the embedded user identification module of the first terminal;By the data information and the embedded user Identification module binding, the embedded user identification module to be registered in mobile communications network according to the data information.
In the technical scheme, by data information memory in second terminal, is then only needed to establish second terminal and The connection of first terminal, first terminal can get the data information in second terminal, so as to more easily will The embedded user identification module (i.e. eSIM card) of first terminal is registered in mobile communications network, and then improves user's use The convenience of first terminal.And before data information to be loaded into the embedded user identification module of first terminal, to Family is authenticated, and avoids illegal user using the data information stored in second terminal, to ensure that data information uses Safety.
In the above-mentioned technical solutions, it is preferable that described that the first terminal is registered to by movement according to the data information After step in communication network, comprising: if receiving the releasing of the data information Yu the embedded user identification module Binding instruction, then it is the data information and the embedded user identification module is unbinding.
In the technical scheme, it since each data information can only bind a first terminal, is somebody's turn to do when user wants to use The eSIM card of other terminals is registered in mobile communications network by data information, or the first terminal is bound other data , can be unbinding by data information and the embedded user identification module in first terminal on first terminal when information, Avoiding user goes to business hall to handle unbundlings business, to promote the experience of user.
In any of the above-described technical solution, it is preferable that described that the data information and the embedded user are identified mould Before the unbinding step of block, comprising: the second authentication information of second user is acquired, according to second authentication information pair The second user is authenticated;If being authenticated successfully to the second user, execute it is described by the data information with it is described The unbinding step of embedded user identification module.
In the technical scheme, by data information and embedded user identification module it is unbinding before, by into Row unbundlings user authenticate, avoid first terminal lose in the case where, illegal user by data information with it is embedded Subscriber identification module is unbinding, to ensure that the safety of first terminal.
In any of the above-described technical solution, it is preferable that described that the data information and the embedded user are identified mould After the unbinding step of block, comprising: delete the data information in the embedded user identification module.
In the technical scheme, after data information and embedded user identification module is unbinding, illustrate user First terminal is registered without using data information, by deleting the data information in embedded user identification module, is avoided The leakage of data information, to ensure that the safety of data information.
In any of the above-described technical solution, it is preferable that the data information by the second terminal is loaded into described Before step in the embedded user identification module of first terminal, comprising: show at least one stored in the second terminal A data information;Selection instruction is received, selects and is loaded into the first terminal at least one described data information The data information.
In the technical scheme, due to can store multiple data informations, multiple data informations in a second terminal It can be identical operator, be also possible to different operators, user can select according to the real-time requirement of oneself wait infuse The data information of volume.
The second aspect of the present invention proposes a kind of register device of embedded user identification module, comprising: the first authentication Unit, for the first authentication information of the first user being acquired, according to institute when detecting that first terminal is connect with second terminal The first authentication information is stated to authenticate first user;Loading unit, if for successful to first subscription authentication, Data information in the second terminal is loaded into the embedded user identification module of the first terminal;Registering unit, For binding the data information and the embedded user identification module, with will be described embedded according to the data information Subscriber identification module is registered in mobile communications network.
In the technical scheme, by data information memory in second terminal, is then only needed to establish second terminal and The connection of first terminal, first terminal can get the data information in second terminal, so as to more easily will The embedded user identification module (i.e. eSIM card) of first terminal is registered in mobile communications network, and then improves user's use The convenience of first terminal.And before data information to be loaded into the embedded user identification module of first terminal, to Family is authenticated, and avoids illegal user using the data information stored in second terminal, to ensure that data information uses Safety.
In the above-mentioned technical solutions, it is preferable that further include: unbundlings unit, if for receiving the data information and institute The unbinding instruction of embedded user identification module is stated, then by the data information and the embedded user identification module solution Except binding.
In the technical scheme, since each data information can only bind a first terminal, when user wants using upper Other first terminals are registered in mobile communications network by the data information stated, or the first terminal is bound others When data information, data information and the embedded user identification module releasing in first terminal can be tied up on first terminal It is fixed, it avoids user and business hall is gone to handle unbundlings business, to promote the experience of user.
In any of the above-described technical solution, it is preferable that further include: the second authenticating unit, for acquiring the of second user Two authentication informations, to be authenticated according to second authentication information to the second user;The unbundlings unit is specifically used for, If being authenticated successfully to the second user, execute described by the data information and embedded user identification module releasing The step of binding.
In the technical scheme, by data information and embedded user identification module it is unbinding before, by into Row unbundlings user authenticate, avoid first terminal lose in the case where, illegal user by data information with it is embedded Subscriber identification module is unbinding, to ensure that the safety of first terminal.
In any of the above-described technical solution, it is preferable that further include: unit is deleted, for identifying the embedded user The data information in module is deleted.
In the technical scheme, after data information and embedded user identification module is unbinding, illustrate user First terminal is registered without using data information, by deleting the data information in embedded user identification module, is avoided The leakage of data information, to ensure that the safety of data information.
In any of the above-described technical solution, it is preferable that further include: display unit is deposited for showing in the second terminal At least one data information of storage;Selecting unit is selected at least one described data information for receiving selection instruction The data information being loaded into the first terminal.
In the technical scheme, due to can store multiple data informations, multiple data informations in a second terminal It can be identical operator, be also possible to different operators, user can select according to the real-time requirement of oneself wait infuse The data information of volume.
The third aspect of the present invention proposes a kind of mobile terminal, including insertion described in any one of above-mentioned technical proposal The register device of formula subscriber identification module, therefore, the mobile terminal have and any one of above-mentioned technical proposal described in insertion The identical technical effect of the register device of formula subscriber identification module, details are not described herein.
According to the technical solution of the present invention, business hall can be gone to bind eSIM card and phone number information to avoid user, To make user more easily use mobile terminal.
Detailed description of the invention
The process that Fig. 1 shows the register method of embedded user identification module according to an embodiment of the invention is shown It is intended to;
Fig. 2 shows the processes of the register method of embedded user identification module according to another embodiment of the invention Schematic diagram;
The structure that Fig. 3 shows the register device of embedded user identification module according to an embodiment of the invention is shown It is intended to;
Fig. 4 shows the structural schematic diagram of mobile terminal according to an embodiment of the invention.
Specific embodiment
It is with reference to the accompanying drawing and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
The process that Fig. 1 shows the register method of embedded user identification module according to an embodiment of the invention is shown It is intended to.
As shown in Figure 1, the register method of embedded user identification module according to an embodiment of the invention, comprising:
Step 102, when detecting that first terminal is connect with second terminal, the first authentication information of the first user is acquired, To be authenticated according to first authentication information to first user;
Preferably, the step of being authenticated according to first authentication information to first user, specifically includes: first Terminal obtains first stored in second terminal and prestores authentication information, and the first authentication information and first are prestored authentication information and carried out Matching, if the two successful match, it is determined that the authentication success to the first user, if the two mismatches, it is determined that the first user Failed authentication.The step of above-mentioned authentication, can be completed by first terminal, can also be completed by second terminal.In addition, the One authentication information includes following one or combinations thereof: password, finger print information, voice messaging, palm print information, facial information, iris Information.
Step 104, if the data information in the second terminal is loaded into institute to first subscription authentication success It states in the embedded user identification module of first terminal;
Data information can be phone number information, and phone number information includes but is not limited to: ISDN (Integrated Services Digital Network, ISDN) EIC equipment identification code, ICCID (Integrate Circuit Card Identity, integrated circuit card identification code), IMSI (International Mobile Subscriber Identification Number, international mobile subscriber identification code), KI (mobile phone identification key).
Step 106, the data information and the embedded user identification module are bound, according to the data information The embedded user identification module is registered in mobile communications network.
Preferably, before the step of data information and the embedded user identification module being bound, if detecting The data information with other first terminals bind, then prompt user by the data information with other first terminals It is unbinding, after detecting data information with the unbinding success of other first terminals, by the data information It is bound with the embedded user identification module.
In the technical scheme, by data information memory in second terminal, is then only needed to establish second terminal and The connection of first terminal, first terminal can get the data information in second terminal, so as to more easily will The embedded user identification module (i.e. eSIM card) of first terminal is registered in mobile communications network, and then improves user's use The convenience of first terminal.And before data information to be loaded into the embedded user identification module of first terminal, to Family is authenticated, and avoids illegal user using the data information stored in second terminal, to ensure that data information uses Safety.
In the above-mentioned technical solutions, it is preferable that after step 106, comprising: if receive the data information with it is described embedding Enter the unbinding instruction of formula subscriber identification module, then ties up the data information and embedded user identification module releasing It is fixed.
In the technical scheme, since each data information can only bind a first terminal, when user wants using upper Other first terminals are registered in mobile communications network by the data information stated, or the first terminal is bound others When data information, data information and the embedded user identification module releasing in first terminal can be tied up on first terminal It is fixed, it avoids user and business hall is gone to handle unbundlings business, to promote the experience of user.
In any of the above-described technical solution, it is preferable that described that the data information and the embedded user are identified mould Before the unbinding step of block, comprising: the second authentication information of second user is acquired, according to second authentication information pair The second user is authenticated;If being authenticated successfully to the second user, execute it is described by the data information with it is described The unbinding step of embedded user identification module.
In the technical scheme, by data information and embedded user identification module it is unbinding before, by into Row unbundlings user authenticate, avoid first terminal lose in the case where, illegal user by data information with it is embedded Subscriber identification module is unbinding, to ensure that the safety of first terminal.
In any of the above-described technical solution, it is preferable that described that the data information and the embedded user are identified mould After the unbinding step of block, comprising: delete the data information in the embedded user identification module.
In the technical scheme, after data information and embedded user identification module is unbinding, illustrate user First terminal is registered without using data information, by deleting the data information in embedded user identification module, is avoided The leakage of data information, to ensure that the safety of data information.
For example, user temporarily uses the data information of oneself to register the mobile phone of stranger, by data information and the mobile phone After unbinding, data information is deleted, data information is avoided and is compromised.
In any of the above-described technical solution, it is preferable that the data information by the second terminal is loaded into described Before step in the embedded user identification module of first terminal, comprising: show at least one stored in the second terminal A data information;Selection instruction is received, selects and is loaded into the first terminal at least one described data information The data information.
In the technical scheme, due to can store multiple data informations, multiple data informations in a second terminal It can be identical operator, be also possible to different operators, user can select according to the real-time requirement of oneself wait infuse The data information of volume.
Fig. 2 shows the processes of the register method of embedded user identification module according to another embodiment of the invention Schematic diagram.
As shown in Fig. 2, the register method of embedded user identification module according to another embodiment of the invention is (at this In embodiment, first terminal is mobile phone, and second terminal is wearable smart machine), comprising:
Step 202, mobile phone establishes connection by bluetooth or Wi-Fi with wearable smart machine;
Wherein, it when user opens phone number, needs to business hall to use identity card progress fingerprint open-minded, and setting pair The password answered, end user obtain the wearable smart machine for replacing entity SIM card, deposit in the wearable smart machine Contain the password and preset fingerprint of phone number information associated with the phone number opened, setting.In addition, this is wearable Smart machine can store multiple telephone number informations, and be different between the operator of multiple telephone number informations 's.
Step 204, mobile phone prompt input password;
Step 206, mobile phone judges whether Password Input is correct, when the judgment result is yes, enters step 208, otherwise, into Enter step 216;
Specifically, it is compared by the password stored in the password and wearable smart machine that input user, if right Than the result is that the two is consistent, then the password for determining that user inputs is correct, otherwise, it is determined that the password bad of user's input.
Step 208, wearable smart machine warning light lights, and user is prompted to input fingerprint;
Step 210, wearable smart machine by the fingerprint stored in fingerprint that user inputs and wearable smart machine into Row matching, it is of course also possible to which mobile phone obtains the fingerprint of the fingerprint stored in wearable smart machine and its acquisition, mobile phone will be stored Fingerprint matched with the fingerprint of acquisition;
Step 212, judge whether successful match, when the judgment result is yes, enter step 214, otherwise, enter step 216;
Step 214, mobile phone is loaded into the phone number information in wearable smart machine, by phone number information and mobile phone The binding of eSIM card, eSIM card is registered in corresponding mobile communications network;
Step 216, prompt user's checking failure.
In addition, if the wearable smart machine of user is lost, can be carried out by mobile phone it is unbinding, it is specifically, first It is introduced into the unbundlings interface of the eSIM card of mobile phone, click is unbinding, then inputs user when phone number is opened in business hall The password of setting can be successfully unbinding by phone number information and eSIM card.If the mobile phone of user is lost, can pass through Wearable smart machine is unbinding, specifically, if triggering the unbundlings key of wearable smart machine, acquires the fingerprint pair of user Unbinding user authenticates, phone number information and eSIM card is unbinding, wherein can to wear if authenticating successfully The unbundlings key for wearing smart machine can be physical button, be also possible to the virtual key shown on wearable smart machine.
The structure that Fig. 3 shows the register device of embedded user identification module according to an embodiment of the invention is shown It is intended to.
As shown in figure 3, the register device 300 of embedded user identification module according to an embodiment of the invention, packet It includes: the first authenticating unit 302, loading unit 304 and registering unit 306, wherein the first authenticating unit 302 is used to work as and detect When first terminal is connect with second terminal, the first authentication information of the first user is acquired, according to first authentication information pair First user authenticates;Loading unit 304, if for first subscription authentication success, eventually by described second Data information in end is loaded into the embedded user identification module of the first terminal;Registering unit 306, being used for will be described Data information and the embedded user identification module are bound, the embedded user is identified mould according to the data information Block is registered in mobile communications network.
In the technical scheme, by data information memory in second terminal, is then only needed to establish second terminal and The connection of first terminal, first terminal can get the data information in second terminal, so as to more easily will The embedded user identification module (i.e. eSIM card) of first terminal is registered in mobile communications network, and then improves user's use The convenience of first terminal.And before data information to be loaded into the embedded user identification module of first terminal, to Family is authenticated, and avoids illegal user using the data information stored in second terminal, to ensure that data information uses Safety.
In the above scheme, data information includes but is not limited to: ISDN (Integrated Services Digital Network, ISDN) EIC equipment identification code, ICCID (Integrate Circuit Card Identity, integrate Circuit card identification code), IMSI (International Mobile Subscriber Identification Number, it is international Mobile subscriber identification code), KI (mobile phone identification key).
First authenticating unit 302 is specifically used for, and obtains first stored in second terminal and prestores authentication information, by the first mirror Power information prestores authentication information with first and is matched, if the two successful match, it is determined that the authentication success to the first user, if The two mismatches, it is determined that the failed authentication of the first user.
In the above-mentioned technical solutions, it is preferable that further include: unbundlings unit 308, if for receive the data information with The unbinding instruction of the embedded user identification module, then by the data information and the embedded user identification module It is unbinding.
In the technical scheme, since each data information can only bind a first terminal, when user wants using upper Other first terminals are registered in mobile communications network by the data information stated, or the first terminal is bound others When data information, data information and the embedded user identification module releasing in first terminal can be tied up on first terminal It is fixed, it avoids user and business hall is gone to handle unbundlings business, to promote the experience of user.
In any of the above-described technical solution, it is preferable that further include: the second authenticating unit 310, for acquiring second user Second authentication information, to be authenticated according to second authentication information to the second user;The unbundlings unit 308 is specific For executing described by the data information and embedded user identification mould if being authenticated successfully to the second user The unbinding step of block.
In the technical scheme, by data information and embedded user identification module it is unbinding before, by into Row unbundlings user authenticate, avoid first terminal lose in the case where, illegal user by data information with it is embedded Subscriber identification module is unbinding, to ensure that the safety of first terminal.
In any of the above-described technical solution, it is preferable that further include: unit 312 is deleted, for knowing the embedded user The data information in other module is deleted.
In the technical scheme, after data information and embedded user identification module is unbinding, illustrate user First terminal is registered without using data information, by deleting the data information in embedded user identification module, is avoided The leakage of data information, to ensure that the safety of data information.
For example, user temporarily uses the data information of oneself to register the mobile phone of stranger, by data information and the mobile phone After unbinding, data information is deleted, data information is avoided and is compromised.
In any of the above-described technical solution, it is preferable that further include: display unit 314, for showing in the second terminal At least one data information of storage;Selecting unit 316, for receiving selection instruction, at least one described data information Select the data information being loaded into the first terminal.
In the technical scheme, due to can store multiple data informations, multiple data informations in a second terminal It can be identical operator, be also possible to different operators, user can select according to the real-time requirement of oneself wait infuse The data information of volume.
Fig. 4 shows the structural schematic diagram of mobile terminal according to an embodiment of the invention.
As shown in figure 4, mobile terminal 400 according to an embodiment of the invention, including in above-mentioned technical proposal it is any The register device 300 of embedded user identification module described in, therefore, which has and above-mentioned technical proposal Any one of described in embedded user identification module the identical technical effect of register device 300, details are not described herein.
The technical scheme of the present invention has been explained in detail above with reference to the attached drawings, according to the technical solution of the present invention, can be to avoid User goes to business hall to bind eSIM card and phone number information, so that user be made more easily to use mobile terminal.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (11)

1. a kind of register method of embedded user identification module characterized by comprising
When detecting that first terminal is connect with second terminal, the first authentication information of the first user is acquired, according to described the One authentication information authenticates first user;
If the data information in the second terminal is loaded into the first terminal to first subscription authentication success In embedded user identification module;
The data information and the embedded user identification module are bound, with will be described embedded according to the data information Subscriber identification module is registered in mobile communications network;
Wherein, the step of being authenticated according to first authentication information to first user, specifically includes: described first eventually End obtains first stored in the second terminal and prestores authentication information, and first authentication information and described first is prestored mirror Power information is matched, if the two successful match, it is determined that the authentication success to first user, if the two mismatches, Determine that first authentication information includes following one or combinations thereof to the failed authentication of first user: password, fingerprint letter Breath, voice messaging, palm print information, facial information, iris information.
2. the register method of embedded user identification module according to claim 1, which is characterized in that described according to The first terminal is registered to after the step in mobile communications network by data information, comprising:
If receiving the unbinding instruction of the data information Yu the embedded user identification module, the data are believed It ceases unbinding with the embedded user identification module.
3. the register method of embedded user identification module according to claim 2, which is characterized in that described by the number It is believed that before breath and the unbinding step of the embedded user identification module, comprising:
The second authentication information of second user is acquired, to authenticate according to second authentication information to the second user;
If being authenticated successfully to the second user, execute described by the data information and the embedded user identification module Unbinding step.
4. the register method of embedded user identification module according to claim 2, which is characterized in that described by the number It is believed that after breath and the unbinding step of the embedded user identification module, comprising:
The data information in the embedded user identification module is deleted.
5. the register method of embedded user identification module according to any one of claim 1 to 4, which is characterized in that The data information by the second terminal is loaded into the step in the embedded user identification module of the first terminal Before, comprising:
Show at least one data information stored in the second terminal;
Selection instruction is received, the number being loaded into the first terminal is selected at least one described data information It is believed that breath.
6. a kind of register device of embedded user identification module characterized by comprising
First authenticating unit, for when detecting that first terminal is connect with second terminal, the first of the first user of acquisition to be authenticated Information, to be authenticated according to first authentication information to first user;
Loading unit, if being loaded into the data information in the second terminal for first subscription authentication success In the embedded user identification module of the first terminal;
Registering unit, for binding the data information and the embedded user identification module, to be believed according to the data The embedded user identification module is registered in mobile communications network by breath;
Wherein, the step of being authenticated according to first authentication information to first user, specifically includes: described first eventually End obtains first stored in the second terminal and prestores authentication information, and first authentication information and described first is prestored mirror Power information is matched, if the two successful match, it is determined that the authentication success to first user, if the two mismatches, Determine that first authentication information includes following one or combinations thereof to the failed authentication of first user: password, fingerprint letter Breath, voice messaging, palm print information, facial information, iris information.
7. the register device of embedded user identification module according to claim 6, which is characterized in that further include:
Unit is unbinded, if the unbinding instruction for receiving the data information Yu the embedded user identification module, It is then that the data information and the embedded user identification module is unbinding.
8. the register device of embedded user identification module according to claim 7, which is characterized in that further include:
Second authenticating unit, for acquiring the second authentication information of second user, with according to second authentication information to described Second user is authenticated;
The unbundlings unit is specifically used for, if being authenticated successfully to the second user, execute it is described by the data information with The unbinding step of the embedded user identification module.
9. the register device of embedded user identification module according to claim 7, which is characterized in that further include:
Unit is deleted, for deleting the data information in the embedded user identification module.
10. the register device of embedded user identification module according to any one of claims 6 to 9, which is characterized in that Further include:
Display unit, for showing at least one data information stored in the second terminal;
Selecting unit is selected at least one described data information for receiving selection instruction and is loaded into described first The data information in terminal.
11. a kind of mobile terminal characterized by comprising the embedded user as described in any one of claim 6 to 10 is known The register device of other module.
CN201610141571.6A 2016-03-11 2016-03-11 Register method, register device and the mobile terminal of embedded user identification module Active CN105657818B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610141571.6A CN105657818B (en) 2016-03-11 2016-03-11 Register method, register device and the mobile terminal of embedded user identification module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610141571.6A CN105657818B (en) 2016-03-11 2016-03-11 Register method, register device and the mobile terminal of embedded user identification module

Publications (2)

Publication Number Publication Date
CN105657818A CN105657818A (en) 2016-06-08
CN105657818B true CN105657818B (en) 2019-04-12

Family

ID=56493236

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610141571.6A Active CN105657818B (en) 2016-03-11 2016-03-11 Register method, register device and the mobile terminal of embedded user identification module

Country Status (1)

Country Link
CN (1) CN105657818B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10856142B2 (en) 2016-07-14 2020-12-01 Huawei Technologies Co., Ltd. Method and device for performing communication by using virtual subscriber identity module
CN109788469B (en) * 2017-11-15 2022-09-09 展讯通信(上海)有限公司 Number binding method and terminal equipment
CN111356124B (en) * 2020-02-17 2021-03-05 深圳杰睿联科技有限公司 eSIM activation method, system and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1860730A (en) * 2003-03-19 2006-11-08 路径系统公司 System and method for mobile transactions using the bearer independent protocol
CN102457834A (en) * 2010-10-28 2012-05-16 苹果公司 Methods and apparatus for storage and execution of access control clients
CN103250434A (en) * 2010-10-28 2013-08-14 苹果公司 Management systems for multiple access control entities
CN103974252A (en) * 2014-04-21 2014-08-06 捷德(中国)信息科技有限公司 Authentication device and application method and device thereof
CN103974250A (en) * 2013-01-30 2014-08-06 华为终端有限公司 Configuration method and equipment
CN104221347A (en) * 2012-02-14 2014-12-17 苹果公司 Methods and apparatus for large scale distribution of electronic access clients

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2813103A2 (en) * 2012-02-10 2014-12-17 Apple Inc. Methods and apparatus for correcting error events associated with identity provisioning

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1860730A (en) * 2003-03-19 2006-11-08 路径系统公司 System and method for mobile transactions using the bearer independent protocol
CN102457834A (en) * 2010-10-28 2012-05-16 苹果公司 Methods and apparatus for storage and execution of access control clients
CN103250434A (en) * 2010-10-28 2013-08-14 苹果公司 Management systems for multiple access control entities
CN104221347A (en) * 2012-02-14 2014-12-17 苹果公司 Methods and apparatus for large scale distribution of electronic access clients
CN103974250A (en) * 2013-01-30 2014-08-06 华为终端有限公司 Configuration method and equipment
CN103974252A (en) * 2014-04-21 2014-08-06 捷德(中国)信息科技有限公司 Authentication device and application method and device thereof

Also Published As

Publication number Publication date
CN105657818A (en) 2016-06-08

Similar Documents

Publication Publication Date Title
CN101141718B (en) Mobile terminal card-locking method
KR101504855B1 (en) Method for exporting on a secure server data comprised on a uicc comprised in a terminal
CN104378145B (en) The matching method and system of bluetooth equipment
CN105188049B (en) A kind of virtual SIM card service authorizing method, terminal, server and system
CN100558176C (en) Communication terminal device and communication control method
KR100664110B1 (en) Usage restriction setting method for mobile communication device
US9198026B2 (en) SIM lock for multi-SIM environment
CN102056148A (en) Anti-breaking method for network locking mobile terminal and network locking mobile terminal
CN105657818B (en) Register method, register device and the mobile terminal of embedded user identification module
CN104268756B (en) Method of mobile payment and system
CN108093392A (en) A kind of method, mobile terminal and storage medium for unlocking SIM card
WO2011091658A1 (en) Terminal and method for binding sim card
CN106231534A (en) Mobile terminal and the number of writing thereof and method of disannuling a call, device
CN107508784B (en) Application login method and terminal equipment
CN102752754B (en) Subscriber Identity Module lock data are carried out method and the mobile terminal of safety certification
CN107172194B (en) Virtual SIM card management method and device and communication terminal
US9386394B2 (en) Mobile communication terminal and terminal control method
JP5584479B2 (en) Terminal line opening system and terminal line opening method
CN105933890A (en) Embedded SIM card realizing method and system, user terminal and server
CN101321351B (en) Method for dynamically implementing one-card multi-number of mobile terminal
CN108495297A (en) A kind of no cartoon letters method and system
CN105072084B (en) The method for building up of mobile terminal and external equipment data connection
KR20090085319A (en) Method of controlling user lock in mobile telephone
CN105704705A (en) Method for switching terminals with shared eSIM information, terminal and server
CN105873026A (en) Method for activating eSIM (Embedded Subscriber Identity Module), mobile terminal and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant