CN106792637B - International mobile equipment identification number wiring method, device and mobile terminal - Google Patents

International mobile equipment identification number wiring method, device and mobile terminal Download PDF

Info

Publication number
CN106792637B
CN106792637B CN201611145091.3A CN201611145091A CN106792637B CN 106792637 B CN106792637 B CN 106792637B CN 201611145091 A CN201611145091 A CN 201611145091A CN 106792637 B CN106792637 B CN 106792637B
Authority
CN
China
Prior art keywords
code
written
imei
coding tools
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201611145091.3A
Other languages
Chinese (zh)
Other versions
CN106792637A (en
Inventor
谭正鹏
蔡文龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611145091.3A priority Critical patent/CN106792637B/en
Publication of CN106792637A publication Critical patent/CN106792637A/en
Application granted granted Critical
Publication of CN106792637B publication Critical patent/CN106792637B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of international mobile equipment identification number wiring methods, device and mobile terminal, applied to field of communication technology, this method comprises: setting a reading mode for the read-write mode of target non-volatile memory, coding tools are authenticated, if passing through authentication, then setting the read-write mode of the target non-volatile memory to can WriteMode, it receives the IMEI code to be written of coding tools transmission and writes code instruction, and by the IMEI code to be written, code instruction is write according to this to be written in the target non-volatile memory, in this way by setting a reading mode for the read-write mode of target non-volatile memory, and third party's coding tools are authenticated, it can effectively prevent IMEI code arbitrarily to be distorted by third party's tool of unauthorized, if and then avoiding that there is phase because of different mobile phones With IMEI code and caused by conflict, allow the network of the normal access carrier of mobile phone, realize normal talking function.

Description

International mobile equipment identification number wiring method, device and mobile terminal
Technical field
The invention belongs to the communications field more particularly to a kind of international mobile equipment identification number wiring methods, device and movement Terminal.
Background technique
International mobile equipment identification number (IMEI, International Mobile Equipment Identity) be by The electronics string number of 15 bit digitals or 17 bit digitals composition.Each mobile phone is endowed a unique IMEI code.The IMEI Code can be used for inquiring guarantee or production information.
In the prior art, either high-pass platform or Lian Fake (MTK, MediaTek) platform, IMEI write-in are mobile electric The mode of words is all disclosed, therefore is easy to be cracked, and tool can be written by third party and arbitrarily distort IMEI code, different If mobile phone has identical IMEI code and when licensed operator needs IMEI code to verify, it will affect mobile phone and connect Enter the network of operator, and then influences the registration of mobile phone proper network and use.
Summary of the invention
The present invention provides a kind of international mobile equipment identification number wiring method, device and mobile terminal, it is intended to solve because If IMEI code, which can arbitrarily be distorted caused different mobile phones, has identical IMEI code and in registration operator When network needs IMEI code to authenticate, the network of mobile phone access carrier will affect, and then influence mobile phone proper network The problem of registration and use.
First aspect present invention provides a kind of international mobile equipment identification number wiring method, comprising:
A reading mode is set by the read-write mode of target non-volatile memory;Coding tools are authenticated, if logical Authentication is crossed, then setting the read-write mode of the target non-volatile memory to can WriteMode;Receive the coding tools hair The international mobile equipment identification number IMEI code to be written sent and code instruction is write, and by the IMEI code to be written, is write according to described Code instruction is written in the target non-volatile memory.
Second aspect of the present invention provides a kind of international mobile equipment identification number writing station, comprising:
Setup module, for setting a reading mode for the read-write mode of target non-volatile memory;Authentication module is used It is authenticated in coding tools;Setup module, if being also used to by authentication, by the reading of the target non-volatile memory WriteMode is set as can WriteMode;Writing module refers to for receiving the IMEI code to be written of the coding tools transmission and writing code It enables, and by the IMEI code to be written, is written in the target non-volatile memory according to the code instruction of writing.
Third aspect present invention provides a kind of mobile terminal, comprising:
Memory and processor;
The memory is stored with executable program code;
The processor coupled with the memory calls the executable program generation stored in the memory Code executes the international mobile equipment identification number wiring method provided such as above-mentioned first aspect.
International mobile equipment identification number wiring method, device and mobile terminal provided by the invention, by target non-volatile The read-write mode of memory is set as a reading mode, authenticates to coding tools, if by authentication, the target is non-volatile Property memory read-write mode be set as can WriteMode, receive the coding tools transmission IMEI code to be written and write code instruction, And by the IMEI code to be written, code instruction is write according to this and is written in the target non-volatile memory, in this way by by target The read-write mode of nonvolatile memory is set as a reading mode, and authenticates to third party's coding tools, can be effective Prevent IMEI code from arbitrarily being distorted by third party's tool of unauthorized, and if then avoiding because different mobile phones is having the same IMEI code and caused by conflict, allow the network of the normal access carrier of mobile phone, realize normal talking function.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention.
Fig. 1 is a kind of structural block diagram of mobile terminal;
Fig. 2 is the implementation process signal for the international mobile equipment identification number wiring method that first embodiment of the invention provides Figure;
Fig. 3 is the implementation process signal for the international mobile equipment identification number wiring method that second embodiment of the invention provides Figure;
Fig. 4 is the structural schematic diagram for the international mobile equipment identification number writing station that third embodiment of the invention provides;
Fig. 5 is the structural schematic diagram for the international mobile equipment identification number writing station that fourth embodiment of the invention provides.
Specific embodiment
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described reality Applying example is only a part of the embodiment of the present invention, and not all embodiments.Based on the embodiments of the present invention, those skilled in the art Member's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Fig. 1 shows a kind of structural block diagram of mobile terminal.International mobile equipment identification number provided in an embodiment of the present invention Wiring method can be applied in mobile terminal 10 as shown in Figure 1, and mobile terminal 10 can be, but not limited to include: that need to rely on electricity Pond maintains to operate normally, supports network and have access to the mobile call equipment of carrier network.
As shown in Figure 1, mobile terminal 10 includes memory 101, storage control 102, one or more (is only shown in figure One) processor 103, Peripheral Interface 104, radio-frequency module 105 and the Touch Screen 106 that are coupled with memory 101.These groups Part is mutually communicated by one or more communication bus/signal wire 107.
It is appreciated that structure shown in FIG. 1 is only to illustrate, the structure of mobile terminal 10 is not caused to limit.It is mobile Terminal 10 may also include than shown in Fig. 1 more perhaps less component or with the configuration different from shown in Fig. 1.Shown in Fig. 1 Each component can using hardware, software, or its combination realize.
Memory 101 can be used for being stored with executable program code software program and module, in the embodiment of the present invention International mobile equipment identification number wiring method and the corresponding program instruction/module of mobile terminal 10, processor 103 pass through calling Operation, which is stored in memory 101, is stored with executable program code software program and module, thereby executing various functions Using and data processing, that is, realize above-mentioned international mobile equipment identification number wiring method.
Memory 101 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 101 can further comprise The memory remotely located relative to processor 103, these remote memories can pass through network connection to mobile terminal 10.On The example for stating network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.Processor 103 And other possible components can carry out the access of memory 101 under the control of storage control 102.
Various input/output devices are couple CPU and memory 101 by Peripheral Interface 104.The operation of processor 103 is deposited Various softwares, instruction in reservoir 101 are to execute the various functions of mobile terminal 10 and carry out data processing.
In some embodiments, Peripheral Interface 104, processor 103 and storage control 102 can be in one single chips It realizes.In some other example, they can be realized by independent chip respectively.
Radio-frequency module 105 is used to receive and transmit electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, thus with Communication network or other equipment are communicated.Radio-frequency module 105 may include various existing for executing the electricity of these functions Circuit component, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module (SIM) card, Memory etc..Radio-frequency module 105 can be with the wireless network progress of various networks such as internet, intranet, preset type Communication is communicated by the wireless network of preset type with other equipment.The wireless network of above-mentioned preset type can wrap Include cellular telephone networks, WLAN or Metropolitan Area Network (MAN).Various communications can be used in the wireless network of above-mentioned preset type Standard, agreement and technology, including but not limited to global system for mobile communications (Global System for Mobile Communication, GSM), enhanced mobile communication technology (Enhanced Data GSM Environment, EDGE) is wide Band Code Division Multiple Access (Wideband Code Division Multiple Access, W-CDMA), Code Division Multiple Access (Code Division Access, CDMA), time division multiple access technology (Time Division Multiple Access, TDMA), Bluetooth, adopting wireless fidelity technology (Wireless-Fidelity, WiFi) (such as American Institute of Electrical and Electronics Engineers's standard IEEE 802.11a, IEEE 802.11b, IEEE802.11g and/or IEEE 802.11n), NFC technique, the networking telephone (Voice Over Internet Protocal, VoIP), worldwide interoperability for microwave accesses (Worldwide Interoperability for Microwave Access, Wi-Max), other for mail, instant messaging and short message agreement and any other is suitable Communications protocol.
Touch Screen 106 provides an output and input interface simultaneously between mobile terminal and user.Specifically, touch-control Screen 106 shows video output to user, and the content of these videos output may include text, figure, video and its any group It closes.Some outputs are the result is that correspond to some user interface objects.Touch Screen 106 also receives the input of user, such as user The gesture operations such as click, sliding, so that user interface object responds the input of these users.Detect user's input Technology can be based on resistance-type, condenser type or any other possible touch control detection technology.106 display unit of Touch Screen Specific example include but is not limited to liquid crystal display or light emitting polymer displays.
Referring to Fig. 2, Fig. 2 is that the international mobile equipment identification number wiring method that first embodiment of the invention provides realizes stream Journey schematic diagram can be applied in terminal as shown in Figure 1.International mobile equipment identification number wiring method shown in Fig. 2, it is main to wrap Include following steps:
S201, a reading mode is set by the read-write mode of target non-volatile memory.
The target non-volatile memory be built in execute IMEI code wiring method terminal in, it is as non-volatile with Machine accesses memory (NVRAM, Non-Volatile Random Access Memory).
A reading mode is set by the external interface of the target non-volatile memory, not authenticated third can be prevented The IMEI code stored in the directly erasable NVRAM of square tool.
S202, coding tools are authenticated, if by authentication, by the read-write mode of the target non-volatile memory Being set as can WriteMode.
It can be authenticated by way of identifying code or identification code, by the coding tools and IMEI code can also be executed The mode of the authentication protocol pre-established between the terminal of wiring method is authenticated.It is only open to successful coding tools are authenticated Can WriteMode, unknown third party's tool can be effectively avoided in this way, write-in arbitrarily is executed to the target non-volatile memory Operation improves the safety of IMEI code write-in memory.
The coding tools can run on equipment (such as computer, hand being connected with the terminal for executing IMEI code wiring method Machine etc.) in, which, which has, generates IMEI code, and the IMEI code of generation is written to the function of NVRAM.
S203, IMEI code to be written and write code instruction that the coding tools are sent are received, and by the IMEI code to be written, pressed Code instruction is write according to this to be written in the target non-volatile memory.
This writes code instruction, is used to indicate the target non-volatile memory for the IMEI code to be written, is written to specific bit It sets.This, which writes code instruction, can be the instruction that developer or user are issued by the equipment for running the coding tools.Actually answering In, which includes the field (item) of a fixed storage IMEI code.
It should be noted that the embodiment of the present invention can be applied to before mobile call terminal dispatches from the factory be written for the first time The scene of IMEI code also can be applied to after mobile call terminal factory, since owner's fault of mobile call terminal is deleted In addition to having stored IMEI code, need that IMEI code is written again by third party's coding tools the scene of the mobile call terminal.
In the embodiment of the present invention, a reading mode is set by the read-write mode of target non-volatile memory, to writing a yard work Tool authenticated, if by authentication, by the read-write mode of the target non-volatile memory be set as can WriteMode, receive should The IMEI code to be written and write code instruction that coding tools are sent, and by the IMEI code to be written, write code instruction according to this and be written to In the target non-volatile memory, in this way by setting a reading mode for the read-write mode of target non-volatile memory, And third party's coding tools are authenticated, it can effectively prevent IMEI code and arbitrarily usurped by third party's tool of unauthorized Change, and if then avoid conflict caused by due to different mobile phones IMEI code having the same, allow mobile phone just The network of normal access carrier realizes normal talking function.
Referring to Fig. 3, Fig. 3 is the realization for the international mobile equipment identification number wiring method that second embodiment of the invention provides Flow diagram can be applied in terminal as shown in Figure 1.International mobile equipment identification number wiring method shown in Fig. 3, mainly The following steps are included:
301, a reading mode is set by the read-write mode of target non-volatile memory.
The target non-volatile memory is to be built in the terminal for executing IMEI code wiring method, as NVRAM.It should The external interface of target non-volatile memory is set as a reading mode, can prevent not authenticated third party's tool from directly wiping Write the IMEI code stored in NVRAM.
302, coding tools are authenticated, if by authentication, by the read-write mode of the target non-volatile memory Being set as can WriteMode.
It can be authenticated, can also be write with the coding tools and execution IMEI code by way of identifying code or identification code The mode for entering the authentication protocol pre-established between the terminal of method is authenticated, only can to the successful coding tools opening of authentication WriteMode, unknown third party's tool can be effectively avoided so arbitrarily to be write target non-volatile memory execution Enter operation, improves the safety of IMEI code write-in memory.
The coding tools can run on equipment (such as computer, hand being connected with the terminal for executing IMEI code wiring method Machine etc.) in, which, which has, generates IMEI code, and the IMEI code of generation is written to the function of NVRAM.
Further, coding tools are authenticated specifically:
Generate authentication code;
The authentication code of the generation is saved, and the authentication code of the generation is sent to the coding tools;
The authentication code to be authenticated of coding tools transmission is received, and by the authentication code of the authentication code to be authenticated and preservation It compares;
If authentication code that should be to be authenticated is consistent with the authentication code of the preservation, it is determined that the coding tools pass through authentication.
It include one of number, character, pattern or a variety of combinations in the authentication code.If there is multiple coding tools, Multiple coding tools can unify corresponding only one authentication code, or each coding tools setting and coding tools pair The authentication code answered.
303, it generates encryption information and is sent to the coding tools, so that the coding tools wait for this according to the encryption information Write-in IMEI code is encrypted.
Further, it generates encryption information and is sent to the coding tools, so that the coding tools are according to the encryption information The IMEI code to be written is encrypted specifically:
Public key private key corresponding with the public key is generated, and the public key is sent to the coding tools, so that the coding tools The IMEI code to be written is encrypted according to the public key.
Public key and private key generate in pairs, if using public key by data encryption, it can be according to corresponding with the public key The data of private key pair encryption be decrypted.
The encryption information can be the rule of encryption IMEI code to be written, or encrypt the close of IMEI code to be written Key.
304, the encrypted IMEI code to be written and the write instruction for receiving coding tools transmission, decrypt the encryption IMEI code to be written afterwards, and by the IMEI code to be written after decryption, writing code instruction according to this, to be written to the target non-easily In the property lost memory.
This writes code instruction, is used to indicate the target non-volatile memory for the IMEI code to be written, is written to specific bit It sets.This, which writes code instruction, can be the instruction that developer or user are issued by the equipment for running the coding tools.Actually answering In, which includes the field of a fixed storage IMEI code.
Further, the encrypted IMEI code to be written is decrypted, and by the IMEI code to be written after decryption, according to This is write code instruction and is written in the target non-volatile memory
By the encrypted IMEI code to be written, it is decrypted according to the private key;
Validation verification is carried out to the IMEI code to be written after decryption;
If the IMEI code to be written after decryption is pressed the IMEI code to be written after decryption by validation verification Code instruction is write according to this to be written in the target non-volatile memory.
The safety that can further guarantee IMEI code by way of encrypting to IMEI code to be written, avoids not The third party's coding tools known obtain or distort IMEI code.
The string number that IMEI code is made of 15-17 bit digital.(being 6 in early days) class that first part is made of 8 bit digitals Type assigned code (TAC, Type Allocation Code) is to discriminate between the coding of mobile phone brand and model;Second part is by 2 The final assembly ground code (FAC, Final Assembly Code) that number is constituted, FAC code are used for the mitogenetic production in manufacturer inner area Ground code;The factory serial number (SNR, Serial Number) that 6 bit digitals that Part III is started by the 9th form is used for area Divide the production sequence number of every mobile phone;Part IV is identifying code (CD, Check Digit);Part V is software version number (SVN, Software Version Number) only exists for distinguishing the different software versions used when the factory of homotype trumpeter's machine Exist in the part type of part brand.
Can be by the identifying code in the IMEI code to be written after decryption, the IMEI code to be written after verifying decryption No is valid data, if being proved to be successful, it is determined that the IMEI code to be written after decryption passes through validation verification;It can also be with priori Whether demonstrate,prove the IMEI code to be written after decrypting includes 15 bit digitals or 17 bit digitals, if so, after executing by decrypting The step of identifying code in the IMEI code to be written is verified;Can also by verify and in a manner of to after decryption this is to be written Whether the IMEI code to be written after IMEI code verifying decryption is valid data, if being proved to be successful, it is determined that after decryption should be to Write-in IMEI code passes through validation verification.
It should be noted that the embodiment of the present invention can be applied to before mobile call terminal dispatches from the factory be written for the first time The scene of IMEI code also can be applied to after mobile call terminal factory, since owner's fault of mobile call terminal is deleted In addition to having stored IMEI code, need that IMEI code is written again by third party's coding tools the scene of the mobile call terminal.
In the embodiment of the present invention, a reading mode is set by the read-write mode of target non-volatile memory, to writing a yard work Tool authenticated, if by authentication, by the read-write mode of the target non-volatile memory be set as can WriteMode, generate plus Confidential information is simultaneously sent to the coding tools, so that the coding tools add the IMEI code to be written according to the encryption information It is close, receive the encrypted IMEI code to be written and the write instruction of coding tools transmission, decrypt this it is encrypted should be to IMEI code is written, and by the IMEI code to be written after decryption, writes code instruction according to this and is written to target non-volatile storage In device, in this way by setting a reading mode for the read-write mode of target non-volatile memory, and to third party's coding tools It is authenticated, can effectively prevent IMEI code and arbitrarily distorted by third party's tool of unauthorized, and then avoid because different If mobile phone IMEI code having the same and caused by conflict, allow the net of the normal access carrier of mobile phone Network realizes normal talking function.
Referring to Fig. 4, Fig. 4 is the structure for the international mobile equipment identification number writing station that third embodiment of the invention provides Schematic diagram, for ease of description, only parts related to embodiments of the present invention are shown.The exemplary international mobile device of Fig. 4 is known Other code writing station can be holding for the international mobile equipment identification number wiring method that earlier figures 2 and embodiment illustrated in fig. 3 provide Row main body, such as a control module in mobile terminal or mobile terminal.The exemplary international mobile equipment identification number write-in of Fig. 4 Device specifically includes that setup module 401, authentication module 402 and writing module 403.Above each functional module is described in detail such as Under:
Setup module 401, for setting a reading mode for the read-write mode of target non-volatile memory.
The target non-volatile memory is to be built in the terminal for executing IMEI code wiring method, as NVRAM.It should The external interface of target non-volatile memory is set as a reading mode, can prevent not authenticated third party's tool from directly wiping Write the IMEI code stored in NVRAM.
Authentication module 402, for being authenticated to coding tools.
Setup module 401, if being also used to set the read-write mode of the target non-volatile memory to by authentication It can WriteMode.
Writing module 403, for receiving the IMEI code to be written of coding tools transmission and writing code instruction, and this is to be written Enter IMEI code, writes code instruction according to this and be written in the target non-volatile memory.
This writes code instruction, is used to indicate the target non-volatile memory for the IMEI code to be written, is written to specific bit It sets.
The details of the present embodiment not to the greatest extent, please refers to the description of aforementioned embodiment illustrated in fig. 2, details are not described herein again.
It should be noted that in the embodiment of the exemplary international mobile equipment identification number writing station of figure 4 above, each function The division of energy module is merely illustrative of, and can according to need in practical application, such as the configuration requirement or soft of corresponding hardware The convenient of the realization of part considers, and above-mentioned function distribution is completed by different functional modules.Moreover, in practical application, this reality Applying the corresponding functional module in example can be by corresponding hardware realization, can also execute corresponding software by corresponding hardware It completes.Each embodiment that this specification provides can all apply foregoing description principle, repeat no more below.
In the embodiment of the present invention, the read-write mode of target non-volatile memory is set read-only mould by setup module 401 Formula, authentication module 402 authenticate coding tools, if setup module 401 is stored the target non-volatile by authentication The read-write mode of device be set as can WriteMode, writing module 403 receive the coding tools send IMEI code to be written and write code Instruction, by the IMEI code to be written, writes code instruction according to this and is written in the target non-volatile memory, in this way by by mesh The read-write mode of mark nonvolatile memory is set as a reading mode, and authenticates to third party's coding tools, can be effective Prevent IMEI code from arbitrarily being distorted by third party's tool of unauthorized, and if then avoid because different mobile phones have it is identical IMEI code and caused by conflict, allow the network of the normal access carrier of mobile phone, realize normal talking function.
Referring to Fig. 5, the structural representation for the international mobile equipment identification number writing station that fourth embodiment of the invention provides Figure, for ease of description, only parts related to embodiments of the present invention are shown.The exemplary international mobile equipment identification number of Fig. 5 Writing station can be the executing subject for the international mobile equipment identification number wiring method that aforementioned embodiment illustrated in fig. 3 provides, such as A control module in mobile terminal or mobile terminal.The exemplary international mobile equipment identification number writing station of Fig. 5, it is main to wrap It includes: setup module 501, authentication module 502, encrypting module 503, deciphering module 504 and writing module 505.Above each function mould Detailed description are as follows for block:
Setup module 501, for setting a reading mode for the read-write mode of target non-volatile memory.
The target non-volatile memory is to be built in the terminal for executing IMEI code wiring method, as NVRAM.It should The external interface of target non-volatile memory is set as a reading mode, can prevent not authenticated third party's tool from directly wiping Write the IMEI code stored in NVRAM.
Authentication module 502, for being authenticated to coding tools.
Setup module 501, if being also used to set the read-write mode of the target non-volatile memory to by authentication It can WriteMode.
Authentication module 502 can be authenticated by way of identifying code or identification code, can also with the coding tools and The mode for executing the authentication protocol pre-established between the terminal of IMEI code wiring method is authenticated.Only authentication is successfully write Code tool opening can WriteMode, unknown third party's tool can be effectively avoided in this way cannot be arbitrarily to the target non-volatile Memory executes write operation, improves the safety of IMEI code write-in memory.
The coding tools can run on equipment (such as computer, hand being connected with the terminal for executing IMEI code wiring method Machine etc.) in, which, which has, generates IMEI code, and the IMEI code of generation is written to the function of NVRAM.
Further, authentication module 502 is also used to generate authentication code, saves the authentication code of the generation, and by the generation Authentication code is sent to the coding tools, and receives the authentication code to be authenticated of coding tools transmission, and this is to be authenticated Authentication code is compared with the authentication code of preservation, if authentication code that should be to be authenticated is consistent with the authentication code of the preservation, it is determined that this is write Code tool passes through authentication.
It include one of number, character, pattern or a variety of combinations in the authentication code.If there is multiple coding tools, Multiple coding tools can unify corresponding only one authentication code, or each coding tools setting and coding tools pair The authentication code answered.
Encrypting module 503, for generating encryption information and being sent to the coding tools, so that the coding tools add according to this Confidential information encrypts the IMEI code to be written.
The encryption information can be the rule of encryption IMEI code to be written, or encrypt the close of IMEI code to be written Key.
Further, encrypting module 503 are also used to generate public key private key corresponding with the public key, and the public key are sent To the coding tools, so that the coding tools encrypt the IMEI code to be written according to the public key.
Public key and private key generate in pairs, if using public key by data encryption, it can be according to corresponding with the public key The data of private key pair encryption be decrypted.
Writing module 505, the encrypted IMEI code to be written and the write-in for receiving coding tools transmission refer to It enables.
This writes code instruction, is used to indicate the target non-volatile memory for the IMEI code to be written, is written to specific bit It sets.This, which writes code instruction, can be the instruction that developer or user are issued by the equipment for running the coding tools.Actually answering In, which includes the field of a fixed storage IMEI code.
Deciphering module 504, for decrypting the encrypted IMEI code to be written, and by the IMEI to be written after decryption Code, writes code instruction according to this and is written in the target non-volatile memory.
Further, deciphering module 504 are also used to be solved the encrypted IMEI code to be written according to the private key It is close, and validation verification is carried out to the IMEI code to be written after decryption.
Further, writing module 505, if the IMEI code to be written after being also used to decrypt passes through validation verification, By the IMEI code to be written after decryption, code instruction is write according to this and is written in the target non-volatile memory.
Deciphering module 504 can by the identifying code in the IMEI code to be written after decryption, after verifying decryption should be to Be written whether IMEI code is valid data, if being proved to be successful, it is determined that the IMEI code to be written after decryption is tested by validity Card;Deciphering module 504 can also first verify the IMEI code to be written after decryption whether comprising 15 bit digitals or 17 bit digitals, If so, executing the step of being verified by the identifying code in the IMEI code to be written after decryption;Deciphering module 504 may be used also By by verify and in a manner of whether be effective to the IMEI code to be written after IMEI code to be written verifying decryption after decryption Data, if being proved to be successful, it is determined that the IMEI code to be written after decryption passes through validation verification.
It should be noted that the embodiment of the present invention can be applied to before mobile call terminal dispatches from the factory be written for the first time The scene of IMEI code also can be applied to after mobile call terminal factory, since owner's fault of mobile call terminal is deleted In addition to having stored IMEI code, need that IMEI code is written again by third party's coding tools the scene of the mobile call terminal.
The details of the present embodiment not to the greatest extent, please refers to the description of earlier figures 2 and embodiment illustrated in fig. 3, details are not described herein again.
In the embodiment of the present invention, the read-write mode of target non-volatile memory is set read-only mould by setup module 501 Formula, authentication module 502 authenticate coding tools, if setup module 501 is stored the target non-volatile by authentication The read-write mode of device be set as can WriteMode, encrypting module 503 generate encryption information simultaneously be sent to the coding tools so that this is write Code tool encrypts the IMEI code to be written according to the encryption information, and writing module 505 receives what the coding tools were sent The encrypted IMEI code to be written and the write instruction, deciphering module 504 are decrypted the encrypted IMEI code to be written, are write Enter module 505 for the IMEI code to be written after decryption, write code instruction according to this and be written in the target non-volatile memory, In this way by setting a reading mode for the read-write mode of target non-volatile memory, and reflect to third party's coding tools Power, can effectively prevent IMEI code and is arbitrarily distorted by third party's tool of unauthorized, and then avoid because of different mobile electricity Conflict caused by if talking about IMEI code having the same, allow the network of the normal access carrier of mobile phone, realizes Normal talking function.
In multiple embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the module It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple module or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling or direct-coupling or communication linkage discussed can be through some interfaces, the indirect coupling of device or module Conjunction or communication linkage can be electrical property, mechanical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in a processing module It is that modules physically exist alone, can also be integrated in two or more modules in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.
It should be noted that for the various method embodiments described above, describing for simplicity, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, certain steps can use other sequences or carry out simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules might not all be this hair Necessary to bright.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
The above are retouch to international mobile equipment identification number wiring method, device and mobile terminal provided by the present invention It states, for those skilled in the art, thought according to an embodiment of the present invention can in specific embodiments and applications There is change place, to sum up, the contents of this specification are not to be construed as limiting the invention.

Claims (11)

1. a kind of international mobile equipment identification number wiring method characterized by comprising
A reading mode is set by the read-write mode of target non-volatile memory;
Coding tools are authenticated, if being set the read-write mode of the target non-volatile memory to by authentication It can WriteMode;
Receive the international mobile equipment identification number IMEI code to be written and write code instruction that the coding tools are sent, and will it is described to IMEI code is written, is written in the target non-volatile memory according to the code instruction of writing.
2. the method according to claim 1, wherein it is described to coding tools carry out authentication include:
Generate authentication code;
The authentication code of the generation is saved, and the authentication code of the generation is sent to the coding tools;
Receive the authentication code to be authenticated that the coding tools are sent, and by the mirror of the authentication code to be authenticated and the preservation Weighted code compares;
If the authentication code to be authenticated is consistent with the authentication code of the preservation, it is determined that the coding tools pass through authentication.
3. method according to claim 1 or 2, which is characterized in that described to receive the to be written of the coding tools transmission International mobile equipment identification number IMEI code and write code instruction, and will the IMEI code to be written, be written according to the code instruction of writing Include: before into the target non-volatile memory
Generate encryption information and be simultaneously sent to the coding tools so that the coding tools according to the encryption information to it is described to Write-in IMEI code is encrypted;
It is then described to receive the international mobile equipment identification number IMEI code to be written and write code instruction that the coding tools are sent, and will The IMEI code to be written, according to it is described write code instruction and be written in the target non-volatile memory include:
Receive the encrypted IMEI code to be written that the coding tools are sent and it is described write code instruction, decrypt the encryption The IMEI code to be written afterwards, and by the IMEI code to be written after decryption, according to it is described write code instruction be written to it is described In target non-volatile memory.
4. according to the method described in claim 3, it is characterized in that, the generation encryption information and being sent to and described writing a yard work Tool so that the coding tools according to the encryption information to the IMEI code to be written carry out encryption include:
Public key and the corresponding private key of the public key are generated, and the public key is sent to the coding tools, so that described write code Tool encrypts the IMEI code to be written according to the public key.
5. according to the method described in claim 4, it is characterized in that, the decryption encrypted IMEI to be written Code, and by the IMEI code to be written after decryption, the target non-volatile memory is written to according to the code instruction of writing In include:
By the encrypted IMEI code to be written, it is decrypted according to the private key;
Validation verification is carried out to the IMEI code to be written after decryption;
If the IMEI code to be written after decryption is pressed the IMEI code to be written after decryption by validation verification It is written in the target non-volatile memory according to the code instruction of writing.
6. a kind of international mobile equipment identification number writing station, which is characterized in that described device includes:
Setup module, for setting a reading mode for the read-write mode of target non-volatile memory;
Authentication module, for being authenticated to coding tools;
The setup module, if being also used to set the read-write mode of the target non-volatile memory to by authentication It can WriteMode;
Writing module, for receiving the IMEI code to be written and write code instruction that the coding tools are sent, and will be described to be written IMEI code is written in the target non-volatile memory according to the code instruction of writing.
7. device according to claim 6, which is characterized in that
The authentication module is also used to generate authentication code, saves the authentication code of the generation, and the authentication code of the generation is sent out The coding tools are given, and, receive the authentication code to be authenticated that the coding tools are sent, and by the mirror to be authenticated Weighted code is compared with the authentication code of the preservation, if the authentication code to be authenticated is consistent with the authentication code of the preservation, really The fixed coding tools pass through authentication.
8. device according to claim 6 or 7, which is characterized in that
Described device further include:
Encrypting module, for generating encryption information and being sent to the coding tools, so that the coding tools add according to described Confidential information encrypts the IMEI code to be written;
The write module is also used to receive the encrypted IMEI code to be written that the coding tools are sent and described writes Code instruction;
Described device further include:
Deciphering module, for decrypting the encrypted IMEI code to be written;
The write module, the IMEI code to be written after being also used to decrypt, according to it is described write code instruction be written to it is described In target non-volatile memory.
9. device according to claim 8, which is characterized in that
The encrypting module is also used to generate public key and the corresponding private key of the public key, and the public key is sent to described write Code tool, so that the coding tools encrypt the IMEI code to be written according to the public key.
10. device according to claim 9, which is characterized in that
The deciphering module is also used to for the encrypted IMEI code to be written being decrypted according to the private key, and to solution The IMEI code to be written after close carries out validation verification;
The write module, if the IMEI code to be written after being also used to decrypt passes through validation verification, after decryption The IMEI code to be written is written in the target non-volatile memory according to the code instruction of writing.
11. a kind of mobile terminal, which is characterized in that the mobile terminal includes:
Memory and processor;
The memory is stored with executable program code;
The processor coupled with the memory calls the executable program code stored in the memory, holds It goes such as claim 1 to the described in any item international mobile equipment identification number wiring methods of claim 5.
CN201611145091.3A 2016-12-13 2016-12-13 International mobile equipment identification number wiring method, device and mobile terminal Expired - Fee Related CN106792637B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611145091.3A CN106792637B (en) 2016-12-13 2016-12-13 International mobile equipment identification number wiring method, device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611145091.3A CN106792637B (en) 2016-12-13 2016-12-13 International mobile equipment identification number wiring method, device and mobile terminal

Publications (2)

Publication Number Publication Date
CN106792637A CN106792637A (en) 2017-05-31
CN106792637B true CN106792637B (en) 2019-08-16

Family

ID=58880554

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611145091.3A Expired - Fee Related CN106792637B (en) 2016-12-13 2016-12-13 International mobile equipment identification number wiring method, device and mobile terminal

Country Status (1)

Country Link
CN (1) CN106792637B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107613493A (en) * 2017-08-02 2018-01-19 捷开通讯(深圳)有限公司 Intelligent terminal and its antitheft method, the device with store function
CN107506665A (en) * 2017-08-30 2017-12-22 惠州Tcl移动通信有限公司 A kind of method, storage medium and mobile phone for rewriting encryption mobile phone MEID
CN108024242A (en) * 2017-12-01 2018-05-11 广东欧珀移动通信有限公司 Information Authentication method and device, terminal and computer-readable recording medium
CN109446234B (en) * 2018-10-12 2021-10-19 Oppo广东移动通信有限公司 Data processing method and device and electronic equipment
CN109618327B (en) * 2018-11-27 2021-08-13 Oppo(重庆)智能科技有限公司 Software adaptation method and device, electronic equipment and readable storage medium
CN109558755B (en) * 2018-12-03 2022-03-29 Oppo(重庆)智能科技有限公司 Data writing method, electronic device, and computer-readable storage medium
CN111093190B (en) * 2019-12-10 2024-02-20 爱讯智联科技(北京)有限公司 Method, device, system, electronic equipment and storage medium for writing key data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101111018A (en) * 2006-07-21 2008-01-23 中兴通讯股份有限公司 Method for implementing PHS mobile phone network locking and unlocking
CN103391537A (en) * 2013-06-24 2013-11-13 上海天奕达电子科技有限公司 Method and device for writing international mobile equipment identify (IMEI) number through mobile terminal
CN105120451A (en) * 2015-09-07 2015-12-02 广东欧珀移动通信有限公司 Method for realizing card-less operation of mobile terminal, operator business platform and mobile terminal
CN105933888A (en) * 2016-06-28 2016-09-07 宇龙计算机通信科技(深圳)有限公司 Burning method and device of eSIM (Subscriber Identity Module) card based on NFC

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101111018A (en) * 2006-07-21 2008-01-23 中兴通讯股份有限公司 Method for implementing PHS mobile phone network locking and unlocking
CN103391537A (en) * 2013-06-24 2013-11-13 上海天奕达电子科技有限公司 Method and device for writing international mobile equipment identify (IMEI) number through mobile terminal
CN105120451A (en) * 2015-09-07 2015-12-02 广东欧珀移动通信有限公司 Method for realizing card-less operation of mobile terminal, operator business platform and mobile terminal
CN105933888A (en) * 2016-06-28 2016-09-07 宇龙计算机通信科技(深圳)有限公司 Burning method and device of eSIM (Subscriber Identity Module) card based on NFC

Also Published As

Publication number Publication date
CN106792637A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
CN106792637B (en) International mobile equipment identification number wiring method, device and mobile terminal
CN109906623B (en) Profile downloading method and device
CN106484484B (en) Application program installs management method and terminal device
CN106464498B (en) Method for authenticating a first electronic entity by a second electronic entity and electronic entity
JP4792037B2 (en) System and method for user certificate initialization, distribution, and distribution in a centralized WLAN-WWAN interaction network
JP5508428B2 (en) Key distribution method and system
CN104519480B (en) Communication control unit, authentication device, central controller and communication system
EP2988470A1 (en) Automatic purposed-application creation
CN109756447A (en) A kind of safety certifying method and relevant device
CN109218263A (en) A kind of control method and device
BRPI0816328A2 (en) update mobile devices with additional elements
CN108762791A (en) Firmware upgrade method and device
US11563730B2 (en) Method and electronic device for managing digital keys
CN105101169A (en) Method and apparatus of information processing by trusted execution environment, terminal and SIM card
CN105376059A (en) Method and system for performing application signature based on electronic key
KR20160143333A (en) Method for Double Certification by using Double Channel
CN105577375A (en) Identity authentication method and device
CN104378375A (en) Remote access method for mobile phone, terminal device, server and system
US20130073840A1 (en) Apparatus and method for generating and managing an encryption key
CN111404706A (en) Application downloading method, secure element, client device and service management device
JP2019500798A (en) Data receiving method in electronic entity and related electronic entity
CN104917718A (en) Method and terminal for fast authentication of mobile terminal user and application server
CN107248910A (en) Method for security protection and equipment
CN101841783A (en) Short message safety communication method, system and device based on STK (SIM Tool Kit) business
CN107111707A (en) Smart card, mobile terminal and the method that network ID authentication is carried out using smart card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190816

CF01 Termination of patent right due to non-payment of annual fee