CN109548002B - Authorization method for controlling functions of SIM card of mobile phone - Google Patents

Authorization method for controlling functions of SIM card of mobile phone Download PDF

Info

Publication number
CN109548002B
CN109548002B CN201811518110.1A CN201811518110A CN109548002B CN 109548002 B CN109548002 B CN 109548002B CN 201811518110 A CN201811518110 A CN 201811518110A CN 109548002 B CN109548002 B CN 109548002B
Authority
CN
China
Prior art keywords
authorization
authorized user
code
authorized
sim card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811518110.1A
Other languages
Chinese (zh)
Other versions
CN109548002A (en
Inventor
余晓峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Youzhongli Information Technology Co ltd
Original Assignee
Nanjing Youzhongli Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Youzhongli Information Technology Co ltd filed Critical Nanjing Youzhongli Information Technology Co ltd
Priority to CN201811518110.1A priority Critical patent/CN109548002B/en
Publication of CN109548002A publication Critical patent/CN109548002A/en
Application granted granted Critical
Publication of CN109548002B publication Critical patent/CN109548002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the technical field of information data processing, and discloses an authorization method for controlling functions of a mobile phone SIM card, wherein after an authorized user selects information of the authorized user, a platform automatically generates an authorization two-dimensional code, the two-dimensional code is sent to the authorized user by the authorized user, meanwhile, the platform generates an authorization verification code which is correspondingly matched and stored in the platform, after the authorized user receives the two-dimensional code and confirms the two-dimensional code, the platform automatically carries out secondary encryption according to the two-dimensional code information received by the authorized user and an identification code of the authorized user, and generates an authorization verification code, when the authorization verification code is consistent with the corresponding authorization verification code, authorization is successful, otherwise, authorization is failed; if the authorized user refuses to accept the authorization, the authorization fails. The invention can realize various functions of authorizing others to manage a specified SIM card through a rapid and convenient process, and can increase the flexibility of user management and improve the use experience of users.

Description

Authorization method for controlling functions of SIM card of mobile phone
Technical Field
The invention belongs to the technical field of information data processing, and particularly relates to an authorization method for controlling functions of an SIM card of a mobile phone.
Background
Currently, the current state of the art commonly used in the industry is such that:
the communication function of the SIM card is controlled, and an operator in the industry controls the SIM card to stop communication according to the credit degree by comparing the charging of the user usage amount and the deduction of the user payment balance data, and the like, so that the SIM card can not be opened for a terminal user generally, and other similar means have various problems.
In summary, the problems of the prior art are as follows:
(1) in the prior art, various functions of authorizing others to manage a certain specified SIM card cannot be realized through a rapid and convenient process, so that the flexibility of user management is increased, and the use experience of a user cannot be improved.
(2) The operator controls the functions of the SIM card, such as stopping and repeating communication and the like according to the condition of paying the balance by using the amount of the terminal user, and an individual customer cannot actively control the functions.
(3) The Android mobile phone can be provided with management application to control communication of a bottom operating system of the mobile phone, but the permission needs to be opened. iOS cannot be controlled (unless the jail is crossed) due to the higher level of security.
(4) Some special wearable equipment like children's wrist-watch can be by the special APP of head of a family installation after manage and control this equipment communication function, but use limitation and audience too little, the suitability is little
The significance of solving the technical problems is as follows:
the problem that the frequency, time and even internet access content of the mobile phone used by the students are forcibly controlled by the students' household; avoid the increasingly mixed and disorderly internet information to influence the academic and life of students.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides an authorization method for controlling the functions of a mobile phone SIM card.
The invention is realized in such a way that an authorization method for controlling the functions of the SIM card of a mobile phone comprises the following steps:
authorizing the two-dimensional code: the two-dimension code information comprises a timestamp, a multi-bit random code, an SIM card ICCID number, an authorized user identification code and the information which are encrypted, and the encrypted information generates an authorized two-dimension code.
Authorization verification code: and the password generated after the information corresponding to the authorized two-dimensional code and the authorized user identification code are subjected to secondary encryption is automatically generated by the platform when the authorized user sends the authorization.
Authorization verification code: the coding mode is consistent with the authorization verification code, and the platform automatically generates when the authorized user receives authorization.
The authorization method comprises the following steps: after the authorized user selects the authorized user information, the platform automatically generates an authorized two-dimensional code, the two-dimensional code is sent to the authorized user by the authorized user, meanwhile, the platform can generate a correspondingly matched authorized verification code to be stored in the platform, after the authorized user receives the two-dimensional code, the authorized user clicks to confirm to accept authorization, the platform automatically carries out secondary encryption according to the two-dimensional code information received by the authorized user and the authorized user identification code, an authorized verification code is generated, when the authorized verification code is consistent with the corresponding authorized verification code, authorization is successful, and otherwise authorization is failed. If the authorized user refuses to accept the authorization, the authorization fails.
Whether the authorization result is successful or failed, after the authorization process is finished, the authorization two-dimensional code, the authorization verification code and the authorization verification and cancellation code generated by the platform in the authorization process are invalid.
Another object of the present invention is to provide a computer program for implementing the authorization method for controlling the SIM card function of a mobile phone.
Another object of the present invention is to provide an information data processing terminal implementing an authorization method for controlling a SIM card function of a mobile phone.
Another object of the present invention is to provide a computer-readable storage medium, comprising instructions which, when run on a computer, cause the computer to perform the authorization method for controlling the SIM card functionality of a handset.
Another object of the present invention is to provide an authorization network platform for controlling the SIM card function of a mobile phone, which implements the authorization method for controlling the SIM card function of a mobile phone.
In summary, the advantages and positive effects of the invention are:
the invention can realize various functions of authorizing others to manage a specified SIM card through a rapid and convenient process, and can increase the flexibility of user management and improve the use experience of users.
Drawings
Fig. 1 is a flowchart of an authorization method for controlling a SIM card function of a mobile phone according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the prior art, various functions of authorizing others to manage a certain specified SIM card cannot be realized through a rapid and convenient process, so that the flexibility of user management is increased, and the use experience of a user cannot be improved.
In the embodiment of the invention, in the process of performing secondary MD5 encryption, an encryption method similar to MD5 is applicable to the invention.
As shown in fig. 1, an authorization method for controlling a function of a mobile phone SIM card provided in an embodiment of the present invention includes:
s101, authorizing the two-dimensional code: the two-dimensional code information comprises a timestamp, a multi-bit random code, an SIM card ICCID number and an authorized user identification code, the information is subjected to MD5 encryption, and the encrypted information generates an authorized two-dimensional code.
S102, authorizing the verification code: and the MD5 information corresponding to the authorized two-dimensional code and the MD5 code generated by carrying out secondary MD5 encryption on the authorized user identification code are automatically generated by the platform when the authorized user sends the authorization.
S103, authorizing the verification and cancellation code: the coding mode is consistent with the authorization verification code, and the platform automatically generates when the authorized user receives authorization.
S104, authorization: after the authorized user selects the authorized user information, the platform automatically generates an authorized two-dimensional code, the two-dimensional code is sent to the authorized user by the authorized user, meanwhile, the platform can generate a correspondingly matched authorized verification code to be stored in the platform, after the authorized user receives the two-dimensional code, the authorized user clicks to confirm to accept authorization, the platform automatically carries out secondary MD5 encryption according to the two-dimensional code information received by the authorized user and the authorized user identification code, an authorized verification code is generated, when the authorized verification code is consistent with the corresponding authorized verification code, authorization is successful, otherwise, authorization fails. If the authorized user refuses to accept the authorization, the authorization fails. Whether the authorization result is successful or failed, after the authorization process is finished, the authorization two-dimensional code, the authorization verification code and the authorization verification and cancellation code generated by the platform in the authorization process are invalid.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When used in whole or in part, can be implemented in a computer program product that includes one or more computer instructions. When loaded or executed on a computer, cause the flow or functions according to embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL), or wireless (e.g., infrared, wireless, microwave, etc.)). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (4)

1. An authorization method for controlling the functions of a mobile phone SIM card is characterized in that the authorization method for controlling the functions of the mobile phone SIM card comprises the following steps:
authorizing the two-dimensional code: the system is used for encrypting the timestamp, the multi-bit random code, the SIM card ICCID number and the authorized user identification code information, and the encrypted information generates an authorized two-dimensional code;
authorization verification code: the password is generated after information corresponding to the authorization two-dimensional code and the authorized user identification code are subjected to secondary MD5 encryption, and is automatically generated by the platform when the authorization user sends authorization;
authorization verification code: the encoding mode is consistent with the authorization verification code, and the platform automatically generates when the authorized user receives authorization;
authorization: after an authorized user selects information of the authorized user, the platform automatically generates an authorized two-dimensional code, the two-dimensional code is sent to the authorized user by the authorized user, meanwhile, the platform generates a correspondingly matched authorized verification code to be stored in the platform, after the authorized user receives the two-dimensional code and confirms the two-dimensional code, the platform automatically carries out secondary encryption according to the two-dimensional code information received by the authorized user and an authorized user identification code, and generates an authorized verification code, when the authorized verification code is consistent with the corresponding authorized verification code, authorization is successful, otherwise authorization is failed; if the authorized user refuses to accept the authorization, the authorization fails; whether the authorization result is successful or failed, after the authorization process is finished, the authorization two-dimensional code, the authorization verification code and the authorization verification and cancellation code generated by the platform in the authorization process are invalid.
2. An information data processing terminal implementing the authorization method for controlling the functions of a SIM card of a handset as claimed in claim 1.
3. A computer-readable storage medium comprising instructions which, when run on a computer, cause the computer to perform the authorization method for controlling the functionality of a SIM card of a handset as claimed in claim 1.
4. An authorization network platform for controlling the functions of the SIM card of the mobile phone, which implements the authorization method for controlling the functions of the SIM card of the mobile phone of claim 1.
CN201811518110.1A 2018-12-12 2018-12-12 Authorization method for controlling functions of SIM card of mobile phone Active CN109548002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811518110.1A CN109548002B (en) 2018-12-12 2018-12-12 Authorization method for controlling functions of SIM card of mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811518110.1A CN109548002B (en) 2018-12-12 2018-12-12 Authorization method for controlling functions of SIM card of mobile phone

Publications (2)

Publication Number Publication Date
CN109548002A CN109548002A (en) 2019-03-29
CN109548002B true CN109548002B (en) 2022-02-08

Family

ID=65854472

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811518110.1A Active CN109548002B (en) 2018-12-12 2018-12-12 Authorization method for controlling functions of SIM card of mobile phone

Country Status (1)

Country Link
CN (1) CN109548002B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111401490A (en) * 2020-02-17 2020-07-10 上海博泰悦臻电子设备制造有限公司 Two-dimensional code obtaining method and related device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297436A (en) * 2013-06-14 2013-09-11 大连三通科技发展有限公司 Electronic authorization method and system
CN103401868A (en) * 2013-07-31 2013-11-20 广东欧珀移动通信有限公司 Temporary authorization method for mobile communication equipment of authorizing party and authorized party and temporary authorization management method and device for manager
CN104253689A (en) * 2013-06-28 2014-12-31 中国电信股份有限公司 User identity module card generated dynamic password authentication method and system based on QR (quick response) code
CN104318437A (en) * 2014-10-11 2015-01-28 上海众人科技有限公司 Online payment system and payment method for virtual prepaid card

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100077467A1 (en) * 2008-09-19 2010-03-25 Microsoft Corporation Authentication service for seamless application operation
CN102821104B (en) * 2012-08-09 2014-04-16 腾讯科技(深圳)有限公司 Authorization method, authorization device and authorization system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297436A (en) * 2013-06-14 2013-09-11 大连三通科技发展有限公司 Electronic authorization method and system
CN104253689A (en) * 2013-06-28 2014-12-31 中国电信股份有限公司 User identity module card generated dynamic password authentication method and system based on QR (quick response) code
CN103401868A (en) * 2013-07-31 2013-11-20 广东欧珀移动通信有限公司 Temporary authorization method for mobile communication equipment of authorizing party and authorized party and temporary authorization management method and device for manager
CN104318437A (en) * 2014-10-11 2015-01-28 上海众人科技有限公司 Online payment system and payment method for virtual prepaid card

Also Published As

Publication number Publication date
CN109548002A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
US11949685B2 (en) Application platform with flexible permissioning
US10326637B2 (en) Functionality management via application modification
US9730044B2 (en) Telecommunications data usage management
US10687205B1 (en) Remote operational management of E-SIM
US9585016B2 (en) Data communications management
US20130054697A1 (en) System and method for sharing content using near field communication in a cloud network
WO2015116577A1 (en) Client authentication using social relationship data
CN103944737A (en) User identity authentication method, third-party authentication platform and operator authentication platform
CN103403669A (en) Securing and managing APPs on a device
US10218707B2 (en) Controlling access to computer accounts managed by a computer account server to provide handoff to a nominee computer terminal
US20190026704A1 (en) Method of registering a membership for an electronic payment, system for same, and apparatus and terminal thereof
US20170132618A1 (en) Mobile card service method utilizing hce, and mobile terminal applying same
CN105516136A (en) Authority management method, device and system
CN109548002B (en) Authorization method for controlling functions of SIM card of mobile phone
CN105392112B (en) Guard method, equipment and the system of MTC device information
CN108021967B (en) Method and device for copying intelligent card and computer readable storage medium
KR101467228B1 (en) Method for preventing outflow file and device thereof
KR20140013639A (en) Method for controlling access applet, apparatus and system for the same
CN105678543A (en) Payment secret key calculating method and device
KR101842678B1 (en) Payment control apparatus and payment server
JP2019110452A (en) Terminal system, terminal and module
US9106766B2 (en) Phone call management
KR20190065083A (en) Management system for sim card, communication terminal and method thereof
CN103235917A (en) Application protection method and device
KR102668016B1 (en) Method for payment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant