CN1200573C - Wireless beep pager protected by encoding handset codes and its method - Google Patents
Wireless beep pager protected by encoding handset codes and its method Download PDFInfo
- Publication number
- CN1200573C CN1200573C CNB031041884A CN03104188A CN1200573C CN 1200573 C CN1200573 C CN 1200573C CN B031041884 A CNB031041884 A CN B031041884A CN 03104188 A CN03104188 A CN 03104188A CN 1200573 C CN1200573 C CN 1200573C
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- phone code
- information
- code
- machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The present invention relates to a wireless pager protected through codes of a cell phone and a method thereof. The wireless pager has coded cell phone code hidden text, and the cell phone code hidden text is obtained in a mode that at lest one key value executes a code program for the cell phone of the pager. When the pager receives information on cell phone codes, at least one key value executes a decoding program for the cell phone code hidden text, and the cell phone codes are generated so as to compare the cell phone codes with the cell phone codes in received information. The received information is processed and executed during the coincidence.
Description
(1) technical field
The invention relates to a kind of data roam machine, refer to a kind of data roam machine and method thereof that the mobile phone code coding is protected especially.
(2) background technology
In the field of mechanics of communication, usually must carry out the affirmation of user's status and the encryption of data, to realize the fail safe of data passes, with traditional both-way communication, as shown in Figure 1, at two-way communication link two ends one server-side 11 and a client 12 are arranged, when the client kicks 12 will obtain the information of server-side 11 time, general security mechanism is to login (login) with user's title (user name) and password (password) to this server-side 11, authentication success Hou that the spy logins, server-side 11 just can send information to client 12, so can realize the fail safe of data passes.
Yet, in the technical field of radio-paging, as shown in Figure 2, base station 21 is in the radio broadcasting mode information to be sent out, and can be received by message transmitting machine 22, therefore, system also can't learn how many message transmitting machines 22 are in reception information, and in order to ensure having only the legal user can receiving broadcasting information, when general dealer can rent message transmitting machine 22 in the user Shen, just give this message transmitting machine at least one identification code, for example, record writes in read-only memory or the flash memory, and also have identification code in the information that the dealer of system is transmitted, could receive this broadcast message so that have one or more message transmitting machines 22 of corresponding identification code, in addition, for further controlling or set specific message transmitting machine 22, the dealer is the mobile phone code that gives a correspondence at each message transmitting machine, this mobile phone code is from ordering by the dealer, same burning is in read-only memory or flash memory, when the dealer wants nationality by transmitting information at some specific message transmitting machine in the air, then in the information that transmits, revest the mobile phone code of this mobile phone, this mobile phone code is the mobile phone code that corresponds to this specific message transmitting machine 22, when message transmitting machine 22 is received this broadcast message, the specific message transmitting machine 22 that only has corresponding mobile phone code just can be handled, carry out this information, with setting and control, for example open-minded at these message transmitting machine 22 enterprising line correlations, close or change identification code etc.
Under the security mechanism of above radio-paging, because paging system also can't be known the amount of information that each message transmitting machine receives, therefore, existing charge method is to collect fixing monthly fee by the dealer to the user, and no matter how much information the user received in every month, with this framework, rent the Hou of a message transmitting machine when the user Shen, just obtain the identification code and the mobile phone code of a combined method, and can come reception information by this message transmitting machine of legal use, and, this group identification code and mobile phone code be written in the memory of message transmitting machine because being records, so identification code and mobile phone code that the user also may be directly legal with this duplicate (copy) to other message transmitting machine, and make many equal accessible informations of message transmitting machine, and because the dealer of system transmits information in the radio broadcasting mode, so the message transmitting machine that can't learn how many platform same identification sign indicating numbers and mobile phone code is in reception information, but the user really only pays the expense of a message transmitting machine, therefore cause the dealer to lose greatly.
(3) summary of the invention
Main purpose of the present invention is to be to guarantee that message transmitting machine can be by fraudulent copying.
According to one aspect of the present invention, be to propose a kind of data roam machine that the mobile phone code coding is protected, in order to receive the information that is transmitted in the mode of radio broadcasting by informant end, these data roam facility have: a receiver, in order to receive the information of radio broadcasting; At least one memory can be for storing an information and a mobile phone code dark text through coding that is received, and this mobile phone code dark text is to carry out a coded program gained with the mobile phone code of at least one this message transmitting machine of key-value pair; And a microprocessor, control this receiver and memory and receive and store information; Wherein, when receiving the information that is provided with the mobile phone code, this microprocessor is to carry out a decoding program with this mobile phone code dark text of this at least one key-value pair, restore a mobile phone code and produce, so that compare the mobile phone code of the information of being received with this mobile phone code, and when conforming to, just handle, carry out the information content that is received.
According to the present invention on the other hand, be to propose a kind of method of protecting the data roam machine with coding generation mobile phone code, these data roam facility have a mobile phone code dark text through coding, this mobile phone code dark text is to carry out a coded program gained with the mobile phone code of at least one this message transmitting machine of key-value pair, and this method mainly may further comprise the steps: (A) reception has the information of mobile phone code; (B) read at least one key assignments; (C) carry out a decoding program with this mobile phone code dark text of this at least one key-value pair, restore the mobile phone code and produce; And the mobile phone code of (D) comparing the information of being received, and when conforming to, just handle, carry out the information content that is received with this mobile phone code.
Be clearer understanding purpose of the present invention, characteristics and advantage, below in conjunction with accompanying drawing to of the present invention preferable
Embodiment is elaborated.
(4) description of drawings
Fig. 1 is the schematic diagram that shows the information of transmitting with both-way communication.
Fig. 2 is the schematic diagram that shows the information of transmitting with wireless communication system.
Fig. 3 is the Organization Chart of the data roam machine of protecting with the mobile phone code coding of the present invention.
Fig. 4 shows according to mobile phone code dark text of the present invention to produce flow chart.
Fig. 5 is a flow chart of protecting the method for data roam machine with the mobile phone code coding of the present invention.
(5) embodiment
At first see also Fig. 3, it is the enforcement state diagram of preferred embodiment of the present invention, wherein, the informant holds 31 to be that information is sent out by the mode of base station 32 with radio broadcasting, and can be received by message transmitting machine 33, this message transmitting machine 33 has receiver 331, microprocessor 332, memory 333, and setting such as display unit 334, so that can receive the information of radio broadcastings with receiver 331, and is stored in memory 333 and by display unit 334 demonstrations.Wherein, this memory 333 also stores a mobile phone code dark text through coding, mobile phone code dark text as shown in Figure 4 produces flow chart, this mobile phone code dark text is when the ancestral's message transmitting machine 33 of user Shen, with at least one key assignments (key) the mobile phone code of this message transmitting machine 33 is carried out a coded program gained by the dealer of system, and this mobile phone code dark text is stored in the memory 333 of message transmitting machine 33.
Fig. 5 shows that the present invention protects the flow chart of the method for data roam machine with the mobile phone code coding; wherein; when message transmitting machine 33 is received the information with mobile phone code (step S501); its microprocessor 332 is at first by reading the mobile phone code dark text (step S502) that prestores in the memory 333; obtain the required key assignments (key) (step S503) of decoding again; right Hou; microprocessor 332 is carried out the decoding program (step S504) of a correspondence with this mobile phone code dark text of this key-value pair; and produce a mobile phone code (step S505); and the mobile phone code of the information of being received with the comparison of this mobile phone code; as when conforming to; understand the information content (step S506), and carry out corresponding operation.For example open, close or change the identification code of data roam machine etc.
The key assignments that abovementioned steps S503 uses can be in advance, and record is written in the memory 333, because being the mobile phone code dark text that cooperates a decoding program could will be pre-stored in the memory 333, this key assignments is reduced into available mobile phone code, therefore, illegal user can be copied to this mobile phone code dark text and key assignments on another message transmitting machine, owing to can't learn original coded program, reduce available mobile phone code so still can't carry out correct decoding, so the mobile phone code that can effectively prevent message transmitting machine is by fraudulent copying.
Again in aforesaid message transmitting machine 33, this receiver 331, microprocessor 332, memory 333 and display unit 334 all include various integrated circuit (IC) chip, or itself be an integrated circuit (IC) chip, for example, this receiver or microprocessor can be made becomes single integrated circuit (IC) chip, and known integrated circuit (IC) chip manufacturer is when making some integrated circuit (IC) chip, can give a chip a unique sequence number, this sequence number can be not identical with the sequence number of other integrated circuit (IC) chip, can not be changed, for example, each receiver or microprocessor chip all have its unique sequence number, in the memory 333 of aforementioned message transmitting machine 33, just be provided with flash memory chip 3331 in addition with unique serial number.Therefore, one of key assignments that abovementioned steps S503 uses can be the unique serial number of aforementioned integrated circuit (IC) chip, for example, the unique serial number of this flash memory chip 3331 in view of the above, had both made illegal user can crack the employed coded program of message transmitting machine, but has only one owing to have the flash memory chip 3331 of this key assignments, therefore, it also can't produce identical useful mobile phone code at different message transmitting machine, so the mobile phone code that can prevent message transmitting machine fully is by fraudulent copying.
Though more than described preferred embodiment of the present utility model, this preferred embodiment is not to be used to limit the utility model.Be familiar with the those of ordinary skill of present technique and also can make all equivalence variations or equivalence replacement according to the spirit that the utility model disclosed, the replacement of the variation of these equivalences or equivalence all should be included in the scope of the present utility model.Therefore, scope of the present utility model should be as the criterion with appended claim institute restricted portion.
Claims (4)
1. method of the mobile phone code coding being protected the data roam machine; these data roam facility have a mobile phone code dark text through coding; this mobile phone code dark text is to carry out a coded program gained with the mobile phone code of at least one this message transmitting machine of key-value pair; it is characterized in that this method mainly may further comprise the steps:
(A) reception has the information of mobile phone code;
(B) read at least one key assignments, carry out a decoding program with this mobile phone code dark text of this at least one key-value pair, and produce a mobile phone code; And
(C) compare the mobile phone code of the information of being received with this mobile phone code, and when conforming to, just handle reception information.
2. know the described method of claim 1, it is characterized in that in step (B), this key assignments is the unique serial number for the integrated circuit (IC) chip in the data roam machine.
3. the method for claim 1 is characterized in that, in step (B), this key assignments is to record in advance in the memory that is written on the data roam machine.
4. the method for claim 1 is characterized in that, also comprises in step (C): if this when the mobile phone code does not conform in mobile phone code of decoding reduction and this reception information, then removes the information that this received from memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031041884A CN1200573C (en) | 2003-02-13 | 2003-02-13 | Wireless beep pager protected by encoding handset codes and its method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031041884A CN1200573C (en) | 2003-02-13 | 2003-02-13 | Wireless beep pager protected by encoding handset codes and its method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1431835A CN1431835A (en) | 2003-07-23 |
CN1200573C true CN1200573C (en) | 2005-05-04 |
Family
ID=4790058
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB031041884A Expired - Fee Related CN1200573C (en) | 2003-02-13 | 2003-02-13 | Wireless beep pager protected by encoding handset codes and its method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1200573C (en) |
-
2003
- 2003-02-13 CN CNB031041884A patent/CN1200573C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN1431835A (en) | 2003-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8929299B2 (en) | Communications terminal, server, playback control method and program | |
EP1275070B1 (en) | A method of operating a ticketing system | |
CN102149083B (en) | Personalized card writing method, system and device | |
US20060282500A1 (en) | Information management method using a managing symbol and information management server | |
EP1628255A2 (en) | A method of operating a ticketing system | |
US20020062361A1 (en) | Method for providing contents for a wireless communication device | |
US20010017885A1 (en) | Method and apparatus for distributing contents | |
US20040093385A1 (en) | Memory information backup method and system for cell phone | |
JP5973808B2 (en) | Information processing device, terminal device, information processing system, information processing method, and computer program | |
CN113065367B (en) | IC card reading method, IC card reading device, electronic device, and storage medium | |
CN1112076C (en) | Method of activation of mobile station | |
JPH0646002A (en) | Mobile communication terminal equipment | |
CN1423473A (en) | Mobile electronic bill system and method thereof | |
CN1200573C (en) | Wireless beep pager protected by encoding handset codes and its method | |
CN1321538C (en) | Short message network address communication system based on two-dimensional bar code identification technology | |
CN106940851A (en) | A kind of method of payment and system based on bar code | |
US20090103770A1 (en) | Image data transmission system and method, and terminal apparatus and management center which constitute transmission side and reception side of the system | |
KR100666396B1 (en) | System and method for providing and management application using subscriber identity module card | |
CN100442309C (en) | Electronic finance bills system capable of hiding information | |
CN1917663A (en) | Method for transferring a message in a predetermined sending time and related communication system thereof | |
CN100389624C (en) | Method for preventing from illegal duplication of mobile communication terminal | |
TWI286017B (en) | Wireless messenger using mobile phone code encryption for protection and method thereof | |
CN1228861A (en) | Method for controlling use of pager, pager operating with this method and chip card for conditioned access to pager | |
JP3352303B2 (en) | Communication device | |
KR20030048882A (en) | An electronic business card system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20050504 Termination date: 20170213 |
|
CF01 | Termination of patent right due to non-payment of annual fee |