CN1277440C - Method and apparatus for preventing mobile terminal from being illegally used - Google Patents

Method and apparatus for preventing mobile terminal from being illegally used Download PDF

Info

Publication number
CN1277440C
CN1277440C CN200410049786.2A CN200410049786A CN1277440C CN 1277440 C CN1277440 C CN 1277440C CN 200410049786 A CN200410049786 A CN 200410049786A CN 1277440 C CN1277440 C CN 1277440C
Authority
CN
China
Prior art keywords
password
mcu
carrier
terminal
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200410049786.2A
Other languages
Chinese (zh)
Other versions
CN1596018A (en
Inventor
卢嘉冰
黎妹红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Tian Bao escort information technology Limited by Share Ltd
Original Assignee
AERO LANTIANDA TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AERO LANTIANDA TECHNOLOGY Co Ltd filed Critical AERO LANTIANDA TECHNOLOGY Co Ltd
Priority to CN200410049786.2A priority Critical patent/CN1277440C/en
Publication of CN1596018A publication Critical patent/CN1596018A/en
Application granted granted Critical
Publication of CN1277440C publication Critical patent/CN1277440C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a method for preventing a mobile communication terminal from being illegally used and a device thereof. The method comprises: after the mobile terminal is successfully connected to a network, the mobile terminal displays the situation of waiting for the prompting information of a password carrier on the display screen, and a user has to provide the password carrier(one-to-one correspondence exists between the password carrier and the mobile terminal) separated with the mobile terminal at the moment; the microprocessor control unit MCU of the mobile terminal starts a security control module to carry out bidirectional authentication to the password carrier; after the authentication is successful, the MCU reads a password in the password carrier through a card reading module, and simultaneously, the MCU compares a start-up password in a certain storage unit in the mobile terminal; if the comparison is successful, the MCU allows the user to use all functions of the terminal through a logical control module, else, the MCU locks a keyboard and all functions, or sends alarm data to a control center through a radio frequency circuit. The password carrier of the present invention and the mobile terminal are separated, even the password of the mobile terminal is disclosed or modified, the terminal can not be used, unless the password carrier and the terminal are simultaneously obtained by a person; therefore, the design method prevents the occurrence of an event that the mobile terminal is illegally used to a great extent.

Description

Prevent the method and apparatus that mobile communication terminal is illegally used
Technical field
The present invention relates to a kind of method and apparatus that prevents that mobile communication terminal from illegally being used.
Background technology
Along with extensively popularizing of various hand-held mobile communications terminals (will be example with the mobile phone terminal mainly here) used, some lawless persons will dispose of stolen goods with extremely low price by the mobile communication terminal of means of crime such as theft, plunder, swindle acquisition.Even the machine master has been provided with the PIN password, the offender also can be on sale throughout stolen goods easily again after mobile phone repair shop allows professional repairman decode, and makes a large amount of booty mobile phones enter the grey Sales Channel, is had a mind to by the consumer or by mistake buys, uses.
Summary of the invention
An object of the present invention is to provide a kind of method that prevents that mobile communication terminal from illegally being used.
Method provided by the present invention may further comprise the steps:
After portable terminal networks successfully, show the information of waiting for crypto carrier at display screen;
The user provides the crypto carrier that separates with portable terminal according to described information;
The microprocessor controller MCU of portable terminal starts safety control module crypto carrier is carried out two-way authentication;
Behind the authentication success, card reading module reads the password in the crypto carrier, and MCU reads corresponding unlocking cipher and compares from memory cell then;
MCU allows the user to use the keyboard proper communication according to comparison result by Logic control module, perhaps pins keyboard and/or sends alert data by radio circuit to control centre.
Wherein, MCU is according to the inconsistent result of comparison, and the control display screen curtain shows the retry information, and after the number of retries that surpasses regulation, the supervisory keyboard self-locking.
Wherein, MCU allows the user to use all buttons and the function of keyboard according to the consistent result of comparison.
Wherein, after the password comparison finishes,, MCU reduces power consumption thereby making card reading module and safety control module be in park mode.
Wherein, the length of described password is no less than 16 bytes.
Wherein, password can be Arabic numerals arbitrarily, also can be any English alphabet, or the mixture of Arabic numerals and English alphabet or other character.
Wherein, crypto carrier has the IC chip of contact or contactless built-in nonvolatile memory.
Another object of the present invention provides a kind of device that prevents that mobile communication terminal from illegally being used.
The device that prevents that mobile communication terminal from illegally being used provided by the invention comprises two parts:
The crypto carrier that separates with portable terminal has the startup password of portable terminal in it;
Portable terminal comprises:
Safety control module under the control of MCU, carries out two-way authentication and finishes deciphering crypto carrier;
Card reading module behind the authentication success, reads the password in the crypto carrier under MCU control;
Memory cell has startup password and other system information in it;
Little processing and control element (PCE) MCU, the core of portable terminal, it is controlled other all parts and carries out corresponding instruction.Startup password in the MCU reading cells is also compared with the password in the crypto carrier, according to comparison result, allow the user to use the keyboard proper communication by Logic control module, perhaps pin keyboard and/or send alert data to control centre by radio circuit.
Other unit, for example logic control element, keyboard, voice unit and expanding element or the like.
Because crypto carrier of the present invention separates with portable terminal, even revealing or be modified, the password on the portable terminal can not use terminal, unless crypto carrier and terminal are obtained by the people simultaneously.Therefore, this method has prevented that to a great extent the incident that mobile phone is illegally used from taking place.
The present invention is described in detail with instantiation below in conjunction with accompanying drawing.
Description of drawings
Fig. 1 is the portable terminal principle assumption diagram that has crypto carrier of the present invention;
Fig. 2 is the workflow of carrying out cipher authentication in the portable terminal of the present invention.
Embodiment
Method and apparatus proposed by the invention is mainly used on the mobile communication terminal (for example mobile phone will be that example is illustrated with the mobile phone mainly below) of hand-hold type, and it mainly comprises the content of the following aspects:
1, the cryptographic technique in the mobile phone terminal: the mobile phone producer is provided with the above lock machine password of one group of 16 byte (reach as high as 1K byte or more than) for each mobile phone, password can be expressly or the ciphertext form deposit.If the ciphertext form is formulated concrete enciphering and deciphering algorithm by cell phone manufacturer, can increase the fail safe of password so to a certain extent, but can increase the complexity of system.Password should leave on the non-volatile memory chips such as FLASH, EEPROM of system, and does not allow to be placed in the SIM card.The modification of password and wipe the professional site of being authorized by cell phone manufacturer and finish, its access limit is formulated by manufacturer oneself.
2, crypto carrier technology:, dispose the crypto carrier (can be profiles such as card form, Wristwatch type or key button) of a band contact or contactless chip corresponding to each mobile phone terminal.Depositing in the carrier with the same password of corresponding mobile phone, can be that plaintext or ciphertext form are deposited.Carrier is controlled by the IC-card security mechanism the access limit of password as the IC chip, can be key authentication or other approved method.If crypto carrier is lost or damaged and can report the loss or repair to the site that manufacturer is authorized, new password is set for again mobile phone terminal and carrier by them for the situation of losing.
3, IC-card module for reading and writing:, need in every mobile phone terminal, increase a Card Reader chip in order to realize the separate type cipher authentication technique.Have a large amount of being used to read and write contact and contactless chip on the market, but contactless technology is development in future direction (as Philips company's " MF RC531 " family chip or a more microminiaturized product).Because these chips are very little, so they are very little to the size impact of mobile phone terminal.The course of work of card reading module is such: after system powered on, self check success back system prompt needed crypto carrier.If carrier exist system will activate card reading module read in the carrier unlocking pin and with terminal in the startup password deposited compare, as the then release success that conforms to, mobile phone enters normal holding state; As not conforming to or reading less than unlocking pin, mobile phone then still is in locking state.Do not allow all buttons of operating system at locking state, and sound out or the mode of other stealing passwords for malice repeatedly, also but triggering system is sent data alarm signal (as public security 110 alarm stations etc., the application number of seeing the inventor is 02153283.4 application for a patent for invention) automatically to the control centre that sets in advance.
4, the communication between terminal and the crypto carrier: can adopt contact or contactless communication modes between terminal and the carrier, comprehensively their pluses and minuses are considered, contactless mode is used in suggestion, the communication modes of present popular 13.56MHz for example, it follows ISO/IEC 14443 standards, and maximum communication distance is 10 centimetres.
The method that the present invention proposes is to realize on the basis of hand-hold type portable terminal, and the configuration of the portable terminal that has a crypto carrier of the present invention as shown in Figure 1.The startup password of the some memory cell in terminal (for example flash, EEPROM etc.) storage equipment, this password is with plaintext or encrypted test mode, the length of password depends on the capacity of the crypto carrier of separation, but the shortlyest should not be less than 16 bytes, the composition of password can be Arabic numerals arbitrarily, also can form, even can also mix by Arabic numerals and English alphabet or other character and form by any English alphabet; The cipher processing method of password is customized by manufacturer oneself.Modification to password need be satisfied certain authority, and also manufacturer terminal oneself is definite again for concrete security mechanism.Safety control module can be that hardware or software mode are realized, it is mainly used in to the protection of password with the authentication of crypto carrier etc.All is independently from function card reading module and safety control module on hardware and software with the mobile phone terminal part, and such design helps the maintenance and the upgrading of system.
To mainly introduce the verification process of the portable terminal that has crypto carrier below, concrete cipher authentication process is seen Fig. 2.After system powers on, it can search for and be connected to network automatically after its self check success, whether fail self-test is then given the prompting of being out of order, if connect unsuccessful then display reminding information and continued to connect by user's decision, successful then point out the wait crypto carrier on display unit.Microprocessor controller MCU will start card reading module crypto carrier will be carried out two-way authentication after the user provides crypto carrier, only at authentication success and have and read the password that just begins to read after the password authority in the crypto carrier, if need encryption and decryption then to finish by safety control module.MCU reads and also reads corresponding unlocking cipher immediately after the password in the carrier from memory cell and compare, if two password unanimities then allow to use all keys and the function (being in holding state) of terminal, allow card reading module and safety control module be in park mode simultaneously to reduce power consumption; If the inconsistent retry that then allows in stipulated number of password, system carries out self-locking or reports to the police by the mode of automatic warning after number of retries surpasses stipulated number.If self-locking state is all keys and the function of locking terminal then, then send alert data by communication module and RF circuit automatically to predefined control centre if need to report to the police by MCU, concrete data format is formulated by manufacturer terminal and control centre.
Crypto carrier that match with mobile phone, the type built-in contactless microelectronic chip, it can be the logical encrypt microelectronic chip card of any abnormity encapsulation, chip has non-volatile type memory cell, and size is not less than 16 bytes, is mainly used in to deposit the password that is used to start shooting.This password is one to one with the password in the mobile phone, and the password in each carrier all different (relation object of password and terminal is similar to the relation of key and lock), and random number is adopted in the password suggestion.Because carrier itself is an IC-card chip with higher-security, therefore must satisfy certain authority to the read-write of carrier password.For convenience the user carries in addition, the form that suggestion considers to use Wristwatch type (digital display, pointer-type all can, have clocking capability concurrently) or key button, little gadget etc. to be difficult for losing.
The technology of the present invention and method if be used on the mobile phone with gps satellite positioning function or LCS network positions function, then can be exerted one's advantage more; When illegal this kind of acquisition mobile phone person under can't the situation of release, attempt to call or when receiving and dispatching short message, just triggered the position that the automatic warning function of data type (application number of seeing the inventor is 02153283.4 the application for a patent for invention) police can be shown according to positioning function, in time arrest and buy the stolen goods people or the person of disposing of stolen goods, then involve and steal the criminal gang who robs mobile phone, more possible is, seek cheap people and again dare not buy of unknown origin booty mobile phone, thereby thoroughly blocked the market of booty mobile phone.

Claims (10)

1, a kind of method that prevents that the hand-held mobile communications terminal from illegally being used said method comprising the steps of:
After portable terminal networks successfully, show the information of waiting for crypto carrier at display screen;
The user provides the crypto carrier that separates with portable terminal according to described information;
The microprocessor controller MCU of portable terminal starts safety control module crypto carrier is carried out two-way authentication;
Authentication success and have the authority of reading after, card reading module reads the password in the crypto carrier, MCU reads corresponding unlocking cipher and compares from memory cell then;
MCU allows the user to use the keyboard proper communication according to comparison result by Logic control module, perhaps pins keyboard and/or sends alert data by radio circuit to control centre.
2, method according to claim 1 wherein, if the password comparison is inconsistent, then shows the retry information on display screen, after the number of retries that surpasses regulation, and the keyboard of MCU locking terminal or transmission warning message.
3, method according to claim 1 wherein, if the password comparison is consistent, then allows the user to use all functions of keyboard and terminal.
4, method according to claim 3, wherein, after the password comparison finished, MCU made card reading module and safety control module be in park mode.
5, method according to claim 1, wherein, the length of described password is no less than 16 bytes.
6, method according to claim 1, wherein, password can be Arabic numerals arbitrarily, also can be any English alphabet, or the mixture of Arabic numerals and English alphabet or other character.
7, method according to claim 1, wherein, crypto carrier has the IC chip of contact or contactless built-in nonvolatile memory.
8, a kind of device that prevents that the hand-held mobile communications terminal from illegally being used comprises:
The crypto carrier that separates with portable terminal has the startup password of portable terminal in it;
Portable terminal comprises:
Safety control module under the control of MCU, carries out two-way authentication and deciphering to crypto carrier;
Card reading module at authentication success and after having the authority of reading, reads the password in the crypto carrier under MCU control;
Memory cell has startup password and system information in it;
Little processing and control element (PCE) MCU, startup password in the reading cells is also compared with the password in the crypto carrier, according to comparison result, allow the user to use the keyboard proper communication by Logic control module, perhaps pin keyboard and/or send alert data to control centre by radio circuit.
9, device according to claim 8, wherein, the length of described password is no less than 16 bytes.
10, device according to claim 8, wherein, crypto carrier has the IC chip of contact or contactless built-in nonvolatile memory.
CN200410049786.2A 2004-06-29 2004-06-29 Method and apparatus for preventing mobile terminal from being illegally used Expired - Fee Related CN1277440C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200410049786.2A CN1277440C (en) 2004-06-29 2004-06-29 Method and apparatus for preventing mobile terminal from being illegally used

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200410049786.2A CN1277440C (en) 2004-06-29 2004-06-29 Method and apparatus for preventing mobile terminal from being illegally used

Publications (2)

Publication Number Publication Date
CN1596018A CN1596018A (en) 2005-03-16
CN1277440C true CN1277440C (en) 2006-09-27

Family

ID=34665831

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200410049786.2A Expired - Fee Related CN1277440C (en) 2004-06-29 2004-06-29 Method and apparatus for preventing mobile terminal from being illegally used

Country Status (1)

Country Link
CN (1) CN1277440C (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100349489C (en) * 2004-08-23 2007-11-14 英华达(南京)科技有限公司 System for preventing mobile telephone from unauthorized use
JPWO2008038515A1 (en) * 2006-09-28 2010-01-28 日本電気株式会社 Portable terminal device, key operation locking method and program in portable terminal device
EP2133811A4 (en) * 2007-03-30 2014-10-22 Nec Corp User authentication control device, user authentication device, data processing device, and user authentication control method and the like
FR2957440B1 (en) 2010-03-09 2012-08-17 Proton World Int Nv PROTECTION OF A SECURITY MODULE IN A TELECOMMUNICATION DEVICE COUPLED TO AN NFC CIRCUIT
FR2957438B1 (en) 2010-03-09 2012-03-30 Proton World Int Nv DETECTION OF A DEROUTEMENT OF A COMMUNICATION CHANNEL OF A TELECOMMUNICATION DEVICE COUPLED TO AN NFC CIRCUIT
FR2957439B1 (en) 2010-03-09 2012-03-30 Proton World Int Nv PROTECTION OF A COMMUNICATION CHANNEL BETWEEN A SECURITY MODULE AND AN NFC CIRCUIT
FR2957437B1 (en) 2010-03-09 2012-03-30 Proton World Int Nv PROTECTION AGAINST A DEROUTEMENT OF A COMMUNICATION CHANNEL OF AN NFC CIRCUIT
WO2012006833A1 (en) * 2010-07-14 2012-01-19 中兴通讯股份有限公司 Apparatus and method for unlocking mobile terminal
FR2964276B1 (en) 2010-08-31 2012-09-07 Proton World Int Nv SECURING A TELECOMMUNICATION DEVICE EQUIPPED WITH A NEAR FIELD COMMUNICATION MODULE
FR2964285B1 (en) * 2010-08-31 2012-09-07 Proton World Int Nv PROTECTING A COMMUNICATION CHANNEL OF A TELECOMMUNICATION DEVICE COUPLED TO AN NFC CIRCUIT AGAINST A BEHAVIOR
FR2969341B1 (en) 2010-12-20 2013-01-18 Proton World Int Nv MANAGING COMMUNICATION CHANNELS IN A TELECOMMUNICATION DEVICE COUPLED TO AN NFC CIRCUIT
CN102594972B (en) * 2011-01-05 2015-01-28 中兴通讯股份有限公司 Method, device and system for card locking of mobile terminal
FR2973901B1 (en) 2011-04-05 2013-04-19 Proton World Int Nv TESTING THE RESISTANCE OF A SECURITY MODULE OF A TELECOMMUNICATION DEVICE COUPLED TO AN NFC CIRCUIT AGAINST COMMUNICATION CHANNEL MISMATCH ATTACKS
FR2974208B1 (en) 2011-04-13 2013-08-16 Proton World Int Nv ACCESS CONTROL MECHANISM FOR A SECURE ELEMENT COUPLED TO AN NFC CIRCUIT.
CN103347127A (en) * 2013-06-28 2013-10-09 苏州市牛勿耳关电器科技有限公司 Internet of things cell phone

Also Published As

Publication number Publication date
CN1596018A (en) 2005-03-16

Similar Documents

Publication Publication Date Title
CN1277440C (en) Method and apparatus for preventing mobile terminal from being illegally used
US8064883B2 (en) Mobile terminal having anti-theft function and anti-theft method
AU595426B2 (en) Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management
CN101422058B (en) Method of securing access to a proximity communication module in a mobile terminal
CN101416223B (en) Method for the protection of a movable object, especially a vehicle, against unauthorized use
US5940773A (en) Access controlled terminal and method for rendering communication services
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN100366112C (en) Apparatus and method for controlling use of a SIM card of a mobile terminal
US7512795B2 (en) Method and apparatus for authenticating components
US20120002808A1 (en) Interleaving and deinterleaving method for preventing periodic position interference
US20010027116A1 (en) Electronic wallet
US20040006655A1 (en) Method for protecting nomad devices against theft, corresponding device and installation
CN101719295A (en) Electronic equipment with radio frequency identification (RFID) technology and losing prevention method thereof
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
EP2391967B1 (en) Password protected secure device
US6393567B1 (en) Method of enabling a server to authorize access to a service from portable devices having electronic microcircuits, e.g. devices of the smart card type
JP2006221477A (en) Portable communication terminal device, security system for the same, and security method
TWI280770B (en) System against illegal use of mobile phone
US20030014642A1 (en) Security arrangement
KR100944246B1 (en) Apparatus and Method for Managing Security Mobile Communication Terminal with Universal Subscriber Identity Module
JP2008276367A (en) Mobile terminal and control program
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
JP2006524450A (en) Protecting mobile phone type telecommunication terminals
US20060211407A1 (en) Method for improving security of mobile communication device
JP3887561B2 (en) Mobile communication terminal and control method of mobile communication terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: BEIJING TIANREN INFORMATION TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: SPACE LANTIANDA SCIENCE AND TECHNOLOGY CO., LTD.; LU JIABING

Effective date: 20080125

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20080125

Address after: Beijing City, Haidian District Zhichun Road Jinqiu International Building No. 6 room A11 floor 16 zip code: 100088

Patentee after: Beijing Tian Bao escort information technology Limited by Share Ltd

Address before: Beijing Fengtai Science City 9 Feng Hang Road, Xin An Ding technology building, zip code: 100070

Co-patentee before: Lu Jiabing

Patentee before: Spacespace Tianda science and Technology Co., Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20060927

Termination date: 20160629