CN1287627C - Method of locking network delocking and number burglary for PHS mobile phone - Google Patents

Method of locking network delocking and number burglary for PHS mobile phone Download PDF

Info

Publication number
CN1287627C
CN1287627C CN200310112510.XA CN200310112510A CN1287627C CN 1287627 C CN1287627 C CN 1287627C CN 200310112510 A CN200310112510 A CN 200310112510A CN 1287627 C CN1287627 C CN 1287627C
Authority
CN
China
Prior art keywords
burning
software
mobile phone
write
unlocking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200310112510.XA
Other languages
Chinese (zh)
Other versions
CN1625280A (en
Inventor
徐胜海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN200310112510.XA priority Critical patent/CN1287627C/en
Publication of CN1625280A publication Critical patent/CN1625280A/en
Application granted granted Critical
Publication of CN1287627C publication Critical patent/CN1287627C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a method for locking networks, unlocking networks and burning numbers for PHS mobile telephones. The method for locking networks has the procedure, after a mobile telephone enters a mode for burning numbers, that mobile telephone software analyzes read-write commands after the mobile telephone software receives the read-write commands of software for burning numbers to a memorizer; the mobile telephone software reads and writes the memorizer; the software for burning numbers writes the data for burning numbers, such as authorization codes, etc., in a mark for locking networks. The method for unlocking networks has the procedure that the method takes unlocking ciphers generated by PSNUM or PSID, or authorization codes as unlocking ciphers; the mobile telephone software analyzes unlocking commands, and judges the category of the unlocking commands after a user inputs the unlocking commands; if unlocking ciphers are effective, the mobile telephone software clears the mark for locking networks. The present invention can meet two requirements of locking networks and not locking networks.

Description

A kind of method to PHS cell-phone lock net
Technical field
The invention belongs to moving communicating field, specifically is a kind of method that the PHS mobile phone is networked and limits and lift restrictions.
Technical background
Now various places PHS operator need carry out various advertising campaigns for the ownership, mainly is exactly price supporting policy wherein, as is lower than the mobile phone purchasing price and sells the user mobile phone, perhaps hands over telephone expenses to send mobile phone etc.The user can or freely obtain mobile phone with very low price like this.Part PHS mobile phone distributors may obtain mobile phone at a low price by certain regional operator, forward other area then to and sell at high price, thereby earning operator is the subsidy that developing market carried out.Operator need limit the networking of this subsidy mobile phone for this reason, and hope is limited to this mobile phone in the local network and uses, the use that can not network again in other place, yet, the convenient and reliable method that does not address the above problem at present.
Summary of the invention
The technical problem to be solved in the present invention provides a kind of can the networking to the PHS mobile phone and limits, and the method that lifts restrictions as required, realizes reliable PHS cell-phone lock net and release; And on this basis, provide the method that the PHS mobile phone is burnt number.
Method among the present invention to PHS cell-phone lock net, after mobile phone enters the burning pattern, cell phone software is received and is resolved this read write command after burning software is to the read write command of memory, by cell phone software memory is read and write, write burning data such as authentication code by burning software, it is characterized in that, after burning software writes the burning data, write lock network mark will.
Described method to PHS cell-phone lock net wherein writes and locks network mark will, is meant that an address bit with memory is defined as locking network mark knowledge position, locks a network mark by burning software in this sign position setting and knows.
The method of the PHS mobile phone number of burning among the present invention, after mobile phone entered the burning pattern, cell phone software judged at first whether mobile phone is in the lock net state, if mobile phone is in the lock net state, did not then respond the read-write of burning software to memory; Otherwise, receive burnings software to the read write command of memory after this read write command of parsing, and memory read and write, write the burning data by burning software.
Described method to the number of burning of PHS mobile phone, it further comprises: if desired to the cell-phone lock net, after burning software writes the burning data, write lock network mark will.
The method that the PHS mobile phone to being in the lock net state among the present invention carries out release may further comprise the steps:
5.1 according to PSNUM or PSID produce unlocking pin or with authentication code as unlocking pin;
5.2 input comprises the unlock command of unlocking pin;
5.3 cell phone software is resolved unlock command and is judged the classification of unlock command;
5.4 judge whether unlocking pin is effective,, remove lock network mark will if effectively.
Described to being in the PHS mobile phone method of carrying out release of lock net state, judge that whether unlocking pin is effective, is meant in the wherein said step 5.4:
6.1 if the authentication code unlock command then reads authentication code from mobile phone memory, with both relatively, identical, then unlocking pin is effective;
6.2 if PSNUM or PSID unlock command, then read PSNUM or PSID in the mobile phone, start selected cryptographic algorithm PSNUM or PSID are carried out cryptographic calculation, the password that the result who obtains and user are imported compares, if identical then unlocking pin is effective.
The described method that the PHS mobile phone that is in the lock net state is carried out release, wherein said selected cryptographic algorithm can be some classical cryptographic algorithm, as BlowFish, MD5, SHA512, RIPEMD160, Secret16 etc.
Adopt this method, PHS mobile phone (being commonly called as PHS mobile phone) can adapt to the lock net and not lock two kinds of demands of net; When needing the lock net, as long as it is just passable to write lock network mark will when writing sign indicating number, write lock network mark will after, mobile phone will no longer respond and write sign indicating number once more, guarantee that this mobile phone is lost to other area and can not writes sign indicating number once more and use.If the disabled user adopts the chip read write line to the memory direct control, then can be, need open reason such as casing because of cell phone mainboard device density height, cause mobile phone to damage easily, lose more than gain, and operation inconvenience, and be unfavorable for cracking by force.So just can be locked mesh preferably.
In addition, operator can carry out release according to the own exclusive authentication code of grasping, and maintenance also can obtain unlocking pin according to the cryptographic algorithm that holds in close confidence and carry out release.Employing this method can obtain strict lock mesh, and three kinds of release modes that provide also can make things convenient for the solution of problem after sale.
Description of drawings
Fig. 1 is that cell phone software enters burning mode treatment schematic flow sheet;
Fig. 2 is adversary's machine burning schematic flow sheet among the present invention;
Fig. 3 is the release handling process schematic diagram among the present invention.
Embodiment
Now to the PHS mobile phone when burning number, general mobile phone can enter a special pattern, we are called " TestMode " (Chinese is called test pattern or burning pattern) for this, as Fig. 1.After entering this pattern, cell phone software is in operation, when receiving that (we refer to eeprom to burning software, Electrically Erasable ﹠amp to memory here; Programmable ROM, Electrically Erasable Read Only Memory also can be other storage medium) instruction of read-write the time, cell phone software can be resolved read write command, specifically memory is carried out reading writing working by cell phone software, returns the state of read-write then; In this way, burning software just can write some parameters in the mobile phone, finishes the sign indicating number work of writing to mobile phone.In order to lock net, we can be defined as locking network mark to the address bit of eeprom and know the position, when mobile phone enters the burning pattern, cell phone software judges at first whether this sign position erects (as 1 for erecting, other is not for erecting), if this sign erects, then do not respond the read-write of burning software to eeprom, otherwise response burning software is finished the read-write operation to memory to the read-write of eeprom, makes correct feedback.
For locking net and not locking net and write two kinds of burning softwares, a kind of is conventional burning software, does not write lock network mark will.A kind of is lock net burning software, writes lock network mark will after conventional burning data write.Perhaps burning software can allow the user select the lock net to burn number or not lock net and burn number.Several softwares are selected to use when burning number as required.If lock net burns number, then after burnings data are write, write and lock network mark will.And then prompting burning success or failure.Burn number if not lock net, then burnings data are being write back just prompting burnings success or failure, do not write lock network mark knowledge.
As Fig. 2 is the flow process of adversary's machine burning number.Mobile phone is checked lock network mark will when entering the TestMode state; In the TestMode of cell phone software State Control code, increase the judgement of a lock network mark will, the read write command of response external not if lock network mark will erects, if lock network mark will does not erect then the instruction of normal response exterior read-write, write conventional burning data, and then according to whether needs are locked net, whether decision writes lock network mark will.With the mobile phone of lock network mark will, when entering the TestMode attitude next time, no longer code instruction is write in response, can not be burnt once more number; Do not lock the mobile phone of network mark will and can write sign indicating number once more; Because can not roam at Chinese PHS mobile phone, if will arriving in the another one network, uses by a mobile phone, the just number of burning again, could use after writing the data of this network, in case mobile phone can not be write sign indicating number once more, this mobile phone can only use in the place that networks, and just can be good at reaching the purpose of lock net.
General operator requires the user how long to use at net in the low price sales promotion, spend this time, and at this moment user's net of just having the right to change just needs release, also needs the release number of burning again during the other after-sales service.In order to solve again the problem of burning number, so we provide the method for multiple release net, as shown in Figure 3, concrete release step is as follows:
According to PSID or PSNUM by calculating (by some classical cryptographic algorithm, as the computing of BlowFish etc., the algorithm correspondence in this algorithm and the cell phone software; Also can be with MD5, SHA512, RIPEMD160, Secret16 scheduling algorithm) obtain corresponding unlocking pin, perhaps adopting authentication code is unlocking pin; Import different unlock commands according to the release mode during release and (be the instruction of authentication code unlocking request as determining * 983*8625625*1#, * 983*8625625*2# is the instruction of PSNUM (fuselage code) unlocking request, and * 983*8625625*3# is the instruction of PSID (handset identities identifier) unlocking request);
2. cell phone software is resolved the instruction of input, and judgement is authentication code release or other release mode;
3. if the authentication code release, then read the authentication code of mobile phone inside and the authentication code of user's input and compare, if identical then remove lock network mark will; Otherwise do not remove lock network mark will;
4. if produce the release mode of unlocking pin according to PSID or PSNUM, whether the unlocking pin of judging input is identical with the password that mobile phone internal condition PSNUM or PSID calculate, if identical then remove lock network mark will; Otherwise do not remove lock network mark will.

Claims (2)

1, a kind of method to PHS cell-phone lock net, after mobile phone enters the burning pattern, cell phone software is received and is resolved this read write command after burning software is to the read write command of memory, by cell phone software memory is read and write, write burning data such as authentication code by burning software, it is characterized in that, after burning software writes the burning data, write lock network mark will.
2, the described method to PHS cell-phone lock net of claim 1 is characterized in that, described writing locked network mark will, is meant that an address bit with memory is defined as locking network mark knowledge position, locks a network mark by burning software in this sign position setting and knows.
CN200310112510.XA 2003-12-04 2003-12-04 Method of locking network delocking and number burglary for PHS mobile phone Expired - Fee Related CN1287627C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200310112510.XA CN1287627C (en) 2003-12-04 2003-12-04 Method of locking network delocking and number burglary for PHS mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200310112510.XA CN1287627C (en) 2003-12-04 2003-12-04 Method of locking network delocking and number burglary for PHS mobile phone

Publications (2)

Publication Number Publication Date
CN1625280A CN1625280A (en) 2005-06-08
CN1287627C true CN1287627C (en) 2006-11-29

Family

ID=34759794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200310112510.XA Expired - Fee Related CN1287627C (en) 2003-12-04 2003-12-04 Method of locking network delocking and number burglary for PHS mobile phone

Country Status (1)

Country Link
CN (1) CN1287627C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370288B (en) * 2008-08-06 2011-12-07 华为终端有限公司 Network locking method and terminal
CN102185974A (en) * 2011-05-11 2011-09-14 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and operation locking control method thereof

Also Published As

Publication number Publication date
CN1625280A (en) 2005-06-08

Similar Documents

Publication Publication Date Title
WO2020216131A1 (en) Digital key-based identity authentication method, terminal apparatus, and medium
US7562227B1 (en) Method of authenticating a user on multiple devices using a procedural memory based password
US20040046638A1 (en) Terminal lock system comprising key device carried by user and terminal-associated device incorporated in terminal device
CN110401655A (en) Access control right management system based on user and role
US20030221122A1 (en) Autonomic security settings switching based upon a network connection security profile
EP2159727B1 (en) Securing a device based on atypical user behavior
CN110149328A (en) Interface method for authenticating, device, equipment and computer readable storage medium
CN109635557A (en) A kind of secure log control method, device and terminal device
WO2010121468A1 (en) Mobile terminal with encryption chip and related network unlocking/ locking method
US20140237560A1 (en) Security context passing for stateless system management
CN107104958A (en) Manage the method, private clound and public cloud equipment and storage device of private clound equipment
CN111478894B (en) External user authorization method, device, equipment and readable storage medium
CN107767509A (en) Authorization method, server, authoring system and storage medium
CN105608349A (en) Terminal mode switching method and apparatus as well as terminal
JP2006279321A (en) Security software for mobile terminal and security communication system
CN101111018A (en) Method for implementing PHS mobile phone network locking and unlocking
CN1287627C (en) Method of locking network delocking and number burglary for PHS mobile phone
CN107426182A (en) The access control method and system of a kind of storage management system
US8590015B2 (en) Method and device to suspend the access to a service
CN108307463B (en) Mode switching method, system and access control system
CN114244568A (en) Security access control method, device and equipment based on terminal access behavior
CN110517372A (en) A kind of biological information processing method and processing device
JP4275156B2 (en) Specific area network access control system, control method, and program thereof
CN105978899A (en) SIM card binding method for preventing malicious mobile phone flash
CN106250758A (en) A kind of storage device connection control method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Assignee: Shenzhen Lead Display Equipment Co., Ltd.

Assignor: ZTE Corporation

Contract fulfillment period: 2007.3.5 to 2013.3.5 contract change

Contract record no.: 2008440000326

Denomination of invention: Method of locking network delocking and number burglary for PHS mobile phone

Granted publication date: 20061129

License type: Exclusive license

Record date: 2008.11.5

LIC Patent licence contract for exploitation submitted for record

Free format text: EXCLUSIVE LICENSE; TIME LIMIT OF IMPLEMENTING CONTACT: 2007.3.5 TO 2013.3.5; CHANGE OF CONTRACT

Name of requester: SHENZHEN CITY LIDE COMMUNICATION DEVICES CO., LTD.

Effective date: 20081105

C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20061129

Termination date: 20131204