CN1553729A - Protection of authentication information of PHS mobile telephone - Google Patents

Protection of authentication information of PHS mobile telephone Download PDF

Info

Publication number
CN1553729A
CN1553729A CNA031316182A CN03131618A CN1553729A CN 1553729 A CN1553729 A CN 1553729A CN A031316182 A CNA031316182 A CN A031316182A CN 03131618 A CN03131618 A CN 03131618A CN 1553729 A CN1553729 A CN 1553729A
Authority
CN
China
Prior art keywords
mobile phone
authentication information
key
expressly
phs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA031316182A
Other languages
Chinese (zh)
Other versions
CN100569024C (en
Inventor
���Ǿ�
林强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp Nanjing Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp Nanjing Branch filed Critical ZTE Corp Nanjing Branch
Priority to CNB031316182A priority Critical patent/CN100569024C/en
Publication of CN1553729A publication Critical patent/CN1553729A/en
Application granted granted Critical
Publication of CN100569024C publication Critical patent/CN100569024C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

A method for protecting authentication information stored in PHS mobile phone includes following steps: 1) the write terminal writes the authentication information into the memory of mobile phone at normal procedure; 2) the PHS mobile phone makes encryption for the plaintext of authentication information as making first authentication, and replaces the information plaintext by cryptograph of authentication information; 3) makes decryption, when the PHS mobile phone starts up, makes decryption operation for the authentication cryptograph. When making encryption and decryption, an encryption key and a decryption key in key pair that is only corresponding to a certain chip in mobile phone are used. The method can be farthest compatible with current write phone number method of PHS mobile phone, and can prevent the authentication information from illegally stealing.

Description

A kind of guard method of PHS mobile phone identification information
Technical field
The present invention relates to the PHS mobile phone, particularly is the guard method of a kind of PHS mobile phone to authentication information.
Background technology
Carry out commercial mobile communication system at present and mainly contain cdma system, gsm system and PHS system, correspondingly, three kinds of portable terminals are arranged: CDMA mobile phone, GSM mobile handset and PHS mobile phone.Parallel operation typically refers to the situation that more than one mobile phone uses same phone number.CDMA mobile phone and GSM mobile handset all are to utilize the secrecy processing of separation between machine and card technology realization to the mobile phone authentication information, can prevent the appearance of parallel operation effectively.
But at present the PHS mobile phone (being commonly called as wireless access hand-held set, Personal Handyphone System(PHS) or Personal Handyphone System) that uses does not adopt the separation between machine and card technology, and be to use the number of writing device directly with number, authentication information (AuthenticationKey) sensitive data of etc.ing with the mode of the plaintext mobile phone memory that writes direct.The big hidden danger that this technical implementation way causes is that technical threshold is lower, obtains the authentication information of secret easily by illegal means.At present occurred utilizing the terminal program coded to read authentication information and by forcing to read the situation that whole eeprom contents obtain authentication information.If someone is written to the information of obtaining on other the phs terminal again, make a plurality of users use same Subscriber Number jointly, this has just formed illegal parallel operation phenomenon, and this situation cause great loss can for real consumer and PHS Virtual network operator.To be the PHS mobile phone congenital when design has for this technological deficiency, do not find to properly settle the otherwise effective technique scheme of this problem in present application as yet, also do not find the disclosed technical literature data at this particular technology problem simultaneously as yet.
Summary of the invention
Technical problem to be solved by this invention is exactly the situation at the illegal parallel operation of above-mentioned PHS mobile phone, proposes a kind of guard method of PHS mobile phone identification information, can prevent the illegal parallel operation of PHS mobile phone effectively, guarantees consumer and benefits of operators.
Core concept of the present invention is: at utmost compatible on the market in the method for the number of writing substantially of the PHS mobile phone that uses, at first write authentication information by existing method, use the key of a certain hardware chip unique corresponding mark information of a pair of and mobile phone right, when the authentication use for the first time of PHS mobile phone, encryption key with cipher key pair is expressly encrypted authentication information, elder generation is decrypted with the decruption key of cipher key pair when using the PHS mobile phone later at every turn, and authentication information expressly is put among the SRAM for calling.
Technical scheme of the present invention is achieved in that a kind of guard method of PHS mobile phone identification information, comprises the following steps:
The number of writing step: the number of writing terminal expressly writes authentication information in the mobile phone memory by normal flow;
Encrypting step: the PHS mobile phone is expressly encrypted authentication information when carrying out first authentication, and the authentication information that substitutes original storage with the authentication information ciphertext is expressly, comprising:
A) the mobile phone internal processes obtains encryption key from the particular memory region that can't visit except that the mobile phone internal processes;
B) utilize encryption key expressly to use cryptographic algorithm to carry out cryptographic calculation, obtain the authentication information ciphertext authentication information;
C) cover storage authentication information ciphertext in mobile phone memory Central Plains authentication information memory address expressly;
Decryption step: later PHS mobile phone carries out corresponding decrypt operation to the authentication information ciphertext when each start, the authentication information that obtains expressly is stored among the SRAM of mobile phone to call for handset program, comprising:
D) the mobile phone internal processes reads the authentication information ciphertext from mobile phone memory;
E) the mobile phone internal processes obtains decruption key from the particular memory region that can't visit except that the mobile phone internal processes;
F) utilize decruption key that the authentication information ciphertext is carried out corresponding decrypt operation and obtain authentication information expressly;
G) will obtain dispatching among the SRAM that power information expressly is stored in mobile phone and call for handset program;
Described encryption key and decruption key are that a key is right, are a pair of and a certain hardware chip unique corresponding mark information mobile phone, are stored in the internal storage of this hardware chip.
Described enciphering and deciphering algorithm is a public key algorithm.The encryption indicator position is set after the number of writing terminal expressly writes authentication information in the mobile phone memory in the described number of writing step is " unencryption "; The mobile phone internal processes detects the encryption indicator position for starting encipheror at once after " unencryption " in the encrypting step, after encrypting step is finished the encryption indicator position is revised as " encrypting "; The mobile phone internal processes detects the encryption indicator position and starts decryption step for " encrypting " back in the decryption step.
Described encryption key and decruption key are stored in the portion of baseband chip among P2ROM or the ROM, and handset program does not provide key right external reference interface.
The authentication information guard method that the present invention proposes; at first ablation process and encryption and decryption process are relatively independent; have with the common number of writing operation well compatible; can the maximum possible compatibility on the market in the method for the number of writing substantially (as series such as WT020, UTS702F) of using mobile phone model; can make operator on the existing equipment basis, easily finish this operation, not need to increase the coding tools that cost more renews.Secondly, by the encryption key that is stored in the specific region authentication information is expressly encrypted when using for the first time, in mobile phone memory, stored ciphertext; Encrypting the each start use in back deciphers authentication information with decruption key earlier; plaintext is stored among the SRAM for handset program calls; authentication information expressly will be lost automatically behind each mobile phone shutdown, and deciphering once can effectively be protected authentication information so again in the mobile phone power-on start-up course.At last; key is to being stored in the specific memory zone; mobile phone does not provide access key right external interface; guarantee that key is not to leaking; this is read complete different with the EEPROM data easily by the outside; fundamentally stopped to obtain the right approach of key, reached the purpose of protection PHS mobile phone identification information by the mode of copy.In sum; the authentication information guard method that the present invention proposes can prevent effectively that PHS mobile phone identification information is illegally accessed, and prevents the generation of illegal parallel operation phenomenon; improve the system safety performance of PHS mobile phone, ensured user and benefits of operators fully.
Description of drawings
Fig. 1 is the hardware configuration schematic diagram of existing PHS mobile phone.
Fig. 2 is the flow chart of the authentication information guard method that proposes of the present invention.
Fig. 3 a preferred embodiment of the present invention overview flow chart.
Embodiment
The present invention is described in further detail below in conjunction with drawings and Examples.
Fig. 1 is the hardware configuration schematic diagram of existing PHS mobile phone.As shown in Figure 1, PHS mobile phone hardware structure is divided into baseband portion and radio frequency part.With baseband chip BBIC is that core is formed baseband circuit, the PHS handset program generally is stored in the external memory storage, promptly be stored on FLASH or the ROM, the adjustable parameter of PHS mobile phone generally is stored on the EEPROM, in the prior art, the PHS handset program directly is stored in manufacture process on ROM (read-only memory) or the Flash (flash memory), and when mobile phone used, handset program was loaded among SRAM, the DRAM and moves.Very important authentication information just is present among the EEPROM with true form form expressly on the PHS mobile phone.When needs used authentication information, handset program read from storage area, and this storage area allows external interface to conduct interviews, and wherein Cun Chu data (comprising authentication information) are obtained by the outside easily and divulged a secret.Described baseband portion links to each other with outside by the IO interface, can control charging circuit battery is carried out charging operations, and battery is given stabilized voltage power supply LDO with electric power, gives baseband chip and radio frequency part power supply by stabilized voltage power supply LDO.Baseband portion is talked about by microphone MIC, and RECEIVER send words by receiver, send ring by loud speaker BUZZER when calling.The signal that radio frequency part is sent here baseband portion carries out giving network system by antenna transmission after the modulation.Display module LCD MODULE is used to show mobile phone interface information, and keypad information input baseband portion is handled.
Fig. 2 is the flow chart of the authentication information guard method that proposes of the present invention.As shown in Figure 2, the method for the present invention's proposition comprises the following steps:
One, write step: the number of writing terminal expressly writes authentication information in the mobile phone memory by normal flow.The mobile phone memory here can be that FLASH also can be EEPROM.
Two, encrypting step: the PHS mobile phone is expressly encrypted authentication information when carrying out first authentication, and the authentication information that substitutes original storage with the authentication information ciphertext expressly.Specifically comprise: a) the mobile phone internal processes obtains encryption key from the particular memory region that can't visit except that the mobile phone internal processes.Described encryption key and decruption key are that a key is right, are a pair of and a certain hardware chip unique corresponding mark information mobile phone, are stored in the internal storage of this hardware chip, can not lead to software and change.B) utilize encryption key expressly to use cryptographic algorithm to carry out cryptographic calculation, obtain the authentication information ciphertext authentication information.C) cover storage authentication information ciphertext in mobile phone memory Central Plains authentication information memory address expressly.In order to reach protection authentication information purpose expressly; to authentication information encrypt finish after essential step be exactly that the original authentication information of deletion is expressly in mobile phone memory; and the authentication information ciphertext after the encryption of storage process, ciphertext is also only used in use from now on.
Three, decryption step: later PHS mobile phone carries out corresponding decrypt operation to the authentication information ciphertext when each start, the authentication information that obtains expressly is stored among the SRAM of mobile phone to call for handset program.Decryption step specifically comprises: d) the mobile phone internal processes reads the authentication information ciphertext from mobile phone memory; E) the mobile phone internal processes obtains decruption key from the particular memory region that can't visit except that the mobile phone internal processes; F) utilize decruption key that the authentication information ciphertext is carried out corresponding decrypt operation and obtain authentication information expressly.Deciphering and encryption are the processes of an inverse operation, and the authentication information before obtaining deciphering by ciphertext and decruption key expressly.Decipherment algorithm used herein and the cryptographic algorithm of using the previously cryptographic algorithm that can use public-key, more typical public key encryption algorithm such as RSA Algorithm can use in the present invention.G) will obtain dispatching among the SRAM that power information expressly is stored in mobile phone and call for handset program.Plaintext is stored among the SRAM for handset program calls; authentication information expressly will be lost automatically behind each mobile phone shutdown, and deciphering is once called in SRAM again in the mobile phone power-on start-up course; utilize the SRAM outage to lose the characteristics of stored information, can effectively protect authentication information.In a preferred embodiment of the invention, described encryption key and decruption key solidify in the portion that is stored in baseband chip among P2ROM or the ROM, and handset program does not provide key right external reference interface.The right visit of key can only be undertaken by the internal processes of mobile phone.P2ROM is meant Production ProgrammedROM, and it does not need masking process, but production stage one-time programming writes specific program, and common ROM need to produce be to write when making by the mask mode.The various aspects of performance of P2ROM more has superiority than common ROM, the encapsulation use of these two kinds of memories that mobile phone base band chip inside is integrated at present.Comprising encryption key and decruption key is the whole baseband chip inside that is encapsulated at interior P2ROM or ROM content, can only be by handset program visit itself, the user can't obtain the inter access inlet of P2ROM or ROM, can not obtain to leave in the data among P2ROM or the ROM by the visit to EEPROM.Here the unauthorized access mode except that the mobile phone internal processes of indication mainly is the illegal copies of EEPROM, write modes such as driver access memory space voluntarily, this also be at present illegal parallel operation person obtain key information expressly the time institute take one of main technological means.The key of described encryption key and decruption key is to also being stored in the storage area that only allows the visit of mobile phone internal processes among the FLASH.In order to carry out cryptographic calculation and the requirement of satisfying the related protocol of PHS mobile phone identification, for example meet the requirement of STEPHI algorithm and FEAL algorithm, usually the data length that requires encryption key and decruption key is more than the 8bit, length is consistent on same type PHS mobile phone gets final product, the different model mobile phone can suitably change, and can determine according to different situations.
Fig. 3 a preferred embodiment of the present invention overview flow chart.The encryption indicator position is set after in a preferred embodiment of the invention, the number of writing terminal expressly writes authentication information in the mobile phone memory in the number of writing step is " expressly "; The mobile phone internal processes detects the encryption indicator position for starting encipheror at once after " expressly " in the encrypting step, after encrypting step is finished the encryption indicator position is revised as " ciphertext "; The mobile phone internal processes detects the encryption indicator position and starts decryption step for " ciphertext " back in the decryption step.Specifically as shown in Figure 5: 1, an encryption indicator position just is set when the number of writing step.This flag bit has only two states: " unencryption " and " encrypting ", " unencryption " are expressly, and " encrypting " is ciphertext, in an embodiment, represents " unencryption " with " 0 ", represents " encrypting " with " 1 ".In a preferred embodiment of the invention, do not encrypt immediately after the number of writing is finished, nature should be provided with the encryption indicator position and be " 0 ".2, after the number of writing of PHS mobile phone was finished, initialization was carried out in start.For the first time opening initialization is bound to carry out authorizing procedure, just authentication first.3, judge authentication information encryption indicator position, see and whether encrypt.If 4 authentication information encryption indicator positions are " 0 ", then start encrypting step, and after encrypting step is finished, " 1 " is revised as in the encryption indicator position.In a preferred embodiment of the invention, during initialization first, authentication information encryption indicator position must be " 0 ", therefore will start encrypting step, after encryption is finished " 1 " is revised as in the encryption indicator position, shows " encrypting ".Detailed description had been done in concrete encrypting step front, did not repeat them here.If 5 authentication information encryption indicator positions are " 1 ", then move decryption step, and after deciphering is finished, authentication information is expressly put into SRAM for calling.Decryption step repeats no more as mentioned above.According to step 4, because carried out encryption during initialization first, thus from the PHS mobile phone start shooting for the second time the beginning after start each time, detected encryption indicator position must be " 1 ", therefore need deciphering, then authentication information is expressly put into SRAM for calling.
Use the guard method of the authentication information of the present invention's proposition, the encryption and decryption that authentication information writes storage medium and authentication information is two independent step, therefore can be compatible to greatest extent at present in the number of the writing method of the PHS mobile phone that uses, guaranteed benefits of operators, need not to increase cost and purchase the new number of writing equipment; On the other hand; after the PHS mobile phone uses for the first time; only store the ciphertext of authentication information; even the total data in a certain PHS mobile phone memory is copied in the another one mobile phone memory; this is equivalent to cipher-text information is all copied on the other mobile phone; but the technical scheme that proposes according to the present invention; former PHS mobile phone has facility information unique, that can not rewrite; the key that is encryption and decryption is right; key also just can't copy, like this passing through external interface access; because key is to the unknown, authentication information has expressly also obtained protection effectively.Even copy on the PHS mobile phone of a same model, by the authentication information ciphertext of key of self to coming with copy, also be to obtain correct authentication information plaintext, be the disabled user since key to difference, still correct authentication information can't be obtained, thereby illegal parallel operation can be effectively prevented.

Claims (9)

1, a kind of guard method of PHS mobile phone identification information is characterized in that comprising the following steps:
The number of writing step: the number of writing terminal expressly writes authentication information in the mobile phone memory by normal flow;
Encrypting step: the PHS mobile phone is expressly encrypted authentication information when carrying out first authentication, and the authentication information that substitutes original storage with the authentication information ciphertext is expressly, comprising:
A) the mobile phone internal processes obtains encryption key from the particular memory region that can't visit except that the mobile phone internal processes;
B) utilize encryption key expressly to use cryptographic algorithm to carry out cryptographic calculation, obtain the authentication information ciphertext authentication information;
C) cover storage authentication information ciphertext in mobile phone memory Central Plains authentication information memory address expressly;
Decryption step: later PHS mobile phone carries out corresponding decrypt operation to the authentication information ciphertext when each start, the authentication information that obtains expressly is stored among the SRAM of mobile phone to call for handset program, comprising:
D) the mobile phone internal processes reads the authentication information ciphertext from mobile phone memory;
E) the mobile phone internal processes obtains decruption key from the particular memory region that can't visit except that the mobile phone internal processes;
F) utilize decruption key that the authentication information ciphertext is carried out corresponding decrypt operation and obtain authentication information expressly;
G) will obtain dispatching among the SRAM that power information expressly is stored in mobile phone and call for handset program;
Described encryption key and decruption key are that a key is right, are a pair of and a certain hardware chip unique corresponding mark information mobile phone, are stored in the internal storage of this hardware chip.
2, the guard method of a kind of PHS mobile phone identification information according to claim 1 is characterized in that: described enciphering and deciphering algorithm is a public key algorithm.
3, the guard method of a kind of PHS mobile phone identification information according to claim 1 and 2 is characterized in that being provided with after the number of writing terminal expressly writes authentication information in the mobile phone memory in the described number of the writing step encryption indicator position and is " unencryption "; The mobile phone internal processes detects the encryption indicator position for starting encipheror at once after " unencryption " in the encrypting step, after encrypting step is finished the encryption indicator position is revised as " encrypting "; The mobile phone internal processes detects the encryption indicator position and starts decryption step for " encrypting " back in the decryption step.
4, the guard method of a kind of PHS mobile phone identification information according to claim 1 and 2 is characterized in that: described encryption key and decruption key are stored in the portion of baseband chip among P2ROM or the ROM, and handset program does not provide key right external reference interface.
5, the guard method of a kind of PHS mobile phone identification information according to claim 1 and 2 is characterized in that: described encryption key and decruption key can not be changed by software.
6, the guard method of a kind of PHS mobile phone identification information according to claim 1 and 2 is characterized in that: described mobile phone memory is the EEPROM or the FLASH of mobile phone.
7, the guard method of a kind of PHS mobile phone identification information according to claim 2 is characterized in that: described public key algorithm is a RSA Algorithm.
8, the guard method of a kind of PHS mobile phone identification information according to claim 1 and 2 is characterized in that: described encryption key and decruption key can be stored in the storage area that only allows the visit of mobile phone internal processes among the FLASH.
9, the guard method of a kind of PHS mobile phone identification information according to claim 1 and 2 is characterized in that: the data length of described encryption key and decruption key is more than the 8bit.
CNB031316182A 2003-05-27 2003-05-27 A kind of guard method of PHS mobile phone identification information Expired - Fee Related CN100569024C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031316182A CN100569024C (en) 2003-05-27 2003-05-27 A kind of guard method of PHS mobile phone identification information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031316182A CN100569024C (en) 2003-05-27 2003-05-27 A kind of guard method of PHS mobile phone identification information

Publications (2)

Publication Number Publication Date
CN1553729A true CN1553729A (en) 2004-12-08
CN100569024C CN100569024C (en) 2009-12-09

Family

ID=34322918

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031316182A Expired - Fee Related CN100569024C (en) 2003-05-27 2003-05-27 A kind of guard method of PHS mobile phone identification information

Country Status (1)

Country Link
CN (1) CN100569024C (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100511259C (en) * 2007-07-20 2009-07-08 威盛电子股份有限公司 Method and programm for protecting data applied in programm code developing programm
WO2012048493A1 (en) * 2010-10-14 2012-04-19 中兴通讯股份有限公司 Method and apparatus for protecting software of mobile terminal
CN105373741A (en) * 2015-10-19 2016-03-02 广东欧珀移动通信有限公司 Method and device for usage of fingerprint information
CN111752200A (en) * 2020-07-08 2020-10-09 深圳市有方科技股份有限公司 Program operating method, computer device, and readable storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100511259C (en) * 2007-07-20 2009-07-08 威盛电子股份有限公司 Method and programm for protecting data applied in programm code developing programm
WO2012048493A1 (en) * 2010-10-14 2012-04-19 中兴通讯股份有限公司 Method and apparatus for protecting software of mobile terminal
US8751824B2 (en) 2010-10-14 2014-06-10 Zte Corporation Method and apparatus for protecting software of mobile terminal
CN105373741A (en) * 2015-10-19 2016-03-02 广东欧珀移动通信有限公司 Method and device for usage of fingerprint information
CN105373741B (en) * 2015-10-19 2018-01-19 广东欧珀移动通信有限公司 The application method and device of a kind of finger print information
CN111752200A (en) * 2020-07-08 2020-10-09 深圳市有方科技股份有限公司 Program operating method, computer device, and readable storage medium

Also Published As

Publication number Publication date
CN100569024C (en) 2009-12-09

Similar Documents

Publication Publication Date Title
CA2041248C (en) Security module for radio telephone
JP2001320768A (en) Portable telephone set and secrecy method of data
KR100766313B1 (en) Apparatus and method for encrypting of preservation key in mobile communication terminal
US20030061488A1 (en) Cloning protection for electronic equipment
CN100401823C (en) Method of pirat copy for internal software of mobile terminal and mobile terminal
KR20020065855A (en) Storage device including a non-volatile memory
KR20050035140A (en) Content processing apparatus and content protection program
CN102781001A (en) Method for encrypting built-in file of mobile terminal and mobile terminal
CN101478595A (en) Mobile communication terminal data protection method
CN1708160A (en) Mobile communication terminal capable of carrying out encrypting to user information and method thereof
JPH10210535A (en) Mobile radio telephone station consisting of at least one authentication number security system and method for protecting authentication number
US8346215B2 (en) Retrospective implementation of SIM capabilities in a security module
KR101625785B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN100476845C (en) Digital copyright management method
CN1264373C (en) Encrypting and de-encrypting method for personal hand-held communication system cell phone identification information
JP2009182970A (en) Protection method of mobile telephone type electrical communication terminal
CN115378592A (en) Password service calling method and system
CN1286336C (en) Protection of authentication information of PHS mobile telephone
CN100569024C (en) A kind of guard method of PHS mobile phone identification information
CN101355740B (en) Method and system for protecting smart card data
US20060121882A1 (en) Desktop cellular phone having a SIM card with an encrypted SIM PIN
CN1227933C (en) Method of storing information for user of PHS handset
JP2008167086A (en) Electronic equipment, method for decoding data used for it, and data decoding control program
CN106850557A (en) A kind of method, system, terminal for writing and reading phonecard associated person information
CN1553727A (en) User information storing method for PHS mobile

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: ZTE CO., LTD.

Free format text: FORMER OWNER: NANJING BRANCH OF SHENZHEN ZTE CORPORATION

Effective date: 20050708

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20050708

Address after: 518057 Department of law, Zhongxing building, South Science and technology road, Nanshan District hi tech Industrial Park, Shenzhen

Applicant after: ZTE Corporation

Address before: 210012, Bauhinia Road, Yuhua District, Jiangsu, Nanjing 68, China

Applicant before: Nanjing Branch Co., Zhongxing Communication Co., Ltd., Shenzen City

C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091209

Termination date: 20130527