CN1717100A - Legality identification method of mobile terminal user and its mobile terminal - Google Patents
Legality identification method of mobile terminal user and its mobile terminal Download PDFInfo
- Publication number
- CN1717100A CN1717100A CN200410062413.9A CN200410062413A CN1717100A CN 1717100 A CN1717100 A CN 1717100A CN 200410062413 A CN200410062413 A CN 200410062413A CN 1717100 A CN1717100 A CN 1717100A
- Authority
- CN
- China
- Prior art keywords
- chip
- subscriber card
- portable terminal
- proofing
- characteristic information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000004048 modification Effects 0.000 claims description 12
- 238000012986 modification Methods 0.000 claims description 12
- 230000009471 action Effects 0.000 claims description 10
- 238000012217 deletion Methods 0.000 claims description 10
- 230000037430 deletion Effects 0.000 claims description 10
- 230000005540 biological transmission Effects 0.000 claims description 8
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 10
- 230000008859 change Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 238000012795 verification Methods 0.000 description 6
- 239000013643 reference control Substances 0.000 description 3
- 238000000926 separation method Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 239000012467 final product Substances 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000007257 malfunction Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
Images
Landscapes
- Telephone Function (AREA)
Abstract
This invention discloses a method for verifying the legality of a mobile terminal user. First of all, a verifying chip is set in the mobile terminal and the character information of a user card corresponding to the mobile terminal is kept on the chip, when the user identity is needed to be verified, the chip fetches the user card character information directly from the card and compares if the fetched information is the same with that kept by itself, if so, it judges if the user identity is legal or not. If the user identity is illegal, the normal work of the mobile terminal is stopped to protect the legitimate right of the terminal users.
Description
Technical field
The present invention relates to the verification technique of cordless communication network, the portable terminal that is specifically related to a kind of legality identification method of mobile phone users and has the user validation authentication function.
Background technology
Present portable terminal great majority adopt the mode of separation between machine and card, and just portable terminal itself is two independent parts with the subscriber card that is used for checking wireless network user profile, bond them together in use to get final product.Present subscriber card mainly is Subscriber Identity Module (SIM) card that is used for global mobile communication (GSM) system.This mode has realized separating of Network operation and terminal sale, thereby have a lot of outstanding advantages, for example the user wants to change the words of a portable terminal, only need to buy a new portable terminal and original subscriber card is inserted into new portable terminal to get final product, like this, because user's information does not need to change, so the user does not need to handle to common carrier the formality of any replacing portable terminal yet.
But when adopting the separation between machine and card mode to bring great convenience, also cause portable terminal stolen and robbed phenomenon and happen occasionally, to such an extent as to portable terminal dare not be hung between waist some local people to the user.Because under the separation between machine and card mode, change a new subscriber card on the portable terminal of robbing and just can have no obstacle ground use as long as steal in institute.Thereby the robber can sail again the steal portable terminal of robbing and sell profit like this.Like this, user not only economic interests is subjected to very big influence, but also need go to the common carrier place to handle a series of formalities, for example changes subscription data, has brought very big inconvenience to the user.
In order to solve portable terminal stolen problem of robbing easily, need carry out legitimate verification to the identity of mobile phone users.Current a kind of method relatively more commonly used is the SIM card scheme, just preserves user's SIM card number in the memory of portable terminal.When portable terminal was started shooting at every turn, the portable terminal program all will be obtained the number of current SIM card in the portable terminal, obtained the number of the SIM card of storage in advance then from memory, and relatively whether the two is consistent.If the two unanimity proves that using the user of current SIM card is original user, that is to say that user identity is legal; If the two is inconsistent, prove that using the user of current SIM card is not original user, can think that then user identity is illegal.By this method, if the disabled user inserts the SIM card of oneself to steal in the portable terminal of robbing and uses, because what preserve in the memory is original SIM card number, what the portable terminal program was obtained then is illegal user's SIM card number, therefore the comparative result of two numbers is inconsistent, thereby it is illegal to judge active user's identity.
But, in this scheme, because preserving the memory of SIM card number generally is the FLASH memory, the disabled user can remove original information of preserving by physical means and write new information then, the disabled user can be with the SIM card write memory of oneself like this, oneself can be thereby when carrying out checking, make smoothly by checking, realization is used and is stolen the purpose of robbing portable terminal.In addition, this scheme need depend on the portable terminal program and come comparison SIM card card number, and therefore, the robber can be by replacing the corresponding program module, and for example the program module of SIM card card number is compared in change, makes this verification method lose efficacy.Therefore the reliability of this scheme is not high enough, thereby makes still easy stolen the robbing of portable terminal, has reduced the fail safe of portable terminal.
Summary of the invention
In view of this, main purpose of the present invention provides a kind of method of verifying the mobile phone users legitimacy, with the reliability of raising to the user identity legitimate verification, thus the fail safe that improves portable terminal.
Another object of the present invention provides a kind of portable terminal with user validation authentication function that is used to realize said method.
Above-mentioned purpose of the present invention is achieved by the following technical solutions:
A kind of legality identification method of mobile phone users comprises at least:
A., a proofing chip that is used to verify the mobile phone users legitimacy is set in portable terminal, and on proofing chip, preserves the subscriber card characteristic information of the subscriber card of this portable terminal correspondence;
B. when needs are verified user identity, proofing chip directly obtains the subscriber card characteristic information that subscriber card is preserved from subscriber card, and whether the subscriber card characteristic information that is relatively obtained is consistent with the subscriber card characteristic information of self preserving, if consistent, judges that user identity is legal; Otherwise judge that user identity is illegal.
Said method is judged the illegal step that may further include the work that stops portable terminal afterwards of user identity in step b.Here can in proofing chip, set in advance one and be connected on power supply in the portable terminal and the power switch between the power management chip, portable terminal be quit work thereby disconnect the power management chip power supply that power switch stops in portable terminal by proofing chip like this.Perhaps, proofing chip further is connected to baseband chip or power management chip, this is that the work that stops portable terminal comprising: the baseband chip of proofing chip in portable terminal or the message of an authentication failed of power management chip transmission, baseband chip or power management chip quit work in the predefined time after receiving this message.
Said method may further include an access control password is set in proofing chip; At this moment the subscriber card characteristic information of preserving in receiving proofing chip reads, during the request of modification or deletion action, judge the access control password that whether comprises described setting in this request, if do not comprise, then forbid to the subscriber card characteristic information of preserving in the proofing chip read, modification or deletion action; If comprise then judge further whether this access control password is correct; If carry out the operation that sends, revises or delete the subscriber card characteristic information; Otherwise, forbid to the subscriber card characteristic information of preserving in the proofing chip read, modification or deletion action.
A kind of portable terminal, at least comprise baseband chip and subscriber card, and further comprise a proofing chip that is used to verify the mobile phone users legitimacy, proofing chip comprises the verifying logic unit that is used to preserve the subscriber card characteristic information memory cell of subscriber card characteristic information and is used for verifying according to the subscriber card characteristic information mobile phone users legitimacy, subscriber card characteristic information memory cell links to each other with the verifying logic unit, and the verifying logic unit is connected to baseband chip and subscriber card by interface.
The interface here can be the subscriber card interface, and the verifying logic unit is connected to subscriber card and baseband chip by this subscriber card interface and a data wire in parallel.In this case, subscriber card, proofing chip and the baseband chip reception object of determining signal by the number of pulses or the command code in the signal of the signal on the data wire in parallel or send object.Perhaps be connected a signal line between any two at subscriber card, proofing chip and baseband chip, the state of subscriber card, proofing chip and the baseband chip holding wire by being connected to oneself is determined the reception object of signal.
Proofing chip may further include a baseband chip interface, and the verifying logic unit further is directly connected to baseband chip by this baseband chip interface.
Aforementioned interface can be subscriber card interface and baseband chip interface in addition, and the verifying logic unit is connected to subscriber card by this subscriber card interface, is connected to baseband chip by this baseband chip interface, and the order that subscriber card is operated of transparent transmission baseband chip.
Proofing chip may further include a power switch, and power switch is connected between power supply and the power management chip, is connected to the verifying logic unit simultaneously and is disconnected or closed by the verifying logic unit controls.
In addition, proofing chip may further include a power management chip interface, this power management chip interface is connected to the verifying logic unit, and being connected to power management chip by data wire, the verifying logic unit issues the operation of control command control power management chip by the power management chip interface
From technical scheme of the present invention as can be seen, the present invention at first is provided with a proofing chip that is used to verify the mobile phone users legitimacy in portable terminal, and preserves the subscriber card characteristic information of the validated user card of portable terminal in this proofing chip.When needs are verified user identity, proofing chip directly obtains the subscriber card characteristic information that subscriber card is preserved, and whether the subscriber card characteristic information that is relatively obtained is consistent with the subscriber card characteristic information of self preserving, if consistent, judging that subscriber card is legal, also is that user identity is legal; Otherwise judging that subscriber card is illegal, also is that user identity is illegal.Like this by a proofing chip is set in portable terminal, and can verify the mobile terminal user identity by subscriber card characteristic information relatively.In this method, proofing chip does not need directly to obtain the subscriber card characteristic information from subscriber card through the portable terminal program, therefore can not verification operation be lost efficacy.
And the present invention deposits the subscriber card characteristic information in a chip, and this information can not illegally read or remove by physical means, unless this chip is destroyed, but this can cause whole portable terminal not use.Steal the disabled user who robs portable terminal like this and can not remove or revise the information of preserving in the proofing chip, thereby when proofing chip is verified, can not make the own checking of passing through smoothly, therefore improved fail safe of the present invention.
To sum up, the present invention has improved the reliability to the user identity legitimate verification effectively, thereby has improved the fail safe of portable terminal.
Description of drawings
Fig. 1 is an overview flow chart of the present invention.
Fig. 2 is the mobile terminal structure schematic diagram according to first embodiment of the invention.
Fig. 3 is the mobile terminal structure schematic diagram according to second embodiment of the invention.
Fig. 4 is the mobile terminal structure schematic diagram according to third embodiment of the invention.
Fig. 5 is the mobile terminal structure schematic diagram according to fourth embodiment of the invention.
Fig. 6 is the mobile terminal structure schematic diagram according to fifth embodiment of the invention.
Embodiment
The present invention is described in detail below in conjunction with the drawings and specific embodiments.
Fig. 1 shows overall procedure of the present invention.As shown in Figure 1,, a proofing chip that is used to verify the mobile phone users legitimacy is set in portable terminal at first, and in this proofing chip, preserves the subscriber card characteristic information of the subscriber card of portable terminal correspondence in step 101.The subscriber card here for example is the employed SIM card of GSM network, and the subscriber card characteristic information can be the card number of subscriber card.
In step 102, when needs were verified the legitimacy of mobile phone users, the subscriber card of proofing chip from portable terminal obtained the subscriber card characteristic information.
In step 103, proofing chip judges whether the subscriber card characteristic information that is obtained is identical with the subscriber card characteristic information of self preserving, if identical, determines that in step 104 user identity is legal, otherwise determines that in step 105 user identity is illegal.
Here, the execution of step 102 can be to carry out immediately behind mobile terminal-opening, also can be after mobile terminal-opening, to carry out again through after a random time or the predefined random time, or the processing unit that detects portable terminal at proofing chip subscriber card is conducted interviews signal the time carry out.
Can further stop the operate as normal of portable terminal after step 105 in a predefined time, concrete implementation will describe in detail in the back.
Fig. 2 shows the mobile terminal structure schematic diagram according to first embodiment of the invention.As can be seen from the figure, proofing chip comprises several parts such as verifying logic unit, subscriber card characteristic information memory cell and subscriber card interface, wherein the verifying logic unit is connected with subscriber card characteristic information memory cell, the verifying logic unit can read the subscriber card characteristic information of storing in the subscriber card characteristic information memory cell like this, also can write new subscriber card characteristic information in subscriber card characteristic information memory cell.In addition, the verifying logic unit is connected to the subscriber card interface, and is connected to subscriber card in the portable terminal by the subscriber card interface.
In this embodiment, subscriber card in the portable terminal and baseband chip directly link together by a data wire, this data wire can be a data wire with parallel connection of three interfaces, just an interface is received subscriber card, other two interfaces are received the subscriber card interface and the baseband chip of proofing chip respectively, form the relation of a threeway like this between proofing chip, baseband chip and the subscriber card, either party signal of sending just, two sides can receive in addition.
In this case, proofing chip and baseband chip can directly read the subscriber card characteristic information from subscriber card, and the interacting message between proofing chip and the baseband chip is also undertaken by this data wire.As previously mentioned, because the signal that either party sends two sides in addition can receive, therefore each side among two sides of received signal needs to judge whether the signal that is received needs oneself to handle, and this signal is then handled in own if desired processing, otherwise this signal is not responded.For example, when baseband chip arrived subscriber card to the access control signal of proofing chip, subscriber card did not need own processing in case judge the message that is received, and did not then handle accordingly and responded; When baseband chip arrived proofing chip to the access control signal of subscriber card, proofing chip judged when the signal that receives does not need own processing, then do not handle accordingly and responded; When proofing chip arrived baseband chip to the access control signal of subscriber card, baseband chip judged when the signal that receives does not need own processing, then do not handle accordingly and responded.
In the middle of reality, can distinguish signal by the mode of command code and send object or receive object.Specifically, in signal, a command code is set, distinguishes signal transmission object by command code being given different values by the data wire transmission.For example, command code is that 1 expression baseband chip sends to subscriber card with signal, and command code is that 2 expression baseband chips send to proofing chip with signal, and command code is that 3 expression proofing chips send to baseband chip with signal.If baseband chip wishes to obtain the subscriber card characteristic information from subscriber card, then the command code in the signal of Fa Songing is set to 1, and to receive behind this signal by command code be 1 to judge this signal and send to oneself to subscriber card like this, therefore handles this signal; And proofing chip also can receive this signal simultaneously, but proofing chip to judge the command code of this signal be 1 rather than 2, thereby determine that this signal do not issue oneself, thereby this signal is not responded.Certainly, also this command code can be used as address code.
Perhaps, can distinguish signal by the mode of holding wire and send object.In this mode, in subscriber card, proofing chip and baseband chip, be connected a signal line in twos, when first party need send signal to second party, open the holding wire between first party and the second party.When second party and third party received access control signal from first party simultaneously like this, the holding wire that second party detects oneself was in open mode, determines that therefore this access control signal sends to oneself, thereby handles this signal; And the third party detects the holding wire of oneself and does not open, and determines that therefore this access control signal does not send to oneself, thereby will not respond.Whether concrete definite holding wire is in open mode can be to determine according to the level of holding wire, perhaps determines according to the pulse signal that is received.For example, can preestablish continuous three pulses and represent the opening signal line, and, then preestablish continuous four pulses and represent the opening signal line for first party and third-party holding wire for the holding wire between first party and the second party.
Simultaneously three signal line also can be unified the holding wire that forms a threeway, for example and the threeway data wire between them unify.Can identify the two ends that communicate by different pulse signals like this.When for example two consecutive pulses signals occurring on the holding wire, the expression baseband chip is to the visit of subscriber card, when three consecutive pulses signals occurring, the expression proofing chip is to the visit of subscriber card, when four consecutive pulses signals occurring, represent the visit of baseband chip to proofing chip, or the like.In this case, this holding wire can be used as address wire, and distinguish the address of signal sending end and receiving terminal by different pulse signals.
The implementation of above-mentioned first embodiment need be changed the design of subscriber card.Because the subscriber card external interface is standard, promote to acquire a certain degree of difficulty for the implementation that requires to change the subscriber card design.For fear of revising present subscriber card, the present invention proposes the second following embodiment.
Fig. 3 shows the mobile terminal structure schematic diagram according to second embodiment of the invention.Different with first embodiment, proofing chip also comprises a baseband chip interface that is used for the verifying logic unit is connected to baseband chip except comprising several parts such as verifying logic unit, subscriber card characteristic information memory cell and subscriber card interface.
In this embodiment, proofing chip and baseband chip are parallel-connected to subscriber card equally.In addition, proofing chip also is directly connected to baseband chip by baseband chip interface and a data wire.Proofing chip and baseband chip can directly read the subscriber card characteristic information from subscriber card like this, but can directly realize interacting message between proofing chip and the baseband chip, do not transmit and do not need to carry out data by the also wiring between proofing chip and the baseband chip, under this mode, the subscriber card interface of proofing chip can conduct interviews to subscriber card by the Analog Baseband chip, like this, subscriber card does not just need to distinguish the access control signal from proofing chip, still from baseband chip, like this, subscriber card does not need therefore to carry out any change, thereby can realize the compatibility to subscriber card.Here subscriber card is conducted interviews can be that command format to subscriber card visit is set to identical to the command format of subscriber card visit with baseband chip to the subscriber card interface Analog Baseband chip of proofing chip.
Proofing chip and baseband chip are parallel-connected to subscriber card among first and second embodiment, proofing chip is connected in series between subscriber card and the baseband chip among the 3rd following embodiment, subscriber card directly is not connected with baseband chip, and the interacting message between them need be through the transparent transmission of proofing chip.
Fig. 4 shows the mobile terminal structure schematic diagram according to third embodiment of the invention.As shown in Figure 4, the internal structure of proofing chip and second embodiment are identical, and its difference is the connected mode between proofing chip and subscriber card and the baseband chip.In this embodiment, proofing chip is connected to subscriber card by the subscriber card interface, is connected to baseband chip by the baseband chip interface, does not then directly connect between subscriber card and the baseband chip.Proofing chip can directly obtain the subscriber card characteristic information from subscriber card like this, also can be directly and baseband chip carry out interacting message, but the interacting message between subscriber card and the baseband chip then needs the transparent transmission through proofing chip.Similar with first embodiment, proofing chip does not need oneself processing in case find the message that is received, and then this message is passed through the opposing party relative with transmit leg.For example, proofing chip receives the message of obtaining the subscriber card characteristic information from baseband chip, judges after this message does not need oneself to handle it directly to be transmitted to subscriber card.
Fig. 5 shows the mobile terminal structure schematic diagram according to fourth embodiment of the invention.This embodiment and the second embodiment difference are that proofing chip further comprises a power switch, and this power switch is connected to the verifying logic unit, and is connected in series between power supply and the power management chip.Disconnect or closure by verifying logic unit controls power switch, thus the connection between cut-out or connection power supply and the power management chip.If the verifying logic unit is after judging authentication failed, the verifying logic unit disconnects power switch, thereby power supply can not be powered to power management chip, makes the disabled user can not use portable terminal like this.After having closed power switch, after portable terminal is started shooting again, the closed once more power switch in the verifying logic unit of proofing chip, power supply can normally be powered to power management chip, thereby make portable terminal energy operate as normal, and after judging authentication failed in the back, disconnect this power switch again.
The spirit that is appreciated that the 4th embodiment can be applied to the first and the 3rd embodiment at an easy rate, omits its detailed description here.
Fig. 6 shows the mobile terminal structure schematic diagram according to fifth embodiment of the invention.This embodiment and the second embodiment difference are that proofing chip further comprises a power management chip interface, and this power management chip interface is connected to the verifying logic unit, and is connected to power management chip by a data wire.The verifying logic unit can send authentication failed message to power management chip by power management chip interface and data wire, power management chip can shut-down operation in the predefined time after receiving this message, thereby make the portable terminal cisco unity malfunction, make the disabled user can not use portable terminal like this.In addition, proofing chip also can not send authentication failed message to power management chip here, but sends a triggering signal, and power management chip is stopped power supply after the triggering signal that receives from proofing chip like this, can reach same technique effect.Here the predefined time can be zero, also can be a period of time, for example 30 seconds.
The spirit that is appreciated that the 5th embodiment equally can be applied to the first and the 3rd embodiment at an easy rate, omits its detailed description here.
Thereby except by stopping to make the disabled user can not normally use portable terminal to improve the fail safe of portable terminal to the mode of portable terminal related chip power supply, in the above-described embodiments, particularly in first to the 3rd embodiment, can also send authentication failed message to baseband chip in direct verifying logic unit by proofing chip.Baseband chip stops the operate as normal of oneself in the predefined time after receiving this message, thereby make whole portable terminal cisco unity malfunction, has so also reached to prevent that the disabled user from continuing to use the purpose of portable terminal.Here the predefined time can be zero, also can be a period of time, for example 30 seconds.
In any case above-mentioned, proofing chip can be directly sends authentication failed message by the verifying logic unit of proofing chip to baseband chip after authentication failed.In this case, baseband chip can be inputed an access control password by output equipments such as display screen prompting user after the authentication failed message that receives from proofing chip.To describe in detail below about the access control password.
In the present invention, an access control password can also be set in proofing chip, if the user wishes to read, revise or delete the subscriber card characteristic information that proofing chip is preserved, proofing chip requires user's input reference control password by portable terminal main control module program, and judge in the request of user input whether comprise the access control password, if do not comprise, forbid to the subscriber card characteristic information of preserving in the proofing chip read, modification or deletion action; If comprise, judge after receiving the access control password of user input whether the access control password that the user inputs is correct.If the user imports correctly, allow the user to read, revise or delete the subscriber card characteristic information of preservation.Otherwise do not allow user's modification, and can be on mobile terminal display screen the prompting of explicit user input password mistake.
In addition, the maximum wrong input reference control password number of times that allows can be set in proofing chip, if proofing chip judge occur continuously to the subscriber card characteristic information of preserving in the proofing chip read, the number of times of included access control password mistake reaches the maximum wrong input reference control password number of times that allows in the request of modification or deletion action, then proofing chip carry out no longer respond to the subscriber card characteristic information of preserving in the proofing chip read, the lock operation of the request of modification or deletion action.
Further, can in proofing chip, be provided with one be used for controlling to the access control password read, delete, revise and to the subscriber card characteristic information that proofing chip is preserved read, the super code of the unlocking operation of modification or deletion action locking, the user can control the reading, delete, revise of access control password by super code, and can carry out unlocking operation after proofing chip has been carried out above-mentioned lock operation.
In the present invention, proofing chip can not be provided with separately yet, but is integrated in existing any one chip of portable terminal such as cpu chip, baseband chip, power management chip or radio frequency chip.Wherein proofing chip is being integrated under the situation of baseband chip, proofing chip can with the shared subscriber card interface of baseband chip.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (13)
1. the legality identification method of a mobile phone users comprises at least:
A., a proofing chip that is used to verify the mobile phone users legitimacy is set in portable terminal, and on described proofing chip, preserves the subscriber card characteristic information of the subscriber card of this portable terminal correspondence;
B. when needs are verified user identity, described proofing chip directly obtains the subscriber card characteristic information that subscriber card is preserved from subscriber card, and whether the subscriber card characteristic information that is relatively obtained is consistent with the subscriber card characteristic information of self preserving, if consistent, judges that user identity is legal; Otherwise judge that user identity is illegal.
2. the legality identification method of mobile phone users according to claim 1 is characterized in that, judges the illegal step that further comprises the work that stops portable terminal afterwards of user identity among the step b.
3. the legality identification method of mobile phone users according to claim 2, it is characterized in that, in proofing chip, set in advance one and be connected on power supply in the portable terminal and the power switch between the power management chip, the described work that stops portable terminal comprising: proofing chip disconnects power switch, stops the power management chip power supply in portable terminal.
4. the legality identification method of mobile phone users according to claim 2, it is characterized in that, proofing chip further is connected to baseband chip or power management chip, the described work that stops portable terminal comprising: the baseband chip of proofing chip in portable terminal or the message of an authentication failed of power management chip transmission, baseband chip or power management chip quit work in the predefined time after receiving this message.
5. the legality identification method of mobile phone users according to claim 1 is characterized in that, this method further comprises:
An access control password is set in proofing chip;
The subscriber card characteristic information of preserving in receiving proofing chip reads, during the request of modification or deletion action, judge the access control password that whether comprises described setting in this request, if do not comprise, then forbid described to the subscriber card characteristic information of preserving in the proofing chip read, modification or deletion action; If comprise then judge further whether this access control password is correct; If carry out the operation that sends, revises or delete the subscriber card characteristic information; Otherwise, forbid to the subscriber card characteristic information of preserving in the proofing chip read, modification or deletion action.
6. portable terminal, at least comprise baseband chip and subscriber card, it is characterized in that, further comprise a proofing chip that is used to verify the mobile phone users legitimacy, described proofing chip comprises the verifying logic unit that is used to preserve the subscriber card characteristic information memory cell of subscriber card characteristic information and is used for verifying according to the subscriber card characteristic information mobile phone users legitimacy, described subscriber card characteristic information memory cell links to each other with the verifying logic unit, and the verifying logic unit is connected to baseband chip and subscriber card by interface.
7. portable terminal according to claim 6 is characterized in that, described interface is the subscriber card interface, and the verifying logic unit is connected to subscriber card and baseband chip by this subscriber card interface and a data wire in parallel.
8. portable terminal according to claim 7 is characterized in that, reception object or transmission object that described subscriber card, proofing chip and baseband chip are determined signal by the number of pulses or the command code in the signal of the signal on the data wire in parallel.
9. portable terminal according to claim 7, it is characterized in that, described subscriber card, proofing chip and baseband chip are connected a signal line between any two, and the state of described subscriber card, proofing chip and the baseband chip holding wire by being connected to oneself is determined the reception object of signal.
10. portable terminal according to claim 6 is characterized in that, described proofing chip further comprises a baseband chip interface, and the verifying logic unit further is directly connected to baseband chip by this baseband chip interface.
11. portable terminal according to claim 6, it is characterized in that, described interface is subscriber card interface and baseband chip interface, the verifying logic unit is connected to subscriber card by this subscriber card interface, be connected to baseband chip by this baseband chip interface, and the order that subscriber card is operated of transparent transmission baseband chip.
12. portable terminal according to claim 6, it is characterized in that, described proofing chip further comprises a power switch, and described power switch is connected between power supply and the power management chip, is connected to the verifying logic unit simultaneously and is disconnected or closed by the verifying logic unit controls.
13. portable terminal according to claim 6, it is characterized in that, described proofing chip further comprises a power management chip interface, this power management chip interface is connected to the verifying logic unit, and being connected to power management chip by data wire, the verifying logic unit issues the operation of control command control power management chip by described power management chip interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100624139A CN100450270C (en) | 2004-07-02 | 2004-07-02 | Legality identification method of mobile terminal user and its mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100624139A CN100450270C (en) | 2004-07-02 | 2004-07-02 | Legality identification method of mobile terminal user and its mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1717100A true CN1717100A (en) | 2006-01-04 |
CN100450270C CN100450270C (en) | 2009-01-07 |
Family
ID=35822446
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100624139A Expired - Lifetime CN100450270C (en) | 2004-07-02 | 2004-07-02 | Legality identification method of mobile terminal user and its mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100450270C (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101098540B (en) * | 2006-06-27 | 2012-05-23 | 国民技术股份有限公司 | Encrypting chip based mobile terminal network-locking method |
CN102902927A (en) * | 2012-09-12 | 2013-01-30 | 飞天诚信科技股份有限公司 | Method and system for modifying password of encryption lock |
CN101496427B (en) * | 2006-08-02 | 2013-06-05 | 摩托罗拉移动公司 | Identity verification using location over time information |
CN107704414A (en) * | 2017-08-30 | 2018-02-16 | 威盛电子股份有限公司 | Electronic device capable of detecting self-connection and control method thereof |
CN109409142A (en) * | 2018-09-30 | 2019-03-01 | 联想(北京)有限公司 | A kind of processing method and electronic equipment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI103469B1 (en) * | 1996-09-17 | 1999-06-30 | Nokia Telecommunications Oy | Prevention of abuse of a copied subscriber code in a mobile telephone system |
US6606491B1 (en) * | 1998-06-26 | 2003-08-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Subscriber validation method in cellular communication system |
FI108908B (en) * | 1999-06-15 | 2002-04-15 | Nokia Corp | Detection of a copied terminal code |
CN1395407A (en) * | 2001-07-05 | 2003-02-05 | 致福股份有限公司 | Mobile telephone burglary-resisting design and its operation method |
-
2004
- 2004-07-02 CN CNB2004100624139A patent/CN100450270C/en not_active Expired - Lifetime
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101098540B (en) * | 2006-06-27 | 2012-05-23 | 国民技术股份有限公司 | Encrypting chip based mobile terminal network-locking method |
CN101496427B (en) * | 2006-08-02 | 2013-06-05 | 摩托罗拉移动公司 | Identity verification using location over time information |
CN102902927A (en) * | 2012-09-12 | 2013-01-30 | 飞天诚信科技股份有限公司 | Method and system for modifying password of encryption lock |
CN102902927B (en) * | 2012-09-12 | 2015-04-15 | 飞天诚信科技股份有限公司 | Method and system for modifying password of encryption lock |
CN107704414A (en) * | 2017-08-30 | 2018-02-16 | 威盛电子股份有限公司 | Electronic device capable of detecting self-connection and control method thereof |
CN109409142A (en) * | 2018-09-30 | 2019-03-01 | 联想(北京)有限公司 | A kind of processing method and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN100450270C (en) | 2009-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102131182B (en) | Network locking method and device for mobile terminal | |
US7184750B2 (en) | Smart terminal remote lock and format | |
CN1262137C (en) | Method for guaranteeing mobile communication terminal safety | |
EP2196045B1 (en) | System and method for protecting data in wireless devices | |
CN101064535B (en) | Intelligent authentication method and system based on close range wireless communication handset | |
CN108173822A (en) | Intelligent door lock management-control method, intelligent door lock and computer readable storage medium | |
CN101521886A (en) | Method and device for authenticating terminal and telecommunication smart card | |
CN100385983C (en) | Key setting method | |
CN101026834A (en) | Locking method and unlocking method | |
US20090260088A1 (en) | System and Method for Data Destruction | |
CN1489329A (en) | Terminal locking system comprising key device and termianl-associated device | |
CN107113613B (en) | Server, mobile terminal, network real-name authentication system and method | |
CN100459786C (en) | Method and system for controlling resources via a mobile terminal, related network and its computer program product | |
CN1713756A (en) | Security guarantee for memory data information of mobile terminal | |
WO2011003304A1 (en) | Phone-card locking method and device for wireless communication | |
US8041340B2 (en) | Personal information protecting method and mobile terminal | |
CN1684411A (en) | Method for verifying user's legitimate of mobile terminal | |
CN101656966A (en) | Data protection method of mobile terminal, device thereof and mobile terminal | |
CN100484292C (en) | Method, system and base station for locking illegal copied mobile terminal | |
CN100362880C (en) | Identification method of mobile terminal user legalness | |
CN106101438A (en) | A kind of cellphone information protection lock | |
CN1717100A (en) | Legality identification method of mobile terminal user and its mobile terminal | |
CN105631351A (en) | Mobile terminal self-destroying method and apparatus as well as mobile terminal | |
US8041391B2 (en) | Mobile communication terminal and terminal control method | |
CN104917737A (en) | User account protection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CX01 | Expiry of patent term |
Granted publication date: 20090107 |
|
CX01 | Expiry of patent term |