CN1956568A - Method for ending service unlock model - Google Patents

Method for ending service unlock model Download PDF

Info

Publication number
CN1956568A
CN1956568A CNA2005101160206A CN200510116020A CN1956568A CN 1956568 A CN1956568 A CN 1956568A CN A2005101160206 A CNA2005101160206 A CN A2005101160206A CN 200510116020 A CN200510116020 A CN 200510116020A CN 1956568 A CN1956568 A CN 1956568A
Authority
CN
China
Prior art keywords
service provider
limited service
equipment
sign indicating
limited
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2005101160206A
Other languages
Chinese (zh)
Other versions
CN100525522C (en
Inventor
陈金岳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Motorola Mobility LLC
Google Technology Holdings LLC
Original Assignee
Motorola Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc filed Critical Motorola Inc
Priority to CNB2005101160206A priority Critical patent/CN100525522C/en
Priority to PCT/US2006/039422 priority patent/WO2007050272A2/en
Publication of CN1956568A publication Critical patent/CN1956568A/en
Application granted granted Critical
Publication of CN100525522C publication Critical patent/CN100525522C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Abstract

This invention provides a method for operating radio communication devices, in which, a limited service provider mode is activated first and the communication against the devices is limited to preset service provider in said mode, the activation time of the preset data and limited service provider mode is used to generate a beginning limited service provider code and the end limited service provider code is generated by the stop time of preset data and the limited service provider mode and the mode is stopped when ending the code corresponding to the start code.

Description

Finish service provider's subsidy lock
Technical field
The present invention relates to limit the field that service is provided to concrete service provider's electronic equipment; Relate in particular to restriction and provide the field of service, but be not limited to the wireless connections service provider to the wireless connections service provider's of the initial cost of subsidy electronic equipment electronic equipment.
Background technology
In wireless portable, for example be used for the cell phone of global system for mobile communications (" GSM "), subscriber identification module (" SIM ") card is used to store the various information about the user.At large, thus the user supposes that by SIM card being inserted the cell phone that cell phone can use any compatibility the user can use SIM card.If the user fails in the given time, or in predetermined number of attempts, import for example correct access code of password, or when he and service provider's contract expired, this user can be blocked the use SIM card.When the user was blocked, SIM card allowed the user only to carry out urgent call.After the predetermined Blackout period expires, can allow the user to re-enter password, and when successfully entering password, phone is in normal manipulation mode.
In cordless communication network, subsidize designated period and the subsidy side Internet Service Provider that the user defines at large and reached an agreement in contract.What be used for cordless communication network is characterised in that the user's particular module (for example SIM card) with subsidy lock or limited service provider pattern by the subsidy wireless portable, and it prevents to carry out in the network of user outside subsidy side Internet Service Provider voice or data call or transmission Short Message Service (" SMS ") message.At at non-subsidy side network or can use the user of wireless portable after contract is expired, the access code that the user must import subsidy side Internet Service Provider to be provided visits SIM card.Otherwise, only allow the user to carry out urgent call.Usually provide access code by audio call at service centre.Yet, in some cases, need come release and/or update service contract being taken service centre, to avoid the open access code of the side of subsidy Internet Service Provider by the subsidy wireless portable.These schemes are to user's inconvenience.
The automated process of release portable radio also is known when Internet Service Provider's subsidy phase finishes.For example, the access code of unlocker device can for example send to portable communication device or phone by the SMS service by service provider's wireless network.Yet access code may be by the intercepting of other each side on the Radio Link, and is used for the release subsidy phase and does not also have overdue other phone.Therefore, this method does not guarantee service provider's interests.
Summary of the invention
Briefly, in one aspect, the invention provides the method that in portable or Wireless Telecom Equipment, activates and stop limited service provider pattern.Limited service provider pattern can arrive single service provider with the communication restriction with equipment, has for example subsidized the wireless connections service provider of the expense of communication equipment.Can respond and to accept SIM card for example being included in or be inserted into equipment and activate this pattern corresponding to the tentation data on other line module of service provider.Common equipment for only accepting line module-limited service provider pattern from the side of subsidy service provider, for example passes through the service provider's password or the code of the corresponding password match on storage safely and the line module with programmed.Similarly, equipment also generally includes the safe storage access code that is used to stop limited service provider pattern.
From line module and/or communications device retrieves tentation data, for example retrieve IMSI and IMEI number respectively; This uses to produce beginning limited service provider sign indicating number with limited service provider mode activation time.Beginning or activationary time can be the time that produces code, and can be corresponding to the beginning of for example subsidizing the phase.Storage beginning limited service provider's sign indicating number is so that compare later on.When equipment produces the end limited service provider sign indicating number of coupling, stop limited service provider pattern, and mobile device can use then other service provider to communicate.Use identical tentation data, but can stop corresponding to the overdue limited service provider pattern of above-mentioned subsidy phase or the concluding time produces limited service provider sign indicating number.The limited service provider pattern concluding time is corresponding to the time that produce to finish limited service provider sign indicating number, and periodically " trials ", or only triggering trial after the end of subsidy phase.
By on communication equipment, using tentation data and timing information to produce code, can be after the predetermined period of for example subsidizing the phase automatic unlocking limited service provider pattern of subsidy lock for example, need not the service provider and send visit to equipment, stop or unlocking code by non-safety wireless network.Similarly, the user of equipment is without any need for operation, and for example call network provider or equipment taken service centre makes unlocking function simpler.
In one embodiment, begin to produce beginning and finish limited service provider sign indicating number with being provided in by encryption function being applied to tentation data with end identical pseudo random number of limited service provider's time.This time-based pseudorandom number generator that has the Cycle Length that equals the phase of subsidizing by use is realized.In other words, repeat pseudo-random number sequence in cycle,, and repeat beginning at end limited service provider's time place corresponding to the end of subsidy phase therefore in the place's beginning of beginning limited service provider's time in each.Alternatively, the subsidy phase can be the multiple of Cycle Length, and equipment can be programmed to when the subsidy phase finishes or produce after the cycle in the pseudo random number of predetermined quantity finish limited service provider sign indicating number in this case.
Provide the safety method of implementing the subsidy phase with tentation data to the encryption of time-based pseudo random number, made barbaric user be difficult to attempt too early unlocker device.
In possibility, can use simple time and date signal, make that time and date will be repeated after the subsidy phase in 1 year for example.Sort signal also can depend on the code of the two with ciphering user data with generation.
In one embodiment, tentation data comprises the user data from the line module of SIM or similar type, and it can comprise user or user's particular data, for example international mobile subscriber ID (IMSI) and specific to the data of network provider.Tentation data also can or comprise device specific data alternatively, for example International Mobile Equipment Identity number (IMEI).
In one embodiment, being used to begin the timing information of limited service provider time and end limited service provider's time is derived by the wireless network signal relevant with service provider's wireless network.These can be included in based on NTP (Network Time Protocol) (NTP) in the network of GSM or code division multiple access (CDMA) or global positioning system (GPS) time signal.By using based on network timing, guarantee that unlock method uses more accurate timing information with synchronizer.
Limited service provider pattern is limited to the particular user identity module (for example, SIM card) relevant with subsidy side's network with the use of equipment usually, yet equipment can be limited to the use of any SIM card relevant with the side's of subsidy network.This is usually by realizing in the safe storage that network and/or SIM card identifier is pre-programmed into equipment before user's delivery apparatus.
In another aspect of this invention, provide a kind of electronic equipment and/or when on suitable processor, carrying out, be used to realize the computer program of method described herein.
Description of drawings
For the present invention can be understood and produce actual effect easily, with reference now to the graphic exemplary embodiment of reference accompanying drawing, identical or functionally similar unit in all independent view of wherein similar Reference numeral indication.The part of specification incorporated and constitutes into by accompanying drawing with following detailed, and is used for further illustrated embodiment and illustrates various based on principle of the present invention and benefit, wherein:
Fig. 1 is the module diagram of the circuit of diagram electronic equipment according to the present invention;
Fig. 2 is the module diagram of the limited wireless connections service provider's of diagram the use according to the present invention;
Fig. 3 is the flow chart of the method for diagram operating electronic equipment according to the present invention; And
Fig. 4 is the flow chart that diagram activated and stopped the specific embodiment of limited (wireless connections) service provider pattern according to the present invention.
It will be appreciated by those skilled in the art that unit among the figure for simple and clear and, and there is no need to draw in proportion by diagram.For example, the size of some unit is exaggerated to improve the understanding to embodiments of the invention with respect to other unit among the figure.
Embodiment
Before describing in detail according to embodiments of the invention, should observe, embodiment mainly is to relate to the activation of the limited service provider pattern in the electronic equipment and the combination of method step that stops and equipment unit.Correspondingly, equipment unit and method step are shown in the drawings in suitable place by ordinary symbol, those specific detail relevant with understanding embodiments of the invention wherein only are shown, are covered by the conspicuous details of those of ordinary skills that benefits because of the explanation here in order to avoid hide disclosure.
In this document, for example first and second, the relational terms of top and bottom or the like can by merely in order to distinguish an entity or the action and another entity or action, and needn't require or hint any reality this relation or the order be present in this entity or the action between.Term " comprises " or its any other variation is intended to cover comprising of non-exclusionism, the feasible process that comprises one group of key element, method, product, equipment or device not only comprise those key elements, and can comprise other key element of aspect character express, not listing or these processes, method, product or device intrinsic key element.Need not more multiple constraint, with " comprising ... " for leading key element is not precluded within the process that comprises this key element, method, the existence of other identical element in product or the device.
Be to be understood that, embodiments of the invention described herein can be by one or more conventional processor, combine with some non-processor circuit to realize that the peculiar stored program instruction of the activation of the limited service provider pattern in great majority or all electronic equipments described herein and the function that stops to constitute with one or more processor of control.Non-processor circuit can be including but not limited to wireless receiver, radio transmitters, signal driver, clock circuit, power circuit, and user input device.Similarly, these functions can be interpreted as the activation of the limited service provider pattern in the electronic equipment and the method step that stops.Alternatively, some or all of functions can be realized by the state machine that does not have stored program instruction, or realize that in one or more application-specific integrated circuit (ASIC) (ASIC) wherein some combinations of each function or some specific function are implemented as customized logic.Certainly, can use the combination of two schemes.Thereby, the method and apparatus that is used for these functions has here been described.In addition, can estimate, the guidance of disclosed here design of those of ordinary skill in the art and principle can easily produce this software instruction and program with minimum experiment down, and IC, although at for example up duration, can inspire possible remarkable achievement and many design alternatives under the condition of current techniques and economic consideration.
With reference to figure 1, the schematic diagram of diagram electronic equipment 100 wherein is provided, it typically is Wireless Telecom Equipment with mobile radio station or mobile phone form, comprise being connected so that the radio frequency communications unit 102 that communicates with processor 103.Electronic equipment 100 also has display screen 105.Also have alarm module 115, it comprises alarm speaker usually, oscillator motor and associated drive.Display screen 105 and alarm module 115 are connected so that communicate with processor 103.
Processor 103 comprises the encoder/decoder 111 with relevant read-only memory (ROM) 112, and this read-only memory (ROM) 112 storages are used for being sent or the voice of reception or the data that other signal carries out Code And Decode by electronic equipment 100.Processor 103 also comprises by common data and address bus 117 and is connected to encoder/decoder 111, character read-only memory (ROM) 114, random access storage device (RAM) 104, the microprocessor 113 of static programmable memory 116 and removable subscriber identity module (RUIM) interface 118.The static programmable memory 116 and the RUIM card 119 (generally being called subscriber identity module (SIM) card) that are connected to RUIM interface 118 in operation all can be stored optimum roaming list (PRL) except that other, user authentication data, the selected text message of importing into is with the telephone number database (TND telephone directory) of the name field that comprises the identifier that the numeric field that is used for telephone number is relevant with being used for one of number with name field.RUIM card 119 and static memory 116 also can be stored the password that is used to allow on the mobile phone 100 accessibility of the function that is subjected to password protection.
Microprocessor 113 has the port that is used to be connected to display screen 105 and alarm module 115.And microprocessor 113 has and is used to be connected to and the integrated microphone 135 of equipment and the port of communications speaker 140.
Character read-only memory 114 storage is used to decode or the code of the text message that code communication unit 102 can receive.In this embodiment, operation code (OC) that character read-only memory 114, RUIM card 119 and static memory 116 also can storage microprocessors 113 and the code that is used to carry out the function relevant with mobile phone 100.
Radio frequency communications unit 102 is combined reception device and the transmitters with community antenna 107.Communication unit 102 has the transceiver 108 that is connected to antenna 107 by radio frequency amplifier 109.Transceiver 108 also is connected to the combined modulator/demodulator 110 that communication unit 102 is connected to processor 103.
Fig. 2 shows wireless communication system, and wherein any wireless network services provider provides the wireless connections service to electronic equipment.Mobile phone for example, wireless PDA, the radio-based electronic devices 200 of kneetop computer or other mobile electronic device uses and comprises that the wireless air interface 280 of the wireless signal of operating based on known predetermined protocol is connected to wireless service provider 250A.Also show optional wireless service provider 250B, and wireless device 200 can have the ability that is wirelessly connected to some this service providers 250.
In order to make radio-based electronic devices 200 can be connected to service provider 250A or 250B, the service provider needs to discern electronic equipment 200 and belongs to the reservation client, so that the use of service is paid.This uses subscriber identity module (SIM) card 260 usually, or more generally is called the similar subscriber identity module of international mobile subscriber identity (IMSI) card; Comprising cdma network RIUM card for example of equal value realizes.These cards 260 can be bought respectively with electronic equipment 200, and can be inserted in the wireless device 200 by the user of equipment.IMSI card 260 comprises the buyer and the service provider's 250 of unique identification card data.This usually use tentation data or for example international mobile subscriber identity (IMSI) number, the service provider user identifier that can carry out cross-index with other personal data about user's for example its name and address and note expense particulars realize.
Line module 260 also comprises the relevant service provider's 250 of sign and module 260 identifier usually; System banner code (SID) for example.Line module 260 comprises also usually that corresponding with service provider 250 is also known and is used for the safe key of the communication of encryption and decryption between them by both.
But for the continuation development of encouraging new mobile phone technology and therefore to the demand of chargeable service, service provider 250 is the true expenses of subsidy electronic equipments 200 usually, only use subsidy side service provider 250A in the hope of the user in for example subsidy phase in 2 years.In order to implement these restrictions to only communicating with subsidy side service provider 250A rather than optional wireless service provider 250B, mobile phone and other radio-based electronic devices 200 can be set up or lock, and make radio communication only may carry out with subsidy side service provider 250A.This can require to realize from reservation service provider password (GID) SIM card, that have only subsidy side's service provider's SIM card to carry before the permission radio communication by pre-programmed electronic equipment 200 so that except urgent call.In fact this mean that equipment or phone 200 are locked into the 250A of special services provider, or even specific SIM card 260A, therefore must under limited service provider pattern, work.
Need separate lock password or access code so that eliminate, therefore allow another service provider's of visit SIM card 260B or wireless service 250B mating the needs of service provider's password (GID).The access code of indication above Here it is, wherein the user must ask this access code to the service provider usually, but this access code is provided with unlocker device automatically or is stopped limited service provider pattern in this embodiment.As discussed, if there is not access code, equipment or phone only allow to carry out urgent call, unless use specific SIM card or SIM card from the 250A of special services provider.Can be according to the data that are stored on the card, for example unique system banner code (SID) of provider is determined and the relevant service provider of specific IMSI card.In case imported suitable access code, mobile phone or wireless device 200 stop limited service provider pattern, and permission and any SIM card 260B are mutual.
Use limited service provider lock function 270 to realize the limited service provider pattern that mobile device 200 wherein only can be communicated by letter with (subsidy side) service provider 250A, this function can be implemented as and is pre-programmed into mobile phone 200 for example and by the software of its execution.This can only check service provider's particular password (GID) and the password match that is stored in safely on the equipment on the SIM card before the calling that allows outside the urgent call.Limited service provider lock function 270 prevents mobile phone 200 and mutual between the SIM card 260B of non-subsidy side network or service provider 250B, and only allows to carry out alternately with the SIM card 260A relevant with subsidy side service provider 260A.One of skill in the art will appreciate that the operation of this class service provider lock or limited service provider mode capabilities 270.Common setting safe in utilization, sign or position, for example the activation of limited service provider pattern or lock is realized in the mobile personal position in the electronic equipment 200; It guarantees phone or the equipment suitable GID of inspection before permission use SIM card is carried out radio communication.Can be by correct access code be provided, promptly with pre-programmed and the access code that is stored in the access code coupling on the equipment safely this sign that resets.
Embodiment provides optional mode input reference sign indicating number stopping limited service provider pattern, and after the subsidy period of service expires, and uses automatic locking to forbid or limited service provider pattern hold function 290 stops limited service provider pattern (270) automatically.This can be by providing access code on the equipment that is stored in safely 200 to restriction service lock 270 parts of equipment 200 when the period of service finishes, or possible line module 260 is realized.By the lock access code that provides of prohibiting function 290 and the safe storage that can be preprogrammed into equipment by the access code that phone or equipment 200 are used for mating.As known, this is only can be by the memory area of the software module visit of authorizing.
The definite of the end in subsidy phase and limited service provider pattern or cycle realizes by watchdog timer 295 or clock signal.Thereby when the end of the subsidy period of service that timer 2 95 is measured, lock disabled module 290 stops limited service provider pattern or locks 270, thereby allows electronic equipment 200 mutual with other SIM card 260B and other service provider 250B.Lock disabled module 290 and limited service provider pattern or lock 270 common can realizations in the fail-safe software in being pre-programmed into equipment 200.
The electronic equipment 200 that Fig. 3 shows operational example such as mobile phone is to realize lock disabled module 290 and limited service provider pattern or to lock the flow chart of the method for 270 function.After device power-up, method (300) etc. is inserted into SIM card or another scheduled event (305), and responds this incident activation limited service provider's pattern (310).In limited service provider pattern, equipment 200 can be only with from the SIM card of subsidy side network or limited service provider alternately or use it.Therefore, the communication at equipment 200 is limited to this reservation service provider.By the SID number of inquiry SIM card, and/or correct by checking service provider's password (GID), can discern SIM card or other IMSI card corresponding to reservation service provider.
Then, method (300) slave unit self obtains the tentation data of IMEI for example and from IMSI number of SIM card (315).Also write down the limited service provider mode activation time, for example use local clock.Alternatively, can respond the activation of limited service provider pattern and timer is set.Then method (300) uses tentation data to produce beginning limited service provider's sign indicating number and limited service provider mode activation time (320).Can directly or indirectly use the limited service provider mode activation time for example as input at as described in greater detail time-based pseudorandom number generator.Can use and be applied to tentation data and produce code based on the encryption or the scrambler function of the parameter of limited service provider mode activation time.
Afterwards, method (300) then obtains for example identical tentation data of the combination of IMSI and IMEI number, and limited service provider pattern dwell time (325).This based on the parameter of limited service provider pattern dwell time corresponding to limited service provider pattern dwell time parameter, and can be the direct time that clock or timer expire and derive on the plate of for example slave unit, or it can be the time-based pseudo random number that depends on limited service provider pattern dwell time.This method can be periodically, or only carry out this step (325) when the end in the cycle of reservation, and if successfully do not stop limited service provider pattern at first, can repeatedly carry out after this.
This method then produces and finishes limited service provider's sign indicating number (330).Use identical tentation data but different time-based parameters, with realizing this purpose with the same method of beginning limited service provider's sign indicating number.When the subsidy phase expires, be arranged to identical based on the parameter of limited service provider pattern dwell time with time-based parameter corresponding to the limited service provider mode activation time.This can use the time-based pseudorandom number generator in cycle that has corresponding to duration of subsidy phase to realize.
Then relatively newer end limited service provider sign indicating number that produces and the beginning limited service provider sign indicating number of being stored (335).If two codes do not match (335N), then method turns back to the step (325) that obtains another limited service provider pattern end or dwell time.Alternatively, method can be reminded the customer contact side of subsidy service provider's support team simply.Yet if two code matches (335Y), limited service provider pattern is stopped (340), and equipment 200 can use other service provider to carry out radio communication.Can realize stopping of limited service provider pattern to the limited service provider locked software module 270 of equipment by the access code that has safely storage is provided; Wherein under the situation of self access code of this module of coupling, cause individualized position of its reset movement or similar means so that unlocker device 200.
Fig. 4 illustrates another embodiment that uses the limited service provider pattern in time-based pseudorandom number generator unlock communication equipment or the arrestment.Method 400 receive in the GSM network for example NTP (NTP (Network Time Protocol)) signal or based on the network timing signal 405 of the GPS timing signal in the network of CDMA.These networks or full time signal are used to local timer or clock 410 and the network time on the synchronizer.Local timer function 410 imports clock signal into to response and produces serial pseudo random number (Kc1, time-based pseudorandom number generator function (PRNG) 415 Kc2) provides clock or time signal.PRNG 415 can be set after clock signal of giving determined number or input, to repeat pseudo-random number sequence.Therefore, by learn that the clock that receives is imported or the quantity of timer signal on designated period, PRNG 415 repeats pseudo random number (PRN) sequence after can being provided in predetermined period.In an embodiment, use service or subsidy phase 420 that PRNG 415 is set, and it is corresponding to subsidy phase (for example 2 years), wireless network or service provider subsidize the expense of equipment on this subsidy phase.In this cycle, the service provider expects that the user of equipment only uses this service provider to carry out radio communication.
Those skilled in the art can be familiar with configurable time-based pseudorandom number generator 415, it can pass through software, firmware or hardware (for example using register and simple logic) are realized, wherein seed are provided for pseudorandom number generator 415 by each predetermined limited service provider mode activation and limited service provider pattern dwell time.
Equipment 200 comprises the pre-programmed lock of one or more type usually, for example prevents to make on another network telephonic network or service provider lock, prevents that phone from using the SIM lock of another SIM card, or requires special password to come the code lock of release phone.Embodiment can use together with any or all this class lock, yet simple for what explain, only describes the reset code lock.The reset code lock also has the effect that stops any SIM or service provider's lock usually.
When the user when the new GSM equipment based on embodiment inserts new SIM card 425, equipment reads tentation data, is from the IMSI of SIM or other subscriber card with from the IMEI or the ESN (electronic serial number) 430 of equipment in this embodiment.As mentioned above, equipment also can be checked SIM card GID before allowing to use the SIM that inserts.This is limited to the service provider relevant with SIM card with the use of equipment effectively, or in other words, activates limited service provider pattern.For IMEI and IMSI, method was also used corresponding to the time of inserting SIM card or producing code, and promptly the time-based pseudo random number Kc1 of limited service provider activationary time produces safe key or the beginning limited service sign indicating number Kd1 of provider 435.In order to produce key, encrypt tentation data and pseudo random number Kc1 to produce initial safe key or the beginning limited service sign indicating number Kd1 of provider based on predetermined encryption function.Thereby safety or locking key K d1 depend on the time of for the first time proper use equipment or phone 200, and this is defined by the beginning or the beginning limited service provider mode time in the cycle of subscribing.
Then, safe key or the beginning limited service sign indicating number Kd1 of provider store 440 in the safe storage of equipment or phone, and phone and be allowed to or enable 445 corresponding to the radio communication between the service provider of the SIM that is inserted.Yet if be inserted into from another operator or service provider's SIM card, GID can not mate the GID of phone, and therefore only allows urgent call.Thereby; phone or equipment 200 enter limited service provider pattern 445; wherein only allow to carry out normal or unconfined radio communication-, and thereby be the service provider of the expense of subsidy phone 200 corresponding to the service provider 250A of SIM card with a service provider.
Accumulative total (count up) the timer trigger function 450 that prevents that any other activity relevant with method 400 from finishing up to subsidy or the period of service can be provided.This prevents further to be that each pseudo random number that is produced produces safe key, because this is a consuming cells, and amount of calculation is very big.In case the subsidy phase finishes, accumulativa timer and trigger step 450 allow to move to next method step.The quantity of the pseudo random number that this trigger function 450 can be simply provides by counting PRNG 415 realizes.Then slave unit or phone and SIM card are retrieved current IMEI and IMSI 455 to method 400 respectively.The tentation data that if new SIM card has been inserted or this tentation data is different from collection when inserting first SIM card (430) for other reasons, then the safe key of Chan Shenging or end limited service provider's sign indicating number (Kd2) can be different from safe key or the beginning limited service provider's sign indicating number of being stored (Kd1); And equipment can not be unlocked-and limited service provider pattern can not be stopped.
Then, use tentation data (455), with the identical encryption function of encryption function that in first key or beginning limited service provider pattern dwell time parameter generating step 435, uses, and, produce second safe key or finish the limited service sign indicating number Kd2 of provider from current pseudo random number or the pattern dwell time parameter K c2 of limited service provider of PRNG 415.PRNG 415 is used to repeat its number sequence row when the period of service finishes, and the pseudo random number Kc1 (corresponding to the limited service provider mode activation time) that the pseudo random number Kc2 (corresponding to limited service provider pattern dwell time) that is therefore provided should provide with the generation for first safe key or the beginning limited service sign indicating number Kd1 of provider is identical.Alternatively, so method to set up makes one of following pseudo random number identical with Kc1, so that the equipment that guarantees is ready to receive Kc2, and " does not miss it " because of for example hindering some software faults of collecting IMSI or IMEI number.In another optional mode, it is shorter that the period of service that enters (420) can be subsidized the phase than reality, makes sequence repeatedly circulation before the cumulative time, trigger was activated of pseudo random number.Thereby, to miss in method under the situation of the suitable sign indicating number Kc2 of end limited service provider, it can be just in pseudo random number (Kc1 and the Kc2) short period before of using limited service provider's mode activation and dwell time coupling.
In case safe key produces step 460 and carries out, the key K d2 (finishing limited service provider sign indicating number) that produced and the safe key Kd1 that is stored (beginning limited service provider sign indicating number) that produces when the beginning of subsidy phase are compared.If two key K d1 and Kd2 do not match (465N), then phone or equipment keep locking 470.Then, this can cause circulation to turn back to safe key or finish limited service provider sign indicating number producing step (460), to attempt next PRN.If two key K d1 and Kd2 coupling (465Y), then method reads the access code 475 that is stored in safely on the equipment.Corresponding access code also can be stored on the SIM card safely, and if like this, this also reads (475) by method.
The access code that the method for supposition provides is matched with the access code of storage in the limited service provider locking of the pre-programmed of equipment 200 or mode section 270, then device reset provides for all mobile phones, and is the mobile personal position 480 of the setting of enabled services provider locking.
Use this release of the limited service provider pattern that the mobile personal position is provided with or stop to allow to carry out unconfined radio communication, for example by inserting corresponding SIM card with other service provider.Person of skill in the art will appreciate that, can use other mechanism that is used to stop limited service provider pattern alternatively.
Can understand from above-mentioned, in one embodiment, by encryption function being applied to the pseudo random number that tentation data and each limited service provider mode activation of freely being scheduled to and limited service provider pattern dwell time provide the pseudorandom number generator of seed, processor 103 is used to produce beginning limited service provider and finishes limited service provider sign indicating number.Using pseudo random number to produce safe key or beginning and end limited service provider sign indicating number is that section (subsidy phase) is limited to the use of equipment single service provider's simple and safe mode at the fixed time; And permission equipment then need not transmit security code by non-safe air interface by automatic unlocking, or bothers the user.In addition, not every operation commercial city has this OTA function.
One skilled in the art will realize that, the said equipment and method for example can be embodied as bearing medium (disk for example, CD-ROM or DVD-ROM), programmable memory (for example read-only memory (firmware)) for example, or the processor control routine on the carrier (for example optics or electrical signal carrier) for example.For many application, embodiments of the invention can be at DSP (digital signal processor), and ASIC (application-specific integrated circuit (ASIC)) or FPGA (field programmable gate array) go up and realize.Thereby described code can comprise conventional program code or microcode, or for example is used to be provided with or control the code of ASIC or FPGA.Described code also can comprise and is used for for example code of the reconfigurable equipment of Reprogrammable logic gate array of dynamic-configuration.Similarly, code can comprise for example code of the hardware description language of VHDL (Very High Speed Integrated Circuit (VHSIC) hardware description language).Skilled person in the art will appreciate that code can distribute between a plurality of links that communicate with one another.If suitably, use at the scene can (again) programmable analogue array or similar device on operation so that the code of configure also can be realized described embodiment.
In above-mentioned specification, specific embodiment of the present invention has been described.Yet those of ordinary skill in the art will appreciate that, can carry out various modifications and variation under the prerequisite of the scope of the present invention that claim limits below not departing from.Therefore, specification and accompanying drawing will be regarded as diagrammatic, rather than restrictive, and all this modifications should be within the scope of the present invention involved.Benefit, advantage, issue-resolution and may cause any benefit, advantage or solution are expected or the more conspicuous any key element that becomes all should not be interpreted as the key of any or all claim, required or essential feature or key element.The present invention is limited by the claims that are included in any modification of carrying out during this application pending trial and all equivalents of these claims merely.

Claims (11)

1. the method for an operate wireless communication equipment, this method comprises:
Activate limited service provider pattern, the communication at equipment in this pattern is limited to reservation service provider, and uses tentation data and limited service provider mode activation time to produce beginning limited service provider sign indicating number;
Use this tentation data and limited service provider pattern dwell time to produce and finish limited service provider sign indicating number; And
Response stops limited service provider pattern corresponding to end limited service provider's sign indicating number of beginning limited service provider sign indicating number.
2. the method for operate wireless communication equipment as claimed in claim 1, wherein, produce beginning limited service provider and finish limited service provider sign indicating number by encrypting or the scrambler function is applied to tentation data and provides the pseudo random number of seed by each limited service provider mode activation and limited service provider pattern dwell time.
3. the method for operate wireless communication equipment as claimed in claim 1 is wherein according to determining limited service provider mode activation and dwell time with the synchronous equipment clock of external wireless communication network clocking.
4. the method for operate wireless communication equipment as claimed in claim 1, wherein tentation data comprises device identifier and equipment user's identifier.
5. the method for operate wireless communication equipment as claimed in claim 1 wherein produces the step that finishes limited service provider sign indicating number and is delayed, up to the predetermined reservation end cycle that begins the mode activation time in limited service provider.
6. a carrying is used to carry out the mounting medium of the processor code of the method for claim 1 when carrying out on processor.
7. electronic equipment comprises:
Radio communication circuit is used for communicating by letter with wireless service provider;
Be used to activate limited service provider pattern, communication at equipment in this pattern is limited to reservation service provider, and is used to use tentation data and limited service provider mode activation time to produce the processor and the memory of beginning limited service provider sign indicating number; And
This processor and memory are further used for using tentation data and limited service provider pattern dwell time to produce end limited service provider sign indicating number, and response stops limited service provider pattern corresponding to end limited service provider's sign indicating number of beginning limited service provider sign indicating number.
8. electronic equipment as claimed in claim 7, also comprise time-based pseudorandom number generator, and wherein processor is used to by encryption function being applied to the pseudo random number that tentation data and each limited service provider mode activation of freely being scheduled to and limited service provider pattern dwell time provide the pseudorandom number generator of seed, produces beginning limited service provider and finishes limited service provider sign indicating number.
9. electronic equipment as claimed in claim 7 also comprises equipment clock, is used to produce limited service provider mode activation and dwell time, and this equipment clock is used for and external wireless communication network timing signal Synchronization.
10. electronic equipment as claimed in claim 7, wherein equipment also is used to accept to comprise the subscriber card of at least a portion tentation data.
11. Wireless Telecom Equipment as claimed in claim 7, wherein processor also is used to realize the accumulativa timer trigger function, the accumulativa timer trigger function is used to prevent that processor and memory from producing end limited service provider sign indicating number, up to the predetermined reservation end cycle that begins the mode activation time in limited service provider.
CNB2005101160206A 2005-10-25 2005-10-25 Method for ending service unlock model Active CN100525522C (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNB2005101160206A CN100525522C (en) 2005-10-25 2005-10-25 Method for ending service unlock model
PCT/US2006/039422 WO2007050272A2 (en) 2005-10-25 2006-10-06 Ending a service provider subsidy lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005101160206A CN100525522C (en) 2005-10-25 2005-10-25 Method for ending service unlock model

Publications (2)

Publication Number Publication Date
CN1956568A true CN1956568A (en) 2007-05-02
CN100525522C CN100525522C (en) 2009-08-05

Family

ID=37968325

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005101160206A Active CN100525522C (en) 2005-10-25 2005-10-25 Method for ending service unlock model

Country Status (2)

Country Link
CN (1) CN100525522C (en)
WO (1) WO2007050272A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103493526A (en) * 2010-12-22 2014-01-01 沃达方Ip许可有限公司 Sim locking

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2368382B1 (en) 2008-12-24 2013-07-10 ST-Ericsson SA Locking of communication device
EP2965564A4 (en) * 2013-03-06 2016-10-19 Nokia Technologies Oy Method and apparatus for controlling a device
CN108093392B (en) * 2017-12-06 2020-05-08 Tcl移动通信科技(宁波)有限公司 Method for unlocking SIM card, mobile terminal and storage medium
US10993107B2 (en) 2019-03-01 2021-04-27 At&T Intellectual Property I, L.P. Multi-factor autonomous SIM lock
GB202013645D0 (en) 2020-08-31 2020-10-14 Innotesto Bvba Pharmacetical compositions for the nasal administration of a colbalamin compound

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3676807B2 (en) * 1994-04-07 2005-07-27 ノキア コーポレイション Mobile radio terminal detachable subscriber identification module and call control method
SE506584C2 (en) * 1996-05-13 1998-01-19 Ericsson Telefon Ab L M Method and apparatus for monitoring mobile communication device
US20020004910A1 (en) * 2000-07-10 2002-01-10 Penzias Arno A. Network lock
FR2853194B1 (en) * 2003-03-26 2005-08-19 Cit Alcatel METHOD FOR UNLOCKING A PORTABLE PHONE TELEPHONE TYPE WIRELESS TELECOMMUNICATION TERMINAL
TW595195B (en) * 2003-04-04 2004-06-21 Benq Corp Network lock method and related apparatus by ciphered network lock and inerasable deciphering key

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103493526A (en) * 2010-12-22 2014-01-01 沃达方Ip许可有限公司 Sim locking
CN103493526B (en) * 2010-12-22 2017-07-18 沃达方Ip许可有限公司 SIM is locked

Also Published As

Publication number Publication date
CN100525522C (en) 2009-08-05
WO2007050272A2 (en) 2007-05-03
WO2007050272A3 (en) 2007-08-30

Similar Documents

Publication Publication Date Title
CN105451212B (en) Portable movable is subscribed to
US11025611B2 (en) Method and apparatus of constructing secure infra-structure for using embedded universal integrated circuit card
US9779564B2 (en) Device and method for controlling an access authorisation and/or driving authorisation for a vehicle
EP2076071B1 (en) Method for transferring provisioning data
US20070129057A1 (en) Service provider subsidy lock
US9007174B2 (en) Service identification authentication
EP3466021B1 (en) A method for managing the status of a connected device
US20130012159A1 (en) Mobile communications
CN100525522C (en) Method for ending service unlock model
US20140220971A1 (en) Change of Subscription Data In An Identification Module
EP2671398A1 (en) Subscriber identity module provisioning
EP2368382B1 (en) Locking of communication device
CN108418837B (en) Mobile data communication device, mobile communication system, storage medium, and method of operating mobile data communication device
CN101978675A (en) System and method for securely issuing subscription credentials to communication devices
CN102047629A (en) Method and apparatus for enabling machine to machine communication
CN101141718A (en) Mobile terminal card-locking method
CN102014387B (en) Wireless terminal and registration and authentication method thereof
US8918143B2 (en) Change of the subscription in an identification module
EP2665300A1 (en) Mobile terminal and network locking method therefor
CN107623907B (en) eSIM card network locking method, terminal and network locking authentication server
CN103959703A (en) Method and apparatus for managing user provided access tokens
JP2004128926A (en) System and program for managing communication and portable terminal device
US20120190340A1 (en) Method for binding secure device to a wireless phone
CN109088975B (en) Method and apparatus for changing mobile phone card
EP2477452A1 (en) Mediation platform, chip card, and method for generating authentication key

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: MOTOROLA MOBILE CO., LTD.

Free format text: FORMER OWNER: MOTOROLA INC.

Effective date: 20110105

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20110105

Address after: Illinois Instrunment

Patentee after: MOTOROLA MOBILITY, Inc.

Address before: Illinois Instrunment

Patentee before: Motorola, Inc.

C41 Transfer of patent application or patent right or utility model
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: Illinois State

Patentee after: MOTOROLA MOBILITY LLC

Address before: Illinois State

Patentee before: MOTOROLA MOBILITY, Inc.

CP02 Change in the address of a patent holder

Address after: Illinois State

Patentee after: MOTOROLA MOBILITY, Inc.

Address before: Illinois Instrunment

Patentee before: MOTOROLA MOBILITY, Inc.

TR01 Transfer of patent right

Effective date of registration: 20160612

Address after: California, USA

Patentee after: Google Technology Holdings LLC

Address before: Illinois State

Patentee before: MOTOROLA MOBILITY LLC