CN1960553A - System and method for preventing software and hardware with communication condition / function from being embezzled - Google Patents

System and method for preventing software and hardware with communication condition / function from being embezzled Download PDF

Info

Publication number
CN1960553A
CN1960553A CNA2006102010963A CN200610201096A CN1960553A CN 1960553 A CN1960553 A CN 1960553A CN A2006102010963 A CNA2006102010963 A CN A2006102010963A CN 200610201096 A CN200610201096 A CN 200610201096A CN 1960553 A CN1960553 A CN 1960553A
Authority
CN
China
Prior art keywords
request
information
terminal
mobile phone
management center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006102010963A
Other languages
Chinese (zh)
Other versions
CN100452908C (en
Inventor
乔超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CNA200510096358XA external-priority patent/CN1764106A/en
Application filed by Individual filed Critical Individual
Priority to CNB2006102010963A priority Critical patent/CN100452908C/en
Publication of CN1960553A publication Critical patent/CN1960553A/en
Application granted granted Critical
Publication of CN100452908C publication Critical patent/CN100452908C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The system thereof comprises: mobile phone terminal; management service center server; WEB server; the network between after-sales services client-side and the mobile terminal; and the network between after-sales service client-side, management center server and WEB server. Each mobile terminal has an ID number, and the basic information and registration information corresponding to each ID number are saved in the management service center server. The hardware of mobile terminal sends registration information to the management service center, and works after getting a returned confirmation command.

Description

A kind of stolen system and method for software and hardware that prevents communication condition/function
Technical field
The present invention relates to communication technical field, especially relate to the system and method that the SIM card of computer, the mobile phone of mobile phone that the software and hardware that prevents to have communication condition/function illegally used, e-commerce, connection the Internet, computer software that needs connect the Internet are illegally used.In addition, also relate to field to illegal user's track and localization of software and hardware with communication condition/function.
Background technology
Along with the development of economy, technology and the raising of living standards of the people, the user of personal communication devices, personal computer, all kinds of computer softwares increases rapidly, but the loss situation of personal communication devices's (particularly mobile phone, Personal Handyphone System), personal computer is also more and more serious.In addition, the piracy of software is also very rampant.Because developing rapidly of Internet, most computer all use the Internet to communicate by letter with extraneous, this just makes that also the computer that can utilize existing communication condition or function to prevent loss is illegally used, and can follow the tracks of illegal user.Also can be used for preventing software pirate usefulness.
The smuggling problem of personal computer and mobile communication equipment, the "parallel goods" that just is commonly called as, also grievous injury manufacturer and user's interests.At present there is not a kind of good technology can control the smuggling of these equipment yet.
A kind of equipment of making special SIM mobile phone card occurs on the market now, can make the SIM card of one-card multi-number.The appearance of this equipment may be used to eavesdropping, free call on somebody else's expense through illegal means or otherwise usurp unlawful activities such as mobile phone rate.Also there is not at present relevant resist technology.
The existing communication apparatus that prevents loss is stolen and method that give for change is all perfect not to the utmost.As application number is 00101440.4, provides a kind of online register method in the patent of invention of " mobile phone antitheft self-explosion and online registration alarming method " by name.This method and the present invention have similarity, but have fatal mistake in this method.The inventor writes " this program comprises a modifiable telephone number that is connected with database hub " in its claim 4 (a), since be a modifiable telephone number, thief or pick up the machine person is modified as a spacing with it so, this system is just as illusory.In its claim 4 (b), write " checking behind the each plug-in card of mobile phone whether this card number occurs for the first time, if occur for the first time, then behind search network, dials database hub automatically, registers ".At first mobile phone is in closed condition during plug-in card, can't check whether this card number occurs for the first time.Secondly, if there is not network, perhaps ended when dialing database hub, that will not registered to database hub, and database hub just can't be followed the tracks of and control this cell-phone number at this moment.And this invention is communicated by letter with database hub with the mode of calling, and is both expensive, dangerous again (discovered by the people easily and ended).In the claim 4 (e) of this invention, write " after database hub obtaining that the owner of lost property agrees and confirming owner of lost property's identity; download manufacturer's internal command; remove all information in mobile phone basic configuration program and the memory ", this way is difficult to operation, destroyed early, mobile phone is retrieved and can not have been used, evening data outflowed, and be a kind of serious potential safety hazard.
In addition, the antitheft mobile phone technology that also has must set in advance password or contact number, can't protect original mobile phone.Some anti-theft technique depends on the Equipment Serial Number that is kept in the terminal equipment, and this sequence number generally is revisable, in case sequence number is modified, then these anti-theft techniques are with ineffective.
Summary of the invention
(1) technical problem that will solve
For the personation that solves hardware device effectively with communication function, renovate, lose, trans-regional sale, problem such as smuggle and usurp; and has a problem of piracy of the software (particularly needing server that the software of service is provided) of communication condition; the interests of protection user and producer; the invention provides a kind of stolen system and method for software and hardware that prevents communication condition/function; by strengthening the after sale management of producer to its product, can false proof effectively, antitheft and anti-smuggling.
(2) technical scheme
The technical solution adopted for the present invention to solve the technical problems is:
A kind of stolen system of software and hardware that prevents communication condition/function, comprise mobile phone terminal, the SMS server, management center server and WEB server, wherein mobile phone terminal is by the GSM/CDMA net, the SMS server links to each other with management center server with the communication port that the INTERNET net constitutes, the WEB server links to each other with management center server by local area network (LAN), the WEB server provides the WEB service based on browser, be used for B/S mode manage central server mobile phone terminal information, management center server is judged its legitimacy by the continuity of checking mobile phone terminal registration and checking, the terminal request respond module is wherein arranged, endpoint registration/checking request respond module, terminal is reported the loss module, module is reported the loss in releasing, the terminal inquiry respond module, mobile phone terminal sale/operating position analysis module, and the essential information of preserving all mobile phone terminals that will protect respectively, the endpoint registration data message, the illegal log-on data information of terminal and report the loss the record data message and remove the terminal essential information data cell report the loss recording data information, the endpoint registration data cell, terminal illegal log-on data unit and report the loss the record data unit and the record data unit is reported the loss in releasing;
Add a legitimate verification module that is used to carry out the user validation checking in mobile phone terminal, this module has data submodule and registration and checking submodule, management center server order detection and processing sub, locking submodule.
Preferably, under the situation of specified otherwise not, the operated data of the subroutine module of legitimate verification module are the corresponding data in the data submodule; The legitimate verification module loads when mobile phone terminal starts automatically, and its flow process is: start a task manager, be management center server order detection and processing sub registration trigger event; Cycle detection is from the information of management center server; If detect information from management center server, then trigger management center server order detection and processing sub, call registration and checking submodule; Continue cycle detection.
Preferably, registration loads under specified requirements with the checking submodule, and its workflow is:
Aa) data in the reading of data submodule, and be translated into the form of appointment; If data were through encrypting, with its deciphering;
Ab) legitimacy, consistency and the integrality of data in the inspection data submodule; If legal, then carry out next step; Otherwise, start the locking submodule, withdraw from this submodule then;
Ac) according to specified rule, check and whether need registration and checking, if desired, then write register requirement and checking request, and send register requirement and checking request to management center server by the contact number of from the tabulation of management center server contact number, choosing; If do not need, then carry out Al);
Ad) value of current state information is set to be verified;
Ae) value of timer is set to 0;
Af) value with timer adds 1;
Ag) whether check timer greater than designated value, as greater than, then upgrade the abnormal condition information, start the locking submodule, carry out Am then); Otherwise, carry out next step;
Ah) the waiting event manager triggers management center server order detection and processing sub;
Ai) check whether current state information is to be verified, if then carry out next step; Otherwise carry out Al);
Aj) judge whether timer satisfies specified requirements,, retransmit registration/checking request if satisfy; Otherwise, carry out next step;
Ak) calling system function regularly, if reach the fixed time, execution in step Af then); Otherwise carry out Ak);
Al) value of inspection current state information if current state information is the value of locking class, then starts the locking submodule;
Am) withdraw from this submodule.
Preferably, described management center server order detection and processing sub are event-driven modules, call when mobile phone terminal is received the information of sending by communication network identical with the management center server command type; Its workflow is:
Ba) detect the information receive and whether derive from the communicating number that exists in the tabulation of management center server contact number, if not then withdrawing from this submodule, otherwise carry out next step;
Bb) by specified rule information is decrypted;
Bc) the order composition rule by appointment extracts corresponding data from information;
Bd) legitimacy of verification command does not withdraw from this submodule if conform to rule, otherwise carries out next step;
Be) carry out Bf);
Bf) according to command information that extracts and the tabulation of the command id in data submodule recognition command kind, carry out predetermined operation by the order kind.
Preferably, the workflow of endpoint registration/checking request respond module is:
Da) record sends the communicating number of this solicited message and the time of receiving this solicited message, and according to specified rule, extracts corresponding item of information from this solicited message; In the terminal essential information, search the essential information record of this mobile phone terminal according to mobile phone terminal ID number that extracts again,, then carry out Dc) if do not find corresponding record; Otherwise carry out Db);
Db) solicited message is carried out legitimate verification; Verify the legal Dd that then carries out); Do not conform to rule and carry out Dc);
Dc) carry out assigned operation;
Dd) upgrade current verification msg in the essential information record of this mobile phone terminal with the new verification msg that from solicited message, extracts;
De) upgrade the communicating number of the last use in this mobile phone terminal essential information record; Whether be register requirement, if then add an endpoint registration record, the corresponding information that registration extracts in the management center server database if detecting;
Df) according to preestablishing, judge whether the analysis request source, analyze if desired, then analyze the indicated country /region of communicating number that sends this solicited message, and whether the indicated country /region of designated sale area information is consistent in comparative analysis result and the terminal essential information; If consistent, then carry out Dg), otherwise, carry out assigned operation, as: according to corresponding specified rule modification current state information, to the management center server order of the communicating number transmission appointment that sends this log-on message, finish this then and call;
Dg) check the value of current state information in the essential information record of this mobile phone terminal, value according to current state information is upgraded it by specified rule, and write corresponding management center server order, the command id of this order is pressed the specified rule setting according to current state information, the corresponding data of current verification msg in this order for from this solicited message, extracting, if this order is to report the loss lock command, also should add in this order from owner of lost property's contact details of this mobile phone terminal being reported the loss for the last time the record; Send the management center server order that has write to the communicating number that sends this solicited message;
Dh) finishing this calls.
Preferably, the zone at the communicating number place that the terminal software and hardware is registered for the first time in the terminal software and hardware sale/operating position analysis module analysing terminal registration, each designated sale zone of statistic of classification at the appointed time in the zone at the terminal software and hardware of the every kind of model/version communicating number place of registering for the first time; Operating position by the last communicating number analysing terminal software and hardware that uses of analysing terminal software and hardware.
Preferably, the terminal software and hardware of management center server is reported the loss the workflow of module and is:
Ea) record sends the communicating number of this solicited message and the time of receiving this solicited message, and according to specified rule, extracts corresponding item of information from this solicited message; Search the essential information record of this terminal software and hardware for ID number according to the terminal software and hardware that extracts in the terminal essential information again, if do not find corresponding record, then the communicating number to this information of request sends the serv-fail information, and finishes this and call; Otherwise carry out next step;
Reporting the loss solicited message comprises: password, owner of lost property's contact details, drop-out time, the communicating number when losing that terminal software and hardware ID number, password, the releasing that report the loss the solicited message sign, will report the loss reported the loss;
Eb) solicited message is carried out legitimate verification; If it is legal to verify, then carry out next step; Otherwise the execution assigned operation sends the serv-fail information as the communicating number to this information of request, and finishes this and call;
Ec) check the value of current state information in this terminal essential information record,,, and finish this and call then to the communicating number transmission denial of service information that sends this solicited message if for reporting the loss; Otherwise carry out next step;
Ed) in the management center server database, add one and report the loss record, preserve this and report the loss information; And the current state information value is saved in this reports the loss in the record, the value of current state information is set to report the loss again; Write then and report the loss lock command; The last communicating number of reporting the loss to request that uses of terminal software and hardware sends lock command again; Send the successful information of service to the communicating number that sends this solicited message; Finishing this calls.
Preferably, removing the workflow of reporting the loss module is:
Fa) record sends the communicating number of this solicited message and the time of receiving this solicited message, and according to specified rule, extracts corresponding item of information from this solicited message; Search the essential information record of this terminal software and hardware for ID number according to the terminal software and hardware that extracts in the terminal essential information again, if do not find corresponding record, then the communicating number to this information of request sends the serv-fail information, and finishes this and call; Otherwise carry out next step;
Releasing is reported the loss solicited message and is comprised: remove password, current communicating number that terminal software and hardware ID number, password, the releasing report the loss the solicited message sign, to have reported the loss are reported the loss;
Fb) solicited message is carried out legitimate verification; If it is legal to verify, then carry out next step; Otherwise the communicating number to this information of request sends the serv-fail information, and finishes this and call;
Fc) check the value of the current state information in this terminal software and hardware essential information, if not reporting the loss, then the communicating number to this information of request sends the serv-fail information, and finishes this and call; If report the loss, then carry out next step;
Fd) search the record of reporting the loss of this terminal software and hardware, do not report the loss record if having, perhaps report the loss record for the last time and removed and report the loss, then the communicating number to this information of request sends the serv-fail information, and finishes this and call;
Fe) write down this releasing and report the loss record, report the loss in the record this record of sign the last time and removed and report the loss; With reporting the loss the state information updating current state information of preserving in the record for the last time; Send the order that unlocks to the current communicating number that extracts; Send the successful information of service to the communicating number that sends this solicited message; Finishing this calls.
Preferably, the workflow of terminal inquiry respond module is:
Ga) record sends the communicating number of this Query Information; According to the form of Query Information, from this Query Information, extract corresponding item of information; In the terminal essential information, search the record of this terminal software and hardware ID number according to the terminal software and hardware that extracts,, then carry out Gd) if the record number that returns is 0; Otherwise, carry out next step;
The information that comprises in the terminal inquiry solicited message has: query requests sign, terminal software and hardware ID number, password, the query contents that will inquire about;
Gb) solicited message is carried out legitimate verification; If it is legal to verify, then carry out next step; Otherwise carry out Gd);
Gc) communicating number to this Query Information of request returns corresponding Query Information; Finishing this calls;
Gd) communicating number to this information of request sends the serv-fail information, and finishes this and call;
The terminal request respond module of management center server is called when system start-up, memory-resident, and up to system closing, workflow is:
Ha) appointed information sent of sense terminals software and hardware is if detect then carry out Hb); Otherwise, carry out Ha);
Hb) by the general format of terminal request, from the information of receiving, extract request mark, detect the request type of request mark representative, the corresponding operating that puts rules into practice;
For example, if endpoint registration/checking request respond module is then called in representative registration/checking request; If request is reported the loss in representative, then call terminal and report the loss module; If representative is removed and reported the loss request, then module is reported the loss in call release; If the terminal inquiry respond module is then called in the request of GC group connector inquiry class; Otherwise, this information is handed to other corresponding module of system of appointment;
Hc) carry out Ha);
The method whether the present invention also provides a kind of checking mobile phone of checking based on the C/S framework to use on unique mobile phone for ID number, its step is as follows:
Preserve current identifying code, corresponding record initial value unanimity in the end message record of mobile phone terminal and server; Mobile phone terminal sends the checking request to server under particular cases, comprise new identifying code and current identifying code in the checking request; New identifying code is one group of irregular data, and not identical with current identifying code; Whether server is consistent with the current identifying code in the counterpart terminal information record by the current identifying code of checking and verifying in the request, judge whether mobile phone terminal ID is abused, if unanimity then do not abused is upgraded current identifying code in the counterpart terminal information record with the new identifying code in the checking request; If inconsistent, then abused; Then, send auth response, include the information of whether being abused for mobile phone terminal ID number in the auth response to mobile phone terminal; After mobile phone terminal is received corresponding auth response, according to next step operation of information and executing of whether being abused for the mobile phone terminal ID in the auth response number.
Wherein use following method to realize fault-tolerant ability:
Whether add the successful identifier of request in the data submodule of terminal software and hardware, it is successful to be used to identify registration/checking request last time; Add the backup verification msg in the management center server database terminal essential information; If the terminal software and hardware is not to communicate by letter in the connection session mode with management center server, then also should in the data submodule of terminal software and hardware, add request ID, be used to identify specific registration/checking request;
Ask successful identifier initial value for successful; The terminal software and hardware is produced request ID by specified rule when writing registration/checking request; Then, to ask successful identifier, current verification msg, request to write registration/checking request for ID number, and will upgrade for the request ID in the data submodule number, and must guarantee that above-mentioned data do not change in this process, as adopting exclusive mode to carry out read-write operation, in the time of also can requiring management server order detection and processing sub that data are read and write, must finish with exclusive mode;
After writing registration/checking request, it is issued management center server, after the transmission, the success of the request in data submodule identifier is revised as not success; Management center server is received registration/checking request, finds corresponding terminal software and hardware essential information record in database, detects the request success identifier that extracts from request;
If ask successful identifier, then verify the legitimacy of request with the current verification msg in the terminal essential information record for successful; If asking successful identifier is not success, then the legitimacy of asking with the backup verification msg checking in the terminal essential information record;
If it is legal to ask, check once more earlier that then whether the successful identifier of request is for successful, if then upgrade the backup verification msg with current verification msg; Then, upgrade current verification msg with the new verification msg that extracts;
If ask illegally, then do not upgrade verification msg;
Before terminal software and hardware commands in return, request ID number of extracting and current verification msg are added in the management center server order;
After the terminal software and hardware is received the management center server order, earlier check whether ask the id information item,, inconsistently then abandon this order if having then whether in request ID number of relatively extracting and the data submodule request ID number be consistent; Unanimity is then done further processing, and for example: it is successful to ask successful identifier to be set to, and upgrades current verification msg with new verification msg, carries out the operation of management center server order correspondence then; If command id is accreditation verification or the order of demonstration validation class, and do not have request id information item in the order, then abandon this order;
If the terminal software and hardware is to communicate by letter in the connection session mode with management center server, then can adds and not verify request ID.
Preferably, use following method to realize fault-tolerant ability in the present invention:
In the data submodule of terminal software and hardware, add identifying code access times information and request ID; Add identifying code access times information and backup verification msg in the management center server database terminal essential information;
The terminal software and hardware is produced request ID by specified rule when writing registration/checking request; Then, to ask successful identifier, current verification msg, request to write registration/checking request for ID number, and will upgrade for the request ID in the data submodule number, and must guarantee that the above-mentioned data in the internal memory do not change in this process, as adopting exclusive mode to carry out read-write operation, in the time of also can requiring management server order detection and processing sub that data are read and write, must finish with exclusive mode; The identifying code access times are added 1;
Whether management center server is received registration/checking request, finds corresponding terminal software and hardware essential information record in database, legal according to following rule judgment request:
The identifying code access times that relatively extract from solicited message deduct the difference of regulation initial value and 1 relation;
If it is less than 1, then illegal;
If equal 1, then whether the current verification msg that goes out of Detection and Extraction is consistent with current verification msg in this terminal software and hardware essential information record, if unanimity is then legal, inconsistent then illegal;
If difference, checks that the identifying code access times that extract whether greater than the identifying code access times in this terminal software and hardware essential information record, if be not more than, then are illegal greater than 1; If whether consistent greater than, the current verification msg that Detection and Extraction go out with backup verification msg in this terminal software and hardware essential information record, if inconsistent then illegal; If it is consistent, then legal;
If it is legal to ask, then earlier check that once more the identifying code access times that extract deduct the difference of regulation initial value and 1 relation from solicited message, if equal, then upgrade the backup verification msg with current verification msg, and the identifying code access times in this terminal software and hardware essential information record are set to initial value and add 1, otherwise, the identifying code access times in this terminal software and hardware essential information record are added 1;
Then, upgrade current verification msg with the new verification msg that extracts;
If ask illegally, then do not upgrade verification msg;
Before terminal software and hardware commands in return, request ID number of extracting and current verification msg are added in the management center server order;
After the terminal software and hardware is received the management center server order, earlier check whether ask the id information item,, inconsistently then abandon this order if having then whether in request ID number of relatively extracting and the data submodule request ID number be consistent; Consistent, then whether the current verification msg in the sense command is consistent with current verification msg in the data submodule, inconsistently then abandon this order, unanimity is then upgraded current verification msg with new verification msg, carries out the operation of management center server order correspondence then; If command id is accreditation verification or the order of demonstration validation class, and do not have request id information item in the order, then abandon this order.
(3) beneficial effect
By the present invention, can prevent from effectively to cheat communication equipment buyer, can recover and lose communication equipment, can supervise dealer's sales behavior by renovation or personation mode, the communication equipment smuggling can be prevented, the software pirate version of communication condition can be prevented to have.When the terminal that will protect was hardware device, the operation on the terminal can realize with hardware mode, also can the pure software mode realize fully; When the terminal that will protect was software, the legitimate verification module on the terminal was realized by the pure software mode.In addition, this technology is difficult to be cracked by illegal user, thereby protects the legitimate rights and interests of user and producer to greatest extent.
Description of drawings
Fig. 1 is the system topological figure of embodiment one;
Fig. 2 is the registration of mobile phone end and checking submodule flow chart of embodiment one;
Fig. 3 is order detection of mobile phone end management center server and the processing sub flow chart of embodiment one.
Fig. 4 is server end mobile telephone registration/auth response module flow chart of embodiment one.
Embodiment
Following examples are used to illustrate the present invention, but are not used for limiting protection scope of the present invention.
Embodiment one
Present embodiment provides that a kind of mobile phone anti-is lost, the implementation of the system and method for false proof, anti-smuggling.
System is made of mobile phone 1, GSM/CDMA net 2, SMS service centre 3, communication link 4, INTERNET net 5, PC 6, management center server 7 and WEB server 8, and its topological structure as shown in Figure 1.
Mobile phone 1 links to each other with management center server 7 by the communication port that GSM/CDMA net 2, SMS service centre 3, SMS gateway, INTERNET net 5 constitute, and realizes the information interaction of mobile phone and management center server.WEB server 8 links to each other with management center server 7 by local area network (LAN).User and after-sale service personnel can operate PC 6 by INTERNET net 5 and WEB server access management center server, can report the loss, remove the operations such as card number information of reporting the loss and inquiring about its essential information and registered to mobile phone.This system has formed mobile phone, communication network, management center server and PC that a mobile phone anti-is lost, the Antiforge system total solution.
In this scheme, the user can report the loss, remove and report the loss and various query requests to the management center server transmission by sending SMS or online.The user with mobile phone short messages when management center server sends request, should write the SMS content by form on request, and send to the service specified number.
" mobile phone essential information tables of data " arranged in the database of management center server; wherein preserve the essential information of all mobile phones that will protect, the field of this tables of data has: mobile phone ID number, mobile phone numbering, password, mobile phone model/version number, date of manufacture, the place of production, current state, color, current verification msg, backup verification msg, hour of log-on, the telephone number that uses at last, the network address (as the IP address) and the designated sale zone of using at last for the first time.Mobile phone ID number is the major key of this tables of data.The current state field value is an enumeration type, have not enabled, normal, report the loss locking and limit four kinds, and can add new value as required, the acquiescence initial value is a not enabled.The codomain of current state field is by " state codomain table " in management center server database management, and the field in " state codomain table " has: status number, state name, Status Type, information, restriction useful life.Current verification msg field initial value is empty.Consistent on password field selection values and the mobile phone packing box.Also have in the database of management center server " mobile telephone registration tables of data ", be used to write down the log-on message of mobile phone, the field of this tables of data has: mobile phone numbering, mobile phone card number and hour of log-on.Also have in the database of management center server by " the illegal log-on data table of mobile phone ", be used to write down illegal log-on message, the field of this tables of data has: mobile phone ID number, mobile phone card number, hour of log-on, log-on message content.Also have in the database of management center server " reporting the loss the record data table " and " the record data table is reported the loss in releasing ", information is reported the loss in the information of reporting the loss and the corresponding releasing that are respectively applied for the record mobile phone.Wherein, field in " reporting the loss the record data table " has: report the loss Record ID, mobile phone numbering, report the loss preceding mobile phone state, owner of lost property's contact details, remove and report the loss password, drop-out time, report the loss the time, remove and report the loss Record ID, remove report the loss the Record ID field initial value for empty; Field in " the record data table is reported the loss in releasing " has: remove and report the loss Record ID, remove and report the loss the time." mobile telephone registration tables of data ", " reporting the loss the record data table " and " mobile phone essential information tables of data " are associated by the mobile phone number field." report the loss the record data table " and " the record data table is reported the loss in releasing " reported the loss the Record ID field by releasing and be associated.
Add a legitimate verification module in mobile phone, this module has data file and registration and checking submodule, management center server order detection and processing sub, locking submodule; Under the situation of specified otherwise not, the operated data of the submodule of legitimate verification module are the corresponding data in the data file; The legitimate verification module loads when handset starting automatically, and its flow process is: whether legal, as illegal, call the locking submodule if detecting data file, withdraw from this submodule then; If data file is legal, then start a task manager, be management center server order detection and processing sub registration trigger event; Cycle detection is from the information of management center server; If detect information from management center server, then trigger management center server order detection and processing sub, call registration and checking submodule; Continue cycle detection;
The forms such as can adopting SMS or socket of communicating by letter of mobile phone and management center server communicates by note channel, GSM net, CDMA net or WLAN (wireless local area network).
After-sale service client and management center server communicate by the communication function that calls communication protocol on this machine of being installed in, standard communication, operating system.
The data of preserving in the data file of mobile phone legitimate verification module have: mobile phone ID number, successfully whether command id tabulation, timer, checking last time sign, server contact number number, acquiescence management center server contact number, the tabulation of management center server contact number, current state, information, current verification msg, the card number number of using, card number tabulation, specific communication list of numbers, the owner of lost property's contact number used.Wherein, mobile phone ID number with administrative center's database " mobile phone essential information tables of data " in mobile phone ID field value corresponding one by one; Current state information is an enumeration type, and its value has normally, locks, reports the loss locking, to be verified etc., and initial value is locking; Current verification msg and owner of lost property's contact number initial value all are null character string; The tabulation of management center server contact number is 3-D character string array, and wherein one dimension is deposited the card number feature string, and one dimension is deposited corresponding management center server telephone number, and one dimension is deposited the corresponding management center server network address.With the communicating number tabulation of crossing is the character string array, and initial value is 1 null character string; Information is a character string, and initial value is " not enabled still ".The specific communication list of numbers is the character string array, is used to preserve some special numbers, as 110,120 of China, and 911 etc. of the U.S..Timer is a nonnegative integer.Last time, whether checking successfully was designated Boolean variable, be worth for the success and the success two kinds.
The information that the management center server order comprises has: mobile phone ID number, current verification msg, command identifier, request ID (just having when having only response registration/checking to ask) and other parameter information.
Registration is enabled the back with the checking submodule at mobile phone and is loaded automatically, or by mobile phone legitimate verification module invokes.Its workflow is:
100) data in the read data files, and be translated into the form of appointment; If data were through encrypting, with its deciphering;
105) legitimacy, consistency and the integrality of data in the inspection data file, when for example moving when mounted or for the first time to data file data signature, by check data signature and content data file whether consistent judgment data whether legal, one make peace complete; If passed through inspection, then carry out next step; Otherwise, start the locking submodule; Withdraw from this submodule;
110), check whether need registration and checking according to specified rule; For example, rule 1: extract current phone number, check with having or not current phone number in the card number tabulation of crossing, not having then to send register requirement, have then to send checking and ask; Rule 2: unconditionally send register requirement; Registration or checking are then carried out next step if desired; Otherwise, carry out 165);
115) write register requirement and checking request.The information that comprises in the registration/checking request has: registration/checking request mark, mobile phone ID number, new verification msg, current verification msg, whether ask to verify ID and last time successful identifier; New verification msg is the irregular data that is generated by specified function, as random number, and current system time; New verification msg can not be identical with current verification msg; If communicate by letter, then also should add the current phone number as registration/checking item in the socket mode.Request ID in the updating memory and read last time checking whether during successful identifier must finish with exclusive mode;
120) contact number of from the tabulation of management center server contact number, choosing according to current phone number.Search for WLAN (wireless local area network), GSM net or CDMA net successively,, then carry out next step if can be communicated with management center server; Otherwise, carry out 130);
125) connect in the socket mode, send registration/checking request to management center server; After receiving the management center server order, call management center server and detect and processing sub.Carry out 170);
130) value of current state information is set to be verified.Verified whether successfully sign is set to not success last time.To send registration/checking request with short message mode;
135) value of timer is set to 0;
140) value with timer adds 1;
145) whether check timer greater than designated value, as greater than, then upgrade information, start the locking submodule, withdraw from this submodule; Otherwise, carry out next step;
150) (the waiting event manager triggers management center server order detection and processing sub) checks whether current state information is to be verified, if then carry out next step; Otherwise carry out 165);
155) judge whether timer satisfies specified requirements,, retransmit registration/checking request note if satisfy; Otherwise, directly carry out next step;
160) calling system timing function, if reach the fixed time, then execution in step 140); Otherwise carry out 160);
165) value of inspection current state information if current state information is the value or the restriction of locking class, then starts the locking submodule;
170) withdraw from this submodule.
Management center server order detection and processing sub are event-driven modules, receive the information identical with the management center server command type sent by communication network (no matter be in the socket mode and be with short message mode) time when mobile phone and trigger; Its flow process is:
200) detect the information receive and whether derive from the communicating number that exists in the tabulation of management center server contact number, if not then withdrawing from this submodule, otherwise carry out next step;
205) by specified rule information is decrypted;
210) the order composition rule by appointment extracts corresponding data from information;
215) legitimacy of verification command does not withdraw from this submodule if conform to rule, otherwise carries out next step;
The legitimate verification Sample Rules:
If the command identifier that extracts does not exist in the command id tabulation, then is illegal command;
If the software and hardware ID that extracts number with data file in software and hardware ID number inconsistent, then be illegal command;
If the current verification msg in current verification msg that extracts and the data file is inconsistent, then be illegal command;
220) whether contain request ID in the sense command information; If have, then check the request ID that extracts whether consistent, if consistent with the request ID in the data submodule, verified then whether successfully sign is set to successful last time, and replace current verification msg with new verification msg, if two request ID are inconsistent, then withdraw from this submodule; If do not have request ID in the command information, then carry out next step;
225) according to command information that extracts and the tabulation of the command id in data file recognition command kind, carry out predetermined operation by the order kind.
For example:
If confirm the class order, then the value of current state information is set to normally; If the accreditation verification order, then read current phone number again, and it is added in the card number tabulation of using; Then, withdraw from this submodule;
If the order of locking class, then the value with current state information is made as locking, and upgrades information; If report the loss lock command, use the owner of lost property's contact number in the owner of lost property's contact number updated data file that from command information, extracts again; Start the locking submodule; Then, withdraw from this submodule;
The class order if unlock checks then whether this order is corresponding with the value of current state information, if corresponding, then the value of current state information is set to normally, and closes the locking submodule; Withdraw from this submodule then; Otherwise directly withdraw from this submodule;
If upgrade current verification msg order, then the value of current state information is set to normally, replaces current verification msg with the verification msg that extracts again from order; Then, withdraw from this submodule;
If also include other and the irrelevant information of order in the command information, then before withdrawing from, these information carried out assigned operation;
Lock submodule, be used for the major function of No Mobile Phones; Its flow process is:
300) detect the value of current state information,, then withdraw from this submodule if be normal; Otherwise, carry out next step;
305) information in the video data file;
310) calling system function, all operations of supervision mobile phone is forbidden other operation except that explicit permission, comprises the automatic operation that default setting and user are provided with.
The operation of explicit permission can have: with the number communication in the specific communication list of numbers; Report the loss under the lock-out state, communicate by letter with owner of lost property's contact number; Detect the management center server order; Task manager triggers management center server order detection and processing sub.
There are terminal request respond module, mobile telephone registration/checking request respond module, mobile phone to report the loss module, remove and report the loss module, terminal inquiry respond module, mobile phone sale/operating position analysis module in the software of management center server.
The workflow of mobile telephone registration/checking request respond module is:
400) record sends the communicating number of this solicited message and the time of receiving this solicited message, and according to specified rule, extracts corresponding item of information from this solicited message; In mobile phone essential information tables of data, search the essential information record of this mobile phone according to mobile phone ID number that extracts again,, then carry out 410) if do not find corresponding record; Otherwise carry out 405);
405) solicited message is carried out legitimate verification;
For example: if the last time that extracts from solicited message, whether checking successfully was designated successful, whether with the current verification msg field value essential information of this mobile phone write down in consistent, otherwise whether detect the current verification msg that extracts from solicited message consistent with the backup verification msg field value during the essential information of this mobile phone writes down if then detecting the current verification msg that from solicited message, extracts; It is legal that the two unanimity then is considered as, inconsistent then be considered as illegal;
Verify and legally then carry out 415); Do not conform to rule and carry out 410);
410) carry out assigned operation;
As: send lock command and warning message to the communicating number that sends this solicited message; Current verification msg in the lock command, the analog value of request ID for from request, extracting.Whether detect is register requirement, if register requirement, then in the management center server database, add the illegal registration of mobile phone, mobile phone ID number of extracting of registration, send the communicating number of this solicited message, the time of receiving this solicited message and requested content; Then, finishing this calls;
Whether whether 415) detect checking last time that extracts earlier from solicited message and successfully identify for successful, be then to upgrade the backup verification msg with current verification msg, be not then not upgrade.Then, use the new verification msg that from solicited message, extracts to upgrade current verification msg in the essential information record of this mobile phone;
Whether be register requirement, if then add a mobile telephone registration record, the corresponding information that registration extracts in the management center server database if 420) detecting.If being short message mode, request sends, to send the cell-phone number of this request, upgrade the telephone number of the last use in this mobile phone essential information record, if send in the socket mode, then upgrade the last telephone number that uses, and upgrade the last network address of using with the communicating number of this request of transmission with the current phone number that extracts;
425) check the value of current state field in the essential information record of this mobile phone, value according to current state information is upgraded it by specified rule, and write corresponding management center server order, by the specified rule setting, current verification msg in this order and request ID are the corresponding data that extracts to the command id of this order from this solicited message according to the current state field value.The order of locking class also includes information, and its value is the information field value of " state codomain table " respective record.If this order is to report the loss lock command, also should add in this order from owner of lost property's contact information field value of this mobile phone being reported the loss for the last time the record; Send the management center server order that has write to the communicating number that sends this solicited message;
Sample Rules:
If the current state field value is normal, then sends and confirm order;
If the current state field value is a not enabled, then change the current state field value into restriction, the first time, hour of log-on was set to receive the time of this solicited message; Operation when then, carrying out the current state field value for restriction;
If the current state field value is restriction, then analyze to send the indicated country /region of mobile phone card number of this registration note, and whether the indicated country /region of designated sale area field value was consistent during the essential information of this mobile phone write down in comparative analysis result and " the mobile phone essential information tables of data "; If consistent, then send and confirm order; If inconsistent, then send the smuggling lock command;
If the current state field value for reporting the loss locking, then sends and reports the loss lock command;
430) finishing this calls.
Reporting the loss solicited message comprises: report the loss password, owner of lost property's contact details, drop-out time, the card number when losing that solicited message sign, will report the loss mobile phone ID number, password, releasing are reported the loss.Releasing is reported the loss solicited message and is comprised: remove the password report the loss solicited message sign, reported the loss mobile phone ID number, password, releasing and to report the loss, the card number of current use.Report the loss solicited message and releasing report the loss solicited message can mobile phone short messages or send to management center server by the after-sale service client.
The workflow of " mobile phone is reported the loss " module of management center server is:
Fa) record sends this and reports the loss communicating number of request and receive that this reports the loss the time of request.According to the form of the request of reporting the loss, report the loss the corresponding character string of extraction the request from this;
Fb) in mobile phone essential information tables of data, search the essential information record of this mobile phone according to the mobile phone ID that will report the loss number of extracting.If do not find, then carry out Ff); If found, then carry out Fc);
Fc) check the current state field value of this record, if value is then carried out Fd for reporting the loss locking); Otherwise carry out Fe);
Fd) return bomp information " this mobile phone is reported the loss, and this asks failure " to sending this communicating number of reporting the loss request, finish this and call.
Fe) check whether the password field selection values in the essential information record of this mobile phone is identical with the password that reads from the request of reporting the loss, the identical Fg that then carries out); Difference is then carried out Ff);
Ff) return bomp information to sending this communicating number of reporting the loss request, finish this and call.
Fg) in " reporting the loss the record data table ", add a record, the Record ID field value of reporting the loss of this record is generated automatically by system, mobile phone number field value is got the mobile phone number field value in the essential information record of this mobile phone, mobile phone mode field value is got the current state field value in the essential information record of this mobile phone before reporting the loss, releasing is reported the loss password field selection values and get the password that the releasing that extracts is reported the loss from the request of reporting the loss, the drop-out time field value is got the drop-out time that extracts from the request of reporting the loss, report the loss the time word segment value and be and receive that this reports the loss the time of request, the owner of lost property contact details of owner of lost property's contact information field value for extracting from the request of reporting the loss are removed and are reported the loss the Record ID field value for empty; Current state field value in the essential information of this mobile phone record changed into report the loss locking, this mobile phone of search is lost all mobile phone card numbers of post-registration in " mobile telephone registration tables of data ", reports the loss the lock command note to these card numbers transmissions; The contact details that include the owner of lost property in the lock command note;
Whether the card number when Fh) checking losing of extracting from the request of reporting the loss is null character string, is not that null character string is then reported the loss the lock command note to its transmission;
Fi) return and report the loss successful information to sending this communicating number of reporting the loss request.At last, finishing this calls.
The workflow of " releasing is reported the loss " module of management center server is:
Ga) record sends this releasing and reports the loss the communicating number of request and receive that this releasing reports the loss the time of request.Report the loss the form of request according to releasing, report the loss from this releasing and extract corresponding character string the request.
Gb) the essential information record of reporting the loss according to will removing of extracting of in " mobile phone essential information tables of data ", searching this mobile phone for mobile phone ID number; Found, then carried out Gc); Do not find, then carry out Gj);
Gc) whether the current state field value of checking this record is to report the loss locking, is not then to carry out Gd); Be then to carry out Ge);
Gd) report the loss the communicating number of request and return bomp information " this mobile phone is not reported the loss, and this ask to fail " to sending this releasing, finish this and call.
Ge) check password field selection values in the essential information record of this mobile phone with whether report the loss the password that reads the request from this releasing identical, the identical Gf that then carries out); Difference is then carried out Gj);
Gf) according to reporting the loss the time word segment value in the mobile phone number field value in the essential information of this mobile phone record and " reporting the loss the record data table ", in " reporting the loss the record data table ", search this mobile phone and report the loss record for the last time, if the record number that returns is 0, then carry out Gj); Otherwise carry out Gg);
Gg) checking that this mobile phone is reported the loss in the record to remove for the last time reports the loss password field selection values to report the loss password identical with report the loss the releasing that extracts the request from releasing, the identical Gh that then carries out); Difference is then carried out Gj);
Gh) check whether the Record ID field value is reported the loss in the releasing of reporting the loss record for the last time is empty, for sky is then carried out Gi); Then do not carry out Gj) for sky;
Gi) add a record in " the record data table is reported the loss in releasing ", the releasing of this record is reported the loss the Record ID field value and is generated automatically by system, removes the time of reporting the loss and is and receive that this releasing reports the loss the time of request; This mobile phone is reported the loss releasing in the record for the last time and is reported the loss the Record ID field value and be set to the releasing that the new releasing of adding reports the loss in the record and report the loss the Record ID field value again; Next, the current state field value that this mobile phone essential information is write down changes into and reports the loss the preceding mobile phone mode field value of reporting the loss of record for the last time; Carry out Gk);
Gj) report the loss the communicating number of request and return bomp information to sending this releasing, finish this and call.
Gk) detect and to report the loss the current card number that uses that extracts the request from releasing and whether be null character string,, then send to remove and report the loss the order note to this card number if not null character string; The current state field value that the remark information in the order note writes down for this mobile phone essential information is reported the loss in releasing;
Gl) report the loss the mobile phone card number of request and return success to remove and report the loss the information note to sending this releasing, finish this and call.
" mobile telephone registration information monitoring " module is used for the log-on message arrangement mobile phone essential information according to mobile phone, time (as 23 o'clock sharps of every day) in appointment calls, workflow is: inquiry " mobile phone essential information tables of data ", the record of current state information field value in this tables of data for restriction extracted, " mobile phone numbering " field value according to every essential information record is searched the record of " hour of log-on " field value minimum in " mobile telephone registration tables of data ", the i.e. registration first time of this mobile phone, take out the hour of log-on field value, the difference of the hour of log-on field value that calculates the current time and extract, if surpassing, difference specifies numerical value, as 90 days, then the current state field value in this mobile phone essential information record is changed into normally; Otherwise, carry out next step.Handle next bar essential information record with the same manner, all handle up to all essential information records; Finishing this calls.
The information that comprises in the mobile phones enquiring request has: inquiry sign, will inquire about mobile phone ID number, password, remark information.The mobile phones enquiring request has inquiry of mobile phone essential information and mobile telephone registration to inquire about two kinds.In the trade mark enquiries request, include the hour of log-on scope of the registration number that returns, the record that will inquire about in the remark information.The mobile phones enquiring request is write by user oneself, can use short message mode, the inquiry of also can surfing the Net.
The workflow of " mobile phones enquiring response " module of management center server is:
Ia) record sends the communicating number of this query requests; According to the form of query requests, from this query requests, extract corresponding character string;
Ib) in " mobile phone essential information tables of data ", search the record of waiting to look into mobile phone according to mobile phone ID number that extracts,, then carry out Ic) if found; If do not find, then carry out Id);
Ic) check whether the password field selection values in the essential information record wait to look into mobile phone is identical with the password that reads, and difference is then carried out Id from this query requests), the identical Ie that then carries out);
Id) return bomp information to the communicating number that sends this query requests, finish this and call.
Ie) according to the mobile phone number field value in the essential information record of waiting to look into mobile phone, the hour of log-on field value in " mobile telephone registration tables of data ", in " mobile telephone registration tables of data ", search the registration of waiting to look into mobile phone;
If) check the query requests sign that from the query requests of receiving, extracts, if Ig is then carried out in the essential information inquiry); If Ih is then carried out in the log-on message inquiry);
Ig) will wait to look into mobile phone ID number of mobile phone essential information record, mobile phone model/version number, date of manufacture, the place of production, current state and the time of designated sale area field value and registration for the first time and the communicating number of last registration and write a return string, again this return string be sent to the communicating number of this query requests by specified rule; Carry out Ii);
Ih) in " mobile telephone registration tables of data " and " the not successful log-on message table of mobile phone ", search the registration of waiting to look into mobile phone according to the mobile phone number field value in the essential information record of waiting to look into mobile phone; According to the parameter of from the remark information that extracts, extracting, the recorded information of appointment is returned to the communicating number of this inquiry of transmission; Carry out Ii);
Ii) finishing this calls.
The request respond module of management center server is called when system start-up, memory-resident, up to system closing, workflow is: whether call operation system and standard communication interface Function detection receive the information that SMS and socket mode are sent, if detected, then press the general format of mobile phone request, from the request of receiving, extract the request mark character string, detect the indicated request type of request mark character string, if registration checking request mark, then calling mobile phone registration/auth response module; If report the loss request mark, then calling mobile phone is reported the loss module; Report the loss request mark if remove, then module is reported the loss in call release; If mobile phones enquiring class sign, then calling mobile phone inquiry response module; Above step is carried out in circulation.
" user's service " module is moved on WEB server 8, is responsible for the after-sale service client corresponding service is provided, the workflow that various concrete whens service are provided to provide corresponding service procedure similar for mobile phone.
The after-sale service client is a browser model, provide service by WEB server 8, all communicating numbers, the request management center server that has inquiry mobile phone current state and essential information, inquiry mobile telephone registration to cross reported the loss mobile phone, the request management center server is removed mobile phone and reported the loss state.In browser, require information that the user provides identical with the SMS request time.
In order to strengthen the validity decision ability of mobile telephone registration/checking request, make following modification:
In the data submodule of mobile phone, add identifying code access times information, abolish being proved to be successful sign last time, add identifying code access times information and backup verification msg in the management center server database terminal essential information;
With step 110) change into:
Whether according to specified rule, checking needs registration and checking, then carry out 111 if desired), otherwise, carry out 175); 111) write registration/checking request; Produce " request ID " by specified rule, it is added in registration/checking request, and the request ID in the updated data file; The identifying code access times are added 1; Then, new identifying code access times are added in register requirement and the checking solicited message; Send register requirement and checking request;
With step 220) change into:
Whether contain request ID in the sense command information; If have, then check the request ID that extracts whether consistent with the request ID in the data file, if consistent, then the identifying code access times are set to initial value, and replace current verification msg with new verification msg, if inconsistent, then withdraw from this submodule; If do not have request ID in the command information, then carry out next step;
With 405) the legitimacy example changes into:
For example: the identifying code access times that relatively extract from solicited message deduct the difference of regulation initial value and 1 relation;
If it is less than 1, then illegal;
If equal 1, then whether the current verification msg that goes out of Detection and Extraction is consistent with current verification msg in this mobile phone essential information record, if unanimity is then legal, inconsistent then illegal;
If difference, checks that the identifying code access times that extract whether greater than the identifying code access times in this mobile phone essential information record, if be not more than, then are illegal greater than 1; If whether consistent greater than, the current verification msg that Detection and Extraction go out with backup verification msg in this mobile phone essential information record, if inconsistent then illegal; If it is consistent, then legal;
With 410) in example change into:
As: send lock command and warning message to the communicating number that sends this solicited message; Current verification msg in the lock command, the analog value of request ID for from request, extracting; Whether detect is register requirement, if register requirement, then in the management center server database, add an illegal terminal registration, mobile phone ID number of extracting of registration, send the communicating number of this solicited message, the time of receiving this solicited message and requested content; Then, finishing this calls;
With 415) change into:
If deducting the difference of regulation initial value, the identifying code access times that extract equal 1 from solicited message, then upgrade the backup verification msg with current verification msg, and the identifying code access times in this mobile phone essential information record are set to initial value and add 1, otherwise, the identifying code access times in this mobile phone essential information record are added 1;
Then, use the new verification msg that from solicited message, extracts to upgrade current verification msg in the essential information record of this mobile phone; Execution in step 420);
When management center server initiatively with have dynamic IP addressing, Personal Handyphone System, when the PDA Terminal Type is set up and communicate by letter, can dial its telephone number or transmission note earlier, notify it to be connected with server; After terminal has notice, initiatively send connection request and set up communication to management center server; Phone incoming call in this way, then terminal is refused the incoming call of management center server earlier when management center server sends connection request.
Can use the sequence number of designated equipment on the terminal, the mapping sign indicating number of Equipment Serial Number appointment, replace mobile phone ID number as the international mobile equipment identification number (IMEI sign indicating number) of mobile phone.
In above-mentioned program module, submodule, can not check the current state information of terminal software and hardware, promptly delete all operations relevant in the terminal software and hardware legitimate verification module with current state information.
The method that can access to your password is handled the data in the data submodule, as encrypting and data signature, and with one group of characteristic of representing the particular terminal software and hardware, distribute to identifier, local hard drive sequence number and the mapping sign indicating number thereof of terminal software module as operating system, add in the data submodule, whether be used for the verification msg submodule is illegal copy, the irregular data that generates in the time of also can being moved one group of installation/first time is added in the data submodule, is used for the identification data submodule.
If require the data in the data submodule are encrypted and data signature, then the data submodule is made amendment after the operation at every turn, all to encrypt again and data signature; The data submodule is made amendment at every turn and all tackle the data submodule after operation, cryptographic operation and the data signature operation and back up.When the checking legitimacy, illegal if the data submodule is verified as, then check the Backup Data submodule, if the Backup Data submodule is legal, then use Backup Data submodule restoring data submodule, assert that the data submodule is legal; Otherwise assert that the data submodule is illegal.
Embodiment two
Present embodiment provides a kind of method for preventing piracy that needs server to improve the software of certain service.
System is made of protected software, server and INTERNET net.
Connect by the INTERNET net between protected software and services device.Protected software, server use socket by the communication function that calls communication protocol on this machine of being installed in, standard communication, operating system, communicate by the Internet.
The software copy information data table is arranged in the data in server storehouse.The field of this tables of data has: software I D number, password, current identifying code, back-up validation, identifying code access times.Get the sequence number of software software I D number, also desirable other designated character string, each software copy that will protect all have a unique software I D number.
The form of server authentication response is: command identifier+software I D number+current identifying code.Command identifier has pirate and non-pirate two kinds.Protected software comprises in the checking solicited message that server sends: software I D number+current identifying code+new identifying code+identifying code access times.Wherein, new identifying code is an irregular data, as random number, and can not be identical with current identifying code.
Add a legitimate verification module in protected software, this module has 1 data file and checking submodule, data file to generate 2 program submodules of submodule.
The data of preserving in the data file have: software I D number, and local verification sign indicating number, server contact address, identifying code access times, current identifying code.Wherein, software I D number its corresponding record must be arranged in server database.Identifying code access times initial value in identifying code access times and the server database all is 0.The local verification sign indicating number is that parameter generates by a non-invertible function with the local hard drive sequence number, or operating system is given the mapping sign indicating number of the identifier of protected software distribution.Software is only preserved the server contact address before installing or moving for the first time in the data file.
Data file generates submodule when software is installed, or run time call for the first time, and its parameter is the sequence number and the password of software, and its flow process is:
Aa) open data file, software sequence number and password that the user is imported are saved in the data file with current identifying code as software I D number respectively.
Ab) call operation system api function reads the local hard drive sequence number, and perhaps operating system is given the identifier of protected software distribution, generates the local verification sign indicating number.The initial value of local verification sign indicating number and identifying code access times is write data file.
Ac) close data file; Withdraw from this submodule.
The checking submodule calls when server requests provides service at needs, and workflow is:
Ba) open data file, read related data;
Bb) use the local verification sign indicating number to check whether this data file is that this software application is peculiar; If can not be by checking, then prompting makes mistakes, and forbids that this software is connected with server; Otherwise, carry out next step.
Bc) write the checking solicited message;
Bd) the identifying code access times are added 1;
Be) to connect socket mode Connection Service device, send the checking request, obtain corresponding request response from server to server;
Bf) whether detection completes successfully with server communication, if complete successfully, then carries out next step; Otherwise then carry out Be), till overtime withdrawing from;
Bg) the identifying code access times are set to initial value; By relatively whether more consistent with the current identifying code the data file from the current identifying code of asking response message to extract, verify the legitimacy of request response, if illegal, then withdraw from this submodule; If the request response is legal, then the command identifier in the extraction request response if the command identifier indication is pirate, is then carried out corresponding operating, as closes software or automatic uninstall; If right and wrong piracy is then upgraded current identifying code with new identifying code.Withdraw from this submodule.
On server, add an auth response module, when server is received the checking request, call.Return a Boolean variable, be worth for allowing service and denial of service.Its workflow is:
Ca) extract in the solicited message software I D number, in the software copy information table, search this ID number record; If do not find then carry out Ce); If found, then carry out next step.
Cb) the identifying code access times that relatively extract from solicited message deduct the difference of regulation initial value and 1 relation;
If less than 1, then carry out Cf);
If equal 1, then whether the current identifying code that goes out of Detection and Extraction is consistent with the current identifying code in this ID information record, if unanimity is then carried out Cc), the inconsistent Ce that then carries out);
If difference, is checked the identifying code access times that extract greater than 1 and whether greater than the identifying code access times in this ID information record, if be not more than, is then carried out Ce); If it is whether consistent with back-up validation in this ID information record, if inconsistent then carry out Ce) greater than, the current identifying code that Detection and Extraction go out; If consistent, then carry out Cc);
Cc) if deducting the difference of regulation initial value, the identifying code access times that extract equal 1 from solicited message, then upgrade back-up validation with current identifying code, and the identifying code access times in this ID information record are set to initial value and add 1, otherwise, the identifying code access times in this ID information record are added 1;
Cd) use the new identifying code that from solicited message, extracts to upgrade current identifying code in this ID information record; Return the server response, the command identifier value is non-piracy in this response message, and other value is got the analog value that extracts from solicited message.Return and allow service, finish this and call;
Whether the current identifying code that Ce) relatively extracts is consistent with the password field selection values in this ID information record, if it is consistent, then upgrade current identifying code and back-up validation, and the identifying code access times in this ID information record are set to initial value and add 1, carry out Cd then) with password field selection values; Otherwise carry out Cf);
Cf) return the server response, the command identifier value is pirate in this response message, and other value is got the analog value that extracts from solicited message.Return denial of service, finish this and call.
If also need to provide offline service, then can whether use on unique terminal in order to following method validation ID number:
After being installed, the offline service bag needs the online verification verifying authority or obtain server.The online verification method is identical with said method.In order to generate and verify authority, need add checking authority submodule and authority generation module on protected software and in the server respectively.The generation of authority is similar with generation checking request process, and the checking authority is identical with the checking request respond module operation principle of server.Whether technical spirit is, as the client that sends the checking request, as the authentication server end, is communications carrier with the authority with protected software with server, adopt with above-mentioned online verification method and use in unique terminal for identical authenticate ID number.
Illustrate and illustrate though the present invention is the indivedual preferred embodiments of concrete combination; but the personnel that are familiar with this technical field are appreciated that; wherein no matter still can make various changes in detail in form, this does not deviate from spirit of the present invention and scope of patent protection.

Claims (10)

1. stolen system of software and hardware that prevents communication condition/function, comprise mobile phone terminal (1), SMS server (3), management center server (7) and WEB server (8), wherein mobile phone terminal (1) is by GSM/CDMA net (2), SMS server (3) links to each other with management center server (7) with the communication port that INTERNET net (5) constitutes, WEB server (8) links to each other with management center server (7) by local area network (LAN), WEB server (8) provides the WEB service based on browser, be used for it is characterized in that with B/S mode manage central server (7) mobile phone terminal information:
Management center server is judged its legitimacy by the continuity of checking mobile phone terminal (1) registration and checking, the terminal request respond module is wherein arranged, endpoint registration/checking request respond module, terminal is reported the loss module, module is reported the loss in releasing, the terminal inquiry respond module, mobile phone terminal sale/operating position analysis module, and the essential information of preserving all mobile phone terminals that will protect respectively, the endpoint registration data message, the illegal log-on data information of terminal and report the loss the record data message and remove the terminal essential information data cell report the loss recording data information, the endpoint registration data cell, terminal illegal log-on data unit and report the loss the record data unit and the record data unit is reported the loss in releasing;
Add a legitimate verification module that is used to carry out the user validation checking in mobile phone terminal, this module has data submodule and registration and checking submodule, management center server order detection and processing sub, locking submodule.
2. stolen method of the software and hardware that prevents communication condition/function of utilizing the described system of claim 1 is characterized in that:
Under the situation of specified otherwise not, the operated data of the subroutine module of legitimate verification module are the corresponding data in the data submodule; The legitimate verification module loads when mobile phone terminal starts automatically, and its flow process is: start a task manager, be management center server order detection and processing sub registration trigger event; Cycle detection is from the information of management center server; If detect information from management center server, then trigger management center server order detection and processing sub, call registration and checking submodule; Continue cycle detection.
3. the stolen method of software and hardware that prevents communication condition/function according to claim 2 is characterized in that: described registration loads under specified requirements with the checking submodule, and its workflow is:
Aa) data in the reading of data submodule, and be translated into the form of appointment; If data were through encrypting, with its deciphering;
Ab) legitimacy, consistency and the integrality of data in the inspection data submodule; If legal, then carry out next step; Otherwise, start the locking submodule, withdraw from this submodule then;
Ac) according to specified rule, check and whether need registration and checking, if desired, then write register requirement and checking request, and send register requirement and checking request to management center server by the contact number of from the tabulation of management center server contact number, choosing; If do not need, then carry out Al);
Ad) value of current state information is set to be verified;
Ae) value of timer is set to 0;
Af) value with timer adds 1;
Ag) whether check timer greater than designated value, as greater than, then upgrade the abnormal condition information, start the locking submodule, carry out Am then); Otherwise, carry out next step;
Ah) the waiting event manager triggers management center server order detection and processing sub;
Ai) check whether current state information is to be verified, if then carry out next step; Otherwise carry out Al);
Aj) judge whether timer satisfies specified requirements,, retransmit registration/checking request if satisfy; Otherwise, carry out next step;
Ak) calling system function regularly, if reach the fixed time, execution in step Af then); Otherwise carry out Ak);
Al) value of inspection current state information if current state information is the value of locking class, then starts the locking submodule;
Am) withdraw from this submodule.
4. the stolen method of software and hardware that prevents communication condition/function according to claim 2, it is characterized in that: described management center server order detection and processing sub are event-driven modules, call when mobile phone terminal is received the information of sending by communication network identical with the management center server command type; Its workflow is:
Ba) detect the information receive and whether derive from the communicating number that exists in the tabulation of management center server contact number, if not then withdrawing from this submodule, otherwise carry out next step;
Bb) by specified rule information is decrypted;
Bc) the order composition rule by appointment extracts corresponding data from information;
Bd) legitimacy of verification command does not withdraw from this submodule if conform to rule, otherwise carries out next step;
Be) carry out Bf);
Bf) according to command information that extracts and the tabulation of the command id in data submodule recognition command kind, carry out predetermined operation by the order kind.
5. the stolen method of software and hardware that prevents communication condition/function according to claim 4 is characterized in that: order kind step Bf) and respective specified operation are as follows:
If have indication to upgrade the item of information of verification msg in the command information, then replace current verification msg with new verification msg;
If confirm the class order, then the value of current state information is set to normally; If current contact number is then read in the accreditation verification order again, and it is added in the communicating number history list; Then, withdraw from this submodule;
If the order of locking class, then the value with current state information is made as locking, and upgrades the abnormal condition information; If report the loss lock command, use the more owner of lost property's contact number in the new data submodule of owner of lost property's contact number of from command information, extracting again; Start the locking submodule; Then, withdraw from this submodule;
The class order if unlock checks then whether this order is corresponding with the value of current state information, if corresponding, then the value of current state information is set to normally, and closes the locking submodule; Withdraw from this submodule then; Otherwise directly withdraw from this submodule;
If upgrade current verification msg order, then the value of current state information is set to normally, replaces current verification msg with the verification msg that extracts again from order; Then, withdraw from this submodule;
If also include other and the irrelevant information of order in the command information, then before withdrawing from, these information carried out assigned operation.
6. the stolen method of software and hardware that prevents communication condition/function according to claim 2 is characterized in that: the workflow of described endpoint registration/checking request respond module is:
Da) record sends the communicating number of this solicited message and the time of receiving this solicited message, and according to specified rule, extracts corresponding item of information from this solicited message; In the terminal essential information, search the essential information record of this mobile phone terminal according to mobile phone terminal ID number that extracts again,, then carry out Dc) if do not find corresponding record; Otherwise carry out Db);
Db) solicited message is carried out legitimate verification; Verify the legal Dd that then carries out); Do not conform to rule and carry out Dc);
Dc) carry out assigned operation;
Dd) upgrade current verification msg in the essential information record of this mobile phone terminal with the new verification msg that from solicited message, extracts;
De) upgrade the communicating number of the last use in this mobile phone terminal essential information record; Whether be register requirement, if then add an endpoint registration record, the corresponding information that registration extracts in the management center server database if detecting;
Df) according to preestablishing, judge whether the analysis request source, analyze if desired, then analyze the indicated country /region of communicating number that sends this solicited message, and whether the indicated country /region of designated sale area information is consistent in comparative analysis result and the terminal essential information; If consistent, then carry out Dg), otherwise, assigned operation carried out;
Dg) check the value of current state information in the essential information record of this mobile phone terminal, value according to current state information is upgraded it by specified rule, and write corresponding management center server order, the command id of this order is pressed the specified rule setting according to current state information, the corresponding data of current verification msg in this order for from this solicited message, extracting, if this order is to report the loss lock command, also should add in this order from owner of lost property's contact details of this mobile phone terminal being reported the loss for the last time the record; Send the management center server order that has write to the communicating number that sends this solicited message;
Dh) finishing this calls.
7. the stolen method of software and hardware that prevents communication condition/function according to claim 2, it is characterized in that: the method whether this method provides a kind of checking mobile phone of checking based on the C/S framework to use on unique mobile phone for ID number, its step is as follows:
Preserve current identifying code, corresponding record initial value unanimity in the end message record of mobile phone terminal and server; Mobile phone terminal sends the checking request to server under particular cases, comprise new identifying code and current identifying code in the checking request; New identifying code is one group of irregular data, and not identical with current identifying code; Whether server is consistent with the current identifying code in the counterpart terminal information record by the current identifying code of checking and verifying in the request, judge whether mobile phone terminal ID is abused, if unanimity then do not abused is upgraded current identifying code in the counterpart terminal information record with the new identifying code in the checking request; If inconsistent, then abused; Then, send auth response, include the information of whether being abused for mobile phone terminal ID number in the auth response to mobile phone terminal; After mobile phone terminal is received corresponding auth response, according to next step operation of information and executing of whether being abused for the mobile phone terminal ID in the auth response number.
8. the stolen method of software and hardware that prevents communication condition/function according to claim 7 is characterized in that: use following method to realize fault-tolerant ability:
Whether add the successful identifier of request in the data submodule of terminal software and hardware, it is successful to be used to identify registration/checking request last time; Add the backup verification msg in the management center server database terminal essential information; If the terminal software and hardware is not to communicate by letter in the connection session mode with management center server, then also should in the data submodule of terminal software and hardware, add request ID, be used to identify specific registration/checking request;
Ask successful identifier initial value for successful; The terminal software and hardware is produced request ID by specified rule when writing registration/checking request; Then, to ask successful identifier, current verification msg, request to write registration/checking request for ID number, and will upgrade for the request ID in the data submodule number, and must guarantee that above-mentioned data do not change in this process, as adopting exclusive mode to carry out read-write operation, in the time of also can requiring management server order detection and processing sub that data are read and write, must finish with exclusive mode;
After writing registration/checking request, it is issued management center server, after the transmission, the success of the request in data submodule identifier is revised as not success; Management center server is received registration/checking request, finds corresponding terminal software and hardware essential information record in database, detects the request success identifier that extracts from request;
If ask successful identifier, then verify the legitimacy of request with the current verification msg in the terminal essential information record for successful; If asking successful identifier is not success, then the legitimacy of asking with the backup verification msg checking in the terminal essential information record;
If it is legal to ask, check once more earlier that then whether the successful identifier of request is for successful, if then upgrade the backup verification msg with current verification msg; Then, upgrade current verification msg with the new verification msg that extracts;
If ask illegally, then do not upgrade verification msg;
Before terminal software and hardware commands in return, request ID number of extracting and current verification msg are added in the management center server order;
After the terminal software and hardware is received the management center server order, earlier check whether ask the id information item,, inconsistently then abandon this order if having then whether in request ID number of relatively extracting and the data submodule request ID number be consistent; Unanimity is then done further processing, and for example: it is successful to ask successful identifier to be set to, and upgrades current verification msg with new verification msg, carries out the operation of management center server order correspondence then; If command id is accreditation verification or the order of demonstration validation class, and do not have request id information item in the order, then abandon this order;
If the terminal software and hardware is to communicate by letter in the connection session mode with management center server, then can adds and not verify request ID.
9. the stolen method of software and hardware that prevents communication condition/function according to claim 7, it is characterized in that: this method provides a kind of server to set up method for communicating with the dynamic IP addressing terminal: when management center server initiatively with the mobile phone that uses dynamic IP addressing, Personal Handyphone System, when the PDA Terminal Type is communicated by letter, can dial its telephone number earlier or send note, notify it to be connected with server; After terminal has notice, initiatively send connection request and set up communication to management center server; Phone incoming call in this way, then terminal is refused the incoming call of management center server earlier when management center server sends connection request.
10. the stolen method of software and hardware that prevents communication condition/function according to claim 7 is characterized in that: use following method to realize fault-tolerant ability:
In the data submodule of terminal software and hardware, add identifying code access times information and request ID; Add identifying code access times information and backup verification msg in the management center server database terminal essential information;
The terminal software and hardware is produced request ID by specified rule when writing registration/checking request; Then, to ask successful identifier, current verification msg, request to write registration/checking request for ID number, and will upgrade for the request ID in the data submodule number, and must guarantee that the above-mentioned data in the internal memory do not change in this process, as adopting exclusive mode to carry out read-write operation, in the time of also can requiring management server order detection and processing sub that data are read and write, must finish with exclusive mode; The identifying code access times are added 1;
Whether management center server is received registration/checking request, finds corresponding terminal software and hardware essential information record in database, legal according to following rule judgment request:
The identifying code access times that relatively extract from solicited message deduct the difference of regulation initial value and 1 relation;
If it is less than 1, then illegal;
If equal 1, then whether the current verification msg that goes out of Detection and Extraction is consistent with current verification msg in this terminal software and hardware essential information record, if unanimity is then legal, inconsistent then illegal;
If difference, checks that the identifying code access times that extract whether greater than the identifying code access times in this terminal software and hardware essential information record, if be not more than, then are illegal greater than 1; If whether consistent greater than, the current verification msg that Detection and Extraction go out with backup verification msg in this terminal software and hardware essential information record, if inconsistent then illegal; If consistent, then legal:
If it is legal to ask, then earlier check that once more the identifying code access times that extract deduct the difference of regulation initial value and 1 relation from solicited message, if equal, then upgrade the backup verification msg with current verification msg, and the identifying code access times in this terminal software and hardware essential information record are set to initial value and add 1, otherwise, the identifying code access times in this terminal software and hardware essential information record are added 1;
Then, upgrade current verification msg with the new verification msg that extracts;
If ask illegally, then do not upgrade verification msg;
Before terminal software and hardware commands in return, request ID number of extracting and current verification msg are added in the management center server order;
After the terminal software and hardware is received the management center server order, earlier check whether ask the id information item,, inconsistently then abandon this order if having then whether in request ID number of relatively extracting and the data submodule request ID number be consistent; Consistent, then whether the current verification msg in the sense command is consistent with current verification msg in the data submodule, inconsistently then abandon this order, unanimity is then upgraded current verification msg with new verification msg, carries out the operation of management center server order correspondence then; If command id is accreditation verification or the order of demonstration validation class, and do not have request id information item in the order, then abandon this order.
CNB2006102010963A 2005-11-16 2006-11-16 System and method for preventing software and hardware with communication condition / function from being embezzled Expired - Fee Related CN100452908C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006102010963A CN100452908C (en) 2005-11-16 2006-11-16 System and method for preventing software and hardware with communication condition / function from being embezzled

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CNA200510096358XA CN1764106A (en) 2005-11-16 2005-11-16 System and method for preventing software and hardware with communication condition/function against embezzlement
CN200510096358.X 2005-11-16
CNB2006102010963A CN100452908C (en) 2005-11-16 2006-11-16 System and method for preventing software and hardware with communication condition / function from being embezzled

Publications (2)

Publication Number Publication Date
CN1960553A true CN1960553A (en) 2007-05-09
CN100452908C CN100452908C (en) 2009-01-14

Family

ID=38071997

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006102010963A Expired - Fee Related CN100452908C (en) 2005-11-16 2006-11-16 System and method for preventing software and hardware with communication condition / function from being embezzled

Country Status (1)

Country Link
CN (1) CN100452908C (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009049456A1 (en) * 2007-10-16 2009-04-23 Zte Corporation Method and system of managing a lost terminal
CN101552999A (en) * 2009-04-03 2009-10-07 厦门敏讯信息技术股份有限公司 Method for realizing anti-false machine
CN101800748A (en) * 2009-02-06 2010-08-11 株式会社东芝 Security strengthening device
CN101730276B (en) * 2008-10-31 2012-05-30 Tcl集团股份有限公司 Anti-counterfeiting method for network terminal device
CN103686667A (en) * 2013-12-13 2014-03-26 北京奇虎科技有限公司 Method and device for inquiring state of terminal
CN103702315A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Stolen terminal processing method and equipment
CN103702314A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Stolen terminal processing method and equipment
CN105828320A (en) * 2016-03-14 2016-08-03 乐视移动智能信息技术(北京)有限公司 Locking method and system of mobile terminal
US10078765B2 (en) 2013-12-13 2018-09-18 Beijing Qihoo Technology Company Limited Method and device for processing stolen terminal
CN112566098A (en) * 2020-11-27 2021-03-26 中国联合网络通信集团有限公司 Identification information verification method and server
CN112954688A (en) * 2021-02-04 2021-06-11 中国联合网络通信集团有限公司 Communication identifier verification method, server and core network equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100464319B1 (en) * 2002-11-06 2004-12-31 삼성전자주식회사 Network architecture for use in next mobile communication system and data communication method using the same
CN1186723C (en) * 2003-01-29 2005-01-26 西安海星现代科技股份有限公司 Dynamic password identity authentication system applicable to network based on software token
JP2005109823A (en) * 2003-09-30 2005-04-21 Nec Corp Layer 2 switch device, radio base station, network system and radio communication method
CN100502599C (en) * 2003-10-10 2009-06-17 高延飞 Security management method for mobile phone
CN100388835C (en) * 2003-11-21 2008-05-14 华为技术有限公司 Method of identifying legalness of mobile terminal user
CN1662028A (en) * 2005-01-01 2005-08-31 周文伟 System for tracking information of losing handset and tracking method

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009049456A1 (en) * 2007-10-16 2009-04-23 Zte Corporation Method and system of managing a lost terminal
CN101730276B (en) * 2008-10-31 2012-05-30 Tcl集团股份有限公司 Anti-counterfeiting method for network terminal device
CN101800748A (en) * 2009-02-06 2010-08-11 株式会社东芝 Security strengthening device
CN101800748B (en) * 2009-02-06 2013-03-27 株式会社东芝 Security strengthening device
CN101552999A (en) * 2009-04-03 2009-10-07 厦门敏讯信息技术股份有限公司 Method for realizing anti-false machine
CN103702315A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Stolen terminal processing method and equipment
CN103686667A (en) * 2013-12-13 2014-03-26 北京奇虎科技有限公司 Method and device for inquiring state of terminal
CN103702314A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Stolen terminal processing method and equipment
CN103702314B (en) * 2013-12-13 2016-11-23 北京奇虎科技有限公司 The processing method of stolen terminal and equipment
CN103702315B (en) * 2013-12-13 2016-11-23 北京奇虎科技有限公司 The processing method of stolen terminal and equipment
US10078765B2 (en) 2013-12-13 2018-09-18 Beijing Qihoo Technology Company Limited Method and device for processing stolen terminal
CN105828320A (en) * 2016-03-14 2016-08-03 乐视移动智能信息技术(北京)有限公司 Locking method and system of mobile terminal
CN112566098A (en) * 2020-11-27 2021-03-26 中国联合网络通信集团有限公司 Identification information verification method and server
CN112954688A (en) * 2021-02-04 2021-06-11 中国联合网络通信集团有限公司 Communication identifier verification method, server and core network equipment
CN112954688B (en) * 2021-02-04 2022-10-28 中国联合网络通信集团有限公司 Communication identifier verification method, server and core network equipment

Also Published As

Publication number Publication date
CN100452908C (en) 2009-01-14

Similar Documents

Publication Publication Date Title
CN1960553A (en) System and method for preventing software and hardware with communication condition / function from being embezzled
CN1764106A (en) System and method for preventing software and hardware with communication condition/function against embezzlement
CN1266875C (en) Content issuing/receiving method
CN1266560C (en) Enhanced quality of identification in a data communications network
CN1542584A (en) Program electronic watermark processing apparatus
CN1914591A (en) Secure device, terminal device, gate device, and device
CN1220953C (en) Retrieving plain-text passwords from main registry by plurality of foreign registries
CN1324487C (en) Data storing device
CN1878176A (en) Apparatus management system
CN1365472A (en) A shared registrations system for registration and using relative domain names
CN101051292A (en) Reliable U disc, method for realizing reliable U disc safety and its data communication with computer
CN1922600A (en) User authentication system and data providing system using the same
CN1788263A (en) Login system and method
CN1430140A (en) Equipment and method for limitting contents access and storage
CN1575580A (en) Portability and privacy with data communications network browsing
CN1571959A (en) Information processing device, information processing method, and computer program
CN1579080A (en) User access control to distributed resources on a data communications network
CN1496628A (en) Content delivery system
CN1691578A (en) A method of self validity verification for an equipment
CN1689367A (en) Security and privacy enhancements for security devices
CN1579079A (en) Enhanced privacy protection in identification in a data communications network
CN1723426A (en) Software execution control system and software execution control program
CN1449540A (en) Method and system of securely collecting, storing, and transmitting information
CN1283040A (en) Method and system of distributing multimedia data using management information
CN1361882A (en) Methods and apparatus for protecting information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090114

Termination date: 20131116