CN2464030Y - Enciphered mobile telephone set - Google Patents

Enciphered mobile telephone set Download PDF

Info

Publication number
CN2464030Y
CN2464030Y CN00238098U CN00238098U CN2464030Y CN 2464030 Y CN2464030 Y CN 2464030Y CN 00238098 U CN00238098 U CN 00238098U CN 00238098 U CN00238098 U CN 00238098U CN 2464030 Y CN2464030 Y CN 2464030Y
Authority
CN
China
Prior art keywords
mobile phone
utility
model
fuselage
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN00238098U
Other languages
Chinese (zh)
Inventor
凌立功
吴亮
赵叔锦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
University of Jinan
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Priority to CN00238098U priority Critical patent/CN2464030Y/en
Application granted granted Critical
Publication of CN2464030Y publication Critical patent/CN2464030Y/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The utility model relates to an enciphered mobile phone. In the utility model, a programmable memory stored with body personal identification code and a mobile phone controller are integrated on a piece of chip. The utility model does not need large changes in mobile phone production line and added manufacturing cost. After a mobile phone of the utility model is lost, robbed or stolen, the mobile phone loses use value, so that someone who picks up the mobile phone is willing to return the mobile phone to an owner, which ensures the benefits of the owner. The utility model provides the competitive ability of products and enlarges selling market.

Description

The ciphering type mobile phone
The utility model relates to the mobile phone communications field, relates to be provided with the mobile phone of coded lock in more detail.
The prior mobile phone machine mainly is made of display screen, keyboard, reception/radiating circuit, antenna, controller, loudspeaker, microphone, programmable storage and random asccess memory, SIM card etc., Fig. 1 is a kind of block diagram of existing mobile phone machine, and prior mobile phone machine (to call mobile phone in the following text) mainly is made of display screen 1, keyboard 2, reception/radiating circuit 3, antenna 4, controller 5, loudspeaker 6, microphone 7, programmable storage/random asccess memory 8, SIM card 9.Controller 5 comprises coder/decoder 5 (1), D/A converter 5 (2), A/D converter 5 (3), CPU5 parts such as (4), display screen 1, keyboard 2, reception/radiating circuit 3, loudspeaker 6, microphone 7, programmable storage/random asccess memory 8, SIM card 9 are connected with controller 5, and antenna 4 is connected with reception/radiating circuit 3.The operation principle of mobile phone is as follows:
Standby: after the start, the channel carrier wave of Broadcast Control Channel searched for and receives by mobile phone by antenna 4, reception/radiating circuit 3, coder/decoder 5 (1) under the control of controller 5, find the strongest one, both nearest wireless telecommunications office cellular station base station (calling the base station in the following text) with mobile phone, by reading the frequency correction channel in the Broadcast Control Channel, frequency synthesizer and the carrier wave of coordinating oneself are synchronous fully.On this frequency, read information in synchronizing channels, solve base station identity code, and when being synchronized to ultrahigh speed on many minutes location frame numbers, guaranteed that mobile phone and radio network (calling system in the following text) are synchronous in time.Check that whether Broadcast Control Channel is from the Public Land Mobile Nerwork of the SIM card operator on this mobile phone or the mobile network country code and the network code name of permission use.Mobile phone sends registration and inserts solicited message on Random Access Channel, system is standalone dedicated control channel of handset allocation by Access granted Channel AGCH, finish login at standalone dedicated control channel, sending information such as power controlling size and Timing Advance on the STOCHASTIC CONTROL channel at a slow speed.So far, mobile phone just performs the preparation of replying or making a call, and constantly adjusts the state of mobile phone by monitoring Broadcast Control Channel and Common Control Channel.
Make a call: mobile phone passes through coder/decoder 5 (1) under the control of controller 5, reception/radiating circuit 3, antenna 4 sends call request on Random Access Channel, it is standalone dedicated control channel of handset allocation by Access granted Channel AGCH that system receives the request back, through a series of exchange message, Traffic Channel of system's reallocation, call number is desired in keyboard 2 inputs, and on display 1, show for confirmation, data in encoded/decoder 5 (1) and SIM card 9 and the mobile phone synthesizes and has dialling the number of calling party and called party information, through reception/radiating circuit 3 be modulated into radio carrier on Traffic Channel by antenna transmission to the base station, base station decodes goes out calling party and called number, with the calling party information keeping records, called number is sent to callee's phone and sets up physical connection with it via telephone or wireless communication networks.
Called: caller/called both sides' telephone number of delivering to the base station via telephone or wireless communication networks, system is by the paging channel calling handset, mobile phone is replied on Random Access Channel, system is standalone dedicated control channel of handset allocation by Access granted Channel AGCH, through a series of exchange message, Traffic Channel of system's reallocation, again calling party's telephone number is encoded and send called mobile phone by Traffic Channel, after the reception/radiating circuit 3 of called mobile phone receives signal, translate the calling party phone number and be presented at the main decision of display screen 1 first-class standby by coder/decoder 5 (1) and whether answer.
Conversation: under the effect of controller 5, the speech of mobile phone side is through microphone 7, A/D converter 5 (3), coder/decoder 5 (1), reception/radiating circuit 3, antenna 4, the base station receives, the physical connection of setting up via Traffic Channel and the other side's phone arrives the other side's telephone set, and the other side's speech is via the other side's telephone set, the physical connection that the other side's phone and base station are set up, the D/A of base station and A/D converter, the coding of base station, the transmitting antenna of base station, the antenna 4 of mobile phone, reception/radiating circuit 3, coder/decoder 5 (1), D/A converter 5 (2) arrives the loudspeaker 6 of mobile phone.
In order to realize function of keeping secret, existing mobile phone is preserved some groups of passwords in programmable storage/random asccess memory 8 and SIM card 9, wherein:
First group: password is kept in programmable storage/random asccess memory 8, and for machine instigator usefulness, purpose is to prevent that other people from illegally changing the mobile phone setting.
Second group: Personal Identification Number (PIN), also call off the secret sign indicating number, be kept in the SIM card 9, for machine instigator usefulness, purpose is to prevent that other people from illegally usurping, and each start all needs to use, and most machine masters are unwilling to use.
The 3rd group: Personal Identification Number (PIN2), be kept in the SIM card 9, for machine instigator usefulness, be used for setting some specific function (as ticketed call time and expense, long-distance call restriction etc.).
The 4th group: personal unblocking key (PUK), be kept in the SIM card 9, use, be used for removing because of machine master misoperation or lose Personal Identification Number (PIN) and use when causing lock machine for machine master, distributors or maintenance personal, generally do not offer the machine master, in case cause unnecessary trouble after the change.
The 5th group: personal unblocking key (PUK2), be kept in the SIM card 9, use for machine master, distributors or maintenance personal, be used for removing because of machine master misoperation or lose Personal Identification Number (PIN2) and use when causing lock machine, generally do not offer the machine master.
There is following shortcoming in existing mobile phone:
1, above-mentioned respectively the group in the password, first group of password can crack and rewrite by equipment such as omnipotent read write lines, perhaps rewrites cell phone password by changing the programmable storage/random asccess memory of preserving password.If hand-set from stolen or lose, after cracking and rewrite with equipment such as omnipotent read write lines, or after changing the programmable storage/random asccess memory of preserving password, mobile phone can be used again.Therefore sell some illegal distributors as long as will pick up the mobile phone that obtains or the mobile phone of theft, can change hands away after the deciphering, this mobile phone is unlikely returns, and causes machine master loss.
2, second group to the 5th group password exists in the SIM card, can only pin the SIM card of mobile phone, and after the replacing SIM card, mobile phone just can normally use, and this password can prevent other people free call on sb. else's expense through illegal means, and avoids bearing the huge telephone charges that causes because of free call on sb. else's expense through illegal means; If but mobile phone is lost or stolen robbing, then mobile phone is difficult to return, and causes heavy losses.
3, this mobile phone lose or stolen after the loss that causes be not only the loss of handset, also have and lose the machine master of making because of data such as mobile phone EMS memory telephone numbers and lose contacts with overseas parties and cause immeasurable loss.
4, in Europe, mobile phone has become people's electronic personal identity card (integrating social insurance, identity card, credit card, bank book and passport) gradually, in case stolen the thing of robbing back dried harm more society by the lawless person, the machine master also will bear legal responsibility except will bearing economy, emotional distress.
The purpose of this utility model is the defective at the prior art existence, a kind of ciphering type mobile phone is provided, make any people who does not know password all can not change password or cancellation coded lock, winner or the robber person of robbing can't change hands mobile phone and make a profit, and ensure mobile phone machine master's interests to greatest extent.
Ciphering type mobile phone of the present utility model is that programmable storage and the cell phone controller that will have fuselage individual identification password is integrated on the chip piece.
Ciphering type mobile phone of the present utility model can be finished encryption and decryption to fuselage by being increased in subprogram in original control program.
Above-mentioned programmable storage can be a programmable storage that increases in existing mobile phone, is arranged to the memory space of fuselage individual identification password.
Above-mentioned programmable storage can also be original programmable storage in the existing mobile phone, unappropriated memory space is wherein told the memory space of fuselage individual identification password.
Above-mentioned programmable storage can also be the capacity increase with original programmable storage in the existing mobile phone, tells the memory space of fuselage individual identification password.
Ciphering type mobile phone of the present utility model cooperates control corresponding software, just can make handset have the call out function of forbidding.
Ciphering type mobile phone of the present utility model, the programmable storage and the controller that are provided with the memory space of fuselage individual identification password are integrated on the chip piece, controller is the most important and expensive component of mobile phone, decipher or cancel just changer controller more of coded lock, have only mobile-phone manufacturers just can accomplish.
The utility model can be integrated in programmable storage and controller on the chip piece by modes such as mask, thick film, films.
Ciphering type mobile phone of the present utility model is realized function of keeping secret in the following way:
Directly input fuselage individual identification password by dialing keyboard, fuselage individual identification password deposits the special fuselage individual identification password memory space that is provided with in the programmable storage in, has a password flag bit (bit) to be used for identification at this fuselage individual identification password memory space and has been provided with or has not been provided with password.The enciphering/deciphering program embeds in the mobile phone Control Software.
1, fuselage individual identification password is selected by holder oneself, and password is a numeral, and the fuselage individual identification password of setting must be confirmed.
2, can import a locking word that is deposited with in random asccess memory or the electro erasible programmable memory again after the input of fuselage individual identification password, constitute multiple variable locking mode, its function is to automatically lock through certain or setting-up time after setting is unblanked again.Lock mode can be changed at any time, is as the criterion with last input.
3, can utilize fuselage individual identification password to make remote control locking fuselage by other telephone sets, can only receive after the mobile phone locking, exhalation be limited.
The utility model compared with prior art has following advantage:
1, ciphering type mobile phone of the present utility model, fuselage individual identification password is deposited in the memory space of the fuselage individual identification password of programmable storage, only need the semiconductor chip manufacturer to be integrated in this programmable storage and controller on the chip piece or use discrete component, and a small amount of encrypt/decrypt control program of increase gets final product on former mobile phone control program, need not do big the change to existing handset production line, for production in enormous quantities, basically need not increase production cost, simple and easy to do.
2, because ciphering type mobile phone of the present utility model realizes that self-timing locks and remote control locks, make mobile phone lose use value after stolen losing to be robbed, make the winner be willing to give back the machine master, obtain fair return.Machine master's interests have also been ensured simultaneously.
3, because of ciphering type mobile phone of the present utility model has function of keeping secret preferably, the competitiveness of product is provided and has enlarged the selling market, economic benefit and social benefit are obvious.
4, because ciphering type mobile phone of the present utility model has special function of keeping secret, make the stepping back of stealing the person's of robbing prestige, the winner is willing to and the machine master gets in touch, thereby forms a kind of not pocketing the money one picks up, do not steal, do not rob the social condition of mobile phone, help improving social security and social spirit civilization construction.
Fig. 2 is the block diagram of ciphering type mobile phone of the present utility model.
Fig. 3 is the encipheror flow chart of Fig. 2.
Fig. 4 is the decrypted program flow chart of Fig. 2.
Fig. 5 is the remote control of Fig. 2 program flow diagram that locks.
Fig. 6 is the programmable storage/random asccess memory 8 and controller 5 connecting circuit schematic diagrams of Fig. 2.
Below by embodiment and accompanying drawing the utility model is done further narration.
Embodiment
As shown in Figure 2, ciphering type mobile phone of the present utility model is made of display screen 1, keyboard 2, reception/radiating circuit 3, antenna 4, controller 5, loudspeaker 6, microphone 7, programmable storage/random asccess memory 8, SIM card 9.Controller 5 comprises coder/decoder 5 (1), D/A converter 5 (2), A/D converter 5 (3), CPU5 parts such as (4), display screen 1, keyboard 2, reception/radiating circuit 3, loudspeaker 6, microphone 7, programmable storage/random asccess memory 8, SIM card 9 are connected with controller, antenna 4 is connected with reception/radiating circuit 3, and the programmable storage 8 that has fuselage individual identification password is integrated on the chip piece with controller.
Programmable storage/random asccess memory 8 is integrated on the block semiconductor chip by mask with controller in this example.This programmable storage/random asccess memory 8 is original in the mobile phone, unappropriated memory space in the programmable storage is told the memory space of fuselage individual identification password.
The encipheror flow process as shown in Figure 3.Encipheror embeds in the mobile phone Control Software.During encryption, directly input fuselage individual identification password by dialing keyboard, fuselage individual identification password deposits the special fuselage individual identification password memory space that is provided with in the programmable storage in, has a password flag bit (bit) to be used for identification at this fuselage individual identification password memory space and has been provided with or has not been provided with password.This fuselage individual identification password is selected by holder oneself, and password is a numeral.The encipheror flow process is schemed to realize as follows:
The 1st step: process begins.
The 2nd step: from PROM, read fuselage PIN encryption indicator position.
The 3rd step: judge to have or not the fuselage PIN? if any then changeing for the 5th step, go on foot otherwise carry out the 4th.
The 4th step: show " encrypting now? " printed words, the 6th step of redirect.
The 5th step: show " change password? " printed words.
The 6th step: wait for that the keyboard input " is/deny ".
The 7th step: judge and answer that "Yes" then carried out for the 8th step, "No" is the 15th step of redirect then.
The 8th step: show " please import the fuselage PIN " printed words.
The 9th step: the numeric string of waiting for keyboard input fuselage PIN.
The 10th step: show " please importing the fuselage PIN once more " printed words.
The 11st step: the numeric string of waiting for keyboard input fuselage PIN.
The 12nd step: the fuselage PIN contrast of twice input.
The 13rd step: whether identical? "Yes" carried out for the 14th step, and "No" is 15 steps of redirect then.
The 14th step: preserve the fuselage PIN and encrypted bits is set.
The 15th step: process finishes to return to call the place.
The decrypted program flow process adds dense program and embeds in the mobile phone Control Software as shown in Figure 4.After the input of fuselage individual identification password, import a locking word that is deposited with in random asccess memory/electro erasible programmable memory again, its function is to automatically lock through certain or setting-up time after setting is unblanked again.Lock mode can be changed at any time, is as the criterion with last input.Decrypted program is realized as follows:
The 1st step: process begins.
The 2nd step: judge whether is time of opening last time between password failure and this call request 〉=value that the timer of starting shooting sets? "Yes" then carried out for the 3rd step, and "No" then jumped to for the 14th step.
The 3rd step: judge whether is time of opening last time between password and this call request 〉=value that the lock mode word sets? "Yes" then carried out for the 4th step, and "No" then jumped to for the 15th step.
The 4th step: show " please import the fuselage PIN " printed words.
The 5th step: the numeric string of waiting for keyboard input fuselage PIN.
The 6th step: judge just whether the fuselage PIN of input correct? "Yes" then carried out for the 7th step, and "No" judges then that the fuselage PIN of input error has or not and reach 5 times, and "Yes" then jumped to for the 13rd step, and "No" then jumped to for the 4th step.
The 7th step: show " setting or revise the lock mode word? " printed words.
The 8th step: wait for that the keyboard input " is/deny ".
The 9th step: judge and answer that "Yes" then carried out for the 10th step, "No" is the 12nd step of redirect then.
The 10th step: wait for keyboard input lock mode word.
The 11st step: preserve the lock mode word.
The 12nd step: record current time, the 15th step of redirect.
The 13rd step: record current time, sign fuselage PIN input failure.
The 14th step: enter holding state.
The 15th step: process finishes to return to call the place.
As shown in Figure 5, the remote control program that locks realizes as follows:
The 1st step: process begins.Annotate: when receiving the lock machine request flag, enter this processing procedure as the double-audio signal of " # " or " * " number.
The 2nd step: begin to receive password, up to receiving fuselage PIN end mark.
The 3rd step: double-tone frequency-digital translation.
The 4th step: record current time, sign fuselage PIN input failure.
The 5th step: enter holding state.
The 6th step: process finishes to return to call the place.
As shown in Figure 6, be on MOTOROLA GC87 type GSM mobile handset, to carry out improved partial circuit figure, as shown in the figure, on the mobile phone controller CPU, increase a slice PROM, address bus, the data/address bus of PROM are connected with cpu address bus, data/address bus respectively, the a certain address blank section E/P of chip select line OE ground connection location decoder connects the end that reads of CPU, and VPP connects program voltage when writing password for the first time, only be connected with the VCC power supply later on.

Claims (2)

1, a kind of ciphering type mobile phone is characterized in that it being that programmable storage and cell phone controller with there being fuselage individual identification password is integrated on the chip piece.
2, ciphering type mobile phone according to claim 1 is characterized in that programmable storage is the programmable storage that increases in the existing mobile phone, is arranged to the memory space of fuselage individual identification password.
CN00238098U 2000-08-26 2000-08-26 Enciphered mobile telephone set Expired - Fee Related CN2464030Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN00238098U CN2464030Y (en) 2000-08-26 2000-08-26 Enciphered mobile telephone set

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN00238098U CN2464030Y (en) 2000-08-26 2000-08-26 Enciphered mobile telephone set

Publications (1)

Publication Number Publication Date
CN2464030Y true CN2464030Y (en) 2001-12-05

Family

ID=33599221

Family Applications (1)

Application Number Title Priority Date Filing Date
CN00238098U Expired - Fee Related CN2464030Y (en) 2000-08-26 2000-08-26 Enciphered mobile telephone set

Country Status (1)

Country Link
CN (1) CN2464030Y (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1321379C (en) * 2003-07-03 2007-06-13 扬智科技股份有限公司 Programmable controlled data handling equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1321379C (en) * 2003-07-03 2007-06-13 扬智科技股份有限公司 Programmable controlled data handling equipment

Similar Documents

Publication Publication Date Title
AU2002230306B2 (en) Method for enabling PKI functions in a smart card
CN1123243C (en) Encrypted broadcast messages in cellular communications system
CN101583124B (en) Authentication method and system of subscriber identity module and terminal
CN100559800C (en) Honeycomb telephone device and method
CN1331371C (en) Method for delocking mobile phone radio communication terminal
CN101141718B (en) Mobile terminal card-locking method
US7992006B2 (en) Smart card data protection method and system thereof
CN101895605B (en) Method and device for communication based on pseudo-contact information
CN102006358A (en) Mobile phone private communication management system and method
US8027665B2 (en) System and method for protecting data in a synchronized environment
CN101076190A (en) Management of authentication keys in a mobile communication system
CN201178476Y (en) Mobile phone without need of inserting customer recognition card
JPH08265843A (en) Message transferring device for audio and data processing communication network
CN1142307A (en) Secure radio personal communications system and method
CN102209318A (en) Real-time mobile phone encrypted conversation method and device based on intelligent TF (Transflash) card
CN101409881A (en) Secrecy apparatus and method for mobile phone data
CN1295774A (en) System and method for authenticating cellular subscriber at registration
US20030181219A1 (en) Method of indicating unauthorized use of a mobile terminal
CN100574345C (en) Be used for the method and apparatus that anonymity call is set up
CN1684411A (en) Method for verifying user's legitimate of mobile terminal
TWI280770B (en) System against illegal use of mobile phone
CN101355740B (en) Method and system for protecting smart card data
CN2464030Y (en) Enciphered mobile telephone set
CN1471326A (en) Method of wireless link encrypting aglorithm for autonomous selective secret communication
CN100429957C (en) Indentifying method for telecommunication smart card and terminal

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee