WO2012022080A1 - 移动终端锁定处理方法、移动终端及网络侧 - Google Patents
移动终端锁定处理方法、移动终端及网络侧 Download PDFInfo
- Publication number
- WO2012022080A1 WO2012022080A1 PCT/CN2010/078844 CN2010078844W WO2012022080A1 WO 2012022080 A1 WO2012022080 A1 WO 2012022080A1 CN 2010078844 W CN2010078844 W CN 2010078844W WO 2012022080 A1 WO2012022080 A1 WO 2012022080A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- command
- locking
- processing
- network side
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
Definitions
- the present invention relates to the field of communications, and in particular to a mobile terminal locking processing method, a mobile terminal, and a network side.
- BACKGROUND In recent years, with the development of mobile terminal technologies and the continuous increase of operators' services, operators in order to maintain user groups will seize activities for freely giving terminals, but these activities are specifically targeted at certain customer groups, but in the gift After the terminal, there is a phenomenon that the gifted terminal is used to use the card of another carrier, so in order to prevent this phenomenon from occurring, it is necessary to make a lock on the terminal. This operation is the lock machine. When the mobile terminal completes the operation of locking to a specific card, the mobile terminal is required to use only this specific card, and other cards cannot be used normally on the terminal.
- the mobile terminal in order to lock the mobile terminal, the mobile terminal is usually locked to a preset number segment, for example, the mobile communication company customizes its customized mobile terminal to the mobile communication company license number segment, but the lock is It is a joint production between the operator and the mobile terminal manufacturer.
- the software firmware version of the mobile terminal to the carrier number segment, when the user needs to unlock or lock the mobile terminal, the user must pass the flashing machine. All firmware versions on the mobile terminal are updated, resulting in the loss of original information on the mobile terminal. If the brush is improperly installed, the result of damaging the mobile terminal may also be caused.
- a main object of the present invention is to provide a mobile terminal locking processing method, a mobile terminal, and a network side, to solve the problem that the user data is lost or even damaged by the mobile terminal locking processing by the brushing machine in the related art.
- a mobile terminal lock processing method is provided.
- the mobile terminal locking processing method of the present invention includes: the mobile terminal acquiring a command of the mobile terminal locking process; and performing a locking processing operation on the mobile terminal according to the command of the mobile terminal locking processing.
- the acquiring, by the mobile terminal, the mobile terminal locking processing command includes: the mobile terminal acquiring a command sent by the network side for performing the mobile terminal locking process; or the mobile terminal acquiring a command input by the user for performing the mobile terminal locking process. Further, before the mobile terminal acquires the command for performing the mobile terminal locking process sent by the network side, the method further includes: generating, by the network side, a command of the mobile terminal locking process, and encapsulating the mobile terminal locking processing command; The internet or mobile communication network transmits the encapsulated mobile terminal lock processing command to the mobile terminal.
- the acquiring, by the mobile terminal, the command for performing the mobile terminal locking process sent by the network side comprises: the mobile terminal receiving the encapsulated mobile terminal locking processing command, and parsing the encapsulated mobile terminal locking processing command.
- the method further includes: the mobile terminal transmitting the result of the locking processing operation to the network side.
- the locking processing operation includes: locking the machine, closing the locking machine, and querying the locking machine state; ⁇ encapsulating the mobile terminal locking processing command in one of the following encapsulation formats: unstructured supplementary data service (USSD), short message, Wireless Application Protocol ( WAP ) message.
- USB unstructured supplementary data service
- WAP Wireless Application Protocol
- the mobile terminal includes: an obtaining module, configured to acquire a command for locking processing of the mobile terminal; and a processing module, configured to perform a locking processing operation on the mobile terminal according to the command of the mobile terminal locking process.
- the obtaining module includes: a first acquiring submodule, configured to acquire a command sent by the network side for performing mobile terminal locking processing; or a second obtaining submodule, configured to acquire a user operation input for performing mobile terminal locking The command to process.
- the first obtaining submodule includes: a receiving unit, configured to receive the encapsulated mobile terminal locking processing command; and a parsing unit, configured to parse the encapsulated mobile terminal locking processing command.
- the apparatus further includes: a first sending module, configured to send a result of the locking processing operation to the network side.
- a network side includes: a generating module, configured to generate a command for locking processing of the mobile terminal; a packaging module, configured to encapsulate a mobile terminal locking processing command; and a second sending module, configured to use a wireless internet network or
- the mobile communication network sends the encapsulated mobile terminal locking processing command to the mobile terminal; further, the locking processing operation includes: locking the machine, closing the lock machine, and querying the lock state; ⁇ locking the processing command to the mobile terminal by using one of the following encapsulation formats Encapsulation: Unstructured Supplementary Data Service (USSD), Short Message, Wireless Application Protocol ( WAP) messages.
- USSD Unstructured Supplementary Data Service
- WAP Wireless Application Protocol
- the mobile terminal acquires the command of the mobile terminal lock processing; the lock processing operation is performed on the mobile terminal according to the command, and the user data loss caused by the mobile terminal lock processing by the brush machine in the related art is solved.
- the problem of damage to the mobile terminal thereby achieving the effect of improving the user experience.
- FIG. 1 is a schematic diagram of interaction of a mobile terminal, a network side, and a user according to an embodiment of the present invention
- FIG. 2 is a flowchart of a method for locking a mobile terminal according to an embodiment of the present invention
- FIG. 4 is a block diagram showing a preferred structure of a mobile terminal according to an embodiment of the present invention
- FIG. 5 is a block diagram of a network side according to an embodiment of the present invention
- FIG. 7 is a flowchart of a network side setting lock processing according to an embodiment of the present invention
- FIG. 8 is a user side setting lock processing according to an embodiment of the present invention
- Flowchart; and FIG. 9 is a flow chart of a method for implementing a lock machine in accordance with an embodiment of the present invention.
- FIG. 1 is a schematic diagram of interaction between a mobile terminal, a network side, and a user according to an embodiment of the present invention.
- the mobile terminal can connect to the network through the mobile communication network, the wireless Internet connection, or directly interact with the user.
- a mobile terminal locking processing method is provided.
- Step 4 S202, the mobile terminal acquires The mobile terminal locks the processed command; in step S204, the mobile terminal lock processing command performs a lock processing operation on the mobile terminal.
- the mobile terminal performs a lock processing operation on the mobile terminal according to the obtained command of the mobile terminal lock processing, which avoids the loss of user data or the damage of the mobile terminal caused by the mobile terminal lock processing by the brush in the related art in the related art.
- the problem has improved the user experience.
- a preferred embodiment of the mobile terminal acquiring the command of the mobile terminal locking process in step S202 will be described below.
- the mobile terminal acquires a command sent by the network side for performing the mobile terminal locking process.
- the mobile terminal acquires a command input by the user for performing the mobile terminal locking process.
- the mobile terminal can obtain the command of the mobile terminal locking process through the network side in the normal state of the network interaction, and obtain the user of the mobile terminal in the network interaction failure state.
- the operation command for the locking process of the mobile terminal improves the flexibility of obtaining the command and satisfies the customization requirement of the operator for the locking process of the mobile terminal.
- the method further includes: generating, by the network side, a command of the mobile terminal locking process, and encapsulating the mobile terminal locking processing command;
- the internet or mobile communication network transmits the encapsulated mobile terminal lock processing command to the mobile terminal.
- the mobile terminal and the network side are packaged; * The command that can be recognized is transmitted to the mobile terminal, ensuring that the mobile terminal can accurately
- the commands for locking processing of the mobile terminal are parsed, and are transmitted through multiple channels of the wireless internet or the mobile communication network, which improves the reliability of command reception while satisfying the diverse needs of the user.
- the mobile terminal in step S202 acquires a command for performing mobile terminal locking processing transmitted by the network side.
- the mobile terminal parses the encapsulated mobile terminal lock processing command and obtains the encapsulated mobile terminal lock processing command.
- the encapsulated mobile terminal locking processing command is parsed, and the parsing step ensures compatibility between the network side and the mobile terminal for command interaction, and enhances the confidentiality of the command of the mobile terminal locking processing.
- the method further includes: the mobile terminal transmitting the result of the locking processing operation to the network side.
- the locking processing operation comprises: locking the machine, closing the locking machine, and querying the locking machine state; and encapsulating the command of the mobile terminal locking processing by using one of the following encapsulation formats: Unstructured supplementary service data (Unstructured supplementary Service Data, Referred to as USSD), short message, Wireless Application Protocol (WAP) message.
- Unstructured supplementary service data Unstructured supplementary Service Data, Referred to as USSD
- WAP Wireless Application Protocol
- the command of the mobile terminal locking process is encapsulated by the existing encapsulated message type, and the existing message type does not need to be modified, which greatly saves development cost.
- a mobile terminal is also provided.
- FIG. 3 is a structural diagram of a mobile terminal according to an embodiment of the present invention.
- the mobile terminal includes: an obtaining module 32 and a processing module 34.
- an obtaining module 32 is configured to obtain The mobile terminal locks the processing command;
- the processing module 34 is connected to the obtaining module 32, and is configured to perform a locking processing operation on the mobile terminal according to the command of the mobile terminal locking process acquired by the obtaining module 32.
- 4 is a block diagram of a preferred structure of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 4, the mobile terminal further includes a first sending module 42.
- the obtaining module 32 includes: a first obtaining submodule 322 and a second The obtaining sub-module 324; the first obtaining sub-module 322 includes: a receiving unit 3222 and a parsing unit 3224.
- the foregoing structure is described in detail below.
- the obtaining module 32 includes: a first obtaining sub-module 322, configured to acquire a network side sending The command for performing the mobile terminal locking process; or the second obtaining sub-module 324, configured to acquire a command input by the user for performing the mobile terminal locking process.
- the first obtaining sub-module 322 includes: a receiving unit 3222, configured to receive the encapsulated mobile terminal locking processing command; and a parsing unit 3224 connected to the receiving unit 3222, configured to parse the encapsulated mobile terminal locking processing command received by the receiving unit 3222.
- the mobile terminal further includes: a first sending module 42 connected to the processing module, configured to send a result of the locking processing operation processed by the processing module 34 to the network side.
- a network side is provided.
- FIG. 5 is a structural block diagram of a network side according to an embodiment of the present invention. As shown in FIG. 5, the network side includes: a generating module 52, a packaging module 54, and a second The sending module 56 is described in detail below.
- the generating module 52 is configured to generate a command for the mobile terminal locking process.
- the encapsulating module 54 is connected to the generating module 52 for locking the processing command generated by the generating module 52.
- the second sending module 56 is connected to the encapsulating module 54 for transmitting the mobile terminal locking processing command encapsulated by the encapsulating module 54 to the mobile terminal by using a wireless internetwork or a mobile communication network.
- the locking processing operation includes: : Lock the machine, close the lock machine, and query the lock status; ⁇ Encapsulate the mobile terminal lock processing command in one of the following encapsulation formats: Unstructured supplementary data service, short message, and wireless application protocol message.
- the network side (network side console) 6 includes: a console input/output module 62 for initiating a process, sending a setting (or query) lock when the card state is normal and the network is in a normal interaction state.
- a mobile communication network USB, short
- WAP wireless internet
- the mobile terminal 2 includes: a network communication module 28, configured to perform network communication with the network side, and receive an instruction sent by the network side; a terminal instruction maintenance module 26, configured to parse the instruction; and a lock state maintenance module 24, configured to The lock function is turned on/off/inquiring state, and the result of the operation is returned to the network side console for display along the original path; the lock module 22 is used for locking operation.
- the user side includes a user input module 01, which is used to directly operate on the mobile terminal 2 when the card is damaged and cannot be operated from the network side, and interacts with the lock state maintenance module 24 to adjust the lock function to be enabled/ The status is closed/queried, and finally notified to the lock module 22, while the result of the operation is displayed on the mobile terminal.
- Embodiment 2 This embodiment combines Embodiment 1 and a preferred embodiment thereof.
- a method for setting a lock processing on a network side is provided
- FIG. 7 is a network side setting lock according to an embodiment of the present invention.
- the flow chart of the machine processing is described in detail below with reference to FIG. 6 and FIG. 7.
- Step 4 S701, the network side console 62 actively sets or queries the mobile terminal lock function, and issues a setting or query command.
- the network side instruction maintenance module 64 respectively encapsulates instructions that can be recognized by the mobile terminal and the console according to the command issued by the console.
- the instructions may be encapsulated in the following three manners.
- Method 1 Encapsulate into USSD commands.
- the communication module 66 has a USSD SP (access point), supports receiving query and setting commands, and the command format is *SP (access point name) *01 (open setting) *SIM card number #, when the communication module 66 receives the command And sent to the terminal network communication module 28, and the terminal instruction maintenance module 26 parses the command and transmits it to the lock state maintenance module 24.
- Method 2 Encapsulating into a special short message, the communication module 66 has a short message access point (SP), which supports receiving and sending a short message, and receives the short message SP address to distinguish whether the service is in the service, such as a format. *01 (open setting) * The short message of SIM card number # is the query and setting command.
- SP short message access point
- the mode is set to the format *01 (open setting) *SIM card number # is transmitted to the terminal in the form of a short message instruction, and the terminal instruction maintenance module 26 parses the command and transmits it to the lock machine.
- Status maintenance module 24 The third method is encapsulated into a special WAP message, and the message is delivered to the mobile terminal through the related gateway, but the premise is that the communication module 28 of the terminal needs to activate the PDP, and after the activation is successful, the information can be obtained through the wireless network.
- the network communication module 66 transmits the instruction to the communication module 28 of the mobile terminal through a specific communication manner.
- the command is transmitted to the terminal instruction maintenance module for the communication module 28 of the mobile terminal.
- Step S705 parsing the passed instructions for the terminal instruction maintenance module 26, corresponding to the three formats in step S702:
- the second part of the command representing the user's SIM card number.
- Step S706 according to the result of the parsing, the terminal status maintenance module 24 adjusts the lock function on/off/inquiry status, and if the lock status changes, notifies the lock module 22, and if not, does not need to notify.
- the terminal state maintenance module 24 further needs to perform the result of the operation, such as whether the opening is successful, whether the shutdown is successful, and the status query result is encapsulated and returned to the terminal instruction maintenance module 26, and the encapsulation method and the format synchronization are performed S702.
- Step S708 the terminal instruction maintenance module 26 passes the encapsulated instruction to the communication module 28 of the mobile terminal.
- Step S709 the communication module 28 of the mobile terminal transmits the instruction to the network side communication module 66 through a specific communication manner.
- step S710 the network side communication module 66 transmits the command to the network side instruction maintenance module 64 for processing.
- Step S711 the network side instruction maintenance module 64 parses the instruction, and the method and format are the same as step S705, and the parsed result is transmitted to the network side console input/output module 62 to notify the final result of the operation.
- step S712 the network side console input/output module 62 displays the final result of the operation and completes the interaction.
- the command sent by the network side console is encapsulated into an instruction that the terminal can also recognize, and is sent to the mobile terminal through the wireless network, and the mobile terminal is locked, unlocked, updated, and locked.
- Embodiment 3 This embodiment combines Embodiment 1 and a preferred embodiment thereof.
- FIG. 8 is a user side setting lock according to an embodiment of the present invention.
- the flow chart of the machine processing is described in detail below with reference to FIG. 6 and FIG. 8.
- Step S801 The user input module 01 inputs some special instructions to adjust the lock function by manual operation of the mobile terminal by the user.
- Step S802 the lock state maintenance module 24 matches the user's input through the hidden menu command built in the terminal, adjusts the lock function on/off/inquiry state, and if the lock state changes, notifies the lock module 22, if No, no notice is required.
- step S803 the terminal state maintenance module 24 returns the result of the operation to the user, for example: whether the lock open is successful, whether the shutdown is successful, and the status query result is returned to the user, which can be displayed on the terminal.
- Embodiment 4 This embodiment provides a method for implementing a lock machine.
- FIG. 9 is a flowchart of a method for implementing a lock machine according to an embodiment of the present invention. As shown in FIG. 9, the method includes: Step S901: A mobile terminal card is powered on, Start the process of locking the mobile terminal to a card. Step S902: The SIM/USIM card is activated during the startup of the mobile terminal, and the IMSI and ICCID of the current SIM/USIM card are obtained and saved.
- Step S903 Obtain the current lock function status, open or close. If it is off, After the boot process is completed, the process goes to step S907. If it is the open state, it jumps to step S904. Step S904, reading data from a specific area in the mobile terminal. If the data is an invalid value, determining that the terminal has not been locked to a SIM/USIM card, the process goes to step S906. If the data is a valid value, it is determined that the terminal has been locked to a SIM/USIM card, and the process goes to step S905. Step S905, comparing the IMSI and ICCID of the locked SIM/USIM card of the terminal with the IMSI and ICCID of the currently acquired SIM/USIM card.
- step S907 the terminal representing the jt ⁇ is locked on the card, and the process proceeds to the step. S907. If it is inconsistent, it means that the terminal is locked not to the card, and the process goes to step S908.
- step S906 the IMSI and the ICCID of the currently acquired SIM/USIM card are saved to the terminal side, and the data padding of the lock machine is completed, and the process proceeds to step S907.
- step S907 the booting is completed, the network is camped on, the welcome word is displayed, and the process goes to step S909.
- Step S908 prompting the user that the terminal is locked and cannot be used, and the process proceeds to step S909.
- step S909 the process ends.
- the mobile device is directly operated in the state where the network cannot be connected, the lock on the mobile terminal is completed, the lock is unlocked, the lock is updated, and the lock state is checked.
- the command sent by the network side console is encapsulated into an instruction that the terminal can also recognize, sent to the mobile terminal through the wireless network, or directly operated when the network cannot be connected.
- the operation of locking the mobile terminal, unlocking, updating the lock machine, and querying the state of the lock machine is realized. The user body-risk is improved, and the diverse needs of the operator for the customization of the mobile terminal are satisfied.
- modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
- the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
- the invention is not limited to any specific combination of hardware and software.
- the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the scope of the present invention are intended to be included within the scope of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Description
移动终端锁定处理方法、 移动终端及网络侧 技术领域 本发明涉及通信领域, 具体而言, 涉及一种移动终端锁定处理方法、 移 动终端及网络侧。 背景技术 近年来随着移动终端技术的发展和运营商 艮务的不断增长, 运营商为了 维护用户群体, 会釆取无偿赠送终端的活动, 但是这些活动是专门针对某些 客户群体, 但是在赠送终端后, 出现赠送的终端被用来使用其它运营商的卡 的现象, 所以为了防止此现象的发生, 需要对终端做一个锁定。 该操作即锁 机, 当移动终端完成了锁定到某种特定卡的操作后, 要求此移动终端只能使 用此特定的卡, 其它卡无法在此终端上正常使用。 相关技术中, 为了对移动终端进行锁定, 通常釆用将移动终端锁定到预 设的号段, 如移动通信公司将其定制的移动终端定制到移动通信公司许可的 号段中, 但是这种锁定是运营商和移动终端制造商进行联合制作, 其通过将 移动终端出厂的软件固件版本上捆绑指定运营商号段, 当用户需要进行对该 移动终端进行解锁或者锁定更新时, 必须通过刷机, 将原移动终端上的所有 固件版本进行更新, 从而造成移动终端上原有信息的丢失, 如果刷机不当, 还会造成损坏移动终端的后果。 发明内容 本发明的主要目的在于提供一种移动终端锁定处理方法、 移动终端及网 络侧, 以解决上述的相关技术中通过刷机进行移动终端锁定处理造成用户数 据丢失甚至导致移动终端损坏的问题。 为了实现上述目的, 根据本发明的一个方面, 提供了一种移动终端锁定 处理方法。 居本发明的移动终端锁定处理方法包括: 移动终端获取移动终端锁定 处理的命令; 根据移动终端锁定处理的命令对移动终端进行锁定处理操作。
进一步地, 移动终端获取移动终端锁定处理命令包括: 移动终端获取网 络侧发送的用于进行移动终端锁定处理的命令; 或移动终端获取用户操作输 入的用于进行移动终端锁定处理的命令。 进一步地, 在移动终端获取网络侧发送的用于进行移动终端锁定处理的 命令之前, 还包括: 网络侧生成移动终端锁定处理的命令, 并对移动终端锁 定处理命令进行封装; 网络侧釆用无线互联网络或移动通信网络将封装的移 动终端锁定处理命令发送给移动终端。 进一步地, 移动终端获取网络侧发送的用于进行移动终端锁定处理的命 令包括: 移动终端接收封装的移动终端锁定处理命令, 并解析封装的移动终 端锁定处理命令。 进一步地, 在 -据命令对移动终端进行锁定处理操作之后, 还包括: 移 动终端将锁定处理操作的结果发送给网络侧。 进一步地, 锁定处理操作包括: 锁机、 关闭锁机、 查询锁机状态; 釆用 以下之一的封装格式对移动终端锁定处理命令进行封装: 非结构化补充数据 业务 (USSD )、 短消息、 无线应用协议 ( WAP ) 消息。 为了实现上述目的, 根据本发明的另一方面, 提供了一种移动终端。 才艮据本发明的移动终端包括: 获取模块, 用于获取移动终端锁定处理的 命令; 处理模块, 用于根据移动终端锁定处理的命令对移动终端进行锁定处 理操作。 进一步地, 获取模块包括: 第一获取子模块, 用于获取网络侧发送的用 于进行移动终端锁定处理的命令; 或第二获取子模块, 用于获取用户操作输 入的用于进行移动终端锁定处理的命令。 进一步地, 第一获取子模块包括: 接收单元, 用于接收封装的移动终端 锁定处理命令; 解析单元, 用于解析封装的移动终端锁定处理命令。 进一步地, 该装置还包括: 第一发送模块, 用于将锁定处理操作的结果 发送给网络侧。 为了实现上述目的, 根据本发明的再一方面, 提供了一种网络侧。
才艮据本发明的网络侧包括: 生成模块, 用于生成移动终端锁定处理的命 令; 封装模块, 用于对移动终端锁定处理命令进行封装; 第二发送模块, 用 于釆用无线互联网络或移动通信网络将封装的移动终端锁定处理命令发送给 移动终端; 进一步地, 锁定处理操作包括: 锁机、 关闭锁机、 查询锁机状态; 釆用 以下之一的封装格式对移动终端锁定处理命令进行封装: 非结构化补充数据 业务 (USSD )、 短消息、 无线应用协议 ( WAP ) 消息。 通过本发明, 釆用移动终端获取移动终端锁定处理的命令; 才艮据所述命 令对所述移动终端进行锁定处理操作, 解决了相关技术中通过刷机进行移动 终端锁定处理造成用户数据丢失甚至导致移动终端损坏的问题, 进而达到了 提高用户体验度的效果。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部 分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的 不当限定。 在附图中: 图 1是才艮据本发明实施例的移动终端、 网络侧及用户的交互示意图一; 图 2是 居本发明实施例的移动终端锁定处理方法的流程图; 图 3是 居本发明实施例的移动终端的结构框图; 图 4是 居本发明实施例的移动终端的优选的结构框图; 图 5是 居本发明实施例的网络侧的结构框图; 图 6是才艮据本发明实施例的移动终端、 网络侧和用户的交互示意图二; 图 7是根据本发明实施例的网络侧设置锁机处理的流程图; 图 8是根据本发明实施例的用户侧设置锁机处理的流程图; 以及 图 9是根据本发明实施例的锁机实现方法的流程图。
具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在 不冲突的情况下, 本申请中的实施例及实施例中的特征可以相互组合。 需要说明的是, 下述实施例都是基于移动终端、 网络侧、 用户构成的交 互网络来实现的, 图 1是才艮据本发明实施例的移动终端、 网络侧及用户的交 互示意图一, 如图 1所示, 移动终端可以通过移动通信网、 无线互联网连接 网络测控制台, 也可以直接和用户交互。 根据本发明实施例, 提供了一种移动终端锁定处理方法, 图 2是根据本 发明实施例的移动终端锁定处理方法的流程图, 如图 2所示, 包括: 步 4聚 S202, 移动终端获取移动终端锁定处理的命令; 步骤 S204, 居该移动终端锁定处理的命令对移动终端进行锁定处理操 作。 通过上述步骤, 移动终端才艮据获取到的移动终端锁定处理的命令对移动 终端进行锁定处理操作, 避免了相关技术中相关技术中通过刷机进行移动终 端锁定处理造成用户数据丢失甚至导致移动终端损坏的的问题, 提高了用户 体验度。 下面对步骤 S202 中的移动终端获取移动终端锁定处理的命令的优选的 实施方式进行说明。 有两种优选的实施方式: 方式一, 移动终端获取网络侧 发送的用于进行移动终端锁定处理的命令; 方式二, 移动终端获取用户操作 输入的用于进行移动终端锁定处理的命令。 通过本优选的实施例的两种实施 方式, 移动终端在和网络正常交互 ^1大态下, 可以通过网络侧获取移动终端锁 定处理的命令, 在网络交互失败状态下, 通过获取移动终端的用户操作的用 于移动终端锁定处理的命令, 提高了获取命令的灵活性, 满足了运营商对移 动终端锁定处理的定制需求。 优选地, 在移动终端获取网络侧发送的用于进行移动终端锁定处理的命 令之前, 还包括: 网络侧生成移动终端锁定处理的命令, 并对移动终端锁定 处理命令进行封装; 网络侧釆用无线互联网络或移动通信网络将封装的移动 终端锁定处理命令发送给移动终端。 通过本发明的发送步骤, 将封装成移动 终端和网络侧; *卩能识别的命令发送给移动终端, 保证了移动终端可以准确地
解析出移动终端锁定处理的命令, 且通过无线互联网络或移动通信网络多种 途径进行发送, 在满足用户多样化需求的同时, 提高了命令接收的可靠性。 下面对步骤 S202 中的移动终端获取网络侧发送的用于进行移动终端锁 定处理的命令的一个优选的实施方式进行说明。 移动终端解析封装的移动终 端锁定处理命令, 并获取封装的移动终端锁定处理命令。 通过本发明的解析 步骤, 将封装后的移动终端锁定处理命令解析出来, 该解析步骤保证了网络 侧和移动终端进行命令交互的兼容性, 同时增强了移动终端锁定处理的命令 的保密性。 优选地, 在 居命令对移动终端进行锁定处理操作之后, 还包括: 移动 终端将锁定处理操作的结果发送给网络侧。 通过本发明的发送步骤, 将锁定 处理操作的结果发送给网络侧,实现了网络侧和移动终端之间交互的完整性。 优选地, 锁定处理操作包括: 锁机、 关闭锁机、 查询锁机状态; 釆用以 下之一的封装格式对移动终端锁定处理的命令进行封装: 非结构化补充数据 业务 ( Unstructured supplementary Service Data, 简称为 USSD ), 短消息、 无 线应用协议 ( Wireless Application Protocol, 简称为 WAP )消息。 通过本优选 实施例, 通过现有封装消息类型对移动终端锁定处理的命令进行封装, 无需 对现有消息类型进行修改处理, 大大节省了开发成本。 根据本发明的实施例, 还提供了一种移动终端。 图 3是根据本发明实施 例的移动终端的结构 图, 如图 3所示, 该移动终端包括: 获取模块 32和 处理模块 34 , 下面对上述结构进行详细说明: 获取模块 32 , 用于获取移动终端锁定处理的命令; 处理模块 34 , 连接 至获取模块 32 , 用于根据获取模块 32获取到的移动终端锁定处理的命令对 移动终端进行锁定处理操作。 图 4是才艮据本发明实施例的移动终端的优选的结构框图, 如图 4所示, 该移动终端还包括第一发送模块 42 ; 获取模块 32包括: 第一获取子模块 322 和第二获取子模块 324; 其中, 第一获取子模块 322包括: 接收单元 3222和 解析单元 3224 , 下面对上述结构进行详细描述: 获取模块 32包括: 第一获取子模块 322 , 用于获取网络侧发送的用于进 行移动终端锁定处理的命令; 或第二获取子模块 324 , 用于获取用户操作输 入的用于进行移动终端锁定处理的命令。
第一获取子模块 322包括: 接收单元 3222 , 用于接收封装的移动终端锁 定处理命令; 解析单元 3224 ,连接至接收单元 3222 , 用于解析接收单元 3222 接收到的封装的移动终端锁定处理命令。 移动终端还包括: 第一发送模块 42 , 连接至处理模块, 用于将处理模块 34处理的锁定处理操作的结果发送给网络侧。 根据本发明的实施例, 提供了一种网络侧, 图 5是根据本发明实施例的 网络侧的结构框图, 如图 5 所示, 该网络侧包括: 生成模块 52、 封装模块 54、 第二发送模块 56 , 下面对上述结构进行详细描述: 生成模块 52 , 用于生成移动终端锁定处理的命令; 封装模块 54 , 连接 至生成模块 52 , 用于对生成模块 52生成的移动终端锁定处理命令进行封装; 第二发送模块 56 , 连接至封装模块 54 , 用于釆用无线互联网络或移动通信 网络将封装模块 54封装的移动终端锁定处理命令发送给移动终端; 优选地, 上述锁定处理操作包括: 锁机、 关闭锁机、 查询锁机状态; 釆 用以下之一的封装格式对移动终端锁定处理命令进行封装: 非结构化补充数 据业务、 短消息、 无线应用协议消息。 为了帮助理解上述实施例, 下面进一步描述本发明的其他多个优选实施 例。 实施例一 图 6是才艮据本发明实施例的移动终端、 网络侧和用户的交互示意图二, 如图 6所示, 用户侧 0包括: 用户输入模块 01 ; 移动终端 2包括: 锁机模块 22 , 锁机状态维护模块 24、 终端指令维护模块 26和网络通信模块 28; 网络 侧 (网络侧控制台) 6包括: 控制台输入输出模块 62、 控制台指令维护模块 64和网络通信模块 66 , 下面对上述结构进行详细描述: 网络侧 (网络侧控制台) 6包括: 控制台输入输出模块 62 , 用于在卡状 态正常和网络正常交互状态下, 发起流程, 发送设置 (或者查询)锁机功能 的命令; 控制台指令维护模块 64 , 连接控制台输入输出模块 62 , 用于对控 制台输入输出模块 62发送的指令进行封装; 网络通信 66 , 连接至控制台指 令维护模块 64 , 用于将控制台指令维护模块 64封装的命令发送到终端侧, 具体地, 可以通过移动通信网络(USSD、 短信等)、 无线互联网络 (WAP、
WIFI等) 等方式进行接入, 保证了移动终端侧至少有一种方式可以接入。 移动终端 2包括: 网络通信模块 28 , 用于和网络侧进行网络通信, 接收 网络侧发送的指令; 终端指令维护模块 26 , 用于解析此指令; 锁机状态维护 模块 24 , 用于根据解析结果, 调整锁机功能开启 /关闭 /查询状态, 同时将操 作的结果沿着原路返回给网络侧控制台进行显示; 锁机模块 22 , 用于进行锁 机操作。 用户侧包括用户输入模块 01 , 用于当卡发生损坏, 无法从网络侧进行操 作状态下, 直接在移动终端 2上进行操作, 并和锁机状态维护模块 24进行 交互, 调整锁机功能开启 /关闭 /查询状态, 并最终通知到锁机模块 22 , 同时 将操作的结果在移动终端上进行显示。 实施例二 本实施例综合了实施例一及其中的优选实施方式, 在本实施例中提供了 一种在网络侧设置锁机处理的方法, 图 7是根据本发明实施例的网络侧设置 锁机处理的流程图, 以下结合图 6和图 7进行详细描述: 步 4聚 S701 , 为网络侧控制台 62主动设置或者查询移动终端锁机功能, 下发设置或者查询的命令。 步骤 S702, 为网络侧指令维护模块 64根据控制台下发的命令, 分别封 装成移动终端和控制台都能够识别的指令。 优选地, 步骤 S702中可以釆用以下三种方式对指令进行封装。 方式一:封装成 USSD命令。通信模块 66有一个 USSD的 SP (接入点), 支持接收查询和设置命令, 命令格式为 *SP (接入点名) *01(打开设置) *SIM卡 号#, 当通信模块 66收到命令后, 发送给终端网络通信模块 28 , 终端指令维 护模块 26对该命令进行解析后, 传递给锁机状态维护模块 24。 方式二: 封装成特殊的短消息, 通信模块 66 中有个一个短消息的接入 点 ( SP ), 支持接收和发送短消息, 居接收短消息的 SP地址来区分是否为 该业务, 如格式 *01(打开设置) * SIM 卡号 #的短消息为查询和设置命令。 当 SP收到该短消息后, 设置成格式 *01 (打开设置) *SIM卡号 #的方式以短消 息指令的形式传递给终端, 终端指令维护模块 26 对该命令进行解析后, 传 递给锁机状态维护模块 24。
方式三, 封装成特殊的 WAP 消息, 通过相关的网关将消息传递给移动 终端, 但是前提是, 终端的通信模块 28需要 PDP激活, 在激活成功后, 才 能够通过无线网络获取到信息。 步骤 S703 , 为网络通信模块 66通过特定的通信方式将指令传递到移动 终端的通信模块 28。 步骤 S704 , 为移动终端的通信模块 28将命令传递到终端指令维护模块
26。 步骤 S705 , 为终端指令维护模块 26对传递过来的指令进行解析, 分别 对应步骤 S702中的 3种格式: 第一种格式: 解析 USSD 命令, 命令格式为 *SP (接入点名) *01(打开设 置) *SIM卡号 #, 命令第二部分, 01代表打开设置, 02代表关闭设置, 03代 表查询状态, 04代表更新设置。 命令第三部分, 代表用户 SIM卡号。 第二种格式: 解析特殊短消息, 格式 *01 (打开设置) *SIM 卡号 #, 命 令第一部分, 01代表打开设置, 02代表关闭设置, 03代表查询状态 ,04代表 更新设置。 命令第二部分, 代表用户 SIM卡号。 第三种格式: 解析 WAP消息, 同第二种格式。 步骤 S706 , 根据解析的结果, 终端状态维护模块 24调整锁机功能打开 / 关闭 /查询状态, 如果锁机状态发生变化, 通知到锁机模块 22 , 如果没有则 无须通知。 步骤 S707, 终端状态维护模块 24还需要将操作的结果, 比如打开是否 成功,关闭是否成功,以及状态查询结果封装后返回给终端指令维护模块 26 , 封装方法和格式同步 4聚 S702。 步骤 S708, 终端指令维护模块 26将封装好的指令传递到移动终端的通 信模块 28。 步骤 S709, 移动终端的通信模块 28通过特定的通信方式将指令传递到 网络侧通信模块 66。 步骤 S710,网络侧通信模块 66将命令传给网络侧指令维护模块 64处理。
步骤 S711 , 网络侧指令维护模块 64解析指令,方法和格式同步骤 S705 , 将解析后的结果传给网络侧控制台输入输出模块 62 ,通知此次操作的最终结 果。 步骤 S712 , 网络侧控制台输入输出模块 62显示操作的最终结果, 完成 交互。 本实施例通过网络侧控制台的发送的命令, 将此命令封装成终端也能够 识别的指令, 通过无线网络发送给移动终端, 完成对移动终端锁机, 解锁, 更新锁机, 查询锁机状态 实施例三 本实施例综合了实施例一及其中的优选实施方式, 在本实施例中提供了 一种在网络侧设置锁机处理的方法, 图 8是根据本发明实施例的用户侧设置 锁机处理的流程图, 以下结合图 6和图 8进行详细描述: 步骤 S801 , 用户输入模块 01通过用户对移动终端的手动操作, 输入某 些特殊性的指令来调整锁机功能。 步骤 S802, 锁机状态维护模块 24通过终端内置的隐藏菜单指令, 和用 户的输入进行匹配, 调整锁机功能打开 /关闭 /查询状态, 如果锁机状态发生 变化, 通知到锁机模块 22 , 如果没有则无须通知。 步骤 S803 , 终端状态维护模块 24将操作的结果返回给用户, 例如: 锁 定打开是否成功, 关闭是否成功, 以及状态查询结果返回给用户, 可以在终 端上显示出来。 实施例四 本实施例提供了一种锁机的实现方法, 图 9是根据本发明实施例的锁机 实现方法的流程图, 如图 9所示, 包括: 步骤 S901 , 移动终端插卡开机, 开始将移动终端锁定都某张卡的流程。 步骤 S902 ,移动终端开机过程中激活 SIM/USIM卡,获取当前 SIM/USIM 卡的 IMSI和 ICCID,并保存。 步骤 S903 , 获取当前锁机功能状态, 打开还是关闭。 如果是关闭状态,
完成开机流程, 跳转到步骤 S907。 如果是打开状态, 跳转到步骤 S904。 步骤 S904, 从移动终端中某个特定区域读取数据, 如果数据为无效值, 则判定此终端还未被锁定到某张 SIM/USIM卡上, 跳转到步骤 S906。 如果数 据为有效值, 则判定此终端已经被锁定到某张 SIM/USIM卡上, 跳转到步骤 S905。 步骤 S905 ,将终端被锁定 SIM/USIM卡的 IMSI和 ICCID和当前获取的 SIM/USIM卡的 IMSI和 ICCID进行比较, 如果一致, 则代表 jt匕终端就是被 锁定在此卡上, 跳转到步骤 S907。 如果不一致, 则代表此终端被锁定不是此 卡, 跳转到步骤 S908。 步骤 S906 , 保存当前获取的 SIM/USIM卡的 IMSI和 ICCID到终端侧, 完成锁机的数据填充, 跳转到步骤 S907。 步骤 S907, 开机结束, 驻留网络, 显示欢迎词, 跳转到步骤 S909。 步骤 S908, 提示用户此终端被锁定, 无法使用, 跳转到步骤 S909。 步骤 S909, 流程结束。 本实施例实现了在无法连接网络的状态下, 直接对移动进行操作, 完成 对移动终端的锁机, 解锁, 更新锁机, 查询锁机状态。 通过上述实施例, 通过网络侧控制台的发送的命令, 将此命令封装成终 端也能够识别的指令, 通过无线网络发送给移动终端, 或者当无法连接网络 的状态下, 直接对移动进行操作, 实现了对移动终端锁机, 解锁, 更新锁机, 查询锁机状态的操作。 提高了用户体 -险, 同时满足了运营商对移动终端定制 的多样需求。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 并 且在某些情况下, 可以以不同于此处的顺序执行所示出或描述的步骤, 或者 将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制作 成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软件 结合。
以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的 ^"神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。
Claims
1. 一种移动终端锁定处理方法, 其特征在于, 包括:
移动终端获取移动终端锁定处理的命令;
根据所述移动终端锁定处理的命令对所述移动终端进行锁定处理操 作。
2. 居权利要求 1所述的方法, 其特征在于, 移动终端获取移动终端锁定 处理命令包括: 所述移动终端获取网络侧发送的用于进行移动终端锁定处理的命 令; 或
所述移动终端获取用户操作输入的用于进行移动终端锁定处理的命 令。
3. 根据权利要求 2所述的方法, 其特征在于, 在所述移动终端获取网络侧 发送的用于进行移动终端锁定处理的命令之前, 还包括:
所述网络侧生成所述移动终端锁定处理的命令, 并对所述移动终端 锁定处理命令进行封装;
所述网络侧釆用无线互联网络或移动通信网络将所述封装的移动终 端锁定处理命令发送给所述移动终端。
4. 根据权利要求 2所述的方法, 其特征在于, 所述移动终端获取网络侧发 送的用于进行移动终端锁定处理的命令包括:
所述移动终端接收所述封装的移动终端锁定处理命令, 并解析所述 封装的移动终端锁定处理命令。
5. 居权利要求 3所述的方法, 其特征在于, 在 -据所述命令对所述移动 终端进行锁定处理操作之后, 还包括:
所述移动终端将所述锁定处理操作的结果发送给所述网络侧。
6. 根据权利要求 1-5任一项所述的方法, 其特征在于,
所述锁定处理操作包括以下之一: 锁机、 关闭锁机、 查询锁机状态; 釆用以下之一的封装格式对所述移动终端锁定处理命令进行封装: 非结构化补充数据业务 USSD、 短消息、 无线应用协议 WAP消息。
7. —种移动终端, 其特征在于, 包括:
获取模块, 用于获取移动终端锁定处理的命令; 处理模块, 用于 居所述移动终端锁定处理的命令对所述移动终端 进行锁定处理操作。
8. 根据权利要求 7所述的移动终端, 其特征在于, 所述获取模块包括: 第一获取子模块, 用于获取网络侧发送的用于进行移动终端锁定处 理的命令; 或
第二获取子模块, 用于获取用户操作输入的用于进行移动终端锁定 处理的命令。
9. 根据权利要求 7所述的移动终端, 其特征在于, 所述第一获取子模块包 括:
接收单元, 用于接收所述封装的移动终端锁定处理命令; 解析单元, 用于解析所述封装的移动终端锁定处理命令。
10. 根据权利要求 9所述的移动终端, 其特征在于, 还包括:
第一发送模块 ,用于将所述锁定处理操作的结果发送给所述网络侧。
11. 一种网络侧, 其特征在于, 包括: 生成模块, 用于生成移动终端锁定处理的命令;
封装模块, 用于对所述移动终端锁定处理命令进行封装; 第二发送模块, 用于釆用无线互联网络或移动通信网络将所述封装 的移动终端锁定处理命令发送给所述移动终端;
12. 根据权利要求 11所述的网络侧, 其特征在于,
所述锁定处理操作包括以下之一: 锁机、 关闭锁机、 查询锁机状态; /022080 采用以下之一的封装格式对所述移动终端锁定处理命令进行封装: 非结构化补充数据业务 USSD、 短消息、 无线应用协议 WAP消息。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010263364.0 | 2010-08-20 | ||
CN201010263364.0A CN101917702B (zh) | 2010-08-20 | 2010-08-20 | 移动终端锁定处理方法、移动终端及网络侧 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012022080A1 true WO2012022080A1 (zh) | 2012-02-23 |
Family
ID=43325064
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2010/078844 WO2012022080A1 (zh) | 2010-08-20 | 2010-11-17 | 移动终端锁定处理方法、移动终端及网络侧 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101917702B (zh) |
WO (1) | WO2012022080A1 (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101977267A (zh) * | 2010-10-25 | 2011-02-16 | 中兴通讯股份有限公司 | 无线终端的锁定方法、无线终端及系统 |
CN102256244B (zh) * | 2011-07-22 | 2014-11-19 | 宇龙计算机通信科技(深圳)有限公司 | 移动终端管理方法、管理服务器、移动终端和管理系统 |
CN105262885B (zh) * | 2015-09-01 | 2018-09-04 | 广东欧珀移动通信有限公司 | 一种具有锁卡防盗功能的移动终端及其锁卡防盗方法 |
CN107124711A (zh) * | 2017-04-13 | 2017-09-01 | 青岛海信移动通信技术股份有限公司 | 终端的锁定处理方法及终端 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2692943Y (zh) * | 2002-09-06 | 2005-04-13 | 华立集团有限公司 | 用于移动通信用终端的本地锁 |
CN101534482A (zh) * | 2009-03-12 | 2009-09-16 | 中兴通讯股份有限公司 | 一种锁网方法及系统 |
CN101765240A (zh) * | 2009-12-29 | 2010-06-30 | 中兴通讯股份有限公司 | 一种实现移动终端锁定/解锁的方法、系统及移动终端 |
CN101778375A (zh) * | 2009-12-25 | 2010-07-14 | 中兴通讯股份有限公司 | 一种管理终端锁卡/锁网的方法、通信系统及终端 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101287251B (zh) * | 2008-05-29 | 2011-09-14 | 北京握奇数据系统有限公司 | 电信智能卡的锁卡方法、装置及系统 |
CN101437067B (zh) * | 2008-12-05 | 2012-05-09 | 中兴通讯股份有限公司 | 移动终端及其锁网/锁卡的实现方法 |
CN101631310A (zh) * | 2009-07-27 | 2010-01-20 | 深圳华为通信技术有限公司 | 锁定方法、解锁方法及其装置、网络设备和通信终端 |
-
2010
- 2010-08-20 CN CN201010263364.0A patent/CN101917702B/zh active Active
- 2010-11-17 WO PCT/CN2010/078844 patent/WO2012022080A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2692943Y (zh) * | 2002-09-06 | 2005-04-13 | 华立集团有限公司 | 用于移动通信用终端的本地锁 |
CN101534482A (zh) * | 2009-03-12 | 2009-09-16 | 中兴通讯股份有限公司 | 一种锁网方法及系统 |
CN101778375A (zh) * | 2009-12-25 | 2010-07-14 | 中兴通讯股份有限公司 | 一种管理终端锁卡/锁网的方法、通信系统及终端 |
CN101765240A (zh) * | 2009-12-29 | 2010-06-30 | 中兴通讯股份有限公司 | 一种实现移动终端锁定/解锁的方法、系统及移动终端 |
Also Published As
Publication number | Publication date |
---|---|
CN101917702B (zh) | 2016-06-08 |
CN101917702A (zh) | 2010-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200228962A1 (en) | Apparatus and method for profile installation in communication system | |
US8655337B2 (en) | Operating a server to determine model of mobile terminal | |
US9401842B2 (en) | Method and device for configuring terminal devices | |
CN104363213B (zh) | 一种网络家电的注册登录控制方法 | |
CN103513998B (zh) | 升级包生成方法和装置、动态文件差分升级的方法和终端 | |
US10893406B2 (en) | Method and apparatus for handling remote profile management exception | |
US20180183882A1 (en) | Method and apparatus of interworking m2m and iot devices and applications with different service layers | |
US11700528B2 (en) | Method and apparatus for installing and managing profile using message service | |
EP3890378A1 (en) | Device changing method and apparatus of wireless communication system | |
AU2010244906B2 (en) | Method and System for Provisioning Terminal Parameters and Terminal Management Apparatus | |
US11449319B2 (en) | Method and apparatus for downloading bundle to smart secure platform by using activation code | |
EP3854115B1 (en) | Method and apparatus for handling remote profile management exception | |
WO2012022072A1 (zh) | 终端操作的触发方法、装置及系统 | |
CN102244666A (zh) | M2m平台处理报文的方法和m2m平台系统 | |
JP7043497B2 (ja) | eSIMプロファイルを設置及び管理する方法及び装置 | |
EP3114806B1 (en) | Network node, device and methods for providing an authentication module | |
WO2012022080A1 (zh) | 移动终端锁定处理方法、移动终端及网络侧 | |
CN111435947A (zh) | 电子消息控制 | |
WO2012055183A1 (zh) | 无线终端的锁定方法、无线终端及系统 | |
CN102652439A (zh) | 归属用户服务器中的智能卡安全特征简档 | |
CN111506356A (zh) | 电子消息适配 | |
EP3487121A1 (en) | Method for updating a firmware of an iot-device over the air | |
WO2022071437A1 (ja) | 通信端末及びその方法 | |
CN114978556A (zh) | 切片认证方法、装置及系统 | |
EP3955607B1 (en) | Method for transmitting and/or for using a profile information or at least parts thereof, system, client communication device, server entity, program and computer program product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10856078 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10856078 Country of ref document: EP Kind code of ref document: A1 |