WO2015131680A1 - 多卡多待通信终端及其锁网方法、装置、计算机存储介质 - Google Patents

多卡多待通信终端及其锁网方法、装置、计算机存储介质 Download PDF

Info

Publication number
WO2015131680A1
WO2015131680A1 PCT/CN2015/070986 CN2015070986W WO2015131680A1 WO 2015131680 A1 WO2015131680 A1 WO 2015131680A1 CN 2015070986 W CN2015070986 W CN 2015070986W WO 2015131680 A1 WO2015131680 A1 WO 2015131680A1
Authority
WO
WIPO (PCT)
Prior art keywords
user identification
card
lock
communication terminal
network
Prior art date
Application number
PCT/CN2015/070986
Other languages
English (en)
French (fr)
Inventor
关瑞娟
赖敏
袁林
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015131680A1 publication Critical patent/WO2015131680A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Definitions

  • the present invention relates to the field of communications, and in particular, to a multi-card multi-standby communication terminal, a method and device for locking the network, and a computer storage medium.
  • the basic principle is a data matching principle, which is to provide some fixed network parameters provided by operators (such as Mobile Network Code (MNC)).
  • MNC Mobile Network Code
  • MCC Mobile Country Code
  • MIN Mobile Identification Number
  • SIM card currently inserted user identification card
  • the embodiment of the present invention provides a multi-card multi-standby communication terminal. End and its lock network method, device, computer storage medium.
  • the embodiment of the invention provides a method for locking a network of a multi-card multi-standby communication terminal, comprising:
  • the determining whether the lock verification result of the at least one user identification card is legal is: determining whether there is a lock of the user identification card in the plurality of user identification cards of the communication terminal The network check result is legal.
  • determining whether a lock verification result of a subscriber identity card is legal, and setting all subscriber identity cards of the communication terminal to be legal includes:
  • determining whether a lock verification result of a subscriber identity card is legal, and setting all subscriber identity cards of the communication terminal to be legal includes:
  • determining whether a lock verification result of a subscriber identity card is legal, and setting all subscriber identity cards of the communication terminal to be legal includes:
  • the multi-card multi-standby communication terminal is a dual card dual standby, three card three standby or four card four standby communication terminal.
  • the communication terminal stores lock network configuration information, where the lock network configuration information includes lock network parameter information and a lock network policy;
  • Locking the network for the subscriber identity card includes:
  • Reading network parameter information of the user identification card comparing the network parameter information with the lock network parameter information according to the lock network policy, and if the two are consistent, determining that the user identification card is legal; otherwise, determining the user identification The card is illegal.
  • the embodiment of the invention further provides a multi-card multi-standby communication terminal lock network device, comprising a judging module and a processing module; wherein
  • the determining module is configured to determine whether a lock verification result of at least one user identification card of the plurality of user identification cards of the communication terminal is legal;
  • the processing module is configured to set all user identification cards of the communication terminal to be legal when the determination result of the determining module is YES.
  • the determining module is configured to: determine whether a lock verification result of one of the plurality of user identification cards of the communication terminal is legal.
  • the determining module includes a first selecting sub-module and a first determining sub-module, where the first selecting sub-module is configured to sequentially select a plurality of user identification cards of the communication terminal, where The first determining sub-module is configured to perform a lock network check on the currently selected user identification card of the first selection sub-module, and if the verification result is legal, notify the processing module; the processing module includes a first setting The module is configured to: after receiving the notification, use the user identification card and the user identification card and/or the front lock network verification result that are not subjected to the network lock verification to be illegal. The subscriber identification card is set to be legal.
  • the determining module includes a second selecting submodule and a second determining submodule, where the second selecting submodule is configured to select from a plurality of user identification cards of the communication terminal The card does not need to perform password verification, and the second determining sub-module is configured to perform network lock verification on the user identification card that does not need to perform password verification, and if the verification result is legal, notify the processing module;
  • the processing module includes a second setting sub-module configured to: after receiving the notification, the user identification card and a user identification card that has not been subjected to network lock verification and/or a user whose front lock network verification result is illegal
  • the identification card is set to be legal.
  • the determining module includes a second selecting submodule and a second determining submodule, where the second selecting submodule is configured to select from a plurality of user identification cards of the communication terminal The card does not need to perform password verification, and the second judging sub-module is configured to perform network lock verification on the user identification card that does not need to perform password verification; when all the user identification cards that do not need password verification are verified, the verification result is If the user identification card that needs to be password-authenticated is verified by the password verification, the network authentication is performed. If one of the verification results is legal, the processing module is notified; the processing module includes a second setting sub-module. After receiving the notification, the user identification card and the user identification card that has not been subjected to the lock verification and/or the user identification card whose front lock network verification result is illegal are set as legal.
  • the embodiment of the invention further provides a multi-card multi-standby communication terminal, comprising a processor and a memory, the memory being configured to store at least one program module, the processor being configured to call at least one of the program modules to perform the following steps:
  • the embodiment of the invention further provides a computer storage medium, the computer storage medium package A set of instructions, when executed, causes at least one processor to perform the multi-card multi-standby communication terminal lock network method described above.
  • the multi-card multi-standby communication terminal and the lock network method and device thereof and the computer storage medium provided by the embodiments of the present invention determine whether there are at least one user identification card in the plurality of user identification cards of the communication terminal in the lock network control process.
  • the lock network check result is legal. If yes, all user identification cards of the communication terminal are set to be legal.
  • the lock network method provided by the present invention can set all the user identification cards of the communication terminal to be legal as long as at least one of the inserted user identification cards is legally required by the operator. It can ensure that the communication terminal must insert at least one operator legally, guarantee the legitimate rights and interests of the operator, and take into account the personalized and intelligent needs of the user, making the use of the multi-card multi-standby communication terminal more flexible and convenient. The satisfaction of the user experience.
  • FIG. 1 is a schematic flowchart of a method for locking a network of a multi-card multi-standby communication terminal according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic structural diagram of a network locking device for a multi-card multi-standby communication terminal according to Embodiment 2 of the present invention
  • FIG. 3 is a schematic structural diagram of a multi-card multi-standby communication terminal according to Embodiment 3 of the present invention.
  • FIG. 4 is a schematic flowchart of a method for locking a network of a multi-card multi-standby communication terminal according to Embodiment 3 of the present invention
  • FIG. 5 is a schematic flowchart of another network locking method for a multi-card multi-standby communication terminal according to Embodiment 3 of the present invention.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • the multi-card multi-standby communication terminal in this embodiment refers to a communication terminal that can simultaneously use multiple user identification cards, such as a dual-card dual-standby, three-card three-standby, or four-card four-standby communication terminal.
  • the method for locking a multi-card multi-standby communication terminal includes:
  • Step 101 Determine whether the lock verification result of at least one user identification card of the plurality of user identification cards of the communication terminal is legal (that is, determine whether there are K user identification card locks in the plurality of user identification cards of the communication terminal.
  • the network check result is legal, K is greater than or equal to 1, and is less than the maximum number of user identification cards supported by the communication terminal N), if yes, go to step 102; otherwise, go to step 103;
  • Step 102 Set all user identification cards of the communication terminal to be legal
  • Step 103 It is determined that all the user identification cards are illegal, and the communication terminal is in a network lock state; the related service cannot be used normally at this time.
  • the value of K can be specifically set according to the actual application scenario and the requirements of the user and the operator. For example, for a dual-card dual-standby communication terminal, K is equal to 1. At this time, it is determined whether the lock verification result of a user identification card exists in the two user identification cards inserted is legal, and if so, the communication terminal is directly set. The two user identification cards are both legal, that is, the user identification card in the other card slot is not restricted, and the card inserted into other operators can be used normally. For another example, for a three-card three-standby communication terminal and a four-card four-standby communication terminal, K may be equal to 1 or equal to 2, and it is determined whether two user identification cards are present in the plurality of user identification cards inserted therein. The lock network check result is legal. If yes, the two user identifications of the communication terminal are directly set. The cards are all legal, that is, the user identification cards in the remaining slots are not restricted, and the cards inserted into other carriers can be used normally.
  • the specific value of at least one user identification card in this embodiment may be specifically selected according to specific communication terminals, individual requirements of operators and users, and the like.
  • the plurality of user identification cards of the communication terminal may be directly selected in sequence (the user identification card in the multi-card multi-standby communication terminal is generally according to the card 1) And the card 2 is sorted sequentially, and the currently selected user identification card is checked for network lock. If the verification result is legal, all the user identification cards of the communication terminal are set to be legally included: the user identification card and The user identification card that has not been subjected to the lock network check and/or the user identification card whose front lock network check result is illegal is set to be legal.
  • the lock network identifier is directly set to FALSE; for the user identification card that has not been checked for the lock network, the lock is no longer needed at this time.
  • the lock network identifier is directly set to FALSE; for the user identification card whose previous lock network check result is illegal, the unlocking process is performed, including modifying the lock network identifier of the user identification card by TRUE.
  • FALSE the user identification card is fed back as legal, and each parameter previously determined to be illegal is restored to the default state.
  • the sequence of the lock verification may be selected according to whether each user identification card needs to perform password verification; for example, the communication terminal is available.
  • a user identification card that does not require password verification is selected among the plurality of user identification cards, and the user identification card that does not require password verification (for example, personal identification number (PIN) authentication) is first checked for network lock. If one of the verification results is legal, the user identification card and the user identification card that has not been checked by the lock network and/or the user identification card whose front lock network verification result is illegal is set as legal; otherwise, it is required to be performed.
  • the user ID card of the password verification is verified by the password verification, and if one of the verification results is legal, the user identification card and the user identification card and/or the network identification card that has not been checked by the network are verified.
  • the user identification card with the previous lock network check result is illegal and set to be legal. That is, for the user identification card that has not been checked by the lock network at this time, the lock network check is no longer needed, and the lock network identifier is directly set to FALSE; the user identification card for the previous lock network check result is illegal.
  • the unlocking process is performed, including changing the lock network identifier of the user identification card from TRUE to FALSE, feeding back the user identification card to be legal, and restoring the previously determined illegal parameters to the default state.
  • the lock network verification process includes reading a lock network configuration file in a pre-written communication terminal, the lock network configuration file including lock network parameter information, a lock network policy, and a lock network restriction; and reading the inserted user Corresponding network parameter information of the identification card, comparing the network parameter with the lock network parameter information stored in the communication terminal according to the lock network policy, if the two are consistent, determining that the current card is legal; if not, determining the user identification card
  • the lock network policy includes but is not limited to lock MCC/MNC, lock MCC/MNC+ communication technology service provider (SUB), lock MCC/MNC+GID1, lock MCC/MNC+GID1+GID2 and All International Mobile Subscriber Identification Numbers (IMSI, etc.) of the lock card.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • the device for locking the network of the multi-card multi-standby communication terminal provided in this embodiment is shown in FIG. 2, and includes a judging module 21 and a processing module 22;
  • the determining module 21 is configured to determine whether the lock verification result of at least one user identification card of the plurality of user identification cards of the communication terminal is legal, that is, whether there are K user identification cards in the plurality of user identification cards of the communication terminal.
  • the lock network check result is legal; K is greater than or equal to 1, and is less than
  • the maximum number of user identification cards supported by the communication terminal is N;
  • the processing module 22 is configured to set all the user identification cards of the communication terminal to be legal when the determination result of the determination module 21 is YES; otherwise, determine that all the user identification cards currently inserted by the communication terminal are illegal, and the communication terminal The network is locked. The related services cannot be used normally.
  • the value of K can be specifically set according to the actual application scenario and the requirements of the user and the operator. For example, for a dual-card dual-standby communication terminal, K is equal to 1. At this time, it is determined whether the lock verification result of a user identification card exists in the two user identification cards inserted is legal, and if so, the communication terminal is directly set. The two user identification cards are both legal, that is, the user identification card in the other card slot is not restricted, and the card inserted into other operators can be used normally. For another example, for a three-card three-standby communication terminal and a four-card four-standby communication terminal, K may be equal to 1 or equal to 2, and it is determined whether two user identification cards are present in the plurality of user identification cards inserted therein. The lock network check result is legal. If yes, the two user identification cards of the communication terminal are directly set to be legal, that is, the user identification cards in the remaining other card slots are not restricted, and the other operators are inserted at this time. The card can also be used normally.
  • the determining module 21 of the multi-card multi-standby communication terminal locking device may include a first selecting sub-module and a first determining sub-module, and the first selecting sub-module is configured to sequentially select a plurality of user identification cards of the communication terminal.
  • the user identification card in the multi-card multi-standby communication terminal is generally sorted according to the card 1 and the card 2 in sequence
  • the first determining sub-module is configured to perform a lock network check on the currently selected user identification card of the first selection sub-module, such as a school.
  • the notification processing module 22 includes a first setting sub-module configured to, after receiving the notification, the user identification card and the user identification card and/or the front lock that are not subjected to the lock verification
  • the user identification card whose network check result is illegal is set to be legal. That is to say, for the current user identification card passed by this verification, the lock network identifier is directly set to FALSE; for the user identification card that has not been subjected to the lock network check later, the lock network check is no longer needed at this time.
  • the unlocking process is performed, including modifying the lock network identifier of the user identification card from TRUE to FALSE, feeding back the user identification card as legal, and determining the previously determined illegal parameters. Both are restored to their default state.
  • the determining module 21 may include a second selecting sub-module and a second determining sub-module, where the second selecting sub-module is configured to select a card that does not require password verification from among a plurality of user identification cards of the communication terminal.
  • the second determining sub-module is configured to perform network lock verification on the user identification card that does not need to perform password verification. If one of the verification results is legal, the processing module 22 is notified, otherwise, the user who needs to perform password verification is configured.
  • the identification card is verified by the password verification, and if the verification result is legal, the processing module 22 is notified; the processing module 22 may include a second setting sub-module configured to receive the user identification card after receiving the notification.
  • the user identification card that has not been subjected to the lock network check and/or the user identification card whose front lock network check result is illegal is set as legal. That is to say, for the current user identification card passed by this verification, the lock network identifier is directly set to FALSE; for the user identification card that has not been subjected to the lock network check later, the lock network check is no longer needed at this time. Directly set its lock network identifier to FALSE; for the user identification card whose previous lock network check result is illegal, unlock the handle, including changing the lock net identifier of the user identification card from TRUE to FALSE, and feedback the The user identification card is legal, and each parameter previously determined to be illegal is restored to the default state.
  • the lock network verification process includes reading a lock network configuration file in a pre-written communication terminal, the lock network configuration file including lock network parameter information, a lock network policy, and a lock network restriction; and reading the inserted user Corresponding network parameter information of the identification card, comparing the network parameter with the lock network parameter information stored in the communication terminal according to the lock network policy, if the two are consistent, determining that the current card is legal; if not, determining the user identification card It is illegal; further; lock network strategy includes but not limited to lock MCC/MNC, lock MCC/MNC+SUB, lock MCC/MNC+GID1, lock MCC/MNC+GID1+GID2 and all IMSI of lock card.
  • the submodule, the first setting submodule, the second selecting submodule, the second judging submodule, and the second setting submodule may be configured by a central processing unit (CPU, Central Processing Unit) in the multi-card multi-standby communication terminal locking device.
  • CPU Central Processing Unit
  • a processor MCU, Micro Control Unit
  • DSP digital signal processor
  • FPGA Field-Programmable Gate Array
  • Embodiment 3 is a diagrammatic representation of Embodiment 3
  • This embodiment provides a multi-card multi-standby communication terminal, such as a dual card dual standby, three card three standby or four card four standby communication terminal, as shown in FIG. 3, including a processor 31 and a memory 32, and a memory configuration.
  • the processor is configured to call at least one program module to perform the following steps:
  • Determining whether the lock verification result of at least one user identification card of the plurality of user identification cards of the communication terminal is legal that is, determining whether there are K user identification cards in the plurality of user identification cards currently inserted by the communication terminal The test result is legal; K is greater than or equal to 1, and is less than the maximum number of user identification cards N supported by the communication terminal;
  • a multi-card multi-standby communication terminal is a dual-card dual-standby mobile phone.
  • the card slot 1 of the dual card dual standby mobile phone corresponds to the user identification card 1 (hereinafter referred to as the card 1)
  • the card slot 2 of the dual card dual standby mobile phone corresponds to the user identification card 2 (hereinafter referred to as the card 2).
  • the card 1 and the card 2 are sequentially selected for the lock network checksum.
  • the sequence of the lock check is selected from the card 1 and the card 2 according to whether the password verification is required, and the embodiment of the present invention is described in detail.
  • the process of selecting the card 1 and the card 2 for the lock network verification in sequence includes:
  • Step 401 After the mobile phone is powered on, it is detected whether the current card slot 1 has a card 1, if yes, step 402 is performed; otherwise, step 408 is performed;
  • Step 402 Perform a network lock verification process on the card 1 to determine whether the lock network check result is legal. If yes, go to step 403; otherwise, go to step 413;
  • lock network configuration file includes the lock network parameter, the lock network strategy, the lock network Conditions, etc.
  • lock network strategy includes but not limited to lock MCC/MNC, lock MCC/MNC+ step UB, lock MCC/MNC+GID1, lock MCC/MNC+GID1+GID2 and lock card all IM step I;
  • the security library according to the lock network policy, it is determined whether the lock network parameter and the network parameter of the card 1 are consistent, and if so, it is determined that the card 1 is legal; otherwise, it is illegal.
  • Step 403 Card 1 is legal, and its lock network identifier is set to FALSE, and then step 404 is performed;
  • Step 404 Determine whether the card slot 2 has a card 2, if yes, perform step 405; otherwise, perform step 406;
  • Step 405 Set the lock network identifier of the card 2 to FALSE, no longer need to perform the lock network verification process, directly execute step 407;
  • Step 406 The current mobile phone is in the card 1 single standby state, and it is in the non-locked network state;
  • Step 407 The lock network identifiers of the current card 1 and the card 2 are both FALSE, and the mobile phone is in a non-locked network state, and the card slot 1 and the card slot 2 can be used normally and the card related process;
  • Step 408 Determine whether the card slot 2 is inserted into the card 2, if not, go to step 412; if so, proceed to step 409;
  • Step 409 Perform a lock network verification process on the card 2, read the parameters of the lock network configuration file, parse the data of the card 2 to obtain the network parameter, and pass it to the lock network security library; in the lock network security library According to the lock network policy, whether the lock network parameter and the network parameter of the card 2 are consistent, if yes, proceed to step 410; otherwise, go to step 411;
  • Step 410 The lock network identifier of the card 2 is FALSE, and the current mobile phone is in the card 2 single standby mode. It is in a non-locked state;
  • Step 411 The lock network identifier of the card 2 is TRUE, and the current mobile phone is in a single card lock network state;
  • Step 412 The current mobile phone is in a cardless state, and neither the card slot 1 nor the card slot 2 has a card insertion;
  • Step 413 Determine whether the card slot 2 has a card, if any, step 414; otherwise step 417;
  • Step 414 Perform a lock network verification process on the card slot 2, read the lock network parameters in the lock network configuration file, parse the relevant network parameters of the card 2, and pass it to the lock network security library, in the lock network security library.
  • the lock network policy compare the lock network parameters and the network parameters of the card 2, if yes, go to step 415; otherwise, go to step 418;
  • Step 415 Unlock the card 1, set the parameters related to the card 1 and the lock network to the non-lock network state, and the lock network identifier is FALSE, and execute step 416;
  • Step 416 The mobile phone is in a dual-card unlocked state
  • Step 417 determining that the current card 1 is in a single card lock network state
  • Step 418 The mobile phone is in a dual card lock network state.
  • Step 501 The current card 1 is in the state of waiting for the PIN code to be unlocked, and the card 2 enters the lock network verification process;
  • Step 502 Perform network lock verification on the card 2, including: reading parameters of the lock network configuration file, parsing the data of the card 2 to obtain network parameters, and transmitting the data to the lock network security library, in the lock network security library
  • Step 504 compare the lock network parameters and the network parameters of the card 2, if yes, proceed to step 503; otherwise, perform step 504;
  • Step 503 After the PIN code of the card 1 is successfully unlocked, the lock network identifier is set to FALSE, which does not need to perform the lock network verification process, and step 507 is performed;
  • Step 504 After the PIN code of the card 1 is successfully unlocked, performing a lock network verification process on the card 1 includes: Read the parameters of the lock network configuration file, parse the data of the card 1 to obtain the network parameters, and pass it to the lock network security library. In the lock network security library, compare the lock network parameters and the card according to the lock network strategy. Whether the network parameters are consistent, if yes, proceed to step 505; otherwise, perform step 506;
  • Step 505 Unlock the card 2, set the parameters related to the card 2 and the lock network to the non-lock network state, and the lock network identifier is FALSE, and execute step 507;
  • Step 506 the lock network identifiers of the card 1 and the card 2 are both set to TRUE, and the mobile phone is in a dual-card lock network state, and the services related to the card are unavailable at this time;
  • Step 507 The lock network identifiers of the current card 1 and the card 2 are both FALSE, and the mobile phone is in a non-locked network state, and both the card 1 and the card 2 can be used normally and the card related process
  • the lock network solution provided by the embodiment of the present invention satisfies the legitimate needs of the operator while taking into account the individualized needs of the customer, and the card inserted in one of the card slots on the dual card dual standby terminal is operated.
  • the legal card of the merchant, the card inserted in the other card slot is not restricted, and the card inserted into any card including the non-operator card can normally use the card-related service, providing a more humanized dual-card dual-standby terminal.
  • the lock network solution is not restricted, and the card inserted into any card including the non-operator card can normally use the card-related service, providing a more humanized dual-card dual-standby terminal.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • an embodiment of the present invention further provides a computer storage medium, where the computer storage medium includes a set of instructions, when the instruction is executed, causing at least one processor to execute the multi-card multi-standby communication terminal lock network method .

Abstract

本发明公开了一种多卡多待通信终端及其锁网方法、装置、计算机存储介质,在锁网控制过程中,判断通信终端的多个用户识别卡中是否有至少一个用户识别卡的锁网校验结果为合法,如是,将通信终端的所有用户识别卡都设置为合法。

Description

多卡多待通信终端及其锁网方法、装置、计算机存储介质 技术领域
本发明涉及通信领域,具体涉及一种多卡多待通信终端及其锁网方法、装置、计算机存储介质。
背景技术
随着3G乃至4G通讯时代的到来,移动通信市场的竞争越来越激烈,各运营商推出了充话费送手机或廉价出售手机等一系列的营销策略,这种情况下,为了充分保证自身的合法权益,锁网功能也逐渐成为了定制移动终端的基本需求,其基本原理是一种数据的匹配原则,即将运营商提供的一些固定的网络参数(例如移动网络号码(MNC,Mobile Network Code)、移动信号国家码(MCC,Mobile Country Code)、移动识别码(MIN,Mobile Identification Number)等)写入到移动终端的FLASH中,在开机流程中读取当前所插入的用户识别卡(SIM卡)的信息,将其与已写入到终端中的参数进行比较,若二者一致,判定当前卡为合法,和卡相关的业务可以正常使用,否则提示用户已锁网。另一方面,双卡双待手机在整个终端市场上的占比也越来越高。目前针对双卡双待移动终端,各运营商的做法是只有在移动终端中所插入的所有用户识别卡都被识别为合法时才能正常使用相关业务,以尽可能保证运营商的合法权益。但这种锁网方式灵活性很差,并不能很好的兼顾客户的个性化和智能化需求,极大的降低了用户体验的满意度。
发明内容
为解决现有存在的技术问题,本发明实施例提供一种多卡多待通信终 端及其锁网方法、装置、计算机存储介质。
本发明实施例提供一种多卡多待通信终端锁网方法,包括:
判断所述通信终端的多个用户识别卡中是否有至少一个用户识别卡的锁网校验结果为合法;
如是,将所述通信终端的所有用户识别卡都设置为合法。
在本发明的一种实施例中,所述判断是否有至少一个用户识别卡的锁网校验结果为合法为:判断所述通信终端的多个用户识别卡中是否有一个用户识别卡的锁网校验结果为合法。
在本发明的一种实施例中,判断是否有一个用户识别卡的锁网校验结果为合法,以及将所述通信终端的所有用户识别卡设置为合法包括:
依次选择所述通信终端的多个用户识别卡,对当前选择的用户识别卡进行锁网校验,如校验结果为合法,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。
在本发明的一种实施例中,判断是否有一个用户识别卡的锁网校验结果为合法,以及将所述通信终端的所有用户识别卡设置为合法包括:
从所述通信终端的多个用户识别卡中选择出不需要进行密码验证的用户识别卡,对不需要进行密码验证的用户识别卡进行锁网校验,如有一个校验结果为合法,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。
在本发明的一种实施例中,判断是否有一个用户识别卡的锁网校验结果为合法,以及将所述通信终端的所有用户识别卡设置为合法包括:
从所述通信终端的多个用户识别卡中选择出不需要进行密码验证的用户识别卡,对不需要进行密码验证的用户识别卡进行锁网校验,所有不需要进行密码验证的用户识别卡的校验结果均为非法时,待所述需要进行密 码验证的用户识别卡通过密码验证后进行锁网校验,如有一个校验结果为合法,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。
在本发明的一种实施例中,所述多卡多待通信终端为双卡双待、三卡三待或四卡四待通信终端。
在本发明的一种实施例中,所述通信终端中存储有锁网配置信息,所述锁网配置信息包括锁网参数信息和锁网策略;
对用户识别卡进行锁网校验包括:
读取用户识别卡的网络参数信息,将该网络参数信息根据所述锁网策略与所述锁网参数信息进行比较,若二者一致,则判定该用户识别卡合法;否则,判定该用户识别卡非法。
本发明实施例还提供了一种多卡多待通信终端锁网装置,包括判断模块和处理模块;其中,
所述判断模块,配置为判断所述通信终端的多个用户识别卡中是否有至少一个用户识别卡的锁网校验结果为合法;
所述处理模块,配置为在所述判断模块的判断结果为是时,将所述通信终端的所有用户识别卡都设置为合法。
在本发明的一种实施例中,所述判断模块配置为:判断所述通信终端的多个用户识别卡中是否有一个用户识别卡的锁网校验结果为合法。
在本发明的一种实施例中,所述判断模块包括第一选择子模块和第一判断子模块,所述第一选择子模块配置为依次选择所述通信终端的多个用户识别卡,所述第一判断子模块配置为对所述第一选择子模块当前选择的用户识别卡进行锁网校验,如校验结果为合法,通知所述处理模块;所述处理模块包括第一设置子模块,配置为在收到所述通知后将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用 户识别卡设置为合法。
在本发明的一种实施例中,所述判断模块包括第二选择子模块和第二判断子模块,所述第二选择子模块配置为从所述通信终端的多个用户识别卡中选择出不需要进行密码验证的卡,所述第二判断子模块配置为先对不需要进行密码验证的用户识别卡进行锁网校验,如有一个校验结果为合法,通知所述处理模块;
所述处理模块包括第二设置子模块,配置为收到所述通知后,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。
在本发明的一种实施例中,所述判断模块包括第二选择子模块和第二判断子模块,所述第二选择子模块配置为从所述通信终端的多个用户识别卡中选择出不需要进行密码验证的卡,所述第二判断子模块配置为对不需要进行密码验证的用户识别卡进行锁网校验;当所有不需要进行密码验证的用户识别卡的校验结果均为非法时,待所述需要进行密码验证的用户识别卡通过密码验证后进行锁网校验,如有一个校验结果为合法,通知所述处理模块;所述处理模块包括第二设置子模块,配置为收到所述通知后,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。
本发明实施例还提供了一种多卡多待通信终端,包括处理器和存储器,所述存储器配置为存储至少一个程序模块,所述处理器配置为调用至少一个所述程序模块执行以下步骤:
判断所述通信终端的多个用户识别卡中是否有至少一个用户识别卡的锁网校验结果为合法;如是,将所述通信终端的所有用户识别卡都设置为合法。
本发明实施例又提供了一种计算机存储介质,所述计算机存储介质包 括一组指令,当执行所述指令时,引起至少一个处理器执行上述的多卡多待通信终端锁网方法。
本发明实施例的有益效果是:
本发明实施例提供的多卡多待通信终端及其锁网方法、装置、计算机存储介质,在锁网控制过程中,判断通信终端的多个用户识别卡中是否有至少一个个用户识别卡的锁网校验结果为合法,如是,将通信终端的所有用户识别卡都设置为合法。可见,本发明提供的锁网方法只要插入的用户识别卡中至少有一个为运营商要求的合法即可,此时即可将该通信终端的所有用户识别卡都设置为合法。既能保证通信终端必须插入至少一张运营商合法,保证运营商的合法权益,又能兼顾用户的个性化和智能化的需求,使得多卡多待通信终端的使用更为灵活和便捷,提升了用户体验的满意度。
附图说明
在附图(其不一定是按比例绘制的)中,相似的附图标记可在不同的视图中描述相似的部件。具有不同字母后缀的相似附图标记可表示相似部件的不同示例。附图以示例而非限制的方式大体示出了本文中所讨论的各个实施例。
图1为本发明实施例一提供的多卡多待通信终端锁网方法流程示意图;
图2为本发明实施例二提供的多卡多待通信终端锁网装置结构示意图;
图3为本发明实施例三提供的多卡多待通信终端结构示意图;
图4为本发明实施例三提供的一种多卡多待通信终端锁网方法流程示意图;
图5为本发明实施例三提供的另一多卡多待通信终端锁网方法流程示意图。
具体实施方式
下面通过具体实施例结合附图对本发明作进一步详细说明。
在发明的各种实施例中:判断所述通信终端的多个用户识别卡中是否有至少一个用户识别卡的锁网校验结果为合法;如是,将所述通信终端的所有用户识别卡都设置为合法。
实施例一:
本实施例中的多卡多待通信终端是指可以同时使用多张用户识别卡的通信终端,例如双卡双待、三卡三待或四卡四待等通信终端。请参见图1所示,本实施例提供的多卡多待通信终端锁网方法包括:
步骤101:判断通信终端的多个用户识别卡中是否有至少一个用户识别卡的锁网校验结果为合法(也即判断通信终端的多个用户识别卡中是否有K个用户识别卡的锁网校验结果为合法,K大于等于1,且小于通信终端所支持的最大用户识别卡数N),如是,转至步骤102;否则,转至步骤103;
步骤102:将该通信终端的所有用户识别卡都设置为合法;
步骤103:判断所有用户识别卡都为非法,通信终端处于锁网状态;此时不能正常使用相关的业务。
本实施例中,K的取值可以根据实际应用场景和用户以及运营商的需求等具体设定。例如,针对双卡双待通信终端,K等于1,此时判断其插入的两张用户识别卡中是否存在一张用户识别卡的锁网校验结果为合法,如是,则直接设置该通信终端的两张用户识别卡都为合法,也即另外一个卡槽中的用户识别卡不受限制,此时插入其他运营商的卡也可正常使用。又例如,针对三卡三待通信终端和四卡四待通信终端,K除了可以取等于1,还可取等于2,此时判断其插入的多张用户识别卡中是否存在两张用户识别卡的锁网校验结果为合法,如是,则直接设置该通信终端的两张用户识别 卡都为合法,也即剩下的其他卡槽中的用户识别卡不受限制,此时插入其他运营商的卡也可正常使用。
可见,本实施例中至少一个用户识别卡的具体取值可根据具体的通信终端以及运营商及用户的个性化需求等具体选择。
上述步骤101中,判断是否有一个用户识别卡的锁网校验结果为合法时,可以直接依次选择通信终端的多个用户识别卡(多卡多待通信终端里面的用户识别卡一般按照卡1、卡2依次排序),对当前选择的用户识别卡进行锁网校验,如校验结果为合法,此时将该通信终端的所有用户识别卡都设置为合法包括:将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。也即:针对当前的这张校验通过的用户识别卡,直接将其锁网标识设置为假(FALSE);针对后面未进行锁网校验的用户识别卡,此时则不再需要进行锁网校验,直接将其锁网标识设置为FALSE;针对前面锁网校验结果为非法的用户识别卡,则对其进行解锁处理,包括将该用户识别卡的锁网标识由真(TRUE)修改为FALSE,反馈该用户识别卡为合法,并将之前所判定的为非法的各个参数均恢复为默认状态。
上述步骤101中,判断是否有一个用户识别卡的锁网校验结果为合法时,还可根据各用户识别卡是否需要进行密码验证选择进行锁网校验的先后顺序;例如:可从通信终端的多个用户识别卡中选择出不需要进行密码验证的用户识别卡,先对不需要进行密码验证(例如个人识别密码(PIN,Personal Identification Number)验证)的用户识别卡进行锁网校验,如有一个校验结果为合法,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法;否则,待需要进行密码验证的用户识别卡通过密码验证后进行锁网校验,如有一个校验结果为合法,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或 前面锁网校验结果为非法的用户识别卡设置为合法。也即针对后面未进行锁网校验的用户识别卡,此时则不再需要进行锁网校验,直接将其锁网标识设置为FALSE;针对前面锁网校验结果为非法的用户识别卡,则对其进行解锁处理,包括将该用户识别卡的锁网标识由TRUE修改为FALSE,反馈该用户识别卡为合法,并将之前所判定的为非法的各个参数均恢复为默认状态。也即:针对当前锁网校验通过这张用户识别卡,直接将其锁网标识设置为FALSE;针对后面未进行锁网校验的用户识别卡,此时则不再需要进行锁网校验,直接将其锁网标识设置为FALSE;针对前面锁网校验结果为非法的用户识别卡,则对其进行解锁处理,包括将该用户识别卡的锁网标识由TRUE修改为FALSE,反馈该用户识别卡为合法,并将之前所判定的为非法的各个参数均恢复为默认状态。
本实施例中,锁网校验流程包括读取预先写入通信终端中的锁网配置文件,该锁网配置文件包括锁网参数信息、锁网策略和锁网限制;读取所插入的用户识别卡的对应网络参数信息,根据该锁网策略对网络参数和通信终端中存储的锁网参数信息进行比较,若二者一致,则判定当前卡为合法;若不一致,则判定该用户识别卡为非法;在一实施例中,锁网策略包括但不局限于锁MCC/MNC,锁MCC/MNC+通信技术服务商(SUB),锁MCC/MNC+GID1,锁MCC/MNC+GID1+GID2和锁卡的全部国际移动用户识别码(IMSI,International Mobile Subscriber Identification Number)等。
实施例二:
本实施例提供的多卡多待通信终端锁网装置请参见图2所示,包括判断模块21和处理模块22;其中,
判断模块21,配置为判断通信终端的多个用户识别卡中是否有至少一个用户识别卡的锁网校验结果为合法,即判断通信终端的多个用户识别卡中是否有K个用户识别卡的锁网校验结果为合法;K大于等于1,且小于 通信终端所支持的最大用户识别卡数N;
处理模块22,配置为在判断模块21的判断结果为是时,将通信终端的所有用户识别卡都设置为合法;否则,判定该通信终端当前插入的所有用户识别卡都为非法,该通信终端处于锁网状态;此时不能正常使用相关业务。
本实施例中,K的取值可以根据实际应用场景和用户以及运营商的需求等具体设定。例如,针对双卡双待通信终端,K等于1,此时判断其插入的两张用户识别卡中是否存在一张用户识别卡的锁网校验结果为合法,如是,则直接设置该通信终端的两张用户识别卡都为合法,也即另外一个卡槽中的用户识别卡不受限制,此时插入其他运营商的卡也可正常使用。又例如,针对三卡三待通信终端和四卡四待通信终端,K除了可以取等于1,还可取等于2,此时判断其插入的多张用户识别卡中是否存在两张用户识别卡的锁网校验结果为合法,如是,则直接设置该通信终端的两张用户识别卡都为合法,也即剩下的其他卡槽中的用户识别卡不受限制,此时插入其他运营商的卡也可正常使用。
在本实施例中,多卡多待通信终端锁网装置的判断模块21可包括第一选择子模块和第一判断子模块,第一选择子模块配置为依次选择通信终端的多个用户识别卡(多卡多待通信终端里面的用户识别卡一般按照卡1、卡2依次排序),第一判断子模块配置为对第一选择子模块当前选择的用户识别卡进行锁网校验,如校验结果为合法,通知处理模块22;处理模块22包括第一设置子模块,配置为在收到该通知后将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。也即:针对当前的这张校验通过的用户识别卡,直接将其锁网标识设置为FALSE;针对后面未进行锁网校验的用户识别卡,此时则不再需要进行锁网校验,直接将其锁网标识设置为FALSE;针对前面锁网校验结 果为非法的用户识别卡,则对其进行解锁处理,包括将该用户识别卡的锁网标识由TRUE修改为FALSE,反馈该用户识别卡为合法,并将之前所判定的为非法的各个参数均恢复为默认状态。
在本实施例中,判断模块21可包括第二选择子模块和第二判断子模块,第二选择子模块配置为从通信终端的多个用户识别卡中选择出不需要进行密码验证的卡,第二判断子模块配置为先对不需要进行密码验证的用户识别卡进行锁网校验,如有一个校验结果为合法,通知处理模块22,否则,还配置为待需要进行密码验证的用户识别卡通过密码验证后进行锁网校验,如有一个校验结果为合法,通知处理模块22;处理模块22可包括第二设置子模块,配置为收到该通知后,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。也即:针对当前的这张校验通过的用户识别卡,直接将其锁网标识设置为FALSE;针对后面未进行锁网校验的用户识别卡,此时则不再需要进行锁网校验,直接将其锁网标识设置为FALSE;针对前面锁网校验结果为非法的用户识别卡,则对其进行解锁处理,包括将该用户识别卡的锁网标识由TRUE修改为FALSE,反馈该用户识别卡为合法,并将之前所判定的为非法的各个参数均恢复为默认状态。
本实施例中,锁网校验流程包括读取预先写入通信终端中的锁网配置文件,该锁网配置文件包括锁网参数信息、锁网策略和锁网限制;读取所插入的用户识别卡的对应网络参数信息,根据该锁网策略对网络参数和通信终端中存储的锁网参数信息进行比较,若二者一致,则判定当前卡为合法;若不一致,则判定该用户识别卡为非法;进一步的;锁网策略包括但不局限于锁MCC/MNC,锁MCC/MNC+SUB,锁MCC/MNC+GID1,锁MCC/MNC+GID1+GID2和锁卡的全部IMSI等。
实际应用时,判断模块21、处理模块22、第一选择子模块、第一判断 子模块、第一设置子模块、第二选择子模块、第二判断子模块、第二设置子模块可由多卡多待通信终端锁网装置中的中央处理器(CPU,Central Processing Unit)、微处理器(MCU,Micro Control Unit)、数字信号处理器(DSP,Digital Signal Processor)或可编程逻辑阵列(FPGA,Field-Programmable Gate Array)实现。
实施例三:
本实施例提供了一种多卡多待通信终端,例如双卡双待、三卡三待或四卡四待等通信终端,请参见图3所示,包括处理器31和存储器32,存储器配置为存储至少一个程序模块,处理器配置为调用至少一个程序模块执行以下步骤:
判断通信终端的多个用户识别卡中是否有至少一个用户识别卡的锁网校验结果为合法,即判断通信终端当前插入的多个用户识别卡中是否有K个用户识别卡的锁网校验结果为合法;K大于等于1,且小于通信终端所支持的最大用户识别卡数N;
如是,将该通信终端的所有用户识别卡都设置为合法;否则,判断当前插入的所有用户识别卡都为非法,通信终端处于锁网状态;此时不能正常使用相关的业务。
为了更好的理解本发明,下面以多卡多待通信终端为双卡双待手机为例进行说明。该双卡双待手机的卡槽1对应用户识别卡1(以下简称卡1),该双卡双待手机的卡槽2对应用户识别卡2(以下简称卡2)。下面分别以依序选择卡1和卡2进行锁网校验和根据是否需要进行密码验证从卡1和卡2中选择进行锁网校验的顺序为例,对本发明实施例进行详细说明。
请参见图4所示,依序选择卡1和卡2进行锁网校验的流程包括:
步骤401:手机开机后,检测当前卡槽1是否有卡1,如果有,则执行步骤402;否则执行步骤408;
步骤402:对卡1进行锁网校验流程,判断锁网校验结果是否为合法,如是,转至步骤403;否则,转至步骤413;
这里,锁网校验过程如下:
读取锁网配置文件的参数,对卡1数据进行解析得到对应的网络参数,并将其传入到锁网安全库里;其中锁网配置文件中包括锁网参数,锁网策略,锁网条件等;锁网策略包括但不局限于锁MCC/MNC,锁MCC/MNC+步骤UB,锁MCC/MNC+GID1,锁MCC/MNC+GID1+GID2和锁卡的全部IM步骤I;在锁网安全库里,根据锁网策略,比较锁网参数和卡1的网络参数是否一致,如果是,则判定卡1为合法;否则,为非法。
步骤403:卡1为合法,将其锁网标识设为FALSE,接下来执行步骤404;
步骤404:判断卡槽2是否有卡2,如果有,执行步骤405;否则,执行步骤406;
步骤405:将卡2的锁网标识设为FALSE,不再需要进行锁网校验流程,直接执行步骤407;
步骤406:当前手机处于卡1单待状态,其处于非锁网状态;
步骤407:当前卡1和卡2的锁网标识均为FALSE,手机处于非锁网状态,卡槽1和卡槽2均可正常使用和卡相关的流程;
步骤408:判断卡槽2是否插入卡2,如果没有,转至步骤412;如果有,则执行步骤409;
步骤409:对卡2执行锁网校验流程,读取锁网配置文件的参数,对卡2数据进行解析得到网络参数,并将其传入到锁网安全库里;在锁网安全库里,根据锁网策略,比较锁网参数和卡2的网络参数是否一致,如果是,则执行步骤410;否则转至步骤411;
步骤410:卡2的锁网标识为FALSE,当前手机处于卡2单待模式, 其处于非锁网状态;
步骤411:卡2的锁网标识为TRUE,当前手机处于单卡锁网状态;
步骤412:当前手机处于无卡状态,卡槽1和卡槽2均没有卡插入;
步骤413:判断卡槽2是否有卡,如果有,执行步骤414;否则步骤417;
步骤414:对卡槽2执行锁网校验流程,读取锁网配置文件中的锁网参数,解析卡2的相关网络参数,并将其传入到锁网安全库,在锁网安全库里,根据锁网策略,比较锁网参数和卡2的网络参数是否一致,如果是,则执行步骤415;否则执行步骤418;
步骤415:解锁卡1,将卡1和锁网相关的参数均设为非锁网状态,锁网标识为FALSE,执行步骤416;
步骤416:手机处于双卡非锁网状态;
步骤417;判定当前卡1处于单卡锁网状态;
步骤418:手机处于双卡锁网状态。
在双卡开机校验时,还有一种情况是卡2优先于卡1进行校验,如卡1的PIN码打开的情况下,此时卡1将处于等待PIN码解锁的状态,卡2则优先进入到锁网校验流程,具体过程请参见图5所示,包括:
步骤501:当前卡1处于等待PIN码解锁状态,则卡2进入到锁网校验流程;
步骤502:对卡2进行锁网校验,包括:读取锁网配置文件的参数,对卡2数据进行解析得到网络参数,并将其传入到锁网安全库里,在锁网安全库里,根据锁网策略,比较锁网参数和卡2的网络参数是否一致,如果是,则执行步骤503;否则执行步骤504;
步骤503:卡1的PIN码解锁成功后,将其锁网标识设为FALSE,其不需要执行锁网校验流程,执行步骤507;
步骤504:卡1的PIN码解锁成功后,对卡1执行锁网校验流程,包括: 读取锁网配置文件的参数,对卡1数据进行解析得到网络参数,并将其传入到锁网安全库里,在锁网安全库里,根据锁网策略,比较锁网参数和卡1的网络参数是否一致,如果是,则执行步骤505;否则执行步骤506;
步骤505:解锁卡2,将卡2和锁网相关的参数均设为非锁网状态,锁网标识为FALSE,执行步骤507;
步骤506:卡1和卡2的锁网标识均设置为TRUE,手机处于双卡锁网状态,此时和卡相关的业务均不可用;
步骤507:当前卡1和卡2的锁网标识均为FALSE,手机处于非锁网状态,卡1和卡2均可正常使用和卡相关的流程
可见,本发明实施例提供的锁网方案,在充分满足运营商合法权益的前提下,同时兼顾了客户的个性化需求,在双卡双待终端上其中的一个卡槽所插入的卡为运营商的合法卡,另一个卡槽所插入的卡则不受限制,插入任意卡包括非运营商的卡均可正常使用卡相关的业务,为双卡双待终端提供了一种更具人性化的锁网方案。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现 在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
基于此,本发明实施例还提供了一种计算机存储介质,所述计算机存储介质包括一组指令,当执行所述指令时,引起至少一个处理器执行上述的多卡多待通信终端锁网方法。
以上内容是结合具体的实施方式对本发明所作的进一步详细说明,不能认定本发明的具体实施只局限于这些说明。对于本发明所属技术领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干简单推演或替换,都应当视为属于本发明的保护范围。

Claims (14)

  1. 一种多卡多待通信终端锁网方法,包括:
    判断所述通信终端的多个用户识别卡中是否有至少一个用户识别卡的锁网校验结果为合法;
    如是,将所述通信终端的所有用户识别卡都设置为合法。
  2. 如权利要求1所述的多卡多待通信终端锁网方法,其中,所述判断是否有至少一个用户识别卡的锁网校验结果为合法为:判断所述多个用户识别卡中是否有一个用户识别卡的锁网校验结果为合法。
  3. 如权利要求2所述的多卡多待通信终端锁网方法,其中,判断是否有一个用户识别卡的锁网校验结果为合法,以及将所述通信终端的所有用户识别卡设置为合法包括:
    依次选择所述通信终端的多个用户识别卡,对当前选择的用户识别卡进行锁网校验,如校验结果为合法,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。
  4. 如权利要求2所述的多卡多待通信终端锁网方法,其中,判断是否有一个用户识别卡的锁网校验结果为合法,以及将所述通信终端的所有用户识别卡设置为合法包括:
    从所述通信终端的多个用户识别卡中选择出不需要进行密码验证的用户识别卡,对不需要进行密码验证的用户识别卡进行锁网校验,如有一个校验结果为合法,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。
  5. 如权利要求2所述的多卡多待通信终端锁网方法,其中,判断是否有一个用户识别卡的锁网校验结果为合法,以及将所述通信终端的所有用户识别卡设置为合法包括:
    从所述通信终端的多个用户识别卡中选择出不需要进行密码验证的用户识别卡,对不需要进行密码验证的用户识别卡进行锁网校验,所有不需要进行密码验证的用户识别卡的校验结果均为非法时,待所述需要进行密码验证的用户识别卡通过密码验证后进行锁网校验,如有一个校验结果为合法,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。
  6. 如权利要求1-5任一项所述的多卡多待通信终端锁网方法,其中,所述多卡多待通信终端为双卡双待、三卡三待或四卡四待通信终端。
  7. 如权利要求1-5任一项所述的多卡多待通信终端锁网方法,其中,所述通信终端中存储有锁网配置信息,所述锁网配置信息包括锁网参数信息和锁网策略;
    对用户识别卡进行锁网校验包括:
    读取用户识别卡的网络参数信息,将该网络参数信息根据所述锁网策略与所述锁网参数信息进行比较,若二者一致,则判定该用户识别卡合法。
  8. 一种多卡多待通信终端锁网装置,包括判断模块和处理模块;其中,
    所述判断模块,配置为判断所述通信终端的多个用户识别卡中是否有至少一个用户识别卡的锁网校验结果为合法;
    所述处理模块,配置为在所述判断模块的判断结果为是时,将所述通信终端的所有用户识别卡都设置为合法。
  9. 如权利要求8所述的多卡多待通信终端锁网装置,其中,所述判断模块配置为:判断所述多个用户识别卡中是否有一个用户识别卡的锁网校验结果为合法。
  10. 如权利要求9所述的多卡多待通信终端锁网装置,其中,所述判断模块包括第一选择子模块和第一判断子模块,所述第一选择子模块配置为依次选择所述通信终端的多个用户识别卡,所述第一判断子模块配置为 对所述第一选择子模块当前选择的用户识别卡进行锁网校验,如校验结果为合法,通知所述处理模块;所述处理模块包括第一设置子模块,配置为在收到所述通知后将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。
  11. 如权利要求10所述的多卡多待通信终端锁网装置,其中,所述判断模块包括第二选择子模块和第二判断子模块,所述第二选择子模块配置为从所述通信终端的多个用户识别卡中选择出不需要进行密码验证的卡,所述第二判断子模块配置为对不需要进行密码验证的用户识别卡进行锁网校验,如有一个校验结果为合法,通知所述处理模块;
    所述处理模块包括第二设置子模块,配置为收到所述通知后,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。
  12. 如权利要求10所述的多卡多待通信终端锁网装置,其中,所述判断模块包括第二选择子模块和第二判断子模块,所述第二选择子模块配置为从所述通信终端的多个用户识别卡中选择出不需要进行密码验证的卡,所述第二判断子模块配置为对不需要进行密码验证的用户识别卡进行锁网校验;当所有不需要进行密码验证的用户识别卡的校验结果均为非法时,待所述需要进行密码验证的用户识别卡通过密码验证后进行锁网校验,如有一个校验结果为合法,通知所述处理模块;
    所述处理模块包括第二设置子模块,配置为收到所述通知后,将该用户识别卡以及后面未进行锁网校验的用户识别卡和/或前面锁网校验结果为非法的用户识别卡设置为合法。
  13. 一种多卡多待通信终端,包括处理器和存储器,所述存储器配置为存储至少一个程序模块,所述处理器配置为调用至少一个所述程序模块执行以下步骤:
    判断所述通信终端的多个用户识别卡中是否有至少一个用户识别卡的锁网校验结果为合法;
    如是,将所述通信终端的所有用户识别卡都设置为合法。
  14. 一种计算机存储介质,所述计算机存储介质包括一组指令,当执行所述指令时,引起至少一个处理器执行如权利要求1至7任一项所述的多卡多待通信终端锁网方法。
PCT/CN2015/070986 2014-10-14 2015-01-19 多卡多待通信终端及其锁网方法、装置、计算机存储介质 WO2015131680A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410542128.0 2014-10-14
CN201410542128.0A CN105578445A (zh) 2014-10-14 2014-10-14 多卡多待通信终端及其锁网方法、装置

Publications (1)

Publication Number Publication Date
WO2015131680A1 true WO2015131680A1 (zh) 2015-09-11

Family

ID=54054532

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/070986 WO2015131680A1 (zh) 2014-10-14 2015-01-19 多卡多待通信终端及其锁网方法、装置、计算机存储介质

Country Status (2)

Country Link
CN (1) CN105578445A (zh)
WO (1) WO2015131680A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112383913B (zh) * 2020-11-12 2024-05-14 深圳市锐尔觅移动通信有限公司 终端锁卡控制方法、装置、终端设备及存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881600B (zh) * 2017-05-11 2020-09-01 展讯通信(上海)有限公司 一种基于sim卡槽的任意解锁方法
CN112235783B (zh) * 2020-10-16 2023-03-24 Tcl通讯(宁波)有限公司 多sim卡管理控制方法、装置、存储介质及移动终端

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102780995A (zh) * 2012-07-06 2012-11-14 宁波萨瑞通讯有限公司 双卡双待手机锁网方法
CN103781053A (zh) * 2012-10-26 2014-05-07 中兴通讯股份有限公司 多卡移动终端锁网锁卡方法、装置及相关终端

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103813326A (zh) * 2012-11-09 2014-05-21 青岛海信移动通信技术股份有限公司 一种终端入网及锁网控制方法、设备

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102780995A (zh) * 2012-07-06 2012-11-14 宁波萨瑞通讯有限公司 双卡双待手机锁网方法
CN103781053A (zh) * 2012-10-26 2014-05-07 中兴通讯股份有限公司 多卡移动终端锁网锁卡方法、装置及相关终端

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112383913B (zh) * 2020-11-12 2024-05-14 深圳市锐尔觅移动通信有限公司 终端锁卡控制方法、装置、终端设备及存储介质

Also Published As

Publication number Publication date
CN105578445A (zh) 2016-05-11

Similar Documents

Publication Publication Date Title
US10798107B2 (en) Application platform with flexible permissioning
US9055443B2 (en) Mobile device-type locking
US9591484B2 (en) Secure environment for subscriber device
EP2919497B1 (en) Soft sim card activating method and network-joining method and terminal, and network access device
TWI587674B (zh) 用以支援嵌入式通用積體電路卡上全球平台使用之方法與裝置
US9628981B2 (en) Method for changing MNO in embedded SIM on basis of special privilege, and embedded SIM and recording medium therefore
EP2905715B1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
US9319884B2 (en) Remote unlocking of telecommunication device functionality
US9749862B1 (en) System for binding multiple SIM cards to an electronic device
US9600671B2 (en) Systems and methods for account recovery using a platform attestation credential
WO2015109692A1 (zh) 移动终端锁网锁卡方法及装置、终端、sim卡、存储介质
CN107113613A (zh) 服务器、移动终端、网络实名认证系统及方法
US11240236B2 (en) Methods for authorizing use of an application on a device
KR20140045571A (ko) 제거가능 모듈을 액세스 단말에 바인딩
CN107508784B (zh) 一种应用登录方法及终端设备
WO2015131680A1 (zh) 多卡多待通信终端及其锁网方法、装置、计算机存储介质
CN105426712A (zh) 应用加密方法和装置
US11910190B1 (en) System for binding multiple SIM cards to an electronic device
US20200228979A1 (en) Framework for securing device activations
CN110191464B (zh) 一种防止sim卡被盗用的方法以及系统
US20200160332A1 (en) Processing payments
CN104134025A (zh) 基于sim卡的移动终端加锁方法、装置及移动终端
CN105636046A (zh) WiFi设备可信接入访问控制方法和系统
CN103702333B (zh) 用户终端中实现电信智能卡功能的方法和软件电信智能卡
US20230254696A1 (en) Sim based application action authentication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15759252

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15759252

Country of ref document: EP

Kind code of ref document: A1