WO2018010480A1 - Procédé de verrouillage de réseau pour une carte esim, terminal et serveur d'authentification de verrouillage de réseau - Google Patents
Procédé de verrouillage de réseau pour une carte esim, terminal et serveur d'authentification de verrouillage de réseau Download PDFInfo
- Publication number
- WO2018010480A1 WO2018010480A1 PCT/CN2017/083885 CN2017083885W WO2018010480A1 WO 2018010480 A1 WO2018010480 A1 WO 2018010480A1 CN 2017083885 W CN2017083885 W CN 2017083885W WO 2018010480 A1 WO2018010480 A1 WO 2018010480A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- lock network
- terminal
- lock
- network authentication
- authentication server
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
Definitions
- the present disclosure relates to the field of communications, for example, to an eSIM (Embedded Subscriber Identification Module) card locking network method, a terminal, and a lock network authentication server.
- eSIM embedded Subscriber Identification Module
- GSM Association Global System for Mobile Communications
- GSMA Global System for Mobile Communications
- SIM Subscriber Identification Module
- the GSMA has not yet named the reprogrammable SIM card, and the externally reprogrammable SIM card is called the Embedded Subscriber Identification Module (eSIM).
- eSIM Embedded Subscriber Identification Module
- eSIM still falls within the scope of SIM cards, but eSIM embeds the SIM card directly on the device chip rather than as a separate removable component.
- the device using eSIM can cancel the SIM card slot, save space and make the device slim, and avoid the problem that the card slot is easy to enter dust and severe vibration, resulting in poor contact, and there is no need to worry about frequent card replacement and damage.
- SIM card and card slot can cancel the SIM card slot, save space and make the device slim, and avoid the problem that the card slot is easy to enter dust and severe vibration, resulting in poor contact, and there is no need to worry about frequent card replacement and damage.
- eSIM allows users to flexibly choose operators and use operators' services.
- a mobile phone user can choose operators to conduct services.
- the user purchases a contract machine at the carrier's reserve price, but switches to another operator's eSIM within the contract, it is equivalent to the user's breach of contract with the contracted operator, which will inevitably result in a larger economy for the operator. loss.
- the eSIM card lock network method, the terminal and the lock network authentication server provided by the disclosure can prevent the contract user of the operator from transferring to other operator services during the contract period and causing losses to the operator of the contract user.
- An eSIM card lock network method includes:
- the terminal When receiving the authentication success notification sent by the lock network authentication server, the terminal is allowed to obtain the service provided by the operator.
- An eSIM card lock network method includes:
- the lock network authentication server on the operator side receives the lock network authentication request sent by the terminal, where the lock network authentication request includes the lock network information of the eSIM card in the terminal;
- the lock network authentication server performs lock network authentication on the eSIM card according to the lock network policy of the operator and the lock network information, and sends the lock network authentication result to the terminal.
- a terminal comprising:
- the query module is configured to read the lock network information of the eSIM card in the terminal, and send the lock network information to the lock network authentication server of the operator to perform lock network authentication;
- the management module is configured to allow the terminal to obtain the service provided by the operator when receiving the authentication success notification sent by the lock network authentication server.
- a lock network authentication server includes:
- a receiving module configured to receive a lock network authentication request sent by the terminal, where the lock network authentication request includes lock network information of the eSIM card in the terminal;
- the lock network authentication module is configured to perform network lock authentication on the eSIM card according to the lock network policy of the operator accessed by the terminal and the lock network information, and send the lock network authentication result to the terminal.
- a computer readable storage medium storing computer executable instructions arranged to perform the aforementioned eSIM card lock network method.
- a terminal comprising:
- At least one processor At least one processor
- the memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor to cause the at least one processor to perform the method of terminal execution described above.
- a lock network authentication server includes:
- At least one processor At least one processor
- the memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor to cause the at least one processor to perform the method performed by the lock network authentication server.
- the eSIM card lock network method, the terminal, the lock network authentication server and the storage medium provided by the disclosure read the lock network information of the eSIM card in the terminal, and send the lock network authentication server to the operator for the lock network authentication, and the lock network authentication server is based on The lock network policy and the lock network information of the operator perform network lock authentication on the eSIM card, and the lock network authentication result is sent to the terminal.
- the authentication success notification sent by the lock network authentication server indicates that the eSIM card of the user terminal is an authorized card of the operator, the terminal is allowed to obtain the service provided by the operator.
- the operator's service can be obtained after the lock network authentication of the operator's lock network authentication server, and the contract user of the operator can be prevented from violating the contract during the contract period.
- Other carrier services cause losses to the operators of contract users.
- FIG. 1 is a schematic flowchart of a method for locking an eSIM card on a terminal side in Embodiment 1;
- FIG. 2 is a schematic flowchart of a method for locking an eSIM card on a lock network authentication server in the first embodiment
- FIG. 3 is a schematic structural diagram of a terminal in Embodiment 2;
- FIG. 4 is a schematic structural diagram of a lock network authentication server in Embodiment 2;
- FIG. 5 is a schematic flowchart of a method for locking an eSIM card in the third embodiment
- FIG. 6 is a schematic structural diagram of hardware of a terminal according to an embodiment
- FIG. 7 is a schematic diagram showing the hardware structure of a lock network authentication server according to an embodiment.
- the terminal lock network method provided in this embodiment relates to a user side terminal and a server on the operator network side.
- the eSIM card of the user-side terminal passes the lock network authentication of the operator when the access operator obtains the service. It indicates that the eSIM card of the user terminal is a card of an authorized operator, and can obtain the service of the authorized operator. It can prevent the operator's contract users from causing losses to the operator during the contract period due to breach of contract to other carrier services.
- the eSIM card lock network method on the lock network server side of the terminal side and the operator side is taken as an example for description.
- FIG. 1 is a flow chart of an eSIM card lock network method on the terminal side.
- step 110 the lock network information of the eSIM card in the terminal is read.
- Step 110 may be performed after the terminal completes booting, or may be performed at any time before the eSIM card of the terminal accesses an operator to obtain the service.
- step 120 the read lock network information is sent to the operator's lock network authentication server for lock network authentication.
- step 130 when receiving the authentication success notification sent by the lock network authentication server, it indicates that the eSIM card in the terminal is a card authorized by the operator, and allows the terminal to obtain the service provided by the operator.
- the secondary authentication opportunity when receiving the authentication failure notification sent by the lock network authentication server, the secondary authentication opportunity may also be provided.
- the corresponding interface may be displayed to prompt the user to input the unlock code to obtain the user input.
- the unlock code is sent to the lock network authentication server for secondary lock network authentication.
- the threshold N of the continuous secondary lock network authentication may also be set.
- the terminal is shut down or locked, so that some users maliciously submit the authentication repeatedly, which causes waste of resources.
- the value of N can be flexibly set according to the application scenario and requirements, for example, set to 1, 3, 4, or 5, and the like.
- the identity of the terminal may be legally authenticated.
- the identity unique identifier of the terminal for example, the International Mobile Equipment Identity (IMEI)
- IMEI International Mobile Equipment Identity
- the identity unique identifier of the terminal may be sent to the lock network authentication server along with the lock network information, or may be separately sent to the lock network authentication server.
- the lock network authentication server may authenticate the identity of the terminal before performing the lock network authentication on the eSIM card, or authenticate the identity of the terminal after the eSIM card is authenticated by the lock network.
- the lock network information of the eSIM card obtained in this embodiment may be based on a lock network algorithm used by the lock network server (see 3rd Generation Partnership Project (3GPP)). Determined by the lock network (SimLock algorithm) described in TS 22.022.
- the lock network information in this embodiment may include any one of the following information:
- IMSI International Mobile Subscriber Identification Number
- MCC Mobile Country Code
- MNC Mobile Network Code
- MCC MCC, MNC, GID1 (first packet identification) and GID2 (second packet identification).
- 2 is an eSIM card lock network method on the side of the operator side lock network authentication server.
- step 210 the lock network authentication server on the operator side receives the lock network authentication request sent by the terminal.
- the lock network authentication request in step 210 may include lock network information of the eSIM card in the terminal.
- step 220 the lock network authentication server performs network lock authentication on the eSIM card according to the operator's lock network policy and the lock network information, and sends the lock network authentication result to the terminal.
- the lock network strategy in step 220 includes a lock network algorithm (SimLock algorithm), and different operators can adopt different lock network algorithms.
- SimLock algorithm a lock network algorithm
- different operators can adopt different lock network algorithms.
- any of the following five algorithms provided in this embodiment may be adopted:
- Network personalization Network personalization algorithm, at this time the lock network information includes MCC and MNC;
- Network subset personalization algorithm where the lock network information includes the last two bits in the MCC, MNC, and IMSI;
- the lock network information includes MCC, MNC and GID1;
- lock network information includes MCC, MNC, GID1 and GID2;
- the lock network information includes IMSI.
- the terminal may also obtain the unlock code input by the user at least once for secondary authentication. Therefore, the lock network authentication server in this embodiment may further receive an unlock code sent by the terminal when the lock network authentication result is a failure, and perform secondary lock network authentication on the eSIM card according to the unlock code, and the secondary lock network The authentication result is sent to the terminal.
- the lock network authentication server in this embodiment may also receive the identity unique identifier sent by the terminal.
- the lock network authentication server in this embodiment performs the network authentication on the eSIM card, or performs the network authentication on the eSIM card.
- the authentication mode includes, but is not limited to, the following two methods. Any one.
- the identity unique identifier of the terminal it is found in the database of the operator whether the identity unique identifier of the terminal is stored, for example, the unique identifier of the terminal is stored, indicating that the identity of the terminal is legal; if the identity unique identifier of the terminal is not stored, indicating The terminal identity is invalid. The terminal is not allowed to obtain the service of the carrier.
- the operator searches the database for the binding of the identity unique identifier of the terminal and the lock network information of the terminal eSIM card. If there is storage, the identity of the terminal is legal; if the storage terminal is not bound, The identity unique identifier and the lock network information of the terminal eSIM card indicate that the identity of the terminal is invalid, and the terminal is not allowed to obtain the service of the operator.
- the eSIM card and the terminal can have a one-to-one binding relationship, so this verification can improve security.
- the embodiment provides a communication system including a terminal and a lock network authentication server.
- the eSIM card lock network information can be provided for the lock network authentication, and the eSIM card of the terminal can be indicated after the authentication is passed. It is a card authorized by the operator to allow the terminal to obtain the service.
- the following examples respectively illustrate the results of the terminal and the lock network authentication server.
- the terminal in this embodiment includes: a query module 31 and a management module 32.
- the query module 31 is configured to read the lock network information of the eSIM card in the terminal, and send the lock network information to the lock network authentication server of the operator for lock network authentication.
- the query module 31 can be executed after the terminal completes the booting, or can be executed at any time before the eSIM card of the terminal accesses an operator to obtain the service.
- the read lock network information can be based on the lock network algorithm used by the lock network server (SimLock algorithm). ) and determined.
- the lock network information can include any of the following information:
- MCC MCC, MNC, GID1 (first packet identification) and GID2 (second packet identification).
- the management module 32 is configured to allow the terminal to obtain the service provided by the operator when receiving the authentication success notification sent by the lock network authentication server.
- the query module 31 in this embodiment may be configured to obtain an unlocking code input by the user, and send the unlocking code to the lock network authentication server, when the authentication result is that the authentication failure notification sent by the lock network authentication server is received.
- Secondary lock network authentication Through the secondary lock network authentication, the way of lock network authentication can be increased, and the satisfaction of the user experience is improved.
- the query module 31 can display a SIM unlock interface on the terminal for the user to input the unlock code.
- the unlock code user in this embodiment can be obtained from the operator in advance.
- the management module 32 may also set a threshold N for continuously performing secondary lock network authentication, and when the authentication code of the user input is continuously sent N times to the lock network authentication server, the terminal is shut down. Or lock, to avoid some users maliciously submit authentication repeatedly, resulting in waste of resources.
- N is a positive integer.
- the identity of the terminal may be legally authenticated.
- the query module 31 can send the identity unique identifier of the terminal, for example, the IMEI, to the lock network authentication server to legally authenticate the identity of the terminal.
- the identity unique identifier of the terminal may be sent to the lock network authentication server along with the lock network information, or may be separately sent to the lock network authentication server.
- the lock network authentication server may authenticate the identity of the terminal before performing the lock network authentication on the eSIM card, or authenticate the identity of the terminal after the eSIM card is authenticated by the lock network.
- the query module 31 and the management module 32 in this embodiment may be disposed in the terminal processor, and the functions of the query module 31 and the functions of the management module 32 may be implemented by a processor of the terminal.
- a lock network authentication server provided by this embodiment includes: a receiving module 41 and a lock network authentication module 42.
- the receiving module 41 is configured to receive a lock network authentication request sent by the terminal, where the lock network authentication request includes the lock network information of the eSIM card in the terminal.
- the lock network authentication module 42 is configured to perform network lock authentication on the eSIM card according to the lock network policy and the lock network information of the operator accessed by the terminal, and send the lock network authentication result to the terminal.
- the lock network strategy may include a lock network algorithm (SimLcok algorithm), and different operators may adopt different lock network algorithms.
- the lock network authentication module 42 can adopt any one of the following five algorithms provided in this embodiment:
- Network personalization Network personalization algorithm, at this time the lock network information includes MCC and MNC;
- Network subset personalization algorithm where the lock network information includes the last two bits of MCC, MNC and IMSI;
- the lock network information includes MCC, MNC, and GID1;
- lock network information includes MCC, MNC, GID1 and GID2;
- the lock network information includes IMSI.
- the receiving module 41 is further configured to receive an unlocking code sent by the terminal when the lock network authentication result is a failure.
- the lock network authentication module 42 is further configured to perform secondary lock network authentication on the eSIM card according to the unlock code, and send the secondary lock network authentication result to the terminal.
- the lock network authentication module 42 can also authenticate the identity of the terminal. Therefore, the receiving module 41 in this embodiment can also receive the identity unique identifier sent by the terminal.
- the lock network authentication module 42 in this embodiment may be configured to perform legal authentication on the identity of the terminal before the network authentication of the eSIM card is performed, or the authentication mode includes, but is not limited to, the following: Either of the two methods.
- the lock network authentication module 42 searches the operator's database for whether the terminal's identity unique identifier is stored, such as the terminal's identity unique identifier, indicating that the terminal's identity is legal; if the terminal's identity is not stored A unique identifier indicates that the identity of the terminal is invalid and the terminal is not allowed to obtain the service of the operator.
- the lock network authentication module 42 searches in the database of the operator whether to bind the identity unique identifier of the terminal and the lock network information of the terminal eSIM card. If there is storage, the identity of the terminal is legal; Binding the identity unique identifier of the storage terminal and the lock network information of the terminal eSIM card, indicating The identity of the terminal is invalid. The terminal is not allowed to obtain the service of the carrier.
- the eSIM card and the terminal can have a one-to-one binding relationship, so this verification can improve security.
- the receiving module 41 and the lock network authentication module 42 in this embodiment may be disposed in a processor of the server, and the function of the receiving module 41 and the function of the lock network authentication module 42 may be implemented by a processor of the server.
- the modules or steps of the foregoing embodiments may be implemented by a general-purpose computing device.
- the functions of the foregoing modules may be implemented by a processor in a terminal or a network management system.
- the modules or steps may be centralized on a single computing device or distributed across a network of computing devices.
- the modules or steps may be implemented in a program code executable by the computing device, and the modules or steps may be stored Executed by a computing device in a computer storage medium (Read Only Memory (ROM), Random Access Memory (RAM), disk, optical disk), and in some cases, may be different
- ROM Read Only Memory
- RAM Random Access Memory
- disk disk
- optical disk optical disk
- the steps shown or described herein are performed sequentially, or the modules or steps are separately fabricated into a plurality of integrated circuit modules, or a plurality of modules or steps are fabricated into a single integrated circuit module.
- This embodiment illustrates the present embodiment by combining a lock network process.
- step 510 the terminal is powered on.
- step 520 the terminal reads the lock network information of the eSIM card and sends it to the lock network authentication server on the operator side.
- the lock network information in this embodiment includes at least one of IMSI, GID1, GID2, and IMEI.
- step 530 the lock network authentication server authenticates the terminal identity based on the IMEI and the IMSI.
- step 540 the lock network authentication server checks the lock network information of the eSIM card, and runs the SimmLok algorithm to determine whether the eSIM card belongs to the license card authorized by the operator. If the eSIM card is an authorized card of the operator, go to the step. 550; if the eSIM card is not an operator authorized card, go to step 560.
- step 550 the authentication success notification is fed back to the terminal, and the terminal service is available.
- step 560 the authentication failure notification is fed back to the terminal, the terminal pops up the SIM unlocking interface, and waits for the user to input the unlocking code.
- step 570 the terminal acquires the unlock code input by the user, encrypts it, and sends it to the lock network authentication server for secondary lock network authentication.
- step 580 the lock network authentication server decrypts the unlock code to determine whether the unlock code is correct. If the unlock code is correct, go to step 550. If the unlock code is incorrect, go to step 590.
- step 590 the number n of consecutive failures of the secondary lock network authentication is updated.
- step 5100 it is determined whether the number n of consecutive failures of the secondary lock network authentication is greater than a preset threshold N; if n is greater than N, go to step 5110; if n is not greater than N, go to step 560.
- step 5110 the terminal is powered off.
- the eSIM card of the user-side terminal passes the lock network authentication of the operator when the access operator obtains the service, indicating that the eSIM card of the user terminal is an authorization card of the operator, and the service of the operator can be obtained, which can be avoided.
- the carrier contract user caused losses to the contract user's operator during the contract period due to the contract to other carrier services.
- the embodiment further provides a computer readable storage medium storing computer executable instructions arranged to perform any of the methods described above.
- the terminal includes:
- At least one processor 60 which is exemplified by a processor 60 in FIG. 6; and a memory 61, may further include a communication interface 62 and a bus 63.
- the processor 60, the communication interface 62, and the memory 61 can complete communication with each other through the bus 63.
- Communication interface 62 can be configured for information transfer.
- the processor 60 can call the logic instructions in the memory 61 to perform the following methods:
- the terminal When receiving the authentication success notification sent by the lock network authentication server, the terminal is allowed to obtain the service provided by the operator.
- logic instructions in the memory 61 described above may be implemented in the form of a software functional unit and sold or used as a stand-alone product, and may be stored in a computer readable storage medium.
- the memory 61 is a computer readable storage medium, and can be configured to store a software program, a computer executable program, such as a program instruction or a module corresponding to the method in the above embodiment.
- the processor 60 performs functional applications and data processing by running software programs, instructions or modules stored in the memory 61.
- the memory 61 may include a storage program area and an storage data area, wherein the storage program area may store an operating system, an application required for at least one function; the storage data area may store data created according to usage of the terminal, and the like.
- the memory 61 may include a high speed random access memory, and may also include non-easy Loss of memory.
- the lock network authentication server includes:
- At least one processor 70 which is exemplified by a processor 70 in FIG. 7; and a memory 71, may further include a communication interface 72 and a bus 73.
- the processor 70, the communication interface 72, and the memory 71 can complete communication with each other through the bus 73.
- Communication interface 72 can be configured for information transfer.
- the processor 70 can call the logic instructions in the memory 71 to perform the following methods:
- the lock network authentication server on the operator side receives the lock network authentication request sent by the terminal, where the lock network authentication request includes the lock network information of the eSIM card in the terminal;
- the lock network authentication server performs lock network authentication on the eSIM card according to the lock network policy of the operator and the lock network information, and sends the lock network authentication result to the terminal.
- logic instructions in the memory 71 described above may be implemented in the form of a software functional unit and sold or used as a stand-alone product, and may be stored in a computer readable storage medium.
- the memory 71 is a computer readable storage medium, and can be configured to store a software program, a computer executable program, such as a program instruction or a module corresponding to the method in the above embodiment.
- the processor 70 executes functional applications and data processing by running software programs, instructions or modules stored in the memory 71.
- the memory 71 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function; the storage data area may store data created according to usage of the terminal, and the like. Further, the memory 71 may include a high speed random access memory, and may also include a nonvolatile memory.
- the embedded subscriber identity module eSIM card lock network method, the terminal and the lock network authentication server provided by the disclosure allow the terminal to obtain the service provided by the operator when the authentication success notification sent by the lock network authentication server, and the operator's contract can be avoided.
- the user caused losses to the operator of the contract user during the contract period due to the conversion of the contract to other carrier services.
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente invention porte sur un procédé de verrouillage de réseau pour une carte de module d'identification d'abonné intégré (eSIM pour embedded subscriber identification module), sur un terminal et sur un serveur d'authentification de verrouillage de réseau. Le procédé consiste : lorsqu'un terminal doit acquérir un service d'un opérateur, à lire des informations de verrouillage de réseau d'une carte eSIM dans le terminal ; à transmettre les informations de verrouillage de réseau à un serveur d'authentification de verrouillage de réseau de l'opérateur pour subir une authentification de verrouillage de réseau ; et à effectuer, au moyen du serveur d'authentification de verrouillage de réseau, et en fonction d'une stratégie de verrouillage de réseau de l'opérateur et des informations de verrouillage de réseau, l'authentification de verrouillage de réseau sur la carte eSIM et à transmettre un résultat d'authentification de verrouillage de réseau au terminal.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610556546.4 | 2016-07-14 | ||
CN201610556546.4A CN107623907B (zh) | 2016-07-14 | 2016-07-14 | eSIM卡锁网方法、终端及锁网认证服务器 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018010480A1 true WO2018010480A1 (fr) | 2018-01-18 |
Family
ID=60951921
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/083885 WO2018010480A1 (fr) | 2016-07-14 | 2017-05-11 | Procédé de verrouillage de réseau pour une carte esim, terminal et serveur d'authentification de verrouillage de réseau |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107623907B (fr) |
WO (1) | WO2018010480A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114006808A (zh) * | 2021-10-08 | 2022-02-01 | 中移(杭州)信息技术有限公司 | 设备锁网方法、装置、设备及存储介质 |
CN114390509A (zh) * | 2021-12-28 | 2022-04-22 | 天翼物联科技有限公司 | 基于物联网的机卡绑定池实现方法、装置、设备及介质 |
US11991525B2 (en) | 2021-12-02 | 2024-05-21 | T-Mobile Usa, Inc. | Wireless device access and subsidy control |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111356121B (zh) * | 2018-12-21 | 2024-01-26 | 西安佰才邦网络技术有限公司 | 一种基于区块链绑定签约数据的方法及设备 |
CN110418331B (zh) * | 2019-08-02 | 2022-04-12 | Oppo广东移动通信有限公司 | 解锁方法、解锁装置、移动终端及服务器 |
CN113938873B (zh) * | 2020-07-14 | 2024-04-16 | 宇龙计算机通信科技(深圳)有限公司 | 网络锁卡方法、装置、存储介质及终端 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916844A (zh) * | 2012-12-31 | 2014-07-09 | 华为技术有限公司 | 客户识别模块卡开通方法及虚拟客户识别模块卡服务器 |
CN105188049A (zh) * | 2015-09-30 | 2015-12-23 | 宇龙计算机通信科技(深圳)有限公司 | 一种虚拟sim卡服务授权方法、终端、服务器以及系统 |
CN105306466A (zh) * | 2015-10-29 | 2016-02-03 | 东莞酷派软件技术有限公司 | 服务业务的执行方法、服务业务的执行系统和移动终端 |
CN105636043A (zh) * | 2016-02-26 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | eSIM卡鉴权方法、eSIM卡鉴权装置和终端 |
CN105848153A (zh) * | 2016-06-07 | 2016-08-10 | 宇龙计算机通信科技(深圳)有限公司 | 嵌入式sim卡注册、嵌入式sim卡鉴权方法及对应系统 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101800986A (zh) * | 2010-02-26 | 2010-08-11 | 华为终端有限公司 | 实现终端锁网及解锁的方法、装置 |
-
2016
- 2016-07-14 CN CN201610556546.4A patent/CN107623907B/zh active Active
-
2017
- 2017-05-11 WO PCT/CN2017/083885 patent/WO2018010480A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916844A (zh) * | 2012-12-31 | 2014-07-09 | 华为技术有限公司 | 客户识别模块卡开通方法及虚拟客户识别模块卡服务器 |
CN105188049A (zh) * | 2015-09-30 | 2015-12-23 | 宇龙计算机通信科技(深圳)有限公司 | 一种虚拟sim卡服务授权方法、终端、服务器以及系统 |
CN105306466A (zh) * | 2015-10-29 | 2016-02-03 | 东莞酷派软件技术有限公司 | 服务业务的执行方法、服务业务的执行系统和移动终端 |
CN105636043A (zh) * | 2016-02-26 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | eSIM卡鉴权方法、eSIM卡鉴权装置和终端 |
CN105848153A (zh) * | 2016-06-07 | 2016-08-10 | 宇龙计算机通信科技(深圳)有限公司 | 嵌入式sim卡注册、嵌入式sim卡鉴权方法及对应系统 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114006808A (zh) * | 2021-10-08 | 2022-02-01 | 中移(杭州)信息技术有限公司 | 设备锁网方法、装置、设备及存储介质 |
US11991525B2 (en) | 2021-12-02 | 2024-05-21 | T-Mobile Usa, Inc. | Wireless device access and subsidy control |
CN114390509A (zh) * | 2021-12-28 | 2022-04-22 | 天翼物联科技有限公司 | 基于物联网的机卡绑定池实现方法、装置、设备及介质 |
CN114390509B (zh) * | 2021-12-28 | 2023-12-05 | 天翼物联科技有限公司 | 基于物联网的机卡绑定池实现方法、装置、设备及介质 |
Also Published As
Publication number | Publication date |
---|---|
CN107623907B (zh) | 2021-07-27 |
CN107623907A (zh) | 2018-01-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210152357A1 (en) | Method and device for identity verification | |
KR102325912B1 (ko) | 디바이스에 대한 총체적 모듈 인증 | |
WO2018010480A1 (fr) | Procédé de verrouillage de réseau pour une carte esim, terminal et serveur d'authentification de verrouillage de réseau | |
US10965690B2 (en) | Method for managing the status of a connected device | |
US20210329453A1 (en) | Blockchain based wireless access point password management | |
US9485648B2 (en) | Method for distributing virtual user identification data, method for acquiring virtual user identification data, and device | |
US20190139047A1 (en) | Block chain based resource management | |
US9025769B2 (en) | Method of registering smart phone when accessing security authentication device and method of granting access permission to registered smart phone | |
DK2924944T3 (en) | Presence authentication | |
WO2019056971A1 (fr) | Procédé et dispositif d'authentification | |
CN104935435A (zh) | 登录方法、终端及应用服务器 | |
CN111065101A (zh) | 基于区块链的5g通信信息加解密方法、设备及存储介质 | |
CN111163467A (zh) | 5g用户终端接入5g网络的方法、用户终端设备及介质 | |
WO2011124051A1 (fr) | Procédé et système d'authentification de terminal | |
WO2012075764A1 (fr) | Procédé de stockage de paramètres clés et terminal | |
CN111132305A (zh) | 5g用户终端接入5g网络的方法、用户终端设备及介质 | |
CN112423300A (zh) | 无线网络接入认证方法及装置 | |
KR20150100602A (ko) | 데이터 저장 및 판독 방법, 장치, 및 기기 | |
CN106537962B (zh) | 无线网络配置、接入和访问方法、装置及设备 | |
CN104918244A (zh) | 一种终端及终端通信方法 | |
CN111770488B (zh) | Ehplmn更新方法、相关设备及存储介质 | |
US11076296B1 (en) | Subscriber identity module (SIM) application authentication | |
CN205864753U (zh) | 一种终端设备的加密防护系统 | |
CN106162630B (zh) | 一种终端设备的加密防护方法 | |
CN111163466A (zh) | 5g用户终端接入区块链的方法、用户终端设备及介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17826819 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17826819 Country of ref document: EP Kind code of ref document: A1 |