WO2018076148A1 - 一种防破解终端锁网信息的方法 - Google Patents
一种防破解终端锁网信息的方法 Download PDFInfo
- Publication number
- WO2018076148A1 WO2018076148A1 PCT/CN2016/103136 CN2016103136W WO2018076148A1 WO 2018076148 A1 WO2018076148 A1 WO 2018076148A1 CN 2016103136 W CN2016103136 W CN 2016103136W WO 2018076148 A1 WO2018076148 A1 WO 2018076148A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal device
- information
- network
- terminal
- lock network
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
Definitions
- the invention relates to the field of preventing the terminal lock network information from being cracked, repairing and restoring the factory lock network information, and particularly relates to a method for preventing cracking the terminal lock network information.
- the object of the present invention is to provide a method for preventing cracking of terminal lock network information in order to solve the above problems.
- the invention comprises the following steps:
- Step 1 After the terminal device is powered on, the network state of the device is monitored, and whether the current terminal device is camped on the mobile network is monitored;
- Step 2 After listening to the terminal device to camp on the network, obtain information about the lock network of the terminal device, otherwise continue to monitor;
- Step 3 Compare the obtained lock network related information with the lock network information saved in the terminal device. If the lock network information is changed, the related information of the terminal device is reported to the server. Otherwise, if the lock network information does not change, go to step 8. For the first time the terminal device is powered on, since the previous lock network information is not saved, Therefore, the relevant information of the terminal device is reported to the server;
- Step 4 After obtaining the request data information sent by the terminal device, the server may search for the relevant lock network information data packet according to the terminal device related information, and return relevant information to the terminal device.
- Step 5 After receiving the related information returned by the server, the terminal device checks whether the information about the lock network packet is included, and if so, encrypts and locks the lock network information, and downloads the lock network data packet. Otherwise, the server does not send the lock network data. Packet information, then encrypt and save the current lock network information, go to step eight;
- Step 6 After downloading the lock network data packet, the terminal device uses the downloaded lock network data packet to upgrade the lock network information;
- Step 7 After the upgrade is complete, the terminal device reports the upgrade result to the server.
- Step 8 The process ends.
- the information about the lock network of the terminal device is the identification code of the mobile user; and the information about the terminal device in the third step is the device model, the version number, the device ID, and the lock network information.
- the method for reporting related information of the terminal device to the server in the step 3 includes the following steps:
- Step (1) the terminal device initiates a request to send data to the server;
- Step (2) determining whether the current terminal device network data link is established
- Step (3) If not established, the terminal device starts to listen to the network data link state, and proceeds to step (4), otherwise, sends data to the server, and proceeds to step (5);
- Step (4) if the terminal device network data link is established, the data is sent to the server, and vice versa, the monitoring is continued;
- Step (5) the data is sent successfully, and the process proceeds to step (6). Otherwise, the number of retries is increased by 1, and it is determined whether the number of retries is greater than a threshold. If the number is greater than, the process proceeds to step (6) to retry sending data.
- Step (6) The process ends.
- the present invention is a method for preventing the information of the terminal lock network.
- the present invention is directed to the lock network terminal sold by the current operator channel to crack the lock network information, so that the terminal can use other carrier networks, and further The problem that causes the operator's interests to suffer losses.
- the invention provides a method for restoring the terminal lock network information by transmitting the original lock network information of the terminal through the server when detecting that the current terminal lock network information is modified. Ensure that the lock information of the terminal is not modified and can always reside under the network of the preset carrier to protect the interests of the operator.
- Figure 1 is a flow chart of the present invention
- FIG. 2 is a flow diagram of a device transmitting data to a server.
- the present invention includes the following steps:
- Step 1 After the terminal device is powered on, the network state of the device is monitored, and whether the current terminal device is camped on the mobile network is monitored;
- Step 2 After listening to the terminal device to camp on the network, obtain information about the lock network of the terminal device, otherwise continue to monitor;
- Step 3 Compare the obtained lock network related information with the lock network information stored in the terminal device. If the lock network information changes, the related information of the terminal device is reported to the server. Otherwise, if the lock network information is not available. Change, then go to step eight, for the terminal device to boot for the first time, because there is no save The previous lock network information, so the relevant information of the terminal device is reported to the server;
- Step 4 After obtaining the request data information sent by the terminal device, the server may search for the relevant lock network information data packet according to the terminal device related information, and return relevant information to the terminal device.
- Step 5 After receiving the related information returned by the server, the terminal device checks whether the information about the lock network packet is included, and if so, encrypts and locks the lock network information, and downloads the lock network data packet. Otherwise, the server does not send the lock network data. Packet information, then encrypt and save the current lock network information, go to step eight;
- Step 6 After downloading the lock network data packet, the terminal device uses the downloaded lock network data packet to upgrade the lock network information;
- Step 7 After the upgrade is complete, the terminal device reports the upgrade result to the server.
- Step 8 The process ends.
- the information related to the lock network of the terminal device in the second step is an identification code of the mobile user, such as an IMSI number of the SIM card; and the related information of the terminal device in the third step is a device model, a version number, a device ID, and a lock. Web information.
- the method for reporting related information of the terminal device to the server in the third step includes the following steps:
- Step (1) the terminal device initiates a request to send data to the server;
- Step (2) determining whether the current terminal device network data link is established
- Step (3) If not established, the terminal device starts to listen to the network data link state, and proceeds to step (4), otherwise, sends data to the server, and proceeds to step (5);
- Step (4) if the terminal device network data link is established, the data is sent to the server, and vice versa, the monitoring is continued;
- Step (5) the data is sent successfully, and the step (6) is reversed. Otherwise, the number of retries is increased by 1, and the retry is judged. Whether the number of times is greater than the threshold, if it is greater than, then step (6) does not retry sending data;
- Step (6) The process ends.
- the terminal moves the network information after the user is turned on.
- the terminal sends the relevant information of the current terminal to the server, and the server detects the related information of the terminal, and confirms that the terminal lock network information is cracked.
- the lock network information at the time of the factory is issued, and after receiving the information, the terminal restores the lock information of the terminal, so that the terminal can only reside on the network of the predetermined operator.
- the present invention provides a method for dynamically monitoring terminal lock network information, and if there is a change, the terminal sends the preset lock network information and the terminal restores the preset information.
- the protection of the lock network information is usually encrypted, but once the encrypted information is cracked, the lock network information is modified and cannot be recovered.
- a further way is to add a hardware lock on the terminal hardware to prevent the terminal lock network information from being brushed by the line.
- this method cannot guarantee to modify the lock information of the device by means of the SD card upgrade. Therefore, at present, operators and terminal manufacturers have not yet had an effective method to ensure that the lock information of the terminal is not modified.
- the solution proposed by the invention can effectively monitor and recover the lock network information of the terminal and protect the interests of the operator.
- the method for cracking the anti-lock network information according to the present invention can solve the problem that the customized terminal that the operator is facing in the channel sales cannot effectively prevent the lock network information from being cracked, resulting in the loss of the operator and the previous period. Terminal subsidies are not recoverable. Can effectively protect the interests of operators.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (4)
- 一种防破解终端锁网信息的方法,其特征在于,包括以下步骤:步骤一:终端设备开机之后监听设备的网络状态,监测当前终端设备是否驻留上移动网络;步骤二:当监听到终端设备驻留上网络之后,获取终端设备的锁网相关信息,否则继续监听;步骤三:将获取到的锁网相关信息与终端设备中保存的锁网信息进行比对,如果锁网信息发生改变,则将终端设备的相关信息上报到服务器端,反之,如果锁网信息没有变化,则转步骤八,对于终端设备第一次开机,由于没有保存之前的锁网信息,因此都会向服务器上报终端设备的相关信息;步骤四:服务器端获取到终端设备发送来的请求数据信息之后,会根据终端设备相关信息去查找有无相关的锁网信息数据包,并向终端设备返回相关信息;步骤五:终端设备收到服务器返回的相关信息后,查看是否包含有锁网数据包信息,如果有,则加密保存锁网信息,并下载锁网数据包,反之,服务器没有下发锁网数据包信息,则加密保存当前锁网信息,转步骤八;步骤六:下载完成锁网数据包后,终端设备使用下载的锁网数据包对其锁网信息进行升级;步骤七:升级完成之后,终端设备向服务器上报升级结果;步骤八:流程结束。
- 根据权利要求1所述的防破解终端锁网信息的方法,其特征在于:所述步骤二中终端设备的锁网相关信息为移动用户的识别码。
- 根据权利要求1所述的防破解终端锁网信息的方法,其特征在于:所述步骤三中终端设备的相关信息为设备型号、版本号、设备ID、锁网信息。
- 根据权利要求1所述的防破解终端锁网信息的方法,其特征在于:所述步骤三中终端设备的相关信息上报到服务器端的方法包括以下步骤:步骤(1):终端设备发起向服务器发送数据的请求;步骤(2):判断当前终端设备网络数据链接是否建立;步骤(3):如果没有建立,则终端设备开始监听网络数据链接状态,转步骤(4),反之,则向服务器发送数据,转步骤(5);步骤(4):如果终端设备网络数据链接建立,则向服务器发送数据,反之,继续监听;步骤(5):发送数据成功,转步骤(6),反之,重试次数加1,并判断重试次数是否大于阈值,大于则转步骤(6)否重试发送数据;步骤(6):流程结束。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201680001907.7A CN108293184A (zh) | 2016-10-25 | 2016-10-25 | 一种防破解终端锁网信息的方法 |
PCT/CN2016/103136 WO2018076148A1 (zh) | 2016-10-25 | 2016-10-25 | 一种防破解终端锁网信息的方法 |
US15/542,539 US20190246283A1 (en) | 2016-10-25 | 2016-10-25 | Method for preventing network locking information of terminal device from being cracked |
PH12017501396A PH12017501396A1 (en) | 2016-10-25 | 2017-08-03 | Method for preventing network locking information of terminal device from being cracked |
CONC2017/0009559A CO2017009559A2 (es) | 2016-10-25 | 2017-09-21 | Método para evitar que se penetre información de bloqueo de red de dispositivo de terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/103136 WO2018076148A1 (zh) | 2016-10-25 | 2016-10-25 | 一种防破解终端锁网信息的方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018076148A1 true WO2018076148A1 (zh) | 2018-05-03 |
Family
ID=62024264
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/103136 WO2018076148A1 (zh) | 2016-10-25 | 2016-10-25 | 一种防破解终端锁网信息的方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20190246283A1 (zh) |
CN (1) | CN108293184A (zh) |
CO (1) | CO2017009559A2 (zh) |
PH (1) | PH12017501396A1 (zh) |
WO (1) | WO2018076148A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110505225A (zh) * | 2019-08-21 | 2019-11-26 | Oppo(重庆)智能科技有限公司 | 一种终端锁卡方法、装置及计算机可读存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101400062A (zh) * | 2008-10-23 | 2009-04-01 | 中兴通讯股份有限公司 | 一种锁网终端的升级方法及系统 |
CN101478748A (zh) * | 2009-01-24 | 2009-07-08 | 深圳华为通信技术有限公司 | 一种sim卡防解锁方法及用户设备 |
CN102186161A (zh) * | 2011-01-17 | 2011-09-14 | 上海华勤通讯技术有限公司 | 鉴别sim卡合法性的方法 |
WO2012055192A1 (zh) * | 2010-10-25 | 2012-05-03 | 中兴通讯股份有限公司 | 一种终端升级锁网方法和装置 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8326268B2 (en) * | 2008-06-10 | 2012-12-04 | Samsung Electronics Co., Ltd. | Method and system for protection against the unauthorized use of a terminal |
CN101873575A (zh) * | 2009-04-24 | 2010-10-27 | 国民技术股份有限公司 | 带加密芯片的移动终端及其解锁/锁网方法 |
CN102056148A (zh) * | 2009-11-02 | 2011-05-11 | 中兴通讯股份有限公司 | 锁网移动终端的反破解方法和装置、及锁网移动终端 |
US20120149329A1 (en) * | 2010-12-10 | 2012-06-14 | Motorola Mobility, Inc. | Method and apparatus for providing a subsidy-lock unlock procedure |
CN102131182B (zh) * | 2011-03-14 | 2015-06-03 | 中兴通讯股份有限公司 | 一种移动终端锁网的方法和装置 |
CN102111755A (zh) * | 2011-03-21 | 2011-06-29 | 中兴通讯股份有限公司 | 一种移动终端解除锁网的方法和系统 |
CN102131190A (zh) * | 2011-03-31 | 2011-07-20 | 华为终端有限公司 | 一种移动终端加密的方法、硬件加密器件及移动终端 |
CN104519479B (zh) * | 2013-09-27 | 2019-06-11 | 中兴通讯股份有限公司 | 一种终端及其锁网和解除锁网的方法 |
CN104811926A (zh) * | 2014-01-26 | 2015-07-29 | 中兴通讯股份有限公司 | 移动终端锁网锁卡的方法、装置及移动终端、sim卡 |
-
2016
- 2016-10-25 US US15/542,539 patent/US20190246283A1/en not_active Abandoned
- 2016-10-25 CN CN201680001907.7A patent/CN108293184A/zh active Pending
- 2016-10-25 WO PCT/CN2016/103136 patent/WO2018076148A1/zh active Application Filing
-
2017
- 2017-08-03 PH PH12017501396A patent/PH12017501396A1/en unknown
- 2017-09-21 CO CONC2017/0009559A patent/CO2017009559A2/es unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101400062A (zh) * | 2008-10-23 | 2009-04-01 | 中兴通讯股份有限公司 | 一种锁网终端的升级方法及系统 |
CN101478748A (zh) * | 2009-01-24 | 2009-07-08 | 深圳华为通信技术有限公司 | 一种sim卡防解锁方法及用户设备 |
WO2012055192A1 (zh) * | 2010-10-25 | 2012-05-03 | 中兴通讯股份有限公司 | 一种终端升级锁网方法和装置 |
CN102186161A (zh) * | 2011-01-17 | 2011-09-14 | 上海华勤通讯技术有限公司 | 鉴别sim卡合法性的方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110505225A (zh) * | 2019-08-21 | 2019-11-26 | Oppo(重庆)智能科技有限公司 | 一种终端锁卡方法、装置及计算机可读存储介质 |
CN110505225B (zh) * | 2019-08-21 | 2022-05-17 | Oppo(重庆)智能科技有限公司 | 一种终端锁卡方法、装置及计算机可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
US20190246283A1 (en) | 2019-08-08 |
PH12017501396A1 (en) | 2018-01-15 |
CO2017009559A2 (es) | 2018-05-10 |
CN108293184A (zh) | 2018-07-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101226575B (zh) | 应用程序的锁定方法 | |
CN104573435A (zh) | 用于终端权限管理的方法和终端 | |
US20130160094A1 (en) | OTA Bootstrap Method and System | |
CN107294924B (zh) | 漏洞的检测方法、装置和系统 | |
CN108830113A (zh) | 一种Android设备唯一标识的获取方法 | |
CN105450403A (zh) | 身份认证方法、装置及服务器 | |
CN107623907B (zh) | eSIM卡锁网方法、终端及锁网认证服务器 | |
CN108134713B (zh) | 一种通信方法及装置 | |
CN109729000B (zh) | 一种即时通信方法及装置 | |
CN104980449B (zh) | 网络请求的安全认证方法及系统 | |
CN105791307A (zh) | 网络时间协议报文安全认证方法及装置 | |
CN105516135A (zh) | 用于账号登录的方法和装置 | |
WO2016173174A1 (zh) | 锁网数据升级方法和装置 | |
CN109743160A (zh) | 防止Hook串改的安卓设备唯一标识获取方法和装置 | |
CN104811927A (zh) | 处理信息的方法、终端、服务器以及通信方法、系统 | |
CN104168126A (zh) | 一种无人值守智能设备自维护管理系统及方法 | |
CN109257387A (zh) | 用于断线重连的方法和装置 | |
US9548969B2 (en) | Encryption/decryption method, system and device | |
CN109889474A (zh) | 一种用户身份验证的方法及装置 | |
CN103714017A (zh) | 一种认证方法、认证装置及认证设备 | |
CN107172112B (zh) | 一种计算机文件传输方法及装置 | |
WO2018076148A1 (zh) | 一种防破解终端锁网信息的方法 | |
CN101364250B (zh) | 一种版权信息处理方法及设备 | |
CN103841120A (zh) | 基于数字水印的数据安全管理方法、移动终端和系统 | |
CN108513272B (zh) | 短信息处理方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 12017501396 Country of ref document: PH Ref document number: PH12017501396 Country of ref document: PH |
|
WWE | Wipo information: entry into national phase |
Ref document number: NC2017/0009559 Country of ref document: CO |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16919758 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 27/09/2019) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16919758 Country of ref document: EP Kind code of ref document: A1 |