Summary of the invention
The present invention is based on the above problems, proposes a kind of new technical solution, can go to business hall will to avoid user
ESIM card and phone number information are bound, so that user be made more easily to use mobile terminal.
In view of this, the first aspect of the present invention proposes a kind of register method of embedded user identification module, comprising:
When detecting that first terminal is connect with second terminal, the first authentication information of the first user is acquired, according to first mirror
Power information authenticates first user;If to first subscription authentication success, by the number in the second terminal
It is believed that breath is loaded into the embedded user identification module of the first terminal;By the data information and the embedded user
Identification module binding, the embedded user identification module to be registered in mobile communications network according to the data information.
In the technical scheme, by data information memory in second terminal, is then only needed to establish second terminal and
The connection of first terminal, first terminal can get the data information in second terminal, so as to more easily will
The embedded user identification module (i.e. eSIM card) of first terminal is registered in mobile communications network, and then improves user's use
The convenience of first terminal.And before data information to be loaded into the embedded user identification module of first terminal, to
Family is authenticated, and avoids illegal user using the data information stored in second terminal, to ensure that data information uses
Safety.
In the above-mentioned technical solutions, it is preferable that described that the first terminal is registered to by movement according to the data information
After step in communication network, comprising: if receiving the releasing of the data information Yu the embedded user identification module
Binding instruction, then it is the data information and the embedded user identification module is unbinding.
In the technical scheme, it since each data information can only bind a first terminal, is somebody's turn to do when user wants to use
The eSIM card of other terminals is registered in mobile communications network by data information, or the first terminal is bound other data
, can be unbinding by data information and the embedded user identification module in first terminal on first terminal when information,
Avoiding user goes to business hall to handle unbundlings business, to promote the experience of user.
In any of the above-described technical solution, it is preferable that described that the data information and the embedded user are identified mould
Before the unbinding step of block, comprising: the second authentication information of second user is acquired, according to second authentication information pair
The second user is authenticated;If being authenticated successfully to the second user, execute it is described by the data information with it is described
The unbinding step of embedded user identification module.
In the technical scheme, by data information and embedded user identification module it is unbinding before, by into
Row unbundlings user authenticate, avoid first terminal lose in the case where, illegal user by data information with it is embedded
Subscriber identification module is unbinding, to ensure that the safety of first terminal.
In any of the above-described technical solution, it is preferable that described that the data information and the embedded user are identified mould
After the unbinding step of block, comprising: delete the data information in the embedded user identification module.
In the technical scheme, after data information and embedded user identification module is unbinding, illustrate user
First terminal is registered without using data information, by deleting the data information in embedded user identification module, is avoided
The leakage of data information, to ensure that the safety of data information.
In any of the above-described technical solution, it is preferable that the data information by the second terminal is loaded into described
Before step in the embedded user identification module of first terminal, comprising: show at least one stored in the second terminal
A data information;Selection instruction is received, selects and is loaded into the first terminal at least one described data information
The data information.
In the technical scheme, due to can store multiple data informations, multiple data informations in a second terminal
It can be identical operator, be also possible to different operators, user can select according to the real-time requirement of oneself wait infuse
The data information of volume.
The second aspect of the present invention proposes a kind of register device of embedded user identification module, comprising: the first authentication
Unit, for the first authentication information of the first user being acquired, according to institute when detecting that first terminal is connect with second terminal
The first authentication information is stated to authenticate first user;Loading unit, if for successful to first subscription authentication,
Data information in the second terminal is loaded into the embedded user identification module of the first terminal;Registering unit,
For binding the data information and the embedded user identification module, with will be described embedded according to the data information
Subscriber identification module is registered in mobile communications network.
In the technical scheme, by data information memory in second terminal, is then only needed to establish second terminal and
The connection of first terminal, first terminal can get the data information in second terminal, so as to more easily will
The embedded user identification module (i.e. eSIM card) of first terminal is registered in mobile communications network, and then improves user's use
The convenience of first terminal.And before data information to be loaded into the embedded user identification module of first terminal, to
Family is authenticated, and avoids illegal user using the data information stored in second terminal, to ensure that data information uses
Safety.
In the above-mentioned technical solutions, it is preferable that further include: unbundlings unit, if for receiving the data information and institute
The unbinding instruction of embedded user identification module is stated, then by the data information and the embedded user identification module solution
Except binding.
In the technical scheme, since each data information can only bind a first terminal, when user wants using upper
Other first terminals are registered in mobile communications network by the data information stated, or the first terminal is bound others
When data information, data information and the embedded user identification module releasing in first terminal can be tied up on first terminal
It is fixed, it avoids user and business hall is gone to handle unbundlings business, to promote the experience of user.
In any of the above-described technical solution, it is preferable that further include: the second authenticating unit, for acquiring the of second user
Two authentication informations, to be authenticated according to second authentication information to the second user;The unbundlings unit is specifically used for,
If being authenticated successfully to the second user, execute described by the data information and embedded user identification module releasing
The step of binding.
In the technical scheme, by data information and embedded user identification module it is unbinding before, by into
Row unbundlings user authenticate, avoid first terminal lose in the case where, illegal user by data information with it is embedded
Subscriber identification module is unbinding, to ensure that the safety of first terminal.
In any of the above-described technical solution, it is preferable that further include: unit is deleted, for identifying the embedded user
The data information in module is deleted.
In the technical scheme, after data information and embedded user identification module is unbinding, illustrate user
First terminal is registered without using data information, by deleting the data information in embedded user identification module, is avoided
The leakage of data information, to ensure that the safety of data information.
In any of the above-described technical solution, it is preferable that further include: display unit is deposited for showing in the second terminal
At least one data information of storage;Selecting unit is selected at least one described data information for receiving selection instruction
The data information being loaded into the first terminal.
In the technical scheme, due to can store multiple data informations, multiple data informations in a second terminal
It can be identical operator, be also possible to different operators, user can select according to the real-time requirement of oneself wait infuse
The data information of volume.
The third aspect of the present invention proposes a kind of mobile terminal, including insertion described in any one of above-mentioned technical proposal
The register device of formula subscriber identification module, therefore, the mobile terminal have and any one of above-mentioned technical proposal described in insertion
The identical technical effect of the register device of formula subscriber identification module, details are not described herein.
According to the technical solution of the present invention, business hall can be gone to bind eSIM card and phone number information to avoid user,
To make user more easily use mobile terminal.
Specific embodiment
It is with reference to the accompanying drawing and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention
Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application
Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also
To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below
Specific embodiment limitation.
The process that Fig. 1 shows the register method of embedded user identification module according to an embodiment of the invention is shown
It is intended to.
As shown in Figure 1, the register method of embedded user identification module according to an embodiment of the invention, comprising:
Step 102, when detecting that first terminal is connect with second terminal, the first authentication information of the first user is acquired,
To be authenticated according to first authentication information to first user;
Preferably, the step of being authenticated according to first authentication information to first user, specifically includes: first
Terminal obtains first stored in second terminal and prestores authentication information, and the first authentication information and first are prestored authentication information and carried out
Matching, if the two successful match, it is determined that the authentication success to the first user, if the two mismatches, it is determined that the first user
Failed authentication.The step of above-mentioned authentication, can be completed by first terminal, can also be completed by second terminal.In addition, the
One authentication information includes following one or combinations thereof: password, finger print information, voice messaging, palm print information, facial information, iris
Information.
Step 104, if the data information in the second terminal is loaded into institute to first subscription authentication success
It states in the embedded user identification module of first terminal;
Data information can be phone number information, and phone number information includes but is not limited to: ISDN (Integrated
Services Digital Network, ISDN) EIC equipment identification code, ICCID (Integrate Circuit
Card Identity, integrated circuit card identification code), IMSI (International Mobile Subscriber
Identification Number, international mobile subscriber identification code), KI (mobile phone identification key).
Step 106, the data information and the embedded user identification module are bound, according to the data information
The embedded user identification module is registered in mobile communications network.
Preferably, before the step of data information and the embedded user identification module being bound, if detecting
The data information with other first terminals bind, then prompt user by the data information with other first terminals
It is unbinding, after detecting data information with the unbinding success of other first terminals, by the data information
It is bound with the embedded user identification module.
In the technical scheme, by data information memory in second terminal, is then only needed to establish second terminal and
The connection of first terminal, first terminal can get the data information in second terminal, so as to more easily will
The embedded user identification module (i.e. eSIM card) of first terminal is registered in mobile communications network, and then improves user's use
The convenience of first terminal.And before data information to be loaded into the embedded user identification module of first terminal, to
Family is authenticated, and avoids illegal user using the data information stored in second terminal, to ensure that data information uses
Safety.
In the above-mentioned technical solutions, it is preferable that after step 106, comprising: if receive the data information with it is described embedding
Enter the unbinding instruction of formula subscriber identification module, then ties up the data information and embedded user identification module releasing
It is fixed.
In the technical scheme, since each data information can only bind a first terminal, when user wants using upper
Other first terminals are registered in mobile communications network by the data information stated, or the first terminal is bound others
When data information, data information and the embedded user identification module releasing in first terminal can be tied up on first terminal
It is fixed, it avoids user and business hall is gone to handle unbundlings business, to promote the experience of user.
In any of the above-described technical solution, it is preferable that described that the data information and the embedded user are identified mould
Before the unbinding step of block, comprising: the second authentication information of second user is acquired, according to second authentication information pair
The second user is authenticated;If being authenticated successfully to the second user, execute it is described by the data information with it is described
The unbinding step of embedded user identification module.
In the technical scheme, by data information and embedded user identification module it is unbinding before, by into
Row unbundlings user authenticate, avoid first terminal lose in the case where, illegal user by data information with it is embedded
Subscriber identification module is unbinding, to ensure that the safety of first terminal.
In any of the above-described technical solution, it is preferable that described that the data information and the embedded user are identified mould
After the unbinding step of block, comprising: delete the data information in the embedded user identification module.
In the technical scheme, after data information and embedded user identification module is unbinding, illustrate user
First terminal is registered without using data information, by deleting the data information in embedded user identification module, is avoided
The leakage of data information, to ensure that the safety of data information.
For example, user temporarily uses the data information of oneself to register the mobile phone of stranger, by data information and the mobile phone
After unbinding, data information is deleted, data information is avoided and is compromised.
In any of the above-described technical solution, it is preferable that the data information by the second terminal is loaded into described
Before step in the embedded user identification module of first terminal, comprising: show at least one stored in the second terminal
A data information;Selection instruction is received, selects and is loaded into the first terminal at least one described data information
The data information.
In the technical scheme, due to can store multiple data informations, multiple data informations in a second terminal
It can be identical operator, be also possible to different operators, user can select according to the real-time requirement of oneself wait infuse
The data information of volume.
Fig. 2 shows the processes of the register method of embedded user identification module according to another embodiment of the invention
Schematic diagram.
As shown in Fig. 2, the register method of embedded user identification module according to another embodiment of the invention is (at this
In embodiment, first terminal is mobile phone, and second terminal is wearable smart machine), comprising:
Step 202, mobile phone establishes connection by bluetooth or Wi-Fi with wearable smart machine;
Wherein, it when user opens phone number, needs to business hall to use identity card progress fingerprint open-minded, and setting pair
The password answered, end user obtain the wearable smart machine for replacing entity SIM card, deposit in the wearable smart machine
Contain the password and preset fingerprint of phone number information associated with the phone number opened, setting.In addition, this is wearable
Smart machine can store multiple telephone number informations, and be different between the operator of multiple telephone number informations
's.
Step 204, mobile phone prompt input password;
Step 206, mobile phone judges whether Password Input is correct, when the judgment result is yes, enters step 208, otherwise, into
Enter step 216;
Specifically, it is compared by the password stored in the password and wearable smart machine that input user, if right
Than the result is that the two is consistent, then the password for determining that user inputs is correct, otherwise, it is determined that the password bad of user's input.
Step 208, wearable smart machine warning light lights, and user is prompted to input fingerprint;
Step 210, wearable smart machine by the fingerprint stored in fingerprint that user inputs and wearable smart machine into
Row matching, it is of course also possible to which mobile phone obtains the fingerprint of the fingerprint stored in wearable smart machine and its acquisition, mobile phone will be stored
Fingerprint matched with the fingerprint of acquisition;
Step 212, judge whether successful match, when the judgment result is yes, enter step 214, otherwise, enter step
216;
Step 214, mobile phone is loaded into the phone number information in wearable smart machine, by phone number information and mobile phone
The binding of eSIM card, eSIM card is registered in corresponding mobile communications network;
Step 216, prompt user's checking failure.
In addition, if the wearable smart machine of user is lost, can be carried out by mobile phone it is unbinding, it is specifically, first
It is introduced into the unbundlings interface of the eSIM card of mobile phone, click is unbinding, then inputs user when phone number is opened in business hall
The password of setting can be successfully unbinding by phone number information and eSIM card.If the mobile phone of user is lost, can pass through
Wearable smart machine is unbinding, specifically, if triggering the unbundlings key of wearable smart machine, acquires the fingerprint pair of user
Unbinding user authenticates, phone number information and eSIM card is unbinding, wherein can to wear if authenticating successfully
The unbundlings key for wearing smart machine can be physical button, be also possible to the virtual key shown on wearable smart machine.
The structure that Fig. 3 shows the register device of embedded user identification module according to an embodiment of the invention is shown
It is intended to.
As shown in figure 3, the register device 300 of embedded user identification module according to an embodiment of the invention, packet
It includes: the first authenticating unit 302, loading unit 304 and registering unit 306, wherein the first authenticating unit 302 is used to work as and detect
When first terminal is connect with second terminal, the first authentication information of the first user is acquired, according to first authentication information pair
First user authenticates;Loading unit 304, if for first subscription authentication success, eventually by described second
Data information in end is loaded into the embedded user identification module of the first terminal;Registering unit 306, being used for will be described
Data information and the embedded user identification module are bound, the embedded user is identified mould according to the data information
Block is registered in mobile communications network.
In the technical scheme, by data information memory in second terminal, is then only needed to establish second terminal and
The connection of first terminal, first terminal can get the data information in second terminal, so as to more easily will
The embedded user identification module (i.e. eSIM card) of first terminal is registered in mobile communications network, and then improves user's use
The convenience of first terminal.And before data information to be loaded into the embedded user identification module of first terminal, to
Family is authenticated, and avoids illegal user using the data information stored in second terminal, to ensure that data information uses
Safety.
In the above scheme, data information includes but is not limited to: ISDN (Integrated Services Digital
Network, ISDN) EIC equipment identification code, ICCID (Integrate Circuit Card Identity, integrate
Circuit card identification code), IMSI (International Mobile Subscriber Identification Number, it is international
Mobile subscriber identification code), KI (mobile phone identification key).
First authenticating unit 302 is specifically used for, and obtains first stored in second terminal and prestores authentication information, by the first mirror
Power information prestores authentication information with first and is matched, if the two successful match, it is determined that the authentication success to the first user, if
The two mismatches, it is determined that the failed authentication of the first user.
In the above-mentioned technical solutions, it is preferable that further include: unbundlings unit 308, if for receive the data information with
The unbinding instruction of the embedded user identification module, then by the data information and the embedded user identification module
It is unbinding.
In the technical scheme, since each data information can only bind a first terminal, when user wants using upper
Other first terminals are registered in mobile communications network by the data information stated, or the first terminal is bound others
When data information, data information and the embedded user identification module releasing in first terminal can be tied up on first terminal
It is fixed, it avoids user and business hall is gone to handle unbundlings business, to promote the experience of user.
In any of the above-described technical solution, it is preferable that further include: the second authenticating unit 310, for acquiring second user
Second authentication information, to be authenticated according to second authentication information to the second user;The unbundlings unit 308 is specific
For executing described by the data information and embedded user identification mould if being authenticated successfully to the second user
The unbinding step of block.
In the technical scheme, by data information and embedded user identification module it is unbinding before, by into
Row unbundlings user authenticate, avoid first terminal lose in the case where, illegal user by data information with it is embedded
Subscriber identification module is unbinding, to ensure that the safety of first terminal.
In any of the above-described technical solution, it is preferable that further include: unit 312 is deleted, for knowing the embedded user
The data information in other module is deleted.
In the technical scheme, after data information and embedded user identification module is unbinding, illustrate user
First terminal is registered without using data information, by deleting the data information in embedded user identification module, is avoided
The leakage of data information, to ensure that the safety of data information.
For example, user temporarily uses the data information of oneself to register the mobile phone of stranger, by data information and the mobile phone
After unbinding, data information is deleted, data information is avoided and is compromised.
In any of the above-described technical solution, it is preferable that further include: display unit 314, for showing in the second terminal
At least one data information of storage;Selecting unit 316, for receiving selection instruction, at least one described data information
Select the data information being loaded into the first terminal.
In the technical scheme, due to can store multiple data informations, multiple data informations in a second terminal
It can be identical operator, be also possible to different operators, user can select according to the real-time requirement of oneself wait infuse
The data information of volume.
Fig. 4 shows the structural schematic diagram of mobile terminal according to an embodiment of the invention.
As shown in figure 4, mobile terminal 400 according to an embodiment of the invention, including in above-mentioned technical proposal it is any
The register device 300 of embedded user identification module described in, therefore, which has and above-mentioned technical proposal
Any one of described in embedded user identification module the identical technical effect of register device 300, details are not described herein.
The technical scheme of the present invention has been explained in detail above with reference to the attached drawings, according to the technical solution of the present invention, can be to avoid
User goes to business hall to bind eSIM card and phone number information, so that user be made more easily to use mobile terminal.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.