[go: up one dir, main page]

CN101169820A - An identification method of valid user identification card - Google Patents

An identification method of valid user identification card Download PDF

Info

Publication number
CN101169820A
CN101169820A CNA2007101785432A CN200710178543A CN101169820A CN 101169820 A CN101169820 A CN 101169820A CN A2007101785432 A CNA2007101785432 A CN A2007101785432A CN 200710178543 A CN200710178543 A CN 200710178543A CN 101169820 A CN101169820 A CN 101169820A
Authority
CN
China
Prior art keywords
user terminal
subscriber identity
user
identity module
identification card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007101785432A
Other languages
Chinese (zh)
Inventor
李希鹏
文永明
赖敏
孙公航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNA2007101785432A priority Critical patent/CN101169820A/en
Publication of CN101169820A publication Critical patent/CN101169820A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

本发明公开了一种有效用户识别卡的识别方法,能够向用户终端中写入用于判断用户识别卡是否有效的模糊解锁数据;读取用户识别卡中的信息,根据该信息与所述模糊解锁数据判断所述用户识别卡是否充许在所述用户终端中使用。因此,有效的多个用户识别卡均可使用于同一个用户终端。在实际应用中,这些用户识别卡可以是运营商充许用户使用的用户识别卡,这使得用户只能在运营商自己经营的网络中使用用户终端,这对运营商的发展显然是有利的;并且,在用户想更换新的用户识别卡或者用户的用户识别卡丢失时,用户仍可以应用其它的用户识别卡,只要该用户识别卡是可以有效应用于用户终端的即可,这显然方便了用户的使用。

Figure 200710178543

The invention discloses an identification method of a valid user identification card, which can write fuzzy unlocking data for judging whether the user identification card is valid into the user terminal; read the information in the user identification card, and according to the information and the fuzzy The unlocking data judges whether the subscriber identification card is allowed to be used in the user terminal. Therefore, multiple effective subscriber identification cards can be used for the same subscriber terminal. In practical applications, these subscriber identification cards can be subscriber identification cards that operators allow users to use, which makes users only use user terminals in the network operated by operators themselves, which is obviously beneficial to the development of operators; And, when the user wants to replace a new subscriber identification card or the subscriber identification card of the user is lost, the user can still use other subscriber identification cards, as long as the subscriber identification card can be effectively applied to the user terminal, which is obviously convenient User's use.

Figure 200710178543

Description

一种有效用户识别卡的识别方法 An identification method of valid user identification card

技术领域technical field

本发明涉及通信领域,具体涉及一种有效用户识别卡的识别方法。The invention relates to the communication field, in particular to an identification method of an effective user identification card.

背景技术Background technique

当前,越来越多的运营商推出价格低廉的终端,一些新的营销方式随之出现,如预存话费送手机。为了可以保证用户在固定的时间内使用其网络,从而收回成本,运营商会采用“机卡互锁”的方法来实现这个目的,把特的用户终端和用户识别卡锁定,锁定后该用户终端只能使用对应的所述用户识别卡。At present, more and more operators are launching low-priced terminals, and some new marketing methods have emerged, such as free mobile phones with pre-stored calls. In order to ensure that users use their network within a fixed period of time and thus recover costs, operators will adopt the method of "machine-card interlocking" to achieve this goal, locking a special user terminal and a user identification card. After locking, the user terminal can only A corresponding said subscriber identity card can be used.

目前机卡互锁最常见的方式是一个用户终端对应一张用户识别卡。这种锁定方法在实际应用中有一定的局限性:在实现机卡互锁后,一张用户识别卡只能在一个用户终端中有效使用。显然,如果用户想更换新的用户识别卡或者用户的用户识别卡丢失,都会给用户带来不便;并且,一个用户终端对应一张用户识别卡的锁定方式也不利于运营商有效拓展市场。At present, the most common method of machine-card interlocking is that one user terminal corresponds to one user identification card. This locking method has certain limitations in practical application: after realizing machine-card interlocking, a user identification card can only be effectively used in one user terminal. Obviously, if the user wants to replace a new subscriber identification card or loses the subscriber identification card, it will bring inconvenience to the user; moreover, the locking method of one subscriber terminal corresponding to one subscriber identification card is not conducive to the effective expansion of the market for operators.

发明内容Contents of the invention

有鉴于此,本发明的主要目的在于提供一种有效用户识别卡的识别方法,使有效的多个用户识别卡均可使用于同一个用户终端,方便用户的使用,有利于运营商的发展。In view of this, the main purpose of the present invention is to provide a valid subscriber identification card identification method, so that multiple valid subscriber identification cards can be used in the same user terminal, which is convenient for users and beneficial to the development of operators.

为达到上述目的,本发明的技术方案是这样实现的:In order to achieve the above object, technical solution of the present invention is achieved in that way:

一种有效用户识别卡的识别方法,该方法包括:A method for identifying a valid user identification card, the method comprising:

向用户终端中写入用于判断用户识别卡是否有效的模糊解锁数据;读取用户识别卡中的信息,根据该信息与所述模糊解锁数据判断所述用户识别卡是否充许在所述用户终端中使用。Write fuzzy unlocking data for judging whether the user identification card is valid in the user terminal; read the information in the user identification card, and judge whether the user identification card is sufficient for the user according to the information and the fuzzy unlocking data used in the terminal.

所述模糊解锁数据是能够唯一识别用户识别卡的数据的部分内容。The fuzzy unlocking data is part of the data that can uniquely identify the user identification card.

能够唯一识别用户识别卡的所述数据是ESN或IMSI。The data that can uniquely identify the subscriber identity card is ESN or IMSI.

所述模糊解锁数据以信息列表的方式存在。The fuzzy unlocking data exists in the form of information list.

所述判断的方法为:The method of judgment is:

用从用户识别卡中读取的所述信息在所述模糊解锁数据中进行检索,如果在模糊解锁数据中检索到从用户识别卡中读取的所述信息,确定所述用户识别卡可用于所述用户终端;否则,确定所述用户识别卡不可用于所述用户终端。using the information read from the subscriber identification card to search in the fuzzy unlocking data, and if the information read from the subscriber identification card is retrieved in the fuzzy unlocking data, it is determined that the subscriber identification card can be used for the user terminal; otherwise, determine that the subscriber identity card is not available for the user terminal.

该方法进一步包括:The method further includes:

确定所述用户识别卡不充许在所述用户终端中使用,该用户终端进入非正常工作状态。It is determined that the subscriber identity card is not allowed to be used in the user terminal, and the user terminal enters an abnormal working state.

该方法进一步包括:The method further includes:

确定所述用户识别卡充许在所述用户终端中使用,该用户终端进入正常工作状态。It is determined that the subscriber identity card is allowed to be used in the user terminal, and the user terminal enters a normal working state.

进行所述判断之前,进一步判断所述用户识别卡是否处于PIN或PUK码使能状态,并在处于使能状态时判断是否在输入解锁码后成功解锁,该用户终端在未成功解锁时进入非正常工作状态。Before performing the judgment, it is further judged whether the subscriber identification card is in the PIN or PUK code enabled state, and when it is in the enabled state, it is judged whether it is successfully unlocked after inputting the unlock code. normal working condition.

进行所述判断之前,进一步判断所述用户终端的锁定标志位是否已经使能,在确定已经使能时,进行所述判断。Before performing the determination, it is further determined whether the lock flag of the user terminal has been enabled, and the determination is performed when it is determined that it has been enabled.

所述用户终端的锁定标志位未使能,所述用户终端进一步进入正常工作状态。The lock flag of the user terminal is not enabled, and the user terminal further enters a normal working state.

可见,本发明所提供的有效用户识别卡的识别方法,能够向用户终端中写入用于判断用户识别卡是否有效的模糊解锁数据;读取用户识别卡中的信息,根据该信息与所述模糊解锁数据判断所述用户识别卡是否充许在所述用户终端中使用。因此,有效的多个用户识别卡均可使用于同一个用户终端。在实际应用中,这些用户识别卡可以是运营商充许用户使用的用户识别卡,这使得用户只能在运营商自己经营的网络中使用用户终端,这对运营商的发展显然是有利的;并且,在用户想更换新的用户识别卡或者用户的用户识别卡丢失时,用户仍可以应用其它的用户识别卡,只要该用户识别卡是可以有效应用于用户终端的即可,这显然方便了用户的使用。It can be seen that the method for identifying a valid subscriber identification card provided by the present invention can write fuzzy unlocking data for judging whether the subscriber identification card is valid into the user terminal; read the information in the subscriber identification card, and based on the information and the described The fuzzy unlocking data judges whether the subscriber identification card is allowed to be used in the user terminal. Therefore, multiple effective subscriber identification cards can be used for the same subscriber terminal. In practical applications, these subscriber identification cards can be subscriber identification cards that operators allow users to use, which makes users only use user terminals in the network operated by operators themselves, which is obviously beneficial to the development of operators; And, when the user wants to replace a new subscriber identification card or the subscriber identification card of the user is lost, the user can still use other subscriber identification cards, as long as the subscriber identification card can be effectively applied to the user terminal, which is obviously convenient User's use.

附图说明Description of drawings

图1为本发明一实施例的预先设置模糊解锁数据的流程图;Fig. 1 is the flowchart of pre-setting fuzzy unlocking data according to an embodiment of the present invention;

图2为本发明一实施例的识别有效用户识别卡的流程图;Fig. 2 is a flow chart of identifying a valid subscriber identification card according to an embodiment of the present invention;

图3为本发明的识别有效用户识别卡的流程简图。Fig. 3 is a simplified flow chart of identifying a valid subscriber identification card in the present invention.

具体实施方式Detailed ways

下面结合附图对本发明技术详细描述。The technology of the present invention will be described in detail below in conjunction with the accompanying drawings.

参见图1,图1为本发明一实施例的预先设置模糊解锁数据的流程图,该流程包括以下步骤:Referring to Fig. 1, Fig. 1 is the flow chart of pre-setting fuzzy unlocking data according to an embodiment of the present invention, and the process includes the following steps:

步骤101:向用户终端中写入用于判断用户识别卡是否有效的模糊解锁数据。Step 101: Write fuzzy unlocking data for judging whether the subscriber identification card is valid into the user terminal.

具体而言,在启动用户终端后,可以使用键盘输入、PC侧软件工具等方式向用户终端中写入模糊解锁数据。所述模糊解锁数据可以是各种能够唯一识别用户识别卡的数据的部分内容,如:ESN、IMSI等的部分内容。Specifically, after starting the user terminal, the fuzzy unlocking data can be written into the user terminal by means of keyboard input, PC-side software tools, and the like. The fuzzy unlocking data may be part of various data that can uniquely identify the subscriber identification card, such as part of ESN, IMSI and the like.

步骤102:写入所述模糊解锁数据后,将用户终端的锁定标志位使能,表示该用户终端已经进行了锁定状态。Step 102: After writing the fuzzy unlocking data, enable the lock flag of the user terminal, indicating that the user terminal has been locked.

完成图1所示的操作后,就可以执行图2所示的操作了。参见图2,图2为本发明一实施例的识别有效用户识别卡的流程图,该流程包括以下步骤:After completing the operations shown in Figure 1, you can perform the operations shown in Figure 2. Referring to FIG. 2, FIG. 2 is a flow chart of identifying a valid subscriber identification card according to an embodiment of the present invention, and the process includes the following steps:

步骤201:在用户终端启动后,判断插入用户终端的用户识别卡是否处于PIN或PUK码使能状态,如果是,进行步骤202;否则,直接进入步骤203。Step 201: After the user terminal is started, determine whether the subscriber identification card inserted into the user terminal is in the PIN or PUK code enabled state, if yes, proceed to step 202; otherwise, directly enter step 203.

步骤202:在用户终端接收到用户输入的解锁码后,判断是否在输入解锁码后成功解锁,如果是,进行步骤203;否则,直接进入步骤207。Step 202: After the user terminal receives the unlock code input by the user, it is judged whether it is successfully unlocked after inputting the unlock code, if yes, go to step 203; otherwise, directly go to step 207.

步骤203:判断用户终端的锁定标志位是否已经使能,如果是,进入步骤204;否则,直接进入步骤208。Step 203: Determine whether the lock flag of the user terminal has been enabled, and if so, go to step 204; otherwise, go to step 208 directly.

步骤204:读取用户识别卡中的信息。Step 204: Read the information in the user identification card.

步骤205:对从用户识别卡中读取的信息和预先向用户终端中所写入的模糊解锁数据进行比较。Step 205: Comparing the information read from the user identification card with the fuzzy unlocking data written into the user terminal in advance.

步骤206:根据所述比较结果判断所述用户识别卡是否可用于所述用户终端,如果是,直接进入步骤208;否则,进入步骤207。Step 206: According to the comparison result, it is judged whether the subscriber identity card can be used for the user terminal, and if yes, directly go to step 208; otherwise, go to step 207.

具体而言,所述模糊解锁数据可以以信息列表的方式存在,该信息列表中保存有能够唯一识别用户识别卡的数据的部分内容,如:ESN信息的部分内容。那么,在进行所述比较操作时,就可以用从用户识别卡中读取的所述信息在所述模糊解锁数据中进行检索,如果在模糊解锁数据中检索到从用户识别卡中读取的所述信息,确定所述用户识别卡可用于所述用户终端;否则,确定所述用户识别卡不可用于所述用户终端。Specifically, the fuzzy unlocking data may exist in the form of an information list, and the information list stores part of the data that can uniquely identify the user identification card, such as part of the ESN information. Then, when performing the comparison operation, the information read from the user identification card can be used to search in the fuzzy unlocking data, if the information read from the user identification card is retrieved in the fuzzy unlocking data The information determines that the subscriber identity card is available for the user terminal; otherwise, determines that the subscriber identity card is not available for the user terminal.

在实际应用中,可以使用字段检索或者模糊检索等操作方式进行所述检索操作。如:假设从一张用户识别卡中读取出的ESN值为“12345678”,并且预先在用户终端中写入的模糊解锁数据为“1234”。那么在检索时,可以以从左向右的检索方式来进行数据检索。可见,经过检索,可以确定ESN前4位为“1234”的所有用户识别卡均可以在用户终端中正常使用。In practical applications, the retrieval operation may be performed by using operation methods such as field retrieval or fuzzy retrieval. For example: assume that the ESN value read from a user identification card is "12345678", and the fuzzy unlocking data written in the user terminal in advance is "1234". Then, during retrieval, data retrieval can be performed in a left-to-right retrieval manner. It can be seen that after searching, it can be determined that all subscriber identification cards whose first four digits of the ESN are "1234" can be used normally in the user terminal.

步骤207:用户终端进入非正常工作状态,并结束本流程。Step 207: The user terminal enters into an abnormal working state, and ends this process.

步骤208:用户终端进入正常工作状态。Step 208: the user terminal enters a normal working state.

由图1、图2可见,针对有效用户识别卡的识别方法的原则如图3所示。It can be seen from Fig. 1 and Fig. 2 that the principle of the identification method for valid subscriber identification cards is shown in Fig. 3 .

参见图3,图3为本发明的识别有效用户识别卡的流程简图,该流程包括以下步骤:Referring to Fig. 3, Fig. 3 is a schematic flow chart of identifying a valid subscriber identification card of the present invention, and the flow includes the following steps:

步骤301:预先向用户终端中写入用于判断用户识别卡是否有效的模糊解锁数据。Step 301: Write fuzzy unlocking data for judging whether the subscriber identification card is valid into the user terminal in advance.

步骤302:读取用户识别卡中的信息,根据该信息与所述模糊解锁数据判断所述用户识别卡是否充许在所述用户终端中使用。Step 302: Read the information in the subscriber identification card, and judge whether the subscriber identification card is allowed to be used in the user terminal according to the information and the fuzzy unlocking data.

通常,可以将充许在用户终端中使用的用户识别卡称为有效的用户识别卡。Generally, a subscriber identity card that is allowed to be used in a user terminal can be called a valid subscriber identity card.

由以上所述可见,本发明所提供的有效用户识别卡的识别方法,使有效的多个用户识别卡均可使用于同一个用户终端。在实际应用中,这些用户识别卡可以是运营商充许用户使用的用户识别卡,这使得用户只能在运营商自己经营的网络中使用用户终端,这对运营商的发展显然是有利的;并且,在用户想更换新的用户识别卡或者用户的用户识别卡丢失时,用户仍可以应用其它的用户识别卡,只要该用户识别卡是可以有效应用于用户终端的即可,这显然方便了用户的使用。It can be seen from the above description that the method for identifying a valid subscriber identification card provided by the present invention enables multiple valid subscriber identification cards to be used in the same user terminal. In practical applications, these subscriber identification cards can be subscriber identification cards that operators allow users to use, which makes users only use user terminals in the network operated by operators themselves, which is obviously beneficial to the development of operators; And, when the user wants to replace a new subscriber identification card or the subscriber identification card of the user is lost, the user can still use other subscriber identification cards, as long as the subscriber identification card can be effectively applied to the user terminal, which is obviously convenient User's use.

Claims (10)

1. the recognition methods of a validated user identification card is characterized in that, this method comprises:
In user terminal, write and be used to judge whether Subscriber Identity Module effectively blurs the release data; Read the information in the Subscriber Identity Module, judge according to this information and described fuzzy release data whether described Subscriber Identity Module fills perhaps and in described user terminal, use.
2. method according to claim 1 is characterized in that, described fuzzy release data be can unique identification Subscriber Identity Module the section data content.
3. method according to claim 2 is characterized in that, described data that can unique identification Subscriber Identity Module are ESN or IMSI.
4. method according to claim 2 is characterized in that, described fuzzy release data exist in the mode of information list.
5. method according to claim 1 is characterized in that, the method for described judgement is:
Retrieve in described fuzzy release data with the described information that from Subscriber Identity Module, reads,, determine that described Subscriber Identity Module can be used for described user terminal if in fuzzy release data, retrieve the described information that from Subscriber Identity Module, reads; Otherwise, determine that described Subscriber Identity Module is not useable for described user terminal.
6. method according to claim 1 is characterized in that, this method further comprises:
Determine that described Subscriber Identity Module does not fill perhaps and in described user terminal, use that this user terminal enters abnormal operating state.
7. method according to claim 1 is characterized in that, this method further comprises:
Determine that described Subscriber Identity Module fills perhaps and in described user terminal, use that this user terminal enters normal operating conditions.
8. according to each described method of claim 1 to 7, it is characterized in that, carry out before the described judgement, further judge whether described Subscriber Identity Module is in PIN or PUK code enabled state, and when being in enabled state, judging whether successful release behind the input PUK, this user terminal enters abnormal operating state when successful release not.
9. according to each described method of claim 1 to 7, it is characterized in that, carry out before the described judgement judge further whether the lock flag position of described user terminal enables, when determining to have enabled, carry out described judgement.
10. method according to claim 9 is characterized in that, the lock flag position of described user terminal does not enable, and described user terminal further enters normal operating conditions.
CNA2007101785432A 2007-11-30 2007-11-30 An identification method of valid user identification card Pending CN101169820A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007101785432A CN101169820A (en) 2007-11-30 2007-11-30 An identification method of valid user identification card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007101785432A CN101169820A (en) 2007-11-30 2007-11-30 An identification method of valid user identification card

Publications (1)

Publication Number Publication Date
CN101169820A true CN101169820A (en) 2008-04-30

Family

ID=39390440

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007101785432A Pending CN101169820A (en) 2007-11-30 2007-11-30 An identification method of valid user identification card

Country Status (1)

Country Link
CN (1) CN101169820A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104735251A (en) * 2015-03-17 2015-06-24 上海天奕达电子科技有限公司 Method and device for unlocking mobile terminals
CN108834160A (en) * 2018-06-01 2018-11-16 中国联合网络通信集团有限公司 Method for Determining Usage of User Identity Card and Network Device
US11994688B2 (en) 2017-08-25 2024-05-28 Nkt Photonics A/S Depolarizing homogenizer

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104735251A (en) * 2015-03-17 2015-06-24 上海天奕达电子科技有限公司 Method and device for unlocking mobile terminals
US11994688B2 (en) 2017-08-25 2024-05-28 Nkt Photonics A/S Depolarizing homogenizer
CN108834160A (en) * 2018-06-01 2018-11-16 中国联合网络通信集团有限公司 Method for Determining Usage of User Identity Card and Network Device
CN108834160B (en) * 2018-06-01 2021-08-10 中国联合网络通信集团有限公司 Method for determining use condition of user identity identification card and network equipment

Similar Documents

Publication Publication Date Title
CN101083816B (en) A wireless terminal and its interlocking and unlocking method with a subscriber identification card
CN101753682B (en) Right management method for user identification card and terminal unit
CN108093392B (en) Method, mobile terminal and storage medium for unlocking SIM card
CN104375836A (en) Method and device for showing lock screen window
CN101820465A (en) Terminal and method for binding SIM card
CN102056148A (en) Anti-breaking method for network locking mobile terminal and network locking mobile terminal
CN111651173A (en) Key code data burning method, device, terminal device and readable storage medium
KR20040008088A (en) System for preventing unauthorized use of recording media
CN101247579A (en) Method for locking mobile communication terminal through Bluetooth earphone
CN101141718B (en) A mobile terminal card locking method
CN102136085A (en) Telecom smart card and telecom smart card-based non-contact application management method
CN101986672B (en) Message processing method and device
CN104660613A (en) Authentication method of user identification module and electronic equipment
CN101789988A (en) Method for realizing binding of mobile phone and SIM card
CN109727027A (en) Account recognition methods, device, equipment and storage medium
CN101610500A (en) Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system
CN101505480A (en) Method and system for customer identity registration
CN101169820A (en) An identification method of valid user identification card
CN102780995B (en) Network locking method of dual-card dual-standby mobile phone
CN105430738A (en) Method and device for initiating registration
CN106507300A (en) A kind of method for giving loss terminal for change, device and terminal
CN101488994B (en) Method and communication terminal for implementing unlocking between communication terminal and recognition card
US20090177716A1 (en) Removable storage device and electronic apparatus that can be connected together and method for saving environmental data
KR100968345B1 (en) Method and system for providing mobile widget using chip
CN109191127A (en) A kind of method and tool of digital asset secure storage

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20080430