CN101169820A - An identification method of valid user identification card - Google Patents
An identification method of valid user identification card Download PDFInfo
- Publication number
- CN101169820A CN101169820A CNA2007101785432A CN200710178543A CN101169820A CN 101169820 A CN101169820 A CN 101169820A CN A2007101785432 A CNA2007101785432 A CN A2007101785432A CN 200710178543 A CN200710178543 A CN 200710178543A CN 101169820 A CN101169820 A CN 101169820A
- Authority
- CN
- China
- Prior art keywords
- user terminal
- subscriber identity
- user
- identity module
- identification card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
本发明公开了一种有效用户识别卡的识别方法,能够向用户终端中写入用于判断用户识别卡是否有效的模糊解锁数据;读取用户识别卡中的信息,根据该信息与所述模糊解锁数据判断所述用户识别卡是否充许在所述用户终端中使用。因此,有效的多个用户识别卡均可使用于同一个用户终端。在实际应用中,这些用户识别卡可以是运营商充许用户使用的用户识别卡,这使得用户只能在运营商自己经营的网络中使用用户终端,这对运营商的发展显然是有利的;并且,在用户想更换新的用户识别卡或者用户的用户识别卡丢失时,用户仍可以应用其它的用户识别卡,只要该用户识别卡是可以有效应用于用户终端的即可,这显然方便了用户的使用。
The invention discloses an identification method of a valid user identification card, which can write fuzzy unlocking data for judging whether the user identification card is valid into the user terminal; read the information in the user identification card, and according to the information and the fuzzy The unlocking data judges whether the subscriber identification card is allowed to be used in the user terminal. Therefore, multiple effective subscriber identification cards can be used for the same subscriber terminal. In practical applications, these subscriber identification cards can be subscriber identification cards that operators allow users to use, which makes users only use user terminals in the network operated by operators themselves, which is obviously beneficial to the development of operators; And, when the user wants to replace a new subscriber identification card or the subscriber identification card of the user is lost, the user can still use other subscriber identification cards, as long as the subscriber identification card can be effectively applied to the user terminal, which is obviously convenient User's use.
Description
技术领域technical field
本发明涉及通信领域,具体涉及一种有效用户识别卡的识别方法。The invention relates to the communication field, in particular to an identification method of an effective user identification card.
背景技术Background technique
当前,越来越多的运营商推出价格低廉的终端,一些新的营销方式随之出现,如预存话费送手机。为了可以保证用户在固定的时间内使用其网络,从而收回成本,运营商会采用“机卡互锁”的方法来实现这个目的,把特的用户终端和用户识别卡锁定,锁定后该用户终端只能使用对应的所述用户识别卡。At present, more and more operators are launching low-priced terminals, and some new marketing methods have emerged, such as free mobile phones with pre-stored calls. In order to ensure that users use their network within a fixed period of time and thus recover costs, operators will adopt the method of "machine-card interlocking" to achieve this goal, locking a special user terminal and a user identification card. After locking, the user terminal can only A corresponding said subscriber identity card can be used.
目前机卡互锁最常见的方式是一个用户终端对应一张用户识别卡。这种锁定方法在实际应用中有一定的局限性:在实现机卡互锁后,一张用户识别卡只能在一个用户终端中有效使用。显然,如果用户想更换新的用户识别卡或者用户的用户识别卡丢失,都会给用户带来不便;并且,一个用户终端对应一张用户识别卡的锁定方式也不利于运营商有效拓展市场。At present, the most common method of machine-card interlocking is that one user terminal corresponds to one user identification card. This locking method has certain limitations in practical application: after realizing machine-card interlocking, a user identification card can only be effectively used in one user terminal. Obviously, if the user wants to replace a new subscriber identification card or loses the subscriber identification card, it will bring inconvenience to the user; moreover, the locking method of one subscriber terminal corresponding to one subscriber identification card is not conducive to the effective expansion of the market for operators.
发明内容Contents of the invention
有鉴于此,本发明的主要目的在于提供一种有效用户识别卡的识别方法,使有效的多个用户识别卡均可使用于同一个用户终端,方便用户的使用,有利于运营商的发展。In view of this, the main purpose of the present invention is to provide a valid subscriber identification card identification method, so that multiple valid subscriber identification cards can be used in the same user terminal, which is convenient for users and beneficial to the development of operators.
为达到上述目的,本发明的技术方案是这样实现的:In order to achieve the above object, technical solution of the present invention is achieved in that way:
一种有效用户识别卡的识别方法,该方法包括:A method for identifying a valid user identification card, the method comprising:
向用户终端中写入用于判断用户识别卡是否有效的模糊解锁数据;读取用户识别卡中的信息,根据该信息与所述模糊解锁数据判断所述用户识别卡是否充许在所述用户终端中使用。Write fuzzy unlocking data for judging whether the user identification card is valid in the user terminal; read the information in the user identification card, and judge whether the user identification card is sufficient for the user according to the information and the fuzzy unlocking data used in the terminal.
所述模糊解锁数据是能够唯一识别用户识别卡的数据的部分内容。The fuzzy unlocking data is part of the data that can uniquely identify the user identification card.
能够唯一识别用户识别卡的所述数据是ESN或IMSI。The data that can uniquely identify the subscriber identity card is ESN or IMSI.
所述模糊解锁数据以信息列表的方式存在。The fuzzy unlocking data exists in the form of information list.
所述判断的方法为:The method of judgment is:
用从用户识别卡中读取的所述信息在所述模糊解锁数据中进行检索,如果在模糊解锁数据中检索到从用户识别卡中读取的所述信息,确定所述用户识别卡可用于所述用户终端;否则,确定所述用户识别卡不可用于所述用户终端。using the information read from the subscriber identification card to search in the fuzzy unlocking data, and if the information read from the subscriber identification card is retrieved in the fuzzy unlocking data, it is determined that the subscriber identification card can be used for the user terminal; otherwise, determine that the subscriber identity card is not available for the user terminal.
该方法进一步包括:The method further includes:
确定所述用户识别卡不充许在所述用户终端中使用,该用户终端进入非正常工作状态。It is determined that the subscriber identity card is not allowed to be used in the user terminal, and the user terminal enters an abnormal working state.
该方法进一步包括:The method further includes:
确定所述用户识别卡充许在所述用户终端中使用,该用户终端进入正常工作状态。It is determined that the subscriber identity card is allowed to be used in the user terminal, and the user terminal enters a normal working state.
进行所述判断之前,进一步判断所述用户识别卡是否处于PIN或PUK码使能状态,并在处于使能状态时判断是否在输入解锁码后成功解锁,该用户终端在未成功解锁时进入非正常工作状态。Before performing the judgment, it is further judged whether the subscriber identification card is in the PIN or PUK code enabled state, and when it is in the enabled state, it is judged whether it is successfully unlocked after inputting the unlock code. normal working condition.
进行所述判断之前,进一步判断所述用户终端的锁定标志位是否已经使能,在确定已经使能时,进行所述判断。Before performing the determination, it is further determined whether the lock flag of the user terminal has been enabled, and the determination is performed when it is determined that it has been enabled.
所述用户终端的锁定标志位未使能,所述用户终端进一步进入正常工作状态。The lock flag of the user terminal is not enabled, and the user terminal further enters a normal working state.
可见,本发明所提供的有效用户识别卡的识别方法,能够向用户终端中写入用于判断用户识别卡是否有效的模糊解锁数据;读取用户识别卡中的信息,根据该信息与所述模糊解锁数据判断所述用户识别卡是否充许在所述用户终端中使用。因此,有效的多个用户识别卡均可使用于同一个用户终端。在实际应用中,这些用户识别卡可以是运营商充许用户使用的用户识别卡,这使得用户只能在运营商自己经营的网络中使用用户终端,这对运营商的发展显然是有利的;并且,在用户想更换新的用户识别卡或者用户的用户识别卡丢失时,用户仍可以应用其它的用户识别卡,只要该用户识别卡是可以有效应用于用户终端的即可,这显然方便了用户的使用。It can be seen that the method for identifying a valid subscriber identification card provided by the present invention can write fuzzy unlocking data for judging whether the subscriber identification card is valid into the user terminal; read the information in the subscriber identification card, and based on the information and the described The fuzzy unlocking data judges whether the subscriber identification card is allowed to be used in the user terminal. Therefore, multiple effective subscriber identification cards can be used for the same subscriber terminal. In practical applications, these subscriber identification cards can be subscriber identification cards that operators allow users to use, which makes users only use user terminals in the network operated by operators themselves, which is obviously beneficial to the development of operators; And, when the user wants to replace a new subscriber identification card or the subscriber identification card of the user is lost, the user can still use other subscriber identification cards, as long as the subscriber identification card can be effectively applied to the user terminal, which is obviously convenient User's use.
附图说明Description of drawings
图1为本发明一实施例的预先设置模糊解锁数据的流程图;Fig. 1 is the flowchart of pre-setting fuzzy unlocking data according to an embodiment of the present invention;
图2为本发明一实施例的识别有效用户识别卡的流程图;Fig. 2 is a flow chart of identifying a valid subscriber identification card according to an embodiment of the present invention;
图3为本发明的识别有效用户识别卡的流程简图。Fig. 3 is a simplified flow chart of identifying a valid subscriber identification card in the present invention.
具体实施方式Detailed ways
下面结合附图对本发明技术详细描述。The technology of the present invention will be described in detail below in conjunction with the accompanying drawings.
参见图1,图1为本发明一实施例的预先设置模糊解锁数据的流程图,该流程包括以下步骤:Referring to Fig. 1, Fig. 1 is the flow chart of pre-setting fuzzy unlocking data according to an embodiment of the present invention, and the process includes the following steps:
步骤101:向用户终端中写入用于判断用户识别卡是否有效的模糊解锁数据。Step 101: Write fuzzy unlocking data for judging whether the subscriber identification card is valid into the user terminal.
具体而言,在启动用户终端后,可以使用键盘输入、PC侧软件工具等方式向用户终端中写入模糊解锁数据。所述模糊解锁数据可以是各种能够唯一识别用户识别卡的数据的部分内容,如:ESN、IMSI等的部分内容。Specifically, after starting the user terminal, the fuzzy unlocking data can be written into the user terminal by means of keyboard input, PC-side software tools, and the like. The fuzzy unlocking data may be part of various data that can uniquely identify the subscriber identification card, such as part of ESN, IMSI and the like.
步骤102:写入所述模糊解锁数据后,将用户终端的锁定标志位使能,表示该用户终端已经进行了锁定状态。Step 102: After writing the fuzzy unlocking data, enable the lock flag of the user terminal, indicating that the user terminal has been locked.
完成图1所示的操作后,就可以执行图2所示的操作了。参见图2,图2为本发明一实施例的识别有效用户识别卡的流程图,该流程包括以下步骤:After completing the operations shown in Figure 1, you can perform the operations shown in Figure 2. Referring to FIG. 2, FIG. 2 is a flow chart of identifying a valid subscriber identification card according to an embodiment of the present invention, and the process includes the following steps:
步骤201:在用户终端启动后,判断插入用户终端的用户识别卡是否处于PIN或PUK码使能状态,如果是,进行步骤202;否则,直接进入步骤203。Step 201: After the user terminal is started, determine whether the subscriber identification card inserted into the user terminal is in the PIN or PUK code enabled state, if yes, proceed to step 202; otherwise, directly enter step 203.
步骤202:在用户终端接收到用户输入的解锁码后,判断是否在输入解锁码后成功解锁,如果是,进行步骤203;否则,直接进入步骤207。Step 202: After the user terminal receives the unlock code input by the user, it is judged whether it is successfully unlocked after inputting the unlock code, if yes, go to step 203; otherwise, directly go to step 207.
步骤203:判断用户终端的锁定标志位是否已经使能,如果是,进入步骤204;否则,直接进入步骤208。Step 203: Determine whether the lock flag of the user terminal has been enabled, and if so, go to step 204; otherwise, go to step 208 directly.
步骤204:读取用户识别卡中的信息。Step 204: Read the information in the user identification card.
步骤205:对从用户识别卡中读取的信息和预先向用户终端中所写入的模糊解锁数据进行比较。Step 205: Comparing the information read from the user identification card with the fuzzy unlocking data written into the user terminal in advance.
步骤206:根据所述比较结果判断所述用户识别卡是否可用于所述用户终端,如果是,直接进入步骤208;否则,进入步骤207。Step 206: According to the comparison result, it is judged whether the subscriber identity card can be used for the user terminal, and if yes, directly go to step 208; otherwise, go to step 207.
具体而言,所述模糊解锁数据可以以信息列表的方式存在,该信息列表中保存有能够唯一识别用户识别卡的数据的部分内容,如:ESN信息的部分内容。那么,在进行所述比较操作时,就可以用从用户识别卡中读取的所述信息在所述模糊解锁数据中进行检索,如果在模糊解锁数据中检索到从用户识别卡中读取的所述信息,确定所述用户识别卡可用于所述用户终端;否则,确定所述用户识别卡不可用于所述用户终端。Specifically, the fuzzy unlocking data may exist in the form of an information list, and the information list stores part of the data that can uniquely identify the user identification card, such as part of the ESN information. Then, when performing the comparison operation, the information read from the user identification card can be used to search in the fuzzy unlocking data, if the information read from the user identification card is retrieved in the fuzzy unlocking data The information determines that the subscriber identity card is available for the user terminal; otherwise, determines that the subscriber identity card is not available for the user terminal.
在实际应用中,可以使用字段检索或者模糊检索等操作方式进行所述检索操作。如:假设从一张用户识别卡中读取出的ESN值为“12345678”,并且预先在用户终端中写入的模糊解锁数据为“1234”。那么在检索时,可以以从左向右的检索方式来进行数据检索。可见,经过检索,可以确定ESN前4位为“1234”的所有用户识别卡均可以在用户终端中正常使用。In practical applications, the retrieval operation may be performed by using operation methods such as field retrieval or fuzzy retrieval. For example: assume that the ESN value read from a user identification card is "12345678", and the fuzzy unlocking data written in the user terminal in advance is "1234". Then, during retrieval, data retrieval can be performed in a left-to-right retrieval manner. It can be seen that after searching, it can be determined that all subscriber identification cards whose first four digits of the ESN are "1234" can be used normally in the user terminal.
步骤207:用户终端进入非正常工作状态,并结束本流程。Step 207: The user terminal enters into an abnormal working state, and ends this process.
步骤208:用户终端进入正常工作状态。Step 208: the user terminal enters a normal working state.
由图1、图2可见,针对有效用户识别卡的识别方法的原则如图3所示。It can be seen from Fig. 1 and Fig. 2 that the principle of the identification method for valid subscriber identification cards is shown in Fig. 3 .
参见图3,图3为本发明的识别有效用户识别卡的流程简图,该流程包括以下步骤:Referring to Fig. 3, Fig. 3 is a schematic flow chart of identifying a valid subscriber identification card of the present invention, and the flow includes the following steps:
步骤301:预先向用户终端中写入用于判断用户识别卡是否有效的模糊解锁数据。Step 301: Write fuzzy unlocking data for judging whether the subscriber identification card is valid into the user terminal in advance.
步骤302:读取用户识别卡中的信息,根据该信息与所述模糊解锁数据判断所述用户识别卡是否充许在所述用户终端中使用。Step 302: Read the information in the subscriber identification card, and judge whether the subscriber identification card is allowed to be used in the user terminal according to the information and the fuzzy unlocking data.
通常,可以将充许在用户终端中使用的用户识别卡称为有效的用户识别卡。Generally, a subscriber identity card that is allowed to be used in a user terminal can be called a valid subscriber identity card.
由以上所述可见,本发明所提供的有效用户识别卡的识别方法,使有效的多个用户识别卡均可使用于同一个用户终端。在实际应用中,这些用户识别卡可以是运营商充许用户使用的用户识别卡,这使得用户只能在运营商自己经营的网络中使用用户终端,这对运营商的发展显然是有利的;并且,在用户想更换新的用户识别卡或者用户的用户识别卡丢失时,用户仍可以应用其它的用户识别卡,只要该用户识别卡是可以有效应用于用户终端的即可,这显然方便了用户的使用。It can be seen from the above description that the method for identifying a valid subscriber identification card provided by the present invention enables multiple valid subscriber identification cards to be used in the same user terminal. In practical applications, these subscriber identification cards can be subscriber identification cards that operators allow users to use, which makes users only use user terminals in the network operated by operators themselves, which is obviously beneficial to the development of operators; And, when the user wants to replace a new subscriber identification card or the subscriber identification card of the user is lost, the user can still use other subscriber identification cards, as long as the subscriber identification card can be effectively applied to the user terminal, which is obviously convenient User's use.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNA2007101785432A CN101169820A (en) | 2007-11-30 | 2007-11-30 | An identification method of valid user identification card |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNA2007101785432A CN101169820A (en) | 2007-11-30 | 2007-11-30 | An identification method of valid user identification card |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN101169820A true CN101169820A (en) | 2008-04-30 |
Family
ID=39390440
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNA2007101785432A Pending CN101169820A (en) | 2007-11-30 | 2007-11-30 | An identification method of valid user identification card |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN101169820A (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104735251A (en) * | 2015-03-17 | 2015-06-24 | 上海天奕达电子科技有限公司 | Method and device for unlocking mobile terminals |
| CN108834160A (en) * | 2018-06-01 | 2018-11-16 | 中国联合网络通信集团有限公司 | Method for Determining Usage of User Identity Card and Network Device |
| US11994688B2 (en) | 2017-08-25 | 2024-05-28 | Nkt Photonics A/S | Depolarizing homogenizer |
-
2007
- 2007-11-30 CN CNA2007101785432A patent/CN101169820A/en active Pending
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104735251A (en) * | 2015-03-17 | 2015-06-24 | 上海天奕达电子科技有限公司 | Method and device for unlocking mobile terminals |
| US11994688B2 (en) | 2017-08-25 | 2024-05-28 | Nkt Photonics A/S | Depolarizing homogenizer |
| CN108834160A (en) * | 2018-06-01 | 2018-11-16 | 中国联合网络通信集团有限公司 | Method for Determining Usage of User Identity Card and Network Device |
| CN108834160B (en) * | 2018-06-01 | 2021-08-10 | 中国联合网络通信集团有限公司 | Method for determining use condition of user identity identification card and network equipment |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101083816B (en) | A wireless terminal and its interlocking and unlocking method with a subscriber identification card | |
| CN101753682B (en) | Right management method for user identification card and terminal unit | |
| CN108093392B (en) | Method, mobile terminal and storage medium for unlocking SIM card | |
| CN104375836A (en) | Method and device for showing lock screen window | |
| CN101820465A (en) | Terminal and method for binding SIM card | |
| CN102056148A (en) | Anti-breaking method for network locking mobile terminal and network locking mobile terminal | |
| CN111651173A (en) | Key code data burning method, device, terminal device and readable storage medium | |
| KR20040008088A (en) | System for preventing unauthorized use of recording media | |
| CN101247579A (en) | Method for locking mobile communication terminal through Bluetooth earphone | |
| CN101141718B (en) | A mobile terminal card locking method | |
| CN102136085A (en) | Telecom smart card and telecom smart card-based non-contact application management method | |
| CN101986672B (en) | Message processing method and device | |
| CN104660613A (en) | Authentication method of user identification module and electronic equipment | |
| CN101789988A (en) | Method for realizing binding of mobile phone and SIM card | |
| CN109727027A (en) | Account recognition methods, device, equipment and storage medium | |
| CN101610500A (en) | Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system | |
| CN101505480A (en) | Method and system for customer identity registration | |
| CN101169820A (en) | An identification method of valid user identification card | |
| CN102780995B (en) | Network locking method of dual-card dual-standby mobile phone | |
| CN105430738A (en) | Method and device for initiating registration | |
| CN106507300A (en) | A kind of method for giving loss terminal for change, device and terminal | |
| CN101488994B (en) | Method and communication terminal for implementing unlocking between communication terminal and recognition card | |
| US20090177716A1 (en) | Removable storage device and electronic apparatus that can be connected together and method for saving environmental data | |
| KR100968345B1 (en) | Method and system for providing mobile widget using chip | |
| CN109191127A (en) | A kind of method and tool of digital asset secure storage |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C12 | Rejection of a patent application after its publication | ||
| RJ01 | Rejection of invention patent application after publication |
Open date: 20080430 |