CN103530553A - Mobile terminal with authorization card and authorization method - Google Patents
Mobile terminal with authorization card and authorization method Download PDFInfo
- Publication number
- CN103530553A CN103530553A CN201310497527.5A CN201310497527A CN103530553A CN 103530553 A CN103530553 A CN 103530553A CN 201310497527 A CN201310497527 A CN 201310497527A CN 103530553 A CN103530553 A CN 103530553A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- authorization card
- authorization
- card
- interface circuit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a mobile terminal with an authorization card and an authorization method. According to the mobile terminal with the authorization card and the authorization method, software is replaced with hardware, and the authorization card can be separated from the body of the mobile terminal; similar to hardware encryption, the authorization card needs to be used when matched operation with authorization required is conducted, and the authorization card is not needed when other ordinary operation is conducted. Accordingly, usage is not affected, limited operation can not be conducted when the authorization card is unavailable, so that operation, such as rewriting into a system, caused by the missing of the mobile terminal is effectively avoided, and the mobile terminal can be retrieved more easily.
Description
Technical field
The present invention relates to a kind of mobile terminal and the method to mobile terminal mandate, specifically the mobile terminal based on safety problem in built-in field.
Background technology
Mobile terminal is one of frequent equipment using of current user, as all kinds of handheld devices such as mobile phones.The portability of mobile device brings great convenience to user, but simultaneously also to user, has brought the easily puzzlement of stolen, easy loss of mobile terminal.
Along with becoming increasingly abundant of mobile terminal application, mobile terminal, not only for meeting user's communication need, also provides as online working, has exchanged the services such as amusement.This just will inevitably be on mobile terminal the sensitive data such as memory communicating record, account number cipher, daily record of work.Therefore the loss of mobile terminal not only can be brought loss economically to user, also may be because the potential loss that the sensitive data existing on mobile terminal causes.Therefore can guarantee that it is not the research direction that need to be concerned by leakage that mobile terminal is lost rear sensitive data.
In prior art, already existed protecting sensitive data and mobile terminal in the time of can solving mobile terminal and lose to give the relevant solution of problem for change.These solutions are mostly after lost terminal, by modes such as note, phone, passwords, mobile terminal can not normally be used, yet this class solution only can be protected the safety of data in mobile terminal, but can not guarantee that mobile terminal is given for change.Reason is that these solutions are all realized by software, and after terminal system is write again, mobile terminal can be reused, thereby can not fundamentally solve the problem that mobile terminal is lost.
And in other are realized, by radio-frequency technique (Radio Frequency Identification, RFID) etc. technology realizes the means such as mobile terminal warning and prevents that mobile terminal from losing, but in public arenas such as noisy market, buses, user is difficult to perceive mobile terminal and reports to the police, and can not fundamentally solve the problem that mobile terminal is lost.
Therefore, inventor thinks, after losing as mobile terminals such as mobile phones, do not have hardware mandate can not normally use and again writing system be very necessary, thereby, by hardware mode, replace software mode and propose a kind of new technology path.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of mobile terminal with authorization card, in the solution of losing at mobile terminal, with hardware mode, replace software mode and produce a kind of new technology path.Meanwhile, the present invention also provides a kind of authorization method.
The present invention is by the following technical solutions:
According to one aspect of the present invention, a kind of mobile terminal with authorization card, the authorization card that comprises the individual packages of terminal body and given terminal body privileged operation, and adaptedly, terminal body the be provided with interface circuit of for both communicating by letter corresponding to authorization card.
Described interface circuit is adaptive slot interface circuit or serial interface circuit.
When interface circuit is slot interface circuit, corresponding authorization card is SD card, miniSD card or IF card, and when interface circuit is serial interface circuit, the communication interface of corresponding authorization card is USB interface.
Described authorization card comprises:
Interface circuit, adapts to authorization card type;
Tandom number generator, is connected in described interface circuit, to respond the request of mobile terminal, produces random number, by described interface circuit, returns this random number;
Crypto-operation engine, is connected in described interface circuit, receives the described random number of processing through terminal body, uses predetermined private key to sign, and passback mobile terminal is verified; And
Storer, is connected in interface circuit, tandom number generator and crypto-operation engine.
Described authorization card is based on internal bus, for the connection of packaged device.
Described storer disposes volatile memory and nonvolatile memory.
Authorization method according to a kind of mobile terminal of another aspect of the present invention, mobile terminal is separated with authorization card, and by authorization card individual packages, the packing forms of the authorization card of coupling individual packages, on mobile terminal, configure adaptive interface, thereby, when given Authorized operation need to be performed, authorization card is connected and obtains the authorization with mobile terminal, authorize by after carry out predetermined Authorized operation.
Mobile terminal configuration wireless communication module, and the running status of mobile terminal is divided into controlled mode and uncontrolled pattern, thereby after mobile terminal is lost, mobile radio telecommunications module by configuration triggers controlled mode, but operation under controlled mode can not move, and in the situation that authorization card is connected with mobile terminal, after authorizing and passing through, removes controlled mode and enter uncontrolled pattern.
Authorized operation based on authorization card comprises the step of authentication password.
The invention has the beneficial effects as follows and use hardware mode to replace software, authorization card wherein can be separated with terminal body, be similar to hardware encipher, when the operation of the needs mandate of mating, need to use this authorization card, and when the normal operations of carrying out in addition, do not need authorization card, neither impact is used, and when with no authorized card, the operation limiting can not be carried out, thereby effectively avoided mobile terminal to lose, carries out as the operation of writing system again.So more be conducive to giving for change of mobile terminal.
Accompanying drawing explanation
Fig. 1 is the foundation theory diagram with the mobile terminal of authorization card of the present invention.
Fig. 2 is the theory diagram of authorization card.
Fig. 3 is the partitioned organization schematic diagram of the Flash (flash memory) with the mobile terminal of authorization card.
Fig. 4 is the licensing process process flow diagram of authorization card and terminal body.
Embodiment
The concept that should be appreciated that authorization card is known by those skilled in the art, such as bank cashier authorization card, and current generally use, but on mobile terminal, owing to also not occurring similar operational version as reasons such as volume, portability.
The design of this case based on such, proposes a kind of mobile terminal with authorization card, and describes its implementation in following content, can effectively solve the problem that mobile terminal is lost rear protecting sensitive data, also can provide terminal management function simultaneously.During normal use, mobile terminal does not need authorization card normally to move, and when needs privileged operation, need to insert authorization card and authorize, and just can carry out privileged operation.
Be to be understood that, about the content of authorizing, those skilled in the art designs according to the requirement of mobile terminal, does not belong to the improved content of this case, the authorized content embodying in following example is only expressed as the content of associated exemplary, does not represent concrete restriction of the present invention.
In certain embodiments, the mobile terminal that has so an authorization card comprises embedded microprocessor, storer, communication module, authorization card.Wherein, communication module is used for carrying out message command with the external world and exchanges.Authorization card individual packages becomes as SD card form, or USB interface is provided, and is conveniently connected with terminal body.Authorization card should comprise tandom number generator, crypto-operation engine, volatile memory, nonvolatile memory and control interface.
In certain embodiments, terminal body can carry out following configuration, and terminal body, according to whether being divided into licensing mode and unauthorized pattern by mandate, is divided into controlled mode and uncontrolled pattern according to terminal body running status.
After terminal body loss, can be by receiving order as communication module, then make terminal enter controlled mode turning-off mobile terminal body, when terminal body reuses, need to insert authorization card, authorize after entering licensing mode and could normally start, if do not insert authorization card, prompting is inserted authorization card and is shown user's information, does not insert in the situation of authorization card and does not allow writing system again.
According to foregoing, mobile terminal due to user's with no authorized card, cannot be used terminal body and access terminal data after losing.User cannot restart terminal body by operations such as updating systems after finding terminal body.
With a specific embodiment, be described implementation process of the present invention below, but the present invention is not limited only to this embodiment.Content of the present invention contain anyly on core content of the present invention, make an amendment, equivalence, the various schemes of replacing.
The authorization card of the present embodiment is packaged into the form of SD card, and the present invention is not limited to the packing forms of SD card.For the ease of explanatory note, directly use mobile terminal to represent terminal body.
There is the mobile terminal of authorization card as shown in Figure 1, comprise following critical piece:
1) processor: central authorities process logical block, is responsible for the operation of data operation, instruction process, control mobile terminal etc.
2) storer: comprise ROM, RAM, FLASH, wherein ROM is for the not revisable start-up code of storage, and RAM is for the variable of storage running, and FLASH is for storage program, digital certificate and data;
3) communication module: communicate and data transmission etc. with miscellaneous equipment;
4) authorization card: carry out crypto-operation, realize the function of the required crypto-operation of licensing process and storage sensitive data;
5) other external unit.
Wherein, authorization card completes the associative operation of authorization function, and authorization card is the set of related hardware and firmware, and the memory function of crypto-operation function and sensitive data is provided.Authorization card is packaged into SD card, mini SD card, TF card (T-Flash claims again microSD), also can be advantageously connected to mobile device, to adapt to different mobile terminal demands.
The composition structure of authorization card is as shown in Figure 2:
1) control interface: authorization card control interface is the hardware interface of authorization card input and output, is the interface of mobile terminal accessing authorization card Resource Supply, and mobile terminal docks with this control interface by system IO interface.
2) tandom number generator: produce random number, for Authorized operation provides true random number.
3) crypto-operation engine: for Authorized operation provides crypto-operation.
4) volatile memory: the ephemeral data that storage authorization card produces when operation.
Nonvolatile memory: the data of storage permanent storage, generally store the sensitive datas such as key of authorization card, and subprogram and general data.
Authorization card is packaged into after SD form, and the reserved order by expansion SD agreement is realized.The major function that authorization card completes has: get random number, digital signature, certifying signature.Between authorization card and mobile terminal, mutual basic interface order meets the standard of SD protocol command.
This programme adopts SD explosion command, and command format is as shown in table 1:
Table 1
SD explosion command | Data field |
The definition of SD explosion command is as shown in table 2, by parameter field [10:8], is determined.
Table 2
Command definition | Parameter [10:8] | Remarks |
Get random number | 001 | Parameter [11:14] represents to get the byte number of random number |
Digital signature | 010 | Message M is carried out to digital signature, and [11:14] represents the length of message |
Certifying signature | 011 | Information signature is verified, [11:14] represents the length of message, and [15:20] represents the length of information signature |
1) get random number: mobile terminal can take out a true random number by this order from authorization card, and concrete operation step is as follows:
A) mobile terminal sends and gets random number order to authorization card;
B) authorization card produces the random number of a request length by randomizer after receiving order, and returns to mobile terminal by the response of SD explosion command.
2) digital signature: mobile terminal can make authorization card with the private key of oneself, message M be signed by this order, and concrete operation step is as follows:
A) mobile terminal sends digital signature order to authorization card;
B) authorization card receives after order, calls crypto-operation engine and uses the private key of oneself to sign to message M, obtains the PRI{M} that signs, and signature PRI{M} is returned to mobile terminal by CMD60 command response.
3) certifying signature: mobile terminal can make the PKI that authorization card utility command transmits verify signature PRI{M} by this order, and concrete operation step is as follows:
A) mobile terminal sends certifying signature order to authorization card;
B) authorization card receives after order, calling the PKI that crypto-operation engine utility command transmits verifies message PRI{M}, if be verified, show it is that legal authorization card returns to 1, otherwise be that illegal authorization card returns to 0, by the response of SD explosion command, return to mobile terminal.
The guidance code of mobile terminal leaves in ROM, guidance code can not be changed, and the major function of this part code is to realize the initialization of basic hardware, FLASH management, detect mobile terminal pattern (controlled mode and uncontrolled pattern), the basic function of empowerment management and boot.
The FLASH storage and distribution of mobile terminal as shown in Figure 3, is followed successively by sensitive data district, system program district, application area, data field.Wherein, sensitive data district, system program district are read-only under unauthorized pattern, are only to change after authorizing.Authorization card digital certificate is deposited in sensitive data district, the sensitive datas such as user name password, mode flags, and the operation code of system program district storage system, deposit application area and data field, the code of application program and user data.Wherein, the mode flags in sensitive data district is revised as controlled mode under unauthorized pattern, but can not revise uncontrolled pattern by controlled mode.
Sensitive data district, system program district are read-only under unauthorized pattern, after authorizing, are only and can change.Therefore revising sensitive data and again all needing the licensing process by authorization card during updating system.The process of change sensitive data and system program is as follows:
A) mobile terminal detects authorization card, if authorization card execution step b detected; Otherwise execution step d;
B) mobile terminal request mandate, passes through if authorize, and performs step c; Otherwise execution step d;
C) revise sensitive data or system program;
D) refusal is revised sensitive data or system program, closes a terminal.
E) licensing process of mobile terminal is as shown in Figure IV:
F) whether mobile terminal checking is authorization card, if authorization card sends and gets random number order to authorization card;
G) authorization card receives after random number order, calls tandom number generator and produces random number, and random number is returned to mobile terminal;
H) repeating step a, b are many times;
I) acquisition for mobile terminal, to after these a plurality of random numbers, is upset the order of random number connect, and then random getting N time got 1 byte at every turn, obtains the random number of a common N byte.
The random number sending obtaining to authorization card is carried out the order of digital signature;
Authorization card receives after signature order, and oneself signature private key of use authority card is signed to random number, and signature is sent to mobile terminal;
Mobile terminal receives after signature, utilizes the PKI that is stored in authorization card in FLASH to verify random number signature, enters uncontrolled pattern if be verified, normal boot-strap, otherwise close mobile device.
Have authorization card mobile terminal after loss, user can be by mobile terminal locking, and by authorization card, mobile terminal solution is locked, and concrete steps are as follows:
1) user can be by network to sending Text Command, and command format is as shown in table 3:
Table 3
Beginning flag | User name+# | Password # | Command context | End mark |
As #*zzc#zzc123#shutdown*#
Command context wherein
Table 4
command context | function |
shutdown | close a terminal, and enter controlled mode. |
lock | locking terminal, and enter controlled mode, only allow to dial designated telephone. |
2) mobile terminal receives after order, resolve user name password, and whether authentication of users name password is correct, if correct, makes mobile terminal enter controlled mode, and turning-off mobile terminal; If incorrect, do not carry out any operation.
3) in controlled mode, when reusing mobile phone, user points out insertion authorization card, the essential informations such as demonstration user's name, contact method, and guide user to give back mobile device.
System is restarting or during screen locking, prompting user input command, if continuous 3 password mistakes enter controlled mode, needs to insert authorization card and carries out just can normally using after Authorized operation.
Mode by password and authorization card combination can guarantee the data security in customer mobile terminal, and after guaranteeing that again mobile terminal is lost, mobile terminal is unavailable, can not reactivate mobile terminal by the mode of updating system program.This with regard to fundamentally solved mobile terminal and lost or be stolen after data information reveal and mobile terminal by the problem of other people use.
Claims (9)
1. a mobile terminal with authorization card, it is characterized in that, the authorization card that comprises the individual packages of terminal body and given terminal body privileged operation, and adaptedly, terminal body the be provided with interface circuit of for both communicating by letter corresponding to authorization card.
2. the mobile terminal with authorization card according to claim 1, is characterized in that, described interface circuit is adaptive slot interface circuit or serial interface circuit.
3. the mobile terminal with authorization card according to claim 2, it is characterized in that, when interface circuit is slot interface circuit, corresponding authorization card is SD card, miniSD card or IF card, and when interface circuit is serial interface circuit, the communication interface of corresponding authorization card is USB interface.
4. according to the arbitrary described mobile terminal with authorization card of claims 1 to 3, it is characterized in that, described authorization card comprises:
Interface circuit, adapts to authorization card type;
Tandom number generator, is connected in described interface circuit, to respond the request of mobile terminal, produces random number, by described interface circuit, returns this random number;
Crypto-operation engine, is connected in described interface circuit, receives the described random number of processing through terminal body, uses predetermined private key to sign, and passback mobile terminal is verified; And
Storer, is connected in interface circuit, tandom number generator and crypto-operation engine.
5. the mobile terminal with authorization card according to claim 4, is characterized in that, described authorization card is based on internal bus, for the connection of packaged device.
6. the mobile terminal with authorization card according to claim 4, is characterized in that, described storer disposes volatile memory and nonvolatile memory.
7. the authorization method of a mobile terminal, it is characterized in that, mobile terminal is separated with authorization card, and by authorization card individual packages, the packing forms of the authorization card of coupling individual packages configures adaptive interface on mobile terminal, thereby, when given Authorized operation need to be performed, authorization card is connected and obtains the authorization with mobile terminal, authorize by after carry out predetermined Authorized operation.
8. the authorization method of mobile terminal according to claim 7, it is characterized in that, mobile terminal configuration wireless communication module, and the running status of mobile terminal is divided into controlled mode and uncontrolled pattern, thereby after mobile terminal is lost, by the mobile radio telecommunications module triggering controlled mode of configuration, but operation under controlled mode can not move, and in the situation that authorization card is connected with mobile terminal, after authorizing and passing through, removes controlled mode and enter uncontrolled pattern.
9. according to the authorization method of the mobile terminal described in claim 7 or 8, it is characterized in that, the Authorized operation based on authorization card comprises the step of authentication password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310497527.5A CN103530553A (en) | 2013-10-22 | 2013-10-22 | Mobile terminal with authorization card and authorization method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310497527.5A CN103530553A (en) | 2013-10-22 | 2013-10-22 | Mobile terminal with authorization card and authorization method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103530553A true CN103530553A (en) | 2014-01-22 |
Family
ID=49932557
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310497527.5A Pending CN103530553A (en) | 2013-10-22 | 2013-10-22 | Mobile terminal with authorization card and authorization method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103530553A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106060788A (en) * | 2016-05-24 | 2016-10-26 | 中国科学院信息工程研究所 | Short message-based security TF card issuing method applicable to circuit domain encrypted communication |
CN106529262A (en) * | 2016-10-31 | 2017-03-22 | 维沃移动通信有限公司 | Data protection method for mobile terminal and mobile terminal |
CN106603486A (en) * | 2016-11-03 | 2017-04-26 | 厦门雅迅网络股份有限公司 | Mobile terminal safety authorization method and system |
CN107995625A (en) * | 2017-12-11 | 2018-05-04 | Tcl移动通信科技(宁波)有限公司 | Mobile terminal and method, storage medium and the credit SIM card for recalling contact person |
CN114598461A (en) * | 2022-02-24 | 2022-06-07 | 广东天波信息技术股份有限公司 | Online unlocking method of terminal equipment, terminal equipment and readable storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1402131A (en) * | 2001-08-14 | 2003-03-12 | 大买家科技股份有限公司 | System and method for controlling software operation by storage card |
CN101005662A (en) * | 2006-11-15 | 2007-07-25 | 深圳凯虹移动通信有限公司 | Mobile terminal with long-range control function and its long-range control method |
CN101043327A (en) * | 2007-03-16 | 2007-09-26 | 中兴通讯股份有限公司 | Anti-symmetric algorithmic based mobile terminal security lock network locking card protection and unlocking method |
CN101223799A (en) * | 2005-05-16 | 2008-07-16 | 索尼爱立信移动通讯股份有限公司 | Method for disabling a mobile device |
CN102693385A (en) * | 2012-05-28 | 2012-09-26 | 山东神思电子技术股份有限公司 | Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof |
CN102883047A (en) * | 2012-08-31 | 2013-01-16 | 惠州Tcl移动通信有限公司 | Method and system for realizing data security of intelligent mobile terminals |
CN102915415A (en) * | 2011-08-04 | 2013-02-06 | 中国长城计算机深圳股份有限公司 | Safety control method and system of mobile terminal |
-
2013
- 2013-10-22 CN CN201310497527.5A patent/CN103530553A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1402131A (en) * | 2001-08-14 | 2003-03-12 | 大买家科技股份有限公司 | System and method for controlling software operation by storage card |
CN101223799A (en) * | 2005-05-16 | 2008-07-16 | 索尼爱立信移动通讯股份有限公司 | Method for disabling a mobile device |
CN101005662A (en) * | 2006-11-15 | 2007-07-25 | 深圳凯虹移动通信有限公司 | Mobile terminal with long-range control function and its long-range control method |
CN101043327A (en) * | 2007-03-16 | 2007-09-26 | 中兴通讯股份有限公司 | Anti-symmetric algorithmic based mobile terminal security lock network locking card protection and unlocking method |
CN102915415A (en) * | 2011-08-04 | 2013-02-06 | 中国长城计算机深圳股份有限公司 | Safety control method and system of mobile terminal |
CN102693385A (en) * | 2012-05-28 | 2012-09-26 | 山东神思电子技术股份有限公司 | Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof |
CN102883047A (en) * | 2012-08-31 | 2013-01-16 | 惠州Tcl移动通信有限公司 | Method and system for realizing data security of intelligent mobile terminals |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106060788A (en) * | 2016-05-24 | 2016-10-26 | 中国科学院信息工程研究所 | Short message-based security TF card issuing method applicable to circuit domain encrypted communication |
CN106060788B (en) * | 2016-05-24 | 2019-06-11 | 中国科学院信息工程研究所 | A kind of safe TF card short message hair fastener method suitable for circuit domain coded communication |
CN106529262A (en) * | 2016-10-31 | 2017-03-22 | 维沃移动通信有限公司 | Data protection method for mobile terminal and mobile terminal |
CN106603486A (en) * | 2016-11-03 | 2017-04-26 | 厦门雅迅网络股份有限公司 | Mobile terminal safety authorization method and system |
CN106603486B (en) * | 2016-11-03 | 2021-09-07 | 厦门雅迅网络股份有限公司 | Method and system for security authorization of mobile terminal |
CN107995625A (en) * | 2017-12-11 | 2018-05-04 | Tcl移动通信科技(宁波)有限公司 | Mobile terminal and method, storage medium and the credit SIM card for recalling contact person |
CN114598461A (en) * | 2022-02-24 | 2022-06-07 | 广东天波信息技术股份有限公司 | Online unlocking method of terminal equipment, terminal equipment and readable storage medium |
CN114598461B (en) * | 2022-02-24 | 2023-10-31 | 广东天波信息技术股份有限公司 | Online unlocking method of terminal equipment, terminal equipment and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2905715B1 (en) | Method, system and terminal for encrypting/decrypting application program on communication terminal | |
CN103530553A (en) | Mobile terminal with authorization card and authorization method | |
CN102792724B (en) | The protection of the communication channel between security module and NFC circuit | |
US7623845B2 (en) | System for preventing unauthorized use of a mobile phone | |
CN102056077B (en) | Method and device for applying smart card by key | |
US20130059566A1 (en) | Protection against rerouting in an nfc circuit communication channel | |
CN103313238A (en) | Safety system and safety protection method for mobile terminal | |
CN202353818U (en) | System for ensuring secure communication between vehicle-mounted communication equipment and wireless terminal | |
CN101741565A (en) | Method and system for transmitting IC (integrated circuit)-card application data | |
CN106230813A (en) | Method for authenticating, authentication device and terminal | |
CN104717063A (en) | Software security protection method of mobile terminal | |
CN101399659B (en) | Cipher key authentication method and device between user identification module and terminal | |
CN104717649A (en) | Method for remote control over wiping of software data of mobile terminal | |
CN104270754A (en) | SIM authentication method and device | |
CN105825149A (en) | Switching method for multi-operation system and terminal equipment | |
CN103297236A (en) | User identity verification and authorization system | |
CN103838988A (en) | Information security protection method and device | |
CN100413368C (en) | A method for verifying user card validity | |
CN104125223B (en) | A kind of security protection system of mobile device private data | |
Kumar et al. | Vulnerability detection of international mobile equipment identity number of smartphone and automated reporting of changed IMEI number | |
CN102122342B (en) | Mobile phone password inputting method and mobile phone using same | |
CN107948973B (en) | Equipment fingerprint generation method applied to IOS (input/output system) for security risk control | |
CN104918244A (en) | Terminal and terminal communication method | |
US10637851B2 (en) | Introducing an identity into a secure element | |
CN100429957C (en) | Indentifying method for telecommunication smart card and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140122 |