CN108199904A - A kind of Android system realizes terminal unit remote lock network and the implementation method of unlock - Google Patents

A kind of Android system realizes terminal unit remote lock network and the implementation method of unlock Download PDF

Info

Publication number
CN108199904A
CN108199904A CN201810075794.6A CN201810075794A CN108199904A CN 108199904 A CN108199904 A CN 108199904A CN 201810075794 A CN201810075794 A CN 201810075794A CN 108199904 A CN108199904 A CN 108199904A
Authority
CN
China
Prior art keywords
client
network
information
configuration information
event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810075794.6A
Other languages
Chinese (zh)
Inventor
李仁启
樊啟保
金星
吴义山
孙荣卫
张波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Abup Intelligent Technology Co ltd
Original Assignee
Shanghai Guang Sheng Information Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Guang Sheng Information Technology Ltd By Share Ltd filed Critical Shanghai Guang Sheng Information Technology Ltd By Share Ltd
Priority to CN201810075794.6A priority Critical patent/CN108199904A/en
Publication of CN108199904A publication Critical patent/CN108199904A/en
Priority to PCT/CN2019/073208 priority patent/WO2019144936A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/0816Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0866Checking the configuration
    • H04L41/0869Validating the configuration within one network element
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • H04L41/0886Fully automatic configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

A kind of Android system realizes terminal unit remote lock network and the implementation method of unlock, it is related to a kind of computer realm.It is characterized by comprising following steps:Client is run as finger daemon resident system;Client monitors power-on event, changes the event changes such as card event, date change events and push message events, timely to obtain newest configuration information and to change device network lock status;Client optimizes collected information combination operation, and after combination is completed, symmetric encryption operation is carried out using specific AES encryption key;Encrypted data are uploaded to server by client in a manner of post by https.After adopting the above technical scheme, the present invention has the beneficial effect that:Brand quotient or operator is facilitated to carry out the operations such as lock network type modification, unlock, locking to the equipment dispatched from the factory, greatly saves and runs successfully and the time.

Description

A kind of Android system realizes terminal unit remote lock network and the implementation method of unlock
Technical field
The present invention relates to computer realms, and in particular to a kind of Android system realizes the reconciliation of terminal unit remote lock network The implementation method of lock, suitable for all Android terminals.
Background technology
In internet highly developed today, terminal device has been a part indispensable in people's life.Wherein Mobile phone is most typical representative, and people can access internet by terminal and carry out web page browsing, amusement, work etc..At these In terminal, quite a few is carrier customization terminal, i.e., can only use the SIM card of specified operator, when user's insertion is non- After the SIM card of specified operator, terminal device will be unable to work normally.The principle of these carrier customization equipment design is to set When standby manufacture, equipment vendors are written with the lock network condition code of specified operator, such as MCCMNC.After leaving factory, this A little lock network condition codes will be unable to change again.
Currently used net locking method is limited by factory, and brand quotient or operator can not be again to lock networks after manufacture Type is modified.Can only again being done over again by equipment factory of not selling completes this operation.The equipment sold Because having arrived user mobile phone, in the case of not recalling, it is difficult to which returning again to factory carries out rework operation.
As above, current lock network mode can not meet the needs of lock network type is freely changed by brand quotient or operator, behaviour Make to get up extremely quite tired, can also improve cost.
It is wide to rise the algorithm for having invented long-range lock network unlock in order to meet the needs of Vehicles Collected from Market, can facilitate brand quotient or Person operator carries out the operations such as lock network type modification, unlock, locking to the equipment dispatched from the factory at any time.Greatly save fortune Seek cost and time.As long as all operations are configured accordingly in operating console, terminal equipment access network it Afterwards, latest configuration information can be obtained from control server automatically, and sets and comes into force.
Invention content
In view of the defects and deficiencies of the prior art, the present invention intends to provide a kind of Android system realizes terminal The long-range lock network of equipment and the implementation method of unlock, greatly save operation cost and time.
To achieve the above object, the present invention is using following technical scheme:It is characterized in that:Include the following steps:
101st, client is run as finger daemon resident system;
102nd, client monitors power-on event, changes the event changes such as card event, date change events and push message events, Timely to obtain newest configuration information and to change device network lock status;
103rd, client first reads the current network lock status preserved in equipment after power-on event is received, if It is locked state, then locking operation is carried out to equipment, user cannot be introduced into desktop, the SIM specified except non-intrusive specified operator Card;If unlocked state, then operation is unlocked to equipment, user can be directly entered desktop and carry out any operation, receive To while event carry out facility information collection operation, including but not limited to system version number, unit type, IMEI, IMSI, Network status, network lock status etc.;
104th, client optimizes collected information combination operation, and after combination is completed, the AES of handling characteristics adds Key carries out symmetric encryption operation;
105th, encrypted data are uploaded to server to client by post modes by https;
106th, client receives the new configuration information that server issues, and first carries out RSA decryption oprerations to information, has decrypted Into and then carry out effectiveness of information verifying work;
107th, after client is to information checking success, configuration information is saved in the nvram of modem, and according to configuration Network lock status in information locks to equipment or is unlocked operation, after locking successfully, has and only specifies operator Specified SIM card can be operated into desktop;No matter whether configuration information verifies success, if comes into force, client can all report Final result is given to server.
2nd, a kind of Android system according to claim 1 realizes the realization of terminal unit remote lock network and unlock Method, it is characterised in that:The step 104, client carry out AES symmetric cryptographies to the information of collection, specifically include following step Suddenly:
201st, client has collected institute's information in need, including but not limited to system version number, unit type, IMEI, IMSI, Network status, network lock status etc.;
202nd, client is ranked up ownship information operation according to the rule of setting;
203rd, client carries out squeeze operation according to the compression algorithm of setting to the ownship information after sequence;
204th, client calculates the encryption key of symmetric cryptography AES according to the method for setting;
205th, operation is encrypted in ownship information after client is compressed by AES encryption key pair.
3rd, a kind of Android system according to claim 1 realizes the realization of terminal unit remote lock network and unlock Method, it is characterised in that:The step 106 receives server configuration information and decrypts verification, specifically includes following steps:
301st, client receives the configuration information that server issues;
302nd, client obtains rivest, shamir, adelman RSA decruption keys according to the mode specified;
303rd, client is decrypted configuration information using RSA public keys, and isolates configuration information element, comprising but not It is limited to:IMEI, IMSI, timestamp, the term of validity, network lock status;
304th, client carries out validity check to the configuration information element isolated, including but not limited to:Signing messages Effectively whether, whether IMEI matches, whether timestamp is effective, whether the term of validity meets, whether network lock status changes.
After adopting the above technical scheme, the present invention has the beneficial effect that:Can facilitate brand quotient or operator it is in office when It waits and the operations such as lock network type modification, unlock, locking is carried out to the equipment dispatched from the factory.It greatly saves and runs successfully and the time.Institute It, can be automatically from control after terminal equipment access network as long as some operations are configured accordingly in operating console Latest configuration information is obtained in server, and sets and comes into force.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also To obtain other attached drawings according to these attached drawings.
Fig. 1 is operational process schematic diagram of the present invention;
Fig. 2 is present device information encryption flow schematic diagram;
Fig. 3 is configuration information decryption flow diagram of the present invention.
Specific embodiment
Referring to shown in Fig. 1-Fig. 3, present embodiment the technical solution adopted is that:A kind of Android system is realized eventually The long-range lock network of end equipment and the implementation method of unlock, it is characterised in that:Include the following steps:
101st, client is run as finger daemon resident system;
102nd, client monitors power-on event, changes the event changes such as card event, date change events and push message events, Timely to obtain newest configuration information and to change device network lock status;
103rd, client first reads the current network lock status preserved in equipment after power-on event is received, if It is locked state, then locking operation is carried out to equipment, user cannot be introduced into desktop, the SIM specified except non-intrusive specified operator Card;If unlocked state, then operation is unlocked to equipment, user can be directly entered desktop and carry out any operation, receive To while event carry out facility information collection operation, including but not limited to system version number, unit type, IMEI, IMSI, Network status, network lock status etc.;
104th, client optimizes collected information combination operation, and after combination is completed, the AES of handling characteristics adds Key carries out symmetric encryption operation;
105th, encrypted data are uploaded to server to client by post modes by https;
106th, client receives the new configuration information that server issues, and first carries out RSA decryption oprerations to information, has decrypted Into and then carry out effectiveness of information verifying work;
107th, after client is to information checking success, configuration information is saved in the nvram of modem, and according to configuration Network lock status in information locks to equipment or is unlocked operation, after locking successfully, has and only specifies operator Specified SIM card can be operated into desktop;No matter whether configuration information verifies success, if comes into force, client can all report Final result is given to server.
2nd, a kind of Android system according to claim 1 realizes the realization of terminal unit remote lock network and unlock Method, it is characterised in that:The step 104, client carry out AES symmetric cryptographies to the information of collection, specifically include following step Suddenly:
201st, client has collected institute's information in need, including but not limited to system version number, unit type, IMEI, IMSI, Network status, network lock status etc.;
202nd, client is ranked up ownship information operation according to the rule of setting;
203rd, client carries out squeeze operation according to the compression algorithm of setting to the ownship information after sequence;
204th, client calculates the encryption key of symmetric cryptography AES according to the method for setting;
205th, operation is encrypted in ownship information after client is compressed by AES encryption key pair.
3rd, a kind of Android system according to claim 1 realizes the realization of terminal unit remote lock network and unlock Method, it is characterised in that:The step 106 receives server configuration information and decrypts verification, specifically includes following steps:
301st, client receives the configuration information that server issues;
302nd, client obtains rivest, shamir, adelman RSA decruption keys according to the mode specified;
303rd, client is decrypted configuration information using RSA public keys, and isolates configuration information element, comprising but not It is limited to:IMEI, IMSI, timestamp, the term of validity, network lock status;
304th, client carries out validity check to the configuration information element isolated, including but not limited to:Signing messages Effectively whether, whether IMEI matches, whether timestamp is effective, whether the term of validity meets, whether network lock status changes.
After adopting the above technical scheme, the present invention has the beneficial effect that:Can facilitate brand quotient or operator it is in office when It waits and the operations such as lock network type modification, unlock, locking is carried out to the equipment dispatched from the factory.It greatly saves and runs successfully and the time.Institute It, can be automatically from control after terminal equipment access network as long as some operations are configured accordingly in operating console Latest configuration information is obtained in server, and sets and comes into force.
The above is merely illustrative of the technical solution of the present invention and unrestricted, and those of ordinary skill in the art are to this hair The other modifications or equivalent replacement that bright technical solution is made, without departing from the spirit and model of technical solutions of the utility model It encloses, is intended to be within the scope of the claims of the invention.

Claims (3)

1. a kind of Android system realizes terminal unit remote lock network and the implementation method of unlock, it is characterised in that:Including as follows Step:
101st, client is run as finger daemon resident system;
102nd, client monitors power-on event, changes the event changes such as card event, date change events and push message events, so as to It timely obtains newest configuration information and changes device network lock status;
103rd, client first reads the current network lock status preserved in equipment after power-on event is received, if on Lock status then carries out locking operation to equipment, and user cannot be introduced into desktop, the SIM card specified except non-intrusive specified operator;Such as Fruit is unlocked state, then operation is unlocked to equipment, and user can be directly entered desktop and carry out any operation, receive event While carry out the collection operation of facility information, including but not limited to system version number, unit type, IMEI, IMSI, network-like Condition, network lock status etc.;
104th, client optimizes collected information combination operation, and after combination is completed, the AES encryption of handling characteristics is close Key carries out symmetric encryption operation;
105th, encrypted data are uploaded to server to client by post modes by https;
106th, client receives the new configuration information that server issues, and RSA decryption oprerations are first carried out to information, decryption completion Afterwards, then effectiveness of information verifying work is carried out;
107th, after client is to information checking success, configuration information is saved in the nvram of modem, and according to configuration information In network lock status operation is locked or unlocked to equipment, after locking successfully, have and only specified operator it is specified SIM card can be operated into desktop;No matter whether configuration information verifies success, if comes into force, client can all report finally As a result it is given to server.
2. a kind of Android system according to claim 1 realizes terminal unit remote lock network and the implementation method of unlock, It is characterized in that:The step 104, client carry out AES symmetric cryptographies to the information of collection, specifically include following steps:
201st, client has collected institute's information in need, including but not limited to system version number, unit type, IMEI, IMSI, Network status, network lock status etc.;
202nd, client is ranked up ownship information operation according to the rule of setting;
203rd, client carries out squeeze operation according to the compression algorithm of setting to the ownship information after sequence;
204th, client calculates the encryption key of symmetric cryptography AES according to the method for setting;
205th, operation is encrypted in ownship information after client is compressed by AES encryption key pair.
3. a kind of Android system according to claim 1 realizes terminal unit remote lock network and the implementation method of unlock, It is characterized in that:The step 106 receives server configuration information and decrypts verification, specifically includes following steps:
301st, client receives the configuration information that server issues;
302nd, client obtains rivest, shamir, adelman RSA decruption keys according to the mode specified;
303rd, client is decrypted configuration information using RSA public keys, and isolates configuration information element, comprising but it is unlimited In:IMEI, IMSI, timestamp, the term of validity, network lock status;
304th, client carries out validity check to the configuration information element isolated, including but not limited to:Whether signing messages Effectively, whether IMEI matches, whether timestamp is effective, whether the term of validity meets, whether network lock status changes.
CN201810075794.6A 2018-01-26 2018-01-26 A kind of Android system realizes terminal unit remote lock network and the implementation method of unlock Pending CN108199904A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810075794.6A CN108199904A (en) 2018-01-26 2018-01-26 A kind of Android system realizes terminal unit remote lock network and the implementation method of unlock
PCT/CN2019/073208 WO2019144936A1 (en) 2018-01-26 2019-01-25 Method for realizing remote network locking and unlocking of mobile terminal based on android system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810075794.6A CN108199904A (en) 2018-01-26 2018-01-26 A kind of Android system realizes terminal unit remote lock network and the implementation method of unlock

Publications (1)

Publication Number Publication Date
CN108199904A true CN108199904A (en) 2018-06-22

Family

ID=62590839

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810075794.6A Pending CN108199904A (en) 2018-01-26 2018-01-26 A kind of Android system realizes terminal unit remote lock network and the implementation method of unlock

Country Status (2)

Country Link
CN (1) CN108199904A (en)
WO (1) WO2019144936A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109462502A (en) * 2018-10-30 2019-03-12 新华三技术有限公司合肥分公司 Configuration information saves control method, device and the SDN controller of instruction
CN109960922A (en) * 2019-03-11 2019-07-02 北京三快在线科技有限公司 A kind of method and device identifying new activation equipment
WO2019144936A1 (en) * 2018-01-26 2019-08-01 上海广升信息技术股份有限公司 Method for realizing remote network locking and unlocking of mobile terminal based on android system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143483A (en) * 2011-03-15 2011-08-03 中兴通讯股份有限公司 Method and terminal for acquiring unlock code
CN104519479A (en) * 2013-09-27 2015-04-15 中兴通讯股份有限公司 Methods for terminal to lock net and unlock net
CN104640101A (en) * 2015-02-03 2015-05-20 惠州Tcl移动通信有限公司 SIM (subscriber identity module) card terminal management method and system based on remote control
KR20170111605A (en) * 2016-03-29 2017-10-12 투어텔레콤 주식회사 The Unlocking Method of User Terminal with Koran Learning Function

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300204A (en) * 2011-08-26 2011-12-28 中兴通讯股份有限公司 Wireless terminal and lockup method and system thereof
US9813399B2 (en) * 2015-09-17 2017-11-07 T-Mobile Usa, Inc. Secure remote user device unlock for carrier locked user devices
CN108199904A (en) * 2018-01-26 2018-06-22 上海广升信息技术股份有限公司 A kind of Android system realizes terminal unit remote lock network and the implementation method of unlock

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143483A (en) * 2011-03-15 2011-08-03 中兴通讯股份有限公司 Method and terminal for acquiring unlock code
CN104519479A (en) * 2013-09-27 2015-04-15 中兴通讯股份有限公司 Methods for terminal to lock net and unlock net
CN104640101A (en) * 2015-02-03 2015-05-20 惠州Tcl移动通信有限公司 SIM (subscriber identity module) card terminal management method and system based on remote control
KR20170111605A (en) * 2016-03-29 2017-10-12 투어텔레콤 주식회사 The Unlocking Method of User Terminal with Koran Learning Function

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019144936A1 (en) * 2018-01-26 2019-08-01 上海广升信息技术股份有限公司 Method for realizing remote network locking and unlocking of mobile terminal based on android system
CN109462502A (en) * 2018-10-30 2019-03-12 新华三技术有限公司合肥分公司 Configuration information saves control method, device and the SDN controller of instruction
CN109462502B (en) * 2018-10-30 2022-02-11 新华三技术有限公司合肥分公司 Control method and device for configuration information storage instruction and SDN controller
CN109960922A (en) * 2019-03-11 2019-07-02 北京三快在线科技有限公司 A kind of method and device identifying new activation equipment
CN109960922B (en) * 2019-03-11 2021-09-07 北京三快在线科技有限公司 Method and device for identifying newly activated equipment

Also Published As

Publication number Publication date
WO2019144936A1 (en) 2019-08-01

Similar Documents

Publication Publication Date Title
CN100505927C (en) Dynamic password identification method
US9647984B2 (en) System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device
CN100563391C (en) The method of mobile communications terminal data protection, system and equipment
CN1953375B (en) Account management in a system and method for providing code signing services
US20070186115A1 (en) Dynamic Password Authentication System and Method thereof
CN108199904A (en) A kind of Android system realizes terminal unit remote lock network and the implementation method of unlock
CN106023360A (en) Intelligent system management method of Bluetooth intelligent lock
CN100507934C (en) System and method for registering entities for code signing services
CN103493526A (en) Sim locking
CN108667791B (en) Identity authentication method
CN103095457A (en) Login and verification method for application program
CN108270739B (en) Method and device for managing encryption information
CN112332975A (en) Internet of things equipment secure communication method and system
WO2011022916A1 (en) Remote control method and system for smart card
EP1552713A1 (en) Retention of old mobile number on sim card replacement
CN100511258C (en) System and method for providing code signing services
US20060189296A1 (en) Procedure for monitoring the usage of a broadcasted content
CN108694333A (en) User information processing method and processing device
CN105379187A (en) Handling of performance monitoring data
CN113472722A (en) Data transmission method, storage medium, electronic device and automatic ticket selling and checking system
CN102045709B (en) Mobile terminal application data downloading method, system and mobile terminal
CN102932782A (en) Mobile intelligent terminal leak inquiring and pushing method based on two-dimensional code under cloud environment
CN113434824B (en) Software service authorization management method, device, equipment and storage medium
CN112291055A (en) Industrial internet data communication encryption method
CN101133410B (en) Contents rights protecting method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210708

Address after: Floor 3, building 19, building 8, No. 498, GuoShouJing Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 200120

Applicant after: SHANGHAI ABUP INTELLIGENT TECHNOLOGY CO.,LTD.

Address before: 201203 block 22301-1491, building 14, No. 498, GuoShouJing Road, Pudong New Area pilot Free Trade Zone, Shanghai

Applicant before: SHANGHAI ADUPS TECHNOLOGY Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180622