CN100431384C - Method for preventing PHS terminal from being parallel operated unauthorizedly - Google Patents

Method for preventing PHS terminal from being parallel operated unauthorizedly Download PDF

Info

Publication number
CN100431384C
CN100431384C CNB2005100642362A CN200510064236A CN100431384C CN 100431384 C CN100431384 C CN 100431384C CN B2005100642362 A CNB2005100642362 A CN B2005100642362A CN 200510064236 A CN200510064236 A CN 200510064236A CN 100431384 C CN100431384 C CN 100431384C
Authority
CN
China
Prior art keywords
phs terminal
password
random number
user
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CNB2005100642362A
Other languages
Chinese (zh)
Other versions
CN1848996A (en
Inventor
潘卫
石涛
毛聪杰
王作强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CNB2005100642362A priority Critical patent/CN100431384C/en
Publication of CN1848996A publication Critical patent/CN1848996A/en
Application granted granted Critical
Publication of CN100431384C publication Critical patent/CN100431384C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention discloses a method for preventing a PHS terminal from being illegally connected in parallel. In the method, a password which can not be changed is arranged in a PHS terminal, and the password, an authentication code, etc. are saved in a system; the terminal is corresponding to the password, the authentication code, etc. The readin of key parameters of a PHS cellphone adopts the mode of terminal keyboard keystrokes; a carrier does not need to purchase a coding device and coding software for a PHS cellphone and does not need to undertake the coding work for the cellphone, either. A cellphone password needs to be arranged in the PHS cellphone; the readin of key parameters needs to verify the cellphone password first; after the cellphone password is successfully verified, a user can further input the parameters according to the prompts on a terminal screen; when authentication is needed, a random number and the password of the PHS terminal are jointly calculated by the system and the terminal to obtain a new random number; then, the new random number is used for authentication. The present invention can fundamentally prevent a PHS terminal from being illegally connected in parallel.

Description

A kind of phs terminal that prevents is by the method for illegal parallel operation
Technical field
The present invention relates to the safe practice of personnel hand system (PHS) terminal in the communication network, be specifically related to a kind of phs terminal that prevents by the method for illegal parallel operation.
Background technology
With respect to the portable terminal in global system for mobile communications (GSM) and code division multiple access (CDMA) system, phs terminal has plurality of advantages such as radiation is low, rate are low, thereby has obtained more and more faster development now.Along with developing rapidly of phs terminal, also more and more at the phenomenon of the illegal parallel operation of phs terminal, brought tremendous loss for PHS user and operation commercial city for this reason.
The illegal parallel operation of phs terminal just is written to a key parameter that phs terminal had in another phs terminal.Phs terminal is not realized the separation between machine and card technology that for example GSM and CDMA terminal adopt in the prior art, and the key parameter of phs terminal is all write in the phs terminal by writing yard device and writing yard software by common carrier.Can be easily obtain and write yard device and write yard software by outside the telecom operators other people, for example partly illegal phs terminal maintenace point also has this and writes yard device and write a yard software, like this when validated user is delivered to the phs terminal of oneself maintenace point and is gone to keep in repair, the personnel of maintenace point can be by writing yard device and writing yard software and read key parameter in the phs terminal, and the key parameter that reads out can be written in another phs terminal by writing yard device and writing yard software, thereby be prone to parallel operation.
Summary of the invention
In view of this, main purpose of the present invention provides a kind of phs terminal that prevents by the method for illegal parallel operation, because the illegal parallel operation of PHS incurs loss, and ensure that phs terminal user's normal life and work are not interfered because of the illegal parallel operation of PHS with the economic interests that prevent user and telecom operators.
In order to realize above-mentioned purpose of the present invention, the invention provides a kind of phs terminal that prevents by the method for illegal parallel operation, comprise at least:
A., a password that can not be modified is set in phs terminal, in system, preserves the password and the authentication code of this portable terminal correspondence;
B. when phs terminal writes key parameter, phs terminal is imported key parameter by the screen prompt user by keyboard, and preserves this key parameter after by the key parameter of keyboard input receiving the user;
C. when needs carried out authentication, phs terminal carried out combined calculation to the random number of the system of being received from the password of oneself preserving and obtains a new random number, and uses this new random number and authentication code to carry out authentication calculations, and result of calculation is sent to system;
D. system uses the password of the random number of own generation and this terminal correspondence to carry out identical combined calculation and obtains a new random number, and uses the authentication code of this new random number and this terminal correspondence to carry out identical authentication calculations to obtain a result of calculation;
E. systematic comparison is received from the result of calculation of phs terminal and whether the result of calculation that oneself obtains mates, if determine that this phs terminal is legal, otherwise determine that this phs terminal is illegal.
Key parameter can comprise user identification code, control channel information, country code and operator code, and described prompting user is to point out the user to import described key parameter by keyboard respectively by keyboard input key parameter.
Preferably, password is one 8 a hexadecimal number, random number is one 16 a hexadecimal number, random number and password are carried out combined calculation to be obtained a new random number and is: carry out logical operation with 8 in whole password and the random number, the result of calculation that obtains is replaced the part that participates in computing in the random number, obtain a new random number.The logical operation here is AND operation or inclusive-OR operation or nonequivalence operation; Participate in to calculate in the random number 8 is 8 of the centres of random number; The front two of password is manufacturer's sign, and back six is a random number that produces at random.
Preferably, phs terminal further comprises by keyboard input key parameter by the screen prompt user before among the step b: phs terminal prompting user inputs password, and judge whether the user inputs password correct, if carry out the step by keyboard input key parameter by the screen prompt user; Otherwise process ends.Before phs terminal prompting user inputs password, may further include password input time counter and be set to initial value, judging that the user further comprises after inputing the password mistake: judge whether password input number of times Counter Value reaches predetermined value, if, process ends; Add 1 otherwise password is imported the number of times Counter Value, the prompting user re-enters password, and then judges whether the user inputs password correct, if carry out the step by keyboard input key parameter by the screen prompt user; Judge whether password input number of times Counter Value reaches the step of predetermined value otherwise re-execute.
Preferably, phs terminal further comprises before generating new random number in step c:
Phs terminal sends an authentication request message to system;
System generates a random number after the authentication request message that receives from phs terminal, then this random number is sent to phs terminal by authentication request response message.
Preferably, system stops the use of this phs terminal after definite phs terminal is illegal.
From technique scheme of the present invention as can be seen, the present invention at first is provided with a password that can not be modified in phs terminal, the password of this terminal correspondence of preservation and authentication code etc. in system.The mode that writes the input of employing terminal keyboard button of PHS mobile phone key parameter, operator need not to purchase writing yard device and writing a yard software of PHS mobile phone again, also need not to bear the sign indicating number work of writing of mobile phone; The PHS mobile phone need increase a cell phone password, and writing of key parameter need be verified cell phone password earlier, and being proved to be successful the back user can further carry out the parameter input operation according to the prompting of terminal screen; When phs terminal writes key parameter, adopted the mode of terminal keyboard button input, phs terminal is imported key parameter by the screen prompt user, and preserve this key parameter after by the key parameter of keyboard input receiving the user, the key parameter here mainly comprises user identification code, control channel information, country code and operator code etc.When needs carried out authentication, system and terminal were carried out combined calculation to the password of random number and phs terminal and are obtained new random number, use this new random number to carry out authentication then.The present invention can prevent fundamentally that phs terminal is by illegal parallel operation.
Owing to import key parameter by the screen prompt user in the present invention, and after receiving the key parameter of user, preserve by the keyboard input.Like this, the operation that writes key parameter to phs terminal no longer needs to write yard device and writes a yard software, thereby overcome in the prior art by writing yard device and writing yard drawback that the software input parameter causes the key parameter in the phs terminal to be stolen easily, made the present invention can stop phs terminal from the source by the phenomenon of illegal parallel operation.
Further, phs terminal can require the user to input password earlier the prompting user before inputing key parameter, and is judging that password just points out the user to import key parameter after correct and preserve the key parameter that the user imports.Like this, even the disabled user has obtained the key parameter of phs terminal by back door, but because the uniqueness and the crypticity of password, the disabled user is difficult to obtain the password of this phs terminal, thereby make the disabled user can not in the another one phs terminal, import the key parameter of this phs terminal, thereby prevented that further phs terminal is by illegal parallel operation.
Further again, the present invention has done improvement to existing system to the authentication process of phs terminal, in the process of authentication process, not directly to use random number to carry out authentication calculations, but use the password of random number and this phs terminal to carry out combined calculation one time earlier, obtain a new random number, use this new random number to carry out authentication calculations then.When carrying out authentication process, used like this corresponding to unique encrypted message in the whole network of this phs terminal, therefore even the disabled user has obtained the key parameter of this phs terminal and has obtained the password of this phs terminal, also can be because of the unalterable feature and the uniqueness of the password of phs terminal, the phs terminal that makes another one import the key parameter of this phs terminal can not pass through authentication, thereby can not normally use, prevent that so fundamentally phs terminal is by illegal parallel operation.
As mentioned above; can fully stop phs terminal by the phenomenon of illegal parallel operation by above-mentioned processing the present invention; thereby protected the economic interests of validated user to greatest extent, ensured that simultaneously validated user can be interfered by illegal parallel operation because of the phs terminal of oneself or harass.For telecom operators, can prevent the number of users minimizing that causes and operation revenue decline that therefore causes, thereby ensure the economic interests of common carrier because of illegal parallel operation phenomenon.
In addition, write key parameter among the present invention and operate, and do not need telecom operators to operate, alleviated the workload of operator by user oneself.The more important thing is that in this way, before being sold to the user, phs terminal can be " bare machine " that does not comprise key parameter such as user identification code for example, and key parameter can be to write again after the user buys.For same phs terminal, the user can select the key parameter of different for example user identification code like this, thereby has realized never having on phs terminal " separation between machine and card " technology that realizes flexiblely.Like this, provide great flexibility, and be convenient to very much the user and change planes and the number of changing for the sale of terminal.By the present invention, can solve the institute that phs terminal can not realize that " separation between machine and card " bring and possess a drawback, wide space is provided for the development and the practical application of PHS technology.
Have, the present invention is very little to the change of phs terminal again, and is also very little for the change of PHS system, so the present invention can't increase the use cost of user and common carrier, makes that the present invention is easy to realize and promote.
Description of drawings
Fig. 1 is an overview flow chart of the present invention.
Fig. 2 is the flow chart of preservation key parameter of the present invention.
Fig. 3 is the basic flow sheet of phs terminal side authentication operations of the present invention.
Embodiment
The present invention is described in detail below in conjunction with the drawings and specific embodiments.
Core concept of the present invention is to preserve the password that can not change in phs terminal, and by keyboard entry method input key parameter, and when authentication operations, use this encrypted message,, fundamentally stop phs terminal by the phenomenon of illegal parallel operation by above-mentioned three processing.
Fig. 1 shows overall procedure of the present invention.As shown in Figure 1,, a password that can not be modified is set in phs terminal at first, the password and the authentication code of this terminal correspondence is set in system in step 101.The password here can be determined by operator, and write in the phs terminal in advance.The password here is unique for terminal, and just different phs terminals has different passwords.
In step 102, when phs terminal write key parameter, phs terminal was imported key parameter by the screen prompt user by keyboard at needs, and preserved this key parameter after by the key parameter of keyboard input receiving the user.The key parameter here comprises user identification code, control channel information, country code and operator code at least.
In step 103, when needs carry out authentication, for example after the phs terminal start, phs terminal carries out combined calculation to the random number of the system of being received from the password of oneself preserving and obtains a new random number, and use the authentication code of this new random number and oneself preservation to carry out authentication calculations, result of calculation is sent to system.
In step 104, system uses the password of the random number of own generation and this terminal correspondence to carry out identical combined calculation and obtains a new random number, and uses the authentication code of this new random number and this terminal correspondence to carry out identical authentication calculations to obtain a result of calculation.
In step 105, systematic comparison is received from the result of calculation of phs terminal and whether the result of calculation that oneself obtains mates, if determine that in step 106 this phs terminal is legal, otherwise determine that in step 107 this phs terminal is illegal.
After definite this phs terminal was illegal, this phs terminal will can not normally use from the service of network side because of can not get, thereby the phs terminal of illegal parallel operation can not normally be used, and therefore stops the disabled user carries out illegal parallel operation to phs terminal motivation.
Below by the operation of Fig. 2 description of step 102, just write the flow process of key parameter.
In step 201, when needs write key parameter, the menu that the user provides by the phs terminal program was selected the operation of input key parameter.
Just user buy the phs terminal that not comprise key parameter after, in order to make this phs terminal can normally network use, need earlier write key parameter when needing to write key parameter here.In the present invention, because key parameter is not just to write in the phs terminal before phs terminal is sold, what just the user had bought only is one " bare machine ", has therefore realized " separation between machine and card " technology that never realizes in phs terminal flexiblely.Here, the user need be known the key parameter of this phs terminal together when buying phs terminal, and it is varied that it knows that mode can have, and for example writes on critical parameter information on a piece of paper by common carrier and is sealed in the envelope.Certainly, common carrier also can be informed the user with the key parameter of phs terminal by alternate manner, and the present invention does not carry out any restriction to this.
In step 202, the phs terminal program is after receiving the operational order that writes key parameter that the user sends, with the password input number of times counter O reset that sets in advance.
In step 203, phs terminal program prompts user inputs password.
In step 204, the phs terminal program judges whether the password of user's input is correct, if, execution in step 205 and subsequent step thereof; Otherwise whether the value of judging password input time counter in step 209 equals 2, if be not equal to 2, the value of password being imported time counter in step 210 adds 1, re-executes step 203 then; If equal 2, because finishing this, the password input error operates step 211 prompting user.
In step 205, phs terminal program prompts user imports the User Recognition code parameters, and behind the User Recognition code parameters that receives user's input, preserves this User Recognition code parameters.
In step 206, phs terminal program prompts user imports the control channel parameter, and after the control channel parameter that receives user's input, preserves this control channel parameter.
In step 207, phs terminal program prompts user imports national code parameter, and after the country code parameter that receives user's input, preserves this country code parameter.
In step 208, phs terminal program prompts user imports the operator code parameter, and after the operator code parameter that receives user's input, preserves this operator code parameter.
So far, the phs terminal program has been preserved all key parameters.These key parameters are the keyboard inputs by terminal, have therefore stopped because write yard device and write yard phs terminal that software input key parameter causes easily by the phenomenon of illegal parallel operation.
Pass through the authentication operations of Fig. 3 description of step 103 to 107 below again.
In step 301, when needs carried out authentication, for example after the phs terminal start, phs terminal sent an authentication request message to system.
In step 302, system generates a random number after the authentication request message that receives from phs terminal.The random number here is one 16 a hexadecimal number.
In step 303, system sends to phs terminal with this random number by authentication request response message.
In step 304, the phs terminal program uses the password of random number and oneself preservation to carry out combined calculation, obtains a new random number.
The combined calculation here can be to carry out AND operation with any 8 in 8 password and 16 s' the random number, then will result calculated substitutes original 8 of participating in computing in 16 the random number, thereby forms a new random number.
Certainly can understand, AND operation also can be replaced by inclusive-OR operation or nonequivalence operation.8 that participate in computing in 16 the random number are preferably middle continuous 8.
In step 305, the phs terminal program uses the new random number and the authentication code of preservation to carry out authentication calculations, obtains a result of calculation, then result of calculation is sent to system.
In step 306, system uses random number and password that should phs terminal is carried out identical combined calculation after the result of calculation that receives from phs terminal, obtains a new random number equally.
In step 307, system uses the authentication code to should phs terminal of new random number and preservation to carry out identical authentication calculations, obtains a result of calculation.
In step 308, whether two result of calculations of systematic comparison mate, because the combined calculation that system uses in step 306 and the step 307 is identical with the calculating in the phs terminal with authentication calculations, therefore whether be exactly whether comparison two result of calculations identical to two result of calculations of systematic comparison here if mating.If it is identical that system judges two result of calculations, then judge that in step 309 this phs terminal is legal; Otherwise judge that in step 310 this phs terminal is illegal.
As previously mentioned, after definite this phs terminal was illegal, system can stop to receive the signal from this phs terminal, and stopped to send signal to this phs terminal.
System among the present invention refers to the communication system side, just the network equipment in the communication system, for example base station, attaching position register (HLR) or the like.
By above-mentioned handling process, can fundamentally stop phs terminal by the phenomenon of illegal parallel operation.It will be understood by those skilled in the art that the foregoing description only is the displaying to spirit of the present invention, rather than restriction.

Claims (10)

1. one kind prevents that phs terminal from by the method for illegal parallel operation, comprising at least:
A., a password that can not be modified is set in phs terminal, in system, preserves the password and the authentication code of this portable terminal correspondence;
B. when phs terminal writes key parameter, phs terminal is imported key parameter by the screen prompt user by keyboard, and preserves this key parameter after by the key parameter of keyboard input receiving the user;
C. when needs carried out authentication, phs terminal carried out combined calculation to the random number of the system of being received from the password of oneself preserving and obtains a new random number, and uses this new random number and authentication code to carry out authentication calculations, and result of calculation is sent to system;
D. system uses the password of the random number of own generation and this terminal correspondence to carry out identical combined calculation and obtains a new random number, and uses the authentication code of this new random number and this terminal correspondence to carry out identical authentication calculations to obtain a result of calculation;
E. systematic comparison is received from the result of calculation of phs terminal and whether the result of calculation that oneself obtains mates, if determine that this phs terminal is legal, otherwise determine that this phs terminal is illegal.
2. method according to claim 1, it is characterized in that, described key parameter comprises user identification code, control channel information, country code and operator code, and described prompting user is to point out the user to import described key parameter by keyboard respectively by keyboard input key parameter.
3. method according to claim 1, it is characterized in that, described password is one 8 a hexadecimal number, described random number is one 16 a hexadecimal number, describedly random number and password are carried out combined calculation obtain a new random number and be: carry out logical operation 8 in whole password and the random number, the result of calculation that obtains is replaced the part that participates in computing in the random number, obtain a new random number.
4. method according to claim 3 is characterized in that, described logical operation is AND operation or inclusive-OR operation or nonequivalence operation.
5. method according to claim 3 is characterized in that, participate in to calculate in the random number 8 is 8 of the centres of random number.
6. method according to claim 3 is characterized in that, the front two of described password is manufacturer's sign, and back six is a random number that produces at random.
7. method according to claim 1, it is characterized in that, phs terminal further comprises before importing key parameter by the screen prompt user by keyboard in step b: phs terminal prompting user inputs password, and judge whether the user inputs password correct, if carry out the step by keyboard input key parameter by the screen prompt user; Otherwise process ends.
8. method according to claim 7, it is characterized in that, before inputing password, phs terminal prompting user comprises further that password input time counter is set to initial value, judging that the user further comprises after inputing the password mistake: judge whether password input number of times Counter Value reaches predetermined value, if, process ends; Add 1 otherwise password is imported the number of times Counter Value, the prompting user re-enters password, and then judges whether the user inputs password correct, if carry out the step by keyboard input key parameter by the screen prompt user; Judge whether password input number of times Counter Value reaches the step of predetermined value otherwise re-execute.
9. method according to claim 1 is characterized in that, phs terminal further comprises before generating new random number in step c:
Phs terminal sends an authentication request message to system;
System generates a random number after the authentication request message that receives from phs terminal, then this random number is sent to phs terminal by authentication request response message.
10. method according to claim 1 is characterized in that, system stops the use of this phs terminal after definite phs terminal is illegal.
CNB2005100642362A 2005-04-12 2005-04-12 Method for preventing PHS terminal from being parallel operated unauthorizedly Active CN100431384C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100642362A CN100431384C (en) 2005-04-12 2005-04-12 Method for preventing PHS terminal from being parallel operated unauthorizedly

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100642362A CN100431384C (en) 2005-04-12 2005-04-12 Method for preventing PHS terminal from being parallel operated unauthorizedly

Publications (2)

Publication Number Publication Date
CN1848996A CN1848996A (en) 2006-10-18
CN100431384C true CN100431384C (en) 2008-11-05

Family

ID=37078315

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100642362A Active CN100431384C (en) 2005-04-12 2005-04-12 Method for preventing PHS terminal from being parallel operated unauthorizedly

Country Status (1)

Country Link
CN (1) CN100431384C (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101888627B (en) * 2009-05-12 2013-08-21 中兴通讯股份有限公司 Mobile terminal and system data protection method thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6067621A (en) * 1996-10-05 2000-05-23 Samsung Electronics Co., Ltd. User authentication system for authenticating an authorized user of an IC card
US20010044295A1 (en) * 1997-10-20 2001-11-22 Makoto Saito Communication control apparatus and radio communications system
CN1414709A (en) * 2001-10-24 2003-04-30 深圳市中兴通讯股份有限公司上海第二研究所 Method of implementing two kind hand set compatible right discrimination mode in personal hand set system
CN1463165A (en) * 2003-06-16 2003-12-24 深圳市天彩礼仪策划有限公司 Method of storing information for user of PHS handset
CN1549631A (en) * 2003-05-15 2004-11-24 ����������ͨѶ�ɷ����޹�˾�Ͼ��ֹ� Encrypting and de-encrypting method for personal hand-held communication system cell phone identification information
CN1558697A (en) * 2004-02-10 2004-12-29 Ut˹�￵ͨѶ���޹�˾ PHS system authentication method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6067621A (en) * 1996-10-05 2000-05-23 Samsung Electronics Co., Ltd. User authentication system for authenticating an authorized user of an IC card
US20010044295A1 (en) * 1997-10-20 2001-11-22 Makoto Saito Communication control apparatus and radio communications system
CN1414709A (en) * 2001-10-24 2003-04-30 深圳市中兴通讯股份有限公司上海第二研究所 Method of implementing two kind hand set compatible right discrimination mode in personal hand set system
CN1549631A (en) * 2003-05-15 2004-11-24 ����������ͨѶ�ɷ����޹�˾�Ͼ��ֹ� Encrypting and de-encrypting method for personal hand-held communication system cell phone identification information
CN1463165A (en) * 2003-06-16 2003-12-24 深圳市天彩礼仪策划有限公司 Method of storing information for user of PHS handset
CN1558697A (en) * 2004-02-10 2004-12-29 Ut˹�￵ͨѶ���޹�˾ PHS system authentication method

Also Published As

Publication number Publication date
CN1848996A (en) 2006-10-18

Similar Documents

Publication Publication Date Title
US6259908B1 (en) Method of limiting access to the data stored in a cellular telephone
CN101432980B (en) Time sync-type otp generation device and method for mobile phones
US20210051475A1 (en) Protection of a communication channel between a security module and an nfc circuit
CN110351346A (en) A kind of eSIM changes chucking method and relevant device
CN102713953A (en) Device, system, and method forlocation-based payment authorization
CN103778374A (en) Trusted terminal, double-channel card, anti-cloning chip, chip fingerprint and channel attack resistance method
CN104301110A (en) Authentication method, authentication device and system applied to intelligent terminal
CN104751334A (en) Service processing method, device and system
KR101509043B1 (en) Implementing method, system of universal card system and smart card
CN103747013A (en) Cloud terminal login verification method and device
CN110458612B (en) Information processing method and related products
CN101957958A (en) Method and mobile phone terminal for realizing network payment
CN104599123A (en) Management method for account information, account management server and a POS terminal and system
CN104883293A (en) Message interaction method, relevant apparatus and communication system
CN108647501A (en) Multiple utility program shares password unlocking method, device, equipment and storage medium
CN105427106A (en) Electronic cash data authorization processing method, electronic cash data payment processing method and virtual card
CN107666470A (en) A kind of processing method and processing device of checking information
CN104951933A (en) Security payment method and mobile terminal
CN113569263A (en) Secure processing method and device for cross-private-domain data and electronic equipment
CN100413368C (en) A method for verifying user card validity
CN101399659A (en) Cipher key authentication method and device between user identification module and terminal
CN105120451A (en) Method for realizing card-less operation of mobile terminal, operator business platform and mobile terminal
CN101408970A (en) Method, system and apparatus for implementing batch electronic transaction, and electronic signing tool
CN100431384C (en) Method for preventing PHS terminal from being parallel operated unauthorizedly
CN102685121A (en) Digital signature method and digital signature device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant