WO2017217873A1 - System and method for disabling mobile telephones of all communication networks of mobile telephone operating companies - Google Patents
System and method for disabling mobile telephones of all communication networks of mobile telephone operating companies Download PDFInfo
- Publication number
- WO2017217873A1 WO2017217873A1 PCT/PE2016/000008 PE2016000008W WO2017217873A1 WO 2017217873 A1 WO2017217873 A1 WO 2017217873A1 PE 2016000008 W PE2016000008 W PE 2016000008W WO 2017217873 A1 WO2017217873 A1 WO 2017217873A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- nfc
- mobile phone
- nfc tag
- mobile
- disabling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive or capacitive transmission systems
- H04B5/40—Near-field transmission systems, e.g. inductive or capacitive transmission systems characterised by components specially adapted for near-field transmission
- H04B5/48—Transceivers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
Definitions
- the present invention generally relates to a system and method for disabling mobile phones simply and safely.
- An RFID Tag in Spanish "RFID tag" is a small device, which can be attached or incorporated into a product, animal or person. They contain antennas to allow them to receive and respond to requests by radio frequency from an RFID transmitter / receiver.
- NFC Near Field Communication
- smartphones Most of the latest models of mobile phones called “smartphones" or smartphones already come with NFC support, although most people do not benefit from this technology.
- NFC tags can be small stickers that contain a small NFC chip without power.
- the IMEI code International Mobile Station Equipment Identity
- SIM subscriber Identity
- the operating company can use the IMEI to verify the status of the device through its respective database.
- the IMEI allows functions such as the blocking of mobile terminals in the event of theft, for which the IMEI of the mobile phone must simply be notified to the telephone operator to proceed with its blocking and thus communication from that device can be prevented by blocking calls. It is also possible to release a locked mobile phone for use with a new mobile operator from the IMEI code, regardless of the brand or model.
- the IMEI of a device is usually printed on the back of the device, under the battery, in the case of devices that contain an internal battery it can be found on the back on the bottom of the device in small numbers, in some cases it can also reach be in the port where the SIM card (chip) is inserted. You can also dial the following USSD code * # 06 # to appear on the device screen.
- the SIM card (acronym for Subscriber Identity Module in English) is a detachable smart card used in mobile phones and HSPA or LTE modems that connect to the USB port. SIM cards securely store the subscriber's service key used to identify themselves to the network, so that it is possible to change the line from one terminal to another simply by changing the card.
- the use of the SIM card is mandatory in the GSM (Global System for Mobile Communications, English Global System for Mobile Communications) networks.
- the usual technique for blocking a mobile phone is to inform the corresponding operating company of the telephone number of the telephone about the need to block the equipment, for which, the name of the user and their respective identification document are indicated. Then, the operator suspends the line of said number by blocking the SIM card and reports to the regulatory entity the IMEI code number of the blocked equipment; in this way, it is registered that this mobile phone must not be used with another telephone number in any other telephone operator.
- US patent US9323696 describes a data security system that includes providing a unique identification of a first system to a second system; copy the unique identification on the second system by the first system; and unlock a memory in the first system or the second system only when the unique identifications in the first system and the second system are the same.
- US patent US6314283 describes the blocking of a subsidized cell phone that ensures that a cell phone sold to an end user at a price subsidized by a mobile phone operator is activated only in the network of the operator administering the grant. , and not in a competitor's network.
- a secure operator code specific and known by the carrier of the subsidy operator, is programmed into the cell phone by the phone manufacturer.
- the phone is programmed and sent by the manufacturer in a locked state, which prevents the programming of the NAM (number assignment module) of the cell phone without first entering a valid unlock code or a valid code to remove the lock
- the telephone's ESN electronic serial number
- the support computer system which uses the ESN code and the support to execute a lock code algorithm It issues an unlock code and a lock to remove the code.
- the code for the end user that will be entered into the telephone is administered.
- the phone executes the same lock code algorithm, using the operator code programmed at the time of manufacture, and its own ESN, to calculate the unlock code and the delete lock code. If the code entered by the user matches the unlock code, NAM programming is allowed to proceed only once, and if the number entered matches the deletion lock code, the phone deletes the entire lock code.
- a system for disabling mobile phones from the network of any operating company is described by relating the IMEI code and the information stored in an electronic device called an NFC tag. Too the UHF tag, the HF tag and the LF tag can be used; the NFC tag being preferably used.
- the system includes:
- NFC NFC
- Microsoft Windows Android System
- IOS IOS
- NFC An RFID reader, preferably NFC, which allows reading RFID tags, preferably NFC.
- NFC NFC
- These tags support all NFC protocols, such as: NFC standard ISO / IEC 14443-3 type A tag, NFC standard ISO / IEC 14443-3 type B tag, FeliCa JIS X standard NFC tag
- An RFID tag preferably NFC, that has storage capacity large enough to support the IMEI code and an additional encryption encoding of at least 32 characters;
- NFC tags A mobile phone, of any brand, from a manufacturer that considers within the equipment, the ability to read NFC tags, with at least a certain NFC protocol, such as: NFC standard ISO / IEC 14443-3 type A tag, NFC standard ISO / IEC 14443-3 type B tag, standard NFC tag FeliCa JIS X 6319-4, among others.
- the method for enabling / disabling proposed by the invention is that the system connects, via wireless connection, the records of mobile phones from the database of the mobile operating company and the regulatory entity; in such a way that when a mobile phone is disabled by an operator it is also disabled from all the networks of all the operators in the area (region or country) and cannot be misused.
- the operator associates the IMEI of that phone with an NFC tag through computer encryption. Then, the NFC tag is given to the telephone user, which is the key to blocking or disabling the mobile phone, for which there are two ways of doing so.
- the center of the network of the system to disable mobile phones of the network of any mobile operating company can be a customer service center of the operating companies, a shopping center in which the proposed system of the invention is installed or any place where attention is provided to the public is chosen by the operators and / or the regulatory entity.
- the second way to disable a mobile phone is for the user to bring the NFC tag corresponding to that phone to another mobile phone with NFC technology at a distance of 2 millimeters to 5 millimeters and have a special application activated for this purpose; said application is part of the proposed system of the invention.
- FIGURE 1 It is a scheme of a system to disable mobile phones from the network of any operating company in accordance with the embodiment of the present invention.
- FIGURE 2 It is a scheme of one of the ways for the user of a mobile phone to disable said equipment from another mobile phone using an NFC tag.
- FIGURE 3 The process for generating an NFC tag is described.
- FIGURE 4 The process for disabling mobile phones is described, so that they cannot be reused in any of the mobile operator networks, by means of the relationship of the NFC tag and the IMEI code.
- FIGURE 1 and FIGURE 2 the proposed system of the invention for disabling mobile phones of all networks of the operating companies of a certain area (region or country) is described 1.
- the proposed system of the invention connect the company database operator 2 and the database of the regulatory entity 3 in the area through a wireless connection system 4.
- the proposed system 1 of the invention relates the IMEI of each mobile phone 8 to a single electronic device called the NFC tag 9.
- the operating company 2 and the regulatory entity 3 have a display 5 (which can be a computer screen or a touch screen) and a server 7; Additionally, operator 2 also has an RIFD 6 reader to read the NFC 9 tag. The information entered by operator 2 enters the database of the regulatory entity 3.
- FIGURE 3 shows the process of generating a new NFC tag or generating a duplicate of an NFC tag 10.
- the mobile phone user In order for this process 10 to start 11, the mobile phone user must approach a call center of the corresponding operating company 2 to be attended by an operator of the same.
- the operator performs the validation of the IMEI and the user's identity document in the database of the operating company 12 and determines whether the IMEI corresponds to a newly acquired mobile phone 13 or to a mobile phone with time of use 14.
- the operator records the user's identity document, the IMEI code of the mobile telephone and the operator in the system database 1; then the proposed system of the invention proceeds to encrypt the IMEI code relating to the internal code of an NFC tag 16;
- the NFC tag is generated by storing the user information in said NFC tag and being put into active status in system 17 and updating the databases of the operating company and the regulatory entity, then its respective tag is delivered to the user NFC 20 thereby ending this process 10.
- the operator checks in the system database if the user has already registered an NFC tag 18.
- the operator If the user does not have an NFC tag, the operator must record the information of the user in the system database 15, then the system encrypts the IMEI 16 and generates the corresponding NFC tag in active state in the system for the mobile phone in question 17 and updating the databases of the operating company and the entity Finally, the operator delivers the NFC tag to the user 20 at the end of the process 10.
- the user of said equipment can do so by two methods.
- the first method is shown in FIGURE 2, so that the user must bring his NFC tag 9 to another mobile phone 8 that has the application of the system 1 of the invention activated.
- This approach only disables the mobile phone related to said NFC tag 9, therefore, it is important that no other NFC tag approaches mobile phone 8 while the application is activated.
- This is recorded in the system database 1 by changing the status of the NFC tag from active to locked, and is updated in the database of the operating company 2 and the regulatory entity 3 via wireless connection 4.
- the second method for the user to disable a certain mobile phone is to approach a service center of the proposed system of the invention, wherein an operator will proceed to disable the mobile phone 21 as shown in FIGURE 4.
- the process for disabling a mobile phone 21, the operator starts the process 21 in two different ways, as the case may be.
- the first case is when the user presents his identification document and his NFC tag 23, then the operator approaches the NFC tag 9 to the RFID reader 6 to validate in the system database the identity document and the NFC tag of the mobile phone in question 25. Then, the system of the invention 1 automatically verifies the amount of SIM cards that the mobile phone can use 28.
- the second case is when the user only presents his identification document 24, then the operator enters the platform of the system 1 to query and validate said identification document 26, then the operator enters the telephone number indicated by the user and the system automatically locates the NFC tag of the mobile phone 27 and recognizes the amount of SIM cards that said mobile phone can use 28 .
- the system automatically changes the status of the NFC tag from active to locked 31, then the system disables the IMEI of that mobile phone from all networks of the operating companies in zone 32 being updated the databases of the operating companies and the regulatory entity via wireless connection 4, then the operator suspends the telephone number line of the mobile phone 33 until the user decides to lift the suspension, which concludes 34 the process 21.
- the system of the invention automatically selects the phone number corresponding to the operator company of the operator 29 (system 1 does not allow the operator to select phone numbers of other operators), then the system 1 automatically deletes all phone numbers not related to the NFC tag 30, then the system automatically changes the status of the NFC tag from active to locked 31, then the system of the invention disables the IMEI of said mobile telephone of all the networks of the operating companies of the zone 32 updating the databases of the operating companies and of the regulatory entity by means of wireless connection 4, then, the operator suspends the line of the telephone number of the mobile telephone 33 until the user decides to lift the suspension, which ends the process 21.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
Description
SISTEMA CONFIGURADO Y MÉTODO PARA DESHABILITAR TELÉFONOS MÓVILES DE TODAS LAS REDES DE COMUNICACIÓN DE EMPRESAS OPERADORAS DE TELEFONÍA MÓVIL CONFIGURED SYSTEM AND METHOD FOR DISABLING MOBILE PHONES OF ALL COMMUNICATION NETWORKS OF MOBILE TELEPHONE OPERATING COMPANIES
I. CAMPO DE LA INVENCIÓN I. FIELD OF THE INVENTION
La presente invención se refiere en general a un sistema y método para deshabilitar de manera simple y segura teléfonos móviles. The present invention generally relates to a system and method for disabling mobile phones simply and safely.
II. ESTADO DE LA TÉCNICA (ANTECEDENTES DE LA INVENCIÓN) II. STATE OF THE TECHNIQUE (BACKGROUND OF THE INVENTION)
Un Tag RFID, en español "etiqueta RFID", es un dispositivo pequeño, que puede ser adherido o incorporado a un producto, animal o persona. Contienen antenas para permitirles recibir y responder a peticiones por radiofrecuencia desde un emisor/receptor RFID. An RFID Tag, in Spanish "RFID tag", is a small device, which can be attached or incorporated into a product, animal or person. They contain antennas to allow them to receive and respond to requests by radio frequency from an RFID transmitter / receiver.
La tecnología NFC (Near Field Communication) se está comenzando a utilizar con mayor frecuencia a través de las etiquetas NFC (tags NFC). La mayoría de los últimos modelos de los teléfonos móviles llamados "smartphones" o teléfonos inteligentes ya vienen con soporte NFC, aunque la mayoría de las personas no se benefician de esta tecnología. Hasta ahora su uso se ha limitado al pago móvil y la publicidad. Las etiquetas NFC pueden ser pequeñas pegatinas que contienen un pequeño chip NFC sin alimentación. Dependiendo de cómo se programa la etiqueta, puede cambiar varios ajustes o aplicaciones de lanzamiento y realizar ciertas acciones con sólo acercar el teléfono. Para ello, la etiqueta NFC necesita una pequeña cantidad de energía que toma de los teléfonos inteligentes y envía y almacena la información. NFC (Near Field Communication) technology is being used more frequently through NFC tags (NFC tags). Most of the latest models of mobile phones called "smartphones" or smartphones already come with NFC support, although most people do not benefit from this technology. Until now its use has been limited to mobile payment and advertising. NFC tags can be small stickers that contain a small NFC chip without power. Depending on how the label is programmed, you can change various settings or launch applications and perform certain actions just by approaching the phone. For this, the NFC tag needs a small amount of energy that it takes from smartphones and sends and stores the information.
En una determinada zona (región o país) es posible que exista una o más empresas operadoras móviles que ofrecen diferentes teléfonos móviles y cuentan con una red con diversos números telefónicos, y algunos de estos equipos pueden utilizar más de un SIM card (tarjeta SIM). Estas empresas son supervisadas por la correspondiente entidad reguladora de la zona, la cual tiene la información de todos los usuarios que utilizan las redes móviles y los códigos IMEI de todos los teléfonos móviles que son activados por dichas empresas. In a certain area (region or country) it is possible that there is one or more mobile operating companies that offer different mobile phones and They have a network with various telephone numbers, and some of these devices can use more than one SIM card. These companies are supervised by the corresponding regulatory entity in the area, which has the information of all users who use mobile networks and IMEI codes of all mobile phones that are activated by these companies.
El código IMEI (del inglés International Mobile Station Equipment Identity, identidad internacional de equipo móvil) es un código USSD pregrabado en los teléfonos móviles GSM. Este código identifica al aparato de forma exclusiva a nivel mundial, y es transmitido por el aparato a la red al conectarse a ésta. Esto quiere decir, entre otras cosas, que la operadora registra quién y desde dónde se realiza la llamada (SIM), y también desde qué terminal telefónico se hizo. La empresa operadora puede usar el IMEI para verificar el estado del aparato a través de su respectiva base de datos. The IMEI code (International Mobile Station Equipment Identity) is a USSD code pre-recorded on GSM mobile phones. This code identifies the device exclusively worldwide, and is transmitted by the device to the network when connected to it. This means, among other things, that the operator records who and from where the call is made (SIM), and also from what telephone terminal was made. The operating company can use the IMEI to verify the status of the device through its respective database.
El IMEI permite funciones como el bloqueo de terminales móviles en caso de robo, para lo cual simplemente se tiene que notificar el IMEI del móvil a la operadora de telefonía para que proceda su bloqueo y así pueda impedirse la comunicación desde ese dispositivo mediante el bloqueo de llamadas. También es posible liberar un teléfono móvil bloqueado para su uso con una nueva operadora móvil a partir del código IMEI, independientemente de la marca o modelo. El IMEI de un aparato habitualmente está impreso en la parte posterior del equipo, bajo la batería, en el caso de dispositivos que contienen batería interna este puede encontrarse al reverso en la parte inferior del equipo en números pequeños, en algunos casos también puede llegar a encontrarse en el puerto donde se introduce la tarjeta SIM (chip). Asimismo, se puede marcar el código USSD siguiente *#06# para que aparezca en la pantalla del dispositivo. The IMEI allows functions such as the blocking of mobile terminals in the event of theft, for which the IMEI of the mobile phone must simply be notified to the telephone operator to proceed with its blocking and thus communication from that device can be prevented by blocking calls. It is also possible to release a locked mobile phone for use with a new mobile operator from the IMEI code, regardless of the brand or model. The IMEI of a device is usually printed on the back of the device, under the battery, in the case of devices that contain an internal battery it can be found on the back on the bottom of the device in small numbers, in some cases it can also reach be in the port where the SIM card (chip) is inserted. You can also dial the following USSD code * # 06 # to appear on the device screen.
La tarjeta SIM (acrónimo en inglés de Subscriber Identity Module, en español módulo de identificación de abonado) es una tarjeta inteligente desmontable usada en teléfonos móviles y módems HSPA o LTE que se conectan al puerto USB. Las tarjetas SIM almacenan de forma segura la clave de servicio del suscriptor usada para identificarse ante la red, de forma que sea posible cambiar la línea de un terminal a otro simplemente cambiando la tarjeta. El uso de la tarjeta SIM es obligatorio en las redes GSM (Sistema global para las comunicaciones móviles, del inglés Global System for Mobile Communications). The SIM card (acronym for Subscriber Identity Module in English) is a detachable smart card used in mobile phones and HSPA or LTE modems that connect to the USB port. SIM cards securely store the subscriber's service key used to identify themselves to the network, so that it is possible to change the line from one terminal to another simply by changing the card. The use of the SIM card is mandatory in the GSM (Global System for Mobile Communications, English Global System for Mobile Communications) networks.
Actualmente, la técnica habitual para el bloqueo de un teléfono móvil es informar a la empresa operadora correspondiente el número telefónico del teléfono sobre la necesidad de bloquear el equipo, para lo cual, se indica el nombre del usuario y su respectivo documento de identificación. Entonces, la operadora suspende la línea de dicho número bloqueando la tarjeta SIM y reporta a la entidad reguladora el número del código del IMEI del equipo bloqueado; de esta manera, queda registrado que ese teléfono móvil no debe ser utilizado con otro número telefónico en ninguna otra empresa operadora de teléfonos. Currently, the usual technique for blocking a mobile phone is to inform the corresponding operating company of the telephone number of the telephone about the need to block the equipment, for which, the name of the user and their respective identification document are indicated. Then, the operator suspends the line of said number by blocking the SIM card and reports to the regulatory entity the IMEI code number of the blocked equipment; in this way, it is registered that this mobile phone must not be used with another telephone number in any other telephone operator.
El inconveniente de la técnica anteriormente explicada es que existe la posibilidad de que el código IMEI sea clonado, copiado y desbloqueado de la base de datos de la empresa operadora y de la base de datos de la entidad reguladora por personas no autorizadas. Esto se debe a que algunos de los procesos de encriptación utilizados actualmente no son tan fuertes como para evitarlo. La encriptación o cifrado de archivos, es un procedimiento que vuelve completamente ilegibles los datos de un documento o de cualquier archivo. De esta manera, el archivo se vuelve prácticamente inservible para un usuario no autorizado a leerlo, ya que incluso si lo ha interceptado o lo ha copiado, no podrá leerlo o visualizarlo. The drawback of the technique explained above is that there is a possibility that the IMEI code will be cloned, copied and unlocked from the database of the operating company and from the database of the regulatory entity by unauthorized persons. This is because some of the encryption processes currently used are not strong enough to avoid it. Encryption or encryption of files is a procedure that makes the data of a document or any file completely illegible. In this way, the file becomes virtually unusable for a user who is not authorized to read it, since even if he has intercepted or copied it, he cannot read or view it.
La patente de Estados Unidos US9323696 describe un sistema de seguridad de los datos que incluye proporcionar una identificación única de un primer sistema a un segundo sistema; copiar la identificación única en el segundo sistema por el primer sistema; y desbloquear una memoria en el primer sistema o el segundo sistema únicamente cuando las identificaciones únicas en el primer sistema y el segundo sistema sean los mismos. US patent US9323696 describes a data security system that includes providing a unique identification of a first system to a second system; copy the unique identification on the second system by the first system; and unlock a memory in the first system or the second system only when the unique identifications in the first system and the second system are the same.
La patente de Estados Unidos US6314283 describe el bloqueo de un teléfono celular subsidiado que asegura que un teléfono celular que se vende a un usuario final a un precio subsidiado por una operadora de telefonía móvil, se activa sólo en la red del operador que administra la subvención, y no en la red de un competidor. Un código de operador seguro, específico y conocido por el portador de la operadora de la subvención, se programa en el teléfono celular por el fabricante del teléfono. El teléfono está programado y enviado por el fabricante en un estado de bloqueo, que impide la programación de la NAM (módulo de asignación de número) del teléfono celular sin necesidad de introducir primero un código de desbloqueo que sea válido o un código válido para quitar el bloqueo. En el momento de la activación del teléfono y la programación de la NAM, ESN del teléfono (número de serie electrónico) se introduce en el sistema informático de soporte, el cual utiliza el código ESN y el soporte para ejecutar un algoritmo de código de bloqueo que emite un código de desbloqueo y una cerradura para quitar el código. A elección del vehículo se administra ya sea el código para el usuario final que se introducirá en el teléfono. El teléfono a continuación, ejecuta el mismo algoritmo de código de bloqueo, utilizando el código de operador programado en el momento de la fabricación, y su propia ESN, para calcular el código de desbloqueo y el código de bloqueo de eliminación. Si el código introducido por el usuario coincide con el código de desbloqueo, se permite la programación NAM para proceder sólo una vez, y si el número introducido coincide con el código de bloqueo de eliminación, el teléfono elimina el código de bloqueo completo. US patent US6314283 describes the blocking of a subsidized cell phone that ensures that a cell phone sold to an end user at a price subsidized by a mobile phone operator is activated only in the network of the operator administering the grant. , and not in a competitor's network. A secure operator code, specific and known by the carrier of the subsidy operator, is programmed into the cell phone by the phone manufacturer. The phone is programmed and sent by the manufacturer in a locked state, which prevents the programming of the NAM (number assignment module) of the cell phone without first entering a valid unlock code or a valid code to remove the lock At the time of activation of the telephone and programming of the NAM, the telephone's ESN (electronic serial number) is entered into the support computer system, which uses the ESN code and the support to execute a lock code algorithm It issues an unlock code and a lock to remove the code. At the vehicle's choice, either the code for the end user that will be entered into the telephone is administered. The phone then executes the same lock code algorithm, using the operator code programmed at the time of manufacture, and its own ESN, to calculate the unlock code and the delete lock code. If the code entered by the user matches the unlock code, NAM programming is allowed to proceed only once, and if the number entered matches the deletion lock code, the phone deletes the entire lock code.
III. DESCRIPCIÓN DE LA INVENCIÓN Se describe un sistema para deshabilitar teléfonos móviles de la red de cualquier empresa operadora relacionando el código IMEI y la información almacenada en un dispositivo electrónico llamado etiqueta NFC. También pueden utilizarse la etiqueta UHF, la etiqueta HF y la etiqueta LF; siendo utilizada de manera preferente la etiqueta NFC. III. DESCRIPTION OF THE INVENTION A system for disabling mobile phones from the network of any operating company is described by relating the IMEI code and the information stored in an electronic device called an NFC tag. Too the UHF tag, the HF tag and the LF tag can be used; the NFC tag being preferably used.
El sistema comprende: The system includes:
- Una base de datos de la empresa operadora; - A database of the operating company;
- Una base de datos de la entidad reguladora; - A database of the regulatory entity;
- Un sistema de interconexión inalámbrica; - A wireless interconnection system;
- Al menos un visualizador de la empresa operadora; - At least one display of the operating company;
- Al menos un visualizador de la entidad reguladora; - At least one display of the regulatory entity;
- Un servidor de la empresa operadora; - A server of the operating company;
- Un servidor de la entidad reguladora; - A server of the regulatory entity;
- Un software que permite la captura de datos de la etiqueta RFID, preferiblemente NFC, el cual está desarrollado en tres sistemas operativos, éstos son: Microsoft Windows, Sistema Android, y IOS (Apple). Este software tiene conectividad remota vía entorno web y red celular; - A software that allows the capture of RFID tag data, preferably NFC, which is developed in three operating systems, these are: Microsoft Windows, Android System, and IOS (Apple). This software has remote connectivity via web environment and cellular network;
- Un lector RFID, preferiblemente NFC, que permite leer etiquetas RFID, preferiblemente NFC. Estas etiquetas soportan todos los protocolos NFC, como, por ejemplo: tag NFC estándar ISO/IEC 14443-3 tipo A, tag NFC estándar ISO/IEC 14443-3 tipo B, tag NFC estándar FeliCa JIS X - An RFID reader, preferably NFC, which allows reading RFID tags, preferably NFC. These tags support all NFC protocols, such as: NFC standard ISO / IEC 14443-3 type A tag, NFC standard ISO / IEC 14443-3 type B tag, FeliCa JIS X standard NFC tag
6319-4, entre otros; 6319-4, among others;
- Una etiqueta RFID, preferiblemente NFC, que tiene capacidad de almacenamiento suficientemente grande para soportar el código IMEI y una codificación de encriptación adicional de por lo menos 32 caracteres; - An RFID tag, preferably NFC, that has storage capacity large enough to support the IMEI code and an additional encryption encoding of at least 32 characters;
- Un teléfono móvil, de cualquier marca, de un fabricante que considere dentro del equipo, la capacidad para leer etiquetas NFC, con por lo menos un determinado protocolo NFC como, por ejemplo: tag NFC estándar ISO/IEC 14443-3 tipo A, tag NFC estándar ISO/IEC 14443-3 tipo B, tag NFC estándar FeliCa JIS X 6319-4, entre otros. - A mobile phone, of any brand, from a manufacturer that considers within the equipment, the ability to read NFC tags, with at least a certain NFC protocol, such as: NFC standard ISO / IEC 14443-3 type A tag, NFC standard ISO / IEC 14443-3 type B tag, standard NFC tag FeliCa JIS X 6319-4, among others.
El método para habilitación/deshabilitación que propone la invención consiste en que el sistema conecta, a través de conexión inalámbrica, los registros de teléfonos móviles de la base de datos de la empresa operadora móvil y de la entidad reguladora; de tal manera que cuando un teléfono móvil sea deshabilitado por una operadora también sea deshabilitado de todas las redes de todas las operadoras de la zona (región o país) y no pueda ser utilizado indebidamente. The method for enabling / disabling proposed by the invention is that the system connects, via wireless connection, the records of mobile phones from the database of the mobile operating company and the regulatory entity; in such a way that when a mobile phone is disabled by an operator it is also disabled from all the networks of all the operators in the area (region or country) and cannot be misused.
Para deshabilitar un teléfono móvil la operadora relaciona el IMEI de dicho teléfono con una etiqueta NFC a través de la encriptación informática. Luego, se entrega al usuario del teléfono dicha etiqueta NFC, la cual es la llave para bloquear o deshabilitar el teléfono móvil, para lo cual existen dos maneras de hacerlo. To disable a mobile phone, the operator associates the IMEI of that phone with an NFC tag through computer encryption. Then, the NFC tag is given to the telephone user, which is the key to blocking or disabling the mobile phone, for which there are two ways of doing so.
Para la primera manera de deshabilitar un teléfono móvil es necesario que el usuario se acerque a un centro de atención de la red provisto con un sistema propuesto de la invención llevando una etiqueta NFC, la cual es leída con un lector RFID (siglas en inglés de Identificación por radiofrecuencia) para ser validada en la base de datos del sistema de la invención y deshabilitándose así dicho teléfono. Si no se cuenta con la etiqueta NFC se puede buscar el código de la etiqueta NFC en el sistema de la invención relacionado con el IMEI del teléfono móvil y se deshabilita el mismo en la base de datos del sistema. For the first way to disable a mobile phone, it is necessary for the user to approach a network service center provided with a proposed system of the invention by carrying an NFC tag, which is read with an RFID reader. Radio frequency identification) to be validated in the database of the system of the invention and thus disabling said telephone. If the NFC tag is not available, the NFC tag code can be searched for in the system of the invention related to the IMEI of the mobile phone and it is disabled in the system database.
El centro de atención de la red del sistema para deshabilitar teléfonos móviles de la red de cualquier empresa operadora móvil puede ser un centro de atención al público de las empresas operadoras, un centro comercial en el que se instale el sistema propuesto de la invención o cualquier lugar en el que se brinde atención al público sea elegido por las operadoras y/o la entidad reguladora. The center of the network of the system to disable mobile phones of the network of any mobile operating company can be a customer service center of the operating companies, a shopping center in which the proposed system of the invention is installed or any place where attention is provided to the public is chosen by the operators and / or the regulatory entity.
La segunda forma de deshabilitar un teléfono móvil es que el usuario acerque a una distancia de 2 milímetros a 5 milímetros la etiqueta NFC correspondiente a dicho teléfono a otro teléfono móvil con tecnología NFC y que tenga activada una aplicación especial para este fin; dicha aplicación forma parte del sistema propuesto de la invención. IV. BREVE DESCRIPCIÓN DE LAS FIGURAS The second way to disable a mobile phone is for the user to bring the NFC tag corresponding to that phone to another mobile phone with NFC technology at a distance of 2 millimeters to 5 millimeters and have a special application activated for this purpose; said application is part of the proposed system of the invention. IV. BRIEF DESCRIPTION OF THE FIGURES
Los dibujos adjuntos ilustran sólo realizaciones ejemplares de la invención y no deben considerarse limitantes de su alcance; la invención puede admitir otras realizaciones igualmente eficaces. The accompanying drawings illustrate only exemplary embodiments of the invention and should not be construed as limiting its scope; The invention may admit other equally effective embodiments.
FIGURA 1. Es un esquema de un sistema para deshabilitar teléfonos móviles de la red de cualquier empresa operadora de acuerdo con la realización de la presente invención. FIGURE 1. It is a scheme of a system to disable mobile phones from the network of any operating company in accordance with the embodiment of the present invention.
FIGURA 2. Es un esquema de una de las formas para que el usuario de un teléfono móvil deshabilite dicho equipo desde otro teléfono móvil utilizando una etiqueta NFC. FIGURE 2. It is a scheme of one of the ways for the user of a mobile phone to disable said equipment from another mobile phone using an NFC tag.
FIGURA 3. Se describe el proceso para la generación de una etiqueta NFC. FIGURE 3. The process for generating an NFC tag is described.
FIGURA 4. Se describe el proceso para deshabilitar teléfonos móviles, de tal manera que éstos no puedan volver a ser utilizados en ninguna de las redes operadoras móviles, mediante la relación de la etiqueta NFC y del código IMEI. FIGURE 4. The process for disabling mobile phones is described, so that they cannot be reused in any of the mobile operator networks, by means of the relationship of the NFC tag and the IMEI code.
V. REALIZACIÓN PREFERENTE DE LA INVENCIÓN (DESCRIPCIÓN DETALLADA DE LA INVENCIÓN) De acuerdo a las figuras mostradas, y de acuerdo con la numeración adoptada, se puede observar en ellas un ejemplo de realización preferente de la invención, la cual comprende los elementos que se describen en detalle a continuación. Tal como se muestra en la FIGURA 1 y FIGURA 2, se describe el sistema propuesto de la invención para deshabilitar los teléfonos móviles de todas las redes de las empresas operadoras de una determinada zona (región o país) 1. El sistema propuesto de la invención conecta la base de datos de la empresa operadora 2 y la base de datos de la entidad reguladora 3 de la zona mediante un sistema de conexión inalámbrica 4. V. PREFERRED EMBODIMENT OF THE INVENTION (DETAILED DESCRIPTION OF THE INVENTION) According to the figures shown, and according to the numbering adopted, an example of a preferred embodiment of the invention can be observed therein, which comprises the elements that are described in detail below. As shown in FIGURE 1 and FIGURE 2, the proposed system of the invention for disabling mobile phones of all networks of the operating companies of a certain area (region or country) is described 1. The proposed system of the invention connect the company database operator 2 and the database of the regulatory entity 3 in the area through a wireless connection system 4.
El sistema 1 propuesto de la invención relaciona el IMEI de cada teléfono móvil 8 con un único dispositivo electrónico llamado etiqueta NFC 9. The proposed system 1 of the invention relates the IMEI of each mobile phone 8 to a single electronic device called the NFC tag 9.
Para realizar el ingreso de información y deshabilitar los teléfonos móviles, la empresa operadora 2 y la entidad reguladora 3, cuentan con un visualizador 5 (el cual puede ser una pantalla de computadora o una pantalla táctil) y un servidor 7; adicionalmente, la operadora 2 cuenta también con un lector RIFD 6 para leer la etiqueta NFC 9. La información ingresada por la operadora 2 ingresa a la base de datos de la entidad reguladora 3. To make the entry of information and disable mobile phones, the operating company 2 and the regulatory entity 3, have a display 5 (which can be a computer screen or a touch screen) and a server 7; Additionally, operator 2 also has an RIFD 6 reader to read the NFC 9 tag. The information entered by operator 2 enters the database of the regulatory entity 3.
La FIGURA 3 muestra el proceso de generación de una etiqueta NFC nueva o generar un duplicado de una etiqueta NFC 10. Para que este proceso 10 se inicie 11 , el usuario del teléfono móvil debe acercarse a un centro de atención de la empresa operadora 2 correspondiente para ser atendido por un operario de la misma. El operario realiza la validación del IMEI y del documento de identidad del usuario en la base de datos de la empresa operadora 12 y determina si el IMEI corresponde a un teléfono móvil recién adquirido 13 o a un teléfono móvil con tiempo de uso 14. FIGURE 3 shows the process of generating a new NFC tag or generating a duplicate of an NFC tag 10. In order for this process 10 to start 11, the mobile phone user must approach a call center of the corresponding operating company 2 to be attended by an operator of the same. The operator performs the validation of the IMEI and the user's identity document in the database of the operating company 12 and determines whether the IMEI corresponds to a newly acquired mobile phone 13 or to a mobile phone with time of use 14.
Si el teléfono es nuevo 13, el operario registra el documento de identidad del usuario, el código IMEI del teléfono móvil y el operador en la base de datos del sistema 1; luego el sistema propuesto de la invención procede a encriptar el código IMEI relacionando con el código interno de una etiqueta NFC 16; en seguida, se genera la etiqueta NFC almacenando la información del usuario en dicha etiqueta NFC y poniéndose en estado activo en el sistema 17 y actualizándose las bases de datos de la empresa operadora y de la entidad reguladora, luego se entrega al usuario su respectiva etiqueta NFC 20 con lo cual finaliza este proceso 10. Si el teléfono móvil ya tiene un tiempo de uso 14, el operario verifica en la base de datos del sistema si el usuario ya tiene registrada una etiqueta NFC 18. Si el usuario no cuenta con una etiqueta NFC, el operario debe registrar la información del usuario en la base de datos del sistema 15, luego el sistema encripta el IMEI 16 y genera la correspondiente etiqueta NFC en estado activo en el sistema para el teléfono móvil en cuestión 17 y actualizándose las bases de datos de la empresa operadora y de la entidad reguladora, finalmente el operario entrega la etiqueta NFC al usuario 20 finalizando el proceso 10. Pero si el usuario ya tiene registrada una etiqueta NFC, se procede a realizar un duplicado de dicha etiqueta, para lo cual el operario realiza la validación del IMEI del teléfono móvil en cuestión y del documento de identidad del usuario en la base de datos del sistema 19; en este caso se pueden presentar dos situaciones, la primera es que la validación sea correcta y entonces el sistema encripta el IMEI 16 y genera la correspondiente etiqueta NFC en estado activo en el sistema para dicho teléfono móvil 17 y actualizándose las bases de datos de la empresa operadora y de la entidad reguladora, y, finalmente el operario entrega la etiqueta NFC a! usuario 20; la segunda situación es que la validación sea incorrecta en cuyo caso se finaliza 20 el proceso de generación de una etiqueta NFC 10. If the telephone is new 13, the operator records the user's identity document, the IMEI code of the mobile telephone and the operator in the system database 1; then the proposed system of the invention proceeds to encrypt the IMEI code relating to the internal code of an NFC tag 16; Next, the NFC tag is generated by storing the user information in said NFC tag and being put into active status in system 17 and updating the databases of the operating company and the regulatory entity, then its respective tag is delivered to the user NFC 20 thereby ending this process 10. If the mobile phone already has a time of use 14, the operator checks in the system database if the user has already registered an NFC tag 18. If the user does not have an NFC tag, the operator must record the information of the user in the system database 15, then the system encrypts the IMEI 16 and generates the corresponding NFC tag in active state in the system for the mobile phone in question 17 and updating the databases of the operating company and the entity Finally, the operator delivers the NFC tag to the user 20 at the end of the process 10. But if the user has already registered an NFC tag, a duplicate of that tag is made, for which the operator performs the IMEI validation of the phone mobile in question and the user's identity document in the system database 19; In this case two situations can occur, the first is that the validation is correct and then the system encrypts the IMEI 16 and generates the corresponding NFC tag in active state in the system for said mobile phone 17 and updating the databases of the operating company and the regulatory entity, and finally the operator delivers the NFC tag to! user 20; The second situation is that the validation is incorrect in which case the process of generating an NFC tag 10 is completed.
Para deshabilitar un teléfono móvil 21 , el usuario de dicho equipo puede hacerlo por dos métodos. El primer método se muestra en la FIGURA 2, de modo que el usuario debe acercar su etiqueta NFC 9 a otro teléfono móvil 8 que tenga activada la aplicación del sistema 1 de la invención. Este acercamiento deshabilita únicamente el teléfono móvil relacionado con dicha etiqueta NFC 9, por lo cual, es importante que ninguna otra etiqueta NFC se aproxime al teléfono móvil 8 mientras que la aplicación está activada. Esto se registra en la base de datos del sistema 1 cambiando el estado de la etiqueta NFC de activo a bloqueado, y se actualiza en la base de datos de la empresa operadora 2 y de la entidad reguladora 3 a través de conexión inalámbrica 4. To disable a mobile phone 21, the user of said equipment can do so by two methods. The first method is shown in FIGURE 2, so that the user must bring his NFC tag 9 to another mobile phone 8 that has the application of the system 1 of the invention activated. This approach only disables the mobile phone related to said NFC tag 9, therefore, it is important that no other NFC tag approaches mobile phone 8 while the application is activated. This is recorded in the system database 1 by changing the status of the NFC tag from active to locked, and is updated in the database of the operating company 2 and the regulatory entity 3 via wireless connection 4.
El segundo método para que el usuario pueda deshabilitar un determinado teléfono móvil es acercándose a un centro de atención del sistema propuesto de la invención, en donde un operario procederá a deshabilitar el teléfono móvil 21 tal como se muestra en la FIGURA 4. The second method for the user to disable a certain mobile phone is to approach a service center of the proposed system of the invention, wherein an operator will proceed to disable the mobile phone 21 as shown in FIGURE 4.
De acuerdo con la FIGURA 4, el proceso para deshabilitar un teléfono móvil 21 , el operario inicia 22 el proceso 21 de dos formas diferentes, según sea el caso. El primer caso es cuando el usuario presenta su documento de identificación y su etiqueta NFC 23, entonces el operario acerca la etiqueta NFC 9 al lector RFID 6 para validar en la base de datos del sistema el documento de identidad y la etiqueta NFC del teléfono móvil en cuestión 25. Luego, el sistema de la invención 1 verifica automáticamente la cantidad de tarjetas SIM que el teléfono móvil puede utilizar 28. El segundo caso es cuando el usuario sólo presenta su documento de identificación 24, entonces el operario ingresa a la plataforma del sistema 1 para consultar y validar dicho documento de identificación 26, luego, el operario ingresa el número telefónico indicado por el usuario y el sistema ubica automáticamente la etiqueta NFC del teléfono móvil 27 y reconoce la cantidad de tarjetas SIM que dicho teléfono móvil puede utilizar 28. According to FIGURE 4, the process for disabling a mobile phone 21, the operator starts the process 21 in two different ways, as the case may be. The first case is when the user presents his identification document and his NFC tag 23, then the operator approaches the NFC tag 9 to the RFID reader 6 to validate in the system database the identity document and the NFC tag of the mobile phone in question 25. Then, the system of the invention 1 automatically verifies the amount of SIM cards that the mobile phone can use 28. The second case is when the user only presents his identification document 24, then the operator enters the platform of the system 1 to query and validate said identification document 26, then the operator enters the telephone number indicated by the user and the system automatically locates the NFC tag of the mobile phone 27 and recognizes the amount of SIM cards that said mobile phone can use 28 .
Si el teléfono móvil soló puede utilizar una tarjeta SIM, el sistema cambia automáticamente el estado de la etiqueta NFC de activo a bloqueado 31, entonces el sistema deshabilita el IMEI de dicho teléfono móvil de todas las redes de las empresas operadoras de la zona 32 actualizándose las bases de datos de las empresas operadoras y de la entidad reguladora mediante conexión inalámbrica 4, después, el operario suspende la línea del número telefónico del teléfono móvil 33 hasta que el usuario decida levantar la suspensión, con lo cual finaliza 34 el proceso 21. If the mobile phone can only use a SIM card, the system automatically changes the status of the NFC tag from active to locked 31, then the system disables the IMEI of that mobile phone from all networks of the operating companies in zone 32 being updated the databases of the operating companies and the regulatory entity via wireless connection 4, then the operator suspends the telephone number line of the mobile phone 33 until the user decides to lift the suspension, which concludes 34 the process 21.
Pero, si el teléfono puede utilizar dos o más tarjeta SIM, el sistema de la invención selecciona automáticamente el número telefónico correspondiente a la empresa operadora del operario 29 (el sistema 1 no permite que el operario seleccione números telefónicos de otras operadoras), luego el sistema 1 borra automáticamente todos los números telefónicos no relacionados con la etiqueta NFC 30, luego el sistema cambia automáticamente el estado de la etiqueta NFC de activo a bloqueado 31, entonces el sistema de la invención deshabilita el IMEI de dicho teléfono móvil de todas las redes de las empresas operadoras de la zona 32 actualizándose las bases de datos de las empresas operadoras y de la entidad reguladora mediante conexión inalámbrica 4, después, el operario suspende la línea del número telefónico del teléfono móvil 33 hasta que el usuario decida levantar la suspensión, con lo cual finaliza 34 el proceso 21. But, if the phone can use two or more SIM cards, the system of the invention automatically selects the phone number corresponding to the operator company of the operator 29 (system 1 does not allow the operator to select phone numbers of other operators), then the system 1 automatically deletes all phone numbers not related to the NFC tag 30, then the system automatically changes the status of the NFC tag from active to locked 31, then the system of the invention disables the IMEI of said mobile telephone of all the networks of the operating companies of the zone 32 updating the databases of the operating companies and of the regulatory entity by means of wireless connection 4, then, the operator suspends the line of the telephone number of the mobile telephone 33 until the user decides to lift the suspension, which ends the process 21.
Otras modificaciones y realizaciones alternativas de esta invención serán evidentes para los expertos en la técnica vista de esta descripción. Se reconocerá, por lo tanto, que la presente invención no está limitada sólo para ser utilizados en teléfonos móviles. En consecuencia, esta descripción ha de interpretarse sólo como ilustrativa y es para el propósito de enseñar a los expertos en la técnica, la manera de llevar a cabo la invención. Other modifications and alternative embodiments of this invention will be apparent to those skilled in the art seen from this description. It will be recognized, therefore, that the present invention is not limited only to be used in mobile phones. Consequently, this description is to be interpreted as illustrative only and it is for the purpose of teaching those skilled in the art, how to carry out the invention.
Cabe señalar, que la invención aquí mostrada y descrita debe ser tomada como la realización actualmente preferida. Se pueden hacer varios cambios en las implementaciones y arquitecturas. Por ejemplo, elementos equivalentes pueden ser sustituidos por los que se ilustran y describen en el presente documento, y ciertas características de la invención se pueden utilizar independientemente de la utilización de otras características, todo ello como sería evidente para un experto en la técnica después de tener el beneficio de esta descripción de la invención. It should be noted that the invention shown and described here should be taken as the presently preferred embodiment. Several changes can be made to implementations and architectures. For example, equivalent elements may be substituted for those illustrated and described herein, and certain features of the invention may be used independently of the use of other features, all as would be apparent to one skilled in the art after have the benefit of this description of the invention.
Claims
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/PE2016/000008 WO2017217873A1 (en) | 2016-06-16 | 2016-06-16 | System and method for disabling mobile telephones of all communication networks of mobile telephone operating companies |
| PCT/PE2017/000004 WO2017217874A1 (en) | 2016-06-16 | 2017-03-03 | System and method for enabling/disabling mobile telephones in communication networks of mobile telephone operating companies |
| ARP170101671A AR108804A1 (en) | 2016-06-16 | 2017-06-16 | CONFIGURED SYSTEM AND METHOD FOR ENABLING / DISABLING MOBILE PHONES IN COMMUNICATION NETWORKS OF MOBILE TELEPHONE OPERATING COMPANIES |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/PE2016/000008 WO2017217873A1 (en) | 2016-06-16 | 2016-06-16 | System and method for disabling mobile telephones of all communication networks of mobile telephone operating companies |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017217873A1 true WO2017217873A1 (en) | 2017-12-21 |
Family
ID=60664112
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/PE2016/000008 Ceased WO2017217873A1 (en) | 2016-06-16 | 2016-06-16 | System and method for disabling mobile telephones of all communication networks of mobile telephone operating companies |
| PCT/PE2017/000004 Ceased WO2017217874A1 (en) | 2016-06-16 | 2017-03-03 | System and method for enabling/disabling mobile telephones in communication networks of mobile telephone operating companies |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/PE2017/000004 Ceased WO2017217874A1 (en) | 2016-06-16 | 2017-03-03 | System and method for enabling/disabling mobile telephones in communication networks of mobile telephone operating companies |
Country Status (2)
| Country | Link |
|---|---|
| AR (1) | AR108804A1 (en) |
| WO (2) | WO2017217873A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109558755A (en) * | 2018-12-03 | 2019-04-02 | Oppo(重庆)智能科技有限公司 | Method for writing data, electronic equipment and computer readable storage medium |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080219444A1 (en) * | 2007-03-07 | 2008-09-11 | Inside Contactless | Method for the secure loading in a NFC chipset of data allowing access to a service |
| US20090115614A1 (en) * | 2007-10-30 | 2009-05-07 | Oberthur Technologies | Authentication of an electronic tag during access to a service, associated methods and system |
| US20090247131A1 (en) * | 2005-10-31 | 2009-10-01 | Champion Laurenn L | Systems and Methods for Restricting The Use of Stolen Devices on a Wireless Network |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1359736A1 (en) * | 2002-05-01 | 2003-11-05 | Markport Limited | Protection for pre-paid mobile terminals |
| EP2131317A1 (en) * | 2008-06-04 | 2009-12-09 | Alcatel Lucent | Method for providing a service based on tag information and corresponding tag and tag reading device |
| US8346210B2 (en) * | 2009-02-27 | 2013-01-01 | Nokia Corporation | Method and apparatus for managing services using bearer tags |
| US20140073300A1 (en) * | 2012-09-10 | 2014-03-13 | Genband Us Llc | Managing Telecommunication Services using Proximity-based Technologies |
| FI20145263A7 (en) * | 2014-03-20 | 2015-09-21 | Sanoma Media Finland Oy | Subscription authentication |
-
2016
- 2016-06-16 WO PCT/PE2016/000008 patent/WO2017217873A1/en not_active Ceased
-
2017
- 2017-03-03 WO PCT/PE2017/000004 patent/WO2017217874A1/en not_active Ceased
- 2017-06-16 AR ARP170101671A patent/AR108804A1/en unknown
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090247131A1 (en) * | 2005-10-31 | 2009-10-01 | Champion Laurenn L | Systems and Methods for Restricting The Use of Stolen Devices on a Wireless Network |
| US20080219444A1 (en) * | 2007-03-07 | 2008-09-11 | Inside Contactless | Method for the secure loading in a NFC chipset of data allowing access to a service |
| US20090115614A1 (en) * | 2007-10-30 | 2009-05-07 | Oberthur Technologies | Authentication of an electronic tag during access to a service, associated methods and system |
Non-Patent Citations (1)
| Title |
|---|
| SOREN, VLADIMIR, INGENIEROS DE LA UNMSM PRESENTAN EL SISTEMA SPANNER IMEI PARA BLOQUEAR CELULARES MROBADOS, 15 June 2016 (2016-06-15), XP055449413, Retrieved from the Internet <URL:http://logophilo.blogspot.com.es/2016/06/ingenieros-de-la-unmsm-presentan-el.html> [retrieved on 20170307] * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109558755A (en) * | 2018-12-03 | 2019-04-02 | Oppo(重庆)智能科技有限公司 | Method for writing data, electronic equipment and computer readable storage medium |
| CN109558755B (en) * | 2018-12-03 | 2022-03-29 | Oppo(重庆)智能科技有限公司 | Data writing method, electronic device, and computer-readable storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| AR108804A1 (en) | 2018-09-26 |
| WO2017217874A1 (en) | 2017-12-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10965690B2 (en) | Method for managing the status of a connected device | |
| ES2316939T3 (en) | PROCESS FOR UNLOCKING A WIRELESS TELECOMMUNICATIONS TERMINAL OF PORTABLE TELEPHONE TYPE. | |
| EP2671398B1 (en) | Subscriber identity module provisioning | |
| ES2267128T3 (en) | MANAGEMENT OF AUTHENTICATION KEYS IN MOBILE COMMUNICATION SYSTEM. | |
| ES2965224T3 (en) | System and method for the presentation of multiple NFC credentials during a single NFC transaction | |
| EP3122080B1 (en) | Method for distributing virtual user identification data, method for acquiring virtual user identification data, and device | |
| US20180041601A1 (en) | Method and apparatus for receving profile by terminal in mobile communication system | |
| ES2319383T3 (en) | PROCESS OF FIGHT AGAINST THE THEFT OF MOBILE DEVICES, DEVICE AND INSTALLATION CORRESPONDING. | |
| ES2528916T3 (en) | Procedure to ensure the execution of an NFC application installed in a secure element that is part of a mobile terminal | |
| US20110059773A1 (en) | Personalising a sim by means of a unique personalized master sim | |
| US10462667B2 (en) | Method of providing mobile communication provider information and device for performing the same | |
| JP5741172B2 (en) | Information processing apparatus, communication system, and information processing method | |
| CN102892102B (en) | A kind of method, system and equipment realizing binding machine and card in a mobile network | |
| ES2558008T3 (en) | Determination of device configuration and programming data | |
| CN107623907B (en) | eSIM card network locking method, terminal and network locking authentication server | |
| CN102792724A (en) | Protection of a communication channel between a security module and an nfc circuit | |
| CN1684411B (en) | A method for verifying the legitimacy of mobile terminal users | |
| WO2012129851A1 (en) | Mobile terminal and network locking method therefor | |
| ES2786261T3 (en) | Method for an improved installation of a service application related to a secure item on a secure item found in a communication device, system and telecommunications network for an improved installation of a service application related to a secure item on an item secure found on a communication device, program that includes computer-readable program code, and computer program product | |
| ES2702061T3 (en) | Operation of a subscriber identification module | |
| ES2219881T3 (en) | WIRE-FREE COMMUNICATION SYSTEM COMPATIBLE WITH A PUBLIC MOBILE COMMUNICATION SYSTEM. | |
| KR20080099117A (en) | Methods for Authentication of Mobility Elements in Embedded Systems | |
| WO2017217873A1 (en) | System and method for disabling mobile telephones of all communication networks of mobile telephone operating companies | |
| JP2009027505A (en) | Control device, communication device, control system, control method, and control program | |
| CN112744181A (en) | Method for configuring vehicle control authority based on NFC (near field communication) equipment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16905614 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16905614 Country of ref document: EP Kind code of ref document: A1 |