Method for managing personal identification information of a subscriber identity module card in a mobile communication terminal
First Claim
1. A method for managing personal identification information of a subscriber identity module (SIM) card in a mobile communication terminal, comprising:
- displaying a security question for user authentication selected from the SIM card by a user;
receiving an input of the user'"'"'s personal information corresponding to the security question;
determining if the input personal information matches personal information stored in the SIM card; and
performing a normal operating mode if the input personal information matches the stored personal information.
1 Assignment
0 Petitions
Accused Products
Abstract
A method by which a user can use a function of a subscriber identity module (SIM) without directly inputting a personal identification number (PIN). The user can directly input the user'"'"'s personal information corresponding to a predetermined security question for user authentication of the mobile communication terminal. The security question can be configured according to the user'"'"'s preference. The user'"'"'s personal information corresponding to the security question is a short answer that the user can easily remember, so that even when the user forgets the PIN or does not have a personal unblocking key (PUK), the PIN is provided immediately after the identity of the user is verified through an input of the user'"'"'s personal information corresponding to the security question rather than a PUK input.
50 Citations
9 Claims
-
1. A method for managing personal identification information of a subscriber identity module (SIM) card in a mobile communication terminal, comprising:
-
displaying a security question for user authentication selected from the SIM card by a user;
receiving an input of the user'"'"'s personal information corresponding to the security question;
determining if the input personal information matches personal information stored in the SIM card; and
performing a normal operating mode if the input personal information matches the stored personal information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification