Method for Setting a Key and a Method for Setting an Inital Security Key to a Mobile Terminal
First Claim
1. A method for setting a key, comprising:
- setting a first security key in a mobile terminal;
providing a corresponding relation between the first security key and an identity of the mobile terminal adapted to be saved on a network side;
obtaining the saved corresponding first security key according to the identity of the mobile terminal, and generating and saving a second security key according to the first security key.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the present invention discloses a method for setting a key, which includes: setting a first security key in a mobile terminal; providing a corresponding relation between the first security key and an identity of the mobile terminal adapted to be saved on a network side; and obtaining, by the network side, the saved corresponding first security key according to the identity of the mobile terminal, and generating and saving a second security key according to the first security key. By means of the above method, when an operator leases out a mobile terminal, a security key corresponding to the mobile terminal is not required to be set manually in subscription data of the subscriber of the mobile terminal on the network side. As a result, various mistakes and leakages due to manual operation may be reduced, and the terminal-lease service of the operator may be facilitated. Another embodiment of the invention further discloses a method for setting an initial security key to a mobile terminal.
-
Citations
17 Claims
-
1. A method for setting a key, comprising:
-
setting a first security key in a mobile terminal;
providing a corresponding relation between the first security key and an identity of the mobile terminal adapted to be saved on a network side;
obtaining the saved corresponding first security key according to the identity of the mobile terminal, and generating and saving a second security key according to the first security key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of setting a key, comprising:
-
setting a first security key in a mobile terminal;
saving the first security key on a network side according to the identity of the subscriber card of the mobile terminal; and
obtaining the saved corresponding first security key according to the identity of the subscriber card of the mobile terminal, and generating and saving a second security key according to the first security key. - View Dependent Claims (12)
-
-
13. A method of setting an initial security key to a mobile terminal, comprising:
-
generating a temporary security key, and transmitting the temporary security key to the mobile terminal;
transmitting the temporary security key to a security module after obtaining the temporary security key;
obtaining the identity of the mobile terminal after the temporary security key has been saved successfully by the security module, and returning the identity of the mobile terminal to writing equipment.
-
-
14. A communication system, comprising:
-
a network side being adapted for providing a wireless communication service;
a mobile terminal being adapted for communicating with the network side and saving a first security key therein, the network side being adapted to save the first security key according to the identity of the mobile terminal or a subscriber card of the mobile terminal, obtain the first security key according to the identity, and generate and save a second security key according to the first security key. - View Dependent Claims (15, 16, 17)
-
Specification