Method of protecting AT commands
First Claim
1. A method of protecting AT commands during the interaction between an AT command module of a mobile terminal and a serial communication unit of an external device, comprising the steps of:
- (1) receiving said AT command from said serial communication unit to said AT command module;
(2) putting said AT command module into an ID verification mode, wherein said AT command module receives a username and password from said serial communication unit in turn, and verifies said received username and password;
(3) putting said AT command module into an AT command processing state, when said ID verification is successful.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of protecting AT commands during the interaction between the AT command module of a mobile terminal and the serial communication unit of an external device, comprising the steps of: receiving AT command from the serial communication unit to the AT command module at an initial state; putting the AT command module into an ID verification mode, wherein the AT command module receives a username and password from the serial communication unit in turn, and verifies said received username and password; and putting the AT command module into an AT command processing state, when the ID verification is successful. Therefore, it'"'"'s impossible for an illegal user to take the control of the mobile terminal through AT command.
-
Citations
20 Claims
-
1. A method of protecting AT commands during the interaction between an AT command module of a mobile terminal and a serial communication unit of an external device, comprising the steps of:
-
(1) receiving said AT command from said serial communication unit to said AT command module; (2) putting said AT command module into an ID verification mode, wherein said AT command module receives a username and password from said serial communication unit in turn, and verifies said received username and password; (3) putting said AT command module into an AT command processing state, when said ID verification is successful. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of protecting a mobile terminal from unauthorized AT commands, comprising a step of:
-
providing an ID verification function to said mobile terminal, which comprises a step of verifying an ID who is trying to control said mobile terminal from an external device via an AT command, whereby when said ID is verified successful, said AT command is implemented to said mobile terminal, and when said ID is verified unsuccessful, said AT command is not implemented to said mobile terminal. - View Dependent Claims (17, 18, 19, 20)
-
Specification