Abstract:
A method for protecting software of a mobile terminal is provided in the disclosure, wherein an encryption chip is mounted in the mobile terminal. The method includes: when the mobile terminal is turned on, whether or not the encryption chip is invalid is detected; when it is not invalid, the encryption chip authenticates the software of the mobile terminal through interaction with a main chip; when the authentication is not passed, the encryption chip controls a functional module of the mobile terminal through a hardware protection circuit. An apparatus for protecting software of a mobile terminal is also provided in the present disclosure. The solution of the disclosure can prevent the software of the mobile terminal from being cracked and protect the functions of the mobile terminal from illegal usage, thus the security of the mobile terminal is greatly improved and the interests of operators and manufacturers are protected.
Abstract:
Disclosed in the present document is a network locking method for a mobile terminal. An encryption chip is built in the mobile terminal, and customization information is saved in a Subscriber Identity Module (SIM) card, an encryption chip and a mobile terminal main chip respectively. After the mobile terminal is powered on, the encryption chip compares its customization information with those in the mobile terminal main chip and the SIM card respectively, and prevents communication between the mobile terminal main chip and the SIM card if any comparison shows that the information is inconsistent; Meanwhile, a mobile terminal is also disclosed in the present document.
Abstract:
A method for protecting software of a mobile terminal is provided in the disclosure, wherein an encryption chip is mounted in the mobile terminal. The method includes: when the mobile terminal is turned on, whether or not the encryption chip is invalid is detected; when it is not invalid, the encryption chip authenticates the software of the mobile terminal through interaction with a main chip; when the authentication is not passed, the encryption chip controls a functional module of the mobile terminal through a hardware protection circuit. An apparatus for protecting software of a mobile terminal is also provided in the present disclosure. The solution of the disclosure can prevent the software of the mobile terminal from being cracked and protect the functions of the mobile terminal from illegal usage, thus the security of the mobile terminal is greatly improved and the interests of operators and manufacturers are protected.
Abstract:
A system and method for placing cellular toll calls over a secondary network to allow a subscriber to save money or realize some other advantage. Either a small software package can be downloaded to a mobile user's telephone to act as an interface into the service or the internet can be used with a wireless application protocol (WAP) using a WAP browser on the mobile telephone. A manager station operated by a third party (generally not the cellular network owner nor the secondary network owner) can receive request calls for cellular users to place toll calls. In a particular embodiment, the software in the user's mobile telephone can transmit the number desired to be called via a mobile data service like GPRS or WAP over GPRS to the manager station. Any method of transmitting this number is within the scope of the present invention including a direct mobile telephone call to the manager station. The manager station can then place two outgoing calls over the secondary network, the first to the called number, and the second a callback to the originating mobile telephone. The called number can be either a mobile or fixed station. When each of the two outgoing calls is set up, the manager can connect or conference the two calls together. The number of calls is not limited to two. After the calls are connected, the manager can track of billing for the service using methods known in the art.
Abstract:
An air-inflated mattress, comprising a top layer, an outer shroud band, a plurality of anchor separators and a bottom layer, wherein said shroud band connects the top and bottom layers together to form an inflatable bladder; further comprising a middle layer below said top layer sealed to the top layer. The mattress may also comprise a middle shroud band and an inner shroud band, a plurality of joint spots welded on the bottom side of the top layer, alternatively arranged with anchor separators and a plurality of joint spots welded between the shrouds and means to pass air between the bladder and a plurality of half-sealed sub-chambers created by the joint welds, which slows the spreading speed of the air to the bladder and the chambers, so that the air mattress is even and level and the supporting strength of the air mattress is greatly improved.
Abstract:
Improved systems and methods for call and call feature setup, administration and processing on PSTN and other telecommunications networks are provided. Calls are set up on a service plane of a conceptual switch that includes a switch plane, control plane, and service plane that are analogous to the OSI layered model of networks including a physical layer, network layer and application layer. Call set-up logic is separated from the switching fabric, allowing for flexible, on-demand, modification of service options using software while maintaining the same switching fabric in hardware. Call set-up is accomplished by a call request made upon connection of a call to the switch. This causes a call agent to search an eXtensible Markup Language knowledge base to find a web page corresponding to the initiating caller. The Web page may be collocated with the switch or on a LAN with the switch or on the “Web,” even on the caller's termination equipment (telephone).
Abstract:
A parallel inverter system includes a plurality of inverters of an instantaneous voltage control type, an output bus, an active power bus, a phase bus, and controlling devices. The output bus is used for connecting outputs of said plurality of inverters to a load. The active power bus is connected to the plurality of inverters so as to provide an active power sharing reference. The phase bus is connected to the plurality of inverters so as to provide a system phase reference. And, controlling devices control sinusoidal wave references of inverters to have the same phase, the reactive power, and the active power responsive to the active power sharing reference and the system phase reference. The related methods are also discussed.