The method includes: associating different cell phones to different
enciphering and deciphering keys of an asymmetric encryption algorithm.
Access information of the network lock corresponding to the cell phone is
enciphered by the corresponding enciphering key. Then, the enciphered
network lock is stored in the cell phone, and the corresponding
deciphering key is recorded in an inerasable memory of the cell phone.
The original plaintext access information of the network lock and the
enciphering key is stored only in a service provider of the communication
network. When the cell phone tries to access the communication network,
it deciphers the enciphered network lock using the deciphering key stored
in the inerasable memory to verify the network lock of the cell phone.