locosto/calypso lite/arima (ODM phones)
patch unlock is free
no unlock via server
db2000 cid17/cid41/cid42/cid54 (lg3g)
db2000 cid24 (old sharp 3g)
full unlock is free
patch unlock is free
no unlock via server
db2000 cid16
full unlock is free
patch unlock is free
full unlock via server - 4 credits
db2000/db2010 cid29
full unlock is free
patch unlock is free
full unlock via server - 4 credits
db2000/db2010 cid36
full unlock is free
patch unlock is free
full unlock via server - 4 credits
db2000/db2010/db2020 cid49
full unlock is free
patch unlock is free
full unlock via server - 4 credits
db2010 cid50
patch unlock - 1 credit
full unlock - 4 credits
db2010/db2020/pnx5230 cid51
patch unlock - 1 credit
full unlock 6+4=10 credits (when signature server works)
db2020 cid52
patch unlock is free
full unlock 6+4=10 credits (when signature server works)
db2010/pnx5230 cid52
patch unlock is not available for public
full unlock 6+4=10 credits (when signature server works)
db3150 (a2 platform) cid52
no patch unlock
full unlock 6+4=10 credits (when signature server works)
db2000 cid53
no patch unlock
full unlock 6+4=10 credits (when signature server works)
upcoming pnx5230 cid53
patch unlock is not available for public
full unlock 6+4=10 credits (when signature server works)
Tutorial on converting DB2020 cid49/cid51 to cid 52 and unlock
Procedure:
1. identify phone first by ticking "Identify" button.
Code:
v0.914014/UNI
Card serial:000***xx
Loaded 51 flash de******ors
Open COM port OK
ChipID:9900,EMP protocol:0301
Speed:921600
Flash ID check:897E
Flash props sent ok
OTP LOCKED:1 CID:51 PAF:1 IMEI:35463701962686 CERT:N/A
FLASH CID:51 COLOR:RED
Model:K610i
MAPP CXC article: R1GB001 prgCXC1250374_GENERIC_TH
MAPP CXC version: R1GB001
Language Package:T_MOB_INT_A
CDA article: CDA102497/8
CDA version: R12A
Default article: cxc1250376
Default version: R1GB001
Extended LOCKED
Operator: MULTIPLE
RESTORATION FILE PRESENT FOR DETECTED FIRMWARE
Elapsed:5 secs.
2. goto "settings" tab then tick "use server for csca flash/unlock and empty user/password section
3. write this misc. files "DB2020_CID49_51_to_CID52" then tick "write s c r i p t"
* you can find this file in s c r i p t folder
Code:
SERVER SUPPORT ENABLED.
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:51
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35463701962686 CERT:RED
FLASH CID:51 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
LDR:070410 1557 HANCXC1250562_DB2020_CSLOADER_R3A009
loader startup: executed
loader GDFS startup: executed
loader filesystem startup: executed
loader unlock: executed
Will execute ****** now.
Writing GDFS var 0001:084E len:010B
Success
Phone detached
Elapsed:29 secs.
4. tick "identify" button again and the result is like this
Code:
SERVER SUPPORT ENABLED.
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
Flash ID check:897E
Flash props sent ok
OTP LOCKED:1 CID:51 PAF:1 IMEI:35463701962686 CERT:RED
FLASH CID:52 COLOR:RED
Model:K610i
MAPP CXC article: R1GB001 prgCXC1250374_GENERIC_TH
MAPP CXC version: R1GB001
Language Package:T_MOB_INT_A
CDA article: CDA102497/8
CDA version: R12A
Default article: cxc1250376
Default version: R1GB001
Extended LOCKED
Operator: MULTIPLE
RESTORATION FILE PRESENT FOR DETECTED FIRMWARE
SECURITY UNITS BACKUP CREATED.
Now your phone is cid52... The phone is ready to unlock..
Unlocking Procedure:
1. In "Settings" Tab tick "Complete phone after flash", "Unlock After Flash", "Use sever for csca unlock/flash", "Enable alternative security bypass" and empty user/password area.
2. Add flash files Main & fs (you need to put main & fs files if you don't have the same files that the phone is presently using, but if you have files then you can use the main file only.)
3. then click "Flash" button and follow all instructions and wait until it finished.
Code:
SERVER SUPPORT ENABLED.
ALTERNATIVE SECURITY BYPASS ENABLED.
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35463701962686 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
CID52 BYPASS PROCEDURE STARTED
Processing part1...
Processing part2...
Processing part3....
OTP LOCKED:1 CID:51 PAF:1 IMEI:35463701962686 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
REMOVE CABLE FROM PHONE
REMOVE BATTERY FROM PHONE, THEN INSERT IT BACK
HOLD "C" BUTTON AND ATTACH AGAIN
CID52 BYPASS PROCEDURE FINISHED
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
Trying to launch embedded bootloader...
Embedded flashloader:
DB2020_PRELOADER_FOR_SETOOL2
Flash ID check:897E
Flash props sent ok
writing D:\Downloads\setool3 flash files\k610\cid52\R1JG001_1250540_CHINA_TH.ssw
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:9200
Will flash 460 blocks...
SSW loading returns:0
writing D:\Downloads\setool3 flash files\k610\cid52\R1JG001_FS_APAC_TH_RED_CID52.ssw
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:2740
Will flash 137 blocks...
SSW loading returns:0
full sig complete.
USERCODE RESET TO "0000"
Searching...
Firmware lock check determined.
loader startup: executed
loader GDFS startup: executed
loader filesystem startup: executed
loader unlock: executed
writing tpa/preset/custom/C3_PCA_G3v2.cer
writing tpa/preset/custom/CONTENT_DOWNLOAD_HOOK_2.itm
writing tpa/preset/custom/customize.xml
writing tpa/preset/custom/DESKTOP_HOOK_2.itm
writing tpa/preset/custom/Entrust.net Root Certificate.cer
writing tpa/preset/custom/Entrust.net_WTLS_Root_Certificat e.wcrt
writing tpa/preset/custom/FM_PICTURES_HOOK_3.itm
writing tpa/preset/custom/FM_SOUNDS_HOOK_3.itm
writing tpa/preset/custom/FM_THEMES_HOOK_3.itm
writing tpa/preset/custom/FM_VIDEOS_HOOK_3.itm
writing tpa/preset/custom/GAMES_HOOK_3.itm
writing tpa/preset/custom/GTE_CyberTrust_Root.cer
writing tpa/preset/custom/GTE_Cybe_Trust_Root_WTLS.wcrt
writing tpa/preset/custom/Root.cer
writing tpa/preset/custom/SEMC_E2E_Root_CA.crt
writing tpa/preset/custom/SETT_RINGTONE_HOOK_3.itm
writing tpa/preset/custom/ThawtePremium.der
writing tpa/preset/custom/ThawteServerCA.cer
writing tpa/preset/custom/Utiroot.cer
writing tpa/preset/custom/VeriSignClass3Root.cer
writing tpa/preset/custom/Verisign_Class_3_CA_WTLS.wcrt
Phone detached
Elapsed:989 secs.
here is TAC (first 6-digit of IMEI) which allowed for CID upgrade.
Code:
new old
35170901 35170701
35171001 35170801
35381301 35342701
35463701 35399601
35194301 35471601
35194201 35570401
35399601 35220601
35170801 35220801
35342701 35170901
35170701 35171001
35471601 35381301
35220601 35463701
35220801 35194201
35283601 35194101
35283701 35463901
35194101 35283601
35463901 35283701
35282601 35194301
35240101 35306601
35536301 35462501
35306601 35306501
35462501 35462601
35306501 35240101
35462601 35282601
35464901 35536301
35464801 35457901
35464901
35464801
35489301
35491101
35306501
Posted by Hilman Anshori at 4:27 AM
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment