CN101188860A - A method and device for recognizing exceptional terminal - Google Patents

A method and device for recognizing exceptional terminal Download PDF

Info

Publication number
CN101188860A
CN101188860A CNA2007101252847A CN200710125284A CN101188860A CN 101188860 A CN101188860 A CN 101188860A CN A2007101252847 A CNA2007101252847 A CN A2007101252847A CN 200710125284 A CN200710125284 A CN 200710125284A CN 101188860 A CN101188860 A CN 101188860A
Authority
CN
China
Prior art keywords
authentication
ssd
update
shared secret
secret data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007101252847A
Other languages
Chinese (zh)
Other versions
CN101188860B (en
Inventor
孙建贝
刘书红
李鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN2007101252847A priority Critical patent/CN101188860B/en
Publication of CN101188860A publication Critical patent/CN101188860A/en
Application granted granted Critical
Publication of CN101188860B publication Critical patent/CN101188860B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method for identifying abnormal terminals and the device thereof, wherein, the method includes the following steps: authentication requests including authentication information are received, mobile terminals are authenticated according to the authentication information, when the authentication is failed, the cause valves of authentication failures are received, and the mobile terminal types of the authentication failures are judged and recorded according to the cause values. The method and the device provided by the invention realize the classified recognition of different abnormal terminals through judging the cause values of the authentication failures.

Description

A kind of method and device of discerning abnormal terminals
Technical field
The present invention relates to moving communicating field, relate in particular to a kind of method and device of discerning abnormal terminals.
Background technology
At CDMA (Code Division Multiple Access, code division multiple access inserts) the network networking initial stage, because historical reasons operator does not consider the safety issue of cdma system, in network, do not open authentication functions, cause part not support the portable terminal of authentication functions to insert network in this period portable terminal.Gradually after the maturation, operator wishes the security mechanism by cdma system, will not support the portable terminal of authentication functions to identify at the later stage network operation.
In the original network of CDMA; reason owing to office's square tube reason; secure data A_KEY (A-key) loss of data of part portable terminal; cause the A_KEY data of A_KEY data in the portable terminal and network side inconsistent, when network was not opened authentication functions, these portable terminals can access network; when network possesses authentication functions; these portable terminals can not access network, and in order to protect benefits of operators, the portable terminal that also needs these to be lost the A_KEY data identifies.
In cdma network; because artificial operation; have two MDN (Mobile DirectoryNumber; Mobile Directory Number), IMSI ((International Mobile SubscriberIdentity; international mobile subscriber identity)) the on all four portable terminal of A_KEY access network simultaneously; also Jiu Shi Margin Machine, in order to protect operator and user's interests, also Xu is Yaoed Margin Machine is identified.
At GSM/UMTS (Global System for Mobile communications/UniversalMobile Telecommunications System, mobile general-purpose system/the Universal Mobile Telecommunications System in the whole world) in the system, also there be the portable terminal of authentication functions, the similar problem of losing the portable terminal, Margin Machine of A_KEY data do not supported, operator wishes the security mechanism by system, it is identified, in order to subsequent treatment.
At present, HLR (home location register, home location register) the authentication success there is log record with the result who fails, MSC (the Mobile Switching Center of part, mobile switching centre) reason of failed authentication has been carried out record, but,, therefore can't identify the portable terminal of not supporting authentication functions and lose the portable terminal of A_KEY data by its record because the record of HLR is careful inadequately.For the record on the MSC, ability so its record of not possessing record failed authentication reason owing to part MSC are not comprehensive, on the other hand, the difficulty that the data of MSC are added up and collected is very big, therefore can't realize not supporting the portable terminal of authentication functions and the identification of losing the portable terminal of A_KEY data.
The identification of Dui Yu Margin Machine, existing scheme comprises: the temporal information and the positional information of record updating of terminal position, utilize general knowledge to judge whether to exist same terminal according to the time interval, for example position update time is that 10 AM is in Beijing, positional information is in Shenzhen after ten minutes, if a user then this situation can not occur, judge in view of the above that therefore the user that twice position, front and back upgraded is two same terminal, but not same terminal.But all there have been the RM in the network in this method Shi Margin Machine and prototype, are a kind of identifying schemes afterwards, can not solve the problem that prevents to occur in the network two same terminal.
Summary of the invention
The embodiment of the invention provides a kind of method and device of discerning abnormal terminals, realizes abnormal terminals is carried out Classification and Identification, and the type of recording exceptional terminal.
The embodiment of the invention provides a kind of method of discerning abnormal terminals, comprising:
Reception comprises the authentication request of authentication information, according to described authentication information portable terminal is carried out authentication, when failed authentication, receives the cause value of failed authentication;
According to described cause value, judge and write down the mobile terminal style of failed authentication.
The embodiment of the invention also provides a kind of device of discerning abnormal terminals, comprise: authenticating unit, judging unit, record cell one, described authenticating unit is used for according to described authentication information portable terminal being carried out authentication after reception comprises the authentication request of authentication information;
Described judging unit is used for receiving the cause value of failed authentication when described authenticating unit failed authentication, judges the mobile terminal style of failed authentication according to described cause value;
Record cell one is used to write down described mobile terminal style.
Method that the embodiment of the invention provided and device, by receiving the cause value of failed authentication, judge the type of the portable terminal of failed authentication according to described failed authentication cause value, be recorded as different mobile terminal styles at different failed authentication reasons, compared with prior art, realized the record of the Classification and Identification and the abnormal terminals type of abnormal terminals, therefore, operator can discern different abnormal terminals types according to described record, at different abnormal terminals, meet the network insertion control of its interests, help better maintaining benefits of operators and terminal use's interests.
Description of drawings
Fig. 1 is the method flow diagram of the identification abnormal terminals of the specific embodiment of the invention one;
Fig. 2 is the method flow diagram of the identification abnormal terminals of the specific embodiment of the invention two;
Fig. 3 is the structure chart of the identification abnormal terminals device of the embodiment of the invention.
Embodiment
The embodiment of the invention is by screening the reason of abnormal terminals failed authentication on HLR, realize the identification of abnormal terminals, described HLR can be (the Authentication Center of the HLR/AC in the cdma system, AUC), also can be (the Authentication Center of the HLR/AUC in the GSM/UMTS system, AUC), the abnormal terminals that the embodiment of the invention is alleged comprises: do not support authentication functions portable terminal, lose the portable terminal Huo Margin Machine of A_KEY data.The terminal of embodiment of the invention indication is portable terminal, is designated hereinafter simply as terminal.
The SSD of terminal (Shared Secret Data, Shared Secret Data) renewal comprises the active renewal of system's initiation and the passive renewal that terminal is initiated, for initiatively upgrading, only on HLR, be provided with the shared secret data (SSD) update that the first time, system initiated is upgraded, follow-uply no longer upgrade, only carry out passive renewal.
HLR receives the cause value of the failed authentication of MSC transmission, and for the cause value that lacks authentication parameter, its corresponding abnormal terminals is not for supporting the terminal of authentication functions; For the cause value of shared secret data (SSD) update failure, its corresponding abnormal terminals may for the Zhong Duan that loses the A_KEY data with Margin Machine.For the terminal of losing the A_KEY data, its shared secret data (SSD) update first will be failed, and Dui Yu Margin Machine has carried out after SSD initiatively upgrades Dang a terminal in Margin Machine and the prototype, and another terminal is because the SSD data are inconsistent, the passive renewal of SSD failure, therefore, according to the number of times of shared secret data (SSD) update can distinguish lose the A_KEY data Zhong Duan with Margin Machine.
Below referring to Fig. 1, method flow diagram for the identification abnormal terminals of the specific embodiment of the invention one, active for terminal SSD is upgraded, only on HLR, be provided with the shared secret data (SSD) update that the first time, system initiated is upgraded, follow-uply no longer upgrade, only carry out passive renewal, below its step be described in detail:
S101, HLR receive the authentication request that comprises authentication information, described authentication information comprises SSD information, described request comprises the shared secret data (SSD) update request, and described authentication request is initiated at terminal by system, also can initiatively be initiated by terminal, after receiving described request, shared secret data (SSD) update is carried out record, preferred, the time of shared secret data (SSD) update is carried out record, promptly on the record of shared secret data (SSD) update, stamp timestamp, in order to the follow-up better analysis of operator, processing;
S102, HLR carry out authentication according to described authentication information to terminal, and the process of concrete authentication and the terminal of authentication success are not that the embodiment of the invention is concerned about, therefore do not give unnecessary details herein;
S103, failed authentication, MSC is to the cause value of HLR transmission failed authentication, shown in being exemplified below:
enum?REPORT_TYPE
{
RT_NOT_USED=0,
RT_UNSPECIFIED_VIOLATION, the unspecified authentication fault of/* */
RT_MIN_ESN_MISMATCH ,/* MIN ESN do not match */
RT_RANDC_MISMATCH ,/* RANDC do not match */
RT_RESERVED1 ,/* reservation */
RT_SSD_UPDATE_FAIL ,/* shared secret data (SSD) update failure */
RT_RESERVED2 ,/* reservation */
RT_COUNT_MISMATCH ,/* COUNT value do not match */
RT_RESERVED3 ,/* reservation */
RT_UCHAL_FAIL ,/* unique challenge failure */
RT_UNSOLICITED_BSCHAL, the base station inquiry * that/* MS initiatively initiates/
RT_SSD_UPDATE_NO_RESPONSE ,/* shared secret data (SSD) update do not receive the response */
RT_COUNT_UPDATE_NO_RESPONSE ,/* COUNT upgrade do not receive response */
RT_UCHAL_NO_RESPONSE ,/* unique challenge do not receive the response */
RT_AUTHR_MISMATCH ,/* Authentication Response do not match */
RT_TERMTYP_MISMATCH ,/* terminal type do not match */
RT_MISSING_AUTH_PARA ,/* lack authentication parameter */
RT_RPTTYP_BUTT
};
At the cause value that receives, HLR identifies the cause value of shared secret data (SSD) update failure and lacks the cause value of authentication parameter;
S104, whether judge described cause value for lacking authentication parameter, if then execution in step 106, if not, then execution in step 105;
S105, judge that whether described cause value is the shared secret data (SSD) update failure,, if not, then finish if then execution in step 107;
S106, for the failed authentication cause value that lacks authentication parameter, it is recorded as the terminal of not supporting authentication, in order to analysis, the processing of follow-up operator.
Preferably, write down the time of described authentication simultaneously, stamp timestamp promptly for the above-mentioned record of the terminal of authentication of not supporting, better carry out Terminal Service and processing in order to operator;
Shared secret data (SSD) update record on S107, the inquiry HLR judges whether described shared secret data (SSD) update is the shared secret data (SSD) update first time, if then execution in step 109, if not, then execution in step 108;
S108, for the shared secret data (SSD) update failure reason value of the shared secret data (SSD) update of twice above number of times, it is former because Margin Machine to be recorded as failed authentication, shared secret data (SSD) update setting according to system intialization, for two identical terminals, when the SSD of one of them terminal has initiatively upgraded, the SSD of another terminal is not owing to upgrade, therefore with HLR on SSD inconsistent, therefore upgrade failure;
S109, for the cause value of the shared secret data (SSD) update failure first time, be recorded as the terminal of losing the A_KEY data, when the A_KEY of terminal loss of data, can't finish shared secret data (SSD) update, therefore when shared secret data (SSD) update failure first, the described abnormal terminals that carries out authentication is the terminal of losing the A_KEY data.
After dissimilar abnormal terminals identified,, distinguish different terminals,, can allow its access network, perhaps refuse its access network according to the authentication management strategy at different terminals by inquiring about the record of described terminal type.
In the said method, there is not sequencing between step 104 and the step 105, promptly can judge whether earlier to judge whether again for lacking the failed authentication cause value of authentication parameter, referring to Fig. 2 into the shared secret data (SSD) update failure, method flow diagram for the identification abnormal terminals of the specific embodiment of the invention two, upgrade for the active of terminal SSD, only on HLR, be provided with the shared secret data (SSD) update that the first time, system initiated is upgraded, follow-uply no longer upgrade, only carry out passive renewal, concrete steps are as follows:
S201, HLR receive authentication request, described request comprises the shared secret data (SSD) update request, described authentication request is initiated at terminal by system, also can initiatively initiate, after receiving described request, shared secret data (SSD) update be carried out record by terminal, preferably, time to shared secret data (SSD) update is carried out record, promptly stamps timestamp on the record of shared secret data (SSD) update, in order to the follow-up better analysis of operator, processing;
S202, HLR carry out authentication according to described authentication information to terminal, and the process of concrete authentication and the terminal of authentication success are not that the embodiment of the invention is concerned about, therefore do not give unnecessary details herein;
S203, failed authentication, MSC is to the cause value of HLR transmission failed authentication, shown in being exemplified below:
enum?REPORT_TYPE
{
RT_NOT_USED=0,
RT_UNSPECIFIED_VIOLATION, the unspecified authentication fault of/* */
RT_MIN_ESN_MISMATCH ,/* MIN ESN do not match */
RT_RANDC_MISMATCH ,/* RANDC do not match */
RT_RESERVED1 ,/* reservation */
RT_SSD_UPDATE_FAIL ,/* shared secret data (SSD) update failure */
RT_RESERVED2 ,/* reservation */
RT_COUNT_MISMATCH ,/* COUNT value do not match */
RT_RESERVED3 ,/* reservation */
RT_UCHAL_FAIL ,/* unique challenge failure */
RT_UNSOLICITED_BSCHAL, the base station inquiry * that/* MS initiatively initiates/
RT_SSD_UPDATE_NO_RESPONSE ,/* shared secret data (SSD) update do not receive the response */
RT_COUNT_UPDATE_NO_RESPONSE ,/* COUNT upgrade do not receive response */
RT_UCHAL_NO_RESPONSE ,/* unique challenge do not receive the response */
RT_AUTHR_MISMATCH ,/* Authentication Response do not match */
RT_TERMTYP_MISMATCH ,/* terminal type do not match */
RT_MISSING_AUTH_PARA ,/* lack authentication parameter */
RT_RPTTYP_BUTT
};
At the cause value that receives, HLR identifies the cause value of shared secret data (SSD) update failure and lacks the cause value of authentication parameter;
S204, judge that whether described cause value is the shared secret data (SSD) update failure, if then execution in step 205, if not, then execution in step 208;
Shared secret data (SSD) update record on S205, the inquiry HLR judges whether described shared secret data (SSD) update is the shared secret data (SSD) update first time, if then execution in step 207, if not, then execution in step 206;
S206, for the shared secret data (SSD) update failure reason value of the shared secret data (SSD) update of twice above number of times, it is former because Margin Machine to be recorded as failed authentication, shared secret data (SSD) update setting according to system intialization, for two identical terminals, when the SSD of one of them terminal has initiatively upgraded, the SSD of another terminal is not owing to upgrade, therefore with HLR on SSD inconsistent, therefore upgrade failure;
S207, for the cause value of the shared secret data (SSD) update failure first time, be recorded as the terminal of losing the A_KEY data, when the A_KEY of terminal loss of data, can't finish shared secret data (SSD) update, therefore when shared secret data (SSD) update failure first, the described abnormal terminals that carries out authentication is the terminal of losing the A_KEY data;
S208, whether judge described cause value for lacking authentication parameter, if then execution in step 209, if not, then finish;
S209, for the failed authentication cause value that lacks authentication parameter, it is recorded as the terminal of not supporting authentication, in order to analysis, the processing of follow-up operator; Preferably, write down the time of described authentication simultaneously, stamp timestamp promptly for the above-mentioned record of the terminal of authentication of not supporting, better carry out Terminal Service and processing in order to operator;
Said method has been realized the Classification and Identification of different terminals, and is further just identified when it is networked by said method in Margin Machine, realized identification in advance.
The method of the embodiment of the invention also can realize on HSS (Home Subscriber Server, home subscriber server), does not repeat them here.
After dissimilar abnormal terminals identified,, distinguish different terminals,, can allow its access network, perhaps refuse its access network according to the authentication management strategy at different terminals by inquiring about the record of described terminal type.
For realizing said method, Fig. 3 is the structure chart of the identification abnormal terminals device of the embodiment of the invention, and described device comprises authenticating unit 310, judging unit 311, record cell 1, record cell 2 312 and query interface.Described authenticating unit 310 is used to receive authentication request, and described request comprises the shared secret data (SSD) update request, and terminal is carried out authentication; Described judging unit 311 is used under the situation of terminal authentication failure, judge whether the failed authentication cause value that MSC sends fails for lacking authentication parameter or shared secret data (SSD) update, also be used for query note unit 2 312 to judge whether described shared secret data (SSD) update serves as to upgrade for the first time; Described record cell 2 312 is used to write down the number of times of shared secret data (SSD) update, record cell 1 be used for when described failed authentication former because be recorded as the terminal of not supporting authentication when lacking authentication parameter, the former renewal for the first time because of SSD of perhaps described failed authentication is recorded as the terminal of losing the A_KEY data when failing, remember that recording is Margin Machine when the former shared secret data (SSD) update because of twice above number of times of perhaps described failed authentication is failed; Described query interface is used to inquire about the data of described record cell 1.
Upgrade for the active of terminal SSD, only be provided with on HLR the shared secret data (SSD) update that the first time, system initiated is upgraded, follow-uply no longer upgrade, only carry out passive renewal, the concrete operation of said apparatus is as follows:
Authenticating unit 310 receives authentication request, described request comprises the shared secret data (SSD) update request, terminal is carried out authentication, the number of times of the described shared secret data (SSD) update of described record cell 2 312 records, when failed authentication, described judging unit 311 receives the failed authentication cause value that MSC sends, judge that whether described failed authentication cause value is for lacking the failure of authentication parameter or shared secret data (SSD) update, when described failed authentication cause value when lacking authentication parameter, described record cell 1 is recorded as the terminal of not supporting authentication, when described failed authentication cause value is the shared secret data (SSD) update failure, described judging unit 311 judges further whether the shared secret data (SSD) update record of described record cell 2 312 records is to upgrade for the first time, when described shared secret data (SSD) update upgraded for the first time, described record cell 1 is recorded as the terminal of losing the A_KEY data, when described shared secret data (SSD) update is the renewal of the number of times more than twice, shared secret data (SSD) update setting according to system intialization, for two identical terminals, when the SSD of one of them terminal has initiatively upgraded, the SSD of another terminal is not owing to upgrade, inconsistent with the SSD on the HLR, therefore upgrade failure, described record cell one 313 Ji Lu are Margin Machine.
Preferably, the time of the described shared secret data (SSD) update of described record cell 2 312 records, promptly on the record of described shared secret data (SSD) update number of times, stamp timestamp, for example, be recorded as shared secret data (SSD) update for the first time, the time is 12: 12: 12 on the 1st January in 2005, preferably, when described record cell 1 can also write down the failed authentication reason, the time of writing down described authentication, promptly on the failed authentication reason, stamp timestamp information.
Said apparatus is arranged on HLR or the HSS, and its part is the logic function unit module, rather than the physical function module, during specific implementation, said units can be provided with respectively, also can be realized by a unit.
Compared with prior art, the method and the device of the identification abnormal terminals that the embodiment of the invention provides, when failed authentication, receive the failed authentication cause value that MSC sends, by identification failed authentication cause value, write down the terminal of different failed authentications, realized the Classification and Identification of different abnormal terminals, and, Dui Yu Margin Machine, can effectively prevent same terminal access network simultaneously, be a kind of processing scheme in advance.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (14)

1. a method of discerning abnormal terminals is characterized in that, comprising:
Reception comprises the authentication request of authentication information, according to described authentication information portable terminal is carried out authentication, when failed authentication, receives the cause value of failed authentication;
According to described cause value, judge and write down the mobile terminal style of failed authentication.
2. the method for claim 1, be characterised in that, described authentication information comprises the information of Shared Secret Data SSD, described authentication request comprises the shared secret data (SSD) update request, described method also comprises the number of times that writes down described shared secret data (SSD) update, according to the number of times and the described cause value of described shared secret data (SSD) update, judge and write down the mobile terminal style of failed authentication.
3. the method for claim 1 is characterized in that, describedly judges and the mobile terminal style of record failed authentication comprises according to described cause value: when described cause value when lacking authentication parameter, be recorded as the portable terminal of not supporting authentication.
4. method as claimed in claim 2, it is characterized in that, described number of times and described cause value according to described shared secret data (SSD) update, the mobile terminal style of judgement and record failed authentication comprises: when described cause value is the shared secret data (SSD) update failure, and when described shared secret data (SSD) update number of times is one time, be recorded as the portable terminal of losing A-key A_KEY data;
Perhaps when described cause value be shared secret data (SSD) update when failure, and described shared secret data (SSD) update number of times is twice when above, Ji Lu is a Margin Machine.
5. as each described method in the claim 1 to 4, it is characterized in that, also comprise: write down the time of described shared secret data (SSD) update, and write down the time of described authentication.
6. as claim 2 or 4 described methods, it is characterized in that, also comprise: set in advance the shared secret data (SSD) update of initiating, only the shared secret data (SSD) update that it is initiated is for the first time upgraded operation for system.
7. as each described method in the claim 1 to 4, it is characterized in that, also comprise after the described mobile terminal style of record: receive the inquiry to the mobile terminal style of described record, be used at different portable terminals, whether decision allows its access network according to the authentication management strategy.
8. a device of discerning abnormal terminals is characterized in that, comprising: authenticating unit, judging unit, record cell one, described authenticating unit are used for according to described authentication information portable terminal being carried out authentication after reception comprises the authentication request of authentication information;
Described judging unit is used for receiving the cause value of failed authentication when described authenticating unit failed authentication, judges the mobile terminal style of failed authentication according to described cause value;
Record cell one is used to write down described mobile terminal style.
9. device as claimed in claim 8, it is characterized in that, described authentication information comprises the information of Shared Secret Data SSD, described authentication request comprises the shared secret data (SSD) update request, described device also comprises record cell two, be used to write down the number of times of described shared secret data (SSD) update, described judging unit also is used for the number of times according to described failed authentication cause value and described shared secret data (SSD) update, judges the mobile terminal style of failed authentication.
10. device as claimed in claim 8 is characterized in that, described judging unit judges that according to described failed authentication cause value the mobile terminal style of failed authentication comprises:
When described cause value when lacking authentication parameter, for not supporting the portable terminal of authentication.
11. device as claimed in claim 9 is characterized in that, described judging unit judges that according to the number of times of described failed authentication cause value and described shared secret data (SSD) update the mobile terminal style of failed authentication comprises:
Perhaps when described cause value be shared secret data (SSD) update when failure, and described shared secret data (SSD) update number of times is when being one time, for losing the portable terminal of A_KEY data;
Perhaps when described cause value be shared secret data (SSD) update when failure, and described shared secret data (SSD) update number of times is that twice , when above is Margin Machine.
12., it is characterized in that as each described device in the claim 8 to 11, also comprise the inquiry port, be used to receive query requests at the mobile terminal style of described record cell one record.
13. device as claimed in claim 9 is characterized in that, described record cell two also is used to write down the time of described shared secret data (SSD) update, and described record cell one also is used to write down the time of described authentication.
14., it is characterized in that described device is on home location register HLR or home subscriber server HSS as each described device in the claim 8 to 11.
CN2007101252847A 2007-12-19 2007-12-19 A method and device for recognizing exceptional terminal Expired - Fee Related CN101188860B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101252847A CN101188860B (en) 2007-12-19 2007-12-19 A method and device for recognizing exceptional terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101252847A CN101188860B (en) 2007-12-19 2007-12-19 A method and device for recognizing exceptional terminal

Publications (2)

Publication Number Publication Date
CN101188860A true CN101188860A (en) 2008-05-28
CN101188860B CN101188860B (en) 2010-11-10

Family

ID=39480988

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101252847A Expired - Fee Related CN101188860B (en) 2007-12-19 2007-12-19 A method and device for recognizing exceptional terminal

Country Status (1)

Country Link
CN (1) CN101188860B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056173A (en) * 2009-11-05 2011-05-11 中国移动通信集团广东有限公司 Parallel-operation monitoring method and parallel-operation monitoring device
CN101754197B (en) * 2008-12-15 2012-06-13 中兴通讯股份有限公司 Terminal authentication method and home location register/authentication center
CN101835150B (en) * 2010-02-09 2013-01-30 华为技术有限公司 Method, device and system for updating shared enciphered data
CN101674574B (en) * 2008-09-10 2013-03-27 中兴通讯股份有限公司 User authentication method and user authentication device
CN103036868A (en) * 2011-10-04 2013-04-10 三星电子株式会社 Preventing terminals from operating an abnormal ciphering algorithm
CN103843379A (en) * 2012-08-08 2014-06-04 华为技术有限公司 Information processing method and device
CN104955045A (en) * 2015-06-12 2015-09-30 联想(北京)有限公司 Access control method, device, terminal and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1258934C (en) * 2003-11-05 2006-06-07 中兴通讯股份有限公司 Method of 'double-in' detection in PHS system
CN1294722C (en) * 2004-09-23 2007-01-10 华为技术有限公司 Method of selecting right identification mode at network side
CN1968094A (en) * 2006-11-23 2007-05-23 华为技术有限公司 Method, system and server for prompting the cause for user terminal authentication failure

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674574B (en) * 2008-09-10 2013-03-27 中兴通讯股份有限公司 User authentication method and user authentication device
CN101754197B (en) * 2008-12-15 2012-06-13 中兴通讯股份有限公司 Terminal authentication method and home location register/authentication center
CN102056173A (en) * 2009-11-05 2011-05-11 中国移动通信集团广东有限公司 Parallel-operation monitoring method and parallel-operation monitoring device
CN101835150B (en) * 2010-02-09 2013-01-30 华为技术有限公司 Method, device and system for updating shared enciphered data
CN103036868B (en) * 2011-10-04 2018-06-29 三星电子株式会社 Cipher control method supports the network system and terminal of this method, terminal operation method
CN103036868A (en) * 2011-10-04 2013-04-10 三星电子株式会社 Preventing terminals from operating an abnormal ciphering algorithm
CN103843379B (en) * 2012-08-08 2018-09-21 华为技术有限公司 Information processing method and device
US9766967B2 (en) 2012-08-08 2017-09-19 Huawei Technologies Co., Ltd. Providing a network access failure cause value of a user equipment
CN103843379A (en) * 2012-08-08 2014-06-04 华为技术有限公司 Information processing method and device
CN109041089A (en) * 2012-08-08 2018-12-18 华为技术有限公司 Information processing method and device
US10474522B2 (en) 2012-08-08 2019-11-12 Huawei Technologies Co., Ltd. Providing a network access failure cause value of a user equipment
CN109041089B (en) * 2012-08-08 2021-12-31 华为技术有限公司 Information processing method and device
CN104955045A (en) * 2015-06-12 2015-09-30 联想(北京)有限公司 Access control method, device, terminal and system
CN104955045B (en) * 2015-06-12 2019-02-05 联想(北京)有限公司 A kind of connection control method, device, terminal and system

Also Published As

Publication number Publication date
CN101188860B (en) 2010-11-10

Similar Documents

Publication Publication Date Title
CN101188860B (en) A method and device for recognizing exceptional terminal
US8909193B2 (en) Authentication method
US7363056B2 (en) Method and system for secured duplication of information from a SIM card to at least one communicating object
EP2352321B1 (en) Method and apparatus for authentication processing of mobile terminal
US7266364B2 (en) Wireless communications unauthorized use verification system
KR101536489B1 (en) Authentication of access terminal identities in roaming networks
EP2521034B1 (en) Managing method, device and terminal for application program
US20120058743A1 (en) Method for legitimately unlocking a sim card lock, unlocking server, and unlocking system for a sim card lock
US20100159924A1 (en) IMSI handling system
EP2368382B1 (en) Locking of communication device
KR20060135003A (en) Method and apparatus for access authentication in wireless mobile communication system
CN1875653A (en) Method for managing the security of applications with a security module
CN1980459B (en) Method for realizing information destroying at network side
CN101238752A (en) Method and database for performing a permission status check on mobile equipment
WO2010060242A1 (en) An authentication method for the mobile terminal and a system thereof
CN103765938A (en) Mobile terminal theft detection system
KR20160143333A (en) Method for Double Certification by using Double Channel
CN100576956C (en) Portable terminal identity protection by the attaching position register modification
WO2012129851A1 (en) Mobile terminal and network locking method therefor
US6618584B1 (en) Terminal authentication procedure timing for data calls
CN101860844A (en) Method, device and system for monitoring SIM card
CN102595376B (en) A kind of activating method, Apparatus and system of User Identity card
CN1980458B (en) Method for realizing information back-up at network side
CN100484292C (en) Method, system and base station for locking illegal copied mobile terminal
CN108024241B (en) Terminal access authentication method, system and authentication server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20101110

Termination date: 20121219