CN101198121B - Authentication method for limiting mobile phone without using by others - Google Patents

Authentication method for limiting mobile phone without using by others Download PDF

Info

Publication number
CN101198121B
CN101198121B CN2007100510678A CN200710051067A CN101198121B CN 101198121 B CN101198121 B CN 101198121B CN 2007100510678 A CN2007100510678 A CN 2007100510678A CN 200710051067 A CN200710051067 A CN 200710051067A CN 101198121 B CN101198121 B CN 101198121B
Authority
CN
China
Prior art keywords
user
mobile phone
service
limit
mobile telephone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2007100510678A
Other languages
Chinese (zh)
Other versions
CN101198121A (en
Inventor
曾健
庞琳
王林
苏伟杰
刘三苏
张超
胡鹏
徐苛杰
李玥毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Sichuan Co Ltd
Original Assignee
China Mobile Group Sichuan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Sichuan Co Ltd filed Critical China Mobile Group Sichuan Co Ltd
Priority to CN2007100510678A priority Critical patent/CN101198121B/en
Publication of CN101198121A publication Critical patent/CN101198121A/en
Application granted granted Critical
Publication of CN101198121B publication Critical patent/CN101198121B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides an authentication method for a user to prevent others from using the mobile telephone of the user illegally. The method is characterized in that the steps are as follows: in the process of providing the communication service for the user, all the phone number, the corresponding IMEI of the mobile telephone, the service time and the related user information are collected by a service supporting system, and then the collected user information is stored in a BOSS system; when the user sends the request of preventing others from using the mobile telephone, an operator judges whether the user has the right to do the operation according to the stored information; if the related certificate provided by the user accords with the stored user information, the user has the right to do the operation of preventing other from using the mobile telephone and the operator provides the corresponding limitation for the mobile telephone according to the request of the user. The invention guarantees the convenience of the user using the mobile telephone and the security of a password and fully meets the individual requirement of the user; the construction cost is low and the invention can be used on a large scale; the sharing of the password of the phone number and that of the mobile telephone is realized, which reduces the inconvenience of memorizing a plurality of passwords; the invention can also prevent the mobile telephone of the user from being stolen or being used illegally after the mobile telephone is stolen.

Description

A kind of user limits the method for authenticating that other people illegally use mobile phone
Technical field
The present invention relates to communication equipment right to use authentication field, particularly a kind of user limits the method for authenticating that other people illegally use mobile phone.
Background technology
Along with the popularization and application of mobile phone, the purposes of mobile phone more and more widely, it is also more and more important in people life.And following mobile phone to penetrate into fields such as routine office work, finance, payment, electronic identity identification, home automation control, the user is more and more higher by other people the illegal requirement of using to forbidding mobile phone.At present, forbid that mobile phone is by the mobile phone special purpose system by other people the illegal major technique of using, as the startup password of mobile phone be set that locking unlocking pin etc. carry out authentication at the mobile phone end to the user.Owing to mobile phone uses frequently, start shooting at every turn or lock release and all input the convenience principle that password runs counter to the mobile phone use, so although most mobile phone provides this function, the user of real use is true also seldom.On the other hand, often the input handset password can reduce the fail safe of password greatly, the user scheme easy with cell phone password be provided with all the other passwords (as bankbook, gate inhibition etc.) the time, stolen may the causing than hand-set from stolen to the user of password robbed bigger loss.Owing to this two aspects reason, prior art can't really satisfy the user to forbidding that mobile phone is by other people the illegal requirement of using, rob at hand-set from stolen, under the situations such as unexpected loss, the user often can't forbid that the mobile phone of oneself is illegally used, and also can only oneself bear the loss that mobile phone is caused by illegal use.
Also exist at present and utilize mobile phone IMEI to limit the technology that illegal mobile phone networks, as the EIR technology, but EIR has only provided how to limit illegal mobile phone networking, does not but provide and how to judge that this mobile phone is illegal method.Because present most users generally do not know the IMEI of own mobile phone, and the user can't initiate the restriction to the mobile phone of assigned I MEI number, and the EIR construction cost is very high, practical large-scale is used so this technology is failed again.
Datang company has proposed to set up the IMEI server; and carry out the method for antitheft mobile phone by the method for IMEI protection password; but because of its system requirements is built the IMEI server; and require the cellphone subscriber when logging on network, to send IMEI automatically; the IMEI server is accepted the IMEI sign indicating number that SIM card sends; so the construction cost height, and because of requiring SIM card to send the IMEI sign indicating number automatically to the IMEI server, the cost of the system reform is also big.So do not see the report of practical application so far.
Summary of the invention
The present invention proposes a kind of method of carrying out authentication by business support system; provide in the process of service for the user in operator; (but not require SIM card as from user's ticket, gathering IMEI information; equipment such as VLR send IMEI automatically to designated equipment; so can compatible present communication equipment); recording user IMEI and cell-phone number corresponding historical information; when the user need forbid that other people illegally use mobile phone (as dial operator's customer service phone and report the loss); by the check analysis of the use historical information of mobile phone being carried out authentication (as user's service number corresponding relation at certain fixed time and IMEI; the duration of service number and IMEI binding; and the model of the corresponding mobile phone of this IMEI etc.); can carry out flexible processing according to authenticating result and user's requirement afterwards; limit this mobile phone and illegally used, as taking when this cellphone changing number as shutting down; batch (-type) is shut down; send the warning note; close some function or the like.
Technical scheme of the present invention is as follows:
A kind of user limits the method for authenticating that other people illegally use mobile phone, it is characterized in that flow process is as follows:
A, providing for the user in the process of communication service, business support system is gathered phone number, corresponding mobile phone IMEI, service time and relevant user profile;
B, the user profile of steps A collection is saved in the BOSS system;
When C, user initiated to limit the use of certain mobile phone, operator judged according to the information that step B preserves whether the user has the right to carry out this operation;
When the user profile that D, the relevant proof and the step B that provide the user preserve was consistent, the user had the right to limit operation, and operator limits the mobile phone that is required to limit accordingly according to user's requirement.
Described business support system is meant that telecom operators utilize the IT technology to realize management to telecommunication service, telecom charges, telecommunications marketing, and to the system of client's management and service.
Described phone number is meant that operator offers the service number that the user uses.
Described mobile phone IMEI is meant International Mobile Station Equipment Identification sign indicating number (International Mobile EquipmentIdentity).
Described providing for the user in the process of communication service, information such as the mobile phone IMEI of business support system collection phone number, correspondence and service time, be meant the modes that business support system is detailed single by user's communication or other conventional network equipment are supported, collect relevant informations such as the phone number of user when using mobile phone, corresponding mobile phone IMEI and service time.
The time period timing mode is adopted in described Information Monitoring, is benchmark with the regular hour section promptly, and being provided with of time period can be according to the actual conditions setting of operator, and the number of times that gather every day also can be provided with flexibly.
Described user initiates to limit the use of certain mobile phone, is meant that the user notifies operator to limit use to certain mobile phone by any way.
Described operator judges according to the information that step B preserves whether the user has the right to carry out this operation, be meant operator when judging whether the user has the right the mobile phone that is required to limit limited, need to use step B to be saved in the information of database and proof that the user provides is compared.Because of the user when initiating limit request, generally be difficult to point out the IMEI of its mobile phone, generally provide its cellular service number and preset password or proof of identification information, so business support system can be according to the information of preserving, the IMEI that obtains user's desire restriction and have the power to restrict, thus which mobile phone what learn user's appointment is.
Described step C authentication by the time, be meant that operator judges that at step C the user has the right to limit the use of its designated mobile phone, and the mobile phone of described mobile phone appointment when promptly to be the user initiate limit request; Described operator is according to user's requirement, can limit flexibly accordingly this mobile phone, be meant that operator can be according to the requirement for restriction of user's proposition, when the mobile phone of its appointment is changed service number, by service network this service number is limited accordingly, or, send command adapted thereto according to concrete cell-phone function, a certain function of its mobile phone can not be used, trigger a certain special function of mobile phone and locked mobile phone etc.
Beneficial effect of the present invention is as follows:
Because authentication is just initiated when the user needs, use the convenience of mobile phone at ordinary times so can ensure the user, and the frequency of utilization of password can reduce greatly also, thereby make the fail safe of password obtain to ensure; Because end carries out authentication to mobile phone in operator,, fully satisfy user's individual demand so can the restriction strategy that mobile phone uses be provided with flexibly; Because IMEI information is gathered in the process that service is provided for the user, compatible conventional network equipment so construction cost is low, can be used on a large scale; Utilize the corresponding historical record of IMEI and phone number to judge whether the user can limit certain mobile phone, carry out which kind of restriction, can also realize that cell-phone number password and cell phone password are shared, reduce the inconvenience that the user remembers a plurality of passwords; The present invention can limited subscriber hand-set from stolen steal or lose the situation that the back is illegally used.
Description of drawings
Fig. 1 is a schematic flow sheet of the present invention
Embodiment
As shown in Figure 1, a kind of user limits the method for authenticating that other people illegally use mobile phone, and its handling process is as follows:
A, providing for the user in the process of communication service, business support system is gathered phone number, corresponding mobile phone IMEI, service time and relevant user profile;
B, the user profile of steps A collection is saved in the BOSS system;
When C, user initiated to limit the use of certain mobile phone, the information that operator preserves according to step B judged whether initiate the user that limiting handset uses has the right to carry out this operation;
When the user profile that D, the relevant proof and the step B that provide the user preserve was consistent, the user had the right to limit operation, and operator limits the mobile phone that is required to limit accordingly according to user's requirement.
Described business support system is meant that telecom operators utilize the IT technology to realize management to telecommunication service, telecom charges, telecommunications marketing, and to the system of client's management and service.
Described phone number is meant that operator offers the service number that the user uses, as: 13512345678.
Described mobile phone IMEI is meant International Mobile Station Equipment Identification sign indicating number (International Mobile EquipmentIdentity).
Described providing for the user in the process of communication service, information such as the mobile phone IMEI of business support system collection phone number, correspondence and service time, be meant business support system by user's communication detailed single or other conventional network equipment support the mode of (when being supported in user-network access user IMEI being delivered to the charging center) as certain model VLR of Huawei, collect relevant informations such as the phone number of user when using mobile phone, corresponding mobile phone IMEI and service time.
The time period timing mode is adopted in described Information Monitoring, be benchmark promptly with the regular hour section, as from every day the morning 9:00~11:00 or every afternoon 3:00~5:00 ticket gather, being provided with of time period can be according to the actual conditions setting of operator, and the number of times that gather every day also can be provided with flexibly.
Described user initiates to limit the use of certain mobile phone, is meant that the user notifies operator to limit use to certain mobile phone by any way.
Described operator judges according to the information that step B preserves whether the user has the right to carry out this operation, be meant operator when judging whether the user has the right the mobile phone that is required to limit limited, need to use step B to be saved in the information of database and proof that the user provides is compared.Because of the user when initiating limit request, generally be difficult to point out the IMEI of its mobile phone, generally provide its cellular service number and preset password or proof of identification information, so business support system can be according to the information of preserving, the IMEI that obtains user's desire restriction and have the power to restrict, thus which mobile phone what learn user's appointment is.
Described step C authentication by the time, be meant that operator judges that at step C the user has the right to limit the use of its designated mobile phone, and the mobile phone of described mobile phone appointment when promptly to be the user initiate limit request; Described operator is according to user's requirement; can limit flexibly accordingly this mobile phone; be meant that operator can be according to the requirement for restriction of user's proposition; when the mobile phone of its appointment is changed service number; by service network this service number is limited accordingly (as shutting down; batch (-type) is shut down; send alarm message; carry out operations such as mobile phone location); or according to concrete cell-phone function; send command adapted thereto; the a certain function of its mobile phone can not be used; trigger a certain special function of mobile phone (, transmitting message in mobile phone etc.) as sound of movement mobile phone alarm bell; and locked mobile phone etc.

Claims (5)

1. a user limits the method for authenticating that other people illegally use mobile phone, it is characterized in that flow process is as follows:
A, providing for the user in the process of communication service, business support system is gathered phone number, corresponding mobile phone IMEI, service time and relevant user profile; The phone number that described business support system is gathered, corresponding mobile phone IMEI, service time and the user profile of being correlated with, be meant the mode that business support system is supported by the detailed list of user's communication or other conventional network equipment, collect the phone number of user when using mobile phone, corresponding mobile phone IMEI, service time and relevant information;
B, the user profile of steps A collection is saved in the BOSS system;
When C, user initiate to limit the use of certain mobile phone, operator judges according to the information that step B preserves whether the user has the right to carry out this operation, be operator when judging whether the user has the right the mobile phone that is required to limit limited, use step B to be saved in the information of database and proof that the user provides is compared;
When the user profile that D, the relevant proof and the step B that provide the user preserve is consistent, the user has the right to limit operation, operator is according to user's requirement, the mobile phone that is required to limit is limited accordingly, be when the mobile phone of appointment is changed service number, by service network this service number is limited accordingly,, send the use of corresponding restriction instruction limiting handset perhaps according to the function of this mobile phone.
2. a kind of user according to claim 1 limits the method for authenticating that other people illegally use mobile phone, it is characterized in that: described business support system, be meant that telecom operators utilize the IT technology to realize management to telecommunication service, telecom charges, telecommunications marketing, and to the system of client's management and service.
3. a kind of user according to claim 1 limits the method for authenticating that other people illegally use mobile phone, it is characterized in that: the time period timing mode is adopted in described Information Monitoring, is benchmark with the regular hour section promptly.
4. a kind of user according to claim 1 limits the method for authenticating that other people illegally use mobile phone, it is characterized in that: described user initiates to limit the use of certain mobile phone, is meant that the user notifies operator to limit use to certain mobile phone by any way.
5. a kind of user according to claim 1 limits the method for authenticating that other people illegally use mobile phone, it is characterized in that: when step C authentication is passed through, be meant that operator judges that at step C the user has the right to limit the use of its designated mobile phone, described mobile phone promptly is the mobile phone of user's appointment when initiating limit request.
CN2007100510678A 2007-12-28 2007-12-28 Authentication method for limiting mobile phone without using by others Active CN101198121B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007100510678A CN101198121B (en) 2007-12-28 2007-12-28 Authentication method for limiting mobile phone without using by others

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007100510678A CN101198121B (en) 2007-12-28 2007-12-28 Authentication method for limiting mobile phone without using by others

Publications (2)

Publication Number Publication Date
CN101198121A CN101198121A (en) 2008-06-11
CN101198121B true CN101198121B (en) 2011-07-20

Family

ID=39548206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007100510678A Active CN101198121B (en) 2007-12-28 2007-12-28 Authentication method for limiting mobile phone without using by others

Country Status (1)

Country Link
CN (1) CN101198121B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9112962B2 (en) 2008-11-24 2015-08-18 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for acquiring an IMEI associated to an IMSI
CN101742483B (en) * 2009-12-16 2013-07-03 中兴通讯股份有限公司 Method and system for unlocking locked network of terminal
CN102469448B (en) * 2010-11-08 2016-12-28 中兴通讯股份有限公司 A kind of method, system and device of machine type communication Access Control
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
CN105225105A (en) * 2015-09-24 2016-01-06 广东欧珀移动通信有限公司 The method for security protection that NFC pays and system
CN107070909A (en) * 2017-04-01 2017-08-18 广东欧珀移动通信有限公司 Method for sending information, message receiving method, apparatus and system
CN107920346B (en) * 2017-11-21 2021-04-30 Oppo广东移动通信有限公司 Method for controlling communication of mobile terminal, mobile terminal and computer-readable storage medium
CN109391630B (en) * 2018-11-28 2022-10-25 平安科技(深圳)有限公司 Mobile terminal locking method and system
CN111182536A (en) * 2019-12-30 2020-05-19 中移(杭州)信息技术有限公司 SIM card state detection method, device, network equipment and storage medium
CN112954688B (en) * 2021-02-04 2022-10-28 中国联合网络通信集团有限公司 Communication identifier verification method, server and core network equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1516503A (en) * 2003-01-03 2004-07-28 ��Ϊ�������޹�˾ Method for limiting illegal mobile telephone
CN1606326A (en) * 2003-10-10 2005-04-13 高延飞 Security management method for mobile phone
CN1829386A (en) * 2006-02-14 2006-09-06 邵毅 Wireless mobile apparatus and user identity binding system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1516503A (en) * 2003-01-03 2004-07-28 ��Ϊ�������޹�˾ Method for limiting illegal mobile telephone
CN1606326A (en) * 2003-10-10 2005-04-13 高延飞 Security management method for mobile phone
CN1829386A (en) * 2006-02-14 2006-09-06 邵毅 Wireless mobile apparatus and user identity binding system

Also Published As

Publication number Publication date
CN101198121A (en) 2008-06-11

Similar Documents

Publication Publication Date Title
CN101198121B (en) Authentication method for limiting mobile phone without using by others
CN102739868B (en) The loss processing method of mobile terminal and system
CN102413221B (en) Method for protecting privacy information and mobile terminal
EP1804418A1 (en) A dynamic password authentication system and the method thereof
CN1703063A (en) Mobile communication terminal
CN101511083B (en) Authentication method and terminal for telecom smart card
CN102654924A (en) China mobile entrance guard security system and corresponding entrance guard system security method
CN1997188A (en) A recognition method of the user identity and its handset
CN103096316A (en) Terminal, network side equipment system and method for authenticating user identification card
CN108234507A (en) Talk back equipment sharing method, talk back equipment and readable storage medium storing program for executing
CN113784348A (en) Method for managing communication authority of mobile terminal
CN104038613A (en) Method and apparatus for information security management
US20050195778A1 (en) Method and device for setting up connections between communication terminals and data and/or communication networks having wireless transmission links, such as, for example, wireless local area networks (WLAN) and/or mobile telephone networks, and a corresponding computer program and a corresponding computer-readable storage medium
CN110034930B (en) Information safety protection system and protection method for power terminal equipment
CN101877848A (en) Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system
CN101631313B (en) Method for network management and associated device
CN102420852B (en) Server, mobile terminal and data synchronizing method
KR101306074B1 (en) Method and system to prevent phishing
CN100571436C (en) A kind of implementation method of mobile terminal information resource safety guarantee
CN102170630A (en) Method and system for preventing network locking of mobile terminal from being illegally cracked
EP2028601B1 (en) Secure mobile environment policy realization based on timed one-time upkeep codes
CN102547249A (en) 3G (3rd Generation) network-based video surveillance point-to-point access method
CN106686196A (en) Personal mobile phone safety management method
WO1998000956A2 (en) System and method for preventing cellular fraud
KR100944246B1 (en) Apparatus and Method for Managing Security Mobile Communication Terminal with Universal Subscriber Identity Module

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant