CN101330756A - Intelligent network business implementing system and method for preventing user identification from being stolen - Google Patents

Intelligent network business implementing system and method for preventing user identification from being stolen Download PDF

Info

Publication number
CN101330756A
CN101330756A CNA2008101166403A CN200810116640A CN101330756A CN 101330756 A CN101330756 A CN 101330756A CN A2008101166403 A CNA2008101166403 A CN A2008101166403A CN 200810116640 A CN200810116640 A CN 200810116640A CN 101330756 A CN101330756 A CN 101330756A
Authority
CN
China
Prior art keywords
user
imei
caller
intelligent network
stolen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008101166403A
Other languages
Chinese (zh)
Other versions
CN101330756B (en
Inventor
王兵
张俊南
高敏
成洁
孙宁
南福星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Communication Co Ltd
Original Assignee
China United Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Communication Co Ltd filed Critical China United Communication Co Ltd
Priority to CN2008101166403A priority Critical patent/CN101330756B/en
Publication of CN101330756A publication Critical patent/CN101330756A/en
Application granted granted Critical
Publication of CN101330756B publication Critical patent/CN101330756B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to an intelligent network service realization system and a method for preventing user identity from being embezzled. The realization method comprises the following steps: a calling service MSC/SSP is increased in the normal process of the intelligent network service to report an IMEI number to a user; when the IMEI number reported by the user is different from an IMEI number preserved in a calling home area SCP, the calling home area SCP informs the calling service IP that the user is prompted to enter a service password; the calling home area SCP determines whether to continue the calling according to the consistency between a judgment service password and a saved service password. The invention provides an intelligent network service for enhancing the legal identity of a protected user; on the premise of changing an original authentication system, an IMSI is incident on the IMEI; furthermore, the simultaneous confirmation of a unit and a card is ensured when the unit and the card are separated.

Description

A kind of stolen intelligent network business of user identity that prevents is realized system and method
Technical field
The present invention relates to intelligent network business, relate in particular to a kind of stolen intelligent network business of user identity that prevents and realize system and method.
Background technology
The GSM network protects legal contracted user to use the network service by authentication mechanism at present.GSM (Global System for Mobile Communications) system adopts tlv triple (IMSI/RAND/SRES) to carry out authentication, (the International Mobile SubscriberIdentification Number of IMSI in the tlv triple, the international mobile subscriber identifier) is stored in SIM (Subscriber IdentityModule, subscriber identification module) card and HLR/AuC (Home Location Register/AuthenticationCenter, attaching position register/AUC) in, RAND is the random number that HLR/AuC produces, SRES (symbol response) is that SIM card and HLR/AuC both sides are respectively according to key K i, IMSI, the authentication arithmetic (as A3) of RAND and both sides' agreement calculates, Ki is stored among SIM card and the HLR/AuC, for increasing reliability, Ki is not in the transmission of eating dishes without rice or wine.Both sides are delivered to MSC/VLR (Mobile Switch Center/Visiting Location Register with the SRES that calculates respectively, mobile switching center) in, compare by MSC/VLR, thereby determine whether the user has legal identity.As can be seen, IMSI is the identification code that the user has legal identity.
In addition, gsm system also provides the affirmation function for equipment identities, promptly terminal is confirmed.The identity code of terminal is IMEI (International Mobile Equipment Identity, an international mobile device identifier), is stored among the EIR (Equipment Identity Register, device identification number register).EIR provides white list, blacklist and the gray list based on IMEI, makes system provide professional for legal mobile phone, also can tackle or follow the tracks of illegal cell phone apparatus simultaneously.EIR is the optional equipment of system, does not all adopt this equipment in the GSM network of China at present.
In the gsm system that EIR is not set, the affirmation of user's legal identity is needed IMSI, Ki and 3 essential informations of authentication arithmetic, these 3 essential informations are stored among SIM card and the HLR/AuC simultaneously.For the user, SIM card is vital proof of identification.For gsm system, when MS (travelling carriage) start, occurrence positions variation and professional application, will trigger authorizing procedure, legal proof of identification is provided, in time notify position and/or the state variation of HLR/AuC self simultaneously.Gsm system is by having unique IMSI can use legitimate traffic in the MS information assurance system that preserves among the HLR/AuC.At present, occur " swiping the card " equipment on the market, promptly duplicate SIM card fully by special installation, because duplicated SIM card has legal identity information, system can't identify.If SIM card by fraudulent copying, hold so the user who duplicates SIM card can usurp validated user identity enjoy network service and can't be by system identification, the interests of validated user will be encroached on.
In the gsm system of EIR was set, EIR only provided the affirmation based on IMEI.Because the IMSI that stores among IMEI that stores among the EIR and the HLR/AuC is separate, use the terminal of normal channel purchase then to become validated user as long as hold the user who duplicates SIM card, also can't be gone out by system identification.
Patent application " a kind of system and method for user terminal identity identification " (application number: 200610032928.3) disclose the implementation that a kind of user terminal identity is discerned, this scheme increases antitheft molding piece on switching equipment, this module sends the prompting of input authentication information to caller equipment after receiving called number, the authorization information of uploading according to caller equipment judges whether user terminal is legal terminal again, if be legal terminal, then connect called equipment; Open antitheft molding piece, be used to open the authentication of calling; Cancel antitheft molding piece, be used to cancel the authentication of calling; Revise the identity information authentication module, be used for revising authentication authorization information when calling out.This implementation utilizes password to control, and all triggers business when per call, all needs mutual with the user when per call, causes waste of network resources.
Summary of the invention
In order to solve above-mentioned technical problem; the invention provides a kind of stolen intelligent network business of user identity that prevents and realize system and method; its purpose is; a kind of intelligent network business of strengthening protecting user's legal identity is provided; do not changing under original authentication mechanism prerequisite; IMSI and IMEI is interrelated, when separation between machine and card, guarantee to confirm in the machine card.
The invention provides a kind of intelligent network business implementation method that prevents that user identity is stolen, comprising:
Step 1, the user makes a call, and caller service MSC/SSP prevents the intelligent network business that user identity is stolen according to this user's CAMEL-Subscription-Information triggering, sends the message of the IMEI that comprises this user to caller ownership place SCP;
Step 2, if the described user's that caller ownership place SCP receives IMEI is different with this user's of its preservation IMEI, perhaps caller ownership place SCP does not preserve this user's IMEI, then caller ownership place SCP prevents the intelligent network business password that user identity is stolen, execution in step 3 by caller service IP prompting user input; Otherwise carry out call proceeding;
Step 3, after user's input prevented the stolen intelligent network business password of user identity, the caller service IP transmitted this password to caller ownership place SCP; If this password prevents that with caller ownership place SCP preservation the stolen intelligent network business password of user identity is identical, then caller ownership place SCP uses its this user's who receives IMEI to upgrade this user's IMEI, and carries out call proceeding; Otherwise caller ownership place SCP refuses this time calling.
In the step 1, caller service MSC/SSP routes to ownership place SCP with user's call request by the No.7 agreement.
If the user is the prepaid user, then prevent the intelligent network business affirmation that user identity is stolen earlier, after this business is confirmed successfully, carry out the prepaid subscriber account inspection again.
If the user is VPN user, then prevent the intelligent network business affirmation that user identity is stolen, after this business is confirmed successfully, carry out the vpn service flow process again.
In the step 1, described message is IDP (Initial DP) message that comprises IMEI.
In the step 3, when caller ownership place SCP refuses this time calling, also notify the user failure cause by the caller service IP.
The invention provides a kind of stolen intelligent network business of user identity that prevents and realize system, comprise caller service MSC/SSP, caller ownership place SCP and caller service IP,
Caller service MSC/SSP also is used for when the user makes a call, and triggers preventing the intelligent network business that user identity is stolen according to this user's CAMEL-Subscription-Information, sends the message of the IMEI that comprises this user to caller ownership place SCP;
Caller ownership place SCP, also be used at its described user's who receives IMEI different with this user's of its preservation IMEI, when perhaps it did not preserve this user's IMEI, notice caller service IP prompting user input prevented the intelligent network business password that user identity is stolen; When its described user's who receives IMEI and this user's of its preservation IMEI is identical, carry out call proceeding;
The caller service IP also is used for after user's input prevents the stolen intelligent network business password of user identity, and SCP transmits this password to the caller ownership place;
Caller ownership place SCP also is used for the professional password that prevents intelligent network business password that user identity is stolen and its preservation in its reception when identical, uses its this user's who receives IMEI to upgrade this user's IMEI, and carries out call proceeding; Otherwise caller ownership place SCP refuses this time calling.
Caller service MSC/SSP is used for user's call request is routed to ownership place SCP by the No.7 agreement.
The described message that comprises this user's IMEI is the IDP message that comprises IMEI.
Caller ownership place SCP also is used for notifying the user failure cause by the caller service IP when the call request of refusing user's.
The invention provides a kind of intelligent network business of strengthening protecting user's legal identity, not changing under original authentication mechanism prerequisite that IMSI and IMEI is interrelated, when separation between machine and card, guarantee to confirm in the machine card.Among the present invention, when validated user generation SIM card during by fraudulent copying, the disabled user will change terminal equipment, and the IMEI that this moment, system was received will be different with the IMEI that receives before, when this moment, the disabled user used legal identity to initiate professional the application, gsm system will be refused disabled user's access.When validated user was changed terminal, upgrade in time the incidence relation of IMSI and new IMEI of the password that operator provides in the time of can applying for business guaranteed to continue legal use gsm service.
Description of drawings
Fig. 1 is the intelligent network business realization flow figure that prevents that user identity is stolen provided by the invention;
Fig. 2 realizes system diagram for the stolen intelligent network business of user identity that prevents provided by the invention.
Embodiment
Provided by the inventionly prevent the stolen intelligent network business implementation method of user identity as shown in Figure 1, comprising:
Step 11, the user makes a call, and caller service MSC/SSP prevents the intelligent network business that user identity is stolen according to this user's CAMEL-Subscription-Information triggering, sends the message of the IMEI that comprises this user to caller ownership place SCP;
Step 12, if the described user's that caller ownership place SCP receives IMEI is different with this user's of its preservation IMEI, perhaps caller ownership place SCP does not preserve this user's IMEI, and then caller ownership place SCP prevents the intelligent network business password that user identity is stolen by caller service IP prompting user input; Otherwise carrying out normal call according to CAMEL Application Part continues;
Step 13, after user's input prevented the stolen intelligent network business password of user identity, the caller service IP transmitted this password to caller ownership place SCP; If this password prevents that with caller ownership place SCP preservation the stolen intelligent network business password of user identity is identical, then caller ownership place SCP uses its this user's who receives IMEI to upgrade this user's of its preservation IMEI, and carries out call proceeding according to CAMEL Application Part; Otherwise caller ownership place SCP refuses this time calling.
The detailed realization flow of said method comprises:
Step 101: the user makes a call, MSC/SSP is according to CAMEL-Subscription-Information O-SCI triggering intelligent network service in the caller service, to caller ownership place SCP (Service Control Point, service control point) sends IDP (Initial DP) message or the self-defining IMEI reporting message that comprises IMEI, in message, place user's IMEI number.Carry out next step.
Step 102: caller ownership place SCP inquiry existing subscriber IMEI.If do not have IMEI among the SCP or receive that the IMEI that SSP (Service Switch Point, Service Switching Point) sends is inequality with the IMEI that preserves of institute, execution next step, otherwise execution in step 108.
Step 103: caller ownership place SCP is to caller service IP (Intelligent Periphcral, ip intelligent peripherals) issuing message PromptAndCollectUserInformation, and prompting user incoming traffic password is carried out next step.
Step 104: the caller service IP sends message PromptAndCollectUserInformationAck to caller ownership place SCP, and professional password is returned to caller ownership place SCP, carries out next step.
Step 105: caller ownership place SCP judges the professional password that the caller service IP sends.If it is identical with preservation password among the SCP that the user inputs password, carry out next step, otherwise execution in step 107.
Step 106: use the IMEI that is received to upgrade the former IMEI that preserves, execution in step 108.
Step 107: refuse this time calling, notify the user failure cause, end of calling.
Step 108: carry out the call proceeding of standard according to standard C AP (CAMEL Application Part, Camel applying portion) agreement.
In above-mentioned flow process, caller service MSC/SSP (Service Switching Point, Service Switching Point) refers to provide the MSC/SSP of service at calling initiation place for caller, and when the user initiates in the roaming place when professional, caller service MSC/SSP is positioned at the roaming place; When the user initiates when professional at ownership place, caller service MSC/SSP is positioned at ownership place.The caller service IP refers to provide for caller at calling initiation place the IP of service.
Caller service MSC/SSP routes to caller ownership place SCP with service request by the No.7 agreement, and SCP carries out service authentication by the caller ownership place.
This realization flow does not change the intelligent network networking structure, only the benchmark service flow process is made an amendment slightly.In this realization flow, in the normal flow of intelligent network business, increase MSC/SSP report of user IMEI step.In reporting of user IMEI and SCP, preserved IMEI not simultaneously, increased the reciprocal process of user and SCP, promptly pointed out user's incoming traffic password, SCP according to judge professional password with whether unanimous decision this calling that whether continues of the professional password of preserving.
In the above-mentioned flow process, the user profile of preserving among the ownership place SCP increases professional password and IMEI.The IMEI zone is sky during first the use.Each user area only keeps an effective I MEI number, forms the corresponding relation of IMSI, IMEI, professional password.
In the above-mentioned flow process, ownership place SCP need analyze IMEI (promptly whether the IMEI of IMEI that relatively preserves and reception is identical) and prevent the service number of the intelligent network business that user identity is stolen.Ownership place SCP confirms according to the above-mentioned service number in the customer service attribute of being preserved that the user has opened should business, MSC/SSP IMEI that reports and the IMEI that is preserved is served in caller compare, and determines whether to carry out call proceeding.If the user does not open this business, then carry out normal service call flow process.
In the above-mentioned flow process, caller service MSC/SSP need obtain IMEI and send IMEI to caller ownership place SCP.Caller service MSC/SSP obtains the A mouth message realization of IMEI by standard, does not need to expand.
Caller service MSC/SSP sends IMEI to caller ownership place SCP and can obtain by the IDP message that comprises IMEI.
Preserved the service attribute that the user should business among the caller ownership place SCP, whether the expression user opens this business.When caller ownership place SCP receives the call request of service MSC/SSP, check that this user's service attribute carries out the business affirmation.
If the user opens this business, caller ownership place SCP preserves user's professional password.User's professional password acquiring way is by other modes (as be printed on the SIM card, in business hall signature business contract etc.) and user's agreement.Operation such as operator can point out modification that the user carries out professional password, reset.
If the user opens this business, the IMEI zone is set among the caller ownership place SCP preserves user's IMEI.When first the use, the IMEI zone is empty, caller ownership SCP prompting user incoming traffic password, if confirm professional password, the IMEI that caller ownership SCP reports SSP is stored in the IMEI district.
When the user of above-mentioned intelligent network business is the prepayment service user simultaneously, at first carry out the business of this business and confirm, after this business is confirmed successfully, the prepaid subscriber account inspection of operative norm again.
When the user of above-mentioned intelligent network business is VPN (Virtual Private Network, Virtual Private Network) user simultaneously, at first carry out the business of this business and confirm, after this business is confirmed successfully, the vpn service flow process of operative norm again.
The invention provides a kind of stolen intelligent network business of user identity that prevents and realize system, comprise caller service MSC/SSP, caller ownership place SCP and caller service IP,
Caller service MSC/SSP also is used for when the user makes a call, and triggers preventing the intelligent network business that user identity is stolen according to this user's CAMEL-Subscription-Information, sends the message of the IMEI that comprises this user to caller ownership place SCP;
Caller ownership place SCP, also be used at its described user's who receives IMEI different with this user's of its preservation IMEI, when perhaps it did not preserve this user's IMEI, notice caller service IP prompting user input prevented the intelligent network business password that user identity is stolen; When its described user's who receives IMEI and this user's of its preservation IMEI is identical, carry out call proceeding;
The caller service IP also is used for after user's input prevents the stolen intelligent network business password of user identity, and SCP transmits this password to the caller ownership place;
Caller ownership place SCP, also be used for the professional password that prevents intelligent network business password that user identity is stolen and its preservation in its reception when identical, use its this user's who receives IMEI to upgrade this user's IMEI, and carry out call proceeding according to CAMEL Application Part; Otherwise refuse this time calling.
Caller service MSC/SSP is used for user's call request is routed to ownership place SCP by the No.7 agreement.
The described message that comprises this user's IMEI is the IDP message that comprises IMEI.
Caller ownership place SCP also is used for notifying the user failure cause by the caller service IP when the call request of refusing user's.
Those skilled in the art can also carry out various modifications to above content under the condition that does not break away from the definite the spirit and scope of the present invention of claims.Therefore scope of the present invention is not limited in above explanation, but determine by the scope of claims.

Claims (10)

1, a kind of intelligent network business implementation method that prevents that user identity is stolen is characterized in that, comprising:
Step 1, the user makes a call, and caller service MSC/SSP prevents the intelligent network business that user identity is stolen according to this user's CAMEL-Subscription-Information triggering, sends the message of the IMEI that comprises this user to caller ownership place SCP;
Step 2, if the described user's that caller ownership place SCP receives IMEI is different with this user's of its preservation IMEI, perhaps caller ownership place SCP does not preserve this user's IMEI, then caller ownership place SCP prevents the intelligent network business password that user identity is stolen, execution in step 3 by caller service IP prompting user input; Otherwise carry out call proceeding;
Step 3, after user's input prevented the stolen intelligent network business password of user identity, the caller service IP transmitted this password to caller ownership place SCP; If this password prevents that with caller ownership place SCP preservation the stolen intelligent network business password of user identity is identical, then caller ownership place SCP uses its this user's who receives IMEI to upgrade this user's IMEI, and carries out call proceeding; Otherwise caller ownership place SCP refuses this time calling.
2, the intelligent network business implementation method that prevents that user identity is stolen as claimed in claim 1 is characterized in that, in the step 1, caller service MSC/SSP routes to ownership place SCP with user's call request by the No.7 agreement.
3, the intelligent network business implementation method that prevents that user identity is stolen as claimed in claim 1, it is characterized in that,, then prevent the intelligent network business affirmation that user identity is stolen earlier if the user is the prepaid user, after this business is confirmed successfully, carry out the prepaid subscriber account inspection again.
4, the intelligent network business implementation method that prevents that user identity is stolen as claimed in claim 1, it is characterized in that,, then prevent the intelligent network business affirmation that user identity is stolen if the user is VPN user, after this business is confirmed successfully, carry out the vpn service flow process again.
As claim 1,2, the 3 or 4 described intelligent network business implementation methods that prevent that user identity is stolen, it is characterized in that 5, in the step 1, described message is the IDP message that comprises IMEI.
6, as claim 1,2, the 3 or 4 described intelligent network business implementation methods that prevent that user identity is stolen, it is characterized in that, in the step 3, when caller ownership place SCP refuses this time calling, also notify the user failure cause by the caller service IP.
7, a kind of stolen intelligent network business of user identity that prevents is realized system, comprises caller service MSC/SSP, caller ownership place SCP and caller service IP, it is characterized in that,
Caller service MSC/SSP also is used for when the user makes a call, and triggers preventing the intelligent network business that user identity is stolen according to this user's CAMEL-Subscription-Information, sends the message of the IMEI that comprises this user to caller ownership place SCP;
Caller ownership place SCP, also be used at its described user's who receives IMEI different with this user's of its preservation IMEI, when perhaps it did not preserve this user's IMEI, notice caller service IP prompting user input prevented the intelligent network business password that user identity is stolen; When its described user's who receives IMEI and this user's of its preservation IMEI is identical, carry out call proceeding;
The caller service IP also is used for after user's input prevents the stolen intelligent network business password of user identity, and SCP transmits this password to the caller ownership place;
Caller ownership place SCP also is used for the professional password that prevents intelligent network business password that user identity is stolen and its preservation in its reception when identical, uses its this user's who receives IMEI to upgrade this user's IMEI, and carries out call proceeding; Otherwise refuse this time calling.
8, the stolen intelligent network business of user identity that prevents as claimed in claim 7 is realized system, it is characterized in that, caller service MSC/SSP is used for user's call request is routed to ownership place SCP by the No.7 agreement.
9, the stolen intelligent network business of user identity that prevents as claimed in claim 7 is realized system, it is characterized in that the described message that comprises this user's IMEI is the IDP message that comprises IMEI.
10, realize system as claim 7, the 8 or 9 described stolen intelligent network business of user identity that prevent, it is characterized in that caller ownership place SCP also is used for notifying the user failure cause by the caller service IP when the call request of refusing user's.
CN2008101166403A 2008-07-14 2008-07-14 Intelligent network business implementing system and method for preventing user identification from being stolen Active CN101330756B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101166403A CN101330756B (en) 2008-07-14 2008-07-14 Intelligent network business implementing system and method for preventing user identification from being stolen

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101166403A CN101330756B (en) 2008-07-14 2008-07-14 Intelligent network business implementing system and method for preventing user identification from being stolen

Publications (2)

Publication Number Publication Date
CN101330756A true CN101330756A (en) 2008-12-24
CN101330756B CN101330756B (en) 2011-04-20

Family

ID=40206289

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101166403A Active CN101330756B (en) 2008-07-14 2008-07-14 Intelligent network business implementing system and method for preventing user identification from being stolen

Country Status (1)

Country Link
CN (1) CN101330756B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572827A (en) * 2010-12-07 2012-07-11 中国电信股份有限公司 Cloning machine discrimination method in mobile communication system and apparatus thereof
CN101848462B (en) * 2009-03-23 2012-12-12 中国移动通信集团公司 Clone card location server, location detection method and system
CN106686594A (en) * 2017-01-17 2017-05-17 北京首信科技股份有限公司 EVDO network authentication method and device
CN107343278A (en) * 2017-07-22 2017-11-10 杭州诚智天扬科技有限公司 The implementation method of number verification business is carried out by audio call
CN110234105A (en) * 2018-03-06 2019-09-13 中国移动通信有限公司研究院 Detect VLR whether the method and device of authentication denial service order

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2000278920B2 (en) * 2000-05-17 2006-11-30 Symstream Technology Holdings No.2 Pty Ltd Octave pulse data method and apparatus
CN101022672B (en) * 2007-02-16 2010-05-26 华为技术有限公司 Method and system for testing mobile user legality
CN101203052B (en) * 2007-12-24 2012-06-27 华为技术有限公司 Method and apparatus for preventing malice business request

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848462B (en) * 2009-03-23 2012-12-12 中国移动通信集团公司 Clone card location server, location detection method and system
CN102572827A (en) * 2010-12-07 2012-07-11 中国电信股份有限公司 Cloning machine discrimination method in mobile communication system and apparatus thereof
CN106686594A (en) * 2017-01-17 2017-05-17 北京首信科技股份有限公司 EVDO network authentication method and device
CN107343278A (en) * 2017-07-22 2017-11-10 杭州诚智天扬科技有限公司 The implementation method of number verification business is carried out by audio call
CN107343278B (en) * 2017-07-22 2021-03-19 杭州诚智天扬科技有限公司 Method for implementing number verification service through voice call
CN110234105A (en) * 2018-03-06 2019-09-13 中国移动通信有限公司研究院 Detect VLR whether the method and device of authentication denial service order

Also Published As

Publication number Publication date
CN101330756B (en) 2011-04-20

Similar Documents

Publication Publication Date Title
CN103634791B (en) Method, user equipment and the remote management platform of switch operators network
EP2547134B1 (en) Improved subscriber authentication for unlicensed mobile access signaling
US8682281B2 (en) Monitoring application and method for establishing emergency communication sessions with disabled devices based on transmitted messages
AU782981B2 (en) Fraud detection method for mobile telecommunication networks
CN103179504B (en) User validation determination methods and device, user access the method and system of mailbox
US20070072587A1 (en) Tracking roaming cellular telephony calls for anti-fraud and other purposes
US20080039048A1 (en) Emergency service provision for a supervised wireless device
CN101330756B (en) Intelligent network business implementing system and method for preventing user identification from being stolen
US6397056B1 (en) System and method for reducing network signaling load in a radio telecommunications network
CA2650029A1 (en) Method and apparatus for steering of roaming
US8804932B2 (en) Protection of services in mobile network against CLI spoofing
KR100507394B1 (en) A method for reducing fraudulent system access
WO2013037383A1 (en) Method for preventing fraud or misuse when using a specific service of a public land mobile network by a user equipment, subscriber identity module and application program
CN102905241B (en) A kind of USSD server, HLR server and the call transfer method based on USSD
CN100442930C (en) Mobile exchanging center and called parner processing method
US7924992B2 (en) Method of ensuring call processing for intelligent user
CN101159625B (en) System and method of implementing monitor for police for WiMAX
CN101431754B (en) Method for preventing clone terminal access
CN101420678B (en) Terminal closedown register method used for PHS system and PHS system implementing the method
CN101272538A (en) Method for locally processing inter-group service
CN101437214A (en) Method and apparatus for implementing back call
KR102440411B1 (en) Method and apparatus for detecting abnormal roaming request
KR101244288B1 (en) System and method for blocking illegal call of roaming subscriber
RU2719442C1 (en) Method of controlling connections in a mobile communication network under conditions when the number of the called subscriber is busy, a call was dropped or a network failure occurred
CN101047999B (en) Call continuing method, server and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant