CN101552988A - Terminal protecting methdo and system - Google Patents

Terminal protecting methdo and system Download PDF

Info

Publication number
CN101552988A
CN101552988A CNA2009101372443A CN200910137244A CN101552988A CN 101552988 A CN101552988 A CN 101552988A CN A2009101372443 A CNA2009101372443 A CN A2009101372443A CN 200910137244 A CN200910137244 A CN 200910137244A CN 101552988 A CN101552988 A CN 101552988A
Authority
CN
China
Prior art keywords
terminal
hlr
sim card
esn
current place
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2009101372443A
Other languages
Chinese (zh)
Inventor
林旭
袁迎峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNA2009101372443A priority Critical patent/CN101552988A/en
Publication of CN101552988A publication Critical patent/CN101552988A/en
Priority to PCT/CN2010/071982 priority patent/WO2010124579A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a terminal protecting method and system, wherein the terminal protecting method comprises: judging wether the prior terminal of the SIM card located is in consonance with the terminal of the SIM card located before by the SIM card; if not, sending authentication information to HLR by the SIM card, wherein the authentication information comprises ESN information of prior terminal; forbiding the prior location terminal accessing network when HLR judges that the terminal corresponding to ESN information is in lost reporting state. The method and system of the invention overcomes problem that other cards are available when the terminal is stolen, and the invention can be implemented simply and conveniently.

Description

Terminal protecting methdo and system
Technical field
The present invention relates to the communications field, in particular to a kind of terminal protecting methdo and system.
Background technology
Fig. 1 is the structural representation of communication system of the prior art, as shown in Figure 1, portable terminal (Mobile Terminal, abbreviate MT as) be linked into core network system by wireless network, core network element MSC (Mobile Switching Center, mobile switching centre), VLR (Visitor Location Register, VLR Visitor Location Register), HLR (Home LocationRegister, attaching position register), communicate by the NO7 signaling network between the AUC (AUC), wherein, MSC is used for being responsible for calling, the user continues, VLR is used for storing user's CAMEL-Subscription-Information temporarily, and HLR is used for forever preserving user's CAMEL-Subscription-Information and preserves user position information in real time.
Along with the application of the standard (Removable User Identity Module (R-UIM) For spread Spectrum Systems) of separation between machine and card, separation between machine and card is because only to need to change terminals (for example, mobile phone) convenient for users to use.But this has also caused terminal after stolen, the problem of using other SIM card just can continue to use.
In the ANSI41D agreement, authentication for terminal, need the information of service recorder in SIM card, this information can be AKEY, ESN (Electronic Serial Number, Electronic Serial Number) and IMSI (International Mobile Subscriber Identity, international mobile subscriber identity) etc.But the use that this method for authenticating can not limiting terminal after terminal is stolen, uses other card still can use this terminal.
At the stolen back still operable problem of card of using other of above-mentioned terminal, present solution is more.For example, providing for the user in the process of communication service, terminal IMEI (the International MobileEquipment Identity of business support system acquisition terminal number, correspondence, international mobile identification), service time and relevant user profile, then the user profile of gathering is saved in the BOSS system; When the user initiated to limit the use of certain terminal, operator judged according to the information of preserving whether the user has the right to carry out this operation.
But above-mentioned solution can not be applicable to the terminal of the support separation between machine and card of CDMA.Because after the separation between machine and card, terminal can't transmit terminal information to network side.In addition, this solution also needs to gather in advance user's information, and owing to need in advance the record end message, even so the user do not losing under the situation of terminal, also can't change terminal voluntarily, otherwise network is with all business of refusing user's.In a word, the inconvenient user's of this solution use, and can not limit use behind the terminal of supporting separation between machine and card stolen.
In sum, other the still operable problem of card is used in the stolen back of terminal that solves separation between machine and card simply and easily, is problem that needing to demand solution at present urgently.
Summary of the invention
At the stolen back still operable problem of card of using other of the terminal of above-mentioned present separation between machine and card, the present invention aims to provide a kind of improved terminal protection scheme, one of to address the above problem.
To achieve these goals, according to an aspect of the present invention, provide a kind of terminal protecting methdo.
This terminal protecting methdo comprises: SIM card judges that its current place terminal is whether consistent with the terminal at place before the SIM card; In judged result is that SIM card sends authentication message to HLR under the situation not, and wherein, authentication message comprises the ESN information of current place terminal; Judge at HLR that the terminal corresponding with ESN information is under the situation of the state of reporting the loss and forbid current place accessing terminal to network.
Preferably, above-mentioned authentication message also comprises the identification information of SIM card.
Preferably, said method also comprises: set up database in the HLR side in advance, wherein, database is used to store the ESN information of reporting the loss terminal of reporting of user.
Wherein, after HLR forbids current place accessing terminal to network, new database more.
This more the operation of new database comprise: SOT state of termination is changed to illegal state; The terminal that mark is corresponding with the identification information of SIM card.
And above-mentioned database also is used to store the time that the user reports the loss terminal.
To achieve these goals, according to a further aspect in the invention, provide a kind of terminal protection system.
Comprise according to terminal protection of the present invention system: receiver module, be positioned at end side, be used to receive the SIM card that is positioned at this terminal judge current place terminal whether with SIM card before the consistent judged result of terminal at place; Sending module is positioned at end side, is used for the judged result that receives at receiver module for not the time, sends the authentication message of the ESN information that comprises current place terminal to HLR, so that HLR judges whether to forbid current place accessing terminal to network according to ESN information; The access control module is positioned at the HLR side, is used for the ESN information of the current place terminal of the authentication message that sends according to sending module, and whether the current place of the State Control terminal that HLR judges the pairing terminal of ESN information access network.
Wherein, above-mentioned access control module is judged at HLR that the pairing terminal of ESN information is under the situation of the state of reporting the loss and is forbidden current place accessing terminal to network.
Said system also comprises: memory, be positioned at the HLR side, and be used to store the ESN information of reporting the loss terminal of reporting of user.
And said system also comprises: update module, be used for after the access control module is forbidden current place accessing terminal to network, and the state of terminal corresponding with ESN information in the memory is changed to illegal state, and the mark terminal corresponding with the identification information of SIM card.
By means of technique scheme one of at least, the present invention is by the terminal at SIM card place before judging its current place terminal and this SIM card when inconsistent, send the authentication message of the ESN information that comprises this current place terminal to HLR, so that HLR forbids this current place accessing terminal to network, overcome the still operable problem of card of using other after terminal is stolen, and the present invention realizes more simple and convenient.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the structural representation of related art communication system;
Fig. 2 is the flow chart according to the terminal protecting methdo of the embodiment of the invention;
Fig. 3 is the flow chart that writes down SIM card most recently used mobile phone ESN according to the HLR of the embodiment of the invention automatically;
Fig. 4 is the flow chart that the user of the stolen mobile phone of the application embodiment of the invention reports the loss mobile phone;
Fig. 5 is a process chart of using the restriction stolen mobile phone business of the embodiment of the invention;
Fig. 6 is the flow chart that SIM card is used the recovery business of normal mobile phone that is limited of using the embodiment of the invention;
Fig. 7 is the block diagram according to the terminal protection system of the embodiment of the invention;
Fig. 8 is the block diagram of terminal protection system according to the preferred embodiment of the invention.
Embodiment
Functional overview
As mentioned above, owing to can't limit use behind the terminal of supporting separation between machine and card stolen at present, based on this, the invention provides a kind of improved terminal protection scheme, to solve the still operable problem of card that other are used in the stolen back of terminal simply and easily.Basic thought of the present invention is: (this terminal is supported separation between machine and card to terminal, be designated as terminal 1) start after, SIM card wherein judges whether the terminal at place is consistent before terminal 1 and the SIM card, in judged result when being inconsistent, SIM card sends the authentication message of the ESN information that comprises this terminal 1 to HLR, HLR determines the state (i.e. the state of the terminal 1 of recording in the HLR sidelights) of the terminal corresponding with ESN information according to this authentication message, if the state of the terminal corresponding with ESN information is for reporting the loss, show that then this terminal 1 may be stolen, at this moment, HLR forbids terminal 1 access network.
Based on network configuration shown in Figure 1, below with reference to the accompanying drawings and in conjunction with the embodiments, describe the present invention in detail.Need to prove that if do not conflict, embodiment and the feature among the embodiment among the application can make up mutually.
According to the embodiment of the invention, a kind of terminal protecting methdo is provided, this method can limit the use of stolen terminal, thereby plays antitheft effect.
Fig. 2 is the flow chart according to the terminal protecting methdo of the embodiment of the invention, and as shown in Figure 2, the flow process of this terminal protecting methdo comprises step 202-206:
Step 202, SIM card judge that its current place terminal is whether consistent with the terminal at place before the SIM card;
Step 204 is that SIM card sends authentication message to HLR under the situation not in judged result, and wherein, authentication message comprises the ESN information of current place terminal, and preferably, this authentication message can also comprise the identification information of this SIM card;
Step 206 is judged at HLR that the pairing terminal of ESN information is under the situation of the state of reporting the loss and is forbidden current place accessing terminal to network.
By above description as can be seen, when starting up of terminal, send the ESN information of this terminal to HLR by SIM card wherein, so that HLR judges whether to agree this accessing terminal to network according to the state of the terminal of this ESN information correspondence, like this, under the situation that this terminal is reported the loss, this terminal just can't access network, thereby limited the use of this terminal, and then played antitheft effect.
Preferably, can set up database in the HLR side, this database is used to store the ESN information of reporting the loss terminal of reporting of user, can also preserve the time that the user reports the loss terminal, also can write down the identification information of the SIM card of each terminal correspondence.That is,, comprise for each data cell: report the loss terminal ESN information, report the loss the identification information of time and corresponding SIM card.
When HLR forbids accessing terminal to network, just need to upgrade this database, promptly, the state of this terminal is changed to illegally, show this terminal stolen and other people want to use, and more the operation of new database also comprises the corresponding terminal of identification information of the SIM card of carrying in mark and the authentication message.
Below describe the terminal protecting methdo of the preferred embodiment of the present invention in detail, this terminal protecting methdo may further comprise the steps 1-6, and wherein, this terminal can be a mobile phone.
Step 1: at first, set up the database (this database is above-mentioned database) of mobile phone ESN blacklist in the HLR side, this database is used to write down the ESN of stolen mobile phone;
Step 2: corresponding to above-mentioned steps 202 and 204, behind the mobile phone power-on, whether the ESN that SIM card wherein detects this mobile phone is consistent with the ESN of mobile phone at place before this SIM card, if it is inconsistent, then the SIM card simulation short message rises and exhales, for example, can be point-to-point sending SMS message (Short Message Delivery Point-to-Point, abbreviate SMDPP as), short message content is the ESN of this mobile phone, the note classification is SMS_TeleserviceIdentifier, and the parameter of note classification is set to 65000;
Step 3:MSC is set to 65000 short message to the SMS_TeleserviceIdentifier parameter and sends to HLR according to IMSI;
Step 4: corresponding to above-mentioned steps 206, after HLR receives SMDPP message, be set to 65000 according to the SMS_TeleserviceIdentifier parameter, whether the ESN that judges the mobile phone in this short message content is the ESN that has reported the loss mobile phone in the database, if, then return refusal and insert message and give MSC, in order to avoid mobile phone, makes all business that MSC can limiting handset owing to do not know refusal and insert former thereby frequently send the mobile phone registration message to MSC;
Step 5: simultaneously, mobile logo number (mobileidentification number abbreviates MIN as) information that HLR carries according to SMDPP navigates to user corresponding in the database, and the user of mark correspondence, and this state of user is changed to illegally;
Step 6: mobile phone is being initiated in the enrollment process subsequently, and HLR detects this state of user for illegal according to MIN, thus the refusal of registration and then limit all business of this mobile phone.
In practical operation, in each HLR, keep synchronous for the mobile phone ESN blacklist in the same operator.And HLR indicates by MIN can note any user's most recently used N portion's mobile phone (ESN of N mobile phone) automatically, prepares against when reporting the loss and uses.In addition, if above-mentioned SIM card is inserted normal mobile phone (this normal mobile phone is with respect to above-mentioned stolen mobile phone), then this card can recover to use (with reference to flow process shown in Figure 6).
Fig. 3 is the flow chart that writes down SIM card most recently used mobile phone ESN according to the HLR of the embodiment of the invention automatically, and as shown in Figure 3, this flow process comprises:
Step 301, the user inserts SIM card in mobile phone, and start;
Step 302, corresponding to above-mentioned steps 202, SIM card reads the ESN of this mobile phone, finds the mobile phone before not being, then proceeds to step 303;
Step 303, corresponding to above-mentioned steps 204, SIM card sends the SMSDPP request message, carries the ESN of this mobile phone among the message body SMS_BearerData, and the SMS_TeleserviceIdentifier that is designated of message is 65000;
Step 304, MSC sends out the HLR of message to the mobile phone ownership according to SMS_TeleserviceIdentifier (65000) according to the IMSI addressing;
Step 305, corresponding to step 206, HLR receives the SMSDPP request message that MSC sends, and HLR decodes to SMSDPP request message parameter, and decoded message parameter comprises MIN, SMS_TeleserviceIdentifier and SMS_BearerData.The SMS_TeleserviceIdentifier value is 65000 in the SMSDPP request message, so enter the ESN identification process: the blacklist table of mobile phone ESN in the reading database, whether detect current mobile phone reports the loss, if find that this mobile phone ESN is not in blacklist list, show that then current mobile phone is legal, then current ESN is updated to this MIN corresponding user data in the database;
Step 306, HLR handles successful response for the MSC return messages;
Step 307, MSC returns note to mobile phone and works the response of exhaling success.
Below in conjunction with Fig. 4, Fig. 5 and Fig. 6, the application scenarios of the embodiment of the invention is described, wherein, scene one is the flow process that the user of the stolen mobile phone of the application embodiment of the invention shown in Figure 4 reports the loss mobile phone, scene two is handling processes of the restriction stolen mobile phone business of the application embodiment of the invention shown in Figure 5, and scene three is the flow processs that SIM card is used the recovery business of normal mobile phone that are limited of the application embodiment of the invention shown in Figure 6.
Scene one
As shown in Figure 4, the user of the stolen mobile phone flow process of reporting the loss mobile phone comprises:
Step 401, after the user found that the mobile phone of oneself is lost, contact client service center required to report the loss mobile phone;
Step 402, client service center gets access to the ESN of the mobile phone that uses before the user according to user's number;
Step 403, client service center adds the ESN that gets access to in HLR (i.e. HLR1 among the figure) the mobile phone ESN blacklist of mobile phone ownership;
Step 404, the HLR of ownership is synchronized to the record of mobile phone ESN blacklist in other HLR (only illustrating among the figure, i.e. HLR2) database of this operator automatically;
Step 405, this step are the alternative steps of step 404, notify all HLR of local exchange that this is reported the loss mobile phone by client service center and record in the mobile phone ESN blacklist.
Scene two
As shown in Figure 5, the flow process of the processing procedure of restriction stolen mobile phone business comprises:
Step 501, certain user starts shooting insert SIM card in stolen mobile phone after;
Step 502, corresponding to above-mentioned steps 202, SIM card reads the ESN of this mobile phone, finds the mobile phone before not being, then proceeds to step 503;
Step 503, corresponding to above-mentioned steps 204, SIM card is constructed a SMSDPP request message, carries the ESN of this mobile phone among the message body SMS_BearerData, and the SMS_TeleserviceIdentifier that is designated of message is 65000;
Step 504, MSC sends out the HLR of message to the mobile phone ownership according to SMS_TeleserviceIdentifier (65000) according to the IMSI addressing;
Step 505, corresponding to step 206, HLR receives the SMSDPP request message that MSC sends, and HLR decodes to SMSDPP request message parameter, and decoded message parameter comprises MIN, SMS_TeleserviceIdentifier and SMS_BearerData.The SMS_TeleserviceIdentifier value is 65000 in the SMSDPP request message, then, enter the ESN identification process: ESN among the message body BearerData and the mobile phone ESN blacklist in the database are compared, found that this is a mobile phone of having reported the loss, write down the current time and the MIN of this SIM card, and sending alarm, there is illegal mobile phone activity in prompting operator; MIN according to SIM card finds corresponding user and state of user is revised as " stolen mobile phone " by " normally ";
Step 506, HLR handles successful response for the MSC return messages;
Step 507, MSC handles successful response for the SIM card return messages;
Step 508, mobile phone is initiated enrollment process;
Step 509, MSC initiates registration message to HLR;
Step 510 after HLR receives registration message, checks that state of user is " stolen mobile phone ";
Step 511, HLR refuses this user's registration.
Scene three
As shown in Figure 6, being limited SIM card uses the flow process of the recovery business of normal mobile phone to comprise:
Step 601, the user starts shooting insert SIM card in normal mobile phone after;
Step 602, corresponding to above-mentioned steps 202, SIM card reads the ESN of this mobile phone, finds the mobile phone before not being, then proceeds to step 603;
Step 603, corresponding to above-mentioned steps 204, SIM card is constructed a SMSDPP request message, carries the ESN of this mobile phone among the message body SMS_BearerData, and the SMS_TeleserviceIdentifier that is designated of message is 65000;
Step 604, MSC sends out the HLR of message to the mobile phone ownership according to SMS_TeleserviceIdentifier (65000) according to the IMSI addressing;
Step 605, corresponding to step 206, after HLR receives the message of SMDPP, enter the ESN identification process according to SMS_TeleserviceIdentifier (65000): ESN among the message body BearerData and the mobile phone ESN blacklist in the database are compared, the result does not match, that is to say that current phone is not reported the loss, then the User Status with the MIN correspondence of this SIM card is revised as " normally " from " stolen mobile phone ";
Step 606, HLR handles successful response for the MSC return messages;
Step 607, MSC handles successful response for the SIM card return messages;
Step 608, mobile phone is initiated enrollment process;
Step 609, MSC initiates registration message to HLR;
Step 610 after HLR receives registration message, checks that state of user is " normally ";
Step 611, HLR accepts this user's registration and returns the successful response of registration, realizes that this card turns back to normal condition from professional restriction state.
Need to prove, for convenience of description, in Fig. 2 to Fig. 6, illustrated and described the technical scheme of method embodiment of the present invention, can in computer system, carry out such as a set of computer-executable instructions in the step shown in Fig. 2 to Fig. 6 with the form of step.Though logical order has been shown in Fig. 2 to Fig. 6, in some cases, can have carried out step shown or that describe with the order that is different from herein.
Device embodiment
According to the embodiment of the invention, a kind of terminal protection system is provided, preferably, this system is used for realizing the method for said method embodiment.Fig. 7 is the block diagram of this terminal protection system, and as shown in Figure 7, this system comprises: receiver module 1, sending module 2 and access control module 3, wherein:
Receiver module 1, be positioned at end side, be used to receive the SIM card that is positioned at this terminal judge current place terminal whether with SIM card before the consistent judged result of terminal at place, preferably, this receiver module is used for receiving the judged result of the step 202 of said method embodiment;
Sending module 2, be positioned at end side, be connected to receiver module 1, be used for the judged result that receives at receiver module 1 for not the time, send the authentication message of the ESN information comprise current place terminal to HLR, so that HLR judges whether to forbid current place accessing terminal to network according to ESN information; Preferably, this sending module is used for realizing the step 204 of said method embodiment;
Access control module 3, be positioned at the HLR side, be connected to sending module 2, the ESN information that is used for the current place terminal of the authentication message that sends according to sending module 2, whether the current place of the State Control terminal that HLR judges the pairing terminal of ESN information access network, wherein, judge at HLR that the pairing terminal of ESN information is under the situation of the state of reporting the loss and forbid current place accessing terminal to network.Preferably, this access control module is used for realizing the step 206 of said method embodiment.
By above description as can be seen, is under the inconsistent situation by sending module in the judged result that receiver module receives, transmission has been carried the authentication message of ESN information of this terminal to the access control module, so that the access control module is according to the whether access network of this terminal of State Control of the terminal corresponding with ESN information, than prior art, the technical scheme that the embodiment of the invention provides has overcome the still operable problem of card of using other after terminal is stolen simply and easily.
Preferably, said system also comprises memory shown in Figure 84 and update module 5, these two modules are positioned at the HLR side, wherein, memory 4 is connected to access control module 3, be used to store the ESN information of reporting the loss terminal of reporting of user, preferably, the memory stores here the database among the said method embodiment (database that has promptly comprised the blacklist table of mobile phone ESN); Update module 5 is connected to memory 4, is used for after access control module 3 is forbidden current place accessing terminal to network, and to being changed to illegal state with the state of the pairing terminal of ESN information in the memory 4, and the mark terminal corresponding with the identification information of SIM card.
More than the function of each module can repeat no more here with reference to the associated description among the said method embodiment.
The present invention monitors effectively and has stoped the continuation of the stolen mobile phone of CDMA separation between machine and card to be used, and effectively raises the convenience (report the loss after only needing user mobile phone to lose get final product, do not need prior Information Monitoring) of cellphone subscriber's operation.The method and system of the CDMA separation between machine and card hand-set from stolen that the present invention realizes, do not need to increase extras, do not need to set up separately the EIR entity, do not need to increase new message definition, the method and system of CDMA separation between machine and card hand-set from stolen can be provided for the system of CDMA on the basis of system software upgrading and upgrading SIM card.The present invention's operation is more flexible, can not increase the normal service fulfillment workload of operator.
In sum, the embodiment of the invention is in advance at the blacklist table that mobile phone ESN is set of HLR side, sends the ESN of mobile phone the mobile phone power-on time to HLR by standard message (SMDPP), and this mobile phone ESN that reports is authenticated; For legal mobile phone, write down the ESN and the user profile of this mobile phone, look into usefulness in order to reporting the loss next time; For reporting the loss mobile phone, record and the activity of reporting illegal mobile phone are taked further step for operator in HLR, by revising all business that the SIM card state that uses illegal mobile phone limits this card, business still can be recovered after changing to normal mobile phone, thereby limited the use of stolen mobile phone, played antitheft effect.In addition, realize that the present invention does not need to increase extras, do not need to set up separately the EIR entity, do not need to increase new message definition yet, the technical scheme of the embodiment of the invention can be provided for the system of CDMA on the basis of system software upgrading and upgrading SIM card, can not increase the normal service fulfillment workload of operator like this.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with the general calculation device, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the storage device and carry out by calculation element, perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a terminal protecting methdo is characterized in that, comprising:
SIM card judges that its current place terminal is whether consistent with the terminal at place before the described SIM card;
In judged result is that described SIM card sends authentication message to HLR under the situation not, and wherein, described authentication message comprises the ESN information of described current place terminal;
Judge at described HLR that the terminal corresponding with described ESN information is under the situation of the state of reporting the loss and forbid described current place accessing terminal to network.
2. method according to claim 1 is characterized in that described authentication message also comprises the identification information of described SIM card.
3. method according to claim 2 is characterized in that, described method also comprises:
Set up database in the HLR side in advance, wherein, described database is used to store the ESN information of reporting the loss terminal of reporting of user.
4. method according to claim 3 is characterized in that, after HLR forbade described current place accessing terminal to network, described method also comprised: upgrade described database.
5. method according to claim 4 is characterized in that, the operation of upgrading described database comprises:
Described SOT state of termination is changed to illegal state; And
The terminal that mark is corresponding with the identification information of described SIM card.
6. according to each described method in the claim 1 to 5, it is characterized in that described database also is used to store the time that the user reports the loss terminal.
7. a terminal protection system is characterized in that, comprising:
Receiver module is positioned at end side, be used to receive the SIM card that is positioned at this terminal judge current place terminal whether with described SIM card before the consistent judged result of terminal at place;
Sending module, be positioned at end side, be used for the judged result that receives at receiver module for not the time, send the authentication message of the ESN information that comprises described current place terminal to HLR, so that HLR judges whether to forbid described current place accessing terminal to network according to described ESN information;
The access control module, be positioned at the HLR side, the ESN information that is used for the described current place terminal of the described authentication message that sends according to sending module, whether the described current place of the State Control terminal that described HLR judges the pairing terminal of described ESN information access network.
8. system according to claim 7 is characterized in that, described access control module is judged at described HLR that the pairing terminal of described ESN information is under the situation of the state of reporting the loss and forbidden described current place accessing terminal to network.
9. system according to claim 7 is characterized in that, described system also comprises:
Memory is positioned at the HLR side, is used to store the ESN information of reporting the loss terminal of reporting of user.
10. system according to claim 9 is characterized in that, described system also comprises:
Update module is used for after described access control module is forbidden described current place accessing terminal to network, and the state of terminal corresponding with described ESN information in the described memory is changed to illegal state, and the mark terminal corresponding with the identification information of described SIM card.
CNA2009101372443A 2009-04-28 2009-04-28 Terminal protecting methdo and system Pending CN101552988A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNA2009101372443A CN101552988A (en) 2009-04-28 2009-04-28 Terminal protecting methdo and system
PCT/CN2010/071982 WO2010124579A1 (en) 2009-04-28 2010-04-21 Method and system for terminal protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2009101372443A CN101552988A (en) 2009-04-28 2009-04-28 Terminal protecting methdo and system

Publications (1)

Publication Number Publication Date
CN101552988A true CN101552988A (en) 2009-10-07

Family

ID=41156906

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2009101372443A Pending CN101552988A (en) 2009-04-28 2009-04-28 Terminal protecting methdo and system

Country Status (2)

Country Link
CN (1) CN101552988A (en)
WO (1) WO2010124579A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010124579A1 (en) * 2009-04-28 2010-11-04 中兴通讯股份有限公司 Method and system for terminal protection
CN103188672A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data protection method thereof
CN103379478A (en) * 2012-04-25 2013-10-30 腾讯科技(深圳)有限公司 Control method, control system, client terminal and server
CN106162630A (en) * 2016-06-21 2016-11-23 贵州电网有限责任公司电力调度控制中心 The encryption guard system of a kind of terminal unit and method
EP3160177A1 (en) * 2015-10-23 2017-04-26 Gemalto Sa Method, server and system for managing a subscriber to a first network
WO2017181550A1 (en) * 2016-04-19 2017-10-26 北京小米移动软件有限公司 Account-theft protection method, device, and system
CN109005543A (en) * 2018-09-03 2018-12-14 上海欣方智能系统有限公司 A kind of system and method used based on IMEI limitation mobile phone
CN109816365A (en) * 2018-12-28 2019-05-28 桂林市鼎耀信息科技有限公司 Plug-in type net joins automobile edge computing terminal system
CN110191464A (en) * 2019-05-29 2019-08-30 恒宝股份有限公司 A kind of method and system for preventing SIM card stolen
CN111010694A (en) * 2019-12-19 2020-04-14 北京首信科技股份有限公司 Mobile communication method and electronic equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI952146A (en) * 1995-05-04 1996-11-05 Nokia Telecommunications Oy Checking the eligibility of a subscriber device
CN1691578A (en) * 2004-04-29 2005-11-02 华为技术有限公司 A method of self validity verification for an equipment
CN100442919C (en) * 2005-04-13 2008-12-10 华为技术有限公司 Method for calling mobile station
CN101022637A (en) * 2007-03-09 2007-08-22 华为技术有限公司 Method and device for testing mobile device
CN101552988A (en) * 2009-04-28 2009-10-07 中兴通讯股份有限公司 Terminal protecting methdo and system

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010124579A1 (en) * 2009-04-28 2010-11-04 中兴通讯股份有限公司 Method and system for terminal protection
CN103188672A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data protection method thereof
CN103379478A (en) * 2012-04-25 2013-10-30 腾讯科技(深圳)有限公司 Control method, control system, client terminal and server
CN103379478B (en) * 2012-04-25 2015-05-27 腾讯科技(深圳)有限公司 Control method, control system, client terminal and server
WO2017067866A1 (en) * 2015-10-23 2017-04-27 Gemalto Sa Method, server and system for managing a subscriber to a first network
EP3160177A1 (en) * 2015-10-23 2017-04-26 Gemalto Sa Method, server and system for managing a subscriber to a first network
WO2017181550A1 (en) * 2016-04-19 2017-10-26 北京小米移动软件有限公司 Account-theft protection method, device, and system
CN106162630A (en) * 2016-06-21 2016-11-23 贵州电网有限责任公司电力调度控制中心 The encryption guard system of a kind of terminal unit and method
CN106162630B (en) * 2016-06-21 2023-03-10 贵州电网有限责任公司电力调度控制中心 Encryption protection method for terminal equipment
CN109005543A (en) * 2018-09-03 2018-12-14 上海欣方智能系统有限公司 A kind of system and method used based on IMEI limitation mobile phone
CN109005543B (en) * 2018-09-03 2021-06-01 上海欣方智能系统有限公司 System and method for limiting mobile phone use based on IMEI
CN109816365A (en) * 2018-12-28 2019-05-28 桂林市鼎耀信息科技有限公司 Plug-in type net joins automobile edge computing terminal system
CN110191464A (en) * 2019-05-29 2019-08-30 恒宝股份有限公司 A kind of method and system for preventing SIM card stolen
CN111010694A (en) * 2019-12-19 2020-04-14 北京首信科技股份有限公司 Mobile communication method and electronic equipment

Also Published As

Publication number Publication date
WO2010124579A1 (en) 2010-11-04

Similar Documents

Publication Publication Date Title
CN101552988A (en) Terminal protecting methdo and system
US8515390B2 (en) System and method for protecting data in wireless devices
EP2374261B1 (en) Method for automatically transferring an application in a mobile communication terminal of telecommunication networks
US6681111B2 (en) Roaming service system for GSM service subscriber in CDMA service area, and method for registering locations and transmitting and receiving signals and short messages using the system
US8639290B2 (en) UICC control over devices used to obtain service
CN101904188B (en) Method and system for preventing use of stolen terminal through forced location re-registration
CN102833699B (en) Method, system and the mobile communication terminal of simulation bilateral function
CN108200568B (en) Mobile communication electronic SIM card data processing method and device
RU2007138035A (en) WIRELESS DATA EXCHANGE
US20030181219A1 (en) Method of indicating unauthorized use of a mobile terminal
MX2014003351A (en) Managing mobile device identities.
KR100431563B1 (en) Mobile-station adapted for removable user identity modules
US8874170B2 (en) Chip card, an electronic system, a method being implemented by a chip card and a computer program product
CN111526500A (en) Code number switching method and system
CN108432339B (en) Wireless communication network registration method and terminal
US8583081B2 (en) Method for calculating a first identifier of a secure element of a mobile terminal according to a second identifier of said secure element
CN101516087A (en) Storage system of mobile terminal and access control method
CN101232677A (en) Method and apparatus for start-up logging of mobile terminal
CN103546873A (en) Push-to-talk processing method and device
CN101925049B (en) Air interface business processing method and terminal
CN105246125A (en) Network access control method and terminal
CN112469042B (en) System for locking bound equipment, module and subscriber identity module
CN111372237B (en) eSIM card operator file management method and device
JP6010637B2 (en) Smart card personalization
CN100415032C (en) Interaction method for mobile terminal and network side in mobile communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20091007