CN102055550A - International mobile equipment identity (IMEI) code and network transmission structure and verification method of same - Google Patents

International mobile equipment identity (IMEI) code and network transmission structure and verification method of same Download PDF

Info

Publication number
CN102055550A
CN102055550A CN2009101982603A CN200910198260A CN102055550A CN 102055550 A CN102055550 A CN 102055550A CN 2009101982603 A CN2009101982603 A CN 2009101982603A CN 200910198260 A CN200910198260 A CN 200910198260A CN 102055550 A CN102055550 A CN 102055550A
Authority
CN
China
Prior art keywords
imei
coding
code
write
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2009101982603A
Other languages
Chinese (zh)
Other versions
CN102055550B (en
Inventor
郭伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leadcore Technology Co Ltd
Original Assignee
Leadcore Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leadcore Technology Co Ltd filed Critical Leadcore Technology Co Ltd
Priority to CN2009101982603A priority Critical patent/CN102055550B/en
Publication of CN102055550A publication Critical patent/CN102055550A/en
Application granted granted Critical
Publication of CN102055550B publication Critical patent/CN102055550B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the field of mobile communication, in particular to an international mobile equipment identity (IMEI) code which is applied to a terminal and a network transmission structure and a verification method of the same. The IMEI code is set by a terminal factory or mobile operator software and comprises a string of code word sequences, wherein the code word sequences can represent a model approval number, a final assembly number, a production sequence number and a verification code respectively; each code word sequence also comprises a password consisting of n numbers or characters; n is a positive integer which is more than or equal to 1; and the password cannot be displayed or inquired on the terminal. The invention also provides a network transmission structure of the IMEI code and a verification method which adopts the IMEI code and the network transmission structure. The method comprises the following steps that: a mobile network requires the terminal to report the IMEI code; the terminal reports the IMEI code to the mobile network according to the network transmission structure; and the mobile network verifies the password in the IMEI code.

Description

The network transport infrastructure and the verification method of IMEI coding, this IMEI coding
Technical field
The present invention relates to moving communicating field, relate in particular to a kind of IMEI coding of terminal, the network transport infrastructure and verification method of this IMEI coding of being applied to.
Background technology
IMEI (International Mobile Equipment Identity) is the abbreviation of International Mobile Equipment Identity sign indicating number, the international equipment identification code that moves, form " electronics string number " by 15 bit digital, it is corresponding one by one with every mobile phone, and is that the whole world is unique.Each mobile phone all will be endowed a globally unique group coding after assembling is finished, this coding is from producing to institute of the manufacturer record that is delivered for use all manufactured production.The correctness of present mobile network's verification terminal IMEI coding comprises the steps: that the mobile network can require the terminal to report Termination ID, and its type comprises the IMEI coding; Behind the IMEI coding of terminal to report oneself, its legitimacy of network verification is if illegal IMEI coding is just refused the service of back.
Yet, because the IMEI coding is announced, the IMEI coding of legal terminal is directly usurped by therefore present a lot of illegal manufacturers, cause different terminals to have same IMEI coding, then just make a lot of terminals that do not detect flow into market through country's networking, bring a lot of potential safety hazards, also caused the disorderly competition in market.For example, possess at a mobile phone under the situation of an IMEI coding, if there are illegal activities in certain user, public security authorities can find the caller by the IMEI coding of mobile phone.If user's hand-set from stolen, operator can also be by IMEI coding forbidding stolen mobile phone.In case a large amount of mobile phones use same IMEI coding, when public security authorities trace terminal stolen, that lose by inquiry IMEI coding, and when following the trail of the mobile phone that the offender uses, then can't directly orient which mobile phone is that they are needed.If, then having the legal terminal that this IMEI encodes with the locking of the IMEI of certain terminal coding and refusal is its service, might can not use on network because of getting involved of illegal terminal.
Summary of the invention
The object of the present invention is to provide the network transport infrastructure and the verification method of a kind of IMEI coding that is applied to terminal, this IMEI coding, it can prevent effectively that the IMEI coding from duplicating and usurp.
For achieving the above object, embodiments of the invention adopt following technical scheme:
The invention provides a kind of IMEI coding, by terminal producer or mobile operator software setting, described IMEI coding comprise string of code word sequence, described codeword sequence can represent respectively the model approval code, at last assemble number, produce serial number and check code; Described codeword sequence also comprises the password that is made of n numeral or character, and wherein n is the positive integer more than or equal to 1; Described password can not show or inquiry in terminal.
As a further improvement on the present invention, described model approval code, assemble number and produce serial number and check code constitutes one 15 bit word sequence at last.
As a further improvement on the present invention, described password can be set at relation one to one with 15 bit word sequences.
The present invention also provides a kind of network transport infrastructure of IMEI coding, is applied to communicate by letter between terminal and the mobile network, and described transformat comprises a plurality of octets; Wherein, described byte comprises:
A byte that is used to write mobile identification code is convenient to the mobile network and is discerned the IMEI coding;
A byte that writes the IMEI code length;
A plurality of bytes, be used for writing successively the model approval code, at last assemble number, produce serial number and check code; And,
A plurality of bytes are used for writing successively password.
As a further improvement on the present invention, move described network transport infrastructure and also comprise a byte, preceding 4 of this byte are used to write parity check code.
As a further improvement on the present invention, 4 bit word that can write the IMEI coding of a byte, promptly a byte can write 2 bit word.
As a further improvement on the present invention,
Preceding 4 of the 3rd byte are used to write, back 4 the 1st bit word that write IMEI;
Preceding 4 the 2nd bit word that are used to write IMEI of the 4th byte, back 4 the 3rd bit word that are used to write IMEI; By that analogy,
Preceding 4 p bit word that are used to write IMEI of the 10th byte, back 4 p position codings (wherein p is a positive integer, 16>p>3) that are used to write IMEI;
Preceding 4 first bit word that are used to write password of the 11st byte, back 4 the 2nd bit word that are used to write password; By that analogy,
Preceding 4 n bit word that are used to write password of 10+n byte, back 4 n+1 bit word that are used to write password write up to password and to finish, and n is the positive integer more than or equal to 1.
The present invention also provides the verification method of a kind of IMEI of employing coding and network transport infrastructure, comprises the steps:
Step 1, mobile network require terminal to report IMEI coding;
Step 2, terminal report to the mobile network with the IMEI coding according to described network transport infrastructure;
This method further comprises: the mobile network verifies the password that comprises in the IMEI coding.
As a further improvement on the present invention, the mobile network at first recognizes the IMEI coding by mobile identification code, and then whether detects the IMEI code length greater than 15; If greater than 15, the mobile network takes out the code word of the 15th bit word back, and judges whether the code word of taking out is correct, if correct, judges that then this IME I coding is legal, if incorrect, judges that then this IMEI is illegal.
As a further improvement on the present invention, the mobile network at first recognizes the IMEI coding by mobile identification code, and then the cryptopart of identification IMEI coding; The mobile network takes out cryptopart, and judges whether password is correct, if correct, judges that then this IMEI coding is legal, if incorrect, judges that then this IMEI is illegal.
Adopt technology of the present invention, legal IMEI coding is difficult to be usurped by illegal manufacturer, has effectively improved fail safe and high usage that terminal is used.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 adopts the verification method flow chart of IMEI coding for the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
The present invention expands on the basis of existing IMEI coding, be about to existing IMEI coding and expand to the codeword sequence that the IMEI+ password constitutes, IMEI coding after the expansion is greater than 15, wherein cryptopart be set at before dispatching from the factory by terminal producer underground, can't be by terminal inquiry to cryptopart.Wherein 15 IMEI coding is: the 1st bit word to the 6 bit word are " model approval code " (TAC, Type ApprovalCode), the general proxy type; The 7th bit word and the 8th bit word are " at last assembling number " (FAC, FinalAssembly Code), the general proxy place of production; The 9th bit word to the 14 bit word are " string number " (SNR, Serial Number), and general proxy is produced serial number; The 15th is that coding is check code (SP).Password is made of n numeral or character, and wherein n is the positive integer more than or equal to 1.
See also table 1, IMEI coding comprises a plurality of octets (octet1, octet2.......) by terminal to report to mobile network's transmission structure.Wherein,
The 1st byte writes mobile identification code (Mobile Identity IEI), and this sign indicating number is convenient to the mobile network and is discerned IMEI coding;
The 2nd byte writes IMEI length (Length of mobile identity contents), is convenient to the length that the mobile network discerns the IMEI coding;
Preceding 4 of the 3rd byte are used to write parity check code (Type of identity), back 4 the 1st bit word that write the IMEI coding;
Preceding 4 the 2nd bit word that are used to write the IMEI coding of the 4th byte, back 4 the 3rd bit word that are used to write the IMEI coding; By that analogy, then,
Preceding 4 the 14th bit word that are used to write the IMEI coding of the 10th byte, back 4 the 15th bit word that are used to write IME I coding.
The present invention has increased a plurality of bytes, writes password since the 11st byte, supposes that password has 6, then:
Preceding 4 the 1st bit word that are used to write password of the 11st byte, back 4 the 2nd bit word that are used to write password; By that analogy, then
Preceding 4 the 5th bit word that are used to write password of the 13rd byte, back 4 the 6th bit word that are used to write password.
Table 1
The IMEI coding is configured by producer before terminal is dispatched from the factory, in preferred embodiment of the present invention, producer writes mobile phone with IMEI and its corresponding password, password has uniqueness, and when realizing that by software terminal phone is checked IMEI, cryptopart does not show that promptly the IMEI coding is checked in input " * #06# " operation on mobile phone, and then terminal only shows preceding 15 bit word of IMEI coding.
The present invention also provides a kind of checking IMEI Methods for Coding, and this method comprises the steps:
Step 1, mobile network require terminal to report IMEI coding;
Step 2, terminal report to the mobile network with the IMEI coding by above-mentioned transmission structure;
Step 3, mobile network at first recognize the IMEI coding by mobile identification code, and then whether detect the IMEI code length greater than 15; If greater than 15, execution in step 4; If smaller or equal to 15, the mobile network judges whether IMEI all code words of encoding are correct, if correct, judges that then this terminal is legal, if incorrect, judges that then this terminal is illegal;
Step 4, the numeral after 15 bit word is taken out, be about to password and take out.
Step 5, mobile network judge whether the taking-up password is correct; If correct, judge that then this IMEI is legal, if incorrect, judge that then this IMEI is illegal.
In step 5, the mobile network need transfer special password database and search for the correctness of judging password, 15 bit word-password database one to one before so the mobile network has, if the mobile network monitors the IMEI code length greater than 15, then 15 bit word and cryptopart are all taken out, transfer above-mentioned database, verify.
In actual applications, legal terminal can arrive the Mobile Network Operator place and carry out software upgrading, is new IMEI coding with former IMEI coding in the existing terminal by adding password change, i.e. " former IMEI+ password " structure, operator is updated to existing IMEI database with the new IMEI coding of this terminal simultaneously, and the illegal terminal of usurping former IMEI coding like this will be moved the network denial of service.In addition, the mobile network has had an IMEI database at present, only need set up a cryptographic libraries again, and the mobile network calls this cryptographic libraries separately in proof procedure; Perhaps set up one with existing IMEI database in the cryptographic libraries one to one of encoding, also can realize checking.
The above; only be the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; can expect easily changing or replacing, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion by described protection range with claim.

Claims (10)

1. IMEI coding, by terminal producer or mobile operator software setting, described IMEI coding comprise string of code word sequence, described codeword sequence can represent respectively the model approval code, at last assemble number, produce serial number and check code; It is characterized in that described codeword sequence also comprises the password that is made of n numeral or character, wherein n is the positive integer more than or equal to 1; Described password can not show or inquiry in terminal.
2. IMEI according to claim 1 coding is characterized in that, described model approval code, assembles number and produce serial number and check code constitutes one 15 bit word sequence at last.
3. IMEI coding according to claim 2 is characterized in that, described password can be set at relation one to one with 15 bit word sequences.
4. the network transport infrastructure of an IMEI coding as claimed in claim 1 is applied to communicate by letter between terminal and the mobile network, it is characterized in that described transformat comprises a plurality of octets; Wherein, described byte comprises:
A byte that is used to write mobile identification code is convenient to the mobile network and is discerned IME I coding;
A byte that writes the IMEI code length;
A plurality of bytes, be used for writing successively the model approval code, at last assemble number, produce serial number and check code; And
A plurality of bytes are used for writing successively password.
5. the network transport infrastructure of IMEI coding according to claim 4 is characterized in that described network transport infrastructure also comprises a byte, and preceding 4 of this byte is used to write parity check code.
6. the network transport infrastructure of IMEI coding according to claim 4 is characterized in that, 4 bit word that can write the IMEI coding of a byte, and a byte can write 2 bit word.
7. the network transport infrastructure of IMEI coding according to claim 6 is characterized in that,
Preceding 4 of the 3rd byte are used to write parity check code, back 4 the 1st bit word that write IMEI;
Preceding 4 the 2nd bit word that are used to write IMEI of the 4th byte, back 4 the 3rd bit word that are used to write IMEI; By that analogy,
Preceding 4 p bit word that are used to write IMEI of the 10th byte, back 4 p position codings (wherein p is a positive integer, 16>p>3) that are used to write IMEI;
Preceding 4 first bit word that are used to write password of the 11st byte, back 4 the 2nd bit word that are used to write password; By that analogy,
Preceding 4 n bit word that are used to write password of 10+n byte, back 4 n+1 bit word that are used to write password write up to password and to finish, and n is the positive integer more than or equal to 1.
8. a verification method that adopts claim 1 or 4 described IMEI codings and network transport infrastructure comprises the steps:
Step 1, mobile network require terminal to report IMEI coding;
Step 2, terminal report to the mobile network with the IMEI coding according to described network transport infrastructure;
It is characterized in that this method further comprises: the mobile network verifies the password that comprises in the IMEI coding.
9. verification method according to claim 8 is characterized in that,
The mobile network at first recognizes the IMEI coding by mobile identification code, and then whether detects the IMEI code length greater than 15;
If greater than 15, the mobile network takes out the code word of the 15th bit word back, and judges whether the code word of taking out is correct, if correct, judges that then this IMEI coding is legal, if incorrect, judges that then this IMEI is illegal.
10. verification method according to claim 8 is characterized in that, the mobile network at first recognizes the IMEI coding by mobile identification code, and then the cryptopart of identification IMEI coding;
The mobile network takes out cryptopart, and judges whether password is correct, if correct, judges that then this IMEI coding is legal, if incorrect, judges that then this IMEI is illegal.
CN2009101982603A 2009-11-03 2009-11-03 International mobile equipment identity (IMEI) code and network transmission structure and verification method of same Active CN102055550B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101982603A CN102055550B (en) 2009-11-03 2009-11-03 International mobile equipment identity (IMEI) code and network transmission structure and verification method of same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101982603A CN102055550B (en) 2009-11-03 2009-11-03 International mobile equipment identity (IMEI) code and network transmission structure and verification method of same

Publications (2)

Publication Number Publication Date
CN102055550A true CN102055550A (en) 2011-05-11
CN102055550B CN102055550B (en) 2013-11-20

Family

ID=43959519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101982603A Active CN102055550B (en) 2009-11-03 2009-11-03 International mobile equipment identity (IMEI) code and network transmission structure and verification method of same

Country Status (1)

Country Link
CN (1) CN102055550B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022795A (en) * 2016-05-12 2016-10-12 大连理工大学 IMEI-based mobile phone flow management system
CN106961433A (en) * 2017-03-21 2017-07-18 天津数集科技有限公司 A kind of method and device of mobile device identity verification

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1541015A (en) * 2003-10-31 2004-10-27 大唐微电子技术有限公司 Method and system of preventing handset from theft by using international id code of mobile facilities

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1541015A (en) * 2003-10-31 2004-10-27 大唐微电子技术有限公司 Method and system of preventing handset from theft by using international id code of mobile facilities

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022795A (en) * 2016-05-12 2016-10-12 大连理工大学 IMEI-based mobile phone flow management system
CN106961433A (en) * 2017-03-21 2017-07-18 天津数集科技有限公司 A kind of method and device of mobile device identity verification

Also Published As

Publication number Publication date
CN102055550B (en) 2013-11-20

Similar Documents

Publication Publication Date Title
US8423075B2 (en) Physical downlink control channel specific scrambling
CN103124266B (en) Mobile terminal and carry out the method, system and the cloud server that log in by it
CN101223799B (en) Method for disabling a mobile device
CN103957522A (en) Intelligent communication method, intelligent communication terminals and intelligent communication system
CN101344825A (en) Method and terminal for inceptive cipher setting and cipher validation based on touch screen
CN102055550B (en) International mobile equipment identity (IMEI) code and network transmission structure and verification method of same
CN103152401B (en) Mobile terminal and carry out the method, system and the cloud server that log in by it
CN104378375A (en) Remote access method for mobile phone, terminal device, server and system
CN104143063A (en) Unlocking method based on pattern screen locking and mobile terminal
CN101221606B (en) Mobile memory device and its authentication method
CN105306435A (en) Method and system for binding information system account and WeChat account
CN103167449A (en) Method and system for setting call forwarding to communication terminal local machine
CN102868482A (en) Method and device for multi-level coding modulation
CN102810220A (en) Access control system based visible light signal transmission method and access control system
CN106209313A (en) Data transmission method and system
CN103365814B (en) A kind of serial data transmission method and system thereof
CN103391537A (en) Method and device for writing international mobile equipment identify (IMEI) number through mobile terminal
CN100385887C (en) Method and device for coding, transmitting and decoding digital data
CN104993906B (en) A kind of method and system of message transmission
CN103200312B (en) Method for writing international mobile equipment identity (IMEI) codes quickly for multiple-card mobile phone
CN1321538C (en) Short message network address communication system based on two-dimensional bar code identification technology
CN105163291A (en) Mobile terminal and control method for group message thereof
US9872035B2 (en) System and method for transcoding data
CN101420692B (en) Checking method for temporarily moved subscriber identification and service server
CN108123721B (en) Encoding method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant