CN102055550B - International mobile equipment identity (IMEI) code and network transmission structure and verification method of same - Google Patents
International mobile equipment identity (IMEI) code and network transmission structure and verification method of same Download PDFInfo
- Publication number
- CN102055550B CN102055550B CN2009101982603A CN200910198260A CN102055550B CN 102055550 B CN102055550 B CN 102055550B CN 2009101982603 A CN2009101982603 A CN 2009101982603A CN 200910198260 A CN200910198260 A CN 200910198260A CN 102055550 B CN102055550 B CN 102055550B
- Authority
- CN
- China
- Prior art keywords
- imei
- code
- coding
- password
- bit word
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the field of mobile communication, in particular to an international mobile equipment identity (IMEI) code which is applied to a terminal and a network transmission structure and a verification method of the same. The IMEI code is set by a terminal factory or mobile operator software and comprises a string of code word sequences, wherein the code word sequences can represent a model approval number, a final assembly number, a production sequence number and a verification code respectively; each code word sequence also comprises a password consisting of n numbers or characters; n is a positive integer which is more than or equal to 1; and the password cannot be displayed or inquired on the terminal. The invention also provides a network transmission structure of the IMEI code and a verification method which adopts the IMEI code and the network transmission structure. The method comprises the following steps that: a mobile network requires the terminal to report the IMEI code; the terminal reports the IMEI code to the mobile network according to the network transmission structure; and the mobile network verifies the password in the IMEI code.
Description
Technical field
The present invention relates to moving communicating field, relate in particular to a kind of IMEI coding of terminal, network transport infrastructure and verification method of this IMEI coding of being applied to.
Background technology
IMEI (International Mobile Equipment Identity) is the abbreviation of International Mobile Equipment Identity code, international Mobile Equipment identification code, by 15 bit digital, form " electronics string number ", it is corresponding one by one with every mobile phone, and is that the whole world is unique.Each mobile phone all will be endowed a globally unique group coding after assembling completes, this coding is delivered for use all by institute of the manufacturer of manufactured production record from producing to.The correctness of present mobile network's verification terminal IMEI coding comprises the steps: that the mobile network can require the terminal to report Termination ID, and its type comprises the IMEI coding; After the IMEI coding of terminal to report oneself, its legitimacy of network verification, if illegal IMEI coding is just refused the service of back.
Yet, because the IMEI coding is announced, the IMEI coding of legal terminal is directly usurped by therefore present a lot of illegal manufacturers, cause different terminals to have same IMEI coding, just make a lot of terminals that do not detect through country's networking flow into market, bring a lot of potential safety hazards, also caused the disorderly competition in market.For example, in the situation that a mobile phone possesses an IMEI coding, if there are illegal activities in certain user, public security authorities can find the caller by the IMEI coding of mobile phone.If user's hand-set from stolen, operator can also encode and forbid stolen mobile phone by IMEI.In case a large amount of mobile phones use same IMEI coding, when public security authorities trace terminal stolen, that lose by inquiry IMEI coding, and while following the trail of the mobile phone that the offender uses, can't directly orient which mobile phone is that they are needed.If it is its service that network is refused the locking of the IMEI of certain terminal coding, the legal terminal that has this IMEI coding likely can not be used because of getting involved of illegal terminal.
Summary of the invention
The object of the present invention is to provide network transport infrastructure and the verification method of a kind of IMEI coding that is applied to terminal, this IMEI coding, it can prevent effectively that the IMEI coding from copying and usurp.
For achieving the above object, embodiments of the invention adopt following technical scheme:
The invention provides a kind of IMEI coding, by terminal producer or mobile operator software, arranged, described IMEI coding comprises that string of code word sequence, described codeword sequence can represent respectively the model approval code, finally assemble number, production sequence number and check code; Described codeword sequence also comprises the password that consists of n numeral or character, and wherein n is the positive integer more than or equal to 1; Described password can not show or inquiry in terminal.
As a further improvement on the present invention, described model approval code, finally assemble number and production sequence number and check code and form 15 bit word sequences.
As a further improvement on the present invention, described password can be set as relation one to one with 15 bit word sequences.
The present invention also provides a kind of network transport infrastructure of IMEI coding, is applied to communicate by letter between terminal and mobile network, and described transformat comprises a plurality of octets; Wherein, described byte comprises:
One be used to writing the byte of mobile identification code, is convenient to the mobile network and identifies the IMEI coding;
A byte that writes the IMEI code length;
A plurality of bytes, for writing successively the model approval code, finally assembling number, production sequence number and check code; And,
A plurality of bytes, for writing successively password.
As a further improvement on the present invention, move described network transport infrastructure and also comprise a byte, this byte front 4 be used to writing parity check code.
As a further improvement on the present invention, 4 bit word that can write the IMEI coding of a byte, namely a byte can write 2 bit word.
As a further improvement on the present invention,
The 3rd byte front 4 be used to writing, rear 4 the 1st bit word that write IMEI;
The 4th byte front 4 be used to writing the 2nd bit word of IMEI, rear 4 be used to writing the 3rd bit word of IMEI; By that analogy,
The 10th byte front 4 be used to writing the p bit word of IMEI, rear 4 be used to writing the p position coding (wherein p is positive integer, 16>p>3) of IMEI;
The 11st byte front 4 be used to writing the first bit word of password, rear 4 be used to writing the 2nd bit word of password; By that analogy,
10+n byte front 4 be used to writing the n bit word of password, rear 4 be used to writing the n+1 bit word of password, until password has write, n is the positive integer more than or equal to 1.
The present invention also provides the verification method of a kind of IMEI of employing coding and network transport infrastructure, comprises the steps:
Step 1, mobile network require terminal to report IMEI coding;
Step 2, terminal report to the mobile network by the IMEI coding according to described network transport infrastructure;
The method further comprises: the mobile network verifies the password that comprises in the IMEI coding.
As a further improvement on the present invention, at first the mobile network recognizes the IMEI coding by mobile identification code, and then whether detects the IMEI code length greater than 15; If greater than 15, the mobile network takes out the code word of the 15th bit word back, and whether the code word that judgement is taken out is correct, if correct, judges that this IMEI coding is legal, if incorrect, judges that this IMEI is illegal.
As a further improvement on the present invention, at first the mobile network recognizes the IMEI coding by mobile identification code, and then the cryptopart of identification IMEI coding; The mobile network takes out cryptopart, and judges whether password is correct, if correct, judges that this IMEI coding is legal, if incorrect, judges that this IMEI is illegal.
Adopt technology of the present invention, legal IMEI coding is difficult to be usurped by illegal manufacturer, has effectively improved fail safe and high usage that terminal is used.
The accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, below will the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the verification method flow chart that the present invention adopts the IMEI coding.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills, not making under the creative work prerequisite the every other embodiment that obtains, belong to the scope of protection of the invention.
The present invention expands on the basis of existing IMEI coding, be about to existing IMEI coding and expand to the codeword sequence that the IMEI+ password forms, IMEI coding after expansion is greater than 15, wherein cryptopart is set as undergroundly before dispatching from the factory by terminal producer, can't arrive cryptopart by terminal inquiry.Wherein the IMEI of 15 coding is: the 1st bit word to the 6 bit word are " model approval code " (TAC, Type ApprovalCode), the general proxy type; The 7th bit word and the 8th bit word are " finally assembling number " (FAC, FinalAssembly Code), the general proxy place of production; The 9th bit word to the 14 bit word are " string number " (SNR, Serial Number), general proxy production sequence number; The 15th is check code (SP) for encoding.Password consists of n numeral or character, and wherein n is the positive integer more than or equal to 1.
Refer to table 1, IMEI coding comprises a plurality of octets (octet1, octet2.......) by terminal to report to mobile network's transmission structure.Wherein,
The 1st byte writes mobile identification code (Mobile Identity IEI), and this code is convenient to the mobile network and is identified IMEI coding;
The 2nd byte writes IMEI length (Length of mobile identity contents), is convenient to the length that the mobile network identifies the IMEI coding;
The 3rd byte front 4 be used to writing parity check code (Type of identity), rear 4 the 1st bit word that write IMEI coding;
Front 4 the 2nd bit word of encoding be used to writing IMEI of the 4th byte, rear 4 the 3rd bit word of encoding be used to writing IMEI; By that analogy,,
Front 4 the 14th bit word of encoding be used to writing IMEI of the 10th byte, rear 4 the 15th bit word of encoding be used to writing IMEI.
The present invention has increased a plurality of bytes, since the 11st byte, writes password, supposes that password has 6:
The 11st byte front 4 be used to writing the 1st bit word of password, rear 4 be used to writing the 2nd bit word of password; By that analogy,
The 13rd byte front 4 be used to writing the 5th bit word of password, rear 4 be used to writing the 6th bit word of password.
Table 1
The IMEI coding is set by producer before terminal is dispatched from the factory, in preferred embodiment of the present invention, producer writes mobile phone by IMEI and its corresponding password, password has uniqueness, and while by software, realizing that terminal phone is checked IMEI, cryptopart does not show, namely on mobile phone, inputs " * #06# " operation and checks the IMEI coding, and terminal only shows front 15 bit word of IMEI coding.
The present invention also provides a kind of method of the IMEI of checking coding, and the method comprises the steps:
Step 1, mobile network require terminal to report IMEI coding;
Step 2, terminal report to the mobile network by the IMEI coding by above-mentioned transmission structure;
At first step 3, mobile network recognize the IMEI coding by mobile identification code, and then whether detect the IMEI code length greater than 15; If greater than 15, execution step 4; If less than or equal to 15, the mobile network judges whether IMEI all code words of encoding are correct, if correct, judges that this terminal is legal, if incorrect, judges that this terminal is illegal;
Step 4, the numeral after 15 bit word is taken out, be about to password and take out.
Step 5, mobile network judge whether the taking-up password is correct; If correct, judge that this IMEI is legal, if incorrect, judge that this IMEI is illegal.
In step 5, the mobile network need to transfer the correctness that special password database is searched for the judgement password, 15 bit word-password database one to one before therefore the mobile network has, if the mobile network monitors the IMEI code length greater than 15,15 bit word and cryptopart are all taken out, transfer above-mentioned database, verify.
In actual applications, legal terminal can arrive the Mobile Network Operator place and carry out software upgrading, by former IMEI coding in existing terminal, by adding password change, be new IMEI coding, i.e. " former IMEI+ password " structure, operator is updated to existing IMEI database by the new IMEI coding of this terminal simultaneously, and the illegal terminal of usurping so former IMEI coding will be moved the network denial of service.In addition, the mobile network has had an IMEI database at present, only need set up a cryptographic libraries again, and the mobile network, in proof procedure, calls separately this cryptographic libraries; Perhaps set up one with existing IMEI database in the cryptographic libraries one to one of encoding, also can realize checking.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited to this, anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; can expect easily changing or replacing, within all should being encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion by described protection range with claim.
Claims (9)
1. a verification method that adopts the IMEI coding, comprise the steps:
Step 1, mobile network require terminal to report IMEI coding;
Step 2, terminal report to the mobile network by the IMEI coding according to network transport infrastructure;
It is characterized in that, the method further comprises: the mobile network verifies the password that comprises in the IMEI coding, if the password that comprises is correct, judges that this IMEI coding is legal, if the password bad that comprises judges that this IMEI coding is illegal;
Wherein, described IMEI coding terminal producer or mobile operator software arrange, and described IMEI coding comprises that string of code word sequence, described codeword sequence represent respectively the model approval code, finally assemble number, production sequence number and check code;
Described codeword sequence also comprises the password that consists of n numeral or character, and wherein n is the positive integer more than or equal to 1; Described password can not show or inquiry in terminal.
2. the verification method of employing according to claim 1 IMEI coding, is characterized in that, described model approval code, finally assembles number and production sequence number and check code and form 15 bit word sequences.
3. the verification method of employing IMEI coding according to claim 2, is characterized in that, described password and 15 bit word sequences are set as relation one to one.
4. the verification method of employing IMEI coding according to claim 1, is characterized in that, described network transport infrastructure is applied to communicate by letter between terminal and mobile network, and described network transport infrastructure comprises a plurality of octets; Wherein, described byte comprises:
One be used to writing the byte of mobile identification code, is convenient to the mobile network and identifies the IMEI coding;
A byte that writes the IMEI code length;
A plurality of bytes, for writing successively the model approval code, finally assembling number, production sequence number and check code; And
A plurality of bytes, for writing successively password.
5. the verification method of employing according to claim 4 IMEI coding, is characterized in that, described network transport infrastructure also comprises a byte, this byte front 4 be used to writing parity check code.
6. the verification method of employing IMEI coding according to claim 4, is characterized in that, 4 bit word that write the IMEI coding of a byte, and namely a byte writes 2 bit word.
7. the verification method of employing IMEI coding according to claim 6, is characterized in that,
The 3rd byte front 4 be used to writing parity check code, rear 4 the 1st bit word that write IMEI;
The 4th byte front 4 be used to writing the 2nd bit word of IMEI, rear 4 be used to writing the 3rd bit word of IMEI; By that analogy,
Latter 4 wherein p is positive integer to first 4 of the 10th byte be used to writing the p+1 bit word of IMEI be used to writing the p bit word of IMEI, 16 > p > 3;
The 11st byte front 4 be used to writing the first bit word of password, rear 4 be used to writing the 2nd bit word of password; By that analogy,
10+n byte front 4 be used to writing the n bit word of password, rear 4 be used to writing the n+1 bit word of password, until password has write, n is the positive integer more than or equal to 1.
8. the verification method of employing IMEI coding according to claim 1, is characterized in that,
At first the mobile network recognizes the IMEI coding by mobile identification code, and then whether detects the IMEI code length greater than 15;
If greater than 15, the mobile network takes out the code word of the 15th bit word back, and whether the code word that judgement is taken out is correct, if correct, judges that this IMEI coding is legal, if incorrect, judges that this IMEI is illegal.
9. the verification method of employing IMEI coding according to claim 1, is characterized in that, at first the mobile network recognizes the IMEI coding by mobile identification code, and then the cryptopart of identification IMEI coding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009101982603A CN102055550B (en) | 2009-11-03 | 2009-11-03 | International mobile equipment identity (IMEI) code and network transmission structure and verification method of same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009101982603A CN102055550B (en) | 2009-11-03 | 2009-11-03 | International mobile equipment identity (IMEI) code and network transmission structure and verification method of same |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102055550A CN102055550A (en) | 2011-05-11 |
CN102055550B true CN102055550B (en) | 2013-11-20 |
Family
ID=43959519
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009101982603A Active CN102055550B (en) | 2009-11-03 | 2009-11-03 | International mobile equipment identity (IMEI) code and network transmission structure and verification method of same |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102055550B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106022795A (en) * | 2016-05-12 | 2016-10-12 | 大连理工大学 | IMEI-based mobile phone flow management system |
CN106961433A (en) * | 2017-03-21 | 2017-07-18 | 天津数集科技有限公司 | A kind of method and device of mobile device identity verification |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1541015A (en) * | 2003-10-31 | 2004-10-27 | 大唐微电子技术有限公司 | Method and system of preventing handset from theft by using international id code of mobile facilities |
-
2009
- 2009-11-03 CN CN2009101982603A patent/CN102055550B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1541015A (en) * | 2003-10-31 | 2004-10-27 | 大唐微电子技术有限公司 | Method and system of preventing handset from theft by using international id code of mobile facilities |
Also Published As
Publication number | Publication date |
---|---|
CN102055550A (en) | 2011-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103124266B (en) | Mobile terminal and carry out the method, system and the cloud server that log in by it | |
CN101022672B (en) | Method and system for testing mobile user legality | |
CN105516902A (en) | Method and system for Bluetooth connection and Bluetooth device | |
CN103957522A (en) | Intelligent communication method, intelligent communication terminals and intelligent communication system | |
CN103632243A (en) | Logistics distribution system and distribution method thereof | |
CN102055550B (en) | International mobile equipment identity (IMEI) code and network transmission structure and verification method of same | |
CN104155667A (en) | Vehicle-borne GPS terminal | |
CN101415182A (en) | Method, system and apparatus for protecting terminal data | |
CN103152401B (en) | Mobile terminal and carry out the method, system and the cloud server that log in by it | |
CN104143063A (en) | Unlocking method based on pattern screen locking and mobile terminal | |
CN107066411A (en) | Data transmission method, device and computer-readable recording medium | |
CN103167449B (en) | For communication terminal local machine arranges the method and system of call forwarding | |
CN102637422A (en) | Matrix obtaining method, character display device and system and electronic signature tool | |
CN100456880C (en) | Method for preventing from illegal duplication of mobile communication terminal | |
CN102088698A (en) | Calling method and system, calling code generator, calling controller and MSC (Mobile Switching Center) | |
CN101155214B (en) | PIN code amending method for Bluetooth access point and bluetooth network system | |
CN101540699A (en) | Method and device for realizing remote maintenance of network equipment | |
CN105306435A (en) | Method and system for binding information system account and WeChat account | |
CN102810220A (en) | Access control system based visible light signal transmission method and access control system | |
CN103391537A (en) | Method and device for writing international mobile equipment identify (IMEI) number through mobile terminal | |
CN1321538C (en) | Short message network address communication system based on two-dimensional bar code identification technology | |
CN101420692B (en) | Checking method for temporarily moved subscriber identification and service server | |
CN103200312A (en) | Method for writing international mobile equipment identity (IMEI) codes quickly for multiple-card mobile phone | |
US9621907B2 (en) | System and method for transcoding data | |
CN106230875A (en) | Remote vehicle control method based on Internet of Things and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |