CN103781058A - Method and device for detecting legality of mobile terminal in CDMA network - Google Patents
Method and device for detecting legality of mobile terminal in CDMA network Download PDFInfo
- Publication number
- CN103781058A CN103781058A CN201210395448.9A CN201210395448A CN103781058A CN 103781058 A CN103781058 A CN 103781058A CN 201210395448 A CN201210395448 A CN 201210395448A CN 103781058 A CN103781058 A CN 103781058A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- esn
- meid
- imsi
- carried out
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method and a device for detecting the legality of a mobile terminal in a CDMA network. The method comprises the following steps: receiving an MEID/ESN and an IMSI which are reported by a mobile terminal under the condition of meeting the requirement of boot-up registration message self-reporting; comparing the received MEID/ESN and the received IMSI with a stored MEID/ESN and a stored IMSI; and determining that the mobile terminal is legal if the mapping relationship between the received MEID/ESN and the received IMSI and the mapping relationship between the stored MEID/ESN and the stored IMSI are the same, or determining that the mobile terminal is an illegal user, querying whether the mobile terminal is illegally occupied based on the reported MEID/ESN, and locking the mobile terminal through a CRM if the mobile terminal is illegally occupied. According to the embodiment of the invention, validity and legitimacy of common users can be detected and managed.
Description
Technical field
The present invention relates to CDMA(Code Division Multiple Access, code division multiple access) network, especially, relate to a kind of method and apparatus that mobile terminal in cdma network is carried out to legitimacy detection.
Background technology
Along with the development of mobile communication technology, mobile operator, for user provides various flexible, various business, meets user's various personalized service requirements.The service and the set meal etc. that customize need to carry out to the terminal of user's travelling carriage the detection of validity and legitimacy, to realize the guarantee to communication service fail safe in mobile communication.Realize in the legal mobile network of being linked into of travelling carriage by functions such as the identification to travelling carriage, supervision, lockings, and the function in other cases travelling carriage being managed.
At present, in cdma network, carry out in the process of authentication for separation between machine and card CDMA travelling carriage, user UIM(User Identity Module due to what report, subscriber identification module) card UIMID(User Identity Module Identifier, UIM mark) parameter and only UIMID is carried out to the SHA1(Secure Hash Algorithm in hash algorithm, Secure Hash Algorithm) process, obtain pseudo-ESN, thereby carry out corresponding authentication, the MEID(Mobile Equipment Identifier of travelling carriage in this mode, mobile device identification code)/ESN(Electric Sequence Number, electronic serial number) do not participate in whole actual authentication process, EIR(Equipment Identity Register, equipment identity register) system cannot carry out legitimacy detection to the MEID/ESN of travelling carriage, therefore may there is custom terminal " cover machine " problem, and after travelling carriage is stolen, cannot realize locked to travelling carriage.
Existing guarding against theft for mobile terminal scheme is a lot, be mainly the mode that matches with service end take mobile terminal client terminal or client as main, its essence is all to lock mobile terminal by client-side program or module.Client application or module are easy to be cracked or unload, so anti-theft effect is limited.
Mobile terminal is lost rear operator at present can only provide the service of reporting the loss of card, cannot provide and report the loss locking the mobile terminal itself of losing, and this situation has been encouraged pilferage and the act of purchase and sale to mobile terminal.
Operator especially cdma network operator cannot provide the main cause of report the loss/terminal network of terminal lock service to have following 2 points at network side:
(1) cannot judge that user terminal reports the loss the legitimacy of request;
(2) network equipment cannot be realized terminal network lock function, because cdma network separation between machine and card terminal is in the time carrying out access to netwoks, what insert in user terminal identification field is the UIMID information of card, in the time of mobile terminal network visiting, do not carry so any effective terminal identification information, therefore network cannot stop the access of stolen terminal to network by terminal iidentification authentication.
Summary of the invention
The technical problem that the embodiment of the present invention will solve is to provide a kind of method and apparatus that mobile terminal in cdma network is carried out to legitimacy detection, can carry out legitimacy detection to the mobile terminal in cdma network.
The embodiment of the present invention provides a kind of method of mobile terminal in cdma network being carried out to legitimacy detection, be included in and meet start-up logging note under the condition reporting, the mobile device identification code MEID/ESN that mobile terminal receive reports and IMSI International Mobile Subscriber Identity IMSI; MEID/ESN and the IMSI of the MEID/ESN of reception and IMSI and storage are compared; If the MEID/ESN receiving is identical with the mapping relations of the mapping relations of IMSI and the MEID/ESN of storage and IMSI, determine that mobile terminal is legal, otherwise determine that mobile terminal is disabled user, and whether MEID/ESN enquiry mobile terminal based on reporting is illegally occupied, as illegally occupied, by CRM system CRM, mobile terminal is carried out to locking processing.
Further, start-up logging note comprises that from the condition reporting mobile terminal is not in international roaming state.
Further, start-up logging note from the condition that reports also comprise that mobile terminal is unregistered, the ESN/MEID that stores in the ESN/MEID that stores in the IMSI that stores in mobile terminal or mobile terminal different from the IMSI storing in subscriber identification module UIM and UIM is different.
Further, the MEID/ESN of storage and the mapping relations of IMSI are one-to-one relationship.
Further, the MEID/ESN of storage and the mapping relations of IMSI are that a MEID/ESN is corresponding with multiple IMSI.
The embodiment of the present invention also provides a kind of device that mobile terminal in cdma network is carried out to legitimacy detection, comprise parameter receiving element, for meeting start-up logging note under the condition reporting, the mobile device identification code MEID/ESN that mobile terminal receive reports and IMSI International Mobile Subscriber Identity IMSI; Mapping relations comparing unit, for comparing MEID/ESN and the IMSI of the MEID/ESN of reception and IMSI and storage; Validity judgement unit, if identical with the mapping relations of the mapping relations of IMSI and the MEID/ESN of storage and IMSI for the MEID/ESN of reception, determine that mobile terminal is legal, otherwise determine that mobile terminal is disabled user, and whether MEID/ESN enquiry mobile terminal based on reporting is illegally occupied, as illegally occupied, by CRM system CRM, mobile terminal is carried out to locking processing.
Further, start-up logging note comprises that from the condition reporting mobile terminal is not in international roaming state.
Further, start-up logging note from the condition that reports also comprise that mobile terminal is unregistered, the ESN/MEID that stores in the ESN/MEID that stores in the IMSI that stores in mobile terminal or mobile terminal different from the IMSI storing in subscriber identification module UIM and UIM is different.
Further, the MEID/ESN of storage and the mapping relations of IMSI are one-to-one relationship.
Further, the MEID/ESN of storage and the mapping relations of IMSI are that a MEID/ESN is corresponding with multiple IMSI.
The method and apparatus that mobile terminal in cdma network is carried out to legitimacy detection that the embodiment of the present invention provides, validity and the legitimacy that can realize domestic consumer detect and management function.In addition, can also, under mobile terminal lost condition, initiatively realize the function of locking to the mobile terminal of losing by blacklist function.The embodiment of the present invention is obtained the MEID/ESN of mobile terminal reality by endpoint registration mechanism, thereby has solved the problem that EIR system cannot obtain true MEID/ESN information and cannot carry out mobile terminal validity detection.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, forms the application's a part.In the accompanying drawings:
Fig. 1 is the present invention carries out an embodiment of the method for legitimacy detection schematic flow sheet to mobile terminal in cdma network.
Fig. 2 is the present invention carries out another embodiment of the method for legitimacy detection schematic flow sheet to mobile terminal in cdma network.
Fig. 3 is that the present invention judges whether to start the schematic diagram of start-up logging note from an example of report flow by detecting the parameter of storing in UIM card and mobile terminal.
Fig. 4 is the present invention carries out an embodiment of the device of legitimacy detection structural representation to mobile terminal in cdma network.
Embodiment
With reference to the accompanying drawings the present invention is described more fully, exemplary embodiment of the present invention is wherein described.Exemplary embodiment of the present invention and explanation thereof are used for explaining the present invention, but do not form inappropriate limitation of the present invention.
Illustrative to the description only actually of at least one exemplary embodiment below, never as any restriction to the present invention and application or use.
The following embodiment of the present invention is that telecom operators are for cdma network system, by customization starting up of terminal from login mechanism by terminal software and hardware parameter active reporting in cdma network system, the MEID/ESN of the real mobile terminal of active reporting and IMSI(International Mobile Subscriber Identity during based on start-up logging of mobile terminal, IMSI International Mobile Subscriber Identity) and storage IMSI and MEID/ESN between relation the legitimacy of mobile terminal is detected, and then the management of realization to mobile terminal, wherein, these parameters are automatically to report form to realize by the built-in program backstage of mobile terminal.
Fig. 1 is the present invention carries out an embodiment of the method for legitimacy detection schematic flow sheet to mobile terminal in cdma network.
As shown in Figure 1, this embodiment can comprise the following steps:
S102, meeting start-up logging note under the condition reporting, the MEID/ESN that mobile terminal receive reports and IMSI,, receive information of mobile terminal and the UIM card information of current true use, wherein, MEID/ESN can mobile terminal of unique identification, IMSI can subscriber card of unique identification, i.e. UIM card;
S104, compares MEID/ESN and the IMSI of the MEID/ESN of reception and IMSI and storage, that is, the legal binding relationship of the mobile terminal of the information of mobile terminal of current true use and UIM card information and network side storing and subscriber card is compared;
S106, if the MEID/ESN receiving is identical with the mapping relations of the mapping relations of IMSI and the MEID/ESN of storage and IMSI, determine that mobile terminal is legal, otherwise determine that mobile terminal is disabled user, and whether MEID/ESN enquiry mobile terminal based on reporting is illegally occupied, as illegally occupied, by CRM(Customer Relationship Management, CRM system) mobile terminal is carried out to locking processing.
Illustrate, in the time of the new UIM card of one of the stolen rear insertion of mobile terminal, mobile terminal can report a start-up logging note automatically, comprises MEID/ESN and IMSI in the information of mobile terminal reporting.It is different from the mapping relations of network side storing that the mapping relations that report are judged in network side monitoring in real time, determine that using the user of mobile terminal is disabled user, at this moment mobile terminal transfers doubtful stolen state to from normal condition, system can be sent out mail and/or short message prompt original subscriber, allow user confirm that whether mobile terminal is stolen, in the situation that user confirms that mobile terminal is stolen, transfer the state of mobile terminal to " network lock " state from " doubtful stolen ".Under network lock state, system can with HLR(Home Location Register, attaching position register) block alternately the access to netwoks of terminal.The releasing of network lock can initiatively be triggered by user, and system and HLR realize alternately.
Validity and legitimacy that this embodiment can realize domestic consumer detect and management function.In addition, can also, under mobile terminal lost condition, initiatively realize the function of locking to the mobile terminal of losing by blacklist function.The embodiment of the present invention is obtained the MEID/ESN of mobile terminal reality by endpoint registration mechanism, thereby has solved the problem that EIR system cannot obtain true MEID/ESN information and cannot carry out mobile terminal validity detection.
Wherein, the start-up logging note in step S102 can comprise that from the condition reporting mobile terminal is not in international roaming state.That is, if mobile terminal detects the international roaming state that self is in, do not carry out start-up logging note from reporting, otherwise, just carry out certainly reporting of start-up logging note.
Further, start-up logging note from the condition that reports can also comprise that mobile terminal is unregistered, the ESN/MEID that stores in the ESN/MEID that stores in the IMSI that stores in mobile terminal or mobile terminal different from the IMSI storing in subscriber identification module UIM and UIM is different.In other words, the IMSI that if mobile terminal is unregistered, store in mobile terminal is identical with the IMSI storing in subscriber identification module UIM and mobile terminal in the ESN/MEID that stores in the ESN/MEID that stores and UIM identical, show that this user realizes the ESN/MEID of registration and current mobile terminal at network side all identical with the parameter of registering at network side with the IMSI in UIM card, mobile terminal is not to network side active reporting start-up logging note, if any in above-mentioned three conditions do not meet all and initiatively report start-up logging note to network side.
In addition can be one-to-one relationship at the MEID/ESN of network side storing and the mapping relations of IMSI.
In the time that MEID/ESN and IMSI are one-to-one relationship, can store this corresponding relation by following two kinds of modes: (1) directly configures the corresponding relation of MEID/ESN and IMSI by the CRM interface of operator; (2) by endpoint registration authorizing procedure, the MEID/ESN of terminal and IMSI parameter are delivered in EIR system, while registration first, the parameter MEID/ESN of mobile terminal reporting and IMSI are bound and storage.
The MEID/ESN it is pointed out that in network side storing and the mapping relations of IMSI can also be that a MEID/ESN is corresponding with multiple IMSI, that is, be the situation of the multiple UIM cards of mobile terminal configuration.
In addition, in step S102, in the time that network side receives the MEID/ESN of mobile terminal reporting, to the position progress row filter of this parameter, allow 8 (, ESN length), 14 (, MEID length) and 15 (, the MEID of tape verifying position) be legal length, in transmittance process, there is the situations such as error code to get rid of.
Fig. 2 is the present invention carries out another embodiment of the method for legitimacy detection schematic flow sheet to mobile terminal in cdma network.
As shown in Figure 2, this embodiment can comprise the following steps:
S202, after user's start, judges whether to start start-up logging note from report flow by detecting the parameter of storing in UIM card and mobile terminal;
S204, needs to start start-up logging note from report flow as judged, the relevant informations such as the IMSI in MEID/ESN current mobile mobile terminal and UIM card are registered to network side;
S206, the terminal legality of network side detects application compares to the MEID/ESN reporting and the MEID/ESN of IMSI and storage and the corresponding relation of IMSI, to detect the legitimacy of mobile terminal;
S208, if the MEID/ESN reporting is identical with the corresponding relation of storage with IMSI, determine that this mobile terminal is by validated user used, now this mobile terminal can normally use, otherwise, determine that this mobile terminal is used by disabled user, now, can notify its mobile terminal of original subscriber in doubtful stolen state according to system configuration, determine whether this mobile terminal to carry out lock-in control according to original subscriber's feedback information again, also can directly detect application by the terminal legality of network side and inform that by interface crm system carries out lock-in control to this mobile terminal, to realize the management to disabled user,
S210, at mobile terminal be illegal in the situation that, the blacklist of MEID/ESN that can also be based on mobile terminal reporting and the MEID/ESN of network side storing judges that the MEID/ESN that reports is whether in blacklist, if in blacklist, require to carry out lock-in control to stolen mobile terminal according to user, to realize the management to disabled user.
Fig. 3 is that the present invention judges whether to start the schematic diagram of start-up logging note from an example of report flow by detecting the parameter of storing in UIM card and mobile terminal.
As shown in Figure 3, this example can comprise the following steps:
S302, mobile terminal start detection signal, judges whether in international roaming state;
S304, if mobile terminal is in international roaming state, does not start start-up logging note from report flow, and this mobile terminal can start normal use;
S306, reads mobile terminal the machine sign-on ID, judges whether this mobile terminal did not carry out registration;
S308, as do not carry out registration, directly the IMSI of the MEID/ESN of mobile terminal and UIM card is reported to network side, the sign-on ID of mobile terminal the machine is set to carry out registration, and IMSI in UIM card is write in mobile terminal the machine, the ESN/pseudo-ESN/MEID of mobile terminal the machine is written in UIM card;
More whether S310, as carried out registration, reads in mobile terminal and UIM card the IMSI number of storage separately, consistent, then reads the ESN/pseudo-ESN/MEID number of storing in the ESN/MEID of mobile terminal and UIM card, consistent;
S312, if following 3 conditions all meet: (1) the machine had been carried out registration; (2) IMSI storing in mobile terminal is identical with the IMSI in UIM card; (3) ESN/MEID in mobile terminal is identical with the ESN/pseudo-ESN/MEID storing in UIM card; Do not carry out subsequent step,, mobile terminal does not initiatively send start-up logging note, mobile terminal normally uses, if the arbitrary condition in above-mentioned three conditions does not meet, mobile terminal sends start-up logging short message automatically to network side, and this registration short message can comprise the ESN/MEID of the machine type, the machine, IMSI and the machine software version of UIM card.
It is pointed out that in the time that mobile terminal sends start-up logging note to network side, if send repeatedly all failures, abandon this start-up logging, in the time starting shooting next time, repeat again above-mentioned registration process.
One of ordinary skill in the art will appreciate that, whole and the part steps that realizes said method embodiment can complete by the relevant hardware of program command, aforesaid program can be stored in a computing equipment read/write memory medium, this program is in the time carrying out, execution comprises the step of said method embodiment, and aforesaid storage medium can comprise the various media that can be program code stored such as ROM, RAM, magnetic disc and CD.
Fig. 4 is the present invention carries out an embodiment of the device of legitimacy detection structural representation to mobile terminal in cdma network.
As shown in Figure 4, the device 40 in this embodiment can comprise parameter receiving element 402, mapping relations comparing unit 404 and validity judgement unit 406.
Wherein, parameter receiving element 402 is meeting start-up logging note under the condition reporting, the mobile device identification code MEID/ESN that mobile terminal receive reports and IMSI International Mobile Subscriber Identity IMSI; Mapping relations comparing unit 404 compares MEID/ESN and the IMSI of the MEID/ESN of reception and IMSI and storage; If the MEID/ESN receiving is identical with the mapping relations of the mapping relations of IMSI and the MEID/ESN of storage and IMSI, validity judgement unit 406 determines that mobile terminal is legal, otherwise determine that mobile terminal is disabled user, and whether MEID/ESN enquiry mobile terminal based on reporting is illegally occupied, as illegally occupied, by CRM system CRM, mobile terminal is carried out to locking processing.
Wherein, start-up logging note can comprise that from the condition reporting mobile terminal is not in international roaming state.
Further, start-up logging note from the condition that reports can also comprise that mobile terminal is unregistered, the ESN/MEID that stores in the ESN/MEID that stores in the IMSI that stores in mobile terminal or mobile terminal different from the IMSI storing in subscriber identification module UIM and UIM is different.
In addition, the MEID/ESN of storage and the mapping relations of IMSI can be one-to-one relationship, can be also a relation that MEID/ESN is corresponding with multiple IMSI.
In this specification, each embodiment all adopts the mode of going forward one by one to describe, and what each embodiment stressed is and the difference of other embodiment that part identical with similar between each embodiment can cross-references.For device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, relevant part can be referring to the explanation of embodiment of the method part.
The above embodiment of the present invention has been described and has a kind ofly been found that by network system mobile terminal is stolen and add network lock to stop it to carry out the method and apparatus of access to netwoks to stolen mobile terminal.This embodiment has not only avoided the appearance of the situation of maliciously reporting lost property to the authorities, and the network lock of mobile terminal has also promoted the anti-theft effect of mobile terminal simultaneously, thereby has at utmost stoped the stolen and act of purchase and sale of mobile terminal.And this scheme is only transformed at network side, be easy in existing network, implement and promote.
Although specific embodiments more of the present invention are had been described in detail by example, it should be appreciated by those skilled in the art, above example is only in order to describe, rather than in order to limit the scope of the invention.It should be appreciated by those skilled in the art, can without departing from the scope and spirit of the present invention, above embodiment be modified.Scope of the present invention is limited by claims.
Claims (10)
1. a method of mobile terminal in cdma network being carried out to legitimacy detection, is characterized in that, comprising:
Meeting start-up logging note under the condition reporting, mobile device identification code MEID/ electronic serial number ESN and IMSI International Mobile Subscriber Identity IMSI that mobile terminal receive reports;
MEID/ESN and the IMSI of the MEID/ESN of reception and IMSI and storage are compared;
If the MEID/ESN receiving is identical with the mapping relations of the mapping relations of IMSI and the MEID/ESN of storage and IMSI, determine that described mobile terminal is legal, otherwise determine that described mobile terminal is disabled user, and whether MEID/ESN based on reporting inquires about described mobile terminal and is illegally occupied, as illegally occupied, by CRM system CRM, described mobile terminal is carried out to locking processing.
2. method of mobile terminal in cdma network being carried out to legitimacy detection according to claim 1, is characterized in that, described start-up logging note comprises that from the condition reporting described mobile terminal is not in international roaming state.
3. method of mobile terminal in cdma network being carried out to legitimacy detection according to claim 2, it is characterized in that, described start-up logging note from the condition that reports also comprise that mobile terminal is unregistered, the MEID/ESN that stores in the MEID/ESN that stores in the IMSI that stores in mobile terminal or mobile terminal different from the IMSI storing in subscriber identification module UIM and UIM is different.
4. method of mobile terminal in cdma network being carried out to legitimacy detection according to claim 1, is characterized in that, the MEID/ESN of storage and the mapping relations of IMSI are one-to-one relationship.
5. method of mobile terminal in cdma network being carried out to legitimacy detection according to claim 1, is characterized in that, the MEID/ESN of storage and the mapping relations of IMSI are that a MEID/ESN is corresponding with multiple IMSI.
6. a device that mobile terminal in cdma network is carried out to legitimacy detection, is characterized in that, comprising:
Parameter receiving element, for meeting start-up logging note under the condition reporting, mobile device identification code MEID/ electronic serial number ESN and IMSI International Mobile Subscriber Identity IMSI that mobile terminal receive reports;
Mapping relations comparing unit, for comparing MEID/ESN and the IMSI of the MEID/ESN of reception and IMSI and storage;
Validity judgement unit, if identical with the mapping relations of the mapping relations of IMSI and the MEID/ESN of storage and IMSI for the MEID/ESN of reception, determine that described mobile terminal is legal, otherwise determine that described mobile terminal is disabled user, and whether MEID/ESN based on reporting inquires about described mobile terminal and is illegally occupied, as illegally occupied, by CRM system CRM, described mobile terminal is carried out to locking processing.
7. the device that mobile terminal in cdma network is carried out to legitimacy detection according to claim 6, is characterized in that, described start-up logging note comprises that from the condition reporting described mobile terminal is not in international roaming state.
8. the device that mobile terminal in cdma network is carried out to legitimacy detection according to claim 7, it is characterized in that, described start-up logging note from the condition that reports also comprise that mobile terminal is unregistered, the MEID/ESN that stores in the MEID/ESN that stores in the IMSI that stores in mobile terminal or mobile terminal different from the IMSI storing in subscriber identification module UIM and UIM is different.
9. the device that mobile terminal in cdma network is carried out to legitimacy detection according to claim 6, is characterized in that, the MEID/ESN of storage and the mapping relations of IMSI are one-to-one relationship.
10. the device that mobile terminal in cdma network is carried out to legitimacy detection according to claim 6, is characterized in that, the MEID/ESN of storage and the mapping relations of IMSI are that a MEID/ESN is corresponding with multiple IMSI.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210395448.9A CN103781058A (en) | 2012-10-18 | 2012-10-18 | Method and device for detecting legality of mobile terminal in CDMA network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210395448.9A CN103781058A (en) | 2012-10-18 | 2012-10-18 | Method and device for detecting legality of mobile terminal in CDMA network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103781058A true CN103781058A (en) | 2014-05-07 |
Family
ID=50572784
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210395448.9A Pending CN103781058A (en) | 2012-10-18 | 2012-10-18 | Method and device for detecting legality of mobile terminal in CDMA network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103781058A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104661220A (en) * | 2015-03-13 | 2015-05-27 | 中国联合网络通信集团有限公司 | Method and device for achieving authentication treatment |
CN105491566A (en) * | 2014-09-18 | 2016-04-13 | 中国电信股份有限公司 | Twin machine detection method and system, and policy and charging rules function (PCRF) device |
CN108153558A (en) * | 2017-12-06 | 2018-06-12 | 广东欧珀移动通信有限公司 | Method, electronic device and the readable storage medium storing program for executing of unified custom terminal software version |
CN108156319A (en) * | 2017-12-26 | 2018-06-12 | 哈尔滨海能达科技有限公司 | A kind of method and device of control terminal equipment |
CN110392353A (en) * | 2018-04-17 | 2019-10-29 | 大唐移动通信设备有限公司 | A kind of note transmission method and device |
CN111836239A (en) * | 2019-04-19 | 2020-10-27 | 诺玛有限公司 | Method for screening dangerous Bluetooth equipment based on connection with Bluetooth equipment |
CN111866716A (en) * | 2019-04-19 | 2020-10-30 | 诺玛有限公司 | System for dangerous bluetooth equipment is filtered to position based on bluetooth equipment |
WO2023246286A1 (en) * | 2022-06-23 | 2023-12-28 | 中兴通讯股份有限公司 | Method, apparatus and system for restricting set-card separation, and storage medium and electronic apparatus |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060061609A (en) * | 2004-12-02 | 2006-06-08 | 주식회사 팬택 | Method for preventing illegal reproduction of mobile communication terminal and mobile communication terminal of enabling the method |
CN101267638A (en) * | 2008-04-16 | 2008-09-17 | 中国联合通信有限公司 | A method and system for obtaining CDMA mobile terminal information |
CN101287298A (en) * | 2008-05-29 | 2008-10-15 | 德信无线通讯科技(北京)有限公司 | Authentication method and system for mobile communication terminal |
CN101720072A (en) * | 2009-12-10 | 2010-06-02 | 候万春 | System and method for realizing antitheft of mobile phone |
CN101990209A (en) * | 2009-07-30 | 2011-03-23 | 中国电信股份有限公司 | Method and system for providing clue for finding lost mobile terminal |
-
2012
- 2012-10-18 CN CN201210395448.9A patent/CN103781058A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060061609A (en) * | 2004-12-02 | 2006-06-08 | 주식회사 팬택 | Method for preventing illegal reproduction of mobile communication terminal and mobile communication terminal of enabling the method |
CN101267638A (en) * | 2008-04-16 | 2008-09-17 | 中国联合通信有限公司 | A method and system for obtaining CDMA mobile terminal information |
CN101287298A (en) * | 2008-05-29 | 2008-10-15 | 德信无线通讯科技(北京)有限公司 | Authentication method and system for mobile communication terminal |
CN101990209A (en) * | 2009-07-30 | 2011-03-23 | 中国电信股份有限公司 | Method and system for providing clue for finding lost mobile terminal |
CN101720072A (en) * | 2009-12-10 | 2010-06-02 | 候万春 | System and method for realizing antitheft of mobile phone |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105491566A (en) * | 2014-09-18 | 2016-04-13 | 中国电信股份有限公司 | Twin machine detection method and system, and policy and charging rules function (PCRF) device |
CN105491566B (en) * | 2014-09-18 | 2018-11-02 | 中国电信股份有限公司 | Margin Machine detection method, system and PCRF equipment |
CN104661220A (en) * | 2015-03-13 | 2015-05-27 | 中国联合网络通信集团有限公司 | Method and device for achieving authentication treatment |
CN108153558A (en) * | 2017-12-06 | 2018-06-12 | 广东欧珀移动通信有限公司 | Method, electronic device and the readable storage medium storing program for executing of unified custom terminal software version |
CN108156319A (en) * | 2017-12-26 | 2018-06-12 | 哈尔滨海能达科技有限公司 | A kind of method and device of control terminal equipment |
CN110392353A (en) * | 2018-04-17 | 2019-10-29 | 大唐移动通信设备有限公司 | A kind of note transmission method and device |
CN110392353B (en) * | 2018-04-17 | 2020-11-03 | 大唐移动通信设备有限公司 | Short message sending method and device |
CN111836239A (en) * | 2019-04-19 | 2020-10-27 | 诺玛有限公司 | Method for screening dangerous Bluetooth equipment based on connection with Bluetooth equipment |
CN111866716A (en) * | 2019-04-19 | 2020-10-30 | 诺玛有限公司 | System for dangerous bluetooth equipment is filtered to position based on bluetooth equipment |
CN111836239B (en) * | 2019-04-19 | 2023-02-21 | 诺玛有限公司 | Method for screening dangerous Bluetooth equipment based on connection with Bluetooth equipment |
WO2023246286A1 (en) * | 2022-06-23 | 2023-12-28 | 中兴通讯股份有限公司 | Method, apparatus and system for restricting set-card separation, and storage medium and electronic apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103781058A (en) | Method and device for detecting legality of mobile terminal in CDMA network | |
CN101953192B (en) | Method and apparatus for managing subscription credentials in a wireless communication device | |
CN101796858B (en) | Service provider activation with subscriber identity module policy | |
RU2391796C2 (en) | Limited access to functional sets of mobile terminal | |
KR102219756B1 (en) | Method for managing the state of connected devices | |
US9497630B2 (en) | Enhanced manageability in wireless data communication systems | |
CN101577908B (en) | User equipment verification method, device identification register and access control system | |
EP2708069B1 (en) | Sim lock for multi-sim environment | |
CN102843669B (en) | Data access method and device | |
CN104244227A (en) | Terminal access authentication method and device in internet of things system | |
CN101494854B (en) | Method, system and equipment for preventing SIM LOCK from being unlocked illegally | |
EP2611226B1 (en) | Processing method and system for over-the-air bootstrap | |
CN101841812B (en) | Terminal legality verifying method and device and communication system | |
EP3675541B1 (en) | Authentication method and device | |
CN105052184A (en) | Controlling access of a user equipment to services | |
US9736676B2 (en) | Method of controlling access to a cellular network | |
CN105578451A (en) | Antitheft method and device | |
EP2617218B1 (en) | Authentication in a wireless access network | |
CN108024241B (en) | Terminal access authentication method, system and authentication server | |
US20130303112A1 (en) | Tracking of missing communication devices | |
CN105636043A (en) | ESIM (Embedded SIM) card authentication method, eSIM card authentication device and terminal | |
CN105764054A (en) | Method for network detection based on embedded intelligent card and terminal thereof | |
CN106487776B (en) | Method, network entity and system for protecting machine type communication equipment | |
CN103843378A (en) | Method for binding secure device to a wireless phone | |
CN100415032C (en) | Interaction method for mobile terminal and network side in mobile communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140507 |
|
RJ01 | Rejection of invention patent application after publication |