CN104427497A - Handset verification method, handset and handset verification system - Google Patents
Handset verification method, handset and handset verification system Download PDFInfo
- Publication number
- CN104427497A CN104427497A CN201310363167.XA CN201310363167A CN104427497A CN 104427497 A CN104427497 A CN 104427497A CN 201310363167 A CN201310363167 A CN 201310363167A CN 104427497 A CN104427497 A CN 104427497A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- mobile
- imsi
- confirmation
- phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 61
- 238000012795 verification Methods 0.000 title claims abstract description 59
- 238000012790 confirmation Methods 0.000 claims description 48
- 238000013475 authorization Methods 0.000 claims description 23
- 238000010295 mobile communication Methods 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 description 2
- 238000012937 correction Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a handset verification method, a handset and a handset verification system. In the handset verification method, which is a method for a first handset to verify a second handset, the first handset pre-stores a plurality of IMSIs. The verification method includes the following steps: S1. the second handset sends a verification message, which includes an IMSI of the second handset, to the first handset; S2. the first handset judges whether the IMSI of the second handset is one of the plurality of IMSIs pre-stored by the first handset and if so, S3 is executed and if not so, the procedure is over; S3. the first handset confirms that the second handset is legal in identity. The verification method is capable of verifying the identity of the handset more accurately and handset identities with permissions are significantly hard to copy so that it is effectively prevented that handsets without permissions intrude and occupy resources.
Description
Technical field
The present invention relates to a kind of verification method of mobile phone, mobile phone and mobile phone verification system.
Background technology
At present, portable WIFI(Wireless Fidelity) focus become technology common in daily life.The GPRS(general packet radio service that mobile phone is received) signal or 3G(3G (Third Generation) Moblie) signal or 4G signal be converted into WIFI signal send out again (otherwise, then that WIFI signal is converted to 2G, 3G, 4G signal), described mobile phone has just become a portable WIFI hot spot.Portable WIFI hot spot can be supplied to other mobile terminals not having authority access network and use.
In prior art, conventional checking means before the described portable WIFI hot spot of other mobile terminals access have the MAC Address (hardware address) of password authentification and binding WIFI, but can be easy to crack authentication password by means such as sniffers, be forged after the packet that MAC Address also can be sent by the portable WIFI hot spot of intercepting and capturing.Portable WIFI hot spot is not easily had the user of authority invade thus take resource, and internet security is very poor.
Summary of the invention
The technical problem to be solved in the present invention is poor in order to overcome internet security in prior art, and the accuracy of existing verification method is not high, thus causes resource by the defect illegally occupied, provide a kind of more accurately and the higher verification method of security performance.
The present invention solves above-mentioned technical problem by following technical proposals: a kind of verification method of mobile phone, and described verification method is the method for one first mobile phone checking one second mobile phone, and described first mobile phone prestores multiple IMSI, and described verification method comprises the steps:
S
1, described second mobile phone sends an authorization information comprising the IMSI of described second mobile phone to described first mobile phone;
S
2, described first mobile phone judges that whether the IMSI of described second mobile phone is one in multiple IMSI of prestoring of described first mobile phone, if then perform step S
3, then flow process terminates if not;
S
3, the described first described second-hand's identity that confirms phone is legal.
IMSI(international mobile subscriber identity) be identify unique number of distributing of mobile subscriber in the world, be the SIM(user identity identification being stored in mobile phone) mark of mobile subscriber in card, IMSI can not be changed by system.The method invading other networks in prior art mainly contains the verification method of the MAC Address of method of password authentication and binding WIFI, compare password and the MAC Address of these two kinds of verification modes, IMSI can not be rewritten, if the packet comprising IMSI number is intercepted and captured by disabled user and decodes out IMSI, the IMSI of self can not be rewritten into the IMSI decoded out by disabled user, and IMSI can not be forged.Therefore, utilize IMSI to verify, fail safe is higher.
Described first mobile phone prestores multiple IMSI, it is legal that the mobile phone that these IMSI are corresponding is that described first mobile phone is considered as identity, such as, when being portable WIFI hot spot with the first mobile phone, the mobile phone that these IMSI are corresponding is the authority of network that has described first mobile phone of access to provide.
Preferably, described first mobile phone also prestores the cell-phone number corresponding with described multiple IMSI, step S
3for:
S
31, described first mobile phone sends one and confirms that request is to described second mobile phone;
S
32, described second mobile phone sends a confirmation to described first mobile phone by mobile communication, described confirmation has the mark that content is the cell-phone number of described second mobile phone;
S
33, described first mobile phone judges that whether the cell-phone number of described second mobile phone corresponding with the IMSI comprised in described authorization information, if then perform step S
34, then flow process terminates if not;
S
34, the described first described second-hand's identity that confirms phone is legal.
The corresponding relation of cell-phone number and IMSI only has mobile communication carrier and described first mobile phone to know, IMSI can not be copied, and by the associating that IMSI checking and cell-phone number are verified, the checking of identity can be made to have high accuracy.
Preferably, described second mobile phone sends described authorization information to described first mobile phone by network service.Described second mobile phone can send described authorization information easily by network service.
Preferably, the form of described confirmation is note.Just the cell-phone number of described second mobile phone can be known after described first mobile phone receives the note of described second mobile phone.
Preferably, the form of described confirmation is mobile calls.Mobile calls is the phone that in daily life, cellphone subscriber dials mutually, just the cell-phone number of described second mobile phone can be known after described first mobile phone receives the phone of described second mobile phone, the mark of described second mobile phone can be comprised in the phone dialed, enable described first-hand machine tell described second mobile phone.
Preferably, described first mobile phone does not make prompting when receiving described confirmation.Described verification method does not need to be shown to user, as as described in the form of confirmation be mobile calls time, described first mobile phone does not need the action made jingle bell, shake a class when receiving described mobile calls, only need the cell-phone number knowing described second mobile phone.Described first mobile phone is not made prompting and can be verified when not affecting user, can accelerate verifying speed yet.
Preferably, after described first mobile phone receives described confirmation, disconnect described mobile calls, or described second confirms phone after described mobile calls is sent to described first mobile phone and disconnects described mobile calls.After the mobile calls of the second mobile phone and described first mobile phone connect, no matter be that described first mobile phone or described second mobile phone all can judge that described mobile calls is set up, after connecting, described first mobile phone just can know the cell-phone number of described second mobile phone, after this no matter be that described first mobile phone or described second mobile phone all can disconnect described mobile calls, this verification method can be made like this not spend call rate.
Preferably, step S
33for:
S
331, described first mobile phone judges describedly to confirm whether the time interval of the time of reception of transmitting time and the described confirmation of request is less than a preset duration, if then execution step S
332, then flow process terminates if not;
S
332, described first mobile phone judges that whether the cell-phone number of described second mobile phone corresponding with the IMSI comprised in described authorization information, if then perform step S
34, then flow process terminates if not.
It is to tell described second mobile phone that described first mobile phone judges whether the described time interval is less than a preset duration, such as after described first mobile phone sends described confirmation request to described second mobile phone, described second mobile phone does not have to send form as the confirmation of mobile calls to described first mobile phone at once, just there is the first mobile phone described in other mobile phone mobile calls in the meantime, the cell-phone number of other mobile phones to be mapped with the IMSI number of described second mobile phone the checking made the mistake for avoiding the first mobile phone, a time interval is set, the confirmation received within the described time interval is considered as the cell-phone number of described second mobile phone.This mode can improve the accuracy of the checking of described verification method further.
Preferably, the span of described preset duration is 1 second to 5 seconds.According to the time of velocity correction interval of the described confirmation of the transmission of mobile phone, thus the value of preset duration is set.
The verification method of mobile phone of the present invention not only can apply on the Authority Verification of portable WIFI hot spot, and other need in the field of identity verification or authority can also to be applied to mobile phone, such as using mobile phone as server mode to the checking etc. of login user identity.
Present invention also offers a kind of mobile phone, described mobile phone prestores multiple IMSI, and described mobile phone comprises:
One receiver module, for receiving the authorization information comprising the IMSI of described outside mobile phone that an outside mobile phone sends;
One judge module, after judging that the IMSI of described outside mobile phone is in multiple IMSI of prestoring of described mobile phone one, calls a confirmation module;
Described confirmation module, legal for confirming described outside handset identities.
Described mobile phone can be the first mobile phone in above-mentioned verification method, and described outside mobile phone can be the second mobile phone in described verification method.Whether described mobile phone can be legal by the identity of the described outside mobile phone of described verification method checking, and the accuracy of checking is high.
Preferably, described receiver module receives described authorization information by network service.Described receiver module can receive described authorization information easily by network service.
Preferably, the form of described confirmation is note.
Preferably, the form of described confirmation is mobile calls.
Preferably, described mobile phone does not make prompting when receiving described confirmation.Described verification method does not need to be shown to user, as described in the form of confirmation be mobile calls time, described mobile phone does not need the action made jingle bell, shake a class when receiving described mobile calls, only need the cell-phone number knowing described outside mobile phone.Described mobile phone is not made prompting and can be verified when not affecting user, can accelerate verifying speed yet.
Preferably, described mobile phone disconnects described mobile calls after receiving described confirmation.After the mobile calls of outside mobile phone and described mobile phone connect, described mobile phone can judge that described mobile calls is set up, after connecting, described mobile phone just can know the cell-phone number of described outside mobile phone, after this described mobile phone can disconnect described mobile calls, and described mobile phone and described outside mobile phone can be made like this not to spend call rate.
Preferably, described judge module also for judge described confirm that the transmitting time of request and time interval of time of reception of described confirmation be less than a preset duration after, continue to judge that whether the cell-phone number of described outside mobile phone is corresponding with the IMSI comprised in described authorization information, if then call described confirmation module.Judge whether the described time interval is less than a preset duration, described mobile phone can be made correctly to recognize the cell-phone number of described outside mobile phone.
Preferably, the span of described preset duration is 1 second to 5 seconds.According to the time of velocity correction interval of the described confirmation of the transmission of mobile phone, thus the value of preset duration is set.
The present invention also provides a kind of mobile phone verification system, and described mobile phone verification system comprises a mobile phone as above and more than one described outside mobile phone.In described mobile phone verification system, described mobile phone can verify that whether the identity of described outside mobile phone is legal accurately.
Positive progressive effect of the present invention is: described verification method of the present invention can verify the identity of mobile phone more accurately, and the handset identities had permission is difficult to be imitated, thus effectively prevents not having the mobile phone of authority invade and take resource.
Accompanying drawing explanation
Fig. 1 is the flow chart of the embodiment 1 of the verification method of mobile phone of the present invention.
Fig. 2 is the structural representation of the embodiment 1 of mobile phone of the present invention.
Fig. 3 is the flow chart of the embodiment 2 of the verification method of mobile phone of the present invention.
Fig. 4 is the flow chart of the embodiment 3 of the verification method of mobile phone of the present invention.
Embodiment
Present pre-ferred embodiments is provided, to describe technical scheme of the present invention in detail below in conjunction with accompanying drawing.
Embodiment 1
See Fig. 1, a kind of verification method of mobile phone, described verification method is the method for one first mobile phone checking one second mobile phone, described first mobile phone prestores multiple IMSI, described first mobile phone is portable WIFI hot spot, described second mobile phone wish first will through the checking of described verification method by described first mobile phone interconnection network, and described verification method comprises the steps:
Step 100, described second mobile phone send one by network service and comprise the authorization information of the IMSI of described second mobile phone to described first mobile phone.
Step 101, described first mobile phone judge that whether the IMSI of described second mobile phone is one in multiple IMSI of prestoring of described first mobile phone, if then perform step 102, then flow process terminates if not.
Step 102, the described first described second-hand's identity that confirms phone is legal.
Because described IMSI can not be modified, therefore described verification method can distinguish the identity of described second mobile phone accurately, and after described second-hand's identity is legal, wireless connections set up by described first mobile phone and described second mobile phone.
Accordingly, see Fig. 2, the present embodiment also provides a kind of mobile phone, described mobile phone prestores multiple IMSI, described mobile phone is portable WIFI hot spot, one outside mobile phone is for passing through described mobile phone interconnection network, and described outside mobile phone will through the checking of described verification method, and described mobile phone comprises: receiver module 11, judge module 12 and confirms module 13.
The authorization information comprising the IMSI of described outside mobile phone that described receiver module 11 is sent by mobile phone outside described in network reception, described judge module 12 judges that the IMSI of described outside mobile phone, after in multiple IMSI of prestoring of described mobile phone one, calls described confirmation module 13.Described confirmation module 13 confirms that described outside handset identities is legal.Namely described outside mobile phone can pass through described mobile phone interconnection network.Described authorization information is received more convenient by network by described receiver module 11.
Accordingly, the present embodiment also provides a kind of mobile phone verification system, and described mobile phone verification system comprises a mobile phone as above and more than one described outside mobile phone.In described mobile phone verification system, described mobile phone can verify that whether the identity of described outside mobile phone is legal accurately.
Embodiment 2
See Fig. 3, the present embodiment is substantially the same manner as Example 1, and difference is only, described first mobile phone also prestores the cell-phone number corresponding with described multiple IMSI, and step 102 is:
Step 1021, described first mobile phone send one and confirm that request is to described second mobile phone.
Step 1022, described second mobile phone send a note to described first mobile phone.
Described note has the mark that content is the cell-phone number of described second mobile phone.Described mobile phone does not make prompting when receiving described note.
Step 1023, described first mobile phone judge whether the time interval of the described transmitting time of confirmation request and the time of reception of described note is less than 1 second, if then perform step 1024, then flow process terminates if not.
Step 1024, described first mobile phone judge that whether the cell-phone number of described second mobile phone is corresponding with the IMSI comprised in described authorization information, if then perform step 1025, then flow process terminates if not.
Step 1025, the described first described second-hand's identity that confirms phone is legal.
The corresponding relation of cell-phone number and IMSI only has mobile communication carrier and described first mobile phone to know, IMSI can not be copied, the conventional method of stealing of cell-phone number cannot be intercepted and captured, and the joint verification of IMSI checking and cell-phone number checking can be verified to have high accuracy.
Accordingly, the mobile phone in the present embodiment is substantially identical with the mobile phone in embodiment 1, and difference is only, described mobile phone also prestores the cell-phone number corresponding with described multiple IMSI, and described mobile phone comprises: a sending module.
At described judge module, described sending module judges that the IMSI of described outside mobile phone is that in multiple IMSI of prestoring of described mobile phone one sends one afterwards and confirms that request is to described outside mobile phone.Described outside mobile phone is in order to verify the note sent to described mobile phone by described mobile phone, described note has the mark that content is the cell-phone number of described outside mobile phone.Described receiver module receives described note, and described mobile phone does not make prompting when receiving described note.Described judge module judge described confirm that the transmitting time of request and time interval of time of reception of note be less than 1 second after, continue to judge that whether the cell-phone number of described outside mobile phone is corresponding with the IMSI comprised in described authorization information, if then call described confirmation module.Described confirmation module confirms that described outside handset identities is legal.The accuracy of the identity of the described outside mobile phone of described mobile phone checking is high.
Embodiment 3
See Fig. 4, the present embodiment is substantially the same manner as Example 2, and difference is only, step 1022 is:
First mobile phone described in step 10221, described second mobile phone mobile calls.
Described mobile calls has the mark that content is the cell-phone number of described second mobile phone.Described mobile phone does not make prompting after receiving described mobile calls, and described second mobile phone is being determined to disconnect described mobile calls after described mobile calls received by described mobile phone.Described mobile phone and described outside mobile phone all do not spend call rate.
Step 1023 be:
Step 10231, described first mobile phone judge whether the time interval of the described transmitting time of confirmation request and the time of reception of described mobile calls is less than 5 seconds, if then perform step 1024, then flow process terminates if not.
Accordingly, mobile phone in the present embodiment is substantially identical with the mobile phone in embodiment 2, difference is only: described outside mobile phone is in order to verify mobile phone described in mobile calls by described mobile phone, and described mobile calls has the mark that content is the cell-phone number of described outside mobile phone.Described receiver module receives described mobile calls, and described mobile phone is not made prompting (comprise not jingle bell, do not shake) just disconnect when being received described mobile calls.Described judge module judge described confirm that the transmitting time of request and time interval of time of reception of mobile calls be less than 5 seconds after, continue to judge that whether the cell-phone number of described outside mobile phone is corresponding with the IMSI comprised in described authorization information, if then call described confirmation module.
Although the foregoing describe the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, protection scope of the present invention is defined by the appended claims.Those skilled in the art, under the prerequisite not deviating from principle of the present invention and essence, can make various changes or modifications to these execution modes, but these change and amendment all falls into protection scope of the present invention.
Claims (19)
1. a verification method for mobile phone, is characterized in that, described verification method is the method for one first mobile phone checking one second mobile phone, and described first mobile phone prestores multiple IMSI, and described verification method comprises the steps:
S
1, described second mobile phone sends an authorization information comprising the IMSI of described second mobile phone to described first mobile phone;
S
2, described first mobile phone judges that whether the IMSI of described second mobile phone is one in multiple IMSI of prestoring of described first mobile phone, if then perform step S
3, then flow process terminates if not;
S
3, the described first described second-hand's identity that confirms phone is legal.
2. verification method as claimed in claim 1, is characterized in that, described first mobile phone also prestores the cell-phone number corresponding with described multiple IMSI, step S
3for:
S
31, described first mobile phone sends one and confirms that request is to described second mobile phone;
S
32, described second mobile phone sends a confirmation to described first mobile phone by mobile communication, described confirmation has the mark that content is the cell-phone number of described second mobile phone;
S
33, described first mobile phone judges that whether the cell-phone number of described second mobile phone corresponding with the IMSI comprised in described authorization information, if then perform step S
34, then flow process terminates if not;
S
34, the described first described second-hand's identity that confirms phone is legal.
3. verification method as claimed in claim 1 or 2, is characterized in that, described second mobile phone sends described authorization information to described first mobile phone by network service.
4. verification method as claimed in claim 2, it is characterized in that, the form of described confirmation is note.
5. verification method as claimed in claim 2, it is characterized in that, the form of described confirmation is mobile calls.
6. verification method as claimed in claim 2, is characterized in that, described first mobile phone does not make prompting when receiving described confirmation.
7. verification method as claimed in claim 5, is characterized in that, disconnect described mobile calls after described first mobile phone receives described confirmation, or described second confirms phone after described mobile calls is sent to described first mobile phone and disconnect described mobile calls.
8. verification method as claimed in claim 2, is characterized in that, step S
33for:
S
331, described first mobile phone judges describedly to confirm whether the time interval of the time of reception of transmitting time and the described confirmation of request is less than a preset duration, if then execution step S
332, then flow process terminates if not;
S
332, described first mobile phone judges that whether the cell-phone number of described second mobile phone corresponding with the IMSI comprised in described authorization information, if then perform step S
34, then flow process terminates if not.
9. verification method as claimed in claim 8, it is characterized in that, the span of described preset duration is 1 second to 5 seconds.
10. a mobile phone, is characterized in that, described mobile phone prestores multiple IMSI, and described mobile phone comprises:
One receiver module, for receiving the authorization information comprising the IMSI of described outside mobile phone that an outside mobile phone sends;
One judge module, after judging that the IMSI of described outside mobile phone is in multiple IMSI of prestoring of described mobile phone one, calls a confirmation module;
Described confirmation module, legal for confirming described outside handset identities.
11. mobile phones as claimed in claim 10, is characterized in that, described mobile phone also prestores the cell-phone number corresponding with described multiple IMSI, and described mobile phone comprises:
One sending module, for judging that at described judge module the IMSI of described outside mobile phone is that in multiple IMSI of prestoring of described mobile phone one sends one afterwards and confirms that request is to described outside mobile phone;
Described receiver module is also for receiving the confirmation that described outside mobile phone sends by mobile communication, described confirmation has the mark that content is the cell-phone number of described outside mobile phone;
Whether described judge module is also corresponding with the IMSI comprised in described authorization information for judging the cell-phone number of described outside mobile phone after described receiver module receives described confirmation, if then call described confirmation module.
12. mobile phones as described in claim 10 or 11, it is characterized in that, described receiver module receives described authorization information by network service.
13. mobile phones as claimed in claim 11, is characterized in that, the form of described confirmation is note.
14. mobile phones as claimed in claim 11, is characterized in that, the form of described confirmation is mobile calls.
15. mobile phones as claimed in claim 11, is characterized in that, described mobile phone does not make prompting when receiving described confirmation.
16. mobile phones as claimed in claim 14, it is characterized in that, described mobile phone disconnects described mobile calls after receiving described confirmation.
17. mobile phones as claimed in claim 11, it is characterized in that, described judge module also for judge described confirm that the transmitting time of request and time interval of time of reception of described confirmation be less than a preset duration after, continue to judge that whether the cell-phone number of described outside mobile phone is corresponding with the IMSI comprised in described authorization information, if then call described confirmation module.
18. mobile phones as claimed in claim 17, is characterized in that, the span of described preset duration is 1 second to 5 seconds.
19. 1 kinds of mobile phone verification systems, is characterized in that, described mobile phone verification system comprises just like the mobile phone in claim 11 to 18 described in any one and more than one described outside mobile phone.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310363167.XA CN104427497B (en) | 2013-08-20 | 2013-08-20 | Verification method, mobile phone and the mobile phone of mobile phone verify system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310363167.XA CN104427497B (en) | 2013-08-20 | 2013-08-20 | Verification method, mobile phone and the mobile phone of mobile phone verify system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104427497A true CN104427497A (en) | 2015-03-18 |
CN104427497B CN104427497B (en) | 2019-10-22 |
Family
ID=52975199
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310363167.XA Expired - Fee Related CN104427497B (en) | 2013-08-20 | 2013-08-20 | Verification method, mobile phone and the mobile phone of mobile phone verify system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104427497B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105578465A (en) * | 2015-12-18 | 2016-05-11 | 努比亚技术有限公司 | Portable hotspot access management method and device of sharing mobile terminal and mobile terminal |
CN107889105A (en) * | 2017-09-12 | 2018-04-06 | 深圳市优购时代科技有限公司 | The checking card-locking method and its checking pintle hook lock system of mobile phone |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043755A (en) * | 2007-04-16 | 2007-09-26 | 华为技术有限公司 | Method, system and apparatus for admittance determination in mobile communication system |
CN102833744A (en) * | 2012-06-28 | 2012-12-19 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for obtaining wireless LAN authentication and privacy Infrastructure (WAPI) certificate |
CN102869014A (en) * | 2012-09-18 | 2013-01-09 | 东莞宇龙通信科技有限公司 | Terminal and data communication method |
CN102883320A (en) * | 2012-09-18 | 2013-01-16 | 东莞宇龙通信科技有限公司 | WiFi (Wireless Fidelity) authentication method and system thereof |
CN102893669A (en) * | 2012-07-02 | 2013-01-23 | 华为技术有限公司 | Method, device and system of accessing mobile network |
US20130035104A1 (en) * | 2011-05-24 | 2013-02-07 | Vodafone Holding Gmbh | Method and device for providing an identity identifier of an electronic terminal device |
-
2013
- 2013-08-20 CN CN201310363167.XA patent/CN104427497B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043755A (en) * | 2007-04-16 | 2007-09-26 | 华为技术有限公司 | Method, system and apparatus for admittance determination in mobile communication system |
US20130035104A1 (en) * | 2011-05-24 | 2013-02-07 | Vodafone Holding Gmbh | Method and device for providing an identity identifier of an electronic terminal device |
CN102833744A (en) * | 2012-06-28 | 2012-12-19 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for obtaining wireless LAN authentication and privacy Infrastructure (WAPI) certificate |
CN102893669A (en) * | 2012-07-02 | 2013-01-23 | 华为技术有限公司 | Method, device and system of accessing mobile network |
CN102869014A (en) * | 2012-09-18 | 2013-01-09 | 东莞宇龙通信科技有限公司 | Terminal and data communication method |
CN102883320A (en) * | 2012-09-18 | 2013-01-16 | 东莞宇龙通信科技有限公司 | WiFi (Wireless Fidelity) authentication method and system thereof |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105578465A (en) * | 2015-12-18 | 2016-05-11 | 努比亚技术有限公司 | Portable hotspot access management method and device of sharing mobile terminal and mobile terminal |
CN107889105A (en) * | 2017-09-12 | 2018-04-06 | 深圳市优购时代科技有限公司 | The checking card-locking method and its checking pintle hook lock system of mobile phone |
CN107889105B (en) * | 2017-09-12 | 2021-02-02 | 深圳市优购时代科技有限公司 | Verification card locking method and verification card locking system of mobile phone |
Also Published As
Publication number | Publication date |
---|---|
CN104427497B (en) | 2019-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102843682B (en) | Access point authorizing method, device and system | |
CN110798833B (en) | Method and device for verifying user equipment identification in authentication process | |
US9674219B2 (en) | Authenticating public land mobile networks to mobile stations | |
WO2019017840A1 (en) | Network verification method, and relevant device and system | |
CN103428699A (en) | Registration binding and identity authentication method based on mobile phone hardware feature information | |
CN110476397B (en) | User authentication method and device | |
RU2010118312A (en) | WIRELESS ACCESS MANAGEMENT | |
CN102318386A (en) | Service-based authentication to a network | |
CN108377574A (en) | A kind of communication means, terminal, network and the system of double card bilateral | |
KR20160143333A (en) | Method for Double Certification by using Double Channel | |
CN102984335B (en) | Dial the identity identifying method of landline telephone, equipment and system | |
CN110073681B (en) | Method, apparatus and computer readable medium for internet of things device | |
WO2013185709A1 (en) | Call authentication method, device, and system | |
US9749856B2 (en) | Device to machine communications | |
CN103607706A (en) | NFC-technology based conversation method, NFC terminal and far-end server | |
CN105873059A (en) | United identity authentication method and system for power distribution communication wireless private network | |
WO2018113536A1 (en) | Method and system for achieving multi-device connected communication | |
CN105429978A (en) | Data access methods and system, and equipment | |
CN104427497A (en) | Handset verification method, handset and handset verification system | |
CN106341374B (en) | Method and device for limiting access of unlicensed user equipment to home gateway | |
US10028141B2 (en) | Method and system for determining that a SIM and a SIP client are co-located in the same mobile equipment | |
US8699675B2 (en) | Method and apparatus for exchanging information in a voice communication system | |
EP1176760A1 (en) | Method of establishing access from a terminal to a server | |
CN103108316A (en) | Authentication method, device and system for aerial card writing | |
CN112399416B (en) | Access method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20191022 |