CN109862513A - A kind of method of illegal mobile terminal in identification region - Google Patents
A kind of method of illegal mobile terminal in identification region Download PDFInfo
- Publication number
- CN109862513A CN109862513A CN201811621981.6A CN201811621981A CN109862513A CN 109862513 A CN109862513 A CN 109862513A CN 201811621981 A CN201811621981 A CN 201811621981A CN 109862513 A CN109862513 A CN 109862513A
- Authority
- CN
- China
- Prior art keywords
- base station
- mobile terminal
- illegal
- mobile
- identification code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a kind of methods of mobile terminal illegal in identification region, comprising the following steps: step 1: mobile terminal enters anolog base station communication zone;Step 2: anolog base station simulates mobile device base station, sends signal of communication, obtains the equipment exclusive identification code of mobile device;Step 3: the equipment exclusive identification code is uploaded to mobile terminal management system by anolog base station;Step 4: mobile terminal management system searches for the equipment exclusive identification code in chartered legitimate device inventory, if the equipment exclusive identification code is searched, for legal terminal;Conversely, being then illegal terminal.The present invention is actively communicated with each mobile phone entered in communication range due to using anolog base station, and automatically obtains its communication access address, and illegal mobile phone user does not perceive entire identification process, it is avoided to use counter-investigation means.Due to the unique identification device code of the intelligent mobile terminals such as detection MAC, illegal mobile phone, which is effectively guaranteed, can not pretend to be legal mobile phone to steal network data.
Description
Technical field
The invention belongs to mobile service scene fields, and in particular to a kind of method of illegal mobile terminal in identification region.
Background technique
At present for sensitive sites, need to forbid the mobile terminals such as tyre mobile phone/Pad in order to avoid information leakage, such as manufacturing industry
Sensitive plant area, trade secret region etc..It generallys use detection the methods of door or artificial detection at present to find tyre mobile phone, takes
When it is laborious.
Chinese invention patent CN102711110A provides a kind of method and wireless router for managing Wi-Fi network, the party
Method includes: the username and password that Wi-Fi network is randomly generated in wireless router;Detection enters the nothing of near-field communication identification region
Line mobile terminal, Xiang Suoshu mobile radio terminal send the username and password for the Wi-Fi network being randomly generated, obtain the nothing
The media access control address of line mobile terminal;Enter the wireless of Wi-Fi network by media access control address control
Mobile terminal.It can prevent the illegal user of loiter network in public places and imitated fishing wireless router by the invention, protect
Card legitimate user safely and efficiently uses wireless network.
However, above-mentioned patent is needed by wireless router, and needs to send password to the mobile phone entered in network, lead to
Whether to verify its MAC Address legal, operating process is complicated if crossing logging in network process, and refuses input password in illegal user
When connecting wireless router networks, the invasion of illegal mobile phone can not be found in time.
Summary of the invention
For overcome the deficiencies in the prior art, the present invention proposes one kind based on anolog base station illegally to move in identification region
The method of terminal, effective solution problems.
The present invention to achieve the above object, is implemented with the following technical solutions:
A kind of method of illegal mobile terminal in identification region, comprising the following steps:
Step 1: mobile terminal enters anolog base station communication zone;
Step 2: anolog base station simulates mobile device base station, sends signal of communication, and the equipment for obtaining mobile device is uniquely marked
Know code;
Step 3: the equipment exclusive identification code is uploaded to mobile terminal management system by anolog base station;
Step 4: mobile terminal management system searches for the equipment exclusive identification code in chartered legitimate device inventory,
If the equipment exclusive identification code is searched, for legal terminal;Conversely, being then illegal terminal.
Further, the equipment exclusive identification code is at least one of the following: the address WiFi Mac, international mobile use
Family identification code, international mobile equipment identification number.
Further, the anolog base station supports that standard includes but is not limited to: GSM (movement, connection 2G), CDMA
CDMA2000 (telecommunications 2G, 3G), WCDMA (connection 3G), TD-CDMA (mobile 3G), TDD (mobile 4G), FDD (connection 4G), FDD
(telecommunications 4G), to support full system type pictorial.Coverage area: 200-800m (factor depending on the site environment);Automatic identified time, place
Etc. relevant informations;Data transmission: supporting a variety of data transfer means, supports a variety of transmission sides such as cable network, wireless, WiFi
Formula;Receiving sensitivity: < -104dBm;Acquisition speed: 1200 per minute or more;40mW (+16dbm)~10W (+40dbm) can
It adjusts, 9 grades of adjustings;Support 3 kinds or more transmitting antennas that can be arranged according to ambient conditions.
Compared with prior art, the present invention have the following advantages that and the utility model has the advantages that
(1) present invention is actively communicated with each mobile phone entered in communication range due to using anolog base station, and from
Dynamic to obtain its communication access address, illegal mobile phone user does not perceive entire identification process, it is avoided to use counter-investigation hand
Section.
(2) illegal hand is effectively guaranteed due to the unique identification device code of the intelligent mobile terminals such as detection MAC in the present invention
Machine can not pretend to be legal mobile phone to steal network data.
Detailed description of the invention
Fig. 1 is overall flow schematic diagram of the invention;
Fig. 2 is flow chart of the method for the present invention.
Specific embodiment
The present invention is described in further detail below with reference to embodiment, embodiments of the present invention are not limited thereto.
Embodiment:
As shown in Figure 1, the present invention is divided into anolog base station and mobile terminal management system two parts, anolog base station is for finding
All mobile terminals in region, and equipment exclusive identification code is obtained, mobile terminal management system and legitimate device inventory compare
The equipment exclusive identification code, is confirmed whether to be legitimate device.
Anolog base station of the present invention, it is fast to the mobile phone terminal in equipment coverage area under the conditions of target unaware
Speed obtains IMSI, IMEI, MAC Address etc..Support standard include but is not limited to: GSM (movement, connection 2G), CDMA CDMA2000
(telecommunications 2G, 3G), WCDMA (connection 3G), TD-CDMA (mobile 3G), TDD (mobile 4G), FDD (connection 4G), FDD (telecommunications
4G), to support full system type pictorial.Coverage area: 200-800m (factor depending on the site environment);The phases such as automatic identified time, place
Close information;Data transmission: supporting a variety of data transfer means, supports a variety of transmission modes such as cable network, wireless, WiFi;It connects
Receive sensitivity: < -104dBm;Acquisition speed: 1200 per minute or more;40mW (+16dbm)~10W (+40dbm) is adjustable, 9 grades
It adjusts;Support 3 kinds or more transmitting antennas that can be arranged according to ambient conditions.
As shown in Fig. 2, in a kind of identification region described in the present embodiment illegal mobile terminal method, including following step
It is rapid:
Step S1: mobile terminal enters anolog base station communication zone.
Step S2: anolog base station simulates mobile device base station, sends signal of communication, with obtaining the WiFi Mac of mobile device
The equipment exclusive identification code such as location, IMSI, IMEI.
International mobile subscriber identity (IMSI:International Mobile Subscriber
Identification Number) it is the mark for distinguishing mobile subscriber, it is stored in SIM card, can be used for distinguishing mobile subscriber's
Effective information.Its total length is no more than 15, equally uses 0~9 number.Wherein MCC is mobile subscriber belonging country code name,
3 bit digitals are accounted for, Chinese MCC is defined as 460;MNC is mobile network number, is made of two or three bit digitals, China Mobile
Mobile network encode (MNC) be 00;The mobile radio communication that mobile subscriber is belonged to for identification;MSIN is mobile subscriber's identification
Code, to identify the mobile subscriber in a certain mobile radio communication.
International mobile equipment identification number (International Mobile Equipment Identity, IMEI) is that is, logical
Often described handset serial, mobile phone " string number ", for identifying that each independent mobile phone etc. is mobile in mobile telephone network
Communication equipment is equivalent to the identity card of mobile phone.Sequence number shares 15 bit digitals, and preceding 6 (TAC) are Type Approval numbers,
Represent type of cell phone.Then 2 (FAC) are last assembly number, represent the place of production.6 (SNR) are strings number afterwards, represent production sequence
Number.Last 1 (SP) is generally 0, is check code, spare.International mobile equipment identification number is generally affixed on the fuselage back side and outsourcing
It loads onto, while existing in mobile phone memory, can be inquired by inputting * #06#.
Step S3: equipment exclusive identification code is uploaded to mobile terminal management system by anolog base station.
Step S4: mobile terminal management system searches for the equipment unique identification in chartered legitimate device inventory
Code, if the equipment exclusive identification code is searched, for legal terminal.Conversely, being then illegal terminal.
This programme can be in the case where not needing to carry out personal seeking, the automatic mobile device found in region, and
Judge whether to be legal terminal.
The above is only presently preferred embodiments of the present invention, not does limitation in any form to the present invention, it is all according to
According to technical spirit any simple modification to the above embodiments of the invention, equivalent variations, protection of the invention is each fallen within
Within the scope of.
Claims (10)
1. a kind of method of illegal mobile terminal in identification region, which comprises the following steps:
Step 1: mobile terminal enters anolog base station communication zone;
Step 2: anolog base station simulates mobile device base station, sends signal of communication, obtains the equipment exclusive identification code of mobile device;
Step 3: the equipment exclusive identification code is uploaded to mobile terminal management system by anolog base station;
Step 4: mobile terminal management system searches for the equipment exclusive identification code in chartered legitimate device inventory, if
The equipment exclusive identification code is searched, then is legal terminal;Conversely, being then illegal terminal.
2. the method for illegal mobile terminal in a kind of identification region according to claim 1, which is characterized in that the equipment
Exclusive identification code is at least one of the following: the address WiFi Mac, international mobile subscriber identity, international mobile device identification
Code.
3. the method for illegal mobile terminal in a kind of identification region according to claim 1, which is characterized in that the simulation
Support at least one of following standard in base station: GSM, CDMA CDMA2000, WCDMA, TD-CDMA, TDD, FDD.
4. the method for illegal mobile terminal in a kind of identification region according to claim 1, which is characterized in that the simulation
The coverage area of base station are as follows: 200-800m.
5. the method for illegal mobile terminal in a kind of identification region according to claim 1, which is characterized in that the simulation
It base station being capable of automatic identified time, location information.
6. the method for illegal mobile terminal in a kind of identification region according to claim 1, which is characterized in that the simulation
Support cable network, wireless, WiFi transmission mode in base station.
7. the method for illegal mobile terminal in a kind of identification region according to claim 1, which is characterized in that the simulation
The receiving sensitivity of base station are as follows: < -104dBm.
8. the method for illegal mobile terminal in a kind of identification region according to claim 1, which is characterized in that the simulation
The acquisition speed of base station are as follows: 1200 per minute or more.
9. the method for illegal mobile terminal in a kind of identification region according to claim 1, which is characterized in that the simulation
Base station is that 40mW (+16dbm)~10W (+40dbm) is adjustable, 9 grades of adjustings.
10. the method for illegal mobile terminal in a kind of identification region according to claim 1, which is characterized in that the mould
Support a variety of transmitting antennas in quasi- base station.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811621981.6A CN109862513A (en) | 2018-12-28 | 2018-12-28 | A kind of method of illegal mobile terminal in identification region |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811621981.6A CN109862513A (en) | 2018-12-28 | 2018-12-28 | A kind of method of illegal mobile terminal in identification region |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109862513A true CN109862513A (en) | 2019-06-07 |
Family
ID=66892864
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811621981.6A Pending CN109862513A (en) | 2018-12-28 | 2018-12-28 | A kind of method of illegal mobile terminal in identification region |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109862513A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101203031A (en) * | 2006-12-14 | 2008-06-18 | 中兴通讯股份有限公司 | Method for preventing illegality terminal from interfering legality terminal |
CN101621732A (en) * | 2008-07-04 | 2010-01-06 | 上海弘视通信技术有限公司 | Intelligent video monitoring method for tracking identification |
CN102469460A (en) * | 2010-11-08 | 2012-05-23 | 中国移动通信集团广东有限公司 | Method for identifying invalid international mobile equipment identity number and apparatus thereof |
CN102740225A (en) * | 2012-05-23 | 2012-10-17 | 东南大学 | Device and method for obtaining international mobile equipment identifier of mobile communication terminal by base station |
US20130023247A1 (en) * | 2009-12-18 | 2013-01-24 | Trueposition, Inc. | Location Intelligence Management System |
CN104243167A (en) * | 2014-09-29 | 2014-12-24 | 重庆大学 | Method and system for intelligently perceiving identities on basis of mobile terminals |
-
2018
- 2018-12-28 CN CN201811621981.6A patent/CN109862513A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101203031A (en) * | 2006-12-14 | 2008-06-18 | 中兴通讯股份有限公司 | Method for preventing illegality terminal from interfering legality terminal |
CN101621732A (en) * | 2008-07-04 | 2010-01-06 | 上海弘视通信技术有限公司 | Intelligent video monitoring method for tracking identification |
US20130023247A1 (en) * | 2009-12-18 | 2013-01-24 | Trueposition, Inc. | Location Intelligence Management System |
CN102469460A (en) * | 2010-11-08 | 2012-05-23 | 中国移动通信集团广东有限公司 | Method for identifying invalid international mobile equipment identity number and apparatus thereof |
CN102740225A (en) * | 2012-05-23 | 2012-10-17 | 东南大学 | Device and method for obtaining international mobile equipment identifier of mobile communication terminal by base station |
CN104243167A (en) * | 2014-09-29 | 2014-12-24 | 重庆大学 | Method and system for intelligently perceiving identities on basis of mobile terminals |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105050112B (en) | Network access method and mobile terminal | |
CN104902541B (en) | A kind of method for network access and mobile communication terminal | |
ATE515855T1 (en) | METHOD AND SYSTEM FOR AUTHENTICATING A USER OF A DATA TRANSFER DEVICE | |
CN104853411B (en) | A kind of method for network access and mobile communication terminal | |
CN101006739A (en) | Reuse of identity data from an identity module in a user equipment by a peripheral device | |
DE602004014542D1 (en) | Method and radio communication network for detecting the presence of fraudulent subscriber identity modules | |
CN109257741A (en) | Information uploading method, device, terminal and storage medium | |
CN101453784B (en) | Mobile terminal positioning method and apparatus for UMTS | |
CN104486818A (en) | Method for selective access to cellular mobile network system and cloud server | |
CN104980954A (en) | Real-time management and control method for terminal and base station control module | |
CN104980998B (en) | A kind of method for network access and mobile terminal | |
CN106878980A (en) | Carrier aggregation capacity update method, device and user terminal | |
CN102595379B (en) | Intelligent identification method and system for wireless electronic terminal | |
FI106508B (en) | A method and system for tracing a local loop | |
CN102149084B (en) | Method and system for identifying M2M (machine-to-machine) terminal | |
CN107567015A (en) | A kind of log-on message acquisition method and log-on message acquisition system based on intelligent terminal | |
KR20060107788A (en) | Home network searching when roaming in wireless communications networks | |
CN108271225A (en) | A kind of network acquisition methods and device | |
CN102572074A (en) | Method for automatically selecting matched card for multi-card mobile phone and implementation device thereof | |
CN107248890A (en) | Wireless communications method, device, storage medium and terminal | |
CN108093404A (en) | A kind of information processing method and device | |
EP2417792A1 (en) | A method for identifying a mobile telephone | |
CN104581676A (en) | Communication system, mobile communication device, and method for switching user identification information | |
CN108307380A (en) | A kind of location of mobile users method for secret protection and mobile gateway | |
CN108738023A (en) | Prevent method, Internet of Things server and the system of internet-of-things terminal access pseudo-base station |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190607 |
|
RJ01 | Rejection of invention patent application after publication |