CN114554461A - SIM card anti-theft method and system - Google Patents

SIM card anti-theft method and system Download PDF

Info

Publication number
CN114554461A
CN114554461A CN202210422321.5A CN202210422321A CN114554461A CN 114554461 A CN114554461 A CN 114554461A CN 202210422321 A CN202210422321 A CN 202210422321A CN 114554461 A CN114554461 A CN 114554461A
Authority
CN
China
Prior art keywords
information
mobile terminal
type
transmitting
relay
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210422321.5A
Other languages
Chinese (zh)
Other versions
CN114554461B (en
Inventor
陆亿尧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Yijiesi Information Technology Co ltd
Original Assignee
Jiangsu Yijiesi Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Yijiesi Information Technology Co ltd filed Critical Jiangsu Yijiesi Information Technology Co ltd
Priority to CN202210422321.5A priority Critical patent/CN114554461B/en
Publication of CN114554461A publication Critical patent/CN114554461A/en
Application granted granted Critical
Publication of CN114554461B publication Critical patent/CN114554461B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria
    • H04W72/566Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
    • H04W72/569Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient of the traffic information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a system for preventing SIM card from being stolen, comprising the following steps: the first mobile terminal is powered on and SIM card information in the first mobile terminal is read; the first mobile terminal establishes communication connection with the relay mobile terminal; after establishing a communication connection with a relay mobile terminal, a first mobile terminal requests a transmission resource from the relay mobile terminal; after requesting transmission resources from the relay mobile terminal, the first mobile terminal receives resources allocated by the relay mobile terminal; after receiving the resources allocated by the relay mobile terminal, the first mobile terminal sends one or more types of information to the relay mobile terminal on the allocated resources based at least in part on different priorities of the type a information, the type B information, and the type C information; after receiving one or more types of information among the a-type information, the B-type information, and the C-type information, the relay mobile terminal transmits one or more types of information among the a-type information, the B-type information, and the C-type information to the core network via the base station.

Description

SIM card anti-theft method and system
Technical Field
The present invention relates to the technical field of SIM card security, and more particularly, to a method and a security system for preventing an SIM card from being stolen.
Background
Under the current condition, the loss of the mobile phone most easily causes great loss of the financial account of the user, and the loss of the value of the mobile phone hardly causes great influence on the user. At present, financial operations such as transfer, loan, and 'white stripe' are generally verified by large banks or financial-attribute enterprises or institutions in a short message verification code mode, and under the condition, an unauthorized user can complete the short message verification operation only by using a normally-functioning SIM card. By means of this authentication mechanism, a related method can be devised to secure the SIM card.
Disclosure of Invention
The invention aims to provide a method and a system for preventing SIM card from being stolen.
Specifically, the method of the present invention comprises:
the method comprises the steps that a first mobile terminal is powered on and SIM card information in the first mobile terminal is read, wherein the SIM card information comprises type A information, type B information and type C information, and the type A information, the type B information and the type C information have different priorities;
the first mobile terminal establishes communication connection with the relay mobile terminal;
after establishing a communication connection with a relay mobile terminal, a first mobile terminal requests a transmission resource from the relay mobile terminal;
after requesting transmission resources from the relay mobile terminal, the first mobile terminal receives resources allocated by the relay mobile terminal;
after receiving the resources allocated by the relay mobile terminal, the first mobile terminal transmits one or more of class a information, class B information, and class C information to the relay mobile terminal on the allocated resources based at least in part on different priorities of the class a information, the class B information, and the class C information;
after receiving one or more types of information among the a-type information, the B-type information, and the C-type information, the relay mobile terminal transmits one or more types of information among the a-type information, the B-type information, and the C-type information to the core network via the base station.
In the first aspect, the establishing, by the first mobile terminal, a communication connection with the relay mobile terminal specifically includes the following steps:
the method comprises the steps that a first mobile terminal monitors a synchronous signal sent by a base station and partial system information, wherein in the partial system information, the base station indicates an SIM card safety information transmission resource pool for communicating with a relay mobile terminal to the first mobile terminal;
after receiving part of the system information, the first mobile terminal monitors a synchronous signal sent by the relay mobile terminal in an SIM card security information transmission resource pool used for communicating with the relay mobile terminal;
after receiving the partial system information, the first mobile terminal acquires a temporary identity identifier of the first mobile terminal based on the partial system information;
after receiving the synchronization signal transmitted by the relay mobile terminal, the first mobile terminal determines the identity identifier of the relay mobile terminal based on the synchronization signal transmitted by the relay mobile terminal;
after receiving the synchronization signal transmitted by the relay mobile terminal, the first mobile terminal synchronizes with the relay mobile terminal.
In a second aspect, a first mobile terminal obtains a pool of transmission resources based on the following steps:
after receiving part of system information sent by a base station, a first mobile terminal acquires configuration of additional system information in the part of system information, wherein the configuration of the additional system information indicates resources used for sending the additional system information, and the resources used for sending the additional system information are not on a broadcast channel;
after obtaining the configuration of the additional system information, the first mobile terminal receives the additional system information on a resource for transmitting the additional system information, wherein the additional system information indicates to the first mobile terminal a SIM card security information transmission resource pool for communicating with the relay mobile terminal.
In a third aspect, the step of requesting transmission resources from the relay mobile terminal specifically includes the steps of:
after obtaining the configuration of the additional system information, the first mobile terminal determines a subset of transmission resources for sending the resource request message and a subset of transmission resources for sending the SIM card information, wherein the subset of transmission resources for sending the resource request message and the subset of transmission resources for sending the SIM card information are included in a SIM card security information transmission resource pool for communicating with the relay mobile terminal;
the first mobile terminal selecting a frequency domain resource for transmitting the resource request message among a subset of transmission resources for transmitting the resource request message based on the temporary identity identifier of the first mobile terminal and the identity identifier of the relay mobile terminal;
the first mobile terminal selecting a time domain resource for transmitting the resource request message among a subset of transmission resources for transmitting the resource request message based on a temporary identity identifier of the first mobile terminal;
and the first mobile terminal sends the resource request message to the relay mobile terminal on the selected time domain resource and the selected frequency domain resource for sending the resource request message.
In the fourth aspect, the step of the first mobile terminal transmitting one or more of the class a information, the class B information and the class C information to the relay mobile terminal on the allocated resources based at least in part on the class a information, the class B information and the class C information having different priorities specifically comprises:
the first mobile terminal receiving the resource allocated by the relay mobile terminal, wherein the relay mobile terminal allocates the resource to the first mobile terminal in response to receiving the resource request message;
after receiving the resources allocated by the relay mobile terminal, the first mobile terminal judges whether the additional system information indicates permission to send the type A information, the type B information and the type C information;
if the additional system information indicates that the transmission of the class A information, the class B information, and the class C information is allowed, the first mobile terminal further determines a transmission power for transmitting the class A information, the class B information, and the class C information based on the channel condition;
the first mobile terminal calculates the sum of the transmitting power for transmitting the type A information, the type B information and the type C information;
the first mobile terminal judges whether the sum of the transmitting power used for transmitting the type A information, the type B information and the type C information is larger than the upper limit of the transmitting power, wherein the upper limit of the transmitting power is indicated in the extra system information;
and if the sum of the transmitting power for transmitting the type A information, the type B information and the type C information is judged to be less than the upper limit of the transmitting power, the first mobile terminal simultaneously transmits the type A information, the type B information and the type C information to the relay mobile terminal.
In the fifth aspect, the step of the first mobile terminal transmitting one or more of the class a information, the class B information and the class C information to the relaying mobile terminal on the allocated resources based at least in part on the class a information, the class B information and the class C information having different priorities further comprises:
if the sum of the transmitting power for transmitting the type A information, the type B information and the type C information is judged to be larger than the upper limit of the transmitting power, the first mobile terminal continues to judge the priority of the type A information, the type B information and the type C information, wherein the priority of the type A information, the priority of the type B information and the priority of the type C information are indicated in the additional system information;
if the priority of the type A information is greater than that of the type B information and the priority of the type B information is greater than that of the type C information, the first mobile terminal continuously judges whether the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is greater than the upper limit of the transmitting power;
if the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is smaller than the upper limit of the transmitting power, the first mobile terminal simultaneously transmits the type A information and the type B information to the relay mobile terminal;
and if the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is judged to be larger than the upper limit of the transmitting power, the first mobile terminal transmits the type A information to the relay mobile terminal.
In a sixth aspect, the first mobile terminal transmitting one or more of class a information, class B information and class C information to the relay mobile terminal on the allocated resources based at least in part on the class a information, the class B information and the class C information having different priorities further comprises the steps of:
if the extra system information indicates that the two types of information are allowed to be sent, the first mobile terminal continues to judge the priority of the type A information, the type B information and the type C information;
if the priority of the type A information is greater than that of the type B information and the priority of the type B information is greater than that of the type C information, the first mobile terminal continuously judges whether the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is greater than the upper limit of the transmitting power;
if the sum of the transmitting power for transmitting the type A information, the type B information and the type C information is judged to be smaller than the upper limit of the transmitting power, the first mobile terminal simultaneously transmits the type A information and the type B information to the relay mobile terminal;
and if the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is judged to be larger than the upper limit of the transmitting power, the first mobile terminal transmits the type A information to the relay mobile terminal.
In a seventh aspect, if only the class a information and the class B information are transmitted to the relay mobile terminal, the method further comprises:
the first mobile terminal selecting a frequency domain resource for transmitting a second resource request message among a subset of transmission resources for transmitting the resource request message based on the temporary identity identifier of the first mobile terminal, the identity identifier of the relay mobile terminal and a predetermined frequency domain offset;
the first mobile terminal selecting a time domain resource for transmitting a second resource request message among a subset of transmission resources for transmitting the resource request message based on a temporary identity identifier of the first mobile terminal and a predetermined time domain offset;
the first mobile terminal sends a second resource request message to the relay mobile terminal on the selected time domain resource and the selected frequency domain resource used for sending the resource request message;
after transmitting the second resource request message to the relay mobile terminal, the first mobile terminal receives the resource allocated by the relay mobile terminal;
after receiving the resources allocated by the relay mobile terminal, the first mobile terminal transmits class C information to the relay mobile terminal.
In the eighth aspect, the transmitting, by the first mobile terminal, the class C information to the relay mobile terminal further comprises:
after receiving the resources allocated by the relay mobile terminal, the first mobile terminal selects a frequency domain resource for transmitting the class C information among the allocated resources based on the temporary identity identifier of the first mobile terminal, the identity identifier of the relay mobile terminal, and a second predetermined frequency domain offset;
the first mobile terminal selects a time domain resource for transmitting the C-type information from the allocated resources based on the temporary identity identifier of the first mobile terminal and a second predetermined time domain offset;
and the first mobile terminal transmits the C-type information to the relay mobile terminal on the selected time domain resource and the selected frequency domain resource for transmitting the C-type information.
The invention also provides a system for preventing the SIM card from being stolen, wherein the system for preventing the SIM card from being stolen at least comprises a first mobile terminal, a relay mobile terminal and a base station, wherein the first mobile terminal is configured to execute the method.
Compared with the prior art, the invention mainly solves the following problems: in the current communication standard and the specific practice of an operator, after the mobile terminal is powered on, the mobile terminal sends SIM card information to the core network part, but the SIM card information is only used by the operator to determine whether the SIM card in the mobile terminal is a legal SIM card permitted by the operator, and to perform traffic charging and other purposes. For the case that a legal SIM card sent by an operator is used by an illegal user (for example, after a mobile phone is stolen, the SIM card is broken and used by other people except the user), the prior art cannot make a corresponding judgment. Under the condition that a user does not know that the mobile phone is stolen, the illegal use of the SIM card is very easy to cause the illegal use of a financial account of the user, thereby causing great economic loss of the user. The method for sending more detailed information of the SIM card to the core network is provided for solving the problems in the prior art, and an operator can preliminarily judge whether a user is a legal user or not and can make corresponding safety measures by utilizing the more detailed information.
Drawings
FIG. 1 is a flow diagram of a method according to an embodiment of the present invention.
FIG. 2 is a flow diagram of a method according to an embodiment of the invention.
FIG. 3 is a flow diagram of a method according to an embodiment of the invention.
FIG. 4 is a flow diagram of a method according to an embodiment of the present invention.
Detailed Description
Specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings, but it should be understood that the scope of the present invention is not limited to the specific embodiments.
The basic requirement of the present invention is that the operator needs to set up a corresponding function module (or through the server of the operator) in the core network part, the function module may be named as a SIM card security management module, and the function of the module is to determine whether to activate some functions of the SIM card based on the SIM card information automatically transmitted after the mobile terminal is powered on. Since the user mobile phone usually has multiple password protection, currently, an unauthorized user (hereinafter referred to as an "unauthorized user") illegally using a financial account of another user basically needs to connect an SIM card in a stolen mobile phone to another mobile phone or a card reader to complete SIM card information reading and short message receiving, and the stolen mobile phone is connected to a desktop computer by a USB data line and is decrypted by a password in the mobile phone body by the desktop computer. Therefore, in one embodiment, the SIM card information may include historical state information of the SIM card, and the historical state information of the SIM card may include judgment information of the SIM card accessing to other hardware devices, if the SIM card is activated in a new mobile phone, the SIM card sends the fact that the SIM card is activated in the new mobile phone to the core network through the mobile terminal, and the core network may immediately close the short message sending and receiving function of the SIM card, while keeping other functions. Then, the host of the SIM card can recover the short message receiving and sending function through operations such as password, identity card verification and the like through the customer service of an operator, so that the safety of the SIM card is ensured to the maximum extent. The above is only an example, and other embodiments or functions of the SIM card security management module are all suitable for achieving the object of the present invention. In addition, since an unauthorized user often limits the communication function of the mobile terminal for the illegal purpose of the user, how to complete the information transmission immediately after the mobile terminal is powered on under the condition of limited communication capability is an important technical problem of the present invention.
FIG. 1 is a flow diagram of a method according to an embodiment of the present invention. As illustrated, the method of one embodiment of the invention comprises the steps of:
step 101: the method comprises the steps that a first mobile terminal is powered on and SIM card information in the first mobile terminal is read, wherein the SIM card information comprises type A information, type B information and type C information, and the type A information, the type B information and the type C information have different priorities; in one embodiment, the type a information may be set to have the highest priority, the type a information may be detection information of a hardware environment of the SIM card, in which whether the SIM card is replaced with a new device is recorded, and the type a information may also be frequency information of accessing the SIM card, currently, since the internal storage space of the mobile terminal is large enough, the frequency of accessing the SIM card by the mobile terminal is low, and if there is frequent access, it may be determined that there is an abnormal condition; the type B information may be set to have an intermediate priority, which may be SIM card geographical location information (e.g., SIM card roaming history information, currently anchored base station, etc.) if the SIM card registered user (owner) is not a business person on business trip frequently, the SIM card presence in a new geographical area may be considered an abnormal situation or a concern; the type C information may be set to have the lowest priority, which has a non-critical auxiliary role for the determination of the abnormal situation, for example, some time information, such as the latest power-on time information of the mobile terminal, etc., may be included in the type C information, which any operator considers necessary but unnecessary and is not included in the type a and B information.
Step 102: the method comprises the steps that a first mobile terminal and a relay mobile terminal are in communication connection;
step 103: after establishing a communication connection with a relay mobile terminal, a first mobile terminal requests a transmission resource from the relay mobile terminal;
step 104: after requesting transmission resources from the relay mobile terminal, the first mobile terminal receives resources allocated by the relay mobile terminal;
step 105: after receiving the resources allocated by the relay mobile terminal, the first mobile terminal transmits one or more of class a information, class B information, and class C information to the relay mobile terminal on the allocated resources based at least in part on different priorities of the class a information, the class B information, and the class C information;
step 106: after receiving one or more types of information among the a-type information, the B-type information, and the C-type information, the relay mobile terminal transmits one or more types of information among the a-type information, the B-type information, and the C-type information to the core network via the base station.
FIG. 2 is a flow diagram of a method according to an embodiment of the invention. In the first aspect, the establishing, by the first mobile terminal, a communication connection with the relay mobile terminal specifically includes the following steps:
step 201: the first mobile terminal monitors a synchronization signal and partial system information transmitted by a base station, wherein the base station indicates a SIM card security information transmission resource pool for communicating with the relay mobile terminal to the first mobile terminal in the partial system information, and in one embodiment, the synchronization signal and the partial system information transmitted by the base station are transmitted on a conventional PBCH channel, and only the most basic system information is transmitted on the channel due to limited capacity of the channel, and in one embodiment, the partial system information may be MIB and Systeminformationblock Type 1. In one embodiment, the relay mobile terminal must also be configured with a SIM card security information transmission resource pool in advance by the base station for communicating with the first mobile terminal, and the specific method for configuring the SIM card security information transmission resource pool by the relay mobile terminal may be the same as the specific method for configuring the SIM card security information transmission resource pool by the first mobile terminal; in one embodiment, when an operator performs related deployment according to the method described herein, it is necessary to require that each mobile terminal, after powering on at startup and after verifying the validity of the SIM card itself (for example, whether the SIM card is a valid SIM card issued by the operator), needs to send the SIM card information specified herein to a core network (or a background server) according to the method described herein, so that it is preferable to separately create a resource to send information related to the security of the SIM card, which can improve the transmission efficiency of information and reduce interference. In one embodiment, the relay mobile terminal is not necessarily a mobile phone, but may be a signal amplifier arranged by an operator to improve signal quality and serving as a relay, but the signal amplifier itself also has a wireless communication function.
Step 202: after receiving part of the system information, the first mobile terminal monitors a synchronous signal sent by the relay mobile terminal in an SIM card security information transmission resource pool used for communicating with the relay mobile terminal; in one embodiment, the synchronization signal transmitted by the relay mobile terminal may be designed with reference to the synchronization signal transmitted by the LTE BS;
step 203: after receiving the partial system information, the first mobile terminal acquires a temporary identity identifier of the first mobile terminal based on the partial system information; in one embodiment, the first mobile terminal obtains the temporary identity identifier of the first mobile terminal indirectly based on part of the system information
Step 204: after receiving the synchronization signal transmitted by the relay mobile terminal, the first mobile terminal determines the identity identifier of the relay mobile terminal based on the synchronization signal transmitted by the relay mobile terminal; in the section of LTE-related cell physical identifier (cell ID) determination, how to determine a cell ID based on a synchronization signal is described in detail, a correlation algorithm may be referred to for determining an identity identifier of a relay mobile terminal based on a synchronization signal sent by the relay mobile terminal, values of the identity identifier of the relay mobile terminal and a cell ID in a standard may be different, and a formula for determining the identity identifier may also be adjusted as known.
Step 205: after receiving the synchronization signal transmitted by the relay mobile terminal, the first mobile terminal synchronizes with the relay mobile terminal.
FIG. 3 is a flow diagram of a method according to an embodiment of the invention. In a second aspect, a first mobile terminal obtains a pool of transmission resources based on the following steps:
step 301: after receiving the partial system information sent by the base station, the first mobile terminal obtains a configuration of additional system information in the partial system information, and in one embodiment, the Systeminformationblock Type1 may include an indication of a resource used for sending the additional system information, where the indication may indicate a resource located on a DL-SCH channel for sending the additional system information, the additional system information may be named Systeminformationblock Type SIM, the system information is specifically used for sending information elements related to SIM card information, and the system information may be ignored by mobile terminals that have been powered on to start normal communication transmission; wherein the configuration of the additional system information indicates resources for transmitting the additional system information, wherein the resources for transmitting the additional system information are not on a broadcast channel;
step 302: after obtaining the configuration of the additional system information, the first mobile terminal receives the additional system information on a resource for transmitting the additional system information, wherein the additional system information indicates to the first mobile terminal a SIM card security information transmission resource pool for communicating with the relay mobile terminal. In one embodiment, the SIM card security information transmission resource pool used for communication with the relay mobile terminal may include specific time resources on predetermined subframes within a periodic period, which in one embodiment may be one radio frame, two radio frames … ten radio frames, etc., and frequency resources on a plurality of RBGs; in a specific embodiment, the SIM card security information transmission resource pool for communicating with the relay mobile terminal may be indicated as a number of OFDM symbols in an mth sub-frame in a first radio frame of every n radio frames for transmitting SIM card security information, starting with an RB with a starting position k in the frequency domain, a total of L RBGs being used for transmitting SIM card security information, the resources constituting the SIM card security information transmission resource pool for communicating with the relay mobile terminal;
FIG. 4 is a flow diagram of a method according to an embodiment of the present invention. In a third aspect, the step of requesting transmission resources from the relay mobile terminal specifically includes the steps of:
step 401: after obtaining the configuration of the additional system information, the first mobile terminal determining a subset of transmission resources for sending the resource request message and a subset of transmission resources for sending the SIM card information, wherein the subset of transmission resources for sending the resource request message and the subset of transmission resources for sending the SIM card information are included in a SIM card security information transmission resource pool for communicating with the relay mobile terminal; in one embodiment, a SIM card security information transmission resource pool for communicating with a relay mobile terminal is divided into a subset of transmission resources for sending resource request messages, a subset of transmission resources for sending SIM card information, and a subset of transmission resources for sending reference signals; the configuration of the subset of transmission resources may be included in the configuration of the additional system information;
step 402: the first mobile terminal selecting a frequency domain resource for transmitting the resource request message among a subset of transmission resources for transmitting the resource request message based on the temporary identity identifier of the first mobile terminal and the identity identifier of the relay mobile terminal; in one embodiment, starting from an RB with a starting position of k in the frequency domain, L 'RBGs are used for sending the resource request message, the first mobile terminal calculates the sum of the temporary identity identifier of the first mobile terminal and the identity identifier of the relay mobile terminal, assuming that the sum of the temporary identity identifier of the first mobile terminal and the identity identifier of the relay mobile terminal is M, the first mobile terminal divides L' by M to obtain a remainder O, and starting from an RB with a starting position of k in the frequency domain, the sequential numbers up to the mth RBG are starting RBGs used for sending the resource request message;
step 403: the first mobile terminal selecting a time domain resource for transmitting the resource request message among a subset of transmission resources for transmitting the resource request message based on a temporary identity identifier of the first mobile terminal; in one embodiment, the temporary id of the first mobile station is I, the number of OFDM symbols is, for example, 5 (the index is assumed to be 0-4), I is divided by 5 to obtain a remainder P, and then the symbol with word index 0 starts counting, and the symbol with index P-1 is the starting symbol;
step 404: and the first mobile terminal sends the resource request message to the relay mobile terminal on the selected time domain resource and the selected frequency domain resource for sending the resource request message.
In the fourth aspect, the step of the first mobile terminal transmitting one or more of the class a information, the class B information and the class C information to the relay mobile terminal on the allocated resources based at least in part on the class a information, the class B information and the class C information having different priorities specifically comprises:
the first mobile terminal receiving the resource allocated by the relay mobile terminal, wherein the relay mobile terminal allocates the resource to the first mobile terminal in response to receiving the resource request message; in one embodiment, the resource allocated by the relay mobile terminal is also a resource segment, and the resource segment comprises a plurality of symbols and a plurality of RBGs;
after receiving the resources allocated by the relay mobile terminal, the first mobile terminal judges whether the additional system information indicates permission to send the type A information, the type B information and the type C information; for example, the information element of the extra system information includes a field "SIM card information allowed to be transmitted", which appears in the form of a bit string, a bit 000 indicates that transmission of the type a information, the type B information, and the type C information is allowed, a bit 001 indicates that transmission of the type a information and the type B information is allowed, transmission of the type C information is not allowed, a bit 010 indicates that transmission of the type a information is allowed, and transmission of the type B and the type C information is not allowed; the base station can dynamically adjust the information amount by sending additional system information due to large information amount of the SIM card under the condition that a plurality of frequent device power-on scenes exist in the service range of the base station or a plurality of devices needing frequent SIM card safety information transmission exist based on special requirements; the resource allocated by the relay mobile terminal for transmitting A, B and the class C information may be a piece of resource, wherein the resource for transmitting the class a information is located in the first time period and the first RBG, the resource for transmitting the class B information is located in the first time period and the second RBG, and the resource for transmitting the class C information is located in the first time period and the third RBG, the first-third RBGs may be discontinuous in the frequency domain, and the first mobile terminal may determine a specific resource for transmitting A, B, C th class information based on the temporary identity identifier of the first mobile terminal and the identity identifier of the relay mobile terminal by the method described above;
if the additional system information indicates that the transmission of the class A information, the class B information, and the class C information is allowed, the first mobile terminal further determines a transmission power for transmitting the class A information, the class B information, and the class C information based on the channel condition; in one embodiment, A, B, C-type information is transmitted simultaneously in a frequency division multiplexing manner, and the transmission power can be controlled independently;
the first mobile terminal calculates the sum of the transmitting power for transmitting the type A information, the type B information and the type C information;
the first mobile terminal judges whether the sum of the transmitting power used for transmitting the type A information, the type B information and the type C information is larger than the upper limit of the transmitting power, wherein the upper limit of the transmitting power is indicated in the extra system information;
and if the sum of the transmitting power for transmitting the type A information, the type B information and the type C information is judged to be less than the upper limit of the transmitting power, the first mobile terminal simultaneously transmits the type A information, the type B information and the type C information to the relay mobile terminal.
In the fifth aspect, the first mobile terminal transmitting one or more of the class a information, the class B information, and the class C information to the relay mobile terminal on the allocated resources based at least in part on the class a information, the class B information, and the class C information having different priorities further comprises:
if the sum of the transmitting power for transmitting the type A information, the type B information and the type C information is judged to be larger than the upper limit of the transmitting power, the first mobile terminal continues to judge the priority of the type A information, the type B information and the type C information, wherein the priority of the type A information, the priority of the type B information and the priority of the type C information are indicated in the additional system information;
if the priority of the type A information is greater than that of the type B information and the priority of the type B information is greater than that of the type C information, the first mobile terminal continuously judges whether the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is greater than the upper limit of the transmitting power;
if the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is smaller than the upper limit of the transmitting power, the first mobile terminal simultaneously transmits the type A information and the type B information to the relay mobile terminal;
and if the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is judged to be larger than the upper limit of the transmitting power, the first mobile terminal transmits the type A information to the relay mobile terminal.
In a sixth aspect, the first mobile terminal transmitting one or more of class a information, class B information and class C information to the relay mobile terminal on the allocated resources based at least in part on the class a information, the class B information and the class C information having different priorities further comprises the steps of:
if the extra system information indicates that the two types of information are allowed to be sent, the first mobile terminal continues to judge the priority of the type A information, the type B information and the type C information;
if the priority of the type A information is greater than that of the type B information and the priority of the type B information is greater than that of the type C information, the first mobile terminal continuously judges whether the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is greater than the upper limit of the transmitting power;
if the sum of the transmitting power for transmitting the type A information, the type B information and the type C information is judged to be smaller than the upper limit of the transmitting power, the first mobile terminal simultaneously transmits the type A information and the type B information to the relay mobile terminal;
and if the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is judged to be larger than the upper limit of the transmitting power, the first mobile terminal transmits the type A information to the relay mobile terminal.
In a seventh aspect, if only the class a information and the class B information are transmitted to the relay mobile terminal, the method further comprises:
the first mobile terminal selecting a frequency domain resource for transmitting a second resource request message among a subset of transmission resources for transmitting the resource request message based on the temporary identity identifier of the first mobile terminal, the identity identifier of the relay mobile terminal and a predetermined frequency domain offset; the predetermined frequency domain offset may be indicated in the additional system information, may be indicated by a previous resource allocation message;
the first mobile terminal selecting a time domain resource for transmitting a second resource request message among a subset of transmission resources for transmitting the resource request message based on a temporary identity identifier of the first mobile terminal and a predetermined time domain offset;
the first mobile terminal sends a second resource request message to the relay mobile terminal on the selected time domain resource and the selected frequency domain resource used for sending the resource request message;
after transmitting the second resource request message to the relay mobile terminal, the first mobile terminal receives the resource allocated by the relay mobile terminal;
after receiving the resources allocated by the relay mobile terminal, the first mobile terminal transmits class C information to the relay mobile terminal.
In the eighth aspect, the transmitting, by the first mobile terminal, the class C information to the relay mobile terminal further comprises:
after receiving the resources allocated by the relay mobile terminal, the first mobile terminal selects a frequency domain resource for transmitting the class C information among the allocated resources based on the temporary identity identifier of the first mobile terminal, the identity identifier of the relay mobile terminal, and a second predetermined frequency domain offset; the second predetermined frequency domain offset is transmitted in the resource allocation message:
the first mobile terminal selects a time domain resource for transmitting the C-type information from the allocated resources based on the temporary identity identifier of the first mobile terminal and a second predetermined time domain offset;
and the first mobile terminal transmits the C-type information to the relay mobile terminal on the selected time domain resource and the selected frequency domain resource for transmitting the C-type information.
The invention also provides a system for preventing the SIM card from being stolen, wherein the system for preventing the SIM card from being stolen at least comprises a first mobile terminal, a relay mobile terminal and a base station, wherein the first mobile terminal is configured to execute the method. Specifically, in one embodiment, the first mobile terminal has corresponding modules for implementing the foregoing method, and the corresponding modules can be implemented in a hardware manner and also implemented in a computer code manner, and specifically, the first mobile terminal may include the following modules:
the module 101: the method comprises the steps that a first mobile terminal is powered on and SIM card information in the first mobile terminal is read, wherein the SIM card information comprises type A information, type B information and type C information, and the type A information, the type B information and the type C information have different priorities;
the module 102: the first mobile terminal establishes communication connection with the relay mobile terminal;
the module 103: after establishing a communication connection with a relay mobile terminal, a first mobile terminal requests a transmission resource from the relay mobile terminal;
the module 104: after requesting transmission resources from the relay mobile terminal, the first mobile terminal receives resources allocated by the relay mobile terminal;
the module 105: after receiving the resources allocated by the relay mobile terminal, the first mobile terminal transmits one or more of class a information, class B information, and class C information to the relay mobile terminal on the allocated resources based at least in part on different priorities of the class a information, the class B information, and the class C information;
the module 106: after receiving one or more types of information among the a-type information, the B-type information, and the C-type information, the relay mobile terminal transmits one or more types of information among the a-type information, the B-type information, and the C-type information to the core network via the base station.
In another aspect, the establishing, by the first mobile terminal, a communication connection with the relay mobile terminal specifically includes the following steps:
the module 201: the method comprises the steps that a first mobile terminal monitors a synchronous signal sent by a base station and partial system information, wherein in the partial system information, the base station indicates an SIM card safety information transmission resource pool for communicating with a relay mobile terminal to the first mobile terminal;
the module 202: after receiving part of the system information, the first mobile terminal monitors a synchronous signal sent by the relay mobile terminal in an SIM card security information transmission resource pool used for communicating with the relay mobile terminal;
the module 203: after receiving the partial system information, the first mobile terminal acquires a temporary identity identifier of the first mobile terminal based on the partial system information;
the module 204: after receiving the synchronization signal transmitted by the relay mobile terminal, the first mobile terminal determines the identity identifier of the relay mobile terminal based on the synchronization signal transmitted by the relay mobile terminal;
the module 205: after receiving the synchronization signal transmitted by the relay mobile terminal, the first mobile terminal synchronizes with the relay mobile terminal.
In another aspect, a first mobile terminal obtains a pool of transmission resources based on:
the module 301: after receiving part of system information sent by a base station, a first mobile terminal acquires configuration of additional system information in the part of system information, wherein the configuration of the additional system information indicates resources used for sending the additional system information, and the resources used for sending the additional system information are not on a broadcast channel;
the module 302: after obtaining the configuration of the additional system information, the first mobile terminal receives the additional system information on a resource for transmitting the additional system information, wherein the additional system information indicates to the first mobile terminal a SIM card security information transmission resource pool for communicating with the relay mobile terminal.
In another aspect, the requesting transmission resources from the relay mobile terminal specifically includes the following steps:
the module 401: after obtaining the configuration of the additional system information, the first mobile terminal determining a subset of transmission resources for sending the resource request message and a subset of transmission resources for sending the SIM card information, wherein the subset of transmission resources for sending the resource request message and the subset of transmission resources for sending the SIM card information are included in a SIM card security information transmission resource pool for communicating with the relay mobile terminal;
a module 402: the first mobile terminal selecting a frequency domain resource for transmitting the resource request message among a subset of transmission resources for transmitting the resource request message based on the temporary identity identifier of the first mobile terminal and the identity identifier of the relay mobile terminal;
the module 403: the first mobile terminal selecting a time domain resource for transmitting the resource request message among a subset of transmission resources for transmitting the resource request message based on a temporary identity identifier of the first mobile terminal;
the module 404: and the first mobile terminal sends the resource request message to the relay mobile terminal on the selected time domain resource and the selected frequency domain resource for sending the resource request message.
In another aspect, the first mobile terminal transmitting one or more of class a information, class B information and class C information to the relay mobile terminal on the allocated resources with different priorities based at least in part on the class a information, the class B information and the class C information specifically comprises the steps of:
the module 501: the first mobile terminal receiving the resource allocated by the relay mobile terminal, wherein the relay mobile terminal allocates the resource to the first mobile terminal in response to receiving the resource request message;
the module 502: after receiving the resources allocated by the relay mobile terminal, the first mobile terminal judges whether the additional system information indicates permission to send the type A information, the type B information and the type C information;
a block 503: if the additional system information indicates that the transmission of the class A information, the class B information, and the class C information is allowed, the first mobile terminal further determines a transmission power for transmitting the class A information, the class B information, and the class C information based on the channel condition;
the module 504 is as follows: the first mobile terminal calculates the sum of the transmitting power for transmitting the type A information, the type B information and the type C information;
the module 505: the first mobile terminal judges whether the sum of the transmitting power used for sending the type A information, the type B information and the type C information is larger than the upper limit of the transmitting power, wherein the upper limit of the transmitting power is indicated in the extra system information;
a module 506: and if the sum of the transmitting power for transmitting the type A information, the type B information and the type C information is judged to be less than the upper limit of the transmitting power, the first mobile terminal simultaneously transmits the type A information, the type B information and the type C information to the relay mobile terminal.
In another aspect, the first mobile terminal transmitting one or more of the class a information, the class B information, and the class C information to the relay mobile terminal on the allocated resources based at least in part on the class a information, the class B information, and the class C information having different priorities further comprises:
the module 601: if the sum of the transmitting power for transmitting the type A information, the type B information and the type C information is judged to be larger than the upper limit of the transmitting power, the first mobile terminal continues to judge the priority of the type A information, the type B information and the type C information, wherein the priority of the type A information, the priority of the type B information and the priority of the type C information are indicated in the additional system information;
a module 602: if the priority of the type A information is greater than that of the type B information and the priority of the type B information is greater than that of the type C information, the first mobile terminal continuously judges whether the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is greater than the upper limit of the transmitting power;
a module 603: if the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is smaller than the upper limit of the transmitting power, the first mobile terminal simultaneously transmits the type A information and the type B information to the relay mobile terminal;
the block 604: and if the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is judged to be larger than the upper limit of the transmitting power, the first mobile terminal transmits the type A information to the relay mobile terminal.
In another aspect, the first mobile terminal transmitting one or more of class a information, class B information, and class C information to the relay mobile terminal on the allocated resources based at least in part on the class a information, the class B information, and the class C information having different priorities further comprises the steps of:
a module 701: if the extra system information indicates that the two types of information are allowed to be sent, the first mobile terminal continues to judge the priority of the type A information, the type B information and the type C information;
module 702: if the priority of the type A information is greater than that of the type B information and the priority of the type B information is greater than that of the type C information, the first mobile terminal continuously judges whether the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is greater than the upper limit of the transmitting power;
a module 703: if the sum of the transmitting power for transmitting the type A information, the type B information and the type C information is judged to be smaller than the upper limit of the transmitting power, the first mobile terminal simultaneously transmits the type A information and the type B information to the relay mobile terminal;
module 704: and if the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is judged to be larger than the upper limit of the transmitting power, the first mobile terminal transmits the type A information to the relay mobile terminal.
In another aspect, if only the class a information and the class B information are transmitted to the relay mobile terminal, the method further comprises:
and a module 801: the first mobile terminal selecting a frequency domain resource for transmitting a second resource request message among a subset of transmission resources for transmitting the resource request message based on the temporary identity identifier of the first mobile terminal, the identity identifier of the relay mobile terminal and a predetermined frequency domain offset;
the module 802: the first mobile terminal selecting a time domain resource for transmitting a second resource request message among a subset of transmission resources for transmitting the resource request message based on a temporary identity identifier of the first mobile terminal and a predetermined time domain offset;
a module 803: the first mobile terminal sends a second resource request message to the relay mobile terminal on the selected time domain resource and the selected frequency domain resource for sending the resource request message;
a block 804: after transmitting the second resource request message to the relay mobile terminal, the first mobile terminal receives the resource allocated by the relay mobile terminal;
a module 805: after receiving the resources allocated by the relay mobile terminal, the first mobile terminal transmits class C information to the relay mobile terminal.
In another aspect, the first mobile terminal transmitting the class C information to the relay mobile terminal further comprises:
a module 901: after receiving the resources allocated by the relay mobile terminal, the first mobile terminal selects a frequency domain resource for transmitting the class C information among the allocated resources based on the temporary identity identifier of the first mobile terminal, the identity identifier of the relay mobile terminal, and a second predetermined frequency domain offset;
a module 902: the first mobile terminal selects a time domain resource for transmitting the C-type information from the allocated resources based on the temporary identity identifier of the first mobile terminal and a second predetermined time domain offset;
a module 903: and the first mobile terminal transmits the C-type information to the relay mobile terminal on the selected time domain resource and the selected frequency domain resource for transmitting the C-type information.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A SIM card anti-theft method comprises the following steps:
a first mobile terminal is powered on and reads SIM card information in the first mobile terminal, wherein the SIM card information comprises A-type information, B-type information and C-type information, and the A-type information, the B-type information and the C-type information have different priorities;
the first mobile terminal establishes communication connection with the relay mobile terminal;
after establishing a communication connection with a relay mobile terminal, a first mobile terminal requests a transmission resource from the relay mobile terminal;
after requesting transmission resources from the relay mobile terminal, the first mobile terminal receiving resources allocated by the relay mobile terminal;
after receiving resources allocated by a relay mobile terminal, a first mobile terminal sends one or more types of information of the type A information, the type B information and the type C information to the relay mobile terminal on the allocated resources based at least in part on different priorities of the type A information, the type B information and the type C information;
after receiving the one or more types of information among the type a information, the type B information, and the type C information, the relay mobile terminal transmits the one or more types of information among the type a information, the type B information, and the type C information to a core network via a base station.
2. The SIM card theft prevention method according to claim 1, wherein the establishing of the communication connection between the first mobile terminal and the relay mobile terminal specifically comprises the steps of:
a first mobile terminal monitors a synchronous signal sent by a base station and partial system information, wherein in the partial system information, the base station indicates a SIM card security information transmission resource pool for communicating with the relay mobile terminal to the first mobile terminal;
after receiving the partial system information, the first mobile terminal monitors a synchronous signal sent by the relay mobile terminal in a SIM card security information transmission resource pool used for communicating with the relay mobile terminal;
after receiving the part of the system information, the first mobile terminal acquires a temporary identity identifier of the first mobile terminal based on the part of the system information;
after receiving the synchronization signal sent by the relay mobile terminal, the first mobile terminal determines the identity identifier of the relay mobile terminal based on the synchronization signal sent by the relay mobile terminal;
after receiving the synchronization signal sent by the relay mobile terminal, the first mobile terminal synchronizes with the relay mobile terminal.
3. The SIM card anti-theft method according to claim 2, wherein the first mobile terminal obtains the transmission resource pool based on the following steps:
after receiving partial system information sent by the base station, the first mobile terminal acquires configuration of additional system information in the partial system information, wherein the configuration of the additional system information indicates resources used for sending the additional system information, and the resources used for sending the additional system information are not on a broadcast channel;
after obtaining the configuration of the additional system information, the first mobile terminal receives the additional system information on the resource for sending the additional system information, wherein the additional system information indicates a SIM card security information transmission resource pool for communicating with the relay mobile terminal to the first mobile terminal.
4. The SIM card theft prevention method according to claim 3, wherein the requesting the relay mobile terminal for the transmission resource specifically comprises the steps of:
after obtaining the configuration of the additional system information, the first mobile terminal determining a subset of transmission resources for sending the resource request message and a subset of transmission resources for sending SIM card information, wherein the subset of transmission resources for sending the resource request message and the subset of transmission resources for sending the SIM card information are included in the SIM card security information transmission resource pool for communicating with the relay mobile terminal;
the first mobile terminal selects a frequency domain resource for transmitting the resource request message in the subset of transmission resources for transmitting the resource request message based on the temporary identity identifier of the first mobile terminal and the identity identifier of the relay mobile terminal;
the first mobile terminal selects a time domain resource for transmitting the resource request message in the subset of transmission resources for transmitting the resource request message based on the temporary identity identifier of the first mobile terminal;
and the first mobile terminal sends the resource request message to the relay mobile terminal on the selected time domain resource and the selected frequency domain resource for sending the resource request message.
5. The SIM card anti-theft method of claim 4, wherein the first mobile terminal transmitting one or more of the class a, B and C information to the relay mobile terminal on the allocated resources based at least in part on the class a, B and C information having different priorities comprises:
receiving, by a first mobile terminal, a resource allocated by a relay mobile terminal, wherein the relay mobile terminal allocates the resource to the first mobile terminal in response to receiving the resource request message;
after receiving the resources allocated by the relay mobile terminal, the first mobile terminal judges whether the additional system information indicates permission to send the type A information, the type B information and the type C information;
if the additional system information indicates that transmission of the class A information, the class B information, and the class C information is allowed, the first mobile terminal further determines a transmission power for transmitting the class A information, the class B information, and the class C information based on a channel condition;
the first mobile terminal calculates the sum of the transmitting power for transmitting the type A information, the type B information and the type C information;
the first mobile terminal judges whether the sum of the transmitting power used for transmitting the type A information, the type B information and the type C information is larger than an upper transmitting power limit, wherein the upper transmitting power limit is indicated in the extra system information;
and if the sum of the transmitting power for transmitting the type A information, the type B information and the type C information is judged to be less than the upper limit of the transmitting power, the first mobile terminal simultaneously transmits the type A information, the type B information and the type C information to the relay mobile terminal.
6. The SIM card anti-theft method according to claim 5, wherein the first mobile terminal sends one or more of the class a, B and C information to the relay mobile terminal on the allocated resources based at least in part on the class a, B and C information having different priorities, further comprising:
if the sum of the transmitting power for transmitting the type A information, the type B information and the type C information is judged to be larger than the upper limit of the transmitting power, the first mobile terminal continues to judge the priority of the type A information, the type B information and the type C information, wherein the priority of the type A information, the priority of the type B information and the priority of the type C information are indicated in the additional system information;
if the priority of the type A information is greater than that of the type B information and the priority of the type B information is greater than that of the type C information, the first mobile terminal continuously judges whether the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is greater than the upper limit of the transmitting power;
if the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is smaller than the upper limit of the transmitting power, the first mobile terminal simultaneously transmits the type A information and the type B information to the relay mobile terminal;
and if the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is judged to be larger than the upper limit of the transmitting power, the first mobile terminal transmits the type A information to the relay mobile terminal.
7. The SIM card anti-theft method of claim 6, wherein the first mobile terminal transmits one or more of the class a, B, and C information to the relay mobile terminal on the allocated resources based at least in part on the class a, B, and C information having different priorities, further comprising the steps of:
if the additional system information indicates that the two types of information are allowed to be sent, the first mobile terminal continues to judge the priority of the type A information, the type B information and the type C information;
if the priority of the type A information is greater than that of the type B information and the priority of the type B information is greater than that of the type C information, the first mobile terminal continuously judges whether the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is greater than the upper limit of the transmitting power;
if the sum of the transmitting power for transmitting the type A information, the type B information and the type C information is judged to be smaller than the upper limit of the transmitting power, the first mobile terminal simultaneously transmits the type A information and the type B information to the relay mobile terminal;
and if the sum of the transmitting power for transmitting the type A information and the transmitting power for transmitting the type B information is judged to be larger than the upper limit of the transmitting power, the first mobile terminal transmits the type A information to the relay mobile terminal.
8. The SIM card theft prevention method as set forth in claim 7, wherein if only the class a information and the class B information are transmitted to the relay mobile terminal, the method further comprises:
the first mobile terminal selects a frequency domain resource for transmitting a second resource request message in the subset of transmission resources for transmitting resource request messages based on the temporary identity identifier of the first mobile terminal, the identity identifier of the relay mobile terminal and a predetermined frequency domain offset;
the first mobile terminal selecting a time domain resource for transmitting a second resource request message among the subset of transmission resources for transmitting resource request messages based on a temporary identity identifier of the first mobile terminal and a predetermined time domain offset;
the first mobile terminal sends a second resource request message to the relay mobile terminal on the selected time domain resource and the selected frequency domain resource for sending the resource request message;
after transmitting the second resource request message to the relay mobile terminal, the first mobile terminal receiving the resource allocated by the relay mobile terminal;
after receiving the resources allocated by the relay mobile terminal, the first mobile terminal sends class C information to the relay mobile terminal.
9. The SIM card anti-theft method according to claim 8, wherein the transmitting of the class C information by the first mobile terminal to the relay mobile terminal further comprises:
after receiving the resources allocated by the relay mobile terminal, the first mobile terminal selects, based on the temporary identity identifier of the first mobile terminal, the identity identifier of the relay mobile terminal and a second predetermined frequency domain offset, frequency domain resources for transmitting class C information among the allocated resources;
the first mobile terminal selects a time domain resource for transmitting the C-type information from the allocated resources based on a temporary identity identifier of the first mobile terminal and a second predetermined time domain offset;
and the first mobile terminal transmits the C-type information to the relay mobile terminal on the selected time domain resource and the selected frequency domain resource for transmitting the C-type information.
10. A SIM card theft prevention system, wherein the SIM card theft prevention system comprises at least a first mobile terminal, a relay mobile terminal and a base station, wherein the first mobile terminal is configured to perform the method of one of claims 1 to 9.
CN202210422321.5A 2022-04-21 2022-04-21 SIM card anti-theft method and system Active CN114554461B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210422321.5A CN114554461B (en) 2022-04-21 2022-04-21 SIM card anti-theft method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210422321.5A CN114554461B (en) 2022-04-21 2022-04-21 SIM card anti-theft method and system

Publications (2)

Publication Number Publication Date
CN114554461A true CN114554461A (en) 2022-05-27
CN114554461B CN114554461B (en) 2022-07-19

Family

ID=81667109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210422321.5A Active CN114554461B (en) 2022-04-21 2022-04-21 SIM card anti-theft method and system

Country Status (1)

Country Link
CN (1) CN114554461B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152425A (en) * 2013-03-15 2013-06-12 苏州九光信息科技有限公司 Safety management system for mobile device based on cloud technology
CN106162630A (en) * 2016-06-21 2016-11-23 贵州电网有限责任公司电力调度控制中心 The encryption guard system of a kind of terminal unit and method
CN106650373A (en) * 2016-12-15 2017-05-10 珠海格力电器股份有限公司 SIM card information protection method and device
CN110493754A (en) * 2019-08-12 2019-11-22 深圳市优克联新技术有限公司 A kind of SIM card resource allocation methods, system, terminal device and storage medium
CN111052780A (en) * 2018-03-29 2020-04-21 华为技术有限公司 SIM card authentication method and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152425A (en) * 2013-03-15 2013-06-12 苏州九光信息科技有限公司 Safety management system for mobile device based on cloud technology
CN106162630A (en) * 2016-06-21 2016-11-23 贵州电网有限责任公司电力调度控制中心 The encryption guard system of a kind of terminal unit and method
CN106650373A (en) * 2016-12-15 2017-05-10 珠海格力电器股份有限公司 SIM card information protection method and device
CN111052780A (en) * 2018-03-29 2020-04-21 华为技术有限公司 SIM card authentication method and terminal
CN110493754A (en) * 2019-08-12 2019-11-22 深圳市优克联新技术有限公司 A kind of SIM card resource allocation methods, system, terminal device and storage medium

Also Published As

Publication number Publication date
CN114554461B (en) 2022-07-19

Similar Documents

Publication Publication Date Title
US7559081B2 (en) Method and apparatus for authenticating a user at an access terminal
EP3223549B1 (en) Wireless network access method and access apparatus, client and storage medium
US8768303B2 (en) Telecommunications chip card and mobile telephone device
EP1145096B1 (en) Mobile telephone auto pc logon
US20080207172A1 (en) Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method
CN104168557A (en) Upgrading method for operating systems and upgrading device for operating systems
CN103891332A (en) Detection of suspect wireless access points
CN105373919A (en) Safety certification device and method for user identity based on far and near field data interaction
CN101316167A (en) Registration and login method of safety authentication, system and mobile terminal
US20140018131A1 (en) Mobile terminal and network locking method therefor
CN103096316A (en) Terminal, network side equipment system and method for authenticating user identification card
CN104618601A (en) Data sharing method and multisystem terminal
CN104660567A (en) D2D terminal access authentication method as well as D2D terminal and server
CN107659935B (en) Authentication method, authentication server, network management system and authentication system
JP7065181B2 (en) Communication control device and terminal device
US20220408252A1 (en) Method for authenticating a user on a network slice
CN113411286B (en) Access processing method and device based on 5G technology, electronic equipment and storage medium
CN114554461B (en) SIM card anti-theft method and system
CN102420852A (en) Server, mobile terminal and data synchronizing method
US11375435B2 (en) Device-to-device service restriction method and storage medium
EP2291036A1 (en) Mobile communication method, radio base station, radio control apparatus, network apparatus and aggregating apparatus
CN101951585A (en) User identity authentication method, system and mobile communication terminal
EP2797048A1 (en) Method of issuing service to smart card of user equipment and system for issuing service by applying same
JP2005301454A (en) User identification system and charger/radio ic chip reader
CN109379744B (en) Pseudo base station identification method and device and communication terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant