CN1543233A - Method of 'double-in' detection in PHS system - Google Patents
Method of 'double-in' detection in PHS system Download PDFInfo
- Publication number
- CN1543233A CN1543233A CNA2003101031475A CN200310103147A CN1543233A CN 1543233 A CN1543233 A CN 1543233A CN A2003101031475 A CNA2003101031475 A CN A2003101031475A CN 200310103147 A CN200310103147 A CN 200310103147A CN 1543233 A CN1543233 A CN 1543233A
- Authority
- CN
- China
- Prior art keywords
- phs
- margin machine
- base station
- margin
- detection method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
This invention discloses a twined cell phone detection method in which, the network management unit sends a detection signaling about the cell phone to a network unit which sends a piece of beep information to the base station hand call sub-system by the base station controller to get the feed back information by beep answer, if it receives two or more than two pieces of reply information, it can determine that the twined cell phone exists in the system. It shows from experiments, if the existing PHS system applies the invented method, the active detection to the call can be realized at low cost by upgrading the system software simply not necessary to add new hardwares.
Description
Technical field
The present invention relates to PHS (Personal Handyphone System) wireless telecommunication system, relate in particular to the method for Yi Zhong Margin (the sound m ā) machine testing in the PHS system.
Background technology
PHS obtains large-scale application in China, and by the end of in January, 2003, the PHS user of China has reached 11,000,000.The PHS Personal Handyphone System(PHS) becomes the practical business growth point of many fixed network operation enterprises.
There is following advantage in the PHS system: the base station is little and cheap, installs very conveniently, and transmitting power is little; Its narrow band transmission form forms in the 10MHz subband than multifrequency point, and user capacity is compared greatly; Better, the various data service bandwidth of speech quality (32 kilobits/second) higher (reaching as high as 128 kilobits/second); The PHS mobile phone radiation is low, environmental protection, rate are cheap.
In the PHS mobile phone, have three parameters with burn number relevant:
● PS ID (hardware identifier dispatches from the factory)
● PS Identity (handset identity code is assigned by network side HLR)
● Authentication Key (the mobile phone identification sign indicating number is assigned by network side HLR)
The authentication principle of PHS system as shown in Figure 1, as shown in Figure 1, three parameters of authentication comprise KI, authentication arithmetic (comprising two kinds of overseas edition STEPHI algorithm and domestic version FEAL32 algorithms) and authentication random number in the PHS system.Authorizing procedure is: HLR is issued to base station controller (Cell Station Controller with random number, KI (EncryptionKey) and the authenticating result of each authentication, CSC), CSC is handed down to the base station with authentication random number, because KI, the authentication arithmetic of mobile phone (are STEPHI among Fig. 1, be public algorithm) consistent with system, the random number that the employing system produces returns to CSC through the authenticating result that mobile phone calculates gained, is detected by CSC, as unanimity, then authentication is passed through; Otherwise failed authentication.This shows that in the PHS system, KI and PS Identity are vital to the identification mobile phone, KI is exactly the authentication code of PHS mobile phone.
Under normal circumstances, be responsible for the burning of user mobile phone, the rule of correspondence of design handset identity code PSIdentit and authentication code Authentication Key by telecom operators; But in some Commercial deployment, two or more mobile phones that top three parameters are identical or latter two parameter is identical occurred at present, claimed that such mobile phone is a Margin Machine.According to the authorizing procedure , Margin Machine of aforesaid PHS system for PHS network authentication all by, therefore can carry out normal wireless traffic.Apparently, Chu Xian Margin Machine will be invaded the rights and interests of validated user in the PHS system, the regular traffic that can disturb operator to carry out.Therefore, as much as possible in the PHS system Fa Xian Margin Machine user (number) be necessary.But, have not yet to see the relevant technologies scheme that the Hang Margin Machine of the disclosed PHS Jin of system detects.
Summary of the invention
Purpose of the present invention is exactly to propose a kind of PHS Zhong De of system Margin Machine detection method, to find Cun Zai De Margin Machine in the PHS system.
A kind of PHS Zhong De of system Margin Machine detection method comprises the following steps:
(1) webmaster She Zhi Margin Machine detected parameters: comprise time and the granularity of selecting active detecting;
(2) webmaster calculates the probable value of direct Quick Paging DPIP and judges that whether it is greater than 80%;
(3) if then webmaster detects signaling to all network elements while Fa send Margin Machines, otherwise Jie Shu Margin Machine testing process;
(4) network element Ti Qu Margin Machine detects information relevant with active detecting in the signaling and judges whether there is the conversation example of detected number this moment, if having, then reports the relevant information of this example;
(5) network element sends beep-page message by base station controller to PHS base station mobile handset subsystem according to different paging zones;
(6) PHS base station mobile handset subsystem is made feedback and reporting base station controller to beep-page message;
(7) network element is collected the feedback message that base station controller reports and is made preliminary judgement, reports webmaster;
(8) detect-message that reports according to the whole network of webmaster, Shi denys a Cun Zai Margin Machine in the judgement system.
The computational methods of DPIP probable value are:
P
dpip=A×B×C-D
Wherein: A represents the normalization number of network element, and B represents foreground free memory piece Ub idle condition, and C represents that the traffic of the foreground system that the backstage obtains takies situation, and D is a changed factor, and the network element position in its value and the webmaster, number etc. are relevant.The span of changed factor D is generally 0.1~0.15.
Mei Margin Machine detects and can detect a plurality of numbers simultaneously.
Practice shows that in existing P HS system, the method that adopts the present invention to propose need not to increase new hardware, only needs the software of system is carried out the active detecting that simple upgrade can show Margin Machine in fact, realizes that cost is low.The method and technology that the present invention proposes is simple effectively to be used, and can effectively detect Cun Zai De Margin Machine in the PHS system, is taken appropriate measures by operator, with protection contracted user's legitimate interests.Therefore, the present invention is applied in the PHS wireless local telephone system, greatly the legitimate interests of maintenance customer and operator.
Description of drawings
Fig. 1 is the simplified diagram of authorizing procedure in the PHS system.
Fig. 2 is the system signaling schematic flow sheet that the present invention proposes De Margin Machine detection method.
Fig. 3 is the flow chart that the present invention proposes De Margin Machine detection method.
Concrete real-time mode
The present invention is described in further detail below in conjunction with drawings and Examples.
Fig. 1 had carried out explanation in background technology.
Fig. 2 is the system signaling schematic flow sheet that the present invention proposes De Margin Machine detection method.As shown in Figure 2, its signaling process figure is as follows: network management system Fa Chu Margin Machine detects signaling Ev_F_Query_Clone_User; The network element module is sent call signaling Ca_Cud_Ring to the base station controller subsystem, and the base station controller subsystem is dealt into the base station mobile handset subsystem by standard agreement with this call signaling; Base station mobile handset subsystem feedback may not have return results and does not promptly have page response, illustrates and does not detect De Margin Machine number in this base station mobile handset subsystem; Also have a plurality of return results, illustrating has a plurality of detection De Margin Machine numbers, i.e. Cun Zai Margin Machine in this base station mobile handset subsystem.The Ca_CloneUserLocation of signaling as a result that the base station controller subsystem will return returns to the network element module, after the network element module is carried out the judgement of Chu Bu Margin Machine, to report network management system Fa send Margin Machine to detect corresponding signaling Ev_F_Query_Clone_User_Ack, by network management system Pan Duan Margin Machine testing result to network management system.
Fig. 3 is the flow chart that the present invention proposes De Margin Machine detection method.As shown in Figure 3, the present invention proposes De Margin Machine detection method and comprises the following steps: that 1, Margin Machine detects beginning.2, the parameter of She Zhi Margin Machine detection.Be time and the granularity that webmaster is selected active detecting: the setting of time should be avoided the high traffic period of PHS as far as possible; Granularity depends on the resource situation of the flow and the foreground processor of AM/BAM, in one embodiment of the invention, gets 30 seconds.3, webmaster calculates the probable value of direct Quick Paging DPIP and judges that whether it is greater than 80%.Webmaster is according to direct Quick Paging (Direct Paging if Possible, DPIP) agreement relation is judged network element number under the current webmaster, position, ruuning situation and system's traffic situation, whether sends the Ev_F_Query_Clone_User signaling message to network element according to the decision of probability situation.The computing formula of DPIP probable value is:
P
dpip=A×B×C-D
Wherein: A represents the normalization number of network element, and B represents foreground free memory piece Ub idle condition, and C represents that the traffic of the foreground system that the backstage obtains takies situation, and D is a changed factor, and the network element position in its value and the webmaster, number etc. are relevant.In general, the span of changed factor D is 0.1~0.15.If the probable value of 4 DPIP is greater than 80%, then network management system detects signaling to all network elements Xia Fa Margin Machine simultaneously and makes Ev_F_Query_Clone_User, otherwise Jie Shu Margin Machine testing process.The information that Margin Machine detects signaling comprises subscriber directory number length, subscriber directory number, PHS handset identity code code length, PHS handset identity code etc.In one embodiment of the invention, the Ev_F_Query_Clone_User message structure is as follows:
typedef?struct{
BYTE result; Effectively (reservation) 2 of the effective 1:psid of/* 0:bUserNum: reservation */
BYTE bUserNumLen; / * subscriber directory number length */
BYTE bUserNum[maPSNUMLEN_M]; / * subscriber directory number, block code */
BYTE psidLen; / * hand-held set identification code code length */
BYTE psid[PSIDLEN_M]; / * hand-held set identification */
F_QueryCloneUserOut; Margin Machine detects the control channel CCH that signaling only takies PHS, does not take Traffic Channel, does not need the time slot that continues.5, network element Ti Qu Margin Machine detects information relevant with active detecting in the signaling and judges whether there is the conversation example of detected number this moment.The information of extracting comprises the base station range at handset identity code, mobile phone place, the paging zone at mobile phone place etc.Yin Wei Margin Machine user is legal concerning network, can converse normally.If Mou Yi Margin Machine user converses, at this moment webmaster Fa Qi Margin Machine detects, and just needs this moment to judge that whether the network element side exists the conversation example of detected number, if having, then reports after the recording-related information.On judgment criterion, a conversation example is equal to the response that pages reply, because there is a detected number in this explanation.6, network element is according to different paging zones, send beep-page message Ca_Cud_Ring by CSC to PHS base station mobile handset subsystem, this beep-page message is meant to have only a beep-page message back and forth, this message has only one back and forth on flow process: promptly CSC sends out beep-page message to the base station mobile handset subsystem, if Cun Zai Margin Machine Zhe Xie Margin Machine can be sent out response message to the base station in the base station mobile handset subsystem, thereby avoids consuming too much CCH resource and influencing normal call.The base station controller subsystem is used beep-page message to obtain user's feedback by agreement (Q.931) foundation of standard and the link of base station mobile handset subsystem.7, the base station mobile handset subsystem is fed back beep-page message: if promptly there is the mobile phone of detected number, then this mobile phone will be sent out response message to this beep-page message, if the mobile phone of this number does not then just have response feedback.These information all can be reported to CSC.8, network element is collected the feedback message that CSC reports and is made preliminary judgement, reports webmaster.The preliminary judgement here is meant if obtain the message that pages reply of one or more under the same network element, can judges Cun Zai Margin Machine.9, the detect-message that reports according to the whole network of webmaster, Shi denys a Cun Zai Margin Machine in the judgement system.Webmaster has the highest weight limit of Pan Duan Margin Machine, the standard of its Pan Duan Margin Machine is as follows: under single network element situation, if the base station controller subsystem reports two or more the message that pages reply (one of them conversation example is equal to the message that pages reply), then can judge the Cun Zai of system Margin Machine (two or more); Under a plurality of effective network element situations, as long as webmaster is received under the different network elements response is arranged, system just can report Cun Zai Margin Machine.Network element might obtain the response of two (or more than) at Signaling Layer, should be to the webmaster reporting information in the very first time.Webmaster draws User Status under the single network element according to the response results of user's call scenarios, CSC.10,, Margin Machine detects and finishes.In practice process, it denys Cun Zai Margin Machine that the PHS webmaster can detect a plurality of number Shi at every turn simultaneously.
Claims (9)
1, a kind of PHS Zhong De of system Margin Machine detection method is characterized in that comprising the following steps:
(1) webmaster She Zhi Margin Machine detected parameters: comprise time and the granularity of selecting active detecting;
(2) webmaster calculates the probable value of direct Quick Paging DPIP and judges that whether it is greater than 80%;
(3) if then webmaster detects signaling to all network elements while Fa send Margin Machines, otherwise Jie Shu Margin Machine testing process;
(4) network element Ti Qu Margin Machine detects information relevant with active detecting in the signaling and judges whether there is the conversation example of detected number this moment, if having, then reports the relevant information of this example;
(5) network element sends beep-page message by base station controller to PHS base station mobile handset subsystem according to different paging zones;
(6) PHS base station mobile handset subsystem is made feedback and reporting base station controller to beep-page message;
(7) network element is collected the feedback message that base station controller reports and is made preliminary judgement, reports webmaster;
(8) detect-message that reports according to the whole network of webmaster, Shi denys a Cun Zai Margin Machine in the judgement system.
2, a kind of PHS Zhong De of system Margin Machine detection method according to claim 1 is characterized in that the computational methods of described DPIP probable value are:
P
dpip=A×B×C-D
Wherein: A represents the normalization number of network element, and B represents foreground free memory piece Ub idle condition, and C represents that the traffic of the foreground system that the backstage obtains takies situation, and D is a changed factor, and the network element position in its value and the webmaster, number etc. are relevant.
3, a kind of PHS Zhong De of system Margin Machine detection method according to claim 2 is characterized in that the span of described changed factor D is generally 0.1~0.15.
4, a kind of PHS Zhong De of system Margin Machine detection method according to claim 1 is characterized in that the detection granularity in the described step (1) is 30 seconds.
5, the Margin Machine detection method in a kind of PHS according to claim 1 system, it is characterized in that the Margin Machine of the stating information that detects signaling comprise subscriber directory number length, subscriber directory number, PHS handset identity code code length, PHS handset identity code.
6, the Margin Machine detection method in a kind of PHS according to claim 1 system is characterized in that described network element is carried to get Margin Machine and detect that the information relevant with active detecting comprises the base station range at handset identity code, mobile phone place, the paging zone at mobile phone place in the signaling.
7, the Margin Machine detection method in a kind of PHS according to claim 1 system is characterized in that the beep-page message in the described step (5) is to have only to get back to a beep-page message.
8, a kind of PHS Zhong De of system Margin Machine detection method according to claim 1 is characterized in that Mei Margin Machine detection can detect a plurality of numbers simultaneously.
9, a kind of PHS Zhong De of system Margin Machine detection method according to claim 1 is characterized in that the preliminary judgement in the described step (7) is meant if obtain the message that pages reply of one or more under the same network element, can judge Cun Zai Margin Machine.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200310103147 CN1258934C (en) | 2003-11-05 | 2003-11-05 | Method of 'double-in' detection in PHS system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200310103147 CN1258934C (en) | 2003-11-05 | 2003-11-05 | Method of 'double-in' detection in PHS system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1543233A true CN1543233A (en) | 2004-11-03 |
CN1258934C CN1258934C (en) | 2006-06-07 |
Family
ID=34333214
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200310103147 Expired - Fee Related CN1258934C (en) | 2003-11-05 | 2003-11-05 | Method of 'double-in' detection in PHS system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1258934C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101188860B (en) * | 2007-12-19 | 2010-11-10 | 华为技术有限公司 | A method and device for recognizing exceptional terminal |
-
2003
- 2003-11-05 CN CN 200310103147 patent/CN1258934C/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101188860B (en) * | 2007-12-19 | 2010-11-10 | 华为技术有限公司 | A method and device for recognizing exceptional terminal |
Also Published As
Publication number | Publication date |
---|---|
CN1258934C (en) | 2006-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101501669B1 (en) | Behavior detection system for detecting abnormal behavior | |
US6405045B1 (en) | Dynamic overload control device and method in digital mobile communication system | |
KR20070099201A (en) | Method of security management for mobile wireless device and apparatus for security management using the same | |
CN1764218A (en) | Relay apparatus and relay method | |
CN1878384A (en) | Network element failure detecting method | |
CN102694900A (en) | Phone call intercepting method and device | |
CN101198121B (en) | Authentication method for limiting mobile phone without using by others | |
CN1373977A (en) | System and method for selectively blocking or dropping calls in telecommunicaltions network | |
CN1852595A (en) | Method for authent ation of access of wireless communication terminal | |
US8532616B2 (en) | Systems and methods for identification of mobile phones in a restricted environment | |
CN1889392A (en) | Network time synchronizing method based on simple network to time protocol | |
CN1258934C (en) | Method of 'double-in' detection in PHS system | |
EP4145769A1 (en) | Method and device for detecting user data of user equipment (ue), and storage medium | |
RU2471313C1 (en) | Device and method to control number of simultaneous calls | |
CN110267219B (en) | Call forwarding reporting method, register, user terminal and block chain network | |
CN1968480A (en) | Active group call listening method and system | |
CN1799248A (en) | System and method for group restricted access of a shared access controller | |
CN1274169C (en) | Method for limiting illegal mobile telephone | |
CN114268509B (en) | Method and system for preventing DDOS attack of zombie terminal | |
CN103139740B (en) | The identification of a kind of illegal signaling, processing method and device | |
CN1771718A (en) | Security methods for use in a wireless communications system | |
CN1773943A (en) | Communication net node fault monitoring method | |
CN1602101A (en) | Method of preventing clone call of clone terminal | |
CN103313247A (en) | Method and device for acquiring spam call | |
CN1595999A (en) | A method for dynamically updating group information in cluster service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20060607 Termination date: 20131105 |