CN1684411B - Method for verifying user's legitimate of mobile terminal - Google Patents

Method for verifying user's legitimate of mobile terminal Download PDF

Info

Publication number
CN1684411B
CN1684411B CN 200410032708 CN200410032708A CN1684411B CN 1684411 B CN1684411 B CN 1684411B CN 200410032708 CN200410032708 CN 200410032708 CN 200410032708 A CN200410032708 A CN 200410032708A CN 1684411 B CN1684411 B CN 1684411B
Authority
CN
China
Prior art keywords
portable terminal
information
mobile terminal
authentication devices
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN 200410032708
Other languages
Chinese (zh)
Other versions
CN1684411A (en
Inventor
王正伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN 200410032708 priority Critical patent/CN1684411B/en
Priority to PCT/CN2004/001325 priority patent/WO2005050910A1/en
Publication of CN1684411A publication Critical patent/CN1684411A/en
Application granted granted Critical
Publication of CN1684411B publication Critical patent/CN1684411B/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

This invention discloses a method for verifying the legal state of a mobile user terminal, which presets a piece of mobile terminal identification information for identifying the mobile terminal and a piece of individual information for testifying the legal state of the mobile terminal and pre-stores the corresponding relation between the mobile terminal identification information and the individuality information in a verification device of the mobile communication network. After the mobile terminal is connected to the network, its identification information is sent to the verification device, which determines related individuality information based on the corresponding relation and sends the verifying information corresponding to the individuality information to the mobile terminal, then the terminal compares if the information is the same with that of the individuality information kept by itself, if so, the mobile terminal user is determined legal, otherwise, it is illegal.

Description

A kind of method of verifying the mobile phone users legitimacy
Technical field
The present invention relates to the verification technique of cordless communication network, be specifically related to a kind of method of verifying the mobile phone users legitimacy.
Background technology
Present portable terminal great majority adopt the mode of separation between machine and card, and just portable terminal itself is two independent parts with the subscriber card that is used for checking wireless network user profile, bond them together in use to get final product.Present subscriber card mainly is Subscriber Identity Module (SIM) card that is used for global mobile communication (GSM) system.This mode has a lot of outstanding advantages, for example the user wants to change the words of a portable terminal, only need to buy a new portable terminal and original SIM card is inserted into new portable terminal to get final product, like this, because user's information does not need to change, so the user does not need to handle to common carrier the formality of any replacing portable terminal yet.
But when adopting the separation between machine and card mode to bring great convenience, also cause portable terminal stolen and robbed phenomenon and happen occasionally, to such an extent as to portable terminal dare not be hung between waist some local people to the user.Because under the separation between machine and card mode, change a new SIM card on the portable terminal of robbing and just can have no obstacle ground use as long as steal in institute.Thereby the robber can sail again the steal portable terminal of robbing and sell profit like this.Like this, user not only economic interests is subjected to very big influence, but also need go to the common carrier place to handle a series of formalities, for example changes subscription data, has brought very big inconvenience to the user.
In order to solve portable terminal stolen problem of robbing easily, a kind of method relatively more commonly used is that cryptoguard is set on portable terminal.Startup password for example is set on portable terminal, all needs to import correct startup password at every turn when starting shooting, portable terminal could be carried out to subsequent operations such as network registries.If the startup password input is incorrect, this portable terminal just can not normally use.Even the robber has obtained user's portable terminal like this, also can not use and sell because not inputing correct password.Therefore, this method has solved portable terminal stolen problem of robbing easily to a certain extent.But for this a kind of method, validated user also needs to input password when each start, will bring very large trouble to validated user.Therefore, at present a lot of users are not provided with such startup password because feeling so each input startup password hell to pay, make this solution be difficult to be accepted and obtain the application of reality, thereby can not fundamentally solve portable terminal stolen problem of robbing easily by the user.
Also having a kind of solution is to build a large amount of equipment identity register (EIR) equipment, and the International Mobile Station Equipment Identification (IMEI) of those stolen mobile terminals is put into the blacklist of corresponding EIR.Like this, portable terminal when starting shooting logging in network at every turn, need all in EIR equipment, to check whether the pairing IMEI of this portable terminal is added in the blacklist, if in blacklist, found the IMEI of this portable terminal, network thinks that this mobile terminal user is the disabled user, thereby refusal further is its request of providing services on the Internet.The robber can not therefrom make a profit because resulting portable terminal can not reuse equally like this, thereby can fundamentally solve portable terminal stolen problem of robbing easily.But this method needs the unified EIR device systems of the common construction of all operators, could guarantee that like this robber uses the portable terminal of being stolen can not use at any one Operation Network, some else if operators do not participate in setting up such EIR equipment, can not carry out antitheft business, the robber can use the portable terminal of being stolen to use in the network of this operator so, thereby the antitheft business that other operators are carried out loses intrinsic meaning.But, allow all operators build unified EIR equipment, brought a lot of inconvenience to operator.
In order to address the above problem, the applicant is 200310116767.2 at application number, denomination of invention be similarly " a kind of verification method of mobile phone users legitimacy " thus patent application in proposed a kind of legitimacy of mobile phone users of verifying and prevented the method that portable terminal is stolen.In the method, an identification information that is used to verify the mobile phone users legitimacy is set in portable terminal in advance, and preserves customized information corresponding to this identification information; In Authentication devices, preserve the user signing contract information of portable terminal correspondence and the corresponding relation between the identification information in advance, such as, this corresponding relation can be the mapping table of IMSI and identification information, also can be the mapping table of MSDN and identification information; After portable terminal signs in to communication network, according to corresponding to the authorization information of the customized information of preserving in the portable terminal with corresponding to the authorization information of the respective identification information of preserving in the Authentication devices consistent legitimacy of verifying mobile phone users whether.Though this method can solve the problem of guarding against theft for mobile terminal, underaction well.For example, user's portable terminal is under the situation that battery electric quantity exhausts, the user may wish that other portable terminals that oneself subscriber card are inserted into the household use, at this moment owing to do not preserve user's oneself CAMEL-Subscription-Information and the corresponding relation between other the portable terminal in advance, so certainly, can be by checking, therefore need the user to rebulid CAMEL-Subscription-Information of oneself and the corresponding relation between other the portable terminal, so that oneself subscriber card is inserted into other portable terminals to be used, but rebuliding above-mentioned corresponding relation can make troubles to user's use.
In addition, some operator attracts the user to use the service of oneself by giving customer mobile terminal now, but the user is after obtaining the portable terminal that this operator gives, immediately it being forwarded to other carrier networks probably uses, thereby do not use the service of the operator that gives portable terminal for a long time, do not reach the purpose of this operator, caused loss to operator.
Summary of the invention
In view of this, main purpose of the present invention provides a kind of method of verifying the mobile phone users legitimacy, and this method can solve portable terminal, and easily stolen problem of robbing and implementation are more flexible.
Above-mentioned purpose of the present invention is solved by the following technical solutions:
A kind of method of verifying the mobile phone users legitimacy is used for the legitimacy of portable terminal being verified that this method comprises the steps: at least under the separation between machine and card mode
A., a mobile terminal identification information and a customized information that is used to verify mobile terminal validity that is used to identify portable terminal is set in portable terminal in advance;
B. in an Authentication devices of mobile communications network, preserve the corresponding relation between mobile terminal identification information and the customized information in advance;
C. after portable terminal is connected to network, the mobile terminal identification information of this portable terminal is sent to Authentication devices; Authentication devices is determined corresponding customized information according to described corresponding relation, and will send to portable terminal corresponding to the authorization information of this customized information;
D. portable terminal relatively is received from the authorization information of Authentication devices whether with consistent corresponding to the authorization information of the customized information of self preserving, if unanimity determines that this mobile phone users is legal; Otherwise determine that this mobile phone users is illegal.
In said method, customized information and can all be key informations that produce by portable terminal corresponding to the authorization information of this customized information.
In said method, customized information is a key information that is produced by portable terminal, can be the result of calculation that key information and random number are carried out computations corresponding to the authorization information of customized information; This moment, step c comprised that further portable terminal sends a random number to Authentication devices, and Authentication devices uses random number that this key is carried out computations after having determined key and obtains described authorization information; Steps d comprises that further portable terminal carries out identical computations to the key of self preserving with the random number that self produces, and obtains the authorization information corresponding to the customized information of self preserving.
For lost mobile terminal, the present invention further comprises the mobile terminal identification information that deletion is preserved in the Authentication devices and the step of the corresponding relation between the customized information.
Said method may further include for sign of the correspondence setting between mobile terminal identification information of preserving in the Authentication devices and the customized information, this is designated portable terminal and loses for the lost mobile terminal setting, this moment, this method further comprised: after Authentication devices receives mobile terminal identification information, determine whether this sign represents that portable terminal loses, if obtain the CAMEL-Subscription-Information of mobile phone users; Otherwise Authentication devices is determined the step and the subsequent step thereof of corresponding customized information among the execution in step c according to described corresponding relation.
Said method may further include a verification operation password that is used to revise verification setting is set.Can use this verification operation password to cancel verification operation of the present invention and judge that directly all users are legal; Also can revise the customized information of portable terminal, and in an Authentication devices of mobile communications network, preserve the corresponding relation between mobile terminal identification information and the customized information again according to set verification operation password.
Step c may further include: Authentication devices is after receiving mobile terminal identification information, judge whether to have corresponding relation corresponding to this mobile terminal identification information, if have, execution is determined the step and the subsequent step thereof of corresponding customized information according to described corresponding relation, otherwise determines that directly mobile phone users is illegal.
Mobile terminal identification information in the said method can be International Mobile Station Equipment Identification (IMEI) information of portable terminal, and Authentication devices can be EIR.
From technical scheme of the present invention as can be seen, the present invention is provided with a mobile terminal identification information and a customized information that is used to verify mobile terminal validity that is used to identify portable terminal in advance in portable terminal; And in an Authentication devices of mobile communications network, preserve corresponding relation between mobile terminal identification information and the customized information in advance; After portable terminal was connected to network, portable terminal sent to Authentication devices with the mobile terminal identification information of this portable terminal; Authentication devices is determined corresponding customized information according to corresponding relation, and will send to portable terminal corresponding to the authorization information of this customized information; Whether portable terminal relatively is received from the authorization information of Authentication devices with consistent corresponding to the authorization information of the customized information of self preserving, if consistent, determines that this mobile phone users is legal; Otherwise determine that this mobile phone users is illegal.Implementation of the present invention is very simple, an identification information and property information one by one only need be set on portable terminal, and in Authentication devices, add the corresponding relation of identification information and customized information, after portable terminal connects network, carry out a compare operation then and get final product.
For the stolen portable terminal of robbing, if in the network of other operators, use, because the Authentication devices in the network of this operator is not preserved the corresponding relation of identification information and customized information, therefore can be by checking.If use in original carrier network, because the user will notify this operator after losing portable terminal, so operator will delete the record of original preservation or a special marking will be set, thereby this portable terminal can not be used.Cooperate locking portable terminal, the position of record portable terminal and user's card number of replacing this moment, and mode such as report public security organ etc., make the disabled user not only can not use and steal the portable terminal profit of robbing, but also can be arrested rapidly, thereby stop the robber effectively and steal the motivation of robbing portable terminal, and then fundamentally solving portable terminal stolen problem of robbing easily.
By technical scheme of the present invention, when the user is inserted into other portable terminal use at the subscriber card with oneself, because Authentication devices is preserved is corresponding relation between mobile terminal identification information and the customized information, therefore portable terminal can normally use, thereby make verification method of the present invention more flexible, brought facility to the user.
In the present invention, use portable terminal will inevitably cause portable terminal can not pass through checking owing to change net, therefore each operator can independently build the Authentication devices of oneself, and does not need all operators to set up unified Authentication devices jointly, thereby has brought convenience to operator.
By a verification operation password being set and grasping this password by operator, the present invention can prevent to give effectively or the portable terminal of sales promotion arbitrarily changes net to other networks, has ensured benefits of operators.
Description of drawings
Fig. 1 is an overview flow chart of the present invention.
Fig. 2 is the flow chart of the concrete proof procedure of first embodiment of the invention.
Fig. 3 is the flow chart of the concrete proof procedure of second embodiment of the invention.
Embodiment
The present invention is described in detail below in conjunction with the drawings and specific embodiments.
Fig. 1 shows overview flow chart of the present invention.As shown in Figure 1, at first in step 101, being provided with one in portable terminal can not have the permanent identification information of preserving of power supply, and preserves a customized information that is used to verify mobile terminal validity.This identification information can be any character combination that figure place is not limit, and is preferably the use numerical character, and under portable terminal does not have electric power thus supplied, and this identification information still can be kept in the portable terminal and can not lose.
In step 102, in Authentication devices, preserve the corresponding relation between the customized information of the identification information of portable terminal and portable terminal in advance.
In step 103, after portable terminal signs in to network, oneself identification information is sent to Authentication devices.
In step 104, Authentication devices judges whether to determine the customized information of correspondence according to the identification information of the portable terminal that is received in mobile terminal identification information of preserving in advance and the corresponding relation between the customized information, if, execution in step 105, otherwise execution in step 108.
In step 105, Authentication devices will send to portable terminal corresponding to the authorization information of this customized information then.
In step 106, whether portable terminal is judged corresponding to the authorization information of customized information consistent with the authorization information that customized information according to portable terminal oneself preservation obtains.If consistent, show that the active user of portable terminal is legal, continue to use Communications service at step 107 portable terminal; Otherwise the active user that portable terminal is described is illegal user, this moment, portable terminal can be stopped using communication service in step 108, for example lock with the refusal operation, perhaps informing network stops portable terminal being served, perhaps new user's card number is sent to network and preserve, so that follow the tracks of illegal user.
In the present invention, the customized information of portable terminal setting can be to be provided with by portable terminal oneself, then the customized information that is provided with is sent to Authentication devices; Also can be to be provided with, then the customized information that is provided be sent to portable terminal by Authentication devices.
In first specific embodiment of the present invention, the International Mobile Station Equipment Identification (IMEI) that can use portable terminal is as mobile terminal identification information, use the customized information of a key that produces at random as portable terminal, as the authorization information corresponding to customized information, Authentication devices uses EIR simultaneously.Its concrete steps as shown in Figure 2.
Step 201 saves as the identification information of portable terminal with the IMEI information of portable terminal, a key that produces is at random saved as the customized information of portable terminal.
In step 202, in EIR equipment, preserve the corresponding relation of the key of the IMEI information of portable terminal and portable terminal in advance.
In step 203, after portable terminal signs in to network, oneself IMEI information is sent to EIR.
In step 204, EIR judges whether to determine the customized information of correspondence according to the IMEI information of the portable terminal that is received in mobile terminal identification information of preserving in advance and the corresponding relation between the customized information, if, execution in step 205, otherwise execution in step 208.
In step 205, Authentication devices will determine that corresponding key sends to portable terminal as the authorization information corresponding to customized information.
In step 206, portable terminal is behind the key that receives from EIR, and if the relatively more own key of preserving consistent, shows that the active user of portable terminal is legal whether with from the key agreement of EIR, continues the use Communications service at step 207 portable terminal; Otherwise the active user that portable terminal is described is illegal user, and this moment, portable terminal can be stopped using communication service in step 208, for example locks with the refusal operation, and perhaps informing network stops portable terminal being served.
In order to improve security of key transmission, the present invention proposes second embodiment, just use key and random number to carry out result of calculation that computations obtains as authorization information, key is carried out implicit expression transmit.Its concrete steps as shown in Figure 3.
Step 301 saves as the identification information of portable terminal with the IMEI information of portable terminal, a key that produces is at random saved as the customized information of portable terminal.
In step 302, in EIR equipment, preserve the corresponding relation of the key of the IMEI information of portable terminal and portable terminal in advance.
In step 303, after portable terminal signs in to network, oneself IMEI information is sent to EIR, send a random number simultaneously.
In step 304, EIR judges whether to determine the customized information of correspondence according to the IMEI information of the portable terminal that is received in mobile terminal identification information of preserving in advance and the corresponding relation between the customized information, if, execution in step 305, otherwise execution in step 309.
In step 305, EIR carries out computations with counterpart keys of determining and the random number that is received from portable terminal, obtains a result of calculation, and this result of calculation is sent to portable terminal as the authorization information corresponding to customized information.
In step 306, portable terminal uses the key of oneself and the random number of oneself generation to carry out a same computations after the result of calculation that receives from EIR, obtains a cryptographic calculation results.
In step 307, whether the result of calculation that portable terminal relatively oneself obtains is consistent with result of calculation from EIR, if consistent, shows that the active user of portable terminal is legal, continues to use Communications service at step 308 portable terminal; Otherwise the active user that portable terminal is described is illegal user, and this moment, portable terminal can be stopped using communication service in step 309, for example locks with the refusal operation, and perhaps informing network stops portable terminal being served.
In first and second embodiment, can utilize the integrated circuit (IC) design technology to realize the control visit of mobile terminal identification and customized information, such as, for writing customized information, or produce the operation of property information one by one again at random, must can carry out by corresponding operator password.For example in the designing technique of existing smart card (IC) chip, a terminal authentication module is set in the IC-card chip, a key and corresponding algorithm are set in this authentication module, and a tandom number generator is set, produce a random number by this tandom number generator.Send this random number to the portable terminal program then, perhaps oneself read by the portable terminal program.The portable terminal program sends to EIR with the random number that obtains.Determining step of the present invention is also undertaken by the terminal authentication module.If the verification passes, authentication module normally moves; If checking is not passed through, authentication module can not normally move, and the power supply of for example cutting off related chip makes portable terminal normally to use.
Pass through the foregoing description, when portable terminal is lost and is used in other Operation Networks, owing to can not preserve the relevant information of this Operation Network in the Authentication devices of other Operation Network, certainly also can not preserve the identification information of this portable terminal and the corresponding relation between the customized information, checking will can not passed through like this, thereby lost mobile terminal can not be used in other Operation Network.
But in the above-described embodiments, lost mobile terminal but can be used in the network of same operator, in order to stop this situation, the present invention proposes the 3rd embodiment and the 4th embodiment.
In the 3rd embodiment, the user is after portable terminal is lost, the modes such as Service Phone that need pass through to the clerk counter registration of operator or dial operator inform that provider customer's portable terminal loses, at this moment corresponding relation between this mobile terminal identification information and the customized information can be deleted according to the mobile terminal identification information that directly or indirectly obtains by operator in the mapping table of Authentication devices, even like this in same carrier network, checking can not be passed through, thus the perfect anti-theft feature of portable terminal.
Perhaps, in order further to determine robber's identity, in the 4th embodiment, after the user informs that provider customer's portable terminal is lost, operator does not delete the corresponding relation between mobile terminal identification information and the customized information immediately, but sets up the mark that this portable terminal has been lost.After using lost mobile terminal to connect network, Authentication devices learns that according to this mark this portable terminal is a lost mobile terminal, thereby obtain the CAMEL-Subscription-Information of mobile terminal user card, can learn the people's who uses this portable terminal details like this, help the user to recover lost mobile terminal.Perhaps, can send a warning message, give back this portable terminal with the people who warns current this portable terminal of use to this portable terminal.
In order to further facilitate the user, a verification operation password can also be set in the fifth embodiment of the present invention, can cancel the verification operation of portable terminal by this operator password, thereby make portable terminal unconditionally by checking.Perhaps upgrade the key information in the authentication module, can guarantee that like this portable terminal also can normally use in the network of another operator.When the cancellation verification operation, a sign of whether verifying is set in portable terminal, such as, this sign being arranged in the authentication module of portable terminal, the portable terminal program can read this sign.If showing, this sign need carry out verification operation, the step of then carrying out transmission relevant information of the present invention and judging; Do not need to carry out verification operation if this sign shows, then this portable terminal does not need to verify promptly and can normally use, and is that the user is legal yet.
For the portable terminal that user oneself buys, this password is provided with and is preserved by the user.But for the portable terminal of being given by operator, this password can be provided with and be preserved by operator, makes the user not know this password.In a period of time of operator's regulation, for example 2 years, this portable terminal can not use in other networks, because other networks are not preserved the identification information of this portable terminal and the corresponding relation between the customized information, and, therefore also can not remove newly-built such corresponding relation owing to do not know its customized information.Only after initiatively telling this password of user through 2 years operators, the user could use this password cancellation verification operation or change key information, thereby reasonably changes other networks over to.
In the present invention, if the user inserts other portable terminals uses with the subscriber card of oneself, fully can be by checking of the present invention, thereby avoided in the applicant's of mentioning in the prior art the technical scheme in case own subscriber card is inserted other portable terminals just use and to make checking of the present invention more flexible by the problem of verifying.In conjunction with the 3rd or the 4th embodiment, the user with its mobile terminal identification information notification operator, makes by lost mobile terminal and can not re-use the network service after portable terminal is lost simultaneously, thereby has guaranteed the fail safe of the present invention's checking.
In the present invention, Authentication devices is not limited to EIR, can also be other equipment that increased authentication function in the network, for example attaching position register (HLR) or the like.
Therefore be appreciated that the above only is preferred embodiment of the present invention, or not within the spirit and principles in the present invention not all in order to restriction the present invention, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (11)

1. a method of verifying the mobile phone users legitimacy is used under the separation between machine and card mode legitimacy of portable terminal being verified that it is characterized in that, this method comprises the steps: at least
A., a mobile terminal identification information and a customized information that is used to verify mobile terminal validity that is used to identify portable terminal is set in portable terminal in advance;
B. in an Authentication devices of mobile communications network, preserve the corresponding relation between described mobile terminal identification information and the customized information in advance;
C. after portable terminal is connected to network, the mobile terminal identification information of this portable terminal is sent to Authentication devices; Authentication devices is determined corresponding customized information according to described corresponding relation, and will send to portable terminal corresponding to the authorization information of this customized information;
D. portable terminal relatively is received from the authorization information of Authentication devices whether with consistent corresponding to the authorization information of the customized information of self preserving, if unanimity determines that this mobile phone users is legal; Otherwise determine that this mobile phone users is illegal.
2. the method for checking mobile phone users legitimacy according to claim 1 is characterized in that, described customized information and all are key informations that produced by portable terminal corresponding to the authorization information of this customized information.
3. the method for checking mobile phone users legitimacy according to claim 1, it is characterized in that, described customized information is a key information that is produced by portable terminal, and described authorization information corresponding to customized information is the result of calculation that key information and random number are carried out computations;
Step c comprises that further portable terminal sends a random number to Authentication devices, and Authentication devices uses random number that this key is carried out computations after having determined key and obtains described authorization information;
Steps d comprises that further portable terminal carries out identical computations to the key of self preserving with the random number that self produces, and obtains the authorization information corresponding to the customized information of self preserving.
4. the method for checking mobile phone users legitimacy according to claim 1, it is characterized in that this method further comprises for the mobile terminal identification information of preserving in the lost mobile terminal deletion Authentication devices and the step of the corresponding relation between the customized information.
5. the method for checking mobile phone users legitimacy according to claim 1, it is characterized in that, this method further comprises for sign of the correspondence setting between mobile terminal identification information of preserving in the Authentication devices and the customized information, this is designated portable terminal and loses for the lost mobile terminal setting, and this moment, this method further comprised:
After Authentication devices receives mobile terminal identification information, determine whether this sign represents that portable terminal loses, if obtain the CAMEL-Subscription-Information of mobile phone users; Otherwise Authentication devices is determined the step and the subsequent step thereof of corresponding customized information among the execution in step c according to described corresponding relation.
6. the method for checking mobile phone users legitimacy according to claim 1 is characterized in that, this method further comprises a verification operation password that is used to revise verification setting is set.
7. the method for checking mobile phone users legitimacy according to claim 6 is characterized in that, this method further comprises a step according to set verification operation password cancellation verification operation.
8. the method for checking mobile phone users legitimacy according to claim 6, it is characterized in that this method further comprises one according to the step of the customized information of set verification operation password modification portable terminal and the step of preserving the corresponding relation between described mobile terminal identification information and the customized information again in an Authentication devices of mobile communications network.
9. the method for checking mobile phone users legitimacy according to claim 1, it is characterized in that, step c further comprises: Authentication devices is after receiving mobile terminal identification information, judge whether to have corresponding relation corresponding to this mobile terminal identification information, if have, execution is determined the step and the subsequent step thereof of corresponding customized information according to described corresponding relation, otherwise determines that directly mobile phone users is illegal.
10. the method for checking mobile phone users legitimacy according to claim 1 is characterized in that, International Mobile Station Equipment Identification (IMEI) information that described mobile terminal identification information is portable terminal.
11. the method for checking mobile phone users legitimacy according to claim 1 is characterized in that, described Authentication devices is equipment identity register (EIR).
CN 200410032708 2003-11-21 2004-04-13 Method for verifying user's legitimate of mobile terminal Expired - Lifetime CN1684411B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN 200410032708 CN1684411B (en) 2004-04-13 2004-04-13 Method for verifying user's legitimate of mobile terminal
PCT/CN2004/001325 WO2005050910A1 (en) 2003-11-21 2004-11-22 A method for authenticating the device’s self-validity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200410032708 CN1684411B (en) 2004-04-13 2004-04-13 Method for verifying user's legitimate of mobile terminal

Publications (2)

Publication Number Publication Date
CN1684411A CN1684411A (en) 2005-10-19
CN1684411B true CN1684411B (en) 2010-04-28

Family

ID=35263554

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200410032708 Expired - Lifetime CN1684411B (en) 2003-11-21 2004-04-13 Method for verifying user's legitimate of mobile terminal

Country Status (1)

Country Link
CN (1) CN1684411B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102480486A (en) * 2010-11-24 2012-05-30 阿尔卡特朗讯公司 Method, device and system for verifying communication session
CN102663836A (en) * 2012-04-07 2012-09-12 张忠义 Method and device for mobile equipment charge error preventing

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101102583A (en) * 2006-07-05 2008-01-09 华为技术有限公司 Using method and device for user terminal identifier
EP2063658A4 (en) * 2006-09-15 2014-03-26 Nec Corp Terminal apparatus, device, unauthorized use preventing system, unauthorized use preventing method, and program
CN100461711C (en) * 2007-03-30 2009-02-11 华为技术有限公司 Method for providing individualized experience, apparatus, server system and network management system
CN101360323B (en) * 2007-08-03 2014-12-31 华为技术有限公司 Method and system acquiring temporaty mark by network
CN102196438A (en) 2010-03-16 2011-09-21 高通股份有限公司 Communication terminal identifier management methods and device
CN101841814B (en) * 2010-04-06 2014-07-02 中兴通讯股份有限公司 Terminal authentication method and system
US9385862B2 (en) 2010-06-16 2016-07-05 Qualcomm Incorporated Method and apparatus for binding subscriber authentication and device authentication in communication systems
US9112905B2 (en) 2010-10-22 2015-08-18 Qualcomm Incorporated Authentication of access terminal identities in roaming networks
US9668128B2 (en) 2011-03-09 2017-05-30 Qualcomm Incorporated Method for authentication of a remote station using a secure element
CN102355654B (en) * 2011-07-26 2017-11-14 中兴通讯股份有限公司 device identification method and device
EP2795530B1 (en) * 2011-12-19 2020-02-26 Hand Held Products, Inc. Encoded information reading terminal using external token
CN104978144A (en) * 2015-06-26 2015-10-14 中国工商银行股份有限公司 Gesture password input device and system and method for transaction based on system
CN106658093B (en) * 2016-12-27 2019-07-09 深圳市九洲电器有限公司 The exchange method and system of set-top box and server
CN109714466B (en) * 2017-10-26 2021-08-17 中国电信股份有限公司 Dynamic password authentication processing method and device and mobile terminal thereof
CN111835689B (en) * 2019-04-22 2021-06-15 华为技术有限公司 Identity authentication method of digital key, terminal device and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1182339A (en) * 1996-02-09 1998-05-20 刘杰 Anti-theft method for the number code of mobile telephone
CN1323478A (en) * 1998-08-17 2001-11-21 格姆普拉斯公司 Method and device for authenticating with symmetrical algorithm

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1182339A (en) * 1996-02-09 1998-05-20 刘杰 Anti-theft method for the number code of mobile telephone
CN1323478A (en) * 1998-08-17 2001-11-21 格姆普拉斯公司 Method and device for authenticating with symmetrical algorithm

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102480486A (en) * 2010-11-24 2012-05-30 阿尔卡特朗讯公司 Method, device and system for verifying communication session
CN102480486B (en) * 2010-11-24 2015-07-22 阿尔卡特朗讯公司 Method, device and system for verifying communication session
CN102663836A (en) * 2012-04-07 2012-09-12 张忠义 Method and device for mobile equipment charge error preventing

Also Published As

Publication number Publication date
CN1684411A (en) 2005-10-19

Similar Documents

Publication Publication Date Title
CN1684411B (en) Method for verifying user's legitimate of mobile terminal
US7024226B2 (en) Method for enabling PKI functions in a smart card
CN100391282C (en) Method for locking mobile telecommunication terminal
EP2248295B1 (en) System and method for wireless device based user authentication
EP1562394B1 (en) Apparatus and method for setting use restriction of mobile communication terminal
US20170105123A1 (en) Method and apparatus for unlocking a mobile telephone type wireless communication terminal
CN100563391C (en) The method of mobile communications terminal data protection, system and equipment
CN101010903B (en) Method for generating and verifying an electronic signature
AU2002230306A1 (en) Method for enabling PKI functions in a smart card
CN102113358B (en) Method, system and terminal device for realizing locking network by terminal device
US7623845B2 (en) System for preventing unauthorized use of a mobile phone
CN101960738A (en) Method and system of providing personal information control service for mobile communication terminal
CN103581441A (en) Mobile terminal tracking anti-theft system and method
KR100631689B1 (en) Theft prevention method and system of mobile communication terminal
JPH11177682A (en) Radio communication equipment
CN100362880C (en) Identification method of mobile terminal user legalness
CN112437428A (en) Verification method and server
CN100413368C (en) A method for verifying user card validity
CN1823494B (en) Method for securing an electronic certificate
JP3497799B2 (en) User authentication method
JP2007281861A (en) Terminal authentication method and mobile terminal device
KR101300764B1 (en) Method for Issuing Settlement/Authentication Token using Data Network and Voice Network
CN1705263B (en) Validity verification method of mobile terminal user and mobile terminal thereof
KR20050095278A (en) Restriction method for illegal use of mobile communication terminal
CN101729245B (en) Method and system for distributing key

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20100428