CN1798199A - Telephone number misappropriated confirmation method of mobile communication terminal - Google Patents

Telephone number misappropriated confirmation method of mobile communication terminal Download PDF

Info

Publication number
CN1798199A
CN1798199A CN 200510105650 CN200510105650A CN1798199A CN 1798199 A CN1798199 A CN 1798199A CN 200510105650 CN200510105650 CN 200510105650 CN 200510105650 A CN200510105650 A CN 200510105650A CN 1798199 A CN1798199 A CN 1798199A
Authority
CN
China
Prior art keywords
communication terminal
information
telephone number
transmission types
stage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510105650
Other languages
Chinese (zh)
Inventor
金钟焕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LG Electronics China Research and Development Center Co Ltd
Original Assignee
LG Electronics China Research and Development Center Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LG Electronics China Research and Development Center Co Ltd filed Critical LG Electronics China Research and Development Center Co Ltd
Publication of CN1798199A publication Critical patent/CN1798199A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a telephone number misappropriated confirmation method of mobile communication terminal, comprising: the first phase, if the transmitter terminal misappropriates other mobile communication terminal number to transmit short message, the exchange will check out the transmission type information, including transmitter phone number, short message content, receiver information and transmission position of the short message; the second phase, judging whether the phone number of the transmitter mobile communication terminal and phone number of the transmission type information are consistent; the third phase, if not consistent, transmitting the short message to the receiver mobile communication terminal and transmitting the misappropriated information to the misappropriated phone number in the transmission type information; the fourth phase, if consistent, transmitting the short message to the receiver mobile communication terminal.

Description

The number of communication terminal is usurped confirmation method
Technical field
The number that the present invention relates to communication terminal is usurped confirmation method, on mobile communcations system, when usurping the herd number that is not the respective service entrant is other people communication terminal number when carrying out SMS communication, sends to stolen communication terminal and confirms that phone usurps thereby will usurp number information.
Background technology
Communication terminal is to be the communication system of object with moving bodys such as people, automobile, boats and ships, train, aircrafts, comprises key telephone system, mobile phone (mobile phone, car telephone), bay phone, airplane telephone, mobile skyphone (being arranged on train, pleasure boat, the expressway bus), wireless calling, radio telephone, satellite mobile communication, ham radio here, fishery is wireless etc.
This mobile communcations system has: AMPS (the Advanced Mobile PhoneService) system that uses analog form, use CDMA (the Code Division Multiple Access of digital form, code division multiple access) system, WCDMA (Wideband Code Division Multiple Access bandwidth code division multiple access), TDMA (Time Division Multiple Access, time division multiple access) system, FDMA (FrequencyDivision Multiple Access, frequency division multiple access) system, WLL (Wireless Local Loop, wireless local loop), CDMA2000-1x, IMT-2000 (International MobileTelecommunication in the year 2000, international third generation mobile) system, GSM (GlobalSystem for Mobile communication global system for mobile communications) system etc.
The terminal that is used in this mobile communication make the user when mobile by carrying out call function between radio zone.
Fig. 1 is the structured flowchart of common communication terminal.
At this, reference marks 10 is switch (Mobile Switching Center/VisitorLocation Register, MSC/VLR), the 20th, HLR (Home Location Register, attaching position register), the 30th, PSTN (Public Switched Telephone Network, the skyphone switching network), the 40th, base station (Basic Station Controller/Base station TransceiverSystem, BSC/BTS), the 50th, and communication terminal (Mobile Station, MS).
MSC10 carries out function of exchange, plays the effect of all communication lines and crossroad.
HLR20 preserves entrant's database of information, and VLR is for prevent that frequent access HLR20 from preserving the device of important entrant's information temporarily.
PSTN30 refers to all of the employed telephone network of general family.
When the telephone set that uses general family when mobile communication entrant's communication terminal 50 is called, at first home telephone machine signal utilizes telephone number to be input to mobile communication thing dealer's switch 10 after being connected to PSTN30.
Mobile communication thing dealer's switch 10 sends it to relevant base station 40 afterwards to HLR20 inquiry entrant's validity and entrant's position, thereby calls out communication terminal 50.
The position of BSC and VLR is different according to the manufacturing company of device on system aspects.For example, BSC can be present in the locus as MSC, also can be in the base station 40 be BTS.The base station 40 of Fig. 1 refers to the blanket of BSC and BTS.
But, on this mobile communcations system the number of the communication terminal 50 of prior art stolen and when transmitting word message the stolen user of number can't know that it usurps the fact.
Promptly, on the mobile communcations system, when usurping the herd number that is not the respective service entrant is that other people communication terminal number carries out (the Short Message Service as SMS, Short Message Service), LMS (LongMessage Service, the long article messenger service), MMS information communications such as (Multimedia Messaging Service, Multimedia Message services).At this moment, the stolen user of number can't know that it usurps the fact.
Summary of the invention
For solving above-mentioned the problems of the prior art, the number that the invention provides communication terminal is usurped confirmation method, on mobile communcations system, when usurping the herd number that is not the respective service entrant is other people communication terminal number when carrying out SMS communication, confirms that phone usurps thereby the number stealing information is sent to stolen communication terminal.The number of communication terminal of the present invention is usurped confirmation method, to showing the image of transmission types on the stolen user's of communication terminal (mobile phone) telephone number the communication terminal, thereby can in time confirm to usurp the fact and have the effect that to tackle.
For achieving the above object, the communication terminal number is usurped confirmation method according to an embodiment of the invention, its technical pattern is characterised in that: comprise four-stage, promptly, the 1st stage, if sending side terminal is usurped other people communication terminal number and transmitted note, switch will detect transmission types information, and it comprises transmission place of transmit leg telephone number, short message content, recipient's information and note; In the 2nd stage, after above-mentioned the 1st stage, judge whether the telephone number of the telephone number of transmit leg communication terminal and transmission types information is consistent; The 3rd stage if the telephone number of the telephone number of transmit leg communication terminal and transmission types information is inconsistent, will send note to recipient's communication terminal, and stealing information is sent to stolen telephone number in the transmission types information; In the 4th stage,, will send note to recipient's communication terminal if the telephone number of transmit leg communication terminal is consistent with the telephone number of transmission types information.
Description of drawings
Fig. 1 is the structured flowchart of common communication terminal;
Fig. 2 is that the number of communication terminal of the present invention is usurped the confirmation method flow chart;
Fig. 3 be Fig. 2 transmission types information for example;
Fig. 4 is the concept map that the transmission types information of Fig. 2 is embodied communication terminal.
Wherein, Reference numeral:
10: switch 20:HLR
30:PSTN 40: the base station
50: communication terminal
Embodiment
Usurp the embodiment of confirmation method technological thought below in conjunction with the number of accompanying drawing detailed description communication terminal according to the present invention.
Fig. 2 is that the number of communication terminal of the present invention is usurped the confirmation method flow chart.
As shown in the figure, comprise four-stage, the 1st stage, if sending side terminal 50 is usurped other people communication terminal 50 numbers and is transmitted note (ST10), switch 10 will detect transmission types information (ST20), and it comprises transmission place of transmit leg telephone number, short message content, recipient's information and note; In the 2nd stage, after above-mentioned the 1st stage, whether the telephone number of judging the telephone number of transmit leg communication terminal 50 and transmission types information consistent (ST30); The 3rd stage, if the telephone number of the telephone number of transmit leg communication terminal 50 and transmission types information is inconsistent, will send notes to recipient's communication terminal 50, and stealing information is sent to stolen telephone number (ST40) in the transmission types information; In the 4th stage,, will send note (ST50) to recipient's communication terminal 50 if the telephone number of transmit leg communication terminal 50 is consistent with the telephone number of transmission types information.
The feature in above-mentioned the 1st stage is to utilize SMS to transmit when transmitting note.
The feature in above-mentioned the 1st stage is to utilize LMS to transmit when transmitting note.
The feature in above-mentioned the 1st stage is to utilize MMS to transmit when transmitting note.
The feature in above-mentioned the 3rd stage is: when transmitting stealing information, stealing information comprises transmission types information, and transmission types information has the source of transmit leg telephone number, short message content, recipient's information and the note of usurping communication terminal 50 telephone numbers.
The feature in above-mentioned the 3rd stage is: when transmitting stealing information, if transmission types communication terminal or smart mobile phone will send the transmission types information that radio telephones such as communicating terminal or smart mobile phone are usurped number that is moved to the stolen communication terminal 50 of telephone number.
The feature in above-mentioned the 3rd stage is: when transmitting stealing information, if the website that transmission types provides literal to transmit service will send the transmission types information that number is usurped in the website that is provided literal transmission service to the stolen communication terminal 50 of telephone number.
The feature in above-mentioned the 3rd stage is: when transmitting stealing information, if telephones such as transmission types plain old telephone will send the transmission types information that telephone such as plain old telephones be usurped number to the stolen communication terminal 50 of telephone number.
Describe the action that the number of communication terminal of the present invention is usurped confirmation method in detail below in conjunction with accompanying drawing.
At first the present invention is on mobile communcations system, is other people communication terminal number when carrying out SMS communication when usurping the herd number that is not the respective service entrant, confirms that number usurps.
In the 1st stage, communication terminal 50 numbers that transmit leg communication terminal 50 is usurped other people transmit note (ST10).
Switch 10 will detect the transmission types information (ST20) of transmission place that shows transmit leg telephone number, short message content, recipient's information and note so.
At this moment, the transmission of note can utilize SMS or LMS or MMS.
At this, SMS (Short Message Service, Short Message Service) is the service that maximum 160 words can be sent to the portable phone that uses GSM (Global System for Mobile communication) communication.Originally GSM and SMS service can only be used in Europe.SMS is similar to the wireless calling service.But, SMS messaging the shutdown or even on the region that can not converse, be in till the talking state but also it is saved in its phone.In same area or the user who enjoys roaming service all can send SMS messaging to anyone.Note can send to portable phone from the website, or from transmitting (Phone ToPhone) between the phone.
And LMS (Long Message Service, long article messenger service) is the service that sends than the long article word, generally can send the long article of Korean 1,024 word or English 2,048 words.
MMS (Multimedia Messaging Service, the Multimedia Message service) tissue in the asynchronous IMT-2000 service standard item of definition is that 3GPP (3rd Generation Partnership Project) has fixed leading standard, for embodying this standard, a lot of cause groups are all in its service of development.MMS compares with the SMS that exists with ... short essay (Short Text) (Short Message Service), and it can transmit multi-medium datas such as still picture (Still Image), audio frequency, moving image, animation.Recently, have after color LCD (Liquid Crystal Display, LCD) the terminal listing of camera, to this entrant's service request also in continuous increase.
At the 2nd stage (ST30), after the 1st stage, judge whether the telephone number of the telephone number of transmit leg communication terminal 50 and transmission types information is consistent.
And, at the 3rd stage (ST40), if the telephone number of the telephone number of transmit leg communication terminal 50 and transmission types information is inconsistent, will sends notes to recipient's communication terminal 50, and stealing information is sent to stolen telephone number in the transmission types information.
At this moment, stealing information comprises the transmission types information that shows transmit leg telephone number, short message content, recipient's information and note transmission place of usurping communication terminal 50 telephone numbers.
And, if transmission types is radio telephones such as communication terminal or smart mobile phone, will send from the stolen transmission types information of radio telephones such as communication terminal or smart mobile phone to the stolen communication terminal 50 of telephone number.
If the website of transmission types for providing literal to transmit service will send from providing literal to transmit the stolen transmission types information in website of service to the stolen communication terminal 50 of telephone number.
If transmission types is telephones such as plain old telephone, will send from the stolen transmission types information of telephones such as plain old telephone to the stolen communication terminal 50 of telephone number.
If the telephone number of transmit leg communication terminal 50 is consistent with the telephone number of transmission types information, just explanation does not have normally to have sent under the stolen state SMS or LMS or MMS information at telephone number, therefore to recipient's communication terminal 50 normal transmission information (ST50).
Fig. 3 be Fig. 2 transmission types information for example.
At this, transmission types is radio telephones such as communication terminal or smart mobile phone, and just explanation sends with the number different with registered communication terminal (mobile phone) number of serving the entrant.For example, can represent with M (Mobile communication station) type circle.
And, the website of transmission types for providing literal to transmit service, just explanation sends with the number different with website entrant's registered communication terminal (mobile phone) number.For example, can represent with I (Internet) type circle.
In addition, transmission types is telephones such as plain old telephone, and just explanation sends with the number different with registered wired number of wired entrant.For example, can represent with T (Telephone) type circle.
Fig. 4 is the concept map that the transmission types information of Fig. 2 is embodied communication terminal.
If show the M type circle of particular color (for example be redness), the user will know the telephone number of having usurped oneself from radio telephones such as communication terminal or smart mobile phones on stolen user's communication terminal 50.
And if show the I type circle of particular color (for example being red), the user will know from providing the literal website that transmission is served to usurp the telephone number of oneself on stolen user's communication terminal 50.
In addition, if show the T type circle of particular color (for example be redness), the user will know the telephone number of having usurped oneself from telephones such as plain old telephones on stolen user's communication terminal 50.
Like this, the present invention is other people a communication terminal number when carrying out SMS communication when usurping the herd number that is not the respective service entrant on mobile communcations system, confirms that phone usurps thereby the number stealing information is sent to stolen communication terminal.
As mentioned above, the number of communication terminal of the present invention is usurped confirmation method, to showing the image of transmission types on the stolen user's of communication terminal (mobile phone) telephone number the communication terminal, thereby can in time confirm to usurp the fact and have the effect that to tackle.
And the radio mobile communication service of the present invention because of confirming to usurp the fact, can use to have more reliability.
In addition, the present invention also can prevent to usurp the criminal offence that telephone number caused of communication terminal.
Embodiments of the present invention more than have been described, but the present invention can use multiple variation and change and equipollent.Clear and definite in the present invention is above-mentioned execution mode suitably to be out of shape also to use with same method.Therefore, above-mentioned record content does not limit the fixed scope of the present invention with the boundary of claim scope.

Claims (8)

1, the number of communication terminal is usurped confirmation method, it is characterized in that comprising:
The 1st stage, if usurping other people communication terminal number, sending side terminal transmits note, and switch will detect transmission types information, and it comprises transmission place of transmit leg telephone number, short message content, recipient's information and note;
In the 2nd stage, after described the 1st stage, judge whether the telephone number of the telephone number of transmit leg communication terminal and transmission types information is consistent;
The 3rd stage if the telephone number of the telephone number of transmit leg communication terminal and transmission types information is inconsistent, will send note to recipient's communication terminal, and stealing information is sent to stolen telephone number in the transmission types information;
In the 4th stage,, will send note to recipient's communication terminal if the telephone number of transmit leg communication terminal is consistent with the telephone number of transmission types information.
2, the number of communication terminal according to claim 1 is usurped confirmation method, it is characterized in that:
Described the 1st stage utilizes Short Message Service to transmit when transmitting note.
3, the number of communication terminal according to claim 1 is usurped confirmation method, it is characterized in that:
Described the 1st stage utilizes the long article messenger service to transmit when transmitting note.
4, the number of communication terminal according to claim 1 is usurped confirmation method, it is characterized in that:
Described the 1st stage utilizes the Multimedia Message service to transmit when transmitting note.
5, usurp confirmation method according to the number of any one described communication terminal in the claim 1 to 4, it is characterized in that:
In described the 3rd stage, when transmitting stealing information, stealing information comprises transmission types information, and transmission types information shows the source of transmit leg telephone number, short message content, recipient's information and the note of usurping the communication terminal telephone number.
6, the number of communication terminal according to claim 5 is usurped confirmation method, it is characterized in that:
In described the 3rd stage, when transmitting stealing information, if transmission types communication terminal or smart mobile phone will send from the stolen transmission types information of radio telephones such as communication terminal or smart mobile phone to the stolen communication terminal of telephone number.
7, the number of communication terminal according to claim 5 is usurped confirmation method, it is characterized in that:
In described the 3rd stage, when transmitting stealing information, if the website that transmission types provides literal to transmit service will send from providing literal to transmit the stolen transmission types information in website of service to the stolen communication terminal of telephone number.
8, the number of communication terminal according to claim 5 is usurped confirmation method, it is characterized in that:
In described the 3rd stage, when transmitting stealing information, if telephones such as transmission types plain old telephone will send from the stolen transmission types information of telephones such as plain old telephone to the stolen communication terminal of telephone number.
CN 200510105650 2004-12-28 2005-09-29 Telephone number misappropriated confirmation method of mobile communication terminal Pending CN1798199A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR20040113771A KR100617548B1 (en) 2004-12-28 2004-12-28 Confirmation method for stealing of calling line identification in mobile communication station
KR1020040113771 2004-12-28

Publications (1)

Publication Number Publication Date
CN1798199A true CN1798199A (en) 2006-07-05

Family

ID=36818947

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510105650 Pending CN1798199A (en) 2004-12-28 2005-09-29 Telephone number misappropriated confirmation method of mobile communication terminal

Country Status (2)

Country Link
KR (1) KR100617548B1 (en)
CN (1) CN1798199A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453799A (en) * 2016-10-25 2017-02-22 北京动石科技有限公司 False communication identifying method and system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101167059B1 (en) * 2006-05-04 2012-07-27 에스케이 텔레콤주식회사 Method for providing short message service in mobile communication network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453799A (en) * 2016-10-25 2017-02-22 北京动石科技有限公司 False communication identifying method and system
CN106453799B (en) * 2016-10-25 2019-06-04 郭铮铮 Manipulative communications deception recognition methods and system

Also Published As

Publication number Publication date
KR20060075183A (en) 2006-07-04
KR100617548B1 (en) 2006-09-01

Similar Documents

Publication Publication Date Title
CN1199507C (en) Portable communication terminal and communication service system
CN1483295A (en) Method and device for handling telephone calls directed to non-reachable mobile phones
CN1395807A (en) Message handover for networked beacons
CN1385049A (en) Communications system providing call type indication for group calls
CN1555661A (en) Method and apparatus for a hybrid mobile terminal
CN1791238A (en) System and method for sending short text messages in mobile communication systems
CN1750569A (en) Method for telecasting video frequency color ring
EP1499153A3 (en) Method for indirectly establishing a call between a mobile station and a public service answering point
CN1801971A (en) System and method for changing a talk group of a mobile communication terminal
CN1109454C (en) Method for indicating that a text message it available in a central messaging module of a mobile radiotelephone network
CN1753439A (en) Method of transmitting called terminal state information to calling user
CN1359601A (en) System and method for automatically answering incoming emergency calls to a wireless phone
CN101056423A (en) A SMS transfer implementation method
US20030134617A1 (en) Switching to voice mail in the event of a dropped call
WO2007008297A3 (en) Method and apparatus for operating a call service in a cellular communication system
CN1798199A (en) Telephone number misappropriated confirmation method of mobile communication terminal
CN1494349A (en) Method of realizing user calling signalling tracking in mobile communication system
CN1162035C (en) Method for positioning handset and providing emergency service and positioning service system
CN1250021C (en) Method for reporting unsuccessful calling-in connection in mobile network
CN1791142A (en) Calling party information display method of communication terminal
CN1406077A (en) Method for realizing mobile network of one number to multiple sets based on expanded compensation business
CN1859455A (en) Main call number matching method
CN1798200A (en) Pursuant method of misappropriated signalling number for mobile communication terminal
CN1299489C (en) Apparatus, and associated method, for effectuating data service designated by service delivery mode
CN1791266A (en) Urgent calling method capable of rapid positioning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication