CN1798199A - Telephone number misappropriated confirmation method of mobile communication terminal - Google Patents
Telephone number misappropriated confirmation method of mobile communication terminal Download PDFInfo
- Publication number
- CN1798199A CN1798199A CN 200510105650 CN200510105650A CN1798199A CN 1798199 A CN1798199 A CN 1798199A CN 200510105650 CN200510105650 CN 200510105650 CN 200510105650 A CN200510105650 A CN 200510105650A CN 1798199 A CN1798199 A CN 1798199A
- Authority
- CN
- China
- Prior art keywords
- communication terminal
- information
- telephone number
- transmission types
- stage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a telephone number misappropriated confirmation method of mobile communication terminal, comprising: the first phase, if the transmitter terminal misappropriates other mobile communication terminal number to transmit short message, the exchange will check out the transmission type information, including transmitter phone number, short message content, receiver information and transmission position of the short message; the second phase, judging whether the phone number of the transmitter mobile communication terminal and phone number of the transmission type information are consistent; the third phase, if not consistent, transmitting the short message to the receiver mobile communication terminal and transmitting the misappropriated information to the misappropriated phone number in the transmission type information; the fourth phase, if consistent, transmitting the short message to the receiver mobile communication terminal.
Description
Technical field
The number that the present invention relates to communication terminal is usurped confirmation method, on mobile communcations system, when usurping the herd number that is not the respective service entrant is other people communication terminal number when carrying out SMS communication, sends to stolen communication terminal and confirms that phone usurps thereby will usurp number information.
Background technology
Communication terminal is to be the communication system of object with moving bodys such as people, automobile, boats and ships, train, aircrafts, comprises key telephone system, mobile phone (mobile phone, car telephone), bay phone, airplane telephone, mobile skyphone (being arranged on train, pleasure boat, the expressway bus), wireless calling, radio telephone, satellite mobile communication, ham radio here, fishery is wireless etc.
This mobile communcations system has: AMPS (the Advanced Mobile PhoneService) system that uses analog form, use CDMA (the Code Division Multiple Access of digital form, code division multiple access) system, WCDMA (Wideband Code Division Multiple Access bandwidth code division multiple access), TDMA (Time Division Multiple Access, time division multiple access) system, FDMA (FrequencyDivision Multiple Access, frequency division multiple access) system, WLL (Wireless Local Loop, wireless local loop), CDMA2000-1x, IMT-2000 (International MobileTelecommunication in the year 2000, international third generation mobile) system, GSM (GlobalSystem for Mobile communication global system for mobile communications) system etc.
The terminal that is used in this mobile communication make the user when mobile by carrying out call function between radio zone.
Fig. 1 is the structured flowchart of common communication terminal.
At this, reference marks 10 is switch (Mobile Switching Center/VisitorLocation Register, MSC/VLR), the 20th, HLR (Home Location Register, attaching position register), the 30th, PSTN (Public Switched Telephone Network, the skyphone switching network), the 40th, base station (Basic Station Controller/Base station TransceiverSystem, BSC/BTS), the 50th, and communication terminal (Mobile Station, MS).
MSC10 carries out function of exchange, plays the effect of all communication lines and crossroad.
HLR20 preserves entrant's database of information, and VLR is for prevent that frequent access HLR20 from preserving the device of important entrant's information temporarily.
PSTN30 refers to all of the employed telephone network of general family.
When the telephone set that uses general family when mobile communication entrant's communication terminal 50 is called, at first home telephone machine signal utilizes telephone number to be input to mobile communication thing dealer's switch 10 after being connected to PSTN30.
Mobile communication thing dealer's switch 10 sends it to relevant base station 40 afterwards to HLR20 inquiry entrant's validity and entrant's position, thereby calls out communication terminal 50.
The position of BSC and VLR is different according to the manufacturing company of device on system aspects.For example, BSC can be present in the locus as MSC, also can be in the base station 40 be BTS.The base station 40 of Fig. 1 refers to the blanket of BSC and BTS.
But, on this mobile communcations system the number of the communication terminal 50 of prior art stolen and when transmitting word message the stolen user of number can't know that it usurps the fact.
Promptly, on the mobile communcations system, when usurping the herd number that is not the respective service entrant is that other people communication terminal number carries out (the Short Message Service as SMS, Short Message Service), LMS (LongMessage Service, the long article messenger service), MMS information communications such as (Multimedia Messaging Service, Multimedia Message services).At this moment, the stolen user of number can't know that it usurps the fact.
Summary of the invention
For solving above-mentioned the problems of the prior art, the number that the invention provides communication terminal is usurped confirmation method, on mobile communcations system, when usurping the herd number that is not the respective service entrant is other people communication terminal number when carrying out SMS communication, confirms that phone usurps thereby the number stealing information is sent to stolen communication terminal.The number of communication terminal of the present invention is usurped confirmation method, to showing the image of transmission types on the stolen user's of communication terminal (mobile phone) telephone number the communication terminal, thereby can in time confirm to usurp the fact and have the effect that to tackle.
For achieving the above object, the communication terminal number is usurped confirmation method according to an embodiment of the invention, its technical pattern is characterised in that: comprise four-stage, promptly, the 1st stage, if sending side terminal is usurped other people communication terminal number and transmitted note, switch will detect transmission types information, and it comprises transmission place of transmit leg telephone number, short message content, recipient's information and note; In the 2nd stage, after above-mentioned the 1st stage, judge whether the telephone number of the telephone number of transmit leg communication terminal and transmission types information is consistent; The 3rd stage if the telephone number of the telephone number of transmit leg communication terminal and transmission types information is inconsistent, will send note to recipient's communication terminal, and stealing information is sent to stolen telephone number in the transmission types information; In the 4th stage,, will send note to recipient's communication terminal if the telephone number of transmit leg communication terminal is consistent with the telephone number of transmission types information.
Description of drawings
Fig. 1 is the structured flowchart of common communication terminal;
Fig. 2 is that the number of communication terminal of the present invention is usurped the confirmation method flow chart;
Fig. 3 be Fig. 2 transmission types information for example;
Fig. 4 is the concept map that the transmission types information of Fig. 2 is embodied communication terminal.
Wherein, Reference numeral:
10: switch 20:HLR
30:PSTN 40: the base station
50: communication terminal
Embodiment
Usurp the embodiment of confirmation method technological thought below in conjunction with the number of accompanying drawing detailed description communication terminal according to the present invention.
Fig. 2 is that the number of communication terminal of the present invention is usurped the confirmation method flow chart.
As shown in the figure, comprise four-stage, the 1st stage, if sending side terminal 50 is usurped other people communication terminal 50 numbers and is transmitted note (ST10), switch 10 will detect transmission types information (ST20), and it comprises transmission place of transmit leg telephone number, short message content, recipient's information and note; In the 2nd stage, after above-mentioned the 1st stage, whether the telephone number of judging the telephone number of transmit leg communication terminal 50 and transmission types information consistent (ST30); The 3rd stage, if the telephone number of the telephone number of transmit leg communication terminal 50 and transmission types information is inconsistent, will send notes to recipient's communication terminal 50, and stealing information is sent to stolen telephone number (ST40) in the transmission types information; In the 4th stage,, will send note (ST50) to recipient's communication terminal 50 if the telephone number of transmit leg communication terminal 50 is consistent with the telephone number of transmission types information.
The feature in above-mentioned the 1st stage is to utilize SMS to transmit when transmitting note.
The feature in above-mentioned the 1st stage is to utilize LMS to transmit when transmitting note.
The feature in above-mentioned the 1st stage is to utilize MMS to transmit when transmitting note.
The feature in above-mentioned the 3rd stage is: when transmitting stealing information, stealing information comprises transmission types information, and transmission types information has the source of transmit leg telephone number, short message content, recipient's information and the note of usurping communication terminal 50 telephone numbers.
The feature in above-mentioned the 3rd stage is: when transmitting stealing information, if transmission types communication terminal or smart mobile phone will send the transmission types information that radio telephones such as communicating terminal or smart mobile phone are usurped number that is moved to the stolen communication terminal 50 of telephone number.
The feature in above-mentioned the 3rd stage is: when transmitting stealing information, if the website that transmission types provides literal to transmit service will send the transmission types information that number is usurped in the website that is provided literal transmission service to the stolen communication terminal 50 of telephone number.
The feature in above-mentioned the 3rd stage is: when transmitting stealing information, if telephones such as transmission types plain old telephone will send the transmission types information that telephone such as plain old telephones be usurped number to the stolen communication terminal 50 of telephone number.
Describe the action that the number of communication terminal of the present invention is usurped confirmation method in detail below in conjunction with accompanying drawing.
At first the present invention is on mobile communcations system, is other people communication terminal number when carrying out SMS communication when usurping the herd number that is not the respective service entrant, confirms that number usurps.
In the 1st stage, communication terminal 50 numbers that transmit leg communication terminal 50 is usurped other people transmit note (ST10).
At this moment, the transmission of note can utilize SMS or LMS or MMS.
At this, SMS (Short Message Service, Short Message Service) is the service that maximum 160 words can be sent to the portable phone that uses GSM (Global System for Mobile communication) communication.Originally GSM and SMS service can only be used in Europe.SMS is similar to the wireless calling service.But, SMS messaging the shutdown or even on the region that can not converse, be in till the talking state but also it is saved in its phone.In same area or the user who enjoys roaming service all can send SMS messaging to anyone.Note can send to portable phone from the website, or from transmitting (Phone ToPhone) between the phone.
And LMS (Long Message Service, long article messenger service) is the service that sends than the long article word, generally can send the long article of Korean 1,024 word or English 2,048 words.
MMS (Multimedia Messaging Service, the Multimedia Message service) tissue in the asynchronous IMT-2000 service standard item of definition is that 3GPP (3rd Generation Partnership Project) has fixed leading standard, for embodying this standard, a lot of cause groups are all in its service of development.MMS compares with the SMS that exists with ... short essay (Short Text) (Short Message Service), and it can transmit multi-medium datas such as still picture (Still Image), audio frequency, moving image, animation.Recently, have after color LCD (Liquid Crystal Display, LCD) the terminal listing of camera, to this entrant's service request also in continuous increase.
At the 2nd stage (ST30), after the 1st stage, judge whether the telephone number of the telephone number of transmit leg communication terminal 50 and transmission types information is consistent.
And, at the 3rd stage (ST40), if the telephone number of the telephone number of transmit leg communication terminal 50 and transmission types information is inconsistent, will sends notes to recipient's communication terminal 50, and stealing information is sent to stolen telephone number in the transmission types information.
At this moment, stealing information comprises the transmission types information that shows transmit leg telephone number, short message content, recipient's information and note transmission place of usurping communication terminal 50 telephone numbers.
And, if transmission types is radio telephones such as communication terminal or smart mobile phone, will send from the stolen transmission types information of radio telephones such as communication terminal or smart mobile phone to the stolen communication terminal 50 of telephone number.
If the website of transmission types for providing literal to transmit service will send from providing literal to transmit the stolen transmission types information in website of service to the stolen communication terminal 50 of telephone number.
If transmission types is telephones such as plain old telephone, will send from the stolen transmission types information of telephones such as plain old telephone to the stolen communication terminal 50 of telephone number.
If the telephone number of transmit leg communication terminal 50 is consistent with the telephone number of transmission types information, just explanation does not have normally to have sent under the stolen state SMS or LMS or MMS information at telephone number, therefore to recipient's communication terminal 50 normal transmission information (ST50).
Fig. 3 be Fig. 2 transmission types information for example.
At this, transmission types is radio telephones such as communication terminal or smart mobile phone, and just explanation sends with the number different with registered communication terminal (mobile phone) number of serving the entrant.For example, can represent with M (Mobile communication station) type circle.
And, the website of transmission types for providing literal to transmit service, just explanation sends with the number different with website entrant's registered communication terminal (mobile phone) number.For example, can represent with I (Internet) type circle.
In addition, transmission types is telephones such as plain old telephone, and just explanation sends with the number different with registered wired number of wired entrant.For example, can represent with T (Telephone) type circle.
Fig. 4 is the concept map that the transmission types information of Fig. 2 is embodied communication terminal.
If show the M type circle of particular color (for example be redness), the user will know the telephone number of having usurped oneself from radio telephones such as communication terminal or smart mobile phones on stolen user's communication terminal 50.
And if show the I type circle of particular color (for example being red), the user will know from providing the literal website that transmission is served to usurp the telephone number of oneself on stolen user's communication terminal 50.
In addition, if show the T type circle of particular color (for example be redness), the user will know the telephone number of having usurped oneself from telephones such as plain old telephones on stolen user's communication terminal 50.
Like this, the present invention is other people a communication terminal number when carrying out SMS communication when usurping the herd number that is not the respective service entrant on mobile communcations system, confirms that phone usurps thereby the number stealing information is sent to stolen communication terminal.
As mentioned above, the number of communication terminal of the present invention is usurped confirmation method, to showing the image of transmission types on the stolen user's of communication terminal (mobile phone) telephone number the communication terminal, thereby can in time confirm to usurp the fact and have the effect that to tackle.
And the radio mobile communication service of the present invention because of confirming to usurp the fact, can use to have more reliability.
In addition, the present invention also can prevent to usurp the criminal offence that telephone number caused of communication terminal.
Embodiments of the present invention more than have been described, but the present invention can use multiple variation and change and equipollent.Clear and definite in the present invention is above-mentioned execution mode suitably to be out of shape also to use with same method.Therefore, above-mentioned record content does not limit the fixed scope of the present invention with the boundary of claim scope.
Claims (8)
1, the number of communication terminal is usurped confirmation method, it is characterized in that comprising:
The 1st stage, if usurping other people communication terminal number, sending side terminal transmits note, and switch will detect transmission types information, and it comprises transmission place of transmit leg telephone number, short message content, recipient's information and note;
In the 2nd stage, after described the 1st stage, judge whether the telephone number of the telephone number of transmit leg communication terminal and transmission types information is consistent;
The 3rd stage if the telephone number of the telephone number of transmit leg communication terminal and transmission types information is inconsistent, will send note to recipient's communication terminal, and stealing information is sent to stolen telephone number in the transmission types information;
In the 4th stage,, will send note to recipient's communication terminal if the telephone number of transmit leg communication terminal is consistent with the telephone number of transmission types information.
2, the number of communication terminal according to claim 1 is usurped confirmation method, it is characterized in that:
Described the 1st stage utilizes Short Message Service to transmit when transmitting note.
3, the number of communication terminal according to claim 1 is usurped confirmation method, it is characterized in that:
Described the 1st stage utilizes the long article messenger service to transmit when transmitting note.
4, the number of communication terminal according to claim 1 is usurped confirmation method, it is characterized in that:
Described the 1st stage utilizes the Multimedia Message service to transmit when transmitting note.
5, usurp confirmation method according to the number of any one described communication terminal in the claim 1 to 4, it is characterized in that:
In described the 3rd stage, when transmitting stealing information, stealing information comprises transmission types information, and transmission types information shows the source of transmit leg telephone number, short message content, recipient's information and the note of usurping the communication terminal telephone number.
6, the number of communication terminal according to claim 5 is usurped confirmation method, it is characterized in that:
In described the 3rd stage, when transmitting stealing information, if transmission types communication terminal or smart mobile phone will send from the stolen transmission types information of radio telephones such as communication terminal or smart mobile phone to the stolen communication terminal of telephone number.
7, the number of communication terminal according to claim 5 is usurped confirmation method, it is characterized in that:
In described the 3rd stage, when transmitting stealing information, if the website that transmission types provides literal to transmit service will send from providing literal to transmit the stolen transmission types information in website of service to the stolen communication terminal of telephone number.
8, the number of communication terminal according to claim 5 is usurped confirmation method, it is characterized in that:
In described the 3rd stage, when transmitting stealing information, if telephones such as transmission types plain old telephone will send from the stolen transmission types information of telephones such as plain old telephone to the stolen communication terminal of telephone number.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20040113771A KR100617548B1 (en) | 2004-12-28 | 2004-12-28 | Confirmation method for stealing of calling line identification in mobile communication station |
KR1020040113771 | 2004-12-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1798199A true CN1798199A (en) | 2006-07-05 |
Family
ID=36818947
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200510105650 Pending CN1798199A (en) | 2004-12-28 | 2005-09-29 | Telephone number misappropriated confirmation method of mobile communication terminal |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR100617548B1 (en) |
CN (1) | CN1798199A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453799A (en) * | 2016-10-25 | 2017-02-22 | 北京动石科技有限公司 | False communication identifying method and system |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101167059B1 (en) * | 2006-05-04 | 2012-07-27 | 에스케이 텔레콤주식회사 | Method for providing short message service in mobile communication network |
-
2004
- 2004-12-28 KR KR20040113771A patent/KR100617548B1/en not_active IP Right Cessation
-
2005
- 2005-09-29 CN CN 200510105650 patent/CN1798199A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453799A (en) * | 2016-10-25 | 2017-02-22 | 北京动石科技有限公司 | False communication identifying method and system |
CN106453799B (en) * | 2016-10-25 | 2019-06-04 | 郭铮铮 | Manipulative communications deception recognition methods and system |
Also Published As
Publication number | Publication date |
---|---|
KR20060075183A (en) | 2006-07-04 |
KR100617548B1 (en) | 2006-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1199507C (en) | Portable communication terminal and communication service system | |
CN1483295A (en) | Method and device for handling telephone calls directed to non-reachable mobile phones | |
CN1395807A (en) | Message handover for networked beacons | |
CN1385049A (en) | Communications system providing call type indication for group calls | |
CN1555661A (en) | Method and apparatus for a hybrid mobile terminal | |
CN1791238A (en) | System and method for sending short text messages in mobile communication systems | |
CN1750569A (en) | Method for telecasting video frequency color ring | |
EP1499153A3 (en) | Method for indirectly establishing a call between a mobile station and a public service answering point | |
CN1801971A (en) | System and method for changing a talk group of a mobile communication terminal | |
CN1109454C (en) | Method for indicating that a text message it available in a central messaging module of a mobile radiotelephone network | |
CN1753439A (en) | Method of transmitting called terminal state information to calling user | |
CN1359601A (en) | System and method for automatically answering incoming emergency calls to a wireless phone | |
CN101056423A (en) | A SMS transfer implementation method | |
US20030134617A1 (en) | Switching to voice mail in the event of a dropped call | |
WO2007008297A3 (en) | Method and apparatus for operating a call service in a cellular communication system | |
CN1798199A (en) | Telephone number misappropriated confirmation method of mobile communication terminal | |
CN1494349A (en) | Method of realizing user calling signalling tracking in mobile communication system | |
CN1162035C (en) | Method for positioning handset and providing emergency service and positioning service system | |
CN1250021C (en) | Method for reporting unsuccessful calling-in connection in mobile network | |
CN1791142A (en) | Calling party information display method of communication terminal | |
CN1406077A (en) | Method for realizing mobile network of one number to multiple sets based on expanded compensation business | |
CN1859455A (en) | Main call number matching method | |
CN1798200A (en) | Pursuant method of misappropriated signalling number for mobile communication terminal | |
CN1299489C (en) | Apparatus, and associated method, for effectuating data service designated by service delivery mode | |
CN1791266A (en) | Urgent calling method capable of rapid positioning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |