CN1829386A - Wireless mobile apparatus and user identity binding system - Google Patents
Wireless mobile apparatus and user identity binding system Download PDFInfo
- Publication number
- CN1829386A CN1829386A CNA2006100382853A CN200610038285A CN1829386A CN 1829386 A CN1829386 A CN 1829386A CN A2006100382853 A CNA2006100382853 A CN A2006100382853A CN 200610038285 A CN200610038285 A CN 200610038285A CN 1829386 A CN1829386 A CN 1829386A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- imei
- imsi
- user
- binding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to wireless mobile equipment and user identity binding system. It contains binding mobile equipment IMEI number IMSI number in mobile communication mobile communication system, to obtain in handset lose someone else unavailable, but also very easy finding out loser through IMSI binding with IMEI.
Description
Technical field
This use patent relates to field of wireless communication.
Background technology
Mobile communication is universal day by day, has had the crowd of considerable scale to use with mobile phone to the wireless mobile apparatus of representative as communication tool in China.A unique sign IMEI is arranged in each mobile phone.
IMSI is stored in the SIM card as unique mobile user identification.
Summary of the invention
The purpose of this invention is to provide a kind of novel solution at the mobile phone theft.
At first the multiple incident that become is stolen and plundered to hand-set from stolen.Method provided by the invention is can't use after hand-set from stolen is stolen.Effectively suppress the circulation of black phone on market simultaneously.
Effectively utilize IMEI and IMSI binding, IMEI is tested.Owing to the channel more complicated that mobile phone obtains, can use the mode of auxiliary activities, apply for this service voluntarily by the user.
A kind of by being the method for wireless mobile apparatus (following directly with mobile phone substitute) with the identity binding of representative with the mobile phone according to the present invention proposes to mobile communication system.
Below in conjunction with the drawings; preferred implementation of the present invention is described; should be appreciated that; here the preferred implementation of Miao Shuing not is restrictive explanation; those skilled in the art can be according to principle of the present invention, the present invention is made various modifications, improvement and can not break away from the protection range that claim limits of enclosing.Said method comprising the steps of:
User applies handset identities binding service.This can be directly open-minded when opening an account, and it is open-minded perhaps to add auxiliary activities, and system sends non-access layer information IDENTITYREQUEST to mobile phone and obtains IMSI binding in IMEI and the SIM card.IMEI is a sequence number unique in the mobile phone, and IMSI then is kept in the SIM card to come user in the net is identified as international mobile subscriber identification code.Mobile phone and user binding that the purpose of binding IMEI and IMSI just is to use the family to use.
After mobile phone access network is finished ATTACH, send the IMEI (IMEI2) that non-access layer information IDENTITY REQUEST message request obtains mobile phone to mobile phone.
Mobile phone loopback IDENTITY RESPONSE message.Obtain the IMEI (IMEI2) in the mobile phone.
In database, search to see whether applied for the binding service by IMEI2,, then from database, obtain corresponding IMEI1 by IMSI if applied for the binding service.If IMSI does not bind IMEI, authentication failed.As bound IMEI, will obtain IMEI1 and IMEI2 contrast, if identical, then by checking, otherwise authentication failed then proves that the user does not use the wireless mobile apparatus of own appointment, by the short message notification user, afterwards mobile phone is Detach or limit service can't normally use mobile phone.If IMEI2 does not apply for the binding service, by checking yet.
Description of drawings: figure I is the system flow chart of identity binding.
Check IMEI2 status among Fig. 1 is for checking from database whether IMEI2 is bound state.If IMEI2 does not have bound, mobile phone normal service then.
Mobile phone is detach limits this IMSI access network simultaneously., also can adopt the method for limiting handset business.Before being detach, can select to notify the user.
It is who is at the mobile phone that uses others that the IMEI of the mobile phone of preservation check failure and IMSI can find.
Replenish, if mobile phone has been bound an IMSI, at this time but changed the piece SIM card when (being equivalent to change IMSI), guarantee that this situation can not use, just must check the IMEI of each access network, find that in inspection the IMEI of mobile phone has applied for the binding service, but the IMSI of mobile phone not have but, authentication failed in this time (for example the mobile phone of application service is used by others) guarantees that mobile phone can't use.
By the binding between mobile phone and the user, can allow each mobile phone use for a user, even hand-set from stolen has been stolen like this, also can't be used by others, on the source, checked the generation of mobile phone larceny.
After larceny is taken place, the user goes the telecommunication department application to nullify the IMSI of oneself, and the IMEI of original mobile phone application is simultaneously cancelled, and perhaps the IMEI with former mobile phone is bundled on the IMSI of new application, mobile phone that can be stolen like this can't access network, thereby can't use.
After if stolen mobile phone is recovered by public security department, be easy to find the owner of lost property of mobile phone according to IMEI number.Can the IMEI of lost handset be traced simultaneously, whom just can find using lost handset by the IMSI that gets in touch with it.
Technically, as long as trace IMEI and IMSI just can determine whose mobile phone who has used.
If unbind then must use perfect instrument to remove operator's place's unbind.
The burden that increases in system needs multiple NAS message to obtain IMEI for connecting as RR to set up.
PS Attach obtains IMEISV. and from IMEISV, can obtain IMEI. if also can send out IMEISV request order after finishing
Special circumstances:
Identical IMEI networks: this situation should have under normal situation anything but.If but the FLASH in the mobile phone by artificial copy other mobile phones IMEI number then this situation can appear.Can before IMEI and IMSI binding, investigate effective character of real IMEI earlier.Then two are all verified when two identical IMEI in network, occurring.
Claims (6)
1, a kind of by core Netcom in the mobile communication system being crossed the method that check IMEI makes mobile phone and user binding, said method comprising the steps of:
IMEI and the IMSI in the SIM card to mobile phone when mobile phone is registered one's residence or after the user applies bind.Reach the effect that each mobile phone can only use a SIM card.
Mobile phone is done the attach process, and this time, the IMSI in the SIM in the mobile phone can learn by this in system.
After attach finishes and RR when connecting core net mobile radio terminal is the IMEI that IDENTITY REQUEST flow process obtains mobile phone known mobile phone IMSI because mobile phone has been Attach.
The IMEI that obtains is searched in system data, find corresponding IMSI again and the IMSI that from network, obtains relatively, determine mobile phone whether usefulness be the SIM card of binding.
If the user has opened the binding service.Just the user give tacit consent to own mobile phone can only be with oneself SIM card.When finding that IMSI does not relatively meet, halt system is to the service of mobile phone.
2 require to add private database according to right 1 in system binds user's IMEI and IMSI.Can inquire corresponding IMSI according to IMEI, perhaps inquire corresponding IMEI according to IMSI.
3 require that according to right 1 each mobile radio terminal is sent out IDENTITY REQUEST message after attach obtains IMEI into network termination.
4 require the IMEI that obtains from database the IMEI that obtains from terminal with according to IMSI relatively according to right 1, see whether mate.Thereby the validity that checking binding terminal networks.
If it is 5 require checking not pass through according to right 1, professional or be detach and handle to terminal limitations.Before can short-message sending, perhaps by the voice suggestion user.
If 6 require checking not pass through according to right 1, by to IMEI in the record that does not pass through and IMSI, whom can find at the mobile phone that uses others, and the owner of original mobile phone.Conveniently help the people to give stolen mobile phone for change.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006100382853A CN1829386A (en) | 2006-02-14 | 2006-02-14 | Wireless mobile apparatus and user identity binding system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006100382853A CN1829386A (en) | 2006-02-14 | 2006-02-14 | Wireless mobile apparatus and user identity binding system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1829386A true CN1829386A (en) | 2006-09-06 |
Family
ID=36947451
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2006100382853A Pending CN1829386A (en) | 2006-02-14 | 2006-02-14 | Wireless mobile apparatus and user identity binding system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1829386A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101796858A (en) * | 2007-09-01 | 2010-08-04 | 苹果公司 | Service provider activation with subscriber identity module policy |
CN101183971B (en) * | 2007-12-12 | 2010-10-13 | 华为终端有限公司 | Method and device of managing MEID |
CN101990209A (en) * | 2009-07-30 | 2011-03-23 | 中国电信股份有限公司 | Method and system for providing clue for finding lost mobile terminal |
CN101198121B (en) * | 2007-12-28 | 2011-07-20 | 中国移动通信集团四川有限公司 | Authentication method for limiting mobile phone without using by others |
CN102469448A (en) * | 2010-11-08 | 2012-05-23 | 中兴通讯股份有限公司 | Machine type communication (MTC) access control method, system and device |
CN103124407A (en) * | 2011-11-18 | 2013-05-29 | 中国移动通信集团内蒙古有限公司 | Determination method and device for on-line mode of mobile user |
CN103188672A (en) * | 2011-12-28 | 2013-07-03 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and data protection method thereof |
CN104703180A (en) * | 2013-12-09 | 2015-06-10 | 江良洲 | Implicit multiple authentication method based on mobile Internet and intelligent terminal |
CN105515774A (en) * | 2014-10-14 | 2016-04-20 | 鸿富锦精密电子(郑州)有限公司 | Steal detection system and method |
CN110234105A (en) * | 2018-03-06 | 2019-09-13 | 中国移动通信有限公司研究院 | Detect VLR whether the method and device of authentication denial service order |
-
2006
- 2006-02-14 CN CNA2006100382853A patent/CN1829386A/en active Pending
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101796858A (en) * | 2007-09-01 | 2010-08-04 | 苹果公司 | Service provider activation with subscriber identity module policy |
CN101796858B (en) * | 2007-09-01 | 2013-09-18 | 苹果公司 | Service provider activation with subscriber identity module policy |
CN101183971B (en) * | 2007-12-12 | 2010-10-13 | 华为终端有限公司 | Method and device of managing MEID |
CN101198121B (en) * | 2007-12-28 | 2011-07-20 | 中国移动通信集团四川有限公司 | Authentication method for limiting mobile phone without using by others |
CN101990209A (en) * | 2009-07-30 | 2011-03-23 | 中国电信股份有限公司 | Method and system for providing clue for finding lost mobile terminal |
CN102469448A (en) * | 2010-11-08 | 2012-05-23 | 中兴通讯股份有限公司 | Machine type communication (MTC) access control method, system and device |
CN102469448B (en) * | 2010-11-08 | 2016-12-28 | 中兴通讯股份有限公司 | A kind of method, system and device of machine type communication Access Control |
CN103124407B (en) * | 2011-11-18 | 2016-04-27 | 中国移动通信集团内蒙古有限公司 | The defining method of mobile subscriber's network access and device |
CN103124407A (en) * | 2011-11-18 | 2013-05-29 | 中国移动通信集团内蒙古有限公司 | Determination method and device for on-line mode of mobile user |
CN103188672A (en) * | 2011-12-28 | 2013-07-03 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and data protection method thereof |
CN104703180A (en) * | 2013-12-09 | 2015-06-10 | 江良洲 | Implicit multiple authentication method based on mobile Internet and intelligent terminal |
CN105515774A (en) * | 2014-10-14 | 2016-04-20 | 鸿富锦精密电子(郑州)有限公司 | Steal detection system and method |
CN110234105A (en) * | 2018-03-06 | 2019-09-13 | 中国移动通信有限公司研究院 | Detect VLR whether the method and device of authentication denial service order |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1829386A (en) | Wireless mobile apparatus and user identity binding system | |
CN101005503B (en) | Method and data processing system for intercepting communication between a client and a service | |
CN1586054A (en) | Technique for generating correlation number for use in lawful interception of telecommunications traffic | |
CN101252703A (en) | Terminal data protecting method, system as well as mobile communication terminal | |
CN104299286A (en) | Attendance method and system for public security inspection tour | |
CN105162768A (en) | Method and device for detecting phishing Wi-Fi hotspots | |
TW201616848A (en) | Communication method of hiding privacy and system thereof | |
CN104008325A (en) | Mobile phone Wi-Fi network-connecting real name identity authentication platform and method based on two-dimension codes | |
CN103686688B (en) | The protection processing method of mobile terminal user's address list and device, mobile terminal | |
CN106130971A (en) | Identity identifying method and certificate server | |
CN102780989A (en) | Method and system for preventing loss of mobile terminal | |
CN102984335B (en) | Dial the identity identifying method of landline telephone, equipment and system | |
CN113079258A (en) | Number privacy protection method, network device and computer storage medium | |
CN107018240A (en) | A kind of call method and system of hiding called number | |
CN104994006A (en) | Back-to-back instant communication method and device based on WeChat public number | |
CN100413368C (en) | A method for verifying user card validity | |
CN104618853A (en) | Method, device and system for information push | |
CN1711785B (en) | System and method for managing access of communication network to mobile terminal | |
CN104244242A (en) | Network number allocation method and corresponding authentication method of Internet-of-things equipment | |
CN107438129A (en) | The attribute information display methods and device of telephone number | |
CN204578617U (en) | A kind of voice evidence service system | |
CN106791133A (en) | The processing method and mobile terminal of the communication information | |
CN105162600A (en) | Authentication information transmission method and device for Internet application | |
CN110035089A (en) | A kind of network security verification method and system of distributed system | |
CN113742701B (en) | System and method for opening AR/VR service, gateway device, AR/VR device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |