CN1829386A - Wireless mobile apparatus and user identity binding system - Google Patents

Wireless mobile apparatus and user identity binding system Download PDF

Info

Publication number
CN1829386A
CN1829386A CNA2006100382853A CN200610038285A CN1829386A CN 1829386 A CN1829386 A CN 1829386A CN A2006100382853 A CNA2006100382853 A CN A2006100382853A CN 200610038285 A CN200610038285 A CN 200610038285A CN 1829386 A CN1829386 A CN 1829386A
Authority
CN
China
Prior art keywords
mobile phone
imei
imsi
user
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006100382853A
Other languages
Chinese (zh)
Inventor
邵毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2006100382853A priority Critical patent/CN1829386A/en
Publication of CN1829386A publication Critical patent/CN1829386A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to wireless mobile equipment and user identity binding system. It contains binding mobile equipment IMEI number IMSI number in mobile communication mobile communication system, to obtain in handset lose someone else unavailable, but also very easy finding out loser through IMSI binding with IMEI.

Description

Wireless mobile apparatus and user identity binding system
Technical field
This use patent relates to field of wireless communication.
Background technology
Mobile communication is universal day by day, has had the crowd of considerable scale to use with mobile phone to the wireless mobile apparatus of representative as communication tool in China.A unique sign IMEI is arranged in each mobile phone.
IMSI is stored in the SIM card as unique mobile user identification.
Summary of the invention
The purpose of this invention is to provide a kind of novel solution at the mobile phone theft.
At first the multiple incident that become is stolen and plundered to hand-set from stolen.Method provided by the invention is can't use after hand-set from stolen is stolen.Effectively suppress the circulation of black phone on market simultaneously.
Effectively utilize IMEI and IMSI binding, IMEI is tested.Owing to the channel more complicated that mobile phone obtains, can use the mode of auxiliary activities, apply for this service voluntarily by the user.
A kind of by being the method for wireless mobile apparatus (following directly with mobile phone substitute) with the identity binding of representative with the mobile phone according to the present invention proposes to mobile communication system.
Below in conjunction with the drawings; preferred implementation of the present invention is described; should be appreciated that; here the preferred implementation of Miao Shuing not is restrictive explanation; those skilled in the art can be according to principle of the present invention, the present invention is made various modifications, improvement and can not break away from the protection range that claim limits of enclosing.Said method comprising the steps of:
User applies handset identities binding service.This can be directly open-minded when opening an account, and it is open-minded perhaps to add auxiliary activities, and system sends non-access layer information IDENTITYREQUEST to mobile phone and obtains IMSI binding in IMEI and the SIM card.IMEI is a sequence number unique in the mobile phone, and IMSI then is kept in the SIM card to come user in the net is identified as international mobile subscriber identification code.Mobile phone and user binding that the purpose of binding IMEI and IMSI just is to use the family to use.
After mobile phone access network is finished ATTACH, send the IMEI (IMEI2) that non-access layer information IDENTITY REQUEST message request obtains mobile phone to mobile phone.
Mobile phone loopback IDENTITY RESPONSE message.Obtain the IMEI (IMEI2) in the mobile phone.
In database, search to see whether applied for the binding service by IMEI2,, then from database, obtain corresponding IMEI1 by IMSI if applied for the binding service.If IMSI does not bind IMEI, authentication failed.As bound IMEI, will obtain IMEI1 and IMEI2 contrast, if identical, then by checking, otherwise authentication failed then proves that the user does not use the wireless mobile apparatus of own appointment, by the short message notification user, afterwards mobile phone is Detach or limit service can't normally use mobile phone.If IMEI2 does not apply for the binding service, by checking yet.
Description of drawings: figure I is the system flow chart of identity binding.
Check IMEI2 status among Fig. 1 is for checking from database whether IMEI2 is bound state.If IMEI2 does not have bound, mobile phone normal service then.
Mobile phone is detach limits this IMSI access network simultaneously., also can adopt the method for limiting handset business.Before being detach, can select to notify the user.
It is who is at the mobile phone that uses others that the IMEI of the mobile phone of preservation check failure and IMSI can find.
Replenish, if mobile phone has been bound an IMSI, at this time but changed the piece SIM card when (being equivalent to change IMSI), guarantee that this situation can not use, just must check the IMEI of each access network, find that in inspection the IMEI of mobile phone has applied for the binding service, but the IMSI of mobile phone not have but, authentication failed in this time (for example the mobile phone of application service is used by others) guarantees that mobile phone can't use.
By the binding between mobile phone and the user, can allow each mobile phone use for a user, even hand-set from stolen has been stolen like this, also can't be used by others, on the source, checked the generation of mobile phone larceny.
After larceny is taken place, the user goes the telecommunication department application to nullify the IMSI of oneself, and the IMEI of original mobile phone application is simultaneously cancelled, and perhaps the IMEI with former mobile phone is bundled on the IMSI of new application, mobile phone that can be stolen like this can't access network, thereby can't use.
After if stolen mobile phone is recovered by public security department, be easy to find the owner of lost property of mobile phone according to IMEI number.Can the IMEI of lost handset be traced simultaneously, whom just can find using lost handset by the IMSI that gets in touch with it.
Technically, as long as trace IMEI and IMSI just can determine whose mobile phone who has used.
If unbind then must use perfect instrument to remove operator's place's unbind.
The burden that increases in system needs multiple NAS message to obtain IMEI for connecting as RR to set up.
PS Attach obtains IMEISV. and from IMEISV, can obtain IMEI. if also can send out IMEISV request order after finishing
Special circumstances:
Identical IMEI networks: this situation should have under normal situation anything but.If but the FLASH in the mobile phone by artificial copy other mobile phones IMEI number then this situation can appear.Can before IMEI and IMSI binding, investigate effective character of real IMEI earlier.Then two are all verified when two identical IMEI in network, occurring.

Claims (6)

1, a kind of by core Netcom in the mobile communication system being crossed the method that check IMEI makes mobile phone and user binding, said method comprising the steps of:
IMEI and the IMSI in the SIM card to mobile phone when mobile phone is registered one's residence or after the user applies bind.Reach the effect that each mobile phone can only use a SIM card.
Mobile phone is done the attach process, and this time, the IMSI in the SIM in the mobile phone can learn by this in system.
After attach finishes and RR when connecting core net mobile radio terminal is the IMEI that IDENTITY REQUEST flow process obtains mobile phone known mobile phone IMSI because mobile phone has been Attach.
The IMEI that obtains is searched in system data, find corresponding IMSI again and the IMSI that from network, obtains relatively, determine mobile phone whether usefulness be the SIM card of binding.
If the user has opened the binding service.Just the user give tacit consent to own mobile phone can only be with oneself SIM card.When finding that IMSI does not relatively meet, halt system is to the service of mobile phone.
2 require to add private database according to right 1 in system binds user's IMEI and IMSI.Can inquire corresponding IMSI according to IMEI, perhaps inquire corresponding IMEI according to IMSI.
3 require that according to right 1 each mobile radio terminal is sent out IDENTITY REQUEST message after attach obtains IMEI into network termination.
4 require the IMEI that obtains from database the IMEI that obtains from terminal with according to IMSI relatively according to right 1, see whether mate.Thereby the validity that checking binding terminal networks.
If it is 5 require checking not pass through according to right 1, professional or be detach and handle to terminal limitations.Before can short-message sending, perhaps by the voice suggestion user.
If 6 require checking not pass through according to right 1, by to IMEI in the record that does not pass through and IMSI, whom can find at the mobile phone that uses others, and the owner of original mobile phone.Conveniently help the people to give stolen mobile phone for change.
CNA2006100382853A 2006-02-14 2006-02-14 Wireless mobile apparatus and user identity binding system Pending CN1829386A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2006100382853A CN1829386A (en) 2006-02-14 2006-02-14 Wireless mobile apparatus and user identity binding system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2006100382853A CN1829386A (en) 2006-02-14 2006-02-14 Wireless mobile apparatus and user identity binding system

Publications (1)

Publication Number Publication Date
CN1829386A true CN1829386A (en) 2006-09-06

Family

ID=36947451

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006100382853A Pending CN1829386A (en) 2006-02-14 2006-02-14 Wireless mobile apparatus and user identity binding system

Country Status (1)

Country Link
CN (1) CN1829386A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101796858A (en) * 2007-09-01 2010-08-04 苹果公司 Service provider activation with subscriber identity module policy
CN101183971B (en) * 2007-12-12 2010-10-13 华为终端有限公司 Method and device of managing MEID
CN101990209A (en) * 2009-07-30 2011-03-23 中国电信股份有限公司 Method and system for providing clue for finding lost mobile terminal
CN101198121B (en) * 2007-12-28 2011-07-20 中国移动通信集团四川有限公司 Authentication method for limiting mobile phone without using by others
CN102469448A (en) * 2010-11-08 2012-05-23 中兴通讯股份有限公司 Machine type communication (MTC) access control method, system and device
CN103124407A (en) * 2011-11-18 2013-05-29 中国移动通信集团内蒙古有限公司 Determination method and device for on-line mode of mobile user
CN103188672A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data protection method thereof
CN104703180A (en) * 2013-12-09 2015-06-10 江良洲 Implicit multiple authentication method based on mobile Internet and intelligent terminal
CN105515774A (en) * 2014-10-14 2016-04-20 鸿富锦精密电子(郑州)有限公司 Steal detection system and method
CN110234105A (en) * 2018-03-06 2019-09-13 中国移动通信有限公司研究院 Detect VLR whether the method and device of authentication denial service order

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101796858A (en) * 2007-09-01 2010-08-04 苹果公司 Service provider activation with subscriber identity module policy
CN101796858B (en) * 2007-09-01 2013-09-18 苹果公司 Service provider activation with subscriber identity module policy
CN101183971B (en) * 2007-12-12 2010-10-13 华为终端有限公司 Method and device of managing MEID
CN101198121B (en) * 2007-12-28 2011-07-20 中国移动通信集团四川有限公司 Authentication method for limiting mobile phone without using by others
CN101990209A (en) * 2009-07-30 2011-03-23 中国电信股份有限公司 Method and system for providing clue for finding lost mobile terminal
CN102469448A (en) * 2010-11-08 2012-05-23 中兴通讯股份有限公司 Machine type communication (MTC) access control method, system and device
CN102469448B (en) * 2010-11-08 2016-12-28 中兴通讯股份有限公司 A kind of method, system and device of machine type communication Access Control
CN103124407B (en) * 2011-11-18 2016-04-27 中国移动通信集团内蒙古有限公司 The defining method of mobile subscriber's network access and device
CN103124407A (en) * 2011-11-18 2013-05-29 中国移动通信集团内蒙古有限公司 Determination method and device for on-line mode of mobile user
CN103188672A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data protection method thereof
CN104703180A (en) * 2013-12-09 2015-06-10 江良洲 Implicit multiple authentication method based on mobile Internet and intelligent terminal
CN105515774A (en) * 2014-10-14 2016-04-20 鸿富锦精密电子(郑州)有限公司 Steal detection system and method
CN110234105A (en) * 2018-03-06 2019-09-13 中国移动通信有限公司研究院 Detect VLR whether the method and device of authentication denial service order

Similar Documents

Publication Publication Date Title
CN1829386A (en) Wireless mobile apparatus and user identity binding system
CN101005503B (en) Method and data processing system for intercepting communication between a client and a service
CN1586054A (en) Technique for generating correlation number for use in lawful interception of telecommunications traffic
CN101252703A (en) Terminal data protecting method, system as well as mobile communication terminal
CN104299286A (en) Attendance method and system for public security inspection tour
CN105162768A (en) Method and device for detecting phishing Wi-Fi hotspots
TW201616848A (en) Communication method of hiding privacy and system thereof
CN104008325A (en) Mobile phone Wi-Fi network-connecting real name identity authentication platform and method based on two-dimension codes
CN103686688B (en) The protection processing method of mobile terminal user's address list and device, mobile terminal
CN106130971A (en) Identity identifying method and certificate server
CN102780989A (en) Method and system for preventing loss of mobile terminal
CN102984335B (en) Dial the identity identifying method of landline telephone, equipment and system
CN113079258A (en) Number privacy protection method, network device and computer storage medium
CN107018240A (en) A kind of call method and system of hiding called number
CN104994006A (en) Back-to-back instant communication method and device based on WeChat public number
CN100413368C (en) A method for verifying user card validity
CN104618853A (en) Method, device and system for information push
CN1711785B (en) System and method for managing access of communication network to mobile terminal
CN104244242A (en) Network number allocation method and corresponding authentication method of Internet-of-things equipment
CN107438129A (en) The attribute information display methods and device of telephone number
CN204578617U (en) A kind of voice evidence service system
CN106791133A (en) The processing method and mobile terminal of the communication information
CN105162600A (en) Authentication information transmission method and device for Internet application
CN110035089A (en) A kind of network security verification method and system of distributed system
CN113742701B (en) System and method for opening AR/VR service, gateway device, AR/VR device and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication