CN1980457A - Network-side alarm-realizing method - Google Patents
Network-side alarm-realizing method Download PDFInfo
- Publication number
- CN1980457A CN1980457A CNA2005101259601A CN200510125960A CN1980457A CN 1980457 A CN1980457 A CN 1980457A CN A2005101259601 A CNA2005101259601 A CN A2005101259601A CN 200510125960 A CN200510125960 A CN 200510125960A CN 1980457 A CN1980457 A CN 1980457A
- Authority
- CN
- China
- Prior art keywords
- information
- network side
- sim card
- user
- warning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
This method applies in the net side in the mobile comm. system. The bonding info of user identification codes (UIC) and the international mobile equipment identification codes (IMIC) is stored in the net side. This method includes the following steps. The net side (a) obtains UIC and IMIC of the mobile terminal; (b) judges the coincidence between UIC/IMIC and their bonding info; if not coincident, executing next step; (c) prohibits from using the SIM card of this UIC; (d) sends info about this SIM card to the user defined point. In this invention, when the net side finds that the bonding info of user IMSI and IMEI does not fit the stored one, an alarm starts. The SIM card is prohibited to use. The info about the new SIM card is informed to the user.
Description
Technical field
The present invention relates to a kind of network side and realize the method for warning, belong to communication technical field.
Background technology
Universal day by day along with mobile phone, the stolen phenomenon of mobile phone is also more and more serious, and mobile phone to think to give for change again after stolen also be a thing that is difficult to substantially realize, thereby market presses for a kind of method that realizes the mobile phone alarm function, make hand-set from stolen more can send warning information from the trend user behind the change card, make original user according to information, create possible condition for giving mobile phone for change.
Summary of the invention
The technical problem to be solved in the present invention is: provide a kind of network side of can realizing to realize the method for reporting to the police, this method can be after mobile phone be lost, and network side triggers reports to the police, and forbids new SIM card use, notifies the owner of lost property with the information of new SIM card simultaneously.
The present invention realizes by following technical proposals:
A kind of network side is realized the method for warning, is applied to the network side of mobile communication system, and described network side storing has the binding information of custom IC and international mobile equipment identification number information, and this method may further comprise the steps:
(a) network side obtains the custom IC and the international mobile equipment identification number information of portable terminal;
(b) network side judges whether custom IC is consistent with the information of binding with international mobile equipment identification number information, if inconsistent, carries out next step;
(c) network side is forbidden the SIM card use of new this custom IC;
(d) network side sends to user's appointed positions with the information of this SIM card.
Further, in the described step (d), described new SIM card information can send to the terminal of appointment by the short message mode.
Further, in the described step (d), described new SIM card information can send to the terminal of appointment by liaison mode.
Further, in the described step (d), described new SIM card information can send to the wap mail server of appointment by Email.
During the binding information that the present invention finds user's IMSI and IMEI at network side and preservation inconsistent, trigger and report to the police, forbid this SIM card use, notify the owner of lost property with the information of new SIM card simultaneously.
Description of drawings
Fig. 1 is the method flow diagram that network side is realized information back-up in the specific embodiment of the invention.
Fig. 2 is the structured flowchart of the device that network side realization information is recovered in the specific embodiment of the invention.
Fig. 3 is the method flow diagram that network side realization information is recovered in the specific embodiment of the invention.
Fig. 4 is the method flow diagram that network side is realized information destroying in the specific embodiment of the invention.
Fig. 5 is the method flow diagram that network side is realized warning in the specific embodiment of the invention.
Embodiment
Below in conjunction with the drawings and specific embodiments the present invention is further introduced, but not as a limitation of the invention.
In order to guarantee the information security of portable terminal, the server of network side is provided with an authenticating user identification unit, is used for the user's of information resources ownership is confirmed; A user profile pretreatment unit is used to extract the type of user terminal and the storage format of various information sources; A registering unit, be used to realize the binding relationship of user's SIM card and user mobile phone, also promptly set up the binding relationship of custom IC (International Subscriber Identification Number:IMSI) and international mobile equipment identification number (International Mobile Equipment Identity:IMEI); A database is used for store various kinds of data information, also comprises: an information recovery device.This network side can be realized information back-up function, information restore funcitons, information destroying function and warning function.
Before carrying out aforesaid operations, set up the binding relationship of portable terminal IMSI and IMEI in the registering unit of the present network side of needs, the mapping relations table of pairing service password of various operations and operand, for example: back up the mapping of certain file and operator password, destroy the mapping of all files and operator password etc., carry out different operations corresponding to different service passwords.
Network side is realized the information back-up function, the information resources of portable terminal can be backuped in the database of network side server, so that be sent to portable terminal when needed, makes portable terminal rebulid the original information resource.With reference to shown in Figure 1, implementation step is as follows:
Step 101: network side receives user's backup request, also is that portable terminal proposes the backup information application by the method that destination mobile terminal IMSI and service password are provided to network side;
The information back-up request is: by short message mode, user's service password that liaison mode or voice service mode etc. send can be provided with a plurality of service passwords in registering unit, corresponding different respectively backup information requests.
Step 102: network side confirms that then the user ID information request is legal if confirming the destination mobile terminal IMSI report mates with service password, and also being the user has ownership to the information resources of destination mobile terminal;
Step 103: the information resources data to be derived that mobile terminal receive is selected, different service passwords can be selected different information resources backups, set in registering unit;
Step 104: encrypt with user cipher receiving data, be kept in the database of network side, include information such as the format name of information source and backup version in the data, these satellite informations are added when data deposit database in automatically receiving.
Network side can be realized the information restore funcitons, thereby mobile phone has lost original information resources or when information is damaged, can rebulid individual's information resources when the user has lost.Data are recovered to mean and are covered existing various information resources in the portable terminal, so must user's write permission and user be differentiated in network side message file ownership, prevent the malice recovery.Thereby before the user carries out information recovery business, can back up the information resources on the existing mobile phone in advance.
The information restore funcitons is realized that by the information recovery device with reference to shown in Figure 2, the information recovery device comprises the recovery request receiving element 21 that connects successively, is used for the information recovery request of mobile terminal receive; Recover authority judging unit 22, be used for determining whether this device has the content of data write permission and request recovery; Information call unit 23 is used for calling the backup information data of network side server; Data processing unit 24 is used for Backup Data deciphering and format conversion; Data transmission unit 25, the data that are used for handling send to target terminal.
With reference to shown in Figure 3, information returns on the portable terminal and comprises the steps:
Step 201: network side receives the information recovery request of portable terminal;
The information recovery request is: by short message mode, user's service password that liaison mode or voice service mode etc. send can be provided with a plurality of service passwords in registering unit, corresponding different respectively recovering information requests.
Step 202: network side confirms that then portable terminal has write permission if confirming the destination mobile terminal IMSI and the service password that report mates;
Step 203: utilize IMSI in database, to find corresponding backup file;
Step 204: utilize service password deciphering backup file;
Step 205: according to the needs recovering information Instruction Selection resource data of user's transmission;
Step 206: read the type information of portable terminal, extract the end message resource format, information source form in the database is changed;
Step 207: the data after the conversion send to portable terminal, carry out corresponding write operation by portable terminal.
Network side realizes that the purpose of information destroying is: after user mobile phone is lost, trigger program in the target terminal by the mode that sends instruction to target terminal, finish the destruction of information resources.
With reference to shown in Figure 4, the implementation method of network side information destroying comprises the steps:
Step 301: network side receives the request that needs the destroying information resource of reporting of user;
The destroying information request is for passing through short message mode, and liaison mode or voice service mode etc. send the IMSI and the service password of destination mobile terminal, and a plurality of service passwords can be set in registering unit, corresponding respectively request of destroying different information.
Step 302: network side confirms that then this user has information ownership to destination mobile terminal if confirming the destination mobile terminal IMSI and the service password that report mates, and then can carry out information destroying;
Step 303: network side is searched the IMEI of portable terminal according to IMSI that sets up and the binding relationship of IMEI, and the startup process waits for that destination mobile terminal is in the net registration;
Step 304: network side is found destination mobile terminal when the net registration, the new IMSI of localizing objects portable terminal in HLR;
Step 305: this portable terminal is sent the information destroying dependent instruction, make it start program stored auto-destruct information.
Network side realizes that the effect of warning function is: mobile phone is lost, and after being reused by the people, during the binding information of finding user's IMSI and IMEI at network side and preservation inconsistent, trigger and reports to the police, and forbids this SIM card use, notifies the owner of lost property with the information of neocaine simultaneously.
With reference to shown in Figure 5, the warning implementation procedure of network side is as follows:
Step 401: when portable terminal was registered on the net, network side obtained the IMSI and the IMEI information of portable terminal;
Step 402: network side compares the IMSI of the IMSI that obtains and IMEI information and storage in advance and IMEI binding information and judges, if find that both are inconsistent, then carries out next step, otherwise, do not handle;
Step 403: network side is forbidden the SIM card use of this IMSI;
Step 404: network side sends to user's appointed positions with the information of new SIM card.
In this step, new card information can send to designated terminal by the mode of short message, phone, also can send to the wap mail server of appointment by Email.
Claims (4)
1, a kind of network side is realized the method for warning, is applied to the network side of mobile communication system, and described network side storing has the binding information of custom IC and international mobile equipment identification number information, and this method may further comprise the steps:
(a) network side obtains the custom IC and the international mobile equipment identification number information of portable terminal;
(b) network side judges whether custom IC is consistent with the information of binding with international mobile equipment identification number information, if inconsistent, carries out next step;
(c) network side is forbidden the new SIM card use of this custom IC;
(d) information that network side will this new SIM card sends to user's appointed positions.
2, a kind of network side as claimed in claim 1 is realized the method for warning, and it is characterized in that: in the described step (d), described new SIM card information can send to the terminal of appointment by the short message mode.
3, a kind of network side as claimed in claim 1 is realized the method for warning, and it is characterized in that: in the described step (d), described new SIM card information can send to the terminal of appointment by liaison mode.
4, a kind of network side as claimed in claim 1 is realized the method for warning, and it is characterized in that: in the described step (d), described new card information can send to the wap mail server of appointment by Email.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2005101259601A CN1980457A (en) | 2005-11-30 | 2005-11-30 | Network-side alarm-realizing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2005101259601A CN1980457A (en) | 2005-11-30 | 2005-11-30 | Network-side alarm-realizing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1980457A true CN1980457A (en) | 2007-06-13 |
Family
ID=38131414
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2005101259601A Pending CN1980457A (en) | 2005-11-30 | 2005-11-30 | Network-side alarm-realizing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1980457A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101686572B (en) * | 2008-09-26 | 2012-07-04 | 中国移动通信集团公司 | Method and system for interlocking wireless terminal cards, and management platform |
CN102843669A (en) * | 2012-08-17 | 2012-12-26 | 中兴通讯股份有限公司 | Data access method and device |
CN103546879A (en) * | 2012-07-13 | 2014-01-29 | 国民技术股份有限公司 | SIM (subscriber identity module) data processing method and system |
CN103648089A (en) * | 2013-11-07 | 2014-03-19 | 北京奇虎科技有限公司 | Anti-theft processing method and anti-theft processing device for mobile equipment |
CN105100131A (en) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | Terminal device and terminal device theft prevention method and system |
CN105704697A (en) * | 2016-03-25 | 2016-06-22 | 广东欧珀移动通信有限公司 | Method and system for realizing mobile equipment loss alarm at network side |
-
2005
- 2005-11-30 CN CNA2005101259601A patent/CN1980457A/en active Pending
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101686572B (en) * | 2008-09-26 | 2012-07-04 | 中国移动通信集团公司 | Method and system for interlocking wireless terminal cards, and management platform |
CN103546879A (en) * | 2012-07-13 | 2014-01-29 | 国民技术股份有限公司 | SIM (subscriber identity module) data processing method and system |
CN103546879B (en) * | 2012-07-13 | 2018-02-16 | 国民技术股份有限公司 | A kind of method and system of SIM card processing data |
CN102843669A (en) * | 2012-08-17 | 2012-12-26 | 中兴通讯股份有限公司 | Data access method and device |
CN102843669B (en) * | 2012-08-17 | 2019-03-15 | 中兴通讯股份有限公司 | Data access method and device |
CN103648089A (en) * | 2013-11-07 | 2014-03-19 | 北京奇虎科技有限公司 | Anti-theft processing method and anti-theft processing device for mobile equipment |
CN105100131A (en) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | Terminal device and terminal device theft prevention method and system |
CN105704697A (en) * | 2016-03-25 | 2016-06-22 | 广东欧珀移动通信有限公司 | Method and system for realizing mobile equipment loss alarm at network side |
CN105704697B (en) * | 2016-03-25 | 2019-06-04 | Oppo广东移动通信有限公司 | The method and system of network side realization mobile device loss alarm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1980459B (en) | Method for realizing information destroying at network side | |
CN103329582B (en) | System for managing multiple subscriptions in a UICC | |
CN101252703B (en) | Terminal data protecting method, system as well as mobile communication terminal | |
EP3466021B1 (en) | A method for managing the status of a connected device | |
CN103347131B (en) | A kind of intelligent mobile phone anti-theft method and system | |
US20080090548A1 (en) | Method for tracking mobile communication terminal | |
RU2006114719A (en) | METHOD FOR SECURITY MANAGEMENT OF APPLICATIONS USING THE SECURITY MODULE | |
EP1347667A2 (en) | Method of indicating unauthorized use of a mobile terminal | |
CN1980457A (en) | Network-side alarm-realizing method | |
CN103581441A (en) | Mobile terminal tracking anti-theft system and method | |
CN1980458B (en) | Method for realizing information back-up at network side | |
CN102595376B (en) | A kind of activating method, Apparatus and system of User Identity card | |
CN107172194B (en) | Virtual SIM card management method and device and communication terminal | |
CN108347730B (en) | Wireless communication processing method and device | |
CN1684411A (en) | Method for verifying user's legitimate of mobile terminal | |
CN100571436C (en) | A kind of implementation method of mobile terminal information resource safety guarantee | |
Kumar et al. | Vulnerability detection of international mobile equipment identity number of smartphone and automated reporting of changed IMEI number | |
CN101184303A (en) | Anti-theft method and apparatus for mobile terminal | |
US20160241564A1 (en) | Device with embedded network subscription and methods | |
CN1980461A (en) | Device and method for realizing information recovery at network side | |
CN100429957C (en) | Indentifying method for telecommunication smart card and terminal | |
CN107705384B (en) | Attendance checking method, system, electronic device and storage medium | |
CN1980427A (en) | Device for mobile terminal to automatically deleting information, and method thereof | |
CN110191464B (en) | Method and system for preventing SIM card from being stolen | |
CN111093186B (en) | eSIM card operator file management method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |