WO1997029601A1 - Systeme de prevention de la reproduction du numero d'un abonne de telephone mobile - Google Patents
Systeme de prevention de la reproduction du numero d'un abonne de telephone mobile Download PDFInfo
- Publication number
- WO1997029601A1 WO1997029601A1 PCT/CN1997/000003 CN9700003W WO9729601A1 WO 1997029601 A1 WO1997029601 A1 WO 1997029601A1 CN 9700003 W CN9700003 W CN 9700003W WO 9729601 A1 WO9729601 A1 WO 9729601A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- code
- user
- mobile phone
- memory
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention relates to an anti-theft code method in a mobile telephone communication system.
- Existing mobile phone communication networks can be divided into two types: analog TACS and digital GSM.
- the MIN code and ESN code used to identify the user's billing account number and phone number are fixed in the chip of the mobile phone, and the MI and ESN are read directly from the mobile phone and transmitted when used. This password is therefore easier to intercept. Once deciphered and discovered, it will lead to the phenomenon of cell phone stringing and theft, which will cause huge economic losses to users.
- the user's billing number and phone number IMSI code of the mobile phone are solidified in the integrated circuit IC in the SIM card. When used, the IMSI code is read from the SIM card and transmitted, so it will also be transmitted. Easy to intercept.
- the purpose of the present invention is to provide a mobile phone anti-theft code method, which enables a mobile phone user to change from passive defense to active defense, so that code theft and serial connection cannot be used normally, thereby preventing code theft,
- the present invention provides a method that is implemented by a user actively changing password data.
- the method is a mobile communication network network management system that uses a user's mobile phone or telephone with a rewritable cipher data storage E 2 PROM and a central processing unit CPU as a generating part and a user window subsystem connected with user window information. As performed between receiving parts.
- the method includes the following steps: entering a password through a password rewriting program; then entering a redundant code P; transmitting the redundant code P;
- the method includes the following steps: receiving an incoming signal sent by the occurrence part; starting the user window subsystem via a service dedicated line; the subsystem identifying the password and generating a response corresponding to the password after the password is input; and then receiving Partially transmitted redundant code P; the redundant code P and the original sequence code A
- a mobile phone anti-theft code method is provided.
- the method is implemented by a generating part and a receiving part.
- the generating part is a user's mobile phone or telephone with a rewritable password data storage and a central processing unit CPU.
- the receiving part It is a mobile communication network network management system with a user window subsystem connected to a user window information database. The method includes the following steps:
- the receiving part receives the incoming signal sent by the occurrence part
- the incoming call signal starts the user window subsystem through the service dedicated line;
- the password is identified and a response is generated in response to the password;
- the password rewriting in the generating part and the password rewriting in the receiving part can be performed simultaneously or in a time-sharing manner; the user window subsystem can be directly dialed in by the user's mobile phone or the telephone network by the user window subsystem. .
- FIG. 1 is a principle block diagram of a mobile phone call-in mode in an anti-theft code method of the present invention
- FIG. 2 is a schematic block diagram of a local call network incoming mode in the anti-theft code method of the present invention
- FIG. 3 is a flowchart of a rewriting procedure of a user's mobile phone in the anti-theft code method of the present invention
- FIG. 4 is a flowchart of a user window management software subsystem in the anti-theft code method of the present invention.
- FIG. 5 is a simulation diagram of the structure of a user's mobile phone password read-write circuit using the anti-theft code method of the present invention.
- the dynamic user accounting number file of the present invention is to open part of the information of the user of the information library file in the computer management system of the original mobile communication network to the user, and the user can change the information in the own file information in the database. Partial number.
- the user window software in Figures 1 and 2 includes manual intervention, password rewriting, password identification, and user window modules. It is a management subsystem designed to facilitate users to change numbers.
- Figure 1 shows the mode of rewriting the program by using the dial-in password of the mobile phone.
- This mode can shorten the length of the code points that the user needs to memorize, because part of the code points can be automatically verified by the mobile phone, and it can also avoid duplicate files to improve the system. Recognition ability. For example, if the password to be rewritten by the user is P, and the password is coded as S, the code point composition of the incoming system is S and A + P.
- the code point of S It can be very short, which prevents the use of mobile phone A to call the password file of mobile phone B, and also prevents the use of mobile phone A, but unknown password encoders call the password file, so this method is That said, it is a very good method of self-protection whether the password can be rewritten or the password itself.
- Figure 2 shows the mode of using the local telephone network to call into the mobile communication network subsystem.
- the user When using this mode, the user must remember the full code of the password, otherwise the code will be duplicated and the system will be confused.
- the phone mode only needs to remember the password encoding to be more tedious, but this method allows users to call in the password file in any area, including in areas not covered by mobile communications. See Figure 3, Figure 3 is the present invention The specific implementation of the part of the processing process that occurs in the anti-theft code method is described in detail below in conjunction with the flowchart of the rewriting program shown in FIG. 3.
- the mobile phone (301) is started to enter the password rewriting program (302). It is determined that if the program is not entered, it returns to the original standby state (312). If the password rewriting program has been entered, the password password S is entered through the input key.
- FIG. 4 is a flowchart of a user window management subsystem in the anti-theft code method of the present invention.
- the service dedicated line subsystem (405) receives the incoming call signal from the user, it will call up the file (406), and wait for the password S input status (407). If there is no password S (408), the delay will be certain.
- the user password is issued by the mobile phone and identified by the switching system of the mobile phone network.
- the password rewriting procedure in Fig. 4 allows users to dial into the special service line of the mobile phone communication network through their mobile phones to enter the user window subsystem.
- the system digital automatic response authentication operation mode can also be adopted, and the manual response authentication operation mode can also be adopted, that is, automatic operation mode or semi-automatic operation mode.
- the system is designed
- the manual intervention module includes manual response authentication and is used to rewrite the password after the user's mobile phone is lost, so that the lost mobile phone can no longer be used.
- the password of the subsystem is a "threshold" set to prevent mobile phone pirates from gaining access to the subsystem. Since only real users can grasp the password, no mobile phone pirate can control the subsystem, restricting the pirates from protecting the interests of mobile phone users. Due to the messy brands and various styles of the mobile phones currently used, the designed key functions, number and logos are different, and the internal integrated circuit structure of each mobile phone is also different, so this method of anti-theft code is impossible to operate the mobile phone. Make it enter the password rewriting procedure and give a fixed mode. Take a Motorola 9 8 0 X series phone as an example to execute a password rewriting procedure: Press MENU + O + O + STO (The phone displays the password rewriting entered. Program); Press the dedicated phone number until there is an answer. If there is no answer, press MENU + 0 + 0 + CLR to cancel the rewrite.
- the above-mentioned password rewriting procedure rewrites the user password file in the mobile communication network and the password P in the mobile phone simultaneously. Since the design of the mobile phone of each company is different in the implementation, it can also be performed in two steps, that is, the user password file in the mobile communication network is rewritten first, and then the password in the mobile phone is rewritten.
- a password reading and writing circuit simulated by using a Motorola 9 800 X series mobile phone as an example.
- the circuit shown in the figure is several components in an integrated circuit drawn according to its functional characteristics. It is only one device in the original circuit.
- the HMDL in the picture is a combination of several circuit parts including the CPU.
- P10-P39 are the input terminals of the password
- II-110 are the input terminals of the keys
- 01-06 are the output terminals of the data and control signals.
- the TZ100 is the data modulation output part
- the ROM is the storage area of the original sequence code A
- the E 2 PROM is a storage area used to store the redundant code.
- the software in the CPU After entering the password rewriting program instruction on the mobile phone according to the procedure in Figure 4, the software in the CPU enters the rewriting program, sets the write end INT of E 2 PROM and the decoder YMQ to wait for the password input, and enters the number in the user
- the rear CPU controls its Q2-Q5 terminals to write the password into the E 2 PROM.
- the dynamic password scheme adopted by the method of the invention can effectively curb the code stealing phenomenon of mobile phones, and change the original mobile communication users from passive anti-theft to active defense, so that there is no market for mobile phone theft codes, thereby purifying the use environment and maintaining users. Purpose of legal rights.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU12999/97A AU1299997A (en) | 1996-02-09 | 1997-01-20 | A method for preventing a subscriber number being cloned in a mobile telephone |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN96101116.5 | 1996-02-09 | ||
CN96101116A CN1060006C (zh) | 1996-02-09 | 1996-02-09 | 移动电话防盗码方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1997029601A1 true WO1997029601A1 (fr) | 1997-08-14 |
Family
ID=5116938
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN1997/000003 WO1997029601A1 (fr) | 1996-02-09 | 1997-01-20 | Systeme de prevention de la reproduction du numero d'un abonne de telephone mobile |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN1060006C (zh) |
AU (1) | AU1299997A (zh) |
WO (1) | WO1997029601A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100356814C (zh) * | 2004-06-28 | 2007-12-19 | 华为技术有限公司 | Sim卡反克隆方法 |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1684411B (zh) * | 2004-04-13 | 2010-04-28 | 华为技术有限公司 | 一种验证移动终端用户合法性的方法 |
CN100388835C (zh) * | 2003-11-21 | 2008-05-14 | 华为技术有限公司 | 一种验证移动终端用户合法性的方法 |
KR20060058325A (ko) * | 2004-11-25 | 2006-05-30 | 엘지전자 주식회사 | 이동통신단말기의 불법 복제 방지 방법 |
CN100375940C (zh) * | 2005-05-27 | 2008-03-19 | 佛山市顺德区顺达电脑厂有限公司 | 防止资料遭窃的可携式电子装置 |
CN104809378A (zh) * | 2015-04-30 | 2015-07-29 | 山东超越数控电子有限公司 | 一种kvm本地管理系统用户身份验证设计方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5237612A (en) * | 1991-03-29 | 1993-08-17 | Ericsson Ge Mobile Communications Inc. | Cellular verification and validation system |
US5241598A (en) * | 1991-05-22 | 1993-08-31 | Ericsson Ge Mobile Communications, Inc. | Rolling key resynchronization in cellular verification and validation system |
US5420908A (en) * | 1993-03-11 | 1995-05-30 | At&T Corp. | Method and apparatus for preventing wireless fraud |
-
1996
- 1996-02-09 CN CN96101116A patent/CN1060006C/zh not_active Expired - Fee Related
-
1997
- 1997-01-20 WO PCT/CN1997/000003 patent/WO1997029601A1/zh active Application Filing
- 1997-01-20 AU AU12999/97A patent/AU1299997A/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5237612A (en) * | 1991-03-29 | 1993-08-17 | Ericsson Ge Mobile Communications Inc. | Cellular verification and validation system |
US5241598A (en) * | 1991-05-22 | 1993-08-31 | Ericsson Ge Mobile Communications, Inc. | Rolling key resynchronization in cellular verification and validation system |
US5420908A (en) * | 1993-03-11 | 1995-05-30 | At&T Corp. | Method and apparatus for preventing wireless fraud |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100356814C (zh) * | 2004-06-28 | 2007-12-19 | 华为技术有限公司 | Sim卡反克隆方法 |
Also Published As
Publication number | Publication date |
---|---|
CN1182339A (zh) | 1998-05-20 |
AU1299997A (en) | 1997-08-28 |
CN1060006C (zh) | 2000-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7400906B2 (en) | Mobile communication terminal | |
US9119078B2 (en) | Mobile terminal apparatus | |
JP3008441B2 (ja) | セキュリティモジュール | |
US6463276B1 (en) | Mobile terminal having conditional blocking of outgoing call requests | |
JP3052244B2 (ja) | 移動通信システムにおける移動機の登録方法とicカードの登録方法、及びそれらを実現するための移動機、icカード、及びicカード挿入型移動機 | |
EP1827049B1 (en) | Authentication vector generating device, subscriber authentication module, mobile communication system and authentication vector generation method | |
JP2001308850A (ja) | 通信端末装置によるネットワークへの接続方法および装置 | |
JPH09322239A (ja) | 携帯電話等の移動体通信機の不正使用防止方法および該方法を実現する不正使用防止システム | |
WO1997008907A1 (en) | Method for foiling cellular telephone cloning | |
KR20050079128A (ko) | 이동 통신 단말기의 사용제한 설정 방법 | |
US6741872B1 (en) | Method of authorizing access to a cellular mobile radio network from a simplified telephone and an associated mobile radio system and simplified telephone | |
JP3350012B2 (ja) | 移動端末認証方式 | |
CN104581676B (zh) | 通信系统、移动通信装置以及用户识别信息的切换方法 | |
JP2001230858A (ja) | 携帯電話システム及び携帯電話機 | |
WO1997029601A1 (fr) | Systeme de prevention de la reproduction du numero d'un abonne de telephone mobile | |
JP3788700B2 (ja) | 携帯電話機 | |
US20070142086A1 (en) | Method of securing a mobile telephone identifier and corresponding mobile telephone | |
PL192616B1 (pl) | Sposób eksploatacji bezprzewodowego systemu łączności i bezprzewodowy system łączności | |
KR100591341B1 (ko) | 스마트 카드를 사용하여 사용자 인증이 가능한 이동통신단말기 및 인증방법 | |
JP2004289690A (ja) | 携帯端末装置 | |
KR0151901B1 (ko) | 비밀 번호를 이용한 이동 단말기 인증 방법 | |
JP2895038B1 (ja) | 移動通信用端末及びその不正使用規制方法 | |
JP2708083B2 (ja) | クレジットカード課金簡易ダイヤル操作サービス装置 | |
KR100641167B1 (ko) | 이동통신단말기의 초기화 방법 | |
JP4019059B2 (ja) | 認証機能付きデータ回線終端装置及びデータ通信における認証方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG US UZ VN AM AZ BY KG KZ MD RU TJ TM |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 97528023 Format of ref document f/p: F |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase |