WO1997029601A1 - Systeme de prevention de la reproduction du numero d'un abonne de telephone mobile - Google Patents

Systeme de prevention de la reproduction du numero d'un abonne de telephone mobile Download PDF

Info

Publication number
WO1997029601A1
WO1997029601A1 PCT/CN1997/000003 CN9700003W WO9729601A1 WO 1997029601 A1 WO1997029601 A1 WO 1997029601A1 CN 9700003 W CN9700003 W CN 9700003W WO 9729601 A1 WO9729601 A1 WO 9729601A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
code
user
mobile phone
memory
Prior art date
Application number
PCT/CN1997/000003
Other languages
English (en)
French (fr)
Inventor
Jie Liu
Original Assignee
Jie Liu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jie Liu filed Critical Jie Liu
Priority to AU12999/97A priority Critical patent/AU1299997A/en
Publication of WO1997029601A1 publication Critical patent/WO1997029601A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the present invention relates to an anti-theft code method in a mobile telephone communication system.
  • Existing mobile phone communication networks can be divided into two types: analog TACS and digital GSM.
  • the MIN code and ESN code used to identify the user's billing account number and phone number are fixed in the chip of the mobile phone, and the MI and ESN are read directly from the mobile phone and transmitted when used. This password is therefore easier to intercept. Once deciphered and discovered, it will lead to the phenomenon of cell phone stringing and theft, which will cause huge economic losses to users.
  • the user's billing number and phone number IMSI code of the mobile phone are solidified in the integrated circuit IC in the SIM card. When used, the IMSI code is read from the SIM card and transmitted, so it will also be transmitted. Easy to intercept.
  • the purpose of the present invention is to provide a mobile phone anti-theft code method, which enables a mobile phone user to change from passive defense to active defense, so that code theft and serial connection cannot be used normally, thereby preventing code theft,
  • the present invention provides a method that is implemented by a user actively changing password data.
  • the method is a mobile communication network network management system that uses a user's mobile phone or telephone with a rewritable cipher data storage E 2 PROM and a central processing unit CPU as a generating part and a user window subsystem connected with user window information. As performed between receiving parts.
  • the method includes the following steps: entering a password through a password rewriting program; then entering a redundant code P; transmitting the redundant code P;
  • the method includes the following steps: receiving an incoming signal sent by the occurrence part; starting the user window subsystem via a service dedicated line; the subsystem identifying the password and generating a response corresponding to the password after the password is input; and then receiving Partially transmitted redundant code P; the redundant code P and the original sequence code A
  • a mobile phone anti-theft code method is provided.
  • the method is implemented by a generating part and a receiving part.
  • the generating part is a user's mobile phone or telephone with a rewritable password data storage and a central processing unit CPU.
  • the receiving part It is a mobile communication network network management system with a user window subsystem connected to a user window information database. The method includes the following steps:
  • the receiving part receives the incoming signal sent by the occurrence part
  • the incoming call signal starts the user window subsystem through the service dedicated line;
  • the password is identified and a response is generated in response to the password;
  • the password rewriting in the generating part and the password rewriting in the receiving part can be performed simultaneously or in a time-sharing manner; the user window subsystem can be directly dialed in by the user's mobile phone or the telephone network by the user window subsystem. .
  • FIG. 1 is a principle block diagram of a mobile phone call-in mode in an anti-theft code method of the present invention
  • FIG. 2 is a schematic block diagram of a local call network incoming mode in the anti-theft code method of the present invention
  • FIG. 3 is a flowchart of a rewriting procedure of a user's mobile phone in the anti-theft code method of the present invention
  • FIG. 4 is a flowchart of a user window management software subsystem in the anti-theft code method of the present invention.
  • FIG. 5 is a simulation diagram of the structure of a user's mobile phone password read-write circuit using the anti-theft code method of the present invention.
  • the dynamic user accounting number file of the present invention is to open part of the information of the user of the information library file in the computer management system of the original mobile communication network to the user, and the user can change the information in the own file information in the database. Partial number.
  • the user window software in Figures 1 and 2 includes manual intervention, password rewriting, password identification, and user window modules. It is a management subsystem designed to facilitate users to change numbers.
  • Figure 1 shows the mode of rewriting the program by using the dial-in password of the mobile phone.
  • This mode can shorten the length of the code points that the user needs to memorize, because part of the code points can be automatically verified by the mobile phone, and it can also avoid duplicate files to improve the system. Recognition ability. For example, if the password to be rewritten by the user is P, and the password is coded as S, the code point composition of the incoming system is S and A + P.
  • the code point of S It can be very short, which prevents the use of mobile phone A to call the password file of mobile phone B, and also prevents the use of mobile phone A, but unknown password encoders call the password file, so this method is That said, it is a very good method of self-protection whether the password can be rewritten or the password itself.
  • Figure 2 shows the mode of using the local telephone network to call into the mobile communication network subsystem.
  • the user When using this mode, the user must remember the full code of the password, otherwise the code will be duplicated and the system will be confused.
  • the phone mode only needs to remember the password encoding to be more tedious, but this method allows users to call in the password file in any area, including in areas not covered by mobile communications. See Figure 3, Figure 3 is the present invention The specific implementation of the part of the processing process that occurs in the anti-theft code method is described in detail below in conjunction with the flowchart of the rewriting program shown in FIG. 3.
  • the mobile phone (301) is started to enter the password rewriting program (302). It is determined that if the program is not entered, it returns to the original standby state (312). If the password rewriting program has been entered, the password password S is entered through the input key.
  • FIG. 4 is a flowchart of a user window management subsystem in the anti-theft code method of the present invention.
  • the service dedicated line subsystem (405) receives the incoming call signal from the user, it will call up the file (406), and wait for the password S input status (407). If there is no password S (408), the delay will be certain.
  • the user password is issued by the mobile phone and identified by the switching system of the mobile phone network.
  • the password rewriting procedure in Fig. 4 allows users to dial into the special service line of the mobile phone communication network through their mobile phones to enter the user window subsystem.
  • the system digital automatic response authentication operation mode can also be adopted, and the manual response authentication operation mode can also be adopted, that is, automatic operation mode or semi-automatic operation mode.
  • the system is designed
  • the manual intervention module includes manual response authentication and is used to rewrite the password after the user's mobile phone is lost, so that the lost mobile phone can no longer be used.
  • the password of the subsystem is a "threshold" set to prevent mobile phone pirates from gaining access to the subsystem. Since only real users can grasp the password, no mobile phone pirate can control the subsystem, restricting the pirates from protecting the interests of mobile phone users. Due to the messy brands and various styles of the mobile phones currently used, the designed key functions, number and logos are different, and the internal integrated circuit structure of each mobile phone is also different, so this method of anti-theft code is impossible to operate the mobile phone. Make it enter the password rewriting procedure and give a fixed mode. Take a Motorola 9 8 0 X series phone as an example to execute a password rewriting procedure: Press MENU + O + O + STO (The phone displays the password rewriting entered. Program); Press the dedicated phone number until there is an answer. If there is no answer, press MENU + 0 + 0 + CLR to cancel the rewrite.
  • the above-mentioned password rewriting procedure rewrites the user password file in the mobile communication network and the password P in the mobile phone simultaneously. Since the design of the mobile phone of each company is different in the implementation, it can also be performed in two steps, that is, the user password file in the mobile communication network is rewritten first, and then the password in the mobile phone is rewritten.
  • a password reading and writing circuit simulated by using a Motorola 9 800 X series mobile phone as an example.
  • the circuit shown in the figure is several components in an integrated circuit drawn according to its functional characteristics. It is only one device in the original circuit.
  • the HMDL in the picture is a combination of several circuit parts including the CPU.
  • P10-P39 are the input terminals of the password
  • II-110 are the input terminals of the keys
  • 01-06 are the output terminals of the data and control signals.
  • the TZ100 is the data modulation output part
  • the ROM is the storage area of the original sequence code A
  • the E 2 PROM is a storage area used to store the redundant code.
  • the software in the CPU After entering the password rewriting program instruction on the mobile phone according to the procedure in Figure 4, the software in the CPU enters the rewriting program, sets the write end INT of E 2 PROM and the decoder YMQ to wait for the password input, and enters the number in the user
  • the rear CPU controls its Q2-Q5 terminals to write the password into the E 2 PROM.
  • the dynamic password scheme adopted by the method of the invention can effectively curb the code stealing phenomenon of mobile phones, and change the original mobile communication users from passive anti-theft to active defense, so that there is no market for mobile phone theft codes, thereby purifying the use environment and maintaining users. Purpose of legal rights.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Description

移动电话防盗码方法 技术领域
本发明涉及一种移动电话通信系统中的防盗码方法. 背景技术
现有的移动电话通信网可分为模拟制式的 TACS和数字制式的 GSM两 种。 在模拟制式的移动电话通信网中, 用于识别用户计费账号和电话号码的 MIN码和 ESN码是被固化在手机的芯片中, 使用时直接从手机读取 MI 和 ESN并发射。 因此该密码较易被截取。 一旦被破译和发现, 就会引发手机被 串机和盗用的现象发生, 给用户造成巨大的经济损失。 在数字制式移动电话 通信网中, 其手机的用户计费号码和电话号码 IMSI码是固化在 SIM卡中的 集成电路 IC中, 使用时从 SIM卡中读取 IMSI码并发射, 因此同样也会被容 易截取。
因此, 在目前, 移动电话通信网中的防盗码问题始终是一个难题, 迫切 需要一种有效可行的防盗码方法。 发明概要
本发明的目的是提供一种移动电话防盗码方法, 使手机用户从被动防范 变为主动设防, 从而使盗码和串机无法正常使用, 由此防止盗码情况,
为实现上述目的, 本发明提供一种通过用户主动更改密码数据的方法来 完成的。该方法是在以具有可重复改写的密码数据存储器 E2PROM和中央处 理器 CPU 的用户手机或电话机作为发生部分和具有以与用户窗口信息连接 的用户窗口子系统的移动通信网网络管理系统作为接收部分之间进行的 . 根 据本发明的防盗码方法, 在发生部分中, 该方法包含如下步骤: 通过密码改 写程序输入密码口令; 然后输入冗码 P ; 将该冗码 P进行发射; 将该冗码 P 与移动通信网给定的原序码 A组合成全码的密码模式 M = A + P; 将该密 码数据通过发生部分的存储器的写入端输入该存储器中; 而在接收部分中, 该方法包含如下步骤: 接收发生部分发送的呼入信号; 该信号经过服务专线 起动用户窗口子系统; 该子系统待密码口令输入后, 进行口令识别并产生相 应该口令的答复; 然后, 接收发生部分发送的冗码 P ; 该冗码 P与原序码 A 组合成全码的密码模式 M = A + P; 然后将该改写密码存入用户信息库中。 根据本发明提供的一种移动电话防盗码方法, 该方法通过发生部分及接 收部分实现. 该发生部分是具有可重复改写的密码数据存储器和中央处理器 CPU的用户手机或电话机, 该接收部分是具有与用户窗口信息库连接的用户 窗口子系统的移动通信网网络管理系统, 所说方法包含如下步骤:
在发生部分中, 通过密码改写程序输入密码口令;
输入冗码 P ;
将该冗码 P进行发射;
将该冗码 P与移动通信网给定的原序码 A组合成全码的密码模式 M = A + P ;
将该组合的密码数据通过该发生部分的存储器的写入端输入该存储器 中; 以及
接收部分接收发生部分发送的呼入信号;
该呼入信号经过服务专线起动用户窗口子系统;
待密码口令输入后, 进行口令识别并产生响应该口令的答复;
接收发生部分发送的冗码 P;
将该冗码 P与原序码 A组合成全码的密码模式 M = A + P ;
将改写的密码存入用户信息库中。
在本发明的方法中, 所述发生部分的密码改写与接收部分中的密码改写 可同时进行, 也可分时进行; 可由用户手机直接呼入或由电话网呼入接收部 分的用户窗口子系统.
下面结合实施例及附图进一步说明本发明的防盗码方法. 附图简述
图 1为本发明防盗码方法中手机呼入模式原理框图;
图 2为本发明防盗码方法中市话网呼入模式原理框图;
图 3为本发明防盗码方法中用户手机改写程序流程图;
图 4为本发明防盗码方法中用户窗口管理软件子系统流程图;
图 5为采用本发明防盗码方法的用户手机密码读写电路结构模拟图。 实现本发明的最佳方式 参见图 1、 图 2, 本发明的动态用户计账号码档案就是将原移动通信网 的计算机管理系统中的信息库档案的用户部分信息向用户开放, 可由用户更 改库中的自身档案信息中的部分号码。 图 1、 图 2中的用户窗口软件包括人 工干预、 密码改写、 口令识别和用户窗口模块, 就是为便于用户更改号码而 设计的管理子系统, 该管理子系统与通信网网络管理系统的用户信息库连 接。 该子系统包含用户密码档案用来接收并改写密码。
图 1所示是采用手机拨入密码改写程序的模式, 这种模式可缩短用户所 需记忆的码位长度, 因为一部分码位可由手机来自动核定, 同时也可避免档 案存在重复, 以提高系统的识别能力。 例如用户要改写的密码为 P, 而口令 编码为 S的话, 则呼入系统的码位组成就为 S和 A + P , 由于 A在通信网中 本身不可能具有重码现象, 因此 S的码位可以很短, 这也就阻止了使用甲手 机呼叫乙手机的密码档案的现象产生, 同时也阻止了使用甲手机但不知口令 编码者呼叫密码档案的现象发生, 因此该方法对手机持有者来说, 无论从密 码可改写还是从改写密码的本身来说都是一种很好的自我保护方法.
图 2所示是采用市话网呼入移动通信网子系统的模式, 采用这种模式时 要求用户必须记住密码的全码, 否则就会造成编码重复使系统混乱, 这与图 1 所示采用手机模式只需记住口令编码要繁琐一些, 但采用此方法可使用户 在任何地域都可呼入密码档案, 包括在移动通信所未覆盖的区域中使用. 参见图 3 , 图 3为本发明防盗码方法中发生部分处理过程的具体实施方 式. 下面结合图 3所示的改写程序流程图进行详细说明.
首先启动手机 (301), 使其进入改写密码程序 (302), 通过判断, 如果未进 入该程序, 则返回原待机状态 (312), 如果已进入改写密码程序, 则通过输入 键将密码口令 S输入 (303), 如果密码口令 S未输入 (304), 则重新进行输入密 码口令 S(303),如果密码口令 S已经输入 (304),则判断是否有取消方式 (305), 如果有取消方式, 则程序返回原待机状态 (313), 如果无取消方式 (305), 则通 过输入键输入新的冗码 P(306), 经过判断 (307)如果无结束符, 则返回 (305), 如果有结束符, 则将冗码 P发射 (317)并等待接收部分回送信号予以确认 (314), 若到时未确认, 则取消改写 (316)并返回原待机状态 (313), 若未到时, 则继续等待, 若已确认 (314), 则使手机存储器的写入端打开 (308), 将更改的 密码数据 M = A + P送入存储器 (309),然后关闭手机存储器的写入端 (310), 程序返回 (311)。 -A- 参见图 4 , 图 4是本发明防盗码方法中用户窗口管理子系统的流程图。 当服务专线子系统 (405)接收来自发生部分的用户呼入信号时,则将档案 调出 (406), 处于等待口令 S输入状态 (407), 如无口令 S(408), 则延时一定时 间 (418 , 419), 在该时间内处于等待口令状态 (407), 当该时间已到 (419), 则 取消服务时间 (420), 程序返回 (421)初始状态, 如果口令 S已被接收到 (408), 则判断口令 S是否吻合 (409), 并通过声讯提示 (409), 如果是否定信息 (422), 则程序返回等待口令状态 (407), 如果声讯提示口令 S吻合 (410), 则等待新密 码 P的输入 (411), 判断新密码是否进行输入 (412), 如果新密码未输入, 则在 延时一定时间内等待新密码的输入 (423 , 424 , 411), 如果延时的时间已到 (424), 仍无新密码输入, 则以声讯提示取消该改写 (425 , 426), 程序返回初 始状态; 如果判断肯定了进行新密码的输入 (412), 则由声讯进行确认 (413), 如果无确认信号 (415), 则延时等待 (414), 若到时尚未确认 (428), 则取消改写 过程 (425), 若有确认信号 (415), 则执行更新档案 (416), 然后程序返回初始状 态 (417)。
在移动通信的规程中, 用户密码由手机发出, 由移动电话网的交换系统 进行识别。 本防盗码方法在现有的移动电话通信系统中给定了一个密码模 式,即模拟制式手机的密码 MIN、 ESN或数字制式手机的密码 IMSI均为 M = A + P , 其中 M为全码, A为通信网给定的原序码, P为扩展了的可由 用户改写的冗码, 这样就不会给原系统在改造时造成较大的麻烦。 图 4中的 密码改写程序, 用户可通过其手机拨入移动电话通信网的特定服务专线而进 入用户窗口子系统, 当听到声讯提示后, 便可继续在手机上键入密码口令, 待子系统识别并进行答复后再键入新的用户冗码 P , 并同时在手机上改写冗 码 P . 这种改写模式是为了用户在下一次使用手机时, 能使用户手机的密码 与用户档案的密码相一致。
子系统在应答的操作方式上, 可采用系统数码自动应答鉴别搡作方式, 也可采用人工应答鉴别操作方式, 即自动的搡作模式或半自动的操作模式, 为确保系统可靠性, 系统设计了人工干预模块, 包括人工应答鉴别和在用户 手机丢失后用于改写密码, 使丢失的手机不能再继续使用.
子系统的口令是为防止手机盗用者 ^子系统而设置的 "门坎", 由于 只有真正的用户才掌握口令, 因此任何手机盗用者都无法 ^子系统, 制约 了盗用者保护了手机用户利益。 由于目前所使用的手机的品牌杂乱、 式样繁多, 所设计的按键功能、 数 量及标识也各有不同, 各手机的使用方法内部集成电路结构也各有千秋, 因 此本防盗码方法不可能就如何操作手机使其进入密码改写程序而给出一固定 的模式, 仅以摩托洛拉 9 8 0 0 X系列手机为例执行一个密码改写程序: 按键 MENU + O + O + STO (手机上显示已进入密码改写程序); 按专线电话号码, 直到有应答为止, 若无应答可按键 MENU + 0 + 0 + CLR , 将此次改写予以取消;
有应答后, 键入口令编码 XXXX + SND ;
再一次应答后, 键入新的密码 PXXXX + SND ;
得到应答后按键 MENU + STO。
上述密码改写程序的改写方式是同步改写了移动通信网中的用户密码 档案和手机中的密码 P。 实施中由于各公司的手机设计各有不同, 也可分两 步进行, 即先改写移动通信网中的用户密码档案, 再改写手机中的密码卩。
参见图 5 ,是以摩托洛拉 9 8 0 0 X系列手机为例而模拟的一个密码读写 电路, 图中所示电路是根据其功能特点而绘制的一个集成电路中的几个组成 部分, 在原电路中仅是一个器件而已。 图中的 HMDL是一个包括 CPU在内 的若干个电路部分的组合, 其 P10 - P39为密码的输入端, II - 110为按键 的输入端, 01 一 06为数据和控制信号的输出端. 图中 TZ100是数据调制 输出部分, ROM是原序码 A的存贮区, E2PROM是用于存贮可更改冗码的 存贮区。当按图 4程序在手机上键入密码改写程序的指令后, CPU中的软件 进入改写程序, 将 E2PROM和译码器 YMQ的写入端 INT置位以等待密码的 输入, 在用户键入数码后 CPU控制其 Q2 - Q5端将密码写入 E2PROM中。
本发明方法所采用的动态密码方案可以有效地扼制移动电话盗码现 象, 使原有的移动通信用户由被动防盗变为主动设防, 使移动电话的盗码没 有市场, 达到净化使用环境和维护用户合法权益的目的。
虽然为了说明本发明而公开了本发明优选的实施例, 但本领域技术人员 可以理解在不脱离本发明的范围和精神下的各种变更、 添加和替换措施都应 当属于本发明权利要求所限定的保护范围,

Claims

权利要求
1、 一种移动电话防盗码发生部分的处理方法, 该发生部分是具有可重 复改写的密码数据存储器和中央处理器 CPU的用户手机或电话机,所说方法 包含如下步骤:
通过密码改写程序输入密码口令;
输入冗码 P ;
将该冗码 P进行发射;
将该冗码 P与移动通信网给定的原序码 A组合成全码的密码模式 M = A + P ;
将该组合的密码数据通过该发生部分的存储器的写入端输入该存储器 中。
2、 根据权利要求 1所述方法, 其中, 所说用户手机的数据存储器包括 模拟制式手机的密码 MIN及 ESN存储器和数字制式手机的 SIM和 IMSI存 储器。
3、 一种移动电话防盗码接收部分的处理方法, 该接收部分是具有用户 窗口子系统的移动通信网网络管理系统, 所说用户窗口子系统与用户信息库 连接, 所说方法包含如下步骤:
接收发生部分发送的呼入信号;
该呼入信号经过服务专线起动用户窗口子系统;
待密码口令输入后, 进行口令识别并产生相应该口令的答复; 接收发生部分发送的冗码 P;
将该冗码 P与原序码 A组合成全码的密码模式 M = A + P;
将改写的密码存入用户信息库中.
4、 一种移动电话防盗码方法, 该方法通过发生部分及接收部分实现, 该发生部分是具有可重复改写的密码数据存储器和中央处理器 CPU 的用户 手机或电话机, 该接收部分是具有与用户窗口信息库连接的用户窗口子系统 的移动通信网网络管理系统, 所说方法包含如下步骤:
在发生部分中, 通过密码改写程序输入密码口令;
输入冗码 P ;
将该冗码 P进行发射; 将该冗码 P与移动通信网给定的原序码 A组合成全码的密码模式 M = A + P ;
将该组合的密码数据通过该发生部分的存储器的写入端输入该存储器 中; 以及
接收部分接收发生部分发送的呼入信号;
该呼入信号经过服务专线起动用户窗口子系统;
待密码口令输入后, 进行口令识别并产生响应该口令的答复;
接收发生部分发送的冗码 P;
将该冗码 P与原序码 A组合成全码的密码模式 M = A + P;
将改写的密码存入用户信息库中。
5、 根据权利要求 4所述的方法, 其中, 所述发生部分的密码改写与接 收部分中的密码改写可同时进行或分时进行。
6、 根据权利要求 4所述的方法, 其中, 所说密码改写可由用户手机直 接呼入或由电话网呼入接收部分的用户窗口子系统。
PCT/CN1997/000003 1996-02-09 1997-01-20 Systeme de prevention de la reproduction du numero d'un abonne de telephone mobile WO1997029601A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU12999/97A AU1299997A (en) 1996-02-09 1997-01-20 A method for preventing a subscriber number being cloned in a mobile telephone

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN96101116.5 1996-02-09
CN96101116A CN1060006C (zh) 1996-02-09 1996-02-09 移动电话防盗码方法

Publications (1)

Publication Number Publication Date
WO1997029601A1 true WO1997029601A1 (fr) 1997-08-14

Family

ID=5116938

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN1997/000003 WO1997029601A1 (fr) 1996-02-09 1997-01-20 Systeme de prevention de la reproduction du numero d'un abonne de telephone mobile

Country Status (3)

Country Link
CN (1) CN1060006C (zh)
AU (1) AU1299997A (zh)
WO (1) WO1997029601A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100356814C (zh) * 2004-06-28 2007-12-19 华为技术有限公司 Sim卡反克隆方法

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1684411B (zh) * 2004-04-13 2010-04-28 华为技术有限公司 一种验证移动终端用户合法性的方法
CN100388835C (zh) * 2003-11-21 2008-05-14 华为技术有限公司 一种验证移动终端用户合法性的方法
KR20060058325A (ko) * 2004-11-25 2006-05-30 엘지전자 주식회사 이동통신단말기의 불법 복제 방지 방법
CN100375940C (zh) * 2005-05-27 2008-03-19 佛山市顺德区顺达电脑厂有限公司 防止资料遭窃的可携式电子装置
CN104809378A (zh) * 2015-04-30 2015-07-29 山东超越数控电子有限公司 一种kvm本地管理系统用户身份验证设计方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5237612A (en) * 1991-03-29 1993-08-17 Ericsson Ge Mobile Communications Inc. Cellular verification and validation system
US5241598A (en) * 1991-05-22 1993-08-31 Ericsson Ge Mobile Communications, Inc. Rolling key resynchronization in cellular verification and validation system
US5420908A (en) * 1993-03-11 1995-05-30 At&T Corp. Method and apparatus for preventing wireless fraud

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5237612A (en) * 1991-03-29 1993-08-17 Ericsson Ge Mobile Communications Inc. Cellular verification and validation system
US5241598A (en) * 1991-05-22 1993-08-31 Ericsson Ge Mobile Communications, Inc. Rolling key resynchronization in cellular verification and validation system
US5420908A (en) * 1993-03-11 1995-05-30 At&T Corp. Method and apparatus for preventing wireless fraud

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100356814C (zh) * 2004-06-28 2007-12-19 华为技术有限公司 Sim卡反克隆方法

Also Published As

Publication number Publication date
CN1182339A (zh) 1998-05-20
AU1299997A (en) 1997-08-28
CN1060006C (zh) 2000-12-27

Similar Documents

Publication Publication Date Title
US7400906B2 (en) Mobile communication terminal
US9119078B2 (en) Mobile terminal apparatus
JP3008441B2 (ja) セキュリティモジュール
US6463276B1 (en) Mobile terminal having conditional blocking of outgoing call requests
JP3052244B2 (ja) 移動通信システムにおける移動機の登録方法とicカードの登録方法、及びそれらを実現するための移動機、icカード、及びicカード挿入型移動機
EP1827049B1 (en) Authentication vector generating device, subscriber authentication module, mobile communication system and authentication vector generation method
JP2001308850A (ja) 通信端末装置によるネットワークへの接続方法および装置
JPH09322239A (ja) 携帯電話等の移動体通信機の不正使用防止方法および該方法を実現する不正使用防止システム
WO1997008907A1 (en) Method for foiling cellular telephone cloning
KR20050079128A (ko) 이동 통신 단말기의 사용제한 설정 방법
US6741872B1 (en) Method of authorizing access to a cellular mobile radio network from a simplified telephone and an associated mobile radio system and simplified telephone
JP3350012B2 (ja) 移動端末認証方式
CN104581676B (zh) 通信系统、移动通信装置以及用户识别信息的切换方法
JP2001230858A (ja) 携帯電話システム及び携帯電話機
WO1997029601A1 (fr) Systeme de prevention de la reproduction du numero d'un abonne de telephone mobile
JP3788700B2 (ja) 携帯電話機
US20070142086A1 (en) Method of securing a mobile telephone identifier and corresponding mobile telephone
PL192616B1 (pl) Sposób eksploatacji bezprzewodowego systemu łączności i bezprzewodowy system łączności
KR100591341B1 (ko) 스마트 카드를 사용하여 사용자 인증이 가능한 이동통신단말기 및 인증방법
JP2004289690A (ja) 携帯端末装置
KR0151901B1 (ko) 비밀 번호를 이용한 이동 단말기 인증 방법
JP2895038B1 (ja) 移動通信用端末及びその不正使用規制方法
JP2708083B2 (ja) クレジットカード課金簡易ダイヤル操作サービス装置
KR100641167B1 (ko) 이동통신단말기의 초기화 방법
JP4019059B2 (ja) 認証機能付きデータ回線終端装置及びデータ通信における認証方法

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG US UZ VN AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 97528023

Format of ref document f/p: F

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase