WO2013082753A1 - 移动终端的防盗方法及装置 - Google Patents

移动终端的防盗方法及装置 Download PDF

Info

Publication number
WO2013082753A1
WO2013082753A1 PCT/CN2011/083524 CN2011083524W WO2013082753A1 WO 2013082753 A1 WO2013082753 A1 WO 2013082753A1 CN 2011083524 W CN2011083524 W CN 2011083524W WO 2013082753 A1 WO2013082753 A1 WO 2013082753A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
mobile
identification information
mobile user
user
Prior art date
Application number
PCT/CN2011/083524
Other languages
English (en)
French (fr)
Inventor
张军伟
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2011/083524 priority Critical patent/WO2013082753A1/zh
Priority to CN201180003417.8A priority patent/CN102726079B/zh
Publication of WO2013082753A1 publication Critical patent/WO2013082753A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to an anti-theft method and apparatus for a mobile terminal.
  • MS Mobile Station
  • SIM Subscriber Identity
  • customer identification module customer identification module
  • UIM User Identity Model, User Identification Module
  • the user can only report the loss of the SIM card/UIM card. After the loss report, the user can apply for a new SIM card/UIM and retain the above-mentioned lost SIM card/UIM card.
  • the mobile number but can not find the MS thief, the user can not recover the economic loss.
  • Embodiments of the present invention provide an anti-theft method and apparatus for an MS to implement finding an illegal mobile user using a lost MS.
  • An anti-theft method for a mobile terminal where the network side stores the correspondence between the identification information of the mobile terminal and the identification information of the mobile user using the mobile terminal, including:
  • the network side queries the corresponding relationship according to the information that the legitimate mobile user reports the loss, and obtains the identification information of the lost mobile terminal.
  • the network side determines, according to the information of the lost mobile terminal, that the illegal mobile user uses the lost mobile terminal, and obtains the identification information of the illegal mobile user.
  • An anti-theft device for a mobile terminal comprising:
  • a correspondence relationship storage module configured to store, on the network side, a correspondence between the identification information of the mobile terminal and the identification information of the mobile user using the mobile terminal;
  • the method for obtaining the lost mobile terminal identification information is used to query the corresponding relationship according to the information that the legal mobile user reports the loss, and obtain the identification information of the lost mobile terminal;
  • An illegal mobile user obtaining module configured to determine, according to the information of the lost mobile terminal obtained by the lost mobile terminal identification information acquiring module, that the illegal mobile user uses the lost mobile terminal, and obtains the identifier of the illegal mobile user information.
  • the network side can search for the corresponding relationship between the identification information of the mobile terminal and the identification information of the mobile user using the mobile terminal on the network side.
  • the lost MS can be recovered by certain means, and a part of the economic loss is reduced for the legitimate mobile user who lost the MS.
  • FIG. 1 is a flowchart of processing an anti-theft method of an MS according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of processing a correspondence between storing identifier information of an MDN and an MS on a network side according to Embodiment 2 of the present invention
  • FIG. 3 is a flowchart of a method for acquiring identification information of an illegal mobile user by a network side according to Embodiment 3 of the present invention
  • FIG. 4 is a process flowchart of a method for acquiring identification information of an illegal mobile user by a network side according to Embodiment 4 of the present invention
  • FIG. 5 is a structural diagram of a specific implementation of an anti-theft device for an MS according to Embodiment 5 of the present invention.
  • the processing flow of the anti-theft method for an MS provided by this embodiment is as shown in FIG. 1 and includes the following processing steps:
  • Step S101 Store, on the network side, a correspondence between the identification information of the MS and the identification information of the mobile user using the MS.
  • the embodiment of the present invention firstly stores the correspondence between the identification information of the MS and the identification information of the mobile user using the MS on the network side.
  • the identification information of the mobile user may be the mobile user's MDN (Mobile) Directory Number, Mobile Directory Number) or IMSI (International Mobile Subscriber Identification Number, International Mobile Subscriber Identity).
  • the identification information of the foregoing MS may be the MEID of the MS (Mobile Equipment Identifier, mobile terminal identification) or ESN (Electronic Serial Number).
  • the network side stores the correspondence between the identifier information of the MS and the identifier information of the mobile user using the MS in the MSC (Mobile).
  • Switching Center Mobile Switching Center
  • VLR Visitor Location Register
  • device identification register device or operator's camping system
  • HLR Home Location Register, home location register
  • Step S102 The network side queries the corresponding relationship according to the information that the legitimate mobile user reports the loss, and obtains the identification information of the lost mobile terminal.
  • the network side can query the corresponding relationship according to the information of the lost mobile user, and obtain the identification information of the corresponding lost MS.
  • the network side may associate the identifier information of the legal mobile user with the identifier information of the lost MS, and store the foregoing relationship with the corresponding relationship.
  • the network side After receiving the message sent by the MS, the network side acquires the identifier information of the MS.
  • the network side After receiving the location registration request or the call message sent by the MS, the network side passes the BSC of the MS (Base Station Controller, Base Station) The controller acquires identification information of the MS.
  • BSC Base Station Controller, Base Station
  • Step S103 The network side determines, according to the identifier information of the lost MS, that the illegal mobile user uses the lost MS, and obtains the identifier information of the illegal mobile user.
  • the network side After receiving the message sent by the MS used by the illegal mobile user, the network side acquires the identifier information of the MS used by the illegal mobile user, and determines, by the network side, the identifier information and the identifier of the MS used by the illegal mobile user. After the identifier information of the lost MS is consistent, it is determined that the illegal mobile user uses the lost MS to obtain the identification information of the illegal mobile user carried in the message;
  • the network side queries the corresponding relationship according to the identifier information of the lost MS, and after the identifier information of the reported lost MS corresponds to multiple mobile users within the legal mobile user, The other mobile users other than the legal mobile user are determined to be the illegal mobile users who use the lost MS, and the identification information of the illegal mobile user is obtained according to the corresponding relationship.
  • the identification information of the illegal mobile user who uses the above-mentioned lost MS is found. Then, the mobile user information corresponding to the identification information of the illegal mobile user can be obtained from the HLR or the camping system.
  • the network side may choose to refuse or agree to use the identification information of the illegal mobile user of the lost MS to enter the network.
  • the network side can store the lost MS by using the corresponding relationship between the identifier information of the MS and the identifier information of the mobile user using the MS on the network side.
  • the identification information of the illegal mobile user can recover the lost MS by certain means, and reduce part of the economic loss for the legitimate mobile user who loses the MS.
  • the processing flow of storing the correspondence between the identifier information of the MS and the identifier information of the mobile user using the MS provided by the embodiment is as shown in FIG. 2, and the specific processing procedure is as follows:
  • Step S201 after the MS of the mobile user is turned on, to the BSC (base station controller, base station)
  • the controller sends a location registration request, and the location registration request carries the IMSI of the mobile user.
  • Step S202 After receiving the location registration request, the BSC sends an MSC (Mobile Switching) Center, Mobile Switching Center) / VLR (Visitor Location The register, the visit location register, sends a location update request, and the location update request carries the IMSI of the mobile user.
  • MSC Mobile Switching
  • VLR Visitor Location
  • Step S203 When the MSC/VLR enables the MS anti-theft function, the MSC/VLR obtains the IMSI of the mobile user using the MS that is carried in the location update request after receiving the location update request.
  • Step S204 The MSC/VLR sends an identifier request of the MS to the BSC.
  • Step S205 After receiving the identification request of the MS, the BSC sends an identity request message to the MS.
  • Step S206 After receiving the identity request message, the MS sends an identity response message carrying the identifier information such as the MEID or the ESN of the MS to the BSC.
  • Step S207 The BSC acquires the MEID or ESN of the MS carried in the identity response message, and sends the MEID or the ESN to the MSC/VLR.
  • Step S208 After receiving the MEID/ESN of the MS sent by the BSC, the MSC/VLR stores the correspondence between the identifier information of the MDN and the IMSI of the mobile user and the identifier information such as the MEID or the ESN of the MS on the network side, for example, in the network.
  • Network element database or EIR (Equipment) in MSC Identity Register, device identification register) The device or operator's billing system or HLR.
  • Step S209 the MSC/VLR sends a location registration permission message to the BSC.
  • Step S210 The BSC sends a location registration permission message to the MS, where the location registration of the MS is successful, and the network can be used normally.
  • the MS security function is enabled on the MSC/VLR, so that the network side can store the identification information of the MS and use the MS according to the message sent by the received MS.
  • the identification information of the mobile user may be the identification information carried in the message sent by the MS or the identification information included in the subscription information of the mobile user.
  • FIG. 3 The processing flow of the method for obtaining the identification information of the illegal mobile user by the network side provided by this embodiment is shown in FIG. 3, and the specific processing procedure is as follows:
  • Step S301 After the MS of the illegal mobile user is turned on, send a location registration request to the BSC, where the location registration request carries the IMSI of the mobile user.
  • Step S302 After receiving the location registration request, the BSC sends a location update request to the MSC/VLR, where the location update request carries the IMSI of the mobile user.
  • Step S303 when the MSC/VLR enables the MS anti-theft function, after the MSC/VLR receives the location registration request, the MSC/VLR sends an identifier request of the MS to the BSC, and the BSC receives the identifier of the MS. After the request, an identity request message is sent to the MS.
  • Step S304 After receiving the identity request message, the MS sends an identity response message carrying the identifier information such as the MEID or the ESN of the MS to the BSC.
  • the BSC obtains the MEID or ESN of the MS carried in the identity response message, and sends the MEID or ESN to the MSC/VLR.
  • Step S305 After receiving the MEID/ESN of the MS sent by the BSC, the MSC/VLR determines whether the MEID/ESN of the MS and the identifier information of the MS that the legitimate mobile user is reporting are consistent. If yes, step S306 is performed; otherwise, the process ends. .
  • Step S306 The MSC/VLR determines that the illegal mobile user uses the lost MS to obtain the identification information of the illegal mobile user carried in the message.
  • the embodiment determines whether the identifier of the MS and the identifier information of the MS that the legitimate mobile user fails to report are consistent, and may be reported after the legitimate mobile user reports the loss.
  • the illegal mobile user can be quickly determined to obtain the identity of the illegal mobile user.
  • FIG. 4 The processing flow of the method for obtaining the identification information of the illegal mobile user by the network side provided by this embodiment is shown in FIG. 4, and the specific processing procedure is as follows:
  • Step S401 According to the processing flow of the foregoing implementation, the corresponding relationship between the identifier information of the MS and the identifier information of the mobile user (including the legal mobile user and the illegal mobile user) using the MS is stored on the network side.
  • Step S402 After the legal mobile user loses the identification information of the legal mobile user or the identifier information of the MS, the network side may query the corresponding relationship according to the information of the lost mobile user, and obtain the identifier information of the corresponding lost MS.
  • Step S403 The network side queries the corresponding relationship according to the identifier information of the lost MS, determines an illegal mobile user that uses the lost MS, and obtains the identification information of the illegal mobile user.
  • the network side queries the corresponding relationship according to the identifier information of the lost MS, and after the identifier information of the reported lost MS corresponds to multiple mobile users within the legal mobile user, Determining, by the mobile user, the mobile user who uses the lost MS as the illegal mobile user of the lost mobile user, and acquiring the identification information of the illegal mobile user according to the corresponding relationship.
  • Embodiment 4 can be used to find an illegal mobile user who uses the lost MS before the loss report, and obtain the illegal mobile user by querying the stored correspondence relationship after the legitimate mobile user reports the loss. logo.
  • the embodiment of the invention further provides an anti-theft device for the MS, and the specific implementation structure is as shown in FIG. 5, which may specifically include:
  • the correspondence relationship storage module 51 is configured to store, on the network side, a correspondence between the identifier information of the MS and the identifier information of the mobile user using the MS.
  • the identifier information of the mobile user may be an MDN or an IMSI of the mobile user.
  • the identification information of the foregoing MS may be the MEID or ESN of the MS.
  • the hangout MS identification information obtaining module 52 is configured to query the corresponding relationship according to the information that the legal mobile user reports the loss, and obtain the identification information of the lost MS.
  • the illegal mobile user obtaining module 53 is configured to determine, according to the lost mobile terminal identification information acquired by the lost mobile terminal identification information acquiring module, that the illegal mobile user uses the lost MS and obtain the identifier of the illegal mobile user. information.
  • the corresponding relationship storage module 51 is further configured to: after receiving the location update request of the MS sent by the BSC of the MS, acquire the identifier information of the mobile user that uses the MS that is carried in the location update request;
  • the identification information of the MS is obtained from the BSC of the MS, and the correspondence between the identification information of the MS and the identification information of the mobile user using the MS is performed on the network side. storage.
  • the corresponding relationship storage module is further configured to store the correspondence between the identifier information of the MS and the identifier information of the mobile user using the MS in a billing system of an MSC or a VLR or an EIR device or an operator, or In the HLR.
  • the report of the lost MS identification information is used to query the corresponding relationship according to the identification information of the legal mobile user that is reported by the legal mobile user or the identification information of the MS, and obtain the identification information of the lost MS.
  • the illegal mobile user obtaining module is further configured to: after receiving the message sent by the MS of the illegal mobile user, acquire the identifier information of the MS, and determine the identifier information of the MS and the lost MS. After the identifier information is consistent, determining that the illegal mobile user uses the lost MS;
  • the multiple mobile users are Other mobile users other than the legitimate mobile user are determined to be illegal mobile users using the lost MS.
  • the illegal mobile user obtaining module is further configured to acquire mobile user information corresponding to the identifier information of the illegal mobile user from an HLR or a camping system.
  • the device is disposed in an MSC or a VLR.
  • the storage medium may be a magnetic disk, an optical disk, or a read-only storage memory (Read-Only) Memory, ROM) or Random Access Memory (RAM).
  • the embodiment of the present invention stores the correspondence between the identification information of the mobile user and the identification information of the MS on the network side, so that the network side can find the information such as the MDN of the illegal mobile user using the lost MS, and can pass certain The means to recover lost MS, reducing part of the economic loss for legitimate mobile users who lost MS.
  • the embodiment of the present invention determines whether the identifier of the MS and the identifier information of the MS that the legitimate mobile user fails to report are consistent. After the legitimate mobile user reports the loss, the illegal mobile user can quickly determine the illegal movement after being turned on. User, obtain the ID of the illegal mobile user.
  • the embodiment of the present invention can obtain an illegal mobile user who uses the lost MS before the loss report and obtain the identifier of the illegal mobile user by querying the stored correspondence relationship after the legal mobile user reports the loss.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明涉及一种移动终端的防盗方法及装置。该方法主要包括:在网络侧存储移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系,网络侧根据所述挂失的移动终端的标识信息确定非法移动用户使用了所述挂失的移动终端后,获取所述非法移动用户的标识信息。本发明实施例通过在网络侧存储移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系,使得网络侧可以查找到使用丢失的移动终端的非法移动用户的标识信息。

Description

移动终端的防盗方法及装置
技术领域
本发明涉及无线通信技术领域,尤其涉及一种移动终端的防盗方法及装置。
发明背景
目前MS(Mobile Station,移动终端)和SIM(Subscriber Identity Module,客户识别模块)卡/UIM(User Identity Model,用户识别模块)卡基本是分离的,用户可以在不更换MS的情况下使用新移动号码。因此,在MS丢失或者被盗后,新的主人可以更新号码来继续使用该MS。
目前,在MS和SIM卡/UIM卡丢失后,用户只能对SIM卡/UIM卡进行挂失,在挂失后用户可以申请一个新的SIM卡/UIM,并保留上述丢失的SIM卡/UIM卡对应的移动号码,但是无法找到MS的盗用者,为用户无法挽回经济损失。
发明内容
本发明的实施例提供了一种MS的防盗方法及装置,以实现找到使用丢失MS的非法移动用户。
一种移动终端的防盗方法,在网络侧存储移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系,包括:
网络侧根据合法移动用户挂失的信息查询所述对应关系,获取挂失的移动终端的标识信息;
所述网络侧根据所述挂失的移动终端的标识信息确定非法移动用户使用了所述挂失的移动终端后,获取所述非法移动用户的标识信息。
一种移动终端的防盗装置,包括:
对应关系存储模块,用于在网络侧存储移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系;
挂失移动终端标识信息获取模块,用于根据合法移动用户挂失的信息查询所述对应关系,获取挂失的移动终端的标识信息;
非法移动用户获取模块,用于根据所述挂失移动终端标识信息获取模块所获取的挂失的移动终端的标识信息确定非法移动用户使用了所述挂失的移动终端后,获取所述非法移动用户的标识信息。
由上述本发明的实施例提供的技术方案可以看出,本发明实施例通过在网络侧存储移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系,使得网络侧可以查找到使用丢失的MS的非法移动用户的标识信息,可以通过一定的手段收回丢失的MS,为丢失MS的合法移动用户减少一部分经济损失。
附图简要说明
图1为本发明实施例一提供的一种MS的防盗方法的处理流程图;
图2为本发明实施例二提供的一种在网络侧存储MDN和MS的标识信息的对应关系的处理流程图;
图3为本发明实施例三提供的一种网络侧获取非法移动用户的标识信息的方法的处理流程图;
图4为本发明实施例四提供的一种网络侧获取非法移动用户的标识信息的方法的处理流程图;
图5为本发明实施例五提供的一种MS的防盗装置的具体实现结构图。
实施本发明的方式
下面将参考附图详细说明本发明实施例。
实施例一
该实施例提供的一种MS的防盗方法的处理流程如图1所示,包括如下的处理步骤:
步骤S101、在网络侧存储MS的标识信息和使用所述MS的移动用户的标识信息的对应关系。
本发明实施例首先要在网络侧存储MS的标识信息和使用所述MS的移动用户的标识信息的对应关系。上述移动用户的标识信息可以为移动用户的MDN(Mobile Directory Number,移动用户号码簿号码)或者IMSI(International Mobile Subscriber Identification Number,国际移动用户识别码)。上述MS的标识信息可以为MS的MEID( Mobile Equipment Identifier,移动终端标识)或者ESN(Electronic Serial Number,电子序列号)。
可选的,所述网络侧将所述MS的标识信息和使用所述MS的移动用户的标识信息的对应关系存储在MSC(Mobile Switching Center,移动交换中心)或者VLR(Visitor Location Register,拜访位置寄存器)或者设备标识寄存器设备或者运营商的营帐系统或者HLR(Home Location Register,归属位置寄存器)中。
步骤S102、网络侧根据合法移动用户挂失的信息查询所述对应关系,获取挂失的移动终端的标识信息。
然后,在合法移动用户挂失了合法移动用户的标识信息或者MS的标识信息后,网络侧可以根据合法移动用户挂失的标识信息查询所述对应关系,获取对应的挂失的MS的标识信息。
可选的,网络侧可以将所述合法移动用户的标识信息和所述挂失的MS的标识信息进行关联存储,并且,和上述对应关系存储在一起。
网络侧接收到MS发送的消息后,获取所述MS的标识信息。
网络侧接收到MS发送的位置登记请求或者呼叫消息后,通过所述MS的BSC(基站控制器,Base Station Controller)获取所述MS的标识信息。
步骤S103、所述网络侧根据所述挂失的MS的标识信息确定非法移动用户使用了所述挂失的MS后,获取所述非法移动用户的标识信息。
具体的,所述网络侧接收到非法移动用户使用的MS发送的消息后,获取所述非法移动用户使用的MS的标识信息,当所述网络侧确定非法移动用户使用的MS的标识信息和所述挂失的MS的标识信息一致后,确定非法移动用户使用了所述挂失的MS,获取所述消息中携带的所述非法移动用户的标识信息;
或者,
所述网络侧根据所述挂失的MS的标识信息查询所述对应关系,当查询到所述挂失的MS的标识信息对应了包括所述合法移动用户之内的多个移动用户后,将所述多个移动用户中除了所述合法移动用户之外的其它移动用户确定为使用了所述挂失的MS的非法移动用户,根据所述对应关系获取所述非法移动用户的标识信息。
于是,就找到了使用上述挂失的MS的非法移动用户的标识信息。然后,可以从HLR或者营帐系统获取所述非法移动用户的标识信息对应的移动用户信息。
之后,上述网络侧可以选择拒绝或者同意使用上述挂失的MS的非法移动用户的标识信息入网。
由上述实施例一提供的技术方案可以看出,该实施例通过在网络侧存储MS的标识信息和使用所述MS的移动用户的标识信息的对应关系,使得网络侧可以查找到使用丢失的MS的非法移动用户的标识信息,可以通过一定的手段收回丢失的MS,为丢失MS的合法移动用户减少一部分经济损失。
实施例二
该实施例提供的一种在网络侧存储MS的标识信息和使用所述MS的移动用户的标识信息的对应关系的处理流程如图2所示,具体处理过程如下:
步骤S201、移动用户的MS在开机后,向BSC(基站控制器,base station controller)发送位置登记请求,该位置登记请求中携带了上述移动用户的IMSI。
步骤S202、BSC接收到上述位置登记请求后,向MSC(Mobile Switching Center,移动交换中心)/VLR(Visitor Location Register,拜访位置寄存器)发送位置更新请求,该位置更新请求中携带了上述移动用户的IMSI。
步骤S203、当所述MSC/VLR开启了MS防盗功能时,MSC/VLR接收到上述位置更新请求后,获取所述位置更新请求中携带的使用所述MS的移动用户的IMSI。
步骤S204、所述MSC/VLR向所述BSC发送上述MS的标识请求。
步骤S205,BSC接收到该MS的标识请求后,向MS发送身份请求消息。
步骤S206、MS接收到该身份请求消息后,向BSC发送携带MS的MEID或者ESN等标识信息的身份响应消息。
步骤S207、BSC获取上述身份响应消息中携带的MS的MEID或者ESN,并发送给MSC/VLR。
步骤S208、MSC/VLR接收到BSC发送的MS的MEID/ESN后,将上述移动用户的MDN和IMSI等标识信息和MS的MEID或者ESN等标识信息的对应关系在网络侧进行存储,比如存储在MSC中网元数据库或者EIR(Equipment Identity Register,设备标识寄存器)设备或者运营商的营帐系统或者HLR中。
步骤S209、然后,MSC/VLR向上述BSC发送位置登记允许消息。
步骤S210、BSC向MS发送位置登记允许消息,上述MS的位置登记成功,可以正常使用网络。
由上述实施例二提供的技术方案可以看出,该实施例通过在MSC/VLR开启了MS防盗功能,使得网络侧可以根据接收到的MS发送的消息来存储MS的标识信息和使用所述MS的移动用户的标识信息的对应关系。上述移动用户的标识信息可以为MS发送的消息中携带的标识信息或者移动用户的签约信息中包含的标识信息。
实施例三
该实施例提供的一种网络侧获取非法移动用户的标识信息的方法的处理流程如图3所示,具体处理过程如下:
步骤S301、非法移动用户的MS在开机后,向BSC发送位置登记请求,该位置登记请求中携带了上述移动用户的IMSI。
步骤S302、BSC接收到上述位置登记请求后,向MSC/VLR发送位置更新请求,该位置更新请求中携带了上述移动用户的IMSI。
步骤S303、当所述MSC/VLR开启了MS防盗功能时,MSC/VLR接收到上述位置登记请求后,所述MSC/VLR向所述BSC发送上述MS的标识请求,BSC接收到该MS的标识请求后,向MS发送身份请求消息。
步骤S304、MS接收到该身份请求消息后,向BSC发送携带MS的MEID或者ESN等标识信息的身份响应消息。BSC获取该身份响应消息中携带的MS的MEID或者ESN,并发送给MSC/VLR。
步骤S305、MSC/VLR接收到BSC发送的MS的MEID/ESN后,判断上述MS的MEID/ESN和合法移动用户挂失的MS的标识信息是否一致,如果是,则执行步骤S306;否则,流程结束。
步骤S306、MSC/VLR确定上述非法移动用户使用了所述挂失的MS,获取所述消息中携带的所述非法移动用户的标识信息。
由上述实施例三提供的技术方案可以看出,该实施例通过接收到MS发送的消息后,判断MS的标识和合法移动用户挂失的MS的标识信息是否一致,可以在合法移动用户挂失后,非法移动用户一开机就能迅速地确定非法移动用户,获取非法移动用户的标识。
实施例四
该实施例提供的一种网络侧获取非法移动用户的标识信息的方法的处理流程如图4所示,具体处理过程如下:
步骤S401、按照上述实施二的处理流程,在网络侧存储MS的标识信息和使用所述MS的移动用户(包括合法移动用户、非法移动用户)的标识信息的对应关系。
步骤S402、在合法移动用户挂失了合法移动用户的标识信息或者上述MS的标识信息后,网络侧可以根据合法移动用户挂失的标识信息查询所述对应关系,获取对应的挂失的MS的标识信息。
步骤S403、网络侧根据所述挂失的MS的标识信息查询所述对应关系,确定使用了所述挂失的MS的非法移动用户,并获取所述非法移动用户的标识信息。
具体的,所述网络侧根据所述挂失的MS的标识信息查询所述对应关系,当查询到所述挂失的MS的标识信息对应了包括所述合法移动用户之内的多个移动用户后,将所述多个移动用户中除了所述合法移动用户之外的其它移动用户确定为使用了所述挂失的MS的非法移动用户,根据所述对应关系获取所述非法移动用户的标识信息。
由上述实施例四提供的技术方案可以看出,该实施例可以实现在合法移动用户挂失后,通过查询存储的对应关系来找到在挂失前使用挂失的MS的非法移动用户,获取非法移动用户的标识。
实施例五
本发明实施例还提供一种MS的防盗装置,其具体实现结构如图5所示,具体可以包括:
对应关系存储模块51,用于在网络侧存储MS的标识信息和使用所述MS的移动用户的标识信息的对应关系;上述移动用户的标识信息可以为移动用户的MDN或者IMSI。上述MS的标识信息可以为MS的MEID或者ESN。
挂失MS标识信息获取模块52,用于根据合法移动用户挂失的信息查询所述对应关系,获取挂失的MS的标识信息。
非法移动用户获取模块53,用于根据所述挂失移动终端标识信息获取模块所获取的挂失的移动终端的标识信息确定非法移动用户使用了所述挂失的MS后,获取所述非法移动用户的标识信息。
具体的,所述的对应关系存储模块51,还用于接收到MS的BSC发送的MS的位置更新请求后,获取所述位置更新请求中携带的使用所述MS的移动用户的标识信息;
当所述装置开启了MS防盗功能时,从所述MS的BSC获取所述MS的标识信息,将所述MS的标识信息和使用所述MS的移动用户的标识信息的对应关系在网络侧进行存储。
具体的,所述的对应关系存储模块,还用于将所述MS的标识信息和使用所述MS的移动用户的标识信息的对应关系存储在MSC或者VLR或者EIR设备或者运营商的营帐系统或者HLR中。
具体的,所述的挂失MS标识信息获取模块,还用于根据合法移动用户挂失的合法移动用户的标识信息或者MS的标识信息查询所述对应关系,获取挂失的MS的标识信息。
具体的,所述的非法移动用户获取模块,还用于接收到非法移动用户的MS发送的消息后,获取所述MS的标识信息,当确定所述MS的标识信息和所述挂失的MS的标识信息一致后,确定所述非法移动用户使用了所述挂失的MS;
或者,
根据所述挂失的MS的标识信息查询所述对应关系,当查询到所述挂失的MS的标识信息对应了包括所述合法移动用户之内的多个移动用户后,将所述多个移动用户中的除了所述合法移动用户之外的其它移动用户确定为使用了所述挂失的MS的非法移动用户。
具体的,所述的非法移动用户获取模块,还用于从HLR或者营帐系统获取所述非法移动用户的标识信息对应的移动用户信息。
进一步地,所述装置设置于MSC或者VLR中。
应用本发明实施例的装置进行MS的防盗处理的具体过程与前述方法实施例类似,此处不再赘述。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
综上所述,本发明实施例通过在网络侧存储移动用户的标识信息和MS的标识信息的对应关系,使得网络侧可以查找到使用丢失的MS的非法移动用户的MDN等信息,可以通过一定的手段收回丢失的MS,为丢失MS的合法移动用户减少一部分经济损失。
本发明实施例通过接收到MS发送的消息后,判断MS的标识和合法移动用户挂失的MS的标识信息是否一致,可以在合法移动用户挂失后,非法移动用户一开机就能迅速地确定非法移动用户,获取非法移动用户的标识。
本发明实施例可以实现在合法移动用户挂失后,通过查询存储的对应关系来找到在挂失前使用挂失的MS的非法移动用户,获取非法移动用户的标识。
以上所述,仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应该以权利要求的保护范围为准。

Claims (14)

  1. 一种移动终端的防盗方法,其特征在于,在网络侧存储移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系,包括:
    网络侧根据合法移动用户挂失的信息查询所述对应关系,获取挂失的移动终端的标识信息;
    所述网络侧根据所述挂失的移动终端的标识信息确定非法移动用户使用了所述挂失的移动终端后,获取所述非法移动用户的标识信息。
  2. 根据权利要求1所述的移动终端的防盗方法,其特征在于,所述在网络侧存储移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系,包括:
    移动交换中心或者拜访位置寄存器接收到移动终端的基站控制器发送的移动终端的位置更新请求后,获取所述位置更新请求中携带的使用所述移动终端的移动用户的标识信息;
    当所述移动交换中心或者拜访位置寄存器开启移动终端防盗功能时,所述移动交换中心或者拜访位置寄存器从所述移动终端的基站控制器获取所述移动终端的标识信息;
    所述移动交换中心或者拜访位置寄存器将所述移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系在网络侧进行存储。
  3. 根据权利要求1或2所述的移动终端的防盗方法,其特征在于,所述在网络侧存储所述移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系,包括:
    将所述移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系存储在移动交换中心或者拜访位置寄存器或者设备标识寄存器设备或者运营商的营帐系统或者归属位置寄存器中。
  4. 根据权利要求1或2或3所述的移动终端的防盗方法,其特征在于,所述网络侧根据合法移动用户挂失的信息查询所述对应关系,获取挂失的移动终端的标识信息,包括:
    网络侧根据合法移动用户挂失的合法移动用户的标识信息或者移动终端的标识信息查询所述对应关系,获取挂失的移动终端的标识信息。
  5. 根据权利要求1至4任一项所述的移动终端的防盗方法,其特征在于,所述移动用户的标识信息包括移动用户的移动用户号码簿号码或者国际移动用户识别码,所述移动终端的标识信息包括移动终端的移动终端标识或者电子序列号。
  6. 根据权利要求1至5任一项所述的移动终端的防盗方法,其特征在于,所述网络侧根据所述挂失的移动终端的标识信息确定非法移动用户使用了所述挂失的移动终端后,获取所述非法移动用户的标识信息,包括:
    所述网络侧接收到非法移动用户的移动终端发送的消息后,获取所述非法移动用户的移动终端的标识信息,当所述网络侧确定所述非法移动用户的移动终端的标识信息和所述挂失的移动终端的标识信息一致后,确定非法移动用户使用了所述挂失的移动终端,获取所述消息中携带的所述非法移动用户的标识信息;
    或者,
    所述网络侧根据所述挂失的移动终端的标识信息查询所述对应关系,当查询到所述挂失的移动终端的标识信息对应了包括所述合法移动用户之内的多个移动用户后,将所述多个移动用户中除了所述合法移动用户之外的其它移动用户确定为使用了所述挂失的移动终端的非法移动用户,根据所述对应关系获取所述非法移动用户的标识信息。
  7. 根据权利要求1所述的移动终端的防盗方法,其特征在于,所述的获取所述非法移动用户的标识信息之后,还包括:
    从归属位置寄存器或者营帐系统获取所述非法移动用户的标识信息对应的移动用户信息。
  8. 一种移动终端的防盗装置,其特征在于,包括:
    对应关系存储模块,用于在网络侧存储移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系;
    挂失移动终端标识信息获取模块,用于根据合法移动用户挂失的信息查询所述对应关系,获取挂失的移动终端的标识信息;
    非法移动用户获取模块,用于根据所述挂失移动终端标识信息获取模块所获取的挂失的移动终端的标识信息确定非法移动用户使用了所述挂失的移动终端后,获取所述非法移动用户的标识信息。
  9. 根据权利要求8所述的移动终端的防盗装置,其特征在于:
    所述的对应关系存储模块,还用于接收到移动终端的基站控制器发送的移动终端的位置更新请求后,获取所述位置更新请求中携带的使用所述移动终端的移动用户的标识信息;当所述装置开启了移动终端防盗功能时,从所述移动终端的基站控制器获取所述移动终端的标识信息;将所述移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系在网络侧进行存储。
  10. 根据权利要求8或9所述的移动终端的防盗装置,其特征在于:
    所述的对应关系存储模块,还用于将所述移动终端的标识信息和使用所述移动终端的移动用户的标识信息的对应关系存储在移动交换中心或者拜访位置寄存器或者设备标识寄存器设备或者运营商的营帐系统或者归属位置寄存器中。
  11. 根据权利要求8或9所述的移动终端的防盗装置,其特征在于:
    所述的挂失移动终端标识信息获取模块,还用于根据合法移动用户挂失的合法移动用户的标识信息或者移动终端的标识信息查询所述对应关系,获取挂失的移动终端的标识信息。
  12. 根据权利要求8至11任一项所述的移动终端的防盗装置,其特征在于:
    所述的非法移动用户获取模块,还用于接收到非法移动用户的移动终端发送的消息后,获取所述非法移动用户的移动终端的标识信息,当确定所述非法移动用户的移动终端的标识信息和所述挂失的移动终端的标识信息一致后,确定所述非法移动用户使用了所述挂失的移动终端,获取所述消息中携带的所述非法移动用户的标识信息;
    或者,
    根据所述挂失的移动终端的标识信息查询所述对应关系,当查询到所述挂失的移动终端的标识信息对应了包括所述合法移动用户之内的多个移动用户后,将所述多个移动用户中的除了所述合法移动用户之外的其它移动用户确定为使用了所述挂失的移动终端的非法移动用户,根据所述对应关系获取所述非法移动用户的标识信息。
  13. 根据权利要求8 所述的移动终端的防盗装置,其特征在于:
    所述的非法移动用户获取模块,还用于从归属位置寄存器或者营帐系统获取所述非法移动用户的标识信息对应的移动用户信息。
  14. 根据权利要求8至13任一项所述的移动终端的防盗装置,其特征在于,所述装置设置于移动交换中心或者拜访位置寄存器中。
PCT/CN2011/083524 2011-12-06 2011-12-06 移动终端的防盗方法及装置 WO2013082753A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2011/083524 WO2013082753A1 (zh) 2011-12-06 2011-12-06 移动终端的防盗方法及装置
CN201180003417.8A CN102726079B (zh) 2011-12-06 2011-12-06 移动终端的防盗方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2011/083524 WO2013082753A1 (zh) 2011-12-06 2011-12-06 移动终端的防盗方法及装置

Publications (1)

Publication Number Publication Date
WO2013082753A1 true WO2013082753A1 (zh) 2013-06-13

Family

ID=46950498

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/083524 WO2013082753A1 (zh) 2011-12-06 2011-12-06 移动终端的防盗方法及装置

Country Status (2)

Country Link
CN (1) CN102726079B (zh)
WO (1) WO2013082753A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113038371A (zh) * 2021-03-08 2021-06-25 读书郎教育科技有限公司 一种电话手表的找回方法

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105335677A (zh) * 2014-07-24 2016-02-17 小米科技有限责任公司 移动终端防盗的方法及装置

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1395407A (zh) * 2001-07-05 2003-02-05 致福股份有限公司 移动电话防盗窃的设定及其运作方法
CN1620165A (zh) * 2003-11-21 2005-05-25 华为技术有限公司 一种移动终端用户合法性的验证方法
CN1691804A (zh) * 2004-04-22 2005-11-02 上海迪比特实业有限公司 一种有助于找回丢失移动电话的方法
CN101184303A (zh) * 2007-12-18 2008-05-21 深圳华为通信技术有限公司 一种移动终端防盗方法和装置
CN101640722A (zh) * 2009-05-19 2010-02-03 上海闻泰电子科技有限公司 带有安防功能的手机及其安防方法
CN101720072A (zh) * 2009-12-10 2010-06-02 候万春 一种实现手机反盗的系统和方法
JP2011002873A (ja) * 2009-06-16 2011-01-06 Nec Corp 応答装置、応答方法、及び応答装置制御プログラム

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7466976B2 (en) * 2003-10-14 2008-12-16 Siemens Aktiengesellschaft Method for securing data traffic between mobile radio network and IMS network

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1395407A (zh) * 2001-07-05 2003-02-05 致福股份有限公司 移动电话防盗窃的设定及其运作方法
CN1620165A (zh) * 2003-11-21 2005-05-25 华为技术有限公司 一种移动终端用户合法性的验证方法
CN1691804A (zh) * 2004-04-22 2005-11-02 上海迪比特实业有限公司 一种有助于找回丢失移动电话的方法
CN101184303A (zh) * 2007-12-18 2008-05-21 深圳华为通信技术有限公司 一种移动终端防盗方法和装置
CN101640722A (zh) * 2009-05-19 2010-02-03 上海闻泰电子科技有限公司 带有安防功能的手机及其安防方法
JP2011002873A (ja) * 2009-06-16 2011-01-06 Nec Corp 応答装置、応答方法、及び応答装置制御プログラム
CN101720072A (zh) * 2009-12-10 2010-06-02 候万春 一种实现手机反盗的系统和方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113038371A (zh) * 2021-03-08 2021-06-25 读书郎教育科技有限公司 一种电话手表的找回方法

Also Published As

Publication number Publication date
CN102726079B (zh) 2014-07-30
CN102726079A (zh) 2012-10-10

Similar Documents

Publication Publication Date Title
JP7234342B2 (ja) Diameterエッジエージェントを利用して下りローミング加入者のために時間距離セキュリティ対策を行うための方法、システム、およびコンピュータ読み取り可能な媒体
JP2021529475A5 (zh)
EP2457394B1 (en) Terminal identifiers in a communications network
US7570941B2 (en) Method enabling detection of stolen mobile communication devices and systems thereof
EP2134061B1 (en) Method and system for protection against the unauthorised use of a terminal
WO2017049984A1 (zh) 一种无线网络的接入方法及无线访问节点
JP2009510960A (ja) 移動体ネットワークにおいてホーム・ロケーション・レジスタを更新する方法およびシステム
WO2012075906A1 (zh) 处理ps域业务、实现ps域业务请求的方法和移动终端
JPH10504957A (ja) 通信システムにおける認証方法および装置
WO2015065138A1 (en) Distributed locker service system, and control method therefor
WO2015165149A1 (zh) 配置方法、ProSe密钥管理功能实体、终端、系统和存储介质
JP2000184447A (ja) 移動通信システム及びクローン端末検出方法
WO2013097332A1 (zh) 一种终端组的管理方法和系统
WO2010124579A1 (zh) 终端保护方法及系统
CN100576956C (zh) 通过归属位置寄存器修改的移动终端身份保护
CN104717600B (zh) 一种m2m终端/终端外设的可及性管理方法及设备
JP2005536122A5 (zh)
WO2012151941A1 (zh) 终端组的移动性管理实体选择方法及系统
WO2012113178A1 (zh) 检测终端连接丢失的方法及装置
WO2013082753A1 (zh) 移动终端的防盗方法及装置
WO2011044816A1 (zh) 用户设备的监控方法及监控装置
US9872124B2 (en) Mobility management method and system in M2M network
WO2012174829A1 (zh) 短消息处理方法及装置
WO2013123716A1 (zh) 一种监控终端行为异常的方法和系统
JP6008412B1 (ja) 通信制御装置、通話制御方法及び通話制御プログラム

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180003417.8

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11876988

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11876988

Country of ref document: EP

Kind code of ref document: A1