WO2006122445A1 - A method for identifying validation of mobile terminal - Google Patents

A method for identifying validation of mobile terminal Download PDF

Info

Publication number
WO2006122445A1
WO2006122445A1 PCT/CN2005/000689 CN2005000689W WO2006122445A1 WO 2006122445 A1 WO2006122445 A1 WO 2006122445A1 CN 2005000689 W CN2005000689 W CN 2005000689W WO 2006122445 A1 WO2006122445 A1 WO 2006122445A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
information
authentication device
mobile
identified
Prior art date
Application number
PCT/CN2005/000689
Other languages
French (fr)
Chinese (zh)
Inventor
Yijun Guo
Original Assignee
Zte Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zte Corporation filed Critical Zte Corporation
Priority to CN2005800497511A priority Critical patent/CN101176368B/en
Priority to PCT/CN2005/000689 priority patent/WO2006122445A1/en
Publication of WO2006122445A1 publication Critical patent/WO2006122445A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity

Definitions

  • the invention relates to a method for identifying the legitimacy of a mobile terminal, in particular to a method for identifying the legitimacy of a mobile terminal by setting a central database and a peripheral authentication device arranged according to a regional distribution in a mobile communication network.
  • Mobile network security is an important part of network operation. In terms of how to implement network security, related communication protocols are described in detail. For example, through the authentication function provided by the network, the mobile network realizes the identification of the user identity. In addition, by setting the EIR (Equipment Identification Register) device, the legitimacy of the mobile terminal itself can be identified.
  • EIR Equipment Identification Register
  • the authentication function of the network is widely used, effectively preventing the access of illegal users, thereby protecting the interests of operators and legitimate users.
  • EIR electronic IR
  • the use of EIR to prevent the use of illegal mobile terminals is far from enough.
  • the most common phenomenon in life is that some mobile terminals that have been stolen are still used on the Internet, although users who lose mobile terminals can stop by. Means to minimize their own losses, but because the mobile network lacks the check of the legitimacy of the mobile terminal itself, it cannot fundamentally effectively prevent the theft of the mobile terminal, which seriously damages the vital interests of legitimate users.
  • EIR is put into use. Although it is possible to identify the legality of the mobile terminal, it is necessary to first establish an EIR containing the information of the national mobile terminal in the mobile communication network. However, for countries with large areas of land and large numbers of mobile users, it is almost impossible for operators to establish a nationwide EIR device. This is because the EIR equipment implemented by current technology cannot meet the processing power. Claim. Summary of the invention
  • the object of the present invention is to address the processing capability of the EIR device implemented by the above prior art. It is unable to satisfy the current situation of legal identification of a large area of land and a large number of mobile terminals, and provides a method for identifying the legitimacy of a mobile terminal.
  • the method identifies the network through a mobile terminal set in the mobile network, and transmits, stores, and authenticates through information. The process can quickly identify the legitimacy of each mobile terminal, so that the illegal mobile terminal cannot enter the mobile communication network.
  • the present invention employs a method for identifying the legitimacy of a mobile terminal, including the following steps:
  • Step 1 The connection service device in the mobile communication network sends the international mobile device identification information of the mobile terminal to be identified to the peripheral authentication device, and simultaneously sends the face certificate request information; the peripheral authentication device is set according to the jurisdiction distribution.
  • the international mobile device identification information is in a mapping relationship with its own state information;
  • the central database is configured to store state information of all mobile terminals in the mobile communication network and a flag of a peripheral authentication device corresponding to a jurisdiction in which each mobile terminal is located Information, and communicating with all of the identification devices;
  • the status information is to allow or disallow the mobile terminal to access information in the mobile communication network;
  • Step 2 the peripheral authentication device is based on the international mobile device identification information Find and get Determining status information of the mobile terminal;
  • Step 3 the peripheral authentication device identifies the legitimacy of the mobile terminal to be identified according to the status information, and returns the recognition result to the connection service device, and then proceeds to step 4;
  • Step 4 Perform legality identification of the mobile terminal.
  • the connection service device may be a mobile switching center distributed in the mobile communication network, or may be a GPRS service support node.
  • the distributed peripheral multiple authentication devices and the central database constitute a mobile terminal legality identification network embedded in the mobile communication network.
  • the state information data of all mobile terminals in the mobile communication network is saved in the central database, and the central database can back up the state information of each mobile terminal to the peripheral authentication device of the jurisdiction in which it is located, so that Mobile switching center within the jurisdiction or
  • the GPRS service support node can identify the legitimacy of the mobile terminal through the peripheral authentication device.
  • the first booting and roaming of the mobile terminal often occurs.
  • the peripheral authentication device can also search for and obtain the state information of the mobile terminal to be identified according to the international mobile device identification information, and can also go to the central database.
  • the central database further has the flag information stored in the mobile terminal according to the identifier information of the peripheral authentication device corresponding to the current jurisdiction of the mobile terminal. The operation of updating the flag information of the peripheral authentication device and requesting the peripheral authentication device corresponding to the jurisdiction in which the mobile terminal is roaming to delete the state information of the mobile terminal.
  • the present invention forms a legality identification network by embedding a distributed peripheral authentication device and a central database in a mobile communication network, and realizes the interaction by connecting the service device with the information of the peripheral authentication device. Identification of the legitimacy of all mobile terminals.
  • FIG. 1 is a schematic structural diagram of a legality identification network of a distributed mobile terminal according to the present invention
  • FIG. 2 is a flowchart of the present invention
  • FIG. 3 is a flow diagram of one embodiment of the present invention. detailed description
  • the implementation of the present invention is based on a mobile terminal legality identification network composed of a distributed peripheral authentication device and a central database.
  • the mobile terminal legality identification network is embedded in the mobile communication network, and its composition is as shown in FIG.
  • the peripheral authentication device 1 performs distribution setting according to a preset mobile communication jurisdiction. All of the peripheral authentication devices 1 are in communication connection with the central database 2.
  • Each of the peripheral authentication devices 1 is connected to a mobile switching center or GPRS service support node (MSC/SGSN) 3 in its jurisdiction.
  • MSC/SGSN GPRS service support node
  • Each authentication device 1 manages some slices District MSC/SGSN.
  • the communication connection between the central database 2 and the peripheral authentication device 1 can be carried out using SS7, Ethernet or some other communication method that carries the network.
  • the peripheral authentication device 1 is an identification device, and each of the identification devices separately stores state information of each mobile terminal in the jurisdiction.
  • the international mobile device identification information (IMEI) of each mobile terminal forms a mapping relationship with its own state information.
  • the peripheral authentication device corresponding to the jurisdiction where the mobile terminal to be identified is located may be referred to as a current peripheral authentication device.
  • the central database 2 is for storing status information of all mobile terminals in the mobile communication network and flag information of previous peripheral authentication devices of each mobile terminal, and is in communication connection with all of the identification devices.
  • the previous peripheral authentication device refers to the peripheral authentication device corresponding to the jurisdiction in which each mobile terminal is located for the last time legality identification, in other words, when one mobile terminal roams from another area managed by the peripheral authentication device to another When the peripheral authentication device manages the region, and the mobile terminal has been legally identified in the previous region, for convenience of explanation, the peripheral authentication device corresponding to the jurisdiction where the previous mobile terminal is located is referred to as a previous peripheral authentication device, and the mobile terminal The peripheral authentication device corresponding to another jurisdiction that is roamed is referred to as the current peripheral authentication device.
  • the status information of the mobile terminal includes a state in which the mobile terminal is allowed to access the network or a state in which the mobile terminal is not allowed to access the network;
  • the setting of the mobile terminal legality identification network shown in Figure 1 is actually a large-capacity device identification register (EIR) setting. After the setting is completed, the legality of any mobile terminal can be identified.
  • EIR device identification register
  • FIG. 2 shows the basic flow of the present invention, which includes the following steps:
  • Step 201 The connection service device in the mobile communication network sends the international mobile device identification information of the mobile terminal to be identified to the peripheral authentication device, and simultaneously issues verification request information;
  • Step 202 The peripheral authentication device searches for and acquires state information of the to-be-identified mobile terminal according to the international mobile device identification information.
  • Step 203 The peripheral authentication device 4 identifies the legality of the to-be-identified mobile terminal according to the status information, and returns the identification result to the connection service device.
  • Step 204 Complete legality identification of the mobile terminal.
  • the interactive communication process between the MSC/SGSN, the peripheral authentication device, and the central database is implemented by using a custom MAP (Mobile Application Part) signaling.
  • MAP Mobile Application Part
  • Step 301 The MSC/SGSN sends the IMEI information of the mobile terminal to be identified in the current jurisdiction to the current peripheral authentication device, and simultaneously sends the verification request information, where the specific signaling is a MAP-CHECK_IMEI request, where the signaling is The IMEI number of the mobile terminal to be identified is obtained by the current peripheral authentication device, and the current peripheral authentication device obtains the IMEI number of the mobile terminal to be identified, and whether the mobile terminal to be identified is stored according to the IMEI. Status information, if any, step 303 is performed; if not, step 304 is performed.
  • Step 303 The current peripheral authentication device identifies the validity of the mobile terminal to be identified according to the status information, and returns the identification result to the MSC/SGSN, and then proceeds to step 310.
  • Step 304 The current peripheral authentication device sends data download request information to the central database, where the data download request information includes the IMEI information of the mobile terminal to be identified and the identifier information of the current peripheral authentication device, and the specific signaling is MAP— UPDATE - IMEIJMPO request, the request requires obtaining the status information of the mobile terminal from the central database, and telling the central database that the current mobile terminal is under the jurisdiction of the current peripheral authentication device.
  • the data download request information includes the IMEI information of the mobile terminal to be identified and the identifier information of the current peripheral authentication device, and the specific signaling is MAP— UPDATE - IMEIJMPO request, the request requires obtaining the status information of the mobile terminal from the central database, and telling the central database that the current mobile terminal is under the jurisdiction of the current peripheral authentication device.
  • Step 305 The central database is based on the IMEI in the MAP_UPDATE_IMEI_INFO request The flag information of the peripheral authentication device of the mobile terminal to be identified that has been stored in the database is queried.
  • Step 306 The central database extracts the stored identifier information of the peripheral authentication device of the mobile terminal to be identified, compares the flag information with the flag information of the current peripheral authentication device in the MAP_UPDATE-IMEI-INFO request, and determines the current peripheral Whether the identifier information of the device is consistent, if yes, step 308 is performed; if not, step 307 is performed.
  • Step 307 In case of inconsistency, the mobile terminal to be identified is roamed from the previous jurisdiction to the current jurisdiction. Therefore, the identifier information of the peripheral authentication device stored in the central database represents the location of the mobile terminal to be identified before roaming.
  • the peripheral authentication device corresponding to the jurisdiction may be referred to as a previous peripheral authentication device.
  • the central database sends a request for deleting the status information of the mobile terminal to be identified to the previous peripheral authentication device according to the flag information of the previous peripheral authentication device.
  • the specific signaling is a MAP-CANCEL-IMEIJNFO request, and the request includes the IMEI information of the mobile terminal to be identified, so that the previous peripheral authentication device can clear the status information of the mobile terminal to be identified, and then, the central database uses the flag information of the current peripheral authentication device. Update the flag information of the previous peripheral authentication device.
  • the central database does not store the flag information of the peripheral authentication device, and the central database directly follows the flag.
  • the status information of the mobile terminal to be identified is sent to the current peripheral authentication device, and at the same time, the flag information of the current peripheral authentication device is stored in the central database and corresponds to the mobile terminal to be identified.
  • Step 308 The central database returns the status information of the mobile terminal to be identified to the current peripheral authentication device, and the specific signaling is a MAP-INSERT JMEI-INFO request, and the request is used by the central database to synchronize the mobile terminal status information with the peripheral authentication device.
  • the request includes IMEI information of the mobile terminal and mobile terminal status information (for example, whitelist, graylist, blacklist).
  • Step 309 After the current peripheral authentication device saves the state information of the mobile terminal to be identified, according to the state information, identify the legitimacy of the mobile terminal to be identified, and return the identification result to the MSC/SGSN, and then go to step 310.
  • Step 310 Complete legality identification of the mobile terminal.
  • the EIR implemented by the present invention adopts a distributed structure, and the central database is only responsible for the storage and management of mobile terminal information, so the workload is effectively controlled, and a large storage device can support a large amount of mobile terminal information. storage.
  • the peripheral authentication device undertakes frequent MAP-CHECK-IMEI signaling processing, satisfies the verification requirements of the MSC/SGSN for the mobile terminal, and improves the processing capability of the system through the load sharing of each peripheral authentication device.
  • the central database needs to send the mobile to the current peripheral authentication device.
  • Terminal information in other cases, the current peripheral authentication device independently processes the mobile terminal legality verification request of the MSC/SGSN, so the load of the distributed EIR is shared by the Xiweiwei authentication device, and the processing capability of the EIR is enhanced. EIR can cover the entire operator or the entire country, effectively preventing the use of illegal mobile stations.
  • the system can not only smoothly expand, but also improve the reliability of the system.
  • the networking is very flexible, and in order to increase the processing power of the peripheral authentication device, the peripheral components can also adopt the distributed structure described herein.

Abstract

A method for identifying validation of mobile terminal includes the steps of mobile switching center or GPRS service supporting node sending international mobile equipment identification information of mobile terminal to be identified to present peripheral authentication equipment, and meanwhile sending validation request information; the present peripheral authentication equipment querying status information of mobile terminal to be identified based on international mobile equipment identification information or downloading status information of mobile terminal to be identified by central database; identifying validity of mobile terminal to be identified; achieving validity identification of mobile terminal. The present invention realizes validity identification of all mobile terminals by embedding peripheral authentication equipment and central database which are distributively configured in mobile communication network to constitute validation identification network and by interacting information between mobile switching center or GPRS serving supporting node and peripheral authentication equipment.

Description

移动终端合法性的识别方法 技术领域  Method for identifying the legitimacy of mobile terminals
本发明涉及一种移动终端合法性的识别方法, 尤其是一种在移动通讯网 络中, 通过设置中心数据库、 按照区域分布设置的外围鉴别设备, 对移动终 端的合法性进行识别的方法。 背景技术  The invention relates to a method for identifying the legitimacy of a mobile terminal, in particular to a method for identifying the legitimacy of a mobile terminal by setting a central database and a peripheral authentication device arranged according to a regional distribution in a mobile communication network. Background technique
移动网络安全是网络运营的一个重要内容, 在如何实现网络安全方面, 相关的通讯协议作了详细的描述, 比如通过网络提供的鉴权功能, 移动网络 实现对用户身份的鉴定。另外,通过设置 EIR(Equipment Identification Register, 设备标识寄存器)设备, 可以对移动终端本身的合法性进行识别。  Mobile network security is an important part of network operation. In terms of how to implement network security, related communication protocols are described in detail. For example, through the authentication function provided by the network, the mobile network realizes the identification of the user identity. In addition, by setting the EIR (Equipment Identification Register) device, the legitimacy of the mobile terminal itself can be identified.
目前, 从实际运营的移动通信网络来看, 网络的鉴权功能得到了普遍使 用, 有效地阻止了非法用户的接入, 从而保护了运营商以及合法用户的利益。 但是, 利用 EIR来阻止非法移动终端的使用方面却 得远远不够, 例如, 生 活中最普遍的现象就是一些同过偷盗得来的移动终端照样在网上使用, 虽然 丢失移动终端的用户可以通过停机手段尽量减少自身的损失, 但是, 由于移 动网络缺少对移动终端本身合法性的检查, 从而不能在根本上有效地阻止偷 窃移动终端的行为, 严重损害了合法用户的切身利益。  At present, from the perspective of the actual mobile communication network, the authentication function of the network is widely used, effectively preventing the access of illegal users, thereby protecting the interests of operators and legitimate users. However, the use of EIR to prevent the use of illegal mobile terminals is far from enough. For example, the most common phenomenon in life is that some mobile terminals that have been stolen are still used on the Internet, although users who lose mobile terminals can stop by. Means to minimize their own losses, but because the mobile network lacks the check of the legitimacy of the mobile terminal itself, it cannot fundamentally effectively prevent the theft of the mobile terminal, which seriously damages the vital interests of legitimate users.
EIR的投入使用, 虽然能够对移动终端进行合法性识别,但是, 必须首先 在移动通信网络中建立一个包含全国移动终端信息的 EIR。 然而,对于拥有大 面积国土、 大量移动用户的国家来说, 运营商几乎不可能建立一个覆盖全国 范围的 EIR设备, 这是因为用目前技术所实现的 EIR设备, 在处理能力上无 法满足这种要求。 发明内容  EIR is put into use. Although it is possible to identify the legality of the mobile terminal, it is necessary to first establish an EIR containing the information of the national mobile terminal in the mobile communication network. However, for countries with large areas of land and large numbers of mobile users, it is almost impossible for operators to establish a nationwide EIR device. This is because the EIR equipment implemented by current technology cannot meet the processing power. Claim. Summary of the invention
本发明的目的在于针对上述目前技术所实现的 EIR设备, 在处理能力上 无法满足对大面积国土、 大量移动终端进行合法性识别的现状, 而提供一种 移动终端合法性的识别方法, 该方法通过设置在移动网絡中的移动终端识别 网络, 通过信息传递、 储存、 验证过程, 能够快速对每一个移动终端的合法 性进行识别, 使非法移动终端不能进入移动通信网络。 The object of the present invention is to address the processing capability of the EIR device implemented by the above prior art. It is unable to satisfy the current situation of legal identification of a large area of land and a large number of mobile terminals, and provides a method for identifying the legitimacy of a mobile terminal. The method identifies the network through a mobile terminal set in the mobile network, and transmits, stores, and authenticates through information. The process can quickly identify the legitimacy of each mobile terminal, so that the illegal mobile terminal cannot enter the mobile communication network.
为实现上述目的, 本发明采用了一种移动终端合法性的识别方法, 包括 以下步骤:  To achieve the above object, the present invention employs a method for identifying the legitimacy of a mobile terminal, including the following steps:
步骤 1、移动通信网络中的连接服务设备将待识别移动终端的国际移动设 备标识信息发送给外围鉴别设备, 并同时发出脸证请求信息; 所述外围鉴别 设备是多个依照管辖区域分布设置在移动通信网络中且与中心数据库以及所 管辖区域中的所述连接服务设备通信连接的识别设备, 每个识别设备中分别 保存有所管辖区域中每个移动终端的状态信息, 并且每个移动终端的国际移 动设备标示信息与其自身的状态信息构成映射关系; 所述中心数据库用于存 储所述移动通信网络中所有移动终端的状态信息以及每一个移动终端所在管 辖区域所对应的外围鉴别设备的标志信息, 并且与所有的识别设备进行通信; 所述状态信息是允许或不允许该移动终端接入所述移动通信网络中的信息; 步骤 2、所述外围鉴别设备根据所述国际移动设备标识信息寻找并获取所 述待识别移动终端的状态信息;  Step 1. The connection service device in the mobile communication network sends the international mobile device identification information of the mobile terminal to be identified to the peripheral authentication device, and simultaneously sends the face certificate request information; the peripheral authentication device is set according to the jurisdiction distribution. An identification device in the mobile communication network and in communication connection with the central database and the connection service device in the jurisdiction area, each of the identification devices respectively stores state information of each mobile terminal in the jurisdiction, and each mobile terminal The international mobile device identification information is in a mapping relationship with its own state information; the central database is configured to store state information of all mobile terminals in the mobile communication network and a flag of a peripheral authentication device corresponding to a jurisdiction in which each mobile terminal is located Information, and communicating with all of the identification devices; the status information is to allow or disallow the mobile terminal to access information in the mobile communication network; Step 2, the peripheral authentication device is based on the international mobile device identification information Find and get Determining status information of the mobile terminal;
步骤 3、所述外围鉴别设备根据所述状态信息, 识别所述待识别移动终端 的合法性, 并将识别结果返回所述连接服务设备, 然后转到步骤 4;  Step 3, the peripheral authentication device identifies the legitimacy of the mobile terminal to be identified according to the status information, and returns the recognition result to the connection service device, and then proceeds to step 4;
步骤 4、 完成所述移动终端的合法性识别。  Step 4: Perform legality identification of the mobile terminal.
上述技术方案中, 连接服务设备可以是分布设置在移动通信网络中的移 动交换中心, 也可以是 GPRS服务支持节点。 分布设置的多个外围鉴别设备 与中心数据库构成了一个嵌入移动通信网络中的移动终端合法性识别网络。 在中心数据库中保存了该移动通信网络中所有移动终端的状态信息数据, 并 且中心数据库能够针对每一个移动终端所在管辖区域, 将它们的状态信息备 份到其所在管辖区域的外围鉴别设备中, 使该管辖区域内的移动交换中心或 GPRS服务支持节点能够通过该外围鉴别设备对移动终端的合法性进行识别。 由于在移动通信网絡中, 经常会出现移动终端的首次开机以及漫游, 因此, 外围鉴别设备在根据国际移动设备标识信息寻找并获取待识别移动终端的状 态信息的过程中, 还可以通过向中心数据库发出下载请求, 来获取待识别移 动终端的状态信息, 对于漫游的移动终端, 中心数据库则还具有根据移动终 端当前所在管辖区域所对应的外围鉴别设备的标志信息对保存的该移动终端 信息中的外围鉴别设备的标志信息进行更新的操作以及请求该移动终端漫游 前所在管辖区域所对应的外围鉴别设备进行删除该移动终端的状态信息的操 作。 In the above technical solution, the connection service device may be a mobile switching center distributed in the mobile communication network, or may be a GPRS service support node. The distributed peripheral multiple authentication devices and the central database constitute a mobile terminal legality identification network embedded in the mobile communication network. The state information data of all mobile terminals in the mobile communication network is saved in the central database, and the central database can back up the state information of each mobile terminal to the peripheral authentication device of the jurisdiction in which it is located, so that Mobile switching center within the jurisdiction or The GPRS service support node can identify the legitimacy of the mobile terminal through the peripheral authentication device. In the mobile communication network, the first booting and roaming of the mobile terminal often occurs. Therefore, the peripheral authentication device can also search for and obtain the state information of the mobile terminal to be identified according to the international mobile device identification information, and can also go to the central database. Sending a download request to obtain status information of the mobile terminal to be identified, and for the roaming mobile terminal, the central database further has the flag information stored in the mobile terminal according to the identifier information of the peripheral authentication device corresponding to the current jurisdiction of the mobile terminal The operation of updating the flag information of the peripheral authentication device and requesting the peripheral authentication device corresponding to the jurisdiction in which the mobile terminal is roaming to delete the state information of the mobile terminal.
通过上述技术方案可以看出, 本发明通过在移动通信网络中嵌入分布式 设置的外围鉴别设备以及中心数据库, 组成合法性识别网络, 并通过连接服 务设备与外围鉴别设备的信息交互 , 实现了对所有移动终端合法性的识别。  It can be seen from the above technical solution that the present invention forms a legality identification network by embedding a distributed peripheral authentication device and a central database in a mobile communication network, and realizes the interaction by connecting the service device with the information of the peripheral authentication device. Identification of the legitimacy of all mobile terminals.
以下, 通过具体实施方式并结合附图对本发明做进一步的详细说明。 附图说明  Hereinafter, the present invention will be further described in detail by way of specific embodiments and drawings. DRAWINGS
图 1为本发明所涉及分布式移动终端合法性识别网络的结构示意图; 图 2为本发明的流程图;  1 is a schematic structural diagram of a legality identification network of a distributed mobile terminal according to the present invention; FIG. 2 is a flowchart of the present invention;
图 3为本发明一个具体实施例的流程图。 具体实施方式  Figure 3 is a flow diagram of one embodiment of the present invention. detailed description
本发明的实现是基于由分布式设置的外围鉴别设备与中心数据库所组成 的移动终端合法性识别网络, 该移动终端合法性识别网络嵌入移动通信网络 中, 其构成如图 1所示。 在图 1中, 外围鉴别设备 1才 据预先设定的移动通 信管辖区域进行分布设置。 所有的外围鉴别设备 1都与中心数据库 2进行通 信连接。 每一个外围鉴别设备 1 分别与其所在管辖区域中的移动交换中心或 GPRS服务支持节点 (MSC/SGSN ) 3连接。 每一个鉴别设备 1管理了一些片 区的 MSC/SGSN。 中心数据库 2与外围鉴别设备 1之间的通信连接可以采用 七号信令、 以太网或者其他一些承载网络的通讯方式。 The implementation of the present invention is based on a mobile terminal legality identification network composed of a distributed peripheral authentication device and a central database. The mobile terminal legality identification network is embedded in the mobile communication network, and its composition is as shown in FIG. In Fig. 1, the peripheral authentication device 1 performs distribution setting according to a preset mobile communication jurisdiction. All of the peripheral authentication devices 1 are in communication connection with the central database 2. Each of the peripheral authentication devices 1 is connected to a mobile switching center or GPRS service support node (MSC/SGSN) 3 in its jurisdiction. Each authentication device 1 manages some slices District MSC/SGSN. The communication connection between the central database 2 and the peripheral authentication device 1 can be carried out using SS7, Ethernet or some other communication method that carries the network.
外围鉴别设备 1 是一识別设备, 每个识别设备中分别保存有所管辖区域 中每个移动终端的状态信息。 在外围鉴別设备 1 中, 每个移动终端的国际移 动设备标识信息(IMEI )与其自身的状态信息构成映射关系。 在具体实施中, 当前待识别移动终端所在管辖区域所对应的外围鉴别设备可称为当前外围鉴 别设备。  The peripheral authentication device 1 is an identification device, and each of the identification devices separately stores state information of each mobile terminal in the jurisdiction. In the peripheral authentication device 1, the international mobile device identification information (IMEI) of each mobile terminal forms a mapping relationship with its own state information. In a specific implementation, the peripheral authentication device corresponding to the jurisdiction where the mobile terminal to be identified is located may be referred to as a current peripheral authentication device.
中心数据库 2用于存储移动通信网络中所有移动终端的状态信息以及每 一个移动终端的先前外围鉴别设备的标志信息, 并且与所有的识别设备进行 通信连接。 先前外围鉴别设备是指每一个移动终端在最后一次进行合法性识 别时, 其所在管辖区域所对应的外围鉴别设备, 换句话说, 当一个移动终端 从一个外围鉴别设备管理的地区漫游到另一个外围鉴别设备管理的地区时, 并且该移动终端在前一个地区时曾经进行过 法性识别, 为便于说明, 先前 移动终端所在管辖区域所对应的外围鉴别设备被称为先前外围鉴别设备, 移 动终端所漫游到的另一个管辖区域所对应的外围鉴别设备被称为当前外围鉴 别设备。  The central database 2 is for storing status information of all mobile terminals in the mobile communication network and flag information of previous peripheral authentication devices of each mobile terminal, and is in communication connection with all of the identification devices. The previous peripheral authentication device refers to the peripheral authentication device corresponding to the jurisdiction in which each mobile terminal is located for the last time legality identification, in other words, when one mobile terminal roams from another area managed by the peripheral authentication device to another When the peripheral authentication device manages the region, and the mobile terminal has been legally identified in the previous region, for convenience of explanation, the peripheral authentication device corresponding to the jurisdiction where the previous mobile terminal is located is referred to as a previous peripheral authentication device, and the mobile terminal The peripheral authentication device corresponding to another jurisdiction that is roamed is referred to as the current peripheral authentication device.
移动终端的状态信息中包括允许该移动终端接入网络的状态或不允许该 移动终端接入网絡的状态;  The status information of the mobile terminal includes a state in which the mobile terminal is allowed to access the network or a state in which the mobile terminal is not allowed to access the network;
图 1 所示的移动终端合法性识别网络的设置, 事实上就是一个大容量的 设备标识寄存器(EIR )的设置, 在设置完成后, 就可以对任何一个移动终端 的合法性进行识别。  The setting of the mobile terminal legality identification network shown in Figure 1 is actually a large-capacity device identification register (EIR) setting. After the setting is completed, the legality of any mobile terminal can be identified.
图 2所示为本发明的基本流程, 其包括以下步驟:  Figure 2 shows the basic flow of the present invention, which includes the following steps:
步骤 201、移动通信网络中的连接服务设备将待识别移动终端的国际移动 设备标识信息发送给外围鉴别设备, 并同时发出验证请求信息;  Step 201: The connection service device in the mobile communication network sends the international mobile device identification information of the mobile terminal to be identified to the peripheral authentication device, and simultaneously issues verification request information;
步骤 202、外围鉴别设备根据所述国际移动设备标识信息寻找并获取所述 待识别移动终端的状态信息; 步驟 203、外围鉴别设备 4艮据所述状态信息, 识别所述待识别移动终端的 合法性, 并将识别结果返回所述连接服务设备; Step 202: The peripheral authentication device searches for and acquires state information of the to-be-identified mobile terminal according to the international mobile device identification information. Step 203: The peripheral authentication device 4 identifies the legality of the to-be-identified mobile terminal according to the status information, and returns the identification result to the connection service device.
步驟 204、 完成所述移动终端的合法性识别。  Step 204: Complete legality identification of the mobile terminal.
由于移动通信网络中, 每一个移动终端的使用状况都有可能出现不同, 例如停机、 新入网开机以及漫游, 因此, 经常需要外围鉴别设备通过与中心 数据库的信息交互, 完成对移动终端的合法性设别。 一个具体的实施例如以 下图 3所示。  Since the usage status of each mobile terminal may be different in the mobile communication network, such as shutdown, new network startup, and roaming, it is often necessary for the peripheral authentication device to complete the legality of the mobile terminal by interacting with the information of the central database. Set up. A specific implementation is shown in Figure 3 below.
在图 3 所示的本实施例中, MSC/SGSN、 外围鉴别设备以及中心数据库 之间的交互通讯过程通过自定义 MAP(Mobile Application Part,移动应用部分) 信令实现。 本实施例的具体步骤如下。  In the embodiment shown in FIG. 3, the interactive communication process between the MSC/SGSN, the peripheral authentication device, and the central database is implemented by using a custom MAP (Mobile Application Part) signaling. The specific steps of this embodiment are as follows.
步骤 301、 MSC/SGSN将处于当前管辖区域内的待识别移动终端的 IMEI 信息发送给当前外围鉴别设备, 并同时发出验证请求信息, 其具体信令为 MAP— CHECK— IMEI请求, 该信令中同时包含了请求识别信息和移动终端的 国际移动设备标口、号码 IMEI(International Mobile Equipment Identification)信 步驟 302、当前外围鉴别设备得到待识别移动终端的 IMEI号码,根据 IMEI 查询是否存储有待识别移动终端的状态信息, 如果有, 则执行步骤 303; 如果 没有则执行步骤 304。  Step 301: The MSC/SGSN sends the IMEI information of the mobile terminal to be identified in the current jurisdiction to the current peripheral authentication device, and simultaneously sends the verification request information, where the specific signaling is a MAP-CHECK_IMEI request, where the signaling is The IMEI number of the mobile terminal to be identified is obtained by the current peripheral authentication device, and the current peripheral authentication device obtains the IMEI number of the mobile terminal to be identified, and whether the mobile terminal to be identified is stored according to the IMEI. Status information, if any, step 303 is performed; if not, step 304 is performed.
步骤 303、 当前外围鉴别设备根据状态信息, 识别待识别移动终端的合法 性, 并将识别结果返回 MSC/SGSN, 然后转到步骤 310。  Step 303: The current peripheral authentication device identifies the validity of the mobile terminal to be identified according to the status information, and returns the identification result to the MSC/SGSN, and then proceeds to step 310.
步骤 304、 当前外围鉴别设备向中心数据库发出数据下载请求信息, 该数 据下载请求信息中包含所述待识别移动终端的 IMEI信息以及所述当前外围 鉴别设备的标志信息, 其具体信令为 MAP—UPDATE— IMEIJMPO请求, 该请 求要求从中心数据库中获取该移动终端的状态信息, 同时告诉中心数据库当 前移动终端位于当前外围鉴别设备的管辖下。  Step 304: The current peripheral authentication device sends data download request information to the central database, where the data download request information includes the IMEI information of the mobile terminal to be identified and the identifier information of the current peripheral authentication device, and the specific signaling is MAP— UPDATE - IMEIJMPO request, the request requires obtaining the status information of the mobile terminal from the central database, and telling the central database that the current mobile terminal is under the jurisdiction of the current peripheral authentication device.
步骤 305、 中心数据库根据 MAP— UPDATE— IMEI— INFO请求中的 IMEI 查询中心数据库中已经存储的待识别移动终端的外围鉴别设备的标志信息。 步骤 306、中心数据库提取存储的待识别移动终端的外围鉴别设备的标志 信息, 将该标志信息与 MAP— UPDATE—IMEI— INFO请求中的当前外围鉴别设 备的标志信息进行比较, 判断其与当前外围鉴别设备的标志信息是否一致, 如果一致, 则执行步驟 308; 如果不一致, 则执行步驟 307。 Step 305: The central database is based on the IMEI in the MAP_UPDATE_IMEI_INFO request The flag information of the peripheral authentication device of the mobile terminal to be identified that has been stored in the database is queried. Step 306: The central database extracts the stored identifier information of the peripheral authentication device of the mobile terminal to be identified, compares the flag information with the flag information of the current peripheral authentication device in the MAP_UPDATE-IMEI-INFO request, and determines the current peripheral Whether the identifier information of the device is consistent, if yes, step 308 is performed; if not, step 307 is performed.
步骤 307、在不一致的情况下,说明待识别移动终端是从先前管辖区域漫 游来到当前管辖区域, 因此, 中心数据库中所存储的外围鉴别设备的标志信 息代表了该待识别移动终端漫游之前所在管辖区域所对应的外围鉴别设备, 可以称为先前外围鉴别设备, 此时, 中心数据库根据这个先前外围鉴别设备 的标志信息向该先前外围鉴别设备发送删除待识别移动终端的状态信息的请 求, 其具体信令为 MAP一 CANCEL— IMEIJNFO请求, 该请求中包含待识别移 动终端的 IMEI信息,使先前外围鉴别设备能够清除待识别移动终端的状态信 息, 然后, 中心数据库用当前外围鉴别设备的标志信息更新先前外围鉴别设 备的标志信息。 在此步骤中, 如果待识别移动终端是第一次开机, 则不存在 先前外围鉴别设备, 此时, 中心数据库中没有存储外围鉴别设备的标志信息, 中心数据库则按照通常的做法, 直接将该待识别移动终端的状态信息发送到 当前外围鉴别设备, 并同时, 将当前外围鉴别设备的标志信息存储在中心数 据库中与该待识别移动终端对应。  Step 307: In case of inconsistency, the mobile terminal to be identified is roamed from the previous jurisdiction to the current jurisdiction. Therefore, the identifier information of the peripheral authentication device stored in the central database represents the location of the mobile terminal to be identified before roaming. The peripheral authentication device corresponding to the jurisdiction may be referred to as a previous peripheral authentication device. At this time, the central database sends a request for deleting the status information of the mobile terminal to be identified to the previous peripheral authentication device according to the flag information of the previous peripheral authentication device. The specific signaling is a MAP-CANCEL-IMEIJNFO request, and the request includes the IMEI information of the mobile terminal to be identified, so that the previous peripheral authentication device can clear the status information of the mobile terminal to be identified, and then, the central database uses the flag information of the current peripheral authentication device. Update the flag information of the previous peripheral authentication device. In this step, if the mobile terminal to be identified is powered on for the first time, there is no previous peripheral authentication device. At this time, the central database does not store the flag information of the peripheral authentication device, and the central database directly follows the flag. The status information of the mobile terminal to be identified is sent to the current peripheral authentication device, and at the same time, the flag information of the current peripheral authentication device is stored in the central database and corresponds to the mobile terminal to be identified.
步骤 308、中心数据库将待识别移动终端的状态信息返回发送到当前外围 鉴别设备, 其具体信令为 MAP— INSERT JMEI— INFO请求, 该请求用于中心 数据库向外围鉴别设备同步移动终端状态信息, 请求中包含移动终端的 IMEI 信息、 移动终端状态信息 (例如, 白名单、 灰名单、 黑名单)。  Step 308: The central database returns the status information of the mobile terminal to be identified to the current peripheral authentication device, and the specific signaling is a MAP-INSERT JMEI-INFO request, and the request is used by the central database to synchronize the mobile terminal status information with the peripheral authentication device. The request includes IMEI information of the mobile terminal and mobile terminal status information (for example, whitelist, graylist, blacklist).
步驟 309、 当前外围鉴别设备保存待识别移动终端的状态信息后,根据该 状态信息, 识别所述待识别移动终端的合法性, 并将识别结果返回 MSC/SGSN, 然后转到步骤 310。  Step 309: After the current peripheral authentication device saves the state information of the mobile terminal to be identified, according to the state information, identify the legitimacy of the mobile terminal to be identified, and return the identification result to the MSC/SGSN, and then go to step 310.
步骤 310、 完成所述移动终端的合法性识别。 从上述工作流程描述看, 本发明实现的 EIR, 由于采用了分布式结构, 中 心数据库只负责移动终端信息的存储和管理, 因此工作负荷得到有效控制 , 借用大型存储设备可以支持大量移动终端信息的存储。 外围鉴别设备承担频 繁的 MAP— CHECK— IMEI信令处理,满足 MSC/SGSN对移动终端的验证要求, 通过各外围鉴别设备的负荷分担来提高系统的处理能力。 Step 310: Complete legality identification of the mobile terminal. From the above description of the workflow, the EIR implemented by the present invention adopts a distributed structure, and the central database is only responsible for the storage and management of mobile terminal information, so the workload is effectively controlled, and a large storage device can support a large amount of mobile terminal information. storage. The peripheral authentication device undertakes frequent MAP-CHECK-IMEI signaling processing, satisfies the verification requirements of the MSC/SGSN for the mobile terminal, and improves the processing capability of the system through the load sharing of each peripheral authentication device.
当移动终端跨越外围鉴别设备管理的地区漫游后或者首次开机, 当前外 围鉴别设备管理地区内的 MSC/SGSN第一次要求验证移动终端的合法性时, 中心数据库才需要给当前外围鉴别设备发送移动终端信息, 其他情况下都是 当前外围鉴别设备独立处理 MSC/SGSN的移动终端合法性验证请求, 因此分 布式 EIR的负荷被夕卜围鉴别设备所分担, 使 EIR的处理能力得到增强。 EIR 能够覆盖到整个运营商或者整个国家, 从而有效地防止非法移动台的使用。  When the mobile terminal roams across the area managed by the peripheral authentication device or is turned on for the first time, when the MSC/SGSN in the current peripheral authentication device management area first requests verification of the legitimacy of the mobile terminal, the central database needs to send the mobile to the current peripheral authentication device. Terminal information, in other cases, the current peripheral authentication device independently processes the mobile terminal legality verification request of the MSC/SGSN, so the load of the distributed EIR is shared by the Xiweiwei authentication device, and the processing capability of the EIR is enhanced. EIR can cover the entire operator or the entire country, effectively preventing the use of illegal mobile stations.
本发明的其他重要意义在于 EIR采用分布式架构后, 系统不但可以做到 平滑扩容, 而且还提高了系统的可靠性。 另外, 组网非常灵活, 为了增加外 围鉴别设备的处理能力, 外围部件也可以采用本文描述的分布式结构。  Another important significance of the present invention is that after the EIR adopts a distributed architecture, the system can not only smoothly expand, but also improve the reliability of the system. In addition, the networking is very flexible, and in order to increase the processing power of the peripheral authentication device, the peripheral components can also adopt the distributed structure described herein.
采用分布式结构实现的其他优点是: 第一、 良好的扩展性, 通过增加外 围鉴别设备数量, EIR的处理能力几乎能够线性增加; 2、 可靠性高, 比如当 一些外围鉴别设备出现故障时, 通过修改 MSC/SGSN 的设置, 把 MAP— CHECK— IMEI信令指向处理能力富余的其他外围鉴别设备, 实现了外 围鉴别设备之间的容灾, 另外, 外围鉴别设备从中心数据库取得移动终端状 态信息后会保存起来, 因此当中心数据库发生异常时, 外围鉴别设备仍能正 常工作, 绝大部分用户业务不受影响。  Other advantages realized by the distributed structure are: First, good scalability, by increasing the number of peripheral authentication devices, the processing capacity of EIR can be increased almost linearly; 2. High reliability, for example, when some peripheral authentication devices fail, By modifying the MSC/SGSN settings, the MAP-CHECK-IMEI signaling is directed to other peripheral authentication devices with sufficient processing capacity to implement disaster tolerance between the peripheral authentication devices. In addition, the peripheral authentication device obtains mobile terminal status information from the central database. It will be saved later, so when the central database is abnormal, the peripheral authentication device can still work normally, and most of the user services are not affected.
最后所应说明的是, 以上实施例仅用以说明本发明的技术方案而非限制 , 尽管参照较佳实施例对本发明进行了详细说明, 本领域的普通技术人员应当 理解, 可以对本发明的技术方案进行修改或者等同替换, 而不脱离本发明技 术方案的精神和范围。  It should be noted that the above embodiments are only intended to illustrate the technical solutions of the present invention and are not intended to be limiting, and the present invention will be described in detail with reference to the preferred embodiments. Modifications or equivalents are made without departing from the spirit and scope of the invention.

Claims

权 利 要 求 Rights request
1、 一种移动终端合法性的识别方法, 其包括以下步骤: A method for identifying the legitimacy of a mobile terminal, comprising the steps of:
步骤 1、移动通信网络中的连接服务设备将待识别移动终端的国际移动设 备标识信息发送给外围鉴别设备, 并同时发出验证请求信息; 所述外围鉴别 设备是多个依照管辖区域分布设置在移动通信网络中且与中心数据库以及所 管辖区域中的所述连接服务设备通信连接的识别设备, 每个识别设备中分别 保存有所管辖区域中每个移动终端的状态信息, 并且每个移动终端的国际移 动设备标示信息与其自身的状态信息构成映射关系; 所述中心数据库用于存 储所述移动通信网络中所有移动终端的状态信息以及每一个移动终端所在管 辖区域所对应的外围鉴别设备的标志信息 , 并且与所有的识别设备进行通信; 所述状态信息是允许或不允许该移动终端接入所述移动通信网络中的信息; 步驟 2、所述外围婆别设备根据所述国际移动设备标识信息寻找并获取所 述待识别移动终端的状态信息;  Step 1. The connection service device in the mobile communication network sends the international mobile device identification information of the mobile terminal to be identified to the peripheral authentication device, and simultaneously issues verification request information; the peripheral authentication device is configured to be moved according to a plurality of jurisdictions. An identification device in the communication network and in communication with the central database and the connection service device in the jurisdiction area, each of the identification devices respectively stores state information of each mobile terminal in the jurisdiction, and each mobile terminal The international mobile device identification information is in a mapping relationship with its own state information; the central database is configured to store state information of all mobile terminals in the mobile communication network and flag information of the peripheral authentication device corresponding to the jurisdiction region where each mobile terminal is located And communicating with all the identification devices; the status information is to allow or disallow the mobile terminal to access information in the mobile communication network; Step 2, the peripheral device according to the international mobile device identification information Find and get Determining status information of the mobile terminal;
步骤 3、所述外围鉴别设备根据所述状态信息, 识别所述待识别移动终端 的合法性, 并将识别结果返回所述连接服务设备, 然后转到步驟 4;  Step 3, the peripheral authentication device identifies the legitimacy of the mobile terminal to be identified according to the status information, and returns the recognition result to the connection service device, and then proceeds to step 4;
步驟 4、 完成所述移动终端的合法性识别。  Step 4: Perform legality identification of the mobile terminal.
2、 根据权利要求 1所述的移动终端合法性的识别方法, 其中所述步骤 1 中的连接服务设备是分布设置在所述移动通信网络中的移动交换中心或 GPRS服务支持节点。  2. The method for identifying the legitimacy of a mobile terminal according to claim 1, wherein the connection service device in the step 1 is a mobile switching center or a GPRS service support node distributed in the mobile communication network.
3、 根据权利要求 1或 2所述的移动终端合法性的识别方法, 其中所述步 骤 1 中的外围鉴别设备是所述待识别移动终端当前所在管辖区域所对应的当 前外围鉴别设备。 The method for identifying the legitimacy of the mobile terminal according to claim 1 or 2, wherein the peripheral authentication device in the step 1 is the current peripheral authentication device corresponding to the jurisdiction in which the mobile terminal to be identified is currently located.
4、 根据权利要求 3所述的移动终端合法性的识别方法, 其中所述步骤 1 中的外围鉴别设备与所述中心数据库是通过七号信令或通过网络数据传输协 议进行通信连接。 The method for identifying the legitimacy of a mobile terminal according to claim 3, wherein the peripheral authentication device in the step 1 and the central database are communicatively connected through the seventh signaling or through a network data transmission protocol.
5、 根据权利要求 3所述的移动终端合法性的识别方法, 其中所述步骤 2 具体包括以下步骤:  The method for identifying the legitimacy of a mobile terminal according to claim 3, wherein the step 2 specifically includes the following steps:
步骤 21、 所述当前外围鉴别设备根据所述国际移动设备标识信息查询是 否存储有所述待识别移动终端的状态信息, 如果有, 则执行步骤 22; 如果没 有则执行步骤 23;  Step 21: The current peripheral authentication device queries, according to the international mobile device identification information, whether the state information of the mobile terminal to be identified is stored, if yes, step 22 is performed; if not, step 23 is performed;
步驟 22、 所述当前外围鉴别设备根据所述状态信息, 识别所述待识别移 动终端的合法性, 并将识别结果返回所述连接服务设备, 然后转到步驟 4; 步骤 23、 所述当前外围鉴别设备向所述中心数据库发出数据下载请求信 息, 该数据下载请求信息中包含所述待识别移动终端的国际移动设备标识信 息以及所述外围鉴别设备的标志信息;  Step 22: The current peripheral authentication device identifies the legality of the to-be-identified mobile terminal according to the status information, and returns the identification result to the connection service device, and then proceeds to step 4; Step 23, the current peripheral The authentication device sends data download request information to the central database, where the data download request information includes the international mobile device identification information of the mobile terminal to be identified and the identifier information of the peripheral authentication device;
步骤 24、 所述中心数据库根据所述国际移动设备标识信息查询并提取所 述待识别移动终端的状态信息;  Step 24: The central database queries and extracts state information of the to-be-identified mobile terminal according to the international mobile device identification information.
步驟 25、 所述中心数据库将所述待识别移动终端的状态信息返回发送到 所述当前外围鉴别设备;  Step 25: The central database returns the status information of the to-be-identified mobile terminal to the current peripheral authentication device.
步骤 26、所述当前外围鉴别设备保存所述待识别移动终端的状态信息后, 根据该状态信息, 识别所述待识别移动终端的合法性, 并将识别结果返回所 述连接服务设备, 然后执行步骤 4。  Step 26: After the current peripheral authentication device saves the status information of the mobile terminal to be identified, according to the status information, identify the legality of the mobile terminal to be identified, and return the recognition result to the connection service device, and then execute Step 4.
6、根据权利要求 5所述的移动终端合法性的识别方法, 其中所述步骤 24 具体包括以下步骤: 步骤 241、所述中心数据库根据所述国际移动设备标识信息查询存储在该 中心数据库中对应所述待识别移动终端的外围鉴别设备的标志信息; The method for identifying the legitimacy of a mobile terminal according to claim 5, wherein the step 24 specifically includes the following steps: Step 241: The central database queries the identifier information of the peripheral authentication device corresponding to the to-be-identified mobile terminal in the central database according to the international mobile device identification information.
步骤 242、所述中心数据库将查询得到的所述外围鉴别设备的标志信息与 步骤 23中发来的所述数据下载请求信息中的当前外围鉴别设备的标志信息进 行比较, 判断两者是否一致, 如果一致, 则执行步驟 25; 如果不一致, 则执 行步骤 243;  Step 242: The central database compares the flag information of the peripheral authentication device obtained by the query with the flag information of the current peripheral authentication device in the data download request information sent in step 23, to determine whether the two are consistent. If they are consistent, go to step 25; if they are inconsistent, go to step 243;
步骤 243、所述中心数据库根据步骤 242中查询得到的所述外围鉴别设备 的标志信息向该外围鉴别设备发送删除所述待识别移动终端的状态信息的请 求, 然后用所述当前外围鉴别设备的标志信息更新存储在该中心数据库中对 应所述待识别移动终端的外围鉴别设备的标志信息。  Step 243: The central database sends a request for deleting the status information of the to-be-identified mobile terminal to the peripheral authentication device according to the identifier information of the peripheral authentication device that is queried in step 242, and then uses the current peripheral authentication device. The flag information updates the flag information stored in the central database corresponding to the peripheral authentication device of the mobile terminal to be identified.
PCT/CN2005/000689 2005-05-18 2005-05-18 A method for identifying validation of mobile terminal WO2006122445A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2005800497511A CN101176368B (en) 2005-05-18 2005-05-18 Method for recognizing mobile terminal validity
PCT/CN2005/000689 WO2006122445A1 (en) 2005-05-18 2005-05-18 A method for identifying validation of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2005/000689 WO2006122445A1 (en) 2005-05-18 2005-05-18 A method for identifying validation of mobile terminal

Publications (1)

Publication Number Publication Date
WO2006122445A1 true WO2006122445A1 (en) 2006-11-23

Family

ID=37430919

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2005/000689 WO2006122445A1 (en) 2005-05-18 2005-05-18 A method for identifying validation of mobile terminal

Country Status (2)

Country Link
CN (1) CN101176368B (en)
WO (1) WO2006122445A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2445778A (en) * 2007-01-10 2008-07-23 Nec Corp Receiving the lock status of a device from a server database
CN103179504A (en) * 2011-12-23 2013-06-26 中兴通讯股份有限公司 Method and device for judging user legality, and method and system for accessing user to mailbox

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098659B (en) * 2011-02-11 2013-07-24 王兰睿 Method and system for fast verifying international mobile equipment identity (IMEI)
JP6217751B2 (en) * 2013-07-04 2017-10-25 富士通株式会社 Data network management system, data network management device, data processing device, and data network management method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1994013115A1 (en) * 1992-12-01 1994-06-09 Nokia Telecommunications Oy Method of checking the identity of a subscriber equipment
CN1516503A (en) * 2003-01-03 2004-07-28 ��Ϊ�������޹�˾ Method for limiting illegal mobile telephone
US6856800B1 (en) * 2001-05-14 2005-02-15 At&T Corp. Fast authentication and access control system for mobile networking

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1549482B (en) * 2003-05-16 2010-04-07 华为技术有限公司 Method for realizing high rate group data service identification
CN1287578C (en) * 2004-01-13 2006-11-29 中兴通讯股份有限公司 A system and method for implementing user roaming between different places by routing server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1994013115A1 (en) * 1992-12-01 1994-06-09 Nokia Telecommunications Oy Method of checking the identity of a subscriber equipment
US6856800B1 (en) * 2001-05-14 2005-02-15 At&T Corp. Fast authentication and access control system for mobile networking
CN1516503A (en) * 2003-01-03 2004-07-28 ��Ϊ�������޹�˾ Method for limiting illegal mobile telephone

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2445778A (en) * 2007-01-10 2008-07-23 Nec Corp Receiving the lock status of a device from a server database
CN103179504A (en) * 2011-12-23 2013-06-26 中兴通讯股份有限公司 Method and device for judging user legality, and method and system for accessing user to mailbox
WO2013091377A1 (en) * 2011-12-23 2013-06-27 中兴通讯股份有限公司 Method and apparatus for determining user validity and mail access system for user
CN103179504B (en) * 2011-12-23 2015-10-21 中兴通讯股份有限公司 User validation determination methods and device, user access the method and system of mailbox

Also Published As

Publication number Publication date
CN101176368A (en) 2008-05-07
CN101176368B (en) 2011-11-23

Similar Documents

Publication Publication Date Title
CN109511115B (en) Authorization method and network element
CN102036222B (en) Method and system for changing M2M equipment selected home operator
CN1327663C (en) Method of user access radio communication network and radio network cut in control device
US9197639B2 (en) Method for sharing data of device in M2M communication and system therefor
CN111698734B (en) Access method of non-public network, terminal and base station
US20140273968A1 (en) Methods, systems, and computer readable media for providing a multi-network equipment identity register
EP2466759B1 (en) Method and system for changing a selected home operator of a machine to machine equipment
CN100551149C (en) The implementation method of user's access control and device in the wireless communication system
CN1863376A (en) Method for protecting mobile terminal identity in mobile communication system
WO2007058024A1 (en) Mobile communication system, core network, radio network system, and method for selecting network for containing the system
EP3347849A1 (en) Method, device and system for authenticating to a mobile network and a server for authenticating devices to a mobile network
WO2019056971A1 (en) Authentication method and device
US8983457B2 (en) Policy control architecture comprising an independent identity provider
CA3159134A1 (en) Method, device, and system for anchor key generation and management in a communication network for encrypted communication with service applications
WO2004004369A1 (en) A method to perform the location service in the communication system
WO2006122445A1 (en) A method for identifying validation of mobile terminal
WO2012151941A1 (en) Method and system for selecting mobility management entity of terminal group
WO2005062525A1 (en) A method for processing the location report from the object user equipment
US20200045549A1 (en) Iot device connectivity provisioning
WO2011029296A1 (en) System and method for providing machine-to-machine equipment with machine communication identity module
WO2018188751A1 (en) Combined migration and remigration of a network subscription
US9872124B2 (en) Mobility management method and system in M2M network
CN102026150B (en) The method and system that a kind of M2M equipment home network operator changes
WO2007121638A1 (en) An authentication method for cdma user roaming to gsm network
KR101837711B1 (en) System and Method for authentication terminal under black list authentication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 200580049751.1

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

NENP Non-entry into the national phase

Ref country code: RU

WWW Wipo information: withdrawn in national office

Country of ref document: RU

122 Ep: pct application non-entry in european phase

Ref document number: 05749559

Country of ref document: EP

Kind code of ref document: A1