Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety communication method

A technology for secure communication and called users, applied in the field of secure communication, can solve the problems of host monitoring and hidden dangers, and achieve the effect of ensuring user communication security and avoiding short messages

Inactive Publication Date: 2008-11-12
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, this processing method also lays a hidden danger for the code machine user to monitor the host

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety communication method
  • Safety communication method
  • Safety communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The main method of the present invention is: the MSC sends a paging request to the MS corresponding to the IMSI / ESN through the BS; when the MSC receives the paging response from the MS forwarded by the BS, it authenticates the MS; In the service channel between the BS and the MS, if the authentication fails, the called user is considered to be an illegal user, and the MSC continues to wait. After the MSC authentication passes, if the MSC receives the paging response from the MS forwarded by the BS again, it will authenticate the called user again. There is a code machine MS, which notifies the BS to tear down the service channel between the called users corresponding to the IMSI / ESN, and stop the communication.

[0036] see figure 2 Shown, the concrete steps that realize the inventive method are as follows:

[0037] Step 201: The MSC sends a paging request to the MS corresponding to the IMSI / ESN through the BS.

[0038] Step 202: The MS receiving the paging request...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes steps: through base station (BS) mobile switching center (MSC) sends seeking request to called user corresponding to international mobile user id (IMSI) / electric sequence number (ESN); when receiving seeking response of called user forwarded by BS, MSC authenticates the called user; if authentication is passed, then service channel between BS and the called user is established. After MSC authentication is passed, if MSC receives seeking response from called user forwarded by BS again; then carrying out authentication again; if authentication is passed, then not carrying out process; if failed, then, the method considers that user of code device is existed currently, informing BS to disengage service channel of called user corresponding to IMSI / ESN, stopping communication. The invention solves issue of monitoring host as called party from code device so as to prevent code device from receiving short message sent from user to host.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for secure communication. Background technique [0002] According to the current agreement, in the Code Division Multiple Access (CDMA) system, the International Mobile Subscriber Identity (IMSI) and Electronic Serial Number (ESN) of the mobile station are unique in the world. However, in the actual operation process, the uniqueness of IMSI and ESN is difficult to be guaranteed. It often happens that the IMSI and ESN of some illegal users are the same as those of legitimate users. Therefore, legitimate users may not be able to communicate normally. Hereinafter, this application refers to legal users as "hosts", and illegal users who use the same IMSI and ESN as the hosts are called "encoders". For example: because a code machine is communicating, if the host needs to initiate a call at this time, because the CDMA network side is providing services for the code mac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/38H04W12/06H04W68/00H04W76/04
Inventor 黄天振邹锋哨郭平陈辉清
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products