Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and base station for locking illegal copied mobile terminal

A mobile terminal and illegal copying technology, which is applied in the field of locking illegally copied mobile terminals, can solve problems such as wrong locking and loss of mobile terminals, and achieve the effect of avoiding wrong locking

Active Publication Date: 2009-04-29
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another kind of better mode is that the base station sends the locking command message to the illegally duplicating mobile terminal through all time slots of the paging channel monitored by the illegally duplicating mobile terminal, when the illegally duplicating mobile terminal receives the locking command message, the The illegally copied mobile terminal will be locked by the system, and cannot initiate an access request to the system before it is turned on again, but the disadvantage of this method is: if the copied mobile terminal and the illegally copied mobile terminal are in the same sector carrier frequency , because the parameters saved in the two are the same, so both monitor the same paging channel; when the duplicated mobile terminal is idle, it monitors some time slots of the paging channel, and the base station sends the locked The command message is transmitted in all time slots of the paging channel, so the duplicated mobile terminal will also receive the locking command message transmitted in the paging channel and be locked by the system by mistake, thus bringing a sense of security to the duplicated mobile terminal in normal work. to unnecessary loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and base station for locking illegal copied mobile terminal
  • Method, system and base station for locking illegal copied mobile terminal
  • Method, system and base station for locking illegal copied mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The embodiment of the present invention proposes a method for locking an illegally copied mobile terminal, see figure 1 , figure 1 It is a flowchart of a method for locking an illegally copied mobile terminal according to an embodiment of the present invention. The method includes:

[0029] Step 101: Receive an access request message sent by a mobile terminal, where the access request message carries an authentication response parameter;

[0030] Step 102: sending the authentication response parameter carried in the access request message to the HLR / AC;

[0031] Step 103: Receive the failure reason that HLR / AC returns is the illegal authentication failure message of mobile terminal, determine the time slot of the paging channel that is monitored when the copied mobile terminal is in an idle state, and remove the determined time slot in the paging channel The time slot other than the time slot sends a lock command message to the illegally copied mobile terminal.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes steps: receiving message of access request sent from mobile terminal, and the message of access request carries parameter of authentication response; sending the parameter of authentication response carried by message of access request to home location register (HLR) / authentication center (AC); receiving message of authentication failure of illegal mobile terminal being as failure cause returned by HLR / AC; determining time slots of monitored seeking channel when the reproduced mobile terminal is in idle state; sending message of locking command to illegal duplicative mobile terminal through time slot in seeking channel except the time slots of monitored seeking channel. Locking up illegal duplicative mobile terminal, at same time, the invention guarantees that the reproduced mobile terminal in idle state will not be locked by mistake.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method, system and base station for locking illegally copied mobile terminals. Background technique [0002] In the Code Division Multiple Access (CDMA, Code Division Multiple Access) 2000 system, before the mobile terminal accesses the network, some important data is pre-saved in the mobile terminal and the Home Location Register (HLR, Home Location Register) / authentication center ( AC, Authentication Center), including: authentication key (A_Key), international mobile terminal identification number (IMSI, International Mobile Station Identification) of the mobile terminal, electronic serial number (ESN, Electronic Serial Number) of the mobile terminal and authentication weighting algorithm, etc. Illegally copied mobile terminals, that is, mobile terminals that illegally steal important data such as A_Key, IMSI, and ESN of other mobile terminals in normal operation, will b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/12H04W12/126H04W88/02
CPCH04W12/06H04W88/02
Inventor 骈琳
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products