Method and system for determining legal terminal

A judgment method and terminal technology, applied in the field of communication, can solve the problem of being unable to distinguish between a completely cloned terminal and a legitimate terminal, and achieve the effect of protecting rights and interests

Active Publication Date: 2011-04-13
ZTE CORP
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the problem of inability to distinguish between a fully cloned terminal and a legitimate terminal in a communication network in the related art, the present invention provides a method and system for judging a legitimate terminal to solve at least one of the above-mentioned problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for determining legal terminal
  • Method and system for determining legal terminal
  • Method and system for determining legal terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Assume that the updated COUNT value of the legal terminal is 1 (0 before the update), the COUNT value of the clone terminal is 0, and the COUNT value recorded by the authentication center is the updated COUNT value of the legal terminal. Both BS and MSC are set to require authentication. In this way, the terminal will carry authentication parameters in the access message.

[0037] After the caller is successfully established, the core network initiates a parameter update process, so that the terminal can update the COUNT value of the authentication parameter. By default, the COUNT value saved by all terminals is 0. When the terminal receives a Parameter Update Order (Parameter Update Order) message, the above-mentioned legal terminal will update the COUNT and save the new COUNT value. When the call comes in, it will In the authentication parameters, the updated COUNT value is brought to the BS, and the BS transparently transmits it to the MSC.

[0038] Combine the followin...

Embodiment 2

[0057] In this embodiment, the COUNT field is added to the paging request message. When the core network sends the paging message, the recorded COUNT value of the legal terminal is sent to the BS through the paging message, and the BS is recording the COUNT value of the paging message. When the BS receives the paging response, it compares the COUNT value of the authentication parameter in the paging response message with the COUNT value of the authentication parameter of the paging request message. If the COUNT value is inconsistent, it means that the paging response message returned by the clone terminal is cloned. The BS directly discards the paging response message and does not process it. If the COUNT value is consistent, it continues processing according to the normal paging response flow. This can avoid the problem of paging failure caused by the clone terminal first responding. In order to better understand the above process, the following combination Figure 4 Detailed ...

Embodiment 3

[0073] This embodiment is implemented by modifying the air interface protocol. It is necessary to also add the COUNT field in the channel assignment message. When the call is established, the COUNT value of the legal terminal is filled in the channel assignment. After the terminal receives the channel assignment, it saves it with the COUNT value in the message. When the COUNT value is inconsistent, the channel assignment message is not processed, and the channel assignment message is processed only when the COUNT value is consistent. Specifically, such as Image 6 As shown, it should be noted that this embodiment needs to be performed before specific implementation Figure 5 Step S502 in the illustrated embodiment and before step S502 Figure 4 The steps of the above embodiment. Specifically, the specific implementation plan includes:

[0074] Step S602, the BS sends a channel assignment message to the cell accessed by the legal terminal MS_2 and the non-access message supporting...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for determining a legal terminal. The method comprises the following steps of: receiving a COUNT value from the terminal by a mobile switching center (MSC); comparing the COUNT value stored in an authentication entity by the MSC with received COUNT value of the terminal to determine whether the values are consistent by the MSC, wherein the COUNT value stored by the MSC is the COUNT value of the legal terminal; determining that the terminal is the legal terminal under the condition of determining that the two values are consistent; and if the two values are not consistent, determining that the terminal is a cloned terminal. By using the scheme, the problems that the cloned terminal and the legal terminal cannot be completely differentiated in a communication network in the related technology and the cloned terminal embezzles network resources are solved and the crosstalk problem caused by embezzling network resources by the cloned terminal is solved, so that the benefit of the legal terminal is effectively protected.

Description

Technical field [0001] The present invention relates to the field of communications, in particular, to a method and system for judging legal terminals. Background technique [0002] With the rapid development of the mobile communication field, some illegal terminals have gradually appeared in the mobile communication network. They cloned some information of real user terminals, such as International Mobile Subscriber Identity (IMSI) and other information, and tried to access Into the mobile communication network and embezzle network resources, we call this type of terminal a clone terminal or an illegal terminal. [0003] The current mobile communication network has its own set of security mechanisms to prevent such illegal terminals from using network resources to initiate various services. In the CDMA 2000 network, the core network will use Electronic Serial Number (ESN) and authentication The Secret Subscriber Authentication Key (A-key for short) is used to authenticate the ter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/126
CPCH04W12/12H04W12/126
Inventor 高淑美
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products