A control method, device and system for a user identification card

A technology for user identification and control device, applied in the control field of user identification card, can solve problems such as high arrears, loss of SIM card control, etc.

Active Publication Date: 2011-11-30
XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the GSM protocol, since the SIM card logs into other VLRs, the user data related to the SIM card is recorded, and the user data includes IMSI and authentication triplet, wherein the authentication triplet refers to SRES, RAND and Kc, Although the SIM card has been shut down, billing services can still occur, such as sending short messages, calling services, etc. The SIM card with the duplicate card will be out of control, resulting in high arrears

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A control method, device and system for a user identification card
  • A control method, device and system for a user identification card
  • A control method, device and system for a user identification card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Such as figure 1 As shown, the control method of the user identification card provided by the embodiment of the present invention includes the following steps:

[0031] S101. When it is determined that there is a duplicate card in the user identification card for the arrears shutdown, extract the user identification of the user identification card;

[0032]The user identifier of the user identification card may be the MSISDN of the user identification card, or the IMSI of the user identification card.

[0033] S102. According to the extracted user identification, determine the HLR to which the user identification card belongs;

[0034] In specific implementation, the corresponding relationship between the user identification and the location information of the HLR can be stored in advance, and the location information of the HLR corresponding to the user identification can be obtained by querying the corresponding relationship stored in advance, and the user identity c...

Embodiment 2

[0059] Based on the same technical idea, the embodiment of the present invention provides a control system for user identification cards, such as image 3 As shown, it includes a control device 301 and an HLR 302. Preferably, the control device 301 can be set in a BOSS (Business Operation Support System, business operation support system), and of course it can also be set in other network entities. in:

[0060] The control device 301 is configured to extract the user identification of the user identification card when there is a duplicating card in the user identification card that is suspended due to arrears; determine the HLR to which the user identification card belongs according to the extracted user identification; and notify the HLR Delete the authentication key of the user identification card stored in the HLR;

[0061] The HLR 302 is configured to delete the locally stored authentication key of the subscriber identity card according to the notification sent by the con...

Embodiment 3

[0083] Taking the suppression of a SIM card with duplicate cards from producing a large number of spam short messages and causing high arrears as an example, a better SIM card control method provided by the embodiment of the present invention is introduced in detail, assuming that the BOSS in the existing GSM system is To transform, the control device provided by Embodiment 2 is set in BOSS, such as Figure 5 shown, including the following steps:

[0084] S501. If the SIM card that is shut down due to payment sends a short message, the BOSS obtains the shutdown time of the SIM card that is stopped due to payment;

[0085] S502, BOSS compare short message sending time and downtime, if the short message sending time is after the set time length from the downtime point, then it is determined that the SIM card has a duplicate card, and the SIM card is extracted from the billing bill MSISDN number and device addresses of all VLRs logged in by the SIM card;

[0086] S504. The BOSS...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a subscriber identity card control method, a subscriber identity card control device and a subscriber identity card control system, which are used for solving the problem of high defaulting caused by illegal copy of subscriber identity cards. The subscriber identity card control method comprises the following steps of: when a subscriber identity card which is shut down dueto defaulting is copied, extracting a user identifier of the subscriber identity card; determining a home location register (HLR) to which the subscriber identity card belongs according to the extracted user identifier; and notifying the HLR to delete a key identifier (KI) of the subscriber identity card which is stored in the HLR.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method, device and system for controlling a user identification card. Background technique [0002] Subscriber identification cards adopted in mobile communication systems of existing various network standards, such as SIM (Subscriber Identity Module, Subscriber Identity Module) card, CDMA (Code The UIM (User Identity Module, User Identification Module) card used in the Division Multiple Access (Code Division Multiple Access) system, and the USIM (Universal Subscriber Identity Module, Universal Subscriber Identity Module) used in the UMTS (Universal Mobile Telecommunications System, Universal Mobile Communications System) Identification module) cards, etc., all belong to the category of smart cards. In the mobile communication system, the mobile terminal (usually a mobile phone) is separated from the user identification card. The user identification card can uniquely identi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/04H04W8/22H04W12/04H04W12/06
Inventor 刘遂江苗晓巧史正伟张新鹏张聪
Owner XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products