Method and device for detecting illegal terminal

An illegal terminal and terminal technology, applied in the field of mobile communication, can solve problems such as crosstalk, and achieve the effect of preventing malicious monitoring and preventing crosstalk.

Active Publication Date: 2016-12-14
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method and device for detecting illegal terminals, so as to solve the problem of illegal terminal crosstalk in the prior art when legal terminals are talking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting illegal terminal
  • Method and device for detecting illegal terminal
  • Method and device for detecting illegal terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to solve the problem in the prior art that illegal terminals with the same IMSI, the same ESN, and different A-KEYs cross talk to legal terminals when the legal terminal is called, the present invention provides a method and device for detecting illegal terminals, as follows The present invention will be described in further detail in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0021] method embodiment

[0022] According to an embodiment of the present invention, a method for detecting an illegal terminal is provided, figure 1 is a flowchart of a method for detecting an illegal terminal according to an embodiment of the present invention, such as figure 1 As shown, the method for detecting an illegal terminal according to an embodiment of the present invention includes the following processi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for detecting illegal terminals. The method includes: the base station successively receives two paging response messages with the same international mobile identity code sent by two different terminals, and sends an authentication parameter carried in one of the paging response messages to the core network for authentication, wherein, The terminal corresponding to the authentication parameter sent to the core network for authentication is the first terminal; it is judged whether the two terminals are in the same cell, and if so, the base station releases the call; otherwise, the base station accesses the first terminal to the service channel, The other terminal is left in the control channel, and whether the first terminal is an illegal terminal is judged according to the authentication result of the first terminal by the core network, and the illegal terminal in the two terminals is blocked according to the judgment result.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method and device for detecting illegal terminals. Background technique [0002] In the prior art, with the rapid development of the mobile communication field, a kind of illegal terminal appears in the mobile communication network. International Mobile Subscriber Identity, referred to as IMSI) and Electronic Serial Number (ElectronicSerial Number, referred to as ESN) information, compared with illegal terminals, clone terminals only authentication key (SecretSubscriber Authentication Key, referred to as A-key) information and real different users. [0003] At present, the security mechanism of the mobile communication network can find that the terminal is an illegal terminal through authentication, thereby rejecting the separate access of the illegal terminal. However, when the legal terminal is called, both the legal terminal and the illegal terminal will return a paging ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12
Inventor 韩碧霞高淑美孙振飞吴东磊谭旭
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products