A detection method, device and terminal device for shared access
A technology for sharing access and terminal equipment, applied to electrical components, transmission systems, etc., can solve the problems of inability to accurately determine the number of terminal equipment, gateway equipment cannot accurately determine whether there is shared access, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0062] The embodiment of the present invention provides a method for detecting shared access, such as figure 1 As shown, the method includes:
[0063] 101. The detection device for shared access receives a data message sent by the first terminal device, the data message includes encryption information of the device identification and the source IP address assigned by the server to the first terminal device, and the device identification is encrypted The information is encrypted information of the device identification of the first terminal device or encrypted information of the device identification of the second terminal device that accesses the network through the first terminal device.
[0064] It should be noted that before the second terminal device requests access to the network or requests data from the network, or the first terminal device requests data from the network, the first terminal device first needs to exchange information with the network side (including gateways, ...
Embodiment 2
[0073] The embodiment of the present invention provides a method for detecting shared access. The execution subject of the method is a terminal device. The terminal device may be a second terminal device or a first terminal device, such as figure 2 As shown, the method includes:
[0074] 201. The terminal device obtains a device identifier.
[0075] Specifically, the terminal device may obtain the International Mobile Subscriber Identification Number (IMSI) or the Mobile Subscriber International Integrated Service Digital Network (MSISDN) of the terminal device.
[0076] 202. The terminal device encrypts the device identification, and obtains device identification encryption information.
[0077] Specifically, the terminal device may use a symmetric encryption algorithm or an asymmetric encryption algorithm to encrypt the device identification of the terminal device to obtain encryption information of the device identification.
[0078] It should be noted that the symmetric encryption ...
Embodiment 3
[0087] The embodiment of the present invention provides a method for detecting shared access, such as image 3 As shown, when the terminal device is a second terminal device, the method includes:
[0088] 301. The second terminal device acquires a device identifier.
[0089] The device identifier may be the IMSI or MSISDN of the second terminal device.
[0090] Specifically, the second terminal device can read the device identifier of the second terminal device.
[0091] 302. The second terminal device encrypts the device identification, and obtains device identification encryption information.
[0092] When the second terminal device requests to access the network or requests data from the network, the device identification of the second terminal device is encrypted, and the device identification encryption information is obtained.
[0093] Specifically, the second terminal device may use a symmetric encryption algorithm or an asymmetric encryption algorithm to encrypt the device identi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 