Preventing misure of copied subscriber identity in mobile communication system

A technology for user identification and device identification number, which is applied in the field of prohibiting the abuse of a duplicated user identification code in a mobile communication, and can solve the problems of undiscoverable and expensive calls.

Inactive Publication Date: 2003-02-19
NOKIA NETWORKS OY
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A lot of abuse will cause users to notice this problem on their next phone bill, which is alr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Preventing misure of copied subscriber identity in mobile communication system
  • Preventing misure of copied subscriber identity in mobile communication system
  • Preventing misure of copied subscriber identity in mobile communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] refer to Figures 6 to 8 , when the operation according to the present invention takes effect, a table 60 for holding terminal identities (IMEI, columns 62-64) which are permissible to said subscriber identity number (IMSI, column 61) is associated with the home location register HLR is generated together. Alternatively, an existing table, file or database can be extended to include the table 60 data. In the GSM system used as an example, the subscriber identification number is the IMSI and the terminal identification number is the IMEI. Figure 6 A situation is shown where two permitted terminals whose identification numbers in columns 62 and 63 have the values ​​IMEI-1a and IMEI-1b respectively have been defined as permissible for the subscriber identification number IMSI-1. (symbol 64 represents that the number of allowed IMEI identification numbers is not limited to two). Only a permitted terminal whose identification number is IMEI-2a is defined as permitted for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and an equipment of preventing the misuse of a copied subscriber identity in a mobile communication system. The use of a subscriber identity (IMSI) is restricted to predetermined terminals (MS), each having an associated equipment identity (IMEI) in such a way that: a number of allowable equipment identities (IMEI) is defined for at least one subscriber identity (IMSI), and a data base (60) linking said subscriber identities (IMSI) and the equipment identities (IMSI) allowable to them is created; the terminal (MS) sends the terminal user subscriber identity (IMSI) and its dedicated equipment identity (IMEI) to the rest of the system; the rest of the system compares whether the equipment identity (IMEI) sent is allowable to the subscriber identity (IMSI) sent; as a response to the equipment identity (IMEI) sent being allowable to the subscriber identity (IMSI) sent, the use of the terminal (MS) is permitted, and otherwise the use is denied.

Description

Technical field: [0001] The present invention relates to a method and system for inhibiting the misuse of a duplicated subscriber identity code in a mobile communication. Background technique: [0002] In all communication networks, users and operators of the network have to protect against unwanted intrusions from third parties. Thus, the network requires various security measures. The most important features of network security are 1) protection of information relayed by the network, and 2) authentication and access control of users of the network. For the foreseeable future, the most important protection mechanism is some kind of encryption. Authentication is a measure to ensure that information comes from a designated source. Typically, it is password and key based. Access rights refer to the ability to send and / or receive over a switched channel. In addition, the access mechanism is based on some kind of password or key. [0003] Because data transmission to mobil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06
CPCH04W12/06H04L63/101H04W12/08H04W12/71H04W12/72
Inventor 贾奇·考特萨尔米塔皮奥·佩尔托
Owner NOKIA NETWORKS OY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products