Method and device for identifying illegal machine card separation of Internet of Things

A technology for illegal machine cards and IoT cards, applied in the field of IoT, can solve problems such as errors in the identification code of IoT cards, and achieve the effect of ensuring safety and accurate identification methods.

Active Publication Date: 2020-04-10
WUHAN GREENET INFORMATION SERVICE
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In actual use, machine-card separation through normal channels may also occur. For example, if the machine breaks down, machine-card separation must be performed. In this case, it cannot be wrongly characterized as illegal machine-card separation.
[0003] In the prior art, there is a way to complete the report through the user of the machine card. However, this way has great disadvantages
First, errors will occur when entering the corresponding associated machine identification codes and IoT card identification codes; second, if large-scale equipment update iterations occur, this will bring a huge additional workload

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying illegal machine card separation of Internet of Things
  • Method and device for identifying illegal machine card separation of Internet of Things
  • Method and device for identifying illegal machine card separation of Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] Embodiment 1 of the present invention provides a method for separating and identifying illegal machine cards in the Internet of Things, such as figure 1 shown, including:

[0046] In step 201, collect data through the corresponding interface in the Internet of Things, and establish a mapping relationship between the collected data; wherein, the collected data includes identification information, signaling data and service data; identification information includes terminal equipment identification and the Internet of Things card logo.

[0047] Among them, the terminal equipment identification is specifically the International Mobile Equipment Identity (International Mobile Equipment Identity, abbreviated as: IMEI), and the IMEI is the number burned into the IoT terminal equipment by the manufacturer when the equipment leaves the factory; Digital Network (Mobile Subscriber International ISDN / PSTN Number, abbreviated as: MSISDN) and / or International Mobile Subscriber Iden...

Embodiment 2

[0077] Such as Figure 4 As shown, it is a schematic diagram of the architecture of the device for separating and identifying illegal machine cards in the Internet of Things according to an embodiment of the present invention. The device for separating and identifying illegal machine cards in the Internet of Things in this embodiment includes one or more processors 21 and memory 22 . in, Figure 4 A processor 21 is taken as an example.

[0078] Processor 21 and memory 22 can be connected by bus or other means, Figure 4 Take connection via bus as an example.

[0079] The memory 22, as a non-volatile computer-readable storage medium, can be used to store non-volatile software programs and non-volatile computer-executable programs, such as the method for separating and identifying illegal machine cards in the Internet of Things in Embodiment 1. The processor 21 runs the non-volatile software programs and instructions stored in the memory 22, thereby executing the method for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of internet of things, and provides a method and a device for identifying illegal machine card separation of the internet of things. The method comprises the steps of collecting data through a corresponding interface in the Internet of Things; and establishing a mapping relationship between the acquired data, and when it is detected that the mapping relationship between the identifier of a first terminal and/or the identifier of a first Internet of Things card is not matched with the mapping relationship between the identifier of the first terminaldevice and the identifier of the first Internet of Things card which are stored in history, performing Internet of Things illegal machine-card separation verification. An Internet of Things terminal portrait library is established by collecting signaling and service data in the Internet of Things and analyzing and extracting the terminal identifier, the Internet of Things card identifier, the signaling data and the service data, and the security of the Internet of Things terminal is effectively guaranteed based on the fingerprint in the terminal portrait library.

Description

【Technical field】 [0001] The invention relates to the technical field of the Internet of Things, in particular to a method and device for separating and identifying illegal machine cards in the Internet of Things. 【Background technique】 [0002] The Internet of Things card is a special card number issued by operators for customers in the Internet of Things industry. It is used for industry equipment. If it is used by some illegal personnel to make calls, send text messages, and surf the Internet, it can evade the supervision of billing or anti-fraud departments. , causing economic losses to the operating company or bearing corresponding legal responsibilities. In actual use, machine-card separation may also occur through normal channels. For example, if the machine breaks down, machine-card separation must be performed. In this case, it cannot be wrongly characterized as illegal machine-card separation. [0003] In the prior art, there is a way to complete the report throug...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0876H04L67/12
Inventor 唐斌张本军谭国权李明栋
Owner WUHAN GREENET INFORMATION SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products