International mobile equipment identification inspection method and system for power wireless private network

A technology for international mobile and equipment identification, applied in transmission systems, wireless communications, electrical components, etc., can solve the problems of occupying air interface resources and increasing air interface burden, meaningless occupation of core network signaling resources, increasing terminal attachment delay, etc.

Inactive Publication Date: 2021-04-09
POTEVIO INFORMATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the terminal user can successfully pass the ME identification verification, the complicated signaling interaction will undoubtedly increase the terminal attachment delay. The identity authentication process is the wireless interface interactive signaling, which occupies air interface resources and increases the burden on the air interface.
If the terminal user cannot successfully pass the ME identification verification, accordin...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • International mobile equipment identification inspection method and system for power wireless private network
  • International mobile equipment identification inspection method and system for power wireless private network
  • International mobile equipment identification inspection method and system for power wireless private network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] Embodiment 1 of the present invention is that the end user initiates the attachment, and the core network checks that the ME identity is successful and continues the attachment process, which specifically includes:

[0074] Step 1: The UE signs the legally matched IMSI / IMEI information in advance, and the IMSI and IMEI information must be unique.

[0075] Step 2: If Figure 6 As shown, the UE sends an attach request (AttachRequest) message carrying its own IMSI to the network side to initiate attach.

[0076] Step 3: After receiving the UE's Attach Request message, the MME sends an Authentication Information Request (Authentication Information Request) to the HSS. The Authentication Information Request is used to request the authentication vector information of the terminal user, which should carry the information of Terminal-MatchCheckFlag=1 , to instruct the HSS to query the corresponding IMEI information of the user.

[0077] Step 4: The HSS calculates the authenti...

Embodiment 2

[0084] Embodiment 2 of the present invention is that the end user initiates the attachment, and the core network fails to check the ME identity to terminate the attachment process, specifically including:

[0085] Step 1: For known stolen terminals, the IMEI usage status of the stolen terminal should be set to prohibited.

[0086] Step 2: If Figure 6 As shown, the UE initiates an attach to the network side Attach Request (Attach Request) message.

[0087] Step 3: Steps are the same as Steps 3-4 in Embodiment 1, the MME initiates an authentication information request process to the HSS, and the specific process includes: the MME sends an Authentication Information Request (AuthenticationInformation Request) to the HSS after receiving the UE's Attach Request message, and the authentication The authorization information request is used to request the authentication vector information of the terminal user, which should carry the information of Terminal-MatchCheckFlag=1 to instru...

Embodiment 3

[0090] Embodiment 3 of the present invention is that the end user initiates the attachment, and the core network fails to check the ME identity to terminate the attachment process. The specific steps include:

[0091] Step 1: For an unknown stolen terminal, the IMEI usage status of the stolen terminal is still allowed or tracked.

[0092] Step 2: The UE sends an Attach Request message to the network side to initiate attachment.

[0093] Step 3: The steps are the same as steps 3-7 in Embodiment 1. The MME initiates the authentication information request process to the HSS, and initiates the authentication and security establishment process to the UE, specifically including: the MME sends the authentication message to the HSS after receiving the Attach Request message from the UE. Authentication Information Request (Authentication Information Request), the authentication information request is used to request the authentication vector information of the terminal user, which shou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an international mobile equipment identification inspection method and system for a power wireless private network. The method comprises the following steps: registering an international mobile subscriber identity (IMSI) and an international mobile equipment identity (IMEI) of user equipment (UE) into a database accessible to a home subscriber server (HSS) in an associated manner, and setting an IMEI use state of the IMEI in the database; enabling the UE to send an attachment request message carrying the IMSI to the MME; enabling the MME to initiate an authentication information request carrying an IMSI to the HSS, wherein the authentication information request carries a flag bit used for indicating whether the HSS queries an IMEI matched with the IMSI or not, wherein when the flag bit indicates that the IMEI matched with the IMSI is inquired, the HSS accesses a database to inquire the IMEI matched with the IMSI and the IMEI use state of the IMEI and returns an authentication information response message to the MME, and the authentication information response message carries the IMEI matched with the IMSI and the IMEI use state of the IMEI. And the acquisition and inspection process of the ME identifier is simplified.

Description

technical field [0001] The invention belongs to the technical field of electric power wireless private network communication systems, and in particular relates to a method and system for checking an international mobile device identification of electric power wireless private network. Background technique [0002] With the development of smart grid construction, the demand for reliability and security of electric power business continues to increase, and the construction of electric power wireless private network has received more and more attention. Smart grid power distribution business terminals are widely spread and scattered. Although the optical fiber communication method has the advantage of strong business transmission capabilities, deployment and construction are difficult and costly, and cannot meet the full coverage of massive power distribution terminals. With the rapid development of wireless broadband communication technology, as a supplementary means of power ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/08H04W12/122H04W8/04H04L29/06
CPCH04W12/06H04W12/08H04W8/04H04L63/0876
Inventor 洪彬婷皇甫晨夕王薇薇张晓静
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products