Security interception method and device

An interception device and safety technology, applied in the direction of safety devices, electrical components, wireless communication, etc., to achieve the effect of improving safety protection capability and avoiding economic losses

Active Publication Date: 2021-10-26
CHINA MOBILE COMM LTD RES INST +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there is no method or means to solve the fraudulent brushing achieved by hijacking users to obtain SMS verification codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security interception method and device
  • Security interception method and device
  • Security interception method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the technical problems, technical solutions and advantages to be solved by the embodiments of the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0043] The process of hijacking and fraudulent brushing is: B calls the hijacked user A; the hijacked user A has a voice call in, the hijacker A' counterfeit the hijacked user A's response to the called voice process of the network, and the network side is interacting with the called party of A' During the process, authentication (Authentication) and identification (Identification) processes will be executed to confirm whether the response is a real user A. Since the core network system has defects in the processing of authentication and identification processes, the hijacker A' can impersonate the hijacked user A responds to the called voice process of the network, and uses the relevant information in the user card of A' or the relevan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security interception method and device, and belongs to the technical field of wireless communication. The security interception method is applied to network side equipment, and comprises the following steps: if a terminal is in a state of keeping a call and triggering a downlink short message verification code, sending an identification information reporting instruction to the terminal to indicate the terminal to report own identification information; receiving first identification information reported by the terminal; comparing the first identification information reported by the terminal with pre-stored second identification information of the terminal, and issuing a short message verification code to the terminal if the first identification information is consistent with the pre-stored second identification information of the terminal; and if not, refusing to issue the short message verification code to the terminal. The technical scheme of the invention can prevent the illegal swiping behavior after the user call is hijacked.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a method and device for secure interception. Background technique [0002] In recent years, with the maturity of mobile communication systems, reports and incidents of attacks on mobile communication systems are increasing. One of the threats is hijacking user fraud attacks. [0003] The realization principle of hijacking and stealing attacks on users in the mobile communication system is to use the defect that the software in the system does not verify the user authentication information and identification information to hijack the user and use the SMS verification code of the user obtained after the hijacking To carry out fraudulent brushing. [0004] At present, there is no method or means to solve the fraudulent brushing realized by hijacking users to obtain SMS verification codes. Contents of the invention [0005] The technical problem to be solved by the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/122H04W12/126
CPCH04W12/06Y02D30/70
Inventor 王峰生
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products