Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for detecting same wireless terminal

A wireless terminal and detection unit technology, applied in security devices, wireless communication, selection devices, etc., can solve the problem of inability to identify authenticity and other problems, and achieve the effect of reducing fraudulent behavior and reducing harm

Active Publication Date: 2007-05-30
HUAWEI TECH CO LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the card information of the cloned mobile terminal is exactly the same as that of the original card, the existing technology cannot identify its authenticity, and there is no mature detection method to detect the same mobile terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for detecting same wireless terminal
  • Method and apparatus for detecting same wireless terminal
  • Method and apparatus for detecting same wireless terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] In this embodiment, it is determined whether there is the same wireless terminal by detecting the call counter value returned by the wireless terminal. The value of the call counter (count) can be regularly updated through the home location register on the network side, and issued to wireless terminals within the jurisdiction. The network side compares the latest count value reported by the wireless terminal with the latest count value saved by the network side, and if they are not the same, it indicates that the same wireless terminal exists. The service may be but not limited to voice service, short message service or data service, and the wireless terminal will report the latest count value saved by itself in the message of initiating or accepting the above services.

[0059] The principle of this method is: the updated count value sent by the HLR is received by one of the host or the clone wireless terminal, while the count value saved in the other is not updated, s...

Embodiment 2

[0065] In this embodiment, it is determined whether there is the same wireless terminal by detecting the paging response message returned by the wireless terminal. That is, the MSC judges whether there is a cloned wireless terminal of the called party user according to receiving multiple paging response messages. FIG. 4 is a flowchart of a method for detecting the same wireless terminal according to a paging response message in this embodiment. The method specifically includes the following steps:

[0066] In step 401, the MSC sends a paging message to the base station subsystem (BSS) to page the called user.

[0067] Step 402, the BSS pages the wireless terminal through the paging channel on the air interface. Since the International Mobile Subscriber Identity (IMSI) and Electronic Serial Number (ESN) of the cloned wireless terminal user are the same as those of the host, the cloned wireless terminal user can also receive and process the paging message on the air interface. ...

Embodiment 3

[0073] In this embodiment, it is determined whether the same wireless terminal exists by detecting the originating and accessing call request message sent by the wireless terminal. This embodiment is to detect whether there is a cloned wireless terminal in the calling party user. Firstly, on the network side, the state information of the wireless terminals within the jurisdiction of the network is stored, and the state information includes whether the wireless terminals are in a talking state or in an idle state at a certain moment. After the call connection from the calling party to the called party is established, during the call, the wireless terminals of the calling party and the called party are both in the call state. If the MSC receives an IMSI message with the same IMSI The originating and accessing call request of another wireless terminal, since the originating and accessing call request message can only be sent when the user's wireless terminal is in a non-communica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses one method to test same wireless terminal, which comprises the following steps: network side receives wireless terminal message or message with signal value; if there received collision message or signal values, that presents wireless terminal same wit the wireless terminal. This invention also discloses one device, which comprises the following parts: message reverie module to receive wireless terminal message or signal value and to send them to judge module; test and judge module to test and judge whether there is collision and whether there is wireless terminal same to wireless terminal.

Description

technical field [0001] The invention relates to identification technology of wireless terminals, in particular to a method and device for detecting identical wireless terminals. Background technique [0002] At present, with the rapid development of communication technology, the convenience of mobile terminals has brought great convenience to people's life, and more and more users use mobile terminals for communication. However, there is now a phenomenon that mobile terminals are cloned. For example, duplicators for Subscriber Identity Module (SIM) cards in the Global System for Mobile Communications (GSM) have appeared, and multiple identical SIM cards with the same number can be duplicated using this duplicator. In addition, duplication of User Identity Module (UIM) cards in Code Division Multiple Access (CDMA) systems has also occurred. The mobile terminal installed with the copied SIM card or UIM card will become the clone mobile terminal of the mobile terminal with th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q7/38H04Q7/34H04B17/00H04Q7/32H04W8/02H04W12/126H04W68/00
Inventor 李世前
Owner HUAWEI TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More