Summary of the invention
In view of this, main purpose of the present invention provides a kind of method of verifying the mobile phone users legitimacy, and this method can fundamentally solve portable terminal, and easily stolen problem of robbing and implementation are simple and reliable.
Above-mentioned purpose of the present invention is solved by the following technical solutions:
A kind of method of verifying the mobile phone users legitimacy comprises the steps: at least
An identification information that is used to verify the mobile phone users legitimacy is set in portable terminal in advance, and preserves the customized information that obtains according to described identification information;
In Authentication devices, preserve the user signing contract information of mobile phone users correspondence and the corresponding relation between the identification information in advance;
After portable terminal signs in to communication network, send the solicited message of an acquisition request corresponding to the mobile terminal identification information of the CAMEL-Subscription-Information of mobile phone users to Authentication devices;
Authentication devices is searched corresponding identification information according to solicited message, and will send to portable terminal corresponding to the authorization information of identification information;
Whether portable terminal receives after the authorization information from Authentication devices, relatively consistent with the authorization information that obtains from the Authentication devices side corresponding to the authorization information of customized information in the portable terminal, to verify the legitimacy of mobile phone users.
Wherein, whether described comparison may further include after consistent corresponding to the authorization information of customized information in the portable terminal and the authorization information that obtains from the Authentication devices side: if judge that authorization information is inconsistent, portable terminal is carried out and is stopped locked service operation that user's operation is responded.And can further play the illegal acoustic information of expression user identity or send the illegal announcement information of expression user identity to communication network.
Above-mentioned purpose of the present invention can also be solved by the following technical solutions:
A kind of method of verifying the mobile phone users legitimacy comprises the steps: at least
An identification information that is used to verify the mobile phone users legitimacy is set in portable terminal in advance, and preserves the customized information that obtains according to described identification information;
In Authentication devices, preserve the user signing contract information of mobile phone users correspondence and the corresponding relation between the identification information in advance;
After portable terminal signed in to communication network, Authentication devices sent the solicited message of the customized information of request portable terminal preservation to this portable terminal;
After portable terminal receives this solicited message, to the authorization information of Authentication devices transmission corresponding to the customized information of being preserved;
After Authentication devices receives authorization information from portable terminal, relatively whether more consistent with authorization information corresponding to the identification information of preserving in the Authentication devices from the authorization information of portable terminal, to verify the legitimacy of mobile phone users.
Wherein, described comparison from the authorization information of portable terminal with whether consistent corresponding to the authorization information of the identification information of preserving in the Authentication devices after may further include: Authentication devices sends to portable terminal with comparative result information.And if judge that authorization information is inconsistent, Authentication devices can stop to provide service to portable terminal by the notifying communication network.
In the method for above two kinds of checking mobile phone users legitimacies, no matter be to carry out verification operation by portable terminal, still carry out verification operation by Authentication devices, the authorization information in customized information of preserving in portable terminal and the described verification operation can be an identification information.
Preferably, the customized information of preserving in portable terminal is an identification information, authorization information in the described verification operation is the summary info corresponding to identification information, at this moment, carry out before the described verification operation, this method further comprises: portable terminal and Authentication devices carry out same summary computing at the identification information of being preserved respectively, generate corresponding to the summary info of mobile terminal identification information with corresponding to the summary info of Authentication devices respective identification information.In addition, this method may further include by carrying out authentication and generates a random number, and the computing of making a summary is like this undertaken by uniting by identification information and random number.
Preferably, the customized information of preserving in portable terminal is the summary info of identification information, authorization information in the described verification operation is the summary info corresponding to identification information, described preservation this moment comprises according to the customized information that described identification information obtains: portable terminal generates and preserves the summary info corresponding to mobile terminal identification information at the computing of making a summary of set identification information; Further comprise before carrying out described verification operation: Authentication devices carries out same summary computing at the identification information of being preserved, and generates the summary info corresponding to Authentication devices respective identification information.
Preferably, this method further comprises: portable terminal and Authentication devices obtain a single channel encryption key in the process of portable terminal being carried out authentication, the The data single channel encryption key that transmits between portable terminal and the Authentication devices is encrypted, and portable terminal or Authentication devices are decrypted after receiving data encrypted.
This method can be carried out described verification operation after portable terminal signs in to network and waits for a random time.
In said method, may further include the verification operation response time that sets in advance a regulation, if the verification operation in regulation is not finished described verification operation within the response time, directly determine that the checking result is illegal or repeat verification operation for mobile phone users.
In said method, in portable terminal, preserve after the described customized information, may further include before the described corresponding relation of preservation in Authentication devices: the identification information that will be provided with in portable terminal in advance is saved in Authentication devices synchronously.The simultaneous operation here can be undertaken by calling out special number head and identification information being attached to the mode that sends after this number head, also can be undertaken by supplementary service command operation sign indicating number.The supplementary service command operation sign indicating number here comprises the command operation sign indicating number and the command operation sign indicating number that is used for sending to Authentication devices from portable terminal identification information that is used for being provided with at Authentication devices identification information.Simultaneous operation can also be that mobile phone users is saved in Authentication devices by the manual service mode that operator provides with the identification information notice that be provided with in advance according to identity information in portable terminal.
In said method, the identification information in the portable terminal be by user input or produce at random by portable terminal.
This method may further include in portable terminal and is provided with, checks, changes or remove the step of the customized information in the portable terminal.This method further comprises setting in advance and is used for being provided with, check, the operator password of the customized information in change or the removing portable terminal, describedly in portable terminal, be provided with carrying out, check, the operating procedure of changing or remove customized information further comprises before: the prompting user imports the setting that is used for that sets in advance, check, the operator password of the identification information in change or the removing portable terminal, whether the operator password of judging user's input is correct, if, permission is provided with in portable terminal, check, change or the operation of removing customized information, otherwise forbid described operation.
This method may further include the switching information of whether carrying out authentication function is set in portable terminal, described portable terminal comprises that further whether the switching information of verifying in the portable terminal is for opening after signing in to network, if carry out described verification operation, otherwise do not carry out verification operation.
Customized information in this method is to have the customized information that does not have the permanent hold function of power supply.Authentication devices can be attaching position register HLR or the AC of AUC.
From technical scheme of the present invention as can be seen, the present invention is provided with the customized information corresponding to the mobile communications network user totem information that can forever preserve in portable terminal, and set up the corresponding relation of this identification information and this mobile communications network user's subscription data, this corresponding relation is kept in this mobile communications network user's the Authentication devices of subscription data, by the Authentication devices comparison of portable terminal or network side corresponding to the authorization information that is kept at the identification information in the portable terminal with whether identical corresponding to the authorization information that is kept at the identification information in the Authentication devices, if it is identical, illustrate that mobile phone users is legal, otherwise the explanation mobile phone users is illegal.Implementation of the present invention is very simple, only a customized information corresponding to identification information need be set on portable terminal, and in Authentication devices, add the corresponding relation of identification information and CAMEL-Subscription-Information, behind the portable terminal logging in network, carry out a compare operation then.
For the stolen portable terminal of robbing, if the disabled user has changed SIM card, so because the change of the current CAMEL-Subscription-Information of this SIM card correspondence, make and in verification operation of the present invention, can find two authorization information differences, thereby the active user who determines portable terminal obtains this portable terminal by back door.Cooperate the position of locking portable terminal, record portable terminal this moment and report mode such as public security organ, make the disabled user not only can not use and steal the portable terminal profit of robbing, but also can be arrested rapidly, thereby stop the robber effectively and steal the motivation of robbing portable terminal, and then fundamentally solving portable terminal stolen problem of robbing easily.
Concerning the user, the process that identification information is set can not need the user to carry out complicated input by the automated randomized generation of portable terminal.After being provided with identification information, whether identical portable terminal can carry out identification information compare operation automatically after signing in to network, do not need the user to carry out troublesome operation such as the input startup password, therefore bring great advantage to the user, make the present invention practical more.
For Virtual network operator, only need in present existing CAMEL-Subscription-Information, increase an identification information, and after portable terminal signs in to network, carry out the compare operation of an identification information.The whole operation process is simple, and does not need common carrier to increase equipment investment, to almost not influence of operation cost, makes also therefore that the present invention is easier to be accepted by common carrier.
In sum, the present invention can fundamentally solve portable terminal stolen problem of robbing easily, and implementation is simple and reliable.
Embodiment
The present invention is described in detail below in conjunction with the drawings and specific embodiments.
Fig. 1 shows overview flow chart of the present invention.As shown in Figure 1, at first in step 101, being provided with one in portable terminal can not have the permanent identification information of preserving of power supply, and preserves the customized information corresponding to this identification information.This identification information can be any character combination that figure place is not limit, and is preferably the use numerical character, and under portable terminal does not have electric power thus supplied, and this identification information still can be kept in the portable terminal and can not lose.
In step 102, in the user signing contract information of HLR, increase user signing contract information and be arranged on corresponding relation between the identification information in the portable terminal.
In step 103, after portable terminal signs in to network, by relatively corresponding to the authorization information of the customized information of self preserving in the portable terminal with verify the legitimacy of mobile terminal user corresponding to the authorization information of the identification information of preserving among the HLR.If two authorization information unanimities show that then the active user of portable terminal is legal, otherwise the active user of explanation portable terminal is illegal user, and this moment, portable terminal can lock with the refusal operation, and perhaps network can stop portable terminal being served.
Overall procedure of the present invention has been described above, and the present invention is described in detail below in conjunction with specific embodiment.
In the first embodiment of the present invention, verify its user's legitimacy by portable terminal.Specifically, comprise as shown in Figure 2 following steps.
In step 201, in portable terminal, be provided with and preserve the identification information that forever to preserve.
In step 202, in the user signing contract information of HLR, increase user signing contract information and be arranged on corresponding relation between the identification information in the portable terminal.
In step 203, portable terminal sends the solicited message of a request mobile terminal identification information to HLR by mobile switching centre (MSC) after signing in to network.
In step 204, HLR will send to corresponding mobile terminal corresponding to the identification information of active user's CAMEL-Subscription-Information of this portable terminal by MSC after the solicited message that receives from portable terminal.
In step 205, portable terminal is behind the identification information that receives from HLR, relatively whether the identification information that obtains from HLR is consistent with the identification information of self preserving, if the two unanimity, show that then mobile terminal user is a validated user, at this moment portable terminal can carry out any operation, if the two is inconsistent, shows that then mobile terminal user is illegal user.
In the second embodiment of the present invention, verify its user's legitimacy equally by portable terminal self.Specifically, comprise as shown in Figure 3 following steps.
In step 301, the identification information that can forever preserve is set in portable terminal.
In step 302, portable terminal calculates summary info to identification information, and preserves this summary info, the customized information corresponding to identification information that the summary info is here just mentioned in the step 101.The concrete operations that summary info generates are common practise for a person skilled in the art, repeat no more here.
In step 303, in the user signing contract information of HLR, increase user signing contract information and be arranged on corresponding relation between the identification information in the portable terminal.
In step 304, portable terminal sends the solicited message of a request mobile terminal identification information to HLR by MSC after signing in to network.
In step 305, after HLR receives request from portable terminal, use the identification information of being preserved to generate summary info, then the summary info that generates is sent to portable terminal by MSC.
In step 306, whether the summary info of the identification information that portable terminal relatively obtains from HLR is consistent with the summary info of the identification information of self preserving, if the two unanimity, show that then mobile terminal user is a validated user, at this moment portable terminal can carry out any operation, if the two is inconsistent, show that then mobile terminal user is illegal user.
Compare with first embodiment of the invention, second embodiment generates summary info by identification information, preserves this summary info then, and HLR will send to portable terminal by the summary info that identification information generates, thereby improve fail safe of the present invention.Certainly, also be appreciated that, portable terminal can only be preserved an original identification information, only generates summary info with the identification information of self preserving again after the summary info that receives the identification information that obtains from HLR, then two summary infos is compared.
In the third embodiment of the present invention, verify its user's legitimacy equally by portable terminal self.Specifically, comprise as shown in Figure 4 following steps.
In step 401, in portable terminal, be provided with and preserve the identification information that forever to preserve.
In step 402, in the user signing contract information of HLR, increase user signing contract information and be arranged on corresponding relation between the identification information in the portable terminal.
In step 403, mobile terminal-opening and sign in to network after, to the solicited message that HLR sends a request mobile terminal identification information, carry an interim random number that produces by MSC simultaneously.
In step 404, HLR receives after the request and random number from portable terminal, utilize identification information and the random number preserved to unite the computing of making a summary corresponding to active user's CAMEL-Subscription-Information of this portable terminal, generate a summary info, and summary info is sent to corresponding mobile terminal by MSC.
In step 405, after portable terminal receives summary info from HLR, utilize the random number that produces in the identification information oneself preserved and the step 403 to unite the computing of making a summary, generate a summary info.
In step 406, whether the summary info that portable terminal relatively obtains from HLR is with self to calculate resulting summary info consistent, if the two unanimity, show that then mobile terminal user is a validated user, at this moment portable terminal can carry out any operation, if the two is inconsistent, show that then mobile terminal user is illegal user.
Compare with second embodiment of the invention, the 3rd embodiment further produces a random number, produces summary info by using identification information and random number join operation, then summary info is compared, thereby has further improved fail safe of the present invention.
In above-mentioned three kinds of embodiment, all be the checking of carrying out user validation at mobile terminal side.In the end a step demonstrate,prove out user identity illegal after, portable terminal can be carried out the locking keyboard, user's operation is stopped processing such as response, thereby makes the user can not re-use this portable terminal.And can send a warning message to common carrier by communication network, public security organ handles by the common carrier report, or directly reports to the police to public security organ.In addition, carry out the locking keyboard, when user's operation is stopped response etc. and handles, portable terminal can be play such as acoustic informations such as " you are illegal user ", to cause disabled user people around's attention.
In fourth embodiment of the invention, by the legitimacy of HLR checking mobile phone users.Its concrete following steps that comprise as shown in Figure 5 of handling.
In step 501, in portable terminal, be provided with and preserve the identification information that forever to preserve.
In step 502, in the user signing contract information of HLR, increase user signing contract information and be arranged on corresponding relation between the identification information in the portable terminal.
In step 503, after portable terminal signed in to network, portable terminal sent to HLR with the identification information of self preserving.Portable terminal can be after the requests for identification information order that the request portable terminal that receives HLR is preserved, and just sends described identification information to HLR.
In step 504, HLR searches portable terminal corresponding identification information according to active user's CAMEL-Subscription-Information of portable terminal correspondence.
In step 505, identification information that HLR relatively gets access to from portable terminal and the identification information that gets access to by step 504, if the two unanimity, show that then mobile terminal user is a validated user, at this moment portable terminal can carry out any operation, if the two is inconsistent, show that then mobile terminal user is illegal user.
In the fifth embodiment of the present invention, verify its user's legitimacy equally by HLR.Specifically, comprise as shown in Figure 6 following steps.
In step 601, the identification information that can forever preserve is set in portable terminal.
In step 602, portable terminal generates summary info to identification information, and preserves this summary info.
In step 603, in the user signing contract information of HLR, increase user signing contract information and be arranged on corresponding relation between the identification information in the portable terminal.
In step 604, after portable terminal signed in to network, portable terminal sent to HLR with the summary info of self preserving.Portable terminal can be behind the summary info request command of the identification information that the request portable terminal that receives HLR is preserved, and just sends described summary info to HLR.
In step 605, HLR searches portable terminal corresponding identification information according to active user's CAMEL-Subscription-Information of portable terminal correspondence.
In step 606, HLR carries out same summary computing to finding identification information.
In step 607, summary info that HLR relatively gets access to from portable terminal and the summary info that calculates by step 606, if the two unanimity, show that then mobile terminal user is a validated user, at this moment portable terminal can carry out any operation, if the two is inconsistent, show that then mobile terminal user is illegal user.
Compare with fourth embodiment of the invention, the 5th embodiment generates summary info to identification information and preserves this summary info then, and summary info is sent to HLR, and HLR generates summary info with identification information equally, compare two summary infos then, thereby improved fail safe of the present invention.Certainly, be appreciated that also portable terminal can only preserve an original identification information, only need be when HLR sends identification information again to the identification information of self the preserving computing of making a summary, then the summary info that calculates is sent to HLR.
In the sixth embodiment of the present invention, verify its user's legitimacy equally by HLR.Specifically, comprise as shown in Figure 7 following steps.
In step 701, in portable terminal, be provided with and preserve the identification information that forever to preserve.
In step 702, in the user signing contract information of HLR, increase user signing contract information and be arranged on corresponding relation between the identification information in the portable terminal.
In step 703, after portable terminal signed in to network, HLR produced a random number and sends this random number to portable terminal.
In step 704, portable terminal utilizes the identification information self preserved and received random number to unite the computing of making a summary, and obtains a summary info.
In step 705, portable terminal sends to HLR with the summary info that previous step obtains suddenly.
In step 706, HLR receives after the summary info from portable terminal, uses the random number that produces in the identification information of active user's CAMEL-Subscription-Information of portable terminal correspondence and the step 703 to unite the computing of making a summary.
In step 707, summary info that HLR relatively gets access to from portable terminal and the summary info that calculates by step 706, if the two unanimity, show that then mobile terminal user is a validated user, at this moment portable terminal can carry out any operation, if the two is inconsistent, show that then mobile terminal user is illegal user.
Compare with fifth embodiment of the invention, the 6th embodiment further produces a random number, produces summary info by using identification information and random number combined calculation, then summary info is compared, thereby has further improved fail safe of the present invention.
In the 4th to the 6th embodiment, if last step judges that the mobile phone users identity is illegal, HLR can lock this portable terminal by communication network, just stops to provide service to portable terminal.
In the above-described embodiments, portable terminal can obtain a single channel encryption key (KC) by after the authentication of AC among the present invention, and HLR also can obtain this KC simultaneously, and KC is sent to corresponding M SC preservation.Therefore, portable terminal sends to MSC after can using KC to encrypt when sending identification information or summary info to HLR, and sends to HLR after using the KC deciphering by MSC.In like manner, HLR can send to portable terminal when portable terminal sends identification information or summary info after using KC to encrypt at MSC, after portable terminal receives information encrypted, use KC to decipher this information, carries out subsequent operation then.
In above-mentioned all embodiment, all be the operation of after portable terminal logs on network, verifying the mobile phone users legitimacy.This operating process can be after portable terminal logs on network, and just authentication can wait for also that by carrying out immediately afterwards a random time carries out afterwards again.
In the present invention, then can be provided with the legitimacy of mobile phone users if verify with checking result notification portable terminal to user validation at mobile terminal side.If portable terminal is not verified the result in a period of time that sets in advance, for example the communication between portable terminal and the HLR goes wrong, and then carries out verification operation once more.This process can periodically or aperiodically repeat, till executing once complete verification operation.
If verify the legitimacy of mobile phone users, so when the obstructed out-of-date service that can directly lock of checking to this portable terminal in the HLR side.If perhaps HLR is not verified the result in a period of time that sets in advance, for example the communication between portable terminal and the HLR goes wrong, and then carries out verification operation once more.This process can periodically or aperiodically repeat, till this portable terminal is executed once complete verification operation.
In the present invention, can pass through dual mode from portable terminal to HLR transmission identification information or summary info.A kind of mode is to call out a special number head, and the above-mentioned information that will need then to send sends to HLR after being attached to this number head.For example, suppose that identification information is 5134356, call out a special number head 17999, then identification information 5134356 is attached to after 17999, just call out 179995134356, HLR will extract identification information 5134356 according to agreement in advance like this.The second way is to realize by increase supplementary service command operation sign indicating number in HLR.The identification information of portable terminal for example, is set at HLR by the SetPI command code that is used for being provided with identification information.Iff being that identification information with portable terminal sends to HLR and compares checking, and need in HLR, not carry out relative set, then can use the SendPI command code that is used to send identification information.
In the present invention, portable terminal produces identification information and can produce automatically, also can manually produce.Under situation about producing automatically, when if the user has selected antitheft operation execution anti-theft feature to be provided with by the menu of portable terminal, portable terminal judges whether the identification information of oneself preserving is empty, if be empty, the then automated randomized generation of portable terminal and preserve an identification information, then this identification information is sent among the HLR automatically, for example by using the SetPI command code.HLR sets up the corresponding relation between identification information and the portable terminal active user CAMEL-Subscription-Information after the identification information that has obtained portable terminal.If manually produce, portable terminal can require identification information of user oneself input, preserves the information of user's input after user's input, then this identification information is sent among the HLR.In automated manner, the identification information of Chan Shenging can be shown to the user at random.Portable terminal is not a sky if find the own identification information of preserving when carrying out anti-theft feature and be provided with, and then portable terminal directly sends to HLR with this identification information and preserves.
The operation that mobile phone users can be provided with, check, change and remove identification information.The user is provided with by above-mentioned execution anti-theft feature, opens anti-theft switch, will the setting or the change result of identification information be synchronized in the subscription data of this user among the HLR simultaneously; Equally,, close anti-theft switch, simultaneously corresponding identification information in the subscription data of this user among the HLR is emptied by the setting of cancellation anti-theft feature.It is the switching information that is used to determine whether to carry out authentication function that the anti-theft switch here can be understood as.
If verification operation carries out in the HLR side, then whether HLR can be that sky judges whether to carry out antitheft verification operation according to corresponding identification information in user's the subscription data.If verification operation carries out at mobile terminal side, then portable terminal judges whether to carry out antitheft verification operation according to anti-theft switch.
Can password be set at portable terminal, restriction to the setting of identification information, check, change and clear operation.For the ease of the Operation and Maintenance of validated user, portable terminal should be able to carry out attended operation to portable terminal under the state of not logining the mobile network.
For example, no matter be automated manner or manual mode, the user can check identification information, can further set in advance the password that the user was provided with, checks, changes and removed identification information this moment.The user need check that identification information must input password, and portable terminal judges whether password is correct, if correctly allow the user to check, otherwise does not allow the user to check.Like this, can prevent further that the robber from obtaining the user and being arranged on identification information in the portable terminal, thereby reach anti-theft effect.
Need to prove, after portable terminal is provided with anti-theft feature, no matter the user changes SIM card or replacing number, and the identification information of portable terminal does not change in this user's of corresponding HLR the subscription data, just still consistent with the identification information of portable terminal preservation, even portable terminal still can pass through verification operation of the present invention after changing SIM card so.On the contrary, if identification information changes in user's the subscription data, just no longer consistent with the identification information of portable terminal preservation, then portable terminal all can not pass through verification operation of the present invention.Therefore, for the stolen situation of portable terminal, because identification information can not be consistent with the identification information of the portable terminal of stealing in robber's the subscription data, therefore, the robber can't normally use this portable terminal.
If validated user has been forgotten the identification information that portable terminal is preserved, then this validated user can be checked this identification information by password; Equally, this user also can discover and seize the identification information that oneself is arranged in the subscription data according to proof of identification from operator.Therefore, portable terminal increases anti-theft feature, can not bring trouble in the maintenance to validated user.
Authentication devices among the present invention can be HLR, also can be that other any network equipments are finished function of the present invention.The function that HLR carries out can be carried out by AC, because present HLR and AC are positioned within the same physical entity, therefore adopts HLR to carry out verification operation.Be appreciated that at HLR and AC be respectively under the situation of two network equipments, all operations of the present invention can substitute HLR by AC.
Therefore be appreciated that the above only is preferred embodiment of the present invention, or not within the spirit and principles in the present invention not all in order to restriction the present invention, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.