CN101188860B - A method and device for recognizing exceptional terminal - Google Patents
A method and device for recognizing exceptional terminal Download PDFInfo
- Publication number
- CN101188860B CN101188860B CN2007101252847A CN200710125284A CN101188860B CN 101188860 B CN101188860 B CN 101188860B CN 2007101252847 A CN2007101252847 A CN 2007101252847A CN 200710125284 A CN200710125284 A CN 200710125284A CN 101188860 B CN101188860 B CN 101188860B
- Authority
- CN
- China
- Prior art keywords
- ssd
- update
- shared secret
- authentication
- secret data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 230000002159 abnormal effect Effects 0.000 claims abstract description 31
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 230000004044 response Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000035800 maturation Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method for identifying abnormal terminals and the device thereof, wherein, the method includes the following steps: authentication requests including authentication information are received, mobile terminals are authenticated according to the authentication information, when the authentication is failed, the cause valves of authentication failures are received, and the mobile terminal types of the authentication failures are judged and recorded according to the cause values. The method and the device provided by the invention realize the classified recognition of different abnormal terminals through judging the cause values of the authentication failures.
Description
Technical field
The present invention relates to moving communicating field, relate in particular to a kind of method and device of discerning abnormal terminals.
Background technology
At CDMA (Code Division Multiple Access, code division multiple access inserts) the network networking initial stage, because historical reasons operator does not consider the safety issue of cdma system, in network, do not open authentication functions, cause part not support the portable terminal of authentication functions to insert network in this period portable terminal.Gradually after the maturation, operator wishes the security mechanism by cdma system, will not support the portable terminal of authentication functions to identify at the later stage network operation.
In the original network of CDMA; reason owing to office's square tube reason; secure data A_KEY (A-key) loss of data of part portable terminal; cause the A_KEY data of A_KEY data in the portable terminal and network side inconsistent, when network was not opened authentication functions, these portable terminals can access network; when network possesses authentication functions; these portable terminals can not access network, and in order to protect benefits of operators, the portable terminal that also needs these to be lost the A_KEY data identifies.
In cdma network; because artificial operation; have two MDN (Mobile DirectoryNumber; Mobile Directory Number), IMSI ((International Mobile SubscriberIdentity; international mobile subscriber identity)) the on all four portable terminal of A_KEY access network simultaneously; also Jiu Shi Margin Machine, in order to protect operator and user's interests, also Xu is Yaoed Margin Machine is identified.
At GSM/UMTS (Global System for Mobile communications/UniversalMobile Telecommunications System, mobile general-purpose system/the Universal Mobile Telecommunications System in the whole world) in the system, also there be the portable terminal of authentication functions, the similar problem of losing the portable terminal, Margin Machine of A_KEY data do not supported, operator wishes the security mechanism by system, it is identified, in order to subsequent treatment.
At present, HLR (home location register, home location register) the authentication success there is log record with the result who fails, MSC (the Mobile Switching Center of part, mobile switching centre) reason of failed authentication has been carried out record, but,, therefore can't identify the portable terminal of not supporting authentication functions and lose the portable terminal of A_KEY data by its record because the record of HLR is careful inadequately.For the record on the MSC, ability so its record of not possessing record failed authentication reason owing to part MSC are not comprehensive, on the other hand, the difficulty that the data of MSC are added up and collected is very big, therefore can't realize not supporting the portable terminal of authentication functions and the identification of losing the portable terminal of A_KEY data.
The identification of Dui Yu Margin Machine, existing scheme comprises: the temporal information and the positional information of record updating of terminal position, utilize general knowledge to judge whether to exist same terminal according to the time interval, for example position update time is that 10 AM is in Beijing, positional information is in Shenzhen after ten minutes, if a user then this situation can not occur, judge in view of the above that therefore the user that twice position, front and back upgraded is two same terminal, but not same terminal.But all there have been the RM in the network in this method Shi Margin Machine and prototype, are a kind of identifying schemes afterwards, can not solve the problem that prevents to occur in the network two same terminal.
Summary of the invention
The embodiment of the invention provides a kind of method and device of discerning abnormal terminals, realizes abnormal terminals is carried out Classification and Identification, and the type of recording exceptional terminal.
The embodiment of the invention provides a kind of method of discerning abnormal terminals, comprising:
Reception comprises the authentication request of authentication information, described authentication information comprises the information of Shared Secret Data SSD, described authentication request comprises the shared secret data (SSD) update request, write down the number of times of described shared secret data (SSD) update, according to described authentication information portable terminal is carried out authentication, when failed authentication, receive the cause value of failed authentication;
According to the number of times and the described cause value of described shared secret data (SSD) update, judge and write down the mobile terminal style of failed authentication; Wherein, described number of times and described cause value according to described shared secret data (SSD) update, judge and the mobile terminal style of record failed authentication comprises: when described cause value is the shared secret data (SSD) update failure, and described shared secret data (SSD) update number of times is recorded as the portable terminal of losing A-key A_KEY data when being one time; Perhaps when described cause value be shared secret data (SSD) update when failure, and described shared secret data (SSD) update number of times is twice when above, Ji Lu is a Margin Machine.
The embodiment of the invention also provides a kind of device of discerning abnormal terminals, comprise: authenticating unit, judging unit, record cell one, record cell two, described authenticating unit are used for according to described authentication information portable terminal being carried out authentication after reception comprises the authentication request of authentication information; Described authentication information comprises the information of Shared Secret Data SSD, and described authentication request comprises the shared secret data (SSD) update request; Described record cell two is used to write down the number of times of described shared secret data (SSD) update;
Described judging unit is used for receiving the cause value of failed authentication when described authenticating unit failed authentication, the mobile terminal style of judging failed authentication according to the number of times and the described cause value of described shared secret data (SSD) update; Wherein, described number of times according to described cause value and described shared secret data (SSD) update, judge that the mobile terminal style of failed authentication comprises: when described cause value is the shared secret data (SSD) update failure, and described shared secret data (SSD) update number of times is when being one time, for losing the portable terminal of A_KEY data; Perhaps when described cause value be shared secret data (SSD) update when failure, and described shared secret data (SSD) update number of times is that twice , when above is Margin Machine;
Described record cell one is used to write down described mobile terminal style.
Method that the embodiment of the invention provided and device, by receiving the cause value of failed authentication, judge the type of the portable terminal of failed authentication according to described failed authentication cause value, be recorded as different mobile terminal styles at different failed authentication reasons, compared with prior art, realized the record of the Classification and Identification and the abnormal terminals type of abnormal terminals, therefore, operator can discern different abnormal terminals types according to described record, at different abnormal terminals, meet the network insertion control of its interests, help better maintaining benefits of operators and terminal use's interests.
Description of drawings
Fig. 1 is the method flow diagram of the identification abnormal terminals of the specific embodiment of the invention one;
Fig. 2 is the method flow diagram of the identification abnormal terminals of the specific embodiment of the invention two;
Fig. 3 is the structure chart of the identification abnormal terminals device of the embodiment of the invention.
Embodiment
The embodiment of the invention is by screening the reason of abnormal terminals failed authentication on HLR, realize the identification of abnormal terminals, described HLR can be (the Authentication Center of the HLR/AC in the cdma system, AUC), also can be (the Authentication Center of the HLR/AUC in the GSM/UMTS system, AUC), the abnormal terminals that the embodiment of the invention is alleged comprises: do not support authentication functions portable terminal, lose the portable terminal Huo Margin Machine of A_KEY data.The terminal of embodiment of the invention indication is portable terminal, is designated hereinafter simply as terminal.
The SSD of terminal (Shared Secret Data, Shared Secret Data) renewal comprises the active renewal of system's initiation and the passive renewal that terminal is initiated, for initiatively upgrading, only on HLR, be provided with the shared secret data (SSD) update that the first time, system initiated is upgraded, follow-uply no longer upgrade, only carry out passive renewal.
HLR receives the cause value of the failed authentication of MSC transmission, and for the cause value that lacks authentication parameter, its corresponding abnormal terminals is not for supporting the terminal of authentication functions; For the cause value of shared secret data (SSD) update failure, its corresponding abnormal terminals may for the Zhong Duan that loses the A_KEY data with Margin Machine.For the terminal of losing the A_KEY data, its shared secret data (SSD) update first will be failed, and Dui Yu Margin Machine has carried out after SSD initiatively upgrades Dang a terminal in Margin Machine and the prototype, and another terminal is because the SSD data are inconsistent, the passive renewal of SSD failure, therefore, according to the number of times of shared secret data (SSD) update can distinguish lose the A_KEY data Zhong Duan with Margin Machine.
Below referring to Fig. 1, method flow diagram for the identification abnormal terminals of the specific embodiment of the invention one, active for terminal SSD is upgraded, only on HLR, be provided with the shared secret data (SSD) update that the first time, system initiated is upgraded, follow-uply no longer upgrade, only carry out passive renewal, below its step be described in detail:
S101, HLR receive the authentication request that comprises authentication information, described authentication information comprises SSD information, described request comprises the shared secret data (SSD) update request, and described authentication request is initiated at terminal by system, also can initiatively be initiated by terminal, after receiving described request, shared secret data (SSD) update is carried out record, preferred, the time of shared secret data (SSD) update is carried out record, promptly on the record of shared secret data (SSD) update, stamp timestamp, in order to the follow-up better analysis of operator, processing;
S102, HLR carry out authentication according to described authentication information to terminal, and the process of concrete authentication and the terminal of authentication success are not that the embodiment of the invention is concerned about, therefore do not give unnecessary details herein;
S103, failed authentication, MSC is to the cause value of HLR transmission failed authentication, shown in being exemplified below:
enum?REPORT_TYPE
{
RT_NOT_USED=0,
RT_UNSPECIFIED_VIOLATION, the unspecified authentication fault of/* */
RT_MIN_ESN_MISMATCH ,/* MIN ESN do not match */
RT_RANDC_MISMATCH ,/* RANDC do not match */
RT_RESERVED1 ,/* reservation */
RT_SSD_UPDATE_FAIL ,/* shared secret data (SSD) update failure */
RT_RESERVED2 ,/* reservation */
RT_COUNT_MISMATCH ,/* COUNT value do not match */
RT_RESERVED3 ,/* reservation */
RT_UCHAL_FAIL ,/* unique challenge failure */
RT_UNSOLICITED_BSCHAL, the base station inquiry * that/* MS initiatively initiates/
RT_SSD_UPDATE_NO_RESPONSE ,/* shared secret data (SSD) update do not receive the response */
RT_COUNT_UPDATE_NO_RESPONSE ,/* COUNT upgrade do not receive response */
RT_UCHAL_NO_RESPONSE ,/* unique challenge do not receive the response */
RT_AUTHR_MISMATCH ,/* Authentication Response do not match */
RT_TERMTYP_MISMATCH ,/* terminal type do not match */
RT_MISSING_AUTH_PARA ,/* lack authentication parameter */
RT_RPTTYP_BUTT
};
At the cause value that receives, HLR identifies the cause value of shared secret data (SSD) update failure and lacks the cause value of authentication parameter;
S104, whether judge described cause value for lacking authentication parameter, if then execution in step 106, if not, then execution in step 105;
S105, judge that whether described cause value is the shared secret data (SSD) update failure,, if not, then finish if then execution in step 107;
S106, for the failed authentication cause value that lacks authentication parameter, it is recorded as the terminal of not supporting authentication, in order to analysis, the processing of follow-up operator.
Preferably, write down the time of described authentication simultaneously, stamp timestamp promptly for the above-mentioned record of the terminal of authentication of not supporting, better carry out Terminal Service and processing in order to operator;
Shared secret data (SSD) update record on S107, the inquiry HLR judges whether described shared secret data (SSD) update is the shared secret data (SSD) update first time, if then execution in step 109, if not, then execution in step 108;
S108, for the shared secret data (SSD) update failure reason value of the shared secret data (SSD) update of twice above number of times, it is former because Margin Machine to be recorded as failed authentication, shared secret data (SSD) update setting according to system intialization, for two identical terminals, when the SSD of one of them terminal has initiatively upgraded, the SSD of another terminal is not owing to upgrade, therefore with HLR on SSD inconsistent, therefore upgrade failure;
S109, for the cause value of the shared secret data (SSD) update failure first time, be recorded as the terminal of losing the A_KEY data, when the A_KEY of terminal loss of data, can't finish shared secret data (SSD) update, therefore when shared secret data (SSD) update failure first, the described abnormal terminals that carries out authentication is the terminal of losing the A_KEY data.
After dissimilar abnormal terminals identified,, distinguish different terminals,, can allow its access network, perhaps refuse its access network according to the authentication management strategy at different terminals by inquiring about the record of described terminal type.
In the said method, there is not sequencing between step 104 and the step 105, promptly can judge whether earlier to judge whether again for lacking the failed authentication cause value of authentication parameter, referring to Fig. 2 into the shared secret data (SSD) update failure, method flow diagram for the identification abnormal terminals of the specific embodiment of the invention two, upgrade for the active of terminal SSD, only on HLR, be provided with the shared secret data (SSD) update that the first time, system initiated is upgraded, follow-uply no longer upgrade, only carry out passive renewal, concrete steps are as follows:
S201, HLR receive authentication request, described request comprises the shared secret data (SSD) update request, described authentication request is initiated at terminal by system, also can initiatively initiate, after receiving described request, shared secret data (SSD) update be carried out record by terminal, preferably, time to shared secret data (SSD) update is carried out record, promptly stamps timestamp on the record of shared secret data (SSD) update, in order to the follow-up better analysis of operator, processing;
S202, HLR carry out authentication according to described authentication information to terminal, and the process of concrete authentication and the terminal of authentication success are not that the embodiment of the invention is concerned about, therefore do not give unnecessary details herein;
S203, failed authentication, MSC is to the cause value of HLR transmission failed authentication, shown in being exemplified below:
enum?REPORT_TYPE
{
RT_NOT_USED=0,
RT_UNSPECIFIED_VIOLATION, the unspecified authentication fault of/* */
RT_MIN_ESN_MISMATCH ,/* MIN ESN do not match */
RT_RANDC_MISMATCH ,/* RANDC do not match */
RT_RESERVED1 ,/* reservation */
RT_SSD_UPDATE_FAIL ,/* shared secret data (SSD) update failure */
RT_RESERVED2 ,/* reservation */
RT_COUNT_MISMATCH ,/* COUNT value do not match */
RT_RESERVED3 ,/* reservation */
RT_UCHAL_FAIL ,/* unique challenge failure */
RT_UNSOLICITED_BSCHAL, the base station inquiry * that/* MS initiatively initiates/
RT_SSD_UPDATE_NO_RESPONSE ,/* shared secret data (SSD) update do not receive the response */
RT_COUNT_UPDATE_NO_RESPONSE ,/* COUNT upgrade do not receive response */
RT_UCHAL_NO_RESPONSE ,/* unique challenge do not receive the response */
RT_AUTHR_MISMATCH ,/* Authentication Response do not match */
RT_TERMTYP_MISMATCH ,/* terminal type do not match */
RT_MISSING_AUTH_PARA ,/* lack authentication parameter */
RT_RPTTYP_BUTT
};
At the cause value that receives, HLR identifies the cause value of shared secret data (SSD) update failure and lacks the cause value of authentication parameter;
S204, judge that whether described cause value is the shared secret data (SSD) update failure, if then execution in step 205, if not, then execution in step 208;
Shared secret data (SSD) update record on S205, the inquiry HLR judges whether described shared secret data (SSD) update is the shared secret data (SSD) update first time, if then execution in step 207, if not, then execution in step 206;
S206, for the shared secret data (SSD) update failure reason value of the shared secret data (SSD) update of twice above number of times, it is former because Margin Machine to be recorded as failed authentication, shared secret data (SSD) update setting according to system intialization, for two identical terminals, when the SSD of one of them terminal has initiatively upgraded, the SSD of another terminal is not owing to upgrade, therefore with HLR on SSD inconsistent, therefore upgrade failure;
S207, for the cause value of the shared secret data (SSD) update failure first time, be recorded as the terminal of losing the A_KEY data, when the A_KEY of terminal loss of data, can't finish shared secret data (SSD) update, therefore when shared secret data (SSD) update failure first, the described abnormal terminals that carries out authentication is the terminal of losing the A_KEY data;
S208, whether judge described cause value for lacking authentication parameter, if then execution in step 209, if not, then finish;
S209, for the failed authentication cause value that lacks authentication parameter, it is recorded as the terminal of not supporting authentication, in order to analysis, the processing of follow-up operator; Preferably, write down the time of described authentication simultaneously, stamp timestamp promptly for the above-mentioned record of the terminal of authentication of not supporting, better carry out Terminal Service and processing in order to operator;
Said method has been realized the Classification and Identification of different terminals, and is further just identified when it is networked by said method in Margin Machine, realized identification in advance.
The method of the embodiment of the invention also can realize on HSS (Home Subscriber Server, home subscriber server), does not repeat them here.
After dissimilar abnormal terminals identified,, distinguish different terminals,, can allow its access network, perhaps refuse its access network according to the authentication management strategy at different terminals by inquiring about the record of described terminal type.
For realizing said method, Fig. 3 is the structure chart of the identification abnormal terminals device of the embodiment of the invention, and described device comprises authenticating unit 310, judging unit 311, record cell 1, record cell 2 312 and query interface.Described authenticating unit 310 is used to receive authentication request, and described request comprises the shared secret data (SSD) update request, and terminal is carried out authentication; Described judging unit 311 is used under the situation of terminal authentication failure, judge whether the failed authentication cause value that MSC sends fails for lacking authentication parameter or shared secret data (SSD) update, also be used for query note unit 2 312 to judge whether described shared secret data (SSD) update serves as to upgrade for the first time; Described record cell 2 312 is used to write down the number of times of shared secret data (SSD) update, record cell 1 be used for when described failed authentication former because be recorded as the terminal of not supporting authentication when lacking authentication parameter, the former renewal for the first time because of SSD of perhaps described failed authentication is recorded as the terminal of losing the A_KEY data when failing, remember that recording is Margin Machine when the former shared secret data (SSD) update because of twice above number of times of perhaps described failed authentication is failed; Described query interface is used to inquire about the data of described record cell 1.
Upgrade for the active of terminal SSD, only be provided with on HLR the shared secret data (SSD) update that the first time, system initiated is upgraded, follow-uply no longer upgrade, only carry out passive renewal, the concrete operation of said apparatus is as follows:
Authenticating unit 310 receives authentication request, described request comprises the shared secret data (SSD) update request, terminal is carried out authentication, the number of times of the described shared secret data (SSD) update of described record cell 2 312 records, when failed authentication, described judging unit 311 receives the failed authentication cause value that MSC sends, judge that whether described failed authentication cause value is for lacking the failure of authentication parameter or shared secret data (SSD) update, when described failed authentication cause value when lacking authentication parameter, described record cell 1 is recorded as the terminal of not supporting authentication, when described failed authentication cause value is the shared secret data (SSD) update failure, described judging unit 311 judges further whether the shared secret data (SSD) update record of described record cell 2 312 records is to upgrade for the first time, when described shared secret data (SSD) update upgraded for the first time, described record cell 1 is recorded as the terminal of losing the A_KEY data, when described shared secret data (SSD) update is the renewal of the number of times more than twice, shared secret data (SSD) update setting according to system intialization, for two identical terminals, when the SSD of one of them terminal has initiatively upgraded, the SSD of another terminal is not owing to upgrade, inconsistent with the SSD on the HLR, therefore upgrade failure, described record cell one 313 Ji Lu are Margin Machine.
Preferably, the time of the described shared secret data (SSD) update of described record cell 2 312 records, promptly on the record of described shared secret data (SSD) update number of times, stamp timestamp, for example, be recorded as shared secret data (SSD) update for the first time, the time is 12: 12: 12 on the 1st January in 2005, preferably, when described record cell 1 can also write down the failed authentication reason, the time of writing down described authentication, promptly on the failed authentication reason, stamp timestamp information.
Said apparatus is arranged on HLR or the HSS, and its part is the logic function unit module, rather than the physical function module, during specific implementation, said units can be provided with respectively, also can be realized by a unit.
Compared with prior art, the method and the device of the identification abnormal terminals that the embodiment of the invention provides, when failed authentication, receive the failed authentication cause value that MSC sends, by identification failed authentication cause value, write down the terminal of different failed authentications, realized the Classification and Identification of different abnormal terminals, and, Dui Yu Margin Machine, can effectively prevent same terminal access network simultaneously, be a kind of processing scheme in advance.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (8)
1. a method of discerning abnormal terminals is characterized in that, comprising:
Reception comprises the authentication request of authentication information, described authentication information comprises the information of Shared Secret Data SSD, described authentication request comprises the shared secret data (SSD) update request, write down the number of times of described shared secret data (SSD) update, according to described authentication information portable terminal is carried out authentication, when failed authentication, receive the cause value of failed authentication;
According to the number of times and the described cause value of described shared secret data (SSD) update, judge and write down the mobile terminal style of failed authentication;
Wherein, described number of times and described cause value according to described shared secret data (SSD) update, judge and the mobile terminal style of record failed authentication comprises: when described cause value is the shared secret data (SSD) update failure, and described shared secret data (SSD) update number of times is recorded as the portable terminal of losing A-key A_KEY data when being one time; Perhaps when described cause value be shared secret data (SSD) update when failure, and described shared secret data (SSD) update number of times is twice when above, Ji Lu is a Margin Machine.
2. the method for claim 1 is characterized in that, also comprises: write down the time of described shared secret data (SSD) update, and write down the time of described authentication.
3. the method for claim 1 is characterized in that, also comprises: set in advance the shared secret data (SSD) update of initiating for system, only the shared secret data (SSD) update that it is initiated is for the first time upgraded operation.
4. the method for claim 1, it is characterized in that, also comprise after the described mobile terminal style of record: receive the inquiry to the mobile terminal style of described record, be used at different portable terminals, whether decision allows its access network according to the authentication management strategy.
5. a device of discerning abnormal terminals is characterized in that, comprising: authenticating unit, judging unit, record cell one, record cell two,
Described authenticating unit is used for according to described authentication information portable terminal being carried out authentication after reception comprises the authentication request of authentication information; Described authentication information comprises the information of Shared Secret Data SSD, and described authentication request comprises the shared secret data (SSD) update request;
Described record cell two is used to write down the number of times of described shared secret data (SSD) update;
Described judging unit is used for receiving the cause value of failed authentication when described authenticating unit failed authentication, according to the number of times and the described cause value of described shared secret data (SSD) update, judges the mobile terminal style of failed authentication; Wherein, described number of times according to described cause value and described shared secret data (SSD) update, judge that the mobile terminal style of failed authentication comprises: when described cause value is the shared secret data (SSD) update failure, and described shared secret data (SSD) update number of times is when being one time, for losing the portable terminal of A_KEY data; Perhaps when described cause value be shared secret data (SSD) update when failure, and described shared secret data (SSD) update number of times is that twice , when above is Margin Machine;
Described record cell one is used to write down described mobile terminal style.
6. device as claimed in claim 5 is characterized in that, also comprises the inquiry port, is used to receive the query requests at the mobile terminal style of described record cell one record.
7. device as claimed in claim 5 is characterized in that described record cell two also is used to write down the time of described shared secret data (SSD) update, and described record cell one also is used to write down the time of described authentication.
8. device as claimed in claim 5 is characterized in that, described device is on home location register HLR or home subscriber server HSS.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007101252847A CN101188860B (en) | 2007-12-19 | 2007-12-19 | A method and device for recognizing exceptional terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007101252847A CN101188860B (en) | 2007-12-19 | 2007-12-19 | A method and device for recognizing exceptional terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101188860A CN101188860A (en) | 2008-05-28 |
CN101188860B true CN101188860B (en) | 2010-11-10 |
Family
ID=39480988
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007101252847A Expired - Fee Related CN101188860B (en) | 2007-12-19 | 2007-12-19 | A method and device for recognizing exceptional terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101188860B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101674574B (en) * | 2008-09-10 | 2013-03-27 | 中兴通讯股份有限公司 | User authentication method and user authentication device |
CN101754197B (en) * | 2008-12-15 | 2012-06-13 | 中兴通讯股份有限公司 | Terminal authentication method and home location register/authentication center |
CN102056173A (en) * | 2009-11-05 | 2011-05-11 | 中国移动通信集团广东有限公司 | Parallel-operation monitoring method and parallel-operation monitoring device |
CN101835150B (en) * | 2010-02-09 | 2013-01-30 | 华为技术有限公司 | Method, device and system for updating shared enciphered data |
KR101873330B1 (en) * | 2011-10-04 | 2018-07-03 | 삼성전자 주식회사 | Ciphering Controlling Method and Network System, Portable Device and operating Method thereof supporting the same |
WO2014022984A1 (en) | 2012-08-08 | 2014-02-13 | 华为技术有限公司 | Information processing method and device |
CN104955045B (en) * | 2015-06-12 | 2019-02-05 | 联想(北京)有限公司 | A kind of connection control method, device, terminal and system |
CN118450378A (en) * | 2023-09-20 | 2024-08-06 | 荣耀终端有限公司 | An exception handling method, device, equipment, medium and product |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1543233A (en) * | 2003-11-05 | 2004-11-03 | 中兴通讯股份有限公司 | Method of 'double-in' detection in PHS system |
CN1753363A (en) * | 2004-09-23 | 2006-03-29 | 华为技术有限公司 | Method of selecting right identification mode at network side |
CN1968094A (en) * | 2006-11-23 | 2007-05-23 | 华为技术有限公司 | Method, system and server for prompting the cause for user terminal authentication failure |
-
2007
- 2007-12-19 CN CN2007101252847A patent/CN101188860B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1543233A (en) * | 2003-11-05 | 2004-11-03 | 中兴通讯股份有限公司 | Method of 'double-in' detection in PHS system |
CN1753363A (en) * | 2004-09-23 | 2006-03-29 | 华为技术有限公司 | Method of selecting right identification mode at network side |
CN1968094A (en) * | 2006-11-23 | 2007-05-23 | 华为技术有限公司 | Method, system and server for prompting the cause for user terminal authentication failure |
Non-Patent Citations (2)
Title |
---|
JP特开2000-57467A 2000.02.25 |
JP特开2007-300232A 2007.11.15 |
Also Published As
Publication number | Publication date |
---|---|
CN101188860A (en) | 2008-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101188860B (en) | A method and device for recognizing exceptional terminal | |
US8909193B2 (en) | Authentication method | |
US7363056B2 (en) | Method and system for secured duplication of information from a SIM card to at least one communicating object | |
CN1857024B (en) | Enhanced security design for cryptography in mobile communication systems | |
EP2352321B1 (en) | Method and apparatus for authentication processing of mobile terminal | |
KR101536489B1 (en) | Authentication of access terminal identities in roaming networks | |
US7266364B2 (en) | Wireless communications unauthorized use verification system | |
EP2521034B1 (en) | Managing method, device and terminal for application program | |
US20120058743A1 (en) | Method for legitimately unlocking a sim card lock, unlocking server, and unlocking system for a sim card lock | |
CN101563944A (en) | IMSI handling system | |
EP2368382B1 (en) | Locking of communication device | |
WO2006079282A1 (en) | A method for setting the key and setting the initial security key in the mobile terminal | |
CN1875653A (en) | Method for managing the security of applications with a security module | |
WO2011015075A1 (en) | Method for reserving card information of subscriber identity module card and system thereof | |
US6618584B1 (en) | Terminal authentication procedure timing for data calls | |
WO2010060242A1 (en) | An authentication method for the mobile terminal and a system thereof | |
WO2005083910A1 (en) | Method and apparatus for access authentication in wireless mobile communication system | |
CN103765938A (en) | Mobile terminal theft detection system | |
CN100484292C (en) | Method, system and base station for locking illegal copied mobile terminal | |
CN1980459B (en) | Method for realizing information destroying at network side | |
CN101466096A (en) | Method and system for triggering synchronous failure of authentication process | |
CN101656958B (en) | Telecommunication intelligent card in Code Division Multiple Access (CDMA) network and authentication method thereof | |
EP3881576B1 (en) | A method and network server for authenticating a communication apparatus | |
CN1980458B (en) | Method for realizing information back-up at network side | |
KR20220170159A (en) | Multi-factor authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20101110 Termination date: 20121219 |