[go: up one dir, main page]

CN1161625A - Checking identification number of mobile subscriber - Google Patents

Checking identification number of mobile subscriber Download PDF

Info

Publication number
CN1161625A
CN1161625A CN96123448.2A CN96123448A CN1161625A CN 1161625 A CN1161625 A CN 1161625A CN 96123448 A CN96123448 A CN 96123448A CN 1161625 A CN1161625 A CN 1161625A
Authority
CN
China
Prior art keywords
user
mobile device
identification number
user identity
communication system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN96123448.2A
Other languages
Chinese (zh)
Inventor
奥斯诺·施罗德斯
帕斯·哈卡拉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Oyj
Original Assignee
Nokia Telecommunications Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Telecommunications Oy filed Critical Nokia Telecommunications Oy
Priority to CN96123448.2A priority Critical patent/CN1161625A/en
Publication of CN1161625A publication Critical patent/CN1161625A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to method for checking a personal identification number of a subscriber in a mobile equipment (500) employed in a mobile communications system, the mobile equipment comprises a protected subscriber identity (IMSI, ITSI). The method comprises the steps of requesting (203) the user of the mobile equipment the personal identification number (PIN) of the subscriber, checking (103) the validity of the personal identification number entered by the user, repeating (109) these steps provided that the user does not enter the valid personal identification number, and, when the number of requests (203) and checks (103) of the identification number exceeds a predetermined threshold value, blocking (111) the mobile equipment.

Description

Checking identification number of mobile subscriber
The present invention relates to check the method for the user identification number in the mobile device that uses in the mobile communication system; described mobile device comprises shielded user identity; this method comprises the following steps: to ask to the mobile device user this user's identification number; check is by the validity of the identification number of user's input; if the user does not import effective identification number; then repeat these steps, when the request of identification number and amount of testing surpass predetermined threshold, then interrupt this mobile device.
The first embodiment of the present invention relates to radio telephone or mobile communication system, and wherein user identity and terminal equipment for good and all mutually combine as mobile radio station.The normally concrete user of this mobile device also discerns them by shielded user identity (the special-purpose TETRA user identity (Individual Tetra Subscriber Identity) of IMSI=international mobile subscriber identity (InternationalMobile Subseriler Identity) or ITSI=).
The second embodiment of the present invention relates to radio telephone system, wherein user and terminal equipment always do not combine, be particularly related to terminal equipment and subscriber identity module in these networks, for example SIM card (SIM=subscriber identity module (Subseriber Identity Modules)).This system comprises that for example the cellular network of being made up of phone is discerned a user by the subscriber identity module that is assemblied in the particular user in the phone in this system.Gsm system (global system for mobile communications) is an example of this cellular communication system.TETRA (trans-European relay radio) mobile communication system is another example.The TETRA mobile communication system is represented an example of PMR (PMR private mobile radio) mobile communication system again.Must be pointed out that according to first embodiment of the invention, wherein the mobile device that for good and all mutually combines of terminal equipment and user also can be worked in these mobile communication system.
Subscriber identity module such as SIM card is concrete user, shows that subscriber equipment is not limited to particular user.Subscriber identity module such as SIM card or GSM card is a kind of smart card or is placed on smart card in the mobile device, and comprises the identification user and encrypt the required information of wireless traffic.Here the subscriber identity module such as SIM card is called smart card, smart card can be removed and allowed the user use this card control mobile device from mobile device.
If the employing subscriber identity module, the user need not have his mobile device, and his required full content is exactly a subscriber identity module.This subscriber identity module may be for example to a certain extent as the SIM card (subscriber identity module) of phonecard, and this circuit card allows user to call out (and reception) from any mobile device of this system.On the one hand, the purpose of SIM card is to provide the data of discerning the user with the protection form safely to mobile device, is to provide service to mobile device on the other hand.These services comprise maintenance identification number (input, replacement etc.), by user's identity algorithm computation encryption key, open for example because of entering the SIM card of wrong Personal Identification Number (PIN) above locking behind the number of times by PUK code (PUK code=individual opens key).
Introduced a kind of so-called plug-in type SIM as the substitute mode of in cell-phone, implementing SIM card.Plug-in type SIM is the parts of coin-size that contain the SIM card of e-credit size.It is to insert in the phone in the mode that the user can not change easily.This phone also can have a plug-in type SIM who has inserted and an other card reader.If contain a card in the card reader, then discern this phone, otherwise discern this phone according to the plug-in type SIM that has inserted according to external card.Unless make opposite suggestion, generally the subscriber identity module term such as plug-in SIM be meant plug-in type SIM and smart card SIM here.
The general utility functions of SIM card in the GSM of the subscriber identity module of gsm mobile communication system ETSI suggestion 02.17, have been stipulated.Wherein defined relevant with SIM item and set requirement to the SIM card fail safe, the function of maximum level has defined canned data in network operator's task and the SIM card.Also stipulated the requirement of the SIM card of the phone user interface such as mobile device is for example related to the input and the change of user's Personal Identification Number (PIN).
In addition, pass through the agreement between definition SIM card and the mobile device (ME=mobile device) in the GSM suggestion 11.11 of SIM application protocol ETSI, the definite content and the length of SIM card data field, and with machinery be electrically connected relevant content and defined problem by said GSM suggestion 02.17 regulation more closely.GSM suggestion 11.11 is a files, and Hope Project technical staff can provide the software and hardware of SIM interface to implement on this basis.
When mobile device and/or SIM card is lost or problematic situation can occur in the use of mobile communication system during by wrong box.Therefore, do not need to notify immediately owing to lose phone, the people who steals phone can try to interrupt the PIN code of SIM card by attempting different sign indicating numbers.When unwarranted user repeatedly attempts interrupting this PIN code, SIM card can be can not only starting by this PIN code must this locking of input cancellation PUK code the mode locking himself.This function only prevents to use without permission SIM card, but can not help the identification or the unwarranted user that neutralizes by any way.
When mobile device in use the time, usually by ask to begin to discern the user of mobile device to the user with the identification number such as the relevant PIN (Personal Identification Number) of mobile device or SIM card.If wish to read or change the data field that level is encrypted in decision, must be input to this mobile device and further be input to SIM card by the Personal Identification Number PIN relevant with the user of SIM card and mobile device.Common this process of carrying out when in fact, inserting card reader whenever the startup phone or with SIM card.
In case input effective recognition number is arranged in allow this card to read in the information that the card file secret is distinguished.
If the user imports invalid Personal Identification Number (PIN), SIM returns invalid code, and identification number is imported in request once more.SIM also makes under any circumstance and can not be rised in value by its inner error calculator that the user regulates.Import three invalid identification numbers if user one connects, SIM is transformed into blocking.
By concrete PUK identification number or may be only measure and to restart the card of locking according to this enforcement by the service of carrying out by manufacturer.The SIM that is in blocking only receive at the open command (UNBLOCK) of SIM card.In this case, the user is the unlatching PUK code of 8 numerals to SIM card input length, suppose for example 10 invalid unlatching PUK identification numbers of user's input, SIM changes permanent blocking over to, only can it be returned from this state by the network operator that this SIM card is provided.
In first embodiment of the invention according to the mobile device of prior art work with the subscriber identity module in second embodiment of the invention (being SIM card) can be when unauthorized user carries out trial that enough number of times interrupts PIN code on the other hand, promptly, prevent to use mobile device or corresponding subscriber identity module under the situation when unauthorized user imports the invalid PIN code of enough number of times, it is SIM card, this mobile device or the card locking himself, so that only no longer can restart this mobile device or card by PIN code, and must input other unlatching sign indicating number such as PIN code.Stop using if unauthorized user had not both known that PIN code is not known PUK code (PUK=people opens key) yet this mobile device or subscriber identity module.
Above-mentioned situation be a kind of like this fact on the other hand: whom the memory as the smart card of subscriber identity module or SIM card had the fact of access right to merotomize to the data that are arranged in this memory usually according to, usually according to secret grade this memory is divided into three zones, opening, secret and closed security zone.In the secret district, be stored as that read and change need be with the data in the PIN identification number input card.Also the memory of the mobile device that is not connected with subscriber identity module can be divided in the above described manner open, maintain secrecy/the secret district; all concrete data of storage user in the secret district of mobile device and SIM card; comprise shielded user identity, for example the special-purpose TETRA user identity in international mobile subscriber identity in the IMSI=GSM system and the ITSI=TETRA system.
An object of the present invention is to provide the method for checking identification number of mobile subscriber and prevent to use without approval mobile device or subscriber identity module, i.e. SIM card.An object of the present invention is to improve network operator and user's fail safe, and protect them to resist and use mobile device and subscriber identity module without approval, particularly prevent to attempt without permission using these equipment.
The first embodiment of the present invention has realized method of the present invention, it is characterized in that, removes the protection of shielded user identity, thereby finds out user identity; Transmit above-mentioned user identity and this mobile device by the indication of locking to mobile communication system.
The second embodiment of the present invention relates to the method for user identification number in the mobile device that uses in the check mobile communication system; described mobile device is subscriber station and the combination that comprises the subscriber identity module of shielded user identity; described identity module removably is attached to this subscriber station; thereby can constitute mobile device by subscriber identity module being attached to the Any user station; the method comprising the steps of: the identification number of asking this user to the mobile device user; from the validity of subscriber identity module check by the identification number of user's input; do not repeat these steps if the user imports effective identification number, and when request and the number of times of checking identification number surpass predetermined threshold this subscriber identity module of locking.
Second embodiment of the invention is characterised in that the protection of removing shielded user identity, thereby finds out user identity; Send above-mentioned user identity and subscriber identity module by the indication of locking to mobile communication system.
First embodiment of the invention further relates to mobile device; comprise: the storage device that is used to store the user identity of being protected; be used for asking the user interface that makes of user identification number to the mobile device user; be used to check the verifying attachment of above-mentioned user's identification number (PIN) validity; be used for counter to the amount of testing counting of user identification number validity; respond the locking device of described counter, be used for this mobile device of locking when number of times that the user of check mobile device does not import effective identification number by described user interface surpasses pre-determined number.
Mobile device according to first embodiment of the invention; it is characterized in that comprising: the decontrol that is used to remove the protection of shielded user identity and finds out this user identity is used for sending the user identity found and subscriber identity module by the dispensing device of the indication of locking to mobile communication system.
The second embodiment of the present invention relates to mobile device, comprise: the user's interface that is used for asking this user identity to the mobile device user, individual consumer's identity module that is equipped with user identity, described module is attached to described mobile device movably, further comprise verifying attachment, be used to check the validity of above-mentioned user identification number, a counter, be used for validity check time counting number to customer identification number, respond the locking device of described counter, the described subscriber identity module of locking when being used for number of times that user when the check mobile device do not import effective identification number and surpassing pre-determined number.
Mobile device according to second embodiment of the invention; it is characterized in that further comprising: decontrol; be used for removing the protection of the shielded user identity of subscriber identity module and find out user identity; and dispensing device, be used for sending the user identity found out and subscriber identity module by the indication of locking to mobile communication system.
The application discloses a kind of method, allows the information of mobile device to system's indication attempt misuse mobile device or the attached subscriber identity module such as SIM card.Misuse may be meant the secret identification number of for example decoding SIM card or mobile user.
The present invention is based on a kind of like this design: mobile device or subscriber identity module, promptly SIM card since the result of invalid PIN code and locking itself the time remove user identity (IMSI, protection ITSI).If the user identity after the SIM card request is interrupted, SIM can to mobile device transmit user identity (IMSI, ITSI).All out of Memory on the SIM card are still protected.Mobile device/the SIM card of working by this way can be indicated user identity to system, and the user PIN identification number relevant with above-mentioned mobile device or SIM decoded and the attempt of this user identity corresponding mobile device or SIM card by decoding.
The invention discloses and how to indicate the attempt of invading mobile device or SIM card to mobile communication system.
The advantage of the method according to this invention and mobile device is can solve and the mobile communication system of prior art and the relevant problem of fail safe of mobile device.
Because estimate and may not invade mobile device or the attached subscriber identity module such as SIM card to system's indication, the operating process of prior art is unfavorable.
Be used for the network of public safety,, wishing very much to invade the attempt of mobile device or attached SIM card to system indication particularly such as in PMR and the TETRA network.Mobile device of the present invention and method can reach this purpose, and promptly their allow mobile communication system to receive some does not attempt to swarm into the subscriber identity module of mobile device or this mobile device special use with the user of permission to use information.
According to the present invention, when the mobile network receives attempt when swarming into the information of mobile device or SIM card, the mobile network attempts mobile device or the subscriber identity module that locking is swarmed into by attempt, so that they can not re-use the business of this network.In addition, can provide and attempt to swarm into the relevant data of purpose to the network operator of less user group or manager or operator on duty, and can take required step to prevent unauthorized use.
Below with reference to accompanying drawing openly the present invention in more detail, wherein:
Fig. 1 is the flow chart according to the subscriber identity module operation of second embodiment of the invention,
Fig. 2 be explanation according to the flow chart of the mobile device operation of second embodiment of the invention and
Fig. 3 is the flow chart of explanation mobile device of the present invention.
The present invention is based on a kind of like this design: if since the SIM card as a result of the invalid PIN code of input locking himself, mobile device can not locking be arranged on its memory or the SIM card of being added in encrypted user identity.Fig. 1 illustrates the method for operation of having in mind from SIM card, and Fig. 2 illustrates the method for having in mind from mobile device.After SIM receives user identity, mobile device will be attempted information and send to system with user identity.
Must will appreciate that the operation of first embodiment of the invention by description to the second embodiment of the invention operation.Therefore, to the request of the particular user PIN code (password) relevant and check and corresponding according to the first embodiment inspection user identification number with the subscriber identity module of second embodiment.
Fig. 1 is the operational flowchart according to the subscriber identity module of second embodiment of the invention.Begin to discern its user at step 101 subscriber identity module, claim that hereinafter subscriber identity module is a SIM card.This is by carrying out to the user of this card or according to the special-purpose PIN code that first embodiment of the invention is linked the user of mobile device or subscriber identity module respectively to user's request of mobile device in step 102.In case obtain this sign indicating number, then check the validity of PIN code in step 103.In step 104, if the PIN code that is provided by the user is effective, then discharge the protection of SIM card, i.e. the secret storage district of SIM card.Corresponding therewith, in first embodiment, will discharge the secret district of mobile device memory.After this, the operation of mobile device and SIM card still continues.
Next, if it is invalid to detect the PIN code of importing mobile device in step 103, import the invalid PIN code of how many times to mobile device in step 108 check through 107.If the number of times of invalid PIN code is less than predetermined threshold, 109, step 102 is returned in the operation of mobile device/SIM card, asks PIN code to the mobile device user once more.
Next, reached maximum times if detect the request PIN code in the check in step 108, step 110 is in the second embodiment of the present invention, in the use of step 111 locking SIM card or mobile device.After this, if do not import effective PUK code of above-mentioned SIM card to this card or mobile device, the user can not re-use this SIM card or mobile device.Next, remove the protection that is arranged on the user identity sign indicating number in SIM card or the mobile device memory, the protection of promptly removing IMSI or LTSI identity is to find out its identity.In the second embodiment of the present invention, at first this identity is sent to mobile device, and in first embodiment of the invention, the indication that sends described identity and attempted to decode the PIN code in the registration message for example to the mobile network.Certainly, the indication in all other message can be sent to network.Thereby the PIN code of notifying this network to attempt to decode mobile device or SIM card, network or operating personnel can conclude that above-mentioned user identification number is relevant with the user who attempts to misapply this network and above-mentioned user stoped outside network.
Next, ask PUK code in step 113 to the mobile subscriber.After this, check the PUK code of being imported whether effective in step 114.Under the effective situation of input PUK code, step 115, the PIN code counter resets in step 116, thereby makes the user can send into the engineering noise PIN identification number of predetermined quantity once more and do not interrupt the operation of SIM card or mobile device.In other words, program is returned step 102, asks PIN code to the user.
Next, if the user imports invalid PUK code, step 117, then step 118 is below imported invalid PUK code from counter check to mobile device or SIM card and whether has been reached maximum times.Surpassing not yet under the situation of maximum times, step 119, program turns back to step 113, asks PUK code to the user once more.In addition, if surpass this maximum times, step 120 is then interrupted SIM card or mobile device, step 121 fully.
Fig. 2 illustrates the operational flowchart of second embodiment of the invention.The operation of this method is from step 201, and mobile device receives the request of asking the PIN identification number to this mobile device user from the subscriber identity module such as attached SIM card.This is second operational instances of implementing according to the present invention.In solution,, but carry out request user's identification number and check its validity and following any operation not to the attached SIM card of mobile device according to first embodiment of the invention.After receiving request from SIM card, step 201, this mobile device concludes that in step 202 code of being asked is a PIN code.After this, mobile device is asked above-mentioned code through its user's interface from its user in step 203.Mobile device receives PIN code and sends it to SIM card according to second embodiment of the invention in step 204 by its user's interface.This subscriber identity module is carried out this PIN code of check and is returned answer in step 205 to mobile device in the mode in the step 103 of above-mentioned Fig. 1, and this mobile device is analyzed the implication of this answer in step 206.In solution, can in actual mobile device, carry out check PIN code and certainly by its measurement that causes according to first embodiment of the invention.
This mobile device is as follows according to information/answer analytical work that SIM sends:
Provide in step 207 under the situation of the information that locking SIM card and request mobile device user import PUK code in SIM card, according to the present invention, mobile device in step 208 to SIM card request user identity, i.e. IMSI or ITSI identity.SIM card remove these identity in himself memory protection and step 209 to mobile device send user identity (IMSI, ITSI).According to first embodiment of the invention, in this mobile device, carry out above-mentioned releasing, and in mobile device, store user identity user identity protection.Next, in step 210, mobile device notify according to the present invention mobile communication system occurred swarming into the attempt of this SIM card (second embodiment) or mobile device (first embodiment) and locking above-mentioned SIM card (or mobile device).This mobile device can be worked as follows:
But radio-cell or mobile device (' temporary interruption ') that mobile communication system temporary interruption SIM card has been used by attempt.This radio-cell can not be used for communication, but but this position in network, system monitoring wireless unit.
This system can for good and all block this radio-cell (' permanent blocking-up ').
Prevent access thus to user under the SIM card of locking.This is undertaken by above-mentioned user being designated as " forbidding user " in system database, but for example this user's operation in the limiting network in this case, so that do not allow this user's calling or close some business.
Because after the locking SIM card, the user identity in this user's of attempt misuse the also readable card taking of people under any circumstance must always be designated as this user " forbidding user ".Yet, must be pointed out, though user identity is not labeled as forbidding,, in system, can not use this identity to differentiate owing to differentiate that required authentication key can not use because of interrupting this card.
According to the present invention, also will be to the personnel of use of supervision mobile communication system, or for example the dispatcher of operator on duty or " public safety " network reports the attempt of this card of misuse.After this, the lawful owner who supervises the personnel of use of this system and SIM card gets in touch and inquires whether this card may fall into his staff.
Next, show the user in the effective PIN code of step 212 input if detect the answer that obtains from SIM card or the observation of being undertaken by mobile device (first embodiment) in step 206, mobile device begins its normal running.
Next, if detect the answer that obtains from SIM card or the observation of being undertaken by mobile device (first embodiment) shows that the user is in the effective PIN code of step 214 input in step 206, then continue executable operations, so that partly is PIN code to user information requested subsequently in step 215 to user's interface report of mobile device, import when correct, PIN code allows the user to start this mobile device.Program turns back to 203 along line 221, asks this code to the user.
Next, continue to implement the present invention from step 211, the code by mobile device and SIM card request is a PUK code subsequently, and the user must import correct PUK code, so that ask PIN code to the user again, and if the user imports effective PIN code SIM card and mobile device can recover to use.After this, program is returned step 203, asks this code to the user.
Next, show the user at the invalid PUK code of step 216 input if detect the answer that obtains from SIM card or the observation of being undertaken by mobile device (first embodiment) in step 206, program turns to step 203 along line 217, asks PUK code once more.
Next, show that the user is in the invalid PIN code of step 218 input if detect the answer that obtains from SIM card or the observation of being undertaken by mobile device (first embodiment) in step 206, program turns to step 203 along line 219, asks PIN code to the user once more.
Fig. 3 illustrates the block diagram according to radio-cell of the present invention.This illustrates the basic structure (INFRA) of mobile communication system 600.The basic structure of this network comprises for example base station, switching center, database D B and other telecommunication apparatus.This illustrates a kind of typical radio-cell 500, i.e. radio telephone, mobile device or the subscriber station that is used by the user who communicates by letter in mobile communication system.The purposes of transreceiver (TX/RX) 501 is the wireless channels that adapt to each moment employing.The described wireless channel of mobile device is connected with network infrastructure.Transreceiver 501 is linked antenna 502, and antenna 502 is linked radio-ray path RP.Usually adopt the radio frequency (VHF and UHF frequency range) between the 60-1000MHz, though also can adopt other frequency.On radio-ray path, can adopt the analog or digital modulation.
User interface 505 comprises electro-acoustic conversion device, normally an earphone 506 and a microphone 507, and have the keyboard relevant with startup, end and dial-up.The mobile device that adopts in the relay system also can comprise the push-to-talk button that must press during the conversation.
The purposes of control unit 503 is operations of control radio-cell.Control unit 503 is linked user's interface 505, and interface provides for example relevant with startup or terminated call pulse to it.Control unit 503 also can provide voice signal or the optical signal relevant with the operation of radio telephone and/or radio telephone system to the user through user's interface 505.
Control unit 503 is linked transreceiver TX/RX501.Control unit 503 is determined the channel that transreceivers are adopted, and promptly transreceiver 501 is listened to the channel that control unit 503 is determined, i.e. radio frequency, and dial in suitable time slot.Transreceiver 501 also switches under the control of control unit 503.Control unit 503 receives and sends signaling message through transreceiver 501.
In the wireless system that can be used for being made up of wireless network according to mobile device of the present invention or radio-cell 500, this wireless network comprises at least one base station and subscriber station, and has one or more relay stations and database D B.Described radio-cell comprises that a reception sends the control unit 503 that 501, one of transreceiver unit that transmit are used to control radio-cell and 505 operations of user's interface by the transmission of other radio-cell or base station transmission with to described other radio-cell or base station.
Mobile device 500 according to first embodiment of the invention comprises a storage device 508, is used to store shielded user identity IMSI or ITSI; User's interface 505 is used for asking user identification number PIN to the mobile device user; Verifying attachment 510 is used to check the validity of described user identification number PIN; Counter 511 is used for the validity check time counting number to user identification number PIN; With the interrupting device 512 of the described counter 51 of response, be used for this mobile device of locking when the user of mobile device does not import effective identification number PIN and makes described amount of testing surpass preset count by described user's interface 505.
Mobile device 500 of the present invention also comprises decontrol 513, is used for removing the protection of the shielded user identity of subscriber identity module and finds out user identity; With dispensing device 514, be used for user identity and the indication of this mobile device of locking found out to mobile communication system 600 transmission.
In mobile device of the present invention, the protection of the shielded user identity of decontrol 513 execution releasings (is seen Fig. 1 step 11) after the locking mobile device 500.
In mobile device 500 of the present invention, with described user identity IMSI or ITSI and the indication of locking mobile device 500 for example sending to mobile communication system in the registration message.
Mobile device according to second embodiment of the invention comprises user's interface 505, be used for asking user identification number PIN to the mobile device user, the subscriber identity module SIM509 of user's special use of an assembling user identity, this subscriber identity module SIM is attached to described mobile device movably.
Mobile device according to second embodiment of the invention further comprises checking device 510, is used to check the validity of described user identification number PIN; Counter 511 is used for the inferior counting number to the validity check of user identification number PIN; With the locking device 515 of the described counter 511 of response, this subscriber identity module of locking when being used for user at mobile device 500 and not importing effective identification number PIN and make described amount of testing surpass pre-determined number.
Mobile device of the present invention also comprises decontrol 516, is used for discharging the protection of the shielded user identity IMSI of subscriber identity module SIM509, ITSI and finding out this user identity; With dispensing device 517, be used for sending user identity and the indication of having found out of locking subscriber identity module to mobile communication system.
In mobile device of the present invention, after interrupting described subscriber identity module SIM509, step 111 carries out the protection of removing shielded user identity in step 112.
In mobile device of the present invention, with described user identity IMSI or ITSI and the indication of locking subscriber identity module SIM509 (step 111 among Fig. 1) in registration message, send to mobile communication system.
The intention of Xiang Guan accompanying drawing and explanation only is explanation the present invention therewith.In detail, can change method of the present invention and mobile device within the scope of the appended claims.
Can implement above-mentioned mobile device with two kinds of substitute modes and decode subscriber identity module, the i.e. operation of the protection of SIM card PIN code to the attempt of mobile communication system notice.
(1) can not store user identity IMSI, ITSI to its mode that applies the PIN code protection.Can read user identity from this card with whether having imported under PIN code and this card all situations whether locking himself has nothing to do.Or another kind of mode:
(2) mode that can only read this identity in following two kinds of situations is stored user identity;
A) when importing effective PIN code and
B) in the time should blocking as the result who imports invalid PIN code locking.
At situation b) in, except that user identity, can not read out of Memory from this card.
Enforcement according to above-mentioned substitute mode (2) is more worked, and this is owing to there is not effective PIN code also to can read user identity under the sort of situation, and this situation is this card of locking and can not fall into unauthorized user's hand because of mistake makes user identity only.

Claims (19)

1. the method for the individual subscriber identification number (PIN) in the mobile device (500) that uses in check mobile communication system (600), described mobile device comprises shielded user identity (IMSI, ITSI), and the method comprising the steps of:
To mobile device user request (203) user's Personal Identification Number (PIN),
Check (103) validity by the Personal Identification Number (PIN) of user's input,
, the user repeats (109) these steps if not importing effective identification number,
Locking (111) mobile device (500) when the request (203) of Personal Identification Number (PIN) and check (103) number of times surpass (110) predetermined threshold is characterized in that comprising step:
Remove the protection of (112) shielded user identity (IMSI, ITSI),
Respond described releasing, find out user identity;
Send (210) above-mentioned user identity (IMSI, ITSI) and the indication of this mobile device of locking to mobile communication system (600).
2. method according to claim 1 is characterized in that carrying out the protection of the shielded user identity of described releasing (112) (IMSI, ITSI) after locking (111) mobile device.
3. method according to claim 1 is characterized in that sending to mobile communication system the described indication of (210) described user identity (IMSI, ITSI) and this mobile device of locking (111) in registration message.
4. method according to claim 1, it is characterized in that response send (210) to the described user identity of mobile communication system (600) and interrupted (111) mobile device (500) described indication these two in the database of mobile communication system (600), described user identity is designated as forbidding.
5. the method for the individual subscriber identification number (PIN) in the mobile device (500) that uses in check mobile communication system (600); described mobile device is subscriber station (501,503,505) and the individual consumer's identity module (509 that comprises the user identity of being protected (IMSI, ITSI); SIM) combination; described identity module is attached to subscriber station movably; thereby can pass through subscriber identity module (509; SIM) be attached to the Any user station and constitute mobile device, the method comprising the steps of:
To mobile device user request (203) user's Personal Identification Number (PIN),
From the validity of the Personal Identification Number (PIN) of subscriber identity module inspection (103) user input,
Repeat if the user does not import effective identification number (PIN) (109) these steps and
Locking (111) subscriber identity module when the request (203) of Personal Identification Number (PIN) and check (103) number of times surpass (110) predetermined threshold (509, SIM), it is characterized in that:
Remove (112) subscriber identity module (509, SIM) in the protection of shielded user identity (IMSI, ITSI),
Respond described releasing, find out user identity,
To mobile communication system (600) send (210) described user identity (IMSI, ITSI) and the locking subscriber identity module (509, indication SIM).
6. method according to claim 5, it is characterized in that locking (111) subscriber identity module (509, SIM) carry out the protection of the shielded user identity of described releasing (112) (IMSI, ITSI) afterwards.
7. method according to claim 5, it is characterized in that in registration message to mobile communication system (600) send described user identity (IMSI, ITSI) and the locking subscriber identity module (509, described indication SIM).
8. method according to claim 1, it is characterized in that response sends (210) described user identity (IMSI, ITSI) and locking (111) subscriber identity module (509 to mobile communication system (600), SIM) described indication is designated as forbidding with described user identity in the database (DB) of mobile communication system (600).
9. according to claim 4 or 8 described methods, it is characterized in that response is designated as forbidding with described user identity (IMSI, ITST) in the database (DB) of mobile communication system (600), described user identity is at using the professional no longer valid of mobile communication system.
10. according to claim 4 or 8 described methods, it is characterized in that response is designated as forbidding with described user identity (IMSI, ITSI) in the database (DB) of mobile communication system (600), make described user identity at using the professional no longer valid of mobile communication system, and mobile communication system still keep the information about described mobile device and/or subscriber identity module position.
11. according to claim 4 or 8 described methods, it is characterized in that response is designated as forbidding with described user identity (IMSI, ITSI) in the database (DB) of mobile communication system (600), report the attempt of described user identity and misuse user's described Personal Identification Number (PIN) to the operator of mobile communication system.
12. according to claim 4 or 8 described methods, it is characterized in that response is designated as forbidding with described user identity (IMSI, ITSI) in the database (DB) of mobile communication system (600), to the operator of mobile communication system report described user identity, with described subscriber-related user data and the attempt of misapplying described user identification number.
13. according to claim 4 or 8 described methods, it is characterized in that response is designated as forbidding with described user identity (IMSI, ITSI) in the database (DB) of mobile communication system (600), subscriber identity module (509 to the user, SIM) and/or the lawful owner of Personal Identification Number (PIN) report the misuse user subscriber identity module (509, SIM) and/or the attempt of Personal Identification Number (PIN).
14. a mobile device (500, Fig. 3), comprising:
Storage device (508) is used to store the user identity of being protected (IMSI, ITSI),
User's interface (505) is used for asking to mobile device (500) user user's Personal Identification Number (PIN),
Verifying attachment (510) is used for checking the validity of (103) this user's described Personal Identification Number (PIN),
A counter (511), the validity check number of times that is used for Personal Identification Number (PIN) to the user count (108) and
Respond the locking device (512) of described counter (511), be used for this mobile device of locking (111) when described amount of testing that the mobile device user does not import effective Personal Identification Number (PIN) by described user's interface (505) surpasses pre-determined number, it is characterized in that further comprising:
Decontrol (513), be used for removing the protection of the user identity of (112) being protected (IMSI, ITSI) and find out user identity and
Dispensing device (514) is used for sending user identity and the indication of locking mobile device that (210) have been found to mobile communication system (600).
15. mobile device according to claim 14 (500) is characterized in that carrying out the protection of the shielded user identity of described releasing (112) (IMSI, ITSI) after locking (111) mobile device.
16. mobile device according to claim 14 (500) is characterized in that sending to mobile communication system (600) the described indication of (210) described user identity (IMSI, ITSI) and locking (111) mobile device (500) in registration message.
17. a mobile device (500, Fig. 3), comprising:
User's interface (505) is used for asking to the mobile device user user's Personal Identification Number (PIN),
A private user identity mould (SIM, 509) that is equipped with user identity and is attached to described mobile device (500) movably, described mobile device further comprises:
Verifying attachment (510) is used for checking the validity of (103) this user's described Personal Identification Number (PIN),
A counter (511), the validity check number of times that is used for Personal Identification Number (PIN) to the user count (108) and
Respond the locking device (515) of described counter (511), be used for this subscriber identity module (509 of locking (111) when the described amount of testing of the mobile device user not being imported effective Personal Identification Number (PIN) surpasses (110) pre-determined number, SIM), it is characterized in that further comprising:
Decontrol (516), be used for removing the protection of the user identity of being protected in (112) subscriber identity module (SIM, 509) (IMSI, ITSI) and find out this user identity and
Dispensing device (517) is used for sending the user identity that (210) found and the indication of locking (111) subscriber identity module (SIM, 509) to mobile communication system (600).
18. mobile device according to claim 17 (500) is characterized in that carrying out the protection of removing (112) shielded user identity (IMSI, ITSI) afterwards at the described subscriber identity module of locking (111) (SIM, 509).
19. mobile device according to claim 17 (500), it is characterized in that in registration message, sending the described indication that (210) send described user identity (IMSI, ITSI) and locking (111) subscriber identity module (SIM, 509) to mobile communication system (600).
CN96123448.2A 1995-11-24 1996-11-22 Checking identification number of mobile subscriber Pending CN1161625A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN96123448.2A CN1161625A (en) 1995-11-24 1996-11-22 Checking identification number of mobile subscriber

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI955677 1995-11-24
CN96123448.2A CN1161625A (en) 1995-11-24 1996-11-22 Checking identification number of mobile subscriber

Publications (1)

Publication Number Publication Date
CN1161625A true CN1161625A (en) 1997-10-08

Family

ID=5127652

Family Applications (1)

Application Number Title Priority Date Filing Date
CN96123448.2A Pending CN1161625A (en) 1995-11-24 1996-11-22 Checking identification number of mobile subscriber

Country Status (1)

Country Link
CN (1) CN1161625A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1310568C (en) * 2003-02-17 2007-04-11 中国移动通信集团公司 Safety authentication method of mobile terminal user identity
CN100433910C (en) * 2005-05-12 2008-11-12 中兴通讯股份有限公司 A method for protecting the identity of a mobile terminal in a mobile communication system
CN100518182C (en) * 2003-10-14 2009-07-22 西门子公司 Method for securing the data traffic between a mobile radio network and an IMS network
CN100531249C (en) * 2002-11-12 2009-08-19 摩托罗拉公司(在特拉华州注册的公司) Wireless subsidized locking solution
CN101690096B (en) * 2007-07-20 2013-07-03 日本电气株式会社 Control apparatus, control system, control method and storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100531249C (en) * 2002-11-12 2009-08-19 摩托罗拉公司(在特拉华州注册的公司) Wireless subsidized locking solution
CN1310568C (en) * 2003-02-17 2007-04-11 中国移动通信集团公司 Safety authentication method of mobile terminal user identity
CN100518182C (en) * 2003-10-14 2009-07-22 西门子公司 Method for securing the data traffic between a mobile radio network and an IMS network
CN100433910C (en) * 2005-05-12 2008-11-12 中兴通讯股份有限公司 A method for protecting the identity of a mobile terminal in a mobile communication system
CN101690096B (en) * 2007-07-20 2013-07-03 日本电气株式会社 Control apparatus, control system, control method and storage medium
US8866584B2 (en) 2007-07-20 2014-10-21 Nec Corporation Control device, control system, control method and storage medium

Similar Documents

Publication Publication Date Title
US5907804A (en) Checking the identification number of a mobile subscriber
AU684434B2 (en) Method and apparatus for authentication in a communication system
CN1085030C (en) Checking the access right of a subscriber equipment
EP0950230B1 (en) A communications system and method using vehicle identifications
CN1102016C (en) Preventing misure of copied subscriber identity in mobile communication system
US5551073A (en) Authentication key entry in cellular radio system
US7689204B2 (en) Method of unlocking a mobile telephone type wireless communication terminal
US5517554A (en) Apparatus and method for locking a mobile communication unit
KR19980702492A (en) Check access rights of subscriber device
US20060009195A1 (en) Wireless communications unauthorized use verification system
CN1209939A (en) Management of authentication keys in mobile communication system
CN1215293A (en) Communication control device and wireless communication system
CN1655643A (en) Apparatus and method for setting use restriction of mobile communication terminal
CN1264525A (en) Remote clearing of access to telecommunication service
WO1998059518A2 (en) Processing of emergency calls in wireless communications system with fraud protection
KR100631689B1 (en) Theft prevention method and system of mobile communication terminal
CN1161625A (en) Checking identification number of mobile subscriber
CN109495894B (en) Method and system for preventing pseudo base station
WO1998000956A2 (en) System and method for preventing cellular fraud
CN101431754B (en) A Method for Preventing Clone Terminal from Accessing
CN1272291A (en) Procedure for setting up call in wireless local loop
CN1568087A (en) Method of communication among a variety of classification mobile terminals
MXPA99010399A (en) Processing of emergency calls in wireless communications system with fraud protection
CN104917649B (en) Method for reverse security audit of communication data
Goel et al. The Approaches to Prevent Cell Phone Cloning In Cdma Enviornment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
C20 Patent right or utility model deemed to be abandoned or is abandoned