[go: up one dir, main page]

WO2018147749A1 - Procédés et leurs composants pour identifier des équipements celllaires irréguliers ne devant pas fonctionner dans aucun réseau cellulaire dans un pays ou un groupe de pays - Google Patents

Procédés et leurs composants pour identifier des équipements celllaires irréguliers ne devant pas fonctionner dans aucun réseau cellulaire dans un pays ou un groupe de pays Download PDF

Info

Publication number
WO2018147749A1
WO2018147749A1 PCT/PE2017/000002 PE2017000002W WO2018147749A1 WO 2018147749 A1 WO2018147749 A1 WO 2018147749A1 PE 2017000002 W PE2017000002 W PE 2017000002W WO 2018147749 A1 WO2018147749 A1 WO 2018147749A1
Authority
WO
WIPO (PCT)
Prior art keywords
country
equipment
countries
group
imei
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/PE2017/000002
Other languages
English (en)
Spanish (es)
Inventor
José Antonio VICUÑA MUÑOZ
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to PCT/PE2017/000002 priority Critical patent/WO2018147749A1/fr
Priority to ARP170102219A priority patent/AR109302A1/es
Publication of WO2018147749A1 publication Critical patent/WO2018147749A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Definitions

  • the present invention relates to methods and their components for identifying cellular equipment that should not be in operation in the cellular networks of operators in a country or group of countries, since they are stolen, stolen, altered, legally acquired cell phones, that are not homologated and that are being operated by people who do not own them or that have been acquired and put into operation through any malicious action.
  • the object of the invention is to provide methods and their components for the identification of cellular equipment, which should not be in operation in the cellular communications networks of any operator at the country or group of countries level; for being active equipment through some malicious action (because they are stolen, cloned, altered, legally acquired cell phones that are not homologated in the country and that are being operated by people who do not own them).
  • EP0918444 describes a methodology to identify cell phones of malicious, fraudulent or cloned origin.
  • the method uses the information that regularly includes all cellular mobile phone systems, every telecommunications company operating a cellular system generates, maintains and updates databases with the information that identifies the equipment formally, legally and homologated. sold, as well as the information of the user or subscriber who has hired a service.
  • the method basically uses the identification request messages that the system sends with a certain frequency and whose frequency is established in each system of the operating company, so that each terminal equipment is identified and then the timer count starts to repeat the operation, said identification arrives with information of the equipment, user and location, but if said registration of identity, appears before the time period set by the timer, then you have a suspicious terminal equipment.
  • PSMS processing unit
  • time and location for example REGNOT notifications, originated with the same MIN in different locations, with insufficient time to move between both locations.
  • a method for the identification of cloned terminal equipment uses the time and location information of the equipment collected by the cellular system, functional as standard. This information is recorded from time to time by the system in its normal operation and allows to keep a record of the location of the equipment and its operation, in such a way, that very well you can determine the time in which a mobile was in a first location and then at another time where it is in another location, because said information is repeatedly collected by the system and at time ranges set by the cellular system; in such a way, which can be determined in how much time said mobile moved from one location to another, if said time is out of the reasonable it can proceed to its blocking, because it is considered cloned.
  • the invention describes a method that controls the time intervals in which notifications, "call” messages or identity requests are generated, which are regularly issued temporarily over a period of time. fixed, between the cellular exchange and the terminal equipment.
  • This message carries the identity of the terminal equipment, therefore, when said information arrives identifying the equipment in a much shorter time than the regular one, then it is considered a suspicious or cloned equipment.
  • the IMEI code information is used, which regularly informs by means of the identity notification and that is requested regularly by the cellular system, in the case that for some reason the equipment does not send said identification, a characteristic could be added, by means of which I managed to identify the terminal and get a location report.
  • EIR equipment identification record
  • the methods described do not depend on the notifications that are exchanged between the terminal equipment and the centrals of the telecommunications operating companies, as described below.
  • RNT National Terminal Registry
  • the standards for the implementation of mobile cellular telephone networks define and name elements that fulfill certain functions to provide information exchange between the networks and provide the service not only in the country but globally. These elements include the IMEI code, the MSISDN code, the IMSI code, the CELL ID code, VLR, HLR, Network Provisioning, among others.
  • IMEI International Mobile Equipment Identity
  • EIR Databases Equipment Identity Register
  • Black List which contains all the cellular equipment reported as irregular and that are blocked to not allow its use
  • Gray List the cellular equipment under observation.
  • IMSI International Mobile Subscriber Identity
  • SIM Subscriber Identity Module
  • GSM global system for mobile communications
  • UMTS Universal mobile telecommunications system
  • MSISDN Mobile Station Integrated Services Digital Network
  • MSISDN Mobile Station Integrated Services Digital Network
  • Irregular cellular devices are those phones that must not operate in any communication network of any mobile operator in the country, because they have been cloned, stolen, stolen or altered, do not properly identify their owner or are involved in Some malicious or legal fact.
  • a cloned cellular device is one whose IMEI has been copied from other cellular equipment, there may be instances of multiple copies where only one of them is the original, but it may also be the case that none of said equipment is original.
  • An altered cellular device is one whose original IMEI has been exchanged for another valid IMEI. This alteration is performed because the original IMEI can be reported as irregular, with the alteration the equipment can function as a regular telephone as long as the new IMEI is not reported to the country's regulatory body.
  • CELL ID Cell Identifier
  • the GSM network uses this information for different actions, such as the handover (when the user is in motion and enters a geographical area served by another base station).
  • the handover when the user is in motion and enters a geographical area served by another base station.
  • VLR Visitor Location Register
  • MSC Mobile Switching Center
  • the VLR Database contains the information of the users located in one of the geographic service areas of an MSC. If we put together all the VLR Databases of a mobile telephone operator company we will have all the users active in the network of said operator (includes the users of the operator and the users who are roaming in the network of said operator). If we put together all the VLR Databases of all the mobile phone operator companies, we will have all the users active in the country in a certain moment of time.
  • HLR Home Location Register
  • HLR Home Location Register
  • Network Provisioning or Network Provisioning is the network element of a mobile phone operator in charge of charging the subscriber information so that they can access the different services defined according to the type of plan they have contracted. It is a means to update the databases of the mobile phone operator.
  • VLR Voice Callback Agent
  • MSISDN Mobile Subscriber Identity
  • IMEI International Mobile Subscriber Identity
  • IMSI IMSI
  • CELL ID the information that can be obtained from the HLR or the Network Provisioning element, such as MSISDN, IMEI, IMSI, CELL ID, among others.
  • RNT Database National Registry of Terminals of Cellular Telephony, contains information of all the subscribers who had hired a service in the country and the cellular equipment declared by each user; It is generally managed by the country's regulatory body.
  • the IMEI and ISDN attributes are found in the VLRs and in the BD RNT.
  • the CELL ID attribute is usually available in VLRs.
  • the proposed invention defines a set of elements configured and related within a method, respectively, to identify cellular equipment that should not operate in any communication network of any mobile telephone operator in a given country or group of countries subscribed to a agreement. These irregular cell identification methods do not depend on the notifications that the affected users have to make to their cellular operator.
  • the set includes:
  • the ordered set of the elements, structured and arranged in a method (hereinafter the set) for identification of irregular cellular equipment proposed by the invention consists of automatic methods of detecting irregular cellular equipment by means of the interaction of the various configured elements that make up the set.
  • the regulatory body may direct specific actions such as notification to mobile phone operators to proceed with the blocking of said cellular equipment.
  • Consolidation stage generates the consolidated VLR at the country level or group of countries. With the VLR information of each mobile phone company in the country or group of countries, the consolidated VLR database is generated at the country level or group of countries to obtain the list of all active cellular equipment at the time the information is generated .
  • the relevant information for this method are the IMEI and MSISDN codes of each active user that are in these VLRs.
  • Identification stage The group of teams that have the same IMEI and different MSISDN is verified to identify the cloned computers. This process will allow us to identify these equipment in a certain country or group of countries Under normal conditions we should not find any cloned equipment.
  • Original search stage uses the information from the RNT database containing the valid IMEI and MSISDN associations. By comparing all the cases found in the Identification Process, we can determine the uncloned and cloned devices.
  • Debug stage it is the filtering that allows us to obtain the list of cloned equipment.
  • SECOND METHOD Search and identification of irregular cellular equipment or of doubtful origin (stolen, altered, stolen, not homologated and / or legally acquired) in a certain country or group of countries.
  • the consolidated VLR is generated at the country level or group of countries. With the VLR information of each mobile phone company in the country or group of countries, the consolidated VLR database is generated at the country level or group of countries to obtain the list of all active cellular equipment at the time the information is generated .
  • the relevant information for this method are the IMEI and MSISDN codes of each active user that are in these VLRs.
  • FIGURE 1 Scheme showing the interaction of the mobile operating company with the regulatory entity, and the cell of the mobile operating company and the cellular equipment.
  • FIGURE 2 Flowchart corresponding to the First Method referring to the search and identification of cloned cellular equipment in a given country or group of countries.
  • FIGURE 3 Flowchart corresponding to the Second Method referred to the search and identification of irregular cellular equipment or of doubtful origin (stolen, altered, stolen, not homologated and / or legally acquired) in a certain country or group of countries. SAW. PREFERRED EMBODIMENT OF THE INVENTION
  • FIGURE 1 describes the interaction 3 between the mobile telephone operator company (server and database) 1 and the regulatory entity of the area (server and database) 2;
  • the cellular equipment can operate in the communication network thanks to the signal emission 6 of the cell (CELL ID) 5 of its corresponding mobile operator 1.
  • the regulatory entity With interaction 3, the regulatory entity generates and manages the RNT Database 12, established with the information sent by the mobile telephone operator companies 1 in which the information updates of the already existing subscribers and the information of new ones are indicated. subscribers
  • FIGURE 2 allows us to illustrate this method and then explain it.
  • CONSOLIDATION STAGE 8 generates the consolidated VLR at the country level or group of countries.
  • the consolidated VLR database is generated at the country level or group of countries 9 to obtain the list of all active cellular equipment at the time the information is generated.
  • the relevant information for this method are the IMEI and MSISDN codes of each active user that are in these VLRs.
  • IDENTIFICATION STAGE 10 of the cloned teams, the group of teams that have the same IMEI and different MSISDN 11. This process will allow us to identify these teams in a certain country or group of countries. Under normal conditions we should not find any cloned equipment.
  • ORIGINAL SEARCH STAGE 13 uses the information from BD RNT 12 that contains the valid IMEI and MSISDN associations. By comparing all the cases found in the Identification Process 10 we can determine the uncloned equipment (OK) and the cloned equipment (x) 14.
  • DEPURATION STAGE 15 is the filtering that allows us to obtain the list of cloned equipment 16.
  • FIGURE 3 allows us to illustrate this method and then explain it.
  • CONSOLIDATION STAGE 8 generates the consolidated VLR at the country level or group of countries. With the VLR information of each mobile phone company in the country or group of countries, the consolidated VLR database is generated at the country level or group of countries 9 to obtain the list of all active cellular equipment at the time the information is generated.
  • the relevant information for this method are the IMEI and MSISDN codes of each active user that are in these VLRs.
  • Other modifications and alternative embodiments of this invention will be apparent to those skilled in the art in view of this description. It will be recognized, therefore, that the present invention is not limited only to be used in cellular equipment, and that the definition of regulated cellular equipment and irregular cellular equipment may vary from one country to another.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne des procédés pour identifier des équipements cellulaires irréguliers dans un pays déterminé ou un groupe de pays et éviter qu'ils continuent à fonctionner dans un l'un quelconque des réseaux de communication des entreprises d'opérateurs de téléphonie mobile qui fournissent des services dans ledit pays ou groupe de pays. Ces procédés ne dépendent pas des listes noires. L'information obtenue et ultérieurement analysée peut améliorer l'information des listes noires. Les procédés pour identifier et localiser les équipements cellulaires irréguliers interagissent avec les bases de données VLR et RNT à de telles fins. Les procédés proposés par l'invention font intervenir des composants standard ce qui permet de les utiliser au niveau mondial. Les procédés proposés par l'invention permettent d'identifier les abonnés qui utilisent des équipements cellulaires irréguliers, ce qui permet d'obtenir une solution qui agit de manière dissuasive face à l'utilisation desdits équipements. Les procédés proposés par l'invention permettent une surveillance constante pour la détection de téléphones irréguliers, ce qui permet de générer des actions pour améliorer la sécurité citoyenne.
PCT/PE2017/000002 2017-02-09 2017-02-09 Procédés et leurs composants pour identifier des équipements celllaires irréguliers ne devant pas fonctionner dans aucun réseau cellulaire dans un pays ou un groupe de pays Ceased WO2018147749A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/PE2017/000002 WO2018147749A1 (fr) 2017-02-09 2017-02-09 Procédés et leurs composants pour identifier des équipements celllaires irréguliers ne devant pas fonctionner dans aucun réseau cellulaire dans un pays ou un groupe de pays
ARP170102219A AR109302A1 (es) 2017-02-09 2017-08-07 Métodos para identificar equipos celulares irregulares en las redes celulares de un país o grupo de países

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/PE2017/000002 WO2018147749A1 (fr) 2017-02-09 2017-02-09 Procédés et leurs composants pour identifier des équipements celllaires irréguliers ne devant pas fonctionner dans aucun réseau cellulaire dans un pays ou un groupe de pays

Publications (1)

Publication Number Publication Date
WO2018147749A1 true WO2018147749A1 (fr) 2018-08-16

Family

ID=63107660

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/PE2017/000002 Ceased WO2018147749A1 (fr) 2017-02-09 2017-02-09 Procédés et leurs composants pour identifier des équipements celllaires irréguliers ne devant pas fonctionner dans aucun réseau cellulaire dans un pays ou un groupe de pays

Country Status (2)

Country Link
AR (1) AR109302A1 (fr)
WO (1) WO2018147749A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020120873A1 (en) * 1999-06-15 2002-08-29 Mika Salmivalli Detecting copied identity of terminal equipment
WO2012106982A1 (fr) * 2011-02-11 2012-08-16 Wang Lanrui Procédé et système de vérification rapide de l'identité internationale d'un équipement de station mobile
US20140235206A1 (en) * 2011-09-06 2014-08-21 Alain Denhez Mobile terminal theft detection system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020120873A1 (en) * 1999-06-15 2002-08-29 Mika Salmivalli Detecting copied identity of terminal equipment
WO2012106982A1 (fr) * 2011-02-11 2012-08-16 Wang Lanrui Procédé et système de vérification rapide de l'identité internationale d'un équipement de station mobile
US20140235206A1 (en) * 2011-09-06 2014-08-21 Alain Denhez Mobile terminal theft detection system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "Central Equipment Identity Register, From Wikipedia, the free encyclopedia", INTERNET ARCHIVE WAYBACK MACHINE, 16 October 2016 (2016-10-16), XP055534622, Retrieved from the Internet <URL:http://web.archive.org/web/20161016122100/http://en.wikipedia.org/wiki/Central_Equipment_Identity_Register> *

Also Published As

Publication number Publication date
AR109302A1 (es) 2018-11-14

Similar Documents

Publication Publication Date Title
US10931668B2 (en) Methods, systems, and computer readable media for network node validation
US6349206B1 (en) Method, system and apparatus for providing a warning when a mobile terminal may lose service
US10470154B2 (en) Methods, systems, and computer readable media for validating subscriber location information
CN102025627B (zh) 处理ps域业务、实现ps域业务请求的方法和移动终端
EP1754390B1 (fr) Procédé et réseau de radiocommunication pour la détection de présence de modules d&#39;identification d&#39;abonnés frauduleux
US7873358B2 (en) Method and system for providing inbound traffic redirection solution
US9113334B2 (en) Methods, systems, and computer readable media for controlling access to voice resources in mobile networks using mobility management signaling messages
KR101857514B1 (ko) Rplmn 정보의 업데이트 방법 및 사용자 장비
EP1763963A2 (fr) Passerelle frontiere d&#39;itinerance
CN103493456A (zh) 请求在蜂窝通信网络中注册静止用户设备的方法和支持节点
CN101180896B (zh) 入境漫游用户呼叫控制系统
CN101904188A (zh) 通过强制位置再登记来阻止使用被盗终端的方法和系统
CN102655638B (zh) 小区接入处理方法和装置、通信系统
US7590417B2 (en) Method, system and computer program product for countering anti-traffic redirection
CN104303564A (zh) 用于在公共陆地移动网络中使用毫微微蜂窝基站和用户设备的方法、毫微微蜂窝基站、公共陆地移动网络、程序和计算机程序产品
CN101938746B (zh) 一种用户标识模块反克隆的方法及装置
US9596589B1 (en) Third-party control of call-related services for a mobile station and subscriber
CN102724649A (zh) 监控低移动性终端位置变更的方法及系统
WO2018147749A1 (fr) Procédés et leurs composants pour identifier des équipements celllaires irréguliers ne devant pas fonctionner dans aucun réseau cellulaire dans un pays ou un groupe de pays
US9191819B2 (en) Security method for the verification of an information retrieval request
WO2015101808A1 (fr) Système de guidage d&#39;itinérance
EP1150529A1 (fr) Système et procédé d&#39;enregistrement d&#39;un terminal sans fil à la frontière entre zones de service géographiques
KR101329005B1 (ko) 비정상 로밍호를 차단하는 방법 및 이를 지원하는 홈 네트워크
CN102833733A (zh) 一种监控低移动性终端位置移动的方法及系统
KR20100064487A (ko) 아웃 바운드 로밍 시의 이동 통신 단말기 분실 관리 시스템 및 그 관리 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17895744

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17895744

Country of ref document: EP

Kind code of ref document: A1