Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Cloned subscriber identity module card test method and system

A user identification module, card detection technology, applied in network data management, security devices, electrical components, etc., can solve the problems of consuming a lot of manpower and energy, loss of operators and mobile users, etc., and achieve the effect of saving labor costs

Active Publication Date: 2010-10-13
ZTE CORP
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the SIM card is cloned into multiple copies, it is distributed to various places. Multiple SIM cards may be registered under multiple mobile switching centers (MSCs) in various places at the same time, and are used to send spam messages in groups or make malicious calls, etc., thereby making the operation Businesses and mobile users suffer huge losses
[0003] In the current mobile communication network, there is a lack of more effective methods to detect and limit the use of these cloned cards; generally, after the bills are settled every month, it can only be extracted from a large number of bills and analyzed for abnormal business bills, and then Analyzing and confirming whether there is a situation where the SIM card has been cloned, so it takes a lot of manpower and energy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloned subscriber identity module card test method and system
  • Cloned subscriber identity module card test method and system
  • Cloned subscriber identity module card test method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0026] The detection method of cloning SIM card of the present invention, as figure 1 shown, including the following steps:

[0027] Step 101: After receiving the authentication request, the network side judges whether the address of the network element initiating the authentication in the authentication request is the same as the registered address of the currently saved SIM card, and if it is determined that they are not the same, execute step 102;

[0028] Here, the timing of receiving the authentication request is: when the SIM card initiates a service, the Mobile Switching Center (MSC) / Serving General Packet Radio Node (SGSN) at the SIM card location sends the authentication request to the Home Location Register (HLR); The network side includes network equipment such as MSC / SGSN and HLR. Wherein, the service initiated by the SI...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloned subscriber identity module (SIM) card test method, which comprises the following steps that: after authentication requirement is received, whether the address of a network element initiating authentication in the authentication requirement is the same as the registered address of the currently stored SIM card or not is judged, if the two addresses are not the same, a preset analysis rule is matched, and if the matching works, the relative information of the SIM card is obtained and reported to the operator. The invention discloses a cloned SIM card test system at the same time. The method and the system can detect the cloned SIM card in mobile communication network efficiently and automatically and then save labor cost.

Description

technical field [0001] The invention relates to detection technology in mobile communication, in particular to a detection method and system for a cloned Subscriber Identification Module (SIM) card. Background technique [0002] Cloning a SIM card, also known as copying a SIM card, is a relatively common phenomenon in mobile communication networks. The main reason for cloning a SIM card is that among the existing SIM cards, some SIM cards use early authentication Authorization algorithm, this algorithm has been cracked now, so criminals can easily obtain the key in the SIM card and create a cloned SIM card. After the SIM card is cloned into multiple copies, it is distributed to various places. Multiple SIM cards may be registered under multiple mobile switching centers (MSCs) in various places at the same time, and are used to send spam messages in groups or make malicious calls, etc., thereby making the operation Businesses and mobile users suffered huge losses. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/04H04W24/10H04W60/00
CPCH04W12/12H04W12/0431H04W12/126
Inventor 曹炜
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products