Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for preventing copy card from embezzling service function

A technology for business functions and duplicating cards, which is applied in wireless communication, electrical components, security devices, etc., can solve problems such as duplicating card theft, achieve the effect of protecting users and standardizing network operations

Active Publication Date: 2014-12-31
浙江杭海新城控股集团有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The technical problem to be solved by the present invention is to provide a method and system for preventing duplicating cards from embezzling business functions, solving the problem of duplicating cards embezzling business functions, protecting users, and standardizing network operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing copy card from embezzling service function
  • Method and system for preventing copy card from embezzling service function
  • Method and system for preventing copy card from embezzling service function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] In the first embodiment, when the duplicate card is not registered with the authentication center, the authentication center notifies the MSC of the service right prohibition indication of the duplicate card through a registration response message.

[0042] Such as image 3 As shown, the method for preventing duplicating cards from embezzling business functions in Embodiment 1 specifically includes the following steps:

[0043] Step 301, when the user card is not registered with the authentication center, the terminal using the duplicate card is turned on, and the terminal initiates an authentication request to the MSC according to the requirements of the MSC;

[0044] Step 302, the MSC forwards the authentication request of the terminal to the authentication center;

[0045] Step 303, the authentication center authenticates the user card and obtains an authentication result, that is, judges that the authentication status of the user card is invalid, and records the au...

Embodiment 2

[0057] In the second embodiment, when the duplicate card is not registered with the authentication center, the authentication center notifies the MSC of the service right prohibition indication of the duplicate card through a qualification request response message.

[0058] Such as Figure 4 As shown, in the second embodiment, the method for preventing duplicating cards from embezzling business functions specifically includes the following steps:

[0059] Steps 401 to 405 correspond to image 3 Step 301 to step 305 in the same;

[0060] Step 406, the terminal sends a short message or initiates a data service;

[0061] Step 407, when the MSC finds that the user's qualification time limit expires or is invalid, it initiates a qualification request to the HLR;

[0062] Step 408, the HLR obtains the authentication result of the user card recorded in the database, checks that the authentication state of the user card is invalid, and determines that the user card is an illegal ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for preventing a copy card from embezzling service function. The system comprises a terminal, an authentication center, a home location register and a mobile management center, wherein the authentication center is used for authenticating a user card to obtain an authentication result; the home location register is used for recording the authentication result of the user card and informing the mobile management center of the authentication result of the user card; and the mobile management center is used for correspondingly forbidding or allowing the service function of the user card according to the authentication result of the user card. An authentication program of a user terminal is not needed to be updated, the problem that the copy card embezzles the service function can be solved, and the aims of protecting the user and standardizing network operation are fulfilled.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method and a system for preventing duplicate cards from embezzling service functions. Background technique [0002] With the development of mobile terminal communication technology, more and more illegally duplicated subscriber cards, such as Subscriber Identity Module (SIM) cards, appear on the market. Such illegally duplicated subscriber cards are usually called duplicated cards. [0003] Such as figure 1 As shown, it is defined in the traditional Code-Division Multiple Access (CDMA) related protocol, before the terminal sends and executes service functions, an authentication result is generated according to the algorithm of the terminal itself, and the authentication result is reported Go to the authentication center, and verify the terminal user card when the copy card terminal sends a short message. The specific process includes the following: [0004] Step ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W88/18
Inventor 林旭
Owner 浙江杭海新城控股集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products