Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for preventing illegal terminal from accessing as well as terminal

An illegal terminal and terminal access technology, applied in transmission systems, electrical components, wireless communications, etc., can solve the problems of MTCServer information security hidden dangers, illegal intrusion, etc., to prevent malicious theft and ensure security.

Inactive Publication Date: 2011-05-11
ZTE CORP
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the scenario where H2H applications and M2M applications coexist, illegal users may steal the SIM card of the MTC terminal and insert it into the H2H device, and use the H2H device to illegally access the network with the IMSI of the MTC device, not only can enjoy the preferential rate of the MTC terminal and other personalized services, and more importantly, it can illegally intrude into MTC Server, which poses a great hidden danger to the information security of MTC Server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing illegal terminal from accessing as well as terminal
  • Method and system for preventing illegal terminal from accessing as well as terminal
  • Method and system for preventing illegal terminal from accessing as well as terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The technical scheme of the present invention will be described in further detail below in conjunction with the accompanying drawings and specific examples, so that those skilled in the art can better understand the present invention and implement it, but the examples given are not intended to limit the present invention .

[0080] In the present invention, the terminal needs to carry device-related information, such as device type information, indicating whether the device is a machine-type device or a mobile phone-type device; or device access capability information, indicating whether the device has a machine-type access capability or a mobile phone-type access capability . After the SGSN / MME downloads the user subscription data from the user database, it can determine whether it is a machine type subscription or a mobile phone type subscription according to the user subscription data. There are many ways to judge, for example, you can sign up for M2M access capabil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for preventing an illegal terminal from accessing, comprising the following steps that: when the terminal requests to access a network, a network side judges whether the equipment type of the terminal and / or equipment access capability is matched with signing data of a user or not; and if not, the network side refuses the terminal to access the network. The invention also provides a system for preventing the illegal terminal from accessing and the terminal for preventing the illegal access. By using the invention, the problem that illegal users maliciously embezzle a universal subscriber identity module (USIM) of MTC (Machine Type Communication) equipment to access to the network can be effectively prevented and the security of MTC communication can be ensured.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method, a terminal and a system for preventing an illegal terminal from using a USIM (Universal Subscriber Identity Module, Universal Subscriber Identity Module) of other equipment to access a network. Background technique [0002] In recent years, M2M (Machine to Machine, machine-to-machine communication) services have gradually begun to be applied, such as logistics systems, remote meter reading, smart home and other applications. M2M service providers use existing wireless networks, such as PS networks such as GPRS (General Packet Radio service, General Packet Radio Service) network and EPS (Evolved Packet System, Evolved Packet System) network, to carry out M2M services. Due to the obvious difference between the M2M service and the H2H (Human to Human, communication between people) service, it is necessary to optimize the existing network to obtain the best network manag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/08
CPCH04L63/0876H04L63/102
Inventor 谢宝国李志军
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products