A method for obtaining an unauthorized user number, an attribution simulator and a system

A technology of user number and attribution, which is applied in the field of communication and can solve problems such as the inability to obtain the user's MSISDN number

Active Publication Date: 2020-10-23
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The corresponding relationship between the user's IMSI (International Mobile Subscriber Identification Number) number and the MSISDN (Mobile Subscriber International ISDN / PSTN number, mobile subscriber number) number is only stored in the home location register in the user's home network. In the signaling process of the location update request, only the user's IMSI number can be obtained, but the user's MSISDN number cannot be obtained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for obtaining an unauthorized user number, an attribution simulator and a system
  • A method for obtaining an unauthorized user number, an attribution simulator and a system
  • A method for obtaining an unauthorized user number, an attribution simulator and a system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] figure 1 A schematic flowchart of a method for obtaining an unauthorized user number provided in Embodiment 1, as shown in figure 1 As shown, the method includes:

[0042] Step 101. Determine the attribution of the unauthorized user according to the International Mobile Subscriber Identity of the unauthorized user.

[0043] The International Mobile Subscriber Identification Code is a sign to distinguish mobile users. It is a 15-digit decimal number with a structure of MCC (Mobile Country Code, Mobile Country Code) + MNC (Mobile Network Code, Mobile Network Number) + MSIN (Mobile Subscriber Identification Number, Mobile Subscriber Identification Number). The MCC has 3 digits and is used to uniquely identify the country to which the mobile user belongs. MNC is 2 to 3 digits and is used to identify the mobile communication network to which the mobile user belongs. MSIN is a mobile subscriber identification number, which is used to identify mobile subscribers in a certa...

Embodiment 2

[0052] figure 2 A schematic flowchart of a method for obtaining an unauthorized user number provided in Embodiment 2, as shown in figure 2 As shown, the method includes:

[0053] Step 201, the user terminal sends a location update request to the visitor location register of the visited place, and the location update request includes the international mobile subscriber identity code of the user terminal.

[0054] In this embodiment, the user terminal is an unauthorized user terminal, and the user terminal does not have the roaming authority of the visited place, and cannot register in the visitor location register of the visited place.

[0055] Step 202, the VLR of the visited place receives the location update request sent by the user terminal, and sends the location update request to the international signaling transfer point of the visited place.

[0056] Step 203: The international signaling transfer point of the visited location receives the location update request sen...

Embodiment 3

[0079] image 3 A structural schematic diagram of an attribution simulator provided in Embodiment 3, such as image 3 As shown, the attribution simulator includes: a judging module 11 , a sending module 12 and a receiving module 13 .

[0080] The judgment module 11 is used for judging the attribution of the unauthorized user according to the International Mobile Subscriber Identity code of the unauthorized user.

[0081]The sending module 12 is used to send a location update request to the international signaling transfer point of the home place, so that the international signaling transfer point of the home place sends a location update request to the home location register of the home place, the The location update request includes the pre-acquired visitor location register number of the home location.

[0082] The receiving module 13 is configured to receive response information sent by the HLR of the home location according to the VLR number of the home location, where ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an acquisition method and system of an unauthorized user number, and a home location simulator. The method comprises the following steps: according to an international mobile subscriber identification number of an unauthorized user, judging the home location of the unauthorized user; transmitting a location update request to an international signaling transfer point of thehome location, so as to enable the international signaling transfer point of the home location to transmit the location update request to a home location register of the home location, wherein the location update request comprises a pre-acquired visitor location register number of the home location; and receiving response information sent by the home location register of the home location according to the visitor location register number of the home location, wherein the response information comprises the unauthorized user number and can be used to obtain an internationally roamed unauthorizeduser number.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for obtaining an unauthorized user number, a home simulator and a system. Background technique [0002] At present, after entering the country, unauthorized users of international roaming will go through processes such as authentication and location update. When performing location update, the roaming network will initiate a location update request to the home network. The HLR (Home Location Register, home location register) of the home network Register) when receiving a location update request, will determine that the user does not have the right to roam in the roaming network according to the subscription information of the user, and thus reply a roaming rejection message to the roaming network, and the user fails to log in to the roaming site. The corresponding relationship between the user's IMSI (International Mobile Subscriber Identification Number) number a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/24H04W8/26H04W64/00
Inventor 朱峰李希金
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products