WO2015188639A1 - 一种鉴权方法、网络侧设备及终端 - Google Patents

一种鉴权方法、网络侧设备及终端 Download PDF

Info

Publication number
WO2015188639A1
WO2015188639A1 PCT/CN2015/073306 CN2015073306W WO2015188639A1 WO 2015188639 A1 WO2015188639 A1 WO 2015188639A1 CN 2015073306 W CN2015073306 W CN 2015073306W WO 2015188639 A1 WO2015188639 A1 WO 2015188639A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
identifier
module card
identification module
network side
Prior art date
Application number
PCT/CN2015/073306
Other languages
English (en)
French (fr)
Inventor
胡静
Original Assignee
西安中兴新软件有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 西安中兴新软件有限责任公司 filed Critical 西安中兴新软件有限责任公司
Publication of WO2015188639A1 publication Critical patent/WO2015188639A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Definitions

  • the present invention relates to an authentication technology in the field of wireless communications, and in particular, to an authentication method, a network side device, and a terminal.
  • the interlocking between the terminal and the subscriber identity module (SIM) is the operator's guarantee of custom security.
  • SIM subscriber identity module
  • the so-called terminal and SIM card interlock referred to as the card interlock, that is, the user-customized terminal and the SIM card are inseparable. If the other SIM card is inserted into the terminal, the terminal will not be used; and if the SIM card is inserted into other terminals. Also not available. It can be seen that the machine card interlocking function not only ensures the security of the operator's customized mode, but also ensures the security of the user using the terminal.
  • the card interlock function is mainly stored in the terminal by storing the SIM card information, or storing the terminal information in the SIM card.
  • the SIM card information is stored in a memory chip in the terminal, and the content in the memory chip can be read, that is, the SIM card information can be obtained by reading the content in the memory chip, so that There is a problem that the security of the lock is poor; and if the terminal information is saved to the SIM card, the SIM card manufacturer needs to store the terminal information one by one in the corresponding SIM card, so that the lock card has low operability. problem.
  • the embodiment of the present invention provides an authentication method, a network side device, and a terminal, which are used to improve the security of the terminal and the user identification module card card interlock.
  • an embodiment of the present invention provides an authentication method, where the method includes: after determining that the user identification module card successfully registers the network, the network side device sends an acquisition instruction to the terminal that installs the user identification module card; Receiving, by the network side device, a first identifier that uniquely identifies the subscriber identity module card and a second identifier that uniquely identifies the terminal, and the user identifier module card and the location according to the first identifier and the second identifier The terminal performs authentication.
  • the network side device authenticates the user identification module card and the terminal according to the first identifier and the second identifier, and the network side device uses the first identifier and The second identifier is matched with the pre-stored user identification module card identifier and the terminal device identifier; wherein the user identification module card identifier is in one-to-one correspondence with the terminal device identifier; when the first identifier is When the user identification module card identifiers are inconsistent, the user identification module card is illegal. When the second identifier is inconsistent with the terminal device identifier, the terminal is illegal.
  • the method further includes: when the authentication result indicates that the user identification module card is illegal, the network side The device sends an offline notification to the terminal; when the authentication result indicates that the terminal is illegal, the network side device sets the user identification module card to a disabled state.
  • the method further includes: the network side device does not receive the first identifier within a preset duration And the second identifier, confirming that the terminal is illegal, and setting the subscriber identity module card to a disabled state.
  • an embodiment of the present invention provides an authentication method, where the method includes: after a user successfully installs a network by a user identification module card installed by the terminal, the terminal receives and executes an acquisition instruction sent by the network side device, and obtains the unique identifier. a first identifier of the user identification module card and a second identifier that uniquely identifies the terminal; the terminal sends the first identifier and the second identifier to the network side device; the first identifier and the The second identifier is used by the network side device for the use The subscriber identity module card and the terminal perform authentication.
  • the method further includes: when the terminal receives the offline notification, the power is turned off; wherein the offline notification is that the network side device indicates that the terminal is illegal or determined by the authentication result. Sent when the terminal is illegal.
  • the embodiment of the present invention provides a network side device, where the network side device includes: a first sending unit, a first receiving unit, and an authentication unit; wherein the first sending unit is configured to determine a user After the identification module card successfully registers the network, sending an acquisition instruction to the terminal that has the user identification module card installed; the first receiving unit is configured to receive the first identifier and the unique identifier that uniquely identify the user identification module card. a second identifier of the terminal, where the authentication unit is configured to authenticate the user identification module card and the terminal according to the first identifier and the second identifier.
  • the authentication unit is configured to match the first identifier and the second identifier with a pre-stored user identification module card identifier and a terminal device identifier, where the user identification module card identifier One-to-one correspondence with the terminal device identifier; when the first identifier and the user identification module card identifier are inconsistent, indicating that the user identification module card is illegal; and when the second identifier matches the terminal device identifier Inconsistent, indicating that the terminal is illegal.
  • the first sending unit is further configured to: after the authentication unit authenticates the user identification module card and the terminal, when the authentication result indicates that the user identification module card is illegal, Sending an offline notification to the terminal;
  • the network side device further includes: a control unit, configured to: after the authentication unit authenticates the user identification module card and the terminal, when the authentication result indicates When the terminal is illegal, the user identification module card is set to a disabled state.
  • the network side device further includes: a control unit configured to: after the first sending unit sends an acquisition instruction to the terminal that installs the user identification module card, does not receive the preset time period When the first identifier and the second identifier are described, it is confirmed that the terminal is illegal, and the user identification module card is set to a disabled state.
  • an embodiment of the present invention provides a terminal, where the terminal includes: a second receiving unit, an obtaining unit, and a second sending unit, where the second receiving unit is configured to be installed on a terminal to which the terminal belongs.
  • the user identification module card After the user identification module card successfully registers the network, it receives an acquisition instruction sent by the network side device; the acquiring unit is configured to execute the obtaining instruction, obtain a first identifier that uniquely identifies the user identification module card, and uniquely identify the terminal.
  • the second identifier is configured to send the first identifier and the second identifier to the network side device; the first identifier and the second identifier are used by the network
  • the side device authenticates the user identification module card and the terminal.
  • the second receiving unit is further configured to receive an offline notification, where the offline notification is sent by the network side device when the authentication result indicates that the terminal is illegal or the terminal is determined to be illegal;
  • the terminal further includes: a shutdown unit configured to be powered off and powered off when the second receiving unit receives the offline notification.
  • the embodiment of the invention further provides a computer readable storage medium, the storage medium comprising a set of computer executable instructions for performing an authentication method of a network side device.
  • the embodiment of the invention further provides a computer readable storage medium, the storage medium comprising a set of computer executable instructions for performing an authentication method of the terminal.
  • the network side device after determining that the user identification module card successfully registers the network, the network side device sends an acquisition instruction to the terminal that installs the user identification module card; Receiving the first identifier and the second identifier, and authenticating the user identification module card and the terminal; that is, the authentication of the user identification module card and the terminal is performed by the network side device, and the network side device
  • the information is not freely available, so the security of the terminal and the subscriber identity module card card interlock is effectively improved.
  • FIG. 1 is a schematic structural diagram of a wireless communication system according to an embodiment of the present invention.
  • FIG. 2 is a schematic flowchart of a method for authenticating a wireless communication system according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart of an authentication method according to an embodiment of the present invention.
  • FIG. 4 is a schematic flowchart of a method for authenticating a network side device according to an embodiment of the present invention
  • FIG. 5 is a schematic flowchart of a method for authenticating a terminal according to an embodiment of the present invention
  • FIG. 6 is a schematic structural diagram of a network side device according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • the present embodiment provides a wireless communication system.
  • the system includes: a terminal 10 and a network side device 20; wherein the terminal 10 is provided with a subscriber identity module card 11.
  • the terminal 10 is configured to receive and execute an acquisition instruction sent by the network side device 20 after the user identification module card 11 successfully registers the network, and obtain a first identifier that uniquely identifies the user identification module card 11 and a second identifier that uniquely identifies the terminal 10; Sending the first identifier and the second identifier to the network side device 20;
  • the network side device 20 can be configured to authenticate the user identification module card 11 and the terminal 10 according to the first identifier and the second identifier.
  • the network side device 20 is configured to, after determining that the user identification module card 11 successfully registers the network, send an acquisition instruction to the terminal 10 on which the user identification module card 11 is installed, and obtain the first identifier and the unique identification terminal that uniquely identify the user identification module card 11.
  • the second identifier of 10 is further configured to authenticate the subscriber identity module card 11 and the terminal 10 according to the received first identifier and the second identifier.
  • the user identification module card 11 may be a SIM card, or may be a Universal Subscriber Identity Module (USIM) card, and may also be a module card for other users, which is not specifically limited in the embodiment of the present invention.
  • the first identifier may be an International Mobile Subscriber Identification Number (IMSI)
  • the second identifier may be an International Mobile Equipment Identity (IMEI, International Mobile Equipment) Identifying, of course, the first identifier and the second identifier may be different information for the system of different architectures, as long as the SIM card and the terminal can be uniquely identified, which is not specifically limited in the embodiment of the present invention.
  • FIG. 2 is a schematic flowchart of a method for performing authentication in a wireless communication system according to an embodiment of the present invention. Referring to FIG. 2, the method includes:
  • the network server After determining that the SIM card is successfully registered, the network server sends an acquisition instruction to the terminal that installs the SIM card.
  • the terminal receives and executes an acquisition instruction, and acquires a first identifier of the SIM card and a second identifier of the terminal itself.
  • the first identifier of the SIM card read by the terminal is IMSI_A
  • the second identifier of the terminal is IMEI_B
  • S203 The terminal sends the first identifier and the second identifier to the network side device.
  • the network side device authenticates the SIM card and the terminal according to the first identifier and the second identifier.
  • a network may be maintained in the network side device, where the SIM card identifiers of the SIM cards of all users in the carrier network are stored, that is, the IMSIs of the SIM cards, and the SIM cards are integrated with the SIM cards.
  • the terminal device identifiers of all the corresponding terminals, that is, the IMEI of these terminals.
  • the network side device may match the IMSI_A and the IMEI_B with the IMSI and the IMEI in the database to obtain an authentication result.
  • the following three authentication results may be, and are not limited to, the following.
  • the network side device confirms that the SIM card is legal, and then matches the IMEI corresponding to the IMSI_A in the database with the IMEI_B. When the matching is consistent, the network side device confirms the terminal. Also legal.
  • the network side device confirms that the SIM card is legal, and then performs the IMEI and IMEI_B corresponding to the IMSI_A in the database. Match, when the match is inconsistent, the network side device confirms that the terminal is illegal.
  • the network side device confirms that the SIM card is illegal, and the network side device queries the IMEI_B in the IMEI.
  • the terminal is confirmed to be legal.
  • the IMEI of the terminal may be queried first, and then the IMSI of the SIM card may be queried, and the query may be performed at the same time, which is not specifically limited in the embodiment of the present invention.
  • the network side device does not perform any operation.
  • the method further includes: the network side device performs corresponding control operations on the SIM card or the terminal according to the foregoing authentication result.
  • the network side device sends a downline notification to the terminal, and the terminal receives the offline notification to be powered off, so that the terminal is locked, that is, “locked”. At this time, the SIM card cannot be registered to the network through the antenna module set on the terminal.
  • the network side device sets the SIM card to a disabled state, such as "downtime”, "emergency call”, etc., so that the SIM card is locked, that is, "locked card”. At this time, the terminal cannot perform services such as calling and surfing the Internet.
  • the terminal is a terminal device that supports the card interlock function, and in actual applications, some terminal devices do not support the card interlock function, then, if If the SIM card supporting the card interlock function is inserted into the terminal that does not support the card interlock function, the terminal does not execute the acquisition command from the network side device, and then the network side device cannot receive the first identifier and the second identifier. Therefore, when the network side device does not receive the first identifier and the second identifier within the preset duration, it confirms that the terminal is illegal.
  • the preset duration may be ten seconds, thirty seconds, one minute, which is subject to the actual situation, and the invention is not specifically limited.
  • IMSI_A the IMSI of the SIM card
  • IMEI_B the IMEI of the terminal
  • FIG. 3 is a schematic flowchart of an authentication method according to an embodiment of the present invention. Referring to FIG. 3, the method includes:
  • S301 The terminal is powered on, detecting that the SIM card is inserted;
  • S302 The SIM card is registered to the network
  • the network server After detecting that the SIM card is registered to the network, the network server sends an acquisition instruction to the terminal to obtain the IMSI of the SIM card and the IMEI of the terminal.
  • S304 the terminal receives the acquisition instruction; when the terminal can execute the acquisition instruction, skip to S305; when the terminal is unable to execute the acquisition instruction, skip to S309b;
  • S305 The terminal determines whether the acquiring instruction is used to obtain an IMSI of the SIM card and an IMEI of the terminal.
  • the terminal After determining that the obtaining instruction is an instruction for acquiring the IMSI of the SIM card and the IMEI of the terminal, the terminal reads the IMSI of the SIM card, that is, IMSI_A; and the IMEI of the terminal, that is, IMEI_B;
  • S307 The terminal sends the IMSI_A and the IMEI_B to the network server.
  • S308 The network server traverses the database, and compares the IMSI_A and the IMEI_B with the IMSI and the IMEI in the database respectively; when the IMSI_A and the IMEI_B are aligned, the process jumps to S309a; when the IMSI_A is consistent, and the IMEI_B is inconsistent, the jump To S309b; when the IMSI_A comparison is inconsistent, and the IMEI_B comparison is consistent, skip to S309c;
  • S309a The network server confirms that the SIM card and the terminal are both legal, the process ends, and the SIM card and the terminal are normally used;
  • S309b The network server confirms that the SIM card is legal, the terminal is illegal, and jumps to S310b;
  • S309c The network server confirms that the SIM card is illegal, the terminal is legal, and jumps to S310c;
  • S310b The network server sets the SIM card to the "downtime” state, the process ends, and the SIM card “locks the card”;
  • S310c The network server sends an offline notification to the terminal, and jumps to S311c.
  • the terminal since the authentication of the user identification module card and the terminal is performed by the network side device, and the information in the network side device cannot be obtained arbitrarily, the terminal is improved. The security of interlocking with the subscriber identity module card machine.
  • FIG. 4 is a schematic flowchart of a network side device performing an authentication method according to an embodiment of the present invention. Referring to FIG. 4, the method includes:
  • the network side device After determining that the user identification module card successfully registers the network, the network side device sends an acquisition instruction to the terminal that installs the user identification module card.
  • the user identification module card may be a SIM card, or may be a USIM card, or may be a user identification module card, which is not specifically limited in the embodiment of the present invention
  • the first identifier may be an IMSI
  • the second identifier may be For the IMEI, of course, the first identifier and the second identifier may be different information for different network architectures, as long as the SIM card and the terminal can be uniquely identified, which is not specifically limited in the embodiment of the present invention.
  • the network side device receives the first identifier that uniquely identifies the subscriber identity module card and the second identifier that uniquely identifies the terminal, and authenticates the subscriber identity module card and the terminal according to the first identifier and the second identifier.
  • the S402 may be: the network side device matches the first identifier and the second identifier with the pre-stored user identification module card identifier and the terminal device identifier, and the user identification module card identifier corresponds to the terminal device identifier.
  • the first identifier is inconsistent with the user identification module card identifier
  • the user identification module card is illegal
  • the second identifier is inconsistent with the terminal device identifier
  • the terminal is illegal.
  • the method further includes: when the authentication result indicates that the user identification module card is illegal, the network side device sends a offline notification to the terminal; when the authentication result indicates that the terminal is illegal, the network side device sets the user identification module card to Disabled state.
  • the method further The method includes: when the network side device does not receive the first identifier and the second identifier within a preset duration, confirming that the terminal is illegal, and setting the subscriber identity module card to a disabled state.
  • FIG. 5 is a schematic flowchart of a method for performing authentication by a terminal according to an embodiment of the present invention. Referring to FIG. 5, the method includes:
  • the terminal After the user identity module card installed by the terminal is successfully registered in the network, the terminal receives and executes an acquisition instruction from the network side device, and acquires a first identifier that uniquely identifies the user identification module card and a second identifier that uniquely identifies the terminal.
  • the user identification module card may be a SIM card, or may be a USIM card, or may be a user identification module card, which is not specifically limited in the embodiment of the present invention
  • the first identifier may be an IMSI
  • the second identifier may be For the IMEI, of course, the first identifier and the second identifier may be different information for different network architectures, as long as the SIM card and the terminal can be uniquely identified, which is not specifically limited in the embodiment of the present invention.
  • the terminal sends the first identifier and the second identifier to the network side device.
  • the first identifier and the second identifier are used by the network side device to authenticate the user identification module card and the terminal.
  • the network side device has the following conditions for the user identification module card and the terminal authentication: the first type, the user identification module card and the terminal are legal; the second type, the user identification module card is legal, the terminal Illegal; third, the user identification module card is illegal and the terminal is legal.
  • the network side device does not perform any operation on the subscriber identity module card and the terminal to make it work normally; for the second type, when the subscriber identity module card is illegal, the network side device sets the subscriber identity module card to the disabled state.
  • the terminal when the terminal is illegal, the terminal is powered off and shut down when receiving the offline notification from the network side device.
  • the terminal does not execute the acquisition command from the network side device, then the network side device The first identifier and the second identifier are not received. Therefore, when the network side device does not receive the first identifier and the second identifier within the preset duration, the device confirms that the terminal is illegal, and the terminal also receives the offline line from the network side device. When notified, power off and shut down.
  • FIG. 6 is a schematic structural diagram of a network side device according to an embodiment of the present invention.
  • the network side device includes: a first sending unit 61, a first receiving unit 62, and an authentication unit 63.
  • the first sending unit 61 And configured to send an acquisition instruction to the terminal that is installed with the user identification module card after determining that the user identification module card successfully registers the network;
  • the first receiving unit 62 is configured to receive the first identifier and the unique identifier terminal that uniquely identify the user identification module card.
  • the second identifier is configured by the authentication unit 63, configured to authenticate the user identification module card and the terminal according to the first identifier and the second identifier.
  • the authentication unit 63 is configured to match the first identifier and the second identifier with the pre-stored user identification module card identifier and the terminal device identifier, where the user identification module card identifier corresponds to the terminal device identifier; wherein, the first If the identifier is inconsistent with the identifier of the user identification module card, it indicates that the user identification module card is illegal. When the second identifier is inconsistent with the terminal device identifier, the terminal is illegal.
  • the first sending unit 61 is configured to: after the authentication unit 63 authenticates the user identification module card and the terminal, when the authentication result indicates that the user identification module card is illegal, sending a offline notification to the terminal; the network side device further includes The control unit 64 is configured to set the user identification module card to a disabled state when the authentication result indicates that the terminal is illegal after the authentication unit 63 authenticates the user identification module card and the terminal.
  • the control unit 64 is further configured to: after the first sending unit 61 sends the acquisition command to the terminal that installs the user identification module card, if the first identifier and the second identifier are not received within the preset duration, the terminal is confirmed to be illegal, and the user is The identification module card is set to the disabled state.
  • the first receiving unit 62 and the first sending unit 61 may be disposed in one transceiver, or may be respectively disposed in the receiver and the transmitter, and the authentication unit 63 and the control unit 64 may be disposed in one or Multiple processors such as CPU and ARM.
  • FIG. 7 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • the terminal includes: a second receiving unit 71, an obtaining unit 72, and a second sending unit. 73.
  • the second receiving unit 71 is configured to receive an acquisition instruction sent by the network side device after the user identification module card installed on the terminal to which the terminal belongs is successfully registered, and the acquiring unit 72 is configured to execute the acquiring instruction.
  • the second sending unit 73 is configured to send the first identifier and the second identifier to the network side device, where the first identifier and the second identifier are used
  • the user identification module card and the terminal are authenticated by the network side device.
  • the second receiving unit 71 is further configured to receive the offline notification, where the offline notification is sent by the network device when the authentication result indicates that the terminal is illegal or the terminal is illegal; the terminal further includes: a shutdown unit 74 configured to receive in the second When the unit 71 receives the offline notification, the unit 71 is powered off and powered off.
  • the foregoing second receiving unit 71 and the second sending unit 73 may be disposed in one transceiver, or may be respectively disposed in the receiver and the transmitter, and the obtaining unit 72 and the shutdown unit 74 may be set in, for example, a CPU. , ARM and other processors.
  • the embodiment of the invention further provides a computer readable storage medium, the storage medium comprising a set of computer executable instructions for performing an authentication method of a network side device.
  • the embodiment of the invention further provides a computer readable storage medium, the storage medium comprising a set of computer executable instructions for performing an authentication method of the terminal.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

本发明实施例公开了一种鉴权方法,该方法包括:网络侧设备在确定用户识别模块卡成功注册网络后,向安装有所述用户识别模块卡的终端发送获取指令;所述网络侧设备接收唯一标识所述用户识别模块卡的第一标识及唯一标识所述终端的第二标识,并根据所述第一标识及所述第二标识对所述用户识别模块卡及所述终端进行鉴权。本发明实施例同时还提供一种网络侧设备及终端。

Description

一种鉴权方法、网络侧设备及终端 技术领域
本发明涉及无线通信领域的鉴权技术,尤其涉及一种鉴权方法、网络侧设备及终端。
背景技术
随着第三代移动通信技术的发展成熟和广泛商用,不同的运营商之间的竞争也日趋激烈。手机、数据卡等终端设备的开发与销售越来越多地采用运营商定制的方式,其中,终端和用户识别模块(SIM,Subscriber Identity Module)卡互锁就成为运营商保证其定制安全性及竞争优势的有效手段之一。所谓终端和SIM卡互锁,简称机卡互锁,即用户定制的终端和SIM卡不可分离使用,如果终端上被***其他SIM卡,终端将不可使用;而SIM卡如果被***到其他终端上,同样不可使用。可见,机卡互锁功能不仅保证了运营商定制方式的安全性,同样也保证了用户使用终端的安全性。
目前,机卡互锁功能主要是通过将SIM卡信息存储在终端中,或者将终端信息存储在SIM卡中。通常,将SIM卡信息存储在终端内的存储芯片中,该存储芯片中的内容是能够被读取的,也就是说,通过读取存储芯片中的内容是能够获得SIM卡信息的,这样,就存在锁机安全性差的问题;而将终端信息保存到SIM卡的话,则需要SIM卡制造商将终端信息一一对应的存储在相应的SIM卡,这样,就存在锁卡可操作性低的问题。
所以,现有技术中并没有一种更为合理的实现机卡互锁功能的方案。
发明内容
有鉴于此,本发明实施例提供一种鉴权方法、网络侧设备及终端,用以提高终端与用户识别模块卡机卡互锁的安全性。
为达到上述目的,本发明的技术方案是这样实现的:
第一方面,本发明实施例提供一种鉴权方法,所述方法包括:网络侧设备在确定用户识别模块卡成功注册网络后,向安装有所述用户识别模块卡的终端发送获取指令;所述网络侧设备接收唯一标识所述用户识别模块卡的第一标识及唯一标识所述终端的第二标识,并根据所述第一标识及所述第二标识对所述用户识别模块卡及所述终端进行鉴权。
上述方案中,所述网络侧设备根据所述第一标识及所述第二标识对所述用户识别模块卡及所述终端进行鉴权,包括:所述网络侧设备将所述第一标识及所述第二标识分别与预先存储的用户识别模块卡标识及终端设备标识进行匹配;其中,所述用户识别模块卡标识与所述终端设备标识一一对应;当所述第一标识与所述用户识别模块卡标识匹配不一致时,表明所述用户识别模块卡非法;当所述第二标识与所述终端设备标识匹配不一致时,表明所述终端非法。
上述方案中,在所述网络侧设备对所述用户识别模块卡及所述终端进行鉴权之后,所述方法还包括:当鉴权结果表明所述用户识别模块卡非法时,所述网络侧设备向所述终端发送下线通知;当鉴权结果表明所述终端非法时,所述网络侧设备将所述用户识别模块卡设置为禁用状态。
上述方案中,在所述网络侧设备向安装有所述用户识别模块卡的终端发送获取指令之后,所述方法还包括:所述网络侧设备在预设时长内没有收到所述第一标识及所述第二标识时,确认所述终端非法,将所述用户识别模块卡设置为禁用状态。
第二方面,本发明实施例提供一种鉴权方法,所述方法包括:终端在自身安装的用户识别模块卡成功注册网络后,接收并执行网络侧设备发送的获取指令,获取唯一标识所述用户识别模块卡的第一标识及唯一标识所述终端的第二标识;所述终端将所述第一标识及所述第二标识发送给所述网络侧设备;所述第一标识和所述第二标识用于所述网络侧设备对所述用 户识别模块卡及所述终端进行鉴权。
上述方案中,所述方法还包括:所述终端在接收到下线通知时,掉电关机;其中,所述下线通知为所述网络侧设备在鉴权结果表明所述终端非法或者确定所述终端非法时发送的。
第三方面,本发明实施例提供一种网络侧设备,所述网络侧设备包括:第一发送单元,第一接收单元及鉴权单元;其中,所述第一发送单元,配置为在确定用户识别模块卡成功注册网络后,向安装有所述用户识别模块卡的终端发送获取指令;所述第一接收单元,配置为接收唯一标识所述用户识别模块卡的第一标识及唯一标识所述终端的第二标识;所述鉴权单元,配置为根据所述第一标识及所述第二标识对所述用户识别模块卡及所述终端进行鉴权。
上述方案中,所述鉴权单元,配置为将所述第一标识及所述第二标识分别与预先存储的用户识别模块卡标识及终端设备标识进行匹配,其中,所述用户识别模块卡标识与所述终端设备标识一一对应;当所述第一标识与所述用户识别模块卡标识匹配不一致时,表明所述用户识别模块卡非法;当所述第二标识与所述终端设备标识匹配不一致时,表明所述终端非法。
上述方案中,所述第一发送单元,还配置为在所述鉴权单元对所述用户识别模块卡及所述终端进行鉴权之后,当鉴权结果表明所述用户识别模块卡非法时,向所述终端发送下线通知;所述网络侧设备还包括:控制单元,配置为在所述鉴权单元对所述用户识别模块卡及所述终端进行鉴权之后,当鉴权结果表明所述终端非法时,将所述用户识别模块卡设置为禁用状态。
上述方案中,所述网络侧设备,还包括:控制单元,配置为在所述第一发送单元向安装有所述用户识别模块卡的终端发送获取指令之后,在预设时长内没有收到所述第一标识及所述第二标识时,确认所述终端非法,将所述用户识别模块卡设置为禁用状态。
第四方面,本发明实施例提供一种终端,所述终端包括:第二接收单元、获取单元及第二发送单元;其中,所述第二接收单元,配置为在自身所属的终端上安装的用户识别模块卡成功注册网络后,接收网络侧设备发送的获取指令;所述获取单元,配置为执行所述获取指令,获取唯一标识所述用户识别模块卡的第一标识及唯一标识所述终端的第二标识;所述第二发送单元,配置为将所述第一标识及所述第二标识发送给所述网络侧设备;所述第一标识和所述第二标识用于所述网络侧设备对所述用户识别模块卡及所述终端进行鉴权。
上述方案中,所述第二接收单元,还配置为接收下线通知,所述下线通知为所述网络侧设备在鉴权结果表明所述终端非法或者确定所述终端非法时发送的;所述终端还包括:关机单元,配置为在所述第二接收单元接收到下线通知时,掉电关机。
本发明实施例还提供了一种计算机可读存储介质,所述存储介质包括一组计算机可执行指令,所述指令用于执行网络侧设备的鉴权方法。
本发明实施例还提供了一种计算机可读存储介质,所述存储介质包括一组计算机可执行指令,所述指令用于执行终端的鉴权方法。
在本发明实施例所提供的鉴权方法、网络侧设备及终端中,网络侧设备在确定用户识别模块卡成功注册网络后,向安装有用户识别模块卡的终端发送获取指令;然后,再根据接收到的第一标识及第二标识,对用户识别模块卡及终端进行鉴权;也就是说,对于用户识别模块卡及终端的鉴权是由网络侧设备去进行的,而网络侧设备中的信息是不能够随意获得的,所以,有效地提高了终端与用户识别模块卡机卡互锁的安全性。
附图说明
图1为本发明实施例中无线通信***的结构示意图;
图2为本发明实施例中无线通信***进行鉴权方法的流程示意图;
图3为本发明实施例中鉴权方法的流程示意图;
图4为本发明实施例中网络侧设备进行鉴权方法的流程示意图;
图5为本发明实施例中终端进行鉴权方法的流程示意图;
图6为本发明实施例中网络侧设备的结构示意图;
图7为本发明实施例中终端的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述。
本实施例提供一种无线通信***,如图1所示,该***包括:终端10及网络侧设备20;其中,终端10上安装有一张用户识别模块卡11。
终端10,配置为在用户识别模块卡11成功注册网络后,接收并执行网络侧设备20发送的获取指令,获取唯一标识用户识别模块卡11的第一标识及唯一标识终端10的第二标识;将第一标识及第二标识发送给网络侧设备20;
可使网络侧设备20根据第一标识和第二标识,对用户识别模块卡11及终端10进行鉴权。
网络侧设备20,配置为在确定用户识别模块卡11成功注册网络后,向安装有用户识别模块卡11的终端10发送获取指令,获取唯一标识用户识别模块卡11的第一标识及唯一标识终端10的第二标识;再根据接收到的第一标识及第二标识,对用户识别模块卡11及终端10进行鉴权。
在本实施例中,用户识别模块卡11可以为SIM卡,也可以为全球用户识别模块(USIM,Universal Subscriber Identity Module)卡,还可以为其他用户识别模块卡,本发明实施例不做具体限定;第一标识可以为国际移动用户识别码(IMSI,International Mobile Subscriber Identification Number),第二标识可以为国际移动设备识别码(IMEI,International Mobile Equipment  Identify),当然,第一标识和第二标识对于不同架构的***也可以为不同的信息,只要能够唯一标识SIM卡及终端即可,本发明实施例不做具体限定。
下面以用户识别模块卡为SIM卡为例,对上述***执行鉴权方法的流程进行说明。图2为本发明实施例中无线通信***执行鉴权方法的流程示意图,参考图2所示,该方法包括:
S201:网络服务器在确定SIM卡成功注册后,向安装该SIM卡的终端下发获取指令;
S202:终端接收并执行获取指令,获取SIM卡的第一标识和终端自身的第二标识;
例如,终端读取到的SIM卡的第一标识为IMSI_A,终端的第二标识为IMEI_B;
S203:终端将第一标识和第二标识发送给网络侧设备;
S204:网络侧设备根据第一标识和第二标识对SIM卡及终端进行鉴权。
在本实施例中,网络侧设备中可以维护着一个数据库,该数据库中存储有运营商网络中所有用户的SIM卡的SIM卡标识,也就是这些SIM卡的IMSI,以及与这些SIM卡一一对应的所有终端的终端设备标识,也就是这些终端的IMEI。
举例来说,网络侧设备在接收终端发送的第一标识和第二标识,如IMSI_A和IMEI_B后,可以将IMSI_A和IMEI_B与上述数据库中的IMSI 及IMEI进行匹配,获得鉴权结果。
在实际应用中,可以且不限于存在以下三种鉴权结果。
第一种,当在数据库中的IMSI中查询到IMSI_A时,网络侧设备确认SIM卡合法,然后,再将数据库中与IMSI_A对应的IMEI与IMEI_B进行匹配,当匹配一致时,网络侧设备确认终端也合法。
第二种,当在数据库中的IMSI中查询到IMSI_A时,网络侧设备确认SIM卡合法,然后,再将数据库中与IMSI_A对应的IMEI与IMEI_B进行 匹配,当匹配不一致时,网络侧设备确认终端非法。
第三种,当数据库中的IMSI中查询不到IMSI_A时,网络侧设备确认SIM卡非法,同时,网络侧设备在IMEI中查询IMEI_B,当查询到IMEI_B时,就确认终端合法。
当然,也可以先查询终端的IMEI,再查询SIM卡的IMSI,还可以同时进行查询,本发明实施例不做具体限定。
对于第一种鉴权结果,网络侧设备不进行任何操作。
对于第二种及第三种鉴权结果,上述方法还包括:网络侧设备根据上述鉴权结果,对SIM卡或终端进行相应的控制操作。
具体来说,当上述鉴权结果表示SIM卡非法时,网络侧设备向终端发送下线通知,终端在接收到下线通知掉电关机,使得终端被锁定,即“锁机”。此时,SIM卡无法通过终端上设置的天线模块注册到网络。
而当上述鉴权结果表示终端非法时,网络侧设备将SIM卡设置为禁用状态,如“停机”、“紧急呼叫”等状态,使得SIM卡被锁定,即“锁卡”。此时,终端无法进行呼叫、上网等业务。
需要说明的是,上述一个或者多个实施例中所说的终端为支持机卡互锁功能的终端设备,而在实际应用中,有些终端设备是不支持机卡互锁功能的,那么,如果将支持机卡互锁功能的SIM卡***不支持机卡互锁功能的终端的话,终端不会执行来自网络侧设备的获取指令,那么,网络侧设备就无法收到第一标识和第二标识,所以,网络侧设备在预设时长内没有收到第一标识及第二标识时,就确认终端非法。
在实际应用中,预设时长可以是十秒、三十秒、一分钟,以实际情况为准,本发明不做具体限定。
下面以具体实例来对上述一个或者多个实施例所述的方法流程进行说明。
假设SIM卡的IMSI为IMSI_A,终端的IMEI为IMEI_B。
图3为本发明实施例中鉴权方法的流程示意图,参考图3所示,该方法包括:
S301:终端上电开机,检测到SIM卡已***;
S302:SIM卡注册到网络;
S303:网络服务器检测到SIM卡注册到网络后,向终端发送获取指令,来获取SIM卡的IMSI和终端的IMEI;
S304:终端接收获取指令;当终端能够执行获取指令时,跳至S305;当终端不能够执行获取指令时,跳至S309b;
S305:终端判断该获取指令是否用于获取SIM卡的IMSI和终端的IMEI;
S306:终端在确定该获取指令是用于获取SIM卡的IMSI和终端的IMEI的指令后,读取SIM卡的IMSI,即IMSI_A;以及终端的IMEI,即IMEI_B;
S307:终端将IMSI_A和IMEI_B发送给网络服务器;
S308:网络服务器遍历数据库,将IMSI_A和IMEI_B分别与数据库中的IMSI和IMEI比对;当IMSI_A和IMEI_B均比对一致时,跳至S309a;当IMSI_A比对一致,且IMEI_B比对不一致时,跳至S309b;当IMSI_A比对不一致,且IMEI_B比对一致时,跳至S309c;
S309a:网络服务器确认SIM卡和终端均合法,流程结束,SIM卡和终端正常使用;
S309b:网络服务器确认SIM卡合法,终端非法,跳至S310b;
S309c:网络服务器确认SIM卡非法,终端合法,跳至S310c;
S310b:网络服务器将SIM卡设置为“停机”状态,流程结束,SIM卡“锁卡”;
S310c:网络服务器向终端发送下线通知,跳至S311c;
S311c:终端在接收到下线通知后,掉电关机,流程结束,终端“锁机”。
综上所述,由于对于用户识别模块卡及终端的鉴权是由网络侧设备去进行的,而网络侧设备中的信息是不能够随意获得的,所以,提高了终端 与用户识别模块卡机卡互锁的安全性。
基于同一发明构思,本发明实施例提供一种鉴权方法,应用于上述一个或者多个实施例所述的网络侧设备。图4为本发明实施例中网络侧设备执行鉴权方法的流程示意图,参考图4所示,方法包括:
S401:网络侧设备在确定用户识别模块卡成功注册网络后,向安装有用户识别模块卡的终端发送获取指令;
在本实施例中,用户识别模块卡可以为SIM卡,也可以为USIM卡,还可以为其他用户识别模块卡,本发明实施例不做具体限定;第一标识可以为IMSI,第二标识可以为IMEI,当然,第一标识和第二标识对于不同的网络架构也可以为不同的信息,只要能够唯一标识SIM卡及终端即可,本发明实施例不做具体限定。
S402:网络侧设备接收唯一标识用户识别模块卡的第一标识及唯一标识终端的第二标识,并根据第一标识及第二标识对用户识别模块卡及终端进行鉴权。
在本实施例中,S402可以为:网络侧设备将第一标识及第二标识分别与预先存储的用户识别模块卡标识及终端设备标识进行匹配,用户识别模块卡标识与终端设备标识一一对应;其中,当第一标识与用户识别模块卡标识匹配不一致时,表明用户识别模块卡非法;当第二标识与终端设备标识匹配不一致时,表明终端非法。
在S402之后,该方法还包括:当鉴权结果表明用户识别模块卡非法时,网络侧设备向终端发送下线通知;当鉴权结果表明终端非法时,网络侧设备将用户识别模块卡设置为禁用状态。
在另一实施例中,如果将支持机卡互锁功能的SIM卡***不支持机卡互锁功能的终端的话,终端不会执行来自网络侧设备的获取指令,那么,在S301之后,方法还包括:网络侧设备在预设时长内没有收到第一标识及第二标识时,确认终端非法,将用户识别模块卡设置为禁用状态。
基于同一发明构思,本发明实施例提供一种鉴权方法,应用于上述一个或者多个实施例所述的终端。图5为本发明实施例中终端执行鉴权方法的流程示意图,参考图5所示,方法包括:
S501:终端在自身安装的用户识别模块卡注册到网络成功后,接收并执行来自网络侧设备的获取指令,获取唯一标识用户识别模块卡的第一标识及唯一标识终端的第二标识;
在本实施例中,用户识别模块卡可以为SIM卡,也可以为USIM卡,还可以为其他用户识别模块卡,本发明实施例不做具体限定;第一标识可以为IMSI,第二标识可以为IMEI,当然,第一标识和第二标识对于不同的网络架构也可以为不同的信息,只要能够唯一标识SIM卡及终端即可,本发明实施例不做具体限定。
S502:终端将第一标识及第二标识发送给网络侧设备;第一标识和第二标识用于网络侧设备对用户识别模块卡及终端进行鉴权。
在具体实施过程中,网络侧设备对于用户识别模块卡和终端的鉴权,存在以下几种情况:第一种,用户识别模块卡和终端均合法;第二种,用户识别模块卡合法,终端非法;第三种,用户识别模块卡非法,终端合法。
对于第一种,网络侧设备对用户识别模块卡及终端不进行任何操作,使其正常工作;对于第二种,当用户识别模块卡非法时,网络侧设备将用户识别模块卡设置为禁用状态;对于第三种,当终端非法时,终端在接收到来自网络侧设备的下线通知时,掉电关机。
当然,还存在另一种情况,如果将支持机卡互锁功能的SIM卡***不支持机卡互锁功能的终端的话,终端不会执行来自网络侧设备的获取指令,那么,网络侧设备就无法收到第一标识和第二标识,所以,网络侧设备在预设时长内没有收到第一标识及第二标识时,就确认终端非法,终端同样在接收到来自网络侧设备的下线通知时,掉电关机。
基于同一发明构思,本发明实施例提供一种网络侧设备,与上述一个 或者多个实施例所述的网络侧设备一致。图6为本发明实施例中网络侧设备的结构示意图,参考图6所示,网络侧设备包括:第一发送单元61,第一接收单元62及鉴权单元63;其中,第一发送单元61,配置为在确定用户识别模块卡成功注册网络后,向安装有用户识别模块卡的终端发送获取指令;第一接收单元62,配置为接收唯一标识用户识别模块卡的第一标识及唯一标识终端的第二标识;鉴权单元63,配置为根据第一标识及第二标识对用户识别模块卡及终端进行鉴权。
鉴权单元63,配置为将第一标识及第二标识分别与预先存储的用户识别模块卡标识及终端设备标识进行匹配,用户识别模块卡标识与终端设备标识一一对应;其中,当第一标识与用户识别模块卡标识匹配不一致时,表明用户识别模块卡非法;当第二标识与终端设备标识匹配不一致时,表明终端非法。
第一发送单元61,配置为在鉴权单元63对用户识别模块卡及终端进行鉴权之后,当鉴权结果表明用户识别模块卡非法时,向终端发送下线通知;网络侧设备,还包括:控制单元64,配置为在鉴权单元63对用户识别模块卡及终端进行鉴权之后,当鉴权结果表明终端非法时,将用户识别模块卡设置为禁用状态。
控制单元64,还配置为在第一发送单元61向安装有用户识别模块卡的终端发送获取指令之后,在预设时长内没有收到第一标识及第二标识时,确认终端非法,将用户识别模块卡设置为禁用状态。
在实际应用中,上述第一接收单元62与第一发送单元61可以设置在一个收发机中,也可以分别设置在接收器和发送器中,鉴权单元63和控制单元64可以设置在一个或者多个如CPU、ARM等处理器中。
基于同一发明构思,本发明实施例提供一种终端,与上述一个或者多个实施例所述的终端一致。图7为本发明实施例中终端的结构示意图,参考图7所示,终端包括:第二接收单元71、获取单元72及第二发送单元 73;其中,第二接收单元71,配置为在自身所属的终端上安装的用户识别模块卡成功注册网络后,接收网络侧设备发送的获取指令;获取单元72,配置为执行所述获取指令,获取唯一标识用户识别模块卡的第一标识及唯一标识终端的第二标识;第二发送单元73,配置为将第一标识及第二标识发送给网络侧设备;第一标识和第二标识用于网络侧设备对用户识别模块卡及终端进行鉴权。
第二接收单元71,还配置为接收下线通知,下线通知为网络侧设备在鉴权结果表明终端非法或者确定终端非法时发送的;终端还包括:关机单元74,配置为在第二接收单元71接收到下线通知时,掉电关机。
在实际应用中,上述第二接收单元71与第二发送单元73可以设置在一个收发机中,也可以分别设置在接收器和发送器中,而获取单元72和关机单元74可以设置在如CPU、ARM等处理器中。
本发明实施例还提供了一种计算机可读存储介质,所述存储介质包括一组计算机可执行指令,所述指令用于执行网络侧设备的鉴权方法。
本发明实施例还提供了一种计算机可读存储介质,所述存储介质包括一组计算机可执行指令,所述指令用于执行终端的鉴权方法。
本领域内的技术人员应明白,本发明的实施例可提供为方法、***、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(***)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得 通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
以上,仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。

Claims (14)

  1. 一种鉴权方法,所述方法包括:
    网络侧设备在确定用户识别模块卡成功注册网络后,向安装有所述用户识别模块卡的终端发送获取指令;
    所述网络侧设备接收唯一标识所述用户识别模块卡的第一标识及唯一标识所述终端的第二标识,并根据所述第一标识及所述第二标识对所述用户识别模块卡及所述终端进行鉴权。
  2. 根据权利要求1所述的方法,其中,所述网络侧设备根据所述第一标识及所述第二标识对所述用户识别模块卡及所述终端进行鉴权,包括:
    所述网络侧设备将所述第一标识及所述第二标识分别与预先存储的用户识别模块卡标识及终端设备标识进行匹配;其中,所述用户识别模块卡标识与所述终端设备标识一一对应;
    当所述第一标识与所述用户识别模块卡标识匹配不一致时,表明所述用户识别模块卡非法;当所述第二标识与所述终端设备标识匹配不一致时,表明所述终端非法。
  3. 根据权利要求1或2所述的方法,其中,在所述网络侧设备对所述用户识别模块卡及所述终端进行鉴权之后,所述方法还包括:
    当鉴权结果表明所述用户识别模块卡非法时,所述网络侧设备向所述终端发送下线通知;
    当鉴权结果表明所述终端非法时,所述网络侧设备将所述用户识别模块卡设置为禁用状态。
  4. 根据权利要求1或2所述的方法,其中,在所述网络侧设备向安装有所述用户识别模块卡的终端发送获取指令之后,所述方法还包括:
    所述网络侧设备在预设时长内没有收到所述第一标识及所述第二标 识时,确认所述终端非法,将所述用户识别模块卡设置为禁用状态。
  5. 一种鉴权方法,所述方法包括:
    终端在自身安装的用户识别模块卡成功注册网络后,接收并执行网络侧设备发送的获取指令,获取唯一标识所述用户识别模块卡的第一标识及唯一标识所述终端的第二标识;
    所述终端将所述第一标识及所述第二标识发送给所述网络侧设备;所述第一标识和所述第二标识用于所述网络侧设备对所述用户识别模块卡及所述终端进行鉴权。
  6. 根据权利要求5所述的方法,其中,所述方法还包括:
    所述终端在接收到下线通知时,掉电关机;其中,所述下线通知为所述网络侧设备在鉴权结果表明所述终端非法或者确定所述终端非法时发送的。
  7. 一种网络侧设备,所述网络侧设备包括:第一发送单元,第一接收单元及鉴权单元;其中,
    所述第一发送单元,配置为在确定用户识别模块卡成功注册网络后,向安装有所述用户识别模块卡的终端发送获取指令;
    所述第一接收单元,配置为接收唯一标识所述用户识别模块卡的第一标识及唯一标识所述终端的第二标识;
    所述鉴权单元,配置为根据所述第一标识及所述第二标识对所述用户识别模块卡及所述终端进行鉴权。
  8. 根据权利要求7所述的网络侧设备,其中,所述鉴权单元,配置为将所述第一标识及所述第二标识分别与预先存储的用户识别模块卡标识及终端设备标识进行匹配,其中,所述用户识别模块卡标识与所述终端设备标识一一对应;当所述第一标识与所述用户识别模块卡标识匹配不一致时,表明所述用户识别模块卡非法;当所述第二标识与所述终端设备标识匹配不一致时,表明所述终端非法。
  9. 根据权利要求7或8所述的网络侧设备,其中,所述第一发送单元,还配置为在所述鉴权单元对所述用户识别模块卡及所述终端进行鉴权之后,当鉴权结果表明所述用户识别模块卡非法时,向所述终端发送下线通知;
    所述网络侧设备还包括:控制单元,配置为在所述鉴权单元对所述用户识别模块卡及所述终端进行鉴权之后,当鉴权结果表明所述终端非法时,将所述用户识别模块卡设置为禁用状态。
  10. 根据权利要求7或8所述的网络侧设备,其中,所述网络侧设备,还包括:控制单元,配置为在所述第一发送单元向安装有所述用户识别模块卡的终端发送获取指令之后,在预设时长内没有收到所述第一标识及所述第二标识时,确认所述终端非法,将所述用户识别模块卡设置为禁用状态。
  11. 一种终端,所述终端包括:第二接收单元、获取单元及第二发送单元;其中,
    所述第二接收单元,配置为在自身所属的终端上安装的用户识别模块卡成功注册网络后,接收网络侧设备发送的获取指令;
    所述获取单元,配置为执行所述获取指令,获取唯一标识所述用户识别模块卡的第一标识及唯一标识所述终端的第二标识;
    所述第二发送单元,配置为将所述第一标识及所述第二标识发送给所述网络侧设备;所述第一标识和所述第二标识用于所述网络侧设备对所述用户识别模块卡及所述终端进行鉴权。
  12. 根据权利要求11所述的终端,其中,所述第二接收单元,还配置为接收下线通知,所述下线通知为所述网络侧设备在鉴权结果表明所述终端非法或者确定所述终端非法时发送的;
    所述终端还包括:关机单元,配置为在所述第二接收单元接收到下线通知时,掉电关机。
  13. 一种计算机可读存储介质,所述存储介质包括一组计算机可执行指令,所述指令用于执行权利要求1-4任一项所述的鉴权方法。
  14. 一种计算机可读存储介质,所述存储介质包括一组计算机可执行指令,所述指令用于执行权利要求5-6任一项所述的鉴权方法。
PCT/CN2015/073306 2014-06-12 2015-02-26 一种鉴权方法、网络侧设备及终端 WO2015188639A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410260532.9A CN105323756B (zh) 2014-06-12 2014-06-12 一种鉴权方法、网络侧设备及终端
CN201410260532.9 2014-06-12

Publications (1)

Publication Number Publication Date
WO2015188639A1 true WO2015188639A1 (zh) 2015-12-17

Family

ID=54832861

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/073306 WO2015188639A1 (zh) 2014-06-12 2015-02-26 一种鉴权方法、网络侧设备及终端

Country Status (2)

Country Link
CN (1) CN105323756B (zh)
WO (1) WO2015188639A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109617898B (zh) * 2018-12-28 2021-10-29 顾宏超 远程鉴权方法及其装置、设备和存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1780435A (zh) * 2004-11-25 2006-05-31 李杨 一种防盗手机及其防盗方法
CN101686572A (zh) * 2008-09-26 2010-03-31 ***通信集团公司 无线终端机卡互锁的方法、***和管理平台
CN101711023A (zh) * 2009-11-10 2010-05-19 中兴通讯股份有限公司 一种实现机卡互锁的方法及***
CN103596170A (zh) * 2012-08-17 2014-02-19 中兴通讯股份有限公司 一种利用用户识别卡对终端进行加密的方法和***
CN103841558A (zh) * 2012-11-26 2014-06-04 ***通信集团北京有限公司 一种终端鉴权方法、***及移动通信终端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1780435A (zh) * 2004-11-25 2006-05-31 李杨 一种防盗手机及其防盗方法
CN101686572A (zh) * 2008-09-26 2010-03-31 ***通信集团公司 无线终端机卡互锁的方法、***和管理平台
CN101711023A (zh) * 2009-11-10 2010-05-19 中兴通讯股份有限公司 一种实现机卡互锁的方法及***
CN103596170A (zh) * 2012-08-17 2014-02-19 中兴通讯股份有限公司 一种利用用户识别卡对终端进行加密的方法和***
CN103841558A (zh) * 2012-11-26 2014-06-04 ***通信集团北京有限公司 一种终端鉴权方法、***及移动通信终端

Also Published As

Publication number Publication date
CN105323756B (zh) 2019-05-10
CN105323756A (zh) 2016-02-10

Similar Documents

Publication Publication Date Title
CN108768970B (zh) 一种智能设备的绑定方法、身份认证平台及存储介质
US8751824B2 (en) Method and apparatus for protecting software of mobile terminal
US9179312B2 (en) Registration and login method and mobile terminal
US10147096B2 (en) Device diagnostic and data retrieval
US9032493B2 (en) Connecting mobile devices, internet-connected vehicles, and cloud services
EP3466021B1 (en) A method for managing the status of a connected device
TWI652596B (zh) 針對應用程式的驗證方法、終端和系統
EP3216251B1 (en) Anti-theft recovery tool
US20150024688A1 (en) Automatic Pairing of a Vehicle and a Mobile Communications Device
WO2017096970A1 (zh) 一种确定目标便携设备位置的方法和装置
CN104767713B (zh) 账号绑定的方法、服务器及***
CN104703170A (zh) 下载运营商的文件的方法及设备
US20130160094A1 (en) OTA Bootstrap Method and System
KR20110083654A (ko) 스마트 카드에 대한 보안 제공 방법, 장치 및 컴퓨터 판독가능 저장 매체
US20160227404A1 (en) Techniques for preventing unauthorized users from controlling modem of mobile device
CN107623907B (zh) eSIM卡锁网方法、终端及锁网认证服务器
WO2020041728A1 (en) Methods, apparatuses, and computer program products for frictionless custody chain management
WO2015113351A1 (zh) 处理信息的方法、终端、服务器以及通信方法、***
WO2013185689A1 (zh) 一种认证方法、认证装置及认证设备
CN106685914B (zh) 一种信息验证方法、服务器和客户端
WO2015188639A1 (zh) 一种鉴权方法、网络侧设备及终端
US10841797B2 (en) Method for generating and injecting SIMLOCK password and device for the same
WO2016015401A1 (zh) 一种初始化方法、装置、移动终端及计算机存储介质
CN113038464B (zh) 一种信息传输方法及设备
CN113099453A (zh) 接入服务器的验证方法、装置、设备及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15807468

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15807468

Country of ref document: EP

Kind code of ref document: A1