CN1154055A - Illegal use preventing system for cellular phone - Google Patents

Illegal use preventing system for cellular phone Download PDF

Info

Publication number
CN1154055A
CN1154055A CN95112803.5A CN95112803A CN1154055A CN 1154055 A CN1154055 A CN 1154055A CN 95112803 A CN95112803 A CN 95112803A CN 1154055 A CN1154055 A CN 1154055A
Authority
CN
China
Prior art keywords
password
cipher
mobile phone
illegal use
technology
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN95112803.5A
Other languages
Chinese (zh)
Inventor
华锁林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN95112803.5A priority Critical patent/CN1154055A/en
Publication of CN1154055A publication Critical patent/CN1154055A/en
Pending legal-status Critical Current

Links

Images

Abstract

The present invention belongs to radio technology and the said illegal use preventing system is a hi-tech product concerned with automatic control technology, communication technology and digital technology. It features its illegal use preventer with DTMF recerving chip, new special cipher control circuit SR301 (or TWH9103) and CMOS circuits. The circuit hardware is mounted in relay station and base station and there is no altering in hand set. The user unlocks by using cipher calling and masters the change of cipher, and the cipher set has as many as one billion ciphers with largest length of 8 digits.

Description

Illegal use preventing system for cellular phone
" illegal use preventing system for cellular phone " is the collection automatic control technology, and the high-tech product of digital technology and digital communication technology belongs to technical field of radio.
The prior art that reference Help is arranged is understood, retrieves, examined in this invention has the DTMF emission to receive principle and application, cmos circuit principle and application, SR301 (TWH9103) special purpose system lock control circuit is used and is introduced, wireless user's identification code system, infrasonic frequency squelch system (CTSS) basic principle and mobile telephone service manual, radio station ABC etc.
The purpose of inventing this system is to steal number phenomenon frequently for the robber who thoroughly stops in the mobile phone.Strict have the right user's the economic interests of radio telephone of protecting effectively thoroughly solve the contradiction of disputing on because of charge between have the right user and the telecommunication bureau's (moving office).
Development along with the wireless telecommunications cause, rolling up of equipment, the widespread usage of the box-like communication equipment of various frequencies is on the rise with frequency, adjacent Intermodulation Interference frequently, the wireless network that particularly has relay function and wire/wireless signaling transfer point also exists number phenomenon of stealing of illegally usurping frequency in a large number.Usurp other people behavior of radio telephone (mobile telephone) number generation is often arranged in countries in the world.How to stop the disabled user to steal frequently and network, other people carry out illegal communication by number steal, are the problems that various countries science and technology expert pays close attention to.U.S. Motorola Inc (MOTOROLA) and day, English, method, moral, meaning, etc. state adopt the identification code system, infrasonic frequency noise elimination (CTSS) system is provided with the unlatching password in mobile phone.Or password limit dials, usurp technology such as warning and prevent to steal and steal frequently number, but these measures only are hardware to be set reach and prevent that the stolen back of mobile phone itself is stolen in mobile phone, and powerless to Na Xie Margin Machine (with the pseudo-machine of frequency).
Usually run into such phenomenon, the mobile phone of oneself was not lost, and the expense of remembering in the mobile phone do not become, but telecommunication bureau's (moving office) charge substantially exceeds, and reason Shi You Margin Machine exists.Margin Machine has been made a call steathily.In fact taking place to steal and steal number phenomenon frequently, mostly is that the burglar has bored the gap that existing anti-stealing technology is taken effective measures.So-called identification code system in the prior art is equipped with the identification code generator exactly in mobile phone, (seeing shown in the figure (2)) is equipped with identification code decoder and controller in trunk desk, base station.(shown in seeing in the middle frame of broken lines of figure (1)).This is to work, but does not have much effects to thief-proof number with frequency, adjacent Intermodulation Interference frequently preventing.Identification code generator hardware in mobile phone is to adopt the crystal oscillator difference, line point is different, reach the inferior purpose of difference frequently, these hardware come into plain view in repair procedures, and promptly the ESN ISN leaks, and these technology are very easy to be imitated, use laboratory facilities exactly, change crystal, the changing-over head also can be made with inferior pseudo-machine (Margin Machine frequently).Especially detect ink recorder (CELLULAR PHONE READ SYSTEM) as long as in use mobile phone person 5-10 rice scope with what U.S. CURTIS electronics corporation produced, the just very easy inside and outside sign indicating number that measures mobile phone is called out sign indicating number, frequency, channel etc., and charge to and detect in the ink recorder computer database, the burglar just can copy the Margin Machine as long as change a social system commercially available mobile phone by these data.In Zhuhai of " stir-fry " mobile telephone, ground such as Shenzhen, Hainan, the mobile telephone of stir-fry is Jiu Shi Margin Machine (pseudo-machine) often, only is this mobile phone of lock control as for the cryptographic means in the mobile phone, is Suo Bu Zhu Margin Machine, so existing technology just seems weak and feeble on thief-proof number.Can only lean on passive measure to take precautions against at present.As: whether mobile phone is not wanted public use, is sent and do not send non-postal and telecommunication entities to repair when repairing, have human to detect ink recorder around noting during use and keep a close watch on or the like, prevent that the ESN sign indicating number from leaking.
Though the present invention unblanks with password call, but with the cell phone password lock of opening of the prior art, or password limit is dialled etc. essential distinction is arranged, prior art is that the control mobile phone can not use, and the present invention is the control trunk desk, the identification code decode system in the base station, and hardware is installed in trunk desk, in the base station, do not increase any hardware in the mobile phone so the burglar can't copy.Especially escape power is handled in user's hand, does not need trunk desk, and the base station staff assists, and is full automatic.If but do not know true form (or having changed the password that is using at present) then the user can't escape, even password is divulged a secret accidentally like this, the user that has the right could in time change.But the burglar is at one's wit's end.Therefore, copied Tong Pin Margin Machine, also do not imagined to obtain the right to use even advantage of the present invention is the burglar.
Certainly, the burglar is own after trapping password to be used by software (method) escape, just can not use when the user oneself that then has the right makes a phone call, and the user that has the right so just finds that at once people's steal is arranged, and then can report a case to the security authorities in view of the above, will soon catch the burglar.
The present invention be advantageous in that the usage that does not change original mobile phone, not hindering does not have to buy user's use of maintaining secrecy and using sign indicating number yet, but this part user can not guarantee not by Margin Machine steal number.It is less that the present invention increases cost, as long as about 100 yuan/.
Introduce the method for hardware unit of the present invention and basic principle and replacing password below:
Figure (1) is the electrical schematic diagram of mobile phone (mobile telephone) illegal use preventing system.It in the frame of broken lines prior art trunk desk, seek a yard control system for identifying in the base station, it is to apply at present and to one of user identification code efficient system, be similar to infrasonic frequency noise elimination CTSS system, be to be connected on after the radio station frequency discriminator output low speed data traffic filter, on the DLO.RX.
The input of apparatus of the present invention is connected on after the radio station frequency discriminator output high-speed data signal filtering shaping circuit, promptly on the DHI.RX.Integrated circuit is by DTMF receiving chip IC 1, digital receiving circuit, CMOS, IC that YN9102 (8870) forms 2The 416 line decoding circuits that CD4514 forms are by S 1-S 51Analog switching circuit, IC that CD1066 forms 3IC 6The cipher lock circuit that SR301 (TWH9103) forms reaches by IC 4R-S flip-flop circuit, IC that CD4011 forms 5Inverter that CD4069 forms and time-delay inverter circuit are formed.
Operation principle:
At first simply introduce the wider wireless user's identification code system of application in the present technology.Be to be contained in trunk desk, two inferior identification code decoder and controller part frequently in the base station in the frame of broken lines among the figure (1); Figure (2) is that it is contained in identification code generator electrical schematic diagram in the mobile phone.
Outside allocated frequency band, a kind of subsonics information of additional transmission realizes the identification of different user in wireless communication procedure.Non-network users, base station, trunk desk are closed voice pathway and emission path automatically.IC is 5087 double-tones (DTMF) own coding frequently integrated circuit among the figure (2), it is the same when operation principle is used with the dtmf code number of sending out herein, difference is just with the former 3.58MHZ crystal that is connected between 7,8 pin, make the crystal of frequency at 400-500KHZ, like this as long as any pin in 3,4,5,9 pin is communicated with any pin of 11,12,13,14 pin, make the output of 16 pin issue the two infrasonic frequency signals of rate below 250HZ, change crystal or be communicated with different points, just can produce two infrasonic frequency signals of various different frequency combinations, realize different codings.
Figure (1)) be that the identification code decode controller is the same with the logical DTMF decode controller of sound in the frame of broken lines, the Chinese is that crystal frequency is consistent with code sender.The infrasonic frequency signal is from " 3 " some input IC 1The logical filter filtering of the band that ' LM324 forms after the amplification, is sent into IC 2' 8870 decodings become the tetrad data of combination of frequency correspondence with two inferior signal transformations frequently, send into IC again 3' CD4514 carries out the decoding of 416 lines, and encoded wire jumper is sent into by IC 4', BG 1, BG 2Produce the different control signaling of multichannel Deng the output control circuit of forming.Control signaling line 4,5,6,7, according to circumstances reach control requirement selection use by the radio station.(can report 93 years the 30th phases " wireless user's identification code system ") with reference to electronics.
This device is with IC 2' 8870 decoder TOE ends (the 10th pin) disconnect high level from " X ", change into by S 41, S 42Two analog switches are controlled.Work as S 41, S 42When portion opened a way, TOE held no high level, then IC 2' in the coded data binary signal be latched, must not export, the result causes the radio station to be equal to being considered as non-Home Network mobile phone to network, and also will close voice pathway and emission path.
S 41, S 42Form by CD4066.S 41By IC 1, IC 2, IC 3, IC 4The wireless cipher lock control of forming; S 42Then by IC 2Time-delay inverter on the ' flag terminal STD is controlled (R 8, C 6, D 4, IC 5In Y 2Form).
S at ordinary times 41Turn-off S 42Conducting, when the mobile phone open power supply is desired to communicate, the subsidiary two infrasonic frequency code signals that send will make IC 2The high level of ' flag terminal output is through R 8, C 6Time-delay adds IC 5Y 2The inverter input, output low level is added in S 42On the control end, make S 42Disconnect.If not at R 8, C 6In time open S in the time delay 41, then cause IC 2' the no high level of TOE end, the radio station will be closed voice pathway and launch path.
S 41Send the password signaling with numeric keyboard of mobile telephone and control, its principle is that the carrier modulation signaling cipher signal that sends when mobile phone is received the frequency discrimination through the radio station, noise suppressed and the filtering of high pass filter, its (300-3000H by the radio station 2) signaling, through high-speed data signaling filtering shaping circuit output DHI, the RX signal is sent into this equipment input again.Through C 1Be coupled to IC 1YN9102 (8870) is decoded into 8421 yards corresponding with signaling, sends into IC 2CD4515 416 line decoders, input (2,3,21,22 pin) after deciphering by Q 1-Q 10End output decimal system 1-10 digital signal (9,10,8,7,6,5,4,18,17,20 pin).(normal open) S by conducting at ordinary times 10, S 12, S 14, S 16, S 18, S 20, S 22, S 24, S 26, S 28Import corresponding S into 30-S 39Control end on, the analog switch conducting that is triggered by corresponding digital signal is recognized the sign indicating number decoding once.Password as input is correct, then IC 317 pin will export a wide low level of 2 seconds and go to trigger by X 1, X 2(IC 4, CD4011) the R pin of the bistable state R-S trigger formed, make it to be turned into Q=0 Q=1 state, so S 41Control end obtain high level, S 41Conducting, IC 2' TOE end obtain high level, the radio station operate as normal has been finished so-called wireless cipher unlocking action.
At Q=0, under the state of Q=1, make S simultaneously 10S 28Disconnect, the telephone number signaling that transmits after making does not influence IC 3Cipher lock circuit makes S again 1-S 9Conducting, ready for changing password work from now on.
After the conversation, send out " a 0 " digital signaling again, coded lock is locked." 0 " signaling is by IC 220 pin output, through IC 5Y among the CD4069 1Anti-phase, trigger X 1, X 2R-S trigger S pin, make it to be turned into the initial condition of Q=1 Q=0, so S 41Disconnect, finished the work of locking.
Though Margin Machine is with having the right the user mobile phone striking resemblances, because of obtaining transformable at any time accessing to your password, the radio station can be closed it and refuse it.Accessing to your password and can change at any time, need not move innings staff and assist, is full automatic.Password can be used repeated code, and figure place is any, the longlyest reaches 8, for avoiding influencing the radio station telephone number is scanned, and only recommends can to choose wantonly in the 1-8 numeral with three to four.Because of accessing to your password and can often change, detecing ink recorder, to spy out the ENS ISN also will be to have no use.The process that replacing accesses to your password is very simple.Condition is to remember former access to your password and fixed password that the office of moving gives can be changed.
Replacing is latched in IC 3, password principle steps among the SR301: at first, make IC with the original catchword that accesses to your password 3Unblank, cause S 1-S 9Conducting.And then with moving the address pin catchword that office gives, (there is IC in the password pin that mobile office gives 6Among) corresponding decoding digital signal is by S 1-S 9Import IC 6The ranks pin, (this moment because of S 10-S 20All open circuit does not influence IC 3Circuit), correct as the fixed code of input, IC then 6Low level of the 17th pin output, make X 3X 4The R-S trigger upset of forming, thus make TC 4On cipher switch S is set 40Conducting also makes S 11-S 29In the odd number switch conduction.New password is more desired in last input again, keys in " a 0 " key signal again, and then new password just is locked in IC 3Among, just must with new password unblank when using phone next time.
The fixed address sign indicating number is latched in IC 6Among, generally immutable, if desire changes, then necessary application, by moving the staff of office operation, step is: close and put code switch K, click " * " key with keyboard, import new password again, click " # " key after the record, the then new address code of shutoff K just is latched in IC 6In, QWERTY keyboard is a schematic diagram on the middle picture one of figure (1), needn't set up on the physical device, can make contact temporarily, also available 12 bit address code switches are changed, and more can import by computer operation.
Illustrate: it is 111 that certain user mobile phone uses sign indicating number, and address code is 8888.
One, make a phone call to operate:
(1) opens mobile phone PWR key;
(2) press 111+0 successively with numerical key, (1110);
(3) see display screen clearly after, press the SND key;
(4) hear high/low alternately sound after, press the END key;
(5) dial the number again, press the SND key;
(6) talk-through is pressed the SND key again by " 0 " key, presses the shutdown of END key.
Two, change the new password operation: desire to change into new sign indicating number 1818.
(1) opens mobile phone PWR key;
(2) use numerical key, key in 1110 successively;
(3) press the SND key;
(4) hear high/low alternately sound after, press the END key;
(5) press the SND key with keyboard Input Address sign indicating number 8888+9;
(6) hear behind the high/low alternately sound by the END key;
(7) with the new sign indicating number of keyboard input, 9+1818+0 presses the SND key again;
(8) press the END key, new password 1818 just is locked in IC 3Among.
The effect of " 0 " and " 9 " sign indicating number in operating process, " 0 " character code is made IC 3Unlock code, be again IC 3With IC 6The pass code-locked; " 9 " character code is IC 6Unlock code, be again IC 3Preparation sign indicating number when new password is set, "+" is schematic symbols in the formula, can directly be written as 1110,88889,918180 get final product.
Certainly can suppose in this circuit that any number substitutes " 0 " and " 9 ", only be that the wiring of circuit is exchanged, as with " 1 " replacements " 9 ", during usefulness " 2 " replacement " 0 ", as long as will scheme (2) middle IC 2On line is exchanged on output 9 pin and 17 pin; On line is exchanged and is got final product on 10 pin and 20.Exchanging back " 1 " is exactly titled with special purpose with " 2 " sign indicating number, and just can not contain " 1 " and " 2 " number in password.Other are analogized, and so, level of confidentiality will be higher, and the user of expansion is just more.
Changing the new password operating procedure in fact can be simplified to:
(1) opens mobile phone PWR key; (start)
(2) use numerical key, key in 1,110 88,889 918180 by SND;
Password 111 has just changed 1818 into like this.
If the number scanning system allows few the transformation in the equipment of radio station, when then making a phone call, also as long as once-through operation gets final product password titled with desiring to dial the number once to transfer to before.
It is said that a kind of C-DNA that cries appears in Hong Kong 2The anti-steal-number system of mobile telephone, I do not know with this patent roughly the same? but this patent is simple, every cost is less than 100 yuan, be well suited for transforming present mobile telephone equipment, need not change any part of present equipment, only be to draw several wiring, and do not influence the use of not buying cryptographic consumer.
The applicable all kinds of mobile telephones of this patent, speakerphone, all kinds of frequencies of wireless phone close the thief-proof system of intercom.Employing emerges with regard to the novel mobile telephone that anti-steal is arranged after setting up this patent, will bring new revolution to radio communication.

Claims (1)

  1. " illegal use preventing system for cellular phone " is a kind of with DTMF receiving chip and SR301 (TWH9103) chip and cmos circuit combination, be used for controlling the CTSS system in the mobile telephone trunk desk base station, thereby reach the purpose that Zu Zhi Margin Machine networks, in mobile phone, do not increase any hardware, also need not change, just can reach to prevent to steal and steal frequently number.This circuit formula and method (software) require to be protected by law.
CN95112803.5A 1995-12-08 1995-12-08 Illegal use preventing system for cellular phone Pending CN1154055A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN95112803.5A CN1154055A (en) 1995-12-08 1995-12-08 Illegal use preventing system for cellular phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN95112803.5A CN1154055A (en) 1995-12-08 1995-12-08 Illegal use preventing system for cellular phone

Publications (1)

Publication Number Publication Date
CN1154055A true CN1154055A (en) 1997-07-09

Family

ID=5079765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN95112803.5A Pending CN1154055A (en) 1995-12-08 1995-12-08 Illegal use preventing system for cellular phone

Country Status (1)

Country Link
CN (1) CN1154055A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8781244B2 (en) 2008-06-25 2014-07-15 Cisco Technology, Inc. Combined deblocking and denoising filter

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8781244B2 (en) 2008-06-25 2014-07-15 Cisco Technology, Inc. Combined deblocking and denoising filter

Similar Documents

Publication Publication Date Title
JP2750638B2 (en) Method for authentication and protection of a subscriber in a telecommunications system
US5148485A (en) Encrypton system for digital cellular communications
US5809125A (en) Method and apparatus for intercepting potentially fraudulent telephone calls
US5481611A (en) Method and apparatus for entity authentication
CN101895605A (en) Method and device for communication based on pseudo-contact information
WO1994019875A1 (en) Authentication key entry in cellular radio system
CN101832067A (en) Electronic control door lock system based on CDMA module and thievery prevention implementation method thereof
CN102011523B (en) Automobile fingerprint password computer burglar-proof lock
US4482787A (en) Telephone-call prohibit circuit
CN101853533A (en) Password setting method and device used for building gate control system
US4546213A (en) Modem security device
CN1697473A (en) Interactive mode wireless doorkeeper system
CN100502599C (en) Security management method for mobile phone
WO1991001067A2 (en) Method for authentication and protection of subscribers in telecommunication systems
WO1992002089A1 (en) Encryption system for digital cellular communications
CN1694548A (en) Method for preventing burglarious of mobile phone and anti-theft mobile phone
CN1154055A (en) Illegal use preventing system for cellular phone
US5812650A (en) Method and apparatus for intercepting potentially fraudulent
JP2000049933A (en) Radio telephony equipment having keyboard
CN101291502B (en) Anti-theft method for mobile phone
CN1060006C (en) Anti-theft method for the number code of mobile telephone
JPH06188829A (en) Telephone system
JPH01302923A (en) Steal countermeasure system for radio telephony set
CN1893698A (en) Method for preventing a security barcode from being reproduced in a mobile terminal and mobile terminal implementing the same
CN2175994Y (en) Enciphering device for telephone and computer system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C01 Deemed withdrawal of patent application (patent law 1993)
WD01 Invention patent application deemed withdrawn after publication