A network security protection method and equipment is used to avoid the harm caused by the illegal operation of the pseudo terminal after the SIM card is copied. This method includes sending RFF initial acquisition instructions to base stations when core network equipment determines the corresponding relationship between the identification module of the unsaved terminal and the RFF fingerprint of the terminal, and RFF initial acquisition of the identification information indicating the carrying terminal; receiving the RFF of the terminal based on the RFF initial acquisition instructions of the base station by core network equipment, and storing the corresponding relationship between the identification module of the terminal and the RFF of the terminal; and in the core, receiving the RFF of the base station according to the When the core network equipment authenticates the terminal, the core network equipment sends RFF acquisition instructions to the base station, and the RFF collects the identification information indicating the carrying terminal; the core network equipment receives the RFF acquisition information from the base station based on the RFF acquisition feedback, and judges whether the RFF authentication of the terminal is successful or not according to the RFF acquisition information.
【技术实现步骤摘要】
【国外来华专利技术】PCT国内申请,说明书已公开。
【技术保护点】
PCT国内申请,权利要求书已公开。
【技术特征摘要】
【国外来华专利技术】PCT国内申请,...
还没有人留言评论。发表了对其他浏览者有用的留言会获得科技券。