Method for detecting false station in GSM and LTE network

A detection method and pseudo base station technology, which is applied in the field of detection of pseudo base stations in GSM and LTE networks, can solve problems such as the inability to eliminate pseudo base stations, and achieve the effects of excellent cost performance, easy portability, and enhanced communication security performance

Inactive Publication Date: 2015-01-07
信亚美科(南京)信息技术有限公司
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In 3G and 4G networks, although some methods such as mutual authentication and integrity protection of all signaling have been adopted in related standards, it is still impossible to say that with the development of technology and the maturity of criminal technology at this stage, it will be eliminated. False base stations occur, and because of 3G, 4G can adopt the fall back (Fall back) to 2G network system, and it is impossible to eliminate the phenomenon of false base stations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting false station in GSM and LTE network
  • Method for detecting false station in GSM and LTE network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In the 2G network, as long as a fake base station sends a similar broadcast, it can deceive the terminal to re-enter the network of the new base station. The terminal will not verify the identity of the base station but directly send the IMSI code. The terminal can be connected to its own network, and services such as calls and text messages can be completed through its own network. The process is roughly like this. First, the base station sends spectrum signals that can accept users through the BCH channel (also known as beacon channel). After the mobile phone receives this signal, it reads an IMSI code (approximately equal to the user ID) assigned by the operator from the SIM card. After receiving the IMSI code, the base station verifies whether the terminal (mobile phone) is a legal terminal, and then decides whether to allow it to access the network. If the base station agrees to allow the terminal to access the network, the base station will issue a RAND code to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for detecting a false station in GSM and LTE networks. The new false station detection method provided can be used on 2G, 3G and 4G mobile equipment, such as cell phones adopting the GSM, WCDMA, LTE, LTEFDD or TD-LTE standard, so as to be universal to the Chinese market; safety performance for communication of using users or multiple users in a user area can be enhanced; the method can be used in a low-speed or static state; meanwhile, a final product has the characteristics of high portability and excellent price performance ratio.

Description

technical field [0001] The invention relates to the technical field of false base station detection, in particular to a method for detecting false base stations in GSM and LTE networks. Background technique [0002] Fake base stations are born from a security flaw in 2G GSM. The base station will verify the client, but the client will not verify the base station. That is to say, as long as it can transmit radio signals similar to the behavior of GSM base stations, the surrounding GSM mobile phones can be connected to a fake base station, and then the fake base station can send text messages to the mobile phones connected to the base station. Usually there are many buildings in the community, which makes the signal of some legal base stations very weak. If the illegal base stations are near these locations, it is easy to deceive the clients in this area and let them connect to the illegal base stations. As a result, it becomes an information security loophole. [0003] In 3...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12
CPCH04W12/12H04W88/08
Inventor 樊健珂柏立洲
Owner 信亚美科(南京)信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products