Interception method and equipment for spam short messages of pseudo base station

A technology of spam text messages and pseudo base stations, which is applied in wireless communication, message/email/notification, electrical components, etc. It can solve the problem of not being able to intercept spam text messages, and achieve the effect of improving experience

Active Publication Date: 2015-06-03
CHINA MOBILE COMM GRP CO LTD
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In method one, a list of information to be intercepted needs to be established in advance, but the fake base station can use the legal phone number of the live network to send text messages to users, and the fake base station is not connected to the live network. to intercept
In method 2, after the interception device judges the spam SMS, it needs to notify the live network HLR to stop the calling user from sending SMS again, but the fake base station is not connected to the live network, and the second method cannot intercept the spam SMS sent by the fake base station

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interception method and equipment for spam short messages of pseudo base station
  • Interception method and equipment for spam short messages of pseudo base station
  • Interception method and equipment for spam short messages of pseudo base station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Aiming at the problems existing in the prior art, Embodiment 1 of the present invention provides a method for intercepting spam messages of pseudo base stations, by analyzing the working principle of spam messages issued by pseudo base stations, and intercepting spam messages of pseudo base stations in a targeted manner, thereby By intercepting spam messages sent by pseudo base stations, the user experience is improved. Among them, the working principle of the fake base station sending spam messages is: the fake base station obtains the frequency point information and system broadcast messages of the operator network, and then adjusts the frequency point information and system broadcast messages of the fake base station to the frequency point information of the operator network It is the same as the system broadcast message, so as to attract terminal equipment to connect to the pseudo base station, and induce the terminal equipment to initiate the location area update pr...

Embodiment 2

[0059] Based on the same inventive concept as in Embodiment 1, Embodiment 2 of the present invention provides a method for intercepting spam messages from fake base stations, by analyzing the working principle of sending spam messages from fake base stations, and intercepting spam messages from fake base stations in a targeted manner. In this way, the spam messages sent by the fake base station are intercepted, thereby improving user experience. Such as figure 2 As shown, the pseudo base station spam interception method comprises the following steps:

[0060] Step 201, judging whether the terminal device has received a terminal identification request fed back by the network; if yes, execute step 202; if not, execute step 208.

[0061] Step 202, judging whether the terminal device has received an authentication request message fed back by the network; if yes, execute step 203; if not, execute step 207.

[0062] Step 203, read the authentication random number from the authent...

Embodiment 3

[0070] Based on the same inventive concept as in Embodiment 1, Embodiment 3 of the present invention provides a method for intercepting spam messages from fake base stations. By analyzing the working principle of sending spam messages from fake base stations, and intercepting spam messages from fake base stations in a targeted manner, In this way, the spam messages sent by the fake base station are intercepted, thereby improving user experience. Such as image 3 As shown, the pseudo base station spam interception method comprises the following steps:

[0071] Step 301, obtaining and storing LAC ID information and cell ID information.

[0072] Step 302, when the terminal device reselects from the first cell to the second cell, use the LAC ID and cell ID of the second cell, and / or the LAC ID and cell ID information to determine whether the network is a fake base station or a legitimate base station. When it is determined that the network is a pseudo base station, the terminal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an interception method and equipment for spam short messages of a pseudo base station. The method comprises: obtaining LAC ID and cell ID; if a mapping relationship is not satisfied, judging that a network is a pseudo base station; otherwise, reporting an update request message of a position region to the network and starting a specific timer; if the specific timer is not overtime and an authentication request message fed back by the network is received, reading random authentication number from the authentication request message and judging whether a fixed bit is a set value or not; if so, judging that a short message is a normal short message of a legal base station; otherwise, judging that the short message is a spam short message of the pseudo base station; in addition, judging whether an update refusal message of the position region fed back by the network is received or not; if so or the specific timer is overtime, judging whether the signal strength of the network is greater than a preset threshold value or not; if so, judging that the short message is the normal short message of the legal base station; otherwise, judging that the short message is the spam short message of the pseudo base station. In the embodiment of the present invention, the spam short messages of the pseudo base station are intercepted targetedly, thus user experience is improved.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and equipment for intercepting spam short messages of pseudo base stations. Background technique [0002] At present, there are many fake base stations in the existing network. The fake base stations can absorb the terminal equipment into the service range of the fake base station, and know the IMSI (International Mobile Subscriber Identification Number, International Mobile Subscriber Identification Number) of the terminal equipment, and then send spam messages to the terminal equipment. , has a great impact on user experience. Among them, the spam text messages of pseudo base stations include promotional text messages, fraudulent text messages, and the like. Therefore, it is of great significance how to intercept spam text messages of pseudo base stations, thereby improving user experience. [0003] In the prior art, methods for intercepting spam text messages include: Meth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/14H04W12/12H04W12/122H04W12/128
CPCH04W4/14H04W12/12
Inventor 韩延涛邓娟程广辉杨光潘毅
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products