Terminal and method and device for terminal to identify pseudo base station

A terminal identification and pseudo base station technology, which is applied in the field of terminals and its identification of pseudo base stations, can solve problems such as high implementation cost, insufficient conditions, and user impact, and achieve reduced identification and prevention costs, strong applicability, and low software development complexity Effect

Active Publication Date: 2016-06-01
ZTE CORP
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has the following problems. First, the condition of using a pseudo base station to send text messages is not sufficient, because the pseudo base station may not only be an act of sending malicious text messages, especially in the future, it may also be used for signal interference or other malicious acts; The second is that receiving SMS is passive, instead of actively detecting fake base stations, the efficien

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal and method and device for terminal to identify pseudo base station
  • Terminal and method and device for terminal to identify pseudo base station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In the embodiment of the present invention, the terminal detects the signal value of the base station to be accessed and / or whether it supports the voice function, and determines that the base station is a pseudo base station when the signal value of the base station exceeds the base station signal range of the cell where it is located and / or the base station does not support the voice function .

[0042] The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

[0043] The embodiment of the present invention implements a method for a terminal to identify a pseudo base station, such as figure 1 As shown, the method includes the following steps:

[0044] Step 101: The terminal detects the signal value of the base station to be accessed and / or whether the voice function is supported;

[0045] The detecting the signal value of the base station to be accessed may be: detecting the broadcast signa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for a terminal to identify a pseudo base station. A terminal detects a signal value of a base station to be accessed and/or whether the base station supports a voice function; and when the signal value of the base station exceeds a base station signal range of a cell where the base station is located and/or the base station does not support the voice function, the base station is determined as a pseudo base station. The invention further discloses the terminal and a device for the terminal to identify a pseudo base station.

Description

technical field [0001] The invention relates to mobile communication security technology, in particular to a terminal and a method and device for identifying a pseudo-base station. Background technique [0002] At present, many criminals use fake base stations to carry out illegal and criminal activities, destroying or interfering with normal communication. But there are only two ways to solve the pseudo base station problem: [0003] One way is to detect and locate the fake base stations, and then ban them. However, this method cannot completely solve the problem, because the fake base stations have fixed positions and some move. It is possible to locate and ban all pseudo base stations, especially for mobile pseudo base stations, it is difficult to track and locate. This method is usually used when operators, specialized organizations or departments use professional equipment or tools to clean up and rectify pseudo base stations. [0004] Another way is to automatically...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W76/00H04W12/122
CPCH04W12/122
Inventor 徐懋鹏
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products