A terminal and its method and device for identifying a pseudo-base station

A terminal identification and pseudo base station technology, which is applied in the field of terminals and its identification of pseudo base stations, can solve problems such as high implementation cost, user impact, and insufficient conditions, and achieve reduced identification and prevention costs, low software development complexity, and strong applicability Effect

Active Publication Date: 2021-02-09
ZTE CORP
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has the following problems. First, the condition of using a pseudo base station to send text messages is not sufficient, because the pseudo base station may not only be an act of sending malicious text messages, especially in the future, it may also be used for signal interference or other malicious acts; The second is that receiving SMS is passive, instead of actively detecting fake base stations, the efficiency is poor, and the actual effect of this method is that spam information has been generated on the terminal, which will still affect users; third, the preset rules for SMS Formulated, the algorithm is relatively complex, and the characteristics of the pseudo base station SMS may change and update dynamically, the corresponding algorithm must also be updated or have self-learning ability, and the implementation cost is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A terminal and its method and device for identifying a pseudo-base station
  • A terminal and its method and device for identifying a pseudo-base station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In the embodiment of the present invention, the terminal detects the signal value of the base station to be accessed and / or whether it supports the voice function, and determines that the base station is a pseudo base station when the signal value of the base station exceeds the base station signal range of the cell where it is located and / or the base station does not support the voice function .

[0042] The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

[0043] The embodiment of the present invention implements a method for a terminal to identify a pseudo base station, such as figure 1 As shown, the method includes the following steps:

[0044] Step 101: The terminal detects the signal value of the base station to be accessed and / or whether the voice function is supported;

[0045] The detecting the signal value of the base station to be accessed may be: detecting the broadcast signa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for a terminal to identify a pseudo base station. The terminal detects the signal value of the base station to be accessed and / or whether it supports the voice function, and the signal value at the base station exceeds the signal range of the base station of the cell where it is located and / or the base station does not support the voice function. , the base station is determined to be a pseudo base station; the invention also discloses a terminal and a device for identifying a pseudo base station.

Description

technical field [0001] The invention relates to mobile communication security technology, in particular to a terminal and a method and device for identifying a pseudo-base station. Background technique [0002] At present, many criminals use fake base stations to carry out illegal and criminal activities, destroying or interfering with normal communication. But there are only two ways to solve the pseudo base station problem: [0003] One way is to detect and locate the fake base stations, and then ban them. However, this method cannot completely solve the problem, because the fake base stations have fixed positions and some move. It is possible to locate and ban all pseudo base stations, especially for mobile pseudo base stations, it is difficult to track and locate. This method is usually used when operators, specialized organizations or departments use professional equipment or tools to clean up and rectify pseudo base stations. [0004] Another way is to automatically...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/122H04W76/18
CPCH04W12/122
Inventor 徐懋鹏
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products