Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identification method for pseudo base station and terminal

An identification method and pseudo base station technology, applied in electrical components, wireless communication, security devices, etc., can solve the problems of reducing the flexibility and applicability of terminal identification of pseudo base stations, the single method of terminal identification of pseudo base stations, and the single authentication method

Inactive Publication Date: 2016-08-10
NUBIA TECHNOLOGY CO LTD
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, by adopting the identification method of the above-mentioned pseudo-base station, the method for the terminal to identify the pseudo-base station is single, resulting in a single authentication method in different scenarios, which reduces the flexibility and applicability of the terminal to identify the pseudo-base station

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method for pseudo base station and terminal
  • Identification method for pseudo base station and terminal
  • Identification method for pseudo base station and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] An embodiment of the present invention provides a method for identifying a pseudo base station, such as figure 2 As shown, the method may include:

[0080] S101. When performing network access, acquire at least one system parameter corresponding to at least one first base station, where the at least one system parameter is used to represent a communication parameter for judging whether to perform network access.

[0081] It should be noted that, based on image 3 In the communication architecture shown, the terminal can communicate with the base station. When the terminal selects or reselects a cell, the terminal can search for available network frequency points from the core network through the base station, obtain available network frequency point information and notify the The terminal selects a frequency point with a strong signal from the network frequency point information to access, so as to realize network communication. The method for identifying a pseudo-ba...

Embodiment 2

[0122] An embodiment of the present invention provides a method for identifying a pseudo base station, such as Figure 5 As shown, the method may include:

[0123] S201. Acquire at least one system message broadcast by at least one base station during network access.

[0124] S202. Parse at least one system parameter from at least one system message, and the at least one system parameter is used to characterize the communication parameters for judging whether to perform network access, where each system parameter includes: the number of blocks reserved for access permission, public control Channel configuration parameters, location update cycle, cell minimum access level value and cell reselection bias parameters.

[0125] It should be noted that, based on image 3 In the communication architecture shown, the terminal can communicate with the base station. When the terminal selects or reselects a cell, the terminal can search for available network frequency points from the c...

Embodiment 3

[0178] Such as Figure 6 As shown, the embodiment of the present invention provides a terminal 1, the terminal 1 may include:

[0179] The obtaining unit 10 is configured to obtain at least one system parameter corresponding to at least one first base station when performing network access, and the at least one system parameter is used to represent a communication parameter for judging whether to perform network access.

[0180] A judging unit 11, configured to judge whether there is a target system parameter that satisfies a preset rule among the at least one system parameter acquired by the acquiring unit 10, and the preset rule is used to determine based on a combination of parameters in the system parameters Whether there is a system parameter of a pseudo base station in the at least one system parameter.

[0181] An identifying unit 12, configured to identify the first base station corresponding to the target system parameter as a pseudo base station when the judging uni...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an identification method for a pseudo base station. With the method, pseudo base stations in different scenes can be identified, so that the flexibility and adaptability of pseudo base station identification are improved. The method comprises: when network access is carried out, at least one system parameter corresponding to at least one first base station is obtained, wherein the at least one system parameter is used for representing a communication parameter for determining whether network access is carried out; whether a target system parameter meeting a preset rule exists in the at least one system parameter is determined, wherein the preset rule is used for determining whether a system parameter of a pseudo base station exists in the at least one system parameter based on combination of all parameters in the system parameters; if the target system parameter exists, the first base station corresponding to the target system parameter is identified as a pseudo base station; and otherwise, whether a pseudo base station exists in the at least one first base station is identified by a position updating authentication process. In addition, the embodiment of the invention also provides a terminal.

Description

technical field [0001] The present invention relates to the field of communication technologies, in particular to a pseudo base station identification method and a terminal. Background technique [0002] The information interaction between the base station and the terminal is the most important way for the terminal to communicate. The base station and the terminal can communicate through a variety of networks, such as the Global System for Mobile Communication (GSM, Global System for Mobile Communication), the third generation mobile communication technology (3G , the 3rd Generation mobile communication technology) network or the third generation mobile communication technology (4G, the 4th Generation mobile communication technology) network. When the GSM network is used for information interaction between the base station and the terminal, because the GSM network does not have a two-way authentication mechanism between the terminal and the base station like the 3G network a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W12/122
CPCH04W12/12
Inventor 张建明
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products