Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Pseudo base station spam short message identification method and system

A technology of spam SMS and pseudo base station, applied in wireless communication, security devices, electrical components, etc., can solve the problem of unable to identify the legitimacy of network identity

Inactive Publication Date: 2016-12-14
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the defect of one-way authentication in the 2G network, that is, only the network authenticates the terminal, and the mobile terminal cannot recognize the legality of the network identity, and the concept of a pseudo base station appears in real life.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo base station spam short message identification method and system
  • Pseudo base station spam short message identification method and system
  • Pseudo base station spam short message identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them.

[0039] Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] The method for discriminating junk short messages of fake base stations provided in this embodiment can be implemented in a mobile terminal. The mobile terminal may be, but not limited to, a mobile electronic device capable of sending and receiving short messages, such as a smart phone, a smart watch, and a tablet computer.

[0041] refer to figure 1 As shown, it is a method flow chart of a preferred embodiment of the fake base s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A pseudo base station spam short message identification method comprises the steps as follows: when a mobile terminal receives a short message, getting check information of the short message; sending verification information and the check information of the short message to a default server; receiving the verification result of the server on the verification information and the check information; judging whether the received short message is a spam short message sent by a pseudo base station according to the verification result of the server on the verification information and the check information; and when judging that the received short message is a spam short message sent by a pseudo base station, labeling the short message. The invention further provides a pseudo base station spam short message identification system. Through the method and the system, a short message received by a mobile terminal can be identified, and a short message sent by a pseudo base station can be labeled.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method and system for identifying spam short messages sent by pseudo base stations. Background technique [0002] 2G, that is, GSM (Global System for Mobile Communication, Global System for Mobile Communications), this system only requires the network to authenticate the mobile terminal, and the attached communication can be carried out after the authentication is passed. Due to the defect of one-way authentication in the 2G network, that is, only the network authenticates the terminal, and the mobile terminal cannot recognize the legality of the network identity, and the concept of a pseudo base station appears in real life. The fake base station pretends to be a public mobile communication operator base station, and absorbs surrounding mobile phone terminal users by modifying some system parameters and increasing its own transmission power. [0003] Although 4G has two-wa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/14H04W12/12H04W12/122H04W12/128
CPCH04W4/14H04W12/12H04W12/122H04W12/128
Inventor 司永杰
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products