Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Pseudo base station protection method and device

A technology of protective device and pseudo base station, which is applied in the field of communication, can solve the problem of low security and achieve the effect of ensuring security

Active Publication Date: 2017-05-17
MEIZU TECH CO LTD
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the composite pseudo base station uses redirection, it has better concealment, which makes the user less secure when connecting to the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo base station protection method and device
  • Pseudo base station protection method and device
  • Pseudo base station protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] figure 1 It is a schematic flow chart of a method for protecting a false base station provided in Embodiment 1 of the present invention. The method is applied to a terminal, and the terminal may be a device such as a mobile phone or a tablet. Such as figure 1 As shown, the false base station protection method may include the following steps:

[0041] S101: If the redirection message sent by the network side is received before the authentication is successful after sending the registration request information to the 3G / 4G cell or the area update request information to the network side, determine whether the redirection message includes a redirection message to 2G network information.

[0042] When the terminal first accesses the network, or when the network type of the terminal changes, it will send a registration request message to the network side. When the terminal enters another location area from one location area, it will send an area update request message to ...

Embodiment 2

[0049] figure 2 It is a schematic flow chart of a method for protecting a false base station provided in Embodiment 2 of the present invention. The method is applied to a terminal, and the terminal may be a device such as a mobile phone or a tablet. Such as figure 2 As shown, the false base station protection method may include the following steps:

[0050] S201: If the increase value of the signal strength of the adjacent cell of the current serving cell where the terminal is located exceeds the preset signal threshold within a preset time, determine whether the network in the current area where the terminal is located can meet the requirements. Describe the service requirements of the terminal.

[0051] In the idle state, the terminal will always measure the signal of the adjacent cell of the current serving cell where the terminal is located, and when the signal strength of the adjacent cell is greater than the signal strength of the current serving cell where the term...

Embodiment 3

[0063] image 3 It is a schematic flow chart of a method for protecting a false base station provided in Embodiment 3 of the present invention. The method is applied to a terminal, and the terminal may be a device such as a mobile phone or a tablet. Such as image 3 As shown, the false base station protection method may include the following steps:

[0064] S301: If the redirection message sent by the network side is received before the authentication is successful after sending the registration request information to the 3G / 4G cell or the area update request information to the network side, determine whether the redirection message includes a redirection message to 2G network information.

[0065] Step S301 in this embodiment is consistent with step S101 in Embodiment 1. For details, please refer to the relevant description of Step S101 in Embodiment 1, and details are not repeated here.

[0066] S302: If the redirection message includes redirection information to the 2G ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A pseudo base station protection method is applied to a terminal. The method comprises the steps that if before authentication succeeds after 3C / 4C community registration request information or region update request information or region update request information is sent to the network side, redirection messages sent by the network side are received, and whether the redirection messages contain information redirected to a 2G network or not is determined; if the redirection messages contain the information redirected to the 2G network, no response is caused to the redirection messages; if the redirection messages do not contain the information redirected to the 2G network, redirection is conducted according to the redirection messages. The invention further provides a pseudo base station protection device. The safety of the terminal user network can be guaranteed.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and device for protecting a pseudo base station. Background technique [0002] False base stations are base stations of public mobile operators forged by criminals. False base stations attract surrounding mobile phone users by forging 2G networks and increasing their own transmission power. When the mobile phone user successfully resides in the fake base station, the fake base station can obtain the identity information of the mobile phone user, and then transmit illegal information, and then obtain illegal profits from it. At present, a composite pseudo-base station has appeared. The composite pseudo-base station integrates 3G / 4G base stations and 2G base stations, and attracts surrounding mobile phone users by increasing the transmission power of 3G / 4G base stations. Perform redirection to 2G networks and subsequently perform illegal activities at 2G base stati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W36/08H04W12/122
CPCH04W12/12H04W36/08
Inventor 刘朋
Owner MEIZU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products