Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Pseudo base station recognition method and terminal

A pseudo base station and base station technology, applied in the field of identification of pseudo base stations, can solve the problems of high cost and missed detection, achieve accurate identification and reduce the cost of implementation

Inactive Publication Date: 2017-06-16
SHENZHEN GIONEE COMM EQUIP
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One is to prevent it through the characteristics of network signaling, that is, to analyze the signaling interaction characteristics of the pseudo base station when accessing and sending information. If it meets the signaling interaction characteristics, it is identified as a pseudo base station. There is a large difference in the above, and there is a high probability of missed detection only from the analysis of the signaling interaction characteristics; the other is to add an authentication mechanism to the legitimate base station, and identify the fake base station by sending authentication instructions, but this method requires the current legal base station The structure is upgraded and transformed, and the cost is huge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo base station recognition method and terminal
  • Pseudo base station recognition method and terminal
  • Pseudo base station recognition method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] see figure 1 , figure 1 It is a schematic flow chart of a method for identifying a fake base station provided in Embodiment 1 of the present invention. The execution subject of this embodiment is a terminal, which may be a mobile phone or other smart terminal or other equipment. figure 1 The shown method for identifying a false base station may include the following steps:

[0034] S101. If connected to a base station to be identified, acquire identification information of the base station to be identified.

[0035] Specifically, the terminal periodically scans the surrounding base station signals, and selects the base station with the strongest signal for connection. If the terminal is connected to the base station to be identified with the strongest current signal, the identification information of the base station to be identified is obtained.

[0036] The identification information is an identification code that uniquely identifies the base station to be identifi...

Embodiment 2

[0050] see figure 2 , figure 2 It is a schematic flow chart of a method for identifying a fake base station provided in Embodiment 2 of the present invention. The execution subject of this embodiment is a terminal, and the terminal may be a mobile phone or other smart terminal or other equipment. figure 2 The shown method for identifying a false base station may include the following steps:

[0051] S201. If connected to a base station to be identified, acquire identification information of the base station to be identified;

[0052] Specifically, the terminal periodically scans the surrounding base station signals, and selects the base station with the strongest signal for connection. If the terminal is connected to the base station to be identified with the strongest current signal, the identification information of the base station to be identified is acquired.

[0053] The identification information is an identification code that uniquely identifies the base station ...

Embodiment 3

[0089] see image 3 , image 3 It is a schematic block diagram of a terminal provided by Embodiment 3 of the present invention. For ease of description, only parts related to the embodiments of the present invention are shown. image 3 The example terminal 300 may be the subject of execution of the method for identifying a pseudo base station provided in Embodiment 1 above. image 3 The exemplary terminal 300 mainly includes: a base station identification obtaining unit 31 , a location obtaining unit 32 , a legal base station requesting unit 33 and a judging unit 34 . The details of each unit are as follows:

[0090] The base station identification obtaining unit 31 is used for obtaining the identification information of the base station to be identified if connected to the base station to be identified;

[0091] A location acquisition unit 32, configured to acquire current location information of the terminal;

[0092] The legal base station request unit 33 is configured...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a pseudo base station recognition method and a terminal. The method comprises steps: if a to-be-recognized base station is connected, the identity information of the to-be-recognized base station is acquired; the current position information of the terminal is acquired; according to the position information, a legal base station list in a preset range corresponding to the position information is acquired from a preset server, and the preset server pre-stores a corresponding relationship between the identity information of a legal base station and the position of the legal base station; and if the identity information of the to-be-recognized base station is not included in the legal base station list, the to-be-recognized base station is determined to be a suspected pseudo base station. According to the embodiment of the invention, the corresponding legal base station list is searched from the preset server through using the position information, whether the to-be-recognized base station is included in the legal base station list is judged, accurate recognition on the pseudo base station can be realized, leakage detection is not caused, the existing legal base station does not need to be changed, and the realization cost is reduced.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and a terminal for identifying a false base station. Background technique [0002] With the widespread use of mobile terminals and mobile networks, there are more and more fraudulent activities on mobile terminals. It has become a common method of fraud to send text messages with fraudulent links through pseudo base stations. Mobile terminal users more or less every day Everywhere will receive spam messages sent by fake base stations. Pseudo base station is a wireless base station that can simulate any sender to send specified SMS content. [0003] Pseudo base stations generally adopt a short-term residence method to interfere with the signals of normal base stations, so that mobile terminals at short distances can first establish a connection with the pseudo base station, and receive fraudulent information and junk advertisement information sent by the pseudo base sta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12
CPCH04W12/12
Inventor 黄儒鸿张柳
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products