Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for identifying pseudo base station

A pseudo base station and base station technology, which is applied in the field of identifying pseudo base stations, can solve the problems of increasing power consumption of mobile terminals, increasing terminal power consumption, and high error probability of identifying pseudo base stations, so as to reduce power consumption, improve accuracy, and improve experience. Effect

Inactive Publication Date: 2017-09-29
ZTE CORP
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, using the existing technology, the false base station is detected by the short message center number, and the false base station can also modify the center number of the short message, resulting in invalid detection. If the content of the short message is detected, it is easy to shield the user's short message. Relational detection of false base stations, the terminal needs to obtain GPS location information, and the power consumption of the terminal increases. If the system parameters are changed, the detection will be invalid, which makes the error probability of identifying the false base station high, and also increases the power consumption of the mobile terminal.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying pseudo base station
  • Method and device for identifying pseudo base station
  • Method and device for identifying pseudo base station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0065] figure 2 It is a schematic flowchart of Embodiment 2 of a method for identifying a pseudo base station provided by the present invention, as shown in figure 2 As shown, in the second embodiment, the mobile terminal detects that the registration process does not enable the encryption command, and then initiates a new registration process. The new registration command contains a randomly generated user identification information. Generally speaking, this user does not exist Yes, if a non-existent user can register with the base station, then the base station is not a legal base station, and it is judged as a fake base station. The specific steps are as follows:

[0066] Step S201: The mobile terminal detects a new GSM cell, and triggers the location area update process, and the mobile terminal establishes a radio resource connection;

[0067] Step S202: the mobile terminal sends an instruction Location updating request, and the Mobile identity parameter value of the in...

Embodiment 4

[0096] Figure 4 It is a schematic flowchart of Embodiment 4 of a method for identifying a pseudo base station provided by the present invention, as shown in Figure 4 As shown, in the fourth embodiment, if the mobile terminal detects that the registration process does not enable the encryption command, the mobile terminal can be used to send a short message to the mobile terminal. If it is a normal base station, the short message will be sent to the mobile terminal , if it is a pseudo base station, it will not send the modified short message to the mobile terminal because it cannot identify the recipient of the short message. The specific steps are as follows:

[0097] Step S401: The mobile terminal detects a new GSM cell, and triggers the location area update process, and the mobile terminal establishes a radio resource connection;

[0098] Step S402: the mobile terminal sends an instruction Location updating request, and the Mobile identity parameter value of the instructi...

Embodiment 5

[0103] Figure 5 It is a schematic flowchart of Embodiment 5 of a method for identifying a pseudo base station provided by the present invention, as shown in Figure 5 As shown, in the fifth embodiment, if the mobile terminal detects that the registration process does not enable the encryption command, the mobile terminal can be used to send a short message to the mobile terminal. If it is a normal base station, the mobile terminal will receive the short message. If it is a pseudo base station, the short message will not be sent to the mobile terminal because it cannot identify the recipient of the short message. The specific steps are as follows:

[0104] Step S501: The mobile terminal detects a new GSM cell, and triggers the location area update process, and the mobile terminal establishes a radio resource connection;

[0105] Step S502: the mobile terminal sends an instruction Location updating request, and the Mobileidentity parameter value of the instruction is a correct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for identifying a pseudo base station. The device comprises a connection module, a reconnection module, a verification module and an identification module. The method comprises the following steps: initiating a registration request to a base station through a registration request instruction that carries correct mark information; when acquiring an unencrypted registration acceptance request instruction sent by the base station, verifying the base station according to whether the base station identifies the mark information of a terminal and / or a unique identification number of a user; and when determining that the verification result is not coincident, identifying the base station as the pseudo base station. According to the method and the device for identifying the pseudo base station provided by the invention, according to the characteristic that any business process of the pseudo base station is not encrypted, and whether the base station is the pseudo base station is verified further according to the mark information of the terminal and / or the unique identification number of the user, so that the pseudo base station can be efficiently and accurately identified, the power consumption of a mobile terminal can be reduced, the harassment of bad information to the user can be avoided, and user experience can be improved.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a method and a device for identifying a false base station. Background technique [0002] At present, with the popularization of various mobile terminals and the explosive growth of wireless data services in the future, illegal base stations for distributing spam messages, or pseudo base stations, are often installed in some prosperous commercial areas. Pretend to be the base station of the operator, and pretend to be someone else's mobile phone number to forcibly send spam messages such as fraudulent and advertising promotions to the mobile terminal equipment residing on the fake base station. [0003] In the prior art, the mobile terminal mainly detects the pseudo base station through static parameters. For example, the short message sent by the pseudo base station can be identified through the application layer software, and the parameters contained in the short...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/12H04W60/00
CPCH04W12/06H04W12/12H04W60/00H04W4/14H04W88/08Y02D30/70
Inventor 林君
Owner ZTE CORP