Method and device for identifying pseudo base station
A pseudo base station and base station technology, which is applied in the field of identifying pseudo base stations, can solve the problems of increasing power consumption of mobile terminals, increasing terminal power consumption, and high error probability of identifying pseudo base stations, so as to reduce power consumption, improve accuracy, and improve experience. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 2
[0065] figure 2 It is a schematic flowchart of Embodiment 2 of a method for identifying a pseudo base station provided by the present invention, as shown in figure 2 As shown, in the second embodiment, the mobile terminal detects that the registration process does not enable the encryption command, and then initiates a new registration process. The new registration command contains a randomly generated user identification information. Generally speaking, this user does not exist Yes, if a non-existent user can register with the base station, then the base station is not a legal base station, and it is judged as a fake base station. The specific steps are as follows:
[0066] Step S201: The mobile terminal detects a new GSM cell, and triggers the location area update process, and the mobile terminal establishes a radio resource connection;
[0067] Step S202: the mobile terminal sends an instruction Location updating request, and the Mobile identity parameter value of the in...
Embodiment 4
[0096] Figure 4 It is a schematic flowchart of Embodiment 4 of a method for identifying a pseudo base station provided by the present invention, as shown in Figure 4 As shown, in the fourth embodiment, if the mobile terminal detects that the registration process does not enable the encryption command, the mobile terminal can be used to send a short message to the mobile terminal. If it is a normal base station, the short message will be sent to the mobile terminal , if it is a pseudo base station, it will not send the modified short message to the mobile terminal because it cannot identify the recipient of the short message. The specific steps are as follows:
[0097] Step S401: The mobile terminal detects a new GSM cell, and triggers the location area update process, and the mobile terminal establishes a radio resource connection;
[0098] Step S402: the mobile terminal sends an instruction Location updating request, and the Mobile identity parameter value of the instructi...
Embodiment 5
[0103] Figure 5 It is a schematic flowchart of Embodiment 5 of a method for identifying a pseudo base station provided by the present invention, as shown in Figure 5 As shown, in the fifth embodiment, if the mobile terminal detects that the registration process does not enable the encryption command, the mobile terminal can be used to send a short message to the mobile terminal. If it is a normal base station, the mobile terminal will receive the short message. If it is a pseudo base station, the short message will not be sent to the mobile terminal because it cannot identify the recipient of the short message. The specific steps are as follows:
[0104] Step S501: The mobile terminal detects a new GSM cell, and triggers the location area update process, and the mobile terminal establishes a radio resource connection;
[0105] Step S502: the mobile terminal sends an instruction Location updating request, and the Mobileidentity parameter value of the instruction is a correct...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


