Method and apparatus for preventing access to pseudo base station

A pseudo base station, base station technology, applied in the field of communication technology security, can solve the problems of misjudgment, large parameter range, inability to accurately match parameters, etc., to avoid harm, improve accuracy, and improve the effect of preventive measures.

Inactive Publication Date: 2018-04-06
CHINA MOBILE COMM GRP CO LTD
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to network optimization, temporary adjustments, different network configurations of different operators, etc. The parameter range is too large to accurately match the parameters, and there is a large possibility of misjudgment, which may cause the mobile terminal to still access the pseudo base station

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for preventing access to pseudo base station
  • Method and apparatus for preventing access to pseudo base station
  • Method and apparatus for preventing access to pseudo base station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] In this embodiment, the implementation process of the method for preventing access to pseudo base stations is as follows figure 2 shown, including the following steps:

[0050] Step 201, the mobile terminal acquires system message parameters of base stations covering the mobile terminal;

[0051] Usually, the air interface of the GSM network is used to realize the intercommunication between the mobile terminal and the fixed part of the GSM network, and the information on the air interface of the network is carried by various wireless logical channels. GSM logical channels are divided into two categories: traffic channel (TCH, TrafficChannel) and control channel (CCH, Control Channel). Among them, TCH mainly transmits services between the network and mobile terminals, such as voice and data; CCH is used to transmit The channel for signaling information and short packet data, the broadcast channel (BCH, Broadcast Channel) in the CCH is used to transmit information by br...

Embodiment 2

[0075] In this embodiment, considering that when the mobile terminal is within the coverage of multiple base stations, each base station can be judged one by one whether it belongs to a pseudo base station, then, for the convenience of judgment, each base station can be used for the base station according to the signal transmission related information. Priority sorting, sequentially judge whether each base station belongs to a pseudo base station and whether it can be accessed. The implementation process of the method for preventing access to pseudo base stations in this embodiment is as follows: image 3 shown, including the following steps:

[0076] Step 301: Prioritize the base stations according to signal transmission related information, and select the best base station as the base station for the mobile terminal to acquire system message parameters.

[0077] Here, the signal transmission-related information includes: signal strength, and / or the distance between the base...

Embodiment 3

[0110] This embodiment is a device using the method described in Embodiment 1. The composition and structure of the device for preventing access to pseudo base stations in this embodiment is as follows Figure 4 As shown, the device for preventing access to false base stations includes: an acquisition module 41 and a connection module 42; wherein,

[0111] The acquiring module 41 is configured to acquire system message parameters of base stations covering the mobile terminal;

[0112] Specifically, the information received by the acquisition module 41 includes system message types 1-4 and 7, 8 transmitted on the BCCH channel, and system messages 5 and 6 transmitted on the SACCH channel in the communication mode.

[0113] Before establishing a connection with a base station, the acquisition module 41 first acquires system information parameters of the base station, so as to detect whether the base station is a pseudo base station.

[0114] The connection module 42 is configure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for preventing access to a pseudo base station. The method comprises the following steps: a mobile terminal acquires a system message parameter of a base station covering the mobile terminal; and when the system message parameter does not comprise preset contents, the mobile terminal does not establish a connection with the base station. The invention further discloses an apparatus for preventing the access to the pseudo base station.

Description

technical field [0001] The present invention relates to the security field of communication technology, in particular to a method and device for preventing access to false base stations. Background technique [0002] A base station refers to a radio transceiver station that transmits information between a mobile communication switching center and a mobile terminal in a certain radio coverage area; It is called an enclosure-type SMS group sender. The pseudo-base station illegally uses the frequency of the operator, uses high-power transmission signals and optimizes the wireless parameter settings, interferes with and shields normal operator signals within a certain range, tricks customers into mobile terminals, and collects customer information. In addition, the fake base station can forcibly send bad information to mobile terminals in the coverage area by forging any sending number. Spam text messages and fraudulent short messages sent by fake base stations seriously interf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W12/08H04W48/08H04W12/122
CPCH04W12/08H04W12/12H04W48/08
Inventor 张滨赵刚冯运波袁捷李祥军郭燕飞王馨裕安宝宇邱勤
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products