Check patentability & draft patents in minutes with Patsnap Eureka AI!

Pseudo base station detection method, device and system, and communication server

A technology of a communication server and a pseudo-base station, applied in the system and a communication server, a method for identifying a pseudo-base station, and a device field, which can solve problems such as the inability to completely avoid spam message interference, untimely detection, etc., and achieve low cost, timely and accurate detection high rate effect

Pending Publication Date: 2018-05-22
WUHAN ANTIY MOBILE SECURITY
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The current false base station detection technology can only be detected when the mobile terminal is connected to the false base station. The disadvantage is that the detection is not timely and the interference of spam messages cannot be completely avoided.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo base station detection method, device and system, and communication server
  • Pseudo base station detection method, device and system, and communication server
  • Pseudo base station detection method, device and system, and communication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Such as figure 1 As shown, a pseudo base station identification method mainly includes the following steps:

[0042] S01, monitor the broadcast information of the base station, and analyze the RXLEV-ACCESS-MIN information of each base station.

[0043] S02. When the RXLEV-ACCESS-MIN information of a base station does not meet the preset integer value, determine that the base station is a pseudo base station. Generally, the RXLEV-ACCESS-MIN information (minimum access power) of a true base station is a confirmed integer value, such as -101db, so the RXLEV-ACCESS-MIN information of a true base station can be preset based on experience. However, the pseudo base station does not meet the preset integer value, which is generally an interval such as less than -110db. This method can identify the pseudo base station only by analyzing the broadcast, so the scheme can judge the existence of the pseudo base station before the mobile terminal is connected to the pseudo base stat...

Embodiment 2

[0045] In order to further improve the accuracy of false base station detection, other characteristics of the base station can also be used to detect the false base station. For example, the LACs of real base stations are very regular, and the LAC values ​​of real base stations in adjacent cells are relatively close, while the LAC values ​​of pseudo base stations are quite different.

[0046] Specifically, such as figure 2 As shown, a pseudo base station identification method mainly includes the following steps:

[0047] S01A, monitor the broadcast information of the base station, and analyze the RXLEV-ACCESS-MIN information and LAC information of each base station.

[0048] S02A. Set the relevant information of base stations whose RXLEV-ACCESS-MIN information is a preset integer value in the second base station list, otherwise set in the first base station list. The relevant information of the base station includes base station RXLEV-ACCESS-MIN information, LAC information...

Embodiment 3

[0062] On the other hand, if image 3 As shown, the present invention discloses a pseudo-base station identification device, which mainly includes a monitoring analysis module 10 and a judgment module 20 connected to each other, wherein:

[0063] The monitoring analysis module 10 is used to monitor the broadcast information of the base station, and analyze the RXLEV-ACCESS-MIN information of each base station;

[0064] The judging module 20 is used for judging that the base station is a pseudo base station when the RXLEV-ACCESS-MIN information of the base station does not meet the preset integer value.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a pseudo base station detection method. The pseudo base station detection method comprises the steps of: monitoring broadcast information of base stations, and analyzing RXLEV-ACCESS-MIN information of various base stations; and, when the RXLEV-ACCESS-MIN information of a base station does not satisfy a pre-set integer value, judging that the base station is the pseudo basestation. According to the scheme, existence of the pseudo base station can be judged before a mobile terminal and the pseudo base station are connected; and thus, the method has the characteristics ofbeing timely to detect, high in accuracy rate, low in cost and wide in application range. The invention further discloses a pseudo base station detection device and system, and a communication server.

Description

technical field [0001] The present invention relates to the technical field of electronic information, in particular to a pseudo base station identification method, device, system and a communication server. Background technique [0002] Because the 2G communication network adopts one-way authentication, that is, only the 2G base station authenticates the mobile terminal, but the mobile terminal does not authenticate the 2G base station, so the criminals use this defect to connect the mobile terminal to the fake base station to send the mobile terminal Sending spam text messages and even conducting fraudulent activities have greatly affected the lives of users. Although the 4G communication network adopts a two-way authentication method, which can effectively prevent mobile terminals from connecting to pseudo base stations, all current 4G mobile phones support 2G communication networks. As long as the 4G communication network is interfered, the network of mobile terminals wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04W12/122
CPCH04W12/12
Inventor 张良超马志远
Owner WUHAN ANTIY MOBILE SECURITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More