Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatusl for identifying pseudo base station and termina

A technology of fake base stations and base stations, applied in the field of identifying fake base stations, can solve problems such as terminal security threats, user loss, phishing, etc., and achieve the effect of safe and effective protection

Pending Publication Date: 2019-01-25
BEIJING SAMSUNG TELECOM R&D CENT +1
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, it is more likely to implement more harmful attacks such as phishing, Trojan horses, and stealing verification codes, which will cause users to suffer great losses
[0006] In the prior art, the defense method for the fake base station in the GSM network is relatively mature, but the existing defense scheme for the fake base station in the GSM network cannot effectively defend against the dangerous attack from the fake base station in the LTE network, so in the LTE network The terminal in will face the security threat from the fake base station

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatusl for identifying pseudo base station and termina
  • Method and apparatusl for identifying pseudo base station and termina
  • Method and apparatusl for identifying pseudo base station and termina

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051]In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and apparatus for identifying a pseudo base station, and a terminal. The method comprises the following steps: acquiring preset parameters in the LTE network where theterminal is located; when the preset parameters meet the corresponding pseudo base station judgment conditions, identifying the corresponding LTE base station in the corresponding network as the pseudo base station and / or the GSM base station corresponding to the LTE base station as the pseudo base station. The invention identifies that the corresponding LTE base station in the corresponding network is a pseudo base station and / or the GSM base station corresponding to the LTE base station is a pseudo base station by monitoring the preset parameters in the LTE network in which the terminal is located, In the process of cell selection and cell reselection, the defense scheme can be adopted before starting the registration process to provide a more secure and effective protection for the terminal.

Description

technical field [0001] The present invention relates to the technical field of communications, and in particular, to a method, device and terminal for identifying a pseudo base station. Background technique [0002] The GSM (Global System for Mobile communication, Global System for Mobile Communications) communication protocol adopts one-way authentication, that is, the terminal cannot authenticate the base station. The loophole in this communication protocol makes there are a large number of fake base stations on the market. They can pretend to be operator base stations and send text messages to connected users with any number. It is difficult to detect after forgery. At the same time, it also separates the user from the real operating network, causing communication interruption to the user. What's more, the terminal information obtained by the fake base station is used to cooperate with other devices to pretend to be a real user, and intercept important information such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W36/00H04W74/08H04W12/122
CPCH04W12/12H04W36/0083H04W74/0833
Inventor 周文静周礼颖苏伟程传景赵明闫英杰
Owner BEIJING SAMSUNG TELECOM R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products