Pseudo base station identification and defense method and terminal

A pseudo base station and terminal technology, applied in the field of communication, can solve the problems of 3/4G pseudo base stations that cannot be authenticated and cannot send spam or fraudulent text messages, so as to improve the level of security access, improve security, and be highly targeted Effect

Inactive Publication Date: 2019-03-15
HUAWEI TECH CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the 3/4G network, due to the introduction of a two-way authentication mechanism (that is, the terminal and the network need to authenticate each other), it is impossible for the 3/4G pseudo base station (that is, the pseudo base station used in the 3/4G network) to pass the authentication. Th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo base station identification and defense method and terminal
  • Pseudo base station identification and defense method and terminal
  • Pseudo base station identification and defense method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] see figure 2 , Embodiment 1 of the present invention provides a method for defending against a fake base station, and the method is executed by a terminal. The terminal (or terminal, user equipment) here refers to the equipment corresponding to the network side equipment, which may include mobile phones, tablet computers, PCs and other various wireless communication services of various generations of operators (such as 2G, 3G, 4G) devices. "Network side equipment" refers to the equipment provided by the operator to cooperate with the terminal to complete wireless communication, which may include base stations and various core network side equipment. In this application, "pseudo-base stations" also belong to network-side equipment and are provided by criminals.

[0049] It should be noted that, in each embodiment of the present invention, for the terminal, it does not care about the specific hardware and software implementation of the network-side device, and the term...

Embodiment 2

[0065] Based on the foregoing embodiments, this embodiment introduces system message configuration. It can be seen from the above-mentioned embodiments that in order to enable the terminal to reselect preferentially or select the pseudo base station itself when performing cell reselection (hereinafter referred to as "reselection") or cell selection (hereinafter referred to as "selection"), the pseudo base station will intentionally set the system The value of the message configuration is configured as a value for priority reselection or selection, and the range of this value is different from the normal value. It is an abnormal value. Therefore, when such an abnormal configuration is detected, there is a large The probability is caused by the pseudo base station, which can be preliminarily judged as a pseudo base station (referred to as "candidate pseudo base station" in the present invention). Various examples will be used to illustrate in detail below. For the convenience of...

Embodiment 3

[0103] Based on the above embodiments, after the candidate pseudo base station is determined, an implementation manner is to directly regard the candidate pseudo base station as a real pseudo base station, and then start various defense measures in Embodiment 4. In this embodiment, in order to prevent misjudgment, the various defense measures in the fourth implementation are not directly implemented, but the security verification process is further initiated, and the candidate pseudo base station is further confirmed according to the security verification process. Defensive measures are implemented after the real and fake base stations are detected.

[0104] This embodiment specifically introduces the NAS process. After the terminal determines that the network-side device interacting with it (in this embodiment, also referred to as "the network") is a candidate pseudo base station through various methods mentioned in the above-mentioned embodiments, the terminal may choose to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a pseudo base station defense method, which is executed by a terminal. The method comprises the steps of during cell reselection or cell selection, acquiring system message configuration for the cell reselection or the cell selection according to a system message sent by a network side device; and when the system message configuration is abnormal configuration, determining that the network side device is a candidate pseudo base station; after dwelling of a cell where the candidate pseudo base station is located, initiating a security verification process to the candidate pseudo base station; and confirming the candidate pseudo base station as a real pseudo base station according to the security verification process.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a false base station identification and defense method and terminal. Background technique [0002] Pseudo base stations usually refer to a set of illegal radio communication equipment composed of laptops, hosts, etc., which are used to perform the functions of base stations in normal networks and some other network side equipment (such as core network equipment). Users of fake base stations can carry out various illegal activities through fake base stations, including collecting user information, for example, collecting IMSI (International Mobile Subscriber Identity, International Mobile Subscriber Identity) or IMEI (International MobileEquipment Identity, International Mobile Equipment Identity), sending fraudulent Or junk text messages, listening to communications, etc., seriously affecting the privacy and property security of users. [0003] In the 2G (GS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/08H04W12/10H04W12/12H04W48/16H04W48/20H04W76/34H04W36/00H04W88/08H04W12/122
CPCH04W12/08H04W12/10H04W12/12H04W48/16H04W48/20H04W76/34H04W36/0077H04W88/08
Inventor 梁云侠张志勇韩磊
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products