Pseudo network device identification method and communication device
A technology of network equipment and identification method, applied in the field of communication, can solve the problems of communication security threats, terminal equipment cannot distinguish whether it resides in a normal base station or a pseudo base station, etc., and achieves the effect of improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] Normally, the process for a terminal device to access a cell of a normal base station includes a synchronization phase, a broadcast message phase, and a random access phase. During the initial access process, if there is a pseudo base station with better signal quality near the terminal device during the broadcast message stage or the random access stage, the terminal device will access the pseudo base station. If there is no pseudo base station with better signal quality near the terminal device during the initial access process, the terminal device accesses a normal base station. After accessing a normal base station, due to factors such as the movement of the terminal device, if a pseudo base station with better signal quality appears near the terminal device, the terminal device performs cell reselection to access the pseudo base station. After accessing the pseudo base station, when the terminal device receives the downlink message, since the pseudo base station ca...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


