Unlock instant, AI-driven research and patent intelligence for your innovation.

Pseudo network device identification method and communication device

A technology of network equipment and identification method, applied in the field of communication, can solve the problems of communication security threats, terminal equipment cannot distinguish whether it resides in a normal base station or a pseudo base station, etc., and achieves the effect of improving security.

Active Publication Date: 2021-08-31
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the pseudo base station can also receive the downlink message of the normal base station, the pseudo base station can forward the downlink message to the terminal device, so that the terminal device cannot distinguish between the normal base station and the pseudo base station, which will threaten the communication security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo network device identification method and communication device
  • Pseudo network device identification method and communication device
  • Pseudo network device identification method and communication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Normally, the process for a terminal device to access a cell of a normal base station includes a synchronization phase, a broadcast message phase, and a random access phase. During the initial access process, if there is a pseudo base station with better signal quality near the terminal device during the broadcast message stage or the random access stage, the terminal device will access the pseudo base station. If there is no pseudo base station with better signal quality near the terminal device during the initial access process, the terminal device accesses a normal base station. After accessing a normal base station, due to factors such as the movement of the terminal device, if a pseudo base station with better signal quality appears near the terminal device, the terminal device performs cell reselection to access the pseudo base station. After accessing the pseudo base station, when the terminal device receives the downlink message, since the pseudo base station ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method for identifying a fake network device and a communication device. The uplink message sent by the terminal device is forwarded to the first network device via the second network device. After receiving the uplink message, the first network device generates a downlink message for the uplink message. , using the first time information to perform security processing on the downlink message and send it to the second network device, and the second network device sends the securely processed downlink message to the terminal device, and the terminal device performs security verification on the received downlink message , identifying whether the second network device is a fake network device, thereby improving communication security.

Description

technical field [0001] The embodiments of the present application relate to the technical field of communication, and in particular, to a method for identifying a fake network device and a communication device. Background technique [0002] In wireless communication technology, communication security is very important. Fake base station attack is a common means of threatening communication security. [0003] During the fake base station attack process, the fake base station is placed near the normal terminal equipment. Since the signal quality of the pseudo base station is better, it will attract terminal equipment to camp on the pseudo base station. The fake base station spreads fraudulent information or even viruses to the terminal equipment; or, the fake base station may also intercept the communication content between the normal base station and the terminal equipment, so as to monitor the user's private data. In addition, after the terminal equipment camps on the fak...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04W12/02H04W12/03H04W12/04H04W12/10H04W12/106H04W12/122
CPCH04W12/04H04W12/10H04W12/122H04W12/03H04W12/106H04W74/0833
Inventor 许斌李秉肇陈磊王学龙
Owner HUAWEI TECH CO LTD