Network equipment legality identification method and device, storage medium, terminal equipment and base station
A network device and identification method technology, applied in the field of communication, can solve the problems of huge workload of key distribution, maintenance and validity verification, and complex public key distribution and maintenance, so as to improve the device fingerprint database, avoid attacks, and protect communication safe effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] As mentioned in the background technology, the working and maintenance mechanism of the authentic base station identification method in the prior art is relatively complicated, and the universality and flexibility are poor, and it cannot effectively avoid the attack of the fake base station on the terminal and protect the terminal communication security.
[0058] Specifically, the rapid development and wide application of wireless communication technology has enriched people's daily work and life, and has become an indispensable part of modern society. However, due to the inherent broadcasting, openness and instability of the transmission link of the wireless network, the wireless communication system is more vulnerable to detection, interception and monitoring by illegal users than the traditional wired communication system, which brings The security issue of transmission data leakage cannot be ignored.
[0059] Traditional methods of protecting wireless network securi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


