Unlock instant, AI-driven research and patent intelligence for your innovation.

Network equipment legality identification method and device, storage medium, terminal equipment and base station

A network device and identification method technology, applied in the field of communication, can solve the problems of huge workload of key distribution, maintenance and validity verification, and complex public key distribution and maintenance, so as to improve the device fingerprint database, avoid attacks, and protect communication safe effect

Pending Publication Date: 2022-04-22
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the distribution and maintenance of the public key is relatively complicated, and the workload of the distribution, maintenance and validity verification of the key is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network equipment legality identification method and device, storage medium, terminal equipment and base station
  • Network equipment legality identification method and device, storage medium, terminal equipment and base station
  • Network equipment legality identification method and device, storage medium, terminal equipment and base station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] As mentioned in the background technology, the working and maintenance mechanism of the authentic base station identification method in the prior art is relatively complicated, and the universality and flexibility are poor, and it cannot effectively avoid the attack of the fake base station on the terminal and protect the terminal communication security.

[0058] Specifically, the rapid development and wide application of wireless communication technology has enriched people's daily work and life, and has become an indispensable part of modern society. However, due to the inherent broadcasting, openness and instability of the transmission link of the wireless network, the wireless communication system is more vulnerable to detection, interception and monitoring by illegal users than the traditional wired communication system, which brings The security issue of transmission data leakage cannot be ignored.

[0059] Traditional methods of protecting wireless network securi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A network device legality identification method and apparatus, a storage medium, a terminal device, and a base station, the method comprising: acquiring a device fingerprint of a network device; and determining whether the network equipment is legal or not according to the equipment fingerprint of the network equipment. Therefore, the authenticity of the network equipment (such as a base station and a gateway) can be flexibly identified, the attack of illegal equipment on the terminal equipment is effectively avoided, and the communication security of the terminal equipment is protected.

Description

technical field [0001] The present invention relates to the field of communication technology, and in particular to a method and device for legality identification of network equipment, a storage medium, terminal equipment, and a base station. Background technique [0002] False base station (False Base Station), that is, a fake base station, which can imitate a mobile communication network, and use a hardware host to transmit a radio frequency signal of a certain power, so that mobile phones in the vicinity of the signal can access the fake base station from the mobile communication network. After the terminal accesses the fake base station, the possible attack risks include: spam text messages; illegal broadcast of information such as earthquakes and tsunamis, causing panic; making legitimate terminals unreachable, resulting in denial of service attacks, etc. Since the pseudo base station is usually small in size, strong in mobility, and good in concealment, it is difficul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/122
CPCH04W12/06
Inventor 韩立锋
Owner SPREADTRUM COMM (SHANGHAI) CO LTD