Identifying illegal base stations

A technology for illegal base stations and base stations, which is applied in the field of identifying illegal base stations and can solve the problems of data theft, interception, and malware download of wireless devices.

Pending Publication Date: 2022-07-15
QUALCOMM INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Wireless devices may then be vulnerable to data theft, malware downloads, or interception of their communications by rogue base stations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identifying illegal base stations
  • Identifying illegal base stations
  • Identifying illegal base stations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Various embodiments will be described in detail with reference to the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts. References to specific examples and implementations are for illustrative purposes and are not intended to limit the scope of the claims.

[0022] Various embodiments include methods and wireless devices configured to identify rogue base stations using various methods. In some embodiments, the processor of the wireless device can determine that the device is a suspicious base station, and the processor of the wireless device can transmit one or more forged messages to the device. Based on the response message or more than one response message received from the device in response to the one or more forged messages, the processor of the wireless device can determine whether the suspected base station is a rogue base station or a legitimate base station. In variou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Various embodiments include methods, components, and wireless devices configured to identify illegal base stations. A processor of a wireless device may determine that a device communicating with the wireless device is a suspicious base station. The processor may transmit the counterfeit message to the device and may receive one or more response messages from the device. The processor may determine whether one or more of the response messages received from the device is an appropriate response or an inappropriate response to the counterfeit message. In response to determining that the response message is an inappropriate response, the processor may determine that the device is an illegal base station. In response to determining that the device is an illegal base station, the wireless device may perform a protection action.

Description

[0001] CROSS-REFERENCE TO RELATED APPLICATIONS [0002] This patent application claims priority to US Non-Provisional Application Serial No. 16 / 699,075, filed November 28, 2019, entitled "IDENTIFYING AN ILLEGITIMATEBASE STATION," which is assigned to the assignee of the present application and is hereby incorporated by reference It is expressly incorporated herein by reference. technical field Background technique [0003] Wireless devices typically access communication networks via communications with base stations. In many cases, the base station is a device previously unknown to the wireless device. The process used by a wireless device to identify and establish communication with a base station presents a potential security vulnerability for the wireless device. For example, a malicious device may present itself as a legitimate base station and may establish communication with wireless devices. The wireless device may then be vulnerable to data theft, malware download...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/122H04W8/18H04W60/04
CPCH04W12/122H04W8/18H04W60/04H04W12/06H04W12/30H04W8/26H04W88/02H04W60/00
Inventor X.关S.K.德N.潘特M.K.休伯K.R.布达托基A.巴塔查杰
Owner QUALCOMM INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products