CN105722085A - Pseudo base station identification method, pseudo base station identification apparatus, and terminal - Google Patents

Pseudo base station identification method, pseudo base station identification apparatus, and terminal Download PDF

Info

Publication number
CN105722085A
CN105722085A CN201610184478.3A CN201610184478A CN105722085A CN 105722085 A CN105722085 A CN 105722085A CN 201610184478 A CN201610184478 A CN 201610184478A CN 105722085 A CN105722085 A CN 105722085A
Authority
CN
China
Prior art keywords
base station
pseudo
sres
numerical value
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610184478.3A
Other languages
Chinese (zh)
Inventor
董志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610184478.3A priority Critical patent/CN105722085A/en
Priority to PCT/CN2016/084067 priority patent/WO2017166419A1/en
Publication of CN105722085A publication Critical patent/CN105722085A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a pseudo base station identification method, a pseudo base station identification apparatus, and a terminal. The pseudo base station identification method comprises the steps of after a to-be-connected base station is selected, generating a plurality of pseudo signed response (SRES) values according to a random number delivered by a server corresponding to the base station and an authentication key of the terminal; sending the plurality of pseudo SRES values to the server, so as to enable the server to authenticate each pseudo SRES value of the plurality of pseudo SRES values; and if a response that each pseudo SRES value is successfully authenticated by the server is received, identifying the base station as a pseudo base station. According to the method, the pseudo base station can be identified accurately.

Description

Pseudo-base station recognition methods, pseudo-base station identification device and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of pseudo-base station recognition methods, a kind of pseudo-base station identification device and a kind of terminal.
Background technology
At present, the terminal pilot signal strength according to Base Transmitter, select strong being attached of signal.In the scheme connected according to Base Transmitter signal power of prior art, when pseudo-base station launches strong signal, it is easy to cause terminal to select pseudo-base station to be attached, and the legitimate base station connected before disconnecting.
And terminal and pseudo-base station carry out in authentication process, easily cause the IMSI (InternationalMobileSubscriberIdentificationNumber of terminal, international mobile subscriber identity) intercepted by pseudo-base station, pseudo-base station can send to terminal and swindle note accordingly simultaneously, causes that user believes the loss that swindle note cause the user is certain.
Therefore, how to identify pseudo-base station exactly and become problem demanding prompt solution.
Summary of the invention
The present invention is based on the problems referred to above, it is proposed that a kind of new technical scheme, it is possible to identify pseudo-base station exactly.
In view of this, a first aspect of the present invention proposes a kind of pseudo-base station recognition methods, including: after selecting base station to be connected, the random number issued according to the server that described base station is corresponding and the KI of terminal, generate multiple pseudo-SRES numerical value;The plurality of pseudo-SRES numerical value is sent to described server, for described server, each pseudo-SRES numerical value in the plurality of pseudo-SRES numerical value is authenticated;If what receive described server all authenticates successful response to described each pseudo-SRES numerical value, then identify that described base station is pseudo-base station.
In this technical scheme, in the process that base station is authenticated, owing to only legal base station is to true SRES (SignedResponse, signed response) numerical value could authenticate and pass through, therefore, if multiple pseudo-SRES numerical value authentications are passed through by base station, illustrate that this base station is pseudo-base station, thus exactly base station being identified.
In technique scheme, it is preferable that also include: according to described random number and described KI, generate true SRES numerical value;And if receive the response to described each pseudo-equal failed authentication of SRES numerical value of described server, then described true SRES numerical value is sent to described server, and when receiving described server and described true SRES numerical value being authenticated successfully, by network corresponding for described endpoint registration to described base station.
In this technical scheme, if to each pseudo-equal failed authentication of SRES numerical value, and true SRES numerical value is authenticated successfully, illustrate that this base station is legal base station, then by network corresponding for endpoint registration to base station, to ensure the normal use of terminal.
In any of the above-described technical scheme, preferably, random number that the described server corresponding according to described base station issues and the KI of terminal, generate the step of multiple pseudo-SRES numerical value, specifically include: the parameter of the first algorithm for generating true SRES numerical value is modified, to form the second algorithm;Adopt described second algorithm and based on described random number and described KI, generate the plurality of pseudo-SRES numerical value.
In this technical scheme, it is possible to the parameter of the algorithm generating true SRES numerical value is modified, to generate multiple pseudo-SRES numerical value according to amended algorithm, for instance, often revise once the numerical value of this algorithm, it is possible to generate a pseudo-SRES numerical value.Furthermore it is also possible to stochastic generation multiple numerical value different from true SRES numerical value are as multiple pseudo-SRES numerical value.
In any of the above-described technical scheme, it is preferable that also include: after identifying that described base station is pseudo-base station, forbid that described endpoint registration is in communication network corresponding to described base station.
In this technical scheme, if identifying base station is pseudo-base station, then forbid that this endpoint registration is in corresponding communication network, it is to avoid the information such as the IMSI of terminal are by base station intercepts, thus the relevant information avoiding terminal is compromised, thus ensure that the safety of terminal data.And, also avoid terminal to receive the swindle information that pseudo-base station is sent, thus avoiding cause the user property loss.
In any of the above-described technical scheme, it is preferable that also include: after the described base station of identification is pseudo-base station, send prompting message.
In this technical scheme, when identifying base station and being pseudo-base station, by sending the prompting message of pseudo-base station, such as, the display of eject notification hurdle connects upper pseudo-base station, user please not believe the information received in case cheated, watch out for thus improving user, it is ensured that the property safety of user.
A second aspect of the present invention proposes a kind of pseudo-base station identification device, including: first generates unit, for after selecting base station to be connected, and the random number issued according to the server that described base station is corresponding and the KI of terminal, generate multiple pseudo-SRES numerical value;Transmitting element, for sending the plurality of pseudo-SRES numerical value to described server, authenticates each pseudo-SRES numerical value in the plurality of pseudo-SRES numerical value for described server;Recognition unit, if described each pseudo-SRES numerical value all being authenticated successful response for what receive described server, then identifies that described base station is pseudo-base station.
In this technical scheme, in the process that base station is authenticated, owing to only legal base station is to true SRES (SignedResponse, signed response) numerical value could authenticate and pass through, therefore, if multiple pseudo-SRES numerical value authentications are passed through by base station, illustrate that this base station is pseudo-base station, thus exactly base station being identified.
In technique scheme, it is preferable that also include: second generates unit, for according to described random number and described KI, generating true SRES numerical value;And processing unit, if for the response to described each pseudo-equal failed authentication of SRES numerical value receiving described server, then described true SRES numerical value is sent to described server, and when receiving described server and described true SRES numerical value being authenticated successfully, by network corresponding for described endpoint registration to described base station.
In this technical scheme, if to each pseudo-equal failed authentication of SRES numerical value, and true SRES numerical value is authenticated successfully, illustrate that this base station is legal base station, then by network corresponding for endpoint registration to base station, to ensure the normal use of terminal.
In any of the above-described technical scheme, it is preferable that described first generates unit includes: amendment subelement, for the parameter of the first algorithm for generating true SRES numerical value is modified, to form the second algorithm;Generate subelement, be used for adopting described second algorithm and based on described random number and described KI, generate the plurality of pseudo-SRES numerical value.
In this technical scheme, it is possible to the parameter of the algorithm generating true SRES numerical value is modified, to generate multiple pseudo-SRES numerical value according to amended algorithm, for instance, often revise once the numerical value of this algorithm, it is possible to generate a pseudo-SRES numerical value.Furthermore it is also possible to stochastic generation multiple numerical value different from true SRES numerical value are as multiple pseudo-SRES numerical value.
In any of the above-described technical scheme, it is preferable that also include: forbid unit, for after identifying that described base station is pseudo-base station, forbid that described endpoint registration is in communication network corresponding to described base station.
In this technical scheme, if identifying base station is pseudo-base station, then forbid that this endpoint registration is in corresponding communication network, it is to avoid the information such as the IMSI of terminal are by base station intercepts, thus the relevant information avoiding terminal is compromised, thus ensure that the safety of terminal data.And, also avoid terminal to receive the swindle information that pseudo-base station is sent, thus avoiding cause the user property loss.
In any of the above-described technical scheme, it is preferable that also include: reminding unit, for, after the described base station of identification is pseudo-base station, sending prompting message.
In this technical scheme, when identifying base station and being pseudo-base station, by sending the prompting message of pseudo-base station, such as, the display of eject notification hurdle connects upper pseudo-base station, user please not believe the information received in case cheated, watch out for thus improving user, it is ensured that the property safety of user.
A third aspect of the present invention proposes a kind of terminal, including the pseudo-base station identification device according to any one of technique scheme, therefore, this terminal has the technique effect identical with the pseudo-base station identification device according to any one of technique scheme, does not repeat them here.
Pass through technical scheme, it is possible to identify pseudo-base station exactly.
Accompanying drawing explanation
Fig. 1 illustrates the schematic flow sheet of pseudo-base station recognition methods according to an embodiment of the invention;
Fig. 2 illustrates the structural representation of pseudo-base station identification device according to an embodiment of the invention;
Fig. 3 illustrates the structural representation of pseudo-base station identification device according to another embodiment of the invention;
Fig. 4 illustrates the structural representation of terminal according to an embodiment of the invention.
Detailed description of the invention
In order to the above-mentioned purpose of the present invention, feature and advantage can be more clearly understood that, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that when not conflicting, embodiments herein and the feature in embodiment can be mutually combined.
Elaborate a lot of detail in the following description so that fully understanding the present invention; but; the present invention can also adopt other to be different from other modes described here to implement, and therefore, protection scope of the present invention is by the restriction of following public specific embodiment.
Fig. 1 illustrates the schematic flow sheet of pseudo-base station recognition methods according to an embodiment of the invention.
As it is shown in figure 1, pseudo-base station recognition methods according to an embodiment of the invention, including:
Step 102, after selecting base station to be connected, the random number issued according to the server that described base station is corresponding and the KI of terminal, generate multiple pseudo-SRES numerical value.
Step 104, sends the plurality of pseudo-SRES numerical value to described server, for described server, each pseudo-SRES numerical value in the plurality of pseudo-SRES numerical value is authenticated.
Step 106, if what receive described server all authenticates successful response to described each pseudo-SRES numerical value, then identifies that described base station is pseudo-base station.
In this technical scheme, in the process that base station is authenticated, owing to only legal base station is to true SRES (SignedResponse, signed response) numerical value could authenticate and pass through, therefore, if multiple pseudo-SRES numerical value authentications are passed through by base station, illustrate that this base station is pseudo-base station, thus exactly base station being identified.Wherein, after selecting base station to be connected, if opening the function identifying pseudo-base station, then the random number issued according to the server that described base station is corresponding and the KI of terminal, generate multiple pseudo-SRES numerical value.User can determine whether to open the function identifying pseudo-base station according to the actual demand of oneself.
In technique scheme, it is preferable that also include: according to described random number and described KI, generate true SRES numerical value;And if receive the response to described each pseudo-equal failed authentication of SRES numerical value of described server, then described true SRES numerical value is sent to described server, and when receiving described server and described true SRES numerical value being authenticated successfully, by network corresponding for described endpoint registration to described base station.
In this technical scheme, if to each pseudo-equal failed authentication of SRES numerical value, and true SRES numerical value is authenticated successfully, illustrate that this base station is legal base station, then by network corresponding for endpoint registration to base station, to ensure the normal use of terminal.
In any of the above-described technical scheme, preferably, random number that the described server corresponding according to described base station issues and the KI of terminal, generate the step of multiple pseudo-SRES numerical value, specifically include: the parameter of the first algorithm for generating true SRES numerical value is modified, to form the second algorithm;Adopt described second algorithm and based on described random number and described KI, generate the plurality of pseudo-SRES numerical value.
In this technical scheme, it is possible to the parameter of the algorithm generating true SRES numerical value is modified, to generate multiple pseudo-SRES numerical value according to amended algorithm, for instance, often revise once the numerical value of this algorithm, it is possible to generate a pseudo-SRES numerical value.Furthermore it is also possible to stochastic generation multiple numerical value different from true SRES numerical value are as multiple pseudo-SRES numerical value.
In any of the above-described technical scheme, it is preferable that also include: after identifying that described base station is pseudo-base station, forbid that described endpoint registration is in communication network corresponding to described base station.
In this technical scheme, if identifying base station is pseudo-base station, then forbid that this endpoint registration is in corresponding communication network, it is to avoid the information such as the IMSI of terminal are by base station intercepts, thus the relevant information avoiding terminal is compromised, thus ensure that the safety of terminal data.And, also avoid terminal to receive the swindle information that pseudo-base station is sent, thus avoiding cause the user property loss.
In any of the above-described technical scheme, it is preferable that also include: after the described base station of identification is pseudo-base station, send prompting message.
In this technical scheme, when identifying base station and being pseudo-base station, by sending prompting message, for instance, the display of eject notification hurdle connects upper pseudo-base station, user please believing the information received in case cheated, watching out for thus improving user, it is ensured that the property safety of user.
Fig. 2 illustrates the structural representation of pseudo-base station identification device according to an embodiment of the invention.
As shown in Figure 2, pseudo-base station identification device 200 according to an embodiment of the invention, including: first generates unit 202, transmitting element 204 and recognition unit 206, wherein, first generates unit 202 for after selecting base station to be connected, the random number issued according to the server that described base station is corresponding and the KI of terminal, generate multiple pseudo-SRES numerical value;Transmitting element 204, for sending the plurality of pseudo-SRES numerical value to described server, authenticates each pseudo-SRES numerical value in the plurality of pseudo-SRES numerical value for described server;Recognition unit 206, if described each pseudo-SRES numerical value all being authenticated successful response for what receive described server, then identifies that described base station is pseudo-base station.
In this technical scheme, in the process that base station is authenticated, owing to only legal base station is to true SRES (SignedResponse, signed response) numerical value could authenticate and pass through, therefore, if multiple pseudo-SRES numerical value authentications are passed through by base station, illustrate that this base station is pseudo-base station, thus exactly base station being identified.Wherein, after selecting base station to be connected, if opening the function identifying pseudo-base station, then the random number issued according to the server that described base station is corresponding and the KI of terminal, generate multiple pseudo-SRES numerical value.User can determine whether to open the function identifying pseudo-base station according to the actual demand of oneself.
In technique scheme, it is preferable that also include: second generates unit 208, for according to described random number and described KI, generating true SRES numerical value;And processing unit 210, if for the response to described each pseudo-equal failed authentication of SRES numerical value receiving described server, then described true SRES numerical value is sent to described server, and when receiving described server and described true SRES numerical value being authenticated successfully, by network corresponding for described endpoint registration to described base station.
In this technical scheme, if to each pseudo-equal failed authentication of SRES numerical value, and true SRES numerical value is authenticated successfully, illustrate that this base station is legal base station, then by network corresponding for endpoint registration to base station, to ensure the normal use of terminal.
In any of the above-described technical scheme, it is preferable that described first generates unit 202 includes: amendment subelement 2022, for the parameter of the first algorithm for generating true SRES numerical value is modified, to form the second algorithm;Generate subelement 2024, be used for adopting described second algorithm and based on described random number and described KI, generate the plurality of pseudo-SRES numerical value.
In this technical scheme, it is possible to the parameter of the algorithm generating true SRES numerical value is modified, to generate multiple pseudo-SRES numerical value according to amended algorithm, for instance, often revise once the numerical value of this algorithm, it is possible to generate a pseudo-SRES numerical value.Furthermore it is also possible to stochastic generation multiple numerical value different from true SRES numerical value are as multiple pseudo-SRES numerical value.
In any of the above-described technical scheme, it is preferable that also include: forbid unit 212, for after identifying that described base station is pseudo-base station, forbid that described endpoint registration is in communication network corresponding to described base station.
In this technical scheme, if identifying base station is pseudo-base station, then forbid that this endpoint registration is in corresponding communication network, it is to avoid the information such as the IMSI of terminal are by base station intercepts, thus the relevant information avoiding terminal is compromised, thus ensure that the safety of terminal data.And, also avoid terminal to receive the swindle information that pseudo-base station is sent, thus avoiding cause the user property loss.
In any of the above-described technical scheme, it is preferable that also include: reminding unit 214, for, after the described base station of identification is pseudo-base station, sending prompting message.
In this technical scheme, when identifying base station and being pseudo-base station, by sending prompting message, for instance, the display of eject notification hurdle connects upper pseudo-base station, user please believing the information received in case cheated, watching out for thus improving user, it is ensured that the property safety of user.
Fig. 3 illustrates the structural representation of pseudo-base station identification device according to another embodiment of the invention.
As it is shown on figure 3, pseudo-base station identification device 300 according to another embodiment of the invention, including: data module 302, processing module 304 and display module 306.
1, data module 302, it is used for storing the IMSI number of terminal, KI (KeyIdentifier, KI) value, the random number that server issues, the true SRES value calculated and multiple pseudo-SRES value, store above-mentioned information and be for use as the data source of terminal authentication.Wherein, IMSI number, KI value are terminal SIM (SubscriberIdentityModule, the subscriber identification module) essential information blocked, and random number is used for calculating true SRES value and multiple pseudo-SRES value.
2, processing module 304, for the random number that processing server issues, and send it to SIM, and SIM is calculated true SRES value according to this random number and KI value, saves it in data module 302, then calculate multiple pseudo-SRES value.Such as, true SRES value is: 8600250920146, multiple pseudo-SRES values are: 8600250920147,8600250920148,8600250920149.Then multiple pseudo-SRES values are sent to server to authenticate, pass through if multiple pseudo-SRES values are all authenticated by server, then receive, from server, multiple puppet SRES values are all authenticated the response passed through.
3, display module 306, for the result of processing module 304 be receive multiple pseudo-SRES values are all authenticated the response passed through time, eject the dialog box reminded, reminding the base station that user currently selects is pseudo-base station, notice that the leakage of personal information and the information of reception are likely fraud information, note anti-cheat.
Fig. 4 illustrates the structural representation of terminal according to an embodiment of the invention.
As shown in Figure 4, terminal 400 according to an embodiment of the invention, including the pseudo-base station identification device 200 according to any one of technique scheme, therefore, this terminal 400 has the technique effect identical with the pseudo-base station identification device 200 according to any one of technique scheme, does not repeat them here.
Describe technical scheme in detail above in association with accompanying drawing, pass through technical scheme, it is possible to identify pseudo-base station exactly.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention.

Claims (11)

1. a pseudo-base station recognition methods, it is characterised in that including:
After selecting base station to be connected, the random number issued according to the server that described base station is corresponding and the KI of terminal, generate multiple pseudo-SRES numerical value;
The plurality of pseudo-SRES numerical value is sent to described server, for described server, each pseudo-SRES numerical value in the plurality of pseudo-SRES numerical value is authenticated;
If what receive described server all authenticates successful response to described each pseudo-SRES numerical value, then identify that described base station is pseudo-base station.
2. pseudo-base station recognition methods according to claim 1, it is characterised in that also include:
According to described random number and described KI, generate true SRES numerical value;And
If receiving the response to described each pseudo-equal failed authentication of SRES numerical value of described server, then described true SRES numerical value is sent to described server, and when receiving described server and described true SRES numerical value being authenticated successfully, by network corresponding for described endpoint registration to described base station.
3. pseudo-base station recognition methods according to claim 1, it is characterised in that random number that the described server corresponding according to described base station issues and the KI of terminal, generates the step of multiple pseudo-SRES numerical value, specifically includes:
The parameter of the first algorithm for generating true SRES numerical value is modified, to form the second algorithm;
Adopt described second algorithm and based on described random number and described KI, generate the plurality of pseudo-SRES numerical value.
4. pseudo-base station recognition methods according to any one of claim 1 to 3, it is characterised in that also include:
After identifying that described base station is pseudo-base station, forbid that described endpoint registration is in communication network corresponding to described base station.
5. pseudo-base station recognition methods according to any one of claim 1 to 3, it is characterised in that also include:
After the described base station of identification is pseudo-base station, send prompting message.
6. a pseudo-base station identification device, it is characterised in that including:
First generates unit, for after selecting base station to be connected, and the random number issued according to the server that described base station is corresponding and the KI of terminal, generate multiple pseudo-SRES numerical value;
Transmitting element, for sending the plurality of pseudo-SRES numerical value to described server, authenticates each pseudo-SRES numerical value in the plurality of pseudo-SRES numerical value for described server;
Recognition unit, if described each pseudo-SRES numerical value all being authenticated successful response for what receive described server, then identifies that described base station is pseudo-base station.
7. pseudo-base station identification device according to claim 6, it is characterised in that also include:
Second generates unit, for according to described random number and described KI, generating true SRES numerical value;And
Processing unit, if for the response to described each pseudo-equal failed authentication of SRES numerical value receiving described server, then described true SRES numerical value is sent to described server, and when receiving described server and described true SRES numerical value being authenticated successfully, by network corresponding for described endpoint registration to described base station.
8. pseudo-base station identification device according to claim 6, it is characterised in that described first generates unit includes:
Amendment subelement, for modifying to the parameter of the first algorithm for generating true SRES numerical value, to form the second algorithm;
Generate subelement, be used for adopting described second algorithm and based on described random number and described KI, generate the plurality of pseudo-SRES numerical value.
9. the pseudo-base station identification device according to any one of claim 6 to 8, it is characterised in that also include:
Forbid unit, for after identifying that described base station is pseudo-base station, forbid that described endpoint registration is in communication network corresponding to described base station.
10. the pseudo-base station identification device according to any one of claim 6 to 8, it is characterised in that also include:
Reminding unit, for, after the described base station of identification is pseudo-base station, sending prompting message.
11. a terminal, it is characterised in that including: the pseudo-base station identification device as according to any one of claim 6 to 10.
CN201610184478.3A 2016-03-28 2016-03-28 Pseudo base station identification method, pseudo base station identification apparatus, and terminal Pending CN105722085A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610184478.3A CN105722085A (en) 2016-03-28 2016-03-28 Pseudo base station identification method, pseudo base station identification apparatus, and terminal
PCT/CN2016/084067 WO2017166419A1 (en) 2016-03-28 2016-05-31 Method of identifying false base station, device identifying false base station, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610184478.3A CN105722085A (en) 2016-03-28 2016-03-28 Pseudo base station identification method, pseudo base station identification apparatus, and terminal

Publications (1)

Publication Number Publication Date
CN105722085A true CN105722085A (en) 2016-06-29

Family

ID=56158291

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610184478.3A Pending CN105722085A (en) 2016-03-28 2016-03-28 Pseudo base station identification method, pseudo base station identification apparatus, and terminal

Country Status (2)

Country Link
CN (1) CN105722085A (en)
WO (1) WO2017166419A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106211169A (en) * 2016-07-28 2016-12-07 努比亚技术有限公司 Pseudo-base station identification device and method
WO2017166952A1 (en) * 2016-03-29 2017-10-05 努比亚技术有限公司 Network registration method and device of mobile terminal during startup, and computer storage medium
WO2018001278A1 (en) * 2016-06-30 2018-01-04 北京奇虎科技有限公司 Base station redirection method and base station redirection device
CN107959935A (en) * 2017-11-09 2018-04-24 广德宝达精密电路有限公司 A kind of new pseudo-base station identification equipment
CN109068330A (en) * 2018-10-29 2018-12-21 Oppo广东移动通信有限公司 Pseudo-base station identifying processing method, equipment and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108271130B (en) 2017-01-03 2021-10-12 阿里巴巴集团控股有限公司 Communication system and method for identifying pseudo base station short message
CN110996321B (en) * 2019-11-12 2022-07-22 恒宝股份有限公司 eSIM card authentication method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002102103A2 (en) * 2001-06-12 2002-12-19 Giesecke & Devrient Gmbh Authentication method
CN103874068A (en) * 2014-03-20 2014-06-18 工业和信息化部电信研究院 Method and device for identifying false base stations
CN105101200A (en) * 2014-05-23 2015-11-25 中国移动通信集团公司 Method, apparatus and terminal equipment for identifying pseudo base station

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105407479B (en) * 2014-09-10 2019-06-21 中国移动通信集团设计院有限公司 A kind of information identifying method, info gateway, SIM card and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002102103A2 (en) * 2001-06-12 2002-12-19 Giesecke & Devrient Gmbh Authentication method
CN103874068A (en) * 2014-03-20 2014-06-18 工业和信息化部电信研究院 Method and device for identifying false base stations
CN105101200A (en) * 2014-05-23 2015-11-25 中国移动通信集团公司 Method, apparatus and terminal equipment for identifying pseudo base station

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017166952A1 (en) * 2016-03-29 2017-10-05 努比亚技术有限公司 Network registration method and device of mobile terminal during startup, and computer storage medium
WO2018001278A1 (en) * 2016-06-30 2018-01-04 北京奇虎科技有限公司 Base station redirection method and base station redirection device
CN106211169A (en) * 2016-07-28 2016-12-07 努比亚技术有限公司 Pseudo-base station identification device and method
CN107959935A (en) * 2017-11-09 2018-04-24 广德宝达精密电路有限公司 A kind of new pseudo-base station identification equipment
CN109068330A (en) * 2018-10-29 2018-12-21 Oppo广东移动通信有限公司 Pseudo-base station identifying processing method, equipment and storage medium
CN109068330B (en) * 2018-10-29 2022-01-11 Oppo广东移动通信有限公司 Pseudo base station identification processing method, device and storage medium

Also Published As

Publication number Publication date
WO2017166419A1 (en) 2017-10-05

Similar Documents

Publication Publication Date Title
CN105722085A (en) Pseudo base station identification method, pseudo base station identification apparatus, and terminal
TWI634771B (en) Wisdom device and method and device for establishing Bluetooth connection between devices
CN104378145B (en) The matching method and system of bluetooth equipment
US9179312B2 (en) Registration and login method and mobile terminal
WO2016082483A1 (en) Pseudo base station discrimination method and apparatus
CN106559783B (en) Authentication method, device and system for WIFI network
CN107733838A (en) A kind of mobile terminal client terminal identity identifying method, device and system
CN103945380A (en) Method and system for network login authentication based on graphic code
CN105119776B (en) A kind of WiFi connection failures reason detection method and system
CN103037366B (en) Mobile phone users authentication method based on asymmetric cryptographic technique and mobile terminal
CN110300400B (en) Sign-in method, device, electronic equipment and storage medium
KR20160143333A (en) Method for Double Certification by using Double Channel
KR101807523B1 (en) Apparatus and method for identifying wireless network provider in wireless communication system
CN104348875A (en) Method, cloud server and system for performing pocket transmission of data
CN115244896A (en) Identifying trusted service set identifiers for wireless networks
CN104955029A (en) Address book protection method, address book protection device and communication system
CN106790036A (en) A kind of information tamper resistant method, device, server and terminal
CN104079527A (en) Information processing method and electronic equipment
CN108271156B (en) Method and device for identifying pseudo base station
CN103108316A (en) Authentication method, device and system for aerial card writing
CN105743859A (en) Method, device and system for authenticating light application
CN107222633A (en) A kind of sales statistics method of testing, device, terminal
KR20120126468A (en) Method and System for Relaying Authentication Number, Program
CN105681248B (en) Information Authentication, sending method and authentication registration server, sms center and terminal
KR20160031083A (en) Method for Accessing Network by using Near Field Communication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160629

RJ01 Rejection of invention patent application after publication