CN104581874A - A method and device for restricting user equipment from accessing base station equipment - Google Patents
A method and device for restricting user equipment from accessing base station equipment Download PDFInfo
- Publication number
- CN104581874A CN104581874A CN201310517208.6A CN201310517208A CN104581874A CN 104581874 A CN104581874 A CN 104581874A CN 201310517208 A CN201310517208 A CN 201310517208A CN 104581874 A CN104581874 A CN 104581874A
- Authority
- CN
- China
- Prior art keywords
- base station
- location information
- source location
- information
- station equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 230000000052 comparative effect Effects 0.000 claims 8
- 230000005540 biological transmission Effects 0.000 claims 2
- 230000000452 restraining effect Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 12
- 238000010295 mobile communication Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 230000002159 abnormal effect Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 108010011222 cyclo(Arg-Pro) Proteins 0.000 description 1
- 238000005187 foaming Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000004083 survival effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/04—Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域technical field
本发明涉及无线通信领域,尤其涉及一种限制用户设备接入基站设备的方法和装置。The present invention relates to the field of wireless communication, in particular to a method and device for restricting user equipment from accessing base station equipment.
背景技术Background technique
由于目前GSM(Global System for Mobile communication,全球移动通信系统)网络系统采用非单向鉴权技术,即仅有网络侧对接入的用户设备进行鉴权,用户设备不对接入的网络进行鉴权,这样使得大量的伪基站设备假冒运营商部署的移动通信网络。Since the current GSM (Global System for Mobile communication, Global System for Mobile Communications) network system uses non-one-way authentication technology, that is, only the network side authenticates the user equipment that is connected, and the user equipment does not perform authentication on the network that is connected. , so that a large number of fake base station equipment impersonate the mobile communication network deployed by the operator.
其中,伪基站设备与运营商部署的移动通信网络相比,具备如下特征:Among them, compared with the mobile communication network deployed by the operator, the pseudo base station equipment has the following characteristics:
1、与运营商部署的移动通信网络的广播网号和广播频率相同;1. It is the same as the broadcast network number and broadcast frequency of the mobile communication network deployed by the operator;
2、信号强度远大于运营商部署的移动通信网络的信号强度,但覆盖范围较小。2. The signal strength is much greater than that of the mobile communication network deployed by the operator, but the coverage area is small.
由于信号强度远大于运营商部署的移动通信网络的信号强度,当用户设备将进入伪基站设备覆盖区域时,用户设备会快速重选到伪基站设备进行接入。在用户设备接入伪基站设备之后,伪基站设备获取用户设备的IMSI(International Mobile Subscriber Identifier,国际移动用户标识符)和IMEI(International Mobile Equipment Identity,国际移动设备标识)等信息,向用户设备推送大量的垃圾短信,并在推送结束后,通过设置使得用户设备快速断开与伪基站设备的连接,重新选择接入运营商部署的移动通信网络中。上述过程用户设备不易察觉,但是使得用户设备接收到大量的垃圾短信,给用户的生活带来困扰。Since the signal strength is much greater than the signal strength of the mobile communication network deployed by the operator, when the user equipment will enter the coverage area of the pseudo base station equipment, the user equipment will quickly reselect to the pseudo base station equipment for access. After the user equipment accesses the pseudo base station equipment, the pseudo base station equipment obtains information such as IMSI (International Mobile Subscriber Identifier, International Mobile Subscriber Identifier) and IMEI (International Mobile Equipment Identity, International Mobile Equipment Identity) of the user equipment, and pushes the information to the user equipment. A large number of spam text messages, and after the push is over, the user equipment is quickly disconnected from the pseudo base station equipment through settings, and re-selected to access the mobile communication network deployed by the operator. The above process is difficult for the user equipment to detect, but it causes the user equipment to receive a large number of junk messages, which brings troubles to the life of the user.
此外,在用户设备接入伪基站设备期间,不能正常的进行通信(例如:无法执行主被叫呼叫业务、数据业务等),严重影响了用户的体验。In addition, during the period when the user equipment accesses the pseudo base station equipment, it cannot communicate normally (for example, it cannot perform calling service, data service, etc.), which seriously affects the user experience.
综上所述,亟需一种伪基站判别方法,用于解决如何防止用户设备接入伪基站设备的问题。To sum up, there is an urgent need for a pseudo base station identification method for solving the problem of how to prevent user equipment from accessing pseudo base station equipment.
发明内容Contents of the invention
本发明实施例提供了一种限制用户设备接入基站设备的方法和装置,用于解决如何防止用户设备接入伪基站设备的问题。Embodiments of the present invention provide a method and device for restricting user equipment from accessing base station equipment, so as to solve the problem of how to prevent user equipment from accessing pseudo base station equipment.
一种限制用户设备接入基站设备的方法,包括:A method for restricting user equipment access to base station equipment, comprising:
接收基站设备发送的位置更新信息,其中,所述位置更新信息用于表征接入所述基站设备的用户设备发生的位置切换事件,包含了用户设备发生位置切换事件之前所使用的源位置信息;receiving location update information sent by the base station device, wherein the location update information is used to characterize a location handover event occurring on a user equipment accessing the base station device, and includes source location information used before the location handover event of the user equipment occurs;
对所述源位置信息的合法性进行判定;Judging the legality of the source location information;
在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备。When it is determined that the source location information is illegal, send the restricted access information including the source location information to the user equipment accessing the base station equipment, so as to restrict the user equipment receiving the restricted access information from accessing the base station device. Enter the base station equipment corresponding to the source location information.
在对所述源位置信息的合法性进行判定之前,所述方法还包括:Before determining the validity of the source location information, the method further includes:
根据接收到的所述源位置信息,判断所述源位置信息是否是特殊位置区标识;According to the received source location information, determine whether the source location information is a special location area identifier;
在判断结果为所述源位置信息是特殊位置区标识时,统计设定时间周期内接收到包含所述特殊位置区标识的位置更新信息的第一次数;When the judgment result is that the source location information is a special location area identifier, count the first number of location update information containing the special location area identifier received within a set time period;
在判断结果为所述源位置信息不是特殊位置区标识时,统计接收到包含所述源位置信息的位置更新信息的第二次数。When the judging result is that the source location information is not a special location area identifier, count the second times of receiving location update information including the source location information.
对所述源位置信息的合法性进行判定,包括:Judging the legality of the source location information, including:
将统计得到的所述第一次数与设定第一阈值进行比较;Comparing the statistically obtained first number with a set first threshold;
在比较结果是所述第一次数大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息不合法;When the comparison result is that the first number is greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is illegal;
在比较结果是所述第一次数不大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息合法。When the comparison result is that the first number is not greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is legal.
所述特殊位置区标识至少包含了0标识、65534标识、65535标识。The special location area identifier includes at least a 0 identifier, a 65534 identifier, and a 65535 identifier.
对所述源位置信息的合法性进行判定,包括:Judging the legality of the source location information, including:
将统计得到的所述第二次数与设定第二阈值进行比较;Comparing the second number of times obtained by statistics with a set second threshold;
在比较结果是所述第二次数大于设定第二阈值时,确定所述源位置信息不合法;When the comparison result is that the second number of times is greater than the set second threshold, it is determined that the source location information is illegal;
在比较结果是所述第二次数不大于设定第二阈值时,确定所述源位置信息合法。When the comparison result is that the second number of times is not greater than the set second threshold, it is determined that the source location information is legal.
对所述源位置信息的合法性进行判定,包括:Judging the legality of the source location information, including:
在判断结果为所述源位置信息不是特殊位置区标识时,判断所述源位置信息是否属于所述基站设备的相邻基站的位置信息;When the judging result is that the source location information is not a special location area identifier, judging whether the source location information belongs to the location information of a neighboring base station of the base station device;
在确定所述源位置信息不属于所述基站设备的相邻基站的位置信息时,确定所述源位置信息不合法。When it is determined that the source location information does not belong to the location information of the neighboring base stations of the base station device, it is determined that the source location information is illegal.
在确定所述源位置信息不合法之后,所述方法还包括:After determining that the source location information is illegal, the method further includes:
确定所述源位置信息对应的基站设备是伪基站设备,并determining that the base station device corresponding to the source location information is a pseudo base station device, and
确定发送所述位置更新信息的基站设备的设备标识,查找发送所述位置更新信息的基站设备的相邻基站设备的设备标识,生成伪基站设备的信息列表,其中,所述信息列表中包含了发送所述位置更新信息的基站设备的设备标识、查找到的所述相邻基站设备的设备标识和所述源位置信息;Determine the device identifier of the base station device that sends the location update information, search for the device identifiers of adjacent base station devices that send the location update information, and generate an information list of pseudo base station devices, wherein the information list contains sending the device identifier of the base station device that sends the location update information, the found device identifier of the adjacent base station device, and the source location information;
将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,包括:Sending the restricted access information including the source location information to the user equipment accessing the base station equipment, including:
将包含了所述信息列表的限制接入信息发送给接入所述发送所述位置更新信息的基站设备的用户设备。Send the access restriction information including the information list to the user equipment accessing the base station equipment that sends the location update information.
一种限制用户设备接入基站设备的方法,包括:A method for restricting user equipment access to base station equipment, comprising:
用户设备接收基站设备发送的限制接入信息,其中,所述限制接入信息中包含了限制接入的位置信息;并The user equipment receives the restricted access information sent by the base station equipment, wherein the restricted access information includes location information of restricted access; and
根据所述限制接入的位置信息,拒绝接入所述位置信息对应的基站设备。According to the location information of the restricted access, deny access to the base station equipment corresponding to the location information.
一种限制用户设备接入基站设备的控制设备,包括:A control device for restricting access of user equipment to base station equipment, comprising:
接收模块,用于接收基站设备发送的位置更新信息,其中,所述位置更新信息用于表征接入所述基站设备的用户设备发生的位置切换事件,包含了用户设备发生位置切换事件之前所使用的源位置信息;The receiving module is configured to receive location update information sent by the base station equipment, wherein the location update information is used to represent a location handover event that occurs on a user equipment that accesses the base station equipment, and includes information used before the location handover event of the user equipment occurs. source location information of
判定模块,用于对所述源位置信息的合法性进行判定;A judging module, configured to judge the legality of the source location information;
发送模块,用于在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备。A sending module, configured to, when it is determined that the source location information is illegal, send restricted access information including the source location information to user equipment accessing the base station device, so as to restrict receiving the restricted access information The user equipment of the information accesses the base station equipment corresponding to the source location information.
所述控制设备还包括:The control device also includes:
判断模块,用于在对所述源位置信息的合法性进行判定之前,根据接收到的所述源位置信息,判断所述源位置信息是否是特殊位置区标识;A judging module, configured to judge whether the source location information is a special location area identifier according to the received source location information before judging the validity of the source location information;
在判断结果为所述源位置信息是特殊位置区标识时,统计设定时间周期内接收到包含所述特殊位置区标识的位置更新信息的第一次数;When the judgment result is that the source location information is a special location area identifier, count the first number of location update information containing the special location area identifier received within a set time period;
在判断结果为所述源位置信息不是特殊位置区标识时,统计接收到包含所述源位置信息的位置更新信息的第二次数。When the judging result is that the source location information is not a special location area identifier, count the second times of receiving location update information including the source location information.
所述判定模块,具体用于将统计得到的所述第一次数与设定第一阈值进行比较;The judging module is specifically configured to compare the first number obtained through statistics with a set first threshold;
在比较结果是所述第一次数大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息不合法;When the comparison result is that the first number is greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is illegal;
在比较结果是所述第一次数不大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息合法。When the comparison result is that the first number is not greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is legal.
所述特殊位置区标识至少包含了0标识、65534标识、65535标识。The special location area identifier includes at least a 0 identifier, a 65534 identifier, and a 65535 identifier.
所述判定模块,具体用于将统计得到的所述第二次数与设定第二阈值进行比较;The judging module is specifically configured to compare the second number of times obtained through statistics with a set second threshold;
在比较结果是所述第二次数大于设定第二阈值时,确定所述源位置信息不合法;When the comparison result is that the second number of times is greater than the set second threshold, it is determined that the source location information is illegal;
在比较结果是所述第二次数不大于设定第二阈值时,确定所述源位置信息合法。When the comparison result is that the second number of times is not greater than the set second threshold, it is determined that the source location information is legal.
所述判定模块,具体用于在判断结果为所述源位置信息不是特殊位置区标识时,判断所述源位置信息是否属于所述基站设备的相邻基站的位置信息;The judging module is specifically configured to judge whether the source location information belongs to the location information of a neighboring base station of the base station device when the judging result is that the source location information is not a special location area identifier;
在确定所述源位置信息不属于所述基站设备的相邻基站的位置信息时,确定所述源位置信息不合法。When it is determined that the source location information does not belong to the location information of the neighboring base stations of the base station device, it is determined that the source location information is illegal.
所述控制设备还包括:The control device also includes:
伪基站确定模块,用于在确定所述源位置信息不合法之后,确定所述源位置信息对应的基站设备是伪基站设备,并确定发送所述位置更新信息的基站设备的设备标识,查找发送所述位置更新信息的基站设备的相邻基站设备的设备标识,生成伪基站设备的信息列表,其中,所述信息列表中包含了发送所述位置更新信息的基站设备的设备标识、查找到的所述相邻基站设备的设备标识和所述源位置信息;The fake base station determination module is used to determine that the base station device corresponding to the source location information is a fake base station device after determining that the source location information is illegal, and determine the device identifier of the base station device that sends the location update information, and search for the sending The equipment identification of the adjacent base station equipment of the base station equipment of the location update information generates an information list of pseudo base station equipment, wherein the information list includes the equipment identification of the base station equipment sending the location update information, the found The device identifier of the adjacent base station device and the source location information;
所述发送模块,具体用于将包含了所述信息列表的限制接入信息发送给接入所述发送所述位置更新信息的基站设备的用户设备。The sending module is specifically configured to send the access restriction information including the information list to the user equipment accessing the base station equipment that sends the location update information.
一种用户设备,包括:A user equipment, comprising:
接收模块,用于接收基站设备发送的限制接入信息,其中,所述限制接入信息中包含了限制接入的位置信息;A receiving module, configured to receive restricted access information sent by the base station equipment, wherein the restricted access information includes location information of restricted access;
限制接入模块,用于根据所述限制接入的位置信息,拒绝接入所述位置信息对应的基站设备。The access restriction module is configured to refuse access to the base station equipment corresponding to the location information according to the location information of the access restriction.
本发明有益效果如下:The beneficial effects of the present invention are as follows:
本发明实施例通过接收基站设备发送的位置更新信息,对位置更新信息中包含的用户设备发生位置切换事件之前所使用的源位置信息的合法性进行判定,并在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以便于限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备,这样,通过对接入基站设备的位置变更信息中包含的用户设备发生位置切换事件之前所使用的源位置信息的合法性进行判定,识别出基站设备周围所部署的伪基站设备,并将识别出的伪基站设备通过限制接入信息的形式发送给用户设备,有效地预防了用户设备在发生位置切换时接入伪基站设备,避免了伪基站设备对用户设备的干扰。In the embodiment of the present invention, by receiving the location update information sent by the base station equipment, the validity of the source location information used before the location switching event of the user equipment contained in the location update information is judged, and the source location information is determined to be illegal When , the access restriction information including the source location information is sent to the user equipment accessing the base station equipment, so as to restrict the user equipment receiving the access restriction information from accessing the location corresponding to the source location information. The base station equipment, in this way, by judging the legality of the source location information used before the location switching event of the user equipment contained in the location change information of the access base station equipment, identifying the pseudo base station equipment deployed around the base station equipment, and The identified pseudo base station is sent to the user equipment in the form of restricted access information, which effectively prevents the user equipment from accessing the pseudo base station when location switching occurs, and avoids the interference of the pseudo base station to the user equipment.
附图说明Description of drawings
图1为本发明实施例一提供的一种限制用户设备接入基站设备的方法的流程图;FIG. 1 is a flow chart of a method for restricting user equipment from accessing base station equipment according to Embodiment 1 of the present invention;
图2为本发明实施例二提供的一种限制用户设备接入基站设备的方法的流程图;FIG. 2 is a flowchart of a method for restricting user equipment from accessing base station equipment according to Embodiment 2 of the present invention;
图3为本发明实施例三提供的一种限制用户设备接入基站设备的控制设备的结构示意图;FIG. 3 is a schematic structural diagram of a control device that restricts user equipment from accessing base station equipment according to Embodiment 3 of the present invention;
图4为本发明实施例四提供的一种用户设备的结构示意图;FIG. 4 is a schematic structural diagram of a user equipment provided in Embodiment 4 of the present invention;
图5为本发明实施例五提供的一种限制用户设备接入基站设备的系统的结构示意图。FIG. 5 is a schematic structural diagram of a system for restricting user equipment from accessing base station equipment according to Embodiment 5 of the present invention.
具体实施方式Detailed ways
为了实现本发明的目的,本发明实施例提供了一种限制用户设备接入基站设备的方法和装置,通过接收基站设备发送的位置更新信息,对位置更新信息中包含的用户设备发生位置切换事件之前所使用的源位置信息的合法性进行判定,并在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以便于限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备,这样,通过对接入基站设备的位置变更信息中包含的用户设备发生位置切换事件之前所使用的源位置信息的合法性进行判定,识别出基站设备周围所部署的伪基站设备,并将识别出的伪基站设备通过限制接入信息的形式发送给用户设备,有效地预防了用户设备在发生位置切换时接入伪基站设备,避免了伪基站设备对用户设备的干扰。In order to achieve the purpose of the present invention, an embodiment of the present invention provides a method and device for restricting user equipment from accessing base station equipment, by receiving location update information sent by the base station equipment, a location switching event occurs for the user equipment included in the location update information judging the validity of the previously used source location information, and when it is determined that the source location information is illegal, sending restricted access information including the source location information to the user equipment accessing the base station device, In order to restrict the user equipment receiving the restricted access information from accessing the base station equipment corresponding to the source location information, in this way, the user equipment contained in the location change information of the access base station equipment used before the location switching event occurs Judging the legitimacy of the source location information, identifying the pseudo base station equipment deployed around the base station equipment, and sending the identified pseudo base station equipment to the user equipment in the form of restricted access information, effectively preventing the user equipment from happening. The pseudo base station equipment is connected during position switching, which avoids the interference of the pseudo base station equipment to the user equipment.
需要说明的是,本发明实施例涉及的基站设备(例如,接入点)可以是指接入网中在空中接口上通过一个或多个扇区与无线终端通信的设备;基站设备还可以用于将收到的空中帧与IP分组进行相互转换,作为无线终端与接入网的其余部分之间的路由器,其中,接入网的其余部分可包括网际协议(IP)网络;基站设备还可以协调对空中接口的属性管理。例如,基站设备可以是GSM或CDMA中的基站(BTS,Base Transceiver Station),也可以是WCDMA中的基站(NodeB),还可以是LTE中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B),这里不做具体限定。It should be noted that the base station equipment (for example, access point) involved in this embodiment of the present invention may refer to a device in the access network that communicates with wireless terminals through one or more sectors on the air interface; the base station equipment may also use It serves as a router between the wireless terminal and the rest of the access network, which can include the Internet Protocol (IP) network; the base station equipment can also Coordinates attribute management for the air interface. For example, the base station device can be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or a base station (NodeB) in WCDMA, or an evolved base station (NodeB or eNB or e-NodeB, evolutionary Node B), there is no specific limitation here.
下面结合说明书附图对本发明各个实施例进行详细描述。Various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
实施例一:Embodiment one:
如图1所示,为本发明实施例一提供的一种限制用户设备接入基站设备的方法的流程图。所述方法包括:As shown in FIG. 1 , it is a flowchart of a method for restricting user equipment from accessing base station equipment provided by Embodiment 1 of the present invention. The methods include:
步骤101:接收基站设备发送的位置更新信息。Step 101: Receive location update information sent by a base station device.
其中,所述位置更新信息用于表征接入所述基站设备的用户设备发生的位置切换事件,包含了用户设备发生位置切换事件之前所使用的源位置信息。Wherein, the location update information is used to characterize a location handover event occurred by the user equipment accessing the base station device, and includes source location information used before the user equipment location handover event occurs.
在步骤101中,在接收基站设备发送的位置更新信息之前,所述方法还包括但不限于:In step 101, before receiving the location update information sent by the base station equipment, the method further includes but not limited to:
通过基站设备获取其相邻基站设备的位置信息,并得到该基站设备以及邻区基站设备的位置信息表。Obtain the location information of its adjacent base station equipment through the base station equipment, and obtain the location information table of the base station equipment and the base station equipment in neighboring cells.
所述位置信息包括但不限于:LAC(Location Area Code,位置区码)、LAI(Location Area Identity,位置区标识)、CI(Cell Identity,小区标识)。The location information includes but not limited to: LAC (Location Area Code, location area code), LAI (Location Area Identity, location area identification), CI (Cell Identity, cell identification).
其中,LAI=MCC+MNC+LAC,MCC为Mobile Country Code,是移动台国家码,MNC为Mobile Network Code,是移动网络代码。Among them, LAI=MCC+MNC+LAC, MCC is the Mobile Country Code, which is the country code of the mobile station, and MNC is the Mobile Network Code, which is the mobile network code.
例如:得到的位置信息表如表1所示:For example: the obtained location information table is shown in Table 1:
表1Table 1
需要说明的是,基站设备可以包含了基站控制器(BSC,Base StationControl)和移动交换中心(MSC,Mobile Switching Center),一个MSC包含多个BSC,一个BSC一般对应1个BTS(Base Transceiver Station,基站收发信机站);一般来说,一个基站设备就是一个小区(Cell)。It should be noted that the base station equipment can include a base station controller (BSC, Base StationControl) and a mobile switching center (MSC, Mobile Switching Center). One MSC contains multiple BSCs, and one BSC generally corresponds to one BTS (Base Transceiver Station, Base transceiver station); Generally speaking, a base station equipment is a cell (Cell).
需要说明的是,LAC通常是按照一定的区域进行分配,也就是一个区域内的多个基站设备具有一个LAC,但是一个MSC中可以包含一个或多个LAC,一个LAC下有一个或多个BSC。It should be noted that LACs are usually allocated according to a certain area, that is, multiple base station devices in an area have one LAC, but one MSC can contain one or more LACs, and one LAC can have one or more BSCs .
每个小区(或者基站设备)具有一个属于自己的CI,终端设备可通过AT指令获取基站设备的CI。Each cell (or base station equipment) has its own CI, and the terminal equipment can obtain the CI of the base station equipment through AT commands.
在本发明实施例中仅讨论一个BSC对应一个小区的情况,但是一个BSC对应多个小区等情况也不影响本方面的应用,特此说明。In the embodiment of the present invention, only the situation that one BSC corresponds to one cell is discussed, but the situation that one BSC corresponds to multiple cells does not affect the application of this aspect, which is hereby explained.
在基站设备发送位置更新消息之前,基站设备接收发生位置切换接入的用户设备发送的位置更新请求消息,所述位置更新请求消息中包含了用户设备发生位置切换之前所接入的基站设备的位置信息。Before the base station equipment sends the location update message, the base station equipment receives the location update request message sent by the user equipment that has undergone location handover and access, and the location update request message includes the location of the base station equipment accessed by the user equipment before the location handover occurs information.
这里需要说明的是,用户设备发起位置切换的方式包括但不限于以下三种:It should be noted here that the ways for the user equipment to initiate location switching include but are not limited to the following three ways:
第一种位置切换:正常位置切换,即用户设备按照正常的切换流程从一个基站设备切换至邻接的一个基站设备。The first type of location handover: normal location handover, that is, the user equipment is handed over from one base station device to an adjacent base station device according to a normal handover process.
假设用户设备是在两个相邻的区域内进行切换,那么用户设备切换前所在基站设备的LAC与切换后所在基站设备的LAC可能不同;假设用户设备是在一个区域内的两个相邻基站设备之间进行切换,那么用户设备切换前所在基站设备的LAC与切换后所在基站设备的LAC可能相同。Assuming that the user equipment is handed over in two adjacent areas, the LAC of the base station equipment where the user equipment is located before the handover may be different from the LAC of the base station equipment where the user equipment is located after the handover; assuming that the user equipment is in two adjacent base stations in one area If handover is performed between devices, the LAC of the base station equipment where the user equipment is located before the handover may be the same as the LAC of the base station equipment where the user equipment is located after the handover.
在这一过程中,用户设备向切换的目标基站设备发送位置切换请求消息,该位置切换请求消息中包含了用户设备切换之前所在的源基站设备的位置信息,即本发明所称的源位置信息。In this process, the user equipment sends a location switching request message to the handover target base station equipment, and the location switching request message includes the location information of the source base station equipment where the user equipment was before switching, that is, the source location information referred to in the present invention .
该位置信息中至少包含了用户设备上报的TMSI(Temporary Mobile StationIdentity,临时移动台标识符)、LAI信息、CI信息、LAC信息。The location information includes at least TMSI (Temporary Mobile Station Identity, temporary mobile station identifier), LAI information, CI information, and LAC information reported by the user equipment.
其中,假设基站设备是伪基站,那么伪基站设备具有LAC,但是不具有CI信息。Wherein, assuming that the base station device is a pseudo base station, the pseudo base station device has LAC, but does not have CI information.
第二种位置切换:周期性位置切换,即网络侧按照设定的时间周期对附着在网络上的移动设备进行定期位置更新,探测用户的存活状态。The second type of location switching: periodic location switching, that is, the network side periodically updates the location of the mobile device attached to the network according to the set time period, and detects the survival status of the user.
第三种位置切换:IMSI(International Mobile Subscriber Identifier,国际移动用户标识符)附着位置更新流程,即用户设备在开机时利用IMSI接入基站设备。The third location switching: IMSI (International Mobile Subscriber Identifier, International Mobile Subscriber Identifier) attachment location update process, that is, the user equipment uses the IMSI to access the base station equipment when it is turned on.
步骤102:根据接收到的所述源位置信息,判断所述源位置信息是否是特殊位置区标识,若是,则执行步骤103,否则,执行步骤104。Step 102: According to the received source location information, judge whether the source location information is a special location area identifier, if yes, perform step 103, otherwise, perform step 104.
所述特殊位置区标识至少包含了0标识、65534标识、65535标识。The special location area identifier includes at least a 0 identifier, a 65534 identifier, and a 65535 identifier.
步骤103:在判断结果为所述源位置信息是特殊位置区标识时,统计设定时间周期内接收到包含所述特殊位置区标识的位置更新信息的第一次数,执行步骤105。Step 103: When it is judged that the source location information is a SLA ID, count the first number of received location update information including the SLA ID within a set time period, and execute Step 105.
在步骤103中,由于用户设备出现异常时,容易发生异常切换,而异常切换一般是从特殊LAC对应的基站设备切换至其他基站设备,但是也不能确定,因此需要对设定时间周期内接收到包含所述特殊位置区标识的位置更新信息进行统计,即为第一次数。In step 103, when the user equipment is abnormal, abnormal handover is likely to occur, and abnormal handover is generally handover from the base station equipment corresponding to the special LAC to other base station equipment, but it cannot be determined, so it is necessary to check the The location update information including the special location area identifier is counted, which is the first number.
其中,设定时间周期可以是一段时间周期内,例如:08:00~09:00;也可以是一个设定时间长度内,例如:一天或者24小时等,这里不做限定。Wherein, the set time period may be within a period of time, such as: 08:00-09:00; it may also be within a set time period, such as: one day or 24 hours, etc., which is not limited here.
例如:如表2所示,统计设定时间周期内接收到包含所述特殊位置区标识的位置更新信息的第一次数:For example: as shown in Table 2, count the first number of received location update information containing the special location area identifier within the set time period:
表2Table 2
步骤104:在判断结果为所述源位置信息不是特殊位置区标识时,统计接收到包含所述源位置信息的位置更新信息的第二次数,执行步骤105。Step 104: When the judging result is that the source location information is not a special location area identifier, count the second times of receiving location update information including the source location information, and execute step 105.
在步骤104中,对接收到包含所述源位置信息的位置更新信息的数量进行统计,即为第二次数。In step 104, the number of received location update information including the source location information is counted, which is the second number of times.
例如:如表3所示,统计接收到包含所述源位置信息的位置更新信息的第二次数:For example: as shown in Table 3, count the second times of receiving location update information including the source location information:
表3table 3
步骤105:对所述源位置信息的合法性进行判定。Step 105: Judging the validity of the source location information.
在步骤105中,由于所述源位置信息可能是特殊的位置信息,也可能是异常的位置信息,因此在接收到源位置信息之后,需要对其合法性进行判定。In step 105, since the source location information may be special location information or abnormal location information, after the source location information is received, its legality needs to be judged.
当所述源位置信息属于步骤103判断的特殊位置区标识时,将统计得到的所述第一次数与设定第一阈值进行比较。When the source location information belongs to the special location area identifier judged in step 103, the first count obtained through statistics is compared with the set first threshold.
在比较结果是所述第一次数大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息不合法;When the comparison result is that the first number is greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is illegal;
在比较结果是所述第一次数不大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息合法。When the comparison result is that the first number is not greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is legal.
当所述源位置信息属于步骤104判断的异常位置区标识时,将统计得到的所述第二次数与设定第二阈值进行比较。When the source location information belongs to the abnormal location area identifier judged in step 104, the second count obtained through statistics is compared with the set second threshold.
在比较结果是所述第二次数大于设定第二阈值时,确定所述源位置信息不合法;When the comparison result is that the second number of times is greater than the set second threshold, it is determined that the source location information is illegal;
在比较结果是所述第二次数不大于设定第二阈值时,确定所述源位置信息合法。When the comparison result is that the second number of times is not greater than the set second threshold, it is determined that the source location information is legal.
需要说明的是,所述第一阈值可以是根据经验确定的,还可以是根据需要确定的;所述的第二阈值一般为0,即发现异常LAC,并判断该位置信息不合法,也可以根据需要确定;这里不做限定。It should be noted that the first threshold may be determined based on experience, and may also be determined according to needs; the second threshold is generally 0, that is, an abnormal LAC is found and the location information is determined to be illegal, or Determine as needed; there is no limit here.
步骤106:在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备。Step 106: When it is determined that the source location information is illegal, send restricted access information including the source location information to the user equipment accessing the base station equipment, so as to restrict the access restricted information from receiving the restricted access information The user equipment accesses the base station equipment corresponding to the source location information.
在步骤106中,在确定所述源位置信息不合法时,确定所述源位置信息所在的小区内包含一个伪基站设备,且伪基站设备的LAC号为源位置信息。In step 106, when it is determined that the source location information is illegal, it is determined that the cell where the source location information is located contains a fake base station device, and the LAC number of the fake base station device is the source location information.
在判断结果为所述源位置信息不合法时,进一步获得用户设备当前所在的(位置切换后的)基站设备的CI信息;并确认该基站设备内包含伪基站设备。When the judgment result is that the source location information is illegal, further obtain the CI information of the base station equipment where the user equipment is currently located (after the location is switched); and confirm that the base station equipment contains pseudo base station equipment.
具体地,确定发送所述位置更新信息的基站设备(即用户设备当前所在的基站设备)的设备标识,查找发送所述位置更新信息的基站设备的相邻基站设备的设备标识,生成伪基站设备的信息列表。Specifically, determine the device identifier of the base station device that sent the location update information (that is, the base station device where the user equipment is currently located), search for the device identifiers of adjacent base station devices that send the location update information, and generate a pseudo base station device information list.
其中,所述信息列表中包含了发送所述位置更新信息的基站设备的设备标识、查找到的所述相邻基站设备的设备标识和所述源位置信息。Wherein, the information list includes the device identifier of the base station device that sends the location update information, the found device identifiers of the adjacent base station devices, and the source location information.
例如:如表4所示,生成信息列表:For example: as shown in Table 4, generate a list of information:
表4Table 4
在得到该信息列表之后,将该信息列表的限制接入信息发送给待接入所述发送所述位置更新信息的基站设备的用户设备。After the information list is obtained, the access restriction information of the information list is sent to the user equipment to be accessed to the base station equipment sending the location update information.
通过本发明实施例一的方案,接收基站设备发送的位置更新信息,对位置更新信息中包含的用户设备发生位置切换事件之前所使用的源位置信息的合法性进行判定,并在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以便于限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备,这样,通过对接入基站设备的位置变更信息中包含的用户设备发生位置切换事件之前所使用的源位置信息的合法性进行判定,识别出基站设备周围所部署的伪基站设备,并将识别出的伪基站设备通过限制接入信息的形式发送给用户设备,有效地预防了用户设备在发生位置切换时接入伪基站设备,避免了伪基站设备对用户设备的干扰。Through the solution of Embodiment 1 of the present invention, the location update information sent by the base station equipment is received, and the validity of the source location information used before the location switching event of the user equipment contained in the location update information is judged, and the source When the location information is illegal, sending restricted access information including the location information of the source to the user equipment accessing the base station equipment, so as to restrict the user equipment receiving the restricted access information from accessing the source The base station equipment corresponding to the location information, in this way, by judging the legality of the source location information used before the location switching event of the user equipment contained in the location change information of the access base station equipment, it can identify the fake network deployed around the base station equipment. Base station equipment, and send the identified pseudo base station equipment to the user equipment in the form of restricted access information, effectively preventing the user equipment from accessing the pseudo base station equipment when location switching occurs, and avoiding the interference of the pseudo base station equipment on the user equipment .
实施例二:Embodiment two:
如图2所示,为本发明实施例二提供的一种限制用户设备接入基站设备的方法的流程图,本发明实施例二是与本发明实施例一在同一发明构思下的发明,所述方法包括:As shown in Figure 2, it is a flow chart of a method for restricting user equipment from accessing base station equipment provided by Embodiment 2 of the present invention. Embodiment 2 of the present invention is an invention under the same inventive concept as Embodiment 1 of the present invention, so The methods described include:
步骤201:用户设备接收基站设备发送的限制接入信息。Step 201: the user equipment receives the access restriction information sent by the base station equipment.
其中,所述限制接入信息中包含了限制接入的位置信息。Wherein, the restricted access information includes location information of restricted access.
在步骤201中,用户设备在接收到基站设备发送的限制接入信息之后,将该限制接入信息中包含的限制接入的位置信息存储在禁止漫游列表(ForbiddenLocation Areas For Foaming)和禁止接入列表(Forbidden Location Areas ForRegion Provision Of Service)中。In step 201, after receiving the restricted access information sent by the base station equipment, the user equipment stores the restricted access location information contained in the restricted access information in the forbidden roaming list (Forbidden Location Areas For Foaming) and forbidden access list (Forbidden Location Areas ForRegion Provision Of Service).
需要说明的是,基站设备发送限制接入信息可以是周期发送的,还可以是时时发送的,这里不做限定。It should be noted that the access restriction information sent by the base station device may be sent periodically or from time to time, which is not limited here.
步骤202:用户设备根据所述限制接入的位置信息,拒绝接入所述位置信息对应的基站设备。Step 202: The user equipment refuses to access the base station equipment corresponding to the location information according to the location information of the restricted access.
在步骤202中,当用户设备接收到所述限制接入的位置信息的基站设备发送的连接请求时,用户设备根据本地存储的限制接入位置信息,拒绝接入该基站设备,使得用户设备避免接入该位置信息对应的基站设备中。In step 202, when the user equipment receives the connection request sent by the base station equipment with the access-restricted location information, the user equipment refuses to access the base station equipment according to the locally stored access-restricted location information, so that the user equipment avoids Access to the base station equipment corresponding to the location information.
实施例三:Embodiment three:
如图3所示,为本发明实施例三提供的一种限制用户设备接入基站设备的控制设备的结构示意图,本发明实施例三所述的控制设备是与本发明实施例一和本发明实施例二在同一发明构思下的设备,所述控制设备包括:接收模块11、判定模块12和发送模块13,其中:As shown in Figure 3, it is a schematic structural diagram of a control device that restricts user equipment from accessing base station equipment provided by Embodiment 3 of the present invention. The control device described in Embodiment 3 of the present invention is the same as Embodiment 1 of the present invention and the present invention Embodiment 2 Devices under the same inventive concept, the control device includes: a receiving module 11, a judging module 12 and a sending module 13, wherein:
接收模块11,用于接收基站设备发送的位置更新信息,其中,所述位置更新信息用于表征接入所述基站设备的用户设备发生的位置切换事件,包含了用户设备发生位置切换事件之前所使用的源位置信息。The receiving module 11 is configured to receive location update information sent by the base station equipment, wherein the location update information is used to represent a location handover event that occurs on a user equipment that accesses the base station equipment, and includes information that has occurred before the location handover event of the user equipment occurs. Source location information to use.
判定模块12,用于对所述源位置信息的合法性进行判定。A judging module 12, configured to judge the legality of the source location information.
发送模块13,用于在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备。The sending module 13 is configured to, when it is determined that the source location information is illegal, send restricted access information including the source location information to the user equipment accessing the base station equipment, so as to restrict receiving the restricted access information. The user equipment that enters the information accesses the base station equipment corresponding to the source location information.
可选地,所述控制设备还包括:判断模块14,其中:Optionally, the control device further includes: a judging module 14, wherein:
判断模块14,用于在对所述源位置信息的合法性进行判定之前,根据接收到的所述源位置信息,判断所述源位置信息是否是特殊位置区标识;A judging module 14, configured to judge whether the source location information is a special location area identifier according to the received source location information before judging the validity of the source location information;
在判断结果为所述源位置信息是特殊位置区标识时,统计设定时间周期内接收到包含所述特殊位置区标识的位置更新信息的第一次数;When the judgment result is that the source location information is a special location area identifier, count the first number of location update information containing the special location area identifier received within a set time period;
在判断结果为所述源位置信息不是特殊位置区标识时,统计接收到包含所述源位置信息的位置更新信息的第二次数。When the judging result is that the source location information is not a special location area identifier, count the second times of receiving location update information including the source location information.
具体地,所述判定模块12,具体用于将统计得到的所述第一次数与设定第一阈值进行比较;Specifically, the determination module 12 is specifically configured to compare the statistically obtained first number with a set first threshold;
在比较结果是所述第一次数大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息不合法;When the comparison result is that the first number is greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is illegal;
在比较结果是所述第一次数不大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息合法。When the comparison result is that the first number is not greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is legal.
所述特殊位置区标识至少包含了0标识、65534标识、65535标识。The special location area identifier includes at least a 0 identifier, a 65534 identifier, and a 65535 identifier.
所述判定模块12,具体用于将统计得到的所述第二次数与设定第二阈值进行比较;The determination module 12 is specifically configured to compare the second number of times obtained through statistics with a set second threshold;
在比较结果是所述第二次数大于设定第二阈值时,确定所述源位置信息不合法;When the comparison result is that the second number of times is greater than the set second threshold, it is determined that the source location information is illegal;
在比较结果是所述第二次数不大于设定第二阈值时,确定所述源位置信息合法。When the comparison result is that the second number of times is not greater than the set second threshold, it is determined that the source location information is legal.
所述判定模块12,具体用于在判断结果为所述源位置信息不是特殊位置区标识时,判断所述源位置信息是否属于所述基站设备的相邻基站的位置信息;The judging module 12 is specifically configured to judge whether the source location information belongs to the location information of a neighboring base station of the base station device when the judging result is that the source location information is not a special location area identifier;
在确定所述源位置信息不属于所述基站设备的相邻基站的位置信息时,确定所述源位置信息不合法。When it is determined that the source location information does not belong to the location information of the neighboring base stations of the base station device, it is determined that the source location information is illegal.
可选地,所述控制设备还包括:伪基站确定模块15,其中:Optionally, the control device further includes: a pseudo base station determining module 15, wherein:
伪基站确定模块15,用于在确定所述源位置信息不合法之后,确定所述源位置信息对应的基站设备是伪基站设备,并确定发送所述位置更新信息的基站设备的设备标识,查找发送所述位置更新信息的基站设备的相邻基站设备的设备标识,生成伪基站设备的信息列表,其中,所述信息列表中包含了发送所述位置更新信息的基站设备的设备标识、查找到的所述相邻基站设备的设备标识和所述源位置信息。The fake base station determination module 15 is used to determine that the base station device corresponding to the source location information is a fake base station device after determining that the source location information is illegal, and determine the device identifier of the base station device that sends the location update information, and search for The equipment identification of the adjacent base station equipment of the base station equipment that sends the location update information, and generates an information list of the pseudo base station equipment, wherein the information list includes the equipment identification of the base station equipment that sends the location update information, the found The device identifier of the neighboring base station device and the source location information.
所述发送模块13,具体用于将包含了所述信息列表的限制接入信息发送给接入所述发送所述位置更新信息的基站设备的用户设备。The sending module 13 is specifically configured to send the restricted access information including the information list to the user equipment accessing the base station device that sends the location update information.
需要说明的是,本发明实施例三所述的控制设备可以是基站设备中的逻辑部件,也可以是基站设备的物理实体单元,还可以是基站设备之外的第三控制设备,这里不做限定。It should be noted that the control device described in Embodiment 3 of the present invention may be a logical component in the base station device, or may be a physical entity unit of the base station device, or may be a third control device other than the base station device, which is not described here. limited.
实施例四:Embodiment four:
如图4所示,为本发明实施例四提供的一种用户设备的结构示意图,本发明实施例四是与本发明实施例一~本发明实施例三在同一发明构思下的发明,所述用户设备包括:接收模块21和限制接入模块22,其中:As shown in FIG. 4 , it is a schematic structural diagram of a user equipment provided by Embodiment 4 of the present invention. Embodiment 4 of the present invention is an invention under the same inventive concept as Embodiment 1 to Embodiment 3 of the present invention. The user equipment includes: a receiving module 21 and an access restriction module 22, wherein:
接收模块21,用于接收基站设备发送的限制接入信息,其中,所述限制接入信息中包含了限制接入的位置信息。The receiving module 21 is configured to receive access restriction information sent by the base station equipment, wherein the access restriction information includes location information of access restriction.
限制接入模块22,用于根据所述限制接入的位置信息,拒绝接入所述位置信息对应的基站设备。The access restriction module 22 is configured to refuse access to the base station equipment corresponding to the location information according to the location information of the access restriction.
需要说明的是,本发明实施例四所述的用户设备可以是实体单元,还可以是用户设备内部集成的逻辑部件,这里不做限定。It should be noted that the user equipment described in Embodiment 4 of the present invention may be a physical unit, or may be a logic component integrated inside the user equipment, which is not limited here.
实施例五:Embodiment five:
如图5所示,为本发明实施例五提供的一种限制用户设备接入基站设备的系统的结构示意图,本发明实施例五是与本发明实施例一~本发明实施例四在同一发明构思下的发明,所述系统包括:基站设备31、用户设备32和控制设备33,其中:As shown in Figure 5, it is a schematic structural diagram of a system for restricting user equipment from accessing base station equipment provided by Embodiment 5 of the present invention. Embodiment 5 of the present invention is the same invention as Embodiment 1 to Embodiment 4 of the present invention. The invention under the conception, the system includes: base station equipment 31, user equipment 32 and control equipment 33, wherein:
所述控制设备具备本发明实施例三所述的功能,用户设备具备了本发明实施例四所述的功能,基站设备可以是合法基站设备,也可以是不合法的、伪基站设备。The control device has the functions described in Embodiment 3 of the present invention, the user equipment has the functions described in Embodiment 4 of the present invention, and the base station equipment can be legitimate base station equipment, or illegal and pseudo base station equipment.
本领域的技术人员应明白,本发明的实施例可提供为方法、装置(设备)、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, devices (devices), or computer program products. Accordingly, the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本发明是参照根据本发明实施例的方法、装置(设备)和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices) and computer program products according to embodiments of the invention. It should be understood that each procedure and/or block in the flowchart and/or block diagram, and a combination of procedures and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions may be provided to a general purpose computer, special purpose computer, embedded processor, or processor of other programmable data processing equipment to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing equipment produce a An apparatus for realizing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions The device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device, causing a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process, thereby The instructions provide steps for implementing the functions specified in the flow chart or blocks of the flowchart and/or the block or blocks of the block diagrams.
尽管已描述了本发明的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。While preferred embodiments of the invention have been described, additional changes and modifications to these embodiments can be made by those skilled in the art once the basic inventive concept is appreciated. Therefore, it is intended that the appended claims be construed to cover the preferred embodiment as well as all changes and modifications which fall within the scope of the invention.
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the present invention without departing from the spirit and scope of the present invention. Thus, if these modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalent technologies, the present invention also intends to include these modifications and variations.
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310517208.6A CN104581874B (en) | 2013-10-28 | 2013-10-28 | A kind of method and apparatus of restricting user equipment access base station equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310517208.6A CN104581874B (en) | 2013-10-28 | 2013-10-28 | A kind of method and apparatus of restricting user equipment access base station equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104581874A true CN104581874A (en) | 2015-04-29 |
CN104581874B CN104581874B (en) | 2018-06-22 |
Family
ID=53096835
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310517208.6A Active CN104581874B (en) | 2013-10-28 | 2013-10-28 | A kind of method and apparatus of restricting user equipment access base station equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104581874B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108513301A (en) * | 2017-02-23 | 2018-09-07 | 中国移动通信有限公司研究院 | A kind of disabled user's recognition methods and device |
CN109362100A (en) * | 2018-12-26 | 2019-02-19 | 中国联合网络通信集团有限公司 | A kind of base station appraisal procedure and system based on communication signaling |
CN111328078A (en) * | 2018-12-17 | 2020-06-23 | 中国移动通信集团北京有限公司 | Method and device for positioning pseudo base station |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101330714A (en) * | 2007-06-20 | 2008-12-24 | 华为技术有限公司 | Wireless access method, system and apparatus |
CN101547495A (en) * | 2008-03-27 | 2009-09-30 | 华为技术有限公司 | Method for reselecting cell, terminal and system |
CN102625351A (en) * | 2012-02-28 | 2012-08-01 | 北京拓明科技有限公司 | Location method of simulation base station based on A interface signal |
-
2013
- 2013-10-28 CN CN201310517208.6A patent/CN104581874B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101330714A (en) * | 2007-06-20 | 2008-12-24 | 华为技术有限公司 | Wireless access method, system and apparatus |
CN101547495A (en) * | 2008-03-27 | 2009-09-30 | 华为技术有限公司 | Method for reselecting cell, terminal and system |
CN102625351A (en) * | 2012-02-28 | 2012-08-01 | 北京拓明科技有限公司 | Location method of simulation base station based on A interface signal |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108513301A (en) * | 2017-02-23 | 2018-09-07 | 中国移动通信有限公司研究院 | A kind of disabled user's recognition methods and device |
CN111328078A (en) * | 2018-12-17 | 2020-06-23 | 中国移动通信集团北京有限公司 | Method and device for positioning pseudo base station |
CN111328078B (en) * | 2018-12-17 | 2023-04-28 | 中国移动通信集团北京有限公司 | A method and device for locating a pseudo base station |
CN109362100A (en) * | 2018-12-26 | 2019-02-19 | 中国联合网络通信集团有限公司 | A kind of base station appraisal procedure and system based on communication signaling |
CN109362100B (en) * | 2018-12-26 | 2021-08-03 | 中国联合网络通信集团有限公司 | Base station evaluation method and system based on communication signaling |
Also Published As
Publication number | Publication date |
---|---|
CN104581874B (en) | 2018-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12200493B2 (en) | Source base station, UE, method in wireless communication system | |
EP3639544B1 (en) | Rogue unit detection information | |
KR101597388B1 (en) | Secure remote subscription management | |
CN112584495B (en) | Method for paging, user equipment, radio frequency base station and integrated circuit thereof | |
AU2010350963B2 (en) | Method and system for controlling Machine Type Communication equipment to access network | |
TWI397339B (en) | Method of setting radio access capability and related communication device | |
EP2614663B1 (en) | Nas communication method and apparatus in mobile telecommunication system | |
WO2020090764A1 (en) | SECURITY PROCEDURE FOR UE's IN 5GLAN GROUP COMMUNICATION | |
US9642068B2 (en) | Method, network device, and user equipment for controlling access to core network | |
US20100190496A1 (en) | Method to generate neighbor list femto cell enviroment | |
US20170245307A1 (en) | Method and device for sending random access signalling | |
US10448286B2 (en) | Mobility in mobile communications network | |
EP3596985B1 (en) | Method and apparatus for protection of privacy in paging of user equipment | |
WO2014032502A1 (en) | Terminal access method and system, and terminal | |
US20130165077A1 (en) | Method and apparatus for identifying fake networks | |
CN108293259B (en) | NAS message processing and cell list updating method and equipment | |
KR20120112753A (en) | Method and apparatus for managing handover of a mobile station from a macro cell to a femto cell | |
CN104581874B (en) | A kind of method and apparatus of restricting user equipment access base station equipment | |
CN112956226B (en) | Isolating fake base stations in communication systems | |
TWI604743B (en) | Dynamic public warning system deactivation | |
US10567951B1 (en) | Dynamic identities in a mobile device | |
CN101431754A (en) | Method for preventing clone terminal access | |
GB2458102A (en) | Providing authorised access to a cellular communication network (100) via an access point using the transmitted identification of wireless communication units | |
US9480009B2 (en) | Method and apparatus for detecting cell identity conflict |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |