CN104581874A - A method and device for restricting user equipment from accessing base station equipment - Google Patents

A method and device for restricting user equipment from accessing base station equipment Download PDF

Info

Publication number
CN104581874A
CN104581874A CN201310517208.6A CN201310517208A CN104581874A CN 104581874 A CN104581874 A CN 104581874A CN 201310517208 A CN201310517208 A CN 201310517208A CN 104581874 A CN104581874 A CN 104581874A
Authority
CN
China
Prior art keywords
base station
location information
source location
information
station equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310517208.6A
Other languages
Chinese (zh)
Other versions
CN104581874B (en
Inventor
粟栗
杜海涛
张峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201310517208.6A priority Critical patent/CN104581874B/en
Publication of CN104581874A publication Critical patent/CN104581874A/en
Application granted granted Critical
Publication of CN104581874B publication Critical patent/CN104581874B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and device for restraining user equipment from accessing to base station equipment. The method comprises the following steps: receiving location updating information sent by the base station equipment; judging the legality of source location information, which is included in the location updating information and is used by the user equipment before the location switching incident happens; when the source location information is determined to be illegal, sending access restriction information containing the source location information to the user equipment accessed to the base station equipment, so as to restrain the user equipment receiving the access restriction information from accessing to the base station equipment corresponding to the source location information. Therefore, by judging the legality of the source location information used by the user equipment before the location switching incident happens, pseudo base station equipment arranged around the base station equipment can be recognized, and the recognized pseudo base station equipment can be sent to the user equipment in the form of access restriction information, so that the user equipment is effectively prevented from accessing to the pseudo base station equipment during location switching, and the user equipment is prevented from being interfered by the pseudo base station equipment.

Description

一种限制用户设备接入基站设备的方法和装置A method and device for restricting user equipment from accessing base station equipment

技术领域technical field

本发明涉及无线通信领域,尤其涉及一种限制用户设备接入基站设备的方法和装置。The present invention relates to the field of wireless communication, in particular to a method and device for restricting user equipment from accessing base station equipment.

背景技术Background technique

由于目前GSM(Global System for Mobile communication,全球移动通信系统)网络系统采用非单向鉴权技术,即仅有网络侧对接入的用户设备进行鉴权,用户设备不对接入的网络进行鉴权,这样使得大量的伪基站设备假冒运营商部署的移动通信网络。Since the current GSM (Global System for Mobile communication, Global System for Mobile Communications) network system uses non-one-way authentication technology, that is, only the network side authenticates the user equipment that is connected, and the user equipment does not perform authentication on the network that is connected. , so that a large number of fake base station equipment impersonate the mobile communication network deployed by the operator.

其中,伪基站设备与运营商部署的移动通信网络相比,具备如下特征:Among them, compared with the mobile communication network deployed by the operator, the pseudo base station equipment has the following characteristics:

1、与运营商部署的移动通信网络的广播网号和广播频率相同;1. It is the same as the broadcast network number and broadcast frequency of the mobile communication network deployed by the operator;

2、信号强度远大于运营商部署的移动通信网络的信号强度,但覆盖范围较小。2. The signal strength is much greater than that of the mobile communication network deployed by the operator, but the coverage area is small.

由于信号强度远大于运营商部署的移动通信网络的信号强度,当用户设备将进入伪基站设备覆盖区域时,用户设备会快速重选到伪基站设备进行接入。在用户设备接入伪基站设备之后,伪基站设备获取用户设备的IMSI(International Mobile Subscriber Identifier,国际移动用户标识符)和IMEI(International Mobile Equipment Identity,国际移动设备标识)等信息,向用户设备推送大量的垃圾短信,并在推送结束后,通过设置使得用户设备快速断开与伪基站设备的连接,重新选择接入运营商部署的移动通信网络中。上述过程用户设备不易察觉,但是使得用户设备接收到大量的垃圾短信,给用户的生活带来困扰。Since the signal strength is much greater than the signal strength of the mobile communication network deployed by the operator, when the user equipment will enter the coverage area of the pseudo base station equipment, the user equipment will quickly reselect to the pseudo base station equipment for access. After the user equipment accesses the pseudo base station equipment, the pseudo base station equipment obtains information such as IMSI (International Mobile Subscriber Identifier, International Mobile Subscriber Identifier) and IMEI (International Mobile Equipment Identity, International Mobile Equipment Identity) of the user equipment, and pushes the information to the user equipment. A large number of spam text messages, and after the push is over, the user equipment is quickly disconnected from the pseudo base station equipment through settings, and re-selected to access the mobile communication network deployed by the operator. The above process is difficult for the user equipment to detect, but it causes the user equipment to receive a large number of junk messages, which brings troubles to the life of the user.

此外,在用户设备接入伪基站设备期间,不能正常的进行通信(例如:无法执行主被叫呼叫业务、数据业务等),严重影响了用户的体验。In addition, during the period when the user equipment accesses the pseudo base station equipment, it cannot communicate normally (for example, it cannot perform calling service, data service, etc.), which seriously affects the user experience.

综上所述,亟需一种伪基站判别方法,用于解决如何防止用户设备接入伪基站设备的问题。To sum up, there is an urgent need for a pseudo base station identification method for solving the problem of how to prevent user equipment from accessing pseudo base station equipment.

发明内容Contents of the invention

本发明实施例提供了一种限制用户设备接入基站设备的方法和装置,用于解决如何防止用户设备接入伪基站设备的问题。Embodiments of the present invention provide a method and device for restricting user equipment from accessing base station equipment, so as to solve the problem of how to prevent user equipment from accessing pseudo base station equipment.

一种限制用户设备接入基站设备的方法,包括:A method for restricting user equipment access to base station equipment, comprising:

接收基站设备发送的位置更新信息,其中,所述位置更新信息用于表征接入所述基站设备的用户设备发生的位置切换事件,包含了用户设备发生位置切换事件之前所使用的源位置信息;receiving location update information sent by the base station device, wherein the location update information is used to characterize a location handover event occurring on a user equipment accessing the base station device, and includes source location information used before the location handover event of the user equipment occurs;

对所述源位置信息的合法性进行判定;Judging the legality of the source location information;

在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备。When it is determined that the source location information is illegal, send the restricted access information including the source location information to the user equipment accessing the base station equipment, so as to restrict the user equipment receiving the restricted access information from accessing the base station device. Enter the base station equipment corresponding to the source location information.

在对所述源位置信息的合法性进行判定之前,所述方法还包括:Before determining the validity of the source location information, the method further includes:

根据接收到的所述源位置信息,判断所述源位置信息是否是特殊位置区标识;According to the received source location information, determine whether the source location information is a special location area identifier;

在判断结果为所述源位置信息是特殊位置区标识时,统计设定时间周期内接收到包含所述特殊位置区标识的位置更新信息的第一次数;When the judgment result is that the source location information is a special location area identifier, count the first number of location update information containing the special location area identifier received within a set time period;

在判断结果为所述源位置信息不是特殊位置区标识时,统计接收到包含所述源位置信息的位置更新信息的第二次数。When the judging result is that the source location information is not a special location area identifier, count the second times of receiving location update information including the source location information.

对所述源位置信息的合法性进行判定,包括:Judging the legality of the source location information, including:

将统计得到的所述第一次数与设定第一阈值进行比较;Comparing the statistically obtained first number with a set first threshold;

在比较结果是所述第一次数大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息不合法;When the comparison result is that the first number is greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is illegal;

在比较结果是所述第一次数不大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息合法。When the comparison result is that the first number is not greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is legal.

所述特殊位置区标识至少包含了0标识、65534标识、65535标识。The special location area identifier includes at least a 0 identifier, a 65534 identifier, and a 65535 identifier.

对所述源位置信息的合法性进行判定,包括:Judging the legality of the source location information, including:

将统计得到的所述第二次数与设定第二阈值进行比较;Comparing the second number of times obtained by statistics with a set second threshold;

在比较结果是所述第二次数大于设定第二阈值时,确定所述源位置信息不合法;When the comparison result is that the second number of times is greater than the set second threshold, it is determined that the source location information is illegal;

在比较结果是所述第二次数不大于设定第二阈值时,确定所述源位置信息合法。When the comparison result is that the second number of times is not greater than the set second threshold, it is determined that the source location information is legal.

对所述源位置信息的合法性进行判定,包括:Judging the legality of the source location information, including:

在判断结果为所述源位置信息不是特殊位置区标识时,判断所述源位置信息是否属于所述基站设备的相邻基站的位置信息;When the judging result is that the source location information is not a special location area identifier, judging whether the source location information belongs to the location information of a neighboring base station of the base station device;

在确定所述源位置信息不属于所述基站设备的相邻基站的位置信息时,确定所述源位置信息不合法。When it is determined that the source location information does not belong to the location information of the neighboring base stations of the base station device, it is determined that the source location information is illegal.

在确定所述源位置信息不合法之后,所述方法还包括:After determining that the source location information is illegal, the method further includes:

确定所述源位置信息对应的基站设备是伪基站设备,并determining that the base station device corresponding to the source location information is a pseudo base station device, and

确定发送所述位置更新信息的基站设备的设备标识,查找发送所述位置更新信息的基站设备的相邻基站设备的设备标识,生成伪基站设备的信息列表,其中,所述信息列表中包含了发送所述位置更新信息的基站设备的设备标识、查找到的所述相邻基站设备的设备标识和所述源位置信息;Determine the device identifier of the base station device that sends the location update information, search for the device identifiers of adjacent base station devices that send the location update information, and generate an information list of pseudo base station devices, wherein the information list contains sending the device identifier of the base station device that sends the location update information, the found device identifier of the adjacent base station device, and the source location information;

将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,包括:Sending the restricted access information including the source location information to the user equipment accessing the base station equipment, including:

将包含了所述信息列表的限制接入信息发送给接入所述发送所述位置更新信息的基站设备的用户设备。Send the access restriction information including the information list to the user equipment accessing the base station equipment that sends the location update information.

一种限制用户设备接入基站设备的方法,包括:A method for restricting user equipment access to base station equipment, comprising:

用户设备接收基站设备发送的限制接入信息,其中,所述限制接入信息中包含了限制接入的位置信息;并The user equipment receives the restricted access information sent by the base station equipment, wherein the restricted access information includes location information of restricted access; and

根据所述限制接入的位置信息,拒绝接入所述位置信息对应的基站设备。According to the location information of the restricted access, deny access to the base station equipment corresponding to the location information.

一种限制用户设备接入基站设备的控制设备,包括:A control device for restricting access of user equipment to base station equipment, comprising:

接收模块,用于接收基站设备发送的位置更新信息,其中,所述位置更新信息用于表征接入所述基站设备的用户设备发生的位置切换事件,包含了用户设备发生位置切换事件之前所使用的源位置信息;The receiving module is configured to receive location update information sent by the base station equipment, wherein the location update information is used to represent a location handover event that occurs on a user equipment that accesses the base station equipment, and includes information used before the location handover event of the user equipment occurs. source location information of

判定模块,用于对所述源位置信息的合法性进行判定;A judging module, configured to judge the legality of the source location information;

发送模块,用于在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备。A sending module, configured to, when it is determined that the source location information is illegal, send restricted access information including the source location information to user equipment accessing the base station device, so as to restrict receiving the restricted access information The user equipment of the information accesses the base station equipment corresponding to the source location information.

所述控制设备还包括:The control device also includes:

判断模块,用于在对所述源位置信息的合法性进行判定之前,根据接收到的所述源位置信息,判断所述源位置信息是否是特殊位置区标识;A judging module, configured to judge whether the source location information is a special location area identifier according to the received source location information before judging the validity of the source location information;

在判断结果为所述源位置信息是特殊位置区标识时,统计设定时间周期内接收到包含所述特殊位置区标识的位置更新信息的第一次数;When the judgment result is that the source location information is a special location area identifier, count the first number of location update information containing the special location area identifier received within a set time period;

在判断结果为所述源位置信息不是特殊位置区标识时,统计接收到包含所述源位置信息的位置更新信息的第二次数。When the judging result is that the source location information is not a special location area identifier, count the second times of receiving location update information including the source location information.

所述判定模块,具体用于将统计得到的所述第一次数与设定第一阈值进行比较;The judging module is specifically configured to compare the first number obtained through statistics with a set first threshold;

在比较结果是所述第一次数大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息不合法;When the comparison result is that the first number is greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is illegal;

在比较结果是所述第一次数不大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息合法。When the comparison result is that the first number is not greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is legal.

所述特殊位置区标识至少包含了0标识、65534标识、65535标识。The special location area identifier includes at least a 0 identifier, a 65534 identifier, and a 65535 identifier.

所述判定模块,具体用于将统计得到的所述第二次数与设定第二阈值进行比较;The judging module is specifically configured to compare the second number of times obtained through statistics with a set second threshold;

在比较结果是所述第二次数大于设定第二阈值时,确定所述源位置信息不合法;When the comparison result is that the second number of times is greater than the set second threshold, it is determined that the source location information is illegal;

在比较结果是所述第二次数不大于设定第二阈值时,确定所述源位置信息合法。When the comparison result is that the second number of times is not greater than the set second threshold, it is determined that the source location information is legal.

所述判定模块,具体用于在判断结果为所述源位置信息不是特殊位置区标识时,判断所述源位置信息是否属于所述基站设备的相邻基站的位置信息;The judging module is specifically configured to judge whether the source location information belongs to the location information of a neighboring base station of the base station device when the judging result is that the source location information is not a special location area identifier;

在确定所述源位置信息不属于所述基站设备的相邻基站的位置信息时,确定所述源位置信息不合法。When it is determined that the source location information does not belong to the location information of the neighboring base stations of the base station device, it is determined that the source location information is illegal.

所述控制设备还包括:The control device also includes:

伪基站确定模块,用于在确定所述源位置信息不合法之后,确定所述源位置信息对应的基站设备是伪基站设备,并确定发送所述位置更新信息的基站设备的设备标识,查找发送所述位置更新信息的基站设备的相邻基站设备的设备标识,生成伪基站设备的信息列表,其中,所述信息列表中包含了发送所述位置更新信息的基站设备的设备标识、查找到的所述相邻基站设备的设备标识和所述源位置信息;The fake base station determination module is used to determine that the base station device corresponding to the source location information is a fake base station device after determining that the source location information is illegal, and determine the device identifier of the base station device that sends the location update information, and search for the sending The equipment identification of the adjacent base station equipment of the base station equipment of the location update information generates an information list of pseudo base station equipment, wherein the information list includes the equipment identification of the base station equipment sending the location update information, the found The device identifier of the adjacent base station device and the source location information;

所述发送模块,具体用于将包含了所述信息列表的限制接入信息发送给接入所述发送所述位置更新信息的基站设备的用户设备。The sending module is specifically configured to send the access restriction information including the information list to the user equipment accessing the base station equipment that sends the location update information.

一种用户设备,包括:A user equipment, comprising:

接收模块,用于接收基站设备发送的限制接入信息,其中,所述限制接入信息中包含了限制接入的位置信息;A receiving module, configured to receive restricted access information sent by the base station equipment, wherein the restricted access information includes location information of restricted access;

限制接入模块,用于根据所述限制接入的位置信息,拒绝接入所述位置信息对应的基站设备。The access restriction module is configured to refuse access to the base station equipment corresponding to the location information according to the location information of the access restriction.

本发明有益效果如下:The beneficial effects of the present invention are as follows:

本发明实施例通过接收基站设备发送的位置更新信息,对位置更新信息中包含的用户设备发生位置切换事件之前所使用的源位置信息的合法性进行判定,并在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以便于限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备,这样,通过对接入基站设备的位置变更信息中包含的用户设备发生位置切换事件之前所使用的源位置信息的合法性进行判定,识别出基站设备周围所部署的伪基站设备,并将识别出的伪基站设备通过限制接入信息的形式发送给用户设备,有效地预防了用户设备在发生位置切换时接入伪基站设备,避免了伪基站设备对用户设备的干扰。In the embodiment of the present invention, by receiving the location update information sent by the base station equipment, the validity of the source location information used before the location switching event of the user equipment contained in the location update information is judged, and the source location information is determined to be illegal When , the access restriction information including the source location information is sent to the user equipment accessing the base station equipment, so as to restrict the user equipment receiving the access restriction information from accessing the location corresponding to the source location information. The base station equipment, in this way, by judging the legality of the source location information used before the location switching event of the user equipment contained in the location change information of the access base station equipment, identifying the pseudo base station equipment deployed around the base station equipment, and The identified pseudo base station is sent to the user equipment in the form of restricted access information, which effectively prevents the user equipment from accessing the pseudo base station when location switching occurs, and avoids the interference of the pseudo base station to the user equipment.

附图说明Description of drawings

图1为本发明实施例一提供的一种限制用户设备接入基站设备的方法的流程图;FIG. 1 is a flow chart of a method for restricting user equipment from accessing base station equipment according to Embodiment 1 of the present invention;

图2为本发明实施例二提供的一种限制用户设备接入基站设备的方法的流程图;FIG. 2 is a flowchart of a method for restricting user equipment from accessing base station equipment according to Embodiment 2 of the present invention;

图3为本发明实施例三提供的一种限制用户设备接入基站设备的控制设备的结构示意图;FIG. 3 is a schematic structural diagram of a control device that restricts user equipment from accessing base station equipment according to Embodiment 3 of the present invention;

图4为本发明实施例四提供的一种用户设备的结构示意图;FIG. 4 is a schematic structural diagram of a user equipment provided in Embodiment 4 of the present invention;

图5为本发明实施例五提供的一种限制用户设备接入基站设备的系统的结构示意图。FIG. 5 is a schematic structural diagram of a system for restricting user equipment from accessing base station equipment according to Embodiment 5 of the present invention.

具体实施方式Detailed ways

为了实现本发明的目的,本发明实施例提供了一种限制用户设备接入基站设备的方法和装置,通过接收基站设备发送的位置更新信息,对位置更新信息中包含的用户设备发生位置切换事件之前所使用的源位置信息的合法性进行判定,并在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以便于限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备,这样,通过对接入基站设备的位置变更信息中包含的用户设备发生位置切换事件之前所使用的源位置信息的合法性进行判定,识别出基站设备周围所部署的伪基站设备,并将识别出的伪基站设备通过限制接入信息的形式发送给用户设备,有效地预防了用户设备在发生位置切换时接入伪基站设备,避免了伪基站设备对用户设备的干扰。In order to achieve the purpose of the present invention, an embodiment of the present invention provides a method and device for restricting user equipment from accessing base station equipment, by receiving location update information sent by the base station equipment, a location switching event occurs for the user equipment included in the location update information judging the validity of the previously used source location information, and when it is determined that the source location information is illegal, sending restricted access information including the source location information to the user equipment accessing the base station device, In order to restrict the user equipment receiving the restricted access information from accessing the base station equipment corresponding to the source location information, in this way, the user equipment contained in the location change information of the access base station equipment used before the location switching event occurs Judging the legitimacy of the source location information, identifying the pseudo base station equipment deployed around the base station equipment, and sending the identified pseudo base station equipment to the user equipment in the form of restricted access information, effectively preventing the user equipment from happening. The pseudo base station equipment is connected during position switching, which avoids the interference of the pseudo base station equipment to the user equipment.

需要说明的是,本发明实施例涉及的基站设备(例如,接入点)可以是指接入网中在空中接口上通过一个或多个扇区与无线终端通信的设备;基站设备还可以用于将收到的空中帧与IP分组进行相互转换,作为无线终端与接入网的其余部分之间的路由器,其中,接入网的其余部分可包括网际协议(IP)网络;基站设备还可以协调对空中接口的属性管理。例如,基站设备可以是GSM或CDMA中的基站(BTS,Base Transceiver Station),也可以是WCDMA中的基站(NodeB),还可以是LTE中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B),这里不做具体限定。It should be noted that the base station equipment (for example, access point) involved in this embodiment of the present invention may refer to a device in the access network that communicates with wireless terminals through one or more sectors on the air interface; the base station equipment may also use It serves as a router between the wireless terminal and the rest of the access network, which can include the Internet Protocol (IP) network; the base station equipment can also Coordinates attribute management for the air interface. For example, the base station device can be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or a base station (NodeB) in WCDMA, or an evolved base station (NodeB or eNB or e-NodeB, evolutionary Node B), there is no specific limitation here.

下面结合说明书附图对本发明各个实施例进行详细描述。Various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

实施例一:Embodiment one:

如图1所示,为本发明实施例一提供的一种限制用户设备接入基站设备的方法的流程图。所述方法包括:As shown in FIG. 1 , it is a flowchart of a method for restricting user equipment from accessing base station equipment provided by Embodiment 1 of the present invention. The methods include:

步骤101:接收基站设备发送的位置更新信息。Step 101: Receive location update information sent by a base station device.

其中,所述位置更新信息用于表征接入所述基站设备的用户设备发生的位置切换事件,包含了用户设备发生位置切换事件之前所使用的源位置信息。Wherein, the location update information is used to characterize a location handover event occurred by the user equipment accessing the base station device, and includes source location information used before the user equipment location handover event occurs.

在步骤101中,在接收基站设备发送的位置更新信息之前,所述方法还包括但不限于:In step 101, before receiving the location update information sent by the base station equipment, the method further includes but not limited to:

通过基站设备获取其相邻基站设备的位置信息,并得到该基站设备以及邻区基站设备的位置信息表。Obtain the location information of its adjacent base station equipment through the base station equipment, and obtain the location information table of the base station equipment and the base station equipment in neighboring cells.

所述位置信息包括但不限于:LAC(Location Area Code,位置区码)、LAI(Location Area Identity,位置区标识)、CI(Cell Identity,小区标识)。The location information includes but not limited to: LAC (Location Area Code, location area code), LAI (Location Area Identity, location area identification), CI (Cell Identity, cell identification).

其中,LAI=MCC+MNC+LAC,MCC为Mobile Country Code,是移动台国家码,MNC为Mobile Network Code,是移动网络代码。Among them, LAI=MCC+MNC+LAC, MCC is the Mobile Country Code, which is the country code of the mobile station, and MNC is the Mobile Network Code, which is the mobile network code.

例如:得到的位置信息表如表1所示:For example: the obtained location information table is shown in Table 1:

基站设备的位置信息Location information of base station equipment 相邻基站设备的位置信息Location information of adjacent base station equipment CI1CI1 CI 2、CI 3、CI 4、CI 5、CI 6、CI 7CI 2, CI 3, CI 4, CI 5, CI 6, CI 7 CI 2CI 2 CI 1、CI 3、CI 7、CI 9、CI 10CI 1, CI 3, CI 7, CI 9, CI 10

表1Table 1

需要说明的是,基站设备可以包含了基站控制器(BSC,Base StationControl)和移动交换中心(MSC,Mobile Switching Center),一个MSC包含多个BSC,一个BSC一般对应1个BTS(Base Transceiver Station,基站收发信机站);一般来说,一个基站设备就是一个小区(Cell)。It should be noted that the base station equipment can include a base station controller (BSC, Base StationControl) and a mobile switching center (MSC, Mobile Switching Center). One MSC contains multiple BSCs, and one BSC generally corresponds to one BTS (Base Transceiver Station, Base transceiver station); Generally speaking, a base station equipment is a cell (Cell).

需要说明的是,LAC通常是按照一定的区域进行分配,也就是一个区域内的多个基站设备具有一个LAC,但是一个MSC中可以包含一个或多个LAC,一个LAC下有一个或多个BSC。It should be noted that LACs are usually allocated according to a certain area, that is, multiple base station devices in an area have one LAC, but one MSC can contain one or more LACs, and one LAC can have one or more BSCs .

每个小区(或者基站设备)具有一个属于自己的CI,终端设备可通过AT指令获取基站设备的CI。Each cell (or base station equipment) has its own CI, and the terminal equipment can obtain the CI of the base station equipment through AT commands.

在本发明实施例中仅讨论一个BSC对应一个小区的情况,但是一个BSC对应多个小区等情况也不影响本方面的应用,特此说明。In the embodiment of the present invention, only the situation that one BSC corresponds to one cell is discussed, but the situation that one BSC corresponds to multiple cells does not affect the application of this aspect, which is hereby explained.

在基站设备发送位置更新消息之前,基站设备接收发生位置切换接入的用户设备发送的位置更新请求消息,所述位置更新请求消息中包含了用户设备发生位置切换之前所接入的基站设备的位置信息。Before the base station equipment sends the location update message, the base station equipment receives the location update request message sent by the user equipment that has undergone location handover and access, and the location update request message includes the location of the base station equipment accessed by the user equipment before the location handover occurs information.

这里需要说明的是,用户设备发起位置切换的方式包括但不限于以下三种:It should be noted here that the ways for the user equipment to initiate location switching include but are not limited to the following three ways:

第一种位置切换:正常位置切换,即用户设备按照正常的切换流程从一个基站设备切换至邻接的一个基站设备。The first type of location handover: normal location handover, that is, the user equipment is handed over from one base station device to an adjacent base station device according to a normal handover process.

假设用户设备是在两个相邻的区域内进行切换,那么用户设备切换前所在基站设备的LAC与切换后所在基站设备的LAC可能不同;假设用户设备是在一个区域内的两个相邻基站设备之间进行切换,那么用户设备切换前所在基站设备的LAC与切换后所在基站设备的LAC可能相同。Assuming that the user equipment is handed over in two adjacent areas, the LAC of the base station equipment where the user equipment is located before the handover may be different from the LAC of the base station equipment where the user equipment is located after the handover; assuming that the user equipment is in two adjacent base stations in one area If handover is performed between devices, the LAC of the base station equipment where the user equipment is located before the handover may be the same as the LAC of the base station equipment where the user equipment is located after the handover.

在这一过程中,用户设备向切换的目标基站设备发送位置切换请求消息,该位置切换请求消息中包含了用户设备切换之前所在的源基站设备的位置信息,即本发明所称的源位置信息。In this process, the user equipment sends a location switching request message to the handover target base station equipment, and the location switching request message includes the location information of the source base station equipment where the user equipment was before switching, that is, the source location information referred to in the present invention .

该位置信息中至少包含了用户设备上报的TMSI(Temporary Mobile StationIdentity,临时移动台标识符)、LAI信息、CI信息、LAC信息。The location information includes at least TMSI (Temporary Mobile Station Identity, temporary mobile station identifier), LAI information, CI information, and LAC information reported by the user equipment.

其中,假设基站设备是伪基站,那么伪基站设备具有LAC,但是不具有CI信息。Wherein, assuming that the base station device is a pseudo base station, the pseudo base station device has LAC, but does not have CI information.

第二种位置切换:周期性位置切换,即网络侧按照设定的时间周期对附着在网络上的移动设备进行定期位置更新,探测用户的存活状态。The second type of location switching: periodic location switching, that is, the network side periodically updates the location of the mobile device attached to the network according to the set time period, and detects the survival status of the user.

第三种位置切换:IMSI(International Mobile Subscriber Identifier,国际移动用户标识符)附着位置更新流程,即用户设备在开机时利用IMSI接入基站设备。The third location switching: IMSI (International Mobile Subscriber Identifier, International Mobile Subscriber Identifier) attachment location update process, that is, the user equipment uses the IMSI to access the base station equipment when it is turned on.

步骤102:根据接收到的所述源位置信息,判断所述源位置信息是否是特殊位置区标识,若是,则执行步骤103,否则,执行步骤104。Step 102: According to the received source location information, judge whether the source location information is a special location area identifier, if yes, perform step 103, otherwise, perform step 104.

所述特殊位置区标识至少包含了0标识、65534标识、65535标识。The special location area identifier includes at least a 0 identifier, a 65534 identifier, and a 65535 identifier.

步骤103:在判断结果为所述源位置信息是特殊位置区标识时,统计设定时间周期内接收到包含所述特殊位置区标识的位置更新信息的第一次数,执行步骤105。Step 103: When it is judged that the source location information is a SLA ID, count the first number of received location update information including the SLA ID within a set time period, and execute Step 105.

在步骤103中,由于用户设备出现异常时,容易发生异常切换,而异常切换一般是从特殊LAC对应的基站设备切换至其他基站设备,但是也不能确定,因此需要对设定时间周期内接收到包含所述特殊位置区标识的位置更新信息进行统计,即为第一次数。In step 103, when the user equipment is abnormal, abnormal handover is likely to occur, and abnormal handover is generally handover from the base station equipment corresponding to the special LAC to other base station equipment, but it cannot be determined, so it is necessary to check the The location update information including the special location area identifier is counted, which is the first number.

其中,设定时间周期可以是一段时间周期内,例如:08:00~09:00;也可以是一个设定时间长度内,例如:一天或者24小时等,这里不做限定。Wherein, the set time period may be within a period of time, such as: 08:00-09:00; it may also be within a set time period, such as: one day or 24 hours, etc., which is not limited here.

例如:如表2所示,统计设定时间周期内接收到包含所述特殊位置区标识的位置更新信息的第一次数:For example: as shown in Table 2, count the first number of received location update information containing the special location area identifier within the set time period:

源位置信息source location information 第一次数first number

00 731731 6553465534 52115211 6553565535 9696

表2Table 2

步骤104:在判断结果为所述源位置信息不是特殊位置区标识时,统计接收到包含所述源位置信息的位置更新信息的第二次数,执行步骤105。Step 104: When the judging result is that the source location information is not a special location area identifier, count the second times of receiving location update information including the source location information, and execute step 105.

在步骤104中,对接收到包含所述源位置信息的位置更新信息的数量进行统计,即为第二次数。In step 104, the number of received location update information including the source location information is counted, which is the second number of times.

例如:如表3所示,统计接收到包含所述源位置信息的位置更新信息的第二次数:For example: as shown in Table 3, count the second times of receiving location update information including the source location information:

源位置信息source location information 第二次数second time 115115 44 416416 55

表3table 3

步骤105:对所述源位置信息的合法性进行判定。Step 105: Judging the validity of the source location information.

在步骤105中,由于所述源位置信息可能是特殊的位置信息,也可能是异常的位置信息,因此在接收到源位置信息之后,需要对其合法性进行判定。In step 105, since the source location information may be special location information or abnormal location information, after the source location information is received, its legality needs to be judged.

当所述源位置信息属于步骤103判断的特殊位置区标识时,将统计得到的所述第一次数与设定第一阈值进行比较。When the source location information belongs to the special location area identifier judged in step 103, the first count obtained through statistics is compared with the set first threshold.

在比较结果是所述第一次数大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息不合法;When the comparison result is that the first number is greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is illegal;

在比较结果是所述第一次数不大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息合法。When the comparison result is that the first number is not greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is legal.

当所述源位置信息属于步骤104判断的异常位置区标识时,将统计得到的所述第二次数与设定第二阈值进行比较。When the source location information belongs to the abnormal location area identifier judged in step 104, the second count obtained through statistics is compared with the set second threshold.

在比较结果是所述第二次数大于设定第二阈值时,确定所述源位置信息不合法;When the comparison result is that the second number of times is greater than the set second threshold, it is determined that the source location information is illegal;

在比较结果是所述第二次数不大于设定第二阈值时,确定所述源位置信息合法。When the comparison result is that the second number of times is not greater than the set second threshold, it is determined that the source location information is legal.

需要说明的是,所述第一阈值可以是根据经验确定的,还可以是根据需要确定的;所述的第二阈值一般为0,即发现异常LAC,并判断该位置信息不合法,也可以根据需要确定;这里不做限定。It should be noted that the first threshold may be determined based on experience, and may also be determined according to needs; the second threshold is generally 0, that is, an abnormal LAC is found and the location information is determined to be illegal, or Determine as needed; there is no limit here.

步骤106:在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备。Step 106: When it is determined that the source location information is illegal, send restricted access information including the source location information to the user equipment accessing the base station equipment, so as to restrict the access restricted information from receiving the restricted access information The user equipment accesses the base station equipment corresponding to the source location information.

在步骤106中,在确定所述源位置信息不合法时,确定所述源位置信息所在的小区内包含一个伪基站设备,且伪基站设备的LAC号为源位置信息。In step 106, when it is determined that the source location information is illegal, it is determined that the cell where the source location information is located contains a fake base station device, and the LAC number of the fake base station device is the source location information.

在判断结果为所述源位置信息不合法时,进一步获得用户设备当前所在的(位置切换后的)基站设备的CI信息;并确认该基站设备内包含伪基站设备。When the judgment result is that the source location information is illegal, further obtain the CI information of the base station equipment where the user equipment is currently located (after the location is switched); and confirm that the base station equipment contains pseudo base station equipment.

具体地,确定发送所述位置更新信息的基站设备(即用户设备当前所在的基站设备)的设备标识,查找发送所述位置更新信息的基站设备的相邻基站设备的设备标识,生成伪基站设备的信息列表。Specifically, determine the device identifier of the base station device that sent the location update information (that is, the base station device where the user equipment is currently located), search for the device identifiers of adjacent base station devices that send the location update information, and generate a pseudo base station device information list.

其中,所述信息列表中包含了发送所述位置更新信息的基站设备的设备标识、查找到的所述相邻基站设备的设备标识和所述源位置信息。Wherein, the information list includes the device identifier of the base station device that sends the location update information, the found device identifiers of the adjacent base station devices, and the source location information.

例如:如表4所示,生成信息列表:For example: as shown in Table 4, generate a list of information:

表4Table 4

在得到该信息列表之后,将该信息列表的限制接入信息发送给待接入所述发送所述位置更新信息的基站设备的用户设备。After the information list is obtained, the access restriction information of the information list is sent to the user equipment to be accessed to the base station equipment sending the location update information.

通过本发明实施例一的方案,接收基站设备发送的位置更新信息,对位置更新信息中包含的用户设备发生位置切换事件之前所使用的源位置信息的合法性进行判定,并在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以便于限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备,这样,通过对接入基站设备的位置变更信息中包含的用户设备发生位置切换事件之前所使用的源位置信息的合法性进行判定,识别出基站设备周围所部署的伪基站设备,并将识别出的伪基站设备通过限制接入信息的形式发送给用户设备,有效地预防了用户设备在发生位置切换时接入伪基站设备,避免了伪基站设备对用户设备的干扰。Through the solution of Embodiment 1 of the present invention, the location update information sent by the base station equipment is received, and the validity of the source location information used before the location switching event of the user equipment contained in the location update information is judged, and the source When the location information is illegal, sending restricted access information including the location information of the source to the user equipment accessing the base station equipment, so as to restrict the user equipment receiving the restricted access information from accessing the source The base station equipment corresponding to the location information, in this way, by judging the legality of the source location information used before the location switching event of the user equipment contained in the location change information of the access base station equipment, it can identify the fake network deployed around the base station equipment. Base station equipment, and send the identified pseudo base station equipment to the user equipment in the form of restricted access information, effectively preventing the user equipment from accessing the pseudo base station equipment when location switching occurs, and avoiding the interference of the pseudo base station equipment on the user equipment .

实施例二:Embodiment two:

如图2所示,为本发明实施例二提供的一种限制用户设备接入基站设备的方法的流程图,本发明实施例二是与本发明实施例一在同一发明构思下的发明,所述方法包括:As shown in Figure 2, it is a flow chart of a method for restricting user equipment from accessing base station equipment provided by Embodiment 2 of the present invention. Embodiment 2 of the present invention is an invention under the same inventive concept as Embodiment 1 of the present invention, so The methods described include:

步骤201:用户设备接收基站设备发送的限制接入信息。Step 201: the user equipment receives the access restriction information sent by the base station equipment.

其中,所述限制接入信息中包含了限制接入的位置信息。Wherein, the restricted access information includes location information of restricted access.

在步骤201中,用户设备在接收到基站设备发送的限制接入信息之后,将该限制接入信息中包含的限制接入的位置信息存储在禁止漫游列表(ForbiddenLocation Areas For Foaming)和禁止接入列表(Forbidden Location Areas ForRegion Provision Of Service)中。In step 201, after receiving the restricted access information sent by the base station equipment, the user equipment stores the restricted access location information contained in the restricted access information in the forbidden roaming list (Forbidden Location Areas For Foaming) and forbidden access list (Forbidden Location Areas ForRegion Provision Of Service).

需要说明的是,基站设备发送限制接入信息可以是周期发送的,还可以是时时发送的,这里不做限定。It should be noted that the access restriction information sent by the base station device may be sent periodically or from time to time, which is not limited here.

步骤202:用户设备根据所述限制接入的位置信息,拒绝接入所述位置信息对应的基站设备。Step 202: The user equipment refuses to access the base station equipment corresponding to the location information according to the location information of the restricted access.

在步骤202中,当用户设备接收到所述限制接入的位置信息的基站设备发送的连接请求时,用户设备根据本地存储的限制接入位置信息,拒绝接入该基站设备,使得用户设备避免接入该位置信息对应的基站设备中。In step 202, when the user equipment receives the connection request sent by the base station equipment with the access-restricted location information, the user equipment refuses to access the base station equipment according to the locally stored access-restricted location information, so that the user equipment avoids Access to the base station equipment corresponding to the location information.

实施例三:Embodiment three:

如图3所示,为本发明实施例三提供的一种限制用户设备接入基站设备的控制设备的结构示意图,本发明实施例三所述的控制设备是与本发明实施例一和本发明实施例二在同一发明构思下的设备,所述控制设备包括:接收模块11、判定模块12和发送模块13,其中:As shown in Figure 3, it is a schematic structural diagram of a control device that restricts user equipment from accessing base station equipment provided by Embodiment 3 of the present invention. The control device described in Embodiment 3 of the present invention is the same as Embodiment 1 of the present invention and the present invention Embodiment 2 Devices under the same inventive concept, the control device includes: a receiving module 11, a judging module 12 and a sending module 13, wherein:

接收模块11,用于接收基站设备发送的位置更新信息,其中,所述位置更新信息用于表征接入所述基站设备的用户设备发生的位置切换事件,包含了用户设备发生位置切换事件之前所使用的源位置信息。The receiving module 11 is configured to receive location update information sent by the base station equipment, wherein the location update information is used to represent a location handover event that occurs on a user equipment that accesses the base station equipment, and includes information that has occurred before the location handover event of the user equipment occurs. Source location information to use.

判定模块12,用于对所述源位置信息的合法性进行判定。A judging module 12, configured to judge the legality of the source location information.

发送模块13,用于在确定所述源位置信息不合法时,将包含了所述源位置信息的限制接入信息发送给接入所述基站设备的用户设备,以限制接收到所述限制接入信息的用户设备接入所述源位置信息对应的基站设备。The sending module 13 is configured to, when it is determined that the source location information is illegal, send restricted access information including the source location information to the user equipment accessing the base station equipment, so as to restrict receiving the restricted access information. The user equipment that enters the information accesses the base station equipment corresponding to the source location information.

可选地,所述控制设备还包括:判断模块14,其中:Optionally, the control device further includes: a judging module 14, wherein:

判断模块14,用于在对所述源位置信息的合法性进行判定之前,根据接收到的所述源位置信息,判断所述源位置信息是否是特殊位置区标识;A judging module 14, configured to judge whether the source location information is a special location area identifier according to the received source location information before judging the validity of the source location information;

在判断结果为所述源位置信息是特殊位置区标识时,统计设定时间周期内接收到包含所述特殊位置区标识的位置更新信息的第一次数;When the judgment result is that the source location information is a special location area identifier, count the first number of location update information containing the special location area identifier received within a set time period;

在判断结果为所述源位置信息不是特殊位置区标识时,统计接收到包含所述源位置信息的位置更新信息的第二次数。When the judging result is that the source location information is not a special location area identifier, count the second times of receiving location update information including the source location information.

具体地,所述判定模块12,具体用于将统计得到的所述第一次数与设定第一阈值进行比较;Specifically, the determination module 12 is specifically configured to compare the statistically obtained first number with a set first threshold;

在比较结果是所述第一次数大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息不合法;When the comparison result is that the first number is greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is illegal;

在比较结果是所述第一次数不大于设定第一阈值时,确定属于特殊位置区标识的所述源位置信息合法。When the comparison result is that the first number is not greater than the set first threshold, it is determined that the source location information belonging to the special location area identifier is legal.

所述特殊位置区标识至少包含了0标识、65534标识、65535标识。The special location area identifier includes at least a 0 identifier, a 65534 identifier, and a 65535 identifier.

所述判定模块12,具体用于将统计得到的所述第二次数与设定第二阈值进行比较;The determination module 12 is specifically configured to compare the second number of times obtained through statistics with a set second threshold;

在比较结果是所述第二次数大于设定第二阈值时,确定所述源位置信息不合法;When the comparison result is that the second number of times is greater than the set second threshold, it is determined that the source location information is illegal;

在比较结果是所述第二次数不大于设定第二阈值时,确定所述源位置信息合法。When the comparison result is that the second number of times is not greater than the set second threshold, it is determined that the source location information is legal.

所述判定模块12,具体用于在判断结果为所述源位置信息不是特殊位置区标识时,判断所述源位置信息是否属于所述基站设备的相邻基站的位置信息;The judging module 12 is specifically configured to judge whether the source location information belongs to the location information of a neighboring base station of the base station device when the judging result is that the source location information is not a special location area identifier;

在确定所述源位置信息不属于所述基站设备的相邻基站的位置信息时,确定所述源位置信息不合法。When it is determined that the source location information does not belong to the location information of the neighboring base stations of the base station device, it is determined that the source location information is illegal.

可选地,所述控制设备还包括:伪基站确定模块15,其中:Optionally, the control device further includes: a pseudo base station determining module 15, wherein:

伪基站确定模块15,用于在确定所述源位置信息不合法之后,确定所述源位置信息对应的基站设备是伪基站设备,并确定发送所述位置更新信息的基站设备的设备标识,查找发送所述位置更新信息的基站设备的相邻基站设备的设备标识,生成伪基站设备的信息列表,其中,所述信息列表中包含了发送所述位置更新信息的基站设备的设备标识、查找到的所述相邻基站设备的设备标识和所述源位置信息。The fake base station determination module 15 is used to determine that the base station device corresponding to the source location information is a fake base station device after determining that the source location information is illegal, and determine the device identifier of the base station device that sends the location update information, and search for The equipment identification of the adjacent base station equipment of the base station equipment that sends the location update information, and generates an information list of the pseudo base station equipment, wherein the information list includes the equipment identification of the base station equipment that sends the location update information, the found The device identifier of the neighboring base station device and the source location information.

所述发送模块13,具体用于将包含了所述信息列表的限制接入信息发送给接入所述发送所述位置更新信息的基站设备的用户设备。The sending module 13 is specifically configured to send the restricted access information including the information list to the user equipment accessing the base station device that sends the location update information.

需要说明的是,本发明实施例三所述的控制设备可以是基站设备中的逻辑部件,也可以是基站设备的物理实体单元,还可以是基站设备之外的第三控制设备,这里不做限定。It should be noted that the control device described in Embodiment 3 of the present invention may be a logical component in the base station device, or may be a physical entity unit of the base station device, or may be a third control device other than the base station device, which is not described here. limited.

实施例四:Embodiment four:

如图4所示,为本发明实施例四提供的一种用户设备的结构示意图,本发明实施例四是与本发明实施例一~本发明实施例三在同一发明构思下的发明,所述用户设备包括:接收模块21和限制接入模块22,其中:As shown in FIG. 4 , it is a schematic structural diagram of a user equipment provided by Embodiment 4 of the present invention. Embodiment 4 of the present invention is an invention under the same inventive concept as Embodiment 1 to Embodiment 3 of the present invention. The user equipment includes: a receiving module 21 and an access restriction module 22, wherein:

接收模块21,用于接收基站设备发送的限制接入信息,其中,所述限制接入信息中包含了限制接入的位置信息。The receiving module 21 is configured to receive access restriction information sent by the base station equipment, wherein the access restriction information includes location information of access restriction.

限制接入模块22,用于根据所述限制接入的位置信息,拒绝接入所述位置信息对应的基站设备。The access restriction module 22 is configured to refuse access to the base station equipment corresponding to the location information according to the location information of the access restriction.

需要说明的是,本发明实施例四所述的用户设备可以是实体单元,还可以是用户设备内部集成的逻辑部件,这里不做限定。It should be noted that the user equipment described in Embodiment 4 of the present invention may be a physical unit, or may be a logic component integrated inside the user equipment, which is not limited here.

实施例五:Embodiment five:

如图5所示,为本发明实施例五提供的一种限制用户设备接入基站设备的系统的结构示意图,本发明实施例五是与本发明实施例一~本发明实施例四在同一发明构思下的发明,所述系统包括:基站设备31、用户设备32和控制设备33,其中:As shown in Figure 5, it is a schematic structural diagram of a system for restricting user equipment from accessing base station equipment provided by Embodiment 5 of the present invention. Embodiment 5 of the present invention is the same invention as Embodiment 1 to Embodiment 4 of the present invention. The invention under the conception, the system includes: base station equipment 31, user equipment 32 and control equipment 33, wherein:

所述控制设备具备本发明实施例三所述的功能,用户设备具备了本发明实施例四所述的功能,基站设备可以是合法基站设备,也可以是不合法的、伪基站设备。The control device has the functions described in Embodiment 3 of the present invention, the user equipment has the functions described in Embodiment 4 of the present invention, and the base station equipment can be legitimate base station equipment, or illegal and pseudo base station equipment.

本领域的技术人员应明白,本发明的实施例可提供为方法、装置(设备)、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, devices (devices), or computer program products. Accordingly, the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

本发明是参照根据本发明实施例的方法、装置(设备)和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices) and computer program products according to embodiments of the invention. It should be understood that each procedure and/or block in the flowchart and/or block diagram, and a combination of procedures and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions may be provided to a general purpose computer, special purpose computer, embedded processor, or processor of other programmable data processing equipment to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing equipment produce a An apparatus for realizing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.

这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions The device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.

这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device, causing a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process, thereby The instructions provide steps for implementing the functions specified in the flow chart or blocks of the flowchart and/or the block or blocks of the block diagrams.

尽管已描述了本发明的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。While preferred embodiments of the invention have been described, additional changes and modifications to these embodiments can be made by those skilled in the art once the basic inventive concept is appreciated. Therefore, it is intended that the appended claims be construed to cover the preferred embodiment as well as all changes and modifications which fall within the scope of the invention.

显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the present invention without departing from the spirit and scope of the present invention. Thus, if these modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalent technologies, the present invention also intends to include these modifications and variations.

Claims (16)

1. a method for restricting user equipment access base station equipment, is characterized in that, comprising:
Receive the location updating message that base station equipment sends, wherein, described location updating message is for characterizing the position handover event of the subscriber equipment generation accessing described base station equipment, the source location information used before containing subscriber equipment occurrence positions handover event;
The legitimacy of described source location information is judged;
When determining that described source location information is illegal, the restriction access information containing described source location information is sent to the subscriber equipment accessing described base station equipment, access base station equipment corresponding to described source location information to limit the subscriber equipment receiving described restriction access information.
2. the method for claim 1, is characterized in that, before judging the legitimacy of described source location information, described method also comprises:
According to the described source location information received, judge whether described source location information is specific position district mark;
When judged result to be described source location information be specific position district mark, in the statistics setting-up time cycle, receive first number of the location updating message comprising described specific position district mark;
When judged result is described source location information Bu Shi specific position district mark, statistics receives second number of the location updating message comprising described source location information.
3. method as claimed in claim 2, is characterized in that, judge, comprising the legitimacy of described source location information:
Compare adding up described first number obtained with setting first threshold;
Comparative result be described first number be greater than setting first threshold time, the described source location information determining to belong to specific position district mark is illegal;
Comparative result be described first number be not more than setting first threshold time, the described source location information determining to belong to specific position district mark is legal.
4. method as claimed in claim 2 or claim 3, is characterized in that, described specific position district mark at least contains 0 mark, 65534 marks, 65535 marks.
5. method as claimed in claim 2, is characterized in that, judge, comprising the legitimacy of described source location information:
Compare adding up described second number obtained with setting Second Threshold;
Comparative result be described second number be greater than setting Second Threshold time, determine that described source location information is illegal;
Comparative result be described second number be not more than setting Second Threshold time, determine that described source location information is legal.
6. method as claimed in claim 2, is characterized in that, judge, comprising the legitimacy of described source location information:
When judged result is described source location information Bu Shi specific position district mark, judge whether described source location information belongs to the positional information of the adjacent base station of described base station equipment;
When determining that described source location information does not belong to the positional information of the adjacent base station of described base station equipment, determine that described source location information is illegal.
7. the method as described in claim 1 or 3 or 5 or 6, it is characterized in that, after determining that described source location information is illegal, described method also comprises:
Determine that base station equipment corresponding to described source location information is pseudo-base station equipment; And
Determine the device identification of the base station equipment sending described location updating message, search the device identification of the adjacent base station equipment of the base station equipment sending described location updating message, generate the information list of pseudo-base station equipment, wherein, the device identification containing the base station equipment sending described location updating message in described information list, the device identification of described adjacent base station equipment found and described source location information;
The restriction access information containing described source location information is sent to the subscriber equipment accessing described base station equipment, comprising:
The restriction access information containing described information list is sent to the subscriber equipment of the base station equipment of the described location updating message of the described transmission of access.
8. a method for restricting user equipment access base station equipment, is characterized in that, comprising:
Subscriber equipment receives the restriction access information that base station equipment sends, and wherein, contains the positional information of restriction access in described restriction access information; And
According to the positional information of described restriction access, the base station equipment that the described positional information of refusal access is corresponding.
9. a control appliance for restricting user equipment access base station equipment, is characterized in that, comprising:
Receiver module, for receiving the location updating message that base station equipment sends, wherein, described location updating message is for characterizing the position handover event of the subscriber equipment generation accessing described base station equipment, the source location information used before containing subscriber equipment occurrence positions handover event;
Determination module, for judging the legitimacy of described source location information;
Sending module, for when determining that described source location information is illegal, the restriction access information containing described source location information is sent to the subscriber equipment accessing described base station equipment, access base station equipment corresponding to described source location information to limit the subscriber equipment receiving described restriction access information.
10. control appliance as claimed in claim 9, it is characterized in that, described control appliance also comprises:
Judge module, for before judging the legitimacy of described source location information, according to the described source location information received, judges whether described source location information is specific position district mark;
When judged result to be described source location information be specific position district mark, in the statistics setting-up time cycle, receive first number of the location updating message comprising described specific position district mark;
When judged result is described source location information Bu Shi specific position district mark, statistics receives second number of the location updating message comprising described source location information.
11. control appliances as claimed in claim 10, is characterized in that,
Described determination module, specifically for comparing adding up described first number obtained with setting first threshold;
Comparative result be described first number be greater than setting first threshold time, the described source location information determining to belong to specific position district mark is illegal;
Comparative result be described first number be not more than setting first threshold time, the described source location information determining to belong to specific position district mark is legal.
12. control appliances as described in claim 10 or 11, is characterized in that, described specific position district mark at least contains 0 mark, 65534 marks, 65535 marks.
13. control appliances as claimed in claim 10, is characterized in that,
Described determination module, specifically for comparing adding up described second number obtained with setting Second Threshold;
Comparative result be described second number be greater than setting Second Threshold time, determine that described source location information is illegal;
Comparative result be described second number be not more than setting Second Threshold time, determine that described source location information is legal.
14. control appliances as claimed in claim 10, is characterized in that,
Described determination module, during specifically for being described source location information Bu Shi specific position district mark in judged result, judges whether described source location information belongs to the positional information of the adjacent base station of described base station equipment;
When determining that described source location information does not belong to the positional information of the adjacent base station of described base station equipment, determine that described source location information is illegal.
15. control appliances as described in claim 9 or 11 or 13 or 14, it is characterized in that, described control appliance also comprises:
Pseudo-base station determination module, for after determining that described source location information is illegal, determine that base station equipment corresponding to described source location information is pseudo-base station equipment, and determine the device identification of the base station equipment sending described location updating message, search the device identification of the adjacent base station equipment of the base station equipment sending described location updating message, generate the information list of pseudo-base station equipment, wherein, the device identification of the base station equipment sending described location updating message is contained in described information list, the device identification of the described adjacent base station equipment found and described source location information,
Described sending module, specifically for sending to the subscriber equipment of the base station equipment of the described location updating message of the described transmission of access by the restriction access information containing described information list.
16. 1 kinds of subscriber equipmenies, is characterized in that, comprising:
Receiver module, for receiving the restriction access information that base station equipment sends, wherein, contains the positional information of restriction access in described restriction access information;
Restriction access module, for the positional information according to described restriction access, the base station equipment that the described positional information of refusal access is corresponding.
CN201310517208.6A 2013-10-28 2013-10-28 A kind of method and apparatus of restricting user equipment access base station equipment Active CN104581874B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310517208.6A CN104581874B (en) 2013-10-28 2013-10-28 A kind of method and apparatus of restricting user equipment access base station equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310517208.6A CN104581874B (en) 2013-10-28 2013-10-28 A kind of method and apparatus of restricting user equipment access base station equipment

Publications (2)

Publication Number Publication Date
CN104581874A true CN104581874A (en) 2015-04-29
CN104581874B CN104581874B (en) 2018-06-22

Family

ID=53096835

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310517208.6A Active CN104581874B (en) 2013-10-28 2013-10-28 A kind of method and apparatus of restricting user equipment access base station equipment

Country Status (1)

Country Link
CN (1) CN104581874B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108513301A (en) * 2017-02-23 2018-09-07 中国移动通信有限公司研究院 A kind of disabled user's recognition methods and device
CN109362100A (en) * 2018-12-26 2019-02-19 中国联合网络通信集团有限公司 A kind of base station appraisal procedure and system based on communication signaling
CN111328078A (en) * 2018-12-17 2020-06-23 中国移动通信集团北京有限公司 Method and device for positioning pseudo base station

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330714A (en) * 2007-06-20 2008-12-24 华为技术有限公司 Wireless access method, system and apparatus
CN101547495A (en) * 2008-03-27 2009-09-30 华为技术有限公司 Method for reselecting cell, terminal and system
CN102625351A (en) * 2012-02-28 2012-08-01 北京拓明科技有限公司 Location method of simulation base station based on A interface signal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330714A (en) * 2007-06-20 2008-12-24 华为技术有限公司 Wireless access method, system and apparatus
CN101547495A (en) * 2008-03-27 2009-09-30 华为技术有限公司 Method for reselecting cell, terminal and system
CN102625351A (en) * 2012-02-28 2012-08-01 北京拓明科技有限公司 Location method of simulation base station based on A interface signal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108513301A (en) * 2017-02-23 2018-09-07 中国移动通信有限公司研究院 A kind of disabled user's recognition methods and device
CN111328078A (en) * 2018-12-17 2020-06-23 中国移动通信集团北京有限公司 Method and device for positioning pseudo base station
CN111328078B (en) * 2018-12-17 2023-04-28 中国移动通信集团北京有限公司 A method and device for locating a pseudo base station
CN109362100A (en) * 2018-12-26 2019-02-19 中国联合网络通信集团有限公司 A kind of base station appraisal procedure and system based on communication signaling
CN109362100B (en) * 2018-12-26 2021-08-03 中国联合网络通信集团有限公司 Base station evaluation method and system based on communication signaling

Also Published As

Publication number Publication date
CN104581874B (en) 2018-06-22

Similar Documents

Publication Publication Date Title
US12200493B2 (en) Source base station, UE, method in wireless communication system
EP3639544B1 (en) Rogue unit detection information
KR101597388B1 (en) Secure remote subscription management
CN112584495B (en) Method for paging, user equipment, radio frequency base station and integrated circuit thereof
AU2010350963B2 (en) Method and system for controlling Machine Type Communication equipment to access network
TWI397339B (en) Method of setting radio access capability and related communication device
EP2614663B1 (en) Nas communication method and apparatus in mobile telecommunication system
WO2020090764A1 (en) SECURITY PROCEDURE FOR UE's IN 5GLAN GROUP COMMUNICATION
US9642068B2 (en) Method, network device, and user equipment for controlling access to core network
US20100190496A1 (en) Method to generate neighbor list femto cell enviroment
US20170245307A1 (en) Method and device for sending random access signalling
US10448286B2 (en) Mobility in mobile communications network
EP3596985B1 (en) Method and apparatus for protection of privacy in paging of user equipment
WO2014032502A1 (en) Terminal access method and system, and terminal
US20130165077A1 (en) Method and apparatus for identifying fake networks
CN108293259B (en) NAS message processing and cell list updating method and equipment
KR20120112753A (en) Method and apparatus for managing handover of a mobile station from a macro cell to a femto cell
CN104581874B (en) A kind of method and apparatus of restricting user equipment access base station equipment
CN112956226B (en) Isolating fake base stations in communication systems
TWI604743B (en) Dynamic public warning system deactivation
US10567951B1 (en) Dynamic identities in a mobile device
CN101431754A (en) Method for preventing clone terminal access
GB2458102A (en) Providing authorised access to a cellular communication network (100) via an access point using the transmitted identification of wireless communication units
US9480009B2 (en) Method and apparatus for detecting cell identity conflict

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant