CN110178395A - Pseudo-base station recognition methods and terminal - Google Patents

Pseudo-base station recognition methods and terminal Download PDF

Info

Publication number
CN110178395A
CN110178395A CN201780083714.5A CN201780083714A CN110178395A CN 110178395 A CN110178395 A CN 110178395A CN 201780083714 A CN201780083714 A CN 201780083714A CN 110178395 A CN110178395 A CN 110178395A
Authority
CN
China
Prior art keywords
base station
target cell
terminal
pseudo
characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780083714.5A
Other languages
Chinese (zh)
Inventor
龙水平
董辰
衣强
李重锦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN110178395A publication Critical patent/CN110178395A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Abstract

The embodiment of the invention provides a kind of pseudo-base station recognition methods and relevant devices, this method comprises: terminal selection target cell;The terminal runs pseudo-base station recognizer according to the characteristic of the Target cell, obtain confidence level, the confidence level is used to indicate that the base station of the Target cell to be the credibility of pseudo-base station, produced by the pseudo-base station recognizer is trained as machine learning algorithm;When the confidence level is greater than or equal to the first confidence threshold value, the terminal determines that the base station of the Target cell is pseudo-base station.Produced by pseudo-base station recognizer is trained as machine learning algorithm, pseudo-base station recognizer is run according to the characteristic of the Target cell so as to realize, obtains confidence level, truth identification is carried out come the base station to Target cell by confidence level.Pseudo-base station recognizer is more complicated than feature Data Matching algorithm, is easier to extend new characteristic, and the recognition success rate to pseudo-base station can be improved.

Description

Pseudo-base station recognition methods and terminal Technical field
The present invention relates to the communications field more particularly to a kind of pseudo-base station recognition methods and terminals.
Background technique
The pseudo-base station of illegal organization or personal control, except public mobile network, it (such as broadcasts the public land mobile network of certain mobile operator by the base station of certain mobile communication carrier that disguises oneself as and identifies (public land mobile network ID, PLMN ID), terminal (or mobile terminal can be inveigled, mobile station, mobile phone, user equipment etc.) to it initiate network registry or position updating request, and then extract the information of terminal, such as, international mobile subscriber identity (International Mobile Subscriber Identification Number, IMSI), temporarily moved subscriber identifies (Temporary Mobile Subscriber Identity, TMSI), or International Mobile Station Equipment Identification (International Mobile Equipment Identity, IMEI), the transmitting etc. of information can also be carried out with terminal, such as fraud text message, hostile network link or harassing and wrecking short message etc. are sent to terminal, to jeopardize user.Pseudo-base station can carry out network registry deception to terminal, can forge arbitrary numbers to terminal and send short message, is i.e. pseudo-base station is not only a base station, is also equipped with certain mobile network core network function.Pseudo-base station emits stronger wireless signal, the covering of one or more cellular cells (cellular cell) signal can be formed, and it can be with system broadcasts parameters such as changing cells marks, terminal is in cell selection (or searching net) process or cell re-selection procedure of the standard of execution, the Target cell of selection may be the cell (abbreviation pseudo-base station cell, or pseudo- cell) that some pseudo-base station is formed.After terminal selection target cell, network registry, resident, service request or the band of position can be can be carried out and updated.
The method of the existing anti-pseudo-base station of terminal (or anti-fake base station), generally using characteristic matching or intercept problems short message etc..Such as, in the anti-fake base station methods of characteristic matching (or characteristic parameter matching), specially, artificial statistics and experience based on pseudo-base station cell system broadcast parameter sample data, select several cell system broadcast parameters, and determine that pseudo-base station cell (often differs greatly to the common value range of these system broadcasts parameters with true base station cell, these parameters are because being referred to herein as characteristic), if several system broadcasts parameters of Target cell to be assessed match the common value range of the characteristic of pseudo-base station cell, the base station for then determining (or determination) Target cell is pseudo-base station, Target cell is pseudo- cell in other words.Wherein, the common value range of the system broadcasts parameter of pseudo-base station cell above-mentioned, for example, LAC value 0,65535, minimum receives level, maximum power level and cell reselection offset (cell reselect offset, CRO) and is often set as 0 etc..However, the system broadcasts parameter of novel pseudo-base station cell is hidden very strong, for example, it can reproducible periphery real ones cell system broadcasts parameter and make certain modification, this meeting is so that the matched anti-fake base station methods of characteristic fail.Problem SMS interception is that fraud text message, hostile network link or harassing and wrecking short message are identified by cloud short message big data analysis, and extract the characteristic information of these problems short message, then problem SMS interception application problem short message characteristic information being sent in terminal, the interception is applied and is detected to the short message that terminal receives, if compliance problem short message characteristic information, short message is then placed in intercepted state, not can be appreciated that intercepted problem short message at normal short-message users interface.Problem short message may be from legal operator mobile network or pseudo-base station.Problem SMS interception only has the function of suitably reducing pseudo-base station harm, but cannot identify pseudo-base station, not can avoid terminal and is inveigled by pseudo-base station.Therefore, existing pseudo-base station recognition methods has that pseudo-base station discrimination is low.
Summary of the invention
The embodiment of the invention provides a kind of pseudo-base station recognition methods and terminals, for improving the recognition success rate to pseudo-base station.
In a first aspect, providing a kind of pseudo-base station recognition methods, this method comprises: terminal selection target cell, after terminal gets the characteristic of Target cell, terminal runs pseudo-base station recognizer according to the characteristic of Target cell, obtains confidence level.Wherein, confidence level is used to indicate that the base station of Target cell to be the credibility of pseudo-base station, produced by pseudo-base station recognizer is trained as machine learning algorithm.Truth identification can be carried out to Target cell according to the confidence level, when confidence level is greater than or equal to the first confidence threshold value, terminal determines that the base station of Target cell is pseudo-base station, namely determines that Target cell is pseudo- cell.Terminal determines that the base station of the Target cell for relevant operation can be performed after pseudo-base station, avoids pseudo-base station bring from endangering.Produced by the pseudo-base station recognizer is trained by machine learning algorithm using a large amount of true, pseudo-base station cell sample datas (referred to as true base station data, pseudo-base station data), recognition performance is high, and it can constantly train, quickly follow-up pseudo-base station technological evolvement, so that the recognition success rate to pseudo-base station can be improved.
In the first possible implementation of the first aspect, pseudo-base station recognizer is run according to the characteristic of Target cell in terminal, after obtaining confidence level, this method further include: when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and terminal detect Target cell meet the first preset condition when, terminal determine Target cell base station be pseudo-base station.Second confidence threshold value is less than the first confidence threshold value, if the confidence bit of Target cell is between the first confidence threshold value and the second confidence threshold value, the base station for indicating Target cell is doubtful pseudo-base station, and the first preset condition is the behavioural information for the cell generation that base station is pseudo-base station, if therefore terminal also detects that Target cell the first preset condition of satisfaction, terminal determine that the base station of Target cell is pseudo-base station.In this way, because truth identification of the confidence level to Target cell is described in terms of probability, when confidence interval belonging to confidence level is in doubtful pseudo-base station, by the auxiliary judgment of the first preset condition, terminal may recognize that confidence level is the Target cell of pseudo-base station less than the first confidence threshold value but base station.
In the second possible implementation of the first aspect, when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and terminal detect Target cell meet the first preset condition when, terminal determines that the base station of Target cell is pseudo-base station, it include: when confidence level less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and terminal detect Target cell meet the first preset condition when, terminal saves the characteristic of Target cell, and the characteristic of Target cell is identified as pseudo-base station data.In this case, pseudo-base station recognizer is not ideal enough to the identification of Target cell, after terminal saves the characteristic of Target cell, terminal can be by being sent to the equipment such as cloud server for the characteristic of the Target cell, so that cloud server determines that the characteristic of the Target cell is pseudo-base station data, and pseudo-base station recognizer is further trained using the characteristic of the Target cell for pseudo-base station data.
In a third possible implementation of the first aspect, terminal saves the characteristic of Target cell, comprising: when pseudo-base station data, which save function, opens, terminal saves the characteristic of Target cell;Alternatively, terminal saves the characteristic of Target cell when Target cell meets pseudo-base station data and saves rule;Alternatively, when pseudo-base station data save function open, and Target cell meet pseudo-base station data save rule when, terminal save Target cell characteristic.In this manner it is achieved that the flexible preservation to the characteristic for the Target cell for being identified as pseudo-base station data at the terminal, facilitates the control for saving expense to terminal data, and can filter out the characteristic of satisfactory pseudo-base station cell.
In a fourth possible implementation of the first aspect, the first preset condition includes at least one the following conditions: terminal intercepts the problem of Target cell is sent short message;Terminal is rejected when requesting to Target cell launch position area update;Terminal It is rejected when to Target cell initiating business request;Terminal loses Target cell signal within a preset time;Alternatively, the Location Area Code LAC of Target cell changes.These conditions are the behavioural information that the cell that base station is pseudo-base station generates.
In the fifth possible implementation of the first aspect, pseudo-base station recognizer is run according to the characteristic of Target cell in terminal, after obtaining confidence level, this method further include: when confidence level is less than or equal to four confidence threshold values, terminal determines that the base station of Target cell is true base station, to terminal by Target cell execute predetermined registration operation, predetermined registration operation include network registry, the band of position update, cell be resident and initiating business request in any one.After terminal is true base station by the base station that credible degree identification goes out Target cell, predetermined registration operation is executed by Target cell, so that terminal is in safer environment.
In the sixth possible implementation of the first aspect, pseudo-base station recognizer is run according to the characteristic of Target cell in terminal, after obtaining confidence level, this method further include: when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, and terminal detect Target cell meet the second preset condition when, terminal determines that the base station of Target cell is true base station.Third confidence threshold value is greater than the 4th confidence threshold value.If the confidence bit of Target cell is between the 4th confidence threshold value and third confidence threshold value, the base station for indicating Target cell is doubtful true base station, and the second preset condition is the behavioural information for the cell generation that base station is true base station, if therefore terminal also detects that Target cell the second preset condition of satisfaction, terminal determine that the base station of Target cell is true base station.In this way, because truth identification of the confidence level to Target cell is described in terms of probability, when confidence interval belonging to confidence level is in doubtful true base station, by the auxiliary judgment of the second preset condition, terminal may recognize that confidence level is greater than the 4th confidence threshold value but base station is the cell of true base station.
In a seventh possible implementation of the first aspect, when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, and terminal detect Target cell meet the second preset condition when, terminal determines that the base station of Target cell is true base station, it include: when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, and terminal detect Target cell meet the second preset condition when, terminal saves the characteristic of Target cell, and the characteristic of Target cell is identified as true base station data.In this case, pseudo-base station recognizer is not ideal enough to the identification of Target cell, after terminal saves the characteristic of Target cell, terminal can be by being sent to the equipment such as cloud server for the characteristic of the Target cell, so that cloud server determines that the characteristic of the Target cell is true base station data, and pseudo-base station recognizer is further trained using the characteristic for the Target cell that this is true base station data.
In the 8th kind of possible implementation of first aspect, terminal saves the characteristic of Target cell, comprising: when base station data of taking seriously saves function unlatching, terminal saves the characteristic of Target cell;Alternatively, terminal saves the characteristic of Target cell when Target cell meets true base station data and saves rule;Alternatively, base station data saves function and opens surely, and when Target cell meets true base station data and saves rule, terminal saves the characteristic of Target cell.In this manner it is achieved that the flexible preservation to the characteristic for the Target cell for being identified as true base station data at the terminal, facilitates the control for saving expense to terminal data, and can filter out the characteristic of satisfactory true base station cell.
In the 9th kind of possible implementation of first aspect, the second preset condition includes at least one the following conditions: terminal establishes call or data service in Target cell;Terminal is completed to authenticate and enters encrypted secure modes by Target cell;Alternatively, terminal is completed to switch in Target cell.These conditions are the behavioural information that the cell that base station is true base station generates.
In the tenth kind of possible implementation of first aspect, Target cell is global system for mobile communications GSM cell.It because current pseudo-base station majority is the base station GSM, therefore is Scene realization this method of GSM cell for Target cell, it can be effective to most of pseudo-base stations.
In a kind of the tenth possible implementation of first aspect, terminal runs pseudo-base station according to the characteristic of Target cell Recognizer obtains confidence level, comprising: when terminal detects the LAC of Target cell and currently the LAC that saves is not identical, terminal runs pseudo-base station recognizer according to the characteristic of Target cell, obtains confidence level.This can reduce power consumption and improve recognition efficiency.
In the 12nd kind of possible implementation of first aspect, determine that the base station of Target cell is this method further include: terminal forbids selection target cell again in preset duration after pseudo-base station in terminal.In this way, by forbidding selection target cell again in preset duration, it is possible to reduce interference of the pseudo-base station cell to terminal, while reducing the influence of selection of the terminal to spoofed true base station cell.
In the 13rd kind of possible implementation of first aspect, characteristic includes cell selection and cell reselection information, mesh information, business function information, at least one of regional information and temporal information.Any in these types of information can also include a variety of specific cell informations.
Second aspect provides a kind of terminal, which has the function of realizing terminal in above-mentioned first aspect the method.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software include one or more modules corresponding with above-mentioned function.
The third aspect provides a kind of terminal, which includes processor and memory.The processor may be configured to that terminal is supported to execute corresponding function in above-mentioned first aspect the method, such as processor is configured for: selection target cell;Pseudo-base station recognizer is run according to the characteristic of Target cell, obtains confidence level, confidence level is used to indicate that the base station of Target cell to be the credibility of pseudo-base station, produced by pseudo-base station recognizer is trained as machine learning algorithm;When confidence level is greater than or equal to the first confidence threshold value, determine that the base station of Target cell is pseudo-base station.
Fourth aspect provides a kind of chip apparatus, and the chip apparatus includes processing unit, and the processing unit is for executing method described in above-mentioned first aspect.
5th aspect, provides a kind of chip apparatus, the chip apparatus includes processor and memory.The memory includes instruction, and the processor operation described instruction is to execute method described in above-mentioned first aspect.
6th aspect, provides a kind of chip system, which includes processor, for supporting terminal to realize function involved in above-mentioned first aspect, such as data and/or information involved in transmission or the processing above method.In a kind of possible design, the chip system further includes memory, the memory, for saving the necessary program instruction of the network equipment and data.The chip system, can be made of chip, also may include chip and other discrete devices.
7th aspect provides a kind of computer program, including instruction, when run on a computer, so that computer executes method described in above-mentioned first aspect.
Eighth aspect provides a kind of computer readable storage medium, and the computer-readable recording medium storage has instruction, when described instruction is run on computers, so that computer executes method described in above-mentioned first aspect.
9th aspect, provides a kind of computer program product comprising instruction, when described instruction is run on computers, so that computer executes method described in above-mentioned first aspect.
In the embodiment of the present invention, confidence level can be obtained according to the characteristic of Target cell by running the pseudo-base station recognizer terminal based on machine learning, and determine whether the base station of Target cell is pseudo-base station according to confidence level.The pseudo-base station recognizer generated by the training of a large amount of characteristics, improves terminal to the discrimination of pseudo-base station.Also, the characteristic of doubtful base station can be sent to cloud server by terminal, be updated by cloud server to pseudo-base station recognizer, so that the technological evolvement for the pseudo-base station that persistently follows up, is continuously improved the discrimination of pseudo-base station.
Detailed description of the invention
Fig. 1 a is an a kind of schematic diagram of the scene that pseudo-base station recognition methods is related to provided in an embodiment of the present invention;
Fig. 1 b is another schematic diagram of scene shown in Fig. 1 a;
Fig. 2 is a kind of method flow diagram of pseudo-base station recognition methods provided in an embodiment of the present invention;
Fig. 3 is a kind of confidence threshold value relation schematic diagram that pseudo-base station recognition methods shown in Fig. 2 is related to;
Fig. 4 is a kind of method flow diagram of pseudo-base station recognition methods provided in an embodiment of the present invention;
Fig. 5 is the scene framework figure that the pseudo-base station recognition methods of embodiment illustrated in fig. 4 is related to;
Fig. 6 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 7 is a kind of hardware structural diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the invention provides a kind of pseudo-base station recognition methods and terminals, for improving the recognition success rate to pseudo-base station.
In order to facilitate each embodiment provided by the invention is understood, some terms that the embodiment of the present invention uses will be explained below, each embodiment can refer to following terms and explain hereinafter.
1, the pseudo-base station that the application mentions, it is the base station by illegal organization or personal control, except the pseudo-base station is independently of public mobile network, pass through the base station for certain mobile communication carrier that disguises oneself as, such as broadcast the PLMN ID of certain mobile operator, terminal (or mobile terminal can be inveigled, mobile station, mobile phone, user equipment etc.) to it initiate network registry or position updating request, and then extract the information of terminal, such as IMSI, TMSI or IMEI, the transmitting etc. of information can also be carried out with terminal, such as fraud text message is sent to terminal, hostile network link or harassing and wrecking short message etc..Pseudo-base station can carry out network registry deception to terminal, can forge arbitrary numbers to terminal and send short message, therefore, pseudo-base station is not only a base station, is also equipped with certain mobile network core network function.Pseudo-base station emits stronger wireless signal, can form the covering of one or more cellular cells (cellular cell) signal, and the system broadcasts parameter such as cell ID that can change each cell.
The basic principle of all kinds of pseudo-base station work is similar, the principle is general are as follows: pseudo-base station disguises oneself as a legitimate base station, then emit stronger cell signal, terminal is attracted to come to be resident and register, forgery short message is issued to terminal after obtaining the IMSI of terminal, and it is able to record the terminal for having sent and having forged short message, it avoids repeating to send, and terminal is kicked out of the cell in due course.
2, machine learning (Machine Learning, ML) is a multi-field cross discipline, is related to the multiple subjects such as probability theory, statistics, Approximation Theory, convextiry analysis, algorithm complexity theory.The learning behavior that the mankind were simulated or realized to computer how is specialized in, to obtain new knowledge or skills, the existing structure of knowledge is reorganized and is allowed to constantly improve the performance of itself.
Machine learning algorithm can be for example decision tree, random forests algorithm, logistic regression, SVM (Support Vector Machine, support vector machines), naive Bayesian, K nearest neighbor algorithm, K mean algorithm, Adaboost algorithm, neural network and markov etc..
After machine learning algorithm is trained or is learnt using a large amount of tagged data sample, can produce model instance, perhaps these model instances of function example or function example have the ability marked automatically to new data sample.
3, Location Area Code (location area code, LAC), in order to determine the position of mobile station, each public land mobile network (Public Land Mobile Network, PLMN the area of coverage) is divided into many position areas, and LAC can be used for identifying different position areas.One position area may include one or more cells.LAC believes in each Cell Broadcast CB It is sent in system message on road.Such as, base station this cell frequency and position area identification code (Location Area Identity are broadcasted to mobile phone by BCCH,) and the information such as neighboring community's broadcast control channel (Broadcast Control Channel, BCCH) frequency LAI.Wherein, LAI includes LAC.
4, the principle of LTE RRC (Long Term Evolution Radio Resource Control, long term evolution radio resource control) redirection attack: LTE pseudo-base station attracts LTE terminal to come to adhere to;It receives terminal and sends attach request later and before safe procedures starting, directly issue the refusal attachment of Non-Access Stratum (Non-access stratum, NAS) message;And then RRC ConnectionRelease message is issued, the message carries redirectedCarrierInfo information, instruction goes to 2G (2-Generation wireless telephone technology, second generation mobile communication technical specification) network and frequency point (ARFCN), the 2G network and frequency point are usually the pseudo-base station set up in advance, so that attacker be facilitated to implement to attack in next step.
5, terminal is according to criterion 1 (Criteria 1, C1) or the process of criterion 2 (Criteria 2, C2) selection cell:
1), for terminal when net is searched in booting, terminal selects C1 > 0 and the maximum cell of C1;
2) when, terminal carries out cell reselection, it is related to C2 criterion (or C2 algorithm).If one of following condition meets, cell reselection will be started;
(A) in 5 seconds calculating cycles, C1 is always less than 0;
(B) in 5 seconds calculating cycles, if current area and adjacent cell have identical LAC, when the C2 of adjacent cell is always more than the C2 value of serving cell, cell reselection can occur;If current area and adjacent cell have different LAC, the C1 of adjacent cell to be always more than the sum of C1 and cell reselection lag (Cell Reselection Hysteresis, CRH) of serving cell, cell reselection can occur.
Comprising above two condition, if having occurred and that cell reselection in previous 15 seconds, the C2 of new candidate cell 5dB higher than current service cell always must could initiate cell reselection in 5 seconds calculating cycles.
Wherein, C1=terminal receives average level-permission terminal access minimum levels;C2=C1+ cell reselection offset amount=terminal receives average level+(cell reselection offset amount-permission terminal access minimum levels).
Fig. 1 a is a kind of schematic diagram of a scenario that pseudo-base station recognition methods is related to provided in an embodiment of the present invention.As shown in Figure 1a, the scene that pseudo-base station recognition methods is related to includes base station 101 and terminal 102, which can communicate to connect with the base station 101.
Terminal 102 can include but is not limited to mobile phone, tablet computer, personal digital assistant (Personal Digital Assistant, PDA), point-of-sale terminal (Point of Sales, POS), vehicle-mounted computer etc..
The base station 101 can form one or more cellular cells, as shown in Figure 1 b with broadcast singal.
In some instances, base station 101 can be true base station, and true base station forms true base station cell.True base station is the legitimate base station of operator mobile network, and terminal 102 can carry out call and data service etc. by true base station cell access carrier mobile network, change persistent district or switching cell, and by true base station cell.
In other examples of the invention, which is also possible to pseudo-base station, and the definition of pseudo-base station can refer to description above.When base station 101 is pseudo-base station, pseudo-base station 101 emits signal, forms pseudo-base station cell.Terminal 102 may select the pseudo-base station cell in cell selection (or searching net) process or cell re-selection procedure of the standard of execution.After terminal selects the pseudo-base station cell, the operations such as network registry, resident, service request or band of position update can be can be carried out.
It, can also be with terminal 102 since pseudo-base station 101 can extract the information such as IMSI, TMSI and IMEI of terminal 102 The transmitting etc. of information is carried out, such as pseudo-base station 101 sends fraud text message, hostile network link or harassing and wrecking short message etc. to terminal 102, to jeopardize use of the user to terminal 102.Pseudo-base station 101 is but also terminal 102 is actually not attached to normal movement network, and terminal is normally conversed and data service etc. can not all carry out.
In conjunction with content above, hereafter the pseudo-base station recognition methods of the embodiment of the present invention and terminal are described in detail.
Fig. 2 is a kind of method flow diagram of pseudo-base station recognition methods provided in an embodiment of the present invention, and this method can be applied in the terminal in scene shown in Fig. 1 a.Referring to Fig. 2, the method for the embodiment of the present invention includes:
Step 201: terminal selection target cell.
Step 202: terminal runs pseudo-base station recognizer according to the characteristic of Target cell, obtains confidence level.
Step 203: when confidence level is greater than or equal to the first confidence threshold value, terminal determines that the base station of Target cell is pseudo-base station.
In step 201, terminal needs to carry out Target cell selection for access to mobile network, change persistent district or switching cell.Base station carries out signal broadcast, forms cell signal covering, and terminal can carry out Target cell selection, terminal may choose pseudo-base station cell at this time according to the broadcast singal of acquisition.
Specifically, by BCH (Broadcast Channel, broadcast channel) to terminal broadcast signal, which for example may include the information such as frequency correction signal, synchronization signal, this cell frequency and LAC and neighboring community's BCCH frequency for base station.Then, terminal can be according to C1 or C2 criterion come selection target cell.
Terminal selection target cell gets the broadcast singal of Target cell, and obtains the characteristic of Target cell from the broadcast singal, and this feature data are for calculating or assessing the credibility that Target cell is pseudo-base station.
In embodiments of the present invention, Target cell can be a plurality of types of cells, such as Target cell can be GSM (Global System for Mobile communication, global system for mobile communications) cell, and base station is the base station GSM;Alternatively, Target cell is 3G (3rd-Generation, 3rd generation mobile communication technology) network cell, base station is NodeB;Alternatively, Target cell is 4G (the 4th Generation mobile communication, fourth generation mobile communication technology) network cell, base station is LTE (Long Term Evolution, long term evolution)/base station 4G.Since current pseudo-base station majority is the base station GSM, for the convenience of description, the application is illustrated so that Target cell is GSM cell as an example.
Step 201 can be realized under several scenes, the specific implementation of step 201 will be described below, in these examples, terminal may all choose pseudo-base station cell.
Example one: terminal is to reside in the Idle state terminal of GSM network, which presses cell re-selection procedure selection target cell, to change resident cell (also referred to as serving cell).
For example, being greater than within the C2 of Target cell continuous 5 seconds serving cell C2, and Target cell and serving cell have identical LAC, then the terminal gravity treatment Target cell is as (newly) serving cell.In cell re-selection procedure, terminal may choose pseudo-base station cell.
Example two: when terminal is changed to resident GSM network from resident 4G/3G network, terminal presses cell-reselection procedure selection target cell.
The terminal for residing in 4G/3G network may be because that current network signal is deteriorated, and be changed to return back to GSM network.The GSM network cell selection of terminal may also choose pseudo-base station cell at this time.In addition, some pseudo-base stations may cause the signal quality (such as carrier/interface ratio) of the artificial network cell 4G/3G to be deteriorated, terminal backoff is forced to arrive by sending 4G/3G interference signal GSM network, then, then it is resident by GSM pseudo-base station cell attraction terminal.
Example three: when terminal is switched on, pass through cell-reselection procedure selection target cell.
When terminal booting, terminal carries out the selection of GSM network cell, to carry out network attachment (i.e. network registry), at this point, terminal is also possible to choose pseudo-base station cell.
The scene of above-mentioned three kinds of selection target cells is all terminal in the spontaneous cell reselection of Idle state or cell housing choice behavior, and in embodiments of the present invention, terminal, which can also be, carries out the selection of Target cell in connected state (i.e. terminal and serving cell has connection).Specific situation is as follows:
Example four: terminal is from 4G/3G network by redirecting selection target cell.
The terminal of connected state is redirected the triggering of instruction by 4G/3G network, may return back to GSM network and carry out cell selection.For example, 4G/3G network instruction terminal is redirected to 2G network, and indicates 2G adjacent cell frequency point information, capture terminal 2G adjacent cell signal simultaneously passes through 2G network originated traffic request (such as incoming call answering).
In redirecting scene, if terminal chooses a GSM pseudo-base station cell, (because pseudo-base station can not generally establish corresponding business) can then be refused by pseudo-base station cell in initiating business request, although the probability that this scene occurs is little, but once occurs, larger interference will be generated to user's using terminal.In addition, novel 4G/3G pseudo-base station may also first attract terminal to be resident under its cell, then inveigle terminal backoff to GSM network by redirecting, then attract terminal resident by GSM pseudo-base station cell.
Example five: terminal is when service condition switches GSM cell, the specified Target cell of search network and selection target cell.
For example, the switching of GSM serving cell in talking state or data service state, may all occur for terminal, network sends switching target small area information to terminal, terminal searching Target cell and selection target cell.The problems such as under this situation, terminal may choose pseudo-base station cell, cause switching that can not normally complete, cause call drop or data traffic interruptions.
In step 202, confidence level is used to indicate that the base station of Target cell to be the credibility of pseudo-base station, produced by pseudo-base station recognizer is trained as machine learning algorithm.
After terminal selection target cell, the characteristic of Target cell can be obtained from the signal that Target cell is broadcasted, which can be the signal that Target cell is broadcasted by BCH.In other words, the characteristic of Target cell can be extracted from the signal that Target cell is broadcasted and be obtained, and this feature data are for calculating or assessing the credibility that Target cell is pseudo-base station.
Characteristic includes cell selection and cell reselection information, mesh information, business function information, at least one of regional information and temporal information, is exemplified below:
This feature data include any one of cell selection and cell reselection information, mesh information, business function information, regional information or temporal information.
Alternatively, this feature data include any two kinds in cell selection and cell reselection information, mesh information, business function information, regional information and temporal information, for example, characteristic includes cell selection and cell reselection information and mesh information.
Or, this feature data include any three kinds in cell selection and cell reselection information, mesh information, business function information, regional information and temporal information, for example, characteristic includes cell selection and cell reselection information, mesh information and business function information.
Alternatively, this feature data include cell selection and cell reselection information, mesh information, business function information, regional information and temporal information in any four, for example, characteristic include cell selection and cell reselection information, mesh information, Business function information and regional information.
Alternatively, this feature data include cell selection and cell reselection information, mesh information, business function information, regional information and temporal information.
It is appreciated that any information in cell selection and cell reselection information, mesh information, business function information, regional information and temporal information can also include multiple specific cell informations.It is as follows about the detailed description of these specific cell informations:
1) cell selection and reselection information, including but not limited to: PLMN-ID, RXLEV-ACCESS-MIN (minimum access level), MS-TXPWR-MAX-CCH (terminal maximum transmission power), MAX-RETRANS (maximum retransmits number), TX-INTEGER (transmission time slot number);Reselecting parameters indicate (parameters indication, PI), cell reselection offset (cell reselect offset, CRO), temporary offset (temporary offset, TO), Penalty time (penalty time, PT), cell reselection lag (cell reselection hysteresis, CRH), current and previous Location Area Code (LAC), base station identity code (base station identity code, BSIC), cell ID (cell identity, CI).Cell selects and gravity treatment relevant information can be for one of in these information or any combination.
2) mesh information, including but not limited to: CCCH-CONF (common control channel configuration), BS-AG-BLKS-RES (access allows to retain block number), BA-PA-MFRMS (paging channel multi-frame number), T3212 (periodically updates duration), and whether there is or not match adjacent cell (BA1/BA2).Networking relevant information can be for one of in these information or any combination.
3) business function information, including but not limited to: whether supporting the information of GPRS, if support the information of urgent call (emergency call, EC).
4) regional information, including but not limited to: current location information of terminal (such as geographical location latitude and longitude information).
5) temporal information, including but not limited to: the current time information of terminal (such as the moon, day, week, hour, point).
Above-mentioned BA1 and BA2 are described as follows:
BA list (BA list), i.e. BCCH allocation information are used in cell selection, cell reselection or cell measurement.BA list is divided into Idle list (BA1) and Active list (BA2).Idle list: the list information is sent on BCCH by system information block type 2, and 32 frequency points are at most arranged in cell selection and gravity treatment when for terminal idle state.Active list: the list information is sent on BCCH by system information block type 5, frequency point therein be terminal should be measured under talking state face area's subdistrict frequency point, work in cell switching, can there is 32 altogether.
It is preset with pseudo-base station recognizer at the terminal, after terminal gets the characteristic of Target cell, in order to identify whether Target cell is pseudo-base station cell, terminal runs pseudo-base station recognizer according to the characteristic of Target cell, confidence level is obtained, which is used to indicate that the base station of Target cell to be the credibility of pseudo-base station.
Specifically, the characteristic of Target cell can be supplied to pseudo-base station recognizer by terminal, and pseudo-base station recognizer is calculated using this feature data, and export a confidence level.Confidence level can value, a possibility that value of the confidence level is bigger, and the base station for indicating the Target cell is pseudo-base station, be bigger in the range of 0 to 1, and a possibility that value of confidence level is smaller, and the base station for indicating the Target cell is true base station is bigger.In other words, confidence level is a parameter for describing probability event.
For example, pseudo-base station recognizer is produced by being trained as SVM algorithm at this time, and pseudo-base station recognizer is specially a SVM model instance so that machine learning algorithm is SVM algorithm as an example.Because SVM algorithm is two sorting algorithms, the base station of cell can be classified as true base station and pseudo-base station by pseudo-base station recognizer, and export confidence level with regard to the result of above-mentioned classification.Specifically, cell selection and cell reselection information, mesh information, business function information, regional information and time of the terminal by Target cell is believed One or more information are supplied to the use of pseudo-base station recognizer in breath, such as, terminal selects cell and the TX-INTEGER (transmission time slot number) in reselection information, cell reselection offset (CRO), Penalty time (PT), duration is periodically updated in mesh information, and the current location information etc. of the terminal or Target cell in regional information is supplied to pseudo-base station recognizer and carries out operation, after pseudo-base station recognizer is calculated using these characteristics, obtain confidence level 0.95, the base station of the confidence level 0.95 expression Target cell is that the probability of pseudo-base station is 95%.
In embodiments of the present invention, produced by pseudo-base station recognizer can train the machine learning algorithm (program) of selection as the sample data of a large amount of cell, wherein, the sample data of the cell includes the sample data of pseudo-base station cell and the sample data of true base station cell.It is appreciated that the sample data of cell can be used to indicate that the feature of cell.
Since pseudo-base station recognizer is generated by machine learning algorithm training, pseudo-base station recognizer has the feature performance benefit of machine learning algorithm, and the description as described in machine learning algorithm can refer to the content of machine learning part above.Machine learning algorithm can be clustering algorithm or sorting algorithm described above, such as K-means, k- neighbour, decision tree, Logistic recurrence, SVM or bayesian algorithm etc., can also be with other existing machine learning algorithms, and it will not go into details herein.
In one example, step 202 may include: when terminal detects the LAC of Target cell and currently the LAC that saves is not identical, and terminal runs pseudo-base station recognizer according to the characteristic of Target cell, obtains confidence level.
Specifically, the LAC that terminal is saved to the LAC of Target cell and currently is compared, if the LAC of Target cell is different with the LAC currently saved, terminal runs pseudo-base station recognizer according to the characteristic of Target cell, obtains confidence level.If the LAC of Target cell is identical with the LAC currently saved, it is Great possibility that the base station for showing the Target cell, which is true base station, then terminal does not run pseudo-base station recognizer.The LAC currently saved the i.e. LAC of serving cell, alternatively, the LAC currently saved can be the LAC that terminal updates the GSM network current location obtained by joint attachment/co-location.Serving cell can be the cell cell that perhaps terminal currently has the cell of connection or terminal currently to carry out business (for example, call or data service) that Idle state terminal is currently resident.Under joint attachment/co-location update status, the terminal for residing in 4G/3G network can obtain the LAC of GSM network current location by the network cell 4G/3G.
According to the rule of pseudo-base station, if the LAC of Target cell is identical with the LAC currently saved, it is Great possibility that the base station for then showing the Target cell, which is true base station, it will be extra or uneconomic for executing pseudo-base station recognizer again at this time, to detect the LAC of Target cell when terminal and when currently the LAC that saves is not identical, terminal is according to the characteristic of Target cell operation pseudo-base station recognizer.In this way, having saved the resources such as electric energy and the calculated performance of terminal, reduce power consumption, improves the networking speeds and recognition efficiency of terminal.
It is appreciated that operation pseudo-base station recognizer opportunity can there are many, the application is not construed as limiting this.In one example, because pseudo-base station recognizer has certain calculation amount and power consumption, it is possible to after the opportunity for running pseudo-base station recognizer is placed on cell reselection (or cell-reselection procedure) completion, can reduce the power consumption of terminal in this way.In some other example, pseudo-base station recognizer can also be run on other opportunitys, in some instances, pseudo-base station recognizer can be run during selection target cell, for example, pseudo-base station recognizer can be run, before C2 algorithm (or C2 criterion) so as to which the confidence level of pseudo-base station recognizer output is added in C2 algorithm, to carry out the identification of pseudo-base station, so that pseudo-base station cell is arrived in terminal not gravity treatment.
In step 203, whether the confidence level that terminal judgment step 202 obtains is greater than or equal to the first confidence threshold value.When confidence level is greater than or equal to the first confidence threshold value, it is Great possibility that the base station for indicating the Target cell, which is pseudo-base station, thus, terminal can determine that the base station of Target cell is pseudo-base station.Terminal can abandon the Target cell, will not further be resident The Target cell or by its initiating business request etc., and continue cell selection or cell reselection to select other Target cells, or terminate cell reselection.The Target cell is pseudo-base station cell, terminal can also further execute the operation for pseudo-base station cell, such as in preset duration (such as 10 seconds) forbid selecting again cell ID for the pseudo-base station cell ID cell, save the characteristic of the pseudo-base station cell to report to cloud server or to issue prompt information (for example, prompt user has pseudo-base station successfully to be intercepted) etc. to the user of terminal.
When confidence level is less than the first confidence threshold value, then terminal can execute other operations.Other operations for example confidence level can determine that the base station of Target cell is true base station according to, alternatively, other situations of other operations reference may also be made to content described in " 1.1, again identify that doubtful pseudo-base station " hereafter and " 1.2, again identify that doubtful true base station ".
First confidence threshold value can be preset confidence threshold value, and the first confidence threshold value is for dividing whether the base station of Target cell is pseudo-base station.Pass through the reasonable setting of the first confidence threshold value, the performance indicator requirement that pseudo-base station recognizer meets designer may be implemented, the performance indicator includes pseudo-base station discrimination or pseudo-base station false alarm rate etc., wherein pseudo-base station false alarm rate indicates the probability by true base station cell wrong identification for pseudo-base station cell.First confidence threshold value can be configured according at least one of test result, the performance indicator of pseudo-base station recognizer (for example, the pseudo-base station discrimination, pseudo-base station false alarm rate) requirement of pseudo-base station recognizer etc..Such as, after machine learning algorithm training generates pseudo-base station recognizer, it can carry out the performance test of algorithm, first confidence threshold value (such as 0.95) is set first, then algorithm is obtained to the pseudo-base station discrimination (such as 0.90) of pseudo-base station cell test sample collection, and algorithm is to the pseudo-base station false alarm rate (such as 0.001) of true base station testing sample set, and by adjusting the first confidence threshold value, available different algorithm performance index.When algorithm performance index, which reaches designer, to be required, so that it may which pseudo-base station recognizer is transplanted to each terminal by the transplanting for carrying out algorithm.It is appreciated that the conversion of algorithmic code can be carried out when algorithm transplanting according to terminal.
Optionally, this method can also include step 204: terminal forbids selection target cell again in preset duration.
After terminal determines the base station of Target cell for pseudo-base station, terminal can forbid selecting the Target cell again in preset duration.Wherein, preset duration can be fixed time span, such as can be 10 seconds, 1 minute, 2 minutes etc., be also possible to the time span that dynamic adjusts, such as be adjusted to 2 minutes etc. from 10 seconds according to the actual situation.It is appreciated that preset duration can determines according to actual conditions, the application to this with no restriction.Terminal can identify Target cell, such as cell id, LAC+cell id by cell ID, mobile network code (Mobile Network Code, MNC)+LAC+cell id or Mobile Country Code MCC (Mobile Country Code, MCC)+MNC+LAC+cell id.Terminal is likely encountered spoofed true base station cell, thus preset duration will rationally so that in the preset duration terminal encounter spoofed true base station cell probability it is very low.
Terminal forbids selecting the Target cell again in preset duration, and can preventing terminal, gravity treatment identifies the Target cell of pseudo-base station again, while spoofed true base station cell being avoided to be prohibited gravity treatment.This is because some pseudo-base stations can monitor the signal of the true base station in periphery, the system broadcasts parameter of the weaker true base station of a signal is read, and launch after modifying partial parameters (such as cell reselection parameters).In general, pseudo-base station does not make an amendment the cell ID of true base station, to pretend to be the true base station.Also, pseudo-base station is frequently transported, for example, pseudo-base station is placed on vehicle, so as to constantly convert the position of pseudo-base station, after the signal of pseudo-base station is covered a region for a period of time, such as 10 minutes, then pseudo-base station is transferred to other places.Under such a scenario, after if terminal is pseudo-base station in the base station for identifying Target cell, forbid always selecting the Target cell again, then after the pseudo-base station transfer of the Target cell, terminal gets the true base station signal pretended to be by the pseudo-base station, at this point, the true base station will likely be mistaken for pseudo-base station by terminal.
Optionally, the specific implementation of step 204 can be combined with the location of terminal information.Specifically, when terminal determines that the base station of Target cell is pseudo-base station, terminal records the first location information where terminal, in preset duration, terminal obtains the second location information where terminal, when the distance between second location information and first location information are less than pre-determined distance, and terminal gets the cell signal for the cell ID that cell ID is the Target cell again, terminal forbids selecting the cell again.This allows for terminal may be mobile in the preset duration, if the overlay area of terminal breakaway cell, into the coverage for the true base station pretended to be by the pseudo-base station of Target cell, then terminal can stop forbidding reselection target cell.Wherein, the pre-determined distance for example can be 300 meters etc., the application to this with no restriction.
Optionally, after step 202, the method of the embodiment of the present invention further include: when confidence level is less than or equal to four confidence threshold values, terminal executes predetermined registration operation by Target cell, wherein, which includes network registry, the band of position updates, cell is resident and initiating business request in any one.At this point, the base station of Target cell is true base station, terminal can connect mobile network by the Target cell.The operation that the predetermined registration operation need to execute when can normally connect mobile network for terminal.
4th confidence threshold value can be preset confidence threshold value, and the 4th confidence threshold value is for dividing whether the base station of Target cell is true base station.By the reasonable setting of the 4th confidence threshold value, pseudo-base station recognizer can be made to meet the performance indicator requirement of designer, the performance indicator is for example including true identification of base stations rate.Wherein, the 4th confidence threshold value can be configured according to test result, the performance indicator of pseudo-base station recognizer (such as the true identification of base stations rate) requirement etc. of pseudo-base station recognizer.After machine learning algorithm training generates pseudo-base station recognizer, it can carry out the performance test of algorithm, 4th confidence threshold value (such as 0.1) is set first, then algorithm is obtained to the true identification of base stations rate (such as 0.999) of true base station cell test sample collection, by adjusting the 4th confidence threshold value, available different algorithm performance index.When algorithm performance index, which reaches designer, to be required, which can be transplanted in each terminal.
It is appreciated that as shown in figure 3, the 4th confidence threshold value is smaller than the first confidence threshold value.For example, the 4th confidence threshold value can be set to 0.1, and the first confidence threshold value is 0.9.
It is understood that, by the way that the first confidence threshold value or the 4th confidence threshold value is reasonably arranged, the base station that can determine that confidence level is greater than or equal to the cell of the first confidence threshold value is pseudo-base station, and the base station that confidence level is less than or equal to the cell of the 4th confidence threshold value is true base station.But if the confidence bit of Target cell is between the first confidence level and the 4th confidence level, the true and false of the base station of the cell needs otherwise further identification.The identification process is also to again identify that process to doubtful base station, wherein, doubtful base station refers to the base station that the true and false cannot be recognized accurately by pseudo-base station recognizer, specifically, when the confidence bit of Target cell is between the first confidence threshold value and the 4th confidence threshold value, the base station of Target cell is doubtful base station.It is as explained further below described to the process that again identifies that of doubtful base station.
1.1, doubtful pseudo-base station is again identified that.
In some instances, it is related to again identifying that for doubtful pseudo-base station.After step 202, the method of the embodiment of the present invention further include: when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and terminal detect Target cell meet the first preset condition when, terminal determine Target cell base station be pseudo-base station.Optionally, when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, terminal executes predetermined registration operation by Target cell;Also, when terminal detects that Target cell meets the first preset condition, terminal determines that the base station of Target cell is pseudo-base station.Wherein, the predetermined registration operation includes network registry, the band of position updates, cell is resident and initiating business request in any one.
Confidence level relative to Target cell is greater than or equal to scene when the first confidence threshold value, when the confidence level of Target cell is less than the first confidence threshold value, a possibility that Target cell is pseudo-base station cell reduces, if being directly pseudo-base station by the identification of base stations of Target cell, then pseudo-base station false alarm rate will increase, and influence use of the user to terminal.On the other hand, if a possibility that confidence level is less than the second confidence threshold value, and the base station of Target cell is pseudo-base station is smaller, at this point, the base station of the Target cell can not have to participate in doubtful pseudo-base station again identify that process.
Wherein, the second confidence threshold value is preset confidence threshold value, as shown in figure 3, the second confidence threshold value is smaller than the first confidence threshold value, for example, the second confidence threshold value is 0.4 when confidence level is in 0 to 1 range, the first confidence threshold value is 0.9.The setting rule of second confidence threshold value is, in the test of pseudo-base station recognizer, the probability in the section that the confidence level of pseudo-base station cell test sample is fallen between the second confidence threshold value and the first confidence threshold value meets the requirement (such as 0.70) of designer.
In this way, terminal judges that the confidence level of Target cell whether less than the first confidence threshold value and more than or equal to the second confidence threshold value, that is, judges whether the confidence level of Target cell is located at the section between the first confidence threshold value and the second confidence threshold value.If confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, the base station for indicating Target cell is doubtful pseudo-base station, such as second confidence threshold value be 0.4, first confidence threshold value is 0.9, and the confidence level of Target cell is 0.7, then the base station of Target cell is doubtful pseudo-base station.For this purpose, terminal also needs further to detect Target cell, i.e., whether terminal detection Target cell meets the first preset condition, if Target cell meets the first preset condition, terminal can determine that the base station of Target cell is pseudo-base station.
First preset condition can be the issuable behavioural information of pseudo-base station cell, and the first preset condition may include at least one the following conditions: terminal intercepts the problem of Target cell is sent short message;Terminal is rejected when requesting to Target cell launch position area update;It is rejected when terminal is to Target cell initiating business request;Terminal loses Target cell signal within a preset time;Alternatively, the LAC of Target cell changes.
In one example, when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, terminal intercepts the problem of Target cell is sent short message by application layer (application layer can be located at application processor), the base station for then determining the Target cell is pseudo-base station, and is detached from from the Target cell;Alternatively, terminal determines that the base station of the Target cell is pseudo-base station when terminal is kicked out of by the Target cell within a certain period of time.
In another example, in redirecting scene or handoff scenario, when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, if being refused when terminal originating service request by the cell, then terminal determines that the base station of the Target cell is pseudo-base station, and is detached from from the Target cell.
In another example, when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, if terminal can't detect the signal of Target cell within a preset time, that is, it is lost Target cell signal, then terminal determines that the base station of the Target cell is pseudo-base station.The preset time can determines according to actual conditions, such as can be 5 seconds, 7 seconds etc., the application to this with no restriction.
In another example, when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value 0.4, terminal detects that the LAC of Target cell is changed, then terminal can also determine that the base station of the Target cell is pseudo-base station.
In some other example, the first preset condition may be any two kinds of above-mentioned condition or any three kinds or any four or all five kinds of combinations.
These conditions are all the behaviors that pseudo-base station cell may cause.If the actual conditions for the first preset condition that Target cell meets are more, the base station of Target cell is that the probability of pseudo-base station is bigger.In a particular application, the first preset condition can be arranged according to the actual situation.
Optionally, when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and terminal detect Target cell meet the first preset condition when, terminal determines the step of base station of Target cell is pseudo-base station, it include: the characteristic that terminal saves Target cell, the characteristic of Target cell is identified as pseudo-base station data.
Wherein, the characteristic of Target cell, which is identified as pseudo-base station data, to be accomplished by the following way: configuring pseudo-base station identification information for the characteristic of Target cell, such as, establish the characteristic of Target cell and the corresponding relationship of pseudo-base station identification information, or the characteristic of Target cell is stored in default storage region etc., such as, one database is set on the memory of terminal, for storing the characteristic of Target cell, the characteristic of the database purchase belongs to pseudo-base station data.
The confidence level of Target cell is less than the first confidence threshold value and the confidence level is greater than or equal to the second confidence threshold value, indicate that pseudo-base station recognizer is undesirable to the characteristic recognition effect of the Target cell, for this purpose, terminal saves the characteristic for being identified as the Target cell of pseudo-base station data.In this way, next pseudo-base station recognizer can be further trained according to the characteristic of the Target cell of preservation, to improve pseudo-base station recognizer to the discrimination of pseudo-base station.Such as, WiFi (Wireless-Fidelity is connected in terminal, Wireless Fidelity) network when, terminal sends the characteristic for being identified as the Target cell of pseudo-base station data by WiFi network to cloud server, the characteristic of the Target cell is further trained the pseudo-base station recognizer prestored on cloud server by cloud server, to update the pseudo-base station recognizer.Wherein, the pseudo-base station algorithm prestored on cloud server can be pseudo-base station recognizer described in step 202.In this way, the updated pseudo-base station recognizer is higher to the discrimination of pseudo-base station.Optionally, cloud server can also send the updated pseudo-base station recognizer to terminal, so that the updated pseudo-base station recognizer identification pseudo-base station can be used in terminal.It can be carried out on server beyond the clouds according to the characteristic of Target cell training pseudo-base station recognizer.
In embodiments of the present invention, the characteristic that terminal saves Target cell can meet following any one condition when progress: pseudo-base station data save function and open;Alternatively, Target cell, which meets pseudo-base station data, saves rule.In one example, when pseudo-base station data, which save function, opens, terminal saves the characteristic of Target cell.In other words, terminal judges that pseudo-base station data save whether function opens, if opening, terminal can save the characteristic of the Target cell;Otherwise, terminal can not save the characteristic of the Target cell.
Terminal can control the opening and closing that pseudo-base station data save function.Pseudo-base station data save the opening and closing of function, can be configured at the terminal for user, or cloud server sends instruction to terminal and is configured, and can also be automatically controlled for terminal according to preset rules.For example, the characteristic that terminal saved or do not saved Target cell can be set in user;Alternatively, cloud server saves by teleinstruction controlling terminal or does not save the characteristic of Target cell;Alternatively, when the memory space of terminal is less than a default storage threshold value, terminal is automatically closed pseudo-base station data and saves function using the memory space of terminal less than a default storage threshold value as preset rules.Wherein, preset storage threshold value can determines according to actual conditions, the application to this with no restriction.Thus, it is possible to which easily preservation of the controlling terminal to these characteristics, increases the flexibility of characteristic preservation.
In another example, when Target cell, which meets pseudo-base station data, saves rule, terminal saves the characteristic of Target cell.In this way, can play the role of screening characteristic, so that the characteristic of the Target cell saved is more conducive to carry out the further training of pseudo-base station recognizer.
Wherein, which, which saves rule, can be the rule screened to the characteristic of pseudo-base station cell.The pseudo-base station data, which save rule, can be the rule that user sets at the terminal, be also possible to the rule that cloud server is sent to terminal.Pseudo-base station data save the location of the acquisition time of the regular characteristic that for example can be Target cell, Target cell region and certain characteristics of Target cell etc..
The exemplary specific implementation for example can be with are as follows: terminal is obtained from the characteristic and other data of Target cell is suitable for the target data that current pseudo-base station data save rule, then, terminal judges whether the target data meets the pseudo-base station data and save rule, if meeting, the characteristic of the Target cell is saved.
As an example, cloud server sends to terminal and instructs, rule is saved to save the characteristic for the pseudo-base station cell for being located at China Shenzhen area to terminal instruction pseudo-base station data, and the position of Shenzhen area can be described by longitude and latitude or network identity such as MNC+LAC etc..When confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and terminal detect Target cell meet the first preset condition when, terminal determines the location of Target cell region, when the location of Target cell information is China Shenzhen area, Target cell meets the pseudo-base station data and saves rule, terminal saves the characteristic of Target cell, and this feature data are identified as pseudo-base station data.
As another example, the acquisition time that pseudo-base station data save the characteristic that rule is Target cell is weekend, when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and terminal detect Target cell meet the first preset condition when, terminal determines the acquisition time of the characteristic of Target cell from the relevant information of Target cell, when the acquisition time is weekend, Target cell meets the pseudo-base station data and saves rule, terminal saves the characteristic of Target cell, and this feature data are identified as pseudo-base station data.
As another example, pseudo-base station data save rule to save cell selection and cell reselection information and mesh information.When confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and terminal detect Target cell meet the first preset condition when, terminal determines the type of the characteristic of Target cell, when the characteristic of Target cell is cell selection and cell reselection information, mesh information, Target cell meets the pseudo-base station data and saves rule, terminal saves the characteristic of Target cell, and this feature data are identified as pseudo-base station data.
In other examples, when pseudo-base station data save function unlatching, and Target cell meets pseudo-base station data preservation rule, terminal saves the characteristic of Target cell.That is, terminal saves the characteristic of Target cell when the condition of two examples above-mentioned description all meets.
Described above is the methods for again identifying that doubtful pseudo-base station, hereafter to again identifying that doubtful true base station is illustrated method.
1.2, doubtful true base station is again identified that.
In some instances, it is related to again identifying that for doubtful true base station.After step 202, the method of the embodiment of the present invention further include: when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, and terminal detect Target cell meet the second preset condition when, terminal can determine that the base station of Target cell is true base station.Optionally, when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, terminal executes predetermined registration operation by Target cell;Also, when terminal detects that Target cell meets the second preset condition, terminal determines that the base station of Target cell is true base station.Wherein, the predetermined registration operation includes network registry, the band of position updates, cell is resident and initiating business request in any one.
Confidence level relative to Target cell is less than or equal to scene when four confidence threshold values, when the confidence level of Target cell is greater than four confidence threshold values, a possibility that Target cell is true base station cell reduction, if directly by the base station of Target cell It is identified as true base station, then misrecognition is easy to produce to the true and false of base station, influences use of the user to terminal.On the other hand, if a possibility that confidence level is greater than third confidence threshold value, and the base station of Target cell is true base station is smaller, at this point, the base station of the Target cell can again identify that process without the doubtful true base station of participation.
Wherein, third confidence threshold value is preset confidence threshold value, as shown in figure 3, third confidence threshold value is bigger than the 4th confidence threshold value, for example, third confidence threshold value is 0.6 when confidence level is in 0 to 1 range, the 4th confidence threshold value is 0.4.The setting rule of third confidence threshold value are as follows: in the test of pseudo-base station recognizer, the probability that the confidence level of true base station cell test sample falls into the 4th confidence threshold value and third confidence threshold value section meets the requirement (such as 0.20) of designer.
In this way, terminal judges whether the confidence level of Target cell is greater than the 4th confidence threshold value and is less than or equal to third confidence threshold value, that is, judge whether the confidence level of Target cell is located between the 4th confidence threshold value and third confidence threshold value.If confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, indicate that the base station of Target cell is doubtful true base station.For this purpose, terminal also needs further to detect Target cell, i.e., whether terminal detection Target cell meets the second preset condition, if Target cell meets the second preset condition, terminal can determine that the base station of Target cell is true base station.
Second preset condition can be the issuable behavioural information in true base station cell, and the second preset condition may include at least one the following conditions: terminal establishes call or data service in Target cell;Terminal is completed to authenticate and enters encrypted secure modes by Target cell;Alternatively, terminal is completed to switch in Target cell.
In one example, when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, if terminal establishes call in Target cell or data service, terminal determine that the base station of Target cell is true base station.
In another example, when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, if terminal is completed to authenticate and enters encrypted secure modes by Target cell, terminal determines that the base station of Target cell is true base station.
In another example, when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, if terminal is completed to switch in Target cell, terminal determines that the base station of Target cell is true base station.In some other example, the second preset condition may be the combination of any two or all three kinds of above-mentioned condition.
These conditions are all the behaviors that true base station cell may cause.If the actual conditions for the second preset condition that Target cell meets are more, the base station of Target cell is that the probability of true base station is bigger.In a particular application, the second preset condition can be arranged according to the actual situation.
Optionally, when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, and terminal detect Target cell meet the second preset condition when, terminal determines the step of base station of Target cell is true base station, it include: the characteristic that terminal saves Target cell, the characteristic of Target cell is identified as true base station data.
Wherein, the characteristic of Target cell, which is identified as true base station data, to be accomplished by the following way: configuring true base station identification information for the characteristic of Target cell, or the characteristic of Target cell is stored in default storage region etc..
The confidence level of Target cell is greater than the 4th confidence threshold value and the confidence level is less than or equal to third confidence threshold value, indicate that pseudo-base station recognizer is undesirable to the recognition effect of the characteristic of Target cell, for this purpose, terminal saves the characteristic for being identified as the Target cell of true base station data.In this way, next can further train pseudo-base station recognizer according to the characteristic of the Target cell of preservation, pseudo-base station recognizer is improved to the discrimination of true base station.Correspondingly, pseudo-base station recognizer improves the discrimination of true base station, and pseudo-base station false alarm rate can also reduce.It is pseudo- according to the training of the characteristic of the Target cell Identification of base stations algorithm can carry out on server beyond the clouds.
In embodiments of the present invention, the characteristic that terminal saves Target cell can meet following any one condition when progress: true base station data saves function and opens;Alternatively, Target cell, which meets true base station data, saves rule.
In one example, when base station data saves function unlatching surely, terminal saves the characteristic of Target cell.The exemplary specific implementation can refer to the description to doubtful pseudo-base station is again identified that above, and it will not go into details herein.
In another example, when Target cell, which meets true base station data, saves rule, terminal saves the characteristic of Target cell.In this way, can play the role of screening characteristic, so that the characteristic of the Target cell saved is more conducive to carry out the further training of pseudo-base station recognizer.
Wherein, which, which saves rule, can be the rule screened to the characteristic of true base station cell.The true base station data, which saves rule, can be the rule that user sets at the terminal, be also possible to the rule that cloud server is sent to terminal.True base station data saves the location of the acquisition time of the regular characteristic that for example can be Target cell, Target cell region and certain characteristics of Target cell etc..The specific implementation that the true base station data saves rule can refer to the description to doubtful pseudo-base station is again identified that above, and it will not go into details herein.It is appreciated that true base station data preservation rule can be identical or different with pseudo-base station data preservation rule.
In other examples, base station data saves function and opens surely, and when Target cell meets true base station data and saves rule, terminal saves the characteristic of Target cell.That is, terminal saves the characteristic of Target cell when the condition of two examples above-mentioned description all meets.
It is appreciated that " being less than or equal to " and " being less than " does not have substantive difference in the deterministic process of above-mentioned confidence level, and it can be with equivalent substitute, " being greater than or equal to " and " being greater than " does not have substantive difference, can also be with equivalent substitute.It is understood that, size relation about the first confidence threshold value, the second confidence threshold value, third confidence threshold value and the 4th confidence threshold value sees Fig. 3, wherein, second confidence threshold value is smaller than third confidence threshold value, second confidence threshold value can be greater than or equal to the 4th confidence threshold value, and third confidence threshold value may be less than or equal to the first confidence threshold value.In some examples of the application, the confidence level of Target cell is likely located in the section of the second confidence threshold value and third confidence threshold value, at this point, terminal can both detect whether Target cell meets the first preset condition, also detect whether Target cell meets the second preset condition.When terminal detects that Target cell meets the first preset condition, terminal can determine that the base station of Target cell is pseudo-base station;When terminal detects that Target cell meets the second preset condition, terminal determines that the base station of Target cell is true base station.In summary, terminal is for access to mobile network, change persistent district or switching cell, the process selecting Target cell that terminal is defined by standard, after terminal gets the characteristic of the Target cell, in order to carry out truth identification to the Target cell, terminal runs pseudo-base station recognizer according to the characteristic of Target cell, obtains confidence level.When confidence level is greater than or equal to the first confidence threshold value, indicate that the base station of the Target cell is that pseudo-base station has a possibility that very big, therefore, the base station that terminal can reasonably determine Target cell is pseudo-base station, and executes corresponding operating, to avoid the harm of pseudo-base station.Produced by the pseudo-base station recognizer is trained as machine learning algorithm, so as to realize according to after the characteristic of Target cell operation pseudo-base station recognizer, confidence level is obtained, truth identification is carried out come the base station to Target cell by confidence level.Pseudo-base station recognizer has the performance advantage of machine learning algorithm, the recognition performance to pseudo-base station can be improved, and pseudo-base station recognizer can be trained constantly, and quickly follow up pseudo-base station technological evolvement, to improve the recognition success rate to pseudo-base station.
Fig. 4 is a kind of method flow diagram of pseudo-base station recognition methods provided in an embodiment of the present invention.The side of embodiment illustrated in fig. 4 Method can be realized based on the method for embodiment illustrated in fig. 2.The applicable scene of the method for embodiment illustrated in fig. 4 can also refer to Fig. 5.Fig. 5 is the scene framework figure that pseudo-base station recognition methods is related to.In this scenario, including terminal 501, terminal 502, cloud server 503 and base station 504.About the particular content of terminal 501, terminal 502 and base station 504, the corresponding description in Fig. 1 a illustrated embodiment to base station 101 and terminal 102 can refer to.
In scene shown in Fig. 5, terminal 501 and terminal 502 can also be communicated with cloud server 503.Specifically, terminal 501 can collect the sample data of cell, and the sample data is sent to cloud server 503.After cloud server 503 receives the cell sample data that terminal 501 is sent, the sample data training machine learning algorithm can be used, obtain pseudo-base station recognizer.Then, which is sent to terminal 502 by cloud server 503, so that terminal 502 executes the pseudo-base station recognition methods of embodiment illustrated in fig. 2.The sample data of cell may include the sample data of pseudo-base station cell and the sample data of true base station cell.The sample data of pseudo-base station cell can be sample data of the confidence level more than or equal to the Target cell of the first confidence threshold value, be also possible to again identify that doubtful pseudo-base station the sample data of determining pseudo-base station cell.Equally, the sample data of true base station cell can be sample data of the confidence level less than the Target cell of the 4th confidence threshold value, be also possible to again identify that doubtful true base station the sample data of determining true base station cell.
It is appreciated that Fig. 5 is exemplary illustration, in some other example, terminal 501, which can have the function of terminal 502 or terminal 502, can also have the function of terminal 501.
In the following, the pseudo-base station recognition methods to embodiment illustrated in fig. 4 is described in detail, with reference to the content of each embodiment above, the method for the embodiment of the present invention includes:
Step 401: terminal obtains the sample data of true base station cell and the sample data of pseudo-base station cell.
Before obtaining pseudo-base station recognizer, cloud server needs to carry out the training of machine learning algorithm using sample data by terminal collecting sample data terminal, generates pseudo-base station recognizer.
Wherein, the base station of true base station cell is true base station, and the base station of pseudo-base station cell is pseudo-base station.
The specific implementation that terminal obtains the sample data of true base station cell can be with are as follows: terminal is successfully established call or data service in certain cell, or it executes and authenticates and enter encrypted secure modes, or cell switches successfully, above situation indicates that the cell is true base station cell, therefore, the sample data for the signal extraction cell that terminal can be broadcasted from the cell base station, and mark the cell sample data be true base station cell sample data.
The specific implementation that terminal obtains the sample data of pseudo-base station cell can be with are as follows: terminal identifies pseudo-base station cell by characteristic matching algorithm;Or, after terminal is resident certain cell, if the harassing and wrecking short message that the application layer identification of terminal is sent to the cell, and the modem chip of terminal further detects that terminal is kicked out of the cell within a certain period of time (such as 3 minutes), above situation indicates that the cell is pseudo-base station cell, therefore, terminal can be from the sample data of the signal extraction of the cell base station broadcast cell, and marks the sample data of the cell for the sample data of pseudo-base station cell.
In embodiments of the present invention, the sample data of the sample data of true base station cell and pseudo-base station cell can be at least one of following information: cell selection and cell reselection information, mesh information, business function information, regional information and temporal information etc..The specific descriptions of these information can refer to step 202, and details are not described herein again.
It is appreciated that the sample data of sample data and pseudo-base station cell that terminal obtains true base station cell can be controlled by acquisition strategies, which can be set by the user, and be also possible to terminal and obtain from cloud server.Whether the acquisition strategies for example can be to save to the sample data of true base station cell or the sample data of pseudo-base station cell;Alternatively, the sample data of the cell of terminal acquisition predeterminable area, sample data etc. of the terminal in preset time period acquisition cell.In some instances, The acquisition strategies can be pseudo-base station data described in embodiment illustrated in fig. 2 and save rule and/or true base station data preservation rule.
Step 402: terminal sends the sample data of the true base station cell and the sample data of the pseudo-base station cell to cloud server.
After terminal gets the sample data of true base station cell and the sample data of pseudo-base station cell, terminal sends the sample data of the true base station cell and the sample data of the pseudo-base station cell to cloud server, so that cloud server uses these data.
Such as, terminal can for example, by cellular mobile network perhaps the modes such as WiFi network to cloud server send the true base station cell sample data and the pseudo-base station cell sample data or by storage card the sample data of the sample data of the true base station cell in terminal and the pseudo-base station cell is dumped on cloud server.
Step 403: cloud server is trained machine learning algorithm using the sample data of true base station cell and the sample data of pseudo-base station cell, generates pseudo-base station recognizer.
After server obtains the sample datas of enough true and false base station cells beyond the clouds, cloud server carries out the training of machine learning algorithm using the sample data of the true base station cell and the sample data of the pseudo-base station cell, to generate pseudo-base station recognizer.The training of the machine learning algorithm can be the training based on big data.
The pseudo-base station recognizer can be used for identifying the true and false of Target cell.
Carry out machine learning algorithm training, clustering algorithm or sorting algorithm, such as K-means, k- neighbour, decision tree, Logistic recurrence, SVM, bayesian algorithm scheduling algorithm can be used to be trained, computation model is generated, which is pseudo-base station recognizer.
Such as, cloud server carries out the training of SVM algorithm using the sample data of true base station cell and the sample data of the pseudo-base station cell, obtain SVM model instance, the SVM model instance is pseudo-base station recognizer, it can be used for identifying the sample data of Target cell according to the characteristic of Target cell, judge that the base station of the Target cell is true base station or pseudo-base station.
By the method in machine learning field, by great amount of samples training, selected machine learning algorithm be can establish true and false identification of base stations ability (or true and false base station knowledge), which may be embodied in the algorithm generated by training.
Optionally, the method for the embodiment of the present invention further includes that cloud server tests pseudo-base station recognizer, and when the performance indicator that pseudo-base station recognizer meets designer requires, which is sent to terminal by cloud server.
In one example, cloud server is after the sample data of true base station cell and the sample data of pseudo-base station cell for getting terminal transmission, cloud server reserves the test that a part of sample data therein carries out algorithm, to obtain the performance of pseudo-base station recognizer.The reserved sample data can be the true base station testing sample set or pseudo-base station test sample collection of embodiment illustrated in fig. 2.Specifically, cloud server is input to pseudo-base station recognizer using the sample data of the reserved true base station cell and the sample data of pseudo-base station cell, pseudo-base station recognizer is allowed to carry out identification test after training generates pseudo-base station recognizer.In this way, available pseudo-base station recognizer to the confidence level of the sample data of pseudo-base station cell output the first test confidence threshold value (such as, 0.9) probability (being properly termed as pseudo-base station discrimination) more than, probability (be properly termed as pseudo-base station false alarm rate) of the pseudo-base station recognizer to the confidence level of the sample data output of true base station cell more than the first test confidence threshold value, also available pseudo-base station recognizer is to the confidence level of the sample data output of true base station cell in the 4th test confidence threshold value (such as 0.4) probability below (being properly termed as true identification of base stations rate).
In another example, when pseudo-base station recognizer reaches the performance indicator of designer (for example, pseudo-base station discrimination is 0.8, pseudo-base station false alarm rate is 0.002, and when true identification of base stations rate is 0.99), which is the satisfactory algorithm of recognition effect.
Step 404: cloud server sends pseudo-base station recognizer to terminal.
Cloud server can send the pseudo-base station recognizer to terminal, i.e., pseudo-base station recognizer is transplanted in terminal after obtaining pseudo-base station recognizer.To which pseudo-base station recognizer identification pseudo-base station can be used in terminal.In some instances, cloud server can carry out code conversion according to terminal before sending pseudo-base station recognizer.
It is appreciated that the terminal in terminal and step 401 in step 404 can be same terminal, be also possible to different terminals, the application to this with no restriction.
Hereafter how terminal is illustrated using the pseudo-base station recognizer.
Step 405: terminal selection target cell.Step 406: terminal runs pseudo-base station recognizer according to the characteristic of Target cell, obtains confidence level.
Step 407: when confidence level is greater than or equal to the first confidence threshold value, terminal determines that the base station of Target cell is pseudo-base station.
Step 408: terminal forbids selection target cell again in preset duration.
Wherein, the specific implementation of step 405 to step 408 can be respectively referring to the detailed description of step 201 to step 204.
Optionally, after step 406, the method of the embodiment of the present invention further include: when confidence level is less than or equal to four confidence threshold values, terminal executes predetermined registration operation by Target cell, wherein, which includes network registry, the band of position updates, cell is resident and initiating business request in any one.At this point, the base station of Target cell is true base station, terminal can connect mobile network by the Target cell.The operation that the predetermined registration operation need to execute when can normally connect mobile network for terminal.The value of 4th confidence threshold value may refer to description above, and details are not described herein again.
Optionally, after step 406, the method of the embodiment of the present invention further include: when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and terminal detects that Target cell meets the first preset condition, terminal determines that the base station of Target cell is pseudo-base station.It is appreciated that the base station of Target cell is doubtful pseudo-base station when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, therefore the doubtful pseudo-base station can be again identified that in conjunction with the first preset condition.The method for again identifying that doubtful pseudo-base station may refer to the description of " 1.1 again identify that doubtful pseudo-base station " above, and details are not described herein again.
Optionally, after step 406, the method of the embodiment of the present invention further include: when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, and terminal detects that Target cell meets the second preset condition, terminal determines that the base station of Target cell is true base station.It is appreciated that the base station of Target cell is doubtful true base station when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, therefore the doubtful true base station can be again identified that in conjunction with the second preset condition.The method for again identifying that doubtful true base station may refer to the description of " 1.2 again identify that doubtful true base station " above, and details are not described herein again.
Pass through the preservation of the characteristic to the Target cell for being identified as pseudo-base station data, and the preservation of the characteristic to the Target cell for being identified as true base station data, terminal can be under predetermined condition, such as when connecting WiFi network, the characteristic of preservation is sent to cloud server.Cloud server is using the characteristic for being identified as pseudo-base station data of Target cell as the sample data of pseudo-base station cell, or using the characteristic for being identified as true base station data of Target cell as the sample data of true base station cell, the pseudo-base station recognizer prestored is further trained, to update pseudo-base station knowledge Other algorithm.In this way, the updated pseudo-base station recognizer is higher to the discrimination of true and false base station.Optionally, cloud server can also send the updated pseudo-base station recognizer to terminal, for terminal use.
It should be noted that, based on big data, the pseudo-base station recognizer of machine learning, it substantially needs to continue to be trained pseudo-base station recognizer and iteration by the sample data of true and false cell, to adapt to the variation of novel pseudo-base station and true base station, therefore, the sample collection of true and false base station and algorithm training can continue to carry out.
In the embodiment of the present invention, confidence level can be obtained according to the characteristic of Target cell by running the pseudo-base station recognizer terminal based on machine learning, and determine whether the base station of Target cell is pseudo-base station according to confidence level.The pseudo-base station recognizer generated by the training of a large amount of characteristics, improves terminal to the discrimination of pseudo-base station.Also, the characteristic of doubtful base station can be sent to cloud server by terminal, be updated by cloud server to pseudo-base station recognizer, so that the technological evolvement for the pseudo-base station that persistently follows up, is continuously improved the discrimination of pseudo-base station.
Fig. 6 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention, which can be used for executing the method for the terminal execution of above-mentioned Fig. 2 and embodiment illustrated in fig. 4.Refering to Fig. 6, the terminal of the embodiment of the present invention includes selecting unit 601, running unit 602 and determination unit 603.
Wherein, selecting unit 601 are used for selection target cell;Running unit 602 obtains confidence level, confidence level is used to indicate that the base station of Target cell to be the credibility of pseudo-base station, produced by pseudo-base station recognizer is trained as machine learning algorithm for running pseudo-base station recognizer according to the characteristic of Target cell;Determination unit 603, for when confidence level is greater than or equal to the first confidence threshold value, determining that the base station of Target cell is pseudo-base station.
Optionally it is determined that unit 603, it is also used to when confidence level less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and when terminal detects that Target cell meets the first preset condition, determines that the base station of Target cell is pseudo-base station.
Optionally it is determined that unit 603 includes preserving module 604.
Wherein, preserving module 604, for when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and terminal detects that Target cell meets the first preset condition, the characteristic of Target cell is saved, the characteristic of Target cell is identified as pseudo-base station data.
Optionally, preserving module 604 are also used to: when pseudo-base station data, which save function, opens, saving the characteristic of Target cell;Alternatively, saving the characteristic of Target cell when Target cell meets pseudo-base station data and saves rule;Alternatively, when pseudo-base station data save function open, and Target cell meet pseudo-base station data save rule when, save the characteristic of Target cell.
Optionally, the first preset condition includes at least one the following conditions: terminal intercepts the problem of Target cell is sent short message;Terminal is rejected when requesting to Target cell launch position area update;It is rejected when terminal is to Target cell initiating business request;Terminal loses Target cell signal within a preset time;Alternatively, the Location Area Code LAC of Target cell changes.
Optionally, terminal further includes execution unit 605;
Execution unit 605, for executing predetermined registration operation by Target cell when confidence level is less than or equal to four confidence threshold values, predetermined registration operation includes network registry, the band of position updates, cell is resident and initiating business request in any one.
Optionally it is determined that unit 603, it is also used to be greater than the 4th confidence threshold value when confidence level and confidence level is less than or equal to third confidence threshold value, and when terminal detects that Target cell meets the second preset condition, determines that the base station of Target cell is true base It stands.
Optionally, preserving module 604, it is also used to be greater than the 4th confidence threshold value when confidence level and confidence level is less than or equal to third confidence threshold value, and terminal detect Target cell meet the second preset condition when, the characteristic of Target cell is saved, the characteristic of Target cell is identified as true base station data.
Optionally, preserving module 604 save the characteristic of Target cell when being also used to base station data preservation function unlatching surely;Alternatively, saving the characteristic of Target cell when Target cell meets true base station data and saves rule;Alternatively, base station data saves function and opens surely, and when Target cell meets true base station data and saves rule, the characteristic of Target cell is saved.
Optionally, the second preset condition includes at least one the following conditions: terminal establishes call or data service in Target cell;Terminal is completed to authenticate and enters encrypted secure modes by Target cell;Alternatively, terminal is completed to switch in Target cell.
Optionally, Target cell is global system for mobile communications GSM cell.
Optionally, running unit 602 are also used to run pseudo-base station recognizer when terminal detects the LAC of Target cell and currently the LAC that saves is not identical according to the characteristic of Target cell, obtain confidence level.
Optionally, determine the base station of Target cell for after pseudo-base station, selecting unit 601 is also used to forbid selection target cell again in preset duration in terminal.
Optionally, characteristic includes cell selection and cell reselection information, mesh information, business function information, at least one of regional information and temporal information.
Optionally, selecting unit 601 can be used for executing above step 201, step 204, step 405 and step 408.
Optionally, running unit 602 can be used for executing above step 202 and step 406.
Optionally it is determined that unit 603, can be used for executing above step 203 and step 407.
In the embodiment of the present invention, confidence level can be obtained according to the characteristic of Target cell by running the pseudo-base station recognizer terminal based on machine learning, and determine whether the base station of Target cell is pseudo-base station according to confidence level.The pseudo-base station recognizer generated by the training of a large amount of characteristics, improves terminal to the discrimination of pseudo-base station.Also, the characteristic of doubtful base station can be sent to cloud server by terminal, be updated by cloud server to pseudo-base station recognizer, so that the technological evolvement for the pseudo-base station that persistently follows up, is continuously improved the discrimination of pseudo-base station.
Fig. 7 is a kind of hardware structural diagram of terminal provided in an embodiment of the present invention, and terminal shown in Fig. 7 can be used for executing Fig. 2 and method shown in Fig. 4, and terminal shown in fig. 6 can be integrated in terminal shown in Fig. 7.
For ease of description, only parts related to embodiments of the present invention are shown, disclosed by specific technical details, please refers to present invention method part.Involved terminal may include the various handheld devices with wireless communication function, mobile unit, wearable device, calculate equipment or be connected to other processing equipments of radio modem in the embodiment of the present invention.The terminal (terminal) is referred to as mobile station (mobile station, abbreviation MS), user equipment (user equipment), terminal device (terminal device), can also include subscriber unit (subscriber unit), cellular phone (cellular phone), smart phone (smart phone), wireless data card, personal digital assistant (personal digital assistant, PDA) computer, plate computer, radio modem (modem), handheld device (handheld), laptop computer (laptop compute R), wireless phone (cordless phone) or wireless local loop (wireless local loop, WLL) platform, machine type communication (machine type communication, MTC) terminal etc..The embodiment of the present invention is illustrated taking the terminal as an example.
As shown in Figure 7, mobile phone includes: radio frequency (Radio Frequency, RF) the components such as circuit 710, memory 720, input unit 730, display 740, sensor 750, voicefrequency circuit 760, Wireless Fidelity (wireless fidelity, WiFi) module 770, processor 780 and power supply 790.It will be understood by those skilled in the art that handset structure shown in Fig. 7 does not constitute the restriction to mobile phone, it may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Fig. 7 to mobile phone:
RF circuit 710 can be used for receiving and sending messages or communication process in, signal sends and receivees, and particularly, after the downlink information of base station is received, handles to processor 780;In addition, the data for designing uplink are sent to base station.In general, RF circuit 710 includes but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuit 710 can also be communicated with network and other equipment by wireless communication.Any communication standard or agreement can be used in above-mentioned wireless communication, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 720 can be used for storing software program and module, and processor 780 is stored in the software program and module of memory 720 by operation, thereby executing the various function application and data processing of mobile phone.Memory 720 can mainly include storing program area and storage data area, wherein storing program area can application program (such as sound-playing function, image player function etc.) needed for storage program area, at least one function etc.;Storage data area, which can be stored, uses created data (such as audio data, video data, phone directory etc.) etc. according to mobile phone.Furthermore, memory 720 may include volatile memory, such as random access memory (random access memory, RAM), non-volatile dynamic random access memory (Nonvolatile Random Access Memory, NVRAM), phase change random access memory (Phase Change RAM, PRAM), magnetic-resistance random access memory (Magetoresistive RAM, MRAM) etc., it can also include nonvolatile memory, a for example, at least disk memory, read-only memory (read-only memory, ROM), Electrical Erasable programmable read only memory (Electrica Lly Erasable Programmable Read-Only Memory, EEPROM), flush memory device, such as anti-or flash memory (NOR flash memory) or instead with flash memory (NAND flash memory), semiconductor devices, such as solid state hard disk (Solid State Disk, SSD) etc..
Input unit 730 can be used for receiving the number or character information of input, and generate key signals input related with the user setting of mobile phone and function control.Specifically, input unit 730 may include touch panel 731 and other input equipments 732.Touch panel 731, also referred to as touch screen, the touch operation (for example user uses the operations of any suitable object or attachment on touch panel 731 or near touch panel 731 such as finger, stylus) of collectable user on it or nearby, and corresponding attachment device is driven according to preset formula.Optionally, touch panel 731 may include both touch detecting apparatus and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 780, and can receive order that processor 780 is sent and be executed.Furthermore, it is possible to realize touch panel 731 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch-control Panel 731, input unit 730 can also include other input equipments 732.Specifically, other input equipments 732 can include but is not limited to one of physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. or a variety of.
Display 740 can be used for showing information input by user or be supplied to the information of user and the various menus of mobile phone.Display 740 may include display panel 741, optionally, display panel 741 can be configured using the forms such as liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED).Further, touch panel 731 can cover display panel 741, after touch panel 731 detects touch operation on it or nearby, processor 780 is sent to determine the type of touch event, device 780 is followed by subsequent processing according to the type of touch event and corresponding visual output is provided on display panel 741.Although in Fig. 7, touch panel 731 and display panel 741 are the input and input function for realizing mobile phone as two independent components, but it is in some embodiments it is possible to touch panel 731 and display panel 741 is integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 750, such as optical sensor, motion sensor and other sensors.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can adjust the brightness of display panel 741 according to the light and shade of ambient light, proximity sensor can close display panel 741 and/or backlight when mobile phone is moved in one's ear.As a kind of motion sensor, accelerometer sensor can detect the size of (generally three axis) acceleration in all directions, size and the direction that can detect that gravity when static can be used to identify application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) of mobile phone posture etc.;The other sensors such as the gyroscope, barometer, hygrometer, thermometer, the infrared sensor that can also configure as mobile phone, details are not described herein.
Voicefrequency circuit 760, loudspeaker 761, microphone 762 can provide the audio interface between user and mobile phone.Electric signal after the audio data received conversion can be transferred to loudspeaker 761 by voicefrequency circuit 760, be converted to voice signal output by loudspeaker 761;On the other hand, the voice signal of collection is converted to electric signal by microphone 762, audio data is converted to after being received by voicefrequency circuit 760, it again will be after the processing of audio data output processor 780, through RF circuit 710 to be sent to such as another mobile phone, or audio data exported to memory 720 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user to send and receive e-mail by WiFi module 770, browse webpage and access streaming video etc., it provides wireless broadband internet for user and accesses.Although Fig. 7 shows WiFi module 770, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need within the scope of not changing the essence of the invention and omit completely.
Processor 780 is the control centre of mobile phone, utilize the various pieces of various interfaces and connection whole mobile phone, by running or executing the software program and/or module that are stored in memory 720, and call the data being stored in memory 720, the various functions and processing data for executing mobile phone, to carry out integral monitoring to mobile phone.Processor 780 can be central processing unit (Central Processing Unit, CPU), general processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field Programmable Gate Array, FPGA) perhaps other programmable logic device, transistor logic hardware component or any combination thereof.Processor 780, which may be implemented or execute, combines various illustrative logic blocks, module and circuit described in present disclosure.Processor 780 is also possible to realize the combination of computing function, such as combines comprising one or more microprocessors, DSP and the combination of microprocessor etc..Optionally, processor 780 may include one or more processing units.Optionally, processor 780 can integrate application processor and modem processor (modem), wherein the main processing operation system of application processor, user interface and application program etc., modem processor mainly handles wireless communication.It is appreciated that above-mentioned modem processor can also be individually present, not be integrated into processor 780, or integrated with voicefrequency circuit 760 etc..
Mobile phone further includes the power supply 790 (such as battery) powered to all parts.Optionally, power supply can be logically contiguous by power-supply management system and processor 780, to realize the functions such as management charging, electric discharge and power managed by power-supply management system.
It should be noted that mobile phone can also include camera, bluetooth module etc., and it will not be described here although being not shown.
In embodiments of the present invention, processor 780, which can be set, is used for: selection target cell;Pseudo-base station recognizer is run according to the characteristic of Target cell, obtains confidence level, confidence level is used to indicate that the base station of Target cell to be the credibility of pseudo-base station, produced by pseudo-base station recognizer is trained as machine learning algorithm;When confidence level is greater than or equal to the first confidence threshold value, determine that the base station of Target cell is pseudo-base station.
Optionally, processor 780 may be provided for: when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and detects that Target cell meets the first preset condition, determine that the base station of Target cell is pseudo-base station.
Optionally, processor 780, which can be set, to be used for: when confidence level is less than the first confidence threshold value and confidence level is greater than or equal to the second confidence threshold value, and when detecting that Target cell meets the first preset condition, the characteristic of Target cell is saved, the characteristic of Target cell is identified as pseudo-base station data.Optionally, processor 780 can control the characteristic that memory 720 saves Target cell.
Optionally, processor 780 may be provided for: when pseudo-base station data, which save function, opens, save the characteristic of Target cell;Alternatively, saving the characteristic of Target cell when Target cell meets pseudo-base station data and saves rule;Alternatively, when pseudo-base station data save function open, and Target cell meet pseudo-base station data save rule when, save the characteristic of Target cell.Optionally, processor 780 can control the characteristic that memory 720 saves Target cell.
Optionally, processor 780 may be provided for: when confidence level is less than or equal to four confidence threshold values, execute predetermined registration operation by Target cell, predetermined registration operation includes network registry, the band of position updates, cell is resident and initiating business request in any one.
Optionally, processor 780 may be provided for: when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, and detects that Target cell meets the second preset condition, determine that the base station of Target cell is true base station.
Optionally, processor 780 may be provided for: when confidence level is greater than the 4th confidence threshold value and confidence level is less than or equal to third confidence threshold value, and when detecting that Target cell meets the second preset condition, the characteristic of Target cell is saved, the characteristic of Target cell is identified as true base station data.Optionally, processor 780 can control the characteristic that memory 720 saves Target cell.
Optionally, processor 780 may be provided for: when base station data of taking seriously saves function unlatching, save the characteristic of Target cell;Alternatively, saving the characteristic of Target cell when Target cell meets true base station data and saves rule;Alternatively, base station data saves function and opens surely, and when Target cell meets true base station data and saves rule, the characteristic of Target cell is saved.Optionally, processor 780 can control the characteristic that memory 720 saves Target cell.
Optionally, processor 780 may be provided for: as the LAC for detecting Target cell and the LAC currently saved not identical, running pseudo-base station recognizer according to the characteristic of Target cell, obtains confidence level.
Optionally, processor 780 may be provided for: after the base station for determining Target cell is pseudo-base station, forbid selection target cell again in preset duration.
Optionally, processor 780 may be provided for executing above step 201 to 204 and step 401 to step 408.
In the embodiment of the present invention, by running the pseudo-base station recognizer based on machine learning, terminal can obtain confidence level according to the characteristic of Target cell, and determine whether the base station of Target cell is pseudo-base station according to confidence level.The pseudo-base station recognizer generated by the training of a large amount of characteristics, improves terminal to the discrimination of pseudo-base station.Also, the characteristic of doubtful base station can be sent to cloud server by terminal, be updated by cloud server to pseudo-base station recognizer, so that the technological evolvement for the pseudo-base station that persistently follows up, is continuously improved the discrimination of pseudo-base station.
The embodiment of the invention also provides a kind of chip apparatus, the chip includes processing unit, for executing above-mentioned Fig. 2 and method shown in Fig. 4.
The embodiment of the invention also provides a kind of chip apparatus, the chip apparatus includes processor and memory.The memory includes instruction, and the processor runs described instruction, for executing above-mentioned Fig. 2 and method shown in Fig. 4.
In embodiments of the present invention, chip apparatus can be the chip in terminal, and the chip includes: processing unit and communication unit, and the processing unit for example can be processor, and the processor can be previously described various types of processors 780.The communication unit for example can be input/output interface, pin or circuit etc., and the communication unit includes system bus.Optionally, the chip further includes storage unit, and the storage unit can be memory of the chip interior, such as register, caching, random access memory (random access memory, RAM), EEPROM or FLASH etc.;The storage unit can also be the memory positioned at the chip exterior, which can be previously described various types of memories 720.Processor is connected to memory, the instruction which can be stored with run memory, so that the chip apparatus executes above-mentioned Fig. 2 and method shown in Fig. 4.
In the above embodiment of the invention, it can be realized wholly or partly by software, hardware, firmware or any combination thereof.When implemented in software, it can entirely or partly realize in the form of a computer program product.
The computer program product includes one or more computer instructions.When loading on computers and executing the computer program instructions, entirely or partly generate according to process or function described in the embodiment of the present invention.The computer can be general purpose computer, special purpose computer, computer network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or it is transmitted from a computer readable storage medium to another computer readable storage medium, for example, the computer instruction can be transmitted from a web-site, computer, server or data center by wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or data center.The computer readable storage medium can be any usable medium that computer can store or include the data storage devices such as one or more usable mediums integrated server, data center.The usable medium can be magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid State Disk (SSD)) etc..
Above-described specific embodiment has carried out further in detail the purpose of the present invention, technical scheme and beneficial effects Explanation.All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.

Claims (47)

  1. A kind of pseudo-base station recognition methods characterized by comprising
    Terminal selection target cell;
    The terminal runs pseudo-base station recognizer according to the characteristic of the Target cell, obtain confidence level, the confidence level is used to indicate that the base station of the Target cell to be the credibility of pseudo-base station, produced by the pseudo-base station recognizer is trained as machine learning algorithm;
    When the confidence level is greater than or equal to the first confidence threshold value, the terminal determines that the base station of the Target cell is pseudo-base station.
  2. The method according to claim 1, wherein
    Pseudo-base station recognizer is run according to the characteristic of the Target cell in the terminal, after obtaining confidence level, the method also includes:
    When the confidence level is less than first confidence threshold value and the confidence level is greater than or equal to the second confidence threshold value, and the terminal detects that the Target cell meets the first preset condition, the terminal determines that the base station of the Target cell is pseudo-base station.
  3. According to the method described in claim 2, it is characterized in that,
    It is described to be greater than or equal to the second confidence threshold value when the confidence level is less than first confidence threshold value and the confidence level, and the terminal is when detecting that the Target cell meets the first preset condition, the terminal determines that the base station of the Target cell is pseudo-base station, comprising:
    When the confidence level is less than first confidence threshold value and the confidence level is greater than or equal to the second confidence threshold value, and the terminal is when detecting that the Target cell meets the first preset condition, the terminal saves the characteristic of the Target cell, and the characteristic of the Target cell is identified as pseudo-base station data.
  4. According to the method described in claim 3, it is characterized in that,
    The terminal saves the characteristic of the Target cell, comprising:
    When pseudo-base station data, which save function, opens, the terminal saves the characteristic of the Target cell;Alternatively,
    When the Target cell, which meets pseudo-base station data, saves rule, the terminal saves the characteristic of the Target cell;Alternatively,
    When pseudo-base station data save function unlatching, and the Target cell meets pseudo-base station data preservation rule, the terminal saves the characteristic of the Target cell.
  5. According to the described in any item methods of claim 2-4, which is characterized in that
    First preset condition includes at least one the following conditions:
    The terminal intercepts the problem of Target cell is sent short message;
    The terminal is rejected when requesting to the Target cell launch position area update;
    It is rejected when the terminal is to the Target cell initiating business request;
    The terminal loses the Target cell signal within a preset time;Alternatively,
    The Location Area Code LAC of the Target cell changes.
  6. Method according to claim 1-5, which is characterized in that
    Pseudo-base station recognizer, after obtaining confidence level, institute are run according to the characteristic of the Target cell in the terminal State method further include:
    When the confidence level be less than or equal to four confidence threshold values when, the terminal by the Target cell execute predetermined registration operation, wherein the predetermined registration operation include network registry, the band of position update, cell be resident and initiating business request in any one.
  7. The method according to claim 1, wherein
    Pseudo-base station recognizer is run according to the characteristic of the Target cell in the terminal, after obtaining confidence level, the method also includes:
    When the confidence level is greater than the 4th confidence threshold value and the confidence level is less than or equal to third confidence threshold value, and the terminal detects that the Target cell meets the second preset condition, the terminal determines that the base station of the Target cell is true base station.
  8. The method according to the description of claim 7 is characterized in that
    It is described to be less than or equal to third confidence threshold value when the confidence level is greater than the 4th confidence threshold value and the confidence level, and the terminal is when detecting that the Target cell meets the second preset condition, the terminal determines that the base station of the Target cell is true base station, comprising:
    When the confidence level is greater than the 4th confidence threshold value and the confidence level is less than or equal to third confidence threshold value, and the terminal is when detecting that the Target cell meets the second preset condition, the terminal saves the characteristic of the Target cell, and the characteristic of the Target cell is identified as true base station data.
  9. According to the method described in claim 8, it is characterized in that,
    The terminal saves the characteristic of the Target cell, comprising:
    Surely when base station data saves function unlatching, the terminal saves the characteristic of the Target cell;Alternatively,
    When the Target cell, which meets true base station data, saves rule, the terminal saves the characteristic of the Target cell;Alternatively,
    Surely base station data saves function and opens, and when the Target cell meets true base station data and saves rule, the terminal saves the characteristic of the Target cell.
  10. According to the described in any item methods of claim 7-9, which is characterized in that
    Second preset condition includes at least one the following conditions:
    The terminal establishes call or data service in the Target cell;
    The terminal is completed to authenticate and enters encrypted secure modes by the Target cell;Alternatively,
    The terminal is completed to switch in the Target cell.
  11. - 10 described in any item methods according to claim 1, which is characterized in that
    The Target cell is global system for mobile communications GSM cell.
  12. - 11 described in any item methods according to claim 1, which is characterized in that
    The terminal runs pseudo-base station recognizer according to the characteristic of the Target cell, obtains confidence level, comprising:
    When the terminal detects the LAC of the Target cell and currently the LAC that saves is not identical, the terminal runs pseudo-base station recognizer according to the characteristic of the Target cell, obtains confidence level.
  13. - 12 described in any item methods according to claim 1, which is characterized in that
    After the terminal determines the base station of the Target cell for pseudo-base station, the method also includes:
    The terminal forbids selecting the Target cell again in preset duration.
  14. - 13 described in any item methods according to claim 1, which is characterized in that
    The characteristic includes cell selection and cell reselection information, mesh information, business function information, at least one of regional information and temporal information.
  15. A kind of terminal characterized by comprising
    Selecting unit is used for selection target cell;
    Running unit, for running pseudo-base station recognizer according to the characteristic of the Target cell, confidence level is obtained, the confidence level is used to indicate that the base station of the Target cell to be the credibility of pseudo-base station, produced by the pseudo-base station recognizer is trained as machine learning algorithm;
    Determination unit, for when the confidence level is greater than or equal to the first confidence threshold value, determining that the base station of the Target cell is pseudo-base station.
  16. Terminal according to claim 15, which is characterized in that
    The determination unit, it is also used to be less than first confidence threshold value when the confidence level and the confidence level is greater than or equal to the second confidence threshold value, and the terminal determines that the base station of the Target cell is pseudo-base station when detecting that the Target cell meets the first preset condition.
  17. Terminal according to claim 16, which is characterized in that
    The determination unit includes preserving module;
    The preserving module, for when the confidence level is less than first confidence threshold value and the confidence level is greater than or equal to the second confidence threshold value, and the terminal is when detecting that the Target cell meets the first preset condition, the characteristic of the Target cell is saved, the characteristic of the Target cell is identified as pseudo-base station data.
  18. Terminal according to claim 17, which is characterized in that
    The preserving module is also used to save the characteristic of the Target cell when pseudo-base station data save function and open;Alternatively, saving the characteristic of the Target cell when the Target cell meets pseudo-base station data and saves rule;Alternatively, when pseudo-base station data save function open, and the Target cell meet pseudo-base station data save rule when, save the characteristic of the Target cell.
  19. The described in any item terminals of 6-18 according to claim 1, which is characterized in that
    First preset condition includes at least one the following conditions:
    The terminal intercepts the problem of Target cell is sent short message;
    The terminal is rejected when requesting to the Target cell launch position area update;
    It is rejected when the terminal is to the Target cell initiating business request;
    The terminal loses the Target cell signal within a preset time;Alternatively,
    The Location Area Code LAC of the Target cell changes.
  20. The described in any item terminals of 5-19 according to claim 1, which is characterized in that
    The terminal further include:
    Execution unit, for when the confidence level is less than or equal to four confidence threshold values, pass through the Target cell and execute predetermined registration operation, wherein the predetermined registration operation includes network registry, the band of position updates, cell is resident and initiating business request in any one.
  21. Terminal according to claim 15, which is characterized in that
    The determination unit, it is also used to be greater than the 4th confidence threshold value when the confidence level and the confidence level is less than or equal to third confidence threshold value, and the terminal determines that the base station of the Target cell is true base station when detecting that the Target cell meets the second preset condition.
  22. Terminal according to claim 21, which is characterized in that
    The determination unit, including preserving module;
    The preserving module, for when the confidence level is greater than the 4th confidence threshold value and the confidence level is less than or equal to third confidence threshold value, and the terminal is when detecting that the Target cell meets the second preset condition, the characteristic of the Target cell is saved, the characteristic of the Target cell is identified as true base station data.
  23. Terminal according to claim 22, which is characterized in that
    The preserving module saves the characteristic of the Target cell when being also used to base station data preservation function unlatching surely;Alternatively, saving the characteristic of the Target cell when the Target cell meets true base station data and saves rule;Alternatively, base station data saves function and opens surely, and when the Target cell meets true base station data and saves rule, the characteristic of the Target cell is saved.
  24. According to the described in any item terminals of claim 21-23, which is characterized in that
    Second preset condition includes at least one the following conditions:
    The terminal establishes call or data service in the Target cell;
    The terminal is completed to authenticate and enters encrypted secure modes by the Target cell;Alternatively,
    The terminal is completed to switch in the Target cell.
  25. The described in any item terminals of 5-24 according to claim 1, which is characterized in that
    The Target cell is global system for mobile communications GSM cell.
  26. The described in any item terminals of 5-25 according to claim 1, which is characterized in that
    The running unit is also used to run pseudo-base station recognizer when the terminal detects the LAC of the Target cell and currently the LAC that saves is not identical according to the characteristic of the Target cell, obtain confidence level.
  27. The described in any item terminals of 5-26 according to claim 1, which is characterized in that
    After the terminal determines the base station of the Target cell for pseudo-base station, the selecting unit is also used to forbid selecting the Target cell again in preset duration.
  28. The described in any item terminals of 5-27 according to claim 1, which is characterized in that
    The characteristic includes cell selection and cell reselection information, mesh information, business function information, at least one of regional information and temporal information.
  29. A kind of terminal characterized by comprising
    Processor and memory;
    By calling the operational order of the memory storage, the processor is set such that the terminal executes the method as described in claim 1-14 any one.
  30. A kind of chip apparatus, which is characterized in that described device includes processing unit;
    Wherein, the processing unit, for executing such as the described in any item methods of claim 1-14.
  31. A kind of chip apparatus characterized by comprising
    Processor and memory;
    The memory includes instruction, and the processor operation described instruction is to be used for:
    Selection target cell;
    Pseudo-base station recognizer is run according to the characteristic of the Target cell, obtains confidence level, the confidence level is used to indicate that the base station of the Target cell to be the credibility of pseudo-base station, produced by the pseudo-base station recognizer is trained as machine learning algorithm;
    When the confidence level is greater than or equal to the first confidence threshold value, determine that the base station of the Target cell is pseudo-base station.
  32. Chip apparatus according to claim 31, which is characterized in that
    The processor is also used to be greater than or equal to the second confidence threshold value when the confidence level is less than first confidence threshold value and the confidence level, and when detecting that the Target cell meets the first preset condition, determines that the base station of the Target cell is pseudo-base station.
  33. Chip apparatus according to claim 32, which is characterized in that
    The processor, it is also used to: when the confidence level is less than first confidence threshold value and the confidence level is greater than or equal to the second confidence threshold value, and when detecting that the Target cell meets the first preset condition, the characteristic of the Target cell is saved, the characteristic of the Target cell is identified as pseudo-base station data.
  34. Chip apparatus according to claim 33, which is characterized in that
    The processor saves the characteristic of the Target cell, comprising:
    When pseudo-base station data, which save function, opens, the processor saves the characteristic of the Target cell;Alternatively,
    When the Target cell, which meets pseudo-base station data, saves rule, the processor saves the characteristic of the Target cell;Alternatively,
    When pseudo-base station data save function unlatching, and the Target cell meets pseudo-base station data preservation rule, the processor saves the characteristic of the Target cell.
  35. According to the described in any item chip apparatus of claim 32-34, which is characterized in that
    First preset condition includes at least one the following conditions:
    The processor intercepts the problem of Target cell is sent short message;
    The processor is rejected when requesting to the Target cell launch position area update;
    It is rejected when the processor is to the Target cell initiating business request;
    The processor loses the Target cell signal within a preset time;Alternatively,
    The Location Area Code LAC of the Target cell changes.
  36. According to the described in any item chip apparatus of claim 31-35, which is characterized in that
    The processor is also used to when the confidence level is less than or equal to four confidence threshold values, executes predetermined registration operation by the Target cell, the predetermined registration operation includes network registry, the band of position updates, cell is resident and initiating business request in any one.
  37. Chip apparatus according to claim 31, which is characterized in that
    The processor is also used to be less than or equal to third confidence threshold value when the confidence level is greater than the 4th confidence threshold value and the confidence level, and when detecting that the Target cell meets the second preset condition, determines that the base station of the Target cell is true base station.
  38. The chip apparatus according to claim 37, it is characterised in that
    The processor, it is also used to be greater than the 4th confidence threshold value when the confidence level and the confidence level is less than or equal to third confidence threshold value, and when detecting that the Target cell meets the second preset condition, the characteristic of the Target cell is saved, the characteristic of the Target cell is identified as true base station data.
  39. The chip apparatus according to claim 38, which is characterized in that
    The processor, is also used to:
    Surely when base station data saves function unlatching, the characteristic of the Target cell is saved;Alternatively,
    When the Target cell, which meets true base station data, saves rule, the characteristic of the Target cell is saved;Alternatively,
    Surely base station data saves function and opens, and when the Target cell meets true base station data and saves rule, saves the characteristic of the Target cell.
  40. According to the described in any item chip apparatus of claim 37-39, which is characterized in that
    Second preset condition includes at least one the following conditions:
    The processor establishes call or data service in the Target cell;
    The processor is completed to authenticate and enters encrypted secure modes by the Target cell;Alternatively,
    The processor is completed to switch in the Target cell.
  41. According to the described in any item chip apparatus of claim 31-40, which is characterized in that
    The processor is also used to as the LAC for detecting the Target cell and the LAC currently saved not identical, is run pseudo-base station recognizer according to the characteristic of the Target cell, is obtained confidence level.
  42. According to the described in any item chip apparatus of claim 31-41, which is characterized in that
    The processor is also used to after the base station for determining the Target cell is pseudo-base station, forbids selecting the Target cell again in preset duration.
  43. According to the described in any item chip apparatus of claim 31-42, which is characterized in that
    The processor is also used to forbid selecting the Target cell again in preset duration.
  44. According to the described in any item chip apparatus of claim 31-43, which is characterized in that
    The characteristic includes cell selection and cell reselection information, mesh information, business function information, at least one of regional information and temporal information.
  45. A kind of computer program, including instruction, when run on a computer, so that computer executes such as the described in any item methods of claim 1-14.
  46. A kind of computer readable storage medium, including instruction, when described instruction is run on computers, so that computer executes such as the described in any item methods of claim 1-14.
  47. A kind of computer program product comprising instruction, when described instruction is run on computers, so that computer executes such as the described in any item methods of claim 1-14.
CN201780083714.5A 2017-09-08 2017-09-08 Pseudo-base station recognition methods and terminal Pending CN110178395A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/101088 WO2019047170A1 (en) 2017-09-08 2017-09-08 Pseudo base station identification method and terminal

Publications (1)

Publication Number Publication Date
CN110178395A true CN110178395A (en) 2019-08-27

Family

ID=65634716

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780083714.5A Pending CN110178395A (en) 2017-09-08 2017-09-08 Pseudo-base station recognition methods and terminal

Country Status (2)

Country Link
CN (1) CN110178395A (en)
WO (1) WO2019047170A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110880020A (en) * 2019-10-30 2020-03-13 西安交通大学 Self-adaptive trans-regional base station energy consumption model migration and compensation method
CN111093200A (en) * 2019-12-18 2020-05-01 中国移动通信集团内蒙古有限公司 Cell residence method, terminal, first server, computing device and medium
CN113329323A (en) * 2020-02-28 2021-08-31 中国电信股份有限公司 Method and system for estimating pseudo base station position

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113490217B (en) * 2021-09-08 2022-01-04 中国科学院信息工程研究所 Detection method and system for 4G and 5G pseudo base stations

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683984A (en) * 2015-03-11 2015-06-03 无锡北邮感知技术产业研究院有限公司 Wireless communication signal real-time monitoring and processing method and system
CN105873178A (en) * 2016-05-06 2016-08-17 北京奇虎科技有限公司 Method and device for recognizing pseudo base-station
CN106060830A (en) * 2016-08-11 2016-10-26 努比亚技术有限公司 Pseudo base station identification method and device, and terminal
CN106131850A (en) * 2016-06-27 2016-11-16 乐视控股(北京)有限公司 A kind of pseudo-base station recognition methods and equipment
CN106332086A (en) * 2015-06-30 2017-01-11 中国科学院上海高等研究院 Bayesian model-based pseudo-base station identification method

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7738884B2 (en) * 2005-06-28 2010-06-15 Microsoft Corporation Positioning service utilizing existing radio base stations
CN103763690B (en) * 2014-01-28 2017-12-05 北京奇虎科技有限公司 Detect the method and apparatus that pseudo-base station sends short message to mobile terminal
CN104053156A (en) * 2014-04-28 2014-09-17 中国石油大学(华东) Automatic pseudo base station recognizing method and system
CN104244289A (en) * 2014-09-09 2014-12-24 北京金山安全软件有限公司 Method and device for identifying pseudo base station
CN105744527B (en) * 2016-03-28 2018-11-09 河海大学 A kind of pseudo-base station detection method and system based on big data and cloud computing
CN105959954A (en) * 2016-04-25 2016-09-21 努比亚技术有限公司 Pseudo base station identification method, pseudo base station identification device, and terminal
CN105848158B (en) * 2016-04-29 2019-12-03 中国科学院信息工程研究所 The method of discrimination and device of pseudo-base station
CN106851654B (en) * 2017-04-13 2020-08-18 Oppo广东移动通信有限公司 Pseudo base station identification method, pseudo base station identification device and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683984A (en) * 2015-03-11 2015-06-03 无锡北邮感知技术产业研究院有限公司 Wireless communication signal real-time monitoring and processing method and system
CN106332086A (en) * 2015-06-30 2017-01-11 中国科学院上海高等研究院 Bayesian model-based pseudo-base station identification method
CN105873178A (en) * 2016-05-06 2016-08-17 北京奇虎科技有限公司 Method and device for recognizing pseudo base-station
CN106131850A (en) * 2016-06-27 2016-11-16 乐视控股(北京)有限公司 A kind of pseudo-base station recognition methods and equipment
CN106060830A (en) * 2016-08-11 2016-10-26 努比亚技术有限公司 Pseudo base station identification method and device, and terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110880020A (en) * 2019-10-30 2020-03-13 西安交通大学 Self-adaptive trans-regional base station energy consumption model migration and compensation method
CN110880020B (en) * 2019-10-30 2022-10-25 西安交通大学 Self-adaptive trans-regional base station energy consumption model migration and compensation method
CN111093200A (en) * 2019-12-18 2020-05-01 中国移动通信集团内蒙古有限公司 Cell residence method, terminal, first server, computing device and medium
CN113329323A (en) * 2020-02-28 2021-08-31 中国电信股份有限公司 Method and system for estimating pseudo base station position
CN113329323B (en) * 2020-02-28 2022-11-01 中国电信股份有限公司 Method and system for estimating pseudo base station position

Also Published As

Publication number Publication date
WO2019047170A1 (en) 2019-03-14

Similar Documents

Publication Publication Date Title
CN105873178A (en) Method and device for recognizing pseudo base-station
CN107852410B (en) Dissect rogue access point
CN103686595B (en) State switching method and electronic equipment
CN110178395A (en) Pseudo-base station recognition methods and terminal
US11405902B2 (en) Identifying a type of cellular connection and a type of service area from cellular broadcast data
CN106375962A (en) Network searching method and mobile terminal
US20190007884A1 (en) Cell selection for exception reporting for wireless networks
CN108207022A (en) Power regulating method and device
CN106060830A (en) Pseudo base station identification method and device, and terminal
CN113676966B (en) Cell selection method and terminal equipment
CN107710823A (en) The method and network node of the geography fence used for managing supply source radio network node
CN104041139A (en) Receiver And Method For Accessing An Access Point Of A Wireless Local Area Network
CN106961710A (en) A kind of method for network access and terminal
CN106231600A (en) Terminal and information processing method
CN106507418A (en) A kind of based on the residence reselecting of signal intensity, device and mobile terminal
CN106385685A (en) Method for preventing access to pseudo base station, and terminal with system for preventing access to pseudo base station
CN108174384A (en) Pseudo-base station recognition methods, terminal and computer readable storage medium
CN106385669A (en) Method and device for identifying pseudo base station
CN106211171A (en) Prevent from accessing the method for pseudo-base station and there is the terminal preventing accessing pseudo-base station system
CN106211173A (en) Prevent from accessing the method for pseudo-base station and there is the terminal preventing accessing pseudo-base station system
Huang et al. Developing xApps for Rogue Base Station Detection in SDR-Enabled O-RAN
WO2022226833A1 (en) Method for recording coverage hole, terminal device, network device, and storage medium
CN106102069B (en) A kind of base station classification method and electronic equipment
CN116193500A (en) Method and device for realizing perceived service, network side equipment and terminal
CN112771907B (en) Pseudo base station identification method, pseudo base station identification device, mobile terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190827