CN111988784A - Information processing method, terminal equipment and storage medium - Google Patents

Information processing method, terminal equipment and storage medium Download PDF

Info

Publication number
CN111988784A
CN111988784A CN202010780615.6A CN202010780615A CN111988784A CN 111988784 A CN111988784 A CN 111988784A CN 202010780615 A CN202010780615 A CN 202010780615A CN 111988784 A CN111988784 A CN 111988784A
Authority
CN
China
Prior art keywords
base station
information
system configuration
configuration message
pseudo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010780615.6A
Other languages
Chinese (zh)
Inventor
吴瑞君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Microphone Holdings Co Ltd
Shenzhen Transsion Holdings Co Ltd
Original Assignee
Shenzhen Microphone Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Microphone Holdings Co Ltd filed Critical Shenzhen Microphone Holdings Co Ltd
Priority to CN202010780615.6A priority Critical patent/CN111988784A/en
Publication of CN111988784A publication Critical patent/CN111988784A/en
Pending legal-status Critical Current

Links

Images

Abstract

The embodiment of the application provides an information processing method, terminal equipment and a storage medium, wherein the information processing method comprises the steps of obtaining a system configuration message of a base station to be connected, wherein the system configuration message comprises at least one of a cell code, a base station code CID and/or a public land mobile network PLMN; verifying whether the system configuration message conforms to a preset rule; and if so, determining the base station to be connected as a pseudo base station. By adopting the method, the identification accuracy of the terminal on the pseudo base station is improved.

Description

Information processing method, terminal equipment and storage medium
Technical Field
The present application relates to the field of communication transmission, and in particular, to an information processing method, a terminal device, and a storage medium.
Background
The pseudo base station (also called as pseudo base station) mainly comprises a host and a notebook computer, and is illegal wireless communication equipment. The pseudo base station usually falsely uses the mobile phone number of other people or the number of a legal service provider to forcibly send spam short messages (i.e. fraud or promotion short messages) to user terminal equipment within a certain range, and the behavior seriously damages the rights and interests of users and the legal service provider and causes adverse effects on the society. In order to reduce the occurrence of such situations, a method of detecting the signal strength of the base station is usually adopted to verify whether the currently connected or to-be-connected base station of the user is a pseudo base station, and if so, the connection between the terminal device and the pseudo base station is disconnected or the connection between the terminal device and the pseudo base station is avoided. However, the accuracy rate is lower when the method is adopted to verify the base station.
It can be seen that how to improve the identification accuracy of the pseudo base station is an urgent problem to be solved.
The foregoing description is provided for general background information and is not admitted to be prior art.
Disclosure of Invention
The embodiment of the application provides an information processing method, terminal equipment and a storage medium.
In a first aspect, an embodiment of the present application provides an information processing method, where the method includes:
acquiring a system configuration message of a base station to be connected, wherein the system configuration message comprises at least one of a cell code, a base station code CID and/or a public land mobile network PLMN;
verifying whether the system configuration message conforms to a preset rule;
and if so, determining that the base station to be connected is a pseudo base station.
In a second aspect, an embodiment of the present application provides an information processing method, where the method includes:
sending an identity authentication message to enable a base station to authenticate terminal equipment based on the identity authentication message, and sending a system configuration message to the terminal equipment after the authentication is passed;
verifying whether the system configuration message conforms to a preset rule;
and if so, determining that the base station to be connected is a pseudo base station.
In a third aspect, an embodiment of the present application provides an information processing method, where the method includes:
acquiring a system configuration message of a base station to be connected, wherein the system configuration message comprises a cell code, a base station code CID and/or a public land mobile network PLMN;
matching the system configuration message of the base station to be connected with at least one pseudo base station system configuration message in a first pseudo base station database;
and if the system configuration message of the base station to be connected is successfully matched with at least one pseudo base station system configuration message in the first pseudo base station database, determining that the base station to be connected is a pseudo base station.
In a fourth aspect, an embodiment of the present application provides an information processing apparatus, including:
an obtaining module, configured to obtain a system configuration message of a to-be-connected base station, where the system configuration message includes at least one of a cell code, a base station code CID, and/or a public land mobile network PLMN;
the processing module is used for verifying whether the system configuration message meets a preset rule or not;
and the processing module is further used for determining that the base station to be connected is a pseudo base station if the base station to be connected is consistent with the pseudo base station.
In a fifth aspect, an embodiment of the present application provides an information processing apparatus, including:
the output module is used for sending an identity authentication message so that the base station authenticates the terminal equipment based on the identity authentication message and sends a system configuration message to the terminal equipment after the authentication is passed;
the processing module is used for verifying whether the system configuration message meets a preset rule or not;
and the processing module is further used for determining that the base station to be connected is a pseudo base station if the base station to be connected is consistent with the pseudo base station.
In a sixth aspect, an embodiment of the present application provides an information processing apparatus, including:
an obtaining module, configured to obtain a system configuration message of a base station to be connected, where the system configuration message includes a tracking area code cell code, a base station code CID, and/or a public land mobile network PLMN;
the processing module is used for matching the system configuration message of the base station to be connected with at least one pseudo base station system configuration message in a first pseudo base station database;
the processing module is further configured to determine that the base station to be connected is a pseudo base station if the system configuration message of the base station to be connected is successfully matched with the at least one pseudo base station system configuration message in the first pseudo base station database.
In a seventh aspect, an embodiment of the present application provides a terminal device, where the terminal device includes an input device and an output device, and the terminal device further includes a processor, and is adapted to implement one or more instructions, where the one or more instructions are adapted to be loaded by the processor and to execute the information processing method according to the first aspect, the second aspect, or the third aspect.
In an eighth aspect, an embodiment of the present application provides a computer storage medium, which stores instructions that, when executed on a computer, cause the computer to perform the information processing method according to the first, second, or third aspect.
In a ninth aspect, the present application provides a computer program product, which includes computer program code, when the computer program code runs on a computer, the computer is caused to execute the information processing method of the first aspect, the second aspect or the third aspect.
In a tenth aspect, an embodiment of the present application provides a chip, including a memory and a processor, where the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that a device in which the chip is installed executes the information processing method according to the first aspect, the second aspect, or the third aspect.
In the embodiment of the application, the terminal device obtains a system configuration message of a base station to be connected, where the system configuration message includes at least one of a cell code, a base station code CID, and/or a public land mobile network PLMN. And if the system configuration message is verified to be in accordance with the preset rule, determining the base station to be connected as a pseudo base station if the system configuration message is in accordance with the preset rule. By adopting the method, the terminal equipment judges the pseudo base station according to the system configuration message of the base station and the first pseudo base station database of the terminal equipment, so that the identification accuracy of the terminal equipment to the pseudo base station is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of an information processing method provided in an embodiment of the present application;
FIG. 2 is a schematic flow chart diagram of another information processing method provided in the embodiments of the present application;
fig. 3 is a schematic diagram of location information between a base station and a terminal device according to an embodiment of the present disclosure;
FIG. 4 is a schematic flowchart of another information processing method provided in the embodiments of the present application;
FIG. 5a is a schematic diagram of an execution logic for verifying whether a system configuration message conforms to a rule according to an embodiment of the present application;
FIG. 5b is a schematic diagram of another embodiment of execution logic for verifying that a system configuration message conforms to a rule;
FIG. 5c is a schematic diagram of another embodiment of execution logic for verifying whether a system configuration message conforms to a rule;
FIG. 5d is a schematic diagram illustrating another embodiment of execution logic for verifying compliance of a system configuration message with a rule;
FIG. 6 is a schematic flowchart of another information processing method provided in the embodiments of the present application;
fig. 7 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of another information processing apparatus provided in an embodiment of the present application;
FIG. 9 is a schematic structural diagram of another information processing apparatus according to an embodiment of the present application
Fig. 10 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the recitation of an element by the phrase "comprising an … …" does not exclude the presence of additional like elements in the process, method, article, or apparatus that comprises the element, and further, where similarly-named elements, features, or elements in different embodiments of the disclosure may have the same meaning, or may have different meanings, that particular meaning should be determined by their interpretation in the embodiment or further by context with the embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context. Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or" and/or "as used herein are to be construed as inclusive or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a; b; c; a and B; a and C; b and C; A. b and C ". An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, in different orders, and may be performed alternately or at least partially with respect to other steps or sub-steps of other steps.
It should be noted that step numbers such as S101 and S102 are used herein for the purpose of more clearly and briefly describing the corresponding contents, and do not constitute a substantial limitation on the sequence, and those skilled in the art may perform S102 first and then S101 in specific implementations, but these steps should be within the scope of the present application.
Because the existence of the pseudo base station seriously damages the rights and interests of users and legal service providers and causes adverse effects to the society, the pseudo base station is usually judged by a method of detecting the signal intensity of the base station or judging spam messages, but the method has lower accuracy in identifying the base station. In the technical scheme of the application, the terminal equipment performs pseudo base station verification on the base station to be connected by acquiring the system configuration message of the base station to be connected and according to the matching result of the system configuration message and the pseudo base station system configuration message in the first pseudo base station database. By adopting the method, the pseudo base station is judged through the system configuration message of the base station, so that the identification accuracy of the terminal equipment to the pseudo base station is improved, and the condition that the user is lost due to the lower identification accuracy of the pseudo base station of the terminal equipment is avoided.
It should be understood that the technical scheme of the application can be applied to a terminal device, and the terminal device can be specifically a smart phone, a tablet computer, a notebook computer, a desktop computer, a vehicle-mounted intelligent terminal device, and the like, and the embodiment of the application is not limited.
Please refer to fig. 1, which is a flowchart illustrating an information processing method according to an embodiment of the present application, where the information processing method includes the following steps:
s101: and acquiring a system configuration message of the base station to be connected, wherein the system configuration message comprises a tracking area code cell code, a base station code CID and/or a public land mobile network PLMN.
The system configuration message may be any one of a system configuration message systemlnformationblocktype 1 (hereinafter, referred to as SIB1 message) for base station reselection or base station reconnection, or a cell broadcast parameter of a base station. The cell Code includes a Tracking Area Code (TAC) and a Location Area Code (LAC). Exemplarily, when the system configuration message is a SIB1 message, the cell code may be a TAC; when the system configuration message is a cell broadcast parameter, the cell code may be LAC. It should be appreciated that the cell code is used to identify a unique cell, e.g., the TAC is used to identify a unique tracking area, which is an area used by the terminal device for paging and location update; the LAC is used to identify a unique location area for the base station. The base station Identity (CID) is used to uniquely identify Cell base station information. Public Land Mobile Network (PLMN) is a Network established and operated for the Public to provide Land Mobile communication services, and consists of Mobile Country Code (MCC) and Mobile Network number (MNC), and the PLMN uniquely identifies the Mobile communication Country (or home Country) and the Mobile communication Network of the base station Network signal. The CID, PLMN and TAC/LAC of a base station correspond to location information of the base station, wherein the location information includes latitude and longitude, address name, and the like.
It should be understood that the second Generation mobile communication system (2nd Generation, 2G) and the third Generation mobile communication system (3th Generation, 3G) use LAC to identify the unique location area of the base station, i.e., the unique location areas are identified by LAC in 2G and 3G. Whereas TAC is used in fourth Generation mobile communication systems (4th Generation, 4G) and fifth Generation mobile communication systems (5th Generation, 5G) to identify unique tracking areas of base stations.
When the terminal device adopts 4G/5G communication, in this case, when the terminal device is handed over from one cell base station signal to another cell base station signal (i.e., base station reselection or base station reconnection), a system configuration message systemlnformationblocktype 1 (hereinafter abbreviated as SIB1 message) for base station reselection or base station reconnection is acquired according to a system message sent by the base station device, where the SIB1 message includes TAC, CID and PLMN corresponding to the base station.
When the terminal device employs 2G/3G communication, in this case, when the terminal device is switched from a signal of one cell base station to a signal of another cell base station (i.e., base station reselection or base station reconnection), the terminal device obtains a cell broadcast parameter of the base station according to a cell broadcast message sent by the base station device, where the cell broadcast parameter includes one or more of LAC, CID, and PLMN.
S102: and matching the system configuration message of the base station to be connected with at least one pseudo base station system configuration message in the first pseudo base station database.
The first pseudo base station database is a local pseudo base station database stored on the terminal device, and the pseudo base station database may include at least one pseudo base station system configuration message(s) or cell broadcast parameters of at least one pseudo base station(s) that have been discovered (or may be acquired) by a developer.
In one scenario, the terminal device employs 4G/5G communication, and the pseudo base station system configuration message may include TAC, CID, and PLMN corresponding to the pseudo base station. In this case, the terminal device matches the TAC, CID, and PLMN in the system configuration message of the base station to be connected with the TAC, CID, and PLMN corresponding to at least one pseudo base station included in the first pseudo base station database.
In another scenario, the terminal device uses 2G/3G communication, and the pseudo base station system configuration message may include cell broadcast parameters corresponding to the pseudo base station. In this case, the terminal device matches the LAC, CID, and PLMN in the cell broadcast parameters of the base station to be connected with the cell broadcast parameters LAC, CID, and PLMN corresponding to the at least one (one or more) pseudo base stations included in the first pseudo base station database.
In an embodiment, the terminal device may further obtain its own location information, and further, the terminal device may obtain a second pseudo base station database according to its own location information, and update the first pseudo base station database according to the second pseudo base station database. By adopting the method, the first pseudo base station database is updated in time, and the accuracy of identifying the pseudo base station by the terminal equipment is improved.
The position information may be Global Positioning System (GPS) information; the second pseudo base station database may be a pseudo base station database periodically updated in a server corresponding to the position information of the terminal device, or a pseudo base station database stored in a cloud server, and the pseudo base station databases correspond to the position information of the terminal device one to one.
For example, in an application scenario, after acquiring the self-location information, the terminal device sends an update request for the first pseudo base station database to the cloud server, where the update request includes the terminal location information. And the cloud server acquires a pseudo base station database corresponding to the position information from the storage space according to the terminal position information as a second pseudo base station database, and sends the second pseudo base station database to the terminal equipment. The terminal equipment updates at least one pseudo base station system configuration message(s) included in the first pseudo base station database of the terminal equipment according to at least one pseudo base station system configuration message(s) and/or cell broadcast parameters of at least one pseudo base station(s) included in the second pseudo base station database and/or updates cell broadcast parameters of at least one pseudo base station(s) included in the first pseudo base station database of the terminal equipment.
S103: and if the system configuration message of the base station to be connected is successfully matched with at least one pseudo base station system configuration message in the first pseudo base station database, determining that the base station to be connected is a pseudo base station.
When the terminal device adopts 4G/5G communication, if the system configuration message (the SIB1 message or the TAC, CID, and PLMN in the system configuration message of the base station) of the base station to be connected is successfully matched with at least one pseudo base station system configuration message (the SIB1 message or the TAC, CID, and PLMN in the system configuration message of the pseudo base station) in the first pseudo base station database, determining that the base station to be connected is a pseudo base station.
When the terminal device adopts 2G/3G communication, if the cell broadcast parameters (cell broadcast parameters or LAC, CID and PLMN in the cell broadcast parameters) of the base station to be connected are successfully matched with the cell broadcast parameters (LAC, CID and PLMN in the cell broadcast parameters or in the cell broadcast parameters) of at least one pseudo base station in the first pseudo base station database, the base station to be connected is determined to be a pseudo base station.
In the embodiment of the application, the terminal device obtains a system configuration message of a base station to be connected, where the system configuration message includes a cell code, a base station code CID, and/or a public land mobile network PLMN, and further, the terminal device may match the system configuration message of the base station to be connected with at least one pseudo base station system configuration message in a first pseudo base station database, and if the system configuration message of the base station to be connected is successfully matched with the at least one pseudo base station system configuration message in the first pseudo base station database, determine that the base station to be connected is a pseudo base station. By adopting the method, the terminal equipment judges the pseudo base station according to the system configuration message of the base station and the first pseudo base station database of the terminal equipment, so that the identification accuracy of the terminal equipment to the pseudo base station is improved.
Please refer to fig. 2, which is a flowchart illustrating an information processing method according to an embodiment of the present application, where the information processing method includes the following steps:
s201: and acquiring a system configuration message of the base station to be connected, wherein the system configuration message comprises a cell code, a base station code CID and/or a public land mobile network PLMN.
S202: and matching the system configuration message of the base station to be connected with at least one pseudo base station system configuration message in the first pseudo base station database.
For the specific implementation of steps S201 to S202, please refer to the specific implementation of steps S101 to S102 in the foregoing embodiment, which is not described herein again.
S203: and if the system configuration message of the base station to be connected fails to be matched with at least one pseudo base station system configuration message in the first pseudo base station database, matching the cell code of the base station to be connected with a cell code number segment threshold, and/or matching the CID of the base station to be connected with a CID number segment threshold.
The cell number segment threshold and the CID number segment threshold may be obtained according to the location information of the terminal device and the mobile network operator information corresponding to the terminal device.
When the terminal device adopts the 4G/5G communication network, if the system configuration message SIB1 message of the base station to be connected fails to match with at least one (one or more) pseudo base station system configuration message SIB1 messages included in the first pseudo base station database, the terminal device may obtain the TAC of the base station to be connected and/or the CID of the base station to be connected from the system configuration message SIB1 message of the base station to be connected, and match the TAC of the base station to be connected with the TAC number segment threshold, and/or match the CID of the base station to be connected with the CID of the number segment threshold. If the TAC of the base station to be connected exists in the TAC number segment threshold, determining that the TAC of the base station to be connected is successfully matched with the TAC number segment threshold; and if the CID of the base station to be connected exists in the CID number segment threshold, determining that the CID of the base station to be connected is successfully matched with the CID number segment threshold.
S204: and if the matching between the cell code of the base station to be connected and the threshold of the cell code number section fails, and/or the matching between the CID of the base station to be connected and the threshold of the CID number section fails, determining that the base station to be connected is a pseudo base station.
If the cell code of the base station to be connected does not exist in the threshold value of the cell code number segment, namely, the matching of the cell code of the base station to be connected and the threshold value of the cell code number segment fails, determining that the base station to be connected is a pseudo base station; or, if the CID of the base station to be connected does not exist in the CID number segment threshold, that is, when the matching between the CID of the base station to be connected and the CID number segment threshold fails, determining that the base station to be connected is a pseudo base station; or when the threshold matching between the TAC and the TAC number section of the base station to be connected fails and the threshold matching between the CID and the CID number section of the base station to be connected fails, determining that the base station to be connected is a pseudo base station.
In an embodiment, if the cell code of the base station to be connected is successfully matched with the cell code number segment threshold, and the CID of the base station to be connected is successfully matched with the CID number segment threshold, the terminal device may further detect the number of PLMNs in the system configuration message of the base station to be connected. And if the number of the PLMNs is more than 1, determining that the base station to be connected is a pseudo base station, and adding the base station to be connected and the redirection base station of the base station to be connected into the first pseudo base station database.
If the terminal device detects that the cell code of the base station to be connected is successfully matched with the cell code number segment threshold value and the CID of the base station to be connected is successfully matched with the CID number segment threshold value, the terminal device judges whether the mobile operators corresponding to the position information allow network sharing according to the position information of the terminal device. If the terminal device determines that the mobile operator does not allow sharing the network, the terminal device may further detect the number of PLMNs in the system configuration message of the base station to be connected. And if the number of the PLMNs is more than 1, determining that the base station to be connected is a pseudo base station, and adding the base station to be connected and the redirection base station of the base station to be connected into a first pseudo base station database.
Exemplarily, when matching between the TAC of the base station to be connected and the TAC number segment threshold is successful, and matching between the CID of the base station to be connected and the CID number segment threshold is successful, the terminal device obtains the location information of itself as location 1, and then the terminal device obtains the network sharing information of the mobile operator in the area corresponding to location 1: there is no shared network situation between mobile operators, i.e. the number of PLMNs in the base station system configuration message is and is only 1. The terminal device detects the number of PLMNs in the configuration message of the base station to be connected, if the number of PLMNs is greater than 1, determines that the base station to be connected is a pseudo base station, and adds the base station to be connected and the redirection base station of the base station to be connected to the first pseudo base station database.
It should be understood that, the term "redirection base station" refers to a redirection base station that forwards a connection request to a base station when a terminal device and the base station are connected, because the base station device fails to respond to the connection request of the terminal device, and the redirection base station corresponding to a pseudo base station is also a pseudo base station. The home (home country) of the mobile communication network and the corresponding mobile communication operator are marked by a PLMN code in the mobile communication network, usually the same mobile communication network only includes one PLMN code, and the pseudo base station usually sets a plurality of PLMNs to absorb more terminal devices using different mobile communication operators, so when the terminal detects that the number of PLMNs in the SIB1 message of the base station to be connected is greater than 1, it can be determined that the base station to be connected is a pseudo base station.
In an embodiment, if the number of PLMNs is equal to 1, a terminal device sends a camping request to a base station to be connected, where the camping request is used for the terminal device to connect to the base station to be connected, and if the terminal device monitors that the camping request responds abnormally, the base station to be connected is determined to be a suspicious base station, and location information of the terminal device itself and location information of the base station to be connected are obtained, and further, the terminal device may verify whether the suspicious base station is a pseudo base station according to the location information of the terminal device itself and the location information of the base station to be connected; and if the suspicious base station is verified to be the pseudo base station, adding the suspicious base station and the corresponding redirection base station into a first pseudo base station database.
The camping request response exception may be that the camping request is not responded to after time out, or the base station apparatus returns a preset cause value for the camping request, for example, cause value #13reject, cause value #15reject, and the like.
Exemplarily, in an application scenario, the terminal device sends a residence request to the base station to be connected, and invokes a terminal device monitoring process to time a response result of the residence request, and if the terminal device receives residence request response data sent by the base station within a preset time threshold, the base station to be connected is determined as a suspicious base station. The preset time threshold is obtained by the developer through measurement and calculation according to an experimental scene, and corresponding adjustment can be subsequently performed according to a specific application scene, which is not specifically limited herein.
In an embodiment, the terminal device may verify whether the suspicious base station is the pseudo base station according to the location information of the terminal device and the location information of the base station to be connected, where the terminal device detects whether the location information of the terminal device is within a preset threshold range of the location information of the suspicious base station. Further, if the terminal device detects that the position information of the terminal device is not within the preset threshold range of the position information of the suspicious base station, it is determined that the suspicious base station is the pseudo base station.
The preset threshold range is obtained by the measurement and calculation of the experimental data of the base station radiation range by developers, and the corresponding adjustment can be subsequently performed according to a specific application scene, which is not specifically limited herein. When the terminal device is a terminal device in a 4G/5G communication network, the manner for the terminal device to acquire the location information of the base station to be connected may be to query the latitude and longitude information of the base station through the CID code, PLMN, and TAC of the base station. When the terminal device is a terminal device in a 2G/3G communication network, the manner for the terminal device to obtain the location information of the base station to be connected may be to query the latitude and longitude information of the base station through the CID code, PLMN, and LAC of the base station.
Illustratively, the preset threshold range is 500m, as shown in fig. 3, the base station 30 is a suspicious base station determined according to the foregoing, the terminal device 31 acquires GPS information of itself and latitude and longitude information of the base station 30, and the distance between the terminal device 31 and the base station 30 is 580m calculated according to the GPS information of the terminal device 31 and the latitude and longitude information of the base station 30, and if the distance exceeds the preset threshold range of the location information of the base station 30, the terminal device determines the suspicious base station 30 as a pseudo base station.
In another embodiment, when the terminal device verifies that the terminal device is within the preset threshold range of the position information of the base station according to the position information of the terminal device and the position information of the base station to be connected, the base station can be blocked for a period of time and the redirection message of the base station is ignored, so that the security of the terminal device is improved by the method, and the terminal device is prevented from being attacked by the pseudo base station as much as possible.
In an embodiment, after the terminal device sends a camping request to the base station to be connected, if the terminal device detects that a TAC of the base station to be connected is different from a TAC of a base station to which the terminal device is currently connected, or the terminal device detects that a LAC of the base station to be connected is different from a LAC of a base station to which the terminal device is currently connected, a Tracking Area Update (TAU) request is sent to the base station to be connected, and further, the terminal device receives an identity verification request for the terminal device sent by the base station to be connected according to the TAU request, and detects whether the identity verification request is an integrity protection identity verification request. If the terminal equipment detects that the identity verification request is not an integrity protection identity verification request, the terminal equipment sends an authentication request to the base station to be connected and monitors the authentication response state of the authentication request. And if the authentication response state is monitored to be authentication response failure, determining that the base station to be connected is a pseudo base station, and adding the base station to be connected and the redirection base station of the base station to be connected into a first pseudo base station database.
Exemplarily, when the terminal device detects that the TAC of the base station to be connected is different from the TAC of the base station to which the terminal device is currently connected (which may be regarded as a normal base station), the terminal device initiates a TAU procedure, that is, sends a TAU request to the base station to be connected, where the TAU request carries a Globally Unique Temporary UE Identity (GUTI) of the terminal device. After receiving the TAU request, the base station to be connected sends authentication information for the GUTI to the terminal device, so as to obtain an International Mobile Subscriber Identity (IMSI) corresponding to the terminal device. Since the pseudo base station does not know the security parameters used by the terminal device, the authentication information cannot be encrypted through integrity protection. Therefore, if the terminal device detects that the authentication information is the incomplete protection authentication information, the terminal device refuses to provide the corresponding IMSI, so as to prevent the sensitive information of the terminal device from being collected by the pseudo base station and causing leakage. Further, the terminal device may send an authentication request to the to-be-connected base station, for example, a Mobility Management Entity (MME), which is a key control node of a Third Generation Partnership Project (3 GPP) protocol LTE access network, is used to perform forced authentication on the to-be-connected base station using an authentication token provided by the MME for the terminal device, and if the authentication fails, it is determined that the base station is a pseudo base station, and the to-be-connected base station and a redirection base station of the to-be-connected base station are added to the first pseudo base station database.
In an application scenario, the terminal device employs a 2G/3G communication network, and in this case, if the terminal device fails to match the cell broadcast parameter of the base station to be connected with the cell broadcast parameter of at least one pseudo base station in the first pseudo base station database, the terminal device may obtain a base station library corresponding to a location area according to the PLMN and LAC in the cell broadcast parameter of the base station to be connected, where the base station library includes base station information (e.g., CID of a normal base station) of a normal base station in the location area, and the base station library corresponds to location areas corresponding to the PLMN and LAC one to one. Further, the terminal device may match (or query) the base station information of the base station to be connected with the base station information of the normal base station included in the base station library, and if the matching is successful (or the query is successful), it is determined that the base station to be connected is the normal base station, and the terminal device connects the base station to be connected. If the matching fails, the terminal equipment determines that the base station to be connected is a pseudo base station, disables the base station to be connected, and uploads the cell broadcast parameters of the base station to be connected to the server, so that other subsequent terminal equipment can obtain the cell broadcast parameters from the server, and the interception success rate of the pseudo base station by other terminal equipment is improved.
Illustratively, the terminal device is a device of a 2G communication network, and when the cell broadcast parameters of the base station to be connected obtained by the terminal device are LAC3, CID3, and PLMN3, the terminal device matches the cell broadcast parameters of the base station to be connected with the cell broadcast parameters LAC1, CID1, and PLMN1 of the pseudo base station 1 included in the first pseudo base station, and the cell broadcast parameters LAC2, CID2, and PLMN2 of the pseudo base station 2. And if the matching result is that the matching fails, the terminal equipment acquires the position area 3 corresponding to the base station according to the cell broadcast parameters PLMN3 and LAC3 of the base station to be connected, and acquires a base station library in the position area 3, wherein the base station library comprises the identification information of the normal base station, namely CID3, CID4 and CID 5. Further, the terminal device may match (or query) the base station information (e.g., identification information CID3) of the base station to be connected with the identification information of the normal base station included in the base station library. And if the matching is successful, the terminal equipment is connected with the base station to be connected. In another example, the terminal device obtains cell broadcast parameters of a base station to be connected as LAC6, CID3, and PLMN3, and if the matching with the identification information of the base station library including the normal base stations as CID3, CID4, and CID5 fails, the terminal adds the cell broadcast parameters of the base station to be connected to a pseudo base station list corresponding to the terminal device, and uploads the cell broadcast parameters of the base station to be connected to the server. By the method, the efficiency of processing the base station information by the terminal equipment of the 2G communication network is improved.
In this embodiment, a terminal device obtains a system configuration message of a base station to be connected, where the system configuration message includes a cell code, a base station code CID, and/or a public land mobile network PLMN, and further, the terminal device may match the system configuration message of the base station to be connected with at least one pseudo base station system configuration message in a first pseudo base station database, and if the system configuration message of the base station to be connected fails to match the at least one pseudo base station system configuration message in the first pseudo base station database, match the cell code of the base station to be connected with a cell code number segment threshold, and/or match the CID of the base station to be connected with a CID number segment threshold. And if the matching between the cell code of the base station to be connected and the threshold of the cell code number section fails, and/or the matching between the CID of the base station to be connected and the threshold of the CID number section fails, determining that the base station to be connected is a pseudo base station. By adopting the method, the terminal equipment judges the characteristics of the pseudo base station for many times according to the system configuration information of the base station, reduces the probability of misjudgment of the pseudo base station, and improves the identification accuracy of the terminal equipment to the pseudo base station.
Please refer to fig. 4, which is a flowchart illustrating an information processing method according to an embodiment of the present application, where the information processing method includes the following steps:
s401: and acquiring a system configuration message of the base station to be connected, wherein the system configuration message comprises at least one of a cell code, a base station code CID and/or a public land mobile network PLMN.
For a specific implementation manner of step S401, reference may be made to the specific implementation manner of step S101 in the foregoing embodiment, and details are not described here again.
S402: and verifying whether the system configuration message conforms to a preset rule.
And the terminal equipment verifies the system configuration message according to a preset rule and verifies whether the system configuration message of the base station to be connected conforms to the preset rule. The preset rule is set by a developer according to an experimental scene, and corresponding adjustment can be carried out subsequently according to a specific application scene.
In one embodiment, if the system configuration message is successfully matched with the at least one pseudo base station system configuration message in the first information, the predetermined rule is met.
Optionally, if the system configuration message fails to match with at least one pseudo base station system configuration message in the first information, matching the cell code of the base station to be connected with the cell code number segment threshold, and if the matching fails, conforming to a preset rule. The threshold of the cell code number segment can be obtained according to the position information of the terminal device and the mobile network operator information corresponding to the terminal device.
Optionally, if the system configuration message fails to match with the at least one pseudo base station system configuration message in the first information, matching the CID of the base station to be connected with the CID number segment threshold, and if the matching fails, conforming to a preset rule.
Optionally, if the system configuration message fails to match with the at least one pseudo base station system configuration message in the first information, the cell code and the CID of the base station to be connected are respectively matched with the cell code threshold and the CID threshold, and if both matching fails, the preset rule is met.
Wherein the first information includes at least one base station data information, which may be pseudo base station system configuration information, i.e., at least one pseudo base station system configuration message(s) or cell broadcast parameters of at least one pseudo base station(s) that have been discovered (or obtainable) by a developer. For example, when the terminal device adopts 4G/5G communication, the pseudo base station system configuration message may include TAC, CID and PLMN corresponding to the pseudo base station. When the terminal device adopts 2G/3G communication, the pseudo base station system configuration message may include LAC, CID, and PLMN corresponding to the pseudo base station.
In one implementation, the terminal device may obtain its own location information, obtain second information according to the location information, and update the first information according to the second information.
The second information has a mapping relationship with the location information, for example, the terminal device may connect to an application server corresponding to the location information according to its own location information, and obtain the second information from the application server. The second information includes at least one base station data information, which may be pseudo base station system configuration information.
Illustratively, in one application scenario, the first information includes a pseudo base station system configuration message 1: TAC1, CID1, and PLMN1, or pseudo base station system configuration message 2: LAC2, CID2, and PLMN 2. Fig. 5a shows a schematic diagram of an execution logic for the terminal device to verify whether the system configuration message of the base station to be connected conforms to the preset rule, where if the system configuration message of the base station to be connected acquired by the terminal device is: and matching the system configuration message of the base station to be connected with the pseudo base station system configuration message in the first information by using the TAC1, the CID1 and the PLMN1, and verifying that the system configuration message of the base station to be connected conforms to a preset rule if the system configuration message of the base station to be connected is successfully matched with the pseudo base station system configuration message 1 (namely the system configuration message of the base station to be connected is matched with the first information).
If the system configuration message of the base station to be connected acquired by the terminal equipment is: TAC3, CID3 and PLMN3, the schematic diagram of the execution logic of the terminal device verifying whether the system configuration message of the to-be-connected base station conforms to the preset rule is shown in fig. 5b, the system configuration information of the to-be-connected base station is matched with at least one pseudo base station system configuration message in the first information, and it is seen that the matching fails (i.e. the system configuration message of the to-be-connected base station is not matched with the first information). And if the TAC3 is larger than the TAC0 (namely the TAC3 is beyond the range of the cell coding threshold), the terminal equipment is considered as failed in matching and accords with a preset rule.
If the system configuration message of the base station to be connected acquired by the terminal equipment is: TAC3, CID3, and PLMN3, the schematic diagram of the execution logic for the terminal device to verify whether the system configuration message of the to-be-connected base station conforms to the preset rule may also be as shown in fig. 5c, the system configuration message of the to-be-connected base station is matched with at least one pseudo base station system configuration message in the first information, and it is seen that the matching fails. According to the CID threshold CID0 obtained by the position information of the terminal equipment, the terminal equipment matches the CID3 of the base station to be connected with the CID threshold CID0, and if the CID3 is larger than the CID0 (namely, if the CID3 is beyond the CID threshold range), the matching is regarded as failed, and the preset rule is met.
If the system configuration message of the base station to be connected acquired by the terminal equipment is: TAC3, CID3, and PLMN3, the schematic diagram of the execution logic for the terminal device to verify whether the system configuration message of the to-be-connected base station conforms to the preset rule may also be as shown in fig. 5d, and the system configuration message of the to-be-connected base station is matched with at least one pseudo base station system configuration message in the first information, and it is seen that the matching fails. Then, according to the CID threshold CID0 and the cell coding threshold TAC0 obtained by the location information of the terminal device, further, the terminal device matches the CID3 of the base station to be connected with the CID threshold CID0, and matches the cell coding threshold TAC3 of the base station to be connected with the cell coding threshold TAC 0. If the TAC3 is greater than the TAC0 (i.e., the TAC3 is considered to be beyond the cell coding threshold range) and the CID3 is greater than the CID0 (i.e., the CID3 is considered to be beyond the CID threshold range), the matching is considered to be failed and the preset rule is met.
In an embodiment, if the cell code of the base station to be connected is successfully matched with the cell code number segment threshold, and the CID of the base station to be connected is successfully matched with the CID number segment threshold, the number of PLMNs in the system configuration message is detected, and if the number of PLMNs is greater than 1, the preset rule is met. And/or adding the base station to be connected and/or the redirection base station of the base station to be connected to the first information.
Illustratively, if the terminal device detects that the cell code of the base station to be connected is successfully matched with the cell code number segment threshold, and the CID of the base station to be connected is successfully matched with the CID number segment threshold, the terminal device judges whether the mobile operators corresponding to the position information allow network sharing according to the position information of the terminal device. If the terminal device detects that the location information of the terminal device is XX country XX province, it is determined that the mobile operators do not allow network sharing, that is, there are only 1 PLMN value in the base station system configuration message of XX country XX province. Further, the terminal device may detect the number of PLMNs in the system configuration message of the base station to be connected. If the number of the PLMNs is larger than 1, the base station to be connected is determined to be a pseudo base station, and the system configuration information of the base station to be connected and the system configuration information of the redirection base station of the base station to be connected are added into the first information.
In an embodiment, if the number of PLMNs is equal to 1, a camping request is sent to a base station to be connected, where the camping request is used for a terminal device to connect to the base station to be connected, and if it is monitored that a response of the camping request is abnormal, the base station to be connected is determined as a suspicious base station.
The camping request response exception may be that the camping request is not responded to after time out, or may be that the base station apparatus returns a preset cause value for the camping request, where the preset cause value may be: cause value #13reject, cause value #15reject, etc.
In one embodiment, after the terminal device determines the base station to be connected as a suspicious base station, the terminal device obtains the position information of itself and/or the position information of the base station to be connected, and verifies whether the suspicious base station is a pseudo base station according to the position information and/or the position information of the base station to be connected.
The terminal device can acquire the position information of the terminal device through a global positioning system. The position information of the base station to be connected, which is obtained by the terminal device, may be: when the terminal device is a terminal device in a 4G/5G communication network, the manner for the terminal device to acquire the location information of the base station to be connected may be to query the latitude and longitude information of the base station through the CID code, PLMN, and TAC of the base station. When the terminal device is a terminal device in a 2G/3G communication network, the manner for the terminal device to obtain the location information of the base station to be connected may be to query the latitude and longitude information of the base station through the CID code, PLMN, and LAC of the base station.
In an embodiment, if the terminal device verifies that the suspicious base station is the pseudo base station, the suspicious base station and/or a redirection base station corresponding to the suspicious base station is added to the first information.
And if the suspicious base station is verified to be the pseudo base station by the terminal equipment according to the position information and/or the position information of the base station to be connected, the terminal equipment adds the system configuration information of the base station to be connected and the system configuration information of the redirection base station of the base station to be connected to the first information.
In an embodiment, the terminal device detects whether the location information of the terminal device is within a preset threshold range of the location information of the suspicious base station, and determines that the suspicious base station is a pseudo base station if the location information of the terminal device is not within the preset threshold range. The preset threshold range is obtained by the measurement and calculation of the experimental data of the base station radiation range by developers, and the corresponding adjustment can be subsequently performed according to a specific application scene, which is not specifically limited herein.
In an embodiment, after the terminal device sends a camping request to the base station to be connected, if the terminal device detects that a cell code of the base station to be connected is different from a cell code of a base station to which the terminal device is currently connected, a tracking area update TAU request is sent to the base station to be connected. Further, the terminal device may receive an identity verification request for the terminal device sent by the base station to be connected according to the TAU request, and detect whether the identity verification request is an integrity protection identity verification request; if the identity verification request is not an integrity protection identity verification request, sending an authentication request to a base station to be connected, and monitoring an authentication response state of the authentication request; and if the authentication response state is authentication response failure, determining that the base station to be connected is a pseudo base station.
Optionally, the terminal device may further add the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
S403: and if so, determining the base station to be connected as a pseudo base station.
If the system configuration information of the base station to be connected conforms to any preset rule in the specific implementation manner of step S402, the terminal device regards the base station to be connected as a pseudo base station. The system configuration information of the base station to be connected and/or the system configuration information of the redirection base station of the base station to be connected can be added to the first information.
In the embodiment of the application, the terminal device obtains a system configuration message of a base station to be connected, where the system configuration message includes at least one of a cell base station code, a base station code CID, and/or a public land mobile network PLMN. Further, the terminal device verifies whether the system configuration message meets a preset rule, and if so, the base station to be connected is determined to be a pseudo base station. By adopting the method, the terminal equipment judges the characteristics of the pseudo base station for many times according to the system configuration information of the base station, reduces the probability of misjudgment of the pseudo base station, and improves the identification accuracy of the terminal equipment to the pseudo base station.
Please refer to fig. 6, which is a flowchart illustrating an information processing method according to an embodiment of the present application, where the information processing method includes the following steps:
s601: and sending an authentication message to enable the base station to authenticate the terminal equipment based on the authentication message, and sending a system configuration message to the terminal equipment after the authentication is passed.
The Identity verification message includes identification information of the terminal device, where the identification information is used to identify a unique terminal device, and specifically may be a registration code of the terminal device, an International Mobile Subscriber Identity (IMSI) corresponding to the terminal device, and the like.
The terminal equipment sends an identity authentication message to the base station, the base station receives the identity authentication message, authenticates the identity of the terminal equipment according to the identity authentication message, acquires a system configuration message after the authentication is passed (namely the terminal equipment is legal), and sends the system configuration message to the terminal equipment. Wherein the system configuration message comprises a system configuration message of at least one base station, the system configuration message comprising one or more of a cell code, a base station code CID and/or a public land mobile network.
In one embodiment, the authentication message includes an encrypted signature of a first key corresponding to the terminal device, and further, the terminal device may decrypt the encrypted signature of the first key by using a second key corresponding to the base station; if the decryption is successful, the verification is passed; and/or if decryption fails, the verification fails.
When the encryption mode used by the communication network system corresponding to the terminal device and the base station for encrypting the authentication message is symmetric encryption (for example, the encryption algorithm used is RC5 algorithm and IDEA algorithm), the first key and the second key are the same key. When the communication network system corresponding to the terminal device and the base station adopts the asymmetric encryption mode for encrypting the authentication message, the first secret key is a private key corresponding to the terminal device and the second secret key is a public key of the terminal device stored in the base station. In this case, when the terminal device leaves the factory or the operating system is installed, registration information is submitted to the communication network system corresponding to the base station, where the registration information includes communication network operator information and/or user information corresponding to the terminal device, and after the communication network system verifies the communication network operator information and/or user information included in the registration information, a pair of keys (a public key and a private key) is generated for the terminal device, and the public key (i.e., the second key) is sent to the base station, and the private key (i.e., the first key) is sent to the terminal device.
S602: and verifying whether the system configuration message conforms to a preset rule.
S603: and if so, determining the base station to be connected as a pseudo base station.
For the specific implementation of steps S602 to S603, reference may be made to the specific implementation of steps S402 to S403 in the foregoing embodiment, and redundant description is not repeated here.
In the embodiment of the application, the terminal equipment sends the identity authentication message to the base station, so that the base station authenticates the terminal equipment based on the identity authentication message, and sends the system configuration message to the terminal equipment after the authentication is passed. And then, the terminal equipment verifies whether the system configuration message meets a preset rule, and if so, the base station to be connected is determined to be a pseudo base station. By adopting the method, the safety of the base station information stored by the server is improved, and the identification accuracy of the terminal equipment to the pseudo base station is further improved.
Referring to fig. 7, a schematic structural diagram of an information processing apparatus according to an embodiment of the present application is shown, where the apparatus includes:
an obtaining module 70, configured to obtain a system configuration message of a base station to be connected, where the system configuration message includes a cell code, a base station code CID, and/or a public land mobile network PLMN;
a processing module 71, configured to match the system configuration message of the base station to be connected with at least one pseudo base station system configuration message in a first pseudo base station database;
the processing module 71 is further configured to determine that the base station to be connected is a pseudo base station if the system configuration message of the base station to be connected is successfully matched with the system configuration message of at least one pseudo base station in the first pseudo base station database.
In an embodiment, the processing module 71 is further configured to, if the system configuration message of the base station to be connected fails to match the system configuration message of the at least one pseudo base station, match the cell code of the base station to be connected with a cell code number segment threshold, and/or match the CID of the base station to be connected with a CID number segment threshold; and if the matching between the cell code of the base station to be connected and the threshold of the cell code number segment fails, and/or the matching between the CID of the base station to be connected and the threshold of the CID number segment fails, determining that the base station to be connected is a pseudo base station.
In an embodiment, the processing module 71 is further configured to detect the number of PLMNs in the system configuration message of the base station to be connected, if the cell code of the base station to be connected is successfully matched with the cell code number segment threshold and the CID of the base station to be connected is successfully matched with the CID number segment threshold; if the number of the PLMNs is larger than 1, determining that the base station to be connected is a pseudo base station, and adding the base station to be connected and the redirection base station of the base station to be connected into the first pseudo base station database.
In an embodiment, the information processing apparatus further includes an output module 72, where the output module 72 is configured to send, if the number of PLMNs is equal to 1, a camping request to the base station to be connected, where the camping request is used for the terminal device to connect to the base station to be connected; the processing module 71 is further configured to determine the base station to be connected as a suspicious base station if it is monitored that the response of the residence request is abnormal, and acquire the location information of the terminal device and the location information of the base station to be connected; verifying whether the suspicious base station is a pseudo base station or not according to the position information of the terminal equipment and the position information of the base station to be connected; and if the suspicious base station is verified to be a pseudo base station, adding the suspicious base station and a redirection base station corresponding to the suspicious base station into the first pseudo base station database.
In an embodiment, the processing module 71 is configured to detect whether the location information of the terminal device is within a preset threshold range of the location information of the suspicious base station; and if the position information of the terminal equipment is not in the preset threshold range of the position information of the suspicious base station, determining that the suspicious base station is a pseudo base station.
In an embodiment, after the terminal device sends a camping request to the base station to be connected, the output module 72 is further configured to send a tracking area update TAU request to the base station to be connected if it is detected that a cell code of the base station to be connected is different from a cell code of a base station to which the terminal device is currently connected; the obtaining module 70 is further configured to receive an identity verification request, which is sent by the base station to be connected according to the TAU request and is addressed to the terminal device; the processing module 71 is further configured to detect whether the identity verification request is an integrity protection identity verification request; the output module 72 is further configured to send an authentication request to the to-be-connected base station if the identity verification request is not an integrity protection identity verification request; the processing module 71 is further configured to monitor an authentication response status of the authentication request; and if the authentication response state is authentication response failure, determining that the base station to be connected is a pseudo base station, and adding the base station to be connected and a redirection base station of the base station to be connected into the first pseudo base station database.
In an embodiment, the obtaining module 70 is further configured to obtain location information of the terminal device; acquiring a second pseudo base station database according to the position information; the processing module 71 is further configured to update the first pseudo base station database according to the second pseudo base station database information.
It should be noted that the functions of each unit module of the information processing apparatus described in the embodiment of the present application may be specifically implemented according to the method in the embodiment of the method described in fig. 1 or fig. 2, and the specific implementation process may refer to the description related to the embodiment of the method in fig. 1 or fig. 2, which is not described herein again.
Referring to fig. 8, a schematic structural diagram of an information processing apparatus according to an embodiment of the present application is shown, where the apparatus includes:
an obtaining module 80, configured to obtain a system configuration message of a to-be-connected base station, where the system configuration message includes at least one of a cell code, a base station code CID, and/or a public land mobile network PLMN;
a processing module 81, configured to verify whether the system configuration message conforms to a preset rule;
the processing module 81 is further configured to determine that the base station to be connected is a pseudo base station if the base station to be connected is a pseudo base station.
In one embodiment, the compliance with the preset rule includes at least one of:
if the system configuration message is successfully matched with at least one pseudo base station system configuration message in the first information, the system configuration message conforms to a preset rule;
if the system configuration message is failed to match with at least one pseudo base station system configuration message in the first information, matching the cell code of the base station to be connected with a cell code number segment threshold, and if the matching is failed, conforming to a preset rule;
and if the system configuration message fails to be matched with at least one pseudo base station system configuration message in the first information, matching the CID of the base station to be connected with the CID number segment threshold, and if the matching fails, conforming to a preset rule.
In one embodiment, the processing module 81 is further configured to: if the cell code of the base station to be connected is successfully matched with the cell code number segment threshold value and the CID of the base station to be connected is successfully matched with the CID number segment threshold value, detecting the number of the PLMN in the system configuration message, and if the number of the PLMN is more than 1, conforming to a preset rule; and/or adding the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
In one embodiment, the processing module 81 is further configured to: if the number of the PLMNs is equal to 1, sending a residing request to the base station to be connected, wherein the residing request is used for the terminal equipment to connect the base station to be connected, and if the residing request response is monitored to be abnormal, determining the base station to be connected as a suspicious base station.
In an embodiment, after the step of determining the base station to be connected as a suspicious base station, the obtaining module 80 is further configured to: acquiring the position information of the terminal equipment and/or the position information of the base station to be connected; the processing module 81 is further configured to verify whether the suspicious base station is a pseudo base station according to the location information of the terminal device and/or the location information of the base station to be connected.
In an embodiment, the processing module 81 is further configured to add the suspicious base station and/or a redirection base station corresponding to the suspicious base station to the first information if it is verified that the suspicious base station is a fake base station.
In an embodiment, the processing module 81 is configured to detect whether the location information of the terminal device is within a preset threshold range of the location information of the suspicious base station; and if the suspicious base station is not in the preset threshold range, determining that the suspicious base station is a pseudo base station.
In an embodiment, after the terminal device sends a camping request to the base station to be connected, the processing module 81 is further configured to send a tracking area update TAU request to the base station to be connected if it is detected that a cell code of the base station to be connected is different from a cell code of a base station to which the terminal device is currently connected; receiving an identity verification request aiming at the terminal equipment, which is sent by the base station to be connected according to the TAU request; detecting whether the identity verification request is an integrity protection identity verification request; if the identity verification request is not an integrity protection identity verification request, sending an authentication request to the base station to be connected, and monitoring an authentication response state of the authentication request; and if the authentication response state is authentication response failure, determining that the base station to be connected is a pseudo base station.
In an embodiment, after the step of determining that the base station to be connected is a pseudo base station, the processing module 81 is further configured to add the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
In an embodiment, the processing module 81 is further configured to obtain location information of the terminal device; acquiring second information according to the position information; and updating the first information according to the second information.
In one embodiment, the first information and/or the second information comprises at least one base station data information.
It should be noted that the functions of each unit module of the information processing apparatus described in the embodiment of the present application may be specifically implemented according to the method in the method embodiment described in fig. 4, and the specific implementation process may refer to the description related to the method embodiment in fig. 4, which is not described herein again.
Referring to fig. 9, a schematic structural diagram of an information processing apparatus according to an embodiment of the present application is shown, where the apparatus includes:
an output module 90, configured to send an authentication message, so that the base station authenticates the terminal device based on the authentication message, and sends a system configuration message to the terminal device after the authentication is passed;
the processing module 91, where the authentication message includes an encrypted signature of a first key corresponding to the terminal device, and is used to verify whether the system configuration message conforms to a preset rule;
the processing module 91 is further configured to determine that the base station to be connected is a pseudo base station if the connection is met.
In an embodiment, the processing module 91 is further configured to decrypt the encrypted signature of the first key by using a second key corresponding to the base station; if the decryption is successful, the verification is passed; and/or if decryption fails, the verification fails.
In one embodiment, the system configuration message includes at least one of a cell code, a base station code CID, and/or a public land mobile network PLMN.
In one embodiment, the compliance with the preset rule includes at least one of:
if the system configuration message is successfully matched with at least one pseudo base station system configuration message in the first information, the system configuration message conforms to a preset rule;
if the system configuration message is failed to match with at least one pseudo base station system configuration message in the first information, matching the cell code of the base station to be connected with a cell code number segment threshold, and if the matching is failed, conforming to a preset rule;
and if the system configuration message fails to be matched with at least one pseudo base station system configuration message in the first information, matching the CID of the base station to be connected with the CID number segment threshold, and if the matching fails, conforming to a preset rule.
In one embodiment, the processing module 91 is further configured to: if the cell code of the base station to be connected is successfully matched with the cell code number segment threshold value and the CID of the base station to be connected is successfully matched with the CID number segment threshold value, detecting the number of the PLMN in the system configuration message, and if the number of the PLMN is more than 1, conforming to a preset rule; and/or adding the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
In one embodiment, the processing module 91 is further configured to: if the number of the PLMNs is equal to 1, sending a residing request to the base station to be connected, wherein the residing request is used for the terminal equipment to connect the base station to be connected, and if the residing request response is monitored to be abnormal, determining the base station to be connected as a suspicious base station.
In an embodiment, after the step of determining the base station to be connected as a suspicious base station, the obtaining module 90 is further configured to: acquiring the position information of the terminal equipment and/or the position information of the base station to be connected; the processing module 91 is further configured to verify whether the suspicious base station is a pseudo base station according to the location information of the terminal device and/or the location information of the base station to be connected.
In an embodiment, the processing module 91 is further configured to add the suspicious base station and/or a redirection base station corresponding to the suspicious base station to the first information if it is verified that the suspicious base station is a fake base station.
In an embodiment, the processing module 91 is configured to detect whether the location information of the terminal device is within a preset threshold range of the location information of the suspicious base station; and if the suspicious base station is not in the preset threshold range, determining that the suspicious base station is a pseudo base station.
In an embodiment, after the terminal device sends a camping request to the base station to be connected, the processing module 91 is further configured to send a tracking area update TAU request to the base station to be connected if it is detected that a cell code of the base station to be connected is different from a cell code of a base station to which the terminal device is currently connected; receiving an identity verification request aiming at the terminal equipment, which is sent by the base station to be connected according to the TAU request; detecting whether the identity verification request is an integrity protection identity verification request; if the identity verification request is not an integrity protection identity verification request, sending an authentication request to the base station to be connected, and monitoring an authentication response state of the authentication request; and if the authentication response state is authentication response failure, determining that the base station to be connected is a pseudo base station.
In an embodiment, after the step of determining that the base station to be connected is a pseudo base station, the processing module 91 is further configured to: and adding the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
In an embodiment, the processing module 91 is further configured to obtain location information of the terminal device; acquiring second information according to the position information; and updating the first information according to the second information.
In one embodiment, the first information and/or the second information comprises at least one base station data information.
It should be noted that the functions of each unit module of the information processing apparatus described in the embodiment of the present application may be specifically implemented according to the method in the method embodiment described in fig. 6, and the specific implementation process may refer to the description related to the method embodiment in fig. 6, which is not described herein again.
Based on the description of the method embodiment and the apparatus item embodiment, the embodiment of the present application further provides a terminal device. Referring to fig. 10, the terminal device may include at least a processor 1001, an input device 1002, an output device 1003, and a memory 1004; the processor 1001, the input device 1002, the output device 1003, and the memory 1004 may be connected by a bus or other connection means. The memory 1004 may also include a computer storage medium for storing a computer program comprising program instructions, and the processor 1001 may be configured to execute the program instructions stored by the memory 1004. The processor 1001 (or CPU) is a computing core and a control core of the terminal device, and is adapted to implement one or more instructions, and specifically, adapted to load and execute the one or more instructions so as to implement the corresponding method flow or the corresponding function in the data Processing method embodiment. Wherein, the processor 1001 is configured to call the program instruction to execute: acquiring a system configuration message of a base station to be connected, wherein the system configuration message comprises at least one of a cell code, a base station code CID and/or a public land mobile network PLMN; verifying whether the system configuration message conforms to a preset rule; and if so, determining that the base station to be connected is a pseudo base station.
In one embodiment, the compliance with the preset rule includes at least one of: if the system configuration message is successfully matched with at least one pseudo base station system configuration message in the first information, the system configuration message conforms to a preset rule; if the system configuration message is failed to match with at least one pseudo base station system configuration message in the first information, matching the cell code of the base station to be connected with a cell code number segment threshold, and if the matching is failed, conforming to a preset rule; and if the system configuration message fails to be matched with at least one pseudo base station system configuration message in the first information, matching the CID of the base station to be connected with the CID number segment threshold, and if the matching fails, conforming to a preset rule.
In one embodiment, the processor 1001 is further configured to: if the cell code of the base station to be connected is successfully matched with the cell code number segment threshold value and the CID of the base station to be connected is successfully matched with the CID number segment threshold value, detecting the number of the PLMN in the system configuration message, and if the number of the PLMN is more than 1, conforming to a preset rule; and/or adding the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
In one embodiment, the processor 1001 is further configured to: if the number of the PLMNs is equal to 1, sending a residing request to the base station to be connected, wherein the residing request is used for the terminal equipment to connect the base station to be connected, and if the residing request response is monitored to be abnormal, determining the base station to be connected as a suspicious base station.
In an embodiment, after the step of determining the base station to be connected as a suspicious base station, the processor 1001 is further configured to: acquiring the position information of the terminal equipment and/or the position information of the base station to be connected; and verifying whether the suspicious base station is a pseudo base station or not according to the position information of the terminal equipment and/or the position information of the base station to be connected.
In an embodiment, the processor 1001 is further configured to add the suspicious base station and/or a redirection base station corresponding to the suspicious base station to the first information if it is verified that the suspicious base station is a fake base station.
In an embodiment, the processor 1001 is configured to detect whether the location information of the terminal device is within a preset threshold range of the location information of the suspicious base station; and if the suspicious base station is not in the preset threshold range, determining that the suspicious base station is a pseudo base station.
In an embodiment, after the terminal device sends a camping request to the base station to be connected, the processor 1001 is further configured to send a tracking area update TAU request to the base station to be connected if it is detected that a cell code of the base station to be connected is different from a cell code of a base station to which the terminal device is currently connected; receiving an identity verification request aiming at the terminal equipment, which is sent by the base station to be connected according to the TAU request; detecting whether the identity verification request is an integrity protection identity verification request; if the identity verification request is not an integrity protection identity verification request, sending an authentication request to the base station to be connected, and monitoring an authentication response state of the authentication request; and if the authentication response state is authentication response failure, determining that the base station to be connected is a pseudo base station.
In an embodiment, after the step of determining that the base station to be connected is a pseudo base station, the processor 1001 is further configured to add the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
In an embodiment, the processor 1001 is further configured to obtain location information of the terminal device; acquiring second information according to the position information; and updating the first information according to the second information.
In one embodiment, the first information and/or the second information comprises at least one base station data information.
In one embodiment, the processor 1001 is configured to call the program instructions to perform: sending an identity authentication message to enable a base station to authenticate terminal equipment based on the identity authentication message, and sending a system configuration message to the terminal equipment after the authentication is passed; verifying whether the system configuration message conforms to a preset rule; and if so, determining that the base station to be connected is a pseudo base station.
In one embodiment, the processor 1001 is further configured to decrypt the encrypted signature of the first key by using a second key corresponding to the base station; if the decryption is successful, the verification is passed; and/or if decryption fails, the verification fails.
In one embodiment, the system configuration message includes at least one of a cell code, a base station code CID, and/or a public land mobile network PLMN.
In one embodiment, the compliance with the preset rule includes at least one of: if the system configuration message is successfully matched with at least one pseudo base station system configuration message in the first information, the system configuration message conforms to a preset rule; if the system configuration message is failed to match with at least one pseudo base station system configuration message in the first information, matching the cell code of the base station to be connected with a cell code number segment threshold, and if the matching is failed, conforming to a preset rule; and if the system configuration message fails to be matched with at least one pseudo base station system configuration message in the first information, matching the CID of the base station to be connected with the CID number segment threshold, and if the matching fails, conforming to a preset rule.
In one embodiment, the processor 1001 is further configured to: if the cell code of the base station to be connected is successfully matched with the cell code number segment threshold value and the CID of the base station to be connected is successfully matched with the CID number segment threshold value, detecting the number of the PLMN in the system configuration message, and if the number of the PLMN is more than 1, conforming to a preset rule; and/or adding the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
In one embodiment, the processor 1001 is further configured to: if the number of the PLMNs is equal to 1, sending a residing request to the base station to be connected, wherein the residing request is used for the terminal equipment to connect the base station to be connected, and if the residing request response is monitored to be abnormal, determining the base station to be connected as a suspicious base station.
In an embodiment, after the step of determining the base station to be connected as a suspicious base station, the processor 1001 is further configured to: acquiring the position information of the terminal equipment and/or the position information of the base station to be connected; and verifying whether the suspicious base station is a pseudo base station or not according to the position information of the terminal equipment and/or the position information of the base station to be connected.
In an embodiment, the processor 1001 is further configured to add the suspicious base station and/or a redirection base station corresponding to the suspicious base station to the first information if it is verified that the suspicious base station is a fake base station.
In an embodiment, the processor 1001 is configured to detect whether the location information of the terminal device is within a preset threshold range of the location information of the suspicious base station; and if the suspicious base station is not in the preset threshold range, determining that the suspicious base station is a pseudo base station.
In an embodiment, after the terminal device sends a camping request to the base station to be connected, the processor 1001 is further configured to send a tracking area update TAU request to the base station to be connected if it is detected that a cell code of the base station to be connected is different from a cell code of a base station to which the terminal device is currently connected; receiving an identity verification request aiming at the terminal equipment, which is sent by the base station to be connected according to the TAU request; detecting whether the identity verification request is an integrity protection identity verification request; if the identity verification request is not an integrity protection identity verification request, sending an authentication request to the base station to be connected, and monitoring an authentication response state of the authentication request; and if the authentication response state is authentication response failure, determining that the base station to be connected is a pseudo base station.
In an embodiment, after the step of determining that the base station to be connected is a pseudo base station, the processor 1001 is further configured to: and adding the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
In an embodiment, the processor 1001 is further configured to obtain location information of the terminal device; acquiring second information according to the position information; and updating the first information according to the second information.
In one embodiment, the first information and/or the second information comprises at least one base station data information.
In one embodiment, the processor 1001 is configured to invoke the program instructions to perform: acquiring a system configuration message of a base station to be connected, wherein the system configuration message comprises a cell code, a base station code CID and/or a public land mobile network PLMN; matching the system configuration message of the base station to be connected with at least one pseudo base station system configuration message in a first pseudo base station database; and if the system configuration message of the base station to be connected is successfully matched with at least one pseudo base station system configuration message in the first pseudo base station database, determining that the base station to be connected is a pseudo base station.
In an embodiment, the processor 1001 is further specifically configured to: if the system configuration message of the base station to be connected fails to be matched with the system configuration message of the at least one pseudo base station, matching the cell code of the base station to be connected with a cell code number segment threshold, and/or matching the CID of the base station to be connected with a CID number segment threshold; and if the matching between the cell code of the base station to be connected and the threshold of the cell code number segment fails, and/or the matching between the CID of the base station to be connected and the threshold of the CID number segment fails, determining that the base station to be connected is a pseudo base station.
In an embodiment, the processor 1001 is further specifically configured to: if the cell code of the base station to be connected is successfully matched with the cell code number segment threshold value, and the CID of the base station to be connected is successfully matched with the CID number segment threshold value, detecting the number of the PLMNs in the system configuration message of the base station to be connected; if the number of the PLMNs is larger than 1, determining that the base station to be connected is a pseudo base station, and adding the base station to be connected and the redirection base station of the base station to be connected into the first pseudo base station database.
In an embodiment, the processor 1001 is further specifically configured to: if the number of the PLMNs is equal to 1, the terminal equipment sends a residing request to the base station to be connected, and the residing request is used for the terminal equipment to be connected with the base station to be connected; if the situation that the response of the residence request is abnormal is monitored, determining the base station to be connected as a suspicious base station, and acquiring the position information of the terminal equipment and the position information of the base station to be connected; verifying whether the suspicious base station is a pseudo base station or not according to the position information of the terminal equipment and the position information of the base station to be connected; and if the suspicious base station is verified to be a pseudo base station, adding the suspicious base station and a redirection base station corresponding to the suspicious base station into the first pseudo base station database.
In an embodiment, the processor 1001 is specifically configured to: detecting whether the position information of the terminal equipment is within a preset threshold range of the position information of the suspicious base station; and if the position information of the terminal equipment is not in the preset threshold range of the position information of the suspicious base station, determining that the suspicious base station is a pseudo base station.
In an embodiment, after the terminal device sends a camping request to the base station to be connected, the processor 1001 is further specifically configured to: if the cell code of the base station to be connected is detected to be different from the cell code of the current base station connected with the terminal equipment, sending a tracking area update TAU request to the base station to be connected; receiving an identity verification request aiming at the terminal equipment, which is sent by the base station to be connected according to the TAU request; detecting whether the identity verification request is an integrity protection identity verification request; if the identity verification request is not an integrity protection identity verification request, sending an authentication request to the base station to be connected, and monitoring an authentication response state of the authentication request; and if the authentication response state is authentication response failure, determining that the base station to be connected is a pseudo base station, and adding the base station to be connected and a redirection base station of the base station to be connected into the first pseudo base station database.
In an embodiment, the processor 1001 is further specifically configured to: acquiring the position information of the terminal equipment; acquiring a second pseudo base station database according to the position information; and updating the first pseudo base station database according to the second pseudo base station database information.
It should be understood that, in the embodiment of the present Application, the Processor 1001 may be a Central Processing Unit (CPU), and the Processor 1001 may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field-Programmable Gate arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete a hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 1004 may include a read-only memory and a random access memory, and provides instructions and data to the processor 1001. A portion of the memory 1004 may also include non-volatile random access memory. For example, the memory 1004 may also store device type information. The input device 1002 may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user), a microphone, a physical keyboard, etc., and the output device 1003 may include a display (LCD, etc.), a speaker, etc.
In a specific implementation, the processor 1001, the memory 1004, the input device 1002, and the output device 1003 described in this embodiment of the present application may execute the implementation described in the method embodiment described in fig. 1, fig. 2, fig. 4, or fig. 6 provided in this embodiment of the present application, or may also execute the implementation of the information processing apparatus described in fig. 7, fig. 8, or fig. 9 provided in this embodiment of the present application, and details thereof are not repeated here.
In another embodiment of the present application, a computer storage medium is provided, where a computer program is stored, the computer program includes program instructions, and the program instructions, when executed by a processor, implement the method of the foregoing embodiment, and the computer storage medium may be an internal storage unit of the terminal device described in any of the foregoing embodiments, such as a hard disk or a memory of the terminal device. The computer storage medium may also be an external storage device of the terminal device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device. Further, the computer storage medium may also include both an internal storage unit and an external storage device of the terminal device. The computer storage medium is used for storing the computer program and other programs and data required by the terminal device. The computer storage medium may also be used to temporarily store data that has been output or is to be output.
The present application further provides an apparatus, comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method as described above.
Embodiments of the present application also provide a computer program product, which includes computer program code, when the computer program code runs on a computer, the computer is caused to execute the method as described in the above various possible embodiments.
An embodiment of the present application further provides a chip, which includes a memory and a processor, where the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that a device in which the chip is installed executes the method described in the above various possible embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above.
The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
While the present disclosure has been described with reference to particular embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present disclosure.

Claims (26)

1. An information processing method, characterized in that the method comprises:
s11, obtaining a system configuration message of a base station to be connected, wherein the system configuration message comprises at least one of a cell code, a base station code CID and/or a public land mobile network PLMN;
s12, verifying whether the system configuration message meets a preset rule;
and S13, if yes, determining that the base station to be connected is a pseudo base station.
2. The method according to claim 1, wherein the compliance with the predetermined rule comprises at least one of:
if the system configuration message is successfully matched with at least one pseudo base station system configuration message in the first information, the system configuration message conforms to a preset rule;
if the system configuration message is failed to match with at least one pseudo base station system configuration message in the first information, matching the cell code of the base station to be connected with a cell code number segment threshold, and if the matching is failed, conforming to a preset rule;
and if the system configuration message fails to be matched with at least one pseudo base station system configuration message in the first information, matching the CID of the base station to be connected with the CID number segment threshold, and if the matching fails, conforming to a preset rule.
3. The method of claim 2, further comprising:
if the cell code of the base station to be connected is successfully matched with the cell code number segment threshold value and the CID of the base station to be connected is successfully matched with the CID number segment threshold value, detecting the number of the PLMN in the system configuration message, and if the number of the PLMN is more than 1, conforming to a preset rule; and/or adding the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
4. The method of claim 3, further comprising:
if the number of the PLMNs is equal to 1, sending a residing request to the base station to be connected, wherein the residing request is used for the terminal equipment to connect the base station to be connected, and if the residing request response is monitored to be abnormal, determining the base station to be connected as a suspicious base station.
5. The method according to claim 4, further comprising, after the step of determining the base station to be connected as a suspicious base station:
acquiring the position information of the terminal equipment and/or the position information of the base station to be connected;
and verifying whether the suspicious base station is a pseudo base station or not according to the position information of the terminal equipment and/or the position information of the base station to be connected.
6. The method of claim 5, further comprising:
and if the suspicious base station is verified to be a pseudo base station, adding the suspicious base station and/or a redirection base station corresponding to the suspicious base station into the first information.
7. The method according to claim 5, wherein said verifying whether the suspicious base station is a pseudo base station according to the location information of the terminal device and/or the location information of the base station to be connected comprises:
detecting whether the position information of the terminal equipment is within a preset threshold range of the position information of the suspicious base station;
and if the suspicious base station is not in the preset threshold range, determining that the suspicious base station is a pseudo base station.
8. The method of claim 4, wherein after the terminal device sends the camping request to the base station to be connected, the method further comprises:
if the cell code of the base station to be connected is detected to be different from the cell code of the current base station connected with the terminal equipment, sending a tracking area update TAU request to the base station to be connected;
receiving an identity verification request aiming at the terminal equipment, which is sent by the base station to be connected according to the TAU request;
detecting whether the identity verification request is an integrity protection identity verification request;
if the identity verification request is not an integrity protection identity verification request, sending an authentication request to the base station to be connected, and monitoring an authentication response state of the authentication request;
and if the authentication response state is authentication response failure, determining that the base station to be connected is a pseudo base station.
9. The method according to claim 8, further comprising, after the step of determining that the base station to be connected is a pseudo base station:
and adding the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
10. The method according to any one of claims 1 to 9, further comprising:
acquiring the position information of the terminal equipment;
acquiring second information according to the position information;
and updating the first information according to the second information.
11. The method of claim 10, wherein the first information and/or the second information comprises at least one base station data information.
12. An information processing method, characterized in that the method comprises:
s21, sending an identity authentication message to enable the base station to authenticate the terminal equipment based on the identity authentication message, and sending a system configuration message to the terminal equipment after the authentication is passed;
s22, verifying whether the system configuration message meets a preset rule;
and S23, if yes, determining that the base station to be connected is a pseudo base station.
13. The method of claim 12, wherein the authentication message includes a cryptographic signature of a first key corresponding to the terminal device, and wherein the verifying whether the terminal device is legitimate based on the authentication message comprises:
decrypting the encrypted signature of the first key by using a second key corresponding to the base station;
if the decryption is successful, the verification is passed; and/or the presence of a gas in the gas,
if the decryption fails, the verification fails.
14. The method of claim 12, wherein the system configuration message comprises at least one of a cell code, a base station Code (CID), and/or a Public Land Mobile Network (PLMN).
15. The method of claim 14, wherein the compliance with the predetermined rule comprises at least one of:
if the system configuration message is successfully matched with at least one pseudo base station system configuration message in the first information, the system configuration message conforms to a preset rule;
if the system configuration message is failed to match with at least one pseudo base station system configuration message in the first information, matching the cell code of the base station to be connected with a cell code number segment threshold, and if the matching is failed, conforming to a preset rule;
and if the system configuration message fails to be matched with at least one pseudo base station system configuration message in the first information, matching the CID of the base station to be connected with the CID number segment threshold, and if the matching fails, conforming to a preset rule.
16. The method of claim 15, further comprising:
if the cell code of the base station to be connected is successfully matched with the cell code number segment threshold value and the CID of the base station to be connected is successfully matched with the CID number segment threshold value, detecting the number of the PLMN in the system configuration message, and if the number of the PLMN is more than 1, conforming to a preset rule; and/or adding the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
17. The method of claim 16, further comprising:
if the number of the PLMNs is equal to 1, the terminal equipment sends a residing request to the base station to be connected, the residing request is used for the terminal equipment to be connected with the base station to be connected, and if the residing request response is monitored to be abnormal, the base station to be connected is determined to be a suspicious base station.
18. The method according to claim 17, further comprising, after the step of determining the base station to be connected as a suspicious base station:
acquiring the position information of the terminal equipment and/or the position information of the base station to be connected;
and verifying whether the suspicious base station is a pseudo base station or not according to the position information of the terminal equipment and/or the position information of the base station to be connected.
19. The method of claim 18, further comprising:
and if the suspicious base station is verified to be a pseudo base station, adding the suspicious base station and/or a redirection base station corresponding to the suspicious base station into the first information.
20. The method according to claim 18, wherein said verifying whether the suspicious base station is a pseudo base station according to the location information of the terminal device and/or the location information of the base station to be connected comprises:
detecting whether the position information of the terminal equipment is within a preset threshold range of the position information of the suspicious base station;
and if the suspicious base station is not in the preset threshold range, determining that the suspicious base station is a pseudo base station.
21. The method of claim 17, wherein after the terminal device sends a camping request to the base station to be connected, the method further comprises:
if the cell code of the base station to be connected is detected to be different from the cell code of the current base station connected with the terminal equipment, sending a tracking area update TAU request to the base station to be connected;
receiving an identity verification request aiming at the terminal equipment, which is sent by the base station to be connected according to the TAU request;
detecting whether the identity verification request is an integrity protection identity verification request;
if the identity verification request is not an integrity protection identity verification request, sending an authentication request to the base station to be connected, and monitoring an authentication response state of the authentication request;
and if the authentication response state is authentication response failure, determining that the base station to be connected is a pseudo base station.
22. The method according to claim 21, further comprising, after the step of determining that the base station to be connected is a pseudo base station:
and adding the base station to be connected and/or a redirection base station of the base station to be connected to the first information.
23. The method according to any one of claims 12 to 22, further comprising:
acquiring the position information of the terminal equipment;
acquiring second information according to the position information;
and updating the first information according to the second information.
24. The method of claim 23, wherein the first information and/or the second information comprises at least one base station data information.
25. A terminal device, comprising: a memory and a processor;
the memory is to store program instructions;
the processor is configured to invoke program instructions in the memory to perform the method of any of claims 1 to 24.
26. A readable storage medium, wherein the readable storage medium has a computer program stored thereon; the computer program, when executed, implementing the method of any one of claims 1 to 24.
CN202010780615.6A 2020-08-04 2020-08-04 Information processing method, terminal equipment and storage medium Pending CN111988784A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010780615.6A CN111988784A (en) 2020-08-04 2020-08-04 Information processing method, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010780615.6A CN111988784A (en) 2020-08-04 2020-08-04 Information processing method, terminal equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111988784A true CN111988784A (en) 2020-11-24

Family

ID=73445074

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010780615.6A Pending CN111988784A (en) 2020-08-04 2020-08-04 Information processing method, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111988784A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357672A (en) * 2015-11-20 2016-02-24 华为技术有限公司 Pseudo base station identification method and user equipment
CN105764059A (en) * 2014-12-15 2016-07-13 北京新讯世纪信息技术有限公司 Method for identifying pseudo base station based on terminal position information
CN109474932A (en) * 2017-09-08 2019-03-15 华为技术有限公司 A kind of identification of pseudo-base station and defence method and terminal
CN110312259A (en) * 2019-08-20 2019-10-08 Oppo广东移动通信有限公司 Pseudo-base station recognition methods, device, terminal and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105764059A (en) * 2014-12-15 2016-07-13 北京新讯世纪信息技术有限公司 Method for identifying pseudo base station based on terminal position information
CN105357672A (en) * 2015-11-20 2016-02-24 华为技术有限公司 Pseudo base station identification method and user equipment
CN109474932A (en) * 2017-09-08 2019-03-15 华为技术有限公司 A kind of identification of pseudo-base station and defence method and terminal
CN110312259A (en) * 2019-08-20 2019-10-08 Oppo广东移动通信有限公司 Pseudo-base station recognition methods, device, terminal and storage medium

Similar Documents

Publication Publication Date Title
RU2546610C1 (en) Method of determining unsafe wireless access point
US20190387407A1 (en) Wireless communications
US20220295269A1 (en) Network access authentication method and device
US20120149330A1 (en) System and method to dynamically authenticate mobile devices
US8931065B2 (en) OTA bootstrap method and system
CN110535877B (en) Internet of things terminal identity authentication method and system based on double authentication
WO1997001231A1 (en) Method and apparatus for authentication in a communication system
CN111246474B (en) Base station authentication method and device
CN111132305B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
KR20160131572A (en) Method and apparatus for certificating information related payment in a mobile communication system
KR101807523B1 (en) Apparatus and method for identifying wireless network provider in wireless communication system
US10820265B2 (en) IoT device connectivity provisioning
US20210282009A1 (en) Integrity for mobile network data storage
CN106912049B (en) Method for improving user authentication experience
WO2013107152A1 (en) Pws signature information verification method, device and system
US20150222433A1 (en) Method and apparatus for disabling algorithms in a device
CN111988784A (en) Information processing method, terminal equipment and storage medium
US8380165B1 (en) Identifying a cloned mobile device in a communications network
US8948745B2 (en) Rogue tower detection in a wireless network
CN111770488A (en) EHPLMN updating method, related equipment and storage medium
US20200374693A1 (en) Reconfiguration of Communications Devices
EP3512229B1 (en) Network access authentication processing method and device
CN112020065A (en) Information processing method, terminal equipment, server and storage medium
CN106888449B (en) USIM application information processing method and system
KR20130074829A (en) Device and method for managing terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201124

RJ01 Rejection of invention patent application after publication