CN112087758A - Detection system and method for identifying pseudo base station based on terminal position information - Google Patents

Detection system and method for identifying pseudo base station based on terminal position information Download PDF

Info

Publication number
CN112087758A
CN112087758A CN202010993207.9A CN202010993207A CN112087758A CN 112087758 A CN112087758 A CN 112087758A CN 202010993207 A CN202010993207 A CN 202010993207A CN 112087758 A CN112087758 A CN 112087758A
Authority
CN
China
Prior art keywords
data
base station
message
identifying
user equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010993207.9A
Other languages
Chinese (zh)
Other versions
CN112087758B (en
Inventor
高平
范保连
张垒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Chuanglian Yixun Technology Co ltd
Original Assignee
Beijing Chuanglian Yixun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Chuanglian Yixun Technology Co ltd filed Critical Beijing Chuanglian Yixun Technology Co ltd
Priority to CN202010993207.9A priority Critical patent/CN112087758B/en
Publication of CN112087758A publication Critical patent/CN112087758A/en
Application granted granted Critical
Publication of CN112087758B publication Critical patent/CN112087758B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention provides a detection system and a method for identifying a pseudo base station based on terminal position information, which comprises a data acquisition device, an identification device, a shielding device, a hidden strategy, a safety device and a processor, wherein the acquisition device is constructed for acquiring data received by the base station; the identification device is configured to identify the data collected by the collection device; the shielding device is configured to intercept data that does not comply with traffic conditions; the hiding policy is configured to process data in cooperation with the shielding device; the safety device is configured to maintain safety of the entire system. In the present invention, after the mobile device enters the signal circle, the location information of the user device is identified or located, that is: and positioning the user equipment according to the relation of the signal strength of the user equipment, and positioning the user equipment with a coded base station of a base station provider.

Description

Detection system and method for identifying pseudo base station based on terminal position information
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a detection system and method for identifying a pseudo base station based on terminal location information.
Background
At present, a pseudo base station appears in an actual communication network, and some lawbreakers forge a public mobile operator base station to attract surrounding communication terminals by forging partial network parameters and increasing self transmitting power; after the communication terminal successfully resides in the pseudo base station cell, the lawbreakers can acquire some privacy information in the communication terminal, such as user identity information, and then acquire illegal benefits from the privacy information.
For example, CN104244252A discloses in the prior art that a mobile phone needs to communicate through a base station, the base station includes a carrier base station, and in addition, an illegal person can send information to the mobile phone through a pseudo base station. The pseudo base station is a high-tech instrument, generally comprises a host and a notebook computer, can search mobile phone card information within a certain radius range by taking the pseudo base station as a center through a short message group sender, a short message sender and other related equipment, and forcibly sends short messages such as fraud, advertising promotion and the like to a mobile phone of a user by arbitrarily pretending to be a base station of an operator by using mobile phone numbers of other people. Another typical pseudo base station identification method, apparatus and terminal disclosed in the prior art of WO2017185742a1, for example, a pseudo base station identification method, apparatus, mobile terminal and storage medium disclosed in the prior art of WO2020087417a1, in the existing GSM mobile communication system, only one-way authentication can be performed, that is, authentication of a network to a communication terminal is performed, however, the communication terminal cannot actively identify validity of a network identity, so that after the communication terminal establishes a communication connection with a pseudo base station, leakage of user privacy information, even loss of personal property, and the like may be caused.
The invention is made in order to solve the problems of poor identification performance, incapability of shielding, easiness in causing information leakage and the like in the field.
Disclosure of Invention
The invention aims to provide a detection system and a method for identifying a pseudo base station based on terminal position information, aiming at the defects of the identification and shielding of the pseudo base station at present.
In order to overcome the defects of the prior art, the invention adopts the following technical scheme:
a detection system for identifying a pseudo base station based on terminal position information comprises a data acquisition device, an identification device, a shielding device, a hiding strategy, a safety device and a processor, wherein the acquisition device is configured to acquire data received by the base station; the identification device is configured to identify the data collected by the collection device; the shielding device is configured to intercept data that does not comply with traffic conditions; the hiding policy is configured to process data in cooperation with the shielding device; the safety device is configured to maintain safety of the entire system.
Optionally, the acquisition device comprises an acquisition module configured to identify data to be sent to a recipient device and a security rule; receiving a current security rule to be used when creating a message to send data; the security rules are configured to obfuscate data according to current security preconditions and create a message to contain the obfuscated data; and sending the message to the recipient device; the current security prerequisite comprises a different obfuscation key than the previously used security prerequisite and the previously used; prior to obfuscating the data, sharing a library including current security premises with a sending device and the recipient device.
Optionally, the shielding device includes a shielding device and a data selecting unit, where the shielding device is configured to shield data that does not meet a rule in the acquisition device, and select the data based on a selecting operation of the selecting unit; the data acquisition unit is structured to be coupled to at least one data capture device of a plurality of baseband controllers, wherein the baseband controllers are configured to determine a data-based location of a first user based on communication data from the at least one data capture device; the signature marker determines mapping data that associates the signature marker with a data-based location of the user.
Optionally, the hidden strategy includes a search base, a hidden memory configured to provide a mutually agreed number of chips for each phasor stored on the hidden memories of the sender subsystem and the receiver subsystem to find a pilot spreading vector for each corresponding phasor; the search bank is structured to match a date and time at which a message is to be transmitted with at least one pilot scheduled start date and time and at least one scheduled pilot end time and date to create a pilot spreading vector for each pilot spreading vector, combine each data spreading data vector with each pilot spreading vector, and a transmitter subsystem configured to transmit each chip of the combined data spreading vector and pilot spreading pilot vector as a signal.
Optionally, the security apparatus comprises a sender device, a receiver device and a security application, the sender device identifying data to share with a recipient device; the security application is structured as a prerequisite to requesting an update before constructing any message format, packet or other datagram; the security application is configured to be responsible for identifying the most recent prerequisite to apply to the message sharing operation, and on a periodic basis creating the prerequisite, and after a certain time has elapsed, after the most recent message transfer operation, updating the prerequisite in response to a message request or the like.
Optionally, the signature data determines the mapping data based on a timestamp of the signature marker and a timestamp of a data-based location of the user.
In addition, the invention provides a detection method for identifying a pseudo base station based on terminal position information, which comprises the steps of receiving legal interception information which identifies user equipment with the base station; and upon subsequent initiation of a call associated with the user equipment, enabling a lawful interception detection point associated with the call; and when the enabled lawful interception detection point appears, sending a message to indicate the appearance of the lawful interception detection point.
Optionally, a lawful interception message is received from a lawful interception delivery function and a message indicating the presence of a lawful interception detection point is sent to the lawful interception delivery function, causing the media gateway to send the call content of the call to the lawful interception delivery function after initiation of the call associated with the user equipment.
Optionally, the interception database is updated according to the lawful interception message to reflect the interception status of the user equipment, wherein, when a call associated with the user equipment is subsequently initiated, the lawful interception detection point is enabled according to the interception status of the user equipment in the user database.
The beneficial effects obtained by the invention are as follows:
1. after the mobile device is adopted to enter the signal circle, the position information of the user equipment can be identified or positioned, namely: positioning the user equipment according to the relation of the signal intensity of the user equipment, and positioning the user equipment with a coded base station of a base station provider;
2. the data is processed by the acquisition device through the obfuscated secret key, so that the safety of the information is not threatened or stolen;
3. the shielding device and the data selection unit are matched for use, so that the data can be selected in the using process, and each data is shielded or hidden based on a set rule;
4. the passing and protection among all base stations are realized through a hidden strategy and the detection and determination of the abnormal signals by an acquisition module of the acquisition device, so that the information of user equipment is prevented from being stolen;
5. the safety application program is adopted to carry out adaptive adjustment according to the actual interception rule, so that the interconnection and intercommunication of information among all base stations are effectively ensured, and in addition, after the prerequisite condition is periodically adjusted, the whole system can be more effectively protected.
Drawings
The invention will be further understood from the following description in conjunction with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the embodiments. Like reference numerals designate corresponding parts throughout the different views.
FIG. 1 is a schematic control flow diagram of the present invention.
Fig. 2 is a schematic view of an application scenario of the present invention.
Fig. 3 is a schematic control flow diagram of the acquisition device.
Fig. 4 is a schematic control flow diagram of the shielding apparatus.
Fig. 5 is a control flow diagram of the safety device.
Detailed Description
In order to make the objects and advantages of the present invention more apparent, the present invention will be further described in detail with reference to the following embodiments; it should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. Other systems, methods, and/or features of the present embodiments will become apparent to those skilled in the art upon review of the following detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims. Additional features of the disclosed embodiments are described in, and will be apparent from, the detailed description that follows.
The same or similar reference numerals in the drawings of the embodiments of the present invention correspond to the same or similar components; in the description of the present invention, it should be understood that if there is an orientation or positional relationship indicated by the terms "upper" and "lower" and "left" and "right" etc., it is only for convenience of description and simplification of the description based on the orientation or positional relationship shown in the drawings, but it is not indicated or implied that the device or assembly referred to must have a specific orientation.
The first embodiment is as follows: a detection system for identifying a pseudo base station based on terminal position information comprises a data acquisition device, an identification device, a shielding device, a hiding strategy, a safety device and a processor, wherein the acquisition device is configured to acquire data received by the base station; the identification device is configured to identify the data collected by the collection device; the shielding device is configured to intercept data that does not comply with traffic conditions; the hiding policy is configured to process data in cooperation with the shielding device; the safety device is configured to maintain safety of the entire system. The acquisition device includes an acquisition module configured to identify data to be sent to a recipient device and a security rule; receiving a current security rule to be used when creating a message to send data; the security rules are configured to obfuscate data according to current security preconditions and create a message to contain the obfuscated data; and sending the message to the recipient device; the current security prerequisite comprises a different obfuscation key than the previously used security prerequisite and the previously used; prior to obfuscating the data, sharing a library including current security premises with a sending device and the recipient device. The shielding device comprises a shielding device and a data selection unit, wherein the shielding device is used for shielding data which do not accord with rules in the acquisition device and selecting the data based on the selection operation of the selection unit; the data acquisition unit is structured to be coupled to at least one data capture device of a plurality of baseband controllers, wherein the baseband controllers are configured to determine a data-based location of a first user based on communication data from the at least one data capture device; the signature marker determines mapping data that associates the signature marker with a data-based location of the user. The hidden strategy comprises a search base, a hidden memory configured to provide a mutually agreed number of chips for each phasor stored on the hidden memory of a sender subsystem and a receiver subsystem to find a pilot spreading vector for each corresponding phasor; the search bank is structured to match a date and time at which a message is to be transmitted with at least one pilot scheduled start date and time and at least one scheduled pilot end time and date to create a pilot spreading vector for each pilot spreading vector, combine each data spreading data vector with each pilot spreading vector, and a transmitter subsystem configured to transmit each chip of the combined data spreading vector and pilot spreading pilot vector as a signal. The security apparatus comprises a transmitter device, a receiver device and a security application, the transmitter device identifying data to share with a receiver device; the security application is structured as a prerequisite to requesting an update before constructing any message format, packet or other datagram; the security application is configured to be responsible for identifying the most recent prerequisite to apply to the message sharing operation, and on a periodic basis creating the prerequisite, and after a certain time has elapsed, after the most recent message transfer operation, updating the prerequisite in response to a message request or the like. The signature data determines the mapping data based on a timestamp of the signature marker and a timestamp of a data-based location of the user.
In addition, the invention provides a detection method for identifying a pseudo base station based on terminal position information, which comprises the steps of receiving legal interception information which identifies user equipment with the base station; and upon subsequent initiation of a call associated with the user equipment, enabling a lawful interception detection point associated with the call; and when the enabled lawful interception detection point appears, sending a message to indicate the appearance of the lawful interception detection point. Receiving a lawful interception message from a lawful interception delivery function and sending a message indicating the presence of a lawful interception detection point to the lawful interception delivery function, causing a media gateway to send call content of a call associated with the user equipment to the lawful interception delivery function after initiation of the call. Updating the interception database according to the lawful interception message to reflect the interception status of the user equipment, wherein upon a subsequent initiation of a call associated with the user equipment, a lawful interception detection point is enabled according to the interception status of the user equipment in the user database.
Example two: the present embodiment should be understood to include at least all the features of any one of the foregoing embodiments and further improve on the same, and in particular, provide a detection system for identifying a pseudo base station based on terminal location information, including a data acquisition device, an identification device, a shielding device, a hiding policy, a security device, and a processor, where the data acquisition device is configured to acquire data received by a base station; the identification device is configured to identify the data collected by the collection device; the shielding device is configured to intercept data that does not comply with traffic conditions; the hiding policy is configured to process data in cooperation with the shielding device; the safety device is configured to maintain safety of the entire system. Specifically, the detection system is used in cooperation with a base station, so that a user can identify, collect, intercept or shield the data in the communication process with the base station. In this embodiment, the acquisition device is configured to acquire data connected to the user equipment, and identify or detect the data based on the acquired data, so that the data can be identified or intercepted or shielded based on an interception rule. The processor is respectively connected with the acquisition device, the identification device, the shielding device and the safety device, and is used for matching the operation among the devices under the centralized control operation of the processor. In addition, in this embodiment, the passage condition is stored in the interception database, and the interception database continuously enriches data in the interception database under the setting of the operator, and in this embodiment, the interception database may also be automatically entered according to the entire system. In the actual use process of the hiding strategy, some data need to be processed, and meanwhile, in the processing process, the data is prevented from being trojan viruses, so in the embodiment, the hiding strategy further comprises a security interception device, wherein the security interception device is configured to filter the hidden or unsafe data and trigger a reminding message to be connected with the processor. In this embodiment, the security interception apparatus adopts a common security procedure, which is a means known to those skilled in the art, and those skilled in the art can query a relevant manual to learn the interception means, so that details are not repeated in this embodiment.
The acquisition device includes an acquisition module configured to identify data to be sent to a recipient device and a security rule; receiving a current security rule to be used when creating a message to send data; the security rules are configured to obfuscate data according to current security preconditions and create a message to contain the obfuscated data; and sending the message to the recipient device; the current security prerequisite comprises a different obfuscation key than the previously used security prerequisite and the previously used; prior to obfuscating the data, sharing a library including current security premises with a sending device and the recipient device. Specifically, the acquisition module of the acquisition device identifies each user equipment connected to the base station, and performs positioning operation based on the position of the user equipment. An operation of locating a position of the user device, the acquisition module being configured to obtain a plurality of signal strength data corresponding to a plurality of positions of the user device; classifying the plurality of signal strength data into a plurality of groups: calculating a plurality of signal circles corresponding to at least some of the plurality of groups based on the representative signal values of the corresponding groups; calculating signal intensity data of each signal circle; determining an optimal signal circle of the user equipment within a predetermined distance of the dead zone; the best signal circle is transmitted to the user equipment based at least in part on the signal strength data and the location of the user equipment. Each of the signal strength data includes a location, a base station provider, a network type, and a timestamp. The event data is utilized to confirm the accuracy of the signal strength data. Calculating the signal circle includes: marking the representative signal value as a signal circle center; and grouping representative signal values within a predetermined distance from the center of the signal circle to the signal circle; and the labeling and grouping is repeated until all representative signal values are contained within the signal circle. Forming a geofence at a first predetermined distance from the deadzone; monitoring a proximity of a user device to a geofence; in response to determining that the user device is within the second predetermined distance of the geofence, the user device is alerted of the shadow zone. Determining the optimal signal circle comprises: discarding signal circles having associated strength scores less than a predetermined threshold; and discarding signal circles outside of a suitable distance from the user equipment location; the signal circle with the highest associated signal strength score is selected. In this embodiment, the acquisition module is configured to score the signal strength values of the user equipment and determine the best signal circle based on the strength scores. After the mobile device enters the signal circle, the location information of the user equipment is identified or located, that is: and positioning the user equipment according to the relation of the signal strength of the user equipment, and positioning the user equipment with a coded base station of a base station provider. In this embodiment, the detection system needs to enter base station information of service providers at various positions for the processor to call or query. In addition, in the embodiment, the security rule is set up to prevent the pirate program from stealing the user information. In this embodiment, the acquisition device processes the data through the obfuscated key, so that the security of the information is not threatened or stolen. In this embodiment, the acquisition apparatus further includes a key generator configured to generate the obfuscated key and encrypt the communicated data by being randomly distributed to each data transmission unit. In this embodiment, the distribution process of the obfuscated key is supervised by the processor.
The shielding device comprises a shielding device and a data selection unit, wherein the shielding device is used for shielding data which do not accord with rules in the acquisition device and selecting the data based on the selection operation of the selection unit; the data acquisition unit is structured to be coupled to at least one data capture device of a plurality of baseband controllers, wherein the baseband controllers are configured to determine a data-based location of a first user based on communication data from the at least one data capture device; the signature marker determines mapping data that associates the signature marker with a data-based location of the user. The signature data determines the mapping data based on a timestamp of the signature marker and a timestamp of a data-based location of the user. Specifically, the masker and the data selection unit are used in cooperation, so that the data can be selected in the using process, and each data is shielded or hidden based on a set rule. And the shielding device is connected with a baseband controller of the base station and is used for capturing the data. In this embodiment, the signature mark includes the information of the client and the transmitted code, and the code has uniqueness, that is: the provider of the code provides signal parameters with the base station which provides signals with the user equipment and simultaneously transmits a signature mark while transmitting with the user equipment; and when the signature marks are different, the pseudo base station cannot acquire the information of the user equipment, so that the information security is realized.
The hidden strategy comprises a search base, a hidden memory configured to provide a mutually agreed number of chips for each phasor stored on the hidden memory of a sender subsystem and a receiver subsystem to find a pilot spreading vector for each corresponding phasor; the search bank is structured to match a date and time at which a message is to be transmitted with at least one pilot scheduled start date and time and at least one scheduled pilot end time and date to create a pilot spreading vector for each pilot spreading vector, combine each data spreading data vector with each pilot spreading vector, and a transmitter subsystem configured to transmit each chip of the combined data spreading vector and pilot spreading pilot vector as a signal. Specifically, the hidden memory is configured to be connected to the database, and to perform collection or hiding based on the information of the search library, and it is determined that the hidden data is hidden in the hidden memory. In this embodiment, the hiding policy is used in cooperation with the shielding apparatus, so that the information of the pirate issued by the user equipment can be hidden. Meanwhile, in this embodiment, if a signal for abnormality is set in the vicinity of the base station, the base stations communicate with each other through a communication function of a hidden policy, so as to implement a relationship of mutual communication between the base stations. Thereby realizing the effect that the pseudo base station does not exist. In this embodiment, the abnormal signal is determined by the acquisition module of the acquisition device, so as to realize passing and protection among base stations and prevent information of the user equipment from being stolen.
The security apparatus comprises a transmitter device, a receiver device and a security application, the transmitter device identifying data to share with a receiver device; the security application is structured as a prerequisite to requesting an update before constructing any message format, packet or other datagram; the security application is configured to be responsible for identifying the most recent prerequisite to apply to the message sharing operation, and on a periodic basis creating the prerequisite, and after a certain time has elapsed, after the most recent message transfer operation, updating the prerequisite in response to a message request or the like. Specifically, the security device shares the identification data of the sender device, so that the data can be shared or connected to devices between the devices according to actual requirements in the sharing process, and meanwhile, in this embodiment, the security device is configured in each base station and protects the data transmitted by the user equipment. In addition, in this embodiment, the security application performs adaptive adjustment according to the actual interception rule, thereby effectively ensuring interconnection and intercommunication of information between the base stations, and in addition, after the prerequisite is periodically adjusted, the entire system can be more effectively protected.
In addition, the invention provides a detection method for identifying a pseudo base station based on terminal position information, which comprises the steps of receiving legal interception information which identifies user equipment with the base station; and upon subsequent initiation of a call associated with the user equipment, enabling a lawful interception detection point associated with the call; and when the enabled lawful interception detection point appears, sending a message to indicate the appearance of the lawful interception detection point. Specifically, a lawful interception message is received from a lawful interception delivery function and a message indicating the presence of a lawful interception detection point is sent to the lawful interception delivery function, and after initiation of a call associated with the user equipment, a media gateway is caused to send call content of the call to the lawful interception delivery function. Specifically, the interception database is updated according to the lawful interception message to reflect the interception state of the user equipment, wherein when a call associated with the user equipment is initiated subsequently, a lawful interception detection point is enabled according to the interception state of the user equipment in the user database. Specifically, in this embodiment, even if the pseudo base station exists within the range of the base station, the intercepted service is provided to the user equipment, that is: enabling a lawful interception detection point associated with the call; and when the started lawful interception detection point appears, sending a message to indicate the occurrence of the lawful interception detection point, receiving a lawful interception message from the lawful interception delivery function, and sending the message indicating the occurrence of the lawful interception detection point to the lawful interception delivery function, so that the message sending or receiving of the pseudo base station fails.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
In summary, in the detection system and method for identifying a pseudo base station based on terminal location information of the present invention, after the mobile device enters the signal circle, the location information of the ue is identified or located, that is: positioning the user equipment according to the relation of the signal intensity of the user equipment, and positioning the user equipment with a coded base station of a base station provider; the data is processed by the acquisition device through the obfuscated secret key, so that the safety of the information is not threatened or stolen; the shielding device and the data selection unit are matched for use, so that the data can be selected in the using process, and each data is shielded or hidden based on a set rule; the passing and protection among all base stations are realized through a hidden strategy and the detection and determination of the abnormal signals by an acquisition module of the acquisition device, so that the information of user equipment is prevented from being stolen; the safety application program is adopted to carry out adaptive adjustment according to the actual interception rule, so that the interconnection and intercommunication of information among all base stations are effectively ensured, and in addition, after the prerequisite condition is periodically adjusted, the whole system can be more effectively protected.
Although the invention has been described above with reference to various embodiments, it should be understood that many changes and modifications may be made without departing from the scope of the invention. That is, the methods, systems, and devices discussed above are examples. Various configurations may omit, substitute, or add various procedures or components as appropriate. For example, in alternative configurations, the methods may be performed in an order different than that described, and/or various components may be added, omitted, and/or combined. Moreover, features described with respect to certain configurations may be combined in various other configurations, as different aspects and elements of the configurations may be combined in a similar manner. Further, elements therein may be updated as technology evolves, i.e., many elements are examples and do not limit the scope of the disclosure or claims.
Specific details are given in the description to provide a thorough understanding of the exemplary configurations including implementations. However, configurations may be practiced without these specific details, for example, well-known circuits, processes, algorithms, structures, and techniques have been shown without unnecessary detail in order to avoid obscuring the configurations. This description provides example configurations only, and does not limit the scope, applicability, or configuration of the claims. Rather, the foregoing description of the configurations will provide those skilled in the art with an enabling description for implementing the described techniques. Various changes may be made in the function and arrangement of elements without departing from the spirit or scope of the disclosure.
In conclusion, it is intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that these examples are illustrative only and are not intended to limit the scope of the invention. After reading the description of the invention, the skilled person can make various changes or modifications to the invention, and these equivalent changes and modifications also fall into the scope of the invention defined by the claims.

Claims (9)

1. A detection system for identifying a pseudo base station based on terminal position information is characterized by comprising a data acquisition device, an identification device, a shielding device, a hiding strategy, a safety device and a processor, wherein the acquisition device is configured to acquire data received by the base station; the identification device is configured to identify the data collected by the collection device; the shielding device is configured to intercept data that does not comply with traffic conditions; the hiding policy is configured to process data in cooperation with the shielding device; the safety device is configured to maintain safety of the entire system.
2. The detection system for identifying a pseudo base station based on terminal location information according to claim 1, wherein said acquisition means comprises an acquisition module and a security rule, said acquisition module configured to identify data to be transmitted to a receiver device; receiving a current security rule to be used when creating a message to send data; the security rules are configured to obfuscate data according to current security preconditions and create a message to contain the obfuscated data; and sending the message to the recipient device; the current security prerequisite comprises a different obfuscation key than the previously used security prerequisite and the previously used; prior to obfuscating the data, sharing a library including current security premises with a sending device and the recipient device.
3. A detection system for identifying pseudo base stations based on terminal location information according to one of the preceding claims, characterized in that said screening means comprises a screening device and a data selection unit, said screening device being configured to screen data in the acquisition means that do not comply with the rules and to select said data based on the selection operation of said selection unit; the data acquisition unit is structured to be coupled to at least one data capture device of a plurality of baseband controllers, wherein the baseband controllers are configured to determine a data-based location of a first user based on communication data from the at least one data capture device; the signature marker determines mapping data that associates the signature marker with a data-based location of the user.
4. A detection system for identifying pseudo base stations based on terminal position information according to one of the preceding claims, characterized in that said concealment strategy comprises a search base, a concealment memory structured to provide a mutually agreed number of chips for each phasor stored on said concealment memory of the transmitter and receiver subsystems to find a pilot spreading vector for each corresponding phasor; the search bank is structured to match a date and time at which a message is to be transmitted with at least one pilot scheduled start date and time and at least one scheduled pilot end time and date to create a pilot spreading vector for each pilot spreading vector, combine each data spreading data vector with each pilot spreading vector, and a transmitter subsystem configured to transmit each chip of the combined data spreading vector and pilot spreading pilot vector as a signal.
5. A detection system for identifying pseudo base stations based on terminal location information according to one of the preceding claims, characterized in that said security means comprise a transmitter device, a receiver device and a security application, said transmitter device identifying data to be shared with a receiver device; the security application is structured as a prerequisite to requesting an update before constructing any message format, packet or other datagram; the security application is configured to be responsible for identifying the most recent prerequisite to apply to the message sharing operation, and on a periodic basis creating the prerequisite, and after a certain time has elapsed, after the most recent message transfer operation, updating the prerequisite in response to a message request or the like.
6. A detection system for identifying pseudo base stations based on terminal location information according to one of the preceding claims, characterized in that said signature data determines said mapping data based on a time stamp of said signature marker and a time stamp of a data-based location of said user.
7. A detection method for identifying a pseudo base station based on terminal location information, which applies the detection system for identifying a pseudo base station based on terminal location information as described above, wherein the detection method comprises receiving a lawful interception message identifying a user equipment with the base station; and upon subsequent initiation of a call associated with the user equipment, enabling a lawful interception detection point associated with the call; and when the enabled lawful interception detection point appears, sending a message to indicate the appearance of the lawful interception detection point.
8. A detection method for identifying a fake base station based on terminal location information according to one of the preceding claims, characterized in that a lawful interception message is received from a lawful interception delivery function and a message indicating the presence of a lawful interception detection point is sent to the lawful interception delivery function, causing the media gateway to send the call content of a call associated with said user equipment to said lawful interception delivery function after the initiation of said call.
9. Detection method for identifying a fake base station based on terminal location information according to one of the preceding claims, characterized in that the interception database is updated based on a lawful interception message to reflect the interception status of the user equipment, wherein upon subsequent initiation of a call associated with the user equipment, a lawful interception detection point is enabled based on the interception status of the user equipment in the user database.
CN202010993207.9A 2020-09-21 2020-09-21 Detection system and method for identifying pseudo base station based on terminal position information Active CN112087758B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010993207.9A CN112087758B (en) 2020-09-21 2020-09-21 Detection system and method for identifying pseudo base station based on terminal position information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010993207.9A CN112087758B (en) 2020-09-21 2020-09-21 Detection system and method for identifying pseudo base station based on terminal position information

Publications (2)

Publication Number Publication Date
CN112087758A true CN112087758A (en) 2020-12-15
CN112087758B CN112087758B (en) 2023-10-20

Family

ID=73740056

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010993207.9A Active CN112087758B (en) 2020-09-21 2020-09-21 Detection system and method for identifying pseudo base station based on terminal position information

Country Status (1)

Country Link
CN (1) CN112087758B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112507368A (en) * 2020-12-30 2021-03-16 广西云牛动力网络科技有限公司 Mixed submission system of asynchronous big data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101548558A (en) * 2006-12-05 2009-09-30 艾利森电话股份有限公司 Systems and methods for location related data interception
CN106856607A (en) * 2017-02-07 2017-06-16 深圳市金立通信设备有限公司 A kind of method and terminal for recognizing pseudo-base station
US20180302872A1 (en) * 2017-04-13 2018-10-18 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Method and Apparatus for Identifying Pseudo Base-Station, and Terminal
CN109495894A (en) * 2019-01-04 2019-03-19 中国联合网络通信集团有限公司 A kind of prevention method and system of pseudo-base station
CN112118578A (en) * 2020-09-18 2020-12-22 佛山市龙生光启科技有限公司 Shielding system based on pseudo base station cellular multi-carrier communication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101548558A (en) * 2006-12-05 2009-09-30 艾利森电话股份有限公司 Systems and methods for location related data interception
CN106856607A (en) * 2017-02-07 2017-06-16 深圳市金立通信设备有限公司 A kind of method and terminal for recognizing pseudo-base station
US20180302872A1 (en) * 2017-04-13 2018-10-18 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Method and Apparatus for Identifying Pseudo Base-Station, and Terminal
CN109495894A (en) * 2019-01-04 2019-03-19 中国联合网络通信集团有限公司 A kind of prevention method and system of pseudo-base station
CN112118578A (en) * 2020-09-18 2020-12-22 佛山市龙生光启科技有限公司 Shielding system based on pseudo base station cellular multi-carrier communication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112507368A (en) * 2020-12-30 2021-03-16 广西云牛动力网络科技有限公司 Mixed submission system of asynchronous big data

Also Published As

Publication number Publication date
CN112087758B (en) 2023-10-20

Similar Documents

Publication Publication Date Title
CN103891332B (en) Detect suspicious WAP (wireless access point)
CN102016938B (en) Wireless device monitoring systems and monitoring devices, and associated methods
US20150358170A1 (en) Communication system, vehicle-mounted terminal, roadside device
US10374796B2 (en) Communication system, communication device, vehicle and communication method
US11381977B2 (en) System and method for decrypting communication exchanged on a wireless local area network
CN101444119A (en) System for implementing security police on mobile communication equipment
CN103945385B (en) The method and its device of guarding against theft for mobile terminal
Chen et al. An ownership transfer scheme using mobile RFIDs
CN103607389A (en) Remote wireless identity authentication system
CN105407479A (en) Information recognition method, information gateway, SIM card, and system
CN112087758B (en) Detection system and method for identifying pseudo base station based on terminal position information
CN112118578A (en) Shielding system based on pseudo base station cellular multi-carrier communication
CN109495894B (en) Method and system for preventing pseudo base station
CN108966232B (en) Service network-based wireless Internet of things physical layer hybrid authentication method and system
US9237424B2 (en) System and method for correlation of mobile communication terminals and individuals at control checkpoints
CN111626884B (en) Method and device for preventing insurance fraud
CN106454778A (en) Short message processing method, short message center and communication system
CN103108316A (en) Authentication method, device and system for aerial card writing
CN108271156B (en) Method and device for identifying pseudo base station
CN111783092B (en) Malicious attack detection method and system for communication mechanism between Android applications
CN106156650A (en) Data protection system and method
CN108271159A (en) Communication processing method, apparatus and system, safety communicating method and device
Song Server impersonation attacks on RFID protocols
CN112950199B (en) Anti-theft method and server for communication identification
CN114358222B (en) System and method for identifying and preventing fraudulent use by multi-node positioning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant