CN112087758B - Detection system and method for identifying pseudo base station based on terminal position information - Google Patents

Detection system and method for identifying pseudo base station based on terminal position information Download PDF

Info

Publication number
CN112087758B
CN112087758B CN202010993207.9A CN202010993207A CN112087758B CN 112087758 B CN112087758 B CN 112087758B CN 202010993207 A CN202010993207 A CN 202010993207A CN 112087758 B CN112087758 B CN 112087758B
Authority
CN
China
Prior art keywords
data
user equipment
base station
message
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010993207.9A
Other languages
Chinese (zh)
Other versions
CN112087758A (en
Inventor
高平
范保连
张垒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Chuanglian Yixun Technology Co ltd
Original Assignee
Beijing Chuanglian Yixun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Chuanglian Yixun Technology Co ltd filed Critical Beijing Chuanglian Yixun Technology Co ltd
Priority to CN202010993207.9A priority Critical patent/CN112087758B/en
Publication of CN112087758A publication Critical patent/CN112087758A/en
Application granted granted Critical
Publication of CN112087758B publication Critical patent/CN112087758B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a detection system and a detection method for identifying a pseudo base station based on terminal position information, wherein the detection system comprises a data acquisition device, an identification device, a shielding device, a hiding strategy, a safety device and a processor, wherein the acquisition device is configured to acquire data received by a base station; the identification device is configured to identify the data acquired by the acquisition device; the shielding device is configured to intercept data which does not meet traffic conditions; the hiding strategy is configured to cooperate with the shielding device to process data; the safety device is configured to maintain the safety of the entire system. After the mobile equipment enters the signal ring, the position information of the user equipment is identified or positioned, namely: and positioning the user equipment according to the relation of the signal intensity of the user equipment, and positioning the user equipment and the coded base station of the base station provider.

Description

Detection system and method for identifying pseudo base station based on terminal position information
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a detection system and method for identifying a pseudo base station based on terminal location information.
Background
At present, pseudo base stations appear in an actual communication network, and some lawbreakers forge public mobile carrier base stations to attract surrounding communication terminals by forging partial network parameters and increasing self-transmitting power; when the communication terminal successfully resides in the pseudo base station cell, the lawbreakers can acquire some privacy information in the communication terminal, such as user identity information and the like, and then acquire illegal interests from the privacy information.
As disclosed in the prior art CN104244252a, a mobile phone needs to communicate through a base station, which includes an operator base station, and in addition, an illegal person can send information to the mobile phone through a pseudo base station. The pseudo base station is a high-tech instrument, which is generally composed of a host computer and a notebook computer, related equipment such as a short message group transmitter and a short message transmitter can search mobile phone card information in a certain radius range by taking the mobile phone card information as a center, and the mobile phone card information can be camouflaged into a base station of an operator to send short messages such as fraud, advertisement promotion and the like to a mobile phone of a user by using mobile phone numbers of other people. Another exemplary method, apparatus and terminal for identifying a pseudo base station disclosed in the prior art, for example, WO2017185742A1, and a method, apparatus, mobile terminal and storage medium for identifying a pseudo base station disclosed in the prior art, for example, WO2020087417A1, are only capable of performing one-way authentication in the existing GSM mobile communication system, that is, authentication of a communication terminal by a network, but the communication terminal cannot actively identify validity of the network identity, which may cause leakage of user privacy information and even loss of personal property after the communication terminal establishes a communication connection with the pseudo base station.
The invention is designed for solving the problems that the identification performance is poor, the shielding is impossible, the information leakage is very easy to cause and the like in the prior art.
Disclosure of Invention
The invention aims to provide a detection system and method for identifying a pseudo base station based on terminal position information aiming at the defects of the existing pseudo base station identification and shielding.
In order to overcome the defects in the prior art, the invention adopts the following technical scheme:
the detection system for identifying the pseudo base station based on the terminal position information comprises a data acquisition device, an identification device, a shielding device, a hiding strategy, a safety device and a processor, wherein the acquisition device is configured to acquire data received by the base station; the identification device is configured to identify the data acquired by the acquisition device; the shielding device is configured to intercept data which does not meet traffic conditions; the hiding strategy is configured to cooperate with the shielding device to process data; the safety device is configured to maintain the safety of the entire system.
Optionally, the acquisition apparatus includes an acquisition module configured to identify data to be sent to a receiver device and a security rule; receiving a current security rule to be used when creating a message to send data; the security rules are configured to obfuscate data according to current security preconditions and create a message to contain the obfuscated data; and transmitting the message to the recipient device; the current security preconditions include a different obfuscated key than the previously used security preconditions and the previously used security preconditions; a library including current security premises is shared with a transmitting device and the receiving device before obfuscating the data.
Optionally, the shielding device comprises a shielding device and a data selecting unit, wherein the shielding device is configured to shield data which does not accord with rules in the acquisition device, and select the data based on the selecting operation of the selecting unit; the data acquisition unit is configured to determine a data-based location of a first user based on communication data from at least one data capture device coupled to a plurality of baseband controllers; the signature tag determines mapping data that associates the signature tag with a data-based location of the user.
Optionally, the hiding policy includes a search library, a hiding memory configured to provide a mutually agreed number of chips for each phasor stored on the hiding memory of the sender subsystem and the receiver subsystem to find a pilot extension vector for each corresponding phasor; the search pool is configured to match a date and time at which a message is to be transmitted with at least one pilot scheduled start date and time and at least one scheduled pilot end time and date to create a pilot spreading vector for each pilot spreading vector, to combine each data spreading data vector and each pilot spreading vector, and a transmitter subsystem configured to signal each chip of the combined data spreading vector and pilot spreading pilot vector.
Optionally, the security apparatus comprises a transmitter device, a receiver device, and a security application, the transmitter device identifying data to be shared with the receiver device; the security application is configured to construct a prerequisite for any message format, packet or other datagram prior to requesting an update; the secure application is configured to be responsible for identifying a most recent prerequisite for application to a message sharing operation, and based on periodically creating the prerequisite, and after a certain time has elapsed, updating the prerequisite in response to a message request or the like after a most recent message transmission operation.
Optionally, the signature data determines the mapping data based on a time stamp of the signature mark and a time stamp of the user's data-based location.
In addition, the invention provides a detection method for identifying a pseudo base station based on terminal position information, wherein the detection method comprises the steps of receiving a lawful interception message which identifies user equipment with the base station; and enabling a lawful intercept detection point associated with the call upon subsequent initiation of the call associated with the user equipment; and sending a message when the enabled lawful interception detection point appears to indicate that the lawful interception detection point appears.
Optionally, a lawful intercept message is received from a lawful intercept transfer function and a message is sent to the lawful intercept transfer function indicating the occurrence of a lawful intercept detection point, after initiation of a call associated with the user equipment, causing a media gateway to send call content of the call to the lawful intercept transfer function.
Optionally, the interception database is updated according to the lawful interception message to reflect the interception status of the user equipment, wherein the lawful interception detection point is enabled according to the interception status of the user equipment in the user database when a call associated with the user equipment is subsequently initiated.
The beneficial effects obtained by the invention are as follows:
1. after the mobile device enters the signal ring, the position information of the user device is identified or positioned, namely: positioning the user equipment according to the relation of the signal intensity of the user equipment, and positioning the user equipment and a coded base station of a base station provider;
2. processing the data through the confusion secret key by adopting the acquisition device, so that the safety of the information is not threatened or stolen;
3. the data can be selected in the using process by adopting the cooperation between the shielding device and the data selecting unit, and each data is shielded or hidden based on a set rule;
4. through the hiding strategy and the detection and the determination of the abnormal signals by the acquisition module of the acquisition device, the passing and the protection among all the base stations are realized, and the information of the user equipment is prevented from being stolen;
5. through adopting the security application program to carry out the adjustment of adaptability according to actual interception rule, the interconnection and the intercommunication of information between each basic station are effectively guaranteed, in addition, after the prerequisite carries out periodic adjustment, can realize more effective protection to whole system.
Drawings
The invention will be further understood from the following description taken in conjunction with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the embodiments. Like reference numerals designate corresponding parts throughout the different views.
Fig. 1 is a schematic control flow chart of the present invention.
Fig. 2 is a schematic diagram of an application scenario of the present invention.
Fig. 3 is a schematic control flow diagram of the acquisition device.
Fig. 4 is a schematic control flow diagram of the shielding device.
Fig. 5 is a schematic control flow diagram of the safety device.
Detailed Description
The technical scheme and advantages of the present invention will become more apparent, and the present invention will be further described in detail with reference to the following examples thereof; it should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. Other systems, methods, and/or features of the present embodiments will be or become apparent to one with skill in the art upon examination of the following detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims. Additional features of the disclosed embodiments are described in, and will be apparent from, the following detailed description.
The same or similar reference numbers in the drawings of embodiments of the invention correspond to the same or similar components; in the description of the present invention, it should be understood that, if there is an orientation or positional relationship indicated by the terms "upper", "lower", "left", "right", etc., based on the orientation or positional relationship shown in the drawings, this is for convenience of description and simplification of the description, rather than to indicate or imply that the apparatus or components referred to must have a specific orientation.
Embodiment one: the detection system for identifying the pseudo base station based on the terminal position information comprises a data acquisition device, an identification device, a shielding device, a hiding strategy, a safety device and a processor, wherein the acquisition device is configured to acquire data received by the base station; the identification device is configured to identify the data acquired by the acquisition device; the shielding device is configured to intercept data which does not meet traffic conditions; the hiding strategy is configured to cooperate with the shielding device to process data; the safety device is configured to maintain the safety of the entire system. The acquisition apparatus includes an acquisition module configured to identify data to be transmitted to a recipient device and a security rule; receiving a current security rule to be used when creating a message to send data; the security rules are configured to obfuscate data according to current security preconditions and create a message to contain the obfuscated data; and transmitting the message to the recipient device; the current security preconditions include a different obfuscated key than the previously used security preconditions and the previously used security preconditions; a library including current security premises is shared with a transmitting device and the receiving device before obfuscating the data. The shielding device comprises a shielding device and a data selecting unit, wherein the shielding device is configured to shield data which does not accord with rules in the acquisition device and select the data based on the selecting operation of the selecting unit; the data acquisition unit is configured to determine a data-based location of a first user based on communication data from at least one data capture device coupled to a plurality of baseband controllers; the signature tag determines mapping data that associates the signature tag with a data-based location of the user. The concealment strategy comprises a search library, a concealment memory configured to provide a mutually agreed number of chips for each phasor stored on the concealment memory of the sender subsystem and the receiver subsystem to find a pilot extension vector for each corresponding phasor; the search pool is configured to match a date and time at which a message is to be transmitted with at least one pilot scheduled start date and time and at least one scheduled pilot end time and date to create a pilot spreading vector for each pilot spreading vector, to combine each data spreading data vector and each pilot spreading vector, and a transmitter subsystem configured to signal each chip of the combined data spreading vector and pilot spreading pilot vector. The secure apparatus comprises a transmitter device, a receiver device, and a secure application, the transmitter device identifying data to share with the receiver device; the security application is configured to construct a prerequisite for any message format, packet or other datagram prior to requesting an update; the secure application is configured to be responsible for identifying a most recent prerequisite for application to a message sharing operation, and based on periodically creating the prerequisite, and after a certain time has elapsed, updating the prerequisite in response to a message request or the like after a most recent message transmission operation. The signature data determines the mapping data based on the signature-tagged time stamp and the user's data-based location time stamp.
In addition, the invention provides a detection method for identifying a pseudo base station based on terminal position information, wherein the detection method comprises the steps of receiving a lawful interception message which identifies user equipment with the base station; and enabling a lawful intercept detection point associated with the call upon subsequent initiation of the call associated with the user equipment; and sending a message when the enabled lawful interception detection point appears to indicate that the lawful interception detection point appears. A lawful intercept message is received from a lawful intercept transfer function and a message is sent to the lawful intercept transfer function indicating the occurrence of a lawful intercept detection point, after initiation of a call associated with the user equipment, causing a media gateway to send call content of the call to the lawful intercept transfer function. Updating the interception database according to the lawful interception message to reflect the interception status of the user equipment, wherein when a call associated with the user equipment is subsequently initiated, the lawful interception detection point is enabled according to the interception status of the user equipment in the user database.
Embodiment two: this embodiment should be understood to include at least all the features of any one of the foregoing embodiments, and further improve on the foregoing embodiments, and specifically, provide a detection system for identifying a pseudo base station based on terminal location information, where the detection system includes a data acquisition device, an identification device, a shielding device, a hiding policy, a security device, and a processor, where the acquisition device is configured to acquire data received by a base station; the identification device is configured to identify the data acquired by the acquisition device; the shielding device is configured to intercept data which does not meet traffic conditions; the hiding strategy is configured to cooperate with the shielding device to process data; the safety device is configured to maintain the safety of the entire system. Specifically, the detection system is matched with the base station for use, so that a user can identify, collect, intercept or shield the data in the process of communicating with the base station. In this embodiment, the collecting device is configured to collect data connected to the user equipment, and identify or detect the data based on the collected data, so that the data can be identified or intercepted or shielded based on an interception rule. The processor is respectively connected with the acquisition device, the identification device, the shielding device and the safety device, and cooperates with the operation among the devices under the centralized control operation of the processor. In addition, in this embodiment, the traffic conditions are stored in the interception database, and the interception database continuously enriches the data in the interception database under the setting of the operator, and in this embodiment, the interception database may also be self-entered according to the whole system. The hiding strategy needs to process some data in the actual use process, and meanwhile, the data is prevented from being Trojan horse virus in the process of processing, so that in the embodiment, the hiding strategy further comprises a safety interception device which is configured to filter hidden or unsafe data and trigger a reminding message to be connected with the processor. In this embodiment, the security interception device adopts a common security procedure, which is a means well known to those skilled in the art, and those skilled in the art can query a related manual to learn about the interception means, so in this embodiment, the details are not repeated.
The acquisition apparatus includes an acquisition module configured to identify data to be transmitted to a recipient device and a security rule; receiving a current security rule to be used when creating a message to send data; the security rules are configured to obfuscate data according to current security preconditions and create a message to contain the obfuscated data; and transmitting the message to the recipient device; the current security preconditions include a different obfuscated key than the previously used security preconditions and the previously used security preconditions; a library including current security premises is shared with a transmitting device and the receiving device before obfuscating the data. Specifically, the acquisition module of the acquisition device identifies each user equipment connected with the base station and performs positioning operation based on the position of the user equipment. An operation of locating the position of the user equipment, the acquisition module being configured to obtain a plurality of signal strength data corresponding to a plurality of positions of the user equipment; classifying the plurality of signal strength data into a plurality of groups: calculating a plurality of signal circles corresponding to at least some of the plurality of groups based on the representative signal values of the corresponding groups; calculating signal intensity data of each signal circle; determining an optimal signal circle of the user equipment within a predetermined distance of the dead zone; the optimal signal circle is transmitted to the user device based at least in part on the signal strength data and the location of the user device. Each of the signal strength data includes a location, a base station provider, a network type, and a timestamp. The event data is used to confirm the accuracy of the signal strength data. Calculating the signal circle includes: marking the representative signal value as the center of the signal circle; and grouping representative signal values within a predetermined distance from the center of the signal circle to the signal circle; and repeating the marking and grouping until all representative signal values are contained within the signal circle. Forming a geofence at a first predetermined distance from the dead zone; monitoring proximity of the user device to the geofence; in response to determining that the user device is within a second predetermined distance of the geofence, the user device is alerted to the blind spot. Determining the optimal signal circle includes: discarding signal circles having associated intensity scores less than a predetermined threshold; and discarding signal circles outside of the appropriate distance from the user device location; the signal circle with the highest associated signal strength score is selected. In this embodiment, the acquisition module is configured to score the signal strength value of the user device and determine the best signal circle based on the strength score. After the mobile device enters the signal ring, the position information of the user device is identified or located, namely: and positioning the user equipment according to the relation of the signal intensity of the user equipment, and positioning the user equipment and the coded base station of the base station provider. In this embodiment, the detection system needs to record the base station information of the service providers at each location, so that the processor can call or query the base station information. In addition, in the present embodiment, the setting of the security rule is used to prevent the crawler program from misappropriating the user information. In this embodiment, the collecting device processes the data through the confusion key, so that the security of the information is not threatened or stolen. In this embodiment, the collecting device further includes a key generator configured to generate the confusion key and encrypt the data of the communication by being randomly distributed to the respective data transmission units. In this embodiment, the process of assigning the obfuscated key is supervised by the processor.
The shielding device comprises a shielding device and a data selecting unit, wherein the shielding device is configured to shield data which does not accord with rules in the acquisition device and select the data based on the selecting operation of the selecting unit; the data acquisition unit is configured to determine a data-based location of a first user based on communication data from at least one data capture device coupled to a plurality of baseband controllers; the signature tag determines mapping data that associates the signature tag with a data-based location of the user. The signature data determines the mapping data based on the signature-tagged time stamp and the user's data-based location time stamp. Specifically, the shielding device and the data selecting unit are matched for use, so that the data can be selected in the using process, and each data is shielded or hidden based on a set rule. The shielding device is connected with a base band controller of the base station and captures the data. In this embodiment, the signature mark includes information of the client and a transmitted code, and the code has uniqueness, namely: the provider of the code, while transmitting with the user equipment, also provides signal parameters with the base station of the user equipment providing signal, and simultaneously transmits signature mark; when the signature marks are different, the pseudo base station cannot acquire the information of the user equipment, so that the information security is realized.
The concealment strategy comprises a search library, a concealment memory configured to provide a mutually agreed number of chips for each phasor stored on the concealment memory of the sender subsystem and the receiver subsystem to find a pilot extension vector for each corresponding phasor; the search pool is configured to match a date and time at which a message is to be transmitted with at least one pilot scheduled start date and time and at least one scheduled pilot end time and date to create a pilot spreading vector for each pilot spreading vector, to combine each data spreading data vector and each pilot spreading vector, and a transmitter subsystem configured to signal each chip of the combined data spreading vector and pilot spreading pilot vector. Specifically, the hidden memory is configured to connect with the database, collect or hide based on the information of the search library, and determine that the hidden data is hidden in the hidden memory. In this embodiment, the hiding policy is used in conjunction with the shielding device, so that the information about theft sent by the user equipment can be hidden. Meanwhile, in this embodiment, if the abnormal signal is set in the vicinity of the base stations, communication is performed between the base stations through the communication function of the hiding policy between the base stations, so as to achieve a relationship of mutual communication between the base stations. Thereby realizing the effect that the pseudo base station does not exist. In this embodiment, the abnormal signal is determined by the acquisition module of the acquisition device, so as to realize traffic and protection between the base stations and prevent information of the user equipment from being stolen.
The secure apparatus comprises a transmitter device, a receiver device, and a secure application, the transmitter device identifying data to share with the receiver device; the security application is configured to construct a prerequisite for any message format, packet or other datagram prior to requesting an update; the secure application is configured to be responsible for identifying a most recent prerequisite for application to a message sharing operation, and based on periodically creating the prerequisite, and after a certain time has elapsed, updating the prerequisite in response to a message request or the like after a most recent message transmission operation. Specifically, the security device shares the identification data of the sender device, so that the data can share or connect the devices between the devices according to actual requirements in the sharing process, and meanwhile, in this embodiment, the security device is configured in each base station and protects the data transmitted by the user device. In addition, in this embodiment, the security application program performs adaptive adjustment according to the actual interception rule, so as to effectively ensure interconnection and interworking of information between the base stations, and in addition, after the preconditions are periodically adjusted, the whole system can be more effectively protected.
In addition, the invention provides a detection method for identifying a pseudo base station based on terminal position information, wherein the detection method comprises the steps of receiving a lawful interception message which identifies user equipment with the base station; and enabling a lawful intercept detection point associated with the call upon subsequent initiation of the call associated with the user equipment; and sending a message when the enabled lawful interception detection point appears to indicate that the lawful interception detection point appears. Specifically, a lawful interception message is received from a lawful interception delivery function and a message indicating the occurrence of a lawful interception detection point is sent to the lawful interception delivery function, after initiation of a call associated with the user equipment, causing a media gateway to send call content of the call to the lawful interception delivery function. Specifically, the interception database is updated according to the lawful interception message to reflect the interception status of the user equipment, wherein when a call associated with the user equipment is subsequently initiated, the lawful interception detection point is enabled according to the interception status of the user equipment in the user database. Specifically, in this embodiment, even if the existence of the pseudo base station exists within the range of the base station, the intercepted service is provided to the ue, that is: enabling a lawful intercept detection point associated with the call; when the enabled lawful interception detection point appears, a message is sent to indicate the lawful interception detection point, a lawful interception message is received from the lawful interception transfer function, and the message indicating the occurrence of the lawful interception detection point is sent to the lawful interception transfer function, so that the message sending or receiving of the pseudo base station has failure.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
In summary, according to the detection system and method for identifying a pseudo base station based on terminal location information of the present invention, after the mobile device enters the signal circle, the location information of the ue is identified or located, that is: positioning the user equipment according to the relation of the signal intensity of the user equipment, and positioning the user equipment and a coded base station of a base station provider; processing the data through the confusion secret key by adopting the acquisition device, so that the safety of the information is not threatened or stolen; the data can be selected in the using process by adopting the cooperation between the shielding device and the data selecting unit, and each data is shielded or hidden based on a set rule; through the hiding strategy and the detection and the determination of the abnormal signals by the acquisition module of the acquisition device, the passing and the protection among all the base stations are realized, and the information of the user equipment is prevented from being stolen; through adopting the security application program to carry out the adjustment of adaptability according to actual interception rule, the interconnection and the intercommunication of information between each basic station are effectively guaranteed, in addition, after the prerequisite carries out periodic adjustment, can realize more effective protection to whole system.
While the invention has been described above with reference to various embodiments, it should be understood that many changes and modifications can be made without departing from the scope of the invention. That is, the methods, systems and devices discussed above are examples. Various configurations may omit, replace, or add various procedures or components as appropriate. For example, in alternative configurations, the methods may be performed in a different order than described, and/or various components may be added, omitted, and/or combined. Moreover, features described with respect to certain configurations may be combined in various other configurations, such as different aspects and elements of the configurations may be combined in a similar manner. Furthermore, as the technology evolves, elements therein may be updated, i.e., many of the elements are examples, and do not limit the scope of the disclosure or the claims.
Specific details are given in the description to provide a thorough understanding of exemplary configurations involving implementations. However, configurations may be practiced without these specific details, e.g., well-known circuits, processes, algorithms, structures, and techniques have been shown without unnecessary detail in order to avoid obscuring configurations. This description provides only an example configuration and does not limit the scope, applicability, or configuration of the claims. Rather, the foregoing description of the configuration will provide those skilled in the art with an enabling description for implementing the described techniques. Various changes may be made in the function and arrangement of elements without departing from the spirit or scope of the disclosure.
It is intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that it is intended that it be regarded as illustrative rather than limiting. Various changes and modifications to the present invention may be made by one skilled in the art after reading the teachings herein, and such equivalent changes and modifications are intended to fall within the scope of the invention as defined in the appended claims.

Claims (1)

1. A detection system for identifying a pseudo base station based on terminal position information, which is characterized by comprising a data acquisition device, an identification device, a shielding device, a hiding strategy, a safety device and a processor, wherein the acquisition device is configured to acquire data received by a base station; the identification device is configured to identify the data acquired by the acquisition device; the shielding device is configured to intercept data which does not meet traffic conditions; the hiding strategy is configured to cooperate with the shielding device to process data; the safety device is configured to maintain the safety of the entire system;
the acquisition apparatus includes an acquisition module configured to identify data to be transmitted to a recipient device and a security rule; receiving a current security rule to be used when creating a message and transmitting data; the security rules are configured to obfuscate data according to current security preconditions and create a message to contain the obfuscated data; and transmitting the message to the recipient device; the current security preconditions include a different obfuscated key than the previously used security preconditions and the previously used security preconditions; sharing a library comprising current security premises with a transmitting device and the receiving device before obfuscating the data;
the acquisition module of the acquisition device identifies each user equipment connected with the coded base station of the base station provider and positions the positions of the user equipment;
the acquisition module is configured to obtain a plurality of signal strength data corresponding to a plurality of locations of the user device and to classify the plurality of signal strength data into a plurality of groups:
calculating a plurality of signal circles corresponding to at least some of the plurality of groups based on the representative signal values of the corresponding groups; calculating signal intensity data of each signal circle; determining an optimal signal circle of the user equipment within a predetermined distance of the dead zone;
wherein calculating the signal circle comprises: marking the representative signal value as the center of the signal circle;
and grouping representative signal values within a predetermined distance from the center of the signal circle to the signal circle;
and repeating the marking and grouping until all representative signal values are contained within the signal circle;
forming a geofence at a first predetermined distance from the dead zone;
monitoring proximity of the user device to the geofence;
alerting the user device of the blind spot in response to determining that the user device is within a second predetermined distance of the geofence;
transmitting the optimal signal circle to the user equipment based on the signal intensity data and the position of the user equipment, namely, performing positioning operation on the user equipment through the relation of the signal intensity of the user equipment and performing positioning operation with the coded base station of the base station provider;
the shielding device comprises a shielding device and a data selecting unit, wherein the shielding device is configured to shield data which does not accord with rules in the acquisition device and select the data based on the selecting operation of the selecting unit; the data selection unit is configured to determine a data-based location of the first user based on communication data from at least one data capture device coupled to a plurality of baseband controllers; the signature tag determining mapping data that associates the signature tag with a data-based location of the user;
the concealment strategy comprises a search library, a concealment memory configured to provide a mutually agreed number of chips for each vector stored on the concealment memory of the sender subsystem and the receiver subsystem to find a pilot extension vector for each corresponding vector; the search pool is configured to match a date and time at which a message is to be transmitted with at least one pilot scheduled start date and time and at least one scheduled pilot end time and date to create a pilot spreading vector for each chip, to combine each chip with each pilot spreading vector, and to a sender subsystem configured to signal each chip of the pilot spreading vector;
the hidden memory is configured to be connected with the search library, collect or hide based on information of the search library, and determine that hidden data is hidden in the hidden memory; the hiding strategy is matched with the shielding device, so that the stolen information sent by the user equipment can be hidden; meanwhile, if abnormal signals are arranged nearby the base stations, communication is carried out among the base stations through a communication function of a hiding strategy, and the mutual communication relation among the base stations is realized; thereby avoiding the existence of a pseudo base station; the abnormal signals are determined by an acquisition module of the acquisition device, so that communication and protection among all base stations are realized, and information of user equipment is prevented from being stolen;
the secure apparatus comprises a transmitter device, a receiver device, and a secure application, the transmitter device identifying data to share with the receiver device; the security application is configured to construct a prerequisite for any message format, packet or other datagram prior to requesting an update; the secure application is configured to be responsible for identifying a most recent prerequisite for application to the message sharing operation and creating the prerequisite based on periodicity, and after the lapse of time, updating the prerequisite in response to the message request after the most recent message transmission operation;
signature data determining the mapping data based on the signature-tagged time stamp and the user's data-based location time stamp;
the shielding device receives a lawful interception message which identifies user equipment with the base station; and enabling a lawful intercept detection point associated with the call upon subsequent initiation of the call associated with the user equipment; transmitting a message indicating the presence of a lawful intercept point when the enabled lawful intercept point is present;
receiving a lawful interception message from a lawful interception delivery function and sending a message indicating the occurrence of a lawful interception detection point to the lawful interception delivery function, causing a media gateway to send call content of a call associated with the user equipment to the lawful interception delivery function after initiation of the call;
updating the interception database according to the lawful interception message to reflect the interception status of the user equipment, wherein when a call associated with the user equipment is subsequently initiated, the lawful interception detection point is enabled according to the interception status of the user equipment in the user database.
CN202010993207.9A 2020-09-21 2020-09-21 Detection system and method for identifying pseudo base station based on terminal position information Active CN112087758B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010993207.9A CN112087758B (en) 2020-09-21 2020-09-21 Detection system and method for identifying pseudo base station based on terminal position information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010993207.9A CN112087758B (en) 2020-09-21 2020-09-21 Detection system and method for identifying pseudo base station based on terminal position information

Publications (2)

Publication Number Publication Date
CN112087758A CN112087758A (en) 2020-12-15
CN112087758B true CN112087758B (en) 2023-10-20

Family

ID=73740056

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010993207.9A Active CN112087758B (en) 2020-09-21 2020-09-21 Detection system and method for identifying pseudo base station based on terminal position information

Country Status (1)

Country Link
CN (1) CN112087758B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112507368A (en) * 2020-12-30 2021-03-16 广西云牛动力网络科技有限公司 Mixed submission system of asynchronous big data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101548558A (en) * 2006-12-05 2009-09-30 艾利森电话股份有限公司 Systems and methods for location related data interception
CN106856607A (en) * 2017-02-07 2017-06-16 深圳市金立通信设备有限公司 A kind of method and terminal for recognizing pseudo-base station
CN109495894A (en) * 2019-01-04 2019-03-19 中国联合网络通信集团有限公司 A kind of prevention method and system of pseudo-base station
CN112118578A (en) * 2020-09-18 2020-12-22 佛山市龙生光启科技有限公司 Shielding system based on pseudo base station cellular multi-carrier communication

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106851654B (en) * 2017-04-13 2020-08-18 Oppo广东移动通信有限公司 Pseudo base station identification method, pseudo base station identification device and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101548558A (en) * 2006-12-05 2009-09-30 艾利森电话股份有限公司 Systems and methods for location related data interception
CN106856607A (en) * 2017-02-07 2017-06-16 深圳市金立通信设备有限公司 A kind of method and terminal for recognizing pseudo-base station
CN109495894A (en) * 2019-01-04 2019-03-19 中国联合网络通信集团有限公司 A kind of prevention method and system of pseudo-base station
CN112118578A (en) * 2020-09-18 2020-12-22 佛山市龙生光启科技有限公司 Shielding system based on pseudo base station cellular multi-carrier communication

Also Published As

Publication number Publication date
CN112087758A (en) 2020-12-15

Similar Documents

Publication Publication Date Title
CN103891332B (en) Detect suspicious WAP (wireless access point)
US11474190B2 (en) Certified location for mobile devices
CN102016938B (en) Wireless device monitoring systems and monitoring devices, and associated methods
US9198034B2 (en) Validating presence of a communication device using a wireless local area network
CN105939521B (en) Detection alarm method and device for pseudo access point
CN103945385B (en) The method and its device of guarding against theft for mobile terminal
CN101444119A (en) System for implementing security police on mobile communication equipment
CN104838681A (en) Fake base station detection with core network support
US20160065367A1 (en) Communication system, communication device, vehicle and communication method
Chen et al. An ownership transfer scheme using mobile RFIDs
US11240136B2 (en) Determining attributes using captured network probe data in a wireless communications system
US11743715B2 (en) Devices, systems and methods for close contact tracing with strong privacy protection
CN111783092B (en) Malicious attack detection method and system for communication mechanism between Android applications
CN105657662A (en) Locating information sharing method and locating information sharing device
US9380412B2 (en) System and method for location of wireless communication terminals using application-level location data
CN112087758B (en) Detection system and method for identifying pseudo base station based on terminal position information
CN105407479A (en) Information recognition method, information gateway, SIM card, and system
CN109151827B (en) WiFi positioning spoofing detection method and device based on radio frequency fingerprint
CN108966232B (en) Service network-based wireless Internet of things physical layer hybrid authentication method and system
US9237424B2 (en) System and method for correlation of mobile communication terminals and individuals at control checkpoints
CN112118578A (en) Shielding system based on pseudo base station cellular multi-carrier communication
Ziayi et al. YAICD: Yet another IMSI catcher detector in GSM
US20240284181A1 (en) Detection of false base stations
CN111372245A (en) LTE network interception method and system
CN108271156A (en) A kind of method and device for differentiating pseudo-base station

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant