CN112637852A - Communication terminal detection control method and device - Google Patents
Communication terminal detection control method and device Download PDFInfo
- Publication number
- CN112637852A CN112637852A CN202011524331.7A CN202011524331A CN112637852A CN 112637852 A CN112637852 A CN 112637852A CN 202011524331 A CN202011524331 A CN 202011524331A CN 112637852 A CN112637852 A CN 112637852A
- Authority
- CN
- China
- Prior art keywords
- communication terminal
- base station
- management
- control
- control base
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 192
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000001514 detection method Methods 0.000 title claims abstract description 15
- 238000012795 verification Methods 0.000 claims description 21
- 238000012545 processing Methods 0.000 description 17
- 238000000354 decomposition reaction Methods 0.000 description 6
- 238000004590 computer program Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Abstract
The invention provides a communication terminal detection control method and equipment, wherein the communication terminal detection control method comprises the following steps: the signal suppressor transmits interference signals in a set control region to suppress downlink signals of the communication tool in the control region, so that the communication tool cannot acquire downlink data from an operator network; the management and control base station broadcasts a downlink message for accessing the communication terminal to a management and control area, so that the communication terminal is accessed to the management and control base station, and identity information of the accessed communication terminal is acquired; and the management and control base station manages and controls the communication terminal according to the identity information of the communication terminal. The invention realizes the differentiated control of the communication terminals in the control area.
Description
Technical Field
The invention relates to the technical field of communication management and control, in particular to a communication terminal detection management and control method and equipment.
Background
At present, a management and control system for communication terminals (such as mobile phones and smart devices) mainly aims at places where illegal communication terminals are forbidden to use, such as various prisons, guard houses, poison-forbidding centers, public security, military heavy places, examination places and the like. The communication terminal management and control system mainly has the functions of shielding mobile phone signals and detecting, alarming, positioning and tracking illegal communication terminals.
In the prior art, the shielding for the communication terminal mostly adopts a pure shielding mode, that is, a high-power single tone signal with a certain frequency is emitted to interfere with peripheral normal signals, and meanwhile, full-time cyclic scanning is carried out, so that the electromagnetic environment is seriously deteriorated, and a base station signal cannot be normally demodulated by a mobile phone, thereby achieving the purpose of shielding the signal. However, the above-mentioned shielding method cannot perform differentiated management and control on the communication terminal, and cannot meet the normal communication requirement of the specific device in the management and control area.
Disclosure of Invention
In view of the above problems, the present invention provides a method and a device for detecting and controlling a communication terminal.
The purpose of the invention is realized by adopting the following technical scheme:
the invention discloses a detection control method of a communication terminal, which comprises the following steps:
the signal suppressor transmits interference signals in a set control region to suppress downlink signals of the communication tool in the control region, so that the communication tool cannot acquire downlink data from an operator network;
the management and control base station broadcasts a downlink message for accessing the communication terminal to a management and control area, so that the communication terminal is accessed to the management and control base station, and identity information of the accessed communication terminal is acquired;
and the management and control base station manages and controls the communication terminal according to the identity information of the communication terminal.
Preferably, the base station manages and controls the communication terminal according to the identity information of the communication terminal, including:
when the identity information of the communication terminal belongs to the set white list, releasing the channel of the communication terminal corresponding to the identity information so that the communication terminal is accessed to the operator communication base station again to recover the normal communication service;
and when the identity information of the communication terminal belongs to the set blacklist, shielding the communication service of the communication terminal corresponding to the identity information.
Preferably, the method further comprises: aiming at the communication terminal which does not belong to the white list or the black list, the control base station sends an authentication request to the communication terminal, so that the communication terminal receives the authentication request and then feeds back authentication information to the control base station;
and the management and control base station verifies according to the received authentication information, and adds the identity information of the communication terminal into the white list after the verification is passed.
Preferably, the authentication request includes an image signal acquisition request, and the communication terminal feeds back a communication terminal user image as authentication information to the control base station after receiving the image signal acquisition request;
the management and control base station forwards the communication terminal user image to a monitoring center according to the received communication terminal user image, and the monitoring center performs identity verification on the communication terminal user image; and the management and control base station outputs an authentication information verification result according to the identity verification result returned by the monitoring center, and adds the identity information of the communication terminal into the white list after the verification is passed.
Preferably, the identity information of the communication terminal includes a unique identification code of the communication terminal.
Preferably, the method further comprises:
and detecting an uplink signal sent by the communication terminal in the control area through the signal detection module, and sending the detected uplink signal to the monitoring center.
The invention also discloses a communication terminal detection control device, which comprises: the system comprises a signal suppressor and a control base station;
the signal suppressor is used for emitting interference signals in a set control area so as to suppress downlink signals of the communication tool in the control area, so that the communication tool cannot acquire downlink data from an operator network;
the management and control base station is used for broadcasting a downlink message for accessing the communication terminal to the management and control area, so that the communication terminal is accessed to the management and control base station and the identity information of the accessed communication terminal is acquired;
and the management and control base station is used for managing and controlling the communication terminal according to the identity information of the communication terminal.
The invention has the beneficial effects that: according to the invention, the downlink communication function of the communication terminal can be captured by the control base station, so that the communication terminal can not be normally accessed to the operator network, and meanwhile, the communication terminal meeting the identity requirement is subjected to channel release according to the identity information of the communication terminal, so that the communication terminal meeting the requirement can be normally accessed to the operator network, and the differentiated control of the communication terminal in the control area is realized.
Meanwhile, the invention also provides an authentication mode aiming at the newly accessed communication terminal, and the communication interruption can be accurately authenticated and managed by communication management and control through the targeted authentication based on the user image mode, so that the management and control accuracy of the communication terminal in the management and control area is improved.
Drawings
The invention is further illustrated by means of the attached drawings, but the embodiments in the drawings do not constitute any limitation to the invention, and for a person skilled in the art, other drawings can be obtained on the basis of the following drawings without inventive effort.
Fig. 1 is a flowchart of a method of detecting, managing and controlling a communication terminal according to an embodiment of the present invention.
Detailed Description
The invention is further described in connection with the following application scenarios.
Referring to fig. 1, an embodiment of the present invention shows a method for detecting and controlling a communication terminal, including:
1) the signal suppressor transmits interference signals in a set control region to suppress downlink signals of the communication tool in the control region, so that the communication tool cannot acquire downlink data from an operator network;
2) the management and control base station broadcasts a downlink message for accessing the communication terminal to a management and control area, so that the communication terminal is accessed to the management and control base station, and identity information of the accessed communication terminal is acquired;
3) and the management and control base station manages and controls the communication terminal according to the identity information of the communication terminal.
In the above embodiment, the management and control base station captures the downlink communication function of the communication terminal, so that the communication terminal cannot normally access the operator network, and meanwhile, according to the identity information of the communication terminal, the communication terminal meeting the identity requirement is subjected to channel release, so that the communication terminal meeting the requirement can normally access the operator network, and the differentiated management and control of the communication terminal in the management and control area is realized.
Preferably, the base station manages and controls the communication terminal according to the identity information of the communication terminal, including:
when the identity information of the communication terminal belongs to the set white list, releasing the channel of the communication terminal corresponding to the identity information so that the communication terminal is accessed to the operator communication base station again to recover the normal communication service;
and when the identity information of the communication terminal belongs to the set blacklist, shielding the communication service of the communication terminal corresponding to the identity information.
Preferably, the Identity information of the communication terminal includes a unique Identity identifier of the communication terminal, including an International Mobile Subscriber Identity (IMSI) or an International Mobile Equipment Identity (IMEI);
the management and control base station broadcasts a common downlink message to all mobile terminals within a preset range, wherein the Broadcast Control Channel (BCCH) carrier frequency signal level of the common downlink message is greater than the BCCH carrier frequency signal level of an adjacent serving cell, and the downlink message also satisfies a serving cell reselection threshold of the mobile terminal. Because the signal intensity of the control base station is greater than that of the operator public network base station within the preset range, the mobile phone terminal can access the control base station according to the serving cell reselection algorithm. And the management and control base station manages and controls the communication terminal according to the fact that the IMSI and the IMEI of the communication terminal accessed to the management and control base station belong to a preset blacklist or a preset white list. For example, if the IMSI and IMEI of the communication terminal accessing the management and control base station belong to a preset blacklist, the mobile phone terminal is separated from the public network and resides in the management and control base station; when the IMSI and IMEI of the communication terminal accessing the control base station belong to the preset white list, the control base station releases the independent dedicated control channel and abandons the control of the communication terminal.
Preferably, the signal suppressor transmits an interference signal 5dB smaller than the operator network signal within the set control region.
Preferably, the method further comprises: aiming at the communication terminal which does not belong to the white list or the black list, the management and control base station sends an authentication request to the communication terminal, so that the communication terminal can receive the authentication information fed back after receiving the authentication request;
and the management and control base station verifies according to the received authentication information, and adds the identity information of the communication terminal into the white list after the verification is passed.
The problem that the coverage hidden danger exists in management and control due to the fact that authentication is conducted on the authentication information only through the information of the communication terminal and the user information behind the communication terminal cannot be authenticated at present is solved. The following provides a technical scheme for authentication according to the image information of the communication terminal user:
preferably, the authentication request comprises an image signal acquisition request, and the communication terminal feeds back an image of a communication terminal user as authentication information fed back by the communication terminal after receiving the image signal acquisition request;
the management and control base station forwards the communication terminal user image to a monitoring center according to the received communication terminal user image, and the monitoring center performs identity verification on the communication terminal user image; and the management and control base station outputs an authentication information verification result according to the identity verification result returned by the monitoring center, and adds the identity information of the communication terminal into the white list after the verification is passed.
Preferably, the method further includes that the management and control base station performs format verification according to the acquired communication terminal user image:
carrying out face detection on a preset target area in the communication terminal user image, outputting a format verification result as a pass when detecting that 1 face exists in the preset target area, and further forwarding the communication terminal user image to a monitoring center; otherwise, when the human faces can not be detected in the preset target area or the number of the detected human faces is more than 1, returning verification failure information to the communication terminal sending the authentication information, and sending an authentication request to the communication terminal again.
When the authentication information sent by the unified communication terminal is failed to be verified for two times, the management and control base station does not actively send an authentication request to the communication terminal any more, and keeps shielding the downlink communication of the communication terminal.
In the above embodiment, in order to ensure that the communication terminal user image sent to the monitoring center for authentication verification by the administrator meets the requirements, the management and control base station further performs preliminary screening on the received communication terminal user image, returns the authentication information that does not meet the requirements to the original communication terminal, and can effectively ensure the efficiency of the monitoring center in verifying the communication terminal user image.
Preferably, before the management and control base station performs face detection on the preset target area in the image of the communication terminal user, the method further includes:
the management and control base station preprocesses the acquired communication terminal user image, and the method comprises the following steps:
1) performing wavelet decomposition processing on the acquired communication terminal user image to acquire a high-frequency wavelet coefficient and a low-frequency wavelet coefficient of the communication terminal user image, wherein the wavelet decomposition processing is performed by adopting a set wavelet basis and a set decomposition layer number;
2) and performing enhancement processing on the acquired low-frequency wavelet coefficient, wherein the adopted low-frequency wavelet coefficient enhancement function is as follows:
in the formula, d' (i, j) represents the jth low-frequency wavelet coefficient of the ith layer after the enhancement processing, d (i, j) represents the jth low-frequency wavelet coefficient of the ith layer before the enhancement processing, dmeanRepresents the average value of the wavelet coefficients of the ith layer before enhancement processing,indicating a set enhancement factor, whichInA larger size means a more significant enhancement effect,
3) carrying out threshold processing on the obtained high-frequency wavelet coefficient, wherein the adopted threshold function is as follows:
wherein g' (i, j) represents the jth high frequency wavelet coefficient of the ith wavelet decomposition after the thresholding, g (i, j) represents the jth high frequency wavelet coefficient of the ith wavelet decomposition before the thresholding, and delta1And delta2Respectively representing a set adjustment factor, T representing a set threshold value, sgn (x) representing a sign function;
4) reconstructing according to the high-frequency coefficient after threshold processing and the low-frequency coefficient after enhancement processing to obtain a preprocessed communication terminal user image;
and the control base station further performs face detection on a preset target area in the preprocessed communication terminal user image.
In order to ensure the accuracy of the management and control base station for format verification of the communication terminal user image, in the above embodiment, the management and control base station can also pre-process the received communication terminal user image through the image processing equipment carried by the management and control base station, wherein the low-frequency wavelet coefficient and the high-frequency wavelet coefficient of the image are obtained based on wavelet decomposition and are used as a basis, the low-frequency part reflecting the overall condition of the image is enhanced, and an enhancement processing mode for the low-frequency coefficient is provided, so that the overall characteristic display effect of the image can be effectively improved; meanwhile, threshold processing is carried out on the high-frequency part reflecting the detailed part of the image, so that noise interference existing in the image can be effectively eliminated; through the processing of the high-frequency and low-frequency parts, the image quality of the communication terminal user can be enhanced from the overall and local details, and a foundation is laid for authentication verification of the monitoring terminal according to the communication terminal user image transmitted by the control base station.
The control base station is also provided with a special image processing device, and processes the communication terminal user image in the authentication information based on the image processing device.
Preferably, the method further comprises:
and detecting an uplink signal sent by the communication terminal in the control area through the signal detection module, and sending the detected uplink signal to the monitoring center.
Meanwhile, the invention also discloses a communication terminal detection control device, which comprises: the system comprises a signal suppressor and a control base station;
the signal suppressor is used for emitting interference signals in a set control area so as to suppress downlink signals of the communication tool in the control area, so that the communication tool cannot acquire downlink data from an operator network;
the management and control base station is used for broadcasting a downlink message for accessing the communication terminal to the management and control area, so that the communication terminal is accessed to the management and control base station and the identity information of the accessed communication terminal is acquired;
and the management and control base station is used for managing and controlling the communication terminal according to the identity information of the communication terminal.
Preferably, the device further comprises a signal detection module and a monitoring center.
It should be noted that, the present apparatus is used for implementing the functions of the above method, and each module in the apparatus corresponds to the above method steps, and can implement different embodiments in the above method, and specifically, refer to the above description about the method, and will not be described in detail here.
It should be noted that, functional units/modules in the embodiments of the present invention may be integrated into one processing unit/module, or each unit/module may exist alone physically, or two or more units/modules are integrated into one unit/module. The integrated units/modules may be implemented in the form of hardware, or may be implemented in the form of software functional units/modules.
From the above description of embodiments, it is clear for a person skilled in the art that the embodiments described herein can be implemented in hardware, software, firmware, middleware, code or any appropriate combination thereof. For a hardware implementation, a processor may be implemented in one or more of the following units: an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, other electronic units designed to perform the functions described herein, or a combination thereof. For a software implementation, some or all of the procedures of an embodiment may be performed by a computer program instructing associated hardware. In practice, the program may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. Computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the protection scope of the present invention, although the present invention is described in detail with reference to the preferred embodiments, it should be analyzed by those skilled in the art that modifications or equivalent substitutions can be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.
Claims (7)
1. The method for detecting, controlling and managing the communication terminal is characterized by comprising the following steps:
the signal suppressor transmits interference signals in a set control region to suppress downlink signals of the communication tool in the control region, so that the communication tool cannot acquire downlink data from an operator network;
the management and control base station broadcasts a downlink message for accessing the communication terminal to a management and control area, so that the communication terminal is accessed to the management and control base station, and identity information of the accessed communication terminal is acquired;
and the management and control base station manages and controls the communication terminal according to the identity information of the communication terminal.
2. The method as claimed in claim 1, wherein the step of the management and control base station managing and controlling the communication terminal according to the identity information of the communication terminal comprises:
when the identity information of the communication terminal belongs to a set white list, releasing a channel of the communication terminal corresponding to the identity information so that the communication terminal is accessed to the operator communication base station again to recover normal communication service;
and when the identity information of the communication terminal belongs to the set blacklist, shielding the communication service of the communication terminal corresponding to the identity information.
3. The method as claimed in claim 2, wherein the method further comprises: aiming at the communication terminal which does not belong to the white list or the black list, the control base station sends an authentication request to the communication terminal, so that the communication terminal receives the authentication request and then feeds back authentication information to the control base station;
and the management and control base station verifies according to the received authentication information, and adds the identity information of the communication terminal into the white list after the verification is passed.
4. The method as claimed in claim 3, wherein the authentication request includes an image signal acquisition request, and the communication terminal feeds back a communication terminal user image as the authentication information to the management and control base station after receiving the image signal acquisition request;
the control base station forwards the communication terminal user image to a monitoring center according to the received communication terminal user image, and the monitoring center performs identity verification on the communication terminal user image; and the management and control base station outputs an authentication information verification result according to the identity verification result returned by the monitoring center, and adds the identity information of the communication terminal into the white list after the verification is passed.
5. The method as claimed in claim 4, wherein the identity information of the communication terminal includes a unique id of the communication terminal.
6. The method as claimed in claim 5, wherein the method further comprises:
and detecting an uplink signal sent by the communication terminal in the control area through a signal detection module, and sending the detected uplink signal to a monitoring center.
7. Management and control equipment is listened to communication terminal, its characterized in that includes: the system comprises a signal suppressor and a control base station;
the signal suppressor is used for emitting interference signals in a set control area so as to suppress downlink signals of the communication tool in the control area, so that the communication tool cannot acquire downlink data from an operator network;
the management and control base station is used for broadcasting a downlink message for accessing the communication terminal to the management and control area, so that the communication terminal is accessed to the management and control base station and the identity information of the accessed communication terminal is acquired;
and the management and control base station is used for managing and controlling the communication terminal according to the identity information of the communication terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011524331.7A CN112637852A (en) | 2020-12-21 | 2020-12-21 | Communication terminal detection control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011524331.7A CN112637852A (en) | 2020-12-21 | 2020-12-21 | Communication terminal detection control method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112637852A true CN112637852A (en) | 2021-04-09 |
Family
ID=75320562
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011524331.7A Pending CN112637852A (en) | 2020-12-21 | 2020-12-21 | Communication terminal detection control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112637852A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111818600A (en) * | 2020-07-08 | 2020-10-23 | 河南软金通信科技有限公司 | Terminal control method, device, equipment and storage medium |
CN113313910A (en) * | 2021-05-27 | 2021-08-27 | 深圳市双佳医疗科技有限公司 | Intelligent medical health reminding system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103167582A (en) * | 2013-04-11 | 2013-06-19 | 中国人民解放军信息工程大学 | Terminal control method and control base station |
CN104980954A (en) * | 2015-05-27 | 2015-10-14 | 中国科学院信息工程研究所 | Real-time management and control method for terminal and base station control module |
CN105142142A (en) * | 2015-08-25 | 2015-12-09 | 中国科学院信息工程研究所 | All-system cellphone terminal control method and device |
CN108260124A (en) * | 2018-01-11 | 2018-07-06 | 阳光凯讯(北京)科技有限公司 | A kind of method for detecing code and management and control for 4G terminals |
CN109842598A (en) * | 2017-11-28 | 2019-06-04 | 杭州海康威视系统技术有限公司 | Auth method, device, control equipment and storage medium |
CN110502592A (en) * | 2019-08-27 | 2019-11-26 | 深圳供电局有限公司 | Item domains subject analysis system based on big data analysis technology |
CN112085416A (en) * | 2020-09-23 | 2020-12-15 | 北京奥康达体育产业股份有限公司 | Personalized fitness management system based on cloud computing |
-
2020
- 2020-12-21 CN CN202011524331.7A patent/CN112637852A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103167582A (en) * | 2013-04-11 | 2013-06-19 | 中国人民解放军信息工程大学 | Terminal control method and control base station |
CN104980954A (en) * | 2015-05-27 | 2015-10-14 | 中国科学院信息工程研究所 | Real-time management and control method for terminal and base station control module |
CN105142142A (en) * | 2015-08-25 | 2015-12-09 | 中国科学院信息工程研究所 | All-system cellphone terminal control method and device |
CN109842598A (en) * | 2017-11-28 | 2019-06-04 | 杭州海康威视系统技术有限公司 | Auth method, device, control equipment and storage medium |
CN108260124A (en) * | 2018-01-11 | 2018-07-06 | 阳光凯讯(北京)科技有限公司 | A kind of method for detecing code and management and control for 4G terminals |
CN110502592A (en) * | 2019-08-27 | 2019-11-26 | 深圳供电局有限公司 | Item domains subject analysis system based on big data analysis technology |
CN112085416A (en) * | 2020-09-23 | 2020-12-15 | 北京奥康达体育产业股份有限公司 | Personalized fitness management system based on cloud computing |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111818600A (en) * | 2020-07-08 | 2020-10-23 | 河南软金通信科技有限公司 | Terminal control method, device, equipment and storage medium |
CN111818600B (en) * | 2020-07-08 | 2023-02-21 | 河南软金通信科技有限公司 | Terminal control method, device, equipment and storage medium |
CN113313910A (en) * | 2021-05-27 | 2021-08-27 | 深圳市双佳医疗科技有限公司 | Intelligent medical health reminding system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10117094B2 (en) | Systems and methods for identifying rogue base stations | |
US10834596B2 (en) | Method for blocking connection in wireless intrusion prevention system and device therefor | |
CN103891332B (en) | Detect suspicious WAP (wireless access point) | |
KR101190537B1 (en) | Method of identifying a transmitt device | |
CN112637852A (en) | Communication terminal detection control method and device | |
EP1860858A1 (en) | Detection of cloned identifiers in communication systems | |
US7555285B2 (en) | Detection of cloned communication united based on message contents | |
US20130344823A1 (en) | Method and Arrangement in A Wireless Communication Device | |
US10285060B2 (en) | Preventing attacks from false base stations | |
US20180124111A1 (en) | System and method for network entity assisted honeypot access point detection | |
US20240114337A1 (en) | Method and user equipment for determining whether base station is genuine or rouge in wireless network | |
US11250172B2 (en) | Handling wireless client devices associated with a role indicating a stolen device | |
US20110314512A1 (en) | Methods for security and monitoring within a worldwide interoperability for microwave access (wimax) network | |
KR20110052635A (en) | Method for managing a telecommunication network and associated devices | |
CN101039517A (en) | Method, system and apparatus for realizing personal hand-held phone terminal register, communication | |
CN111641942A (en) | Mobile terminal management and control system and method based on scene recognition | |
CN108809937B (en) | Management and control system and method | |
CN112703755A (en) | Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium | |
US11510061B1 (en) | Mitigation of cyberattacks on cellular devices | |
CN111817815A (en) | Indoor signal distributed management system, method, medium and equipment | |
CN106454776B (en) | Pseudo base station protection method and device | |
WO2021058120A1 (en) | Identyifying and reporting a fraudelent base station | |
CN112989879B (en) | Data receiving and transmitting system and method applying characteristic analysis | |
KR20090116401A (en) | Method for identifying mobile station, and mobile station and core network apparauts for executing the method | |
Oh et al. | Enabling Physical Localization of Uncooperative Cellular Devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210409 |