CN112637852A - Communication terminal detection control method and device - Google Patents

Communication terminal detection control method and device Download PDF

Info

Publication number
CN112637852A
CN112637852A CN202011524331.7A CN202011524331A CN112637852A CN 112637852 A CN112637852 A CN 112637852A CN 202011524331 A CN202011524331 A CN 202011524331A CN 112637852 A CN112637852 A CN 112637852A
Authority
CN
China
Prior art keywords
communication terminal
base station
management
control
control base
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011524331.7A
Other languages
Chinese (zh)
Inventor
高斌
孙小鹏
张小红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinjiang Pinxuan Biotechnology Co ltd
Original Assignee
Xinjiang Pinxuan Biotechnology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinjiang Pinxuan Biotechnology Co ltd filed Critical Xinjiang Pinxuan Biotechnology Co ltd
Priority to CN202011524331.7A priority Critical patent/CN112637852A/en
Publication of CN112637852A publication Critical patent/CN112637852A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Abstract

The invention provides a communication terminal detection control method and equipment, wherein the communication terminal detection control method comprises the following steps: the signal suppressor transmits interference signals in a set control region to suppress downlink signals of the communication tool in the control region, so that the communication tool cannot acquire downlink data from an operator network; the management and control base station broadcasts a downlink message for accessing the communication terminal to a management and control area, so that the communication terminal is accessed to the management and control base station, and identity information of the accessed communication terminal is acquired; and the management and control base station manages and controls the communication terminal according to the identity information of the communication terminal. The invention realizes the differentiated control of the communication terminals in the control area.

Description

Communication terminal detection control method and device
Technical Field
The invention relates to the technical field of communication management and control, in particular to a communication terminal detection management and control method and equipment.
Background
At present, a management and control system for communication terminals (such as mobile phones and smart devices) mainly aims at places where illegal communication terminals are forbidden to use, such as various prisons, guard houses, poison-forbidding centers, public security, military heavy places, examination places and the like. The communication terminal management and control system mainly has the functions of shielding mobile phone signals and detecting, alarming, positioning and tracking illegal communication terminals.
In the prior art, the shielding for the communication terminal mostly adopts a pure shielding mode, that is, a high-power single tone signal with a certain frequency is emitted to interfere with peripheral normal signals, and meanwhile, full-time cyclic scanning is carried out, so that the electromagnetic environment is seriously deteriorated, and a base station signal cannot be normally demodulated by a mobile phone, thereby achieving the purpose of shielding the signal. However, the above-mentioned shielding method cannot perform differentiated management and control on the communication terminal, and cannot meet the normal communication requirement of the specific device in the management and control area.
Disclosure of Invention
In view of the above problems, the present invention provides a method and a device for detecting and controlling a communication terminal.
The purpose of the invention is realized by adopting the following technical scheme:
the invention discloses a detection control method of a communication terminal, which comprises the following steps:
the signal suppressor transmits interference signals in a set control region to suppress downlink signals of the communication tool in the control region, so that the communication tool cannot acquire downlink data from an operator network;
the management and control base station broadcasts a downlink message for accessing the communication terminal to a management and control area, so that the communication terminal is accessed to the management and control base station, and identity information of the accessed communication terminal is acquired;
and the management and control base station manages and controls the communication terminal according to the identity information of the communication terminal.
Preferably, the base station manages and controls the communication terminal according to the identity information of the communication terminal, including:
when the identity information of the communication terminal belongs to the set white list, releasing the channel of the communication terminal corresponding to the identity information so that the communication terminal is accessed to the operator communication base station again to recover the normal communication service;
and when the identity information of the communication terminal belongs to the set blacklist, shielding the communication service of the communication terminal corresponding to the identity information.
Preferably, the method further comprises: aiming at the communication terminal which does not belong to the white list or the black list, the control base station sends an authentication request to the communication terminal, so that the communication terminal receives the authentication request and then feeds back authentication information to the control base station;
and the management and control base station verifies according to the received authentication information, and adds the identity information of the communication terminal into the white list after the verification is passed.
Preferably, the authentication request includes an image signal acquisition request, and the communication terminal feeds back a communication terminal user image as authentication information to the control base station after receiving the image signal acquisition request;
the management and control base station forwards the communication terminal user image to a monitoring center according to the received communication terminal user image, and the monitoring center performs identity verification on the communication terminal user image; and the management and control base station outputs an authentication information verification result according to the identity verification result returned by the monitoring center, and adds the identity information of the communication terminal into the white list after the verification is passed.
Preferably, the identity information of the communication terminal includes a unique identification code of the communication terminal.
Preferably, the method further comprises:
and detecting an uplink signal sent by the communication terminal in the control area through the signal detection module, and sending the detected uplink signal to the monitoring center.
The invention also discloses a communication terminal detection control device, which comprises: the system comprises a signal suppressor and a control base station;
the signal suppressor is used for emitting interference signals in a set control area so as to suppress downlink signals of the communication tool in the control area, so that the communication tool cannot acquire downlink data from an operator network;
the management and control base station is used for broadcasting a downlink message for accessing the communication terminal to the management and control area, so that the communication terminal is accessed to the management and control base station and the identity information of the accessed communication terminal is acquired;
and the management and control base station is used for managing and controlling the communication terminal according to the identity information of the communication terminal.
The invention has the beneficial effects that: according to the invention, the downlink communication function of the communication terminal can be captured by the control base station, so that the communication terminal can not be normally accessed to the operator network, and meanwhile, the communication terminal meeting the identity requirement is subjected to channel release according to the identity information of the communication terminal, so that the communication terminal meeting the requirement can be normally accessed to the operator network, and the differentiated control of the communication terminal in the control area is realized.
Meanwhile, the invention also provides an authentication mode aiming at the newly accessed communication terminal, and the communication interruption can be accurately authenticated and managed by communication management and control through the targeted authentication based on the user image mode, so that the management and control accuracy of the communication terminal in the management and control area is improved.
Drawings
The invention is further illustrated by means of the attached drawings, but the embodiments in the drawings do not constitute any limitation to the invention, and for a person skilled in the art, other drawings can be obtained on the basis of the following drawings without inventive effort.
Fig. 1 is a flowchart of a method of detecting, managing and controlling a communication terminal according to an embodiment of the present invention.
Detailed Description
The invention is further described in connection with the following application scenarios.
Referring to fig. 1, an embodiment of the present invention shows a method for detecting and controlling a communication terminal, including:
1) the signal suppressor transmits interference signals in a set control region to suppress downlink signals of the communication tool in the control region, so that the communication tool cannot acquire downlink data from an operator network;
2) the management and control base station broadcasts a downlink message for accessing the communication terminal to a management and control area, so that the communication terminal is accessed to the management and control base station, and identity information of the accessed communication terminal is acquired;
3) and the management and control base station manages and controls the communication terminal according to the identity information of the communication terminal.
In the above embodiment, the management and control base station captures the downlink communication function of the communication terminal, so that the communication terminal cannot normally access the operator network, and meanwhile, according to the identity information of the communication terminal, the communication terminal meeting the identity requirement is subjected to channel release, so that the communication terminal meeting the requirement can normally access the operator network, and the differentiated management and control of the communication terminal in the management and control area is realized.
Preferably, the base station manages and controls the communication terminal according to the identity information of the communication terminal, including:
when the identity information of the communication terminal belongs to the set white list, releasing the channel of the communication terminal corresponding to the identity information so that the communication terminal is accessed to the operator communication base station again to recover the normal communication service;
and when the identity information of the communication terminal belongs to the set blacklist, shielding the communication service of the communication terminal corresponding to the identity information.
Preferably, the Identity information of the communication terminal includes a unique Identity identifier of the communication terminal, including an International Mobile Subscriber Identity (IMSI) or an International Mobile Equipment Identity (IMEI);
the management and control base station broadcasts a common downlink message to all mobile terminals within a preset range, wherein the Broadcast Control Channel (BCCH) carrier frequency signal level of the common downlink message is greater than the BCCH carrier frequency signal level of an adjacent serving cell, and the downlink message also satisfies a serving cell reselection threshold of the mobile terminal. Because the signal intensity of the control base station is greater than that of the operator public network base station within the preset range, the mobile phone terminal can access the control base station according to the serving cell reselection algorithm. And the management and control base station manages and controls the communication terminal according to the fact that the IMSI and the IMEI of the communication terminal accessed to the management and control base station belong to a preset blacklist or a preset white list. For example, if the IMSI and IMEI of the communication terminal accessing the management and control base station belong to a preset blacklist, the mobile phone terminal is separated from the public network and resides in the management and control base station; when the IMSI and IMEI of the communication terminal accessing the control base station belong to the preset white list, the control base station releases the independent dedicated control channel and abandons the control of the communication terminal.
Preferably, the signal suppressor transmits an interference signal 5dB smaller than the operator network signal within the set control region.
Preferably, the method further comprises: aiming at the communication terminal which does not belong to the white list or the black list, the management and control base station sends an authentication request to the communication terminal, so that the communication terminal can receive the authentication information fed back after receiving the authentication request;
and the management and control base station verifies according to the received authentication information, and adds the identity information of the communication terminal into the white list after the verification is passed.
The problem that the coverage hidden danger exists in management and control due to the fact that authentication is conducted on the authentication information only through the information of the communication terminal and the user information behind the communication terminal cannot be authenticated at present is solved. The following provides a technical scheme for authentication according to the image information of the communication terminal user:
preferably, the authentication request comprises an image signal acquisition request, and the communication terminal feeds back an image of a communication terminal user as authentication information fed back by the communication terminal after receiving the image signal acquisition request;
the management and control base station forwards the communication terminal user image to a monitoring center according to the received communication terminal user image, and the monitoring center performs identity verification on the communication terminal user image; and the management and control base station outputs an authentication information verification result according to the identity verification result returned by the monitoring center, and adds the identity information of the communication terminal into the white list after the verification is passed.
Preferably, the method further includes that the management and control base station performs format verification according to the acquired communication terminal user image:
carrying out face detection on a preset target area in the communication terminal user image, outputting a format verification result as a pass when detecting that 1 face exists in the preset target area, and further forwarding the communication terminal user image to a monitoring center; otherwise, when the human faces can not be detected in the preset target area or the number of the detected human faces is more than 1, returning verification failure information to the communication terminal sending the authentication information, and sending an authentication request to the communication terminal again.
When the authentication information sent by the unified communication terminal is failed to be verified for two times, the management and control base station does not actively send an authentication request to the communication terminal any more, and keeps shielding the downlink communication of the communication terminal.
In the above embodiment, in order to ensure that the communication terminal user image sent to the monitoring center for authentication verification by the administrator meets the requirements, the management and control base station further performs preliminary screening on the received communication terminal user image, returns the authentication information that does not meet the requirements to the original communication terminal, and can effectively ensure the efficiency of the monitoring center in verifying the communication terminal user image.
Preferably, before the management and control base station performs face detection on the preset target area in the image of the communication terminal user, the method further includes:
the management and control base station preprocesses the acquired communication terminal user image, and the method comprises the following steps:
1) performing wavelet decomposition processing on the acquired communication terminal user image to acquire a high-frequency wavelet coefficient and a low-frequency wavelet coefficient of the communication terminal user image, wherein the wavelet decomposition processing is performed by adopting a set wavelet basis and a set decomposition layer number;
2) and performing enhancement processing on the acquired low-frequency wavelet coefficient, wherein the adopted low-frequency wavelet coefficient enhancement function is as follows:
Figure BDA0002850014040000041
in the formula, d' (i, j) represents the jth low-frequency wavelet coefficient of the ith layer after the enhancement processing, d (i, j) represents the jth low-frequency wavelet coefficient of the ith layer before the enhancement processing, dmeanRepresents the average value of the wavelet coefficients of the ith layer before enhancement processing,
Figure BDA0002850014040000042
indicating a set enhancement factor, whichIn
Figure BDA0002850014040000051
A larger size means a more significant enhancement effect,
Figure BDA0002850014040000052
3) carrying out threshold processing on the obtained high-frequency wavelet coefficient, wherein the adopted threshold function is as follows:
Figure BDA0002850014040000053
wherein g' (i, j) represents the jth high frequency wavelet coefficient of the ith wavelet decomposition after the thresholding, g (i, j) represents the jth high frequency wavelet coefficient of the ith wavelet decomposition before the thresholding, and delta1And delta2Respectively representing a set adjustment factor, T representing a set threshold value, sgn (x) representing a sign function;
4) reconstructing according to the high-frequency coefficient after threshold processing and the low-frequency coefficient after enhancement processing to obtain a preprocessed communication terminal user image;
and the control base station further performs face detection on a preset target area in the preprocessed communication terminal user image.
In order to ensure the accuracy of the management and control base station for format verification of the communication terminal user image, in the above embodiment, the management and control base station can also pre-process the received communication terminal user image through the image processing equipment carried by the management and control base station, wherein the low-frequency wavelet coefficient and the high-frequency wavelet coefficient of the image are obtained based on wavelet decomposition and are used as a basis, the low-frequency part reflecting the overall condition of the image is enhanced, and an enhancement processing mode for the low-frequency coefficient is provided, so that the overall characteristic display effect of the image can be effectively improved; meanwhile, threshold processing is carried out on the high-frequency part reflecting the detailed part of the image, so that noise interference existing in the image can be effectively eliminated; through the processing of the high-frequency and low-frequency parts, the image quality of the communication terminal user can be enhanced from the overall and local details, and a foundation is laid for authentication verification of the monitoring terminal according to the communication terminal user image transmitted by the control base station.
The control base station is also provided with a special image processing device, and processes the communication terminal user image in the authentication information based on the image processing device.
Preferably, the method further comprises:
and detecting an uplink signal sent by the communication terminal in the control area through the signal detection module, and sending the detected uplink signal to the monitoring center.
Meanwhile, the invention also discloses a communication terminal detection control device, which comprises: the system comprises a signal suppressor and a control base station;
the signal suppressor is used for emitting interference signals in a set control area so as to suppress downlink signals of the communication tool in the control area, so that the communication tool cannot acquire downlink data from an operator network;
the management and control base station is used for broadcasting a downlink message for accessing the communication terminal to the management and control area, so that the communication terminal is accessed to the management and control base station and the identity information of the accessed communication terminal is acquired;
and the management and control base station is used for managing and controlling the communication terminal according to the identity information of the communication terminal.
Preferably, the device further comprises a signal detection module and a monitoring center.
It should be noted that, the present apparatus is used for implementing the functions of the above method, and each module in the apparatus corresponds to the above method steps, and can implement different embodiments in the above method, and specifically, refer to the above description about the method, and will not be described in detail here.
It should be noted that, functional units/modules in the embodiments of the present invention may be integrated into one processing unit/module, or each unit/module may exist alone physically, or two or more units/modules are integrated into one unit/module. The integrated units/modules may be implemented in the form of hardware, or may be implemented in the form of software functional units/modules.
From the above description of embodiments, it is clear for a person skilled in the art that the embodiments described herein can be implemented in hardware, software, firmware, middleware, code or any appropriate combination thereof. For a hardware implementation, a processor may be implemented in one or more of the following units: an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, other electronic units designed to perform the functions described herein, or a combination thereof. For a software implementation, some or all of the procedures of an embodiment may be performed by a computer program instructing associated hardware. In practice, the program may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. Computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the protection scope of the present invention, although the present invention is described in detail with reference to the preferred embodiments, it should be analyzed by those skilled in the art that modifications or equivalent substitutions can be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (7)

1. The method for detecting, controlling and managing the communication terminal is characterized by comprising the following steps:
the signal suppressor transmits interference signals in a set control region to suppress downlink signals of the communication tool in the control region, so that the communication tool cannot acquire downlink data from an operator network;
the management and control base station broadcasts a downlink message for accessing the communication terminal to a management and control area, so that the communication terminal is accessed to the management and control base station, and identity information of the accessed communication terminal is acquired;
and the management and control base station manages and controls the communication terminal according to the identity information of the communication terminal.
2. The method as claimed in claim 1, wherein the step of the management and control base station managing and controlling the communication terminal according to the identity information of the communication terminal comprises:
when the identity information of the communication terminal belongs to a set white list, releasing a channel of the communication terminal corresponding to the identity information so that the communication terminal is accessed to the operator communication base station again to recover normal communication service;
and when the identity information of the communication terminal belongs to the set blacklist, shielding the communication service of the communication terminal corresponding to the identity information.
3. The method as claimed in claim 2, wherein the method further comprises: aiming at the communication terminal which does not belong to the white list or the black list, the control base station sends an authentication request to the communication terminal, so that the communication terminal receives the authentication request and then feeds back authentication information to the control base station;
and the management and control base station verifies according to the received authentication information, and adds the identity information of the communication terminal into the white list after the verification is passed.
4. The method as claimed in claim 3, wherein the authentication request includes an image signal acquisition request, and the communication terminal feeds back a communication terminal user image as the authentication information to the management and control base station after receiving the image signal acquisition request;
the control base station forwards the communication terminal user image to a monitoring center according to the received communication terminal user image, and the monitoring center performs identity verification on the communication terminal user image; and the management and control base station outputs an authentication information verification result according to the identity verification result returned by the monitoring center, and adds the identity information of the communication terminal into the white list after the verification is passed.
5. The method as claimed in claim 4, wherein the identity information of the communication terminal includes a unique id of the communication terminal.
6. The method as claimed in claim 5, wherein the method further comprises:
and detecting an uplink signal sent by the communication terminal in the control area through a signal detection module, and sending the detected uplink signal to a monitoring center.
7. Management and control equipment is listened to communication terminal, its characterized in that includes: the system comprises a signal suppressor and a control base station;
the signal suppressor is used for emitting interference signals in a set control area so as to suppress downlink signals of the communication tool in the control area, so that the communication tool cannot acquire downlink data from an operator network;
the management and control base station is used for broadcasting a downlink message for accessing the communication terminal to the management and control area, so that the communication terminal is accessed to the management and control base station and the identity information of the accessed communication terminal is acquired;
and the management and control base station is used for managing and controlling the communication terminal according to the identity information of the communication terminal.
CN202011524331.7A 2020-12-21 2020-12-21 Communication terminal detection control method and device Pending CN112637852A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011524331.7A CN112637852A (en) 2020-12-21 2020-12-21 Communication terminal detection control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011524331.7A CN112637852A (en) 2020-12-21 2020-12-21 Communication terminal detection control method and device

Publications (1)

Publication Number Publication Date
CN112637852A true CN112637852A (en) 2021-04-09

Family

ID=75320562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011524331.7A Pending CN112637852A (en) 2020-12-21 2020-12-21 Communication terminal detection control method and device

Country Status (1)

Country Link
CN (1) CN112637852A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818600A (en) * 2020-07-08 2020-10-23 河南软金通信科技有限公司 Terminal control method, device, equipment and storage medium
CN113313910A (en) * 2021-05-27 2021-08-27 深圳市双佳医疗科技有限公司 Intelligent medical health reminding system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167582A (en) * 2013-04-11 2013-06-19 中国人民解放军信息工程大学 Terminal control method and control base station
CN104980954A (en) * 2015-05-27 2015-10-14 中国科学院信息工程研究所 Real-time management and control method for terminal and base station control module
CN105142142A (en) * 2015-08-25 2015-12-09 中国科学院信息工程研究所 All-system cellphone terminal control method and device
CN108260124A (en) * 2018-01-11 2018-07-06 阳光凯讯(北京)科技有限公司 A kind of method for detecing code and management and control for 4G terminals
CN109842598A (en) * 2017-11-28 2019-06-04 杭州海康威视系统技术有限公司 Auth method, device, control equipment and storage medium
CN110502592A (en) * 2019-08-27 2019-11-26 深圳供电局有限公司 Item domains subject analysis system based on big data analysis technology
CN112085416A (en) * 2020-09-23 2020-12-15 北京奥康达体育产业股份有限公司 Personalized fitness management system based on cloud computing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167582A (en) * 2013-04-11 2013-06-19 中国人民解放军信息工程大学 Terminal control method and control base station
CN104980954A (en) * 2015-05-27 2015-10-14 中国科学院信息工程研究所 Real-time management and control method for terminal and base station control module
CN105142142A (en) * 2015-08-25 2015-12-09 中国科学院信息工程研究所 All-system cellphone terminal control method and device
CN109842598A (en) * 2017-11-28 2019-06-04 杭州海康威视系统技术有限公司 Auth method, device, control equipment and storage medium
CN108260124A (en) * 2018-01-11 2018-07-06 阳光凯讯(北京)科技有限公司 A kind of method for detecing code and management and control for 4G terminals
CN110502592A (en) * 2019-08-27 2019-11-26 深圳供电局有限公司 Item domains subject analysis system based on big data analysis technology
CN112085416A (en) * 2020-09-23 2020-12-15 北京奥康达体育产业股份有限公司 Personalized fitness management system based on cloud computing

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818600A (en) * 2020-07-08 2020-10-23 河南软金通信科技有限公司 Terminal control method, device, equipment and storage medium
CN111818600B (en) * 2020-07-08 2023-02-21 河南软金通信科技有限公司 Terminal control method, device, equipment and storage medium
CN113313910A (en) * 2021-05-27 2021-08-27 深圳市双佳医疗科技有限公司 Intelligent medical health reminding system

Similar Documents

Publication Publication Date Title
US10117094B2 (en) Systems and methods for identifying rogue base stations
US10834596B2 (en) Method for blocking connection in wireless intrusion prevention system and device therefor
CN103891332B (en) Detect suspicious WAP (wireless access point)
KR101190537B1 (en) Method of identifying a transmitt device
CN112637852A (en) Communication terminal detection control method and device
EP1860858A1 (en) Detection of cloned identifiers in communication systems
US7555285B2 (en) Detection of cloned communication united based on message contents
US20130344823A1 (en) Method and Arrangement in A Wireless Communication Device
US10285060B2 (en) Preventing attacks from false base stations
US20180124111A1 (en) System and method for network entity assisted honeypot access point detection
US20240114337A1 (en) Method and user equipment for determining whether base station is genuine or rouge in wireless network
US11250172B2 (en) Handling wireless client devices associated with a role indicating a stolen device
US20110314512A1 (en) Methods for security and monitoring within a worldwide interoperability for microwave access (wimax) network
KR20110052635A (en) Method for managing a telecommunication network and associated devices
CN101039517A (en) Method, system and apparatus for realizing personal hand-held phone terminal register, communication
CN111641942A (en) Mobile terminal management and control system and method based on scene recognition
CN108809937B (en) Management and control system and method
CN112703755A (en) Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium
US11510061B1 (en) Mitigation of cyberattacks on cellular devices
CN111817815A (en) Indoor signal distributed management system, method, medium and equipment
CN106454776B (en) Pseudo base station protection method and device
WO2021058120A1 (en) Identyifying and reporting a fraudelent base station
CN112989879B (en) Data receiving and transmitting system and method applying characteristic analysis
KR20090116401A (en) Method for identifying mobile station, and mobile station and core network apparauts for executing the method
Oh et al. Enabling Physical Localization of Uncooperative Cellular Devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210409