CN112640512A - Pseudo base station identification method and device - Google Patents

Pseudo base station identification method and device Download PDF

Info

Publication number
CN112640512A
CN112640512A CN201880096749.7A CN201880096749A CN112640512A CN 112640512 A CN112640512 A CN 112640512A CN 201880096749 A CN201880096749 A CN 201880096749A CN 112640512 A CN112640512 A CN 112640512A
Authority
CN
China
Prior art keywords
cell
base station
user equipment
list
pseudo base
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201880096749.7A
Other languages
Chinese (zh)
Inventor
卓超
刘涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN112640512A publication Critical patent/CN112640512A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Abstract

A pseudo base station identification method and a device are used for carrying out corresponding processing on user equipment under the condition that the user equipment is changed from a cell under a 3G or above standard to a cell of a GSM pseudo base station in a resident mode, so that the risk that the user equipment is attacked by the pseudo base station is reduced, and the user experience is improved. The method comprises the following steps: the user equipment resides in a second cell from a first cell where the user equipment resides currently, wherein the first cell is a cell under a first network system, and the second cell is a cell under a second network system; recording that a second cell is a pseudo base station cell by user equipment under the condition that the second base station for managing the second cell is judged to be a pseudo base station, and adding cell information of the second cell into a stay prohibition list, wherein the stay prohibition list is used for indicating the user equipment to prohibit staying in a cell corresponding to the cell information recorded in the stay prohibition list; the user equipment backs to the first network type and re-resides in the first cell; the user equipment determines whether a first base station for managing a first cell is a pseudo base station.

Description

Pseudo base station identification method and device Technical Field
The present application relates to the field of communications technologies, and in particular, to a pseudo base station identification method and apparatus.
Background
Starting from the 3G standard, a bidirectional authentication operation is introduced in a 3rd generation partnership project (3 GPP) protocol, and before a user equipment completes bidirectional authentication with a base station and enters a connected state, the base station can only send a system message, a paging message and other messages to the user equipment, and cannot acquire related information of the user equipment. Because the pseudo base station can not obtain the authentication information of the network side, the pseudo base station can not complete the bidirectional authentication with the user equipment. Therefore, in the existing network, in order to acquire the relevant information of the ue, the pseudo base station generally induces the ue in the 3G, Long Term Evolution (LTE), 5G, and other systems to perform cell reselection or redirection, so that the ue resides in a pseudo base station cell (hereinafter referred to as GSM pseudo base station cell) in a global system for mobile communication (GSM) system, thereby acquiring the relevant information of the ue, and further performing hacker relevant operations, such as sending spam information.
In the prior art, after the user equipment changes from a cell under 3G or above systems (e.g., 3G system, LTE system, 5G system, etc.) to a cell of a GSM pseudo base station, the user equipment identifies that the user equipment currently resides in the cell of the GSM pseudo base station, and determines that cell reselection or redirection fails, and then falls back to the cell under the previously-residing 3G or above systems. Taking the example that the user equipment backs to the LTE cell, the user equipment does not know the situation that the GSM pseudo base station cell resided before after backing to the LTE cell, but continues the subsequent process, for example, the user equipment is induced to reside in the GSM pseudo base station cell again by the LTE cell, and so on, the user equipment cannot avoid the risk of the pseudo base station attack, and the user experience is affected.
Therefore, after the user equipment is changed from the cell under the 3G and above systems to the cell of the GSM pseudo base station, how the user equipment carries out corresponding processing is carried out, so that the risk that the user equipment is attacked by the pseudo base station is reduced, and the user experience is improved.
Disclosure of Invention
The embodiment of the application provides a pseudo base station identification method and device, which are used for carrying out corresponding processing on user equipment under the condition that the user equipment is resident in a GSM pseudo base station cell instead of a cell under 3G or above, so that the risk that the user equipment is attacked by the pseudo base station is reduced, and the user experience is improved.
In a first aspect, an embodiment of the present application provides a pseudo base station identification method, including the following steps: the user equipment is resided to a second cell from a first cell where the user equipment is currently resided. The first cell is a cell under a first network system, and the second cell is a cell under a second network system; the user equipment records the second cell as a pseudo base station cell under the condition that the second base station for managing the second cell is judged to be the pseudo base station, and adds cell information of the second cell into a stay prohibition list, wherein the stay prohibition list is used for indicating the user equipment to prohibit staying in a cell corresponding to the cell information recorded in the stay prohibition list; the user equipment returns to the first network type and resides in the first cell again; the user equipment determines whether a first base station for managing a first cell is a pseudo base station.
The first network system can be a global system for mobile communications (GSM); the second network system is any one of the following: long term evolution, LTE; 5G; code Division Multiple Access (CDMA); the bandwidth CDMA is accessed into WCDMA; TD-SCDMA is accessed by time division synchronous code division multiple access.
Wherein the cell information of the second cell may include at least one of: a cell frequency point of a second cell; a cell frequency band of a second cell; the physical cell identity PCI of the second cell.
By adopting the scheme, after the user equipment changes from the first cell under the first network system to reside in the second cell under the second network system, the user equipment records the condition that the second cell is the pseudo base station cell under the condition that the user equipment judges that the second cell is the pseudo base station cell, and adds the second cell into the stay prohibition list, so that the user equipment is prevented from residing in the pseudo base station cell of the second cell again, the risk of the user equipment being attacked by the pseudo base station is reduced, and the user experience is improved. Meanwhile, after the user equipment returns to the first network type, the user equipment can further determine whether the first base station is the pseudo base station according to the condition that the second cell is the pseudo base station cell recorded before, so that the risk that the user equipment is attacked by the pseudo base station is further reduced.
Specifically, in the method for identifying a pseudo base station provided in the first aspect, there are various methods for the ue to determine whether the first base station is a pseudo base station. Three of which are described below.
First one
The method for determining whether the first base station for managing the first cell is the pseudo base station by the user equipment may specifically be implemented as follows: triggering and building a link by the user equipment; and the user equipment determines the first base station as a pseudo base station under the condition of failure in link establishment.
Starting from the 3G standard, bidirectional authentication operations are introduced in 3 GPP: and the pseudo base station is difficult to acquire the authentication information of the network side, so that the pseudo base station is difficult to complete the bidirectional authentication with the user equipment. That is, in 3G and above systems, it is difficult for the pseudo base station to link with the user equipment. Then, in the first method, if the ue fails to actively trigger the link setup, it indicates that the first base station is a pseudo base station.
Second kind
Before the user equipment is resided to a second cell from a first cell where the user equipment currently resides, the user equipment determines that the system message configuration of a first base station is abnormal and stores a pseudo base station configuration identifier; then, the ue determines whether the first base station for managing the first cell is a pseudo base station, which may specifically be implemented by the following method: and the user equipment determines the first base station as a pseudo base station under the condition of storing the pseudo base station configuration identifier.
The user equipment determines that the system message configuration of the first base station is abnormal when at least one of the following information is satisfied: the method comprises the steps that user equipment determines that a plurality of Public Land Mobile Network (PLMN) identifications of a first base station configured in a shared PLMN list are PLMN identifications prohibited from being configured in the same shared PLMN list; the user equipment determines that the residence threshold of the first base station is lower than the residence threshold configured by the user equipment; the user equipment determines that the first base station is not configured with the pilot frequency adjacent cell and the inter-system adjacent cell; and the user equipment determines that the priority of the GSM neighboring cell configured by the first base station is the high reselection priority.
By adopting the second method, whether the first base station is a pseudo base station can be judged by identifying whether the system message configuration of the first base station has the characteristic of the system message configuration of the pseudo base station. That is, whether the first base station is a pseudo base station can be determined according to the system message configuration condition of the first base station.
Third kind
The method for determining whether the first base station for managing the first cell is the pseudo base station by the user equipment may specifically be implemented as follows: the user equipment determines that the system message configuration of the first base station is abnormal; the user equipment determines that the first base station is a pseudo base station.
The method for determining the system message configuration abnormality of the first base station is similar to the second method, and is not described herein again.
The third method is different from the second method in that, in the third method, the user equipment does not determine the system message configuration of the first base station when camping in the first cell for the first time, but determines whether the system message configuration of the first base station is abnormal after the user equipment camps in the first cell again.
Regardless of which of the three methods is adopted, after the ue determines that the first base station is the pseudo base station, the ue may add the cell information of the first cell to the camp-inhibition list.
Wherein the cell information of the first cell includes at least one of: a cell frequency point of a first cell; a cell frequency band of a first cell; PCI of the first cell, E-UTRA Absolute radio frequency channel number EARFCN of the first cell.
By adopting the scheme, after the cell information of the first cell is added into the stay-prohibited list, the user equipment can not stay in the first cell any more, so that the user equipment can be prevented from staying in the pseudo base station cell for a long time, and the risk of the user equipment being attacked by the pseudo base station is reduced.
Further, after the user equipment adds the cell information of the first cell into the forbidden residence list, the user equipment can search the cell under the first network mode; and if the user equipment searches the available cell in the first network system, the user equipment resides in a third cell according to the search result, and the cell information of the third cell is not recorded in the stay-prohibited list.
By adopting the scheme, the user equipment can search the network again in the first network mode, so that the user equipment can reside in a legal base station cell in the first network mode to carry out normal communication.
In addition, in the aforementioned first method, after the ue triggers the chain establishment, the ue may determine that the first base station is a legal base station if the chain establishment is successful.
After the bidirectional authentication operation between the user equipment and the base station is completed, the user equipment can enter a connection state, and the base station can acquire the relevant information of the user equipment and normally communicate with the user equipment. The legal base station can acquire the authentication information of the network side, and then the two-way authentication between the legal base station and the user equipment is completed. Therefore, after the user equipment triggers the link establishment, if the link establishment is successful, the first base station can be determined to be a legal base station.
After the user equipment determines that the first base station is a legal base station, the user equipment can add the cell information of the first cell into the forbidden residence list; then, the user equipment searches the cell under the first network system; if the user equipment searches the available cell in the first network system, the user equipment resides in a fourth cell according to the search result, and the cell information of the fourth cell is not recorded in the stay-prohibited list; and if the user equipment does not search the available cell in the first network system, the user equipment deletes the cell information of the first cell from the forbidden residence list and re-resides in the first cell.
By adopting the scheme, under the condition that the available cell exists in the current system, the user equipment resides in the fourth cell according to the search result, so that the user equipment can reside in the legal base station cell in the first network system to carry out normal communication; and re-camping in the first cell under the condition that no available cell exists in the current system, so that the situation that the user equipment has no available cell in the current system can be avoided.
In addition, in the pseudo base station identification method provided in the first aspect, the camping of the user equipment from the currently camped first cell to the second cell may specifically be implemented in the following two ways.
In a first mode
The method for camping the user equipment from the first cell where the user equipment currently camps to the second cell specifically can be implemented as follows: after the user equipment succeeds in random access, the user equipment receives an indication message sent by the first base station, wherein the indication message is used for indicating the user equipment to redirect and comprises one or more redirection frequency points; and the user equipment resides in a second cell from the first cell according to the indication message, and the cell frequency point of the second cell is one of one or more redirection frequency points.
Mode two
The method for camping the user equipment from the first cell where the user equipment currently camps to the second cell specifically can be implemented as follows: when the user equipment is in an idle state, the user equipment performs cell reselection based on a neighbor cell list under a second network system, wherein the neighbor cell list is configured by the first base station and is used for indicating one or more candidate cells for cell reselection of the user equipment; the user equipment resides in a second cell from the first cell, and the second cell is a candidate cell indicated in the neighbor cell list.
In a second aspect, an embodiment of the present application provides a pseudo base station identification apparatus, which is applied to a user equipment and includes a residence module, a judgment processing module and a fallback module.
The resident module is used for residing from a first cell residing at present to a second cell, wherein the first cell is a cell under a first network system, and the second cell is a cell under a second network system.
And the judging and processing module is used for recording the second cell as the pseudo base station cell and adding the cell information of the second cell into a stay prohibition list under the condition that the second base station for managing the second cell is judged as the pseudo base station, wherein the stay prohibition list is used for indicating the user equipment to prohibit the user equipment from residing in the cell corresponding to the cell information recorded in the stay prohibition list.
And the rollback module is used for the user equipment to rollback to the first network type and to reside in the first cell again.
And the judging and processing module is also used for judging whether the first base station for managing the first cell is a pseudo base station.
The first network system can be a global system for mobile communications (GSM); the second network system may be any one of the following: LTE; 5G; CDMA; WCDMA; TD-SCDMA.
Wherein the cell information of the second cell may include at least one of: a cell frequency point of a second cell; a cell frequency band of a second cell; the PCI of the second cell.
The judgment processing module judges whether the first base station for managing the first cell is a pseudo base station, and can be implemented by the following three optional designs.
In a possible design, when determining whether the first base station for managing the first cell is a pseudo base station, the determining and processing module is specifically configured to: triggering and building a link; and determining the first base station as a pseudo base station under the condition of failure in link establishment.
In one possible design, the determination processing module is further configured to: before a resident module is resident to a second cell from a first cell where the resident module is resident currently, determining that the system message configuration of a first base station is abnormal; storing pseudo base station configuration identification; the determining and processing module, when determining whether the first base station for managing the first cell is a pseudo base station, is specifically configured to: and determining the first base station as a pseudo base station under the condition of storing the pseudo base station configuration identifier.
In a possible design, when determining whether the first base station for managing the first cell is a pseudo base station, the determining and processing module is specifically configured to: determining that the system message configuration of the first base station is abnormal; and determining the first base station as a pseudo base station.
The judging and processing module determines that the system message configuration of the first base station is abnormal when at least one of the following information is satisfied: determining a plurality of PLMN identifications of a first base station configured in a PLMN list as PLMN identifications prohibited from being configured in the same shared PLMN list; determining that the camping threshold of the first base station is lower than the camping threshold configured by the user equipment; determining that the first base station is not configured with a pilot frequency adjacent cell and a different system adjacent cell; and determining that the priority of the GSM neighboring cell configured by the first base station is the high reselection priority.
In addition, the judging and processing module is also used for adding the cell information of the first cell into the forbidden residence list after the first base station is determined to be the pseudo base station.
After adding the cell information of the first cell into the stay forbidden list, carrying out cell search under the first network mode; the resident module is further to: and if the judging and processing module searches the available cell in the first network system, residing in a third cell according to the search result, wherein the cell information of the third cell is not recorded in the stay-prohibited list.
In a possible design, the determining and processing module is further configured to determine that the first base station is a legal base station if the chain establishment is successful after triggering the chain establishment.
In one possible design, the determining and processing module is further configured to add cell information of the first cell to the camp-inhibition list after determining that the first base station is a legal base station; carrying out cell search under a first network system; the resident module is further to: if the judging and processing module searches the available cell in the first network system, residing in a fourth cell according to the search result, wherein the cell information of the fourth cell is not recorded in the stay-prohibited list; the judgment processing module is further used for: and if the available cell is not searched under the first network system, deleting the cell information of the first cell from the stay-prohibited list, and re-camping on the first cell.
The camping module camps from a first cell where the camping module currently camps to a second cell, and can be realized by the following two optional designs.
In one possible design, the camping module, when camped from a first cell currently camped on to a second cell, is specifically configured to: after the user equipment is successfully accessed randomly, receiving an indication message sent by the first base station, wherein the indication message is used for indicating the user equipment to redirect and comprises one or more redirection frequency points; and residing from the first cell to a second cell according to the indication message, wherein the cell frequency point of the second cell is one of one or more redirection frequency points.
In one possible design, the camping module, when camping from a first cell currently camping on to a second cell, is specifically configured to: when the user equipment is in an idle state, cell reselection is carried out based on a neighbor cell list which is configured by the first base station and under a second network system, wherein the neighbor cell list is used for indicating one or more candidate cells for cell reselection of the user equipment; and the first cell is resided to a second cell, and the second cell is a candidate cell indicated in a neighbor cell list.
In a third aspect, an embodiment of the present application provides a pseudo base station identification apparatus, which includes a processor, coupled to a memory, and configured to read instructions in the memory, so as to perform the method according to the first aspect or any one of the first aspect designs above.
The pseudo base station identification device may be a user equipment, or may be a chip in the user equipment.
In particular, the user device includes, but is not limited to, a smartphone, a smartwatch, a tablet, a Virtual Reality (VR) device, an Augmented Reality (AR) device, a personal computer, a handheld computer, a personal digital assistant.
In a fourth aspect, this embodiment of the present application further provides a computer-readable storage medium for storing a program for performing the functions of the first aspect or any design of the first aspect, where the program is configured to, when executed by a processor, implement the method of the first aspect or any design of the first aspect.
In a fifth aspect, the present application provides a computer program product comprising program code, which when run on a computer causes the computer to perform the method of the first aspect or any design of the first aspect.
In addition, the technical effects brought by any one of the possible design manners in the second aspect to the fifth aspect can be referred to the technical effects brought by the different design manners in the first aspect, and are not described herein again.
Drawings
Fig. 1 is a schematic view of an application scenario according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a first pseudo base station identification method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a second pseudo base station identification method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a third pseudo base station identification method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a first pseudo base station identification device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a second pseudo base station identification device according to an embodiment of the present application.
Detailed Description
As described in the background art, starting from the 3G standard, bidirectional authentication operations are introduced in 3 GPP: before the user equipment completes the bidirectional authentication with the base station and enters a connection state, the base station can only send messages such as system messages, paging messages and the like to the user equipment, and cannot acquire related information of the user equipment; only after the bidirectional authentication operation between the user equipment and the base station is completed, the user equipment can enter a connection state, and the base station can acquire the relevant information of the user equipment and normally communicate with the user equipment. The pseudo base station is difficult to acquire the authentication information of the network side, so that the pseudo base station is difficult to complete the bidirectional authentication with the user equipment. That is, when the ue resides in a cell in 3G or above, it is difficult for the pseudo base station to acquire the relevant information of the ue because it is difficult to complete bidirectional authentication. For obtaining the relevant information of the ue, the pseudo base station generally induces the ue in 3G or above systems to perform cell reselection or redirection, so that the ue resides in the GSM pseudo base station cell, thereby obtaining the relevant information of the ue, and further performing hacker relevant operations, such as sending spam information.
In the prior art, after the user equipment changes from the cell under the 3G or above standard to the cell of the GSM pseudo base station, the user equipment identifies that the user equipment currently resides in the cell of the GSM pseudo base station, and determines that cell reselection or redirection fails, and then reverts to the cell under the previously residing 3G or above standard. Taking the example that the user equipment backs to the LTE cell, the user equipment does not know the situation that the GSM pseudo base station cell resided before after backing to the LTE cell, but continues the subsequent process, for example, the user equipment is induced to reside in the GSM pseudo base station cell again by the LTE cell, and so on, the user equipment cannot avoid the risk of the pseudo base station attack, and the user experience is affected.
Based on the above problems, embodiments of the present application provide a pseudo base station identification method and apparatus, which are used for performing corresponding processing when a user equipment is changed from a cell in 3G or above systems to a cell in a GSM pseudo base station, so as to reduce a risk of the user equipment being attacked by the pseudo base station and improve user experience.
In addition, when the user equipment resides in a legal base station cell under 3G or above system, a situation that the user equipment resides in a GSM pseudo base station cell instead of a cell of 3G or above system may also occur. For example, since the legal base station transmits the system message (for example, the system message carrying the paging channel configuration) to the user equipment in a plaintext manner, a hacker can acquire the paging channel configuration of the legal base station, and further interfere with the paging channel of the legal base station; when a legal base station cell where the user equipment resides is interfered by a hacker, the hacker can induce the user equipment to reside in a pseudo base station cell under a GSM system, so that the relevant information of the user equipment is obtained, and further hacker operation is carried out.
By adopting the scheme provided by the embodiment of the application, whether the base station of the previously resident 3G or above system is the pseudo base station can be judged after the user equipment is resident to the GSM pseudo base station cell from the cell under the 3G or above system, so that the risk that the user equipment is attacked by the pseudo base station is further reduced, and the user experience is improved.
Next, an application scenario of the embodiment of the present application will be described.
The embodiment of the application can be applied to the communication system shown in fig. 1. The communication system comprises a first base station, a second base station and user equipment.
The user device may be, among other things, a device that provides voice and/or data connectivity to a user, a handheld device that corresponds to wireless connectivity functionality, or other processing device connected to a wireless modem. User equipment, which may be mobile terminals such as mobile telephones (or "cellular" telephones) and computers corresponding to the mobile terminals, for example, mobile devices that may be portable, pocket, hand-held, computer-included, or vehicle-mounted, may communicate with one or more core networks via a Radio Access Network (RAN). Examples of such devices include Personal Communication Service (PCS) phones, cordless phones, Session Initiated Protocol (SIP) phones, Wireless Local Loop (WLL) stations, Personal Digital Assistants (PDAs), and the like. The terminal device may also be referred to as a system, a subscriber unit (subscriber unit), a subscriber station (subscriber station), a mobile station (mobile), a remote station (remote station), an access point (access point), a remote terminal (remote terminal), an access terminal (access terminal), a user terminal (user terminal), a user agent (user agent), or a user equipment (user equipment), which is not limited in the embodiment of the present application.
The first base station is a base station under a first network system, and the second base station is a base station under a second network system.
Specifically, the second network system may be GSM, and the first network system may be 3G or above, including but not limited to Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), time division-synchronous code division multiple access (TD-SCDMA), Long Term Evolution (LTE), and fifth generation (5th generation, 5G) communication systems.
That is, the second base station may be a network equipment (BTS) in GSM; the first base station may be a BTS in CDMA, a network device (NodeB) in WCDMA or TD-SCDMA, an evolved node B (eNB or e-NodeB) in LTE system, a 5G base station in 5G network architecture, a home evolved node B (HeNB), or the like, and in this embodiment, the types of the first base station and the second base station are not specifically limited.
In this embodiment, the second base station is a pseudo base station, and the first base station may be a pseudo base station or a legal base station. In an application scenario of the embodiment of the present application, a user equipment resides in a first cell managed by a first base station; then, the user equipment is changed from the first cell under the first network system to reside in the second cell under the second network system through operations such as cell reselection or redirection. After the user equipment resides in the second cell, corresponding judgment and processing can be performed by adopting the scheme provided by the embodiment of the application, so that the risk that the user equipment is attacked by the pseudo base station is reduced, and the user experience is improved.
Embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Referring to fig. 2, a schematic flowchart of a pseudo base station identification method provided in an embodiment of the present application is shown. The method comprises the following steps.
S201: the user equipment is resided to a second cell from a first cell where the user equipment is currently resided.
The first cell is a cell under a first network system, and the second cell is a cell under a second network system. Illustratively, the first network type may be GSM; the second network system may be any one of the following: LTE; 5G; CDMA; WCDMA; TD-SCDMA. For the description of the first network standard and the second network standard, reference may be made to the related descriptions in the application scenarios of the embodiments of the present application, and details are not described here again.
Specifically, in S201, the process of transferring the ue from the first cell to camp on the second cell may be implemented by the aforementioned cell reselection or redirection operation. These two operations will be described separately below.
Cell reselection
Specifically, the user equipment camps on the second cell from the currently camped first cell, which may be implemented as follows: when the user equipment is in an idle state, the user equipment performs cell reselection based on a neighbor cell list under a second network system, wherein the neighbor cell list is configured by the first base station and is used for indicating one or more candidate cells for cell reselection of the user equipment; the user equipment resides in a second cell from the first cell, and the second cell is a candidate cell indicated in the neighbor cell list.
When the user equipment is in an idle state, the user equipment can trigger the operation of cell reselection. It should be noted that, although the cell reselection is an autonomous behavior of the user equipment, the user equipment performs the cell reselection based on the neighboring cell list configured by the first base station, that is, the second cell where the user equipment resides after performing the cell reselection is a candidate cell indicated in the neighboring cell list configured by the first base station.
It should be understood that, in the embodiment of the present application, after performing cell reselection, the user equipment transfers a first cell in a first network standard to reside in a second cell in a second network standard, and therefore the cell reselection in the embodiment of the present application may be understood as inter-system cell reselection.
Second, redirect
Specifically, the user equipment camps on the second cell from the currently camped first cell, which may be implemented as follows: after the user equipment succeeds in random access, the user equipment receives an indication message sent by the first base station, wherein the indication message is used for indicating the user equipment to redirect, and the indication message comprises one or more redirection frequency points; and the user equipment resides in a second cell from the first cell according to the indication message, and the cell frequency point of the second cell is one of one or more redirection frequency points.
After the user equipment is successfully accessed randomly, the first base station can trigger the user equipment to redirect. The user equipment can select a frequency point which can reside from one or more redirection frequency points issued by the first base station, and further reside on a second cell corresponding to the frequency point.
It should be understood that, when the user equipment performs redirection, a frequency point may be randomly selected from one or more redirection frequency points, a frequency point may be selected based on the priority of one or more redirection frequency points, a frequency point may be selected based on an indication of the first base station, or a frequency point may be selected in other manners.
In addition, when the user equipment is redirected, if one or more redirection frequency points issued by the first base station through the indication message are unavailable, the user equipment can start frequency sweeping under the second network system, search for an available cell under the second network system, and then reside in the searched second cell. Of course, if no available cell is searched yet by the frequency sweep, it may be determined that the redirection fails, and the user equipment reverts to the first network system as in S203, and continues to perform subsequent operations such as S204.
Therefore, in the embodiment of the present application, after the user equipment performs cell reselection or redirection, the user equipment is made to camp from the first cell in the first network system to the second cell in the second network system. If the second cell is a pseudo base station cell, the scheme provided by the embodiment of the application can be adopted to perform corresponding judgment and processing on the first cell and the second cell. The specific mode will be described in detail later.
S202: and under the condition that the second base station for managing the second cell is judged to be the pseudo base station by the user equipment, recording the second cell as the pseudo base station cell, and adding the cell information of the second cell into the forbidden residence list.
The forbidden residence list is used for indicating the user equipment to be forbidden to reside in the cell corresponding to the cell information recorded in the forbidden residence list. It should be noted that the camping prohibition list is only one expression provided in the embodiment of the present application, and it may also be replaced by another expression, such as a restricted list, a cell restricted list, or a bar list, as long as the expression can be used to indicate cell information of a cell where the user equipment is prohibited from camping.
Wherein the cell information of the second cell includes at least one of: a cell frequency point of a second cell; a cell frequency band of a second cell; physical Cell Identity (PCI) of the second cell.
In addition, in the embodiment of the application, when the user equipment performs cell reselection evaluation, measurement evaluation and replies measurement results of other systems, the pseudo base station cells in the forbidden residence list can be removed, so that the frequent initiation of interoperation with the pseudo base station cells is avoided.
In the embodiment of the present application, when the user equipment determines that the second base station is a pseudo base station (that is, the second cell is a pseudo base station cell), instead of directly determining that reselection or redirection fails as in the prior art and then falls back to the first cell, the user equipment records that the second cell is the pseudo base station cell, and adds the second cell to the stay prohibition list, so that the user equipment is prevented from residing in the pseudo base station cell (that is, the second cell) in the second network system again, and the risk that the user equipment is attacked by the pseudo base station is reduced.
In addition, if the user equipment finds that the cell corresponding to a certain frequency point is a cell in the forbidden residence list in the process of searching the redirection frequency points issued by the first base station, the user equipment can directly record the condition that the cell is a pseudo base station cell, and execute the following steps S203-S204.
It should be noted that, in this embodiment of the present application, after adding the second cell to the camp-inhibition list, if the ue has no other available cell in the second network type, the ue may select to delete the second cell from the camp-inhibition list, and in this way, the ue may camp on the second cell again, thereby avoiding a problem that the ue has no available cell in the second network type. This is done primarily for the following considerations: as described in the foregoing description, when a legal base station cell where the ue resides is interfered, a situation that the ue instead resides in a GSM pseudo base station cell from a cell of 3G or above may also occur. In practical implementation, the mobility of the GSM pseudo base station is strong, and if the second cell is not in the coverage area of the GSM pseudo base station along with the movement of the GSM pseudo base station, the second cell is disabled all the time, which may cause the situation that the user equipment has no available cell in the second network system, and at this time, the second cell may be deleted from the camp-on prohibition list, and the user equipment may still camp on the second cell again.
It is assumed that, in an extreme case, due to interference of the GSM pseudo base station, the ue may add all GSM cells configured by the first base station to the camp-inhibition list, and actually, along with movement of the GSM pseudo base station, the GSM pseudo base station may no longer cover any one of the GSM cells at this time, and at this time, if none of the GSM cells is deleted from the camp-inhibition list, the ue may no longer camp on any GSM cell.
Of course, when the user equipment has no available cell in the second network system, the user equipment may also choose not to delete the second cell from the camp-inhibition list, which is not specifically limited in this embodiment of the present application.
S203: and the user equipment backs to the first network type and re-resides in the first cell.
And under the condition that the user equipment judges that the second base station is the pseudo base station, the redirection failure or reselection failure is judged, so that the user equipment can return to the first network system and reside in the first cell again.
S204: the user equipment determines whether a first base station for managing a first cell is a pseudo base station.
After the ue re-camps on the first cell, the ue may trigger the determination of whether the first cell is the pseudo base station cell based on the recorded condition that the second cell is the pseudo base station cell.
In the case that the first base station is a pseudo base station, the procedure of transferring the user equipment from the first cell to camp on the second cell in S201 may be: a first base station (pseudo base station) configures a neighbor cell for user equipment as a pseudo base station cell, and the user equipment performs cell reselection based on a neighbor cell list configured by the first base station and then resides in a second cell (pseudo base station cell); or, the redirection frequency point issued by the first base station (pseudo base station) is the frequency point of the pseudo base station cell, and the user equipment resides in the second cell (pseudo base station cell) after redirection.
In the case that the first base station is a legal base station, the procedure of the user equipment changing from the first cell to camping on the second cell in S201 may be: since the legal base station sends the system message (for example, the system message carrying the paging channel configuration) to the user equipment in a plaintext manner, a hacker can acquire the paging channel configuration of the legal base station, so as to interfere with the paging channel of the legal base station, thereby inducing the user equipment to reside in the second cell (pseudo base station cell).
Specifically, there are various manners that can be adopted when determining whether the second base station is a pseudo base station in the embodiment of the present application, and two of them are listed below.
In a first mode
The method for determining whether the first base station for managing the first cell is the pseudo base station by the user equipment may specifically be implemented as follows: triggering and building a link by the user equipment; and the user equipment determines the first base station as a pseudo base station under the condition of failure in link establishment.
As described in the foregoing introduction, starting from the 3G standard, a bidirectional authentication operation is introduced in 3 GPP: only after the bidirectional authentication operation between the user equipment and the base station is completed, the user equipment can enter a connection state, and the base station can acquire the relevant information of the user equipment and normally communicate with the user equipment. And the pseudo base station is difficult to acquire the authentication information of the network side, so that the pseudo base station is difficult to complete the bidirectional authentication with the user equipment. That is, in 3G and above systems, it is difficult for the pseudo base station to link with the user equipment. Then, in the first method, if the ue fails to actively trigger the link setup, it indicates that the first base station is a pseudo base station.
After the user equipment determines that the first base station is a pseudo base station, the user equipment may add cell information of the first cell to the camp-on forbidden list.
Wherein the cell information of the first cell includes at least one of: a cell frequency point of a first cell; a cell frequency band of a first cell; PCI of the first cell, E-UTRA absolute radio frequency channel number (EARFCN) of the first cell.
After adding the cell information of the first cell into the stay-prohibited list, the user equipment can not stay in the first cell any more, so that the user equipment can be prevented from staying in the pseudo base station cell for a long time, and the risk that the user equipment is attacked by the pseudo base station is reduced.
Further, after the user equipment adds the cell information of the first cell to the stay-prohibited list, the user equipment may perform cell search again in the first network system, and if the user equipment searches for an available cell in the first network system, the user equipment stays in a third cell according to a cell search result, where the cell information of the third cell is not recorded in the stay-prohibited list.
That is, after adding the cell information of the first cell into the camp-inhibition list, when the user equipment performs cell search again, the cell in the camp-inhibition list (i.e., the first cell) needs to be removed, and only when an available cell (i.e., the third cell) outside the camp-inhibition list is searched in the first network system, the cell is selected to camp on.
By adopting the scheme, the user equipment can search the network again in the first network mode, so that the user equipment can reside in a legal base station cell in the first network mode to carry out normal communication.
In addition, after the user equipment performs the cell search in the first network system, if the user equipment does not search for an available cell in the first network system, the user equipment may switch to another system other than the first network system to perform the cell search. For example, when the first network standard is LTE, the ue may disable (disable) LIE and trigger to search for a network in 3G or 5G standard.
By adopting the scheme, the cell search is carried out by switching to other modes under the condition that no cell is available in the first network mode, so that the user equipment can be prevented from residing in a pseudo base station cell.
Of course, in the first mode, after the ue triggers the link establishment, the ue may determine that the first base station is a legal base station if the link establishment is successful.
As described above, after the bidirectional authentication operation between the ue and the base station is completed, the ue may enter a connected state, and the base station may acquire the relevant information of the ue and perform normal communication with the ue. The legal base station can acquire the authentication information of the network side, and then the two-way authentication between the legal base station and the user equipment is completed. Therefore, after the user equipment triggers the link establishment, if the link establishment is successful, the first base station can be determined to be a legal base station.
After the user equipment determines that the first base station is a legal base station, the user equipment can add the cell information of the first cell into the forbidden residence list; then, the user equipment searches the cell under the first network system; if the user equipment searches the available cell in the first network system, the user equipment resides in a fourth cell according to the search result, and the cell information of the fourth cell is not recorded in the stay-prohibited list; and if the user equipment does not search the available cell in the first network system, the user equipment deletes the cell information of the first cell from the forbidden residence list and re-resides in the first cell.
By adopting the scheme, under the condition that the available cell exists in the current system, the user equipment resides in the fourth cell according to the search result, so that the user equipment can reside in the legal base station cell in the first network system to carry out normal communication; and re-camping in the first cell under the condition that no available cell exists in the current system, so that the situation that the user equipment has no available cell in the current system can be avoided.
Mode two
Before the user equipment is resided to a second cell from a first cell where the user equipment currently resides, the user equipment can determine that the system message configuration of a first base station is abnormal and store a pseudo base station configuration identifier; then, the ue determines whether the first base station for managing the first cell is a pseudo base station, which may specifically be implemented by the following scheme: and the user equipment determines the first base station as a pseudo base station under the condition of storing the pseudo base station configuration identifier.
The user equipment determines that the system message configuration of the first base station is abnormal when at least one of the following information is satisfied: the method comprises the steps that user equipment determines that a plurality of Public Land Mobile Network (PLMN) identifications of a first base station configured in a shared PLMN list are PLMN identifications prohibited from being configured in the same shared PLMN list; the user equipment determines that the residence threshold of the first base station is lower than the residence threshold configured by the user equipment; the user equipment determines that the first base station is not configured with the pilot frequency adjacent cell and the inter-system adjacent cell; and the user equipment determines that the priority of the GSM neighboring cell configured by the first base station is the high reselection priority.
When the system message configuration is carried out, the configurations of the legal base station and the pseudo base station are different.
For example, when the base station performs system message configuration, the base station may issue a shared PLMN list to the user equipment to indicate that the PLMN identifier of the user equipment is any one of the lists, and the user equipment may establish connection with the base station. A PLMN list is also maintained in the user equipment indicating which PLMNs are not shared by a base station, e.g., PLMN1 for mobile operators and PLMN2 for telecommunications operators are not shared by a base station. After receiving the shared PLMN list issued by the base station, the user equipment may compare the shared PLMN list with a PLMN list maintained by the user equipment, and if the shared PLMN list includes at least two PLMNs that cannot be shared by one base station, the user equipment regards the base station as a pseudo base station, thereby storing a pseudo base station-like configuration identifier. This is because: the pseudo base station will typically configure PLMN identities of multiple operators in a shared PLMN list to induce more user equipments to establish connections with itself.
For example, a legal base station may configure a pilot frequency neighboring cell and/or an inter-system neighboring cell, and a pseudo base station may not configure a pilot frequency neighboring cell and an inter-system neighboring cell.
For example, the camping threshold configured by the pseudo base station is usually lower, so that when the transmission power of the base station is lower, the ue can determine that the camping condition is satisfied according to the camping threshold of the pseudo base station, so as to induce the ue to camp on, and the camping threshold configured by the legal base station is usually higher than the camping threshold configured by the pseudo base station.
As another example, the pseudo base station will typically configure the GSM neighbor to a high reselection priority. This is because: GSM has no bidirectional authentication, and the danger that user equipment resides in a GSM pseudo base station cell is larger (the privacy of the user is revealed and junk short messages are sent). The pseudo base station generally configures the GSM neighbor cell as a high reselection priority, which can make the user equipment easier to reselect to the GSM pseudo base station cell. And the legal base station in the current network generally configures the GSM adjacent cell as the low reselection priority, so as to avoid reselecting the GSM cell with lower speed.
Therefore, in the second mode, when the ue resides in the first cell, if the ue finds that the system message configuration of the first base station is abnormal, the pseudo base station-like configuration identifier is saved. Subsequently, after the ue moves back from the second cell to the first cell, the ue may determine that the first base station is the pseudo base station, according to the pseudo base station configuration identifier and the recorded condition that the second cell is the pseudo base station cell.
In the foregoing implementation manner, whether the first base station is a pseudo base station may be determined by identifying whether the system message configuration of the first base station has the characteristic of the system message configuration of the pseudo base station. That is, whether the first base station is a pseudo base station can be determined according to the system message configuration condition of the first base station.
Of course, in the second mode, when the ue camps on the first cell for the first time, the ue may not determine the system message configuration of the first base station, but after the ue camps on the first cell again in S203, determine whether the system message configuration of the first base station is abnormal. That is, in the second method, the ue determines in S204 whether the first base station for managing the first cell is a pseudo base station, which may be implemented as follows: the user equipment determines that the system message configuration of the first base station is abnormal; the user equipment determines that the first base station is a pseudo base station. In this implementation, the ue does not need to store the pseudo base station configuration identifier in advance, but determines the system message configuration of the first base station after the ue changes from the first cell to the second cell, and determines whether the first base station is a pseudo base station by combining the recorded condition that the second cell is a pseudo base station cell.
No matter what timing the system message configuration condition of the first base station is determined, in the second mode, after the ue determines that the first base station is the pseudo base station, the ue may add the cell information of the first cell to the camp-inhibition list.
Wherein the cell information of the first cell includes at least one of: a cell frequency point of a first cell; a cell frequency band of a first cell; PCI of the first cell, EARFCN of the first cell.
After adding the cell information of the first cell into the stay-prohibited list, the user equipment can not stay in the first cell any more, so that the user equipment can be prevented from staying in the pseudo base station cell for a long time, and the risk that the user equipment is attacked by the pseudo base station is reduced.
Further, after the user equipment adds the cell information of the first cell to the stay-prohibited list, the user equipment may perform cell search again in the first network system, and if the user equipment searches for an available cell in the first network system, the user equipment stays in a third cell according to a cell search result, where the cell information of the third cell is not recorded in the stay-prohibited list.
That is, after adding the cell information of the first cell into the camp-inhibition list, when the user equipment performs cell search again, the cell in the camp-inhibition list (i.e., the first cell) needs to be removed, and only when an available cell (i.e., the third cell) outside the camp-inhibition list is searched in the first network system, the cell is selected to camp on.
By adopting the scheme, the user equipment can search the network again in the first network mode, so that the user equipment can reside in a legal base station cell in the first network mode to carry out normal communication.
In addition, after the user equipment performs the cell search in the first network system, if the user equipment does not search for an available cell in the first network system, the user equipment may switch to another system other than the first network system to perform the cell search. For example, when the first network type is LTE, the ue may disable (disable) LIE and trigger to search for a network in 3G type.
By adopting the scheme, the cell search is carried out by switching to other modes under the condition that no cell is available in the first network mode, so that the user equipment can be prevented from residing in a pseudo base station cell.
In addition, in the second mode, since the pseudo base station may also simulate a legitimate base station to perform system message configuration, if the user equipment does not store the pseudo base station configuration identifier of the first base station or the user equipment determines that the system message configuration of the first base station is not abnormal, it cannot be said that the first base station is a legitimate base station.
By adopting the pseudo base station identification method provided by the embodiment of the application, after the user equipment is changed from the first cell in the first network system to reside in the second cell in the second network system, the user equipment records the condition that the second cell is the pseudo base station cell under the condition that the second cell is judged to be the pseudo base station cell, and adds the second cell into the stay prohibition list, so that the user equipment is prevented from residing in the pseudo base station cell which is the second cell again, the risk of the user equipment being attacked by the pseudo base station is reduced, and the user experience is improved. Meanwhile, after the user equipment returns to the first network type, the user equipment can further determine whether the first base station is the pseudo base station according to the condition that the second cell is the pseudo base station cell recorded before, so that the risk that the user equipment is attacked by the pseudo base station is further reduced.
After determining that the first base station is the pseudo base station, the user equipment may take corresponding measures, for example, add the cell information of the first cell into the camp-inhibition list, thereby avoiding that the user equipment resides in the pseudo base station cell of the first cell again, and reducing the risk of the user equipment being attacked by the pseudo base station.
Based on the same inventive concept, the embodiments of the present application further provide the following two pseudo base station identification methods, which can be both regarded as a specific example of the method shown in fig. 2.
In the two methods, the user equipment is taken as UE, the first network type is LTE, and the second network type is GSM as an example. The UE comprises two modules, namely a GSM module and an LTE module. The GSM module is responsible for communication of the user equipment under a GSM network system; the LTE module is responsible for communication of the user equipment under an LTE network mode. In specific implementation, the GSM module and the LTE module may be different hardware processors or different software processing units, which is not specifically limited in this embodiment of the present application.
The two pseudo base station identification methods are respectively described below with reference to the accompanying drawings.
Method 1
Referring to fig. 3, the method comprises the steps of:
【1】 The UE resides in an LTE cell and determines to initiate L2G reselection after measurement evaluation.
The LTE base station can configure a GSM (global system for mobile communications) neighbor cell list of the UE through system information, and the UE initiates L2G reselection after measuring and evaluating candidate cells in the GSM neighbor cell list. And L2G cell reselection, namely cell reselection from an LTE system to a GSM system.
【2】 The UE initiates reselection to GSM.
【3】 And the UE resides in the GSM cell after reselection.
【4】 And the GSM module indicates the LTE reselection failure to the LTE module and indicates the reselected GSM cell as a pseudo base station cell.
In addition, in the step [ 4 ], the GSM module may also store a determination result that the GSM cell is the pseudo base station cell, and after the UE reverts to the LTE, the LTE module may perform corresponding processing according to the determination result stored in the GSM module when performing subsequent operations.
【5】 And the LTE module adds the GSM pseudo base station cell into the forbidden residence list, thereby reducing the reselection and measurement priority of the GSM cell and removing the limitation after no other available GSM adjacent cells exist.
Wherein de-restricting the GSM cell removes the GSM cell from the forbidden camp list.
【6】 And returning after reselection failure, and re-residing the UE in the LTE cell.
【7】 After the UE reverts back to the LTE cell, an LTE Radio Resource Control (LRRC) in the UE notifies an LTE non-access stratum (LNAS) to actively trigger link establishment to confirm whether the network can complete the bidirectional authentication procedure.
When the UE actively triggers the link establishment, the UE may perform Tracking Area Update (TAU) and initiate a Service request (Service).
After the UE actively triggers the link establishment, different processing modes are provided for the link establishment failure and the link establishment success.
For the processing of link establishment failure:
【8】 If the UE receives an RRC connection RELEASE message (RRC _ CONN _ RELEASE), the authentication process fails, a Radio Link Failure (RLF) is reported by a UE bottom layer, a NAS protocol process timer is overtime, then the UE can identify the LTE cell as a pseudo base station cell, and the LNAS informs the LRRC to add the LTE cell into a forbidden residence list and re-search other available cells.
For successful link establishment processing:
【8】 If the LTE link establishment is successful, the UE can identify the LTE cell as a legal base station cell, but the system message of the LTE base station is acquired by a hacker and interferes with a GSM adjacent cell configured by the LTE base station; the LNAS informs the LRRC to add the LTE cell into the forbidden residence list, the limited type is that the network cannot be searched and is not limited, and the network is searched again after the network sends an RRC connection RELEASE message (RRC _ CONN _ RELEASE); and if the other available cells are not searched, deleting the LTE cell from the forbidden residence list.
Wherein, the meaning that the network solution is not limited is as follows: and if no other available cell is searched, deleting the LTE cell from the forbidden residence list.
It should be noted that, in the first method, the UE is introduced by using a case where the UE resides in the GSM cell from the LTE cell through cell reselection, when the UE actually achieves the first method, the process of changing from the LTE cell to the GSM cell through steps [ 1 ] to [ 3 ] may also be achieved through redirection of the UE, and the redirection process may refer to related description in the method shown in fig. 2, and is not described herein again. In addition, in the first method, when the LRRC performs reselection evaluation, measurement reporting, and replies to other system measurement results, the pseudo base station cell in the forbidden residence list can be removed, thereby avoiding frequently initiating the interoperation to the pseudo base station cell.
Method two
Referring to fig. 4, the method includes the steps of:
【1】 The UE resides in an LTE cell, the LRRC identifies the abnormal configuration of the LTE base station system message, and the UE stores a pseudo base station configuration identifier; the UE determines to initiate L2G reselection after performing measurement evaluation.
The LTE base station can configure a GSM (global system for mobile communications) neighbor cell list of the UE through system information, and the UE initiates L2G reselection after measuring and evaluating candidate cells in the GSM neighbor cell list. And L2G cell reselection, namely cell reselection from an LTE system to a GSM system.
When the LRRC judges that the LTE base station meets any one of the following conditions, the LTE base station is considered to be pseudo base station configuration, and the LRRC stores a base station pseudo base station configuration identifier;
1) LTE base station configuration cannot configure a shared PLMN on the same base station, for example: configuring a mobile, Unicom and telecom PLMN in a shared PLMNLIST of an LTE base station;
2) the configured residence threshold in the system information block 1 (SIB 1) of the LTE base station is abnormally low, and the UE can also determine that the residence condition is satisfied when the LTE base station has poor energy. Judging whether the residence threshold is lower than the abnormal threshold, and comparing and judging the abnormal threshold with the residence threshold detection value configured by the UE;
3) the LTE base station does not configure a pilot frequency adjacent cell or a different system adjacent cell, and induces the UE to reside in the pseudo base station for a long time;
4) and the LTE base station configures the GSM adjacent cell as a high reselection priority.
【2】 The user equipment initiates a reselection to GSM.
【3】 And the UE resides in the GSM cell after reselection.
【4】 And the GSM module indicates the LTE reselection failure to the LTE module and indicates the reselected GSM cell as a pseudo base station cell.
In addition, in the step [ 4 ], the GSM module may also store a determination result that the GSM cell is the pseudo base station cell, and after the UE reverts to the LTE, the LTE module may perform corresponding processing according to the determination result stored in the GSM module when performing subsequent operations.
【5】 And the LTE module adds the GSM pseudo base station cell into the forbidden residence list, thereby reducing the reselection and measurement priority of the GSM cell and removing the limitation after no other available GSM adjacent cells exist.
Wherein de-restricting the GSM cell removes the GSM cell from the forbidden camp list.
【6】 And returning after reselection failure, and re-residing the UE in the LTE cell.
【7】 And the LRRC judges whether the pseudo base station configuration identification is true, if so, the LTE base station is identified as the pseudo base station, the LTE cell is added into the forbidden residence list, and other available cells are searched again.
It should be noted that, in the second method, the UE is introduced by using an example that the UE resides in the GSM cell from the LTE cell through cell reselection, and during actual implementation, the process that the UE resides in the GSM cell from the LTE cell in steps [ 1 ] to [ 3 ] may also be implemented through redirection of the UE, and the redirection process may refer to relevant description in the method shown in fig. 2, and is not described herein again.
In addition, in the second method, when the LRRC performs reselection evaluation, measurement reporting, and replies to other system measurement results, the pseudo base station cell in the forbidden residence list can be removed, thereby avoiding frequently initiating the interoperation to the pseudo base station cell.
It should be noted that the method shown in fig. 3 or fig. 4 can be regarded as a specific example of the method shown in fig. 2. The implementation and technical effects of the method shown in fig. 3 or fig. 4, which are not described in detail, can be referred to the related description of the method shown in fig. 2.
Based on the same inventive concept, the embodiment of the present application further provides a pseudo base station identification apparatus, which may be used to execute the method shown in fig. 2. Referring to fig. 5, the apparatus 500 includes a resident module 501, a determination processing module 502, and a rollback module 503.
Specifically, when the apparatus 500 is configured to execute the method shown in fig. 2, the camping module 501 is configured to camp on a second cell from a currently camped first cell, where the first cell is a cell in a first network system, and the second cell is a cell in a second network system. A determining and processing module 502, configured to record the second cell as a pseudo base station cell when it is determined that the second base station for managing the second cell is a pseudo base station, and add cell information of the second cell to a camp-inhibition list, where the camp-inhibition list is used to instruct the user equipment to camp-inhibition on a cell corresponding to the cell information recorded in the camp-inhibition list. A fallback module 503, configured to fallback to the first network type and camp on the first cell again. The determining module 502 is further configured to determine whether a first base station for managing the first cell is a pseudo base station.
The first network system can be GSM; the second network system may be any one of the following: LTE; 5G; CDMA; WCDMA; TD-SCDMA.
Wherein the cell information of the second cell may include at least one of: a cell frequency point of a second cell; a cell frequency band of a second cell; the PCI of the second cell.
The judgment processing module judges whether the first base station for managing the first cell is a pseudo base station, which can be implemented in the following three optional ways.
First one
When determining whether the first base station for managing the first cell is a pseudo base station, the determining processing module 502 is specifically configured to: triggering and building a link; and determining the first base station as a pseudo base station under the condition of failure in link establishment.
Second kind
The determination processing module 502 is further configured to: before the camping module 501 camps from a first cell currently camped on a second cell, determining that the system message configuration of the first base station is abnormal; storing pseudo base station configuration identification; when determining whether the first base station for managing the first cell is a pseudo base station, the determining processing module 502 is specifically configured to: and determining the first base station as a pseudo base station under the condition of storing the pseudo base station configuration identifier.
Third kind
When determining whether the first base station for managing the first cell is a pseudo base station, the determining processing module 502 is specifically configured to: determining that the system message configuration of the first base station is abnormal; and determining the first base station as a pseudo base station.
In the second and third modes, the determination processing module 502 determines that the system message configuration of the first base station is abnormal when at least one of the following information is satisfied: determining a plurality of PLMN identifications of a first base station configured in a PLMN list as PLMN identifications prohibited from being configured in the same shared PLMN list; determining that the camping threshold of the first base station is lower than the camping threshold configured by the user equipment; determining that the first base station is not configured with a pilot frequency adjacent cell and a different system adjacent cell; and determining that the priority of the GSM neighboring cell configured by the first base station is the high reselection priority.
In addition, the determination processing module 502 is further configured to: after the first base station is determined to be a pseudo base station, adding the cell information of the first cell into the forbidden residence list.
Further, the determination processing module 502 is further configured to: after adding the cell information of the first cell into the forbidden residence list, carrying out cell search under a first network system; the resident module 501 is further configured to: if the judgment processing module 502 searches for an available cell in the first network type, the cell is camped on a third cell according to the search result, and the cell information of the third cell is not recorded in the camp-on prohibition list.
In addition, the determining and processing module 502 is further configured to determine that the first base station is a legal base station if the chain establishment is successful after the triggering of the chain establishment.
Further, the determination processing module 502 is further configured to: adding the cell information of the first cell into a forbidden residence list after the first base station is determined to be a legal base station; carrying out cell search under a first network system; the resident module 501 is further configured to: if the judgment processing module 502 searches for an available cell in the first network system, residing in a fourth cell according to the search result, wherein the cell information of the fourth cell is not recorded in the stay prohibited list; the determination processing module 502 is further configured to: and if the available cell is not searched under the first network system, deleting the cell information of the first cell from the stay-prohibited list, and re-camping on the first cell.
The camping module 501 is configured to camp on a second cell from a first cell where the camping module currently camps on, and may be implemented in two alternative ways as follows.
First one
When camping from a first cell currently camping on to a second cell, the camping module 501 is specifically configured to: after the user equipment is successfully accessed randomly, receiving an indication message sent by the first base station, wherein the indication message is used for indicating the user equipment to redirect and comprises one or more redirection frequency points; and residing from the first cell to a second cell according to the indication message, wherein the cell frequency point of the second cell is one of one or more redirection frequency points.
Second kind
When camping from a first cell currently camping on to a second cell, the camping module 501 is specifically configured to: when the user equipment is in an idle state, cell reselection is carried out based on a neighbor cell list which is configured by the first base station and under a second network system, wherein the neighbor cell list is used for indicating one or more candidate cells for cell reselection of the user equipment; and the first cell is resided to a second cell, and the second cell is a candidate cell indicated in a neighbor cell list.
It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation. Each functional module in the embodiments of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It should also be noted that the pseudo base station identification apparatus 500 may be used to execute the method provided by the corresponding embodiment of fig. 2, and therefore, the implementation manner and technical effect not described in detail in the pseudo base station identification apparatus 500 shown in fig. 5 may refer to the related description in fig. 2.
Based on the same concept, the embodiment of the present application further provides a pseudo base station identification apparatus, which is applied to a user equipment, and the pseudo base station identification apparatus is configured to perform the pseudo base station identification method shown in fig. 2, and may be the same apparatus as the pseudo base station identification apparatus 500 shown in fig. 5.
Fig. 6 schematically illustrates a structure of a pseudo base station identification apparatus provided in the present application, and as shown in fig. 6, the pseudo base station identification apparatus 600 includes a processor, a memory, a control circuit, and an antenna. The processor is mainly used for processing a communication protocol and communication data, controlling the entire pseudo base station identification apparatus 600, executing a software program, and processing data of the software program, for example, for supporting the pseudo base station identification apparatus 600 to execute the pseudo base station identification method shown in fig. 2. The memory is used primarily for storing software programs and data. The control circuit is mainly used for converting baseband signals and radio frequency signals and processing the radio frequency signals. The control circuit and the antenna together, which may also be called a transceiver, are mainly used for transceiving radio frequency signals in the form of electromagnetic waves.
When the user equipment is started, the processor can read the software program in the memory, interpret and execute the instruction of the software program, and process the data of the software program. When data needs to be sent wirelessly, the processor outputs a baseband signal to the radio frequency circuit after performing baseband processing on the data to be sent, and the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal outwards in the form of electromagnetic waves through the antenna. When data is transmitted to the pseudo base station identification apparatus 600, the radio frequency circuit receives a radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
Those skilled in the art will appreciate that fig. 6 shows only one memory and processor for ease of illustration. In the actual pseudo base station identifying apparatus 600, a plurality of processors and memories may be present. The memory may also be referred to as a storage medium or a storage device, etc., which is not limited in this application.
As an alternative implementation manner, the processor may include a baseband processor and a central processing unit, the baseband processor is mainly used for processing the communication protocol and the communication data, and the central processing unit is mainly used for controlling the entire pseudo base station identification apparatus 600, executing the software program, and processing the data of the software program. The processor in fig. 6 integrates the functions of the baseband processor and the central processing unit, and those skilled in the art will understand that the baseband processor and the central processing unit may also be independent processors, and are interconnected through a bus or the like. Those skilled in the art will appreciate that the pseudo base station identification apparatus 600 may include a plurality of baseband processors to adapt to different network formats, the pseudo base station identification apparatus 600 may include a plurality of central processors to enhance the processing capability thereof, and various components of the pseudo base station identification apparatus 600 may be connected by various buses. The baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip. The central processing unit can also be expressed as a central processing circuit or a central processing chip. The function of processing the communication protocol and the communication data may be built in the processor, or may be stored in the storage unit in the form of a software program, and the processor executes the software program to realize the baseband processing function.
In the embodiment of the present application, the antenna and the control circuit having the transceiving function may be regarded as a transceiving unit of the pseudo base station identification apparatus 600, and the processor having the processing function may be regarded as a processing unit of the pseudo base station identification apparatus 600. A transceiver unit may also be referred to as a transceiver, a transceiving device, etc. Alternatively, a device for implementing a receiving function in the transceiver unit may be regarded as the receiving unit, and a device for implementing a transmitting function in the transceiver unit may be regarded as the transmitting unit, that is, the transceiver unit includes the receiving unit and the transmitting unit. For example, the receiving unit may also be referred to as a receiver, a receiving circuit, etc., and the sending unit may be referred to as a transmitter, a transmitting circuit, etc.
Downlink signals (including data and/or control information) transmitted by a network device (e.g., a base station) are received on the downlink through an antenna, uplink signals (including data and/or control information) are transmitted to the network device (e.g., a base station) through the antenna on the uplink, traffic data and signaling messages are processed in a processor, and the units are processed according to a radio access technology (e.g., an access technology of LTE, NR, and other evolved systems) employed by a radio access network. The processor is also configured to control and manage the actions of the pseudo base station identification apparatus 600, and is configured to execute the processing performed by the pseudo base station identification apparatus 600 in the foregoing embodiment. The processor is further configured to support the pseudo base station identification apparatus 600 to execute the method performed by the user equipment in fig. 2.
It will be appreciated that fig. 6 only shows a simplified design of the pseudo base station identification means 600. In practical applications, the pseudo base station identification apparatus 600 may include any number of antennas, memories, processors, etc., and all of the pseudo base station identification apparatuses 600 that can implement the present application are within the protection scope of the present application.
Specifically, in the present application, for example, a transceiver unit is called a transceiver, and a processing unit is called a processor, when the pseudo base station identification apparatus 600 executes the pseudo base station identification method shown in fig. 2, the processor is configured to interact with a first base station through the transceiver, and then reside from a currently residing first cell to a second cell, where the first cell is a cell in a first network system, and the second cell is a cell in a second network system; under the condition that a second base station for managing the second cell is judged to be a pseudo base station, recording the second cell as a pseudo base station cell, and adding cell information of the second cell into a stay forbidden list, wherein the stay forbidden list is used for indicating the user equipment to be forbidden to stay in a cell corresponding to the recorded cell information in the stay forbidden list; interacting with a first base station and a second base station through a transceiver, returning to the first network type and residing in the first cell again; and judging whether the first base station for managing the first cell is a pseudo base station or not.
The processor may also implement any detailed functions of the user equipment in the method embodiment shown in fig. 2, which are not described in detail herein, and refer to the processing steps executed by the user equipment in the method embodiment shown in fig. 2.
The pseudo base station identification apparatus shown in fig. 5 to 6 may be regarded as an integrated chip in the user equipment, or may also be regarded as the user equipment.
In particular, the user device includes, but is not limited to, a smartphone, a smartwatch, a tablet, a VR device, an AR device, a personal computer, a handheld computer, a personal digital assistant.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the embodiments of the present application without departing from the spirit and scope of the embodiments of the present application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to encompass such modifications and variations.

Claims (30)

  1. A pseudo base station identification method is characterized by comprising the following steps:
    the method comprises the steps that user equipment resides in a second cell from a first cell where the user equipment resides currently, wherein the first cell is a cell under a first network system, and the second cell is a cell under a second network system;
    the user equipment records that a second cell is a pseudo base station cell under the condition that the second base station for managing the second cell is judged to be a pseudo base station, and adds cell information of the second cell into a stay prohibition list, wherein the stay prohibition list is used for indicating the user equipment to prohibit staying in a cell corresponding to the cell information recorded in the stay prohibition list;
    the user equipment retreats to the first network type and resides in the first cell again;
    the user equipment judges whether a first base station for managing the first cell is a pseudo base station.
  2. The method of claim 1, wherein the determining, by the UE, whether the first base station for managing the first cell is a pseudo base station comprises:
    the user equipment triggers the establishment of a link;
    and the user equipment determines that the first base station is a pseudo base station under the condition of failure in link establishment.
  3. The method of claim 1, further comprising, before the user equipment camps on the second cell from the first cell on which it currently camps:
    the user equipment determines that the system message configuration of the first base station is abnormal;
    the user equipment stores pseudo base station configuration identification;
    the determining, by the ue, whether a first base station for managing the first cell is a pseudo base station includes:
    and the user equipment determines that the first base station is a pseudo base station under the condition of storing the pseudo base station configuration identifier.
  4. The method of claim 1, wherein the determining, by the UE, whether the first base station for managing the first cell is a pseudo base station comprises:
    the user equipment determines that the system message configuration of the first base station is abnormal;
    the user equipment determines that the first base station is a pseudo base station.
  5. The method of claim 3 or 4, wherein the UE determines that the system message configuration of the first base station is abnormal when at least one of the following information is satisfied:
    the user equipment determines that a plurality of PLMN identifications configured in a shared Public Land Mobile Network (PLMN) list by the first base station are PLMN identifications prohibited from being configured in the same shared PLMN list;
    the user equipment determines that the camping threshold of the first base station is lower than the camping threshold configured by the user equipment;
    the user equipment determines that the first base station is not configured with a pilot frequency adjacent cell and a pilot system adjacent cell;
    and the user equipment determines that the priority of the global system for mobile communication (GSM) adjacent cell configured by the first base station is a high reselection priority.
  6. The method according to any of claims 2 to 5, wherein after the UE determines that the first base station is a pseudo base station, further comprising:
    and the user equipment adds the cell information of the first cell into the forbidden residence list.
  7. The method of claim 6, wherein after the user equipment adds the cell information of the first cell to the barred residence list, further comprising:
    the user equipment searches a cell under the first network system;
    and if the user equipment searches the available cell in the first network system, the user equipment resides in a third cell according to the search result, and the cell information of the third cell is not recorded in the stay-prohibited list.
  8. The method according to any of claims 2 to 7, further comprising, after the user equipment triggers the chain establishment:
    and the user equipment determines that the first base station is a legal base station under the condition of successful link establishment.
  9. The method of claim 8, wherein after the UE determines that the first base station is a legal base station, further comprising:
    the user equipment adds the cell information of the first cell into the forbidden residence list;
    the user equipment searches a cell under the first network system;
    if the user equipment searches for an available cell in the first network system, the user equipment resides in a fourth cell according to a search result, and cell information of the fourth cell is not recorded in the stay-prohibited list; and if the user equipment does not search the available cell in the first network system, the user equipment deletes the cell information of the first cell from the stay prohibited list and re-stays the first cell.
  10. The method of any one of claims 1 to 9, wherein camping on a user equipment from a first cell currently camped on to a second cell comprises:
    after the user equipment succeeds in random access, the user equipment receives an indication message sent by the first base station, wherein the indication message is used for indicating the user equipment to redirect, and the indication message comprises one or more redirection frequency points;
    and the user equipment resides in the second cell from the first cell according to the indication message, and the cell frequency point of the second cell is one of the one or more redirection frequency points.
  11. The method of any one of claims 1 to 9, wherein camping on a user equipment from a first cell currently camped on to a second cell comprises:
    when the user equipment is in an idle state, the user equipment performs cell reselection based on a neighbor cell list under the second network system, configured by the first base station, where the neighbor cell list is used to indicate one or more candidate cells for cell reselection by the user equipment;
    and the user equipment is resided to the second cell from the first cell, and the second cell is a candidate cell indicated in the neighbor cell list.
  12. The method according to any one of claims 1 to 11, wherein the first network standard is a global system for mobile communications GSM; the second network standard is any one of the following: long term evolution, LTE; 5G; code Division Multiple Access (CDMA); the bandwidth CDMA is accessed into WCDMA; TD-SCDMA is accessed by time division synchronous code division multiple access.
  13. The method according to any of claims 1 to 12, wherein the cell information of the second cell comprises at least one of:
    the cell frequency point of the second cell;
    a cell frequency band of the second cell;
    the physical cell identity, PCI, of the second cell.
  14. A pseudo base station identification device is applied to user equipment and comprises the following components:
    the device comprises a resident module, a first switching module and a second switching module, wherein the resident module is used for residing from a first cell residing at present to a second cell, the first cell is a cell under a first network standard, and the second cell is a cell under a second network standard;
    a determining processing module, configured to record that a second base station used for managing the second cell is a pseudo base station cell when the second base station is determined to be the pseudo base station, and add cell information of the second cell to a camp-inhibition list, where the camp-inhibition list is used to indicate that the user equipment is prohibited to camp on a cell corresponding to the cell information recorded in the camp-inhibition list;
    a fallback module, configured to fallback to the first network type and camp on the first cell again;
    the judgment processing module is further configured to judge whether a first base station for managing the first cell is a pseudo base station.
  15. The apparatus of claim 14, wherein the determination processing module, when determining whether the first base station for managing the first cell is a pseudo base station, is specifically configured to:
    triggering and building a link;
    determining that the first base station is a pseudo base station if the link setup fails.
  16. The apparatus of claim 14, wherein the determination processing module is further configured to:
    before the resident module is resident to a second cell from a first cell where the resident module is resident currently, determining that the system message configuration of the first base station is abnormal;
    storing pseudo base station configuration identification;
    the judgment processing module, when judging whether the first base station for managing the first cell is a pseudo base station, is specifically configured to:
    and determining the first base station as a pseudo base station under the condition of storing the pseudo base station configuration identifier.
  17. The apparatus of claim 14, wherein the determination processing module, when determining whether the first base station for managing the first cell is a pseudo base station, is specifically configured to:
    determining that the system message configuration of the first base station is abnormal;
    and determining that the first base station is a pseudo base station.
  18. The apparatus of claim 16 or 17, wherein the determining module determines that the system message configuration of the first base station is abnormal when at least one of the following information is satisfied:
    determining a plurality of PLMN identifications of the first base station configured in a PLMN list as PLMN identifications prohibited from being configured in the same shared PLMN list;
    determining that the camping threshold of the first base station is lower than the camping threshold configured by the user equipment;
    determining that the first base station is not configured with a pilot frequency adjacent cell and a different system adjacent cell;
    and determining that the priority of the GSM neighboring cell configured by the first base station is a high reselection priority.
  19. The apparatus according to any one of claims 15 to 18, wherein the determination processing module is further configured to:
    after the first base station is determined to be a pseudo base station, adding the cell information of the first cell into the forbidden residence list.
  20. The apparatus of claim 19, wherein the determination processing module is further configured to:
    after adding the cell information of the first cell into the stay prohibited list, performing cell search in the first network system;
    the resident module is further to:
    and if the judging and processing module searches the available cell in the first network system, residing in a third cell according to the search result, wherein the cell information of the third cell is not recorded in the stay-prohibited list.
  21. The apparatus according to any one of claims 15 to 20, wherein the determination processing module is further configured to:
    after triggering the link establishment, determining that the first base station is a legal base station under the condition that the link establishment is successful.
  22. The apparatus of claim 21, wherein the determination processing module is further configured to:
    adding the cell information of the first cell into the forbidden residence list after the first base station is determined to be a legal base station;
    performing cell search in the first network system;
    the resident module is further to:
    if the judging and processing module searches an available cell in the first network system, residing in a fourth cell according to a search result, wherein the cell information of the fourth cell is not recorded in the stay-prohibited list;
    the judgment processing module is further configured to:
    and if the available cell is not searched in the first network system, deleting the cell information of the first cell from the stay prohibited list, and re-camping on the first cell.
  23. The apparatus according to any of claims 14 to 22, wherein the camping module, when camping from a currently camped first cell to a second cell, is specifically configured to:
    after the user equipment is successfully accessed randomly, receiving an indication message sent by the first base station, wherein the indication message is used for indicating the user equipment to redirect, and the indication message comprises one or more redirection frequency points;
    and residing from the first cell to the second cell according to the indication message, wherein the cell frequency point of the second cell is one of the one or more redirection frequency points.
  24. The apparatus according to any of claims 14 to 22, wherein the camping module, when camping from a currently camped first cell to a second cell, is specifically configured to:
    when the user equipment is in an idle state, performing cell reselection based on a neighbor cell list under the second network system, configured by the first base station, where the neighbor cell list is used to indicate one or more candidate cells for cell reselection of the user equipment;
    and the first cell is resided to the second cell, and the second cell is a candidate cell indicated in the neighbor cell list.
  25. The apparatus according to any one of claims 14 to 24, wherein the first network standard is global system for mobile communications GSM; the second network standard is any one of the following: LTE; 5G; CDMA; WCDMA; TD-SCDMA.
  26. The apparatus of any of claims 14 to 25, wherein the cell information of the second cell comprises at least one of:
    the cell frequency point of the second cell;
    a cell frequency band of the second cell;
    a PCI of the second cell.
  27. A pseudo base station identification apparatus comprising a processor coupled to a memory and reading instructions in the memory for performing the method of any of claims 1 to 13.
  28. The apparatus of claim 27, wherein the apparatus is a user equipment or the apparatus is a chip.
  29. A computer storage medium, characterized in that the computer storage medium has stored thereon a program which, when executed by a processor, is adapted to carry out the method according to any one of claims 1 to 13.
  30. A computer program product comprising program code which, when run on a computer, causes the computer to perform the method according to any one of claims 1 to 13.
CN201880096749.7A 2018-08-31 2018-08-31 Pseudo base station identification method and device Pending CN112640512A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/103658 WO2020042176A1 (en) 2018-08-31 2018-08-31 Pseudo base station identification method and device

Publications (1)

Publication Number Publication Date
CN112640512A true CN112640512A (en) 2021-04-09

Family

ID=69644799

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880096749.7A Pending CN112640512A (en) 2018-08-31 2018-08-31 Pseudo base station identification method and device

Country Status (2)

Country Link
CN (1) CN112640512A (en)
WO (1) WO2020042176A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347634A (en) * 2021-08-04 2021-09-03 中国科学院信息工程研究所 4G and 5G air interface attack detection method based on signal and signaling fingerprint
CN113709847A (en) * 2021-08-30 2021-11-26 联想(北京)有限公司 Network connection method and electronic equipment
CN114143824A (en) * 2021-12-07 2022-03-04 西安广和通无线软件有限公司 Wireless communication module network selection method and related device
CN114222338A (en) * 2021-12-30 2022-03-22 西安航空学院 Method for preventing terminal from residing under pseudo base station, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357672A (en) * 2015-11-20 2016-02-24 华为技术有限公司 Pseudo base station identification method and user equipment
CN106211157A (en) * 2016-06-30 2016-12-07 北京奇虎科技有限公司 Base station reorientation method and base station redirection device
WO2017128542A1 (en) * 2016-01-29 2017-08-03 宇龙计算机通信科技(深圳)有限公司 Network residing method, network residing system and terminal
CN107182056A (en) * 2017-06-29 2017-09-19 努比亚技术有限公司 A kind of method and terminal for recognizing pseudo-base station
CN107241731A (en) * 2016-03-29 2017-10-10 努比亚技术有限公司 Mobile terminal network gravity treatment control method and device
CN108093407A (en) * 2017-12-18 2018-05-29 努比亚技术有限公司 Pseudo-base station cell recognition method, mobile terminal and computer readable storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222860A (en) * 2016-03-22 2017-09-29 中兴通讯股份有限公司 A kind of method and apparatus for recognizing pseudo-base station
CN106572450A (en) * 2016-11-03 2017-04-19 华为技术有限公司 Pseudo base station identification method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357672A (en) * 2015-11-20 2016-02-24 华为技术有限公司 Pseudo base station identification method and user equipment
WO2017128542A1 (en) * 2016-01-29 2017-08-03 宇龙计算机通信科技(深圳)有限公司 Network residing method, network residing system and terminal
CN107241731A (en) * 2016-03-29 2017-10-10 努比亚技术有限公司 Mobile terminal network gravity treatment control method and device
CN106211157A (en) * 2016-06-30 2016-12-07 北京奇虎科技有限公司 Base station reorientation method and base station redirection device
CN107182056A (en) * 2017-06-29 2017-09-19 努比亚技术有限公司 A kind of method and terminal for recognizing pseudo-base station
CN108093407A (en) * 2017-12-18 2018-05-29 努比亚技术有限公司 Pseudo-base station cell recognition method, mobile terminal and computer readable storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347634A (en) * 2021-08-04 2021-09-03 中国科学院信息工程研究所 4G and 5G air interface attack detection method based on signal and signaling fingerprint
CN113347634B (en) * 2021-08-04 2022-01-04 中国科学院信息工程研究所 4G and 5G air interface attack detection method based on signal and signaling fingerprint
CN113709847A (en) * 2021-08-30 2021-11-26 联想(北京)有限公司 Network connection method and electronic equipment
CN114143824A (en) * 2021-12-07 2022-03-04 西安广和通无线软件有限公司 Wireless communication module network selection method and related device
CN114222338A (en) * 2021-12-30 2022-03-22 西安航空学院 Method for preventing terminal from residing under pseudo base station, computer equipment and storage medium
CN114222338B (en) * 2021-12-30 2023-07-25 西安航空学院 Method for preventing terminal from residing under pseudo base station, computer equipment and storage medium

Also Published As

Publication number Publication date
WO2020042176A1 (en) 2020-03-05

Similar Documents

Publication Publication Date Title
CN112272392B (en) Cell residence method, device, terminal equipment and storage medium
CN111565427B (en) Network selection method, network equipment and terminal equipment
US9603083B2 (en) Method, device and system for selecting service cell
CN111866972B (en) Cell selection method, cell reselection method and chip
US8380206B1 (en) Indication of user equipment mobility state to enhance mobility and call performance
CN113068236B (en) Wireless communication method, terminal device, chip, medium, and program product
CN112640512A (en) Pseudo base station identification method and device
US9445330B2 (en) Pre-configured redirection information
EP2343918A2 (en) Circuit switched fallback
CN106465218B (en) User device, base station, cell selection control method, and parameter transmission method
KR20120125574A (en) Method and apparatus for managing csg priorities in idle and connected modes
CN113475162A (en) Mobility management method and device, and terminal
EP3984283A1 (en) Methods, ue and access node for handling system information signatures
CN112889316A (en) Cell reselection method and device, and terminal
US11528760B2 (en) Cell global identification report procedure for new radio cells without SIB1
CN114125972A (en) Network connection method and related device
CN112075100A (en) Measurement control method, UE, network equipment and computer storage medium
CN112514435B (en) Pseudo base station identification method and device
WO2014024123A1 (en) Fast cell reselection
CN112470501B (en) Paging message processing method and device
CN114830731A (en) Method, apparatus, storage medium, and chip system for wireless communication apparatus
CN115066917A (en) Communication method, device, readable storage medium and chip system
CN114731576A (en) Link selection for idle or inactive user equipment
EP4013116A1 (en) Wireless communication method, terminal device and network device
CN116456507A (en) Communication method, communication device and communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210409