CN112673663A - Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium - Google Patents

Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium Download PDF

Info

Publication number
CN112673663A
CN112673663A CN201880097365.7A CN201880097365A CN112673663A CN 112673663 A CN112673663 A CN 112673663A CN 201880097365 A CN201880097365 A CN 201880097365A CN 112673663 A CN112673663 A CN 112673663A
Authority
CN
China
Prior art keywords
mobile terminal
base station
pseudo base
target
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201880097365.7A
Other languages
Chinese (zh)
Other versions
CN112673663B (en
Inventor
李伟清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd, Shenzhen Huantai Technology Co Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN112673663A publication Critical patent/CN112673663A/en
Application granted granted Critical
Publication of CN112673663B publication Critical patent/CN112673663B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application discloses a pseudo base station processing method, a pseudo base station processing device, a mobile terminal and a storage medium, and relates to the technical field of mobile terminals. The method is applied to the mobile terminal, and comprises the following steps: when detecting that the mobile terminal is attacked by the pseudo base station, disconnecting the pseudo base station and trying to access a target base station, and when the mobile terminal is successfully accessed into the target base station, sending alarm information to control the mobile terminal to logout the network and enter a flight mode. According to the pseudo base station processing method and device, the mobile terminal and the storage medium, when the mobile terminal is detected to be attacked by the pseudo base station, the connection between the mobile terminal and the pseudo base station is disconnected, the mobile terminal is connected with the target base station to send alarm information, and the network is cancelled to carry out a flight mode after the alarm information is sent, so that the attack probability of the pseudo base station on the mobile terminal is reduced, and the information security of the mobile terminal is improved.

Description

Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium Technical Field
The present application relates to the field of mobile terminal technologies, and in particular, to a pseudo base station processing method and apparatus, a mobile terminal, and a storage medium.
Background
The pseudo base station is a pseudo base station, the pseudo base station generally comprises a host and a notebook computer, mobile phone card information within a certain radius range centered on the pseudo base station can be searched by related equipment such as a short message group sender, a short message sender and the like, and by utilizing the defects of mobile communication, the pseudo base station serves as a base station of an operator and forces to send short messages such as fraud, advertising promotion and the like to a mobile phone of a user by pretending to be the mobile phone number of other people.
Disclosure of Invention
In view of the above problems, the present application provides a pseudo base station processing method, apparatus, mobile terminal and storage medium to solve the above problems.
In a first aspect, an embodiment of the present application provides a pseudo base station processing method, which is applied to a mobile terminal, and the method includes: when detecting that the mobile terminal is attacked by a pseudo base station, disconnecting the pseudo base station and trying to access a target base station; when the mobile terminal is successfully accessed to the target base station, sending alarm information; and controlling the mobile terminal to log off the network to enter a flight mode.
In a second aspect, an embodiment of the present application provides a pseudo base station processing apparatus, which is applied to a mobile terminal, and the apparatus includes: the disconnection module is used for disconnecting the connection with the pseudo base station and trying to access a target base station when the mobile terminal is detected to be attacked by the pseudo base station; the alarm module is used for sending alarm information when the mobile terminal is successfully accessed to the target base station; and the control module is used for controlling the mobile terminal to log off the network and enter a flight mode.
In a third aspect, an embodiment of the present application provides a mobile terminal, including: a memory; one or more processors coupled with the memory; one or more programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the above-described methods.
In a fourth aspect, the present application provides a computer-readable storage medium, in which a program code is stored, and the program code can be called by a processor to execute the above method.
According to the pseudo base station processing method, the pseudo base station processing device, the mobile terminal and the storage medium, when the mobile terminal is detected to be attacked by the pseudo base station, connection with the pseudo base station is disconnected, access to a target base station is attempted, when the mobile terminal is successfully accessed to the target base station, alarm information is sent, the mobile terminal is controlled to logout the network to enter a flight mode, therefore, when the mobile terminal is detected to be attacked by the pseudo base station, the mobile terminal is disconnected from the pseudo base station and connected with the target base station to send the alarm information, the network is logout after the alarm information is sent to conduct the flight mode, attack probability of the pseudo base station to the mobile terminal is reduced, and information safety of the mobile terminal is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram illustrating a system architecture of a mobile communication network according to an embodiment of the present application;
fig. 2 is a schematic system architecture diagram of another mobile communication network provided in the embodiment of the present application;
fig. 3 is a flowchart illustrating a pseudo base station processing method according to an embodiment of the present application;
fig. 4 is a flowchart illustrating a pseudo base station processing method according to another embodiment of the present application;
fig. 5 is a flowchart illustrating a pseudo base station processing method according to still another embodiment of the present application;
fig. 6 is a schematic flowchart illustrating a pseudo base station processing method according to another embodiment of the present application;
fig. 7 shows a flowchart of step S420 of the pseudo base station processing method shown in fig. 6 of the present application;
fig. 8 is a flowchart illustrating a pseudo base station processing method according to yet another embodiment of the present application;
fig. 9 shows a flowchart of step S520 of the pseudo base station processing method shown in fig. 8 of the present application;
fig. 10 is a flowchart illustrating a pseudo base station processing method according to yet another embodiment of the present application;
fig. 11 shows a block diagram of a pseudo base station processing apparatus provided in an embodiment of the present application;
fig. 12 is a block diagram of an electronic device for executing a pseudo base station processing method according to an embodiment of the present application;
fig. 13 illustrates a storage unit of an embodiment of the present application, configured to store or carry program code for implementing a pseudo base station processing method according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
With the great development of mobile communication technology, mobile communication has undergone the development of multiple versions, 2G, 3G, and 4G. Regardless of the gsm (global System for Mobile communication) communication System or cdma (code Division Multiple access) communication System in the early 2G era, or the LTE (long term evolution) System architecture in the later 4G era, the base station is an important communication device.
For example, the 2G mobile communication system architecture diagram shown in fig. 1. BTS Base Station 99(Base Station Controller) is connected to Base Station Controller 98 as an access device for mobile communication, then Base Station Controller 98 is connected to mobile switching center 97, and mobile switching center 97 is also connected to public switched telephone network 96. For another example, fig. 2 is a schematic diagram of a 4G mobile communication system architecture. The eNB base station 95 is connected to an MME (mobility Management entity), namely a mobility Management node 94, the MME is connected to a serving gateway 93, the serving gateway 93 is connected to a packet data gateway 92, and the packet data gateway 92 is connected to a packet data network 91. As can be seen from fig. 1 and 2, in the mobile communication system, the base station is a device that directly establishes a connection with the mobile terminal, and has a relatively important position in the whole system architecture. The base station, generally referred to as a "public mobile communication base station," is mainly used for providing signals to mobile terminals such as mobile phones and tablet computers. As communication technology has advanced, the inventors have discovered the presence of a pseudo base station.
The pseudo base station is an illegal base station outside a mobile communication network, generally comprises a host and a notebook computer, can search mobile phone card information within a certain radius range by taking the pseudo base station as a center through related equipment such as a short message group sender, a short message sender and the like, and forcibly sends short messages such as fraud, advertising promotion and the like to a mobile phone of a user by pretending to be a base station of an operator through the defect of 2G mobile communication by pretending to be a mobile phone number of other people.
When the pseudo base station equipment runs, a wireless signal sent by the mobile terminal is forcibly connected to the equipment, so that the mobile terminal cannot normally use services provided by an operator, the mobile terminal is normally recovered after temporarily disconnecting the network for 8-12 seconds, and part of the mobile terminals need to be turned on and off to access the network again. In addition, it may cause the mobile terminal user to frequently update the location, so that the wireless network resources in the area are strained and network congestion occurs, which affects the normal communication of the user.
In view of the above problems, the inventor has made long-term research and has proposed a method, an apparatus, a mobile terminal, and a storage medium for processing a pseudo base station according to an embodiment of the present application, where when the mobile terminal is attacked by the pseudo base station, the connection with the pseudo base station is disconnected and the target base station is connected to send alarm information, and after the alarm information is sent, the network is cancelled to perform a flight mode, so as to reduce the attack probability of the pseudo base station on the mobile terminal and improve the information security of the mobile terminal.
Examples
Referring to fig. 3, fig. 3 is a schematic flowchart illustrating a pseudo base station processing method according to an embodiment of the present application, where the pseudo base station processing method is used to disconnect the pseudo base station and connect to a target base station to send alarm information when a mobile terminal is attacked by a pseudo base station, and cancel a network to perform a flight mode after the alarm information is sent, so as to reduce the attack probability of the pseudo base station on the mobile terminal and improve the information security of the mobile terminal. In a specific embodiment, the pseudo base station processing method is applied to the pseudo base station processing apparatus 200 shown in fig. 11 and the mobile terminal 100 (fig. 12) configured with the pseudo base station processing apparatus 200, and a specific flow of the present embodiment will be described below by taking a mobile terminal as an example. As will be described in detail with respect to the flow shown in fig. 3, the pseudo base station processing method may specifically include the following steps:
step S110: and when detecting that the mobile terminal is attacked by the pseudo base station, disconnecting the pseudo base station and trying to access the target base station.
Generally, a network air interface is used to enable information interaction between a mobile terminal and a base station of a mobile communication network, and information on the network air interface is carried by various logical channels. The logical channels are divided into two categories, namely Traffic Channels (TCH) and Control Channels (CCH), where the TCH is mainly used for transmitting Traffic, such as voice and data, between the network and the mobile terminal; the CCH is a Channel for transmitting signaling information and short packet data, and a Broadcast Channel (BCH) in the CCH is used for transmitting information by broadcasting, and a Broadcast Control Channel (BCCH) in the BCH is used for broadcasting common information, such as system messages, to the mobile terminals by the base station. Therefore, the mobile terminal can detect the base station by monitoring the broadcast information of the base station and register in the base station according to the detection result.
However, the base stations detected by the mobile terminal may include a pseudo base station, and thus, the mobile terminal may register with the pseudo base station and be attacked by the pseudo base station. Therefore, as one mode, it may be determined whether the base station registered by the mobile terminal is a pseudo base station, for example, the mobile terminal may acquire broadcast information of the base station, extract identification information of the base station from the broadcast information, and determine whether the base station is a pseudo base station by using the identification information. Specifically, the identification information may include a cell location area (TAC) of a base station cell corresponding to the base station, a Location Area Code (LAC), a Cell Identity (CID), and the like, so that, as a manner, when the mobile terminal detects a new base station, the mobile terminal may calculate a difference between the TAC/LAC/CID of the base station cell corresponding to the base station and the TAC/LAC/CID of the base station cell that the mobile terminal has successfully registered recently, and if the difference is greater than a set threshold, it may be determined that the base station detected by the mobile terminal is a pseudo base station.
In this embodiment, when it is determined that the base station detected by the mobile terminal is a pseudo base station, whether the mobile terminal is attacked by the pseudo base station may be monitored, and as a mode, the monitoring mode of whether the mobile terminal is attacked by the pseudo base station may include real-time monitoring, monitoring at a predetermined interval time, or a detection mode set by a user, which is not limited herein. When detecting that the mobile terminal is attacked by the pseudo base station, the mobile terminal processes the pseudo base station attack as a response, and as one mode, the mobile terminal may disconnect from the pseudo base station and try to access the target base station. Specifically, when the mobile terminal is attacked by the pseudo base station, the pseudo base station is characterized to acquire a communication information secret key such as imsi, tmsi and the like of the user, another mobile terminal can be used for replacing the mobile terminal to interact with a network of an operator, receiving a verification short message and the like, and then stealing account funds, so that in order to protect the property security of the mobile terminal user, the mobile terminal can be disconnected from the pseudo base station and tries to access a target base station to use the network normally, on one hand, the attack of the pseudo base station can be avoided, and on the other hand, alarm information can be sent out after the network is normally used.
Step S120: and when the mobile terminal is successfully accessed to the target base station, sending alarm information.
As a manner, after disconnecting from the pseudo base station, the mobile terminal may detect a neighboring base station again, and select a base station to register according to a detection result, it can be understood that the base station to which the mobile terminal re-registers may be the pseudo base station or may not be the pseudo base station, therefore, the mobile terminal may detect whether the detected base station or the registered base station is the pseudo base station, and when detecting that the detected or registered base station is not the pseudo base station, it may be determined that the mobile terminal successfully accesses the target base station, that is, when the mobile terminal is connected to a base station and may use a normal network, it is characterized that the mobile terminal successfully accesses the target base station.
Further, when the mobile terminal successfully accesses the target base station, the mobile terminal can be represented as a normal network, and then the mobile terminal can send alarm information to the public security organization so as to inform the public security organization of the attack time, the attack place, the attack mode and other characteristic information of the pseudo base station through the alarm information, so that the public security organization can remove the pseudo base station according to the alarm information of the mobile terminal and report the information security of the mobile terminal user. The alarm information may include an alarm telephone and/or an alarm short message.
As an implementation manner, when the mobile terminal successfully accesses the target base station, the mobile terminal may automatically generate alarm information, for example, automatically edit an alarm short message or automatically jump to an alarm call dialing interface, and then send out query information to query whether the user sends the alarm information, it can be understood that when an operation indicating to confirm sending the alarm information is detected, the mobile terminal sends the alarm information to the public security organization as a response; and when the operation indicating that the alarm information is not sent is detected, the mobile terminal deletes the alarm information as a response.
Step S130: and controlling the mobile terminal to log off the network to enter a flight mode.
Specifically, because the pseudo base station exists in the area where the mobile terminal is located, and the pseudo base station generally attacks the mobile terminal through the 2G network or the 3G network, the mobile terminal may be attacked by the pseudo base station again at any time in the network using process in the area, and therefore, in order to avoid the mobile terminal being attacked by the pseudo base station again, the mobile terminal may be controlled to logout the network and enter the flight mode, so that the pseudo base station may be prevented from attacking the mobile terminal through the 2G network or the 3G network, and the information security of the mobile terminal is improved.
According to the pseudo base station processing method provided by one embodiment of the application, when the mobile terminal is detected to be attacked by the pseudo base station, the connection with the pseudo base station is disconnected and the target base station is tried to be accessed, when the mobile terminal is successfully accessed to the target base station, alarm information is sent out, the mobile terminal is controlled to logout the network to enter the flight mode, therefore, when the mobile terminal is detected to be attacked by the pseudo base station, the connection between the mobile terminal and the pseudo base station is disconnected and the target base station is connected to send the alarm information, the network is logout after the alarm information is sent to carry out the flight mode, the attack probability of the pseudo base station to the mobile terminal is reduced, and the information safety of the.
Referring to fig. 4, fig. 4 is a flowchart illustrating a pseudo base station processing method according to another embodiment of the present application. As will be described in detail with respect to the flow shown in fig. 4, the pseudo base station processing method may specifically include the following steps:
step S210: and when detecting that the mobile terminal is attacked by the pseudo base station, acquiring the characteristic parameters of the pseudo base station.
In this embodiment, when it is determined that the mobile terminal is attacked by the pseudo base station, the characteristic parameter of the pseudo base station may be obtained, where the characteristic parameter may include at least one of a location Area identifier (TAI), an absolute video channel number (EARFCN), a Physical Cell Identifier (PCI), and a Cell Identity (CID), and of course, the characteristic parameter corresponding to the pseudo base station may further include other parameters, which are not described herein again. It is to be understood that the characteristic parameters may be used to identify a pseudo base station, where one characteristic parameter may correspond to a plurality of base stations, and therefore, when the characteristic parameter of a certain base station is consistent with the characteristic parameter of the pseudo base station, the certain base station may be considered as a pseudo base station.
Step S220: and prohibiting the mobile terminal from accessing the base station corresponding to the characteristic parameter.
It can be understood that, since the base station corresponding to the characteristic parameter may be a pseudo base station, in order to reduce or even avoid the possibility that the mobile terminal accesses the pseudo base station and is attacked by the pseudo base station, the mobile terminal may be prohibited from accessing all base stations corresponding to the characteristic parameter. That is to say, the mobile terminal may obtain the feature parameters corresponding to all the detected base stations, and then compare the feature parameters of the detected base stations with the feature parameters of the pseudo base stations to determine whether the feature parameters of the detected base stations are consistent with the feature parameters of the pseudo base stations, it can be understood that when the feature parameters of the detected base stations are consistent with the feature parameters of the pseudo base stations, it is determined that the base stations detected by the mobile terminal may be pseudo base stations, and then the mobile terminal is prohibited from accessing the base stations; and when the detected characteristic parameters of the base station are inconsistent with the characteristic parameters of the pseudo base station, determining that the base station detected by the mobile terminal is not the pseudo base station or the probability of the pseudo base station is low, and allowing the mobile terminal to access the base station.
Step S230: and trying to access the target base station corresponding to other characteristic parameters except the characteristic parameters.
Further, the base stations detected by the mobile terminal are analyzed to obtain the characteristic parameters of each base station, the base stations with the characteristic parameters consistent with those of the pseudo base stations are obtained from the characteristic parameters, and then the target base stations corresponding to other characteristic parameters except the base stations with the characteristic parameters consistent with those of the pseudo base stations in the detected base stations are tried to be accessed, so that the possibility that the mobile terminal accesses the pseudo base stations is reduced.
For example, assume that the characteristic parameter of the pseudo base station is N1, and the base stations detected by the mobile terminal include base station a1, base station a2, base station A3 and base station a4, the characteristic parameter of base station a1 is N1, the characteristic parameter of base station a2 is N2, the characteristic parameter of base station A3 is N1, and the characteristic parameter of base station a4 is N3. Then, it can be determined that the feature parameters of bs a1 and bs A3 are consistent with the feature parameters of the pseudo bs, and then the bs a1 and bs A3 may also be the pseudo bs, and at the same time, it can be determined that the feature parameters of bs a2 and bs a4 are not consistent with the feature parameters of the pseudo bs, and then the bs a2 and bs a4 are not the pseudo bs or have a low probability of being the pseudo bs, so that the mobile terminal can be controlled to attempt to access bs a2 or bs a4, and the possibility of accessing the pseudo bs by the mobile terminal is reduced.
Step S240: and when the mobile terminal is successfully accessed to the target base station, sending alarm information comprising the characteristic parameters of the pseudo base station.
As one way, the alarm information sent by the mobile terminal may include characteristic parameters of the pseudo base station, such as at least one of a location Area Identity (TAI), an absolute video channel number (EARFCN), a Physical Cell Identity (PCI), and a Cell Identity (CID), so as to facilitate the public security organization to quickly locate the pseudo base station for timely processing.
Step S250: and controlling the mobile terminal to log off the network to enter a flight mode.
As an implementation manner, after controlling the mobile terminal to log off the network and enter the flight mode, the mobile terminal may record at least one of the characteristic parameter corresponding to the pseudo base station, the attack time of the pseudo base station, and the alarm information of the mobile terminal, and then generate the prompt information based on the characteristic parameter corresponding to the pseudo base station, the attack time of the pseudo base station, and the alarm information of the mobile terminal, and output the prompt information through the mobile terminal, wherein the prompt information may be output in a manner of being displayed on the mobile terminal, or may be output in a manner of being voice-broadcasted by the mobile terminal, and the like, which is not limited herein.
Step S260: and detecting the time length of the mobile terminal entering the flight mode.
In this embodiment, after the mobile terminal is controlled to enter the flight mode, the time length of the mobile terminal entering the flight mode starts to be monitored and recorded, where the monitoring mode may include real-time monitoring, interval preset time length monitoring, or time interval monitoring set by a user, and optionally, in order to improve the accuracy of the time length obtained by monitoring, a real-time monitoring mode may be adopted.
Step S270: and judging whether the duration is greater than a preset duration.
As a mode, the mobile terminal sets a preset duration to be used as a criterion for determining a duration for the mobile terminal to enter the flight mode, and it can be understood that the preset duration may be stored locally by the mobile terminal in advance, or may be set when it is determined, which is not limited herein. The preset duration may be automatically configured by the mobile terminal, may be manually set by a user corresponding to the mobile terminal, or may be configured by a server connected to the mobile terminal and then sent to the mobile terminal, which is not limited herein. Further, after the duration that the mobile terminal enters the flight mode is obtained, the duration is compared with a preset duration to judge whether the duration is greater than the preset duration.
Step S280: and when the duration is longer than the preset duration, controlling the mobile terminal to exit the flight mode and access the network.
It can be understood that, when the duration is greater than the preset duration, it may be considered that the pseudo base station has been processed or the mobile terminal has left the area where the pseudo base station is located within the duration, and therefore, the mobile terminal may be controlled to exit the flight mode and normally access the network, so as to ensure normal network utilization of the mobile terminal.
As another mode, position information of the mobile terminal entering the flight mode may be obtained first, the position information of the mobile terminal after entering the flight mode is detected, the position information of the mobile terminal after entering the flight mode is compared with the position information of the mobile terminal when entering the flight mode to obtain a difference between the position information of the mobile terminal after entering the flight mode and the position information of the mobile terminal when entering the flight mode, and then the difference is compared with a preset difference, where when the difference is greater than the preset difference, it is represented that the mobile terminal has moved out of a range covered by the pseudo base station after entering the flight mode, and the mobile terminal may be controlled to exit the flight mode and access the network; and when the difference is not greater than the preset difference, representing that the mobile terminal does not move or does not move out of the range covered by the pseudo base station after entering the flight mode, controlling the mobile terminal to keep the flight mode and avoiding being attacked by the pseudo base station again.
In another embodiment of the present application, when it is detected that the mobile terminal is attacked by the pseudo base station, the method for processing the pseudo base station obtains a feature parameter of the pseudo base station, prohibits the mobile terminal from accessing the base station corresponding to the feature parameter, tries to access a target base station corresponding to other feature parameters except the feature parameter, sends an alarm message including the feature parameter when the mobile terminal successfully accesses the target base station, controls the mobile terminal to logout the network into a flight mode, detects a duration for the mobile terminal to logout the network into the flight mode, determines whether the duration is greater than a preset duration, and controls the mobile terminal to logout the flight mode and access the network when the duration is greater than the preset duration. Compared with the pseudo base station processing method shown in fig. 3, in this embodiment, the probability that the mobile terminal accesses the pseudo base station is reduced by prohibiting the base station corresponding to the characteristic parameter of the pseudo base station, and the mobile terminal exits the flight mode and accesses the network when the time length for the mobile terminal to enter the flight mode is longer than the preset time length, so as to ensure normal network utilization of the mobile terminal.
Referring to fig. 5, fig. 5 is a schematic flowchart illustrating a pseudo base station processing method according to still another embodiment of the present application. As will be described in detail with respect to the flow shown in fig. 5, the pseudo base station processing method may specifically include the following steps:
step S310: and when detecting that the mobile terminal is attacked by the pseudo base station, forbidding the mobile terminal to access the 2G network and the 3G network.
In general, a pseudo base station is a base station disguised as an operator by utilizing the technical defects of a 2G network or a 3G network, and forcibly sends short messages such as fraud, advertising promotion and the like to a mobile phone of a user by pretending to be a mobile phone number of another person. In this embodiment, when it is detected that the mobile terminal is attacked by the pseudo base station, it represents that the mobile terminal is currently in a state of accessing the 2G network or the 3G network, so that, in order to relieve the attack of the pseudo base station on the mobile terminal, the mobile terminal may be prohibited from accessing the 2G network and the 3G network, thereby prohibiting the pseudo base station from attacking the mobile terminal by using the technical defects of the 2G network or the 3G network, and avoiding the mobile terminal from registering on the pseudo base station.
Step S320: attempting to access the 4G network enters VOLTE mode.
Further, since the pseudo base stations used by most of the illegal molecules are the 2G network and the 3G network, and the 4G network is only used by a very few pseudo base stations, for example, the pseudo base station used by the security monitoring system is the 4G network, but the pseudo base station is used for security monitoring of the mobile terminal, and does not cause property loss to the mobile terminal user, as a way, after the mobile terminal is prohibited from accessing the 2G network and the 3G network, the mobile terminal may be set to connect the 4G network to enter a VOLTE mode, where VOLTE, i.e., Voice over LTE, is a Voice service based on IMS. The method is an IP data transmission technology, does not need a 2G network/a 3G network, and can realize the unification of data and voice services in the same network by bearing all services on a 4G network. Specifically, within the specified duration, the mobile terminal is always in a state of being connected to the 4G network and is not allowed to be switched to a state of being connected to the 2G network and the 3G network, so that the pseudo base station adopted by an illegal party can be prevented from attacking the mobile terminal through the 2G network or the 3G network, and the mobile terminal is allowed to normally surf the internet at the same time.
It should be noted that the mobile terminal may further enter an IMS mode, where the IMS mode includes a VOLTE mode, a VOWIFI mode, and even a VO5G mode, which is not limited herein.
Step S330: and when the mobile terminal is successfully accessed to the target base station, sending alarm information.
Further, when it is determined that the mobile terminal successfully accesses the 4G network, it may be considered that the mobile terminal successfully accesses the target base station, and the mobile terminal sends an alarm message as a response.
Step S340: and controlling the mobile terminal to log off the network to enter a flight mode.
Step S350: and detecting the time length of the mobile terminal entering the flight mode.
Step S360: and judging whether the duration is greater than a preset duration.
Step S370: and when the duration is longer than the preset duration, controlling the mobile terminal to exit the flight mode and access the network.
In the method for processing the pseudo base station provided in another embodiment of the present application, when it is detected that the mobile terminal is attacked by the pseudo base station, the mobile terminal is prohibited from accessing the 2G network and the 3G network, an attempt is made to access the 4G network to enter the VOLTE mode, when the mobile terminal successfully accesses the target base station, an alarm message is sent, the mobile terminal is controlled to logout the network to enter the flight mode, a duration of the mobile terminal entering the flight mode is detected, whether the duration is greater than a preset duration is determined, and when the duration is greater than the preset duration, the mobile terminal is controlled to quit the flight mode and access the network. Compared with the pseudo base station processing method shown in fig. 3, in the embodiment, the probability of the mobile terminal accessing the pseudo base station is reduced by prohibiting the mobile terminal from entering the 2G network and the 3G network and trying to access the 4G network, and the mobile terminal exits the flight mode and accesses the network when the time length for the mobile terminal to enter the flight mode is longer than the preset time length, so as to ensure normal network use of the mobile terminal.
Referring to fig. 6, fig. 6 is a schematic flowchart illustrating a pseudo base station processing method according to another embodiment of the present application. As will be described in detail with respect to the flow shown in fig. 6, the pseudo base station processing method may specifically include the following steps:
step S410: and monitoring the network connection state of the mobile terminal.
In this embodiment, the network connection state of the mobile terminal is monitored first, and it can be understood that the network connection state of the mobile terminal may include a connected state and a disconnected state, where the disconnected state includes a disconnected state and a connected state. As a manner, whether the mobile terminal is in the network connection state may be determined by looking up a state value of the mobile terminal, specifically, in an embodiment, when the mobile terminal is in the network connection state, the mobile terminal may generate a first state value, and when the mobile terminal is in the non-network connection state, the mobile terminal may generate a second state value, so that the network connection state of the mobile terminal may be monitored by monitoring the first state value and the second state value.
In addition, after determining that the mobile terminal is in the network connection state, the change of the network to which the mobile terminal is connected may also be monitored, for example, whether the mobile terminal drops from a resident cell to a non-resident cell, whether the mobile terminal drops from an original cell to a new cell, and the like, which is not limited herein.
Step S420: and when the mobile terminal falls from a resident cell to a non-resident cell and receives the target short message, determining that the mobile terminal is attacked by the pseudo base station.
When the mobile terminal is monitored to fall from the resident cell to the non-resident cell, whether the mobile terminal receives the short message is detected, wherein if the mobile terminal falls from the resident cell to the non-resident cell and receives the short message, the short message is identified to judge whether the short message is a target short message.
As an implementation manner, when the mobile terminal falls from a resident cell to a non-resident cell and receives a short message, performing word segmentation on the short message content of the short message to obtain a plurality of word segmentation results, and then judging whether the plurality of word segmentation results include a target keyword, wherein when the plurality of word segmentation results include the target keyword, the short message received by the mobile terminal can be determined to be the target short message. In this embodiment, the target keyword may include at least one of an account login, a password modification, a verification code, and a transfer. For example, if the short message content is "you apply for mobile phone number registration in year, month, and date, and the verification code is 000000", then, as a way, the word segmentation of the short message content may obtain "you", "in", "year, month, date", "applied", "mobile phone", "number", "registration", "verification code", "yes", and "000000", and then compare the word segmentation result with a pre-stored target keyword to determine whether the word segmentation result includes a target keyword.
Referring to fig. 7, fig. 7 is a flowchart illustrating step S420 of the pseudo base station processing method illustrated in fig. 6 according to the present application. As will be described in detail with respect to the flow shown in fig. 7, the method may specifically include the following steps:
step S421: and when the mobile terminal falls from a resident cell to a non-resident cell and receives a target short message, detecting a signal intensity attenuation value of the resident cell.
As an embodiment, when the mobile terminal drops from the resident cell to the non-resident cell and receives the target short message, the attenuation value of the signal strength of the resident cell can be detected. Specifically, when the mobile terminal resides in a residential cell, the signal strength of the residential cell is monitored to obtain a first signal strength value of the residential cell in real time, and when the mobile terminal falls from the residential cell to a non-residential cell, the signal strength of the residential cell is detected to obtain a second signal strength, and then a difference between the first signal strength value and the second signal strength value is calculated to obtain a signal strength attenuation value of the residential cell.
Step S422: and judging whether the signal intensity attenuation value is smaller than a specified attenuation value or not.
As one mode, the mobile terminal sets a specified attenuation value as a criterion for determining the attenuation value of the signal strength of the resident cell, and it is understood that the specified attenuation value may be stored locally by the mobile terminal in advance, or may be set again at the time of determination, which is not limited herein. The specified attenuation value may be automatically configured by the mobile terminal, may be manually set by a user corresponding to the mobile terminal, or may be configured by a server connected to the mobile terminal and then sent to the mobile terminal, which is not limited herein. Further, after the signal intensity attenuation value of the resident cell is acquired, the signal intensity attenuation value of the resident cell is compared with a specified attenuation value to judge whether the signal intensity attenuation value of the resident cell is smaller than the specified attenuation value.
Step S423: and when the signal strength attenuation value is smaller than the designated attenuation value, determining that the mobile terminal is attacked by a pseudo base station.
When the attenuation value of the signal strength of the resident cell is determined to be smaller than the designated attenuation value, the signal representing the resident cell is not weakened, that is, the mobile terminal falls to the non-resident cell not because of the attenuation of the signal of the resident cell but because of the intervention of the pseudo base station, so that the mobile terminal can be determined to be attacked by the pseudo base station.
Step S430: and when detecting that the mobile terminal is attacked by the pseudo base station, disconnecting the pseudo base station and trying to access the target base station.
Step S440: and when the mobile terminal is successfully accessed to the target base station, sending alarm information.
Step S450: and controlling the mobile terminal to log off the network to enter a flight mode.
For detailed description of steps S430 to S450, please refer to steps S110 to S130, which are not described herein again.
In another embodiment of the present application, a pseudo base station processing method monitors a network connection state of a mobile terminal, determines that the mobile terminal is attacked by a pseudo base station when the mobile terminal falls from a resident cell to a non-resident cell and receives a target short message, disconnects the connection with the pseudo base station and tries to access the target base station when detecting that the mobile terminal is attacked by the pseudo base station, and sends new alarm information when the mobile terminal successfully accesses the target base station to control the mobile terminal to logout a network and enter a flight mode. Compared with the pseudo base station processing method shown in fig. 3, in the embodiment, when it is monitored that the mobile terminal falls from the resident cell to the non-resident cell and receives the target short message, it is determined that the mobile terminal is attacked by the pseudo base station, so that the attack of the mobile terminal by the pseudo base station is reduced.
Referring to fig. 8, fig. 8 is a schematic flowchart illustrating a pseudo base station processing method according to yet another embodiment of the present application. As will be described in detail with respect to the flow shown in fig. 8, the pseudo base station processing method may specifically include the following steps:
step S510: and monitoring the network connection state of the mobile terminal.
Step S520: and when the mobile terminal falls from the original cell to the new cell and receives the target short message, determining that the mobile terminal is attacked by the pseudo base station.
In this embodiment, when the short message is the target short message, it may be determined that the mobile terminal is attacked by a pseudo base station, and when the short message is not the target short message, it may be determined that the mobile terminal is not attacked by the pseudo base station. Please refer to the detailed description of step S420, which is not repeated herein.
Referring to fig. 9, fig. 9 is a flowchart illustrating step S520 of the pseudo base station processing method illustrated in fig. 8 according to the present application. As will be described in detail with respect to the flow shown in fig. 9, the method may specifically include the following steps:
step S521: and when the mobile terminal falls from the original cell to a new cell and receives the target short message, judging whether the signal of the original cell is interfered.
As an implementation manner, when the mobile terminal drops from the original cell to the new cell and receives the target short message, whether the signal of the original cell is interfered is determined. Specifically, the signal of the original cell in the time that the mobile terminal resides in the original cell may be monitored in real time, and the signal of the original cell in the process that the mobile terminal falls from the original cell to the new cell may be monitored in real time, where when the signal of the original cell is monitored to have large fluctuation, it may be determined that the signal of the original cell is interfered, for example, when the signal of the original cell is monitored to be suddenly weakened at a certain time, it may be determined that the signal of the original cell is interfered.
Step S522: and when the signal of the original cell is interfered, determining that the mobile terminal is attacked by the pseudo base station.
If the judgment result indicates that the signal of the original cell is interfered, the mobile terminal is not considered to fall from the original cell to the new cell in a normal mode, but the signal of the original cell is interfered, and the interference may be caused by the pseudo base station, so that the mobile terminal can be determined to be attacked by the pseudo base station.
Step S530: and when detecting that the mobile terminal is attacked by the pseudo base station, disconnecting the pseudo base station and trying to access the target base station.
Step S540: and when the mobile terminal is successfully accessed to the target base station, sending alarm information.
Step S550: and controlling the mobile terminal to log off the network to enter a flight mode.
For the detailed description of steps S530 to S550, refer to steps S110 to S130, which are not described herein again.
In another embodiment of the present application, a method for processing a pseudo base station is provided, where a network connection state of a mobile terminal is monitored, when the mobile terminal falls from an original cell to a new cell and receives a target short message, it is determined that the mobile terminal is attacked by the pseudo base station, when it is detected that the mobile terminal is attacked by the pseudo base station, a connection with the pseudo base station is disconnected and an access to the target base station is attempted, and when the mobile terminal successfully accesses the target base station, an alarm message is sent to control the mobile terminal to logout a network and enter a flight mode. Compared with the pseudo base station processing method shown in fig. 3, in this embodiment, when it is monitored that the mobile terminal falls from the original cell to the new cell and receives the target short message, it is determined that the mobile terminal is attacked by the pseudo base station, so as to reduce the attack of the mobile terminal by the pseudo base station.
Referring to fig. 10, fig. 10 is a schematic flowchart illustrating a pseudo base station processing method according to yet another embodiment of the present application. As will be described in detail with respect to the flow shown in fig. 10, the pseudo base station processing method may specifically include the following steps:
step S610: monitoring an operation acting on the mobile terminal.
In this embodiment, the operation applied to the mobile terminal may include a touch operation applied to the mobile terminal, or inputting voice information of the mobile terminal, which is not limited herein. The touch operation can comprise screen touch, key click, gravity sensing change, screen extinguishment and the like, wherein the screen touch comprises large-area pressing, continuous long pressing, continuous overlong pressing, double-finger long pressing, copying, multi-finger continuous clicking and the like, the large-area pressing means that the pressing area exceeds a preset area, the continuous long pressing means that the continuous pressing time exceeds a preset time, the continuous overlong pressing means that the pressing time exceeds the preset overlong time, the double-finger long pressing means that the simultaneous pressing time of the double fingers exceeds the preset time, copying contents to the pasting board is carried out after copying, and the multi-finger continuous connection means that the number of continuous clicking exceeds the preset number.
Step S620: and when the operation acting on the mobile terminal is not detected and the target short message is received, determining that the mobile terminal is attacked by the pseudo base station.
When the operation acting on the mobile terminal is not detected and the target short message is received, the representation user automatically receives the target short message under the condition that the mobile terminal is not operated, that is, the target short message is not a result fed back based on the request operation of the user and may be caused by the fact that the pseudo base station attacks the mobile terminal, and then the mobile terminal can be determined to be attacked by the pseudo base station. Please refer to the detailed description of step S420, which is not repeated herein.
Step S630: and when detecting that the mobile terminal is attacked by the pseudo base station, disconnecting the pseudo base station and trying to access the target base station.
Step S640: and when the mobile terminal is successfully accessed to the target base station, sending alarm information.
Step S650: and controlling the mobile terminal to log off the network to enter a flight mode.
In another embodiment of the present application, a method for processing a pseudo base station includes monitoring an operation performed on a mobile terminal, determining that the mobile terminal is attacked by the pseudo base station when the operation performed on the mobile terminal is not detected and a target short message is received, disconnecting the mobile terminal from the pseudo base station and attempting to access the target base station when the mobile terminal is detected to be attacked by the pseudo base station, and sending an alarm message to control the mobile terminal to logout a network to perform a flight mode when the mobile terminal is successfully accessed to the target base station. Compared with the pseudo base station processing method shown in fig. 3, in the embodiment, when the mobile terminal does not detect the operation acting on the mobile terminal and receives the target short message, it is determined that the mobile terminal is attacked by the pseudo base station, so as to reduce the attack of the mobile terminal by the pseudo base station.
Referring to fig. 11, fig. 11 is a block diagram illustrating a pseudo base station processing apparatus 200 according to an embodiment of the present disclosure. The pseudo base station processing apparatus 200 is applied to the mobile terminal, and will be explained with reference to the block diagram shown in fig. 11, where the pseudo base station processing apparatus 200 includes: a disconnect module 210, an alarm module 220, and a control module 230, wherein:
a disconnecting module 210, configured to, when it is detected that the mobile terminal is attacked by a pseudo base station, disconnect the pseudo base station and attempt to access a target base station. Further, the illustrated disconnect module 210 includes: the system comprises a characteristic parameter obtaining submodule, a base station forbidding submodule, a target base station accessing submodule, a network forbidding submodule and a network accessing submodule, wherein:
and the characteristic parameter acquisition submodule is used for acquiring the characteristic parameters of the pseudo base station.
And the base station forbidding submodule is used for forbidding the mobile terminal to access the base station corresponding to the characteristic parameter.
And the target base station access sub-module is used for trying to access the target base station corresponding to the other characteristic parameters except the characteristic parameters.
And the network forbidding submodule is used for forbidding the mobile terminal to access the 2G network and the 3G network.
And the network access sub-module is used for attempting to access the 4G network to enter the VOLTE mode.
And an alarm module 220, configured to send alarm information when the mobile terminal successfully accesses the target base station.
A control module 230, configured to control the mobile terminal to log off the network and enter a flight mode.
Further, the pseudo base station processing apparatus 200 further includes: duration detection module, length of time judgement module and mode release module, wherein:
and the duration detection module is used for detecting the duration of the mobile terminal entering the flight mode.
And the time length judging module is used for judging whether the time length is greater than the preset time length.
And the mode exit module is used for controlling the mobile terminal to exit the flight mode and access the network when the duration is longer than the preset duration.
Further, the pseudo base station processing apparatus 200 further includes: a first state monitoring module, a first determination module, a second state monitoring module, a second determination module, an operation monitoring module, and a third determination module, wherein:
and the first state monitoring module is used for monitoring the network connection state of the mobile terminal.
The first determining module is used for determining that the mobile terminal is attacked by the pseudo base station when the mobile terminal falls from a resident cell to a non-resident cell and receives a target short message. Further, the first determining module comprises: the attenuation value monitoring submodule, the attenuation value judging submodule and the first determining submodule, wherein:
and the attenuation value monitoring submodule is used for detecting the signal intensity attenuation value of the resident cell when the mobile terminal falls from the resident cell to the non-resident cell and receives the target short message.
And the attenuation value judgment submodule is used for judging whether the signal intensity attenuation value is smaller than a specified attenuation value or not.
And the first determining submodule is used for determining that the mobile terminal is attacked by the pseudo base station when the signal strength attenuation value is smaller than the specified attenuation value.
And the second state monitoring module is used for monitoring the network connection state of the mobile terminal.
And the second determining module is used for determining that the mobile terminal is attacked by the pseudo base station when the mobile terminal falls from the original cell to the new cell and receives the target short message. Further, the second determining module includes: an interference judgment sub-module and a second determination sub-module, wherein:
and the interference judgment submodule is used for judging whether the signal of the original cell is interfered or not when the mobile terminal falls from the original cell to a new cell and receives the target short message.
And the second determining submodule is used for determining that the mobile terminal is attacked by the pseudo base station when the signal of the original cell is interfered.
And the operation monitoring module is used for monitoring the operation acted on the mobile terminal.
And the third determining module is used for determining that the mobile terminal is attacked by the pseudo base station when the operation acting on the mobile terminal is not detected and the target short message is received.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, the coupling between the modules may be electrical, mechanical or other type of coupling.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Referring to fig. 12, a block diagram of a mobile terminal 100 according to an embodiment of the present disclosure is shown. The mobile terminal 100 may be a smart phone, a tablet computer, an electronic book, or other mobile terminal capable of running an application. The mobile terminal 100 in the present application may include one or more of the following components: a processor 110, a memory 120, a screen 130, and one or more applications, wherein the one or more applications may be stored in the memory 120 and configured to be executed by the one or more processors 110, the one or more programs configured to perform the methods as described in the aforementioned method embodiments.
Processor 110 may include one or more processing cores, among other things. The processor 110 interfaces with various components throughout the mobile terminal 100 using various interfaces and lines, and performs various functions of the mobile terminal 100 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 120 and invoking data stored in the memory 120. Alternatively, the processor 110 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 110 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 110, but may be implemented by a communication chip.
The Memory 120 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory 120 may be used to store instructions, programs, code sets, or instruction sets. The memory 120 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The storage data area may also store data created by the terminal 100 in use, such as a phonebook, audio-video data, chat log data, and the like.
Further, the screen 130 may be a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. The screen 130 is used to display information input by a user, information provided to the user, and various graphic user interfaces of the mobile terminal, which may be composed of graphics, text, icons, numbers, video, and any combination thereof.
Referring to fig. 13, a block diagram of a computer-readable storage medium according to an embodiment of the present application is shown. The computer-readable medium 300 has stored therein a program code that can be called by a processor to execute the method described in the above-described method embodiments.
The computer-readable storage medium 300 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 300 includes a non-volatile computer-readable storage medium. The computer readable storage medium 300 has storage space for program code 310 for performing any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 310 may be compressed, for example, in a suitable form.
To sum up, according to the pseudo base station processing method, the pseudo base station processing device, the mobile terminal and the storage medium provided in the embodiments of the present application, when it is detected that the mobile terminal is attacked by the pseudo base station, the connection with the pseudo base station is disconnected and an attempt is made to access a target base station, and when the mobile terminal successfully accesses the target base station, an alarm message is sent, so that the mobile terminal is controlled to log off the network to enter a flight mode, and thus, when the mobile terminal is attacked by the pseudo base station, the connection with the pseudo base station is disconnected and the target base station is connected to send the alarm message, and after the alarm message is sent, the network is logged off to perform the flight mode, so that the attack probability of the pseudo base station on.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (20)

  1. A pseudo base station processing method is applied to a mobile terminal, and comprises the following steps:
    when detecting that the mobile terminal is attacked by a pseudo base station, disconnecting the pseudo base station and trying to access a target base station;
    when the mobile terminal is successfully accessed to the target base station, sending alarm information;
    and controlling the mobile terminal to log off the network to enter a flight mode.
  2. The method of claim 1, wherein the disconnecting from the pseudo base station and attempting to access a target base station comprises:
    acquiring characteristic parameters of the pseudo base station;
    forbidding the mobile terminal to access the base station corresponding to the characteristic parameter;
    and trying to access the target base station corresponding to other characteristic parameters except the characteristic parameters.
  3. The method of claim 2, wherein the feature parameters comprise at least one of TAI, EARFCN, PCI, and CID.
  4. The method of claim 1, wherein the disconnecting from the pseudo base station and attempting to access a target pseudo base station comprises:
    forbidding the mobile terminal to access the 2G network and the 3G network;
    attempting to access the 4G network enters VOLTE mode.
  5. The method according to any of claims 1-4, wherein after controlling the mobile terminal to log off the network into an airplane mode, further comprising:
    detecting the time length of the mobile terminal entering the flight mode;
    judging whether the duration is greater than a preset duration or not;
    and when the duration is longer than the preset duration, controlling the mobile terminal to exit the flight mode and access the network.
  6. The method according to any of claims 1-5, wherein before disconnecting the pseudo base station and attempting to access the target base station when detecting that the mobile terminal is attacked by the pseudo base station, further comprising:
    monitoring the network connection state of the mobile terminal;
    and when the mobile terminal falls from a resident cell to a non-resident cell and receives a target short message, determining that the mobile terminal is attacked by the pseudo base station.
  7. The method of claim 6, wherein the determining that the mobile terminal is attacked by the pseudo base station when the mobile terminal falls from a resident cell to a non-resident cell and receives the target short message comprises:
    when the mobile terminal falls from a resident cell to a non-resident cell and receives a target short message, detecting a signal intensity attenuation value of the resident cell;
    judging whether the signal intensity attenuation value is smaller than a specified attenuation value or not;
    and when the signal strength attenuation value is smaller than the designated attenuation value, determining that the mobile terminal is attacked by a pseudo base station.
  8. The method according to any of claims 1-5, wherein before disconnecting the pseudo base station and attempting to access the target base station when detecting that the mobile terminal is attacked by the pseudo base station, further comprising:
    monitoring the network connection state of the mobile terminal;
    and when the mobile terminal falls from the original cell to the new cell and receives the target short message, determining that the mobile terminal is attacked by the pseudo base station.
  9. The method of claim 8, wherein the determining that the mobile terminal is attacked by the pseudo base station when the mobile terminal falls from an original cell to a new cell and receives a target short message comprises:
    when the mobile terminal falls from an original cell to a new cell and receives the target short message, judging whether the signal of the original cell is interfered;
    and when the signal of the original cell is interfered, determining that the mobile terminal is attacked by the pseudo base station.
  10. The method according to any of claims 1-5, wherein before disconnecting the pseudo base station and attempting to access the target base station when detecting that the mobile terminal is attacked by the pseudo base station, further comprising:
    monitoring an operation acting on the mobile terminal;
    and when the operation acting on the mobile terminal is not detected and the target short message is received, determining that the mobile terminal is attacked by the pseudo base station.
  11. The method according to claim 10, wherein the action on the mobile terminal comprises:
    the touch operation is acted on the mobile terminal; or
    And inputting voice information of the mobile terminal.
  12. The method of any one of claims 6-11, wherein receiving the target sms comprises:
    when the mobile terminal receives the short message, performing word segmentation on the short message content of the short message to obtain a plurality of word segmentation results;
    judging whether the word segmentation results comprise target keywords or not;
    and when the word segmentation results comprise the target keyword, determining that the mobile terminal receives the target short message.
  13. The method of claim 12, wherein the target keywords comprise at least one of account login, password modification, passcode, and money transfer.
  14. The method according to any one of claims 1-13, wherein said sending out an alarm message when the mobile terminal successfully accesses the target base station comprises:
    and when the mobile terminal is successfully accessed to the target base station, sending alarm information comprising the characteristic parameters of the pseudo base station.
  15. The method of claim 14, wherein the alert information comprises at least one of an alert phone and an alert text message.
  16. The method according to any of claims 1-15, wherein after controlling the mobile terminal to log off the network for an airplane mode, further comprising:
    and the mobile terminal outputs prompt information.
  17. The method according to claim 16, wherein the prompt message includes at least one of a characteristic parameter corresponding to the pseudo base station, an attack time of the pseudo base station, and an alarm record of the mobile terminal.
  18. A pseudo base station processing device is applied to a mobile terminal, and the device comprises:
    the disconnection module is used for disconnecting the connection with the pseudo base station and trying to access a target base station when the mobile terminal is detected to be attacked by the pseudo base station;
    the alarm module is used for sending alarm information when the mobile terminal is successfully accessed to the target base station;
    and the control module is used for controlling the mobile terminal to log off the network and enter a flight mode.
  19. A mobile terminal, comprising:
    a memory;
    one or more processors coupled with the memory;
    one or more programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of claims 1-17.
  20. A computer-readable storage medium having program code stored therein, the program code being invoked by a processor to perform the method of any one of claims 1 to 17.
CN201880097365.7A 2018-10-31 2018-10-31 Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium Active CN112673663B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/113209 WO2020087419A1 (en) 2018-10-31 2018-10-31 False base station processing method and apparatus, mobile terminal, and storage medium

Publications (2)

Publication Number Publication Date
CN112673663A true CN112673663A (en) 2021-04-16
CN112673663B CN112673663B (en) 2023-11-24

Family

ID=70464284

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880097365.7A Active CN112673663B (en) 2018-10-31 2018-10-31 Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium

Country Status (2)

Country Link
CN (1) CN112673663B (en)
WO (1) WO2020087419A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114615714A (en) * 2020-12-09 2022-06-10 中国移动通信有限公司研究院 Voice calling method, voice calling device, communication equipment and computer readable storage medium
CN114221778B (en) * 2021-10-21 2022-08-26 北京连山科技股份有限公司 Method for improving access security of wireless public network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105792215A (en) * 2016-04-29 2016-07-20 努比亚技术有限公司 Detection method of pseudo base station and terminal thereof
CN106231600A (en) * 2016-09-05 2016-12-14 努比亚技术有限公司 Terminal and information processing method
US20180309769A1 (en) * 2009-12-21 2018-10-25 Continental Automotive Systems, Inc. Apparatus and method for detecting a cloned base station

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7162285B2 (en) * 2003-09-19 2007-01-09 Raytheon Company Detector and method for detecting telephone-activated devices in idle state
CN105263142A (en) * 2014-07-14 2016-01-20 百度在线网络技术(北京)有限公司 Method and device for identifying pseudo base station
CN105472620A (en) * 2015-12-02 2016-04-06 广东南方通信建设有限公司 Pseudo base station alarm method and system
CN206775755U (en) * 2017-05-08 2017-12-19 深圳市格林维产品信息技术有限公司 A kind of anti-detection means of GPS location alarm

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180309769A1 (en) * 2009-12-21 2018-10-25 Continental Automotive Systems, Inc. Apparatus and method for detecting a cloned base station
CN105792215A (en) * 2016-04-29 2016-07-20 努比亚技术有限公司 Detection method of pseudo base station and terminal thereof
CN106231600A (en) * 2016-09-05 2016-12-14 努比亚技术有限公司 Terminal and information processing method

Also Published As

Publication number Publication date
CN112673663B (en) 2023-11-24
WO2020087419A1 (en) 2020-05-07

Similar Documents

Publication Publication Date Title
CN105873068B (en) Method and device for identifying pseudo base station
CN106488456B (en) Base station registration method and device and mobile terminal
CN110149599B (en) Short message protection method and terminal equipment
US10045166B2 (en) Method and device for identifying short messages from pseudo base stations
WO2020113530A1 (en) Communication processing method and apparatus, mobile terminal and storage medium
CN112806044B (en) Pseudo base station identification method and device, mobile terminal and storage medium
CN112673663B (en) Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium
US11736945B2 (en) Method for handling pseudo base station, mobile terminal, and storage medium
CN106714181B (en) Method and device for connecting WiFi hotspot
CN110072269B (en) Scanning control method, device, mobile terminal and storage medium
WO2019047170A1 (en) Pseudo base station identification method and terminal
US20210329519A1 (en) Cell Connection Processing Method and Mobile Terminal
WO2019052464A1 (en) Rogue base station recognition method and device, and computer readable storage medium
CN112789877B (en) Cell interference detection method, device, mobile terminal and storage medium
CN111338710A (en) Application program control method and device, electronic equipment and storage medium
CN112806043B (en) Pseudo base station identification method and device, mobile terminal and storage medium
WO2020007250A1 (en) Pseudo base station identification on-off control method and device, mobile terminal, and storage medium
CN110366184A (en) A kind of method and intelligent terminal identifying pseudo-base station note
US11812270B2 (en) Method for identifying pseudo base station, apparatus, and mobile terminal
WO2020087420A1 (en) Pseudo base station prevention method and apparatus, mobile terminal, and storage medium
CN112868247B (en) Cell connection processing method, device, mobile terminal and storage medium
CN112771907B (en) Pseudo base station identification method, pseudo base station identification device, mobile terminal and storage medium
CN105704780A (en) Wireless network access method and device
US20220053077A1 (en) Method for detecting the completion of a telephone call initiated from a web browser of a mobile communication device
WO2020087417A1 (en) Pseudo base station identification method and device, mobile terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant