CN112673663B - Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium - Google Patents
Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium Download PDFInfo
- Publication number
- CN112673663B CN112673663B CN201880097365.7A CN201880097365A CN112673663B CN 112673663 B CN112673663 B CN 112673663B CN 201880097365 A CN201880097365 A CN 201880097365A CN 112673663 B CN112673663 B CN 112673663B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- base station
- pseudo base
- target
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 44
- 238000012545 processing Methods 0.000 title claims abstract description 28
- 238000000034 method Methods 0.000 claims abstract description 43
- 238000012544 monitoring process Methods 0.000 claims description 29
- 230000011218 segmentation Effects 0.000 claims description 10
- 238000012795 verification Methods 0.000 claims description 6
- 230000004048 modification Effects 0.000 claims description 3
- 238000012986 modification Methods 0.000 claims description 3
- 238000012546 transfer Methods 0.000 claims description 2
- 238000010295 mobile communication Methods 0.000 description 15
- 238000010586 diagram Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000001514 detection method Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000007547 defect Effects 0.000 description 4
- 230000008520 organization Effects 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 238000011161 development Methods 0.000 description 3
- 230000018109 developmental process Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000009849 deactivation Effects 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the application discloses a pseudo base station processing method, a pseudo base station processing device, a mobile terminal and a storage medium, and relates to the technical field of mobile terminals. The method is applied to the mobile terminal, and comprises the following steps: when the mobile terminal is detected to be attacked by the pseudo base station, the connection with the pseudo base station is disconnected, the mobile terminal tries to access the target base station, and when the mobile terminal successfully accesses the target base station, alarm information is sent out to control the mobile terminal to log off the network and enter a flight mode. According to the pseudo base station processing method, the pseudo base station processing device, the mobile terminal and the storage medium, when the mobile terminal is detected to be attacked by the pseudo base station, the connection between the mobile terminal and the pseudo base station is disconnected, the target base station is connected to send alarm information, and the network is logged off to carry out a flight mode after the alarm information is sent, so that the attack probability of the pseudo base station to the mobile terminal is reduced, and the information safety of the mobile terminal is improved.
Description
Technical Field
The present application relates to the field of mobile terminals, and in particular, to a method and apparatus for processing a pseudo base station, a mobile terminal, and a storage medium.
Background
The fake base station is composed of a host and a notebook computer, and can search mobile phone card information in a certain radius range by using the mobile phone card information as a center through a short message mass transmitter, a short message transmitter and other equipment, and can forcibly send short messages such as fraud, advertisement promotion and the like to a user mobile phone by impersonating the mobile phone number of other people by using the mobile communication defect to form a base station of an operator.
Disclosure of Invention
In view of the above problems, the present application proposes a pseudo base station processing method, apparatus, mobile terminal and storage medium to solve the above problems.
In a first aspect, an embodiment of the present application provides a method for processing a pseudo base station, which is applied to a mobile terminal, where the method includes: disconnecting the connection with the pseudo base station and attempting to access a target base station when the mobile terminal is detected to be attacked by the pseudo base station; when the mobile terminal is successfully accessed to the target base station, alarm information is sent; and controlling the mobile terminal to log out of the network and enter a flight mode.
In a second aspect, an embodiment of the present application provides a pseudo base station processing apparatus, which is applied to a mobile terminal, and the apparatus includes: the disconnection module is used for disconnecting the connection with the pseudo base station and attempting to access a target base station when the mobile terminal is detected to be attacked by the pseudo base station; the alarm module is used for sending alarm information when the mobile terminal is successfully accessed to the target base station; and the control module is used for controlling the mobile terminal to log out of the network and enter a flight mode.
In a third aspect, an embodiment of the present application provides a mobile terminal, including: a memory; one or more processors coupled with the memory; one or more programs, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the above-described methods.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having program code stored therein, the program code being callable by a processor to perform the above method.
According to the pseudo base station processing method, the pseudo base station processing device, the mobile terminal and the storage medium, when the mobile terminal is detected to be attacked by the pseudo base station, connection with the pseudo base station is disconnected, the mobile terminal tries to access the target base station, when the mobile terminal successfully accesses the target base station, alarm information is sent, the mobile terminal is controlled to log out of the network to enter a flight mode, and therefore when the mobile terminal is detected to be attacked by the pseudo base station, the mobile terminal is disconnected from the pseudo base station, the target base station is connected, the alarm information is sent, and after the alarm information is sent, the network is logged out to carry out the flight mode, so that the attack probability of the pseudo base station to the mobile terminal is reduced, and the information security of the mobile terminal is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a system architecture of a mobile communication network according to an embodiment of the present application;
fig. 2 is a schematic diagram of a system architecture of another mobile communication network according to an embodiment of the present application;
fig. 3 is a schematic flow chart of a pseudo base station processing method according to an embodiment of the present application;
fig. 4 is a schematic flow chart of a pseudo base station processing method according to still another embodiment of the present application;
fig. 5 is a schematic flow chart of a pseudo base station processing method according to still another embodiment of the present application;
fig. 6 is a schematic flow chart of a pseudo base station processing method according to another embodiment of the present application;
fig. 7 is a flowchart schematically showing step S420 of the pseudo base station processing method shown in fig. 6 according to the present application;
fig. 8 is a schematic flow chart of a pseudo base station processing method according to still another embodiment of the present application;
Fig. 9 is a flowchart schematically showing step S520 of the pseudo base station processing method shown in fig. 8 according to the present application;
fig. 10 is a schematic flow chart of a pseudo base station processing method according to still another embodiment of the present application;
fig. 11 shows a block diagram of a pseudo base station processing apparatus provided by an embodiment of the present application;
fig. 12 shows a block diagram of an electronic device for performing a pseudo base station processing method according to an embodiment of the present application;
fig. 13 shows a memory unit for storing or carrying program codes for implementing the pseudo base station processing method according to the embodiment of the present application.
Detailed Description
In order to enable those skilled in the art to better understand the present application, the following description will make clear and complete descriptions of the technical solutions according to the embodiments of the present application with reference to the accompanying drawings.
With the development of mobile communication technology, mobile communication has undergone the development of multiple versions of 2G, 3G, and 4G. The base station is an important communication device, whether it is the GSM (Global System for Mobile Communication) mobile communication system or CDMA (Code Division Multiple Access) communication system of the early 2G age or the LTE (long term evolution ) system architecture of the later 4G age.
For example, a 2G mobile communication system architecture is schematically shown in fig. 1. The BTS base station 99 (Base Station Controller) is connected to the base station controller 98 as an access device for mobile communication, and then the base station controller 98 is connected to the mobile switching center 97, and the mobile switching center 97 is also connected to the public switched telephone network 96, etc. For example, the architecture of the 4G mobile communication system shown in fig. 2 is shown. The eNB base station 95 is connected to MME (Mobility Management Entity), i.e. the mobility management node 94, while the MME is connected to the serving gateway 93, which serving gateway 93 is in turn connected to the packet data gateway 92, which packet data gateway 92 is connected to the packet data network 91. As can be seen from fig. 1 and 2, in a mobile communication system, a base station has a relatively important role in the overall system architecture as a device for directly establishing a connection with a mobile terminal. The base station is generally referred to as a "public mobile communication base station", and is mainly used for providing signals for mobile terminals such as mobile phones and tablet computers. With the development of communication technology, the inventors found that a pseudo base station appears.
The fake base station is an illegal base station outside the mobile communication network, and is generally composed of a host computer and a notebook computer, and can search mobile phone card information in a certain radius range by taking a short message group transmitter, a short message transmitter and other related equipment, and by utilizing the defect of 2G mobile communication, the fake base station is used as an operator to impersonate the mobile phone number of other people to forcibly send short messages such as fraud, advertisement promotion and the like to the mobile phone of the user.
When the pseudo base station equipment operates, the wireless signal sent by the mobile terminal is forcedly connected to the equipment, so that the mobile terminal cannot normally use the service provided by an operator, the mobile terminal generally returns to normal after being temporarily disconnected for 8-12 seconds, and part of the mobile terminal can be restarted after being started and stopped. In addition, it may cause the mobile terminal user to frequently update the location, so that the wireless network resources in the area are tense and network congestion phenomenon occurs, which affects the normal communication of the user.
In order to solve the problems, the inventor has long studied and put forward the pseudo base station processing method, the pseudo base station processing device, the mobile terminal and the storage medium provided by the embodiment of the application, when the mobile terminal is attacked by the pseudo base station, the connection with the pseudo base station is disconnected, the target base station is connected to send alarm information, and after the alarm information is sent, the network is logged off to carry out a flight mode, so that the attack probability of the pseudo base station to the mobile terminal is reduced, and the information security of the mobile terminal is improved.
Examples
Referring to fig. 3, fig. 3 is a flow chart illustrating a pseudo base station processing method according to an embodiment of the present application, where the pseudo base station processing method is used for disconnecting a connection with a pseudo base station and connecting a target base station to send alarm information when a mobile terminal is attacked by the pseudo base station, and canceling a network to perform a flight mode after sending the alarm information, so as to reduce the attack probability of the pseudo base station to the mobile terminal and improve the information security of the mobile terminal. In a specific embodiment, the method for processing a pseudo base station is applied to the apparatus 200 for processing a pseudo base station shown in fig. 11 and the mobile terminal 100 (fig. 12) configured with the apparatus 200 for processing a pseudo base station, and a specific flow of the embodiment will be described below by taking the mobile terminal as an example, however, it will be understood that the mobile terminal to which the embodiment is applied may be a smart phone, a tablet computer, a wearable electronic device, etc., and is not limited specifically herein. The following details about the flow shown in fig. 3, the pseudo base station processing method specifically may include the following steps:
Step S110: and when the mobile terminal is detected to be attacked by the pseudo base station, disconnecting the mobile terminal from the pseudo base station and attempting to access a target base station.
Typically, a network air interface is used to enable information interaction between mobile terminals and base stations of a mobile communications network, and information on the network air interface is carried by various logical channels. The logical channels are divided into two major types, namely a Traffic Channel (TCH) and a Control Channel (CCH), wherein the TCH mainly transmits services, such as voice, data, etc., between the network and the mobile terminal; the CCH is a channel for transmitting signaling information and short packet data, a broadcast channel (BCH, broadcast Channel) in the CCH is used for transmitting information by broadcasting, and a broadcast control channel (BCCH, broadcast Control Channel) in the BCH is used for a base station broadcasting common information, such as a system message or the like, to a mobile terminal. Therefore, the mobile terminal can detect the base station by monitoring the broadcast information of the base station, and register with the base station according to the detected result.
However, the base station detected by the mobile terminal may include a pseudo base station, and thus the mobile terminal may register with the pseudo base station to be attacked by the pseudo base station. Therefore, as one way, it may be determined whether the base station to which the mobile terminal is registered is a pseudo base station, for example, the mobile terminal may acquire broadcast information of the base station, extract identification information of the base station from the broadcast information, and determine whether the base station is a pseudo base station according to the identification information. Specifically, the identification information may include a cell location area (TAC) of a base station cell corresponding to the base station, a location area code (LAC, location area code), a Cell Identity (CID), etc., so that, as a way, when the mobile terminal detects a new base station, a difference between the TAC/LAC/CID of the base station cell corresponding to the base station and the TAC/LAC/CID of a base station cell that has been successfully registered by the mobile terminal recently may be calculated, and if the difference is greater than a set threshold, it may be determined that the base station detected by the mobile terminal is a pseudo base station.
In this embodiment, when it is determined that the base station detected by the mobile terminal is a pseudo base station, whether the mobile terminal is attacked by the pseudo base station may be monitored. When the mobile terminal is detected to be attacked by the pseudo base station, the mobile terminal processes the attack of the pseudo base station as a response, and as a way, the mobile terminal can disconnect the connection with the pseudo base station and try to access the target base station. Specifically, when the mobile terminal is attacked by the pseudo base station, the pseudo base station is characterized in that the pseudo base station has acquired communication information keys such as imsi and tmsi of the user, the mobile terminal can be used for replacing the network of the mobile terminal and an operator to interact, receiving verification short messages and the like, and then stealing account funds, so that in order to protect property safety of the user of the mobile terminal, the mobile terminal can disconnect the connection with the pseudo base station and try to access a target base station to normally use the network, on one hand, the attack of the pseudo base station can be avoided, and on the other hand, alarm information can be sent after the network is normally used.
Step S120: and sending alarm information when the mobile terminal is successfully accessed to the target base station.
As a way, after disconnecting from the pseudo base station, the mobile terminal may re-detect surrounding base stations and select a base station to register according to the detection result, and it may be understood that the base station to which the mobile terminal re-registers may be the pseudo base station or may not be the pseudo base station, so that the mobile terminal may detect whether the detected base station or the registered base station is the pseudo base station, and when detecting that the detected or registered base station is not the pseudo base station, may determine that the mobile terminal successfully accesses the target base station, that is, when the mobile terminal is connected to a certain base station and can normally use the network, it is characterized that the mobile terminal successfully accesses the target base station.
Further, when the mobile terminal is successfully accessed to the target base station, the mobile terminal can be used for normal network usage, the mobile terminal can send alarm information to the public security organization, so that the public security organization can inform the public security organization of attack time, attack place, attack mode, other characteristic information and the like of the pseudo base station, the public security organization can remove the pseudo base station according to the alarm information of the mobile terminal, and the information security of a user of the mobile terminal can be reported. The alarm information can comprise an alarm telephone and/or an alarm short message.
As an implementation manner, when the mobile terminal successfully accesses the target base station, the mobile terminal can automatically generate alarm information, for example, automatically edit an alarm short message or automatically jump to an alarm telephone dialing interface, and then send out inquiry information to inquire whether a user sends out the alarm information, and it can be understood that when detecting an operation for indicating to confirm to send out the alarm information, the mobile terminal sends the alarm information to a public security mechanism as a response; when detecting an operation indicating that the alarm information is confirmed not to be sent out, the mobile terminal deletes the alarm information as a response.
Step S130: and controlling the mobile terminal to log out of the network and enter a flight mode.
Specifically, because the pseudo base station exists in the area where the mobile terminal is located and the pseudo base station attacks the mobile terminal through the 2G network or the 3G network generally, the possibility that the mobile terminal is attacked by the pseudo base station again at any time exists in the network using process in the area, so that the mobile terminal can be controlled to log off the network to enter a flight mode in order to avoid being attacked by the pseudo base station again, the mobile terminal can be prevented from being attacked by the pseudo base station through the 2G network or the 3G network, and the information security of the mobile terminal is improved.
According to the pseudo base station processing method provided by the embodiment of the application, when the mobile terminal is detected to be attacked by the pseudo base station, the connection with the pseudo base station is disconnected, the mobile terminal tries to access the target base station, when the mobile terminal successfully accesses the target base station, alarm information is sent, the mobile terminal is controlled to log off the network to enter the flight mode, so that when the mobile terminal is detected to be attacked by the pseudo base station, the connection between the mobile terminal and the pseudo base station is disconnected, the target base station is connected, the alarm information is sent, and the network is logged off to carry out the flight mode after the alarm information is sent, so that the attack probability of the pseudo base station to the mobile terminal is reduced, and the information security of the mobile terminal is improved.
Referring to fig. 4, fig. 4 is a flow chart illustrating a pseudo base station processing method according to another embodiment of the present application. The following details the flow shown in fig. 4, and the pseudo base station processing method specifically includes the following steps:
step S210: and when the mobile terminal is detected to be attacked by the pseudo base station, acquiring the characteristic parameters of the pseudo base station.
In this embodiment, when it is determined that the mobile terminal is attacked by the pseudo base station, the characteristic parameter of the pseudo base station may be obtained, where the characteristic parameter may include at least one of a location area identifier (TAI, tracking Area Identity), an absolute video channel number (EARFCN, eutra absolute radio frequency channel number), a physical element identifier (PCI, physical cell identity), and a cell identity (CID, cell identity), and of course, the characteristic parameter corresponding to the pseudo base station may also include other parameters, which are not described herein again. It will be appreciated that the characteristic parameter may be used to identify a pseudo base station, wherein a characteristic parameter may correspond to a plurality of base stations, and thus a base station may be considered to be a pseudo base station when the characteristic parameter of the base station and the characteristic parameter of the pseudo base station are identical.
Step S220: and prohibiting the mobile terminal from accessing the base station corresponding to the characteristic parameter.
It will be appreciated that, since the base station corresponding to the characteristic parameter may be a pseudo base station, in order to reduce or even avoid the possibility that the mobile terminal accesses the pseudo base station and is attacked by the pseudo base station, the mobile terminal may be prohibited from accessing all the base stations corresponding to the characteristic parameter. That is, the mobile terminal may obtain the feature parameters corresponding to all the detected base stations, and then compare the feature parameters of the detected base stations with the feature parameters of the pseudo base stations to determine whether the feature parameters of the detected base stations are consistent with the feature parameters of the pseudo base stations, and it may be understood that when the feature parameters of the detected base stations are consistent with the feature parameters of the pseudo base stations, it is determined that the base station detected by the mobile terminal may be the pseudo base station, and then the mobile terminal is prohibited from accessing the base station; when the detected characteristic parameters of the base station are inconsistent with the characteristic parameters of the pseudo base station, the probability that the base station detected by the mobile terminal is not the pseudo base station or the pseudo base station is low is determined, and the mobile terminal is allowed to access the base station.
Step S230: and attempting to access the target base station corresponding to the characteristic parameters except the characteristic parameters.
Further, the base station detected by the mobile terminal is analyzed to obtain the characteristic parameters of each base station, the base station with the characteristic parameters consistent with the characteristic parameters of the pseudo base station is obtained from the characteristic parameters, then the target base stations corresponding to other characteristic parameters except the base station with the characteristic parameters consistent with the characteristic parameters of the pseudo base station in the detected base station are tried to be accessed, and the possibility that the mobile terminal is accessed to the pseudo base station is reduced.
For example, assume that the characteristic parameter of the pseudo base station is N1, and the base stations detected by the mobile terminal include a base station A1, a base station A2, a base station A3, and a base station A4, where the characteristic parameter of the base station A1 is N1, the characteristic parameter of the base station A2 is N2, the characteristic parameter of the base station A3 is N1, and the characteristic parameter of the base station A4 is N3. Then, it may be determined that the characteristic parameters of the base station A1 and the base station A3 are consistent with the characteristic parameters of the pseudo base station, and then the base station A1 and the base station A3 may also be pseudo base stations, and meanwhile, it may be determined that the characteristic parameters of the base station A2 and the base station A4 are inconsistent with the characteristic parameters of the pseudo base station, and then the base station A2 and the base station A4 are not pseudo base stations or are pseudo base stations with a lower probability, so that the mobile terminal may be controlled to attempt to access the base station A2 or the base station A4, and the possibility of the mobile terminal accessing the pseudo base station is reduced.
Step S240: and when the mobile terminal is successfully accessed to the target base station, sending out alarm information comprising characteristic parameters of the pseudo base station.
As one way, the alarm information sent by the mobile terminal may include a characteristic parameter of the pseudo base station, for example, at least one of a location area identifier (TAI, tracking Area Identity), an absolute video channel number (EARFCN, eutra absolute radio frequency channel number), a physical element identifier (PCI, physical cell identity), and a Cell Identity (CID), so as to facilitate a public security authority to quickly locate the pseudo base station for timely processing.
Step S250: and controlling the mobile terminal to log out of the network and enter a flight mode.
As an implementation manner, after the mobile terminal is controlled to log out of the network and enter the flight mode, the mobile terminal may record at least one of a feature parameter corresponding to the pseudo base station, an attack time of the pseudo base station, and alarm information of the mobile terminal, and then generate prompt information based on the feature parameter corresponding to the pseudo base station, the attack time of the pseudo base station, and the alarm information of the mobile terminal, and output the prompt information through the mobile terminal, where the prompt information may be output through a mode of displaying on the mobile terminal, may be output through a mode of voice broadcasting of the mobile terminal, and the like, and is not limited herein.
Step S260: and detecting the time length of the mobile terminal entering the flight mode.
In this embodiment, after the mobile terminal is controlled to enter the flight mode, the monitoring and recording of the time length of the mobile terminal entering the flight mode are started, where the monitoring mode may include real-time monitoring, interval preset time length monitoring, or time interval monitoring set by the user, and optionally, in order to improve accuracy of the time length obtained by monitoring, the real-time monitoring mode may be adopted.
Step S270: judging whether the duration is longer than a preset duration.
As a way, the mobile terminal sets a preset duration, which is used as a basis for judging the duration of the mobile terminal entering the flight mode, it can be understood that the preset duration may be stored locally in advance by the mobile terminal, or may be set when judging, which is not limited herein. The preset duration may be configured automatically by the mobile terminal, may be set manually by a user corresponding to the mobile terminal, or may be configured by a server connected to the mobile terminal and then sent to the mobile terminal, which is not limited herein. Further, after the time length of the mobile terminal entering the flight mode is obtained, the time length is compared with a preset time length to judge whether the time length is greater than the preset time length.
Step S280: and when the duration is longer than the preset duration, controlling the mobile terminal to exit the flight mode and access a network.
It can be appreciated that when the duration is greater than the preset duration, the pseudo base station can be considered to have been processed or the mobile terminal has left the area where the pseudo base station is located within the duration, so that the mobile terminal can be controlled to exit the flight mode and normally access the network, so as to ensure the normal network usage of the mobile terminal.
As another way, the position information of the mobile terminal when entering the flight mode can be obtained first, the position information of the mobile terminal after entering the flight mode can be detected, the position information of the mobile terminal after entering the flight mode and the position information when entering the flight mode can be compared to obtain the difference value between the position information of the mobile terminal after entering the flight mode and the position information when entering the flight mode, and then the difference value is compared with a preset difference value, wherein when the difference value is larger than the preset difference value, the mobile terminal is characterized to be moved out of the range covered by the pseudo base station after entering the flight mode, and the mobile terminal can be controlled to exit the flight mode and access the network; and when the difference value is not larger than the preset difference value, the mobile terminal is characterized to not move or not move out of the range covered by the pseudo base station after entering the flight mode, and the mobile terminal is controlled to keep the flight mode, so that the mobile terminal is prevented from being attacked by the pseudo base station again.
According to the pseudo base station processing method provided by the further embodiment of the application, when the mobile terminal is detected to be attacked by the pseudo base station, the characteristic parameters of the pseudo base station are obtained, the mobile terminal is forbidden to access to the base station corresponding to the characteristic parameters, the mobile terminal is tried to access to the target base station corresponding to the characteristic parameters except the characteristic parameters, when the mobile terminal is successfully accessed to the target base station, the alarm information comprising the characteristic parameters is sent, the mobile terminal is controlled to log off the network to enter a flight mode, the time length of the mobile terminal logging off the network to enter the flight mode is detected, whether the time length is longer than the preset time length is judged, and when the time length is longer than the preset time length, the mobile terminal is controlled to log off the flight mode and access the network. Compared with the pseudo base station processing method shown in fig. 3, the method reduces the probability of the mobile terminal accessing the pseudo base station by prohibiting the base station corresponding to the characteristic parameter of the pseudo base station, and ensures the normal network usage of the mobile terminal by exiting the flight mode and accessing the network when the duration of the mobile terminal entering the flight mode is longer than the preset duration.
Referring to fig. 5, fig. 5 is a flowchart illustrating a pseudo base station processing method according to still another embodiment of the present application. The following details the flow shown in fig. 5, and the pseudo base station processing method specifically includes the following steps:
Step S310: and prohibiting the mobile terminal from accessing the 2G network and the 3G network when the mobile terminal is detected to be attacked by the pseudo base station.
In general, the pseudo base station uses the technical defect of a 2G network or a 3G network, and by disguising as a base station of an operator, the pseudo base station forcible sends short messages such as fraud, advertisement promotion and the like to a mobile phone of a user by using the mobile phone number of other people. In this embodiment, when it is detected that the mobile terminal is attacked by the pseudo base station, the mobile terminal is represented as being currently in a state of accessing to the 2G network or the 3G network, so in order to release the attack of the pseudo base station on the mobile terminal, the mobile terminal may be prohibited from accessing to the 2G network and the 3G network, thereby prohibiting the pseudo base station from attacking the mobile terminal by using the technical defect of the 2G network or the 3G network, and avoiding the mobile terminal from registering on the pseudo base station.
Step S320: attempting to access the 4G network enters the VOLTE mode.
Further, since the pseudo base stations adopted by most illegal molecules are the 2G network and the 3G network, and only few pseudo base stations adopted by the 4G network, for example, the pseudo base stations adopted by the security monitoring system are the 4G network, however, the pseudo base stations are used for performing security monitoring on the mobile terminal, and no property loss is caused to the user of the mobile terminal, as a way, after the mobile terminal is forbidden to access the 2G network and the 3G network, the mobile terminal can be set to be connected with the 4G network to enter the VOLTE mode, wherein the VOLTE is Voice over lte and is Voice service based on the IMS. The method is an IP data transmission technology, a 2G network/3G network is not needed, all the services are loaded on a 4G network, and unification of data and voice services under the same network can be realized. Specifically, the mobile terminal is always in a state of being connected with the 4G network and is not allowed to be switched to a state of being connected with the 2G network and the 3G network within a specified duration, so that a pseudo base station adopted by an illegal molecule can be prevented from attacking the mobile terminal through the 2G network or the 3G network, and the mobile terminal is allowed to normally surf the Internet at the same time.
It should be noted that the mobile terminal may also enter an IMS mode, where the IMS mode includes a VOLTE mode, a VOWIFI mode, and even a VO5G mode, which is not limited herein.
Step S330: and sending alarm information when the mobile terminal is successfully accessed to the target base station.
Further, when it is determined that the mobile terminal successfully accesses the 4G network, the mobile terminal can be considered to successfully access the target base station, and the mobile terminal sends out alarm information as a response.
Step S340: and controlling the mobile terminal to log out of the network and enter a flight mode.
Step S350: and detecting the time length of the mobile terminal entering the flight mode.
Step S360: judging whether the duration is longer than a preset duration.
Step S370: and when the duration is longer than the preset duration, controlling the mobile terminal to exit the flight mode and access a network.
According to the pseudo base station processing method provided by the further embodiment of the application, when the mobile terminal is detected to be attacked by the pseudo base station, the mobile terminal is forbidden to access the 2G network and the 3G network, the 4G network is tried to access the VOLTE mode, when the mobile terminal is successfully accessed to the target base station, alarm information is sent, the mobile terminal is controlled to log off the network to enter the flight mode, the duration of the mobile terminal entering the flight mode is detected, whether the duration is longer than the preset duration is judged, and when the duration is longer than the preset duration, the mobile terminal is controlled to exit the flight mode and access the network. Compared with the pseudo base station processing method shown in fig. 3, the method of the embodiment reduces the probability of the mobile terminal accessing the pseudo base station by prohibiting the mobile terminal from accessing the 2G network and the 3G network and attempting to access the 4G network, and ensures the normal network use of the mobile terminal by exiting the flight mode and accessing the network when the duration of the mobile terminal entering the flight mode is longer than the preset duration.
Referring to fig. 6, fig. 6 is a flow chart illustrating a pseudo base station processing method according to another embodiment of the application. The following details the flow shown in fig. 6, and the pseudo base station processing method specifically includes the following steps:
step S410: and monitoring the network connection state of the mobile terminal.
In this embodiment, the network connection state of the mobile terminal is monitored first, and it can be understood that the network connection state of the mobile terminal may include a connected state and a non-connected state, where the non-connected state includes a non-connected state and an in-connection state. As one way, whether the mobile terminal is in the network connection state may be determined by looking at the state value of the mobile terminal, in particular, in one embodiment, when the mobile terminal is in the network connection state, the mobile terminal may generate a first state value, and when the mobile terminal is in the non-network connection state, the mobile terminal may generate a second state value, so that the network connection state of the mobile terminal may be monitored by monitoring the first state value and the second state value.
In addition, after determining that the mobile terminal is in the network connection state, the change of the network to which the mobile terminal is connected may also be monitored, for example, whether the mobile terminal drops from a resident cell to a non-resident cell, whether the mobile terminal drops from an original cell to a new cell, etc., which are not limited herein.
Step S420: and when the mobile terminal falls from the resident cell to the non-resident cell and receives the target short message, determining that the mobile terminal is attacked by the pseudo base station.
When the mobile terminal is monitored to drop from the resident cell to the non-resident cell, detecting whether the mobile terminal receives the short message, wherein if the mobile terminal drops from the resident cell to the non-resident cell and receives the short message, the short message is identified to judge whether the short message is a target short message, in the embodiment, when the short message is the target short message, the mobile terminal can be determined to be attacked by the pseudo base station, and when the short message is not the target short message, the mobile terminal can be determined not to be attacked by the pseudo base station.
When the mobile terminal falls from the resident cell to the non-resident cell and receives the short message, the short message content of the short message is segmented to obtain a plurality of segmentation results, and then whether the plurality of segmentation results comprise target keywords is judged, wherein when the plurality of segmentation results comprise the target keywords, the short message received by the mobile terminal can be determined to be the target short message. In this embodiment, the target keyword may include at least one of account login, password modification, verification code, and transfer. For example, the content of the short message is "you apply for registration of a mobile phone number and the verification code is 000000" in the year of the month of the year, and then, as a way, the content of the short message is segmented to obtain "you", "month of the year", "apply for", "mobile phone", "number", "registration", "verification code", "yes", "000000", and then, the segmentation result is compared with the pre-stored target keyword to determine whether the segmentation result includes the target keyword, and it can be understood that the content of the short message includes the target keyword, that is, it is determined that the mobile terminal receives the target short message, that is, the mobile terminal is attacked by the pseudo base station, because the segmentation result includes the keyword "verification code".
Referring to fig. 7, fig. 7 is a flowchart illustrating a step S420 of the pseudo base station processing method shown in fig. 6 according to the present application. The following will describe the flow chart shown in fig. 7 in detail, and the method specifically may include the following steps:
step S421: and detecting a signal strength attenuation value of the resident cell when the mobile terminal drops from the resident cell to the non-resident cell and receives the target short message.
As an implementation, when the mobile terminal drops from a resident cell to a very resident cell and receives a target short message, the signal strength attenuation value of the resident cell may be detected. Specifically, when the mobile terminal resides in a resident cell, the signal intensity of the resident cell is monitored to acquire a first signal intensity value of the resident cell in real time, after the mobile terminal falls from the resident cell to the non-resident cell, the signal intensity of the resident cell is detected to acquire a second signal intensity, and then the difference value between the first signal intensity value and the second signal intensity value is calculated to acquire a signal intensity attenuation value of the resident cell.
Step S422: and judging whether the signal strength attenuation value is smaller than a designated attenuation value.
As a way, the mobile terminal sets a specified attenuation value, which is used as a basis for determining the signal strength attenuation value of the resident cell, it can be understood that the specified attenuation value may be stored locally in advance by the mobile terminal, or may be set again at the time of determination, which is not limited herein. The specified attenuation value may be automatically configured by the mobile terminal, may be manually set by a user corresponding to the mobile terminal, or may be configured by a server connected to the mobile terminal and then sent to the mobile terminal, which is not limited herein. Further, after the signal strength attenuation value of the resident cell is obtained, the signal strength attenuation value of the resident cell is compared with a specified attenuation value to determine whether the signal strength attenuation value of the resident cell is less than the specified attenuation value.
Step S423: and when the signal strength attenuation value is smaller than the designated attenuation value, determining that the mobile terminal is attacked by a pseudo base station.
Wherein upon determining that the signal strength attenuation value of the resident cell is less than the specified attenuation value, the signal characterizing the resident cell is not weakened, i.e., the mobile terminal is not dropped to the resident cell due to the resident cell signal attenuation, but is due to the intervention of a pseudo base station, and thus, it can be determined that the mobile terminal is attacked by the pseudo base station.
Step S430: and when the mobile terminal is detected to be attacked by the pseudo base station, disconnecting the mobile terminal from the pseudo base station and attempting to access a target base station.
Step S440: and sending alarm information when the mobile terminal is successfully accessed to the target base station.
Step S450: and controlling the mobile terminal to log out of the network and enter a flight mode.
The specific description of step S430 to step S450 is referred to step S110 to step S130, and will not be repeated here.
According to the pseudo base station processing method provided by the other embodiment of the application, the network connection state of the mobile terminal is monitored, when the mobile terminal falls from a resident cell to a very resident cell and receives a target short message, the mobile terminal is determined to be attacked by the pseudo base station, when the mobile terminal is detected to be attacked by the pseudo base station, the connection with the pseudo base station is disconnected and the target base station is tried to be accessed, when the mobile terminal is successfully accessed to the target base station, new alarm information is sent, and the mobile terminal is controlled to log off the network and enter a flight mode. Compared with the pseudo base station processing method shown in fig. 3, the embodiment determines that the mobile terminal is attacked by the pseudo base station when the mobile terminal is monitored to drop from the resident cell to the non-resident cell and the target short message is received, so as to reduce the attack of the mobile terminal by the pseudo base station.
Referring to fig. 8, fig. 8 is a flow chart illustrating a pseudo base station processing method according to still another embodiment of the present application. The following details the flow shown in fig. 8, and the pseudo base station processing method specifically includes the following steps:
step S510: and monitoring the network connection state of the mobile terminal.
Step S520: and when the mobile terminal falls from the original cell to the new cell and receives the target short message, determining that the mobile terminal is attacked by the pseudo base station.
When the mobile terminal is monitored to drop from the original cell to the new cell, whether the mobile terminal receives the short message is detected, wherein if the mobile terminal drops from the original cell to the new cell and receives the short message, the short message is identified to judge whether the short message is a target short message, in the embodiment, when the short message is the target short message, the mobile terminal can be determined to be attacked by the pseudo base station, and when the short message is not the target short message, the mobile terminal can be determined not to be attacked by the pseudo base station. The detection method of the target short message is described in step S420, and is not described herein.
Referring to fig. 9, fig. 9 is a flowchart illustrating a step S520 of the pseudo base station processing method shown in fig. 8 according to the present application. The following will describe the flow chart shown in fig. 9 in detail, and the method specifically may include the following steps:
Step S521: when the mobile terminal drops from an original cell to a new cell and receives the target short message, judging whether the signal of the original cell is interfered.
As one embodiment, when the mobile terminal drops from the original cell to the new cell and receives the target short message, it is determined whether the signal of the original cell is interfered. Specifically, the signal of the original cell in the time when the mobile terminal resides in the original cell can be monitored in real time, and the signal of the original cell in the process that the mobile terminal falls from the original cell to the new cell can be monitored in real time, wherein when the signal of the original cell is monitored to have larger fluctuation, the signal of the original cell can be determined to be interfered, for example, when the signal of the original cell is monitored to suddenly weaken at a certain moment, the signal of the original cell can be determined to be interfered.
Step S522: and when the signal of the original cell is interfered, determining that the mobile terminal is attacked by the pseudo base station.
If the judgment result indicates that the signal of the original cell is interfered, the mobile terminal can be considered to fall from the original cell to the new cell in a normal mode, but the signal of the original cell is interfered, and the interference is possibly caused by the pseudo base station, so that the mobile terminal can be determined to be attacked by the pseudo base station.
Step S530: and when the mobile terminal is detected to be attacked by the pseudo base station, disconnecting the mobile terminal from the pseudo base station and attempting to access a target base station.
Step S540: and sending alarm information when the mobile terminal is successfully accessed to the target base station.
Step S550: and controlling the mobile terminal to log out of the network and enter a flight mode.
The specific description of step S530 to step S550 refer to step S110 to step S130, and are not repeated here.
In the pseudo base station processing method provided by the still another embodiment of the application, the network connection state of the mobile terminal is monitored, when the mobile terminal falls from an original cell to a new cell and receives a target short message, the mobile terminal is determined to be attacked by the pseudo base station, when the mobile terminal is detected to be attacked by the pseudo base station, the connection with the pseudo base station is disconnected and the target base station is tried to be accessed, when the mobile terminal is successfully accessed to the target base station, alarm information is sent, and the mobile terminal is controlled to log off the network and enter a flight mode. Compared with the pseudo base station processing method shown in fig. 3, in the embodiment, when the mobile terminal is monitored to drop from the original cell to the new cell and the target short message is received, the mobile terminal is determined to be attacked by the pseudo base station, so that the attack of the mobile terminal by the pseudo base station is reduced.
Referring to fig. 10, fig. 10 is a flow chart illustrating a pseudo base station processing method according to still another embodiment of the present application. The following details the flow shown in fig. 10, and the pseudo base station processing method specifically includes the following steps:
step S610: an operation acting on the mobile terminal is monitored.
In this embodiment, the operation applied to the mobile terminal may include a touch operation applied to the mobile terminal or inputting voice information of the mobile terminal, which is not limited herein. The touch operation may include screen touch, key clicking, gravity sensing change, screen deactivation, and the like, where the screen touch includes large area pressing, continuous long pressing, continuous extra long pressing, double-finger long pressing, copying, multi-finger continuous clicking, and the like, where the large area pressing refers to the pressing area exceeding the preset area, the continuous long pressing refers to the continuous pressing time exceeding the preset time, the continuous extra long pressing refers to the pressing time exceeding the preset extra long time, the double-finger long pressing refers to the double-finger simultaneous pressing time exceeding the preset time, copying refers to copying content to the pasting board, and the multi-finger continuous connection refers to the continuous clicking times exceeding the preset times.
Step S620: and when the operation acting on the mobile terminal is not detected and the target short message is received, determining that the mobile terminal is attacked by the pseudo base station.
When the operation acting on the mobile terminal is not detected and the target short message is received, the user is characterized to automatically receive the target short message under the condition that the mobile terminal is not operated, that is, the target short message is not a result fed back based on the request operation of the user, but is possibly caused by the attack of the pseudo base station on the mobile terminal, and then the mobile terminal can be determined to be attacked by the pseudo base station. The detection method of the target short message is described in step S420, and is not described herein.
Step S630: and when the mobile terminal is detected to be attacked by the pseudo base station, disconnecting the mobile terminal from the pseudo base station and attempting to access a target base station.
Step S640: and sending alarm information when the mobile terminal is successfully accessed to the target base station.
Step S650: and controlling the mobile terminal to log out of the network and enter a flight mode.
According to the pseudo base station processing method provided by the application, the operation on the mobile terminal is monitored, when the operation on the mobile terminal is not detected and the target short message is received, the mobile terminal is determined to be attacked by the pseudo base station, when the mobile terminal is detected to be attacked by the pseudo base station, the connection with the pseudo base station is disconnected and the target base station is tried to be accessed, when the mobile terminal is successfully accessed to the target base station, alarm information is sent, and the mobile terminal is controlled to log off the network to perform the flight mode. Compared with the pseudo base station processing method shown in fig. 3, the embodiment determines that the mobile terminal is attacked by the pseudo base station when the mobile terminal does not detect the operation acting on the mobile terminal and receives the target short message, so as to reduce the attack of the mobile terminal by the pseudo base station.
Referring to fig. 11, fig. 11 is a block diagram illustrating a pseudo base station processing apparatus 200 according to an embodiment of the present application. The pseudo base station processing apparatus 200 is applied to the above-described mobile terminal, and will be explained below with respect to a block diagram shown in fig. 11, the pseudo base station processing apparatus 200 including: a disconnect module 210, an alarm module 220, and a control module 230, wherein:
and the disconnection module 210 is configured to disconnect the connection with the pseudo base station and attempt to access the target base station when the mobile terminal is detected to be attacked by the pseudo base station. Further, the disconnect module 210 is shown to include: the system comprises a characteristic parameter acquisition sub-module, a base station prohibition sub-module, a target base station access sub-module, a network prohibition sub-module and a network access sub-module, wherein:
and the characteristic parameter acquisition sub-module is used for acquiring the characteristic parameters of the pseudo base station.
And the base station prohibiting sub-module is used for prohibiting the mobile terminal from accessing the base station corresponding to the characteristic parameter.
And the target base station access submodule is used for attempting to access the target base station corresponding to the characteristic parameters except the characteristic parameters.
And the network prohibiting sub-module is used for prohibiting the mobile terminal from accessing the 2G network and the 3G network.
And the network access submodule is used for attempting to access the 4G network and entering the VOLTE mode.
And the alarm module 220 is configured to send alarm information when the mobile terminal successfully accesses the target base station.
And the control module 230 is used for controlling the mobile terminal to log off the network and enter the flight mode.
Further, the pseudo base station processing apparatus 200 further includes: the device comprises a duration detection module, a duration judgment module and a mode push module, wherein:
and the duration detection module is used for detecting the duration of the mobile terminal entering the flight mode.
And the duration judging module is used for judging whether the duration is greater than a preset duration.
And the mode exit module is used for controlling the mobile terminal to exit the flight mode and access the network when the duration is longer than the preset duration.
Further, the pseudo base station processing apparatus 200 further includes: the system comprises a first state monitoring module, a first determining module, a second state monitoring module, a second determining module, an operation monitoring module and a third determining module, wherein:
and the first state monitoring module is used for monitoring the network connection state of the mobile terminal.
And the first determining module is used for determining that the mobile terminal is attacked by the pseudo base station when the mobile terminal falls from the resident cell to the non-resident cell and receives the target short message. Further, the first determining module includes: the device comprises an attenuation value monitoring sub-module, an attenuation value judging sub-module and a first determining sub-module, wherein:
And the attenuation value monitoring sub-module is used for detecting the attenuation value of the signal strength of the resident cell when the mobile terminal drops from the resident cell to the non-resident cell and receives the target short message.
And the attenuation value judging submodule is used for judging whether the signal strength attenuation value is smaller than a designated attenuation value or not.
A first determining sub-module, configured to determine that the mobile terminal is attacked by a pseudo base station when the signal strength attenuation value is less than the specified attenuation value.
And the second state monitoring module is used for monitoring the network connection state of the mobile terminal.
And the second determining module is used for determining that the mobile terminal is attacked by the pseudo base station when the mobile terminal falls from the original cell to the new cell and receives the target short message. Further, the second determining module includes: an interference determination sub-module and a second determination sub-module, wherein:
and the interference judging sub-module is used for judging whether the signal of the original cell is interfered or not when the mobile terminal drops from the original cell to the new cell and receives the target short message.
And the second determining submodule is used for determining that the mobile terminal is attacked by the pseudo base station when the signal of the original cell is interfered.
And the operation monitoring module is used for monitoring the operation acted on the mobile terminal.
And the third determining module is used for determining that the mobile terminal is attacked by the pseudo base station when the operation acting on the mobile terminal is not detected and the target short message is received.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus and modules described above may refer to the corresponding process in the foregoing method embodiment, which is not repeated herein.
In several embodiments provided by the present application, the coupling of the modules to each other may be electrical, mechanical, or other.
In addition, each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module. The integrated modules may be implemented in hardware or in software functional modules.
Referring to fig. 12, a block diagram of a mobile terminal 100 according to an embodiment of the present application is shown. The mobile terminal 100 may be a mobile terminal capable of running an application program such as a smart phone, a tablet computer, an electronic book, etc. The mobile terminal 100 of the present application may include one or more of the following components: processor 110, memory 120, screen 130, and one or more application programs, wherein the one or more application programs may be stored in memory 120 and configured to be executed by the one or more processors 110, the one or more program(s) configured to perform the method as described in the foregoing method embodiments.
Wherein the processor 110 may include one or more processing cores. The processor 110 connects various parts within the overall mobile terminal 100 using various interfaces and lines, performs various functions of the mobile terminal 100 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 120, and invoking data stored in the memory 120. Alternatively, the processor 110 may be implemented in hardware in at least one of digital signal processing (Digital Signal Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA). The processor 110 may integrate one or a combination of several of a central processing unit (Central Processing Unit, CPU), a graphics processor (Graphics Processing Unit, GPU), and a modem, etc. The CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for being responsible for rendering and drawing of display content; the modem is used to handle wireless communications. It will be appreciated that the modem may not be integrated into the processor 110 and may be implemented solely by a single communication chip.
The Memory 120 may include a random access Memory (Random Access Memory, RAM) or a Read-Only Memory (Read-Only Memory). Memory 120 may be used to store instructions, programs, code, sets of codes, or sets of instructions. The memory 120 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described below, etc. The storage data area may also store data created by the terminal 100 in use (such as phonebook, audio-video data, chat-record data), etc.
Further, the screen 130 may be a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like. The screen 130 is for displaying information input by a user, information provided to the user, and various graphical user interfaces of the mobile terminal, which may be composed of graphics, text, icons, numbers, video, and any combination thereof.
Referring to fig. 13, a block diagram of a computer readable storage medium according to an embodiment of the present application is shown. The computer readable medium 300 has stored therein program code which can be invoked by a processor to perform the methods described in the method embodiments described above.
The computer readable storage medium 300 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Optionally, the computer readable storage medium 300 comprises a non-volatile computer readable medium (non-transitory computer-readable storage medium). The computer readable storage medium 300 has storage space for program code 310 that performs any of the method steps described above. The program code can be read from or written to one or more computer program products. Program code 310 may be compressed, for example, in a suitable form.
In summary, the method, the device, the mobile terminal and the storage medium for processing the pseudo base station provided by the embodiment of the application disconnect the connection with the pseudo base station and try to access the target base station when the mobile terminal is attacked by the pseudo base station, and send out alarm information when the mobile terminal is successfully accessed to the target base station, and control the mobile terminal to log off the network to enter the flight mode, so that when the mobile terminal is attacked by the pseudo base station, the connection with the pseudo base station is disconnected, the target base station is connected to send the alarm information, and the network is logged off to carry out the flight mode after the alarm information is sent, thereby reducing the attack probability of the pseudo base station to the mobile terminal and improving the information security of the mobile terminal.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the application has been described in detail with reference to the foregoing embodiments, it will be appreciated by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not drive the essence of the corresponding technical solutions to depart from the spirit and scope of the technical solutions of the embodiments of the present application.
Claims (18)
1. A pseudo base station processing method, applied to a mobile terminal, comprising:
monitoring operations acting on the mobile terminal;
when the operation acting on the mobile terminal is not detected and the target short message is received, determining that the mobile terminal is attacked by a pseudo base station;
disconnecting the connection with the pseudo base station and attempting to access a target base station when the mobile terminal is detected to be attacked by the pseudo base station;
detecting whether the detected base station or the registered base station is a pseudo base station;
when the detected or registered base station is detected not to be a pseudo base station, determining that the mobile terminal is successfully accessed to the target base station, and sending alarm information to a public security agency, wherein the alarm information comprises at least one of an alarm telephone and an alarm short message, and the alarm information carries at least one of a location area identifier, an absolute video channel number, a physical unit identifier and a cell identity of the pseudo base station;
Controlling the mobile terminal to log off the network to enter a flight mode;
acquiring position information of the mobile terminal when the mobile terminal enters a flight mode, and detecting the position information of the mobile terminal after the mobile terminal enters the flight mode;
acquiring a difference value between the position information of the mobile terminal after entering the flight mode and the position information when entering the flight mode;
and if the difference value is larger than a preset difference value, controlling the mobile terminal to exit the flight mode and access the network.
2. The method of claim 1, wherein disconnecting the pseudo base station and attempting to access a target base station comprises:
acquiring characteristic parameters of the pseudo base station;
prohibiting the mobile terminal from accessing the base station corresponding to the characteristic parameter;
and attempting to access the target base station corresponding to the characteristic parameters except the characteristic parameters.
3. The method of claim 2, wherein the characteristic parameter comprises at least one of TAI, EARFCN, PCI and CID.
4. The method of claim 1, wherein disconnecting the pseudo base station and attempting to access a target pseudo base station comprises:
prohibiting the mobile terminal from accessing a 2G network and a 3G network;
Attempting to access the 4G network enters the VOLTE mode.
5. The method of claim 1, wherein said controlling the mobile terminal to log off the network into the flight mode further comprises:
detecting the time length of the mobile terminal entering the flight mode;
judging whether the duration is longer than a preset duration;
and when the duration is longer than the preset duration, controlling the mobile terminal to exit the flight mode and access a network.
6. The method according to any one of claims 1-5, wherein when the mobile terminal is detected as being attacked by a pseudo base station, before disconnecting from the pseudo base station and attempting to access a target base station, further comprising:
monitoring the network connection state of the mobile terminal;
and when the mobile terminal falls from the resident cell to the non-resident cell and receives the target short message, determining that the mobile terminal is attacked by the pseudo base station.
7. The method of claim 6, wherein the determining that the mobile terminal is attacked by the pseudo base station when the mobile terminal falls from the resident cell to the very resident cell and receives the target short message comprises:
when the mobile terminal drops from a resident cell to a non-resident cell and receives a target short message, detecting a signal strength attenuation value of the resident cell;
Judging whether the signal strength attenuation value is smaller than a designated attenuation value;
and when the signal strength attenuation value is smaller than the designated attenuation value, determining that the mobile terminal is attacked by a pseudo base station.
8. The method according to any one of claims 1-5, wherein when the mobile terminal is detected as being attacked by a pseudo base station, before disconnecting from the pseudo base station and attempting to access a target base station, further comprising:
monitoring the network connection state of the mobile terminal;
and when the mobile terminal falls from the original cell to the new cell and receives the target short message, determining that the mobile terminal is attacked by the pseudo base station.
9. The method of claim 8, wherein the determining that the mobile terminal is attacked by the pseudo base station when the mobile terminal drops from an original cell to a new cell and receives the target short message comprises:
when the mobile terminal drops from an original cell to a new cell and receives the target short message, judging whether the signal of the original cell is interfered;
and when the signal of the original cell is interfered, determining that the mobile terminal is attacked by the pseudo base station.
10. The method of claim 1, wherein the operations acting on the mobile terminal comprise:
The touch operation is acted on the mobile terminal; or (b)
And inputting voice information of the mobile terminal.
11. The method of claim 1, wherein the receiving the target sms includes:
when the mobile terminal receives a short message, word segmentation is carried out on the short message content of the short message to obtain a plurality of word segmentation results;
judging whether the word segmentation results comprise target keywords or not;
and when the target keywords are included in the word segmentation results, determining that the mobile terminal receives the target short message.
12. The method of claim 11, wherein the target keyword comprises at least one of account login, password modification, verification code, and transfer.
13. The method according to any of claims 1-5, wherein issuing an alarm message upon successful access of the mobile terminal to the target base station comprises:
and when the mobile terminal is successfully accessed to the target base station, sending out alarm information comprising characteristic parameters of the pseudo base station.
14. The method according to any one of claims 1-5, wherein after controlling the mobile terminal to log off the network for the flight mode, further comprising:
And the mobile terminal outputs prompt information.
15. The method of claim 14, wherein the hint information includes at least one of a characteristic parameter corresponding to the pseudo base station, attack time of the pseudo base station, and an alarm record of the mobile terminal.
16. A pseudo base station processing apparatus, characterized by being applied to a mobile terminal, comprising:
an operation monitoring module for monitoring the operation of the mobile terminal;
a third determining module, configured to determine that the mobile terminal is attacked by a pseudo base station when no operation acting on the mobile terminal is detected and a target short message is received;
the disconnection module is used for disconnecting the connection with the pseudo base station and attempting to access a target base station when the mobile terminal is detected to be attacked by the pseudo base station;
the alarm module is used for detecting whether the detected base station or the registered base station is a pseudo base station or not; when the detected or registered base station is detected not to be a pseudo base station, determining that the mobile terminal is successfully accessed to the target base station, and sending alarm information to a public security agency, wherein the alarm information comprises at least one of an alarm telephone and an alarm short message, and the alarm information carries at least one of a location area identifier, an absolute video channel number, a physical unit identifier and a cell identity of the pseudo base station;
The control module is used for controlling the mobile terminal to log out of the network and enter a flight mode; acquiring position information of the mobile terminal when the mobile terminal enters a flight mode, and detecting the position information of the mobile terminal after the mobile terminal enters the flight mode; acquiring a difference value between the position information of the mobile terminal after entering the flight mode and the position information when entering the flight mode; and if the difference value is larger than a preset difference value, controlling the mobile terminal to exit the flight mode and access the network.
17. A mobile terminal, comprising:
a memory;
one or more processors coupled with the memory;
one or more programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of claims 1-15.
18. A computer readable storage medium having stored therein program code which is callable by a processor to perform the method of any one of claims 1-15.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/113209 WO2020087419A1 (en) | 2018-10-31 | 2018-10-31 | False base station processing method and apparatus, mobile terminal, and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112673663A CN112673663A (en) | 2021-04-16 |
CN112673663B true CN112673663B (en) | 2023-11-24 |
Family
ID=70464284
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201880097365.7A Active CN112673663B (en) | 2018-10-31 | 2018-10-31 | Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112673663B (en) |
WO (1) | WO2020087419A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114615714A (en) * | 2020-12-09 | 2022-06-10 | 中国移动通信有限公司研究院 | Voice calling method, voice calling device, communication equipment and computer readable storage medium |
CN114221778B (en) * | 2021-10-21 | 2022-08-26 | 北京连山科技股份有限公司 | Method for improving access security of wireless public network |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105792215A (en) * | 2016-04-29 | 2016-07-20 | 努比亚技术有限公司 | Detection method of pseudo base station and terminal thereof |
CN106231600A (en) * | 2016-09-05 | 2016-12-14 | 努比亚技术有限公司 | Terminal and information processing method |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7162285B2 (en) * | 2003-09-19 | 2007-01-09 | Raytheon Company | Detector and method for detecting telephone-activated devices in idle state |
US10027682B2 (en) * | 2009-12-21 | 2018-07-17 | Continental Automotive Systems, Inc. | Apparatus and method for detecting a cloned base station |
CN105263142A (en) * | 2014-07-14 | 2016-01-20 | 百度在线网络技术(北京)有限公司 | Method and device for identifying pseudo base station |
CN105472620A (en) * | 2015-12-02 | 2016-04-06 | 广东南方通信建设有限公司 | Pseudo base station alarm method and system |
CN206775755U (en) * | 2017-05-08 | 2017-12-19 | 深圳市格林维产品信息技术有限公司 | A kind of anti-detection means of GPS location alarm |
-
2018
- 2018-10-31 CN CN201880097365.7A patent/CN112673663B/en active Active
- 2018-10-31 WO PCT/CN2018/113209 patent/WO2020087419A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105792215A (en) * | 2016-04-29 | 2016-07-20 | 努比亚技术有限公司 | Detection method of pseudo base station and terminal thereof |
CN106231600A (en) * | 2016-09-05 | 2016-12-14 | 努比亚技术有限公司 | Terminal and information processing method |
Also Published As
Publication number | Publication date |
---|---|
CN112673663A (en) | 2021-04-16 |
WO2020087419A1 (en) | 2020-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105873068B (en) | Method and device for identifying pseudo base station | |
CN106488456B (en) | Base station registration method and device and mobile terminal | |
US10772033B2 (en) | Avoiding reselection of a fake cell in a wireless communication network | |
CN110149599B (en) | Short message protection method and terminal equipment | |
WO2020113530A1 (en) | Communication processing method and apparatus, mobile terminal and storage medium | |
CN112806044B (en) | Pseudo base station identification method and device, mobile terminal and storage medium | |
CN112673663B (en) | Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium | |
CN111338710A (en) | Application program control method and device, electronic equipment and storage medium | |
CN106454968A (en) | CSFB-based calling method and apparatus | |
CN115134901B (en) | Communication processing method and device, terminal and readable storage medium | |
WO2024193372A1 (en) | Method and apparatus for identifying pseudo base station, and electronic device | |
US11736945B2 (en) | Method for handling pseudo base station, mobile terminal, and storage medium | |
WO2019052464A1 (en) | Rogue base station recognition method and device, and computer readable storage medium | |
WO2019047170A1 (en) | Pseudo base station identification method and terminal | |
CN112040057A (en) | Device control method, device, electronic device, control system and storage medium | |
CN111278003B (en) | Position updating processing method and mobile terminal | |
WO2020007250A1 (en) | Pseudo base station identification on-off control method and device, mobile terminal, and storage medium | |
CN110366184A (en) | A kind of method and intelligent terminal identifying pseudo-base station note | |
CN112771906B (en) | Pseudo base station identification method and device and mobile terminal | |
CN109151829B (en) | Pseudo base station identification method and device | |
WO2020087420A1 (en) | Pseudo base station prevention method and apparatus, mobile terminal, and storage medium | |
CN112771907B (en) | Pseudo base station identification method, pseudo base station identification device, mobile terminal and storage medium | |
CN112868247B (en) | Cell connection processing method, device, mobile terminal and storage medium | |
CN112954781B (en) | Communication control method, communication control device, electronic device, and storage medium | |
CN112673662B (en) | Pseudo base station identification method, pseudo base station identification device, mobile terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |