CN112806044B - Pseudo base station identification method and device, mobile terminal and storage medium - Google Patents

Pseudo base station identification method and device, mobile terminal and storage medium Download PDF

Info

Publication number
CN112806044B
CN112806044B CN201880098555.0A CN201880098555A CN112806044B CN 112806044 B CN112806044 B CN 112806044B CN 201880098555 A CN201880098555 A CN 201880098555A CN 112806044 B CN112806044 B CN 112806044B
Authority
CN
China
Prior art keywords
base station
cell
redirection
pseudo
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880098555.0A
Other languages
Chinese (zh)
Other versions
CN112806044A (en
Inventor
李伟清
张涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd, Shenzhen Huantai Technology Co Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN112806044A publication Critical patent/CN112806044A/en
Application granted granted Critical
Publication of CN112806044B publication Critical patent/CN112806044B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Abstract

The application discloses a method and a device for identifying a pseudo base station, a mobile terminal and a storage medium, wherein the method for identifying the pseudo base station is applied to the mobile terminal, and the method comprises the following steps: when the cell of the first base station needs to be redirected to the cell of the second base station, judging whether the cell of the first base station is successfully registered; if the cell of the first base station is not successfully registered, initiating tracking area update to the cell of the first base station; and if the tracking area updating fails, identifying the first base station as a pseudo base station. The method can accurately identify the pseudo base station.

Description

Pseudo base station identification method and device, mobile terminal and storage medium
Technical Field
The present invention relates to the field of mobile terminals, and in particular, to a method and apparatus for identifying a pseudo base station, a mobile terminal, and a storage medium.
Background
Mobile terminals, such as mobile phones, tablet computers, etc., have become one of the most commonly used consumer electronics products in daily life, and people are increasingly accustomed to performing various life-related operations through mobile terminals, which generally need to communicate through an operator base station. In some regions with more luxury businesses, pseudo base stations disguised as operator base stations are often arranged, and because the pseudo base stations often impersonate mobile phone numbers of other people to forcibly send junk short messages such as fraud, advertisement promotion and the like to a terminal, the pseudo base stations which are confusing for the life of people need to be identified in order to protect the data security of the terminal.
Disclosure of Invention
In view of the above problems, the present application proposes a method, an apparatus, a mobile terminal and a storage medium for identifying a pseudo base station, so as to solve the above problems.
In a first aspect, an embodiment of the present application provides a method for identifying a pseudo base station, which is applied to a mobile terminal, where the method includes: when the cell of the first base station needs to be redirected to the cell of the second base station, judging whether the cell of the first base station is successfully registered; if the cell of the first base station is not successfully registered, initiating tracking area update to the cell of the first base station; and if the tracking area updating fails, identifying the first base station as a pseudo base station.
In a second aspect, an embodiment of the present application provides an apparatus for identifying a pseudo base station, which is applied to a mobile terminal, where the apparatus includes: the system comprises a cell judging module, a tracking area updating module and a determining module, wherein when the cell of a first base station needs to be redirected to the cell of a second base station, whether the cell of the first base station is successfully registered is judged; if the cell of the first base station is not successfully registered, initiating tracking area update to the cell of the first base station; and if the tracking area updating fails, identifying the first base station as a pseudo base station.
In a third aspect, an embodiment of the present application provides a mobile terminal, including: one or more processors; a memory; one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more application programs configured to perform the method for identifying a pseudo base station provided in the first aspect.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having stored therein program code that is callable by a processor to perform the method for identifying a pseudo base station provided in the first aspect above.
According to the scheme provided by the application, when the cell of the first base station needs to be redirected to the cell of the second base station, whether the cell of the first base station is successfully registered is judged, if the cell of the first base station is not successfully registered, tracking area update is initiated to the cell of the first base station, and if the tracking area update fails, the first base station can be identified as a pseudo base station, so that the pseudo base station can be accurately identified, and the trouble of the pseudo base station to a user is avoided.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 shows a system architecture schematic diagram of a mobile communication network according to an embodiment of the present application.
Fig. 2 is a schematic diagram of a system architecture of another mobile communication network according to an embodiment of the present application.
Fig. 3 shows a flow chart of a method for identifying a pseudo base station according to an embodiment of the present application.
Fig. 4 shows a flow chart of a method for identifying a pseudo base station according to another embodiment of the present application.
Fig. 5 shows a flowchart of step S210 in the method for identifying a pseudo base station according to an embodiment of the present application.
Fig. 6 shows a flowchart of step S240 in the method for identifying a pseudo base station according to an embodiment of the present application.
Fig. 7 shows a flow chart of a method for identifying a pseudo base station according to a further embodiment of the present application.
Fig. 8 shows a block diagram of an identification device of a pseudo base station according to an embodiment of the present application.
Fig. 9 shows a block diagram of cell judgment in the pseudo base station identification apparatus according to an embodiment of the present application.
Fig. 10 is a block diagram of a mobile terminal according to an embodiment of the present application for performing a method of identifying a pseudo base station according to an embodiment of the present application.
Fig. 11 is a storage unit for storing or carrying program codes for implementing the pseudo base station identification method according to the embodiment of the present application.
Detailed Description
In order to enable those skilled in the art to better understand the present application, the following description will make clear and complete descriptions of the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application.
With the development of mobile communication technology, mobile communication has undergone the development of multiple versions of 2G, 3G, and 4G. The base station is an important communication device, whether it is the GSM (Global System for Mobile Communication) mobile communication system or CDMA (Code Division Multiple Access) communication system of the early 2G age or the LTE (long term evolution ) system architecture of the later 4G age.
For example, a 2G mobile communication system architecture is schematically shown in fig. 1. The base station BTS (base transceiver station) is connected to BSC (Base Station Controller) as an access device for the mobile communication path, and then the BSC is connected to the MSC (mobile switching center ). For example, the architecture of the 4G mobile communication system shown in fig. 2 is shown. The base station eNB (evolved node B) is connected to MME (Mobility Management Entity), while the MME is connected to a Serving Gateway. As can be seen from fig. 1 and 2, in a mobile communication system, a base station has a relatively important role in the overall system architecture as a device for directly establishing a connection with a mobile terminal. The base station is generally referred to as a "public mobile communication base station", and is mainly used for providing signals for mobile terminals such as mobile phones and tablet computers. The base station facilities not only master the situation that the bodies and shadows of the large operators and equipment manufacturers can be frequently seen in the universities, the research institutions and the scientific research institutions, so that the frequency of updating and upgrading the communication technology is accelerated, the transition time of commercial development is shortened, and the inventor discovers that a pseudo base station appears along with the development of the communication technology.
The pseudo base station uses the parameters of signal intensity, position area, system information and the like to decoy the user to access in the coverage area through the fake present network mobile communication network so as to acquire the information of IMSI (Intemational Mobile SubscriberIdentification Number, international mobile subscriber identity), IMEI (Intemational Mobile EquipmentIdentity, international mobile equipment identity) and the like of the user. The lawless persons can collect user information by using the pseudo base station, and also can maliciously send short messages such as junk advertisements, fraud and the like or dial harassment calls by using the pseudo base station, so that normal communication of users is seriously affected.
Currently, low-standard mobile communication technologies, such as 2G (2-Generation wireless telephone technology, second Generation mobile communication technology), 3G (3 rd-Generation mobile communication technology), etc., have poor authentication and protection of a network, which results in that lawbreakers often perform illegal activities through a 2G pseudo base station and a 3G pseudo base station, and particularly, send short messages such as spam advertisements, fraud, etc. maliciously by using the 2G pseudo base station. The high-system communication technology may be specifically an LTE network system, for example, 4G (the 4 th-th Generation mobile communication technology, fourth-Generation mobile communication technology), 4g+, 5G (the 5th-Generation, fifth-Generation mobile communication technology), and so on, which is better for authentication and protection of the network, so that the mobile terminal may fail when registering the cell of the pseudo base station of the high-system mobile communication technology, and thus may be generally considered as safe under the high-system communication network. Therefore, the security of the low-system mobile communication technology is relatively low compared with the high-system mobile communication technology, and the illegal activity of the illegal molecule is easier to be realized by using the pseudo base station of the low-system mobile communication network.
The inventor discovers through long-term research that many pseudo base stations of the high-system mobile communication network redirect to the pseudo base stations of the low-system mobile communication network in the process of authentication so as to realize illegal activities. Based on the above problems, the inventor proposes a method, a device, a mobile terminal and a storage medium for identifying a pseudo base station according to embodiments of the present application, where when a cell of a first base station needs to be redirected to a cell of a second base station and a cell of the first base station is not successfully registered, tracking area update is initiated to the cell of the first base station, and if the tracking area update fails, the first base station is identified as the pseudo base station, so as to accurately identify the pseudo base station.
The following describes in detail a method for identifying a pseudo base station according to an embodiment of the present application.
Referring to fig. 3, an embodiment of the present application provides a method for identifying a pseudo base station, which may be applied to a mobile terminal, where the method for identifying a pseudo base station may include:
step S110: when the redirection from the cell of the first base station to the cell of the second base station is needed, judging whether the cell of the first base station is successfully registered.
In the embodiment of the present application, since most of the pseudo base stations need to direct the mobile terminal to the pseudo base station of the low-system mobile communication technology, the low-system mobile communication technology may be 2G or 3G so as to implement illegal actions. Therefore, the redirection of the cell of the base station can be detected in the use process of the mobile terminal so as to determine the situation of the cell redirection, and further confirmation is carried out when the cell is redirected so as to determine the redirection of the cell of the pseudo base station. In a mobile communication system, a cell refers to an area covered by a base station, and a mobile terminal can reliably communicate with the base station through a wireless channel in the cell.
When the cell to which the mobile terminal is currently accessing is the cell of the first base station, the first base station may establish an RRC (Radio Resource Control ) connection with the mobile terminal. The control plane between UE (User Equipment) and eNodeB (Evolved Node-B) includes a first layer, a second layer and a third layer, where the first layer is a physical layer, the second layer is a medium access control layer, and the third layer is an RRC. The RRC is used to process layer three information of the control plane between UE (User Equipment) and eNodeB (Evolved Node-B), the RRC allocates radio resources and sends related signaling, the main part of the control signaling between UE and UTRAN (Evolved Universal Terrestrial Radio Access Network) is RRC messages, which carry all parameters required for establishing, modifying and releasing the medium access control layer and physical layer protocol entities, while also carrying some signaling of NAS (non access stratum).
The RRC processes the third layer information of the control plane between the terminal and the base station, allocates radio resources and sends related signaling. The RRC connection establishment procedure of the first base station with the mobile terminal includes several steps of reselection of an available cell, access admission control and establishment of a layer 2 signal link.
In some embodiments, the cell of the first base station may issue a redirection instruction to the mobile terminal, and when the mobile terminal receives the redirection instruction issued by the cell of the first base station, the mobile terminal may determine that redirection from the cell of the first base station to the cell of the second base station is required, where the second base station is the target base station to which redirection is required. The cell of the first base station may issue the redirection command through the RRC connection. Of course, the mobile terminal needs to be redirected from the cell of the first base station to the cell of the second base station, or may be a redirecting cell that is actively performed when the location of the mobile terminal changes, or due to fluctuations in the wireless environment (i.e., changes in signal strength and interference level).
Since a mobile terminal, when accessing a cell of a pseudo base station, the cell of the pseudo base station is often redirected to a more dangerous cell of the pseudo base station without being successfully registered to achieve its illegal behaviour. That is, after the mobile terminal accesses the cell of the pseudo base station of the 4G or higher system, the mobile terminal is redirected to the pseudo base station cell of the more dangerous low system mobile communication network, for example, the 2G or 3G pseudo base station cell, generally within the time that the cell of the pseudo base station utilizes the registration cell. Thus, in the embodiment of the present application, when the mobile terminal determines that the cell of the first base station needs to be redirected to the cell of the second base station, it may be determined whether the cell of the first base station is successfully registered, so as to determine that the current redirection may be a redirection performed by the pseudo base station.
When a cell of a base station registers, an initial access procedure, for example, the above-mentioned RRC connection, is required. After the initial access procedure is performed, an attach procedure is required. The attach procedure is a necessary procedure in the registration procedure, and the subsequent service can be performed only after the attach is successful. In performing the attach procedure, mutual authentication of the mobile terminal and the network is required, and the mobile terminal establishes MM (mobile management) a context with MM (Mobility Management Entity). The MME establishes a default bearer for the mobile terminal, and the mobile terminal obtains the IP address distributed by the network side. User location registration and temporary identity (S-TMSI) assignment are also required.
In the embodiment of the present application, determining whether to successfully register the cell of the first base station may be performed by whether to receive a result returned by registration, for example, if a result indicating that registration is successful is received, the cell of the first base station may be determined to be successfully registered, and if a result indicating that registration is successful is not received, the cell of the first base station may be determined to be unsuccessfully registered. The result generated in the above-mentioned attachment process may also be determined, for example, by determining whether authentication is successful, if authentication is successful, determining that the cell of the first base station is successfully registered, and if not, determining that the cell of the first base station is not successfully registered. It is also possible to determine whether an IP address is currently assigned, if so, to indicate that a cell is successfully registered, and if not, to indicate that a cell is not successfully registered. Of course, the manner of specifically determining whether the cell of the first base station is successfully registered may not be limited in the embodiment of the present application.
Step S120: and if the cell of the first base station is not successfully registered, initiating tracking area updating to the cell of the first base station.
In this embodiment of the present application, when it is required to redirect from the cell of the first base station to the cell of the second base station and it is determined that the cell of the first base station has not been successfully registered, it means that the current redirection may be that the cell of the pseudo base station is intentionally redirected to the cell of the base station of the more dangerous low-system mobile communication network when the cell of the pseudo base station has not been successfully registered, for example, that the cell of the 4G pseudo base station is redirected to the cell of the 2G base station or the cell of the 3G base station when the cell of the pseudo base station has not been successfully registered. Of course, the redirection that is currently needed may also be a normal redirection, such as occurs when the mobile terminal is just powered on and the signal of the current base station is poor. Therefore, the first base station is a suspected pseudo base station, and further detection can be performed on the first base station to determine whether the first base station is a pseudo base station.
Since the cell location area code (TAC, tracking area code) of the pseudo base station will be deliberately set to the same TAC as the operator base station, the mobile terminal will not initiate tracking area update (Tracking Area Update, TAU). Among them, the tracking area update in the long term evolution network (Long Term Evolution, LTE) means that when a mobile terminal moves from one cell location area (TA) to another TA, location registration must be performed again on the new TA to inform the network to change the location information of the mobile terminal stored in the network. For example, when the mobile terminal detects a new cell and finds that the TAC of the cell is different from the TAC of the current cell, the TAU is initiated. To determine the location of the mobile terminal, the coverage area of the LTE network will be divided into a plurality of TAs, which function like the location area and routing area of the 3G, and are the basic units for location update and paging in the LTE system. The TAs are identified with TACs, one of which may contain one or more cells, the TACs being broadcast in SIB1 of these cells. TAI is used as a unique identification of TA during network operation.
When the TAU is performed, security verification processes such as authentication and integrity protection are performed, and if the TAU is performed by the pseudo base station, the TAU update fails because the pseudo base station cannot pass the security verification process. Therefore, when the cell of the first base station is not successfully registered, tracking area update can be initiated to the cell of the first base station to determine whether the first base station is a pseudo base station.
It can be appreciated that when accessing to a pseudo base station of an LTE network, a mobile terminal can be quickly redirected to a more dangerous pseudo base station cell if it is not successfully registered with the pseudo base station cell because it cannot be successfully registered with the pseudo base station cell. In addition, since the TAC of the pseudo base station coincides with the TAC of the operator, TAU is not performed. Thus, the mobile terminal may perform TAU to determine whether the first base station is a pseudo base station when it determines that the cell of the first base station needs to be redirected to the cell of the second base station and the cell of the first base station is not successfully registered. When the TAU is initiated to the cell of the first base station, a TAU request may be sent to the cell of the first base station, where the TAU request is used to instruct the first base station to perform a TAU related operation. When the cell of the first base station is successfully registered, the redirection is indicated as normal.
Step S130: and if the tracking area updating fails, identifying the first base station as a pseudo base station.
In this embodiment of the present application, after a TAU is initiated to a cell of a first base station, a mobile terminal may receive a tracking area update result returned by the cell of the first base station, and when receiving reject update information returned by the cell of the first base station, it indicates that tracking area update fails.
Further, when it is determined that the tracking area update fails, the first base station may be identified as a pseudo base station. It can be appreciated that when accessing to a pseudo base station of an LTE network, a mobile terminal can quickly redirect to a more dangerous pseudo base station cell without successfully registering the pseudo base station cell. Therefore, when it is determined that redirection from the cell of the first base station to the cell of the second base station is required, the cell of the first base station is not successfully registered, and the cell of the first base station cannot realize tracking area update, it can be determined that the first base station is a pseudo base station.
According to the method for identifying the pseudo base station, when redirection is needed, the pseudo base station is identified, so that the pseudo base station can be identified before the pseudo base station cell is redirected to a more dangerous base station cell, subsequent quick decision making is facilitated, and loss of a user is avoided. And the multiple characteristics of the pseudo base station are used for identifying the pseudo base station, so that the accuracy of identifying the pseudo base station is higher.
Referring to fig. 4, another embodiment of the present application provides a method for identifying a pseudo base station, which may be applied to a mobile terminal, and the method for identifying a pseudo base station may include:
step S200: when a redirection from a cell of a first base station to a cell of a second base station is required, a determination is made as to whether the redirection is a redirection that occurs when a call is conducted using a communication network.
In this embodiment of the present application, when the cell currently accessed by the mobile terminal is the cell of the first base station, the first base station may establish RRC connection with the mobile terminal. The first base station may transmit a redirection instruction to the mobile terminal through the RRC connection when the mobile terminal is required to be redirected from the cell of the first base station to the cell of the second base station. Thus, as an embodiment, the mobile terminal determining that redirection by the cell of the first base station to the cell of the second base station is required may comprise:
receiving release information sent by a cell of the first base station in a connection process of releasing radio resource control between the cell and the mobile terminal; and when the release information carries an instruction for indicating that the mobile terminal needs to be redirected to the cell of the second base station, determining that the mobile terminal needs to be redirected to the cell of the second base station by the cell of the first base station.
It will be appreciated that after the cell of the first base station establishes an RRC (Radio Resource Control ) connection with the mobile terminal, the release information carrying a redirection instruction may be sent during the RRC connection for controlling the release of the mobile terminal, where the redirection instruction is used to instruct the mobile terminal to be redirected from the cell of the first base station to the cell of the second base station. Correspondingly, the mobile terminal can receive release information sent by the cell of the first base station in the process of releasing the RRC connection, and when the received release information is determined to have the instruction, the mobile terminal can determine that the cell of the first base station needs to be redirected to the cell of the second base station. Therefore, after establishing the RRC connection with the cell of the first base station, by receiving a message sent by the cell of the first base station during the RRC connection of the control release mobile terminal, it is possible to determine a situation in which redirection from the cell of the first base station to the cell of the second base station is required.
Further, when the mobile terminal accesses to the pseudo base station of the high-format mobile communication network, the mobile terminal needs to be redirected to the pseudo base station of the low-format mobile communication network, wherein the high-format mobile communication network can be an LTE network (e.g., 4G), and the low-format mobile communication network can be 2G or 3G. Therefore, it may be further determined whether the second base station to which redirection is required is a 2G base station or a 3G base station before making a determination as to whether the cell of the first base station has been successfully registered. Therefore, the method for identifying the pseudo base station may further include:
Judging whether the second base station is a base station of a second generation mobile communication technology or a third generation mobile communication technology; and if the mobile communication technology is a base station of the second generation mobile communication technology or the third generation mobile communication technology, the step of judging whether the cell of the first base station is successfully registered is performed.
In this embodiment of the present application, whether the characteristic parameter of the second base station corresponds to the characteristic parameter of the 2G base station or the 3G base station may be determined according to the characteristic parameter of the second base station, so as to determine whether the second base station is the 2G base station or the 3G base station. Among other parameters, the characteristic parameters include location area code (LAC, location area code), location area identity (TAI, tracking Area Identity), absolute video channel number (EARFCN, eutra absolute radio frequency channel number), physical cell identity (PCI, physical cell identity), cell Identity (CID), etc. Specifically, let LAC be taken as an illustration, since the operator allocates LAC codes in the early stage of network establishment, a certain number of LACs are allocated to each region. The 2G network specifies that LAC uses BCD coding (Binary-Coded Decimal), and the LAC range of 2G is hexadecimal [0x1000-0x1999], [0x2000-0x2999], [0x9000-0x9999]. In 3G networks, the LAC range of WCDMA and TD-SCDMA is 0xa000-0 xffff. Therefore, whether the LAC is within the LAC range can be determined according to the LAC of the second base station, and when the LAC of the second base station is within the LAC range, it can be determined that the second base station is a 2G base station or a 3G base station. Of course, the manner of specifically determining whether the second base station is a 2G base station or a 3G base station may not be limited in the embodiment of the present application.
In the embodiment of the present application, it may also be determined whether the first base station is a 4G base station, a 4g+ base station, or a 5G base station, so as to further determine that the above redirection is that the base station cell under the LTE network is redirected to a 2G or 3G base station cell. Also, it may be determined whether the first base station is a pseudo base station according to the characteristic parameter of the first base station. For example, it may be determined that the first base station is a 4G base station according to whether the TAC of the first base station is within the TAC range of the 4G base station, and if so. Of course, the manner of specifically determining whether the first base station is a 4G base station, a 4g+ base station, or a 5G base station may not be limited in the embodiments of the present application.
Since the pseudo base station of the high-format communication network redirects the mobile terminal to the pseudo base station of the low-format communication network, the redirection does not occur when the voice call is made by using the communication network. Therefore, before judging whether the cell of the first base station is successfully registered, it may also be determined whether the redirection is a redirection that occurs when the communication network is used for a call, where the redirection is a redirection from the cell of the first base station to the cell of the second base station.
As one way, the redirection that occurs when a call is made using the communication network may include:
redirection at call time provided by Circuit Switched Fallback (CSFB) is employed.
Among them, since the wireless communication of the long term evolution (LTE, long Term Evolution) and 2G/3G dual mode terminals is a single wireless mode (Signal-radio mode), dual mode or multi mode terminals with LTE and 2G/3G access capability cannot transmit 2G/3G circuit domain service signals when LTE access is used. In order to enable a terminal (UE) to perform a Circuit Switched (CS) service such as voice in LTE access or to reside therein and to properly process a Packet Switched (PS) service in progress by the UE in LTE access, CSFB technology has been generated.
The CSFB procedure includes three phases: 1) The mobile terminal initiates a call on the LTE network, corresponding to the originator of the phone, i.e. the caller (MO, mobile Origination), or receives a page, corresponding to the recipient of the phone, i.e. the callee (MT, mobile Termination); 2) The mobile terminal falls back under the guidance of the LTE network and searches for a proper 2G/3G cell, such as a GSM cell/WCDMA cell for access; 3) The UE reads the GSM cell/WCDMA cell system broadcast message and establishes a voice call.
CSFB requires that the mobile terminal be redirected to a 2G/3G cell, which is done when talking with CFSB. Therefore, as an implementation manner, it may be determined whether the mobile terminal initiates the call request within the LTE coverage within a first set time before determining that the redirection needs to be performed. If a call request is initiated, determining that the redirection is a redirection when a call provided by Circuit Switched Fallback (CSFB) is adopted, and if the call request is not initiated, determining that the redirection is not a redirection when a call provided by Circuit Switched Fallback (CSFB) is adopted. As another embodiment, it may be determined whether the mobile terminal has received the paging request within the LTE coverage within a first set time before determining that the redirection needs to be performed. If the paging request is received, determining that the redirection is redirection when a call provided by Circuit Switched Fallback (CSFB) is adopted, and if the paging request is not received, determining that the redirection is not redirection when a call provided by Circuit Switched Fallback (CSFB) is adopted. The call request and the paging request may be a service request carrying a CSFB indicator parameter. Of course, the manner in which the redirection is specifically determined whether to redirect the call provided by Circuit Switched Fallback (CSFB) may not be limited in the embodiments of the present application.
As another approach, the redirection that occurs when a communication network is used to make a call may include:
redirection at call time provided by single radio mode voice call continuity (SRVCC).
Wherein SRVCC refers to the service continuity of a voice call when a single radio mode terminal is handed over from a time division long term evolution (Time Division LongTerm Evolution, TD-LTE) network to UTRAN/GERAN. The decision of SRVCC is completed at an evolved Node B (eNB) side, when a user request exists, a mobility management entity (Mobility Management Entity, MME) can integrate the SRVCC capability information of the user and the SRVCC capability information of UE to obtain integrated SRVCC capability information, then the information is notified to the eNB, and the eNB can initiate the SRVCC switching request for the UE only when the MME and the UE both support the SRVCC capability through the switching judgment of the eNB.
SRVCC requires that the mobile terminal be redirected to a 2G/3G cell, which is done when talking with SRVCC. Thus, as an embodiment, it may be determined whether the mobile terminal initiates the call request if the EPC has completed attachment and radio bearer within a first set time period before determining that the redirection is required. If the call request is initiated, determining that the redirection is the redirection when the call provided by the SRVCC is adopted, and if the call request is not initiated, determining that the redirection is not the redirection when the call provided by the SRVCC is adopted. As another embodiment, it may be determined whether the mobile terminal has received the paging request when the EPC has completed attaching and radio bearer within a first set time period before determining that the above redirection is required. If the paging request is received, determining that the redirection is redirection when a call provided by SRVCC is adopted, and if the paging request is not received, determining that the redirection is not redirection when a call provided by SRVCC is adopted. The call request and the paging request may be the service request carrying the SRVCC indicator parameter. Of course, the manner in which the above redirection is specifically determined whether to redirect a call provided by SRVCC may not be limiting in the embodiments of the present application.
Therefore, the above manner may determine whether the redirection is a redirection that occurs when the communication network is used for a call, and the manner of determining whether the redirection is a redirection that occurs when the communication network is used for a call is not limited in the embodiment of the present application.
Step S210: if the redirection is not a redirection occurring when a call is made using the communication network, determining whether the cell of the first base station was successfully registered.
When it is determined that the redirection from the cell of the first base station to the cell of the second base station is not a redirection that occurs when using the communication network for a call, it indicates that the current redirection may be a redirection from a pseudo base station cell under the LTE network to a 2G or 3G pseudo base station cell. At this point, it may be determined whether the cell of the first base station was successfully registered to further determine that the current redirection may be a redirection by a pseudo base station. When it is determined that the redirection is a redirection that occurs when a call is made using the communication network, it is indicated that the redirection is a normal redirection.
As an embodiment, referring to fig. 5, determining whether to register the cell of the first base station successfully may include:
Step S211: a record of successfully registered cells is obtained.
It will be appreciated that when determining whether or not a cell of the first base station has been successfully registered, a record of the currently stored successfully registered cell may be read. The record may be a stored list of successfully registered cells, in which identity information of successfully registered cells, e.g. cell identification information, may be stored.
Step S212: and judging whether a cell of the first base station exists in the record.
After the record of the successfully registered cell is obtained, the identity information of the cell of the first base station can be compared with the identity information of the successfully registered cell in the record to determine whether the cell of the first base station exists in the record. I.e. if the identity information of the cell of the first base station matches with the identity information of any one of the successfully registered cells in the record, determining that the cell of the first base station exists in the record.
Step S213: if the cell of the first base station exists, determining that the cell of the base station is successfully registered; if there is no cell of the first base station, determining that the cell of the base station is not successfully registered.
It will be appreciated that if it is determined that there is a cell of the first base station in the above record, this indicates that the cell of the first base station has been successfully registered, and therefore the first base station is a normal base station. If the fact that the cell of the first base station exists in the record is determined, the cell of the first base station is not successfully registered, and the fact that the redirection can be to a 2G or 3G pseudo base station cell in an LTE network is indicated. Of course, the manner of specifically determining whether the cell of the first base station is successfully registered may not be limited in the embodiment of the present application. If it is judged that the cell of the first base station is successfully registered, the redirection is indicated as normal redirection.
Step S220: and if the cell of the first base station is not successfully registered, suspending the redirecting operation.
When the redirection is needed from the cell of the first base station to the cell of the second base station, the redirection is determined to be the redirection when the redirection is not talking, and the cell of the first base station is determined to be unsuccessfully registered, the current redirection is indicated, and the cell which is possibly a pseudo base station under the LTE network is redirected to a more dangerous base station cell when the registration is deliberately unsuccessful, for example, a 4G pseudo base station cell is redirected to a cell of a 2G base station or a cell of a 3G base station when the registration is unsuccessful.
In the embodiment of the application, in order to ensure the safety of the user, the lawless persons are prevented from redirecting the mobile terminal to the cell of the 2G base station or the cell of the 3G base station to realize the lawless persons, and the redirecting operation can be suspended when the cell of the first base station is determined to be unsuccessfully registered, so that the loss of the user is avoided.
Step S230: and initiating tracking area updating to the cell of the first base station.
When the above redirection is determined to be possibly a pseudo base station cell of the mobile terminal accessing the LTE network, the pseudo base station redirects the mobile terminal to a 2G pseudo base station cell or a 3G pseudo base station cell, so the first base station is a suspected pseudo base station. In this embodiment of the present application, the tracking area update may be initiated to the cell of the first base station, so as to further detect the first base station to determine whether the first base station is a pseudo base station, and details of initiating the tracking area update to the cell of the first base station may refer to those of the foregoing embodiment and will not be described herein.
Step S240: and if the tracking area updating fails, identifying the first base station as a pseudo base station.
After the tracking area update request is initiated, a tracking area update result may be determined according to information returned by the cell of the first base station. In the embodiment of the present application, referring to fig. 6, step S240 may include:
Step S241: and receiving an updating result returned by the cell of the first base station.
Step S242: and when the updating result comprises the reason value of the updating failure, determining that the tracking area fails to track.
It can be understood that after receiving the tracking area update requested by the mobile terminal, the cell of the first base station may return an update result, and the mobile terminal may correspondingly receive the update result returned by the cell of the first base station. When the tracking area update fails, the update result issued by the LTE network is typically a tracking area update reject message, and the tracking area update reject message typically carries reject cause values, different reject cause values indicating different reject causes. For example, a reject cause value of #15 indicates that the tracking area does not have a suitable cell, etc. In practical application, the mobile terminal can analyze the update reject message of the tracking area to obtain the base station identifier and reject cause value. Therefore, when the received update result is a tracking area update reject message, and the tracking area update reject message carries a reject cause value, it can be determined that the tracking area update fails.
Since security verification processes such as authentication and integrity protection are performed when the TAU is performed, and if the TAU is performed by the pseudo base station, the TAU update fails because the pseudo base station cannot pass the security verification process. Thus, when it is determined that the tracking area update fails, the first base station can be identified as a pseudo base station. It can be appreciated that when the mobile terminal accesses to the pseudo base station of the LTE network, the mobile terminal can be quickly redirected to a more dangerous 2G pseudo base station cell or 3G pseudo base station cell under the condition of unsuccessfully registering the pseudo base station cell, and the mobile terminal does not perform TAU when accessing to the pseudo base station cell. Therefore, when it is determined that redirection from the cell of the first base station to the cell of the second base station is required, the redirection being redirection at the time of non-call, the cell of the first base station is not successfully registered, and the cell of the first base station cannot realize tracking area update, it can be determined that the first base station is a pseudo base station.
Step S250: access to the cell of the first base station is forbidden.
It will be appreciated that when the first base station is determined to be a pseudo base station, access to the cell of the first base station may be inhibited in order to avoid the user being attacked by lawbreakers.
As an implementation manner of prohibiting the mobile terminal from accessing the cell of the first base station includes prohibiting the mobile terminal from detecting the characteristic parameter corresponding to the first base station, where the characteristic parameter includes a location area identifier (TAI, tracking Area Identity), an absolute video channel number (EARFCN, eutra absolute radiofrequency channel number), a physical unit identifier (PCI, physical cell identity), a Cell Identity (CID), etc., and of course, the characteristic parameter corresponding to the first base station may also include other characteristic parameters, which are not described herein. In this embodiment, the first base station may be identified by a feature parameter corresponding to the first base station, and access of the mobile terminal to the first base station may be prohibited based on the identification.
In the embodiment of the application, if the first base station is directly and completely prohibited, although the possibility that the mobile terminal is attacked by the first base station can be avoided, the mobile terminal is completely prohibited from being monitored and tracked by the security monitoring system, and the adverse effect is caused.
In this embodiment, after the mobile terminal is prohibited from accessing the cell of the first base station, the mobile terminal may be prohibited from accessing the cell of the first base station in a specific case. Therefore, the method for identifying the pseudo base station may further include:
and when the specified condition is met, canceling the forbidden access to the cell of the first base station.
In one embodiment, after the mobile terminal is prohibited from accessing the cell of the first base station, monitoring and recording the duration of the mobile terminal prohibited from accessing the cell of the first base station are started, where the monitoring mode may include real-time monitoring, interval predetermined duration monitoring, or time interval monitoring set by the user, and optionally, in order to improve accuracy of the duration obtained by monitoring, a real-time monitoring mode may be adopted. And when the monitored duration exceeds the specified duration, canceling to prohibit the mobile terminal from accessing the first base station, that is, not limiting the registered network of the mobile terminal on the first base station, so as to cooperate with reporting information required by the security monitoring system. It can be understood that by the mode, the attack of the mobile terminal by the pseudo base station can be reduced, meanwhile, the mobile terminal is not completely forbidden to access the pseudo base station, and the mobile terminal is ensured to be monitored and tracked by the security monitoring system.
Step S260: and identifying the second base station as a pseudo base station.
In the embodiment of the present application, when the first base station is determined to be the pseudo base station, the redirection is indicated to be that the mobile terminal is quickly redirected to a more dangerous 2G pseudo base station cell or 3G pseudo base station cell when accessing to the pseudo base station of the LTE network. Thus, it can be determined that the second base station is also a pseudo base station.
Step S270: access to the cell of the second base station is forbidden.
In the embodiment of the present application, when the second base station is determined to be a pseudo base station, in order to avoid the attack of the user by lawless persons, the access to the cell of the second base station may be prohibited.
As an implementation manner of prohibiting the mobile terminal from accessing the cell of the second base station includes prohibiting the mobile terminal from detecting the characteristic parameter corresponding to the second base station, where the characteristic parameter includes a location area identifier (TAI, tracking Area Identity), an absolute video channel number (EARFCN, eutra absolute radiofrequency channel number), a physical unit identifier (PCI, physical cell identity), a Cell Identity (CID), etc., and of course, the characteristic parameter corresponding to the second base station may also include other characteristic parameters, which are not described herein. In this embodiment, the second base station may be identified by a feature parameter corresponding to the second base station, and access of the mobile terminal to the second base station may be prohibited based on the identification.
In this embodiment, after the mobile terminal is prohibited from accessing the cell of the second base station, the mobile terminal may be prohibited from accessing the cell of the second base station in a specific case. Therefore, the method for identifying the pseudo base station may further include:
and when the specified condition is met, canceling the forbidden access to the cell of the second base station.
In one embodiment, after the mobile terminal is prohibited from accessing the cell of the second base station, monitoring and recording the duration of the mobile terminal prohibited from accessing the cell of the second base station are started, where the monitoring mode may include real-time monitoring, interval predetermined duration monitoring, or time interval monitoring set by the user, and optionally, in order to improve accuracy of the duration obtained by monitoring, a real-time monitoring mode may be adopted. And when the monitored duration exceeds the specified duration, canceling to prohibit the mobile terminal from accessing the second base station, that is, not limiting the registered network of the mobile terminal on the second base station, so as to cooperate with reporting information required by the security monitoring system. It can be understood that by the mode, the attack of the mobile terminal by the pseudo base station can be reduced, meanwhile, the mobile terminal is not completely forbidden to access the pseudo base station, and the mobile terminal is ensured to be monitored and tracked by the security monitoring system.
Step S280: and refusing to reside in the cell of the first base station and redirecting to other cells except the cell of the first base station and the cell of the second base station.
In the embodiment of the application, when the first base station is determined, the mobile terminal can directly reject the cell managed by the first base station, and in addition, when the first base station is a pseudo base station, the second base station can also be identified as the pseudo base station, so that the mobile terminal can redirect to other cells except the cell of the first base station and the cell of the second base station, and the effect of preventing the residence of the pseudo base station is achieved. For example, it is possible to redirect to a cell managed by a universal mobile telecommunications system (UMTS, universal Mobile Telecommunications System) base station other than the first base station and the second base station, a cell managed by an LTE base station, or the like, according to the cell list. The execution order of step S250, step S260, and step S280 may not be limited in the embodiment of the present application.
Step S290: if the tracking area update is successful, the operation of redirecting continues.
In the embodiment of the present application, after the tracking area update is initiated to the cell of the first base station, if the update is successful, it indicates that the first base station can implement security verification processes such as authentication, integrity protection, etc. that can be performed by the normal base station, and it can be determined that the first base station is a legal base station. Therefore, the redirection from the cell of the first base station to the cell of the second base station is redirection in normal use, for example, when the signal in the LTE network is bad, the redirection is performed to the 3G or 2G network, so that the redirection operation can be continued to meet the normal use requirement.
According to the pseudo base station identification method, when redirection is needed, the redirection is judged, whether the current cell is registered successfully or not is judged, in addition, tracking area updating is also conducted, when the tracking area updating fails, the current cell is determined to be the pseudo base station, and therefore the pseudo base station can be identified before the pseudo base station cell is redirected to a more dangerous base station cell, redirection operation is suspended, and loss of a user is avoided. And the multiple characteristics of the pseudo base station are used for identifying the pseudo base station, so that the accuracy of identifying the pseudo base station is higher. In addition, when the pseudo base station is identified, the pseudo base station is forbidden, the resident pseudo base station cell is refused to redirect to other cells, the attack of the pseudo base station to the user is avoided, and the safety of the user is ensured.
Referring to fig. 7, still another embodiment of the present application provides a method for identifying a pseudo base station, which may be applied to a mobile terminal, where the method for identifying a pseudo base station may include:
step S310: when a redirection from a cell of a first base station to a cell of a second base station is required, a determination is made as to whether the redirection is a redirection that occurs when a call is conducted using a communication network.
Step S320: if the redirection is not a redirection occurring when a call is made using the communication network, determining whether the cell of the first base station was successfully registered.
In the embodiment of the present application, step S310 and step S320 may refer to the content of the previous embodiment, and are not described herein.
Step S330: and if the cell of the first base station is not successfully registered, canceling the redirecting operation.
It should be noted that, unlike the previous embodiment, when the redirection needs to be performed from the cell of the first base station to the cell of the second base station, it is determined that the redirection is a redirection when the redirection is not call, and it is determined that the cell of the first base station is not successfully registered, the current redirection is indicated, and the cell which may be a pseudo base station in the LTE network is intentionally redirected to a more dangerous base station cell when the registration is not successfully performed, for example, a 4G pseudo base station cell is redirected to a cell of the 2G base station or a cell of the 3G base station when the registration is not successfully performed.
In the embodiment of the application, in order to ensure the safety of the user, the illegal action of the illegal molecule is avoided by redirecting the mobile terminal to the cell of the 2G base station or the cell of the 3G base station. Therefore, when the cell of the first base station is determined to be unsuccessfully registered, the redirection operation is canceled, that is, the redirection operation is not executed any more, so that the loss of the user caused by attack after the redirection to the cell of the 2G base station or the cell of the 3G base station is avoided.
Step S340: and initiating tracking area updating to the cell of the first base station.
Step S350: and if the tracking area updating fails, identifying the first base station as a pseudo base station.
Step S360: access to the cell of the first base station is forbidden.
Step S370: and identifying the second base station as a pseudo base station.
Step S380: access to the cell of the second base station is forbidden.
Step S390: and refusing to reside in the cell of the first base station and redirecting to other cells except the cell of the first base station and the cell of the second base station.
In the embodiment of the present application, the steps S340 to S390 may refer to the content of the previous embodiment, and are not described herein.
According to the pseudo base station identification method, when redirection is needed, the redirection is judged, whether the current cell is registered successfully or not is judged, in addition, tracking area updating is also conducted, when the tracking area updating fails, the current cell is determined to be the pseudo base station, and therefore the pseudo base station can be identified before the pseudo base station cell is redirected to a more dangerous base station cell, redirection operation is canceled, and loss of a user is avoided. And the multiple characteristics of the pseudo base station are used for identifying the pseudo base station, so that the accuracy of identifying the pseudo base station is higher. In addition, when the pseudo base station is identified, the pseudo base station is forbidden, the resident pseudo base station cell is refused to redirect to other cells, the attack of the pseudo base station to the user is avoided, and the safety of the user is ensured.
Referring to fig. 8, fig. 8 is a block diagram illustrating a pseudo base station identifying apparatus 400 according to an embodiment of the present application. The apparatus 400 for identifying a pseudo base station is applied to the mobile terminal, and will be described with respect to the apparatus shown in fig. 8, where the apparatus 400 for identifying a pseudo base station includes: a cell determination module 410, a tracking area update module 420, and a determination module 430. The cell determining module 410 is configured to determine whether to register the cell of the first base station successfully when the cell of the first base station needs to be redirected to the cell of the second base station; the tracking area update module 420 is configured to initiate a tracking area update to a cell of the first base station if the cell of the first base station is not successfully registered; the determining module 430 is configured to identify the first base station as a pseudo base station if the tracking area update fails.
In the embodiment of the present application, the identifying device 400 of the pseudo base station may further include: the redirect pause module. And the redirection suspending module is used for suspending the redirection operation if the cell of the first base station is not successfully registered.
Further, the apparatus 400 for identifying a pseudo base station may further include: and redirecting the execution module. And the redirection execution module is used for continuing the redirection operation if the tracking area is updated successfully.
In the embodiment of the present application, the identifying device 400 of the pseudo base station may further include: and a redirection cancellation module. The redirection cancellation module is configured to cancel the redirection operation if the cell of the first base station is not successfully registered.
In an embodiment of the present application, referring to fig. 9, the cell determining module 410 may include: redirection determination section 411 and cell determination execution section 412. The redirection judging unit 411 is configured to judge whether the redirection is a redirection that occurs when a communication network is used for a call; the cell determination performing unit 412 is configured to determine whether to successfully register the cell of the first base station if the redirection is not a redirection that occurs when the communication network is used for a call.
Further, the redirecting that occurs when the communication network is used for communication includes: redirecting upon a call provided by Circuit Switched Fallback (CSFB); or redirection at call time provided with single radio mode voice call continuity (SRVCC).
In the embodiment of the present application, the identifying device 400 of the pseudo base station may further include: and the release information receiving module and the redirection determining module. The release information receiving module is used for receiving release information sent by a cell of the first base station in the process of releasing the connection of the radio resource control between the cell and the mobile terminal; and the redirection determining module is used for determining that the mobile terminal needs to be redirected to the cell of the second base station by the cell of the first base station when the release information carries an instruction for indicating that the mobile terminal needs to be redirected to the cell of the second base station.
In the embodiment of the present application, the identifying device 400 of the pseudo base station may further include: the first cell prohibiting module. The first cell prohibition module is used for prohibiting access to a cell of the first base station.
Further, the first cell prohibiting module is specifically configured to: and prohibiting detection of characteristic parameters corresponding to the first base station, wherein the characteristic parameters comprise at least one of a location area identifier, an absolute video channel number, a physical unit identifier and a cell identifier.
In some embodiments, the identifying apparatus 400 of the pseudo base station may further include: the first prohibition cancellation module. And the first prohibition cancellation module is used for canceling prohibition of accessing to the cell of the first base station when the specified condition is met.
In the embodiment of the present application, the identifying device 400 of the pseudo base station may further include: and the base station judging module. The base station judging module is used for judging whether the second base station is a base station of a second generation mobile communication technology or a third generation mobile communication technology. If the second generation mobile communication technology or the third generation mobile communication technology is judged as the base station, the cell judgment module judges whether the cell of the first base station is successfully registered.
In the embodiment of the present application, the identifying device 400 of the pseudo base station may further include: and a base station identification module. The base station identification module is used for identifying the second base station as a pseudo base station.
Further, the apparatus 400 for identifying a pseudo base station may further include: and a second cell prohibiting module. And the second cell prohibition module is used for prohibiting access to the cell of the second base station.
In some embodiments, the identifying apparatus 400 of the pseudo base station may further include: the second prohibition cancellation module. And the second prohibition cancellation module is used for canceling prohibition of accessing to the cell of the second base station when the specified condition is met.
In the embodiment of the present application, the identifying device 400 of the pseudo base station may further include: and the updating result receiving module and the updating determining module. The updating result receiving module is used for receiving an updating result returned by the cell of the first base station; and the updating determining module is used for determining that the tracking area fails to track when the updating result comprises the reason value of the updating failure.
In the embodiment of the present application, the cell determining module 410 may be specifically configured to: acquiring records of cells successfully registered; judging whether a cell of the first base station exists in the record; if the cell of the first base station exists, determining that the cell of the base station is successfully registered; if there is no cell of the first base station, determining that the cell of the base station is not successfully registered.
In the embodiment of the present application, the identifying device 400 of the pseudo base station may further include: and a rejection module. The rejecting module is used for rejecting the cell residing in the first base station and redirecting to other cells except the cell of the first base station and the cell of the second base station.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus and modules described above may refer to the corresponding process in the foregoing method embodiment, which is not repeated herein.
In several embodiments provided herein, the coupling of the modules to each other may be electrical, mechanical, or other.
In addition, each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module. The integrated modules may be implemented in hardware or in software functional modules.
In summary, according to the scheme provided by the present application, when the cell of the first base station needs to be redirected to the cell of the second base station, whether the cell of the first base station is successfully registered is judged, if the cell of the first base station is not successfully registered, tracking area update is initiated to the cell of the first base station, and if the tracking area update fails, the first base station can be identified as a pseudo base station, so that the pseudo base station can be accurately identified, and the trouble of the pseudo base station to a user is avoided.
Referring to fig. 10, a block diagram of a mobile terminal according to an embodiment of the present application is shown. The mobile terminal 100 may be a mobile terminal capable of running an application program such as a smart phone, a tablet computer, an electronic book, etc. The mobile terminal 100 in the present application may include one or more of the following components: a processor 110, a memory 120, and one or more application programs, wherein the one or more application programs may be stored in the memory 120 and configured to be executed by the one or more processors 110, the one or more program(s) configured to perform the method as described in the foregoing method embodiments.
Processor 110 may include one or more processing cores. The processor 110 connects various parts within the overall mobile terminal 100 using various interfaces and lines, performs various functions of the mobile terminal 100 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 120, and invoking data stored in the memory 120. Alternatively, the processor 110 may be implemented in hardware in at least one of digital signal processing (Digital Signal Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA). The processor 110 may integrate one or a combination of several of a central processing unit (Central Processing Unit, CPU), an image processor (Graphics Processing Unit, GPU), and a modem, etc. The CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for being responsible for rendering and drawing of display content; the modem is used to handle wireless communications. It will be appreciated that the modem may not be integrated into the processor 110 and may be implemented solely by a single communication chip.
The Memory 120 may include a random access Memory (Random Access Memory, RAM) or a Read-Only Memory (Read-Only Memory). Memory 120 may be used to store instructions, programs, code, sets of codes, or sets of instructions. The memory 120 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described below, etc. The storage data area may also store data created by the terminal 100 in use (such as phonebook, audio-video data, chat-record data), etc.
Referring to fig. 11, a block diagram of a computer readable storage medium according to an embodiment of the present application is shown. The computer readable medium 800 has stored therein program code which can be invoked by a processor to perform the methods described in the method embodiments described above.
The computer readable storage medium 800 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Optionally, the computer readable storage medium 800 comprises a non-volatile computer readable medium (non-transitory computer-readable storage medium). The computer readable storage medium 800 has storage space for program code 810 that performs any of the method steps described above. The program code can be read from or written to one or more computer program products. Program code 810 may be compressed, for example, in a suitable form.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limiting thereof; although the present application has been described in detail with reference to the foregoing embodiments, one of ordinary skill in the art will appreciate that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not drive the essence of the corresponding technical solutions to depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (18)

1. A method for identifying a pseudo base station, the method being applied to a mobile terminal, the method comprising:
when the cell of the first base station is required to be redirected to the cell of the second base station, judging whether the redirection is the redirection which occurs when the communication network is used for communication;
if the redirection is not the redirection occurring when the communication network is used for communication, judging whether the cell of the first base station is successfully registered;
if the cell of the first base station is not successfully registered, initiating tracking area update to the cell of the first base station;
if the tracking area updating fails, identifying the first base station as a pseudo base station;
The redirection which occurs when the communication network is used for communication comprises the following steps:
redirecting upon a call provided by Circuit Switched Fallback (CSFB); or alternatively
Redirection at call time provided by single radio mode voice call continuity (SRVCC).
2. The method of claim 1, wherein if the cell of the first base station has not been successfully registered, the method further comprises:
suspending the redirecting operation.
3. The method according to claim 2, wherein the method further comprises:
if the tracking area update is successful, the operation of redirecting continues.
4. The method of claim 1, wherein if the cell of the first base station has not been successfully registered, the method further comprises:
the redirecting operation is canceled.
5. The method of claim 1, wherein before determining whether the cell of the first base station was successfully registered when the cell of the first base station needs to be redirected by the cell of the first base station to the cell of the second base station, the method further comprises:
receiving release information sent by a cell of the first base station in a connection process of releasing radio resource control between the cell and the mobile terminal;
And when the release information carries an instruction for indicating that the mobile terminal needs to be redirected to the cell of the second base station, determining that the mobile terminal needs to be redirected to the cell of the second base station by the cell of the first base station.
6. The method according to any of claims 1-5, wherein after identifying the first base station as a pseudo base station if the tracking area update fails, the method further comprises:
and prohibiting access to a cell of the first base station.
7. The method of claim 6, wherein the prohibiting access to the cell of the first base station comprises:
and prohibiting detection of characteristic parameters corresponding to the first base station, wherein the characteristic parameters comprise at least one of a location area identifier, an absolute video channel number, a physical unit identifier and a cell identifier.
8. The method of claim 6, wherein the method further comprises:
and when the specified condition is met, canceling the forbidden access to the cell of the first base station.
9. The method according to any of claims 1-5, wherein before determining whether the cell of the first base station was successfully registered, the method further comprises:
Judging whether the second base station is a base station of a second generation mobile communication technology or a third generation mobile communication technology;
and if the mobile communication technology is a base station of the second generation mobile communication technology or the third generation mobile communication technology, the step of judging whether the cell of the first base station is successfully registered is performed.
10. The method of claim 9, wherein after identifying the first base station as a pseudo base station if the tracking area update fails, the method further comprises:
and identifying the second base station as a pseudo base station.
11. The method of claim 10, wherein after said identifying said second base station as a pseudo base station, the method further comprises:
and prohibiting access to a cell of the second base station.
12. The method of claim 11, wherein the method further comprises:
and when the specified condition is met, canceling the forbidden access to the cell of the second base station.
13. The method according to any of claims 1-5, wherein before the identifying the first base station as a pseudo base station if the tracking area update fails, the method further comprises:
receiving an updating result returned by the cell of the first base station;
And when the updating result comprises the reason value of the updating failure, determining that the tracking area fails to track.
14. The method according to any one of claims 1-5, wherein said determining whether the cell of the first base station was successfully registered comprises:
acquiring records of cells successfully registered;
judging whether a cell of the first base station exists in the record;
if the cell of the first base station exists, determining that the cell of the base station is successfully registered;
if there is no cell of the first base station, determining that the cell of the base station is not successfully registered.
15. The method according to any one of claims 1-5, further comprising:
and refusing to reside in the cell of the first base station and redirecting to other cells except the cell of the first base station and the cell of the second base station.
16. An apparatus for identifying a pseudo base station, applied to a mobile terminal, comprising: a cell judging module, a tracking area updating module and a determining module, wherein,
the cell judging module is used for judging whether the redirection is the redirection which occurs when the communication network is used for communicating when the cell of the first base station is required to be redirected to the cell of the second base station; if the redirection is not the redirection occurring when the communication network is used for communication, judging whether the cell of the first base station is successfully registered;
The tracking area updating module is used for initiating tracking area updating to the cell of the first base station if the cell of the first base station is not successfully registered;
the determining module is used for identifying the first base station as a pseudo base station if the tracking area update fails;
the redirection which occurs when the communication network is used for communication comprises the following steps:
redirecting upon a call provided by Circuit Switched Fallback (CSFB); or alternatively
Redirection at call time provided by single radio mode voice call continuity (SRVCC).
17. A mobile terminal, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more applications configured to perform the method of any of claims 1-15.
18. A computer readable storage medium having stored therein program code which is callable by a processor to perform the method of any one of claims 1-15.
CN201880098555.0A 2018-12-06 2018-12-06 Pseudo base station identification method and device, mobile terminal and storage medium Active CN112806044B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/119579 WO2020113519A1 (en) 2018-12-06 2018-12-06 Method and apparatus for identifying pseudo base station, mobile terminal and storage medium

Publications (2)

Publication Number Publication Date
CN112806044A CN112806044A (en) 2021-05-14
CN112806044B true CN112806044B (en) 2023-06-13

Family

ID=70975252

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880098555.0A Active CN112806044B (en) 2018-12-06 2018-12-06 Pseudo base station identification method and device, mobile terminal and storage medium

Country Status (2)

Country Link
CN (1) CN112806044B (en)
WO (1) WO2020113519A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073971A (en) * 2020-09-16 2020-12-11 北京亚鸿世纪科技发展有限公司 Pseudo base station trajectory tracking method and device based on ticket
CN113055934B (en) * 2021-03-26 2022-06-10 RealMe重庆移动通信有限公司 Method and device for processing redirection information, terminal equipment and storage medium
CN113923665B (en) * 2021-11-11 2023-06-06 中国联合网络通信集团有限公司 Flower arrangement base station identification method and device, electronic equipment and storage medium
CN114286344B (en) * 2021-12-14 2023-07-28 中国联合网络通信集团有限公司 Pseudo base station determining method, pseudo base station determining device, server and storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10334435B2 (en) * 2016-04-27 2019-06-25 Qualcomm Incorporated Enhanced non-access stratum security
CN106358199B (en) * 2016-09-30 2019-03-05 维沃移动通信有限公司 A kind of method and mobile terminal of mobile terminal identification pseudo-base station
CN107071778A (en) * 2016-12-12 2017-08-18 西安汇龙科技股份有限公司 Pseudo-base station recognition methods and data analysing method
CN106686601B (en) * 2017-03-16 2020-06-23 珠海市魅族科技有限公司 Pseudo base station protection method and device
CN107071779A (en) * 2017-04-13 2017-08-18 广东欧珀移动通信有限公司 Pseudo-base station recognition methods, device and terminal
CN107466041B (en) * 2017-09-30 2020-09-01 奇酷互联网络科技(深圳)有限公司 Method and device for identifying pseudo base station and mobile terminal
CN108235312A (en) * 2018-01-16 2018-06-29 奇酷互联网络科技(深圳)有限公司 Communication control method, device and the mobile terminal of mobile terminal

Also Published As

Publication number Publication date
CN112806044A (en) 2021-05-14
WO2020113519A1 (en) 2020-06-11

Similar Documents

Publication Publication Date Title
CN112806044B (en) Pseudo base station identification method and device, mobile terminal and storage medium
US8094620B2 (en) System and method for providing voice service in a multimedia mobile network
EP3337245A1 (en) Method and apparatus for handling abnormality of network communication function and storage medium
CN108696872B (en) Redirection method and device
CN112806073B (en) Communication processing method, device, mobile terminal and storage medium
WO2014107054A1 (en) A method and system to minimize delay in circuit-switched fallback (csfb) procedure
US9301214B2 (en) Method and device in a telecommunications system
CN108738093B (en) Method for preventing LTE terminal from having no service after multiple attach requests are rejected
CN107333302B (en) Service processing method and device
CN108064459B (en) CSFB (Circuit switched Fall Back) result detection method and device and storage medium
CN112806043B (en) Pseudo base station identification method and device, mobile terminal and storage medium
CN108064463B (en) CSFB (Circuit switched Fall Back) result detection method and device and storage medium
CN107980230B (en) CSFB (Circuit switched Fall Back) fall result detection method and device and computer storage medium
CN108124511B (en) CSFB (Circuit switched Fall Back) result detection method and device and storage medium
WO2019061410A1 (en) Abnormal frequency point detection method and device, and computer storage medium
US11012870B2 (en) Technique for triggering mobility management specific procedure to avoid registration state mismatch between user equipment and network
WO2019061438A1 (en) Method and device for detecting fallback result of csfb, and storage medium
US10285100B2 (en) Indication of IMEISV over map for inter-MSC handover
WO2019061421A1 (en) Method and device for detecting fallback result of circuit switched fallback, and storage medium
EP3062576B1 (en) Circuit switched fall back user device identification method and device
CN108135018B (en) CSFB (Circuit switched Fall Back) fall result detection method and device and computer storage medium
CN107980231B (en) CSFB (Circuit switched Fall Back) fall result detection method and device and computer storage medium
WO2019061486A1 (en) Csfb fallback result detecting method, device thereof and computer storage medium
WO2019061431A1 (en) Method and device for detecting fallback result of csfb, and computer storage medium
WO2019061490A1 (en) Csfb-based terminal detection method and apparatus, and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant