CN113099456B - Pseudo base station identification method, device, equipment and storage medium - Google Patents
Pseudo base station identification method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN113099456B CN113099456B CN202110520651.3A CN202110520651A CN113099456B CN 113099456 B CN113099456 B CN 113099456B CN 202110520651 A CN202110520651 A CN 202110520651A CN 113099456 B CN113099456 B CN 113099456B
- Authority
- CN
- China
- Prior art keywords
- base station
- terminal
- identity
- base stations
- uploaded
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000006399 behavior Effects 0.000 claims description 224
- 238000004590 computer program Methods 0.000 claims description 17
- 238000012795 verification Methods 0.000 abstract description 9
- 238000004891 communication Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 5
- 208000027418 Wounds and injury Diseases 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000006378 damage Effects 0.000 description 3
- 208000014674 injury Diseases 0.000 description 3
- 238000010801 machine learning Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000007635 classification algorithm Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 238000012706 support-vector machine Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000004931 aggregating effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000007477 logistic regression Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000003062 neural network model Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The method receives a terminal identity and first behavior characteristic data of a base station uploaded by a terminal through a first block chain, performs identity verification on the terminal, receives the first behavior characteristic data after the verification is passed, further determines second behavior data of the base station and sends the second behavior data to a second block chain, so that the second block chain determines whether the base station is a pseudo base station or not based on the second behavior data, manual participation is not needed, time and labor are saved, and the pseudo base station can be found in time. In addition, the method not only uses the terminal identity identification, but also combines the behavior characteristic data of the base station to judge whether the base station is a pseudo base station, thereby improving the identification accuracy of the pseudo base station. In addition, the identity of the terminal is verified, that is, the terminal is determined to be a legal terminal, and then the reported data is received, so that the reported data is guaranteed to be real and effective, system misjudgment caused by the fact that illegal terminals report forged data is prevented, and the fake base station is identified as a normal base station.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a storage medium for pseudo base station identification.
Background
With the continuous development of mobile communication technology, in addition to providing legal services for user terminals by base station equipment of regular communication operators from the 2G era to the 5G era, not only is the interference of pseudo base stations for illegal purposes generated in society, which affects the normal use of user terminals.
The pseudo base station is generally composed of a host and a notebook computer, and can extract terminal information of mobile phones and the like within a certain radius by taking the terminal information as a center through related equipment such as a short message group sender, a short message sender and the like, and forcibly send short messages such as fraud, advertising promotion and the like to terminals of mobile phones and the like of users by pretending to be the base station of an operator and using information such as mobile phone numbers of other people and the like. When the equipment is operated, the signal of the user terminal is forcibly connected to the equipment and cannot be connected to the public telecommunication network, so that the normal use of the terminal is influenced, and the user cannot normally use the normal service.
The existing method for identifying the pseudo base station mainly depends on the cooperation of the manual power of an operator and relevant departments. If the operator finds a lot of spam complaints which are not recorded and can be checked within a period of time, the behavior of sending spam messages by the pseudo base station can be preliminarily determined to exist. Through massive signaling analysis of the key areas, the approximate position (wireless cell, street) of the pseudo base station is found. However, the method for identifying the pseudo base station consumes a lot of time and labor, and cannot find the pseudo base station in time, so that an event that lawless persons send spam messages through the pseudo base station happens occasionally, and economic loss and even personal injury of users are caused.
Disclosure of Invention
In order to solve the problems in the prior art, the application provides a pseudo base station identification method, a pseudo base station identification device, pseudo base station identification equipment and a storage medium.
In a first aspect, an embodiment of the present application provides a pseudo base station identification method, where the method is applied to a first block chain, and the method includes the following steps:
receiving ciphertexts, identity marks and first behavior characteristic data uploaded by a plurality of terminals, wherein the ciphertexts uploaded by the terminal i are obtained by encrypting the identity marks of the terminal i based on an allocated identity private key, the first behavior characteristic data uploaded by the terminal i are first behavior characteristic data of a base station accessed by the terminal i, i is 1,2, … … n, and n is equal to the number of the terminals;
determining an identity public key distributed by the terminal i according to the identity of the terminal i, and decrypting a ciphertext uploaded by the terminal i based on the identity public key;
if the identity obtained after decryption is consistent with the identity of the terminal i, receiving first behavior feature data uploaded by the terminal i, and summarizing the first behavior feature data uploaded by all accessed terminals under a plurality of base stations within a preset time period according to the first behavior feature data uploaded by the terminal i;
and determining second behavior characteristic data of the base stations according to the first behavior characteristic data uploaded by all accessed terminals under the base stations, and sending the second behavior characteristic data of the base stations to a second block chain, so that the second block chain determines whether the base stations are pseudo base stations according to the second behavior characteristic data of the base stations.
In a possible implementation manner, the determining, according to the identity of the terminal i, the identity public key allocated to the terminal i includes:
acquiring a corresponding relation between a prestored identity of the terminal and an identity public key;
and determining an identity public key corresponding to the identity of the terminal i according to the corresponding relation.
In a possible implementation manner, the first behavior feature data uploaded by the terminal i includes a base station identifier of a base station that the terminal i has accessed, a base station access time, a base station leaving time, a base station signal level, a voice traffic volume, and a data traffic volume;
the second behavior characteristic data of the base station j comprises a base station identifier of the base station j, an average residence time, the number of base station terminal users, a base station signal average level, generated base station voice telephone traffic and base station data traffic, wherein j is 1,2, … … m, and m is equal to the number of the plurality of base stations;
the determining second behavior feature data of the plurality of base stations according to the first behavior feature data uploaded by all accessed terminals under the plurality of base stations includes:
determining the base station identification of the base station j and the number of the base station terminal users according to the base station identifications of the base stations accessed by the terminals uploaded by all accessed terminals under the plurality of base stations;
determining the average residence time of the base station j according to the access base station time and the base station leaving time uploaded by all accessed terminals under the plurality of base stations;
determining the average level of the base station signal of the base station j according to the base station signal level of the base station which is accessed by the terminal and uploaded by all accessed terminals under the plurality of base stations;
and determining the voice telephone traffic and the base station data traffic of the base station generated by the base station j according to the voice telephone traffic and the data traffic of the base station which is uploaded by all accessed terminals under the plurality of base stations and is accessed by the terminals.
In a second aspect, an embodiment of the present application provides another pseudo base station identification method, which is applied to a second block chain, and includes the following steps:
receiving second behavior characteristic data of a plurality of base stations uploaded by a first block chain, wherein the second behavior characteristic data of the plurality of base stations are second behavior characteristic data determined by the first block chain according to first behavior characteristic data uploaded by all accessed terminals under the plurality of base stations, the first behavior characteristic data uploaded by all accessed terminals under the plurality of base stations are ciphertext, identity marks and first behavior characteristic data uploaded by a plurality of terminals received by the first block chain, an identity public key distributed to the terminal i is determined according to the identity mark of the terminal i, after the ciphertext uploaded by the terminal i is decrypted based on the identity public key, if the identity mark obtained after decryption is consistent with the identity mark of the terminal i, the first behavior characteristic data uploaded by the terminal i is received, and the first behavior characteristic data uploaded by the terminal i is determined according to the first behavior characteristic data uploaded by the terminal i, summarizing first behavior characteristic data uploaded by all accessed terminals under a plurality of base stations within a preset time period, wherein a ciphertext uploaded by a terminal i is an encrypted ciphertext obtained by encrypting an identity of the terminal i based on a distributed identity private key by the terminal i, the first behavior characteristic data uploaded by the terminal i is first behavior characteristic data of the base stations accessed by the terminal i, i is 1,2, … … n, and n is equal to the number of the plurality of terminals;
and determining whether the base stations are pseudo base stations according to the second behavior characteristic data of the base stations.
In a possible implementation manner, the determining whether the base stations are pseudo base stations according to the second behavior feature data of the base stations includes:
judging whether second behavior characteristic data of a base station j meets a preset pseudo base station identification rule, wherein j is 1,2, … … m, and m is equal to the number of the base stations;
and if the second behavior characteristic data of the base station j meets the preset pseudo base station identification rule, determining the base station j as a pseudo base station.
In one possible implementation, the method further includes:
receiving an inquiry request sent by a terminal, wherein the inquiry request carries an identifier of a base station to be inquired;
and determining whether the base station to be inquired is a pseudo base station according to the determination result of whether the base stations are pseudo base stations and the identification of the base station to be inquired, and returning the inquiry result of the base station to be inquired of the terminal.
In a third aspect, an embodiment of the present application provides a pseudo base station identification apparatus, where the apparatus is applied to a first block chain, and the apparatus includes:
the first receiving module is used for receiving ciphertexts, identity identifiers and first behavior feature data uploaded by a plurality of terminals, wherein the ciphertexts uploaded by the terminal i are obtained by encrypting the identity identifiers of the terminal i based on the allocated identity private key, the first behavior feature data uploaded by the terminal i are first behavior feature data of a base station accessed by the terminal i, i is 1,2, … … n, and n is equal to the number of the terminals;
the first determining module is used for determining an identity public key distributed to the terminal i according to the identity of the terminal i and decrypting a ciphertext uploaded by the terminal i based on the identity public key;
the summarizing module is used for receiving the first behavior characteristic data uploaded by the terminal i if the identity obtained after decryption is consistent with the identity of the terminal i, and summarizing the first behavior characteristic data uploaded by all accessed terminals under a plurality of base stations within a preset time period according to the first behavior characteristic data uploaded by the terminal i;
a second determining module, configured to determine second behavior feature data of the multiple base stations according to the first behavior feature data uploaded by all access terminals under the multiple base stations, and send the second behavior feature data of the multiple base stations to a second block chain, so that the second block chain determines whether the multiple base stations are pseudo base stations according to the second behavior feature data of the multiple base stations.
In a possible implementation manner, the first determining module is specifically configured to:
acquiring a corresponding relation between a prestored identity of the terminal and an identity public key;
and determining an identity public key corresponding to the identity of the terminal i according to the corresponding relation.
In a possible implementation manner, the first behavior feature data uploaded by the terminal i includes a base station identifier of a base station that the terminal i has accessed, a base station access time, a base station leaving time, a base station signal level, a voice traffic volume, and a data traffic volume;
the second behavior characteristic data of the base station j comprises a base station identification of the base station j, an average residence time, the number of base station terminal users, a base station signal average level, a generated base station voice telephone traffic and a base station data traffic, wherein j is 1,2, … … m, and m is equal to the number of the plurality of base stations.
The second determining module is specifically configured to:
determining the base station identification of the base station j and the number of the base station terminal users according to the base station identifications of the base stations accessed by the terminals uploaded by all accessed terminals under the plurality of base stations;
determining the average residence time of the base station j according to the access base station time and the base station leaving time uploaded by all accessed terminals under the plurality of base stations;
determining the average level of the base station signal of the base station j according to the base station signal level of the base station which is accessed by the terminal and uploaded by all accessed terminals under the plurality of base stations;
and determining the voice telephone traffic and the base station data traffic of the base station generated by the base station j according to the voice telephone traffic and the data traffic of the base station which is accessed by the terminal and uploaded by all accessed terminals under the plurality of base stations.
In a fourth aspect, an embodiment of the present application provides another pseudo base station identification apparatus, where the apparatus is applied to a second block chain, and the apparatus includes:
a second receiving module, configured to receive second behavior feature data of multiple base stations uploaded by a first block chain, where the second behavior feature data of the multiple base stations is second behavior feature data determined by the first block chain according to first behavior feature data uploaded by all terminals accessed under the multiple base stations, the first behavior feature data uploaded by all terminals accessed under the multiple base stations is ciphertext, identity, and first behavior feature data uploaded by the first block chain, and determine an identity public key allocated to the terminal i according to the identity of the terminal i, decrypt the ciphertext uploaded by the terminal i based on the identity public key, and if the identity obtained after decryption is consistent with the identity of the terminal i, receive the first behavior feature data uploaded by the terminal i, and according to the first behavior feature data uploaded by the terminal i, summarizing first behavior characteristic data uploaded by all accessed terminals under a plurality of base stations within a preset time period, wherein a ciphertext uploaded by a terminal i is an encrypted ciphertext obtained by encrypting an identity of the terminal i based on a distributed identity private key by the terminal i, the first behavior characteristic data uploaded by the terminal i is first behavior characteristic data of the base stations accessed by the terminal i, i is 1,2, … … n, and n is equal to the number of the plurality of terminals;
and a third determining module, configured to determine whether the base stations are pseudo base stations according to the second behavior feature data of the base stations.
In a possible implementation manner, the third determining module is specifically configured to:
judging whether second behavior characteristic data of a base station j meets a preset pseudo base station identification rule, wherein j is 1,2, … … m, and m is equal to the number of the base stations;
and if the second behavior characteristic data of the base station j meets the preset pseudo base station identification rule, determining the base station j as a pseudo base station.
In a possible implementation manner, the second receiving module is further configured to:
receiving an inquiry request sent by a terminal, wherein the inquiry request carries an identifier of a base station to be inquired;
and determining whether the base station to be inquired is a pseudo base station according to the determination result of whether the base stations are pseudo base stations and the identification of the base station to be inquired, and returning the inquiry result of the base station to be inquired of the terminal.
In a fifth aspect, an embodiment of the present application provides a pseudo base station identification device, including:
a processor;
a memory; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor, the computer program comprising instructions for performing the method of the first aspect.
In a sixth aspect, an embodiment of the present application provides a pseudo base station identification device, including:
a processor;
a memory; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor, the computer program comprising instructions for performing the method of the second aspect.
In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored, and the computer program causes a server to execute the method in the first aspect.
In an eighth aspect, the present application provides a computer-readable storage medium, which stores a computer program, where the computer program causes a server to execute the method of the second aspect.
In a ninth aspect, the present application provides a computer program product, which includes computer instructions for executing the method of the first aspect by a processor.
In a tenth aspect, an embodiment of the present application provides a computer program product, which includes computer instructions for executing the method of the second aspect by a processor.
The method, the device, the equipment and the storage medium for identifying the pseudo base station, provided by the embodiment of the application, receive ciphertext, an identity and first behavior feature data uploaded by a plurality of terminals through a first block chain, wherein the ciphertext is obtained by encrypting the identity of the terminal based on an allocated identity private key by the terminal, then the first block chain determines an identity public key allocated by the terminal according to the identity of the terminal, decrypts the ciphertext based on the identity public key, receives the first behavior feature data uploaded by the terminal if the identity obtained after decryption is consistent with the identity, so as to summarize the first behavior feature data uploaded by all accessed terminals under a plurality of base stations in a preset time period, further determine second behavior feature data of the plurality of base stations and send the second behavior feature data to a second block chain, so that the second block chain is according to the second behavior feature data, and determining whether the plurality of base stations are pseudo base stations, wherein manual participation is not needed, so that time and labor are saved, and the pseudo base stations can be found in time. In addition, the embodiment of the application not only uses the terminal identity identification, but also combines the behavior characteristic data of the base station to judge whether the base station is a pseudo base station, so that the pseudo base station identification accuracy is improved. In addition, when the identity obtained after decryption is consistent with the identity, namely the terminal is determined to be a legal terminal, the reported data is received, so that the truth and the validity of the reported data are guaranteed, the system misjudgment caused by the illegal terminal reporting forged data is prevented, and the fake base station is identified as a normal base station.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic diagram of a pseudo base station identification system according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a pseudo base station identification method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another pseudo base station identification method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another pseudo base station identification method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a pseudo base station identification apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another pseudo base station identification apparatus according to an embodiment of the present application;
fig. 7A is a schematic diagram of a basic hardware architecture of a pseudo base station identification device provided in the present application;
fig. 7B is a schematic diagram of a basic hardware architecture of another pseudo base station identification device provided in the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," "third," and "fourth," if any, in the description and claims of this application and the above-described figures are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Moreover, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The existing method for identifying the pseudo base station mainly depends on the cooperation of the manual power of an operator and relevant departments. If the operator finds a lot of spam complaints which are not recorded and can be checked within a period of time, the behavior of sending spam messages by the pseudo base station can be preliminarily determined to exist. Through massive signaling analysis of key areas, the approximate position (wireless cell, street) of a pseudo base station is found. However, the method for identifying the pseudo base station consumes a lot of time and labor, and cannot find the pseudo base station in time, so that an event that lawless persons send spam messages through the pseudo base station happens occasionally, and economic loss and even personal injury of users are caused.
In order to solve the above problems, a technology for automatically identifying a pseudo base station is provided in the prior art, in which a query request is sent to a base station database by a user terminal, the base station database traverses a preset legal base station database according to the query request to obtain a legal base station set corresponding to the query request, and sends the legal base station set to the user terminal, the user terminal matches a current base station currently connected with the user terminal with the legal base station set, and when the current base station is not matched with the legal base station set, the user terminal selects any base station from the legal base station set to connect.
However, the above-mentioned technology identifies the pseudo base station only by using the base station information including the identity of the base station, the terminal equipment number of the base station, and so on, and it cannot avoid that the pseudo base station may falsely and illegally use the identity information, resulting in a terminal identification error. Moreover, the above-mentioned technology relies on the base station data in the existing base station database, and if the database is abnormal or has data errors, the normal access of the terminal will be affected.
Therefore, the embodiment of the present application provides a pseudo base station identification method, which may receive a terminal identity and first behavior feature data of a base station, which are uploaded by a terminal, through a first block chain, perform identity verification on the terminal, after the terminal passes the identity verification, receive the first behavior feature data of the base station, determine second behavior data of the base station based on the first behavior feature data, and send the second behavior data to a second block chain, so that the second block chain determines whether the base station is a pseudo base station based on the second behavior data, where manual participation is not required, time and labor are saved, and the pseudo base station can be found in time. In addition, the embodiment of the application not only uses the terminal identity identification, but also combines the behavior characteristic data of the base station to judge whether the base station is a pseudo base station, so that the pseudo base station identification accuracy is improved. In addition, the embodiment of the application carries out identity verification on the terminal, namely the terminal is determined to be a legal terminal, the reported data is received, the truth and the validity of the reported data are guaranteed, the misjudgment of a system caused by the fact that the illegal terminal reports forged data is prevented, and the fake base station is identified as a normal base station.
Optionally, the pseudo base station identification method provided in the present application may be applied to the schematic structure of the pseudo base station identification system shown in fig. 1, and as shown in fig. 1, the system may include a first blockchain 11, a second blockchain 12, and a plurality of terminals, where the plurality of terminals take a first terminal 13, a second terminal 14, and a third terminal 15 as an example.
It is to be understood that the illustrated structure of the embodiment of the present application does not form a specific limitation to the pseudo base station identification system architecture. In other possible embodiments of the present application, the architecture may include more or fewer components than those shown in the drawings, or combine some components, or split some components, or arrange different components, which may be determined according to an actual application scenario and is not limited herein. The components shown in fig. 1 may be implemented in hardware, software, or a combination of software and hardware.
In a specific implementation process, in this embodiment of the application, the first terminal 13, the second terminal 14, and the third terminal 15 may be terminal devices of different users, for example, the first terminal 13 is a terminal device of a user 1, the second terminal 14 is a terminal device of a user 2, and the third terminal 15 is a terminal device of a user 3, the first terminal 13 sends the identity and the first behavior feature data of the first terminal to the first block chain 11, the second terminal 14 sends the identity and the first behavior feature data of the second terminal to the first block chain 11, and the third terminal 15 sends the identity and the first behavior feature data of the third terminal to the first block chain 11. In the above Application scenario, users (e.g., user 1, user 2, and user 3) may log in a terminal Application (APP), obtain an identity of the terminal and first behavior feature data of a base station to which the terminal has access, and send the obtained data to the first block chain 11. The first blockchain 11 performs authentication on terminals (for example, the first terminal 13, the second terminal 14, and the third terminal 15), receives first behavior feature data of the base station after the authentication is passed, determines second behavior data of the base station based on the first behavior feature data, and sends the second behavior data to the second blockchain 12. The second block chain 12 determines whether the base station is a pseudo base station based on the second behavior data, wherein manual participation is not required, time and labor are saved, and the pseudo base station can be found in time. In addition, the terminal identity is used in the determination process, and whether the base station is a pseudo base station is judged by combining the behavior characteristic data of the base station, so that the pseudo base station identification accuracy is improved. In addition, the first block chain carries out identity verification on the terminal, namely the terminal is determined to be a legal terminal, the reported data is received, the truth and the validity of the reported data are guaranteed, the misjudgment of a system caused by the fact that the illegal terminal reports forged data is prevented, and the fake base station is identified as a normal base station.
In this embodiment of the application, each terminal may be a handheld device, a vehicle-mounted device, a wearable device, a computing device, and various forms of User Equipment (UE) and other devices that are equipped with a pseudo base station identification function APP.
In addition, the system architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not constitute a limitation to the technical solution provided in the embodiment of the present application, and it can be known by a person skilled in the art that the technical solution provided in the embodiment of the present application is also applicable to similar technical problems along with the evolution of the network architecture and the appearance of a new service scenario.
The technical solutions of the present application are described below with several embodiments as examples, and the same or similar concepts or processes may not be described in detail in some embodiments.
Fig. 2 is a schematic flowchart of a pseudo base station identification method provided in an embodiment of the present application, where an execution subject of the embodiment may be a first block chain in the embodiment shown in fig. 1, and as shown in fig. 2, the method may include:
s201: and receiving ciphertexts, identity marks and first behavior characteristic data uploaded by a plurality of terminals, wherein the ciphertexts uploaded by the terminal i are obtained by encrypting the identity marks of the terminal i based on the allocated identity private key, the first behavior characteristic data uploaded by the terminal i are first behavior characteristic data of a base station accessed by the terminal i, i is 1,2, … … n, and n is equal to the number of the terminals.
Here, the operator server may assign a unique public identity key, a pair of private identity keys, and an identity to each legitimate end user, and store the public identity key and the identity to the first zone chain.
For example, the operator server may assign a unique public identity key and a unique private identity key to each terminal when the terminal accesses the network. The operator server may generate the public key and the private key pair by using an asymmetric encryption algorithm, such as RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC (elliptic curve encryption algorithm), and the like. The operator server may also add the public identity key and the identity of the terminal packaged as part of the terminal block to the first block chain.
Here, the first block chain is used to store blocks of data of each terminal, and each block may include the public identity key, the identity identifier and the first behavior feature data of the terminal.
In addition, the first behavior feature data uploaded by the terminal i may include a base station identifier of a base station accessed by the terminal i, an access base station time, a leaving base station time, a base station signal level, voice traffic volume, data traffic volume and the like.
After the terminal i accesses the base station, the terminal i may acquire a base station identifier of the resident base station, where the base station identifier may be a base station number, a base station equipment serial number, or the like. The access base station time refers to a time stamp of the terminal i reselecting or switching into the base station. The time-from-base refers to the timestamp of the reselection or handover of terminal i out of the base station. The base station Signal level refers to a level at which a terminal i receives a Signal transmitted by a base station, such as Received Signal Code Power (RSCP) of a 3G network or Reference Signal Receiving Power (RSRP) of a 4G network. Voice traffic refers to the traffic generated by terminal i initiating a voice call during the time that the base station is camped on. The data traffic refers to traffic generated by a data service initiated by the terminal i during the base station camping. The terminal dwell duration refers to a time interval from the time when the terminal i accesses the base station to the time when the terminal i leaves the base station. After the terminal i leaves the resident base station every time, the base station identification, the time of accessing the base station, the time of leaving the base station, the signal level of the base station, the voice telephone traffic, the data traffic and other data can be packaged to generate first behavior characteristic data, and the first block chain is prepared to be uploaded.
S202: and determining the identity public key distributed to the terminal i according to the identity of the terminal i, and decrypting the ciphertext uploaded by the terminal i based on the identity public key.
Here, after receiving the ciphertext, the identity and the first behavior feature data uploaded by the multiple terminals, the first blockchain needs to verify that the terminal is a valid terminal to the first blockchain when initiating a data upload request to the first blockchain in order to prevent the pseudo base station from reporting the forged first behavior feature data by using an illegal terminal. The first block chain acquires the corresponding relation between the prestored identity of the terminal and the identity public key, and then determines the identity public key corresponding to the identity of the terminal i according to the corresponding relation, so that the ciphertext uploaded by the terminal i is decrypted based on the identity public key, and whether the identity acquired after decryption is consistent with the identity of the terminal i is judged. If the data is consistent with the first behavior feature data, the first block chain determines that the terminal is a legal terminal of an operator, and receives the first behavior feature data uploaded by the terminal, otherwise, the first block chain determines that the terminal is an illegal terminal, and the first block chain does not receive the data uploaded by the terminal.
S203: and if the identity obtained after decryption is consistent with the identity of the terminal i, receiving first behavior feature data uploaded by the terminal i, and summarizing the first behavior feature data uploaded by all accessed terminals under a plurality of base stations within a preset time period according to the first behavior feature data uploaded by the terminal i.
If the identity obtained after decryption is consistent with the identity of the terminal i, the terminal is a legal terminal of an operator, the first block chain receives first behavior characteristic data uploaded by the terminal i, and then the first behavior characteristic data uploaded by all accessed terminals under a plurality of base stations in a preset time period are gathered according to the received first behavior characteristic data.
The preset time period may be determined according to actual conditions, and is not particularly limited in the embodiment of the present application.
S204: and determining second behavior characteristic data of the base stations according to the first behavior characteristic data uploaded by all accessed terminals under the base stations, and sending the second behavior characteristic data of the base stations to a second block chain so that the second block chain determines whether the base stations are pseudo base stations according to the second behavior characteristic data of the base stations.
The second behavior characteristic data of the base station j comprises a base station identifier of the base station j, an average residence time, the number of base station terminal users, a base station signal average level, a generated base station voice telephone traffic and a base station data traffic, wherein j is 1,2, … … m, and m is equal to the number of the plurality of base stations.
Here, after aggregating the first behavior feature data uploaded by all the accessed terminals under the multiple base stations within the preset time period, the first blockchain may determine the second behavior feature data of the multiple base stations based on the first behavior feature data. For example, the first blockchain may determine a base station identifier of the base station j and a number of users of the base station terminal according to base station identifiers of base stations to which terminals have been accessed and uploaded by all terminals to which the terminals have been accessed under the plurality of base stations, determine an average residence time of the base station j according to access base station time and base station leaving time to which terminals have been accessed and uploaded by all terminals to which the terminals have been accessed under the plurality of base stations, determine an average base station signal level of the base station j according to base station signal levels of base stations to which terminals have been accessed and uploaded by all terminals to which the terminals have been accessed under the plurality of base stations, and determine a voice traffic and a data traffic of the base station generated by the base station j according to voice traffic and data traffic of the base stations to which terminals have been accessed and uploaded by all terminals to which the plurality of base stations.
The first blockchain may send the second behavior feature data of the plurality of base stations to a second blockchain after determining the second behavior feature data of the plurality of base stations. The second block chain may determine whether the second behavior feature data of the base station j satisfies a preset pseudo base station identification rule, and if the second behavior feature data of the base station j satisfies the preset pseudo base station identification rule, determine that the base station j is a pseudo base station.
The preset pseudo base station identification rule may be determined according to actual conditions, for example, when the average residence time is less than 1 minute, the number of base station terminal users is greater than 500, the average level of the base station signal is greater than-90 dBm, the generated voice traffic of the base station is less than 0.01 irish, and the data traffic of the base station is less than 50MB, the pseudo base station may be determined.
For example, the second blockchain may be analyzed by using a machine learning classification algorithm, and behavior feature samples, such as an average residence time of the known pseudo base station and a normal base station, a number of base station terminals, an average level of a base station signal, a generated voice traffic of the base station, and a base station data traffic, are collected, and a pseudo base station positive and negative sample label is marked on each sample to perform machine learning model training. The Machine learning model used herein may be a Nearest Neighbor classification algorithm (KNN), a Support Vector Machine (SVM), a logistic regression, or a neural network model. And after the model is trained, inputting the second behavior characteristic data serving as the characteristic sample into the model for prediction to obtain a pseudo base station identification result.
In addition, after determining whether the plurality of base stations are pseudo base stations, the second block chain may add a pseudo base station determination flag, for example, the pseudo base station determination flag is 1 to indicate a pseudo base station, and 0 to indicate a non-pseudo base station, in order to facilitate subsequent processing.
Here, the second block chain is used to store blocks of data of each base station, and each block may contain second behavior feature data of each base station and a pseudo base station determination identifier. The second block chain may add a pseudo base station judgment identifier to the received second behavior feature data to generate a new base station block, and add the new base station block to the second block chain, where the pseudo base station judgment identifier is 1 and indicates a pseudo base station, and 0 indicates a non-pseudo base station.
Before accessing the base station, the terminal may send an inquiry request to the second block chain, inquire whether the second block chain has the above access base station information and the pseudo base station judgment identifier of the base station is 0, if yes, access; otherwise, no access is performed.
Here, in the embodiment of the application, two behavior characteristic chains, namely a terminal chain and a base station chain, are realized through the first block chain and the second block chain, so that the traceability and the reliability of the behavior characteristic of each base station are guaranteed, and the pseudo base stations are screened and identified in time.
The embodiment of the application receives ciphertext, identity marks and first behavior characteristic data uploaded by a plurality of terminals through a first block chain, wherein the ciphertext is obtained by encrypting the identity marks of the terminals by the terminals based on an allocated identity private key, then the first block chain determines an identity public key allocated to the terminals according to the identity marks of the terminals and decrypts the ciphertext based on the identity public key, if the identity marks obtained after decryption are consistent with the identity marks, the first behavior characteristic data uploaded by the terminals are received, so that the first behavior characteristic data uploaded by all accessed terminals under a plurality of base stations in a preset time period are gathered, and then second behavior characteristic data of the base stations are determined to be sent to a second block chain, so that the second block chain determines whether the base stations are false base stations according to the second behavior characteristic data, the method does not need manual participation, saves time and manpower, and can discover the pseudo base station in time. In addition, the embodiment of the application not only uses the terminal identity identification, but also combines the behavior characteristic data of the base station to judge whether the base station is a pseudo base station, so that the pseudo base station identification accuracy is improved. In addition, when the identity obtained after decryption is consistent with the identity, namely the terminal is determined to be a legal terminal, the reported data is received, so that the truth and the validity of the reported data are guaranteed, the system misjudgment caused by the illegal terminal reporting forged data is prevented, and the fake base station is identified as a normal base station.
The method for identifying a pseudo base station according to the embodiment of the present application is described in detail from the first blockchain side in the above embodiment, and the method for identifying a pseudo base station provided according to the embodiment of the present application is described in detail from the second blockchain side in conjunction with the following embodiment. It should be understood that certain concepts, characteristics, and the like described in the first blockchain side correspond to those of the second blockchain side, and the repeated description is appropriately omitted for the sake of brevity.
Fig. 3 is a schematic flowchart of another pseudo base station identification method provided in an embodiment of the present application, where an execution subject of the embodiment may be the second block chain in fig. 1, as shown in fig. 3, the method may include the following steps:
s301: receiving second behavior characteristic data of a plurality of base stations uploaded by a first block chain, wherein the second behavior characteristic data of the plurality of base stations are determined by the first block chain according to first behavior characteristic data uploaded by all accessed terminals under the plurality of base stations, the first behavior characteristic data uploaded by all accessed terminals under the plurality of base stations are ciphertext, identity marks and first behavior characteristic data uploaded by a plurality of terminals which are received by the first block chain, an identity public key distributed by a terminal i is determined according to the identity mark of the terminal i, after the ciphertext uploaded by the terminal i is decrypted based on the identity public key, if the identity mark obtained after decryption is consistent with the identity mark of the terminal i, the first behavior characteristic data uploaded by the terminal i is received, and the first behavior characteristic data uploaded by all accessed terminals under the plurality of base stations within a preset time period is summarized according to the first behavior characteristic data uploaded by the terminal i, the ciphertext uploaded by the terminal i is an encrypted ciphertext obtained by encrypting the identity of the terminal i based on the allocated identity private key, the first behavior feature data uploaded by the terminal i is the first behavior feature data of the base station to which the terminal i has access, i is 1,2, … … n, and n is equal to the number of the terminals.
S302: and determining whether the base stations are pseudo base stations according to the second behavior characteristic data of the base stations.
Here, the second blockchain may determine whether the second behavior feature data of the base station j satisfies a preset pseudo base station identification rule, where j is 1,2, … … m, and m is equal to the number of the base stations. And if the second behavior characteristic data of the base station j meets the preset pseudo base station identification rule, the second block chain determines that the base station j is a pseudo base station.
The second blockchain may further receive an inquiry request sent by the terminal, where the inquiry request carries an identifier of a base station to be inquired, and further, according to a determination result of whether the plurality of base stations are pseudo base stations and the identifier of the base station to be inquired, determine whether the base station to be inquired is a pseudo base station, and return an inquiry result of the base station to be inquired to the terminal, so that the terminal may determine whether to access the base station to be inquired based on the inquiry result. For example, if the query result is that the base station to be queried is a pseudo base station, the terminal does not access the base station to be queried, thereby avoiding a lawbreaker sending a spam message through the pseudo base station, and reducing the economic loss and the personal injury of a user.
According to the embodiment of the application, the terminal identity and the first behavior characteristic data of the base station uploaded by the terminal are received through the first block chain, the terminal is subjected to identity verification, after the terminal passes the verification, the first behavior characteristic data of the base station are received, the second behavior data of the base station are determined and sent to the second block chain based on the first behavior characteristic data, so that whether the base station is a pseudo base station or not is determined based on the second behavior data of the second block chain, manual participation is not needed, time and labor are saved, and the pseudo base station can be found in time. In addition, the embodiment of the application not only uses the terminal identity identification, but also combines the behavior characteristic data of the base station to judge whether the base station is a pseudo base station, so that the pseudo base station identification accuracy is improved. In addition, the embodiment of the application carries out identity verification on the terminal, namely the terminal is determined to be a legal terminal, the reported data is received, the truth and the validity of the reported data are guaranteed, the misjudgment of a system caused by the fact that the illegal terminal reports forged data is prevented, and the fake base station is identified as a normal base station.
In addition, another pseudo base station identification method is further provided in this embodiment, which is illustrated by interaction between a first block chain, a second block chain, and multiple terminals, and as shown in fig. 4, the method may include:
s401: the multiple terminals upload the ciphertext, the identity and the first behavior feature data to the first block chain, wherein the ciphertext uploaded by the terminal i is an encrypted ciphertext obtained by encrypting the identity of the terminal i based on the allocated identity private key, the first behavior feature data uploaded by the terminal i is the first behavior feature data of the base station to which the terminal i has access, i is 1,2, … … n, and n is equal to the number of the multiple terminals.
Here, the operator server may assign a unique public identity key, a pair of private identity keys, and an identity to each legitimate end user, and store the public identity key and the identity to the first zone chain.
S402: the first block chain receives the ciphertext, the identity and the first behavior characteristic data, determines an identity public key distributed by the terminal i according to the identity of the terminal i, and decrypts the ciphertext uploaded by the terminal i based on the identity public key.
S403: if the identity obtained after decryption is consistent with the identity of the terminal i, the first block chain receives first behavior feature data uploaded by the terminal i, and summarizes the first behavior feature data uploaded by all accessed terminals under a plurality of base stations within a preset time period according to the first behavior feature data uploaded by the terminal i.
S404: and the first block chain determines second behavior characteristic data of the base stations according to the first behavior characteristic data uploaded by all accessed terminals under the base stations.
S405: and the first block chain transmits the second behavior characteristic data of the plurality of base stations to the second block chain.
S406: and the second block chain determines whether the base stations are pseudo base stations according to the second behavior characteristic data of the base stations.
S407: and the terminal i sends a query request to the second block chain, wherein the query request carries the identifier of the base station to be queried.
S408: and the second block chain determines whether the base station to be inquired is a pseudo base station according to the determination result of whether the base stations are pseudo base stations and the identification of the base station to be inquired.
S409: and the second block chain returns the query result of the base station to be queried of the terminal i.
S410: and the terminal i determines whether to access the base station to be inquired based on the inquiry result. For example, if the query result is that the base station to be queried is a pseudo base station, the terminal i does not access the base station to be queried.
The embodiment of the application can receive ciphertext, identity marks and first behavior characteristic data uploaded by a plurality of terminals through a first block chain, wherein the ciphertext is obtained by encrypting the identity marks of the terminals by the terminals based on an allocated identity private key, then the first block chain determines an identity public key allocated to the terminals according to the identity marks of the terminals and decrypts the ciphertext based on the identity public key, if the identity marks obtained after decryption are consistent with the identity marks, the first behavior characteristic data uploaded by the terminals are received, so that the first behavior characteristic data uploaded by all accessed terminals under a plurality of base stations in a preset time period are gathered, and then second behavior characteristic data of the base stations are determined to be sent to a second block chain, so that the second block chain determines whether the base stations are false base stations according to the second behavior characteristic data, therefore, the subsequent terminal can access the base station based on the determination result in the second block chain, manual participation is not needed, time and labor are saved, and the pseudo base station can be found in time. In addition, the embodiment of the application not only uses the terminal identity identification, but also combines the behavior characteristic data of the base station to judge whether the base station is a pseudo base station, so that the pseudo base station identification accuracy is improved. In addition, when the identity obtained after decryption is consistent with the identity, namely the terminal is determined to be a legal terminal, the reported data is received, so that the truth and the validity of the reported data are guaranteed, the system misjudgment caused by the illegal terminal reporting forged data is prevented, and the fake base station is identified as a normal base station.
Fig. 5 is a schematic structural diagram of a pseudo base station identification device according to an embodiment of the present application, corresponding to the pseudo base station identification method according to the foregoing embodiment. For convenience of explanation, only portions related to the embodiments of the present application are shown. Fig. 5 is a schematic structural diagram of a pseudo base station identification apparatus according to an embodiment of the present application, where the pseudo base station identification apparatus 50 includes: a first receiving module 501, a first determining module 502, a summing module 503, and a second determining module 504. The pseudo base station identification means may be the first block chain itself, or a chip or an integrated circuit that implements the function of the first block chain. It should be noted here that the division of the first receiving module, the first determining module, the summarizing module, and the second determining module is only a division of one logic function, and the two may be integrated or independent physically.
The first receiving module 501 is configured to receive ciphertexts, identity identifiers and first behavior feature data uploaded by multiple terminals, where the ciphertexts uploaded by a terminal i are obtained by encrypting the identity identifier of the terminal i based on an allocated identity private key, the first behavior feature data uploaded by the terminal i is first behavior feature data of a base station to which the terminal i has access, i is 1,2, … … n, and n is equal to the number of the multiple terminals.
The first determining module 502 is configured to determine, according to the identity of the terminal i, an identity public key allocated to the terminal i, and decrypt, based on the identity public key, a ciphertext uploaded by the terminal i.
And a summarizing module 503, configured to receive the first behavior feature data uploaded by the terminal i if the decrypted identity is consistent with the identity of the terminal i, and summarize the first behavior feature data uploaded by all accessed terminals under multiple base stations within a preset time period according to the first behavior feature data uploaded by the terminal i.
A second determining module 504, configured to determine second behavior feature data of the multiple base stations according to the first behavior feature data uploaded by all access terminals under the multiple base stations, and send the second behavior feature data of the multiple base stations to a second block chain, so that the second block chain determines whether the multiple base stations are pseudo base stations according to the second behavior feature data of the multiple base stations.
In a possible implementation manner, the first determining module 502 is specifically configured to:
acquiring a corresponding relation between a prestored identity of the terminal and an identity public key;
and determining an identity public key corresponding to the identity of the terminal i according to the corresponding relation.
In a possible implementation manner, the first behavior feature data uploaded by the terminal i includes a base station identifier of a base station that the terminal i has accessed, a base station access time, a base station leaving time, a base station signal level, a voice traffic volume, and a data traffic volume;
the second behavior characteristic data of the base station j comprises a base station identification of the base station j, an average residence time, the number of base station terminal users, a base station signal average level, a generated base station voice telephone traffic and a base station data traffic, wherein j is 1,2, … … m, and m is equal to the number of the plurality of base stations.
The second determining module 504 is specifically configured to:
determining the base station identification of the base station j and the number of the base station terminal users according to the base station identifications of the base stations accessed by the terminals uploaded by all accessed terminals under the plurality of base stations;
determining the average residence time of the base station j according to the access base station time and the base station leaving time uploaded by all accessed terminals under the plurality of base stations;
determining the average level of the base station signal of the base station j according to the base station signal levels of the base stations accessed by the terminals uploaded by all accessed terminals under the plurality of base stations;
and determining the voice telephone traffic and the base station data traffic of the base station generated by the base station j according to the voice telephone traffic and the data traffic of the base station which is accessed by the terminal and uploaded by all accessed terminals under the plurality of base stations.
The apparatus provided in the embodiment of the present application may be used to implement the technical solution of the method embodiment in fig. 2, which has similar implementation principles and technical effects, and is not described herein again in the embodiment of the present application.
Fig. 6 is a schematic structural diagram of another pseudo base station identification apparatus according to an embodiment of the present application. The pseudo base station identification device 60 includes: a second receiving module 601 and a third determining module 602. The pseudo base station identification means may be the second block chain itself, or a chip or an integrated circuit that implements the function of the second block chain. It should be noted here that the division of the second receiving module and the third determining module is only a division of logical functions, and both may be integrated or independent physically.
The second receiving module 601 is configured to receive second behavior feature data of multiple base stations uploaded by a first block chain, where the second behavior feature data of the multiple base stations is second behavior feature data determined by the first block chain according to first behavior feature data uploaded by all accessed terminals under the multiple base stations, the first behavior feature data uploaded by all accessed terminals under the multiple base stations is ciphertext, an identity identifier and first behavior feature data uploaded by multiple terminals received by the first block chain, and according to an identity identifier of a terminal i, an identity public key allocated to the terminal i is determined, after the ciphertext uploaded by the terminal i is decrypted based on the identity public key, if the identity identifier obtained after decryption is consistent with the identity identifier of the terminal i, the first behavior feature data uploaded by the terminal i is received, and according to the first behavior feature data uploaded by the terminal i, summarizing the first behavior feature data uploaded by all accessed terminals under a plurality of base stations within a preset time period, wherein a ciphertext uploaded by the terminal i is an encrypted ciphertext obtained by encrypting the identity of the terminal i based on the allocated identity private key by the terminal i, the first behavior feature data uploaded by the terminal i is the first behavior feature data of the base station accessed by the terminal i, i is 1,2, … … n, and n is equal to the number of the plurality of terminals.
A third determining module 602, configured to determine whether the base stations are pseudo base stations according to the second behavior feature data of the base stations.
In one possible design, the third determining module 602 is specifically configured to:
judging whether second behavior characteristic data of a base station j meets a preset pseudo base station identification rule, wherein j is 1,2, … … m, and m is equal to the number of the base stations;
and if the second behavior characteristic data of the base station j meets the preset pseudo base station identification rule, determining the base station j as a pseudo base station.
In a possible implementation manner, the second receiving module 601 is further configured to:
receiving an inquiry request sent by a terminal, wherein the inquiry request carries an identifier of a base station to be inquired;
and determining whether the base station to be inquired is a pseudo base station according to the determination result of whether the base stations are pseudo base stations and the identification of the base station to be inquired, and returning the inquiry result of the base station to be inquired of the terminal.
The apparatus provided in the embodiment of the present application may be configured to implement the technical solution in the embodiment of the method in fig. 3, and the implementation principle and the technical effect are similar, which are not described herein again.
Alternatively, fig. 7A and 7B schematically provide a possible basic hardware architecture of the pseudo base station identification device according to the present application, respectively.
Referring to fig. 7A and 7B, the pseudo base station identification apparatus includes at least one processor 701 and a communication interface 703. Further optionally, a memory 702 and a bus 704 may also be included.
Among them, in the pseudo base station identification device, the number of the processors 701 may be one or more, and fig. 7A and 7B only illustrate one of the processors 701. Alternatively, the processor 701 may be a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), or a Digital Signal Processor (DSP). If the pseudo base station identification device has a plurality of processors 701, the types of the plurality of processors 701 may be different, or may be the same. Alternatively, the plurality of processors 701 of the pseudo base station identification device may also be integrated into a multi-core processor.
The communication interface 703 may provide information input/output for the at least one processor. Any one or any combination of the following devices may also be included: a network interface (e.g., an ethernet interface), a wireless network card, etc. having a network access function.
Optionally, the communication interface 703 may also be used for data communication between the pseudo base station identification device and other computing devices or terminals.
Further alternatively, fig. 7A and 7B show the bus 704 by a thick line. The bus 704 may connect the processor 701 with the memory 702 and the communication interface 703. Thus, via bus 704, processor 701 may access memory 702 and may also interact with other computing devices or terminals using communication interface 703.
In this application, the pseudo base station identification device executes the computer instructions in the memory 702, so that the pseudo base station identification device implements the pseudo base station identification method provided in this application, or the pseudo base station identification device deploys the pseudo base station identification apparatus.
From the perspective of logical functional division, illustratively, as shown in fig. 7A, a first receiving module 501, a first determining module 502, a summing module 503, and a second determining module 504 may be included in the memory 702. The inclusion herein merely refers to that the instructions stored in the memory may, when executed, implement the functions of the first receiving module, the first determining module, the summarizing module, and the second determining module, respectively, without limiting to a physical structure.
In one possible design, as shown in fig. 7B, the second receiving module 601 and the third determining module 602 are included in the memory 702, and the inclusion only refers to that the instructions stored in the memory can implement the functions of the second receiving module and the third determining module, respectively, when executed, without limitation to a physical structure.
In addition, the pseudo base station identification device may be implemented by software as shown in fig. 7A and 7B, or may be implemented by hardware as a hardware module or a circuit unit.
The present application provides a computer readable storage medium, the computer program product comprising computer instructions that instruct a computing device to perform the above pseudo base station identification method provided herein.
The present application provides a chip comprising at least one processor and a communication interface providing information input and/or output for the at least one processor. Further, the chip may also include at least one memory for storing computer instructions. The at least one processor is configured to invoke and execute the computer instructions to perform the pseudo base station identification method provided by the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Claims (9)
1. A pseudo base station identification method applied to a first block chain, the method comprising:
receiving ciphertexts, identity marks and first behavior characteristic data uploaded by a plurality of terminals, wherein the ciphertexts uploaded by the terminal i are obtained by encrypting the identity marks of the terminal i based on an allocated identity private key, the first behavior characteristic data uploaded by the terminal i are first behavior characteristic data of a base station accessed by the terminal i, i =1,2, … … n, n is equal to the number of the terminals;
determining an identity public key distributed to the terminal i according to the identity of the terminal i, and decrypting a ciphertext uploaded by the terminal i based on the identity public key;
if the identity obtained after decryption is consistent with the identity of the terminal i, receiving first behavior feature data uploaded by the terminal i, and summarizing the first behavior feature data uploaded by all accessed terminals under a plurality of base stations within a preset time period according to the first behavior feature data uploaded by the terminal i;
and determining second behavior characteristic data of the base stations according to the first behavior characteristic data uploaded by all accessed terminals under the base stations, and sending the second behavior characteristic data of the base stations to a second block chain, so that the second block chain determines whether the base stations are pseudo base stations according to the second behavior characteristic data of the base stations.
2. The method according to claim 1, wherein the determining the allocated public identity key of the terminal i according to the identity of the terminal i comprises:
acquiring a corresponding relation between a prestored identity of the terminal and an identity public key;
and determining an identity public key corresponding to the identity of the terminal i according to the corresponding relation.
3. The method according to claim 1 or 2, wherein the first behavior characteristic data uploaded by the terminal i comprises base station identification of a base station accessed by the terminal i, base station access time, base station leaving time, base station signal level, voice traffic volume and data traffic volume;
the second behavior characteristic data of the base station j comprises a base station identifier, an average residence time length, the number of base station terminal users, a base station signal average level, generated base station voice telephone traffic and base station data traffic of the base station j, wherein j =1,2, … … m, m is equal to the number of the plurality of base stations;
the determining second behavior feature data of the plurality of base stations according to the first behavior feature data uploaded by all accessed terminals under the plurality of base stations includes:
determining the base station identification of the base station j and the number of the base station terminal users according to the base station identifications of the base stations accessed by the terminals uploaded by all accessed terminals under the plurality of base stations;
determining the average residence time of the base station j according to the access base station time and the base station leaving time uploaded by all accessed terminals under the plurality of base stations;
determining the average level of the base station signal of the base station j according to the base station signal level of the base station which is accessed by the terminal and uploaded by all accessed terminals under the plurality of base stations;
and determining the voice telephone traffic and the base station data traffic of the base station generated by the base station j according to the voice telephone traffic and the data traffic of the base station which is accessed by the terminal and uploaded by all accessed terminals under the plurality of base stations.
4. A pseudo base station identification method applied to a second block chain, the method comprising:
receiving second behavior characteristic data of a plurality of base stations uploaded by a first block chain, wherein the second behavior characteristic data of the plurality of base stations are second behavior characteristic data determined by the first block chain according to first behavior characteristic data uploaded by all accessed terminals under the plurality of base stations, the first behavior characteristic data uploaded by all accessed terminals under the plurality of base stations are ciphertext, identity marks and first behavior characteristic data uploaded by a plurality of terminals received by the first block chain, an identity public key distributed to the terminal i is determined according to the identity mark of the terminal i, after the ciphertext uploaded by the terminal i is decrypted based on the identity public key, if the identity mark obtained after decryption is consistent with the identity mark of the terminal i, the first behavior characteristic data uploaded by the terminal i is received, and the first behavior characteristic data uploaded by the terminal i is determined according to the first behavior characteristic data uploaded by the terminal i, summarizing first behavior feature data uploaded by all accessed terminals under a plurality of base stations within a preset time period, wherein a ciphertext uploaded by a terminal i is an encrypted ciphertext obtained by encrypting an identity of the terminal i based on a distributed identity private key by the terminal i, the first behavior feature data uploaded by the terminal i is first behavior feature data of the base stations accessed by the terminal i, i =1,2, … … n, n is equal to the number of the plurality of terminals;
and determining whether the base stations are pseudo base stations according to the second behavior characteristic data of the base stations.
5. The method of claim 4, wherein the determining whether the plurality of base stations are pseudo base stations according to the second behavior characteristic data of the plurality of base stations comprises:
judging whether second behavior characteristic data of a base station j meets a preset pseudo base station identification rule, wherein j =1,2, … … m, m is equal to the number of the base stations;
and if the second behavior characteristic data of the base station j meets the preset pseudo base station identification rule, determining the base station j as a pseudo base station.
6. The method according to claim 4 or 5, further comprising:
receiving an inquiry request sent by a terminal, wherein the inquiry request carries an identifier of a base station to be inquired;
and determining whether the base station to be inquired is a pseudo base station according to the determination result of whether the base stations are pseudo base stations and the identification of the base station to be inquired, and returning the inquiry result of the base station to be inquired of the terminal.
7. A pseudo base station identification apparatus, wherein the apparatus is applied to a first block chain, the apparatus comprising:
the first receiving module is used for receiving ciphertexts, identity identifiers and first behavior characteristic data uploaded by a plurality of terminals, wherein the ciphertexts uploaded by the terminal i are encrypted by the terminal i based on an allocated identity private key to obtain an encrypted ciphertext, the first behavior characteristic data uploaded by the terminal i is the first behavior characteristic data of a base station accessed by the terminal i, i =1,2, … … n is equal to the number of the terminals;
the first determining module is used for determining an identity public key distributed to the terminal i according to the identity of the terminal i and decrypting a ciphertext uploaded by the terminal i based on the identity public key;
the summarizing module is used for receiving the first behavior characteristic data uploaded by the terminal i if the identity obtained after decryption is consistent with the identity of the terminal i, and summarizing the first behavior characteristic data uploaded by all accessed terminals under a plurality of base stations within a preset time period according to the first behavior characteristic data uploaded by the terminal i;
a second determining module, configured to determine second behavior feature data of the multiple base stations according to the first behavior feature data uploaded by all access terminals under the multiple base stations, and send the second behavior feature data of the multiple base stations to a second block chain, so that the second block chain determines whether the multiple base stations are pseudo base stations according to the second behavior feature data of the multiple base stations.
8. A pseudo base station identification device, comprising:
a processor;
a memory; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor, the computer program comprising instructions for performing the method of any of claims 1-3.
9. A computer-readable storage medium, characterized in that it stores a computer program that causes a server to execute the method of any one of claims 1-3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110520651.3A CN113099456B (en) | 2021-05-13 | 2021-05-13 | Pseudo base station identification method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110520651.3A CN113099456B (en) | 2021-05-13 | 2021-05-13 | Pseudo base station identification method, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113099456A CN113099456A (en) | 2021-07-09 |
CN113099456B true CN113099456B (en) | 2022-05-03 |
Family
ID=76665391
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110520651.3A Active CN113099456B (en) | 2021-05-13 | 2021-05-13 | Pseudo base station identification method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113099456B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112020065B (en) * | 2020-08-04 | 2023-05-19 | 深圳传音控股股份有限公司 | Information processing method, terminal equipment, server and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106358198A (en) * | 2016-09-05 | 2017-01-25 | 努比亚技术有限公司 | Method and device for recognizing false base station |
CN107580326A (en) * | 2017-10-17 | 2018-01-12 | 奇酷互联网络科技(深圳)有限公司 | Parameter regulation means, device and mobile terminal in pseudo-base station identification |
CN108513302A (en) * | 2018-03-16 | 2018-09-07 | 广东欧珀移动通信有限公司 | Identify the method, apparatus and mobile terminal of pseudo-base station |
CN109041064A (en) * | 2018-08-28 | 2018-12-18 | 中科创达软件科技(深圳)有限公司 | A kind of recognition methods of pseudo-base station, device and mobile terminal |
CN110753349A (en) * | 2019-10-29 | 2020-02-04 | 西安交通大学 | Method and equipment for identifying pseudo base station |
CN111107552A (en) * | 2018-10-25 | 2020-05-05 | 中国移动通信有限公司研究院 | Method and system for identifying pseudo base station |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109548027B (en) * | 2017-08-17 | 2023-12-05 | 北京三星通信技术研究有限公司 | Method and device for identifying pseudo base station in mobile terminal |
-
2021
- 2021-05-13 CN CN202110520651.3A patent/CN113099456B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106358198A (en) * | 2016-09-05 | 2017-01-25 | 努比亚技术有限公司 | Method and device for recognizing false base station |
CN107580326A (en) * | 2017-10-17 | 2018-01-12 | 奇酷互联网络科技(深圳)有限公司 | Parameter regulation means, device and mobile terminal in pseudo-base station identification |
CN108513302A (en) * | 2018-03-16 | 2018-09-07 | 广东欧珀移动通信有限公司 | Identify the method, apparatus and mobile terminal of pseudo-base station |
CN109041064A (en) * | 2018-08-28 | 2018-12-18 | 中科创达软件科技(深圳)有限公司 | A kind of recognition methods of pseudo-base station, device and mobile terminal |
CN111107552A (en) * | 2018-10-25 | 2020-05-05 | 中国移动通信有限公司研究院 | Method and system for identifying pseudo base station |
CN110753349A (en) * | 2019-10-29 | 2020-02-04 | 西安交通大学 | Method and equipment for identifying pseudo base station |
Also Published As
Publication number | Publication date |
---|---|
CN113099456A (en) | 2021-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107770182B (en) | Data storage method of home gateway and home gateway | |
US8655312B2 (en) | Wireless access point detection | |
RU2007103334A (en) | METHOD FOR SWITCHING COMMUNICATION, METHOD FOR PROCESSING COMMUNICATION MESSAGES AND METHOD FOR MANAGING COMMUNICATION | |
CN106899948B (en) | Pseudo base station discovery method, system, terminal and server | |
WO2018010480A1 (en) | Network locking method for esim card, terminal, and network locking authentication server | |
CN113099456B (en) | Pseudo base station identification method, device, equipment and storage medium | |
CN111148094A (en) | Registration method of 5G user terminal, user terminal equipment and medium | |
CN103686651A (en) | Emergency call based authentication method, device and system | |
CN106921633A (en) | Calling number Verification System and method | |
CN101860844A (en) | Method, device and system for monitoring SIM card | |
CN105407479A (en) | Information recognition method, information gateway, SIM card, and system | |
WO2016134608A1 (en) | Method and apparatus for identifying pseudo base station | |
CN112165458B (en) | Real-name authentication method, device and terminal | |
CN107995616B (en) | User behavior data processing method and device | |
CN112788587A (en) | System for acquiring and managing cloud SIM card data and processing method thereof | |
CN116743481A (en) | Service security management and control method, device, equipment and storage medium | |
CN110366184A (en) | A kind of method and intelligent terminal identifying pseudo-base station note | |
CN107809758B (en) | SIM card information protection method and device | |
CN116963055A (en) | Authentication method, authentication device, authentication apparatus, authentication storage medium, and authentication program product | |
CN111163466B (en) | Method for 5G user terminal to access block chain, user terminal equipment and medium | |
CN109379744B (en) | Pseudo base station identification method and device and communication terminal | |
CN102404711B (en) | Locking net device of mobile terminal and identifying method between modules | |
CN111065099B (en) | Base station selection method, terminal to be accessed and reference terminal | |
CN111246475B (en) | Method and device for authenticating base station | |
CN112672341B (en) | Pseudo base station identification method, apparatus and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |