WO2016082483A1 - 鉴别伪基站的方法和装置 - Google Patents

鉴别伪基站的方法和装置 Download PDF

Info

Publication number
WO2016082483A1
WO2016082483A1 PCT/CN2015/078984 CN2015078984W WO2016082483A1 WO 2016082483 A1 WO2016082483 A1 WO 2016082483A1 CN 2015078984 W CN2015078984 W CN 2015078984W WO 2016082483 A1 WO2016082483 A1 WO 2016082483A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
short message
identifier
pseudo base
module
Prior art date
Application number
PCT/CN2015/078984
Other languages
English (en)
French (fr)
Inventor
姜承志
戴晔
刘亮
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016082483A1 publication Critical patent/WO2016082483A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices

Definitions

  • This document relates to techniques for identifying pseudo base stations, and more particularly to a method and apparatus for identifying pseudo base stations.
  • the pseudo base station first suppresses the signals of the surrounding GSM cells by using high-power broadcast signals, so that the surrounding mobile phones change their doors and rely on the pseudo base station because of the difference in signal strength.
  • the pseudo base station also broadcasts a very unique number that allows the phone to discover a new area and needs to be re-registered.
  • the pseudo base station simulates a real base station, interacts with the mobile phone, implements an authentication process, and obtains the IMSI of the mobile phone user.
  • the pseudo base station uses the obtained IMSI to authenticate the terminal of the pseudo base station.
  • the pseudo base station sends a short message, where the calling number uses a forged number to trick the user.
  • the present invention provides a method and apparatus for identifying a pseudo base station to at least solve the above problem.
  • a method of authenticating a pseudo base station comprising:
  • the terminal receives the short message sent by the base station
  • the terminal parses the identifier of the recipient in the short message
  • the terminal determines, according to the comparison result, whether the base station is a pseudo base station.
  • the method further includes:
  • the terminal Before the terminal receives the short message sent by the base station, the terminal stores the recipient identity.
  • the step of the terminal parsing the identity identifier in the short message includes:
  • the terminal parses the protocol data unit PDU string in the short message, and acquires the receiver identity identifier included in the PDU string.
  • the receiver identity identifier includes at least one of the following information:
  • Mobile terminal number ID number, password set by the user.
  • the method further includes: determining, by the terminal, that the receiver identity identifier is not in the short message, determining that the base station is a pseudo base station;
  • the step of determining, by the terminal, whether the base station is a pseudo base station according to the comparison result comprises: determining, by the terminal, that the identifier of the receiver and the identifier of the stored receiver are inconsistent, determining that the base station is a pseudo base station.
  • a method of authenticating a pseudo base station comprising:
  • the base station acquires a receiver identity, where the receiver identity is used to compare with the receiver identity stored by the terminal, and determines whether the base station is a pseudo base station;
  • the base station adds the identifier of the receiver to the short message
  • the base station sends the short message to the terminal.
  • the step of the base station adding the receiver identity identifier to the short message includes:
  • the network side server edits the short message, and adds the recipient identity to the protocol data unit PDU string in the short message.
  • the receiver identity identifier includes at least one of the following information:
  • Mobile terminal number ID number, password set by the user.
  • a device for identifying a pseudo base station is located at a terminal side, and the device includes a receiving module, a parsing module, a comparing module, and a judging module, wherein:
  • the receiving module is configured to: receive a short message sent by the base station;
  • the parsing module is configured to: parse the identifier of the recipient in the short message
  • the comparison module is configured to: compare the parsed identity identifier obtained by the parsing with the stored receiver identity identifier, and generate a comparison result;
  • the determining module is configured to: determine, according to the comparison result, whether the base station is a pseudo base station.
  • the device further includes a storage module, wherein
  • the storage module is configured to: store the identifier of the receiver before the receiving module receives the short message sent by the base station.
  • the parsing module is configured to parse the recipient identity in the short message as follows:
  • the receiver identity identifier includes at least one of the following information:
  • Mobile terminal number ID number, password set by the user.
  • the device further includes a prompting module:
  • the determining module is configured to: when the identifier of the recipient is not in the short message, or the identifier of the receiver and the identifier of the stored receiver are inconsistent, determine that the base station is a pseudo base station;
  • the prompting module is configured to: after the determining module determines that the base station is a pseudo base station, send the result to the user.
  • An apparatus for identifying a pseudo base station located at a base station side, where the apparatus includes an obtaining module, an adding module, and a sending module, where:
  • the adding module is configured to: add the identifier of the recipient to the short message
  • the adding module is configured to add the receiver identity to the short message as follows:
  • the adding module adds the identifier of the receiver to the protocol data unit PDU string in the short message when the network side server edits the short message.
  • the receiver identity identifier includes at least one of the following information:
  • Mobile terminal number ID number, password set by the user.
  • the short message sent by the base station Receiving, by the technical solution of the present invention, the short message sent by the base station; and analyzing the identifier of the receiver in the short message, wherein the identity of the receiver is added to the short message by using a network side server; and comparing the identifier of the receiver And comparing the stored receiver identity, generating a comparison result; determining, according to the comparison result, whether the base station is a pseudo base station.
  • the problem that the terminal device cannot effectively identify the pseudo base station is solved, and the pseudo base station is accurately identified, and the illegal behavior of the pseudo base station is prevented.
  • FIG. 1 is a flow chart of a method for authenticating a pseudo base station according to an embodiment of the present invention
  • FIG. 2 is a flow chart of a method for authenticating a pseudo base station according to an embodiment of the present invention
  • FIG. 3 is a block diagram showing the structure of an apparatus for authenticating a pseudo base station according to an embodiment of the present invention
  • FIG. 4 is a block diagram showing the structure of an apparatus for authenticating a pseudo base station according to an embodiment of the present invention
  • FIG. 5 is a flowchart of an authentication pseudo base station according to an embodiment of the present invention.
  • FIG. 1 is a flowchart of a method for authenticating a pseudo base station according to an embodiment of the present invention. As shown in FIG. 1, the process includes the following steps:
  • Step S102 receiving a short message sent by the base station
  • Step S104 parsing the identifier of the receiver in the short message, where the identifier of the receiver is added to the short message by using a network side server;
  • Step S106 Compare the receiver identity identifier with the stored receiver identity identifier, and generate a comparison result.
  • Step S108 Determine, according to the comparison result, whether the base station is a pseudo base station.
  • the identity identifier of the receiver is added to the short message sent by the base station to the user, and according to the identity identifier, it is determined whether the received short message is from the pseudo base station, and the problem that the terminal device cannot effectively identify the pseudo base station is solved, and the accurate authentication is realized.
  • the base station prevents the illegal behavior of using the pseudo base station.
  • the parsing the identity identifier in the short message comprises: parsing a protocol data unit PDU string in the short message, and acquiring a recipient identity identifier included in the PDU string.
  • the recipient identity identifier includes at least one of the following: a mobile phone number, an identity card number, and a password set by the user.
  • the method includes: in the short message, the recipient identity identifier or the identifier of the receiver and the stored identity of the receiver are inconsistent, and after determining that the base station is a pseudo base station, sending the result to the user.
  • FIG. 2 is a flowchart of a method for authenticating a pseudo base station according to an embodiment of the present invention. As shown in FIG. 2, the process includes the following steps:
  • Step S202 Acquire a receiver identity identifier, where the receiver identity identifier is used to compare with a receiver identity identifier stored by the terminal, to determine whether the base station is a pseudo base station;
  • Step S204 adding the identifier of the recipient to the short message
  • Step S206 sending the short message.
  • the identifier of the receiver where the identifier of the receiver is used to compare with the identifier of the receiver stored by the terminal, determining whether the base station is a pseudo base station; adding the identifier of the receiver to the short message; SMS.
  • the identity identifier of the receiver is added to the short message sent by the base station to the user, and according to the identity identifier, it is determined whether the received short message is from the pseudo base station, and the problem that the terminal device cannot effectively identify the pseudo base station is solved, and the accurate authentication is realized.
  • the base station prevents the illegal behavior of using the pseudo base station.
  • the adding the identity of the recipient to the short message includes: when the network side server edits the short message, adding the identifier of the recipient to the protocol data unit PDU string in the short message.
  • the recipient identity identifier includes at least one of the following: a mobile phone number, an identity card number, and a password set by the user.
  • the device for identifying the pseudo base station is further provided, and the device is used to implement the foregoing embodiments and optional embodiments, and details are not described herein.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and conceivable.
  • FIG. 3 is a structural block diagram of an apparatus for authenticating a pseudo base station according to an embodiment of the present invention. As shown in FIG. 3, the apparatus includes:
  • the receiving module 32 is configured to: receive a short message sent by the base station;
  • the parsing module 34 is configured to: parse the identifier of the receiver in the short message, where the identifier of the receiver is added to the short message by using a network side server;
  • the comparison module 36 is configured to: compare the receiver identity identifier with the stored receiver identity identifier, and generate a comparison result;
  • the determining module 38 is configured to: determine, according to the comparison result, whether the base station is a pseudo base station.
  • the receiving module 32, the parsing module 34, the comparing module 36, and the judging module 38 are combined by the foregoing apparatus, and the identifier of the receiving party is added to the short message sent by the base station to the user, and according to the identity identifier, whether the received short message is from the pseudo base station is determined.
  • the problem that the terminal device cannot effectively identify the pseudo base station is solved, and the pseudo base station is accurately identified, and the illegal behavior of the pseudo base station is prevented.
  • the device includes: a storage module, configured to: store the identity identifier of the receiver before receiving the short message sent by the base station.
  • the apparatus includes: the parsing module 34 is configured to parse the protocol data unit PDU string in the short message, and obtain the receiver identity identifier included in the PDU string.
  • the recipient identity identifier includes at least one of the following: a mobile phone number, an identity card number, and a password set by the user.
  • the apparatus includes: a prompting module, configured to: if the identifier of the recipient is not in the short message, or the identifier of the receiver is inconsistent with the identifier of the stored receiver, and after determining that the base station is a pseudo base station, Send the result to the user.
  • a prompting module configured to: if the identifier of the recipient is not in the short message, or the identifier of the receiver is inconsistent with the identifier of the stored receiver, and after determining that the base station is a pseudo base station, Send the result to the user.
  • the device for identifying the pseudo base station is further provided, and the device is used to implement the foregoing embodiments and optional embodiments, and details are not described herein.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and conceivable.
  • FIG. 4 is a structural block diagram of an apparatus for authenticating a pseudo base station according to an embodiment of the present invention. As shown in FIG. 4, the apparatus includes:
  • the obtaining module 42 is configured to: obtain a receiver identity, where the receiver identity is used to compare with a receiver identity stored by the terminal, and determine whether the base station is a pseudo base station;
  • the adding module 44 is configured to: add the recipient identity to the short message
  • the sending module 46 is configured to: send the short message.
  • the obtaining module 42 and the adding module 44 are combined with the sending module 46, and the identity identifier of the receiving party is added to the short message sent by the base station to the user, and according to the identity identifier, whether the received short message is from the pseudo base station is determined, and the terminal device is solved.
  • the problem of the pseudo base station cannot be effectively identified, and the pseudo base station is accurately identified, and the illegal behavior of the pseudo base station is prevented.
  • the apparatus includes: the adding module is configured to: when the network side server edits the short message, add the receiver identity identifier to the protocol data unit PDU string in the short message.
  • the recipient identity identifier includes at least one of the following: a mobile phone number, an identity card number, and a password set by the user.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • the recipient identity is added to the short message, and the identity identifier of the receiver is not known to the pseudo base station. Only the operator knows, then the fraud message can be determined.
  • the short message center of the operator edits the short message PDU string
  • the identity of the recipient is added, and the terminal analyzes and compares the received short message, so that it can accurately determine whether it is a fraudulent short message sent by the pseudo base station.
  • the user first stores the identity in the storage module through the terminal, and the short message receiving module receives the short message, and the short message receiving module calls the short message PDU string parsing module to perform short message parsing, parses and reads the related information attached to the short message PDU string, and then performs the comparison module through the comparison module. If the user identity is inconsistent or the received PDU string does not include the user identity, the information sent by the pseudo base station can be determined, and the user is prompted by the display module.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • Each mobile phone card has a unique mobile phone number, so the mobile phone number can function as the recipient identity.
  • the mobile phone number can function as the recipient identity.
  • Adding the user's mobile phone number as the recipient identity in the PDU string of the short message may be, but is not limited to, the following:
  • the format of the PDU when the mobile terminal sends a short message is as follows:
  • the format of the PDU when the mobile terminal receives the short message is as follows:
  • the short message center when the short message center establishes the PDU string of the receiving party's short message, it only needs to add the mobile phone number of the receiving party, that is, the PDU string is formed in the following format.
  • the user first stores the mobile phone number in the identity storage module of the terminal through the mobile phone;
  • the protocol stack After receiving the information sent by the base station, the protocol stack transmits the short message content to the short message receiving module;
  • the short message receiving module calls the short message PDU string parsing module to perform short message parsing, and parses and reads related information attached to the PDU string;
  • the identity identification comparison module performs comparison of the mobile phone numbers. If the mobile phone number is inconsistent or the received PDU string does not include the mobile phone number, the information sent by the pseudo base station may be determined;
  • the embodiment of the invention discloses a computer program, including program instructions, when the program instruction is executed by the terminal, so that the terminal can perform any method of identifying the pseudo base station on the terminal side.
  • the embodiment of the invention also discloses a carrier carrying the above computer program.
  • the embodiment of the invention discloses a computer program, comprising program instructions, when the program instruction is executed by a base station, so that the base station can perform the method of identifying the pseudo base station on the base station side.
  • the embodiment of the invention also discloses a carrier carrying the above computer program.
  • the present invention Receiving, by the technical solution of the present invention, the short message sent by the base station; and analyzing the identifier of the receiver in the short message, wherein the identity of the receiver is added to the short message by using a network side server; and comparing the identifier of the receiver And comparing the stored receiver identity, generating a comparison result; determining, according to the comparison result, whether the base station is a pseudo base station.
  • the problem that the terminal device cannot effectively identify the pseudo base station is solved, and the pseudo base station is accurately identified, and the illegal behavior of the pseudo base station is prevented. Therefore, the present invention has strong industrial applicability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

一种鉴别伪基站的方法和装置,其中,该方法包括:接收基站发送的短信;解析该短信中的接收方身份标识,其中,该接收方身份标识为通过网络侧服务器添加到该短信中;对比该接收方身份标识和所存储的接收方身份标识,生成对比结果;根据该对比结果确定该基站是否是伪基站。上述技术方案解决了终端设备无法有效鉴别伪基站的问题,实现了准确的鉴别出伪基站,防止了利用伪基站的不法行为。

Description

鉴别伪基站的方法和装置 技术领域
本文涉及鉴别伪基站的技术,尤其涉及一种鉴别伪基站方法和装置。
背景技术
随着移动通信技术的发展,诈骗手段也是层出不穷,目前广泛流传的一种高科技诈骗手段就是不发分子利用伪基站以银行、公安、通讯运营商的身份给用户发送诈骗短信,要求用户输入银行卡、密码等涉及用户财产安全的相关信息,以达到诈骗目的。
伪基站首先用大功率的广播信号压制周围GSM小区的信号,使得周边的手机由于信号强度的差异,纷纷改换门庭,投靠到伪基站这边来。伪基站还广播了非常独特的编号,使得手机发现进入了一个新的区域,需要重新位置登记。在位置登记阶段,伪基站模拟成一个真实的基站,与手机交互,实施鉴权过程,并且获得了手机用户的IMSI。位置登记完成后,伪基站利用获得的IMSI,鉴别伪基站的终端。终端响应后,伪基站下发短消息,其中的主叫号码采用伪造的号码,以欺骗用户。
在相关技术中,针对终端设备无法有效鉴别伪基站的问题,目前尚未提出有效的解决方法。
发明内容
有鉴于此,为了解决终端设备无法有效鉴别伪基站的问题,本发明提供了一种鉴别伪基站的方法和装置,以至少解决上述问题。
为了解决上述技术问题,采用如下技术方案:
一种鉴别伪基站的方法,所述方法包括:
终端接收基站发送的短信;
所述终端解析所述短信中的接收方身份标识;
所述终端对比解析得到的所述接收方身份标识和所存储的接收方身份标识,生成对比结果;
所述终端根据所述对比结果确定所述基站是否是伪基站。
可选地,该方法还包括:
在所述终端接收基站发送的短信的步骤之前,所述终端存储所述接收方身份标识。
可选地,所述终端解析所述短信中的身份标识的步骤包括:
所述终端解析所述短信中的协议数据单元PDU串,获取所述PDU串中包含的所述接收方身份标识。
可选地,所述接收方身份标识包括以下信息至少之一:
移动终端号码,身份证号码,用户设置的密码。
可选地,该方法还包括:所述终端确定在所述短信中没有所述接收方身份标识,则确定所述基站是伪基站;
所述终端根据所述对比结果确定所述基站是否是伪基站的步骤包括:所述终端确定所述接收方身份标识和存储的接收方的身份标识不一致,则确定所述基站是伪基站。
一种鉴别伪基站的方法,所述方法包括:
基站获取接收方身份标识,其中,所述接收方身份标识用于和终端存储的接收方身份标识对比,确定所述基站是否是伪基站;
所述基站添加所述接收方身份标识到短信中;
所述基站将所述短信发送给终端。
可选地,所述基站添加所述接收方身份标识到短信中的步骤包括:
网络侧服务器编辑所述短信,添加所述接收方身份标识到所述短信中的协议数据单元PDU串中。
可选地,所述接收方身份标识包括以下信息的至少之一:
移动终端号码,身份证号码,用户设置的密码。
一种鉴别伪基站的装置,位于终端侧,所述装置包括接收模块、解析模块、对比模块和判断模块,其中:
所述接收模块设置成:接收基站发送的短信;
所述解析模块设置成:解析所述短信中的接收方身份标识;
所述对比模块设置成:对比解析得到的所述接收方身份标识和所存储的接收方身份标识,生成对比结果;
所述判断模块设置成:根据所述对比结果确定所述基站是否是伪基站。
可选地,该装置还包括存储模块,其中
所述存储模块设置成:在所述接收模块接收基站发送的短信之前,存储所述接收方身份标识。
可选地,所述解析模块设置成按照如下方式解析所述短信中的接收方身份标识:
解析所述短信中的协议数据单元PDU串,获取所述PDU串中包含的接收方身份标识。
可选地,所述接收方身份标识包括以下信息至少之一:
移动终端号码,身份证号码,用户设置的密码。
可选地,该装置还包括提示模块:
所述判断模块设置成:在所述短信中没有所述接收方身份标识,或所述接收方身份标识和存储的接收方的身份标识不一致时,确定所述基站是伪基站;
所述提示模块设置成:在所述判断模块确定所述基站是伪基站后,发送结果给用户。
一种鉴别伪基站的装置,位于基站侧,所述装置包括获取模块、添加模块和发送模块,其中:
所述获取模块设置成:获取接收方身份标识,其中,所述接收方身份标识用于和终端存储的接收方身份标识对比,确定所述基站是否是伪基站;
所述添加模块设置成:添加所述接收方身份标识到短信中;
所述发送模块设置成:发送所述短信给终端。
可选地,所述添加模块设置成按照如下方式添加所述接收方身份标识到短信中:
所述添加模块在网络侧服务器编辑所述短信时,添加所述接收方身份标识到所述短信中的协议数据单元PDU串中。
可选地,所述接收方身份标识包括以下信息至少之一:
移动终端号码,身份证号码,用户设置的密码。
通过本发明技术方案,接收基站发送的短信;解析所述短信中的接收方身份标识,其中,所述接收方身份标识为通过网络侧服务器添加到所述短信中;对比所述接收方身份标识和所存储的接收方身份标识,生成对比结果;根据所述对比结果确定所述基站是否是伪基站。解决终端设备无法有效鉴别伪基站的问题,实现了准确的鉴别出伪基站,防止了利用伪基站的不法行为。
附图概述
图1是根据本发明实施例的一种鉴别伪基站的方法流程图;
图2是根据本发明实施例的一种鉴别伪基站的方法流程图;
图3是根据本发明实施例的一种鉴别伪基站的装置结构框图;
图4是根据本发明实施例的一种鉴别伪基站的装置结构框图;
图5是根据本发明实施例的鉴别伪基站的流程图。
本发明的较佳实施方式
下面结合附图对本发明的实施例进行说明,需要说明的是,在不冲突的情况下,本申请中的实施例和实施例中的特征可以相互任意组合。
下面结合附图及具体实施例对本发明再作进一步详细的说明。
在本实施例中提供了一种鉴别伪基站的方法,图1是根据本发明实施例的一种鉴别伪基站的方法流程图,如图1所示,该流程包括如下步骤:
步骤S102,接收基站发送的短信;
步骤S104,解析所述短信中的接收方身份标识,其中,所述接收方身份标识为通过网络侧服务器添加到所述短信中;
步骤S106,对比所述接收方身份标识和所存储的接收方身份标识,生成对比结果;
步骤S108,根据所述对比结果确定所述基站是否是伪基站。
其中,上述步骤中接收基站发送的短信;解析该短信中的接收方身份标识,其中,该接收方身份标识为通过网络侧服务器添加到该短信中;对比该接收方身份标识和所存储的接收方身份标识,生成对比结果;根据该对比结果确定该基站是否是伪基站。
通过上述步骤,在基站向用户发送的短信中添加接收方的身份标识,根据此身份标识判断接收的短信是否来自伪基站,解决终端设备无法有效鉴别伪基站的问题,实现了准确的鉴别出伪基站,防止了利用伪基站的不法行为。
在本实施例中,该方法包括:在该接收基站发送的短信之前,存储该接收方身份标识。
在本实施例中,该解析该短信中的身份标识包括:解析该短信中的协议数据单元PDU串,获取该PDU串中包含的接收方身份标识。
在本实施例中,该接收方身份标识包括以下至少之一:手机号码,身份证号码,用户设置的密码。
在本实施例中,该方法包括:在该短信中没有该接收方身份标识或该接收方身份标识和存储的接收方的身份标识不一致,确定该基站是伪基站后,发送结果给用户。
在本实施例中还提供了一种鉴别伪基站的方法,图2是根据本发明实施例的一种鉴别伪基站的方法流程图,如图2所示,该流程包括如下步骤:
步骤S202,获取接收方身份标识,其中,所述接收方身份标识用于和终端存储的接收方身份标识对比,确定所述基站是否是伪基站;
步骤S204,添加所述接收方身份标识到短信中;
步骤S206,发送所述短信。
其中,上述步骤中获取接收方身份标识,其中,该接收方身份标识用于和终端存储的接收方身份标识对比,确定该基站是否是伪基站;添加该接收方身份标识到短信中;发送该短信。
通过上述步骤,在基站向用户发送的短信中添加接收方的身份标识,根据此身份标识判断接收的短信是否来自伪基站,解决终端设备无法有效鉴别伪基站的问题,实现了准确的鉴别出伪基站,防止了利用伪基站的不法行为。
在本实施例中,该添加该接收方身份标识到短信中包括:在网络侧服务器编辑该短信时,添加该接收方身份标识到该短信中的协议数据单元PDU串中。
在本实施例中,该接收方身份标识包括以下至少之一:手机号码,身份证号码,用户设置的密码。
在本实施例中还提供了鉴别伪基站的装置,该装置用于实现上述实施例及可选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件、或者软件和硬件的组合的实现也是可能并被构想的。
图3是根据本发明实施例的一种鉴别伪基站的装置结构框图,如图3所示,该装置包括:
接收模块32,设置成:接收基站发送的短信;
解析模块34,设置成:解析所述短信中的接收方身份标识,其中,所述接收方身份标识为通过网络侧服务器添加到所述短信中;
对比模块36,设置成:对比所述接收方身份标识和所存储的接收方身份标识,生成对比结果;
判断模块38,设置成:根据所述对比结果确定所述基站是否是伪基站。
通过上述装置,将接收模块32、解析模块34、对比模块36、判断模块38相结合,在基站向用户发送的短信中添加接收方的身份标识,根据此身份标识判断接收的短信是否来自伪基站,解决终端设备无法有效鉴别伪基站的问题,实现了准确的鉴别出伪基站,防止了利用伪基站的不法行为。
在本实施例中,该装置包括:存储模块,设置成:在该接收基站发送的短信之前,存储该接收方身份标识。
在本实施例中,该装置包括:该解析模块34设置成:解析该短信中的协议数据单元PDU串,获取该PDU串中包含的接收方身份标识。
在本实施例中,该接收方身份标识包括以下至少之一:手机号码,身份证号码,用户设置的密码。
在本实施例中,该装置包括:提示模块,设置成:在该短信中没有该接收方身份标识或该接收方身份标识和存储的接收方的身份标识不一致,确定该基站是伪基站后,发送结果给用户。
在本实施例中还提供了鉴别伪基站的装置,该装置用于实现上述实施例及可选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件、或者软件和硬件的组合的实现也是可能并被构想的。
图4是根据本发明实施例的一种鉴别伪基站的装置结构框图,如图4所示,该装置包括:
获取模块42,设置成:获取接收方身份标识,其中,所述接收方身份标识用于和终端存储的接收方身份标识对比,确定所述基站是否是伪基站;
添加模块44,设置成:添加所述接收方身份标识到短信中;
发送模块46,设置成:发送所述短信。
通过上述装置,将获取模块42、添加模块44和发送模块46相结合,在基站向用户发送的短信中添加接收方的身份标识,根据此身份标识判断接收的短信是否来自伪基站,解决终端设备无法有效鉴别伪基站的问题,实现了准确的鉴别出伪基站,防止了利用伪基站的不法行为。
在本实施例中,该装置包括:该添加模块设置成:在网络侧服务器编辑该短信时,添加该接收方身份标识到该短信中的协议数据单元PDU串中。
在本实施例中,该接收方身份标识包括以下至少之一:手机号码,身份证号码,用户设置的密码。
下面结合可选实施例和实施方式对本发明进行详细说明。
实施例一:
在短信中增加接收方身份标识,此接收方身份标识伪基站并不知道,只有运营商知道,那么就可以以此判断出诈骗短信了。在运营商短消息中心编辑短信PDU串时,将接收方身份标识加入,终端在收到短信后进行解析对比,由此就可以准确的判断出是否是伪基站发来的诈骗短信。用户首先通过终端将身份标识存储在存储模块中,短信接收模块接收短信,短信接收模块调用短信PDU串解析模块进行短信解析,将短信PDU串附加的相关信息进行解析读取,然后通过对比模块进行用户身份标识的对比,如果不一致或者接收的PDU串中不包含用户身份标识,则可以判断为伪基站发来的信息,通过显示模块给用户进行提示。
实施例二:
每张手机卡中都有一个唯一的手机号,所以手机号就可以起到接收方身份标识作用。在运营商短信中心编辑短信PDU串时,将手机卡对应的手机号码加入其中。
对于在短信的PDU串中增加用户手机号作为接收方身份标识,可以采用但不限于以下方式:
当前手机终端发送短消息时的PDU格式如下:
SCA PDU-Type MR DA PID DCS VP UDL UD
其中的DA是接收方的手机号码
当前手机终端接收短消息时的PDU格式如下:
SCA PDU-Type OA PID DCS SCTS UDL UD
其中的OA字段是发送方的手机号码
由以上格式可知,短信中心在组建接收方短信的PDU串时,只需要将接收方的手机号码加入即可,即以如下格式来组建PDU串。
SCA PDU-Type OA DA PID DCS SCTS UDL UD
图5是根据本发明实施例的鉴别伪基站的流程图,如图5所示:
用户首先通过手机将本手机号码存储在终端的身份标识存储模块;
当协议栈接收到基站发来的信息后,将短信内容传递给短信接收模块;
短信接收模块调用短信PDU串解析模块进行短信解析,将PDU串附加的相关信息进行解析读取;
通身份标识对比模块进行手机号码的对比,如果不一致或者接收的PDU串中不包含本手机号码,则可以判断为伪基站发来的信息;
通过提示模块给用户进行提示。
本发明实施例公开了一种计算机程序,包括程序指令,当该程序指令被终端执行时,使得该终端可执行上述任意的终端侧的鉴别伪基站的方法。
本发明实施例还公开了一种载有上述计算机程序的载体。
本发明实施例公开了一种计算机程序,包括程序指令,当该程序指令被基站执行时,使得该基站可执行上述任意的基站侧的鉴别伪基站的方法。
本发明实施例还公开了一种载有上述计算机程序的载体。
虽然本发明所揭示的实施方式如上,但其内容只是为了便于理解本发明的技术方案而采用的实施方式,并非用于限定本发明。任何本发明所属技术领域内的技术人员,在不脱离本发明所揭示的核心技术方案的前提下,可以 在实施的形式和细节上做任何修改与变化,但本发明所限定的保护范围,仍须以所附的权利要求书限定的范围为准。
工业实用性
通过本发明技术方案,接收基站发送的短信;解析所述短信中的接收方身份标识,其中,所述接收方身份标识为通过网络侧服务器添加到所述短信中;对比所述接收方身份标识和所存储的接收方身份标识,生成对比结果;根据所述对比结果确定所述基站是否是伪基站。解决终端设备无法有效鉴别伪基站的问题,实现了准确的鉴别出伪基站,防止了利用伪基站的不法行为。因此本发明具有很强的工业实用性。

Claims (16)

  1. 一种鉴别伪基站的方法,所述方法包括:
    终端接收基站发送的短信;
    所述终端解析所述短信中的接收方身份标识;
    所述终端对比解析得到的所述接收方身份标识和所存储的接收方身份标识,生成对比结果;
    所述终端根据所述对比结果确定所述基站是否是伪基站。
  2. 根据权利要求1所述的鉴别伪基站的方法,该方法还包括:
    在所述终端接收基站发送的短信的步骤之前,所述终端存储所述接收方身份标识。
  3. 根据权利要求1所述的鉴别伪基站的方法,其中,所述终端解析所述短信中的身份标识的步骤包括:
    所述终端解析所述短信中的协议数据单元PDU串,获取所述PDU串中包含的所述接收方身份标识。
  4. 根据权利要求1至3中任一项所述的鉴别伪基站的方法,其中,所述接收方身份标识包括以下信息至少之一:
    移动终端号码,身份证号码,用户设置的密码。
  5. 根据权利要求4所述的鉴别伪基站的方法,
    该方法还包括:所述终端确定在所述短信中没有所述接收方身份标识,则确定所述基站是伪基站;
    所述终端根据所述对比结果确定所述基站是否是伪基站的步骤包括:所述终端确定所述接收方身份标识和存储的接收方的身份标识不一致,则确定所述基站是伪基站。
  6. 一种鉴别伪基站的方法,所述方法包括:
    基站获取接收方身份标识,其中,所述接收方身份标识用于和终端存储的接收方身份标识对比,确定所述基站是否是伪基站;
    所述基站添加所述接收方身份标识到短信中;
    所述基站将所述短信发送给终端。
  7. 根据权利要求6所述的鉴别伪基站的方法,其中,所述基站添加所述接收方身份标识到短信中的步骤包括:
    网络侧服务器编辑所述短信,添加所述接收方身份标识到所述短信中的协议数据单元PDU串中。
  8. 根据权利要求6或7所述的鉴别伪基站的方法,其中,所述接收方身份标识包括以下信息的至少之一:
    移动终端号码,身份证号码,用户设置的密码。
  9. 一种鉴别伪基站的装置,位于终端侧,所述装置包括接收模块、解析模块、对比模块和判断模块,其中:
    所述接收模块设置成:接收基站发送的短信;
    所述解析模块设置成:解析所述短信中的接收方身份标识;
    所述对比模块设置成:对比解析得到的所述接收方身份标识和所存储的接收方身份标识,生成对比结果;
    所述判断模块设置成:根据所述对比结果确定所述基站是否是伪基站。
  10. 根据权利要求9所述的鉴别伪基站的装置,该装置还包括存储模块,其中
    所述存储模块设置成:在所述接收模块接收基站发送的短信之前,存储所述接收方身份标识。
  11. 根据权利要求9所述的鉴别伪基站的装置,其中,所述解析模块设置成按照如下方式解析所述短信中的接收方身份标识:
    解析所述短信中的协议数据单元PDU串,获取所述PDU串中包含的接收方身份标识。
  12. 根据权利要求9至11中任一项所述的鉴别伪基站的装置,其中,所述接收方身份标识包括以下信息至少之一:
    移动终端号码,身份证号码,用户设置的密码。
  13. 根据权利要求12所述的鉴别伪基站的装置,该装置还包括提示模块:
    所述判断模块设置成:在所述短信中没有所述接收方身份标识,或所述接收方身份标识和存储的接收方的身份标识不一致时,确定所述基站是伪基站;
    所述提示模块设置成:在所述判断模块确定所述基站是伪基站后,发送结果给用户。
  14. 一种鉴别伪基站的装置,位于基站侧,所述装置包括获取模块、添加模块和发送模块,其中:
    所述获取模块设置成:获取接收方身份标识,其中,所述接收方身份标识用于和终端存储的接收方身份标识对比,确定所述基站是否是伪基站;
    所述添加模块设置成:添加所述接收方身份标识到短信中;
    所述发送模块设置成:发送所述短信给终端。
  15. 根据权利要求14所述的鉴别伪基站的装置,其中,所述添加模块设置成按照如下方式添加所述接收方身份标识到短信中:
    所述添加模块在网络侧服务器编辑所述短信时,添加所述接收方身份标识到所述短信中的协议数据单元PDU串中。
  16. 根据权利要求14或15所述的鉴别伪基站的装置,其中,所述接收方身份标识包括以下信息至少之一:
    移动终端号码,身份证号码,用户设置的密码。
PCT/CN2015/078984 2014-11-25 2015-05-14 鉴别伪基站的方法和装置 WO2016082483A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410692493.X 2014-11-25
CN201410692493.XA CN105704718A (zh) 2014-11-25 2014-11-25 鉴别伪基站的方法和装置

Publications (1)

Publication Number Publication Date
WO2016082483A1 true WO2016082483A1 (zh) 2016-06-02

Family

ID=56073498

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/078984 WO2016082483A1 (zh) 2014-11-25 2015-05-14 鉴别伪基站的方法和装置

Country Status (2)

Country Link
CN (1) CN105704718A (zh)
WO (1) WO2016082483A1 (zh)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105933907A (zh) * 2016-06-28 2016-09-07 努比亚技术有限公司 一种伪基站识别装置、方法及移动终端
CN106255119A (zh) * 2016-09-13 2016-12-21 宇龙计算机通信科技(深圳)有限公司 伪基站消息识别方法及系统
CN106454848A (zh) * 2016-12-21 2017-02-22 荆楚理工学院 一种伪基站识别方法及设备
CN106792713A (zh) * 2017-02-28 2017-05-31 努比亚技术有限公司 一种伪基站短信的识别方法、移动终端及基站设备
CN107172622A (zh) * 2017-07-21 2017-09-15 北京奇虎科技有限公司 伪基站短信的识别和分析方法、装置及系统
WO2017206341A1 (zh) * 2016-06-03 2017-12-07 中兴通讯股份有限公司 一种短信识别方法及装置
CN108207001A (zh) * 2016-12-16 2018-06-26 中国移动通信集团四川有限公司 数据处理装置及方法
CN109362079A (zh) * 2018-11-05 2019-02-19 北京小米移动软件有限公司 数据处理方法及装置
US10623430B2 (en) 2017-11-14 2020-04-14 International Business Machines Corporation Risk area determination in communication network

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107872793B (zh) * 2016-09-26 2021-11-16 中国移动通信有限公司研究院 一种基站识别方法、终端和服务器
CN106454776B (zh) * 2016-09-30 2022-03-18 宇龙计算机通信科技(深圳)有限公司 伪基站的防护方法及装置
CN106572451A (zh) * 2016-10-28 2017-04-19 努比亚技术有限公司 一种终端和伪基站短信识别方法
CN106412915A (zh) 2016-10-31 2017-02-15 宇龙计算机通信科技(深圳)有限公司 伪无线接入点识别方法及系统
CN108271156B (zh) * 2016-12-30 2021-09-03 中国移动通信集团上海有限公司 一种鉴别伪基站的方法及装置
CN108271127A (zh) * 2016-12-30 2018-07-10 中国移动通信集团公司 伪基站短信识别的方法及终端
CN108271159A (zh) * 2017-01-04 2018-07-10 中国移动通信集团四川有限公司 通信处理方法、装置及系统、安全通信方法及装置
CN108322896A (zh) * 2017-01-18 2018-07-24 大唐移动通信设备有限公司 一种发送短信的方法及装置
CN106851603A (zh) * 2017-03-31 2017-06-13 深圳市金立通信设备有限公司 一种伪基站短信识别方法及终端
CN109246630A (zh) * 2018-11-01 2019-01-18 江苏理工学院 一种防止短信诈骗的短消息监测方法及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859613A (zh) * 2005-12-15 2006-11-08 华为技术有限公司 一种短消息过滤的系统及方法
CN103763690A (zh) * 2014-01-28 2014-04-30 北京奇虎科技有限公司 检测伪基站向移动终端发送短信息的方法和装置
CN104010285A (zh) * 2014-06-18 2014-08-27 中国联合网络通信集团有限公司 一种短信过滤方法、系统以及短信服务中心和终端

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859613A (zh) * 2005-12-15 2006-11-08 华为技术有限公司 一种短消息过滤的系统及方法
CN103763690A (zh) * 2014-01-28 2014-04-30 北京奇虎科技有限公司 检测伪基站向移动终端发送短信息的方法和装置
CN104010285A (zh) * 2014-06-18 2014-08-27 中国联合网络通信集团有限公司 一种短信过滤方法、系统以及短信服务中心和终端

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017206341A1 (zh) * 2016-06-03 2017-12-07 中兴通讯股份有限公司 一种短信识别方法及装置
CN107466019A (zh) * 2016-06-03 2017-12-12 中兴通讯股份有限公司 一种短信识别方法及装置
CN105933907A (zh) * 2016-06-28 2016-09-07 努比亚技术有限公司 一种伪基站识别装置、方法及移动终端
CN105933907B (zh) * 2016-06-28 2019-10-15 努比亚技术有限公司 一种伪基站识别装置、方法及移动终端
CN106255119A (zh) * 2016-09-13 2016-12-21 宇龙计算机通信科技(深圳)有限公司 伪基站消息识别方法及系统
CN108207001A (zh) * 2016-12-16 2018-06-26 中国移动通信集团四川有限公司 数据处理装置及方法
CN106454848A (zh) * 2016-12-21 2017-02-22 荆楚理工学院 一种伪基站识别方法及设备
CN106792713A (zh) * 2017-02-28 2017-05-31 努比亚技术有限公司 一种伪基站短信的识别方法、移动终端及基站设备
CN107172622A (zh) * 2017-07-21 2017-09-15 北京奇虎科技有限公司 伪基站短信的识别和分析方法、装置及系统
US10623430B2 (en) 2017-11-14 2020-04-14 International Business Machines Corporation Risk area determination in communication network
CN109362079A (zh) * 2018-11-05 2019-02-19 北京小米移动软件有限公司 数据处理方法及装置
CN109362079B (zh) * 2018-11-05 2023-09-12 北京小米移动软件有限公司 数据处理方法及装置

Also Published As

Publication number Publication date
CN105704718A (zh) 2016-06-22

Similar Documents

Publication Publication Date Title
WO2016082483A1 (zh) 鉴别伪基站的方法和装置
US11727396B2 (en) Processing electronic tokens
RU2370901C2 (ru) Проверка допустимости контактов и обновление достоверных контактов в мобильных устройствах беспроводной связи
TW201717595A (zh) 智慧設備及其建立設備間藍牙連接的方法、裝置
CN104822146B (zh) 管理网络中不期望的服务请求
US10791106B2 (en) Digital credential with embedded authentication instructions
CN106559783B (zh) 一种对wifi网络的认证方法、装置和系统
US20100064135A1 (en) Secure Negotiation of Authentication Capabilities
CN107733838A (zh) 一种移动终端客户端身份认证方法、装置和系统
CN105915517A (zh) 一种语音验证码业务的实现方法
US20200228981A1 (en) Authentication method and device
CN103826226A (zh) 无线上网的控制方法及装置
CN105307158B (zh) 一种通信终端的手机号码的身份验证方法
WO2017161875A1 (zh) 识别伪基站的方法及装置
WO2015198136A1 (en) A method to authenticate calls in a telecommunication system
WO2016134587A1 (zh) Wifi连接验证方法、wifi热点设备及终端
CN104486761A (zh) 终端通信方法和装置
CN107333247A (zh) 短消息处理方法、装置及系统
CN106203021B (zh) 一种多认证模式一体化的应用登录方法和系统
CN105142136A (zh) 一种防伪基站攻击的方法
US10291613B1 (en) Mobile device authentication
CN112312391A (zh) 认证方法、系统和相关设备
US9131365B2 (en) Methods, apparatuses and computer program products for securing communications
CN106576241B (zh) D2d通信中检验mic的方法和d2d通信系统
CN103166755A (zh) 一种颁发移动用户身份数字证书的方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15862428

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15862428

Country of ref document: EP

Kind code of ref document: A1