WO2019047170A1 - Pseudo base station identification method and terminal - Google Patents

Pseudo base station identification method and terminal Download PDF

Info

Publication number
WO2019047170A1
WO2019047170A1 PCT/CN2017/101088 CN2017101088W WO2019047170A1 WO 2019047170 A1 WO2019047170 A1 WO 2019047170A1 CN 2017101088 W CN2017101088 W CN 2017101088W WO 2019047170 A1 WO2019047170 A1 WO 2019047170A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
target cell
terminal
confidence
pseudo base
Prior art date
Application number
PCT/CN2017/101088
Other languages
French (fr)
Chinese (zh)
Inventor
龙水平
董辰
衣强
李重锦
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2017/101088 priority Critical patent/WO2019047170A1/en
Priority to CN201780083714.5A priority patent/CN110178395A/en
Publication of WO2019047170A1 publication Critical patent/WO2019047170A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Definitions

  • the present invention relates to the field of communications, and in particular, to a pseudo base station identification method and terminal.
  • the terminal or mobile terminal, mobile station, mobile phone, user equipment, etc.
  • PLMN ID public land mobile network ID
  • the terminal can be tricked into initiating a network registration or location update request, thereby extracting information of the terminal, for example, an International Mobile Subscriber Identification Number (IMSI). ), Temporary Mobile Subscriber Identity (TMSI), or International Mobile Equipment Identity (IMEI), can also transfer information with the terminal, such as sending fraudulent text messages, malicious network links, or Harassing short messages, etc., thereby jeopardizing the user.
  • IMSI International Mobile Subscriber Identification Number
  • TMSI Temporary Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • the pseudo base station can perform network registration spoofing on the terminal, and can forge any number to send a short message to the terminal, that is, the pseudo base station is not only a base station, but also has a certain mobile network core network function.
  • the wireless signal can form one or more cellular cell signal coverage, and can change system broadcast parameters such as cell identity, and when the terminal performs a standard cell selection (or search network) process or a cell reselection process,
  • the selected target cell may be a cell formed by a certain pseudo base station (referred to as a pseudo base station cell or a pseudo cell). After the terminal selects the target cell, network registration, camping, service request, or location area update may be performed.
  • the existing method of the terminal anti-counterfeiting base station generally adopts feature data matching or intercepting the problem text message.
  • the anti-spyware base station method for feature data matching specifically, based on manual statistics and experience of the pseudo-base station cell system broadcast parameter sample data, a plurality of cell system broadcast parameters are selected, and the pseudo base station is determined.
  • the common value range of the broadcast parameters of the system to the system (often different from the true base station cell, these parameters are therefore called feature data), if several system broadcast parameters of the target cell to be evaluated match the feature data of the pseudo base station cell
  • the common value range determines (or determines) that the base station of the target cell is a pseudo base station, or the target cell is a pseudo cell.
  • the common value range of the system broadcast parameters of the foregoing pseudo base station cell for example, the LAC values 0, 65535, the minimum receiving level, the maximum power level, and the cell reselection offset (CRO) are often set to 0 and so on. However, the system broadcast parameters of the new pseudo base station cell are very concealed.
  • the problem message interception is to identify the fraudulent message, the malicious network link or the harassment message through the cloud message big data analysis, and extract the feature information of the problem message, and then send the problem message feature information to the problem message interception application on the terminal, and the interception application pair
  • the short message received by the terminal is detected. If the message characteristic information of the problem is met, the short message is placed in the intercepted state, and the blocked short message is not seen in the normal short message user interface.
  • the problem message may come from a legitimate carrier mobile network, or a pseudo base station.
  • the problem message interception only has the effect of appropriately reducing the harm of the pseudo base station, but the pseudo base station cannot be identified, and the terminal cannot be prevented from being deceived by the pseudo base station. Therefore, the existing pseudo base station identification method has a problem that the pseudo base station identification rate is low.
  • the embodiment of the invention provides a pseudo base station identification method and a terminal, which are used to improve the recognition success rate of the pseudo base station.
  • a method for identifying a pseudo base station includes: the terminal selects a target cell, and after acquiring the feature data of the target cell, the terminal runs a pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level.
  • the confidence level is used to indicate that the base station of the target cell is a trusted base station, and the pseudo base station identification algorithm is generated by the machine learning algorithm training.
  • the target cell can be authenticated according to the confidence.
  • the terminal determines that the base station of the target cell is a pseudo base station, that is, determines that the target cell is a pseudo cell.
  • the terminal may perform related operations to avoid the harm caused by the pseudo base station.
  • the pseudo base station identification algorithm is generated by the machine learning algorithm using a large number of sample data of the true and pseudo base station cells (referred to as true base station data and pseudo base station data), the recognition performance is high, and the training can be continuously trained to quickly follow the evolution of the pseudo base station technology. Therefore, the recognition success rate of the pseudo base station can be improved.
  • the method further includes: when the confidence is less than the first confidence threshold and the confidence is When the terminal detects that the target cell meets the first preset condition, the terminal determines that the base station of the target cell is a pseudo base station.
  • the second confidence threshold is smaller than the first confidence threshold. If the confidence of the target cell is between the first confidence threshold and the second confidence threshold, the base station of the target cell is a suspected pseudo base station, and the first preset condition is The base station is behavior information generated by the cell of the pseudo base station.
  • the terminal determines that the base station of the target cell is a pseudo base station. In this way, the authenticity identification of the target cell by the confidence degree is described from the probability aspect.
  • the terminal can recognize that the confidence is less than the first confidence condition. A confidence threshold but the base station is the target cell of the pseudo base station.
  • the terminal when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, the terminal Determining that the base station of the target cell is a pseudo base station, including: when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, the terminal saves the target cell Characteristic data, the feature data of the target cell is identified as pseudo base station data.
  • the pseudo base station identification algorithm is not ideal for identifying the target cell.
  • the terminal may send the feature data of the target cell to a device such as a cloud server, so that the cloud server determines the
  • the feature data of the target cell is pseudo base station data
  • the pseudo base station identification algorithm is further trained using the feature data of the target cell that is the pseudo base station data.
  • the terminal saves the feature data of the target cell, where the terminal saves the feature data of the target cell when the pseudo base station data save function is enabled, or when the target cell satisfies the pseudo base station data.
  • the terminal saves the feature data of the target cell; or, when the pseudo base station data save function is enabled, and the target cell satisfies the pseudo base station data storage rule, the terminal saves the feature data of the target cell.
  • the feature data of the target cell identified as the pseudo base station data can be flexibly saved on the terminal, the control of the terminal data storage overhead is facilitated, and the feature data of the pseudo base station cell that meets the requirements can be selected.
  • the first preset condition includes at least one condition that the terminal intercepts the problem message sent by the target cell; the terminal is rejected when the location area update request is initiated to the target cell; When the service request is initiated to the target cell, the terminal is rejected; the terminal loses the target cell signal within a preset time; or the location area code LAC of the target cell changes.
  • These conditions are behavior information generated by the base station as a cell of the pseudo base station.
  • the method further includes: when the confidence is less than or equal to the fourth confidence threshold
  • the terminal determines that the base station of the target cell is a real base station, so that the terminal performs a preset operation by using the target cell, where the preset operation includes any one of network registration, location area update, cell camping, and originating service request.
  • the terminal After the terminal identifies that the base station of the target cell is a true base station, the terminal performs a preset operation through the target cell, so that the terminal is in a more secure environment.
  • the method further includes: when the confidence is greater than the fourth confidence threshold and the confidence is When the terminal detects that the target cell meets the second preset condition, the terminal determines that the base station of the target cell is a true base station.
  • the third confidence threshold is greater than the fourth confidence threshold.
  • the terminal determines that the base station of the target cell is a true base station. In this way, since the authenticity of the target cell is determined from the probability aspect, when the confidence level is in the confidence interval to which the suspected true base station belongs, the terminal can recognize that the confidence is greater than the second confidence condition.
  • the terminal when the confidence level is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset condition, the terminal Determining that the base station of the target cell is a true base station, including: when the confidence level is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset condition, the terminal saves the target cell Characteristic data, the feature data of the target cell is identified as true base station data.
  • the pseudo base station identification algorithm is not ideal for identifying the target cell.
  • the terminal may send the feature data of the target cell to the cloud server or the like, so that the cloud server determines the The feature data of the target cell is true base station data, and the pseudo base station identification algorithm is further trained using the feature data of the target cell that is the true base station data.
  • the terminal saves the feature data of the target cell, where the terminal saves the feature data of the target cell when the true base station data save function is enabled, or saves the target cell to the true base station data.
  • the terminal saves the feature data of the target cell; or, when the true base station data save function is enabled, and the target cell satisfies the true base station data storage rule, the terminal saves the feature data of the target cell.
  • the feature data of the target cell identified as the true base station data can be flexibly saved on the terminal, the control of the terminal data storage overhead is facilitated, and the feature data of the true base station cell that meets the requirements can be selected.
  • the second preset condition includes at least one condition that the terminal establishes a call or a data service in the target cell; the terminal completes the authentication through the target cell and enters an encryption security mode; or, the terminal The handover is completed in the target cell.
  • These conditions are behavior information generated by a cell in which the base station is a true base station.
  • the target cell is a global mobile communication system GSM cell. Since the current pseudo base station is mostly a GSM base station, the present method is implemented for a scenario in which the target cell is a GSM cell, and is effective for most pseudo base stations.
  • the terminal runs the pseudo base station according to the feature data of the target cell.
  • the identification algorithm obtains a confidence level, including: when the terminal detects that the LAC of the target cell is different from the currently saved LAC, the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell, and obtains a confidence level. This can reduce power consumption and improve recognition efficiency.
  • the method further includes: the terminal prohibiting the target cell from being selected again within the preset duration. In this way, by prohibiting the selection of the target cell again within the preset duration, the interference of the pseudo base station cell to the terminal can be reduced, and the influence of the terminal on the selection of the impersonated true base station cell can be reduced.
  • the feature data includes at least one of cell selection and cell reselection information, networking information, service function information, area information, and time information. Any of these kinds of information may also include a plurality of specific cell information.
  • a terminal having the function of implementing the terminal in the method of the first aspect described above.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a terminal in a third aspect, includes a processor and a memory.
  • the processor may be configured to support a terminal to perform a corresponding function in the method described in the foregoing first aspect, for example, the processor is configured to: select a target cell; and run a pseudo base station identification algorithm according to feature data of the target cell to obtain a confidence The confidence level is used to indicate that the base station of the target cell is a trusted level of the pseudo base station, and the pseudo base station identification algorithm is generated by the machine learning algorithm training; when the confidence level is greater than or equal to the first confidence threshold, the base station of the target cell is determined to be a pseudo Base station.
  • a chip arrangement comprising a processing unit for performing the method of the first aspect described above.
  • a chip arrangement comprising a processor and a memory.
  • the memory includes instructions that are executed by the processor to perform the method of the first aspect described above.
  • a chip system comprising a processor for supporting a terminal to implement the functions involved in the first aspect described above, such as transmitting or processing data and/or information involved in the above method.
  • the chip system further includes a memory for storing necessary program instructions and data of the network device.
  • the chip system can be composed of chips, and can also include chips and other discrete devices.
  • a computer program comprising instructions which, when run on a computer, cause the computer to perform the method of the first aspect described above.
  • a computer readable storage medium storing instructions that, when executed on a computer, cause the computer to perform the method of the first aspect described above.
  • a computer program product comprising instructions for causing a computer to perform the method of the first aspect described above when the instructions are run on a computer.
  • the terminal can obtain the confidence according to the feature data of the target cell by running the pseudo base station identification algorithm based on the machine learning, and determine whether the base station of the target cell is a pseudo base station according to the confidence level.
  • the pseudo base station identification algorithm generated by a large number of feature data training improves the recognition rate of the terminal to the pseudo base station.
  • the terminal may send the feature data of the suspected base station to the cloud server, and the cloud server updates the pseudo base station identification algorithm, thereby continuously following the technical evolution of the pseudo base station, and continuously improving the recognition rate of the pseudo base station.
  • FIG. 1 is a schematic diagram of a scenario related to a pseudo base station identification method according to an embodiment of the present disclosure
  • Figure 1b is another schematic view of the scene shown in Figure 1a;
  • FIG. 2 is a flowchart of a method for identifying a pseudo base station according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a confidence threshold relationship involved in the pseudo base station identification method shown in FIG. 2;
  • FIG. 4 is a flowchart of a method for identifying a pseudo base station according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of a scenario structure involved in the pseudo base station identification method in the embodiment shown in FIG. 4;
  • FIG. 5 is a schematic diagram of a scenario structure involved in the pseudo base station identification method in the embodiment shown in FIG. 4;
  • FIG. 6 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic structural diagram of hardware of a terminal according to an embodiment of the present invention.
  • the embodiment of the invention provides a pseudo base station identification method and a terminal, which are used to improve the recognition success rate of the pseudo base station.
  • the pseudo base station mentioned in the present application is a base station controlled by an illegal organization or an individual, and the pseudo base station is spoofed as a base station of a mobile communication carrier, for example, broadcasting a PLMN of a mobile operator, independently of the public mobile network. ID, can trick a terminal (or mobile terminal, mobile station, mobile phone, user equipment, etc.) to initiate a network registration or location update request, thereby extracting information of the terminal, such as IMSI, TMSI or IMEI, and can also perform information with the terminal. Delivering, etc., for example, sending a scam message, a malicious network link, or harassing a message to the terminal.
  • the pseudo base station can perform network registration spoofing on the terminal, and can forge any number to send a short message to the terminal. Therefore, the pseudo base station is not only a base station, but also has a certain mobile network core network function.
  • the pseudo base station transmits a strong wireless signal, can form one or more cellular cell signal coverage, and can change system broadcast parameters such as cell identifier of each cell.
  • the basic principles of the operation of various types of pseudo base stations are similar.
  • the principle is generally: the pseudo base station masquerades as a legal base station, and then transmits a strong cell signal, attracts the terminal to stay and register, obtains the IMSI of the terminal, and then sends the fake SMS to The terminal can record the terminal that has sent the fake SMS, avoids repeated transmission, and kicks the terminal out of the cell in time.
  • Machine Learning is a multi-disciplinary subject involving many disciplines such as probability theory, statistics, approximation theory, convex analysis, and algorithm complexity theory. Specializing in how computers simulate or implement human learning behaviors to acquire new knowledge or skills and reorganize existing knowledge structures to continuously improve their performance.
  • Machine learning algorithms can be, for example, decision trees, random forest algorithms, logistic regression, SVM (Support Vector Machine), Naive Bayes, K nearest neighbor algorithm, K-means algorithm, Adaboost algorithm, neural network and Markov Wait.
  • Machine learning algorithms that use a large number of labeled data samples for training or learning can produce model instances or function instances that have the ability to auto-tag new data samples.
  • LAC Location area code
  • PLMN Public Land Mobile Network
  • a location area may contain one or more cells.
  • LAC broadcasts a message in each cell Sent in the system message on the track.
  • the base station broadcasts the cell frequency and the location area identity (LAI), and the information of the adjacent cell broadcast control channel (BCCH) frequency to the mobile phone through the BCCH.
  • LAI includes LAC.
  • LTE pseudo base station attracts LTE terminal to attach; after receiving the attachment request from the terminal and before the security process starts, directly The non-access stratum (NAS) message is rejected, and the RRC ConnectionRelease message is sent.
  • the message carries the redirectedCarrierInfo message, indicating that the second generation mobile phone communication technology is transmitted to the 2G (2-Generation wireless telephone technology).
  • Specification) Network and Frequency Point ARFCN, which is usually a pre-configured pseudo base station, which is convenient for attackers to carry out the next attack.
  • the terminal searches for the network, the terminal selects a cell with C1>0 and the largest C1;
  • the terminal When the terminal performs cell reselection, it involves the C2 criterion (or C2 algorithm). Cell reselection will be initiated if one of the following conditions is met;
  • (A) C1 is always less than 0 during the 5 second calculation period
  • the C2 of the new candidate cell must always be 5 dB higher than the current serving cell in the 5 second calculation period to initiate cell reselection.
  • C1 terminal reception average level - minimum level that allows terminal access
  • FIG. 1 is a schematic diagram of a scenario involved in a method for identifying a pseudo base station according to an embodiment of the present invention.
  • the scenario involved in the pseudo base station identification method includes a base station 101 and a terminal 102, and the terminal 102 can be communicatively coupled to the base station 101.
  • the terminal 102 can include, but is not limited to, a mobile phone, a tablet, a Personal Digital Assistant (PDA), a Point of Sales (POS), a car computer, and the like.
  • PDA Personal Digital Assistant
  • POS Point of Sales
  • the base station 101 can broadcast signals to form one or more cells, as shown in Figure 1b.
  • base station 101 can be a true base station and a true base station forms a true base station cell.
  • the real base station is a legal base station of the operator mobile network, and the terminal 102 can access the operator mobile network, change the camping cell or the handover cell through the real base station cell, and perform call and data services through the real base station cell.
  • the base station 101 may also be a pseudo base station, and the definition of the pseudo base station may refer to the above description.
  • the pseudo base station 101 transmits a signal to form a pseudo base station cell.
  • the terminal 102 may select the pseudo base station cell when performing a standard cell selection (or network) process or a cell reselection procedure. After the terminal selects the pseudo base station cell, operations such as network registration, camping, service request, or location area update may be performed.
  • the pseudo base station 101 can extract information such as the IMSI, TMSI, and IMEI of the terminal 102, it can also be associated with the terminal 102. For example, the pseudo base station 101 transmits a fraudulent short message, a malicious network link, or a harassment message to the terminal 102, thereby jeopardizing the user's use of the terminal 102. The pseudo base station 101 also makes the terminal 102 not actually connected to the normal mobile network, and the normal call and data service of the terminal cannot be performed.
  • FIG. 2 is a flowchart of a method for identifying a pseudo base station according to an embodiment of the present invention. The method is applicable to a terminal in the scenario shown in FIG. 1a.
  • the method of the embodiment of the present invention includes:
  • Step 201 The terminal selects a target cell.
  • Step 202 The terminal runs a pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level.
  • Step 203 When the confidence is greater than or equal to the first confidence threshold, the terminal determines that the base station of the target cell is a pseudo base station.
  • the terminal needs to perform target cell selection in order to access the mobile network, change the camped cell or switch the cell.
  • the base station performs signal broadcast to form a cell signal coverage, and the terminal may perform target cell selection according to the acquired broadcast signal, and the terminal may select the pseudo base station cell.
  • the base station broadcasts a signal to the terminal through a BCH (Broadcast Channel), and the signal may include, for example, a frequency correction signal, a synchronization signal, a local cell frequency and an LAC, and information such as a neighboring cell BCCH frequency.
  • the terminal can then select the target cell based on the C1 or C2 criteria.
  • the terminal selects the target cell, acquires a broadcast signal of the target cell, and obtains feature data of the target cell from the broadcast signal, where the feature data is used to calculate or evaluate the degree of trust of the target cell as a pseudo base station.
  • the target cell may be a plurality of types of cells, for example, the target cell may be a GSM (Global System for Mobile communication) cell, and the base station is a GSM base station; or, the target cell is 3G ( 3rd-Generation, 3rd generation mobile communication technology), the base station is a 3G base station; or the target cell is 4th (the 4th Generation mobile communication) network cell, and its base station is LTE (Long Term) Evolution, Long Term Evolution) / 4G base station.
  • the current pseudo base station is mostly a GSM base station.
  • the present application uses the target cell as a GSM cell as an example for description.
  • Step 201 can be implemented in various scenarios. A specific implementation of step 201 will be described below.
  • the terminal may select a pseudo base station cell.
  • Example 1 A terminal is an idle state terminal camping on a GSM network, and the terminal selects a target cell according to a cell reselection procedure to change a camped cell (also called a serving cell).
  • a camped cell also called a serving cell
  • the terminal reselects the target cell as the (new) serving cell.
  • the terminal may select a pseudo base station cell.
  • Example 2 When the terminal changes from the resident 4G/3G network to the GSM network, the terminal selects the target cell according to the cell selection process.
  • a terminal residing on a 4G/3G network may fall back to the GSM network because the current network signal is degraded.
  • the GSM network cell selection of the terminal may also be selected to the pseudo base station cell.
  • some pseudo base stations may transmit 4G/3G interference signals, resulting in poor signal quality (such as carrier-to-interference ratio) of artificial 4G/3G network cells, forcing the terminal to fall back to The GSM network then attracts the terminal to camp through the GSM pseudo base station cell.
  • Example 3 When the terminal is powered on, the target cell is selected through the cell selection process.
  • the terminal When the terminal is powered on, the terminal performs GSM network cell selection for network attachment (ie, network registration). At this time, the terminal may also select a pseudo base station cell.
  • the scenario of the three types of target cells is the cell reselection or the cell selection behavior of the terminal in the idle state.
  • the terminal may also be in the connected state (that is, the terminal is connected to the serving cell) to perform the target cell.
  • s Choice The specific situation is as follows:
  • Example 4 The terminal selects the target cell through redirection from the 4G/3G network.
  • the connected terminal is triggered by the redirection command of the 4G/3G network, and may fall back to the GSM network for cell selection.
  • the 4G/3G network instructs the terminal to redirect to the 2G network and indicates the 2G neighbor cell frequency point information, and the terminal captures the 2G neighbor cell signal and initiates a service request (such as answering an incoming call) through the 2G network.
  • the new 4G/3G pseudo base station may also first attract the terminal to camp on its cell, and then deny the terminal to fall back to the GSM network through the redirect, and then attract the terminal to camp through the GSM pseudo base station cell.
  • Example 5 When the terminal switches the GSM cell in the service state, the terminal searches for the target cell specified by the network and selects the target cell.
  • the GSM serving cell handover may occur in the call state or the data service state of the terminal, and the network sends the handover target cell information to the terminal, and the terminal searches for the target cell and selects the target cell.
  • the terminal may select a pseudo base station cell, causing the handover to fail to complete normally, causing problems such as dropped calls or data service interruption.
  • step 202 the confidence level is used to indicate that the base station of the target cell is the trustworthiness of the pseudo base station, and the pseudo base station identification algorithm is generated by the machine learning algorithm training.
  • the feature data of the target cell may be obtained from the signal broadcast by the target cell, where the signal may be a signal that the target cell broadcasts through the BCH.
  • the feature data of the target cell can be extracted from the signal broadcast by the target cell, and the feature data is used to calculate or evaluate the degree of trust of the target cell as a pseudo base station.
  • the feature data includes at least one of cell selection and cell reselection information, networking information, service function information, area information, and time information, as follows:
  • the feature data includes any one of cell selection and cell reselection information, networking information, service function information, area information, or time information.
  • the feature data includes any two of cell selection and cell reselection information, networking information, service function information, area information, and time information.
  • the feature data includes cell selection and cell reselection information, and networking information. .
  • the feature data includes any three of cell selection and cell reselection information, networking information, service function information, area information, and time information.
  • the feature data includes cell selection and cell reselection information, networking information, And business function information.
  • the feature data includes any four of cell selection and cell reselection information, networking information, service function information, area information, and time information.
  • the feature data includes cell selection and cell reselection information, networking information, Business function information and geographic information.
  • the feature data includes cell selection and cell reselection information, networking information, service function information, area information, and time information.
  • any one of cell selection and cell reselection information, networking information, service function information, area information, and time information may further include multiple specific cell information.
  • a detailed description of these specific cell information is as follows:
  • Cell selection and reselection information including but not limited to: PLMN-ID, RXLEV-ACCESS-MIN (minimum access level), MS-TXPWR-MAX-CCH (terminal maximum transmit power), MAX-RETRANS (maximum Retransmission number), TX-INTEGER (number of transmission slots); reselection parameter indication (PI), cell reselection offset (CRO), temporary offset (TO), penalty Time (penalty time, PT), cell reselection hysteresis (CRH), current and previous location area code (LAC), base station identity code (BSIC), cell identity (cell identity, CI).
  • the cell selection and reselection related information may be one or any combination of such information.
  • Network information including but not limited to: CCCH-CONF (Common Control Channel Configuration), BS-AG-BLKS-RES (Access Allowed Block Number), BA-PA-MFRMS (Paging Channel Multiframe) , T3212 (periodic update duration), with or without neighboring cells (BA1/BA2).
  • the networking related information may be one or any combination of the information.
  • Service function information including but not limited to: whether to support GPRS information, whether to support emergency call (EC) information.
  • Geographical information including but not limited to: current location information of the terminal (such as geographic location latitude and longitude information).
  • Time information including but not limited to: current time information of the terminal (such as month, day, week, hour, minute).
  • BA list that is, BCCH allocation information, is used in cell selection, cell reselection, or cell measurement.
  • the BA list is divided into an Idle list (BA1) and an Active list (BA2).
  • Idle list The list information is sent on the BCCH through the system information block type 2, and is used for cell selection and reselection in the idle state of the terminal, and up to 32 frequency points are set.
  • Active list The list information is sent on the BCCH through the system information block type 5.
  • the frequency point is the frequency of the temporary cell that should be measured when the terminal is in the call state. When the cell is switched, there are a total of 32.
  • a pseudo base station identification algorithm is pre-configured on the terminal. After the terminal acquires the feature data of the target cell, in order to identify whether the target cell is a pseudo base station cell, the terminal runs a pseudo base station identification algorithm according to the feature data of the target cell, and obtains a confidence level. The degree is used to indicate the degree of trust of the base station of the target cell as a pseudo base station.
  • the terminal may provide the feature data of the target cell to the pseudo base station identification algorithm, and the pseudo base station identification algorithm uses the feature data to perform calculation, and outputs a confidence.
  • the confidence level may be in the range of 0 to 1. The greater the value of the confidence, the greater the probability that the base station of the target cell is a pseudo base station, and the smaller the value of the confidence, the base station indicating the target cell is The probability of a true base station is greater. In other words, the confidence is a parameter describing the probability event.
  • the machine learning algorithm is taken as an example of the SVM algorithm.
  • the pseudo base station identification algorithm is generated by the SVM algorithm training, and the pseudo base station identification algorithm is specifically an SVM model instance. Since the SVM algorithm is a binary classification algorithm, the pseudo base station identification algorithm can classify the base stations of the cell into a true base station and a pseudo base station, and output a confidence level as a result of the above classification.
  • the terminal selects cell selection and cell reselection information, networking information, service function information, area information, and time information of the target cell.
  • One or more kinds of information are provided for use by the pseudo base station identification algorithm, for example, the terminal selects TX-INTEGER (number of transmission slots), cell reselection offset (CRO), penalty time in cell selection and reselection information (PT), the periodic update duration in the networking information, and the current location information of the terminal or the target cell in the regional information are provided to the pseudo base station identification algorithm for calculation, and the pseudo base station identification algorithm uses the feature data to perform calculation, and obtains a confidence.
  • the degree is 0.95
  • the confidence level of 0.95 indicates that the probability that the base station of the target cell is a pseudo base station is 95%.
  • the pseudo base station identification algorithm may be generated by the sample data of a large number of cells, and the sample data of the cell includes the sample data of the pseudo base station cell and the real base station cell. Sample data. It can be understood that the sample data of the cell can be used to represent the characteristics of the cell.
  • the machine learning algorithm may be a clustering algorithm or a classification algorithm as described above, such as K-means, k-nearest neighbor, decision tree, logistic regression, SVM, or Bayesian algorithm, or other existing machine learning algorithms. It will not be repeated here.
  • the step 202 may include: when the terminal detects that the LAC of the target cell is different from the currently saved LAC, the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level.
  • the terminal compares the LAC of the target cell with the currently stored LAC. If the LAC of the target cell is different from the currently stored LAC, the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level. If the LAC of the target cell is the same as the currently stored LAC, indicating that the base station of the target cell is a true base station, the terminal does not run the pseudo base station identification algorithm.
  • the currently saved LAC is the LAC of the serving cell, or the currently saved LAC may be the LAC of the current location of the GSM network obtained by the terminal through the joint attach/join location update.
  • the serving cell may be a cell in which the idle state terminal currently camps, or a cell to which the terminal currently has a connection, or a cell in which the terminal currently performs a service (for example, a call or a data service).
  • a service for example, a call or a data service.
  • the terminal camping on the 4G/3G network can obtain the LAC of the current location of the GSM network through the 4G/3G network cell.
  • the terminal if the LAC of the target cell is the same as the currently stored LAC, it indicates that the base station of the target cell is a high probability event, and it is redundant or uneconomical to perform the pseudo base station identification algorithm at this time. Therefore, when the terminal detects that the LAC of the target cell is different from the currently saved LAC, the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell. In this way, resources such as power and computing performance of the terminal are saved, power consumption is reduced, and the networking speed and recognition efficiency of the terminal are improved.
  • the timing of running the pseudo base station identification algorithm can be placed after the cell reselection (or cell selection process) is completed, so that the function of the terminal can be reduced. Consumption.
  • the pseudo base station identification algorithm may also be run at other times.
  • the pseudo base station identification algorithm may operate during the selection of the target cell, for example, may be run before the C2 algorithm (or C2 criterion).
  • the pseudo base station identification algorithm can add the confidence of the output of the pseudo base station identification algorithm to the C2 algorithm to perform identification of the pseudo base station, so that the terminal does not reselect to the pseudo base station cell.
  • step 203 the terminal determines whether the confidence obtained in step 202 is greater than or equal to the first confidence threshold.
  • the confidence level is greater than or equal to the first confidence threshold, the base station indicating the target cell is a large probability event, and the terminal may determine that the base station of the target cell is a pseudo base station.
  • the terminal can discard the target cell and will not further camp
  • the target cell initiates a service request or the like through the same, and continues cell selection or cell reselection to select other target cells, or ends cell reselection.
  • the target cell is a pseudo base station cell
  • the terminal may further perform operations on the pseudo base station cell, for example, prohibiting to select the cell with the cell identifier as the pseudo base station cell identity again, and saving the pseudo base station cell within a preset duration (for example, 10 seconds).
  • the feature data is used to report to the cloud server or send a prompt message to the user of the terminal (for example, prompting the user that the pseudo base station is successfully intercepted).
  • the terminal can perform other operations.
  • the other operations may be, for example, determining that the base station of the target cell is a true base station according to the confidence level, or other situations of the other operations may also refer to "1.1, recognizing the suspected pseudo base station again” and "1.2, recognizing the suspected true base station again". The content described in .
  • the first confidence threshold may be a preset confidence threshold, and the first confidence threshold is used to divide whether the base station of the target cell is a pseudo base station.
  • the pseudo base station identification algorithm can meet the performance requirement requirements of the designer, and the performance indicator includes a pseudo base station identification rate or a pseudo base station false alarm rate, wherein the pseudo base station false alarm rate indicates that the true The probability that the base station cell is erroneously identified as a pseudo base station cell.
  • the first confidence threshold may be set according to at least one of a test result of the pseudo base station identification algorithm, a performance indicator of the pseudo base station identification algorithm (eg, a pseudo base station identification rate, a pseudo base station false alarm rate), and the like.
  • the performance test of the algorithm may be performed.
  • the first confidence threshold such as 0.95
  • the pseudo base station identification rate of the pseudo base station cell test sample set is obtained (for example, 0.90)
  • the pseudo base station false alarm rate such as 0.001
  • the algorithm can be transplanted, and the pseudo base station identification algorithm is transplanted to each terminal. It can be understood that the algorithm can be converted according to the terminal when the algorithm is transplanted.
  • the method may further include the step 204: the terminal prohibits selecting the target cell again within the preset duration.
  • the terminal may prohibit the target cell from being selected again within a preset duration.
  • the preset duration may be a fixed length of time, for example, 10 seconds, 1 minute, 2 minutes, etc., or may be a dynamically adjusted time length, for example, from 10 seconds to 2 minutes according to actual conditions. It can be understood that the preset duration can be determined according to actual conditions, and the application does not limit this.
  • the terminal can identify the target cell by using the cell identifier, such as cell id, LAC+cell id, Mobile Network Code (MNC)+LAC+cell id, or Mobile Country Code (MCC)+MNC+LAC+ Cell id.
  • MNC Mobile Network Code
  • MCC Mobile Country Code
  • the terminal prohibits the selection of the target cell again within the preset duration, and may prevent the terminal from reselecting the target cell that identifies the pseudo base station again, while preventing the true base station cell that is impersonated from being reselected.
  • some pseudo base stations will listen to the signals of the surrounding real base stations, read the system broadcast parameters of a weak base station, and transmit them after modifying some parameters (such as cell reselection parameters).
  • the pseudo base station does not modify the cell identity of the real base station, thereby posing as the true base station.
  • the pseudo base station is often transferred.
  • the pseudo base station is placed on the vehicle, so that the position of the pseudo base station can be continuously changed, and the signal of the pseudo base station is covered in one area for a period of time, for example, 10 minutes, and then the pseudo base station is transferred to other units. local.
  • the terminal if the terminal is configured to prevent the target cell from being selected again after the base station of the target cell is identified as the pseudo base station, the terminal acquires the true base station impersonated by the pseudo base station after the pseudo base station of the target cell is transferred. Signal, at this time, the terminal will likely misjudge the real base station as a pseudo base station.
  • step 204 may also be combined with location information of the terminal. Specifically, when the terminal determines that the base station of the target cell is a pseudo base station, the terminal records the first location information where the terminal is located, and within the preset duration, the terminal acquires the second location information where the terminal is located, when the second location information and the first location information When the distance between the location information is less than the preset distance, and the terminal acquires the cell signal that the cell identifier is the cell identifier of the target cell, the terminal prohibits the cell from being selected again. This is because the terminal may move within the preset time period.
  • the terminal may stop prohibiting the reselection of the target cell.
  • the preset distance may be, for example, 300 meters, etc., which is not limited in this application.
  • the method of the embodiment of the present invention further includes: when the confidence is less than or equal to the fourth confidence threshold, the terminal performs a preset operation by using the target cell, where the preset operation includes network registration, Any of the location area update, cell camping, and originating service request.
  • the base station of the target cell is a true base station, and the terminal can connect to the mobile network through the target cell.
  • the preset operation may be an operation that needs to be performed when the terminal normally connects to the mobile network.
  • the fourth confidence threshold may be a preset confidence threshold, and the fourth confidence threshold is used to divide whether the base station of the target cell is a true base station.
  • the pseudo base station identification algorithm can satisfy the designer's performance index requirement, and the performance indicator includes, for example, a true base station identification rate.
  • the fourth confidence threshold may be set according to the test result of the pseudo base station identification algorithm, the performance indicator of the pseudo base station identification algorithm (for example, the true base station identification rate), and the like. After the machine learning algorithm training generates the pseudo base station identification algorithm, the performance test of the algorithm can be performed. First, the fourth confidence threshold (such as 0.1) is set, and then the true base station recognition rate of the real base station cell test sample set is obtained (for example, 0.999). By adjusting the fourth confidence threshold, different algorithm performance indicators can be obtained. When the performance index of the algorithm meets the requirements of the designer, the pseudo base station identification algorithm can be transplanted to each terminal.
  • the fourth confidence threshold is smaller than the first confidence threshold.
  • the fourth confidence threshold can be set to 0.1 and the first confidence threshold is 0.9.
  • the base station of the cell whose confidence is greater than or equal to the first confidence threshold is a pseudo base station, and the confidence is less than or equal to the fourth confidence threshold.
  • the base station of the cell is a true base station.
  • the confidence of the target cell is between the first confidence level and the fourth confidence level, the authenticity of the base station of the cell needs to be further identified by other means.
  • the identification process is also a re-identification process for the suspected base station, wherein the suspected base station refers to a base station that cannot accurately identify the authenticity through the pseudo base station identification algorithm, specifically, when the confidence of the target cell is at the first confidence threshold and the fourth When the confidence threshold is between, the base station of the target cell is a suspect base station.
  • the re-identification process for the suspected base station is described below.
  • the method of the embodiment of the present invention further includes: when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, the terminal The base station of the target cell is determined to be a pseudo base station.
  • the terminal performs a preset operation by using the target cell; and when the terminal detects that the target cell meets the first preset condition, The terminal determines that the base station of the target cell is a pseudo base station.
  • the preset operation includes any one of network registration, location area update, cell camping, and originating service request.
  • the confidence level of the target cell is greater than or equal to the first confidence threshold
  • the probability that the target cell is a pseudo base station cell is reduced, and if the target cell is directly The base station is identified as a pseudo base station, and the false alarm rate of the pseudo base station is increased, which affects the user's use of the terminal.
  • the base station of the target cell is less likely to be a pseudo base station. At this time, the base station of the target cell may not participate in the re-identification process of the suspected pseudo base station.
  • the second confidence threshold is a preset confidence threshold. As shown in FIG. 3, the second confidence threshold is smaller than the first confidence threshold. For example, when the confidence is in the range of 0 to 1, the second confidence is The degree threshold is 0.4 and the first confidence threshold is 0.9.
  • the setting rule of the second confidence threshold is that, in the test of the pseudo base station identification algorithm, the probability that the confidence level of the pseudo base station cell test sample falls within the interval between the second confidence threshold and the first confidence threshold satisfies the designer's Requirements (such as 0.70).
  • the terminal determines whether the confidence of the target cell is less than the first confidence threshold and is greater than or equal to the second confidence threshold, that is, whether the confidence of the target cell is located between the first confidence threshold and the second confidence threshold. . If the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, indicating that the base station of the target cell is a suspected pseudo base station, for example, the second confidence threshold is 0.4, and the first confidence threshold is 0.9, and the target is The confidence level of the cell is 0.7, and the base station of the target cell is a suspected pseudo base station. Therefore, the terminal further needs to detect the target cell, that is, the terminal detects whether the target cell meets the first preset condition. If the target cell meets the first preset condition, the terminal may determine that the base station of the target cell is a pseudo base station.
  • the first preset condition may be behavior information that may be generated by the pseudo base station cell, and the first preset condition may include at least one condition that the terminal intercepts the problem message sent by the target cell; when the terminal initiates the location area update request to the target cell, Rejected; the terminal is rejected when initiating a service request to the target cell; the terminal loses the target cell signal within a preset time; or the LAC of the target cell changes.
  • the terminal intercepts the problem message sent by the target cell through the application layer (the application layer may be located in the application processor). Then, the base station of the target cell is determined to be a pseudo base station, and is detached from the target cell; or, when the terminal is kicked out by the target cell within a certain time, the terminal determines that the base station of the target cell is a pseudo base station.
  • the terminal when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, if the terminal rejects the cell when the service request is initiated, the terminal The base station of the target cell is determined to be a pseudo base station and detached from the target cell.
  • the terminal determines that the base station of the target cell is a pseudo base station.
  • the preset time may be determined according to actual conditions, for example, may be 5 seconds, 7 seconds, etc., which is not limited in this application.
  • the terminal when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold of 0.4, the terminal detects that the LAC of the target cell has changed, and the terminal may also determine the base station of the target cell. It is a pseudo base station.
  • the first preset condition may also be any two or any three of the above conditions or a combination of any four or all five.
  • the first preset condition may be set according to actual conditions.
  • the terminal determines that the base station of the target cell is a pseudo base station.
  • the method includes: the terminal saves feature data of the target cell, and the feature data of the target cell is identified as pseudo base station data.
  • the mapping of the feature data of the target cell to the pseudo base station data may be implemented by configuring the pseudo base station identity information for the feature data of the target cell, for example, establishing a correspondence between the feature data of the target cell and the pseudo base station identity information, or
  • the feature data of the target cell is stored in a preset storage area or the like.
  • a database is set on the memory of the terminal for storing feature data of the target cell, and the feature data stored in the database belongs to the pseudo base station data.
  • the confidence of the target cell is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, indicating that the pseudo base station identification algorithm is not ideal for identifying the feature data of the target cell.
  • the terminal save is identified as a pseudo. Characteristic data of the target cell of the base station data.
  • the pseudo base station identification algorithm can be further trained according to the saved feature data of the target cell, thereby improving the recognition rate of the pseudo base station by the pseudo base station identification algorithm. For example, when the terminal is connected to a WiFi (Wireless-Fidelity) network, the terminal transmits the feature data of the target cell identified as the pseudo base station data to the cloud server through the WiFi network, and the cloud server uses the feature data of the target cell as a pseudo.
  • WiFi Wireless-Fidelity
  • the sample data of the base station cell further trains a pseudo base station identification algorithm pre-stored on the cloud server to update the pseudo base station identification algorithm.
  • the pseudo base station algorithm pre-stored on the cloud server may be the pseudo base station identification algorithm described in step 202.
  • the updated pseudo base station identification algorithm has a higher recognition rate for the pseudo base station.
  • the cloud server may further send the updated pseudo base station identification algorithm to the terminal, so that the terminal may use the updated pseudo base station identification algorithm to identify the pseudo base station. Training the pseudo base station identification algorithm according to the feature data of the target cell can be performed on the cloud server.
  • the feature data of the terminal to save the target cell may be performed when any of the following conditions are met: the pseudo base station data saving function is enabled; or the target cell satisfies the pseudo base station data storage rule.
  • the terminal saves the feature data of the target cell.
  • the terminal determines whether the pseudo base station data saving function is enabled. If enabled, the terminal may save the feature data of the target cell; otherwise, the terminal may not save the feature data of the target cell.
  • the terminal can control the opening and closing of the pseudo base station data saving function.
  • the opening and closing of the pseudo base station data saving function may be set for the user on the terminal, or may be set by the cloud server to send instructions to the terminal, or may be automatically controlled by the terminal according to a preset rule.
  • the user may set the terminal to save or not save the feature data of the target cell; or the cloud server may or may not save the feature data of the target cell by using the remote command; or, the storage space of the terminal is less than a preset storage threshold.
  • the rule is that when the storage space of the terminal is less than a preset storage threshold, the terminal automatically turns off the pseudo base station data saving function.
  • the preset storage threshold may be determined according to actual conditions, which is not limited in this application. Thereby, the terminal can conveniently control the storage of the feature data, and the flexibility of saving the feature data is increased.
  • the terminal when the target cell satisfies the pseudo base station data saving rule, the terminal saves the feature data of the target cell. In this way, the function of screening the feature data can be played, so that the feature data of the saved target cell is more advantageous for further training of the pseudo base station identification algorithm.
  • the pseudo base station data storage rule may be a rule for screening feature data of the pseudo base station cell.
  • the pseudo base station data storage rule may be a rule set by the user on the terminal, or may be a rule sent by the cloud server to the terminal.
  • the pseudo base station data retention rule may be, for example, an acquisition time of feature data of the target cell, a location area where the target cell is located, and certain feature data of the target cell, and the like.
  • the specific implementation of the example may be: the terminal acquires target data applicable to the current pseudo base station data retention rule from the feature data of the target cell and other data, and then the terminal determines whether the target data conforms to the pseudo base station data retention rule. If it matches, the feature data of the target cell is saved.
  • the cloud server sends an instruction to the terminal to indicate to the terminal that the pseudo base station data storage rule is to save the feature data of the pseudo base station cell located in the Shenzhen area of China.
  • the location of the Shenzhen area may be described by a latitude and longitude or a network identifier such as MNC+LAC.
  • the terminal determines the location area where the target cell is located, when the target cell is located When the location information is in the Shenzhen area of China, the target cell conforms to the pseudo base station data storage rule, and the terminal saves the feature data of the target cell, and the feature data is identified as pseudo base station data.
  • the pseudo base station data retention rule is that the collection time of the feature data of the target cell is a weekend, when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell is satisfied.
  • the terminal determines the collection time of the feature data of the target cell from the related information of the target cell.
  • the collection time is a weekend
  • the target cell meets the data storage rule of the pseudo base station, and the terminal saves the feature data of the target cell.
  • the feature data is identified as pseudo base station data.
  • the pseudo base station data saving rule is to save cell selection and cell reselection information, and networking information.
  • the terminal determines the type of the feature data of the target cell, when the characteristics of the target cell
  • the data is cell selection, cell reselection information, and networking information
  • the target cell conforms to the pseudo base station data storage rule, and the terminal stores feature data of the target cell, and the feature data is identified as pseudo base station data.
  • the terminal when the pseudo base station data saving function is enabled and the target cell satisfies the pseudo base station data saving rule, the terminal saves the feature data of the target cell. That is, when the conditions described in the two examples above are satisfied, the terminal saves the feature data of the target cell.
  • the method of the embodiment of the present invention further includes: when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset condition, the terminal It can be determined that the base station of the target cell is a true base station.
  • the terminal performs a preset operation by using the target cell; and when the terminal detects that the target cell meets the second preset condition, The terminal determines that the base station of the target cell is a true base station.
  • the preset operation includes any one of network registration, location area update, cell camping, and originating service request.
  • the confidence level of the target cell is less than or equal to the fourth confidence threshold
  • the probability that the target cell is a true base station cell is reduced, and if the target cell is directly Base station
  • the confidence level is greater than the third confidence threshold
  • the base station of the target cell is less likely to be a true base station. At this time, the base station of the target cell may not participate in the re-identification process of the suspected true base station.
  • the third confidence threshold is a preset confidence threshold. As shown in FIG. 3, the third confidence threshold is greater than the fourth confidence threshold. For example, when the confidence is in the range of 0 to 1, the third confidence.
  • the degree threshold is 0.6 and the fourth confidence threshold is 0.4.
  • the setting rule of the third confidence threshold is: in the test of the pseudo base station identification algorithm, the probability that the confidence of the true base station cell test sample falls within the fourth confidence threshold and the third confidence threshold interval satisfies the designer's requirements (for example 0.20).
  • the terminal determines whether the confidence of the target cell is greater than the fourth confidence threshold and is less than or equal to the third confidence threshold, that is, whether the confidence of the target cell is between the fourth confidence threshold and the third confidence threshold. If the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, the base station indicating the target cell is a suspected true base station. Therefore, the terminal needs to further detect the target cell, that is, the terminal detects whether the target cell meets the second preset condition. If the target cell meets the second preset condition, the terminal may determine that the base station of the target cell is a true base station.
  • the second preset condition may be behavior information that may be generated by the real base station cell, and the second preset condition may include at least one of the following conditions: the terminal establishes a call or data service in the target cell; the terminal completes the authentication through the target cell and enters the encryption security mode. Or, the terminal completes the handover in the target cell.
  • the terminal determines that the base station of the target cell is a true base station.
  • the terminal determines that the base station of the target cell is true. Base station.
  • the terminal determines that the base station of the target cell is a true base station.
  • the second preset condition may also be a combination of any two or all three of the above conditions.
  • the second preset condition may be set according to actual conditions.
  • the terminal determines that the base station of the target cell is a true base station.
  • the method includes: the terminal saves feature data of the target cell, and the feature data of the target cell is identified as true base station data.
  • the feature data of the target cell is identified as true base station data, which may be implemented by configuring true base station identification information for the feature data of the target cell, or saving the feature data of the target cell in a preset storage area.
  • the confidence of the target cell is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, indicating that the pseudo base station identification algorithm does not have an ideal recognition effect on the feature data of the target cell.
  • the terminal save is identified as true. Characteristic data of the target cell of the base station data.
  • the pseudo base station identification algorithm can be further trained according to the saved feature data of the target cell, and the recognition rate of the pseudo base station identification algorithm to the true base station is improved.
  • the recognition rate of the real base station by the pseudo base station identification algorithm is improved, and the false alarm rate of the pseudo base station is also reduced. Training pseudo based on the feature data of the target cell
  • the base station identification algorithm can be performed on the cloud server.
  • the feature data of the terminal to save the target cell may be performed when any of the following conditions are met: the true base station data saving function is enabled; or the target cell satisfies the true base station data storage rule.
  • the terminal when the true base station data saving function is turned on, the terminal saves the feature data of the target cell.
  • the terminal saves the feature data of the target cell.
  • the terminal when the target cell satisfies the true base station data retention rule, the terminal saves the feature data of the target cell. In this way, the function of screening the feature data can be played, so that the feature data of the saved target cell is more advantageous for further training of the pseudo base station identification algorithm.
  • the true base station data storage rule may be a rule for screening feature data of a true base station cell.
  • the real base station data storage rule may be a rule set by the user on the terminal, or may be a rule sent by the cloud server to the terminal.
  • the true base station data retention rule may be, for example, an acquisition time of feature data of the target cell, a location area where the target cell is located, and certain feature data of the target cell, and the like.
  • the true base station data saving rule can be the same as or different from the pseudo base station data saving rule.
  • the terminal when the true base station data saving function is enabled and the target cell satisfies the true base station data saving rule, the terminal saves the feature data of the target cell. That is, when the conditions described in the two examples above are satisfied, the terminal saves the feature data of the target cell.
  • the confidence of the target cell may be located in the interval between the second confidence threshold and the third confidence threshold.
  • the terminal may detect whether the target cell meets the first preset condition and also detects the target. Whether the cell satisfies the second preset condition.
  • the terminal may determine that the base station of the target cell is a pseudo base station; when the terminal detects that the target cell meets the second preset condition, the terminal determines that the base station of the target cell is a true base station.
  • the terminal in order to access the mobile network, change the camping cell or switch the cell, the terminal selects the target cell through a standard defined process, and after the terminal acquires the feature data of the target cell, the terminal performs authenticity identification for the target cell.
  • the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell, and obtains a confidence level.
  • the confidence level is greater than or equal to the first confidence threshold, the base station indicating that the target cell is a pseudo base station has a great possibility. Therefore, the terminal can reasonably determine that the base station of the target cell is a pseudo base station, and perform corresponding operations to Avoid the danger of pseudo base stations.
  • the pseudo base station identification algorithm is generated by the training of the machine learning algorithm, so that after the pseudo base station identification algorithm is run according to the feature data of the target cell, the confidence degree is obtained, and the base station of the target cell is authenticated by the confidence degree.
  • the pseudo base station identification algorithm has the performance advantage of the machine learning algorithm, can improve the recognition performance of the pseudo base station, and the pseudo base station identification algorithm can continuously train and quickly follow up the pseudo base station technology evolution, thereby improving the recognition success rate of the pseudo base station.
  • FIG. 4 is a flowchart of a method for identifying a pseudo base station according to an embodiment of the present invention.
  • the square of the embodiment shown in Figure 4 The method can be implemented based on the method of the embodiment shown in FIG. 2.
  • the scenario in which the method of the embodiment shown in FIG. 4 is applicable can also refer to FIG. 5.
  • FIG. 5 is a schematic diagram of a scenario structure involved in a pseudo base station identification method.
  • a terminal 501, a terminal 502, a cloud server 503, and a base station 504 are included.
  • the terminal 502, and the base station 504 reference may be made to the corresponding description of the base station 101 and the terminal 102 in the embodiment shown in FIG. 1a.
  • the terminal 501 and the terminal 502 can also communicate with the cloud server 503.
  • the terminal 501 can collect sample data of the cell, and send the sample data to the cloud server 503.
  • the cloud server 503 can use the sample data to train the machine learning algorithm to obtain a pseudo base station identification algorithm.
  • the cloud server 503 transmits the pseudo base station identification algorithm to the terminal 502 to cause the terminal 502 to execute the pseudo base station identification method of the embodiment shown in FIG. 2.
  • the sample data of the cell may include sample data of the pseudo base station cell and sample data of the true base station cell.
  • the sample data of the pseudo base station cell may be sample data of a target cell whose confidence is greater than or equal to the first confidence threshold, or may be sample data of the pseudo base station cell identified by the suspected pseudo base station again.
  • the sample data of the true base station cell may be sample data of a target cell whose confidence is less than a fourth confidence threshold, or may be sample data of a true base station cell that is identified by the suspected true base station.
  • FIG. 5 is merely an exemplary illustration.
  • the terminal 501 may have the function of the terminal 502, or the terminal 502 may also have the function of the terminal 501.
  • the method in the embodiment of the present invention includes:
  • Step 401 The terminal acquires sample data of a real base station cell and sample data of a pseudo base station cell.
  • the cloud server Before the terminal obtains the pseudo base station identification algorithm, the cloud server needs to collect sample data through the terminal, and uses the sample data to train the machine learning algorithm to generate a pseudo base station identification algorithm.
  • the base station of the real base station cell is a true base station
  • the base station of the pseudo base station cell is a pseudo base station.
  • the specific implementation manner of the terminal acquiring the sample data of the real base station cell may be: the terminal successfully establishes a call or data service in a certain cell, or performs authentication and enters an encryption security mode, or the cell handover succeeds, where the situation indicates that the cell is a true base station cell. Therefore, the terminal may extract sample data of the cell from the signal broadcast by the cell base station, and mark the sample data of the cell as the sample data of the true base station cell.
  • the specific implementation manner of the terminal acquiring the sample data of the pseudo base station cell may be: the terminal identifies the pseudo base station cell by using the feature data matching algorithm; or, after the terminal camps on the certain cell, if the application layer of the terminal identifies the harassment message sent by the cell And the modem chip of the terminal further detects that the terminal is kicked out of the cell within a certain time (for example, 3 minutes), and the foregoing situation indicates that the cell is a pseudo base station cell, and therefore, the terminal may extract the cell from the signal broadcast by the cell base station.
  • the sample data, and the sample data of the cell is marked as sample data of the pseudo base station cell.
  • the sample data of the real base station cell and the sample data of the pseudo base station cell may be at least one of the following information: cell selection and cell reselection information, networking information, service function information, area information, and time information. Wait.
  • cell selection and cell reselection information may be at least one of the following information: cell selection and cell reselection information, networking information, service function information, area information, and time information. Wait.
  • the sample data of the terminal acquiring the real base station cell and the sample data of the pseudo base station cell may be controlled by the collection policy, and the collection policy may be set by the user, or may be obtained by the terminal from the cloud server.
  • the acquisition policy may be, for example, whether to save the sample data of the real base station cell or the sample data of the pseudo base station cell; or the terminal collects the sample data of the cell in the preset area, and the terminal collects the sample data of the cell in a preset time period.
  • the acquisition policy may be a pseudo base station data retention rule and/or a true base station data retention rule as described in the embodiment shown in FIG. 2.
  • Step 402 The terminal sends the sample data of the true base station cell and the sample data of the pseudo base station cell to the cloud server.
  • the terminal After the terminal acquires the sample data of the real base station cell and the sample data of the pseudo base station cell, the terminal sends the sample data of the true base station cell and the sample data of the pseudo base station cell to the cloud server, so that the cloud server uses the data.
  • the terminal may send the sample data of the true base station cell and the sample data of the pseudo base station cell to the cloud server by using, for example, a cellular mobile network or a WiFi network, or use the memory card to sample data of the true base station cell on the terminal.
  • the sample data of the pseudo base station cell is transferred to the cloud server.
  • Step 403 The cloud server trains the machine learning algorithm by using the sample data of the real base station cell and the sample data of the pseudo base station cell to generate a pseudo base station identification algorithm.
  • the cloud server After the cloud server obtains the sample data of the authentic base station cell, the cloud server uses the sample data of the true base station cell and the sample data of the pseudo base station cell to perform training of the machine learning algorithm to generate a pseudo base station identification algorithm.
  • the training of the machine learning algorithm can be based on big data training.
  • the pseudo base station identification algorithm can be used to identify the authenticity of the target cell.
  • clustering algorithm or classification algorithm such as K-means, k-nearest neighbor, decision tree, logistic regression, SVM, Bayesian algorithm, etc.
  • K-means K-means
  • k-nearest neighbor decision tree
  • logistic regression logistic regression
  • SVM Bayesian algorithm
  • Bayesian algorithm Bayesian algorithm
  • the cloud server uses the sample data of the real base station cell and the sample data of the pseudo base station cell to perform training of the SVM algorithm, and obtains an SVM model instance, where the SVM model instance is a pseudo base station identification algorithm, which can be used according to the feature data of the target cell.
  • the sample data of the target cell is identified, and it is determined whether the base station of the target cell is a true base station or a pseudo base station.
  • the selected machine learning algorithm can establish the authentic base station identification capability (or the authentic base station knowledge) through a large number of sample training, and the recognition capability can be included in the trained generated algorithm.
  • the method of the embodiment of the present invention further includes: the cloud server tests the pseudo base station identification algorithm, and when the pseudo base station identification algorithm meets the performance requirement of the designer, the cloud server sends the pseudo base station identification algorithm to the terminal.
  • the cloud server reserves a part of the sample data for testing the algorithm to obtain the performance of the pseudo base station identification algorithm.
  • the reserved sample data may be the true base station test sample set or the pseudo base station test sample set of the embodiment shown in FIG. 2.
  • the cloud server is trained to generate the pseudo base station identification algorithm, the sample data of the reserved true base station cell and the sample data of the pseudo base station cell are input to the pseudo base station identification algorithm, and the pseudo base station identification algorithm is used for the identification test.
  • the probability that the confidence of the pseudo base station identification algorithm for the sample data output of the pseudo base station cell is above the first test confidence threshold (eg, 0.9) (which may be referred to as a pseudo base station identification rate) may be obtained, and the pseudo base station identification algorithm is true.
  • the probability that the confidence of the sample data output of the base station cell is above the first test confidence threshold (which may be referred to as a pseudo base station false alarm rate) may also obtain the confidence that the pseudo base station identification algorithm outputs the sample data of the true base station cell.
  • the probability of the fourth test confidence threshold eg, 0.4 or less (which may be referred to as a true base station identification rate).
  • the pseudo base station identification algorithm when the pseudo base station identification algorithm reaches the designer's performance metric (eg, the pseudo base station identification rate) 0.8, the pseudo base station false alarm rate is 0.002, and the true base station identification rate is 0.99), the pseudo base station identification algorithm is an algorithm that recognizes that the effect meets the requirements.
  • the designer's performance metric eg, the pseudo base station identification rate
  • the pseudo base station false alarm rate is 0.002
  • the true base station identification rate is 0.99
  • Step 404 The cloud server sends a pseudo base station identification algorithm to the terminal.
  • the cloud server may send the pseudo base station identification algorithm to the terminal, that is, the pseudo base station identification algorithm is transplanted to the terminal.
  • the terminal can identify the pseudo base station using the pseudo base station identification algorithm.
  • the cloud server may transcode according to the terminal before transmitting the pseudo base station identification algorithm.
  • terminal in step 404 and the terminal in step 401 can be the same terminal or different terminals, which is not limited in this application.
  • the following describes how the terminal uses the pseudo base station identification algorithm.
  • Step 405 The terminal selects a target cell.
  • Step 406 The terminal runs the pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level.
  • Step 407 When the confidence is greater than or equal to the first confidence threshold, the terminal determines that the base station of the target cell is a pseudo base station.
  • Step 408 The terminal prohibits selecting the target cell again within the preset duration.
  • step 405 to step 408 can be referred to the detailed description of step 201 to step 204, respectively.
  • the method of the embodiment of the present invention further includes: when the confidence is less than or equal to the fourth confidence threshold, the terminal performs a preset operation by using the target cell, where the preset operation includes network registration, Any of the location area update, cell camping, and originating service request.
  • the base station of the target cell is a true base station, and the terminal can connect to the mobile network through the target cell.
  • the preset operation may be an operation that needs to be performed when the terminal normally connects to the mobile network.
  • the method of the embodiment of the present invention further includes: when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset In the condition, the terminal determines that the base station of the target cell is a pseudo base station. It can be understood that when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, the base station of the target cell is a suspected pseudo base station, and thus the suspected pseudo base station can be re-identified in combination with the first preset condition. For the method of identifying the suspected pseudo base station again, refer to the description of “1.1 Identifying the suspected pseudo base station again”, and details are not described herein again.
  • the method of the embodiment of the present invention further includes: when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset When the condition is met, the terminal determines that the base station of the target cell is a true base station. It can be understood that when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, the base station of the target cell is a suspected true base station, and thus the suspected true base station can be re-identified in combination with the second preset condition. For the method of identifying the suspected true base station again, refer to the description of “1.2 Identifying the suspected true base station again”, and details are not described herein again.
  • the terminal may be in a preset situation, for example, when connecting to the WiFi network, Send the saved feature data to the cloud server.
  • the cloud server uses the feature data of the target cell identified as the pseudo base station data as the sample data of the pseudo base station cell, or the feature data of the target cell identified as the true base station data as the sample data of the true base station cell, and the pre-stored pseudo base station
  • the recognition algorithm is further trained to update the pseudo base station Do not algorithm.
  • the updated pseudo base station identification algorithm has a higher recognition rate for the authentic base station.
  • the cloud server may further send the updated pseudo base station identification algorithm to the terminal for use by the terminal.
  • the pseudo base station identification algorithm based on big data and machine learning essentially needs to continuously train and iterate the pseudo base station identification algorithm by using the sample data of the authentic cell, thereby adapting to the changes of the new pseudo base station and the real base station.
  • the authenticity base station sample collection and algorithm training can be continued.
  • the terminal can obtain the confidence according to the feature data of the target cell by running the pseudo base station identification algorithm based on the machine learning, and determine whether the base station of the target cell is a pseudo base station according to the confidence level.
  • the pseudo base station identification algorithm generated by a large number of feature data training improves the recognition rate of the terminal to the pseudo base station.
  • the terminal may send the feature data of the suspected base station to the cloud server, and the cloud server updates the pseudo base station identification algorithm, thereby continuously following the technical evolution of the pseudo base station, and continuously improving the recognition rate of the pseudo base station.
  • FIG. 6 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure, where the terminal is used to perform the method performed by the terminal in the foregoing embodiment shown in FIG. 2 and FIG. 4.
  • the terminal of the embodiment of the present invention includes a selecting unit 601, an operating unit 602, and a determining unit 603.
  • the selecting unit 601 is configured to select a target cell
  • the running unit 602 is configured to run a pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level, where the confidence level is used to indicate that the base station of the target cell is a trusted base station.
  • the pseudo base station identification algorithm is generated by the machine learning algorithm training.
  • the determining unit 603 is configured to determine that the base station of the target cell is a pseudo base station when the confidence level is greater than or equal to the first confidence threshold.
  • the determining unit 603 is further configured to: when the confidence level is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, determining the target cell
  • the base station is a pseudo base station.
  • the determining unit 603 includes a saving module 604.
  • the saving module 604 is configured to save the feature data of the target cell when the confidence level is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition,
  • the feature data of the target cell is identified as pseudo base station data.
  • the saving module 604 is further configured to: when the pseudo base station data saving function is enabled, save the feature data of the target cell; or, when the target cell satisfies the pseudo base station data storage rule, save the feature data of the target cell; or When the pseudo base station data saving function is enabled and the target cell satisfies the pseudo base station data storage rule, the feature data of the target cell is saved.
  • the first preset condition includes at least one condition that the terminal intercepts the problem message sent by the target cell; when the terminal initiates the location area update request to the target cell, the terminal is rejected; when the terminal initiates the service request to the target cell, the terminal is rejected; The target cell signal is lost within a preset time; or, the location area code LAC of the target cell changes.
  • the terminal further includes an executing unit 605;
  • the executing unit 605 is configured to perform a preset operation by using the target cell when the confidence is less than or equal to the fourth confidence threshold, where the preset operation includes any one of network registration, location area update, cell camping, and originating service request. .
  • the determining unit 603 is further configured to: when the confidence level is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset condition, determining the target cell Base station is the base station.
  • the saving module 604 is further configured to save the target cell when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset condition.
  • Characteristic data the feature data of the target cell is identified as true base station data.
  • the saving module 604 is further configured to: save the feature data of the target cell when the true base station data saving function is enabled; or save the feature data of the target cell when the target cell satisfies the true base station data saving rule; or, the authentic base station When the data saving function is enabled and the target cell satisfies the true base station data storage rule, the feature data of the target cell is saved.
  • the second preset condition includes at least one condition that the terminal establishes a call or a data service in the target cell; the terminal completes the authentication through the target cell and enters an encryption security mode; or the terminal completes the handover in the target cell.
  • the target cell is a Global System for Mobile Communications (GSM) cell.
  • GSM Global System for Mobile Communications
  • the running unit 602 is further configured to: when the terminal detects that the LAC of the target cell is different from the currently saved LAC, run the pseudo base station identification algorithm according to the feature data of the target cell, to obtain a confidence level.
  • the selecting unit 601 is further configured to prohibit the target cell from being selected again within the preset duration.
  • the feature data includes at least one of cell selection and cell reselection information, networking information, service function information, area information, and time information.
  • the selecting unit 601 is configured to perform step 201, step 204, step 405, and step 408 above.
  • the running unit 602 is configured to perform step 202 and step 406 above.
  • the determining unit 603 is configured to perform step 203 and step 407 in the foregoing.
  • the terminal can obtain the confidence according to the feature data of the target cell by running the pseudo base station identification algorithm based on the machine learning, and determine whether the base station of the target cell is a pseudo base station according to the confidence level.
  • the pseudo base station identification algorithm generated by a large number of feature data training improves the recognition rate of the terminal to the pseudo base station.
  • the terminal may send the feature data of the suspected base station to the cloud server, and the cloud server updates the pseudo base station identification algorithm, thereby continuously following the technical evolution of the pseudo base station, and continuously improving the recognition rate of the pseudo base station.
  • FIG. 7 is a schematic structural diagram of a hardware structure of a terminal according to an embodiment of the present invention.
  • the terminal shown in FIG. 7 can be used to perform the method shown in FIG. 2 and FIG. 4.
  • the terminal shown in FIG. 6 can be integrated in FIG. On the terminal.
  • the terminals involved in the embodiments of the present invention may include various handheld devices having wireless communication functions, in-vehicle devices, wearable devices, computing devices, or other processing devices connected to the wireless modem.
  • the terminal may also be referred to as a mobile station (MS), a user equipment, a terminal device, and may also include a subscriber unit and a cellular phone.
  • the terminal is used as a mobile phone as an example for description.
  • the mobile phone includes: a radio frequency (RF) circuit 710, a memory 720, an input unit 730, a display 740, a sensor 750, an audio circuit 760, a wireless fidelity (WiFi) module 770, and a processor. 780, and power supply 790 and other components.
  • RF radio frequency
  • the structure of the handset shown in FIG. 7 does not constitute a limitation to the handset, and may include more or less components than those illustrated, or some components may be combined, or different components may be arranged.
  • the RF circuit 710 can be used for transmitting and receiving information or during a call, and receiving and transmitting the signal. Specifically, after receiving the downlink information of the base station, the processor 780 processes the data. In addition, the uplink data is designed to be sent to the base station.
  • RF circuit 710 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 710 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • the memory 720 can be used to store software programs and modules, and the processor 780 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 720.
  • the memory 720 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, video data, phone book, etc.).
  • the memory 720 may include volatile memory such as random access memory (RAM), nonvolatile random access memory (NVRAM), phase change random access memory (Phase Change).
  • RAM random access memory
  • PRAM magnetoresistive random access memory
  • MRAM magnetoresistive random access memory
  • non-volatile memory such as at least one disk storage device, read-only memory (ROM), electronically Electrically Erasable Programmable Read-Only Memory (EEPROM), flash memory devices such as NOR flash memory or NAND flash memory, semiconductor devices such as solid state hard disks (Solid) State Disk, SSD), etc.
  • ROM read-only memory
  • EEPROM electronically Electrically Erasable Programmable Read-Only Memory
  • flash memory devices such as NOR flash memory or NAND flash memory
  • semiconductor devices such as solid state hard disks (Solid) State Disk, SSD), etc.
  • the input unit 730 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 730 may include a touch panel 731 and other input devices 732.
  • the touch panel 731 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 731 or near the touch panel 731. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 731 may include two parts of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 780 is provided and can receive commands from the processor 780 and execute them.
  • the touch panel 731 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • input unit 730 may also include other input devices 732.
  • other input devices 732 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • Display 740 can be used to display information entered by the user or information provided to the user as well as various menus of the handset.
  • the display panel 740 can include a display panel 741.
  • the display panel 741 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 731 can cover the display panel 741. When the touch panel 731 detects a touch operation on or near the touch panel 731, it transmits to the processor 780 to determine the type of the touch event, and then the processor 780 according to the touch event. The type provides a corresponding visual output on display panel 741.
  • touch panel 731 and the display panel 741 are used as two independent components to implement the input and input functions of the mobile phone in FIG. 7, in some embodiments, the touch panel 731 can be integrated with the display panel 741. Realize the input and output functions of the phone.
  • the handset may also include at least one type of sensor 750, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 741 according to the brightness of the ambient light, and the proximity sensor may close the display panel 741 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • An audio circuit 760, a speaker 761, and a microphone 762 can provide an audio interface between the user and the handset.
  • the audio circuit 760 can transmit the converted electrical data of the received audio data to the speaker 761 for conversion to the sound signal output by the speaker 761; on the other hand, the microphone 762 converts the collected sound signal into an electrical signal by the audio circuit 760. After receiving, it is converted into audio data, and then processed by the audio data output processor 780, sent to, for example, another mobile phone via the RF circuit 710, or outputted to the memory 720 for further processing.
  • WiFi is a short-range wireless transmission technology
  • the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 770, which provides users with wireless broadband Internet access.
  • FIG. 7 shows the WiFi module 770, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 780 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 720, and invoking data stored in the memory 720, The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 780 can be a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), and a field programmable gate array ( Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof.
  • the processor 780 can implement or perform various exemplary logical blocks, modules and circuits described in connection with the present disclosure.
  • Processor 780 can also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
  • Optional processor 780 can include one or more processing units.
  • the processor 780 can integrate an application processor and a modem, wherein the application processor primarily processes an operating system, a user interface, an application, etc., and the modem processor primarily processes wireless communications. It will be appreciated that the above described modem processor may also be present independently, not integrated into the processor 780, or integrated with the audio circuit 760 or the like.
  • the handset also includes a power source 790 (such as a battery) that powers the various components.
  • a power source 790 such as a battery
  • the power supply can be logically coupled to the processor 780 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein.
  • the processor 780 may be configured to: select a target cell; run a pseudo base station identification algorithm according to the feature data of the target cell, and obtain a confidence level, where the confidence level is used to indicate that the base station of the target cell is a trusted base station.
  • the pseudo base station identification algorithm is generated by the machine learning algorithm training; when the confidence level is greater than or equal to the first confidence threshold, the base station of the target cell is determined to be a pseudo base station.
  • the processor 780 may be further configured to determine the target cell when the confidence level is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the target cell is detected to meet the first preset condition.
  • the base station is a pseudo base station.
  • the processor 780 may be configured to: when the confidence level is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the target cell is detected to meet the first preset condition, save the target cell Characteristic data, the feature data of the target cell is identified as pseudo base station data.
  • the processor 780 can control the memory 720 to save feature data of the target cell.
  • the processor 780 is further configured to: save the feature data of the target cell when the pseudo base station data saving function is enabled; or save the feature data of the target cell when the target cell satisfies the pseudo base station data saving rule; or When the pseudo base station data saving function is enabled, and the target cell satisfies the pseudo base station data storage rule, the feature data of the target cell is saved.
  • the processor 780 can control the memory 720 to save feature data of the target cell.
  • the processor 780 is further configured to perform a preset operation by using the target cell when the confidence is less than or equal to the fourth confidence threshold, where the preset operation includes network registration, location area update, cell camping, and initiation. Any of the business requests.
  • the processor 780 is further configured to: when the confidence level is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the target cell is detected to meet the second preset condition, determining the target cell
  • the base station is a true base station.
  • the processor 780 is further configured to: when the confidence level is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the target cell is detected to meet the second preset condition, save the target cell.
  • Characteristic data the feature data of the target cell is identified as true base station data.
  • the processor 780 can control the memory 720 to save feature data of the target cell.
  • the processor 780 is further configured to: save the feature data of the target cell when the true base station data save function is enabled; or save the feature data of the target cell when the target cell meets the true base station data save rule; or When the true base station data saving function is enabled and the target cell satisfies the true base station data storage rule, the feature data of the target cell is saved.
  • the processor 780 can control the memory 720 to save feature data of the target cell.
  • the processor 780 is further configured to: when detecting that the LAC of the target cell is different from the currently saved LAC, run the pseudo base station identification algorithm according to the feature data of the target cell, to obtain a confidence level.
  • the processor 780 is further configured to: after determining that the base station of the target cell is a pseudo base station, prohibiting to select the target cell again within a preset time period.
  • the processor 780 may also be configured to perform steps 201 to 204, and steps 401 to 408 above.
  • the terminal may obtain a confidence according to the feature data of the target cell, and determine whether the base station of the target cell is a pseudo base station according to the confidence level.
  • the pseudo base station identification algorithm generated by a large number of feature data training improves the recognition rate of the terminal to the pseudo base station.
  • the terminal may send the feature data of the suspected base station to the cloud server, and the cloud server updates the pseudo base station identification algorithm, thereby continuously following the technical evolution of the pseudo base station, and continuously improving the recognition rate of the pseudo base station.
  • the embodiment of the invention further provides a chip device, the chip comprising a processing unit for performing the method shown in FIG. 2 and FIG. 4 above.
  • the embodiment of the invention further provides a chip device, which comprises a processor and a memory.
  • the memory includes instructions that are executed by the processor for performing the methods illustrated in Figures 2 and 4 above.
  • the chip device may be a chip in the terminal, the chip includes: a processing unit and a communication unit, and the processing unit may be, for example, a processor, and the processor may be various types as described above.
  • the communication unit may be, for example, an input/output interface, a pin or a circuit, etc., and the communication unit includes a system bus.
  • the chip further includes a storage unit, where the storage unit may be a memory inside the chip, such as a register, a cache, a random access memory (RAM), an EEPROM or a FLASH, etc.;
  • the unit may also be a memory located external to the chip, which may be various types of memory 720 as previously described.
  • the processor is coupled to a memory that can execute instructions stored in the memory to cause the chip device to perform the methods illustrated in Figures 2 and 4 above.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • wire eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be stored by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).

Abstract

Provided are a pseudo base station identification method and a related device. The method comprises: a terminal selecting a target cell; the terminal running a pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence, wherein the confidence is used for indicating the degree of confidence that the base station of the target cell is a pseudo base station, and the pseudo base station identification algorithm is generated by means of training of a machine learning algorithm; and when the confidence is greater than or equal to a first confidence threshold, the terminal determining that the base station of the target cell is a pseudo base station. The pseudo base station identification algorithm is generated by means of training of a machine learning algorithm, so that the pseudo base station identification algorithm can be run according to the feature data of the target cell to obtain a confidence, and the authenticity of the base station of the target cell is identified by means of the confidence. The pseudo base station identification algorithm is more complex than the feature data matching algorithm, and it is easier to expand new feature data, so that the identification success rate for a pseudo base station can be improved.

Description

伪基站识别方法和终端Pseudo base station identification method and terminal 技术领域Technical field
本发明涉及通信领域,尤其涉及一种伪基站识别方法和终端。The present invention relates to the field of communications, and in particular, to a pseudo base station identification method and terminal.
背景技术Background technique
非法组织或个人控制的伪基站,独立于公众移动网络之外,通过伪装成某移动通信运营商的基站(例如广播某移动运营商的公共陆地移动网络标识(public land mobile network ID,PLMN ID),可以诱骗终端(或称移动终端、移动台、手机、用户设备等)向其发起网络注册或位置更新请求,进而提取终端的信息,比如,国际移动用户识别码(International Mobile Subscriber Identification Number,IMSI),临时移动用户识别(Temporary Mobile Subscriber Identity,TMSI),或国际移动设备标识(International Mobile Equipment Identity,IMEI),还可以与终端进行信息的传递等,例如向终端发送诈骗短信、恶意网络链接或骚扰短信等,从而危害到用户。伪基站可以对终端进行网络注册欺骗,可以伪造任意号码向终端发送短信,即伪基站不仅是一个基站,还具备一定的移动网络核心网功能。伪基站发射较强的无线信号,可以形成一个或多个蜂窝小区(cellular cell)信号覆盖,并可以变更小区标识等系统广播参数,终端在执行标准的小区选择(或称搜网)流程或小区重选流程时,选择的目标小区可能是某个伪基站形成的小区(简称伪基站小区,或称伪小区)。终端选择目标小区后,可能进行网络注册、驻留、业务请求或位置区域更新。A pseudo-base station controlled by an illegal organization or individual, independent of the public mobile network, by a base station disguised as a mobile communication carrier (for example, broadcasting a public land mobile network ID (PLMN ID) of a mobile operator) The terminal (or mobile terminal, mobile station, mobile phone, user equipment, etc.) can be tricked into initiating a network registration or location update request, thereby extracting information of the terminal, for example, an International Mobile Subscriber Identification Number (IMSI). ), Temporary Mobile Subscriber Identity (TMSI), or International Mobile Equipment Identity (IMEI), can also transfer information with the terminal, such as sending fraudulent text messages, malicious network links, or Harassing short messages, etc., thereby jeopardizing the user. The pseudo base station can perform network registration spoofing on the terminal, and can forge any number to send a short message to the terminal, that is, the pseudo base station is not only a base station, but also has a certain mobile network core network function. The wireless signal can form one or more cellular cell signal coverage, and can change system broadcast parameters such as cell identity, and when the terminal performs a standard cell selection (or search network) process or a cell reselection process, The selected target cell may be a cell formed by a certain pseudo base station (referred to as a pseudo base station cell or a pseudo cell). After the terminal selects the target cell, network registration, camping, service request, or location area update may be performed.
现有的终端防伪基站(或反伪基站)的方法,一般采用特征数据匹配或者拦截问题短信等。例如,在特征数据匹配(或称特征参数匹配)的防伪基站方法中,具体为,基于伪基站小区系统广播参数样本数据的人工统计和经验,选定若干个小区系统广播参数,并确定伪基站小区对这些系统广播参数的常见取值范围(往往与真基站小区差异较大,这些参数因此称为特征数据),如果待评估目标小区的若干个系统广播参数均匹配伪基站小区的特征数据的常见取值范围,则判定(或确定)该目标小区的基站为伪基站,或者说目标小区为伪小区。其中,前述的伪基站小区的系统广播参数的常见取值范围,例如,LAC取值0、65535,最小接收电平、最大功率电平和小区重选偏移(cell reselect offset,CRO)经常设置为0等。然而,新型伪基站小区的系统广播参数隐蔽很强,比如,它可能复制周边真实基站小区的系统广播参数并做一定的修改,这会使得特征数据匹配的防伪基站方法失效。问题短信拦截是通过云端短信大数据分析识别诈骗短信、恶意网络链接或骚扰短信,并提取这些问题短信的特征信息,然后将问题短信特征信息发送给终端上的问题短信拦截应用,该拦截应用对终端接收到的短信进行检测,如果符合问题短信特征信息,则将短信置于被拦截状态,在正常短信用户界面不会看到被拦截的问题短信。问题短信可能来自合法的运营商移动网络,或者伪基站。问题短信拦截只是具有适当降低伪基站危害的作用,但是不能识别伪基站,无法避免终端被伪基站诱骗。因此,现有的伪基站识别方法存在伪基站识别率低的问题。 The existing method of the terminal anti-counterfeiting base station (or anti-pseudo base station) generally adopts feature data matching or intercepting the problem text message. For example, in the anti-spyware base station method for feature data matching (or feature parameter matching), specifically, based on manual statistics and experience of the pseudo-base station cell system broadcast parameter sample data, a plurality of cell system broadcast parameters are selected, and the pseudo base station is determined. The common value range of the broadcast parameters of the system to the system (often different from the true base station cell, these parameters are therefore called feature data), if several system broadcast parameters of the target cell to be evaluated match the feature data of the pseudo base station cell The common value range determines (or determines) that the base station of the target cell is a pseudo base station, or the target cell is a pseudo cell. The common value range of the system broadcast parameters of the foregoing pseudo base station cell, for example, the LAC values 0, 65535, the minimum receiving level, the maximum power level, and the cell reselection offset (CRO) are often set to 0 and so on. However, the system broadcast parameters of the new pseudo base station cell are very concealed. For example, it may duplicate the system broadcast parameters of the surrounding real base station cells and make certain modifications, which may invalidate the anti-spyware base station method for matching the feature data. The problem message interception is to identify the fraudulent message, the malicious network link or the harassment message through the cloud message big data analysis, and extract the feature information of the problem message, and then send the problem message feature information to the problem message interception application on the terminal, and the interception application pair The short message received by the terminal is detected. If the message characteristic information of the problem is met, the short message is placed in the intercepted state, and the blocked short message is not seen in the normal short message user interface. The problem message may come from a legitimate carrier mobile network, or a pseudo base station. The problem message interception only has the effect of appropriately reducing the harm of the pseudo base station, but the pseudo base station cannot be identified, and the terminal cannot be prevented from being deceived by the pseudo base station. Therefore, the existing pseudo base station identification method has a problem that the pseudo base station identification rate is low.
发明内容Summary of the invention
本发明实施例提供了一种伪基站识别方法和终端,用于提高对伪基站的识别成功率。The embodiment of the invention provides a pseudo base station identification method and a terminal, which are used to improve the recognition success rate of the pseudo base station.
第一方面,提供了一种伪基站识别方法,该方法包括:终端选择目标小区,终端获取到目标小区的特征数据后,终端根据目标小区的特征数据运行伪基站识别算法,得到置信度。其中,置信度用于表示目标小区的基站为伪基站的可信程度,伪基站识别算法由机器学习算法训练所产生。根据该置信度即可对目标小区进行真伪识别,当置信度大于或等于第一置信度阈值时,终端确定目标小区的基站为伪基站,也即确定目标小区为伪小区。终端确定该目标小区的基站为伪基站后,可执行相关操作,避免伪基站带来的危害。该伪基站识别算法由机器学习算法使用大量真、伪基站小区的样本数据(简称真基站数据、伪基站数据)进行训练所产生,识别性能高,并且可以不断训练,快速跟进伪基站技术演进,从而可提高对伪基站的识别成功率。In a first aspect, a method for identifying a pseudo base station is provided. The method includes: the terminal selects a target cell, and after acquiring the feature data of the target cell, the terminal runs a pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level. The confidence level is used to indicate that the base station of the target cell is a trusted base station, and the pseudo base station identification algorithm is generated by the machine learning algorithm training. The target cell can be authenticated according to the confidence. When the confidence is greater than or equal to the first confidence threshold, the terminal determines that the base station of the target cell is a pseudo base station, that is, determines that the target cell is a pseudo cell. After determining that the base station of the target cell is a pseudo base station, the terminal may perform related operations to avoid the harm caused by the pseudo base station. The pseudo base station identification algorithm is generated by the machine learning algorithm using a large number of sample data of the true and pseudo base station cells (referred to as true base station data and pseudo base station data), the recognition performance is high, and the training can be continuously trained to quickly follow the evolution of the pseudo base station technology. Therefore, the recognition success rate of the pseudo base station can be improved.
在第一方面的第一种可能的实现方式中,在终端根据目标小区的特征数据运行伪基站识别算法,得到置信度之后,本方法还包括:当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且终端检测到目标小区满足第一预设条件时,终端确定目标小区的基站为伪基站。第二置信度阈值小于第一置信度阈值,若目标小区的置信度位于第一置信度阈值和第二置信度阈值之间,表示目标小区的基站为疑似伪基站,而第一预设条件为基站为伪基站的小区产生的行为信息,故若终端还检测到目标小区满足第一预设条件,则终端确定目标小区的基站为伪基站。这样,因置信度对目标小区的真伪识别是从概率方面描述,当置信度处于疑似伪基站所属的置信度区间时,通过第一预设条件的辅助判断,终端可识别出置信度小于第一置信度阈值但基站为伪基站的目标小区。In a first possible implementation manner of the first aspect, after the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell, and after obtaining the confidence, the method further includes: when the confidence is less than the first confidence threshold and the confidence is When the terminal detects that the target cell meets the first preset condition, the terminal determines that the base station of the target cell is a pseudo base station. The second confidence threshold is smaller than the first confidence threshold. If the confidence of the target cell is between the first confidence threshold and the second confidence threshold, the base station of the target cell is a suspected pseudo base station, and the first preset condition is The base station is behavior information generated by the cell of the pseudo base station. Therefore, if the terminal further detects that the target cell meets the first preset condition, the terminal determines that the base station of the target cell is a pseudo base station. In this way, the authenticity identification of the target cell by the confidence degree is described from the probability aspect. When the confidence level is in the confidence interval to which the suspected pseudo base station belongs, the terminal can recognize that the confidence is less than the first confidence condition. A confidence threshold but the base station is the target cell of the pseudo base station.
在第一方面的第二种可能的实现方式中,当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且终端检测到目标小区满足第一预设条件时,终端确定目标小区的基站为伪基站,包括:当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且终端检测到目标小区满足第一预设条件时,终端保存目标小区的特征数据,目标小区的特征数据被标识为伪基站数据。在这种情形中,伪基站识别算法对目标小区的识别不够理想,终端保存目标小区的特征数据后,终端可通过将该目标小区的特征数据发送给云端服务器等设备,以使云端服务器确定该目标小区的特征数据为伪基站数据,并使用该为伪基站数据的目标小区的特征数据进一步训练伪基站识别算法。In a second possible implementation manner of the first aspect, when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, the terminal Determining that the base station of the target cell is a pseudo base station, including: when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, the terminal saves the target cell Characteristic data, the feature data of the target cell is identified as pseudo base station data. In this case, the pseudo base station identification algorithm is not ideal for identifying the target cell. After the terminal saves the feature data of the target cell, the terminal may send the feature data of the target cell to a device such as a cloud server, so that the cloud server determines the The feature data of the target cell is pseudo base station data, and the pseudo base station identification algorithm is further trained using the feature data of the target cell that is the pseudo base station data.
在第一方面的第三种可能的实现方式中,终端保存目标小区的特征数据,包括:当伪基站数据保存功能开启时,终端保存目标小区的特征数据;或者,当目标小区满足伪基站数据保存规则时,终端保存目标小区的特征数据;或者,当伪基站数据保存功能开启,且目标小区满足伪基站数据保存规则时,终端保存目标小区的特征数据。这样,可以实现在终端上对标识为伪基站数据的目标小区的特征数据的灵活保存,方便了对终端数据保存开销的控制,且可以筛选出符合要求的伪基站小区的特征数据。In a third possible implementation manner of the first aspect, the terminal saves the feature data of the target cell, where the terminal saves the feature data of the target cell when the pseudo base station data save function is enabled, or when the target cell satisfies the pseudo base station data. When the rule is saved, the terminal saves the feature data of the target cell; or, when the pseudo base station data save function is enabled, and the target cell satisfies the pseudo base station data storage rule, the terminal saves the feature data of the target cell. In this way, the feature data of the target cell identified as the pseudo base station data can be flexibly saved on the terminal, the control of the terminal data storage overhead is facilitated, and the feature data of the pseudo base station cell that meets the requirements can be selected.
在第一方面的第四种可能的实现方式中,第一预设条件包括至少一个以下条件:终端拦截到目标小区发送的问题短信;终端向目标小区发起位置区域更新请求时被拒绝;终端 向目标小区发起业务请求时被拒绝;终端在预设时间内丢失目标小区信号;或者,目标小区的位置区码LAC发生改变。这些条件为基站为伪基站的小区产生的行为信息。In a fourth possible implementation manner of the first aspect, the first preset condition includes at least one condition that the terminal intercepts the problem message sent by the target cell; the terminal is rejected when the location area update request is initiated to the target cell; When the service request is initiated to the target cell, the terminal is rejected; the terminal loses the target cell signal within a preset time; or the location area code LAC of the target cell changes. These conditions are behavior information generated by the base station as a cell of the pseudo base station.
在第一方面的第五种可能的实现方式中,在终端根据目标小区的特征数据运行伪基站识别算法,得到置信度之后,本方法还包括:当置信度小于或等于第四置信度阈值时,终端确定目标小区的基站为真基站,从而终端通过目标小区执行预设操作,预设操作包括网络注册、位置区域更新、小区驻留和发起业务请求中的任意一项。终端通过置信度识别出目标小区的基站为真基站后,通过目标小区执行预设操作,使得终端处于更安全的环境中。In a fifth possible implementation manner of the first aspect, after the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell, and after obtaining the confidence, the method further includes: when the confidence is less than or equal to the fourth confidence threshold The terminal determines that the base station of the target cell is a real base station, so that the terminal performs a preset operation by using the target cell, where the preset operation includes any one of network registration, location area update, cell camping, and originating service request. After the terminal identifies that the base station of the target cell is a true base station, the terminal performs a preset operation through the target cell, so that the terminal is in a more secure environment.
在第一方面的第六种可能的实现方式中,在终端根据目标小区的特征数据运行伪基站识别算法,得到置信度之后,本方法还包括:当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值,且终端检测到目标小区满足第二预设条件时,终端确定目标小区的基站为真基站。第三置信度阈值大于第四置信度阈值。若目标小区的置信度位于第四置信度阈值和第三置信度阈值之间,表示目标小区的基站为疑似真基站,而第二预设条件为基站为真基站的小区产生的行为信息,故若终端还检测到目标小区满足第二预设条件,则终端确定目标小区的基站为真基站。这样,因置信度对目标小区的真伪识别是从概率方面描述,当置信度处于疑似真基站所属的置信度区间时,通过第二预设条件的辅助判断,终端可识别出置信度大于第四置信度阈值但基站为真基站的小区。In a sixth possible implementation manner of the first aspect, after the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell, and after obtaining the confidence, the method further includes: when the confidence is greater than the fourth confidence threshold and the confidence is When the terminal detects that the target cell meets the second preset condition, the terminal determines that the base station of the target cell is a true base station. The third confidence threshold is greater than the fourth confidence threshold. If the confidence of the target cell is between the fourth confidence threshold and the third confidence threshold, indicating that the base station of the target cell is a suspected true base station, and the second preset condition is that the base station is behavior information generated by the cell of the true base station, If the terminal further detects that the target cell meets the second preset condition, the terminal determines that the base station of the target cell is a true base station. In this way, since the authenticity of the target cell is determined from the probability aspect, when the confidence level is in the confidence interval to which the suspected true base station belongs, the terminal can recognize that the confidence is greater than the second confidence condition. A cell with a four confidence threshold but the base station is a true base station.
在第一方面的第七种可能的实现方式中,当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值,且终端检测到目标小区满足第二预设条件时,终端确定目标小区的基站为真基站,包括:当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值,且终端检测到目标小区满足第二预设条件时,终端保存目标小区的特征数据,目标小区的特征数据被标识为真基站数据。在这种情形下,伪基站识别算法对目标小区的识别不够理想,终端保存目标小区的特征数据后,终端可通过将该目标小区的特征数据发送给云端服务器等设备,以使云端服务器确定该目标小区的特征数据为真基站数据,并使用该为真基站数据的目标小区的特征数据进一步训练伪基站识别算法。In a seventh possible implementation manner of the first aspect, when the confidence level is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset condition, the terminal Determining that the base station of the target cell is a true base station, including: when the confidence level is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset condition, the terminal saves the target cell Characteristic data, the feature data of the target cell is identified as true base station data. In this case, the pseudo base station identification algorithm is not ideal for identifying the target cell. After the terminal saves the feature data of the target cell, the terminal may send the feature data of the target cell to the cloud server or the like, so that the cloud server determines the The feature data of the target cell is true base station data, and the pseudo base station identification algorithm is further trained using the feature data of the target cell that is the true base station data.
在第一方面的第八种可能的实现方式中,终端保存目标小区的特征数据,包括:当真基站数据保存功能开启时,终端保存目标小区的特征数据;或者,当目标小区满足真基站数据保存规则时,终端保存目标小区的特征数据;或者,当真基站数据保存功能开启,且目标小区满足真基站数据保存规则时,终端保存目标小区的特征数据。这样,可以实现在终端上对标识为真基站数据的目标小区的特征数据的灵活保存,方便了对终端数据保存开销的控制,且可以筛选出符合要求的真基站小区的特征数据。In an eighth possible implementation manner of the first aspect, the terminal saves the feature data of the target cell, where the terminal saves the feature data of the target cell when the true base station data save function is enabled, or saves the target cell to the true base station data. When the rule is used, the terminal saves the feature data of the target cell; or, when the true base station data save function is enabled, and the target cell satisfies the true base station data storage rule, the terminal saves the feature data of the target cell. In this way, the feature data of the target cell identified as the true base station data can be flexibly saved on the terminal, the control of the terminal data storage overhead is facilitated, and the feature data of the true base station cell that meets the requirements can be selected.
在第一方面的第九种可能的实现方式中,第二预设条件包括至少一个以下条件:终端在目标小区建立通话或者数据业务;终端通过目标小区完成认证并进入加密安全模式;或者,终端在目标小区完成切换。这些条件为基站为真基站的小区产生的行为信息。In a ninth possible implementation manner of the first aspect, the second preset condition includes at least one condition that the terminal establishes a call or a data service in the target cell; the terminal completes the authentication through the target cell and enters an encryption security mode; or, the terminal The handover is completed in the target cell. These conditions are behavior information generated by a cell in which the base station is a true base station.
在第一方面的第十种可能的实现方式中,目标小区为全球移动通信系统GSM小区。因当前伪基站多数为GSM基站,故针对目标小区为GSM小区的场景实现本方法,可对大多数伪基站有效。In a tenth possible implementation manner of the first aspect, the target cell is a global mobile communication system GSM cell. Since the current pseudo base station is mostly a GSM base station, the present method is implemented for a scenario in which the target cell is a GSM cell, and is effective for most pseudo base stations.
在第一方面的第十一种可能的实现方式中,终端根据目标小区的特征数据运行伪基站 识别算法,得到置信度,包括:当终端检测到目标小区的LAC和当前保存的LAC不相同时,终端根据目标小区的特征数据运行伪基站识别算法,得到置信度。这可以减少功耗以及提高识别效率。In an eleventh possible implementation manner of the first aspect, the terminal runs the pseudo base station according to the feature data of the target cell. The identification algorithm obtains a confidence level, including: when the terminal detects that the LAC of the target cell is different from the currently saved LAC, the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell, and obtains a confidence level. This can reduce power consumption and improve recognition efficiency.
在第一方面的第十二种可能的实现方式中,在终端确定目标小区的基站为伪基站之后,本方法还包括:终端在预设时长内禁止再次选择目标小区。这样,通过在预设时长内禁止再次选择目标小区,可以减少伪基站小区对终端的干扰,同时减小终端对被冒充的真基站小区的选择的影响。In a twelfth possible implementation manner of the first aspect, after the terminal determines that the base station of the target cell is a pseudo base station, the method further includes: the terminal prohibiting the target cell from being selected again within the preset duration. In this way, by prohibiting the selection of the target cell again within the preset duration, the interference of the pseudo base station cell to the terminal can be reduced, and the influence of the terminal on the selection of the impersonated true base station cell can be reduced.
在第一方面的第十三种可能的实现方式中,特征数据包括小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信息的至少一种。在这几种信息中的任一种还可以包括多种具体的小区信息。In a thirteenth possible implementation manner of the first aspect, the feature data includes at least one of cell selection and cell reselection information, networking information, service function information, area information, and time information. Any of these kinds of information may also include a plurality of specific cell information.
第二方面,提供了一种终端,该终端具有实现上述第一方面所述方法中终端的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。In a second aspect, a terminal is provided, the terminal having the function of implementing the terminal in the method of the first aspect described above. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
第三方面,提供了一种终端,该终端包括处理器和存储器。所述处理器可以配置用于支持终端执行上述第一方面所述方法中相应的功能,例如处理器被配置用于:选择目标小区;根据目标小区的特征数据运行伪基站识别算法,得到置信度,置信度用于表示目标小区的基站为伪基站的可信程度,伪基站识别算法由机器学习算法训练所产生;当置信度大于或等于第一置信度阈值时,确定目标小区的基站为伪基站。In a third aspect, a terminal is provided that includes a processor and a memory. The processor may be configured to support a terminal to perform a corresponding function in the method described in the foregoing first aspect, for example, the processor is configured to: select a target cell; and run a pseudo base station identification algorithm according to feature data of the target cell to obtain a confidence The confidence level is used to indicate that the base station of the target cell is a trusted level of the pseudo base station, and the pseudo base station identification algorithm is generated by the machine learning algorithm training; when the confidence level is greater than or equal to the first confidence threshold, the base station of the target cell is determined to be a pseudo Base station.
第四方面,提供了一种芯片装置,所述芯片装置包括处理单元,所述处理单元用于执行上述第一方面所述的方法。In a fourth aspect, a chip arrangement is provided, the chip arrangement comprising a processing unit for performing the method of the first aspect described above.
第五方面,提供了一种芯片装置,所述芯片装置包括处理器和存储器。所述存储器包括指令,所述处理器运行所述指令以执行上述第一方面所述的方法。In a fifth aspect, a chip arrangement is provided, the chip arrangement comprising a processor and a memory. The memory includes instructions that are executed by the processor to perform the method of the first aspect described above.
第六方面,提供了一种芯片系统,该芯片系统包括处理器,用于支持终端实现上述第一方面中所涉及的功能,例如发送或处理上述方法中所涉及的数据和/或信息。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存网络设备必要的程序指令和数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。In a sixth aspect, a chip system is provided, the chip system comprising a processor for supporting a terminal to implement the functions involved in the first aspect described above, such as transmitting or processing data and/or information involved in the above method. In a possible design, the chip system further includes a memory for storing necessary program instructions and data of the network device. The chip system can be composed of chips, and can also include chips and other discrete devices.
第七方面,提供了一种计算机程序,包括指令,当其在计算机上运行时,使得计算机执行上述第一方面所述的方法。In a seventh aspect, a computer program is provided comprising instructions which, when run on a computer, cause the computer to perform the method of the first aspect described above.
第八方面,提供了一种计算机可读存储介质,所述计算机可读存储介质存储有指令,当所述指令在计算机上运行时,使得计算机执行上述第一方面所述的方法。In an eighth aspect, a computer readable storage medium is provided, the computer readable storage medium storing instructions that, when executed on a computer, cause the computer to perform the method of the first aspect described above.
第九方面,提供了一种包含指令的计算机程序产品,当所述指令在计算机上运行时,使得计算机执行上述第一方面所述的方法。In a ninth aspect, a computer program product comprising instructions for causing a computer to perform the method of the first aspect described above when the instructions are run on a computer.
本发明实施例中,通过运行基于机器学习的伪基站识别算法终端可以根据目标小区的特征数据得到置信度,并根据置信度确定目标小区的基站是否为伪基站。通过大量特征数据训练产生的伪基站识别算法,提高了终端对伪基站的识别率。并且,终端可以将疑似基站的特征数据发送给云端服务器,由云端服务器对伪基站识别算法进行更新,从而持续跟进伪基站的技术演进,不断提高伪基站的识别率。 In the embodiment of the present invention, the terminal can obtain the confidence according to the feature data of the target cell by running the pseudo base station identification algorithm based on the machine learning, and determine whether the base station of the target cell is a pseudo base station according to the confidence level. The pseudo base station identification algorithm generated by a large number of feature data training improves the recognition rate of the terminal to the pseudo base station. Moreover, the terminal may send the feature data of the suspected base station to the cloud server, and the cloud server updates the pseudo base station identification algorithm, thereby continuously following the technical evolution of the pseudo base station, and continuously improving the recognition rate of the pseudo base station.
附图说明DRAWINGS
图1a为本发明实施例提供的一种伪基站识别方法涉及到的场景的一个示意图;FIG. 1 is a schematic diagram of a scenario related to a pseudo base station identification method according to an embodiment of the present disclosure;
图1b为图1a所示场景的另一个示意图;Figure 1b is another schematic view of the scene shown in Figure 1a;
图2为本发明实施例提供的一种伪基站识别方法的方法流程图;2 is a flowchart of a method for identifying a pseudo base station according to an embodiment of the present invention;
图3为图2所示伪基站识别方法涉及的一种置信度阈值关系示意图;3 is a schematic diagram of a confidence threshold relationship involved in the pseudo base station identification method shown in FIG. 2;
图4为本发明实施例提供的一种伪基站识别方法的方法流程图;4 is a flowchart of a method for identifying a pseudo base station according to an embodiment of the present invention;
图5为图4所示实施例的伪基站识别方法涉及到的场景架构图;FIG. 5 is a schematic diagram of a scenario structure involved in the pseudo base station identification method in the embodiment shown in FIG. 4; FIG.
图6为本发明实施例提供的一种终端的结构示意图;FIG. 6 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure;
图7为本发明实施例提供的一种终端的硬件结构示意图。FIG. 7 is a schematic structural diagram of hardware of a terminal according to an embodiment of the present invention.
具体实施方式Detailed ways
本发明实施例提供了一种伪基站识别方法和终端,用于提高对伪基站的识别成功率。The embodiment of the invention provides a pseudo base station identification method and a terminal, which are used to improve the recognition success rate of the pseudo base station.
为了方便理解本发明提供的各实施例,下面将对本发明实施例使用到的一些术语进行解释,后文各实施例可参考下述的术语解释。In order to facilitate the understanding of the various embodiments provided by the present invention, some terms used in the embodiments of the present invention will be explained below, and the following embodiments can be explained with reference to the following terms.
1、本申请提到的伪基站,是由非法组织或个人控制的基站,该伪基站独立于公众移动网络之外,通过伪装成某移动通信运营商的基站,例如广播某移动运营商的PLMN ID,可以诱骗终端(或称移动终端、移动台、手机、用户设备等)向其发起网络注册或位置更新请求,进而提取终端的信息,例如IMSI,TMSI或IMEI,还可以与终端进行信息的传递等,例如向终端发送诈骗短信、恶意网络链接或骚扰短信等。伪基站可以对终端进行网络注册欺骗,可以伪造任意号码向终端发送短信,因此,伪基站不仅是一个基站,还具备一定的移动网络核心网功能。伪基站发射较强的无线信号,可以形成一个或多个蜂窝小区(cellular cell)信号覆盖,并可以变更各小区的小区标识等系统广播参数。1. The pseudo base station mentioned in the present application is a base station controlled by an illegal organization or an individual, and the pseudo base station is spoofed as a base station of a mobile communication carrier, for example, broadcasting a PLMN of a mobile operator, independently of the public mobile network. ID, can trick a terminal (or mobile terminal, mobile station, mobile phone, user equipment, etc.) to initiate a network registration or location update request, thereby extracting information of the terminal, such as IMSI, TMSI or IMEI, and can also perform information with the terminal. Delivering, etc., for example, sending a scam message, a malicious network link, or harassing a message to the terminal. The pseudo base station can perform network registration spoofing on the terminal, and can forge any number to send a short message to the terminal. Therefore, the pseudo base station is not only a base station, but also has a certain mobile network core network function. The pseudo base station transmits a strong wireless signal, can form one or more cellular cell signal coverage, and can change system broadcast parameters such as cell identifier of each cell.
各类伪基站工作的基本原理相似,该原理一般为:伪基站伪装成一个合法基站,然后发射较强的小区信号,吸引终端前来驻留和注册,获得终端的IMSI后下发伪造短信到终端,并能够记录已发送伪造短信的终端,避免重复发送,并适时将终端踢出该小区。The basic principles of the operation of various types of pseudo base stations are similar. The principle is generally: the pseudo base station masquerades as a legal base station, and then transmits a strong cell signal, attracts the terminal to stay and register, obtains the IMSI of the terminal, and then sends the fake SMS to The terminal can record the terminal that has sent the fake SMS, avoids repeated transmission, and kicks the terminal out of the cell in time.
2、机器学习(Machine Learning,ML)是一门多领域交叉学科,涉及概率论、统计学、逼近论、凸分析、算法复杂度理论等多门学科。专门研究计算机怎样模拟或实现人类的学习行为,以获取新的知识或技能,重新组织已有的知识结构使之不断改善自身的性能。2. Machine Learning (ML) is a multi-disciplinary subject involving many disciplines such as probability theory, statistics, approximation theory, convex analysis, and algorithm complexity theory. Specializing in how computers simulate or implement human learning behaviors to acquire new knowledge or skills and reorganize existing knowledge structures to continuously improve their performance.
机器学习算法例如可以为决策树、随机森林算法、逻辑回归、SVM(Support Vector Machine,支持向量机)、朴素贝叶斯、K最近邻算法、K均值算法、Adaboost算法、神经网络和马尔可夫等。Machine learning algorithms can be, for example, decision trees, random forest algorithms, logistic regression, SVM (Support Vector Machine), Naive Bayes, K nearest neighbor algorithm, K-means algorithm, Adaboost algorithm, neural network and Markov Wait.
机器学习算法使用大量的带标记数据样本进行训练或学习后,可以产生模型实例或者函数实例,这些模型实例或者函数实例具备对新的数据样本进行自动标记的能力。Machine learning algorithms that use a large number of labeled data samples for training or learning can produce model instances or function instances that have the ability to auto-tag new data samples.
3、位置区码(location area code,LAC),为了确定移动台的位置,每个公共陆地移动网络(Public Land Mobile Network,PLMN)的覆盖区都被划分成许多位置区,LAC可以用于标识不同的位置区。一个位置区可以包含一个或多个小区。LAC在每个小区广播信 道上的系统消息中发送。例如,基站通过BCCH向手机广播本小区频率和位置区识别码(Location Area Identity,LAI),以及相邻小区广播控制信道(Broadcast Control Channel,BCCH)频率等信息。其中,LAI包括LAC。3. Location area code (LAC). In order to determine the location of the mobile station, the coverage area of each Public Land Mobile Network (PLMN) is divided into a plurality of location areas, and the LAC can be used for identification. Different location areas. A location area may contain one or more cells. LAC broadcasts a message in each cell Sent in the system message on the track. For example, the base station broadcasts the cell frequency and the location area identity (LAI), and the information of the adjacent cell broadcast control channel (BCCH) frequency to the mobile phone through the BCCH. Among them, LAI includes LAC.
4、LTE RRC(Long Term Evolution Radio Resource Control,长期演进无线资源控制协议)重定向攻击的原理:LTE伪基站吸引LTE终端前来附着;收到终端发来附着请求之后以及安全流程启动之前,直接下发非接入层(Non-access stratum,NAS)消息拒绝附着;紧接着下发RRC ConnectionRelease消息,该消息携带redirectedCarrierInfo信息,指示转到2G(2-Generation wireless telephone technology,第二代手机通信技术规格)网络和频点(ARFCN),该2G网络和频点通常是预先架设好的伪基站,从而方便攻击者实施下一步攻击。4. Principle of LTE RRC (Long Term Evolution Radio Resource Control) redirection attack: LTE pseudo base station attracts LTE terminal to attach; after receiving the attachment request from the terminal and before the security process starts, directly The non-access stratum (NAS) message is rejected, and the RRC ConnectionRelease message is sent. The message carries the redirectedCarrierInfo message, indicating that the second generation mobile phone communication technology is transmitted to the 2G (2-Generation wireless telephone technology). Specification) Network and Frequency Point (ARFCN), which is usually a pre-configured pseudo base station, which is convenient for attackers to carry out the next attack.
5、终端根据准则1(Criteria 1,C1)或准则2(Criteria 2,C2)选择小区的过程:5. The process of selecting a cell according to criterion 1 (Criteria 1, C1) or criterion 2 (Criteria 2, C2):
1)、终端在开机搜网时,终端选择C1>0且C1最大的小区;1) When the terminal searches for the network, the terminal selects a cell with C1>0 and the largest C1;
2)、终端进行小区重选时,涉及到C2准则(或称C2算法)。如果下列条件之一满足,则将启动小区重选;2) When the terminal performs cell reselection, it involves the C2 criterion (or C2 algorithm). Cell reselection will be initiated if one of the following conditions is met;
(A)在5秒的计算周期内,C1一直小于0;(A) C1 is always less than 0 during the 5 second calculation period;
(B)在5秒的计算周期内,如果当前小区和邻小区有相同LAC,当邻小区的C2一直大于服务小区的C2值时,可以发生小区重选;如果当前小区和邻小区有不同LAC,邻小区的C1一直大于服务小区的C1与小区重选滞后(Cell Reselection Hysteresis,CRH)之和,可以发生小区重选。(B) In the calculation period of 5 seconds, if the current cell and the neighboring cell have the same LAC, when the C2 of the neighboring cell is always greater than the C2 value of the serving cell, cell reselection may occur; if the current cell and the neighboring cell have different LACs The C1 of the neighboring cell is always greater than the sum of the C1 of the serving cell and the Cell Reselection Hysteresis (CRH), and cell reselection may occur.
包含上述两种条件,如果在先前15秒内已经发生过小区重选,那么新的候选小区的C2在5秒的计算周期内必须一直比当前服务小区高5dB才能发起小区重选。Including the above two conditions, if cell reselection has occurred within the previous 15 seconds, the C2 of the new candidate cell must always be 5 dB higher than the current serving cell in the 5 second calculation period to initiate cell reselection.
其中,C1=终端接收平均电平-允许终端接入的最小电平;C2=C1+小区重选偏移量=终端接收平均电平+(小区重选偏移量–允许终端接入的最小电平)。Where C1 = terminal reception average level - minimum level that allows terminal access; C2 = C1 + cell reselection offset = terminal reception average level + (cell reselection offset - minimum power allowed for terminal access) level).
图1a为本发明实施例提供的一种伪基站识别方法涉及的场景示意图。如图1a所示,伪基站识别方法涉及到的场景包括基站101和终端102,该终端102可与该基站101通信连接。FIG. 1 is a schematic diagram of a scenario involved in a method for identifying a pseudo base station according to an embodiment of the present invention. As shown in FIG. 1a, the scenario involved in the pseudo base station identification method includes a base station 101 and a terminal 102, and the terminal 102 can be communicatively coupled to the base station 101.
终端102可以包括但不限于手机、平板电脑、个人数字助理(Personal Digital Assistant,PDA)、销售终端(Point of Sales,POS)、车载电脑等。The terminal 102 can include, but is not limited to, a mobile phone, a tablet, a Personal Digital Assistant (PDA), a Point of Sales (POS), a car computer, and the like.
该基站101可以广播信号,形成一个或多个蜂窝小区,如图1b所示。The base station 101 can broadcast signals to form one or more cells, as shown in Figure 1b.
在一些示例中,基站101可以是真基站,真基站形成真基站小区。真基站为运营商移动网络的合法基站,终端102可通过真基站小区接入运营商移动网络、变更驻留小区或者切换小区,以及通过真基站小区进行通话和数据业务等。In some examples, base station 101 can be a true base station and a true base station forms a true base station cell. The real base station is a legal base station of the operator mobile network, and the terminal 102 can access the operator mobile network, change the camping cell or the handover cell through the real base station cell, and perform call and data services through the real base station cell.
在本发明的另一些示例中,该基站101也可以是伪基站,伪基站的定义可参考上文的描述。当基站101为伪基站时,伪基站101发射信号,形成伪基站小区。终端102在执行标准的小区选择(或称搜网)流程或小区重选流程时,可能选择该伪基站小区。终端选择该伪基站小区后,可能进行网络注册、驻留、业务请求或位置区域更新等操作。In other examples of the present invention, the base station 101 may also be a pseudo base station, and the definition of the pseudo base station may refer to the above description. When the base station 101 is a pseudo base station, the pseudo base station 101 transmits a signal to form a pseudo base station cell. The terminal 102 may select the pseudo base station cell when performing a standard cell selection (or network) process or a cell reselection procedure. After the terminal selects the pseudo base station cell, operations such as network registration, camping, service request, or location area update may be performed.
由于伪基站101可以提取终端102的IMSI、TMSI和IMEI等信息,还可以与终端102 进行信息的传递等,例如伪基站101向终端102发送诈骗短信、恶意网络链接或骚扰短信等,从而危害到用户对终端102的使用。伪基站101也使得终端102实际上未连接到正常移动网络,终端正常的通话和数据业务等都无法进行。Since the pseudo base station 101 can extract information such as the IMSI, TMSI, and IMEI of the terminal 102, it can also be associated with the terminal 102. For example, the pseudo base station 101 transmits a fraudulent short message, a malicious network link, or a harassment message to the terminal 102, thereby jeopardizing the user's use of the terminal 102. The pseudo base station 101 also makes the terminal 102 not actually connected to the normal mobile network, and the normal call and data service of the terminal cannot be performed.
结合上文的内容,下文即对本发明实施例的伪基站识别方法和终端进行详细的说明。The pseudo base station identification method and the terminal according to the embodiment of the present invention are described in detail below in conjunction with the above.
图2为本发明实施例提供的一种伪基站识别方法的方法流程图,该方法可应用于图1a所示的场景中的终端上。请参阅图2,本发明实施例的方法包括:FIG. 2 is a flowchart of a method for identifying a pseudo base station according to an embodiment of the present invention. The method is applicable to a terminal in the scenario shown in FIG. 1a. Referring to FIG. 2, the method of the embodiment of the present invention includes:
步骤201:终端选择目标小区。Step 201: The terminal selects a target cell.
步骤202:终端根据目标小区的特征数据运行伪基站识别算法,得到置信度。Step 202: The terminal runs a pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level.
步骤203:当置信度大于或等于第一置信度阈值时,终端确定目标小区的基站为伪基站。Step 203: When the confidence is greater than or equal to the first confidence threshold, the terminal determines that the base station of the target cell is a pseudo base station.
在步骤201中,终端为了接入移动网络、变更驻留小区或切换小区,需要进行目标小区选择。基站进行信号广播,形成小区信号覆盖,终端可以根据获取的广播信号,进行目标小区选择,此时终端可能选择到伪基站小区。In step 201, the terminal needs to perform target cell selection in order to access the mobile network, change the camped cell or switch the cell. The base station performs signal broadcast to form a cell signal coverage, and the terminal may perform target cell selection according to the acquired broadcast signal, and the terminal may select the pseudo base station cell.
具体来说,基站通过BCH(Broadcast Channel,广播信道)向终端广播信号,该信号例如可包括频率校正信号、同步信号、本小区频率和LAC,以及相邻小区BCCH频率等信息。然后,终端可根据C1或C2准则来选择目标小区。Specifically, the base station broadcasts a signal to the terminal through a BCH (Broadcast Channel), and the signal may include, for example, a frequency correction signal, a synchronization signal, a local cell frequency and an LAC, and information such as a neighboring cell BCCH frequency. The terminal can then select the target cell based on the C1 or C2 criteria.
终端选择目标小区,获取到目标小区的广播信号,并从该广播信号中得到目标小区的特征数据,该特征数据用于计算或评估目标小区是伪基站的可信程度。The terminal selects the target cell, acquires a broadcast signal of the target cell, and obtains feature data of the target cell from the broadcast signal, where the feature data is used to calculate or evaluate the degree of trust of the target cell as a pseudo base station.
在本发明实施例中,目标小区可以为多种类型的小区,例如目标小区可以为GSM(Global System for Mobile communication,全球移动通信系统)小区,其基站为GSM基站;或者,目标小区是3G(3rd-Generation,第三代移动通信技术)网络小区,其基站为3G基站;或者,目标小区是4G(the 4th Generation mobile communication,第四代移动通信技术)网络小区,其基站为LTE(Long Term Evolution,长期演进)/4G基站。由于当前伪基站多数为GSM基站,为方便描述起见,本申请以目标小区为GSM小区为例进行说明。In the embodiment of the present invention, the target cell may be a plurality of types of cells, for example, the target cell may be a GSM (Global System for Mobile communication) cell, and the base station is a GSM base station; or, the target cell is 3G ( 3rd-Generation, 3rd generation mobile communication technology), the base station is a 3G base station; or the target cell is 4th (the 4th Generation mobile communication) network cell, and its base station is LTE (Long Term) Evolution, Long Term Evolution) / 4G base station. The current pseudo base station is mostly a GSM base station. For convenience of description, the present application uses the target cell as a GSM cell as an example for description.
步骤201可以在多种场景下实现,下面将对步骤201的具体实现方式进行描述,在这些示例中,终端都可能选择到伪基站小区。Step 201 can be implemented in various scenarios. A specific implementation of step 201 will be described below. In these examples, the terminal may select a pseudo base station cell.
示例一:终端为驻留在GSM网络的空闲态终端,该终端按小区重选流程选择目标小区,以变更驻留的小区(也称服务小区)。Example 1: A terminal is an idle state terminal camping on a GSM network, and the terminal selects a target cell according to a cell reselection procedure to change a camped cell (also called a serving cell).
例如,目标小区的C2连续5秒大于服务小区C2,且目标小区与服务小区有相同LAC,则终端重选该目标小区作为(新的)服务小区。在小区重选流程中,终端可能选择到伪基站小区。For example, if the C2 of the target cell is greater than the serving cell C2 for 5 consecutive seconds, and the target cell has the same LAC as the serving cell, the terminal reselects the target cell as the (new) serving cell. In the cell reselection procedure, the terminal may select a pseudo base station cell.
示例二:终端从驻留4G/3G网络改为驻留GSM网络时,终端按小区选择流程选择目标小区。Example 2: When the terminal changes from the resident 4G/3G network to the GSM network, the terminal selects the target cell according to the cell selection process.
驻留在4G/3G网络的终端可能因为当前网络信号变差,改为回退到GSM网络。此时终端的GSM网络小区选择也可能选择到伪基站小区。另外,一些伪基站可能通过发送4G/3G干扰信号,导致人为的4G/3G网络小区的信号质量(比如载干比)变差,迫使终端回退到 GSM网络,然后,再通过GSM伪基站小区吸引终端驻留。A terminal residing on a 4G/3G network may fall back to the GSM network because the current network signal is degraded. At this time, the GSM network cell selection of the terminal may also be selected to the pseudo base station cell. In addition, some pseudo base stations may transmit 4G/3G interference signals, resulting in poor signal quality (such as carrier-to-interference ratio) of artificial 4G/3G network cells, forcing the terminal to fall back to The GSM network then attracts the terminal to camp through the GSM pseudo base station cell.
示例三:终端开机时,通过小区选择流程选择目标小区。Example 3: When the terminal is powered on, the target cell is selected through the cell selection process.
当终端开机时,终端进行GSM网络小区选择,以进行网络附着(即网络注册),此时,终端也有可能选择到伪基站小区。When the terminal is powered on, the terminal performs GSM network cell selection for network attachment (ie, network registration). At this time, the terminal may also select a pseudo base station cell.
上述三种选择目标小区的场景都是终端在空闲态自发的小区重选或小区选择行为,在本发明实施例中,终端还可以是在连接态(即终端与服务小区有连接)进行目标小区的选择。具体情形如下:The scenario of the three types of target cells is the cell reselection or the cell selection behavior of the terminal in the idle state. In the embodiment of the present invention, the terminal may also be in the connected state (that is, the terminal is connected to the serving cell) to perform the target cell. s Choice. The specific situation is as follows:
示例四:终端从4G/3G网络通过重定向选择目标小区。Example 4: The terminal selects the target cell through redirection from the 4G/3G network.
连接态的终端受到4G/3G网络的重定向指令的触发,可能回退到GSM网络进行小区选择。例如,4G/3G网络指示终端重定向到2G网络,并指示2G邻小区频点信息,终端捕获2G邻小区信号并通过2G网络发起业务请求(比如接听来电)。The connected terminal is triggered by the redirection command of the 4G/3G network, and may fall back to the GSM network for cell selection. For example, the 4G/3G network instructs the terminal to redirect to the 2G network and indicates the 2G neighbor cell frequency point information, and the terminal captures the 2G neighbor cell signal and initiates a service request (such as answering an incoming call) through the 2G network.
在重定向场景中,如果终端选择到一个GSM伪基站小区,则在发起业务请求时会被伪基站小区拒绝(因为伪基站一般无法建立相应的业务),这种场景发生的概率虽然不大,但一旦发生,将对用户使用终端产生较大干扰。另外,新型4G/3G伪基站也可能先吸引终端驻留到其小区下,再通过重定向诱骗终端回退到GSM网络,再通过GSM伪基站小区吸引终端驻留。In the redirection scenario, if the terminal selects a GSM pseudo base station cell, it will be rejected by the pseudo base station cell when the service request is initiated (because the pseudo base station generally cannot establish the corresponding service), although the probability of occurrence of such a scenario is not large, However, once it occurs, it will cause a large interference to the user's use of the terminal. In addition, the new 4G/3G pseudo base station may also first attract the terminal to camp on its cell, and then deny the terminal to fall back to the GSM network through the redirect, and then attract the terminal to camp through the GSM pseudo base station cell.
示例五:终端在业务状态切换GSM小区时,搜索网络指定的目标小区并选择目标小区。Example 5: When the terminal switches the GSM cell in the service state, the terminal searches for the target cell specified by the network and selects the target cell.
例如,终端在通话状态或者数据业务状态,都可能发生GSM服务小区切换,网络发送切换目标小区信息给终端,终端搜索目标小区并选择目标小区。这种情形下,终端可能选择到伪基站小区,导致切换无法正常完成,引起掉话或数据业务中断等问题。For example, the GSM serving cell handover may occur in the call state or the data service state of the terminal, and the network sends the handover target cell information to the terminal, and the terminal searches for the target cell and selects the target cell. In this case, the terminal may select a pseudo base station cell, causing the handover to fail to complete normally, causing problems such as dropped calls or data service interruption.
在步骤202中,置信度用于表示目标小区的基站为伪基站的可信程度,伪基站识别算法由机器学习算法训练所产生。In step 202, the confidence level is used to indicate that the base station of the target cell is the trustworthiness of the pseudo base station, and the pseudo base station identification algorithm is generated by the machine learning algorithm training.
终端选择目标小区后,可从目标小区广播的信号中获取目标小区的特征数据,该信号可以是目标小区通过BCH广播的信号。换句话说,目标小区的特征数据可以从目标小区广播的信号中提取得到,该特征数据用于计算或评估目标小区是伪基站的可信程度。After the terminal selects the target cell, the feature data of the target cell may be obtained from the signal broadcast by the target cell, where the signal may be a signal that the target cell broadcasts through the BCH. In other words, the feature data of the target cell can be extracted from the signal broadcast by the target cell, and the feature data is used to calculate or evaluate the degree of trust of the target cell as a pseudo base station.
特征数据包括小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信息的至少一种,举例如下:The feature data includes at least one of cell selection and cell reselection information, networking information, service function information, area information, and time information, as follows:
该特征数据包括小区选择和小区重选信息、组网信息、业务功能信息、地域信息或者时间信息的任意一种。The feature data includes any one of cell selection and cell reselection information, networking information, service function information, area information, or time information.
或者,该特征数据包括小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信息中的任意两种,例如,特征数据包括小区选择和小区重选信息、以及组网信息。Alternatively, the feature data includes any two of cell selection and cell reselection information, networking information, service function information, area information, and time information. For example, the feature data includes cell selection and cell reselection information, and networking information. .
或者,该特征数据包括小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信息中的任意三种,例如,特征数据包括小区选择和小区重选信息、组网信息、以及业务功能信息。Alternatively, the feature data includes any three of cell selection and cell reselection information, networking information, service function information, area information, and time information. For example, the feature data includes cell selection and cell reselection information, networking information, And business function information.
或者,该特征数据包括小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信息中的任意四种,例如,特征数据包括小区选择和小区重选信息、组网信息、 业务功能信息、以及地域信息。Alternatively, the feature data includes any four of cell selection and cell reselection information, networking information, service function information, area information, and time information. For example, the feature data includes cell selection and cell reselection information, networking information, Business function information and geographic information.
或者,该特征数据包括小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信息。Alternatively, the feature data includes cell selection and cell reselection information, networking information, service function information, area information, and time information.
可以理解,小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信息中的任一种信息还可以包括多个具体的小区信息。关于这些具体的小区信息的详细描述,如下所示:It can be understood that any one of cell selection and cell reselection information, networking information, service function information, area information, and time information may further include multiple specific cell information. A detailed description of these specific cell information is as follows:
1)小区选择和重选信息,包括但不限于:PLMN-ID,RXLEV-ACCESS-MIN(最小接入电平),MS-TXPWR-MAX-CCH(终端最大发射功率),MAX-RETRANS(最大重传数),TX-INTEGER(传输时隙数);重选参数指示(parameters indication,PI),小区重选偏移(cell reselect offset,CRO),临时偏移(temporary offset,TO),惩罚时间(penalty time,PT),小区重选滞后(cell reselection hysteresis,CRH),当前的和前一个位置区码(LAC),基站识别码(base station identity code,BSIC),小区标识(cell identity,CI)。小区选择和重选相关信息可以为这些信息中的其中之一或任意组合。1) Cell selection and reselection information, including but not limited to: PLMN-ID, RXLEV-ACCESS-MIN (minimum access level), MS-TXPWR-MAX-CCH (terminal maximum transmit power), MAX-RETRANS (maximum Retransmission number), TX-INTEGER (number of transmission slots); reselection parameter indication (PI), cell reselection offset (CRO), temporary offset (TO), penalty Time (penalty time, PT), cell reselection hysteresis (CRH), current and previous location area code (LAC), base station identity code (BSIC), cell identity (cell identity, CI). The cell selection and reselection related information may be one or any combination of such information.
2)组网信息,包括但不限于:CCCH-CONF(公共控制信道配置),BS-AG-BLKS-RES(接入允许保留块数),BA-PA-MFRMS(寻呼信道复帧数),T3212(周期性更新时长),有无配邻小区(BA1/BA2)。组网相关信息可以为这些信息中的其中之一或任意组合。2) Network information, including but not limited to: CCCH-CONF (Common Control Channel Configuration), BS-AG-BLKS-RES (Access Allowed Block Number), BA-PA-MFRMS (Paging Channel Multiframe) , T3212 (periodic update duration), with or without neighboring cells (BA1/BA2). The networking related information may be one or any combination of the information.
3)业务功能信息,包括但不限于:是否支持GPRS的信息,是否支持紧急呼叫(emergency call,EC)的信息。3) Service function information, including but not limited to: whether to support GPRS information, whether to support emergency call (EC) information.
4)地域信息,包括但不限于:终端当前位置信息(如地理位置经纬度信息)。4) Geographical information, including but not limited to: current location information of the terminal (such as geographic location latitude and longitude information).
5)时间信息,包括但不限于:终端的当前时间信息(比如月、日、星期、小时、分)。5) Time information, including but not limited to: current time information of the terminal (such as month, day, week, hour, minute).
对上述的BA1和BA2说明如下:The above BA1 and BA2 are explained as follows:
BA list(BA列表),即BCCH allocation信息,在小区选择、小区重选或小区测量时使用。BA列表分为Idle列表(BA1)和Active列表(BA2)。Idle列表:该列表信息在BCCH上通过系统信息块类型2发送,用于终端空闲态时的小区选择与重选,最多设置32个频点。Active列表:该列表信息在BCCH上通过系统信息块类型5发送,其中的频点是终端在通话状态下应测量的临区小区频点,在小区切换时起作用,一共可以有32个。BA list (BA list), that is, BCCH allocation information, is used in cell selection, cell reselection, or cell measurement. The BA list is divided into an Idle list (BA1) and an Active list (BA2). Idle list: The list information is sent on the BCCH through the system information block type 2, and is used for cell selection and reselection in the idle state of the terminal, and up to 32 frequency points are set. Active list: The list information is sent on the BCCH through the system information block type 5. The frequency point is the frequency of the temporary cell that should be measured when the terminal is in the call state. When the cell is switched, there are a total of 32.
在终端上预设有伪基站识别算法,终端获取到目标小区的特征数据后,为了识别目标小区是否是伪基站小区,终端根据目标小区的特征数据运行伪基站识别算法,得到置信度,该置信度用于表示目标小区的基站为伪基站的可信程度。A pseudo base station identification algorithm is pre-configured on the terminal. After the terminal acquires the feature data of the target cell, in order to identify whether the target cell is a pseudo base station cell, the terminal runs a pseudo base station identification algorithm according to the feature data of the target cell, and obtains a confidence level. The degree is used to indicate the degree of trust of the base station of the target cell as a pseudo base station.
具体来说,终端可以将目标小区的特征数据提供给伪基站识别算法,伪基站识别算法使用该特征数据进行计算,并输出一置信度。置信度可以在0至1的范围内取值,该置信度的值越大,表示该目标小区的基站为伪基站的可能性越大,置信度的值越小,表示该目标小区的基站为真基站的可能性越大。换言之,置信度为一描述概率事件的参数。Specifically, the terminal may provide the feature data of the target cell to the pseudo base station identification algorithm, and the pseudo base station identification algorithm uses the feature data to perform calculation, and outputs a confidence. The confidence level may be in the range of 0 to 1. The greater the value of the confidence, the greater the probability that the base station of the target cell is a pseudo base station, and the smaller the value of the confidence, the base station indicating the target cell is The probability of a true base station is greater. In other words, the confidence is a parameter describing the probability event.
例如,以机器学习算法为SVM算法为例,此时伪基站识别算法为由SVM算法训练所产生,伪基站识别算法具体为一SVM模型实例。因为SVM算法为二分类算法,伪基站识别算法可将小区的基站分类为真基站和伪基站,并就上述分类的结果输出置信度。具体地,终端将目标小区的小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信 息中一种或多种信息提供给伪基站识别算法使用,例如,终端将小区选择和重选信息中的TX-INTEGER(传输时隙数)、小区重选偏移(CRO)、惩罚时间(PT),组网信息中的周期性更新时长,以及地域信息中的终端或目标小区的当前位置信息等提供给伪基站识别算法进行运算,伪基站识别算法使用这些特征数据进行计算后,得到置信度0.95,该置信度0.95表示目标小区的基站为伪基站的概率为95%。For example, the machine learning algorithm is taken as an example of the SVM algorithm. At this time, the pseudo base station identification algorithm is generated by the SVM algorithm training, and the pseudo base station identification algorithm is specifically an SVM model instance. Since the SVM algorithm is a binary classification algorithm, the pseudo base station identification algorithm can classify the base stations of the cell into a true base station and a pseudo base station, and output a confidence level as a result of the above classification. Specifically, the terminal selects cell selection and cell reselection information, networking information, service function information, area information, and time information of the target cell. One or more kinds of information are provided for use by the pseudo base station identification algorithm, for example, the terminal selects TX-INTEGER (number of transmission slots), cell reselection offset (CRO), penalty time in cell selection and reselection information ( PT), the periodic update duration in the networking information, and the current location information of the terminal or the target cell in the regional information are provided to the pseudo base station identification algorithm for calculation, and the pseudo base station identification algorithm uses the feature data to perform calculation, and obtains a confidence. The degree is 0.95, and the confidence level of 0.95 indicates that the probability that the base station of the target cell is a pseudo base station is 95%.
在本发明实施例中,伪基站识别算法可以由大量的小区的样本数据对选择的机器学习算法(程序)训练所产生,其中,该小区的样本数据包括伪基站小区的样本数据和真基站小区的样本数据。可以理解,小区的样本数据可以用于表示小区的特征。In the embodiment of the present invention, the pseudo base station identification algorithm may be generated by the sample data of a large number of cells, and the sample data of the cell includes the sample data of the pseudo base station cell and the real base station cell. Sample data. It can be understood that the sample data of the cell can be used to represent the characteristics of the cell.
由于伪基站识别算法由机器学习算法训练产生,因此伪基站识别算法具有机器学习算法的性能优点,关于机器学习算法的描述可参考上文机器学习部分的内容。机器学习算法可以是上文所述的聚类算法或分类算法,比如K-means、k-近邻,决策树、Logistic回归、SVM、或者贝叶斯算法等,也可以其它已有的机器学习算法,此处不予赘述。Since the pseudo base station identification algorithm is generated by the machine learning algorithm training, the pseudo base station identification algorithm has the performance advantages of the machine learning algorithm, and the description of the machine learning algorithm can refer to the contents of the machine learning part above. The machine learning algorithm may be a clustering algorithm or a classification algorithm as described above, such as K-means, k-nearest neighbor, decision tree, logistic regression, SVM, or Bayesian algorithm, or other existing machine learning algorithms. It will not be repeated here.
在一个示例中,步骤202可以包括:当终端检测到目标小区的LAC和当前保存的LAC不相同时,终端根据目标小区的特征数据运行伪基站识别算法,得到置信度。In an example, the step 202 may include: when the terminal detects that the LAC of the target cell is different from the currently saved LAC, the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level.
具体来说,终端对目标小区的LAC和当前保存的LAC进行比较,若目标小区的LAC和当前保存的LAC不同,则终端根据目标小区的特征数据运行伪基站识别算法,得到置信度。若目标小区的LAC和当前保存的LAC相同,表明该目标小区的基站是真基站为大概率事件,则终端不运行伪基站识别算法。当前保存的LAC即服务小区的LAC,或者,当前保存的LAC可以是终端通过联合附着/联合位置更新获得的GSM网络当前位置的LAC。服务小区可以是空闲态终端当前驻留的小区,或者终端当前有连接的小区,或者终端当前进行业务(例如,通话或者数据业务)的小区。在联合附着/联合位置更新情况下,驻留在4G/3G网络的终端可以通过4G/3G网络小区获得GSM网络当前位置的LAC。Specifically, the terminal compares the LAC of the target cell with the currently stored LAC. If the LAC of the target cell is different from the currently stored LAC, the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level. If the LAC of the target cell is the same as the currently stored LAC, indicating that the base station of the target cell is a true base station, the terminal does not run the pseudo base station identification algorithm. The currently saved LAC is the LAC of the serving cell, or the currently saved LAC may be the LAC of the current location of the GSM network obtained by the terminal through the joint attach/join location update. The serving cell may be a cell in which the idle state terminal currently camps, or a cell to which the terminal currently has a connection, or a cell in which the terminal currently performs a service (for example, a call or a data service). In the case of joint attach/join location update, the terminal camping on the 4G/3G network can obtain the LAC of the current location of the GSM network through the 4G/3G network cell.
根据伪基站的规律,若目标小区的LAC和当前保存的LAC相同,则表明该目标小区的基站为真基站是大概率事件,此时再执行伪基站识别算法将是多余的或者不经济的,从而当终端检测到目标小区的LAC和当前保存的LAC不相同时,终端根据目标小区的特征数据运行伪基站识别算法。这样,节约了终端的电能和计算性能等资源,减少了功耗,提高了终端的联网速度和识别效率。According to the rule of the pseudo base station, if the LAC of the target cell is the same as the currently stored LAC, it indicates that the base station of the target cell is a high probability event, and it is redundant or uneconomical to perform the pseudo base station identification algorithm at this time. Therefore, when the terminal detects that the LAC of the target cell is different from the currently saved LAC, the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell. In this way, resources such as power and computing performance of the terminal are saved, power consumption is reduced, and the networking speed and recognition efficiency of the terminal are improved.
可以理解,运行伪基站识别算法的时机可以有多种,本申请对此不作限定。在一个例子中,因为伪基站识别算法有一定的计算量和功耗,所以可以将运行伪基站识别算法的时机放在小区重选(或小区选择流程)完成之后,这样可以减小终端的功耗。在其它一些例子中,也可以在其它时机运行伪基站识别算法,在一些示例中,伪基站识别算法可以在选择目标小区的过程中运行,例如,可以在C2算法(或称C2准则)前运行伪基站识别算法,从而可以在C2算法中加入伪基站识别算法输出的置信度,以进行伪基站的识别,以使终端不重选到伪基站小区。It can be understood that there may be multiple timings for running the pseudo base station identification algorithm, which is not limited in this application. In an example, since the pseudo base station identification algorithm has a certain amount of calculation and power consumption, the timing of running the pseudo base station identification algorithm can be placed after the cell reselection (or cell selection process) is completed, so that the function of the terminal can be reduced. Consumption. In other examples, the pseudo base station identification algorithm may also be run at other times. In some examples, the pseudo base station identification algorithm may operate during the selection of the target cell, for example, may be run before the C2 algorithm (or C2 criterion). The pseudo base station identification algorithm can add the confidence of the output of the pseudo base station identification algorithm to the C2 algorithm to perform identification of the pseudo base station, so that the terminal does not reselect to the pseudo base station cell.
在步骤203中,终端判断步骤202得到的置信度是否大于或等于第一置信度阈值。当置信度大于或等于第一置信度阈值时,表示该目标小区的基站为伪基站为大概率事件,从而,终端可以确定目标小区的基站为伪基站。终端可以丢弃该目标小区,不会进一步驻留 该目标小区或通过其发起业务请求等,并继续进行小区选择或小区重选以选择其它的目标小区,或者结束小区重选。该目标小区为伪基站小区,终端还可以进一步执行针对伪基站小区的操作,例如在预设时长内(比如10秒)禁止再次选择小区标识为该伪基站小区标识的小区、保存该伪基站小区的特征数据以便向云端服务器上报、或者向终端的用户发出提示信息(比如,提示用户有伪基站被成功拦截)等。In step 203, the terminal determines whether the confidence obtained in step 202 is greater than or equal to the first confidence threshold. When the confidence level is greater than or equal to the first confidence threshold, the base station indicating the target cell is a large probability event, and the terminal may determine that the base station of the target cell is a pseudo base station. The terminal can discard the target cell and will not further camp The target cell initiates a service request or the like through the same, and continues cell selection or cell reselection to select other target cells, or ends cell reselection. The target cell is a pseudo base station cell, and the terminal may further perform operations on the pseudo base station cell, for example, prohibiting to select the cell with the cell identifier as the pseudo base station cell identity again, and saving the pseudo base station cell within a preset duration (for example, 10 seconds). The feature data is used to report to the cloud server or send a prompt message to the user of the terminal (for example, prompting the user that the pseudo base station is successfully intercepted).
当置信度小于第一置信度阈值时,则终端可以执行其它操作。该其它操作例如可以为根据置信度确定目标小区的基站为真基站,或者,该其它操作的其它情形还可参考下文的“1.1、再次识别疑似伪基站”和“1.2、再次识别疑似真基站”中描述的内容。When the confidence is less than the first confidence threshold, the terminal can perform other operations. The other operations may be, for example, determining that the base station of the target cell is a true base station according to the confidence level, or other situations of the other operations may also refer to "1.1, recognizing the suspected pseudo base station again" and "1.2, recognizing the suspected true base station again". The content described in .
第一置信度阈值可以为预设的置信度阈值,第一置信度阈值用于划分目标小区的基站是否为伪基站。通过第一置信度阈值的合理设置,可以实现伪基站识别算法满足设计者的性能指标要求,该性能指标包括伪基站识别率或伪基站误警率等,其中,伪基站误警率表示将真基站小区错误识别为伪基站小区的概率。第一置信度阈值可以根据伪基站识别算法的测试结果、伪基站识别算法的性能指标(例如,伪基站识别率、伪基站误警率)要求等的至少一个进行设置。例如,在机器学习算法训练产生伪基站识别算法后,可以进行算法的性能测试,首先设置第一置信度阈值(比如0.95),然后获得算法对伪基站小区测试样本集的伪基站识别率(比如0.90),以及算法对真基站测试样本集的伪基站误警率(比如0.001),通过调整第一置信度阈值,可以得到不同的算法性能指标。当算法性能指标达到设计者要求时,就可以进行算法的移植,将伪基站识别算法移植到各个终端。可以理解,算法移植时可以根据终端进行算法代码的转换。The first confidence threshold may be a preset confidence threshold, and the first confidence threshold is used to divide whether the base station of the target cell is a pseudo base station. Through the reasonable setting of the first confidence threshold, the pseudo base station identification algorithm can meet the performance requirement requirements of the designer, and the performance indicator includes a pseudo base station identification rate or a pseudo base station false alarm rate, wherein the pseudo base station false alarm rate indicates that the true The probability that the base station cell is erroneously identified as a pseudo base station cell. The first confidence threshold may be set according to at least one of a test result of the pseudo base station identification algorithm, a performance indicator of the pseudo base station identification algorithm (eg, a pseudo base station identification rate, a pseudo base station false alarm rate), and the like. For example, after the machine learning algorithm training generates the pseudo base station identification algorithm, the performance test of the algorithm may be performed. First, the first confidence threshold (such as 0.95) is set, and then the pseudo base station identification rate of the pseudo base station cell test sample set is obtained (for example, 0.90), and the pseudo base station false alarm rate (such as 0.001) of the algorithm for the true base station test sample set, by adjusting the first confidence threshold, different algorithm performance indicators can be obtained. When the performance index of the algorithm meets the requirements of the designer, the algorithm can be transplanted, and the pseudo base station identification algorithm is transplanted to each terminal. It can be understood that the algorithm can be converted according to the terminal when the algorithm is transplanted.
可选地,本方法还可以包括步骤204:终端在预设时长内禁止再次选择目标小区。Optionally, the method may further include the step 204: the terminal prohibits selecting the target cell again within the preset duration.
在终端确定目标小区的基站为伪基站之后,终端可以在预设时长内禁止再次选择该目标小区。其中,预设时长可以是固定的时间长度,例如可以为10秒钟、1分钟、2分钟等,也可以是动态调整的时间长度,例如根据实际情况从10秒钟调整到2分钟等。可以理解,预设时长可以根据实际情况确定,本申请对此不作限制。终端可通过小区标识识别目标小区,比如cell id,LAC+cell id,移动网络号码(Mobile Network Code,MNC)+LAC+cell id,或者移动国家码(Mobile Country Code,MCC)+MNC+LAC+cell id。终端可能遇到被冒充的真基站小区,所以预设时长要合理,使得在该预设时长内终端遇到被冒充真基站小区的概率很低。After the terminal determines that the base station of the target cell is a pseudo base station, the terminal may prohibit the target cell from being selected again within a preset duration. The preset duration may be a fixed length of time, for example, 10 seconds, 1 minute, 2 minutes, etc., or may be a dynamically adjusted time length, for example, from 10 seconds to 2 minutes according to actual conditions. It can be understood that the preset duration can be determined according to actual conditions, and the application does not limit this. The terminal can identify the target cell by using the cell identifier, such as cell id, LAC+cell id, Mobile Network Code (MNC)+LAC+cell id, or Mobile Country Code (MCC)+MNC+LAC+ Cell id. The terminal may encounter the true base station cell that is impersonated, so the preset duration should be reasonable, so that the probability that the terminal encounters the impersonated real base station cell in the preset duration is very low.
终端在预设时长内禁止再次选择该目标小区,可以防止终端再次重选识别出伪基站的目标小区,同时避免被冒充的真基站小区被禁止重选。这是因为,有的伪基站会监听周边真基站的信号,读取一个信号较弱的真基站的系统广播参数,并在修改部分参数(比如小区重选参数)后发射出去。通常,伪基站对真基站的小区标识不做修改,从而冒充该真基站。并且,伪基站经常被转移,例如,伪基站安置在车辆上,从而可以不断变换伪基站的位置,将伪基站的信号覆盖一个区域一段时间后,例如10分钟,再将伪基站转移到其它的地方。在这样的场景下,若终端在识别出目标小区的基站为伪基站后,一直禁止再次选择该目标小区,则在该目标小区的伪基站转移之后,终端获取到被该伪基站冒充的真基站信号,此时,终端将可能把该真基站误判为伪基站。 The terminal prohibits the selection of the target cell again within the preset duration, and may prevent the terminal from reselecting the target cell that identifies the pseudo base station again, while preventing the true base station cell that is impersonated from being reselected. This is because some pseudo base stations will listen to the signals of the surrounding real base stations, read the system broadcast parameters of a weak base station, and transmit them after modifying some parameters (such as cell reselection parameters). Generally, the pseudo base station does not modify the cell identity of the real base station, thereby posing as the true base station. Moreover, the pseudo base station is often transferred. For example, the pseudo base station is placed on the vehicle, so that the position of the pseudo base station can be continuously changed, and the signal of the pseudo base station is covered in one area for a period of time, for example, 10 minutes, and then the pseudo base station is transferred to other units. local. In such a scenario, if the terminal is configured to prevent the target cell from being selected again after the base station of the target cell is identified as the pseudo base station, the terminal acquires the true base station impersonated by the pseudo base station after the pseudo base station of the target cell is transferred. Signal, at this time, the terminal will likely misjudge the real base station as a pseudo base station.
可选地,步骤204的具体实现还可以结合终端所处的位置信息。具体来说,当终端确定目标小区的基站为伪基站时,终端记录终端所在的第一位置信息,在预设时长内,终端获取终端所在的第二位置信息,当第二位置信息和第一位置信息之间的距离小于预设距离,且终端再次获取到小区标识为该目标小区的小区标识的小区信号时,终端禁止再次选择该小区。这是考虑到终端在该预设时长内可能移动,若终端脱离目标小区的覆盖区域,进入被目标小区的伪基站冒充的真基站的服务区域,则终端可以停止禁止重选目标小区。其中,该预设距离例如可以为300米等,本申请对此不作限制。Optionally, the specific implementation of step 204 may also be combined with location information of the terminal. Specifically, when the terminal determines that the base station of the target cell is a pseudo base station, the terminal records the first location information where the terminal is located, and within the preset duration, the terminal acquires the second location information where the terminal is located, when the second location information and the first location information When the distance between the location information is less than the preset distance, and the terminal acquires the cell signal that the cell identifier is the cell identifier of the target cell, the terminal prohibits the cell from being selected again. This is because the terminal may move within the preset time period. If the terminal leaves the coverage area of the target cell and enters the service area of the true base station impersonated by the pseudo base station of the target cell, the terminal may stop prohibiting the reselection of the target cell. The preset distance may be, for example, 300 meters, etc., which is not limited in this application.
可选地,在步骤202之后,本发明实施例的方法还包括:当置信度小于或等于第四置信度阈值时,终端通过目标小区执行预设操作,其中,该预设操作包括网络注册、位置区域更新、小区驻留和发起业务请求中的任意一项。此时,目标小区的基站为真基站,终端可以通过该目标小区连接移动网络。所述预设操作可以为终端正常连接移动网络时需执行的操作。Optionally, after the step 202, the method of the embodiment of the present invention further includes: when the confidence is less than or equal to the fourth confidence threshold, the terminal performs a preset operation by using the target cell, where the preset operation includes network registration, Any of the location area update, cell camping, and originating service request. At this time, the base station of the target cell is a true base station, and the terminal can connect to the mobile network through the target cell. The preset operation may be an operation that needs to be performed when the terminal normally connects to the mobile network.
第四置信度阈值可以为预设的置信度阈值,第四置信度阈值用于划分目标小区的基站是否为真基站。通过第四置信度阈值的合理设置,可以使得伪基站识别算法满足设计者的性能指标要求,该性能指标例如包括真基站识别率。其中,第四置信度阈值可以根据伪基站识别算法的测试结果、伪基站识别算法的性能指标(例如真基站识别率)要求等进行设置。在机器学习算法训练产生伪基站识别算法后,可以进行算法的性能测试,首先设置第四置信度阈值(比如0.1),然后获得算法对真基站小区测试样本集的真基站识别率(比如0.999),通过调整第四置信度阈值,可以得到不同的算法性能指标。当算法性能指标达到设计者要求时,可以将该伪基站识别算法移植到各个终端上。The fourth confidence threshold may be a preset confidence threshold, and the fourth confidence threshold is used to divide whether the base station of the target cell is a true base station. Through a reasonable setting of the fourth confidence threshold, the pseudo base station identification algorithm can satisfy the designer's performance index requirement, and the performance indicator includes, for example, a true base station identification rate. The fourth confidence threshold may be set according to the test result of the pseudo base station identification algorithm, the performance indicator of the pseudo base station identification algorithm (for example, the true base station identification rate), and the like. After the machine learning algorithm training generates the pseudo base station identification algorithm, the performance test of the algorithm can be performed. First, the fourth confidence threshold (such as 0.1) is set, and then the true base station recognition rate of the real base station cell test sample set is obtained (for example, 0.999). By adjusting the fourth confidence threshold, different algorithm performance indicators can be obtained. When the performance index of the algorithm meets the requirements of the designer, the pseudo base station identification algorithm can be transplanted to each terminal.
可以理解,如图3所示,第四置信度阈值比第一置信度阈值小。例如,可以将第四置信度阈值设置为0.1,而第一置信度阈值为0.9。It can be understood that, as shown in FIG. 3, the fourth confidence threshold is smaller than the first confidence threshold. For example, the fourth confidence threshold can be set to 0.1 and the first confidence threshold is 0.9.
可以理解,通过合理地设置第一置信度阈值或第四置信度阈值,可以确定置信度大于或等于第一置信度阈值的小区的基站为伪基站,置信度小于或等于第四置信度阈值的小区的基站为真基站。但是,若目标小区的置信度位于第一置信度和第四置信度之间,则该小区的基站的真伪需要通过其它方式进一步识别。该识别过程也是对疑似基站的再次识别过程,其中,疑似基站指通过伪基站识别算法不能准确识别出真伪的基站,具体来说,当目标小区的置信度位于第一置信度阈值和第四置信度阈值之间时,目标小区的基站为疑似基站。对疑似基站的再次识别过程,详情如下文所述。It can be understood that, by reasonably setting the first confidence threshold or the fourth confidence threshold, it can be determined that the base station of the cell whose confidence is greater than or equal to the first confidence threshold is a pseudo base station, and the confidence is less than or equal to the fourth confidence threshold. The base station of the cell is a true base station. However, if the confidence of the target cell is between the first confidence level and the fourth confidence level, the authenticity of the base station of the cell needs to be further identified by other means. The identification process is also a re-identification process for the suspected base station, wherein the suspected base station refers to a base station that cannot accurately identify the authenticity through the pseudo base station identification algorithm, specifically, when the confidence of the target cell is at the first confidence threshold and the fourth When the confidence threshold is between, the base station of the target cell is a suspect base station. The re-identification process for the suspected base station is described below.
1.1、再次识别疑似伪基站。1.1. Identify the suspected pseudo base station again.
在一些示例中,涉及疑似伪基站的再次识别。在步骤202之后,本发明实施例的方法还包括:当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且终端检测到目标小区满足第一预设条件时,终端确定目标小区的基站为伪基站。可选地,当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值时,终端通过目标小区执行预设操作;并且,当终端检测到目标小区满足第一预设条件时,终端确定目标小区的基站为伪基站。其中,所述预设操作包括网络注册、位置区域更新、小区驻留和发起业务请求中的任意一项。 In some examples, re-identification of a suspected pseudo base station is involved. After the step 202, the method of the embodiment of the present invention further includes: when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, the terminal The base station of the target cell is determined to be a pseudo base station. Optionally, when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, the terminal performs a preset operation by using the target cell; and when the terminal detects that the target cell meets the first preset condition, The terminal determines that the base station of the target cell is a pseudo base station. The preset operation includes any one of network registration, location area update, cell camping, and originating service request.
相对于目标小区的置信度大于或等于第一置信度阈值时的场景,当目标小区的置信度小于第一置信度阈值时,目标小区为伪基站小区的可能性减小,若直接将目标小区的基站识别为伪基站,则伪基站误警率会增大,影响用户对终端的使用。另一方面,若置信度小于第二置信度阈值,则目标小区的基站为伪基站的可能性更小,此时,该目标小区的基站可以不用参与疑似伪基站的再次识别过程。When the confidence level of the target cell is greater than or equal to the first confidence threshold, when the confidence of the target cell is less than the first confidence threshold, the probability that the target cell is a pseudo base station cell is reduced, and if the target cell is directly The base station is identified as a pseudo base station, and the false alarm rate of the pseudo base station is increased, which affects the user's use of the terminal. On the other hand, if the confidence is less than the second confidence threshold, the base station of the target cell is less likely to be a pseudo base station. At this time, the base station of the target cell may not participate in the re-identification process of the suspected pseudo base station.
其中,第二置信度阈值为预设的置信度阈值,如图3所示,第二置信度阈值比第一置信度阈值小,例如,在置信度处于0至1的范围时,第二置信度阈值为0.4,第一置信度阈值为0.9。第二置信度阈值的设置规则为,在伪基站识别算法的测试中,伪基站小区测试样本的置信度落入第二置信度阈值与第一置信度阈值之间的区间的概率满足设计者的要求(比如0.70)。The second confidence threshold is a preset confidence threshold. As shown in FIG. 3, the second confidence threshold is smaller than the first confidence threshold. For example, when the confidence is in the range of 0 to 1, the second confidence is The degree threshold is 0.4 and the first confidence threshold is 0.9. The setting rule of the second confidence threshold is that, in the test of the pseudo base station identification algorithm, the probability that the confidence level of the pseudo base station cell test sample falls within the interval between the second confidence threshold and the first confidence threshold satisfies the designer's Requirements (such as 0.70).
这样,终端判断目标小区的置信度是否小于第一置信度阈值且大于或等于第二置信度阈值,即判断目标小区的置信度是否位于第一置信度阈值和第二置信度阈值之间的区间。若置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,表示目标小区的基站为疑似伪基站,例如第二置信度阈值为0.4,第一置信度阈值为0.9,而目标小区的置信度为0.7,则目标小区的基站为疑似伪基站。为此,终端还需对目标小区进行进一步检测,即终端检测目标小区是否满足第一预设条件,若目标小区满足第一预设条件,则终端可以确定目标小区的基站为伪基站。In this way, the terminal determines whether the confidence of the target cell is less than the first confidence threshold and is greater than or equal to the second confidence threshold, that is, whether the confidence of the target cell is located between the first confidence threshold and the second confidence threshold. . If the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, indicating that the base station of the target cell is a suspected pseudo base station, for example, the second confidence threshold is 0.4, and the first confidence threshold is 0.9, and the target is The confidence level of the cell is 0.7, and the base station of the target cell is a suspected pseudo base station. Therefore, the terminal further needs to detect the target cell, that is, the terminal detects whether the target cell meets the first preset condition. If the target cell meets the first preset condition, the terminal may determine that the base station of the target cell is a pseudo base station.
该第一预设条件可以是伪基站小区可能产生的行为信息,第一预设条件可以包括至少一个以下条件:终端拦截到目标小区发送的问题短信;终端向目标小区发起位置区域更新请求时被拒绝;终端向目标小区发起业务请求时被拒绝;终端在预设时间内丢失目标小区信号;或者,目标小区的LAC发生改变。The first preset condition may be behavior information that may be generated by the pseudo base station cell, and the first preset condition may include at least one condition that the terminal intercepts the problem message sent by the target cell; when the terminal initiates the location area update request to the target cell, Rejected; the terminal is rejected when initiating a service request to the target cell; the terminal loses the target cell signal within a preset time; or the LAC of the target cell changes.
在一个示例中,当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值时,终端通过应用层(该应用层可以位于应用处理器)拦截到该目标小区发送的问题短信,则确定该目标小区的基站为伪基站,并从该目标小区脱离;或者,在一定时间内终端被该目标小区踢出时,终端确定该目标小区的基站为伪基站。In an example, when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, the terminal intercepts the problem message sent by the target cell through the application layer (the application layer may be located in the application processor). Then, the base station of the target cell is determined to be a pseudo base station, and is detached from the target cell; or, when the terminal is kicked out by the target cell within a certain time, the terminal determines that the base station of the target cell is a pseudo base station.
在另一个示例中,在重定向场景或切换场景中,当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值时,若终端发起业务请求时被该小区拒绝,则终端确定该目标小区的基站为伪基站,并从该目标小区脱离。In another example, in the redirection scenario or the handover scenario, when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, if the terminal rejects the cell when the service request is initiated, the terminal The base station of the target cell is determined to be a pseudo base station and detached from the target cell.
在另一个示例中,当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值时,若终端在预设时间内检测不到目标小区的信号,即丢失了目标小区信号,则终端确定该目标小区的基站为伪基站。该预设时间可以根据实际情况确定,例如可以为5秒、7秒等,本申请对此不作限制。In another example, when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, if the terminal does not detect the signal of the target cell within the preset time, the target cell signal is lost. Then, the terminal determines that the base station of the target cell is a pseudo base station. The preset time may be determined according to actual conditions, for example, may be 5 seconds, 7 seconds, etc., which is not limited in this application.
在另一个示例中,当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值0.4时,终端检测到目标小区的LAC发生了变化,则终端也可以确定该目标小区的基站为伪基站。In another example, when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold of 0.4, the terminal detects that the LAC of the target cell has changed, and the terminal may also determine the base station of the target cell. It is a pseudo base station.
在其它一些示例中,第一预设条件也可以为上述条件的任意两种或任意三种或任意四种或全部五种的组合。 In some other examples, the first preset condition may also be any two or any three of the above conditions or a combination of any four or all five.
这些条件都是伪基站小区可能导致的行为。若目标小区满足的第一预设条件的具体条件越多,则目标小区的基站为伪基站的概率越大。在具体应用中,第一预设条件可以根据实际情况设置。These conditions are all possible behaviors of the pseudo base station cell. If the specific condition of the first preset condition that the target cell satisfies, the probability that the base station of the target cell is a pseudo base station is larger. In a specific application, the first preset condition may be set according to actual conditions.
可选地,当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且终端检测到目标小区满足第一预设条件时,终端确定目标小区的基站为伪基站的步骤,包括:终端保存目标小区的特征数据,目标小区的特征数据被标识为伪基站数据。Optionally, when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, the terminal determines that the base station of the target cell is a pseudo base station. The method includes: the terminal saves feature data of the target cell, and the feature data of the target cell is identified as pseudo base station data.
其中,目标小区的特征数据被标识为伪基站数据可以通过以下方式实现:为目标小区的特征数据配置伪基站标识信息,例如,建立目标小区的特征数据和伪基站标识信息的对应关系,或者将目标小区的特征数据保存在预设存储区域等,例如,在终端的存储器上设置一个数据库,用于存储目标小区的特征数据,该数据库存储的特征数据属于伪基站数据。The mapping of the feature data of the target cell to the pseudo base station data may be implemented by configuring the pseudo base station identity information for the feature data of the target cell, for example, establishing a correspondence between the feature data of the target cell and the pseudo base station identity information, or The feature data of the target cell is stored in a preset storage area or the like. For example, a database is set on the memory of the terminal for storing feature data of the target cell, and the feature data stored in the database belongs to the pseudo base station data.
目标小区的置信度小于第一置信度阈值且该置信度大于或等于第二置信度阈值,表示伪基站识别算法对该目标小区的特征数据识别效果不理想,为此,终端保存被标识为伪基站数据的目标小区的特征数据。这样,接下来可以根据保存的该目标小区的特征数据进一步训练伪基站识别算法,从而提高伪基站识别算法对伪基站的识别率。例如,在终端连接WiFi(Wireless-Fidelity,无线保真)网络时,终端通过WiFi网络向云端服务器发送被标识为伪基站数据的目标小区的特征数据,云端服务器将该目标小区的特征数据作为伪基站小区的样本数据进一步训练云端服务器上预存的伪基站识别算法,以更新该伪基站识别算法。其中,云端服务器上预存的伪基站算法可以是步骤202中描述的伪基站识别算法。这样,该更新后的伪基站识别算法对伪基站的识别率更高。可选地,云端服务器还可以向终端发送该更新后的伪基站识别算法,从而终端可以使用该更新后的伪基站识别算法识别伪基站。根据该目标小区的特征数据训练伪基站识别算法可以在云端服务器上进行。The confidence of the target cell is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, indicating that the pseudo base station identification algorithm is not ideal for identifying the feature data of the target cell. To this end, the terminal save is identified as a pseudo. Characteristic data of the target cell of the base station data. In this way, the pseudo base station identification algorithm can be further trained according to the saved feature data of the target cell, thereby improving the recognition rate of the pseudo base station by the pseudo base station identification algorithm. For example, when the terminal is connected to a WiFi (Wireless-Fidelity) network, the terminal transmits the feature data of the target cell identified as the pseudo base station data to the cloud server through the WiFi network, and the cloud server uses the feature data of the target cell as a pseudo. The sample data of the base station cell further trains a pseudo base station identification algorithm pre-stored on the cloud server to update the pseudo base station identification algorithm. The pseudo base station algorithm pre-stored on the cloud server may be the pseudo base station identification algorithm described in step 202. Thus, the updated pseudo base station identification algorithm has a higher recognition rate for the pseudo base station. Optionally, the cloud server may further send the updated pseudo base station identification algorithm to the terminal, so that the terminal may use the updated pseudo base station identification algorithm to identify the pseudo base station. Training the pseudo base station identification algorithm according to the feature data of the target cell can be performed on the cloud server.
在本发明实施例中,终端保存目标小区的特征数据可以在满足以下任意一项条件时进行:伪基站数据保存功能开启;或者,目标小区满足伪基站数据保存规则。在一个示例中,当伪基站数据保存功能开启时,终端保存目标小区的特征数据。换言之,终端判断伪基站数据保存功能是否开启,若开启,则终端可以保存该目标小区的特征数据;否则,终端可以不保存该目标小区的特征数据。In the embodiment of the present invention, the feature data of the terminal to save the target cell may be performed when any of the following conditions are met: the pseudo base station data saving function is enabled; or the target cell satisfies the pseudo base station data storage rule. In one example, when the pseudo base station data saving function is turned on, the terminal saves the feature data of the target cell. In other words, the terminal determines whether the pseudo base station data saving function is enabled. If enabled, the terminal may save the feature data of the target cell; otherwise, the terminal may not save the feature data of the target cell.
终端可以控制伪基站数据保存功能的启闭。伪基站数据保存功能的启闭,可以为用户在终端上进行设置,也可以为云端服务器向终端发送指令进行设置,还可以为终端根据预设规则自动控制。例如,用户可以设置终端保存或者不保存目标小区的特征数据;或者,云端服务器通过远程指令控制终端保存或者不保存目标小区的特征数据;或者,将终端的存储空间小于一预设存储阈值作为预设规则,当终端的存储空间小于一预设存储阈值时,终端自动关闭伪基站数据保存功能。其中,预设存储阈值可以根据实际情况确定,本申请对此不作限制。由此,可以方便地控制终端对这些特征数据的保存,增加了特征数据保存的灵活性。The terminal can control the opening and closing of the pseudo base station data saving function. The opening and closing of the pseudo base station data saving function may be set for the user on the terminal, or may be set by the cloud server to send instructions to the terminal, or may be automatically controlled by the terminal according to a preset rule. For example, the user may set the terminal to save or not save the feature data of the target cell; or the cloud server may or may not save the feature data of the target cell by using the remote command; or, the storage space of the terminal is less than a preset storage threshold. The rule is that when the storage space of the terminal is less than a preset storage threshold, the terminal automatically turns off the pseudo base station data saving function. The preset storage threshold may be determined according to actual conditions, which is not limited in this application. Thereby, the terminal can conveniently control the storage of the feature data, and the flexibility of saving the feature data is increased.
在另一个示例中,当目标小区满足伪基站数据保存规则时,终端保存目标小区的特征数据。这样,可以起到筛选特征数据的作用,使得保存的目标小区的特征数据更利于进行伪基站识别算法的进一步训练。 In another example, when the target cell satisfies the pseudo base station data saving rule, the terminal saves the feature data of the target cell. In this way, the function of screening the feature data can be played, so that the feature data of the saved target cell is more advantageous for further training of the pseudo base station identification algorithm.
其中,该伪基站数据保存规则可以是对伪基站小区的特征数据进行筛选的规则。该伪基站数据保存规则可以是用户在终端上设定的规则,也可以是云端服务器发送给终端的规则。伪基站数据保存规则例如可以为目标小区的特征数据的采集时间、目标小区所处的位置区域、和目标小区的某些特征数据等等。The pseudo base station data storage rule may be a rule for screening feature data of the pseudo base station cell. The pseudo base station data storage rule may be a rule set by the user on the terminal, or may be a rule sent by the cloud server to the terminal. The pseudo base station data retention rule may be, for example, an acquisition time of feature data of the target cell, a location area where the target cell is located, and certain feature data of the target cell, and the like.
该示例的具体实现方式例如可以为:终端从目标小区的特征数据及其它数据中获取适用于当前伪基站数据保存规则的目标数据,然后,终端判断该目标数据是否符合该伪基站数据保存规则,若符合,则保存该目标小区的特征数据。The specific implementation of the example may be: the terminal acquires target data applicable to the current pseudo base station data retention rule from the feature data of the target cell and other data, and then the terminal determines whether the target data conforms to the pseudo base station data retention rule. If it matches, the feature data of the target cell is saved.
作为一个例子,云端服务器向终端发送指令,向终端指示伪基站数据保存规则为保存位于中国深圳地区的伪基站小区的特征数据,深圳地区的位置可通过经纬度或者网络标识如MNC+LAC等描述。当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且终端检测到目标小区满足第一预设条件时,终端确定目标小区所处的位置区域,当目标小区所处的位置信息为中国深圳地区时,目标小区符合该伪基站数据保存规则,终端保存目标小区的特征数据,该特征数据被标识为伪基站数据。As an example, the cloud server sends an instruction to the terminal to indicate to the terminal that the pseudo base station data storage rule is to save the feature data of the pseudo base station cell located in the Shenzhen area of China. The location of the Shenzhen area may be described by a latitude and longitude or a network identifier such as MNC+LAC. When the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, the terminal determines the location area where the target cell is located, when the target cell is located When the location information is in the Shenzhen area of China, the target cell conforms to the pseudo base station data storage rule, and the terminal saves the feature data of the target cell, and the feature data is identified as pseudo base station data.
作为另一个例子,伪基站数据保存规则为目标小区的特征数据的采集时间为周末,当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且终端检测到目标小区满足第一预设条件时,终端从目标小区的相关信息中确定目标小区的特征数据的采集时间,当该采集时间为周末时,目标小区符合该伪基站数据保存规则,终端保存目标小区的特征数据,该特征数据被标识为伪基站数据。As another example, the pseudo base station data retention rule is that the collection time of the feature data of the target cell is a weekend, when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell is satisfied. When the first preset condition is met, the terminal determines the collection time of the feature data of the target cell from the related information of the target cell. When the collection time is a weekend, the target cell meets the data storage rule of the pseudo base station, and the terminal saves the feature data of the target cell. The feature data is identified as pseudo base station data.
作为另一个例子,伪基站数据保存规则为保存小区选择和小区重选信息、以及组网信息。当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且终端检测到目标小区满足第一预设条件时,终端确定目标小区的特征数据的类型,当目标小区的特征数据为小区选择和小区重选信息、组网信息时,目标小区符合该伪基站数据保存规则,终端保存目标小区的特征数据,该特征数据被标识为伪基站数据。As another example, the pseudo base station data saving rule is to save cell selection and cell reselection information, and networking information. When the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, the terminal determines the type of the feature data of the target cell, when the characteristics of the target cell When the data is cell selection, cell reselection information, and networking information, the target cell conforms to the pseudo base station data storage rule, and the terminal stores feature data of the target cell, and the feature data is identified as pseudo base station data.
在另一些示例中,当伪基站数据保存功能开启,且目标小区满足伪基站数据保存规则时,终端保存目标小区的特征数据。也就是说,当前述的两个示例描述的条件都满足时,终端保存目标小区的特征数据。In other examples, when the pseudo base station data saving function is enabled and the target cell satisfies the pseudo base station data saving rule, the terminal saves the feature data of the target cell. That is, when the conditions described in the two examples above are satisfied, the terminal saves the feature data of the target cell.
上文描述了再次识别疑似伪基站的方法,下文对再次识别疑似真基站进行说明方法。The method of recognizing the suspected pseudo base station again is described above, and the following describes the method of recognizing the suspected true base station again.
1.2、再次识别疑似真基站。1.2. Identify the suspected true base station again.
在一些示例中,涉及疑似真基站的再次识别。在步骤202之后,本发明实施例的方法还包括:当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值,且终端检测到目标小区满足第二预设条件时,终端可确定目标小区的基站为真基站。可选地,当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值时,终端通过目标小区执行预设操作;并且,当终端检测到目标小区满足第二预设条件时,终端确定目标小区的基站为真基站。其中,所述预设操作包括网络注册、位置区域更新、小区驻留和发起业务请求中的任意一项。In some examples, re-identification of suspected true base stations is involved. After the step 202, the method of the embodiment of the present invention further includes: when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset condition, the terminal It can be determined that the base station of the target cell is a true base station. Optionally, when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, the terminal performs a preset operation by using the target cell; and when the terminal detects that the target cell meets the second preset condition, The terminal determines that the base station of the target cell is a true base station. The preset operation includes any one of network registration, location area update, cell camping, and originating service request.
相对于目标小区的置信度小于或等于第四置信度阈值时的场景,当目标小区的置信度大于第四置信度阈值时,目标小区为真基站小区的可能性减小,若直接将目标小区的基站 识别为真基站,则对基站的真伪容易产生误识别,影响用户对终端的使用。另一方面,若置信度大于第三置信度阈值,则目标小区的基站为真基站的可能性更小,此时,该目标小区的基站可以不用参与疑似真基站的再次识别过程。When the confidence level of the target cell is less than or equal to the fourth confidence threshold, when the confidence of the target cell is greater than the fourth confidence threshold, the probability that the target cell is a true base station cell is reduced, and if the target cell is directly Base station When it is identified as a true base station, the authenticity of the base station is easily misidentified, which affects the user's use of the terminal. On the other hand, if the confidence level is greater than the third confidence threshold, the base station of the target cell is less likely to be a true base station. At this time, the base station of the target cell may not participate in the re-identification process of the suspected true base station.
其中,第三置信度阈值为预设的置信度阈值,如图3所示,第三置信度阈值比第四置信度阈值大,例如,在置信度处于0至1的范围时,第三置信度阈值为0.6,第四置信度阈值为0.4。第三置信度阈值的设置规则为:在伪基站识别算法的测试中,真基站小区测试样本的置信度落入第四置信度阈值与第三置信度阈值区间的概率满足设计者的要求(比如0.20)。The third confidence threshold is a preset confidence threshold. As shown in FIG. 3, the third confidence threshold is greater than the fourth confidence threshold. For example, when the confidence is in the range of 0 to 1, the third confidence. The degree threshold is 0.6 and the fourth confidence threshold is 0.4. The setting rule of the third confidence threshold is: in the test of the pseudo base station identification algorithm, the probability that the confidence of the true base station cell test sample falls within the fourth confidence threshold and the third confidence threshold interval satisfies the designer's requirements (for example 0.20).
这样,终端判断目标小区的置信度是否大于第四置信度阈值且小于或等于第三置信度阈值,即判断目标小区的置信度是否位于第四置信度阈值和第三置信度阈值之间。若置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值,表示目标小区的基站为疑似真基站。为此,终端还需对目标小区进行进一步检测,即终端检测目标小区是否满足第二预设条件,若目标小区满足第二预设条件,则终端可以确定目标小区的基站为真基站。In this way, the terminal determines whether the confidence of the target cell is greater than the fourth confidence threshold and is less than or equal to the third confidence threshold, that is, whether the confidence of the target cell is between the fourth confidence threshold and the third confidence threshold. If the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, the base station indicating the target cell is a suspected true base station. Therefore, the terminal needs to further detect the target cell, that is, the terminal detects whether the target cell meets the second preset condition. If the target cell meets the second preset condition, the terminal may determine that the base station of the target cell is a true base station.
该第二预设条件可以为真基站小区可能产生的行为信息,第二预设条件可以包括至少一个以下条件:终端在目标小区建立通话或者数据业务;终端通过目标小区完成认证并进入加密安全模式;或者,终端在目标小区完成切换。The second preset condition may be behavior information that may be generated by the real base station cell, and the second preset condition may include at least one of the following conditions: the terminal establishes a call or data service in the target cell; the terminal completes the authentication through the target cell and enters the encryption security mode. Or, the terminal completes the handover in the target cell.
在一个示例中,当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值时,若终端在目标小区建立通话或者数据业务,则终端确定目标小区的基站为真基站。In an example, when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, if the terminal establishes a call or data service in the target cell, the terminal determines that the base station of the target cell is a true base station.
在另一个示例中,当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值时,若终端通过目标小区完成认证并进入加密安全模式,则终端确定目标小区的基站为真基站。In another example, when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, if the terminal completes the authentication through the target cell and enters the encryption security mode, the terminal determines that the base station of the target cell is true. Base station.
在另一个示例中,当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值时,若终端在目标小区完成切换,则终端确定目标小区的基站为真基站。在其它一些示例中,第二预设条件也可以为上述条件的任意两种或全部三种的组合。In another example, when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, if the terminal completes the handover in the target cell, the terminal determines that the base station of the target cell is a true base station. In other examples, the second preset condition may also be a combination of any two or all three of the above conditions.
这些条件都是真基站小区可能导致的行为。若目标小区满足的第二预设条件的具体条件越多,则目标小区的基站为真基站的概率越大。在具体应用中,第二预设条件可以根据实际情况设置。These conditions are all possible behaviors of a true base station cell. If the specific condition of the second preset condition that the target cell satisfies, the probability that the base station of the target cell is a true base station is larger. In a specific application, the second preset condition may be set according to actual conditions.
可选地,当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值,且终端检测到目标小区满足第二预设条件时,终端确定目标小区的基站为真基站的步骤,包括:终端保存目标小区的特征数据,目标小区的特征数据被标识为真基站数据。Optionally, when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset condition, the terminal determines that the base station of the target cell is a true base station. The method includes: the terminal saves feature data of the target cell, and the feature data of the target cell is identified as true base station data.
其中,目标小区的特征数据被标识为真基站数据可以通过以下方式实现:为目标小区的特征数据配置真基站标识信息,或者将目标小区的特征数据保存在预设存储区域等。The feature data of the target cell is identified as true base station data, which may be implemented by configuring true base station identification information for the feature data of the target cell, or saving the feature data of the target cell in a preset storage area.
目标小区的置信度大于第四置信度阈值且该置信度小于或等于第三置信度阈值,表示伪基站识别算法对目标小区的特征数据的识别效果不理想,为此,终端保存被标识为真基站数据的目标小区的特征数据。这样,接下来可以根据保存的该目标小区的特征数据进一步训练伪基站识别算法,提高伪基站识别算法对真基站的识别率。相应地,伪基站识别算法对真基站的识别率提高了,伪基站误警率也会减小。根据该目标小区的特征数据训练伪 基站识别算法可以在云端服务器上进行。The confidence of the target cell is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, indicating that the pseudo base station identification algorithm does not have an ideal recognition effect on the feature data of the target cell. To this end, the terminal save is identified as true. Characteristic data of the target cell of the base station data. In this way, the pseudo base station identification algorithm can be further trained according to the saved feature data of the target cell, and the recognition rate of the pseudo base station identification algorithm to the true base station is improved. Correspondingly, the recognition rate of the real base station by the pseudo base station identification algorithm is improved, and the false alarm rate of the pseudo base station is also reduced. Training pseudo based on the feature data of the target cell The base station identification algorithm can be performed on the cloud server.
在本发明实施例中,终端保存目标小区的特征数据可以在满足以下任意一项条件时进行:真基站数据保存功能开启;或者,目标小区满足真基站数据保存规则。In the embodiment of the present invention, the feature data of the terminal to save the target cell may be performed when any of the following conditions are met: the true base station data saving function is enabled; or the target cell satisfies the true base station data storage rule.
在一个示例中,当真基站数据保存功能开启时,终端保存目标小区的特征数据。该示例的具体实现可参考上文对再次识别疑似伪基站的描述,此处不予赘述。In one example, when the true base station data saving function is turned on, the terminal saves the feature data of the target cell. For a specific implementation of the example, reference may be made to the above description for identifying the suspected pseudo base station again, and details are not described herein.
在另一个示例中,当目标小区满足真基站数据保存规则时,终端保存目标小区的特征数据。这样,可以起到筛选特征数据的作用,使得保存的目标小区的特征数据更利于进行伪基站识别算法的进一步训练。In another example, when the target cell satisfies the true base station data retention rule, the terminal saves the feature data of the target cell. In this way, the function of screening the feature data can be played, so that the feature data of the saved target cell is more advantageous for further training of the pseudo base station identification algorithm.
其中,该真基站数据保存规则可以是对真基站小区的特征数据进行筛选的规则。该真基站数据保存规则可以是用户在终端上设定的规则,也可以是云端服务器发送给终端的规则。真基站数据保存规则例如可以为目标小区的特征数据的采集时间、目标小区所处的位置区域,和目标小区的某些特征数据等等。所述真基站数据保存规则的具体实现可参考上文对再次识别疑似伪基站的描述,此处不予赘述。可以理解,真基站数据保存规则可以和伪基站数据保存规则相同或不同。The true base station data storage rule may be a rule for screening feature data of a true base station cell. The real base station data storage rule may be a rule set by the user on the terminal, or may be a rule sent by the cloud server to the terminal. The true base station data retention rule may be, for example, an acquisition time of feature data of the target cell, a location area where the target cell is located, and certain feature data of the target cell, and the like. For a specific implementation of the data storage rule of the real base station, reference may be made to the description of identifying the suspected pseudo base station again, and details are not described herein. It can be understood that the true base station data saving rule can be the same as or different from the pseudo base station data saving rule.
在另一些示例中,当真基站数据保存功能开启,且目标小区满足真基站数据保存规则时,终端保存目标小区的特征数据。也就是说,当前述的两个示例描述的条件都满足时,终端保存目标小区的特征数据。In other examples, when the true base station data saving function is enabled and the target cell satisfies the true base station data saving rule, the terminal saves the feature data of the target cell. That is, when the conditions described in the two examples above are satisfied, the terminal saves the feature data of the target cell.
可以理解,在上述置信度的判断过程中,“小于或等于”与“小于”没有实质区别,可以等同替代,“大于或等于”与“大于”没有实质区别,也可以等同替代。可以理解,关于第一置信度阈值、第二置信度阈值、第三置信度阈值和第四置信度阈值的大小关系可参阅图3,其中,第二置信度阈值可小于第三置信度阈值,第二置信度阈值可大于或等于第四置信度阈值,第三置信度阈值可小于或等于第一置信度阈值。在本申请的一些示例中,目标小区的置信度可能位于第二置信度阈值和第三置信度阈值的区间内,此时,终端可以既检测目标小区是否满足第一预设条件,也检测目标小区是否满足第二预设条件。当终端检测到目标小区满足第一预设条件时,终端可以确定目标小区的基站为伪基站;当终端检测到目标小区满足第二预设条件时,终端确定目标小区的基站为真基站。综上所述,终端为了接入移动网络、变更驻留小区或者切换小区,终端通过标准定义的流程选择目标小区,终端获取到该目标小区的特征数据后,为了对该目标小区进行真伪识别,终端根据目标小区的特征数据运行伪基站识别算法,得到置信度。当置信度大于或等于第一置信度阈值时,表示该目标小区的基站为伪基站有极大的可能性,因此,终端可以合理地确定目标小区的基站为伪基站,并执行相应操作,以避免伪基站的危害。该伪基站识别算法由机器学习算法训练所产生,从而可以实现根据目标小区的特征数据运行伪基站识别算法后,得到置信度,通过置信度来对目标小区的基站进行真伪识别。伪基站识别算法具有机器学习算法的性能优势,可提高对伪基站的识别性能,并且伪基站识别算法可以不断训练,快速跟进伪基站技术演进,从而提高对伪基站的识别成功率。It can be understood that, in the process of judging the above confidence degree, “less than or equal to” is not substantially different from “less than”, and may be equivalently replaced. “greater than or equal to” is not substantially different from “greater than”, and may be equivalently replaced. It can be understood that, regarding the magnitude relationship between the first confidence threshold, the second confidence threshold, the third confidence threshold, and the fourth confidence threshold, refer to FIG. 3, where the second confidence threshold may be less than the third confidence threshold. The second confidence threshold may be greater than or equal to a fourth confidence threshold, and the third confidence threshold may be less than or equal to the first confidence threshold. In some examples of the present application, the confidence of the target cell may be located in the interval between the second confidence threshold and the third confidence threshold. At this time, the terminal may detect whether the target cell meets the first preset condition and also detects the target. Whether the cell satisfies the second preset condition. When the terminal detects that the target cell meets the first preset condition, the terminal may determine that the base station of the target cell is a pseudo base station; when the terminal detects that the target cell meets the second preset condition, the terminal determines that the base station of the target cell is a true base station. In summary, in order to access the mobile network, change the camping cell or switch the cell, the terminal selects the target cell through a standard defined process, and after the terminal acquires the feature data of the target cell, the terminal performs authenticity identification for the target cell. The terminal runs the pseudo base station identification algorithm according to the feature data of the target cell, and obtains a confidence level. When the confidence level is greater than or equal to the first confidence threshold, the base station indicating that the target cell is a pseudo base station has a great possibility. Therefore, the terminal can reasonably determine that the base station of the target cell is a pseudo base station, and perform corresponding operations to Avoid the danger of pseudo base stations. The pseudo base station identification algorithm is generated by the training of the machine learning algorithm, so that after the pseudo base station identification algorithm is run according to the feature data of the target cell, the confidence degree is obtained, and the base station of the target cell is authenticated by the confidence degree. The pseudo base station identification algorithm has the performance advantage of the machine learning algorithm, can improve the recognition performance of the pseudo base station, and the pseudo base station identification algorithm can continuously train and quickly follow up the pseudo base station technology evolution, thereby improving the recognition success rate of the pseudo base station.
图4为本发明实施例提供的一种伪基站识别方法的方法流程图。图4所示实施例的方 法可以基于图2所示实施例的方法实现。图4所示实施例的方法可应用的场景还可以参考图5。图5为伪基站识别方法涉及到的场景架构图。在该场景中,包括终端501、终端502、云端服务器503和基站504。关于终端501、终端502和基站504的具体内容,可参考图1a所示实施例中对基站101和终端102的相应描述。FIG. 4 is a flowchart of a method for identifying a pseudo base station according to an embodiment of the present invention. The square of the embodiment shown in Figure 4 The method can be implemented based on the method of the embodiment shown in FIG. 2. The scenario in which the method of the embodiment shown in FIG. 4 is applicable can also refer to FIG. 5. FIG. 5 is a schematic diagram of a scenario structure involved in a pseudo base station identification method. In this scenario, a terminal 501, a terminal 502, a cloud server 503, and a base station 504 are included. For specific contents of the terminal 501, the terminal 502, and the base station 504, reference may be made to the corresponding description of the base station 101 and the terminal 102 in the embodiment shown in FIG. 1a.
在图5所示的场景中,终端501和终端502还可以和云端服务器503进行通信。具体来说,终端501可以收集小区的样本数据,并将该样本数据发送给云端服务器503。云端服务器503接收终端501发送的小区样本数据之后,可以使用该样本数据训练机器学习算法,得到伪基站识别算法。然后,云端服务器503将该伪基站识别算法发送给终端502,以使终端502执行图2所示实施例的伪基站识别方法。小区的样本数据可以包括伪基站小区的样本数据和真基站小区的样本数据。伪基站小区的样本数据可以是置信度大于或等于第一置信度阈值的目标小区的样本数据,也可以是对疑似伪基站再次识别确定的伪基站小区的样本数据。同样,真基站小区的样本数据可以是置信度小于第四置信度阈值的目标小区的样本数据,也可以是对疑似真基站再次识别确定的真基站小区的样本数据。In the scenario shown in FIG. 5, the terminal 501 and the terminal 502 can also communicate with the cloud server 503. Specifically, the terminal 501 can collect sample data of the cell, and send the sample data to the cloud server 503. After receiving the cell sample data sent by the terminal 501, the cloud server 503 can use the sample data to train the machine learning algorithm to obtain a pseudo base station identification algorithm. Then, the cloud server 503 transmits the pseudo base station identification algorithm to the terminal 502 to cause the terminal 502 to execute the pseudo base station identification method of the embodiment shown in FIG. 2. The sample data of the cell may include sample data of the pseudo base station cell and sample data of the true base station cell. The sample data of the pseudo base station cell may be sample data of a target cell whose confidence is greater than or equal to the first confidence threshold, or may be sample data of the pseudo base station cell identified by the suspected pseudo base station again. Similarly, the sample data of the true base station cell may be sample data of a target cell whose confidence is less than a fourth confidence threshold, or may be sample data of a true base station cell that is identified by the suspected true base station.
可以理解,图5只是示例性说明,在其它一些示例中,终端501可以具有终端502的功能,或者终端502还可以具有终端501的功能。It can be understood that FIG. 5 is merely an exemplary illustration. In other examples, the terminal 501 may have the function of the terminal 502, or the terminal 502 may also have the function of the terminal 501.
下面,对图4所示实施例的伪基站识别方法进行详细描述,参考上文各实施例的内容,本发明实施例的方法包括:In the following, the method for identifying the pseudo base station in the embodiment shown in FIG. 4 is described in detail. Referring to the content of the foregoing embodiments, the method in the embodiment of the present invention includes:
步骤401:终端获取真基站小区的样本数据和伪基站小区的样本数据。Step 401: The terminal acquires sample data of a real base station cell and sample data of a pseudo base station cell.
终端在获取伪基站识别算法之前,云端服务器需要通过终端采集样本数据,利用样本数据进行机器学习算法的训练,产生伪基站识别算法。Before the terminal obtains the pseudo base station identification algorithm, the cloud server needs to collect sample data through the terminal, and uses the sample data to train the machine learning algorithm to generate a pseudo base station identification algorithm.
其中,真基站小区的基站为真基站,伪基站小区的基站为伪基站。The base station of the real base station cell is a true base station, and the base station of the pseudo base station cell is a pseudo base station.
终端获取真基站小区的样本数据的具体实现方式可以为:终端在某小区成功建立通话或者数据业务,或者执行鉴权并进入加密安全模式,或者小区切换成功,上述情况表示该小区为真基站小区,因此,终端可以从该小区基站广播的信号提取该小区的样本数据,并标记该小区的样本数据为真基站小区的样本数据。The specific implementation manner of the terminal acquiring the sample data of the real base station cell may be: the terminal successfully establishes a call or data service in a certain cell, or performs authentication and enters an encryption security mode, or the cell handover succeeds, where the situation indicates that the cell is a true base station cell. Therefore, the terminal may extract sample data of the cell from the signal broadcast by the cell base station, and mark the sample data of the cell as the sample data of the true base station cell.
终端获取伪基站小区的样本数据的具体实现方式可以为:终端通过特征数据匹配算法识别出伪基站小区;或者,终端驻留该某小区后,若终端的应用层识别到该小区发送的骚扰短信,且终端的modem芯片进一步检测到终端在一定时间内(例如3分钟)被踢出该小区,上述情况表示该小区为伪基站小区,因此,终端可以从该小区基站广播的信号提取该小区的样本数据,并标记该小区的样本数据为伪基站小区的样本数据。The specific implementation manner of the terminal acquiring the sample data of the pseudo base station cell may be: the terminal identifies the pseudo base station cell by using the feature data matching algorithm; or, after the terminal camps on the certain cell, if the application layer of the terminal identifies the harassment message sent by the cell And the modem chip of the terminal further detects that the terminal is kicked out of the cell within a certain time (for example, 3 minutes), and the foregoing situation indicates that the cell is a pseudo base station cell, and therefore, the terminal may extract the cell from the signal broadcast by the cell base station. The sample data, and the sample data of the cell is marked as sample data of the pseudo base station cell.
在本发明实施例中,真基站小区的样本数据和伪基站小区的样本数据可以为如下信息的至少一种:小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信息等。这些信息的具体描述可参考步骤202,此处不再赘述。In the embodiment of the present invention, the sample data of the real base station cell and the sample data of the pseudo base station cell may be at least one of the following information: cell selection and cell reselection information, networking information, service function information, area information, and time information. Wait. For a detailed description of the information, refer to step 202, and details are not described herein again.
可以理解,终端获取真基站小区的样本数据和伪基站小区的样本数据可以由采集策略控制,该采集策略可以由用户设定,也可以是终端从云端服务器获得。该采集策略例如可以为是否对真基站小区的样本数据或者伪基站小区的样本数据进行保存;或者,终端采集预设区域的小区的样本数据,终端在预设时间段采集小区的样本数据等。在一些示例中, 该采集策略可以是图2所示实施例中所述的伪基站数据保存规则和/或真基站数据保存规则。It can be understood that the sample data of the terminal acquiring the real base station cell and the sample data of the pseudo base station cell may be controlled by the collection policy, and the collection policy may be set by the user, or may be obtained by the terminal from the cloud server. The acquisition policy may be, for example, whether to save the sample data of the real base station cell or the sample data of the pseudo base station cell; or the terminal collects the sample data of the cell in the preset area, and the terminal collects the sample data of the cell in a preset time period. In some examples, The acquisition policy may be a pseudo base station data retention rule and/or a true base station data retention rule as described in the embodiment shown in FIG. 2.
步骤402:终端向云端服务器发送该真基站小区的样本数据和该伪基站小区的样本数据。Step 402: The terminal sends the sample data of the true base station cell and the sample data of the pseudo base station cell to the cloud server.
终端获取到真基站小区的样本数据和伪基站小区的样本数据后,终端向云端服务器发送该真基站小区的样本数据和该伪基站小区的样本数据,以供云端服务器使用这些数据。After the terminal acquires the sample data of the real base station cell and the sample data of the pseudo base station cell, the terminal sends the sample data of the true base station cell and the sample data of the pseudo base station cell to the cloud server, so that the cloud server uses the data.
例如,终端可以通过例如蜂窝移动网络或者WiFi网络等方式向云端服务器发送该真基站小区的样本数据和该伪基站小区的样本数据,或者通过存储卡将终端上的该真基站小区的样本数据和该伪基站小区的样本数据转存到云端服务器上。For example, the terminal may send the sample data of the true base station cell and the sample data of the pseudo base station cell to the cloud server by using, for example, a cellular mobile network or a WiFi network, or use the memory card to sample data of the true base station cell on the terminal. The sample data of the pseudo base station cell is transferred to the cloud server.
步骤403:云端服务器使用真基站小区的样本数据和伪基站小区的样本数据对机器学习算法进行训练,产生伪基站识别算法。Step 403: The cloud server trains the machine learning algorithm by using the sample data of the real base station cell and the sample data of the pseudo base station cell to generate a pseudo base station identification algorithm.
在云端服务器获取了足够的真伪基站小区的样本数据后,云端服务器使用该真基站小区的样本数据和该伪基站小区的样本数据进行机器学习算法的训练,以产生伪基站识别算法。该机器学习算法的训练可以为基于大数据的训练。After the cloud server obtains the sample data of the authentic base station cell, the cloud server uses the sample data of the true base station cell and the sample data of the pseudo base station cell to perform training of the machine learning algorithm to generate a pseudo base station identification algorithm. The training of the machine learning algorithm can be based on big data training.
该伪基站识别算法可用于对目标小区的真伪进行识别。The pseudo base station identification algorithm can be used to identify the authenticity of the target cell.
进行机器学习算法训练,可以采用聚类算法或分类算法,比如K-means、k-近邻,决策树、Logistic回归、SVM、贝叶斯算法等算法进行训练,产生计算模型,该计算模型即为伪基站识别算法。For machine learning algorithm training, clustering algorithm or classification algorithm, such as K-means, k-nearest neighbor, decision tree, logistic regression, SVM, Bayesian algorithm, etc., can be used to train and generate a calculation model, which is Pseudo base station identification algorithm.
例如,云端服务器使用真基站小区的样本数据和该伪基站小区的样本数据进行SVM算法的训练,得到SVM模型实例,该SVM模型实例即为伪基站识别算法,其可用于根据目标小区的特征数据对目标小区的样本数据进行识别,判断该目标小区的基站是真基站还是伪基站。For example, the cloud server uses the sample data of the real base station cell and the sample data of the pseudo base station cell to perform training of the SVM algorithm, and obtains an SVM model instance, where the SVM model instance is a pseudo base station identification algorithm, which can be used according to the feature data of the target cell. The sample data of the target cell is identified, and it is determined whether the base station of the target cell is a true base station or a pseudo base station.
借助机器学习领域的方法,通过大量样本训练,所选择的机器学习算法可以建立真伪基站识别能力(或称真伪基站知识),该识别能力可以包含在经过训练产生的算法中。With the help of the machine learning domain method, the selected machine learning algorithm can establish the authentic base station identification capability (or the authentic base station knowledge) through a large number of sample training, and the recognition capability can be included in the trained generated algorithm.
可选地,本发明实施例的方法还包括云端服务器对伪基站识别算法进行测试,当伪基站识别算法符合设计者的性能指标要求时,云端服务器将该伪基站识别算法发送给终端。Optionally, the method of the embodiment of the present invention further includes: the cloud server tests the pseudo base station identification algorithm, and when the pseudo base station identification algorithm meets the performance requirement of the designer, the cloud server sends the pseudo base station identification algorithm to the terminal.
在一个示例中,云端服务器在获取到终端发送的真基站小区的样本数据和伪基站小区的样本数据后,云端服务器预留其中的一部分样本数据进行算法的测试,以获得伪基站识别算法的性能。该预留的样本数据可以为图2所示实施例的真基站测试样本集或伪基站测试样本集。具体来说,云端服务器在训练产生伪基站识别算法后,使用该预留的真基站小区的样本数据和伪基站小区的样本数据输入到伪基站识别算法,让伪基站识别算法进行识别测试。这样,可以得到伪基站识别算法对伪基站小区的样本数据输出的置信度在第一测试置信度阈值(例如,0.9)以上的概率(可以称为伪基站识别率),伪基站识别算法对真基站小区的样本数据输出的置信度在该第一测试置信度阈值以上的概率(可以称为伪基站误警率),也可以得到伪基站识别算法对真基站小区的样本数据输出的置信度在第四测试置信度阈值(比如0.4)以下的概率(可以称为真基站识别率)。In an example, after the cloud server obtains the sample data of the true base station cell and the sample data of the pseudo base station cell sent by the terminal, the cloud server reserves a part of the sample data for testing the algorithm to obtain the performance of the pseudo base station identification algorithm. . The reserved sample data may be the true base station test sample set or the pseudo base station test sample set of the embodiment shown in FIG. 2. Specifically, after the cloud server is trained to generate the pseudo base station identification algorithm, the sample data of the reserved true base station cell and the sample data of the pseudo base station cell are input to the pseudo base station identification algorithm, and the pseudo base station identification algorithm is used for the identification test. In this way, the probability that the confidence of the pseudo base station identification algorithm for the sample data output of the pseudo base station cell is above the first test confidence threshold (eg, 0.9) (which may be referred to as a pseudo base station identification rate) may be obtained, and the pseudo base station identification algorithm is true. The probability that the confidence of the sample data output of the base station cell is above the first test confidence threshold (which may be referred to as a pseudo base station false alarm rate) may also obtain the confidence that the pseudo base station identification algorithm outputs the sample data of the true base station cell. The probability of the fourth test confidence threshold (eg, 0.4) or less (which may be referred to as a true base station identification rate).
在另一个示例中,当伪基站识别算法达到设计者的性能指标(比如,伪基站识别率为 0.8,伪基站误警率为0.002,真基站识别率为0.99)时,该伪基站识别算法为识别效果符合要求的算法。In another example, when the pseudo base station identification algorithm reaches the designer's performance metric (eg, the pseudo base station identification rate) 0.8, the pseudo base station false alarm rate is 0.002, and the true base station identification rate is 0.99), the pseudo base station identification algorithm is an algorithm that recognizes that the effect meets the requirements.
步骤404:云端服务器向终端发送伪基站识别算法。Step 404: The cloud server sends a pseudo base station identification algorithm to the terminal.
云端服务器在得到伪基站识别算法后,可以向终端发送该伪基站识别算法,即将伪基站识别算法移植到终端上。从而,终端可以使用该伪基站识别算法识别伪基站。在一些示例中,云端服务器在发送伪基站识别算法之前可以根据终端进行代码转换。After obtaining the pseudo base station identification algorithm, the cloud server may send the pseudo base station identification algorithm to the terminal, that is, the pseudo base station identification algorithm is transplanted to the terminal. Thus, the terminal can identify the pseudo base station using the pseudo base station identification algorithm. In some examples, the cloud server may transcode according to the terminal before transmitting the pseudo base station identification algorithm.
可以理解,步骤404中的终端和步骤401中的终端可以为同一终端,也可以是不同的终端,本申请对此不作限制。It can be understood that the terminal in step 404 and the terminal in step 401 can be the same terminal or different terminals, which is not limited in this application.
下文即对终端如何使用该伪基站识别算法进行说明。The following describes how the terminal uses the pseudo base station identification algorithm.
步骤405:终端选择目标小区。步骤406:终端根据目标小区的特征数据运行伪基站识别算法,得到置信度。Step 405: The terminal selects a target cell. Step 406: The terminal runs the pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level.
步骤407:当置信度大于或等于第一置信度阈值时,终端确定目标小区的基站为伪基站。Step 407: When the confidence is greater than or equal to the first confidence threshold, the terminal determines that the base station of the target cell is a pseudo base station.
步骤408:终端在预设时长内禁止再次选择目标小区。Step 408: The terminal prohibits selecting the target cell again within the preset duration.
其中,步骤405至步骤408的具体实现可以分别参见步骤201至步骤204的详细描述。The specific implementation of step 405 to step 408 can be referred to the detailed description of step 201 to step 204, respectively.
可选地,在步骤406之后,本发明实施例的方法还包括:当置信度小于或等于第四置信度阈值时,终端通过目标小区执行预设操作,其中,该预设操作包括网络注册、位置区域更新、小区驻留和发起业务请求中的任意一项。此时,目标小区的基站为真基站,终端可以通过该目标小区连接移动网络。所述预设操作可以为终端正常连接移动网络时需执行的操作。第四置信度阈值的取值可以参见前文的描述,此处不再赘述。Optionally, after the step 406, the method of the embodiment of the present invention further includes: when the confidence is less than or equal to the fourth confidence threshold, the terminal performs a preset operation by using the target cell, where the preset operation includes network registration, Any of the location area update, cell camping, and originating service request. At this time, the base station of the target cell is a true base station, and the terminal can connect to the mobile network through the target cell. The preset operation may be an operation that needs to be performed when the terminal normally connects to the mobile network. For the value of the fourth confidence threshold, refer to the foregoing description, and details are not described herein again.
可选地,在步骤406之后,本发明实施例的方法还包括:当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且终端检测到目标小区满足第一预设条件时,终端确定目标小区的基站为伪基站。可以理解,当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值时,目标小区的基站为疑似伪基站,因此可以结合第一预设条件对该疑似伪基站再次识别。再次识别疑似伪基站的方法可以参见前文“1.1再次识别疑似伪基站”的描述,此处不再赘述。Optionally, after the step 406, the method of the embodiment of the present invention further includes: when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset In the condition, the terminal determines that the base station of the target cell is a pseudo base station. It can be understood that when the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, the base station of the target cell is a suspected pseudo base station, and thus the suspected pseudo base station can be re-identified in combination with the first preset condition. For the method of identifying the suspected pseudo base station again, refer to the description of “1.1 Identifying the suspected pseudo base station again”, and details are not described herein again.
可选地,在步骤406之后,本发明实施例的方法还包括:当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值,且终端检测到目标小区满足第二预设条件时,终端确定目标小区的基站为真基站。可以理解,当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值时,目标小区的基站为疑似真基站,因此可以结合第二预设条件对该疑似真基站再次识别。再次识别疑似真基站的方法可以参见前文“1.2再次识别疑似真基站”的描述,此处不再赘述。Optionally, after the step 406, the method of the embodiment of the present invention further includes: when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset When the condition is met, the terminal determines that the base station of the target cell is a true base station. It can be understood that when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, the base station of the target cell is a suspected true base station, and thus the suspected true base station can be re-identified in combination with the second preset condition. For the method of identifying the suspected true base station again, refer to the description of “1.2 Identifying the suspected true base station again”, and details are not described herein again.
通过对被标识为伪基站数据的目标小区的特征数据的保存,以及对被标识为真基站数据的目标小区的特征数据的保存,终端可以在预设情况下,例如在连接WiFi网络的时候,将保存的特征数据向云端服务器发送。云端服务器将目标小区的被标识为伪基站数据的特征数据作为伪基站小区的样本数据,或者将目标小区的被标识为真基站数据的特征数据作为真基站小区的样本数据,对预存的伪基站识别算法进行进一步训练,以更新该伪基站识 别算法。这样,该更新后的伪基站识别算法对真伪基站的识别率更高。可选地,云端服务器还可以向终端发送该更新后的伪基站识别算法,以供终端使用。By saving the feature data of the target cell identified as the pseudo base station data, and saving the feature data of the target cell identified as the true base station data, the terminal may be in a preset situation, for example, when connecting to the WiFi network, Send the saved feature data to the cloud server. The cloud server uses the feature data of the target cell identified as the pseudo base station data as the sample data of the pseudo base station cell, or the feature data of the target cell identified as the true base station data as the sample data of the true base station cell, and the pre-stored pseudo base station The recognition algorithm is further trained to update the pseudo base station Do not algorithm. Thus, the updated pseudo base station identification algorithm has a higher recognition rate for the authentic base station. Optionally, the cloud server may further send the updated pseudo base station identification algorithm to the terminal for use by the terminal.
需要说明的是,基于大数据、机器学习的伪基站识别算法,本质上需要持续借助真伪小区的样本数据对伪基站识别算法进行训练和迭代,从而适应新型伪基站和真基站的变化,因此,真伪基站样本采集和算法训练可以持续进行。It should be noted that the pseudo base station identification algorithm based on big data and machine learning essentially needs to continuously train and iterate the pseudo base station identification algorithm by using the sample data of the authentic cell, thereby adapting to the changes of the new pseudo base station and the real base station. The authenticity base station sample collection and algorithm training can be continued.
本发明实施例中,通过运行基于机器学习的伪基站识别算法终端可以根据目标小区的特征数据得到置信度,并根据置信度确定目标小区的基站是否为伪基站。通过大量特征数据训练产生的伪基站识别算法,提高了终端对伪基站的识别率。并且,终端可以将疑似基站的特征数据发送给云端服务器,由云端服务器对伪基站识别算法进行更新,从而持续跟进伪基站的技术演进,不断提高伪基站的识别率。In the embodiment of the present invention, the terminal can obtain the confidence according to the feature data of the target cell by running the pseudo base station identification algorithm based on the machine learning, and determine whether the base station of the target cell is a pseudo base station according to the confidence level. The pseudo base station identification algorithm generated by a large number of feature data training improves the recognition rate of the terminal to the pseudo base station. Moreover, the terminal may send the feature data of the suspected base station to the cloud server, and the cloud server updates the pseudo base station identification algorithm, thereby continuously following the technical evolution of the pseudo base station, and continuously improving the recognition rate of the pseudo base station.
图6为本发明实施例提供的一种终端的结构示意图,该终端可用于执行上述图2和图4所示实施例的终端执行的方法。参阅图6,本发明实施例的终端包括选择单元601、运行单元602和确定单元603。FIG. 6 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure, where the terminal is used to perform the method performed by the terminal in the foregoing embodiment shown in FIG. 2 and FIG. 4. Referring to FIG. 6, the terminal of the embodiment of the present invention includes a selecting unit 601, an operating unit 602, and a determining unit 603.
其中,选择单元601,用于选择目标小区;运行单元602,用于根据目标小区的特征数据运行伪基站识别算法,得到置信度,置信度用于表示目标小区的基站为伪基站的可信程度,伪基站识别算法由机器学习算法训练所产生;确定单元603,用于当置信度大于或等于第一置信度阈值时,确定目标小区的基站为伪基站。The selecting unit 601 is configured to select a target cell, and the running unit 602 is configured to run a pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level, where the confidence level is used to indicate that the base station of the target cell is a trusted base station. The pseudo base station identification algorithm is generated by the machine learning algorithm training. The determining unit 603 is configured to determine that the base station of the target cell is a pseudo base station when the confidence level is greater than or equal to the first confidence threshold.
可选地,确定单元603,还用于当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且终端检测到目标小区满足第一预设条件时,确定目标小区的基站为伪基站。Optionally, the determining unit 603 is further configured to: when the confidence level is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, determining the target cell The base station is a pseudo base station.
可选地,确定单元603包括保存模块604。Optionally, the determining unit 603 includes a saving module 604.
其中,保存模块604,用于当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且终端检测到目标小区满足第一预设条件时,保存目标小区的特征数据,目标小区的特征数据被标识为伪基站数据。The saving module 604 is configured to save the feature data of the target cell when the confidence level is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, The feature data of the target cell is identified as pseudo base station data.
可选地,保存模块604,还用于:当伪基站数据保存功能开启时,保存目标小区的特征数据;或者,当目标小区满足伪基站数据保存规则时,保存目标小区的特征数据;或者,当伪基站数据保存功能开启,且目标小区满足伪基站数据保存规则时,保存目标小区的特征数据。Optionally, the saving module 604 is further configured to: when the pseudo base station data saving function is enabled, save the feature data of the target cell; or, when the target cell satisfies the pseudo base station data storage rule, save the feature data of the target cell; or When the pseudo base station data saving function is enabled and the target cell satisfies the pseudo base station data storage rule, the feature data of the target cell is saved.
可选地,第一预设条件包括至少一个以下条件:终端拦截到目标小区发送的问题短信;终端向目标小区发起位置区域更新请求时被拒绝;终端向目标小区发起业务请求时被拒绝;终端在预设时间内丢失目标小区信号;或者,目标小区的位置区码LAC发生改变。Optionally, the first preset condition includes at least one condition that the terminal intercepts the problem message sent by the target cell; when the terminal initiates the location area update request to the target cell, the terminal is rejected; when the terminal initiates the service request to the target cell, the terminal is rejected; The target cell signal is lost within a preset time; or, the location area code LAC of the target cell changes.
可选地,终端还包括执行单元605;Optionally, the terminal further includes an executing unit 605;
执行单元605,用于当置信度小于或等于第四置信度阈值时,通过目标小区执行预设操作,预设操作包括网络注册、位置区域更新、小区驻留和发起业务请求中的任意一项。The executing unit 605 is configured to perform a preset operation by using the target cell when the confidence is less than or equal to the fourth confidence threshold, where the preset operation includes any one of network registration, location area update, cell camping, and originating service request. .
可选地,确定单元603,还用于当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值,且终端检测到目标小区满足第二预设条件时,确定目标小区的基站为真基 站。Optionally, the determining unit 603 is further configured to: when the confidence level is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset condition, determining the target cell Base station is the base station.
可选地,保存模块604,还用于当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值,且终端检测到目标小区满足第二预设条件时,保存目标小区的特征数据,目标小区的特征数据被标识为真基站数据。Optionally, the saving module 604 is further configured to save the target cell when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset condition. Characteristic data, the feature data of the target cell is identified as true base station data.
可选地,保存模块604,还用于当真基站数据保存功能开启时,保存目标小区的特征数据;或者,当目标小区满足真基站数据保存规则时,保存目标小区的特征数据;或者,当真基站数据保存功能开启,且目标小区满足真基站数据保存规则时,保存目标小区的特征数据。Optionally, the saving module 604 is further configured to: save the feature data of the target cell when the true base station data saving function is enabled; or save the feature data of the target cell when the target cell satisfies the true base station data saving rule; or, the authentic base station When the data saving function is enabled and the target cell satisfies the true base station data storage rule, the feature data of the target cell is saved.
可选地,第二预设条件包括至少一个以下条件:终端在目标小区建立通话或者数据业务;终端通过目标小区完成认证并进入加密安全模式;或者,终端在目标小区完成切换。Optionally, the second preset condition includes at least one condition that the terminal establishes a call or a data service in the target cell; the terminal completes the authentication through the target cell and enters an encryption security mode; or the terminal completes the handover in the target cell.
可选地,目标小区为全球移动通信系统GSM小区。Optionally, the target cell is a Global System for Mobile Communications (GSM) cell.
可选地,运行单元602,还用于当终端检测到目标小区的LAC和当前保存的LAC不相同时,根据目标小区的特征数据运行伪基站识别算法,得到置信度。Optionally, the running unit 602 is further configured to: when the terminal detects that the LAC of the target cell is different from the currently saved LAC, run the pseudo base station identification algorithm according to the feature data of the target cell, to obtain a confidence level.
可选地,在终端确定目标小区的基站为伪基站之后,选择单元601,还用于在预设时长内禁止再次选择目标小区。Optionally, after the terminal determines that the base station of the target cell is a pseudo base station, the selecting unit 601 is further configured to prohibit the target cell from being selected again within the preset duration.
可选地,特征数据包括小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信息的至少一种。Optionally, the feature data includes at least one of cell selection and cell reselection information, networking information, service function information, area information, and time information.
可选地,选择单元601,可用于执行上文中的步骤201、步骤204、步骤405和步骤408。Optionally, the selecting unit 601 is configured to perform step 201, step 204, step 405, and step 408 above.
可选地,运行单元602,可用于执行上文中的步骤202和步骤406。Optionally, the running unit 602 is configured to perform step 202 and step 406 above.
可选地,确定单元603,可用于执行上文中的步骤203和步骤407。Optionally, the determining unit 603 is configured to perform step 203 and step 407 in the foregoing.
本发明实施例中,通过运行基于机器学习的伪基站识别算法终端可以根据目标小区的特征数据得到置信度,并根据置信度确定目标小区的基站是否为伪基站。通过大量特征数据训练产生的伪基站识别算法,提高了终端对伪基站的识别率。并且,终端可以将疑似基站的特征数据发送给云端服务器,由云端服务器对伪基站识别算法进行更新,从而持续跟进伪基站的技术演进,不断提高伪基站的识别率。In the embodiment of the present invention, the terminal can obtain the confidence according to the feature data of the target cell by running the pseudo base station identification algorithm based on the machine learning, and determine whether the base station of the target cell is a pseudo base station according to the confidence level. The pseudo base station identification algorithm generated by a large number of feature data training improves the recognition rate of the terminal to the pseudo base station. Moreover, the terminal may send the feature data of the suspected base station to the cloud server, and the cloud server updates the pseudo base station identification algorithm, thereby continuously following the technical evolution of the pseudo base station, and continuously improving the recognition rate of the pseudo base station.
图7为本发明实施例提供的一种终端的硬件结构示意图,图7所示的终端可用于执行图2和图4所示的方法,图6所示的终端可集成在图7所示的终端上。FIG. 7 is a schematic structural diagram of a hardware structure of a terminal according to an embodiment of the present invention. The terminal shown in FIG. 7 can be used to perform the method shown in FIG. 2 and FIG. 4. The terminal shown in FIG. 6 can be integrated in FIG. On the terminal.
为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。本发明实施例中所涉及到的终端可以包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备。所述终端(terminal)也可以称为移动台(mobile station,简称MS),用户设备(user equipment),终端设备(terminal device),还可以包括用户单元(subscriber unit)、蜂窝电话(cellular phone)、智能电话(smart phone)、无线数据卡、个人数字助理(personal digital assistant,PDA)电脑、平板型电脑、无线调制解调器(modem)、手持设备(handheld)、膝上型电脑(laptop computer)、无绳电话(cordless phone)或者无线本地环路(wireless local loop,WLL)台、机器类型通信(machine type communication, MTC)终端等。本发明实施例以终端为手机为例进行说明。For the convenience of description, only the parts related to the embodiments of the present invention are shown. If the specific technical details are not disclosed, please refer to the method part of the embodiment of the present invention. The terminals involved in the embodiments of the present invention may include various handheld devices having wireless communication functions, in-vehicle devices, wearable devices, computing devices, or other processing devices connected to the wireless modem. The terminal may also be referred to as a mobile station (MS), a user equipment, a terminal device, and may also include a subscriber unit and a cellular phone. , smart phone, wireless data card, personal digital assistant (PDA) computer, tablet computer, wireless modem (modem), handheld, laptop computer, cordless Cordless phone or wireless local loop (WLL) station, machine type communication (machine type communication, MTC) terminal, etc. In the embodiment of the present invention, the terminal is used as a mobile phone as an example for description.
如图7所示,手机包括:射频(Radio Frequency,RF)电路710、存储器720、输入单元730、显示器740、传感器750、音频电路760、无线保真(wireless fidelity,WiFi)模块770、处理器780、以及电源790等部件。本领域技术人员可以理解,图7中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。As shown in FIG. 7, the mobile phone includes: a radio frequency (RF) circuit 710, a memory 720, an input unit 730, a display 740, a sensor 750, an audio circuit 760, a wireless fidelity (WiFi) module 770, and a processor. 780, and power supply 790 and other components. It will be understood by those skilled in the art that the structure of the handset shown in FIG. 7 does not constitute a limitation to the handset, and may include more or less components than those illustrated, or some components may be combined, or different components may be arranged.
下面结合图7对手机的各个构成部件进行具体的介绍:The following describes the components of the mobile phone in detail with reference to FIG. 7:
RF电路710可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器780处理;另外,将设计上行的数据发送给基站。通常,RF电路710包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路710还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。The RF circuit 710 can be used for transmitting and receiving information or during a call, and receiving and transmitting the signal. Specifically, after receiving the downlink information of the base station, the processor 780 processes the data. In addition, the uplink data is designed to be sent to the base station. Generally, RF circuit 710 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 710 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
存储器720可用于存储软件程序以及模块,处理器780通过运行存储在存储器720的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器720可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、视频数据、电话本等)等。此外,存储器720可以包括易失性存储器,例如随机存取存储器(random access memory,RAM)、非挥发性动态随机存取内存(Nonvolatile Random Access Memory,NVRAM)、相变化随机存取内存(Phase Change RAM,PRAM)、磁阻式随机存取内存(Magetoresistive RAM,MRAM)等,还可以包括非易失性存储器,例如至少一个磁盘存储器件、只读存储器(read-only memory,ROM)、电子可擦除可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、闪存器件,例如反或闪存(NOR flash memory)或是反与闪存(NAND flash memory)、半导体器件,例如固态硬盘(Solid State Disk,SSD)等。The memory 720 can be used to store software programs and modules, and the processor 780 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 720. The memory 720 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, video data, phone book, etc.). In addition, the memory 720 may include volatile memory such as random access memory (RAM), nonvolatile random access memory (NVRAM), phase change random access memory (Phase Change). RAM, PRAM), magnetoresistive random access memory (MRAM), etc., may also include non-volatile memory, such as at least one disk storage device, read-only memory (ROM), electronically Electrically Erasable Programmable Read-Only Memory (EEPROM), flash memory devices such as NOR flash memory or NAND flash memory, semiconductor devices such as solid state hard disks (Solid) State Disk, SSD), etc.
输入单元730可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元730可包括触控面板731以及其他输入设备732。触控面板731,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板731上或在触控面板731附近的操作),并根据预先设定的程式驱动相应的连接装置。可选地,触控面板731可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器780,并能接收处理器780发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板731。除了触控 面板731,输入单元730还可以包括其他输入设备732。具体地,其他输入设备732可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 730 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset. Specifically, the input unit 730 may include a touch panel 731 and other input devices 732. The touch panel 731, also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 731 or near the touch panel 731. Operation), and drive the corresponding connecting device according to a preset program. Alternatively, the touch panel 731 may include two parts of a touch detection device and a touch controller. Wherein, the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information. The processor 780 is provided and can receive commands from the processor 780 and execute them. In addition, the touch panel 731 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves. In addition to touch Panel 731, input unit 730 may also include other input devices 732. In particular, other input devices 732 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
显示器740可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示器740可包括显示面板741,可选地,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板741。进一步的,触控面板731可覆盖显示面板741,当触控面板731检测到在其上或附近的触摸操作后,传送给处理器780以确定触摸事件的类型,随后处理器780根据触摸事件的类型在显示面板741上提供相应的视觉输出。虽然在图7中,触控面板731与显示面板741是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板731与显示面板741集成而实现手机的输入和输出功能。 Display 740 can be used to display information entered by the user or information provided to the user as well as various menus of the handset. The display panel 740 can include a display panel 741. Alternatively, the display panel 741 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like. Further, the touch panel 731 can cover the display panel 741. When the touch panel 731 detects a touch operation on or near the touch panel 731, it transmits to the processor 780 to determine the type of the touch event, and then the processor 780 according to the touch event. The type provides a corresponding visual output on display panel 741. Although the touch panel 731 and the display panel 741 are used as two independent components to implement the input and input functions of the mobile phone in FIG. 7, in some embodiments, the touch panel 731 can be integrated with the display panel 741. Realize the input and output functions of the phone.
手机还可包括至少一种传感器750,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板741的亮度,接近传感器可在手机移动到耳边时,关闭显示面板741和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The handset may also include at least one type of sensor 750, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 741 according to the brightness of the ambient light, and the proximity sensor may close the display panel 741 and/or when the mobile phone moves to the ear. Or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
音频电路760、扬声器761,传声器762可提供用户与手机之间的音频接口。音频电路760可将接收到的音频数据转换后的电信号,传输到扬声器761,由扬声器761转换为声音信号输出;另一方面,传声器762将收集的声音信号转换为电信号,由音频电路760接收后转换为音频数据,再将音频数据输出处理器780处理后,经RF电路710以发送给比如另一手机,或者将音频数据输出至存储器720以便进一步处理。An audio circuit 760, a speaker 761, and a microphone 762 can provide an audio interface between the user and the handset. The audio circuit 760 can transmit the converted electrical data of the received audio data to the speaker 761 for conversion to the sound signal output by the speaker 761; on the other hand, the microphone 762 converts the collected sound signal into an electrical signal by the audio circuit 760. After receiving, it is converted into audio data, and then processed by the audio data output processor 780, sent to, for example, another mobile phone via the RF circuit 710, or outputted to the memory 720 for further processing.
WiFi属于短距离无线传输技术,手机通过WiFi模块770可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图7示出了WiFi模块770,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-range wireless transmission technology, and the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 770, which provides users with wireless broadband Internet access. Although FIG. 7 shows the WiFi module 770, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
处理器780是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器720内的软件程序和/或模块,以及调用存储在存储器720内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。处理器780可以是中央处理器(Central Processing Unit,CPU)、通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件,硬件部件或者其任意组合。处理器780可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。处理器780也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。可选地,处理器 780可包括一个或多个处理单元。可选地,处理器780可以集成应用处理器和调制解调处理器(modem),其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解,上述调制解调处理器也可以独立存在、不集成到处理器780中,或者与音频电路760等集成。The processor 780 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 720, and invoking data stored in the memory 720, The phone's various functions and processing data, so that the overall monitoring of the phone. The processor 780 can be a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), and a field programmable gate array ( Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. The processor 780 can implement or perform various exemplary logical blocks, modules and circuits described in connection with the present disclosure. Processor 780 can also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like. Optional processor 780 can include one or more processing units. Optionally, the processor 780 can integrate an application processor and a modem, wherein the application processor primarily processes an operating system, a user interface, an application, etc., and the modem processor primarily processes wireless communications. It will be appreciated that the above described modem processor may also be present independently, not integrated into the processor 780, or integrated with the audio circuit 760 or the like.
手机还包括给各个部件供电的电源790(比如电池)。可选的,电源可以通过电源管理系统与处理器780逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The handset also includes a power source 790 (such as a battery) that powers the various components. Optionally, the power supply can be logically coupled to the processor 780 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
需要说明的是,尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不予赘述。It should be noted that, although not shown, the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein.
在本发明实施例中,处理器780可以设置用于:选择目标小区;根据目标小区的特征数据运行伪基站识别算法,得到置信度,置信度用于表示目标小区的基站为伪基站的可信程度,伪基站识别算法由机器学习算法训练所产生;当置信度大于或等于第一置信度阈值时,确定目标小区的基站为伪基站。In the embodiment of the present invention, the processor 780 may be configured to: select a target cell; run a pseudo base station identification algorithm according to the feature data of the target cell, and obtain a confidence level, where the confidence level is used to indicate that the base station of the target cell is a trusted base station. To the extent, the pseudo base station identification algorithm is generated by the machine learning algorithm training; when the confidence level is greater than or equal to the first confidence threshold, the base station of the target cell is determined to be a pseudo base station.
可选地,处理器780还可以设置用于:当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且检测到目标小区满足第一预设条件时,确定目标小区的基站为伪基站。Optionally, the processor 780 may be further configured to determine the target cell when the confidence level is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the target cell is detected to meet the first preset condition. The base station is a pseudo base station.
可选地,处理器780可以设置用于:当置信度小于第一置信度阈值且置信度大于或等于第二置信度阈值,且检测到目标小区满足第一预设条件时,保存目标小区的特征数据,目标小区的特征数据被标识为伪基站数据。可选地,处理器780可以控制存储器720保存目标小区的特征数据。Optionally, the processor 780 may be configured to: when the confidence level is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the target cell is detected to meet the first preset condition, save the target cell Characteristic data, the feature data of the target cell is identified as pseudo base station data. Alternatively, the processor 780 can control the memory 720 to save feature data of the target cell.
可选地,处理器780还可以设置用于:当伪基站数据保存功能开启时,保存目标小区的特征数据;或者,当目标小区满足伪基站数据保存规则时,保存目标小区的特征数据;或者,当伪基站数据保存功能开启,且目标小区满足伪基站数据保存规则时,保存目标小区的特征数据。可选地,处理器780可以控制存储器720保存目标小区的特征数据。Optionally, the processor 780 is further configured to: save the feature data of the target cell when the pseudo base station data saving function is enabled; or save the feature data of the target cell when the target cell satisfies the pseudo base station data saving rule; or When the pseudo base station data saving function is enabled, and the target cell satisfies the pseudo base station data storage rule, the feature data of the target cell is saved. Alternatively, the processor 780 can control the memory 720 to save feature data of the target cell.
可选地,处理器780还可以设置用于:当置信度小于或等于第四置信度阈值时,通过目标小区执行预设操作,预设操作包括网络注册、位置区域更新、小区驻留和发起业务请求中的任意一项。Optionally, the processor 780 is further configured to perform a preset operation by using the target cell when the confidence is less than or equal to the fourth confidence threshold, where the preset operation includes network registration, location area update, cell camping, and initiation. Any of the business requests.
可选地,处理器780还可以设置用于:当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值,且检测到目标小区满足第二预设条件时,确定目标小区的基站为真基站。Optionally, the processor 780 is further configured to: when the confidence level is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the target cell is detected to meet the second preset condition, determining the target cell The base station is a true base station.
可选地,处理器780还可以设置用于:当置信度大于第四置信度阈值且置信度小于或等于第三置信度阈值,且检测到目标小区满足第二预设条件时,保存目标小区的特征数据,目标小区的特征数据被标识为真基站数据。可选地,处理器780可以控制存储器720保存目标小区的特征数据。Optionally, the processor 780 is further configured to: when the confidence level is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the target cell is detected to meet the second preset condition, save the target cell. Characteristic data, the feature data of the target cell is identified as true base station data. Alternatively, the processor 780 can control the memory 720 to save feature data of the target cell.
可选地,处理器780还可以设置用于:当真基站数据保存功能开启时,保存目标小区的特征数据;或者,当目标小区满足真基站数据保存规则时,保存目标小区的特征数据;或者,当真基站数据保存功能开启,且目标小区满足真基站数据保存规则时,保存目标小区的特征数据。可选地,处理器780可以控制存储器720保存目标小区的特征数据。 Optionally, the processor 780 is further configured to: save the feature data of the target cell when the true base station data save function is enabled; or save the feature data of the target cell when the target cell meets the true base station data save rule; or When the true base station data saving function is enabled and the target cell satisfies the true base station data storage rule, the feature data of the target cell is saved. Alternatively, the processor 780 can control the memory 720 to save feature data of the target cell.
可选地,处理器780还可以设置用于:当检测到目标小区的LAC和当前保存的LAC不相同时,根据目标小区的特征数据运行伪基站识别算法,得到置信度。Optionally, the processor 780 is further configured to: when detecting that the LAC of the target cell is different from the currently saved LAC, run the pseudo base station identification algorithm according to the feature data of the target cell, to obtain a confidence level.
可选地,处理器780还可以设置用于:在确定目标小区的基站为伪基站之后,在预设时长内禁止再次选择目标小区。Optionally, the processor 780 is further configured to: after determining that the base station of the target cell is a pseudo base station, prohibiting to select the target cell again within a preset time period.
可选地,处理器780还可以设置用于执行上文中的步骤201至204,以及步骤401至步骤408。Optionally, the processor 780 may also be configured to perform steps 201 to 204, and steps 401 to 408 above.
本发明实施例中,通过运行基于机器学习的伪基站识别算法,终端可以根据目标小区的特征数据得到置信度,并根据置信度确定目标小区的基站是否为伪基站。通过大量特征数据训练产生的伪基站识别算法,提高了终端对伪基站的识别率。并且,终端可以将疑似基站的特征数据发送给云端服务器,由云端服务器对伪基站识别算法进行更新,从而持续跟进伪基站的技术演进,不断提高伪基站的识别率。In the embodiment of the present invention, by running a pseudo-base station identification algorithm based on machine learning, the terminal may obtain a confidence according to the feature data of the target cell, and determine whether the base station of the target cell is a pseudo base station according to the confidence level. The pseudo base station identification algorithm generated by a large number of feature data training improves the recognition rate of the terminal to the pseudo base station. Moreover, the terminal may send the feature data of the suspected base station to the cloud server, and the cloud server updates the pseudo base station identification algorithm, thereby continuously following the technical evolution of the pseudo base station, and continuously improving the recognition rate of the pseudo base station.
本发明实施例还提供了一种芯片装置,所述芯片包括处理单元,用于执行上述图2和图4所示的方法。The embodiment of the invention further provides a chip device, the chip comprising a processing unit for performing the method shown in FIG. 2 and FIG. 4 above.
本发明实施例还提供了一种芯片装置,所述芯片装置包括处理器和存储器。所述存储器包括指令,所述处理器运行所述指令,用于执行上述图2和图4所示的方法。The embodiment of the invention further provides a chip device, which comprises a processor and a memory. The memory includes instructions that are executed by the processor for performing the methods illustrated in Figures 2 and 4 above.
在本发明实施例中,芯片装置可以为终端内的芯片,所述芯片包括:处理单元和通信单元,所述处理单元例如可以是处理器,所述处理器可以是前文所述的各种类型的处理器780。所述通信单元例如可以是输入/输出接口、管脚或电路等,所述通信单元包括系统总线。可选地,所述芯片还包括存储单元,所述存储单元可以是所述芯片内部的存储器,例如寄存器、缓存、随机存取存储器(random access memory,RAM)、EEPROM或者FLASH等;所述存储单元还可以是位于所述芯片外部的存储器,该存储器可以是前文所述的各种类型的存储器720。处理器连接到存储器,该处理器可以运行存储器存储的指令,以使该芯片装置执行上述图2和图4所示的方法。In the embodiment of the present invention, the chip device may be a chip in the terminal, the chip includes: a processing unit and a communication unit, and the processing unit may be, for example, a processor, and the processor may be various types as described above. Processor 780. The communication unit may be, for example, an input/output interface, a pin or a circuit, etc., and the communication unit includes a system bus. Optionally, the chip further includes a storage unit, where the storage unit may be a memory inside the chip, such as a register, a cache, a random access memory (RAM), an EEPROM or a FLASH, etc.; The unit may also be a memory located external to the chip, which may be various types of memory 720 as previously described. The processor is coupled to a memory that can execute instructions stored in the memory to cause the chip device to perform the methods illustrated in Figures 2 and 4 above.
在本发明的上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。In the above-described embodiments of the present invention, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product.
所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device. The computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.). The computer readable storage medium can be any available media that can be stored by a computer or a data storage device such as a server, data center, or the like that includes one or more available media. The usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).
以上所述的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细 说明。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 The specific embodiments described above further detail the object, technical solution and beneficial effects of the present invention. Description. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims (47)

  1. 一种伪基站识别方法,其特征在于,包括:A pseudo base station identification method, comprising:
    终端选择目标小区;The terminal selects a target cell;
    所述终端根据所述目标小区的特征数据运行伪基站识别算法,得到置信度,所述置信度用于表示所述目标小区的基站为伪基站的可信程度,所述伪基站识别算法由机器学习算法训练所产生;The terminal runs a pseudo base station identification algorithm according to the feature data of the target cell, and obtains a confidence level, where the confidence level is used to indicate that the base station of the target cell is a trusted base station, and the pseudo base station identification algorithm is determined by a machine. Learning algorithm training produced;
    当所述置信度大于或等于第一置信度阈值时,所述终端确定所述目标小区的基站为伪基站。When the confidence is greater than or equal to the first confidence threshold, the terminal determines that the base station of the target cell is a pseudo base station.
  2. 根据权利要求1所述的方法,其特征在于,The method of claim 1 wherein
    在所述终端根据所述目标小区的特征数据运行伪基站识别算法,得到置信度之后,所述方法还包括:After the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell, and the confidence is obtained, the method further includes:
    当所述置信度小于所述第一置信度阈值且所述置信度大于或等于第二置信度阈值,且所述终端检测到所述目标小区满足第一预设条件时,所述终端确定所述目标小区的基站为伪基站。When the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, the terminal determines The base station of the target cell is a pseudo base station.
  3. 根据权利要求2所述的方法,其特征在于,The method of claim 2 wherein:
    所述当所述置信度小于所述第一置信度阈值且所述置信度大于或等于第二置信度阈值,且所述终端检测到所述目标小区满足第一预设条件时,所述终端确定所述目标小区的基站为伪基站,包括:When the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, the terminal Determining that the base station of the target cell is a pseudo base station, including:
    当所述置信度小于所述第一置信度阈值且所述置信度大于或等于第二置信度阈值,且所述终端检测到所述目标小区满足第一预设条件时,所述终端保存所述目标小区的特征数据,所述目标小区的特征数据被标识为伪基站数据。When the confidence is less than the first confidence threshold and the confidence is greater than or equal to the second confidence threshold, and the terminal detects that the target cell meets the first preset condition, the terminal saves the location Characteristic data of the target cell, the feature data of the target cell is identified as pseudo base station data.
  4. 根据权利要求3所述的方法,其特征在于,The method of claim 3 wherein:
    所述终端保存所述目标小区的特征数据,包括:The terminal saves feature data of the target cell, including:
    当伪基站数据保存功能开启时,所述终端保存所述目标小区的特征数据;或者,When the pseudo base station data saving function is enabled, the terminal saves feature data of the target cell; or
    当所述目标小区满足伪基站数据保存规则时,所述终端保存所述目标小区的特征数据;或者,When the target cell satisfies the pseudo base station data retention rule, the terminal saves the feature data of the target cell; or
    当伪基站数据保存功能开启,且所述目标小区满足伪基站数据保存规则时,所述终端保存所述目标小区的特征数据。When the pseudo base station data saving function is enabled, and the target cell satisfies the pseudo base station data storage rule, the terminal saves the feature data of the target cell.
  5. 根据权利要求2-4任一项所述的方法,其特征在于,A method according to any of claims 2-4, characterized in that
    所述第一预设条件包括至少一个以下条件:The first preset condition includes at least one of the following conditions:
    所述终端拦截到所述目标小区发送的问题短信;The terminal intercepts a problem message sent by the target cell;
    所述终端向所述目标小区发起位置区域更新请求时被拒绝;The terminal is rejected when initiating a location area update request to the target cell;
    所述终端向所述目标小区发起业务请求时被拒绝;The terminal is rejected when initiating a service request to the target cell;
    所述终端在预设时间内丢失所述目标小区信号;或者,The terminal loses the target cell signal within a preset time; or
    所述目标小区的位置区码LAC发生改变。The location area code LAC of the target cell changes.
  6. 根据权利要求1-5任一项所述的方法,其特征在于,A method according to any one of claims 1 to 5, wherein
    在所述终端根据所述目标小区的特征数据运行伪基站识别算法,得到置信度之后,所 述方法还包括:After the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell, and obtains the confidence level, the The method also includes:
    当所述置信度小于或等于第四置信度阈值时,所述终端通过所述目标小区执行预设操作,其中,所述预设操作包括网络注册、位置区域更新、小区驻留和发起业务请求中的任意一项。When the confidence is less than or equal to a fourth confidence threshold, the terminal performs a preset operation by using the target cell, where the preset operation includes network registration, location area update, cell camping, and initiation of a service request. Any of them.
  7. 根据权利要求1所述的方法,其特征在于,The method of claim 1 wherein
    在所述终端根据所述目标小区的特征数据运行伪基站识别算法,得到置信度之后,所述方法还包括:After the terminal runs the pseudo base station identification algorithm according to the feature data of the target cell, and the confidence is obtained, the method further includes:
    当所述置信度大于第四置信度阈值且所述置信度小于或等于第三置信度阈值,且所述终端检测到所述目标小区满足第二预设条件时,所述终端确定所述目标小区的基站为真基站。When the confidence is greater than a fourth confidence threshold and the confidence is less than or equal to a third confidence threshold, and the terminal detects that the target cell meets a second preset condition, the terminal determines the target The base station of the cell is a true base station.
  8. 根据权利要求7所述的方法,其特征在于,The method of claim 7 wherein:
    所述当所述置信度大于所述第四置信度阈值且所述置信度小于或等于第三置信度阈值,且所述终端检测到所述目标小区满足第二预设条件时,所述终端确定所述目标小区的基站为真基站,包括:When the confidence level is greater than the fourth confidence threshold and the confidence is less than or equal to a third confidence threshold, and the terminal detects that the target cell meets a second preset condition, the terminal Determining that the base station of the target cell is a true base station, including:
    当所述置信度大于所述第四置信度阈值且所述置信度小于或等于第三置信度阈值,且所述终端检测到所述目标小区满足第二预设条件时,所述终端保存所述目标小区的特征数据,所述目标小区的特征数据被标识为真基站数据。When the confidence level is greater than the fourth confidence threshold and the confidence is less than or equal to the third confidence threshold, and the terminal detects that the target cell meets the second preset condition, the terminal saves the location Characteristic data of the target cell, the feature data of the target cell is identified as true base station data.
  9. 根据权利要求8所述的方法,其特征在于,The method of claim 8 wherein:
    所述终端保存所述目标小区的特征数据,包括:The terminal saves feature data of the target cell, including:
    当真基站数据保存功能开启时,所述终端保存所述目标小区的特征数据;或者,When the true base station data saving function is enabled, the terminal saves feature data of the target cell; or
    当所述目标小区满足真基站数据保存规则时,所述终端保存所述目标小区的特征数据;或者,When the target cell satisfies the true base station data retention rule, the terminal saves the feature data of the target cell; or
    当真基站数据保存功能开启,且所述目标小区满足真基站数据保存规则时,所述终端保存所述目标小区的特征数据。When the true base station data saving function is enabled, and the target cell satisfies the true base station data saving rule, the terminal saves the feature data of the target cell.
  10. 根据权利要求7-9任一项所述的方法,其特征在于,A method according to any one of claims 7-9, characterized in that
    所述第二预设条件包括至少一个以下条件:The second preset condition includes at least one of the following conditions:
    所述终端在所述目标小区建立通话或者数据业务;The terminal establishes a call or data service in the target cell;
    所述终端通过所述目标小区完成认证并进入加密安全模式;或者,The terminal completes the authentication by using the target cell and enters an encryption security mode; or
    所述终端在所述目标小区完成切换。The terminal completes handover at the target cell.
  11. 根据权利要求1-10任一项所述的方法,其特征在于,A method according to any one of claims 1 to 10, wherein
    所述目标小区为全球移动通信系统GSM小区。The target cell is a Global System for Mobile Communications (GSM) cell.
  12. 根据权利要求1-11任一项所述的方法,其特征在于,A method according to any one of claims 1-11, wherein
    所述终端根据所述目标小区的特征数据运行伪基站识别算法,得到置信度,包括:The terminal runs a pseudo base station identification algorithm according to the feature data of the target cell, and obtains a confidence level, including:
    当所述终端检测到所述目标小区的LAC和当前保存的LAC不相同时,所述终端根据所述目标小区的特征数据运行伪基站识别算法,得到置信度。When the terminal detects that the LAC of the target cell is different from the currently saved LAC, the terminal runs a pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level.
  13. 根据权利要求1-12任一项所述的方法,其特征在于,Method according to any of claims 1-12, characterized in that
    在所述终端确定所述目标小区的基站为伪基站之后,所述方法还包括: After the terminal determines that the base station of the target cell is a pseudo base station, the method further includes:
    所述终端在预设时长内禁止再次选择所述目标小区。The terminal prohibits selecting the target cell again within a preset time period.
  14. 根据权利要求1-13任一项所述的方法,其特征在于,A method according to any one of claims 1 to 13, wherein
    所述特征数据包括小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信息的至少一种。The feature data includes at least one of cell selection and cell reselection information, networking information, service function information, area information, and time information.
  15. 一种终端,其特征在于,包括:A terminal, comprising:
    选择单元,用于选择目标小区;a selection unit for selecting a target cell;
    运行单元,用于根据所述目标小区的特征数据运行伪基站识别算法,得到置信度,所述置信度用于表示所述目标小区的基站为伪基站的可信程度,所述伪基站识别算法由机器学习算法训练所产生;An operation unit, configured to run a pseudo base station identification algorithm according to the feature data of the target cell, to obtain a confidence level, where the confidence level is used to indicate that the base station of the target cell is a trusted base station, and the pseudo base station identification algorithm Generated by machine learning algorithm training;
    确定单元,用于当所述置信度大于或等于第一置信度阈值时,确定所述目标小区的基站为伪基站。And a determining unit, configured to determine, when the confidence level is greater than or equal to the first confidence threshold, that the base station of the target cell is a pseudo base station.
  16. 根据权利要求15所述的终端,其特征在于,The terminal of claim 15 wherein:
    所述确定单元,还用于当所述置信度小于所述第一置信度阈值且所述置信度大于或等于第二置信度阈值,且所述终端检测到所述目标小区满足第一预设条件时,确定所述目标小区的基站为伪基站。The determining unit is further configured to: when the confidence is less than the first confidence threshold and the confidence is greater than or equal to a second confidence threshold, and the terminal detects that the target cell meets the first preset When the condition is met, the base station of the target cell is determined to be a pseudo base station.
  17. 根据权利要求16所述的终端,其特征在于,The terminal of claim 16 wherein:
    所述确定单元包括保存模块;The determining unit includes a saving module;
    所述保存模块,用于当所述置信度小于所述第一置信度阈值且所述置信度大于或等于第二置信度阈值,且所述终端检测到所述目标小区满足第一预设条件时,保存所述目标小区的特征数据,所述目标小区的特征数据被标识为伪基站数据。The saving module is configured to: when the confidence is less than the first confidence threshold and the confidence is greater than or equal to a second confidence threshold, and the terminal detects that the target cell meets a first preset condition And storing feature data of the target cell, where the feature data of the target cell is identified as pseudo base station data.
  18. 根据权利要求17所述的终端,其特征在于,The terminal according to claim 17, wherein
    所述保存模块,还用于当伪基站数据保存功能开启时,保存所述目标小区的特征数据;或者,当所述目标小区满足伪基站数据保存规则时,保存所述目标小区的特征数据;或者,当伪基站数据保存功能开启,且所述目标小区满足伪基站数据保存规则时,保存所述目标小区的特征数据。The saving module is further configured to: when the pseudo base station data saving function is enabled, save the feature data of the target cell; or, when the target cell satisfies the pseudo base station data saving rule, save the feature data of the target cell; Or, when the pseudo base station data saving function is enabled, and the target cell satisfies the pseudo base station data saving rule, the feature data of the target cell is saved.
  19. 根据权利要求16-18任一项所述的终端,其特征在于,A terminal according to any one of claims 16-18, characterized in that
    所述第一预设条件包括至少一个以下条件:The first preset condition includes at least one of the following conditions:
    所述终端拦截到所述目标小区发送的问题短信;The terminal intercepts a problem message sent by the target cell;
    所述终端向所述目标小区发起位置区域更新请求时被拒绝;The terminal is rejected when initiating a location area update request to the target cell;
    所述终端向所述目标小区发起业务请求时被拒绝;The terminal is rejected when initiating a service request to the target cell;
    所述终端在预设时间内丢失所述目标小区信号;或者,The terminal loses the target cell signal within a preset time; or
    所述目标小区的位置区码LAC发生改变。The location area code LAC of the target cell changes.
  20. 根据权利要求15-19任一项所述的终端,其特征在于,A terminal according to any one of claims 15 to 19, characterized in that
    所述终端还包括:The terminal further includes:
    执行单元,用于当所述置信度小于或等于第四置信度阈值时,通过所述目标小区执行预设操作,其中,所述预设操作包括网络注册、位置区域更新、小区驻留和发起业务请求中的任意一项。 An execution unit, configured to perform a preset operation by using the target cell when the confidence is less than or equal to a fourth confidence threshold, where the preset operation includes network registration, location area update, cell camping, and initiation Any of the business requests.
  21. 根据权利要求15所述的终端,其特征在于,The terminal of claim 15 wherein:
    所述确定单元,还用于当所述置信度大于第四置信度阈值且所述置信度小于或等于第三置信度阈值,且所述终端检测到所述目标小区满足第二预设条件时,确定所述目标小区的基站为真基站。The determining unit is further configured to: when the confidence is greater than a fourth confidence threshold and the confidence is less than or equal to a third confidence threshold, and the terminal detects that the target cell meets a second preset condition Determining that the base station of the target cell is a true base station.
  22. 根据权利要求21所述的终端,其特征在于,The terminal according to claim 21, characterized in that
    所述确定单元,包括保存模块;The determining unit includes a saving module;
    所述保存模块,用于当所述置信度大于所述第四置信度阈值且所述置信度小于或等于第三置信度阈值,且所述终端检测到所述目标小区满足第二预设条件时,保存所述目标小区的特征数据,所述目标小区的特征数据被标识为真基站数据。The saving module is configured to: when the confidence level is greater than the fourth confidence threshold, and the confidence is less than or equal to a third confidence threshold, and the terminal detects that the target cell meets a second preset condition And storing feature data of the target cell, where the feature data of the target cell is identified as true base station data.
  23. 根据权利要求22所述的终端,其特征在于,The terminal according to claim 22, characterized in that
    所述保存模块,还用于当真基站数据保存功能开启时,保存所述目标小区的特征数据;或者,当所述目标小区满足真基站数据保存规则时,保存所述目标小区的特征数据;或者,当真基站数据保存功能开启,且所述目标小区满足真基站数据保存规则时,保存所述目标小区的特征数据。The saving module is further configured to: save the feature data of the target cell when the true base station data saving function is enabled; or save the feature data of the target cell when the target cell satisfies the true base station data saving rule; or And when the true base station data saving function is enabled, and the target cell satisfies the true base station data saving rule, the feature data of the target cell is saved.
  24. 根据权利要求21-23任一项所述的终端,其特征在于,A terminal according to any one of claims 21 to 23, characterized in that
    所述第二预设条件包括至少一个以下条件:The second preset condition includes at least one of the following conditions:
    所述终端在所述目标小区建立通话或者数据业务;The terminal establishes a call or data service in the target cell;
    所述终端通过所述目标小区完成认证并进入加密安全模式;或者,The terminal completes the authentication by using the target cell and enters an encryption security mode; or
    所述终端在所述目标小区完成切换。The terminal completes handover at the target cell.
  25. 根据权利要求15-24任一项所述的终端,其特征在于,A terminal according to any one of claims 15 to 24, characterized in that
    所述目标小区为全球移动通信系统GSM小区。The target cell is a Global System for Mobile Communications (GSM) cell.
  26. 根据权利要求15-25任一项所述的终端,其特征在于,A terminal according to any one of claims 15 to 25, characterized in that
    所述运行单元,还用于当所述终端检测到所述目标小区的LAC和当前保存的LAC不相同时,根据所述目标小区的特征数据运行伪基站识别算法,得到置信度。The operating unit is further configured to: when the terminal detects that the LAC of the target cell is different from the currently saved LAC, run the pseudo base station identification algorithm according to the feature data of the target cell, to obtain a confidence level.
  27. 根据权利要求15-26任一项所述的终端,其特征在于,A terminal according to any one of claims 15 to 26, characterized in that
    在所述终端确定所述目标小区的基站为伪基站之后,所述选择单元,还用于在预设时长内禁止再次选择所述目标小区。After the terminal determines that the base station of the target cell is a pseudo base station, the selecting unit is further configured to prohibit the target cell from being selected again within a preset time period.
  28. 根据权利要求15-27任一项所述的终端,其特征在于,A terminal according to any one of claims 15 to 27, characterized in that
    所述特征数据包括小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信息的至少一种。The feature data includes at least one of cell selection and cell reselection information, networking information, service function information, area information, and time information.
  29. 一种终端,其特征在于,包括:A terminal, comprising:
    处理器和存储器;Processor and memory;
    通过调用所述存储器存储的操作指令,所述处理器被设置使得所述终端执行如权利要求1-14任意一项所述的方法。The processor is arranged to cause the terminal to perform the method of any of claims 1-14 by invoking an operational instruction stored by the memory.
  30. 一种芯片装置,其特征在于,所述装置包括处理单元;A chip device, characterized in that the device comprises a processing unit;
    其中,所述处理单元,用于执行如权利要求1-14任一项所述的方法。The processing unit is configured to perform the method according to any one of claims 1-14.
  31. 一种芯片装置,其特征在于,包括: A chip device, comprising:
    处理器和存储器;Processor and memory;
    所述存储器包括指令,所述处理器运行所述指令以用于:The memory includes instructions that the processor runs to:
    选择目标小区;Select the target cell;
    根据所述目标小区的特征数据运行伪基站识别算法,得到置信度,所述置信度用于表示所述目标小区的基站为伪基站的可信程度,所述伪基站识别算法由机器学习算法训练所产生;Performing a pseudo base station identification algorithm according to the feature data of the target cell to obtain a confidence level, where the confidence level is used to indicate that the base station of the target cell is a trusted base station, and the pseudo base station identification algorithm is trained by a machine learning algorithm. Produced
    当所述置信度大于或等于第一置信度阈值时,确定所述目标小区的基站为伪基站。When the confidence is greater than or equal to the first confidence threshold, determining that the base station of the target cell is a pseudo base station.
  32. 根据权利要求31所述的芯片装置,其特征在于,The chip device according to claim 31, wherein
    所述处理器,还用于当所述置信度小于所述第一置信度阈值且所述置信度大于或等于第二置信度阈值,且检测到所述目标小区满足第一预设条件时,确定所述目标小区的基站为伪基站。The processor is further configured to: when the confidence is less than the first confidence threshold and the confidence is greater than or equal to a second confidence threshold, and detecting that the target cell meets a first preset condition, Determining that the base station of the target cell is a pseudo base station.
  33. 根据权利要求32所述的芯片装置,其特征在于,A chip device according to claim 32, wherein
    所述处理器,还用于:当所述置信度小于所述第一置信度阈值且所述置信度大于或等于第二置信度阈值,且检测到所述目标小区满足第一预设条件时,保存所述目标小区的特征数据,所述目标小区的特征数据被标识为伪基站数据。The processor is further configured to: when the confidence level is less than the first confidence threshold and the confidence is greater than or equal to a second confidence threshold, and detecting that the target cell meets a first preset condition And storing feature data of the target cell, where the feature data of the target cell is identified as pseudo base station data.
  34. 根据权利要求33所述的芯片装置,其特征在于,A chip device according to claim 33, wherein
    所述处理器保存所述目标小区的特征数据,包括:The processor saves feature data of the target cell, including:
    当伪基站数据保存功能开启时,所述处理器保存所述目标小区的特征数据;或者,When the pseudo base station data saving function is enabled, the processor saves feature data of the target cell; or
    当所述目标小区满足伪基站数据保存规则时,所述处理器保存所述目标小区的特征数据;或者,When the target cell satisfies the pseudo base station data saving rule, the processor saves the feature data of the target cell; or
    当伪基站数据保存功能开启,且所述目标小区满足伪基站数据保存规则时,所述处理器保存所述目标小区的特征数据。When the pseudo base station data saving function is enabled, and the target cell satisfies the pseudo base station data saving rule, the processor saves the feature data of the target cell.
  35. 根据权利要求32-34任一项所述的芯片装置,其特征在于,A chip device according to any one of claims 32 to 34, characterized in that
    所述第一预设条件包括至少一个以下条件:The first preset condition includes at least one of the following conditions:
    所述处理器拦截到所述目标小区发送的问题短信;The processor intercepts a problem message sent by the target cell;
    所述处理器向所述目标小区发起位置区域更新请求时被拒绝;The processor is rejected when initiating a location area update request to the target cell;
    所述处理器向所述目标小区发起业务请求时被拒绝;The processor is rejected when initiating a service request to the target cell;
    所述处理器在预设时间内丢失所述目标小区信号;或者,The processor loses the target cell signal within a preset time; or
    所述目标小区的位置区码LAC发生改变。The location area code LAC of the target cell changes.
  36. 根据权利要求31-35任一项所述的芯片装置,其特征在于,A chip device according to any one of claims 31 to 35, wherein
    所述处理器,还用于当所述置信度小于或等于第四置信度阈值时,通过所述目标小区执行预设操作,所述预设操作包括网络注册、位置区域更新、小区驻留和发起业务请求中的任意一项。The processor is further configured to perform a preset operation by using the target cell when the confidence is less than or equal to a fourth confidence threshold, where the preset operation includes network registration, location area update, cell camping, and Initiate any of the business requests.
  37. 根据权利要求31所述的芯片装置,其特征在于,The chip device according to claim 31, wherein
    所述处理器,还用于当所述置信度大于第四置信度阈值且所述置信度小于或等于第三置信度阈值,且检测到所述目标小区满足第二预设条件时,确定所述目标小区的基站为真基站。 The processor is further configured to: when the confidence is greater than a fourth confidence threshold and the confidence is less than or equal to a third confidence threshold, and the target cell is detected to meet a second preset condition, determine The base station of the target cell is a true base station.
  38. 根据权利要求37所述的芯片装置,其特征在于A chip device according to claim 37, wherein
    所述处理器,还用于当所述置信度大于所述第四置信度阈值且所述置信度小于或等于第三置信度阈值,且检测到所述目标小区满足第二预设条件时,保存所述目标小区的特征数据,所述目标小区的特征数据被标识为真基站数据。The processor is further configured to: when the confidence is greater than the fourth confidence threshold and the confidence is less than or equal to a third confidence threshold, and detecting that the target cell meets a second preset condition, The feature data of the target cell is saved, and the feature data of the target cell is identified as true base station data.
  39. 根据权利要求38所述的芯片装置,其特征在于,A chip device according to claim 38, wherein
    所述处理器,还用于:The processor is further configured to:
    当真基站数据保存功能开启时,保存所述目标小区的特征数据;或者,When the true base station data saving function is enabled, the feature data of the target cell is saved; or
    当所述目标小区满足真基站数据保存规则时,保存所述目标小区的特征数据;或者,Saving the feature data of the target cell when the target cell satisfies the true base station data retention rule; or
    当真基站数据保存功能开启,且所述目标小区满足真基站数据保存规则时,保存所述目标小区的特征数据。When the true base station data saving function is enabled, and the target cell satisfies the true base station data storage rule, the feature data of the target cell is saved.
  40. 根据权利要求37-39任一项所述的芯片装置,其特征在于,A chip device according to any one of claims 37 to 39, characterized in that
    所述第二预设条件包括至少一个以下条件:The second preset condition includes at least one of the following conditions:
    所述处理器在所述目标小区建立通话或者数据业务;The processor establishes a call or data service in the target cell;
    所述处理器通过所述目标小区完成认证并进入加密安全模式;或者,The processor completes authentication through the target cell and enters an encryption security mode; or
    所述处理器在所述目标小区完成切换。The processor completes the handover at the target cell.
  41. 根据权利要求31-40任一项所述的芯片装置,其特征在于,A chip device according to any one of claims 31 to 40, characterized in that
    所述处理器,还用于当检测到所述目标小区的LAC和当前保存的LAC不相同时,根据所述目标小区的特征数据运行伪基站识别算法,得到置信度。The processor is further configured to: when detecting that the LAC of the target cell is different from the currently saved LAC, run a pseudo base station identification algorithm according to the feature data of the target cell, to obtain a confidence level.
  42. 根据权利要求31-41任一项所述的芯片装置,其特征在于,A chip device according to any one of claims 31 to 41, wherein
    所述处理器,还用于在确定所述目标小区的基站为伪基站之后,在预设时长内禁止再次选择所述目标小区。The processor is further configured to, after determining that the base station of the target cell is a pseudo base station, prohibit to select the target cell again within a preset time period.
  43. 根据权利要求31-42任一项所述的芯片装置,其特征在于,A chip device according to any one of claims 31 to 42, wherein
    所述处理器,还用于在预设时长内禁止再次选择所述目标小区。The processor is further configured to prohibit the target cell from being selected again within a preset duration.
  44. 根据权利要求31-43任一项所述的芯片装置,其特征在于,A chip device according to any of claims 31-43, characterized in that
    所述特征数据包括小区选择和小区重选信息、组网信息、业务功能信息、地域信息和时间信息的至少一种。The feature data includes at least one of cell selection and cell reselection information, networking information, service function information, area information, and time information.
  45. 一种计算机程序,包括指令,当其在计算机上运行时,使得计算机执行如权利要求1-14任一项所述的方法。A computer program comprising instructions which, when run on a computer, cause the computer to perform the method of any of claims 1-14.
  46. 一种计算机可读存储介质,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求1-14任一项所述的方法。A computer readable storage medium comprising instructions which, when executed on a computer, cause the computer to perform the method of any of claims 1-14.
  47. 一种包含指令的计算机程序产品,当所述指令在计算机上运行时,使得计算机执行如权利要求1-14任一项所述的方法。 A computer program product comprising instructions which, when executed on a computer, cause the computer to perform the method of any of claims 1-14.
PCT/CN2017/101088 2017-09-08 2017-09-08 Pseudo base station identification method and terminal WO2019047170A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/101088 WO2019047170A1 (en) 2017-09-08 2017-09-08 Pseudo base station identification method and terminal
CN201780083714.5A CN110178395A (en) 2017-09-08 2017-09-08 Pseudo-base station recognition methods and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/101088 WO2019047170A1 (en) 2017-09-08 2017-09-08 Pseudo base station identification method and terminal

Publications (1)

Publication Number Publication Date
WO2019047170A1 true WO2019047170A1 (en) 2019-03-14

Family

ID=65634716

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/101088 WO2019047170A1 (en) 2017-09-08 2017-09-08 Pseudo base station identification method and terminal

Country Status (2)

Country Link
CN (1) CN110178395A (en)
WO (1) WO2019047170A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113490217A (en) * 2021-09-08 2021-10-08 中国科学院信息工程研究所 Detection method and system for 4G and 5G pseudo base stations

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110880020B (en) * 2019-10-30 2022-10-25 西安交通大学 Self-adaptive trans-regional base station energy consumption model migration and compensation method
CN111093200A (en) * 2019-12-18 2020-05-01 中国移动通信集团内蒙古有限公司 Cell residence method, terminal, first server, computing device and medium
CN113329323B (en) * 2020-02-28 2022-11-01 中国电信股份有限公司 Method and system for estimating pseudo base station position

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007001660A2 (en) * 2005-06-28 2007-01-04 Microsoft Corporation Positioning service utilizing existing radio base stations
CN103763690A (en) * 2014-01-28 2014-04-30 北京奇虎科技有限公司 Method and device for sending short messages to mobile terminal from detection fake base station
CN104053156A (en) * 2014-04-28 2014-09-17 中国石油大学(华东) Automatic pseudo base station recognizing method and system
CN104244289A (en) * 2014-09-09 2014-12-24 北京金山安全软件有限公司 Method and device for identifying pseudo base station
CN104683984A (en) * 2015-03-11 2015-06-03 无锡北邮感知技术产业研究院有限公司 Wireless communication signal real-time monitoring and processing method and system
CN105744527A (en) * 2016-03-28 2016-07-06 河海大学 Pseudo base station detection method and system based on big data and cloud computing
CN105848158A (en) * 2016-04-29 2016-08-10 中国科学院信息工程研究所 Pseudo base station judging method and device
CN105959954A (en) * 2016-04-25 2016-09-21 努比亚技术有限公司 Pseudo base station identification method, pseudo base station identification device, and terminal
CN106851654A (en) * 2017-04-13 2017-06-13 广东欧珀移动通信有限公司 Pseudo-base station recognition methods, device and terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106332086B (en) * 2015-06-30 2019-06-04 中国科学院上海高等研究院 A kind of pseudo-base station recognition methods based on Bayesian model
CN105873178A (en) * 2016-05-06 2016-08-17 北京奇虎科技有限公司 Method and device for recognizing pseudo base-station
CN106131850A (en) * 2016-06-27 2016-11-16 乐视控股(北京)有限公司 A kind of pseudo-base station recognition methods and equipment
CN106060830A (en) * 2016-08-11 2016-10-26 努比亚技术有限公司 Pseudo base station identification method and device, and terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007001660A2 (en) * 2005-06-28 2007-01-04 Microsoft Corporation Positioning service utilizing existing radio base stations
CN103763690A (en) * 2014-01-28 2014-04-30 北京奇虎科技有限公司 Method and device for sending short messages to mobile terminal from detection fake base station
CN104053156A (en) * 2014-04-28 2014-09-17 中国石油大学(华东) Automatic pseudo base station recognizing method and system
CN104244289A (en) * 2014-09-09 2014-12-24 北京金山安全软件有限公司 Method and device for identifying pseudo base station
CN104683984A (en) * 2015-03-11 2015-06-03 无锡北邮感知技术产业研究院有限公司 Wireless communication signal real-time monitoring and processing method and system
CN105744527A (en) * 2016-03-28 2016-07-06 河海大学 Pseudo base station detection method and system based on big data and cloud computing
CN105959954A (en) * 2016-04-25 2016-09-21 努比亚技术有限公司 Pseudo base station identification method, pseudo base station identification device, and terminal
CN105848158A (en) * 2016-04-29 2016-08-10 中国科学院信息工程研究所 Pseudo base station judging method and device
CN106851654A (en) * 2017-04-13 2017-06-13 广东欧珀移动通信有限公司 Pseudo-base station recognition methods, device and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113490217A (en) * 2021-09-08 2021-10-08 中国科学院信息工程研究所 Detection method and system for 4G and 5G pseudo base stations
CN113490217B (en) * 2021-09-08 2022-01-04 中国科学院信息工程研究所 Detection method and system for 4G and 5G pseudo base stations

Also Published As

Publication number Publication date
CN110178395A (en) 2019-08-27

Similar Documents

Publication Publication Date Title
CN105873178A (en) Method and device for recognizing pseudo base-station
US10462764B2 (en) Method and apparatus for identifying pseudo base-station, and terminal
CN109089297B (en) Network searching method and terminal
WO2019047170A1 (en) Pseudo base station identification method and terminal
US20210136585A1 (en) Detecting False Cell Towers
CN107257575A (en) Home (e) node identification, interference are reduced and energy saving
CN108200632A (en) A kind of method and terminal of terminal access LTE network
CN105704734A (en) Specified type cell detection method, device and communication terminal
CN111436088B (en) Cell reselection method, base station, user terminal and storage medium
CN106412255A (en) Terminal and display method
CN107071773A (en) A kind of internetwork connection establishing method and device
CN109275146A (en) A kind of pseudo-base station detection method, terminal and computer readable storage medium
CN106231600A (en) Terminal and information processing method
CN116321213A (en) Cell reselection method, terminal equipment and storage medium
CN112703755B (en) Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium
CN107529171B (en) Method for detecting terminal access pseudo base station and related product
WO2020087419A1 (en) False base station processing method and apparatus, mobile terminal, and storage medium
CN106385669A (en) Method and device for identifying pseudo base station
Huang et al. Developing xApps for Rogue Base Station Detection in SDR-Enabled O-RAN
CN105208208B (en) Network connection switchs deployment method and device
CN108391294A (en) A kind of method and mobile terminal of registered network
CN112771907B (en) Pseudo base station identification method, pseudo base station identification device, mobile terminal and storage medium
CN109548028B (en) Base station type identification method, device, terminal and computer readable storage medium
WO2020124388A1 (en) Cell interference detection method and device, mobile terminal and storage medium
CN106358196A (en) Terminal and information processing method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17924183

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17924183

Country of ref document: EP

Kind code of ref document: A1