WO2020034228A1 - Pseudo base station identification method and apparatus - Google Patents

Pseudo base station identification method and apparatus Download PDF

Info

Publication number
WO2020034228A1
WO2020034228A1 PCT/CN2018/101203 CN2018101203W WO2020034228A1 WO 2020034228 A1 WO2020034228 A1 WO 2020034228A1 CN 2018101203 W CN2018101203 W CN 2018101203W WO 2020034228 A1 WO2020034228 A1 WO 2020034228A1
Authority
WO
WIPO (PCT)
Prior art keywords
user equipment
cell
base station
message
pws
Prior art date
Application number
PCT/CN2018/101203
Other languages
French (fr)
Chinese (zh)
Inventor
卓超
刘涛
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2018/101203 priority Critical patent/WO2020034228A1/en
Priority to CN201880096528.XA priority patent/CN112567780B/en
Publication of WO2020034228A1 publication Critical patent/WO2020034228A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a method and a device for identifying a pseudo base station.
  • PWS public warning system
  • the purpose of the public warning system is to inform users in a timely and effective manner of emergency, such as earthquakes, tsunamis, hurricanes, fires, and terrorist attacks, through communication networks that have been set up, so that users can Take appropriate risk avoidance measures in time to reduce the impact of the disaster on the public, so as to achieve the purpose of early warning.
  • information related to disasters is usually notified by sending PWS messages to user equipment.
  • the base station can send a PWS message to the user equipment in the following way: When an unexpected situation needs to be notified to the user through the PWS message, the base station will send a search request to the user equipment. A Paging message to instruct the user equipment to receive the PWS message; after the user equipment receives the paging message, a modem in the user equipment receives the PWS message issued by the base station and sends it to the application processor (application processor, AP). The AP displays the content of the PWS message on the display interface of the user equipment.
  • application processor application processor
  • paging messages and system messages are sent in plain text, there will be cases of malicious forgery of PWS messages in actual applications, which will not only cause panic among the people, users The device will also cause power consumption problems due to receiving the PWS message.
  • a legitimate base station when a legitimate base station sends a system message (for example, a system message with a paging channel configuration) to the user equipment, it is sent in clear text. Therefore, a hacker can obtain the paging channel configuration of the legitimate base station, and search for a legitimate base station.
  • the paging channel interferes, and sends a paging message to the user equipment to instruct the user equipment to receive the PWS message and a fake PWS message (at this time, the PWS message received by the user equipment may be considered to be sent by a pseudo base station simulated by a hacker).
  • the pseudo base station may send a paging message to the user equipment to instruct the user equipment to receive a PWS message and a fake PWS message.
  • the paging message and the PWS message are both sent in plain text, and the user equipment cannot determine the source of the message through the plain text message, and thus cannot distinguish the authenticity of the PWS message.
  • the embodiments of the present application provide a method and a device for identifying a pseudo base station, which are used by a user equipment to identify a source of a message after receiving a paging message for instructing to receive a PWS message or after receiving a PWS message, so as to avoid receiving the fake PWS message.
  • an embodiment of the present application provides a method for identifying a pseudo base station. The method includes the following steps:
  • the user equipment receives a paging message sent by a base station to which the currently camping first cell belongs, and the paging message is used for the user equipment to receive a PWS message of the public early warning system; the user equipment determines that the message type of the PWS message is related to the service provided to the user equipment. Whether the type of PWS message supported by the operator is consistent; and when the message type of the PWS message is inconsistent with the type of PWS message supported by the operator providing the user equipment, the user equipment determines that the base station is a pseudo base station.
  • the message type of the PWS message may be used to indicate a system message block that carries the PWS message.
  • the message type of the PWS message received by the user equipment is any of the following: commercial mobile early warning system CMAS; earthquake and tsunami warning system ETWS; European public early warning system EU-Alert; Korean public early warning system KPAS; disaster and emergency early warning Network DEWN.
  • the user equipment may determine that the message type of the PWS message is inconsistent with the type of the PWS message supported by the operator that provides service to the user equipment.
  • the base station is a pseudo base station. Because the type of PWS messages supported by an operator is limited, when the paging message indicates that the type of PWS message received by the user equipment is a type that is not supported by the current operator, the user equipment can determine that the PWS message is not from the operator's network. That is, it is determined that the PWS message is a fake PWS message. Therefore, the method provided in the first aspect can accurately identify whether the base station is a fake base station (that is, judge the source of the PWS message), and then determine the authenticity of the PWS message to avoid the panic caused by the fake PWS message.
  • the user equipment may prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell. After seeing the prompt, the user will not cause panic because of the content of the PWS message.
  • the user equipment may determine the information supported by the operator according to the configuration information of the first cell and the message type configuration list.
  • PWS message type the message type configuration list is used to indicate the correspondence between at least one operator and the message type of the PWS message supported by the operator; then, the user equipment obtains the message type of the PWS message.
  • the configuration information of the first cell includes at least one of the following: a public land mobile network PLMN identification of the first cell; a tracking area code TAC of the first cell; a cell identification code CellID of the first cell; and location information of the first cell .
  • the PWS message types and PWS message message types supported by the operator that provides services for user equipment can be obtained, and then can be used to determine whether the types are the same.
  • the user equipment may add the cell information of the first cell to the forbidden camp list, and the forbidden camp list is used to indicate the user equipment It is forbidden to camp on the cell corresponding to the cell information recorded in the forbidden camping list.
  • the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a physical cell identification PCI of the first cell; and an absolute radio frequency channel number EARFCN of the first cell.
  • the user equipment After adding the cell information of the first cell to the forbidden camping list, the user equipment will no longer reside in the first cell, thereby preventing the user from staying in the pseudo base station cell for a long time and frequently receiving fake PWS messages.
  • the user equipment can perform a cell search in the current system; if the user equipment searches for an available cell in the current system, it camps on the cell according to the cell search result.
  • the second cell the cell information of the second cell is not recorded in the prohibited camping list.
  • the user equipment can perform network search again under the current system, so that the user equipment can camp on a legal base station cell for normal communication.
  • the user equipment after the user equipment performs a cell search in the current system, if the user equipment does not search for an available cell in the current system, it switches to a system other than the current system for the cell search, or The cell information of the first cell is deleted from the forbidden camping list, and the first cell is camped again.
  • switching to another system for cell search if there is no available cell under the current system can prevent the user equipment from camping on the pseudo base station cell; if the available cell is not available under the current system, the first cell is camped again. This can prevent the user equipment from having no available cells under the current system.
  • the user equipment may further update the message type configuration list.
  • the user equipment may update the message type configuration list in at least one of the following ways: the user equipment updates the message type configuration list according to an instruction of the base station; the user equipment updates the message type configuration list by querying the alarm server,
  • the alarm server is an application server that provides public warning services; the user device updates the message type configuration list through the software upgrade process of the user device; the user device updates the message type configuration list through the software upgrade process of the user identification SIM card in the user device .
  • the pseudo base station identification scheme provided in the first aspect fails to determine that the base station sending the paging message is a pseudo base station, another method may be used to determine again.
  • the following method can be further used to determine whether the base station is a pseudo base station: the user equipment identifies the content of the PWS message; in the PWS When the content of the message is spam, the user equipment determines that the base station is a pseudo base station.
  • the following method can be further used to determine whether the base station is a pseudo base station:
  • the user equipment When the user equipment is in a connected state, the user equipment and the alarm The server communicates, and the alarm server is an application server that provides public early warning services.
  • the user equipment determines that the base station is a pseudo base station if the query of the alarm server does not trigger the PWS message update or the PWS message is a tampered PWS message.
  • an embodiment of the present application provides a method for identifying a pseudo base station.
  • the method includes the following steps: a user equipment receives a PWS message sent by a base station to which a currently camping first cell belongs; the user equipment determines that the content of the PWS message is junk In the case of information, it is determined that the base station is a pseudo base station.
  • the user equipment may determine that the base station is a pseudo base station in a case where the content of the PWS message is determined to be spam. Since the alarm server does not push spam information to the user equipment through the operator's network, when the content of the PWS message is spam, the user equipment can determine that the PWS message does not come from the operator's network, that is, the PWS message is judged to be fake PWS message. Therefore, the method provided in the second aspect can accurately identify whether the base station is a fake base station (that is, judge the source of the PWS message), and then determine the authenticity of the PWS message to avoid the panic caused by the fake PWS message.
  • the user equipment may prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell. After seeing the prompt, the user will not cause panic because of the content of the PWS message.
  • the user equipment may receive a paging message sent by the base station, and the paging message is used to instruct the user equipment to receive PWS message.
  • the user equipment may receive the PWS message according to the indication of the paging message.
  • the user equipment may add the cell information of the first cell to the forbidden camping list, and the forbidden camping list is used to instruct the user equipment It is forbidden to camp on the cell corresponding to the cell information recorded in the forbidden camping list.
  • the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a physical cell identification PCI of the first cell; and an absolute radio frequency channel number EARFCN of the first cell.
  • the user equipment After adding the cell information of the first cell to the forbidden camping list, the user equipment will no longer reside in the first cell, thereby preventing the user from staying in the pseudo base station cell for a long time and frequently receiving fake PWS messages.
  • the user equipment can perform a cell search in the current system; if the user equipment searches for an available cell in the current system, it camps on the cell according to the cell search result.
  • the second cell the cell information of the second cell is not recorded in the prohibited camping list.
  • the user equipment can perform network search again under the current system, so that the user equipment can camp on a legal base station cell for normal communication.
  • the user equipment after the user equipment performs a cell search in the current system, if the user equipment does not search for an available cell in the current system, it switches to a system other than the current system for the cell search, or The cell information of the first cell is deleted from the forbidden camping list, and the first cell is camped again.
  • switching to another system to perform a cell search when there is no available cell in the current system can prevent the user equipment from camping on the pseudo base station cell; if the available cell is not available in the current system, the first cell is camped again. This can prevent the user equipment from having no available cells under the current system.
  • an embodiment of the present application provides a pseudo base station identification method.
  • the method includes the following steps: a user equipment receives a PWS message sent by a base station to which a first cell that currently resides; when the user equipment is in a connected state, the user equipment Communicate with the alarm server.
  • the alarm server is an application server that provides public warning services.
  • the user equipment determines that the base station is a pseudo base station if the alarm server does not trigger the PWS message update or the PWS message is a tampered PWS message. .
  • the user equipment after receiving the PWS message, the user equipment can actively communicate with the alarm server, and determine that the base station is false if the alarm server is not triggered to update the PWS message or the PWS message is a tampered PWS message.
  • Base station Since it is difficult for the pseudo base station to interfere with the communication initiated by the connected user equipment with the alarm server, the information obtained by the user equipment by querying the alarm server is non-interfering information. When the uninterfered information does not match the PWS message, it means that the PWS message is forged, that is, the base station is a fake base station. Therefore, the method provided in the third aspect can accurately identify whether the base station is a fake base station (that is, judge the source of the PWS message), and then determine the authenticity of the PWS message, thereby avoiding the panic caused by the fake PWS message.
  • the user equipment communicates with the alarm server in any of the following ways: the user equipment queries whether the alarm server triggers a PWS message update within the first set time period; the user equipment Query the content of the second PWS message sent by the alarm server last time, and compare the content of the second PWS message with the content of the PWS message; the user equipment instructs the alarm server to resend the third PWS sent last time by using asymmetric encryption and decryption Message and / or check code stream of the third PWS message; the user equipment compares the content of the third PWS message with the content of the PWS message, and / or, compares the check code stream of the third PWS message with the content of the PWS message Check the code stream for comparison.
  • the user equipment may prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell. After seeing the prompt, the user will not cause panic because of the content of the PWS message.
  • the user equipment may receive a paging message sent by the base station, and the paging message is used to instruct the user equipment to receive PWS message.
  • the user equipment may receive the PWS message according to the indication of the paging message.
  • the user equipment may add the cell information of the first cell to the forbidden camping list, and the forbidden camping list is used to indicate the user equipment. It is forbidden to camp on the cell corresponding to the cell information recorded in the forbidden camping list.
  • the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a physical cell identification PCI of the first cell; and an absolute radio frequency channel number EARFCN of the first cell.
  • the user equipment After adding the cell information of the first cell to the forbidden camping list, the user equipment will no longer reside in the first cell, thereby preventing the user from staying in the pseudo base station cell for a long time and frequently receiving fake PWS messages.
  • the user equipment can perform a cell search in the current system; if the user equipment searches for an available cell in the current system, it camps on the cell according to the cell search result.
  • the second cell the cell information of the second cell is not recorded in the prohibited camping list.
  • the user equipment can perform network search again under the current system, so that the user equipment can camp on a legal base station cell for normal communication.
  • the user equipment after the user equipment performs a cell search in the current system, if the user equipment does not search for an available cell in the current system, it switches to a system other than the current system for the cell search, or The cell information of the first cell is deleted from the forbidden camping list, and the first cell is camped again.
  • switching to another system to perform a cell search when there is no available cell in the current system can prevent the user equipment from camping on the pseudo base station cell; if the available cell is not available in the current system, the first cell is camped again. This can prevent the user equipment from having no available cells under the current system.
  • the following scheme can be used to determine whether the base station is a pseudo base station: The user equipment receives a message sent by the base station to which the first cell currently camping belongs. After the PWS message, if the user equipment is in an idle state, the user equipment triggers a chain establishment; the user equipment determines that the base station is a pseudo base station if the chain establishment fails.
  • the chain establishment between the user equipment and the base station is successful, so that the user equipment can be switched to a connected state for normal communication with the base station; while the user equipment resides in the In the case of a pseudo base station cell, since it is difficult for the pseudo base station to perform two-way authentication with the user equipment, if the user equipment actively initiates a chain establishment, the chain establishment may fail. Therefore, in the method provided in the third aspect, whether the base station is a legitimate base station may be determined by whether the user equipment triggers the establishment of the chain successfully.
  • the user equipment when the user equipment triggers the chain establishment, it may trigger the chain establishment after waiting for a second set time.
  • the second setting duration may be configured by the user equipment, may be configured by the network, or may be configured by the user equipment and the network together.
  • the following scheme can be used to further determine whether the base station is a pseudo base station: the user equipment communicates with the alarm server after the chain establishment is successful; the user equipment does not trigger the query when the alarm server is found When the PWS message is updated or it is found that the PWS message is a tampered PWS message, it is determined that the base station is a pseudo base station.
  • the success of the user equipment chain establishment may be as follows: the PWS message received by the user equipment is sent to the user equipment after the pseudo base station interferes with the paging channel of the legitimate base station; when the user equipment triggers the chain establishment, A legitimate base station will establish a connection with the user equipment. At this time, the user equipment can still query the alarm server to determine whether the previously received PWS message is a PWS message sent by a pseudo base station.
  • an embodiment of the present application provides a pseudo base station identification device, which is applied to user equipment and includes a transceiver module and a processing module.
  • the transceiver module is configured to receive a paging message sent by the base station to which the currently camping first cell belongs, and the paging message is used to instruct the user equipment to receive a public early warning system PWS message.
  • a processing module configured to determine whether a message type of the PWS message is consistent with a PWS message type supported by an operator serving a user equipment; a message type of the PWS message and a PWS message type supported by an operator serving the user equipment In the case of inconsistency, it is determined that the base station is a pseudo base station.
  • the message type of the PWS message is used to indicate a system message block that carries the PWS message.
  • the processing module is further configured to: before determining whether the message type of the PWS message is consistent with the PWS message type supported by the operator, determine according to the configuration information of the first cell and the message type configuration list The PWS message type supported by the operator.
  • the message type configuration list is used to indicate the correspondence between at least one operator and the message type of the PWS message supported by the operator; obtain the message type of the PWS message.
  • the processing module is further configured to: after determining whether the message type of the PWS message is consistent with the PWS message type supported by the operator, after the message type of the PWS message is consistent with the PWS message type supported by the operator In this case, the content of the PWS message is identified; then, if the content of the PWS message is spam, it is determined that the base station is a pseudo base station.
  • the processing module is further configured to: after determining whether the message type of the PWS message is consistent with the PWS message type supported by the operator, after the message type of the PWS message is consistent with the PWS message type supported by the operator In the case, when the user equipment is in the connected state, it communicates with the alarm server through the transceiver module.
  • the alarm server is an application server that provides public warning services. Then, the PWS message update is not triggered when the alarm server is queried or the PWS message is queried as In the case of a tampered PWS message, it is determined that the base station is a pseudo base station.
  • the processing module is further configured to: after determining that the base station is a pseudo base station, add the cell information of the first cell to a prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit camping on the prohibited The cell corresponding to the cell information recorded in the camping list.
  • the processing module is further configured to: after adding the cell information of the first cell to the forbidden camping list, perform a cell search in the current system; if an available cell is searched in the current system, according to the cell The search result is camped on the second cell, and the cell information of the second cell is not recorded in the prohibited camping list.
  • the processing module is further configured to: after performing a cell search, if no available cell is found in the current system, switch to a system other than the current system to perform a cell search; or, perform a cell search After searching, if no available cell is found in the current system, the cell information of the first cell is deleted from the forbidden camping list, and the first cell is camped again.
  • the processing module is further configured to: update the message type configuration list.
  • the processing module updates the message type configuration list in at least one of the following ways: the processing module updates the message type configuration list according to an instruction of the base station; the processing module queries the alarm server for the message type The configuration list is updated.
  • the alarm server is an application server that provides public warning services.
  • the processing module updates the message type configuration list through the software upgrade process of the user device.
  • the processing module updates the message through the software upgrade process of the user identification SIM card in the user device.
  • Type configuration list is updated.
  • the configuration information of the first cell includes at least one of the following: a public land mobile network PLMN identification of the first cell; a tracking area code TAC of the first cell; a cell identification code CellID of the first cell; Location information of the first cell.
  • the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a physical cell identifier PCI of the first cell; and an E- of the first cell UTRA absolute radio frequency channel number EARFCN.
  • the processing module is further configured to: after determining that the base station is a pseudo base station, prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
  • the message type of the PWS message is any of the following: commercial mobile early warning system CMAS; earthquake and tsunami warning system ETWS; European public early warning system EU-Alert; Korean public early warning system KPAS; disaster and emergency early warning network DEWN.
  • an embodiment of the present application provides a pseudo base station identification apparatus, which is characterized in that the apparatus is applied to user equipment and includes a transceiver module and a processing module.
  • the transceiver module is configured to receive a PWS message sent by the base station to which the currently camping first cell belongs.
  • a processing module is configured to determine that the base station is a pseudo base station when the content of the PWS message is judged as spam.
  • the transceiver module is further configured to: before receiving a PWS message sent by the base station to which the first cell currently resides, receive a paging message sent by the base station, the paging message is used to indicate a user The device receives a PWS message.
  • the processing module is further configured to: after determining that the base station is a pseudo base station, add the cell information of the first cell to a prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit camping on the prohibited The cell corresponding to the cell information recorded in the camping list.
  • the processing module is further configured to: after adding the cell information of the first cell to the forbidden camping list, perform a cell search in the current system; if an available cell is searched in the current system, according to The cell search result is camped on the second cell, and the cell information of the second cell is not recorded in the prohibited camping list.
  • the processing module is further configured to: after performing a cell search, if no available cell is found in the current system, switch to a system other than the current system to perform a cell search; or, perform a cell search After searching, if no available cell is found in the current system, the cell information of the first cell is deleted from the forbidden camping list, and the first cell is camped again.
  • the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
  • the processing module is further configured to: after determining that the base station is a pseudo base station, prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
  • an embodiment of the present application provides a pseudo base station identification apparatus, which is applied to user equipment and includes a transceiver module and a processing module.
  • the transceiver module is configured to receive a PWS message sent by a base station to which the currently camping first cell belongs.
  • the processing module is configured to communicate with the alarm server through the transceiver module when the user equipment is in a connected state, and the alarm server is an application server that provides a public early warning service.
  • the processing module is further configured to determine that the base station is a pseudo base station when the alarm server is not triggered to update the PWS message or the PWS message is a tampered PWS message.
  • the transceiver module is further configured to: before receiving a PWS message sent by the base station to which the currently camping first cell belongs, receive a paging message sent by the base station, and the paging message is used to indicate the user equipment Receive PWS messages.
  • the processing module when the processing module communicates with the alarm server through the transceiver module, the processing module is specifically used for: the processing module queries the alarm server whether to trigger the PWS message update within the first set time period through the transceiver module; or, the processing module Query the content of the second PWS message sent by the alarm server through the transceiver module, and compare the content of the second PWS message with the content of the PWS message; or, the processing module instructs the alarm server to re-use the asymmetric encryption and decryption method through the transceiver module Send the third PWS message and / or the checksum stream of the third PWS message sent last time; the processing module compares the content of the third PWS message with the content of the PWS message, and / or, compares the content of the third PWS message The check code stream is compared with the check code stream of the PWS message.
  • the processing module is further configured to: after determining that the base station is a pseudo base station, add the cell information of the first cell to a prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit camping on the prohibited The cell corresponding to the cell information recorded in the camping list.
  • the processing module is further configured to: after adding the cell information of the first cell to the forbidden camping list, perform a cell search in the current system; if an available cell is searched in the current system, according to the cell The search result is camped on the second cell, and the cell information of the second cell is not recorded in the prohibited camping list.
  • the processing module is further configured to: after performing a cell search, if no available cell is found in the current system, switch to a system other than the current system to perform a cell search; or, perform a cell search After searching, if no available cell is found in the current system, the cell information of the first cell is deleted from the forbidden camping list, and the first cell is camped again.
  • the processing module is further configured to: after receiving the PWS message sent by the base station to which the first cell currently resides, if the user equipment is in an idle state, triggering a chain establishment through the transceiver module; In the case of a chain failure, the base station is determined to be a pseudo base station.
  • the processing module is further configured to: after triggering the chain establishment, communicate with the alarm server through the transceiver module after the chain establishment is successful; when the query of the alarm server does not trigger the PWS message update or the query of the PWS message is When the tampered PWS message is determined, the base station is determined to be a pseudo base station.
  • the processing module triggers chain establishment through the transceiver module, including: the processing module triggers chain establishment through the transceiver module after waiting for the second set time.
  • the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
  • the processing module is further configured to: after determining that the base station is a pseudo base station, prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
  • an embodiment of the present application provides a pseudo base station identification device.
  • the device includes a processor, the processor is coupled to a memory, and reads an instruction in the memory, for executing the first aspect to the third aspect. Any of the aspects or any of the aspects design a method as described.
  • the pseudo base station identification device may be a user equipment or a chip in the user equipment.
  • the user equipment includes, but is not limited to, a smart phone, a smart watch, a tablet computer, a virtual reality (VR) device, an augmented reality (AR) device, a personal computer, a handheld computer, and a personal digital assistant.
  • a smart phone a smart watch, a tablet computer
  • a virtual reality (VR) device a virtual reality (VR) device
  • AR augmented reality
  • personal computer a handheld computer
  • personal digital assistant a personal digital assistant
  • an embodiment of the present application further provides a computer-readable storage medium for storing a program for executing a function designed in any one of the first to third aspects or any one of the aspects.
  • the program When the program is executed by a processor, it is used to implement the method described in any one of the first to third aspects or any one of the aspects.
  • the computer-readable storage medium provided in the eighth aspect may only be used to store a program used for the functions of the first aspect or any one of the designs of the first aspect, the second aspect or any of the designs of the second aspect
  • One of the programs used for the functions of the third aspect or the functions designed for the third aspect or any one of the third aspects may also store two or three of the above three types of programs. That is, when the program is called by the processor, it can be used to implement the method described in the first aspect or any one of the first aspects, and the method described in the second aspect or any one of the second aspects.
  • an embodiment of the present application provides a computer program product including a program code, and when the program code contained in the computer program product runs on a computer, the computer executes any one of the first to third aspects or any one of the foregoing aspects. Any of the aspects design the method described.
  • the computer can execute the method described in the first aspect or any one of the first aspects, the second aspect, or One or more of the three types of methods described in any one of the second aspect designing the method and the third aspect or any one of the third aspect designing the method.
  • the pseudo base station identification scheme provided in the embodiment of the present application is triggered after the user equipment receives the PWS message.
  • the PWS message is determined by identifying some characteristics of the PWS message and the subsequent interaction process between the user equipment and the base station. origin of.
  • the pseudo base station can also push false information by sending other types of messages to the user equipment, such as a cell broadcast service (CBS) message. Since this type of message (for example, CBS message) is similar to the transmission mode and transmission timing of PWS message, after receiving this type of message (for example, CBS message), the user equipment can also use a similar method to the above embodiment to Determine the source of the message.
  • CBS cell broadcast service
  • the embodiments of the present application can be used not only to judge the source of PWS messages, but also to judge the sources of other types of messages used by pseudo base stations to push false information. Since the judgment process is similar, the judgment of the source of the PWS message is taken as an example for description in the embodiment of the present application.
  • FIG. 1 is a schematic diagram of an application scenario according to an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a first pseudo base station identification method according to an embodiment of the present application
  • FIG. 3 is a schematic flowchart of a second pseudo base station identification method according to an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a third pseudo base station identification method according to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a fourth pseudo base station identification method according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a fifth pseudo base station identification method according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a user equipment according to an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of another user equipment according to an embodiment of the present application.
  • the 3GPP protocol specifies that a base station may send a PWS message to a user equipment by using a PWS message to notify the user when an unexpected situation occurs.
  • the base station may send a paging message to the user equipment.
  • the user equipment To instruct the user equipment to receive the PWS message; after receiving the paging message, the user equipment immediately receives the PWS message issued by the base station and displays the content of the PWS message on the display interface.
  • the PWS message can be regarded as one of the system messages.
  • the system message may include a master information block (master information block, MIB) and at least one system message block (system information block, SIB), such as SIB1, SIB2, SIB3, etc.
  • SIB1 includes information required for user equipment cell access and scheduling information of other SIBs.
  • MIB master information block
  • SIB1 system message block
  • SIB1 includes information required for user equipment cell access and scheduling information of other SIBs.
  • SIB1 includes information required for user equipment cell access and scheduling information of other SIBs.
  • SIB1 includes information required for user equipment cell access and scheduling information of other SIBs.
  • SIB1 includes information required for user equipment cell access and scheduling information of other SIBs.
  • SIB1 includes information required for user equipment cell access and scheduling information of other SIBs.
  • SIB1 includes information required for user equipment cell access and scheduling information of other SIBs.
  • SIB1 includes information required for user equipment cell access and scheduling information of other SIBs.
  • the manner in which the user equipment receives the PWS message may be: the user equipment first receives the MIB and then the SIB1, and the SIB1 carries scheduling information of the PWS message, and the scheduling information includes, but is not limited to, the message type of the PWS message and the system carrying the PWS message The indication information of the message block; the user equipment can obtain the scheduling information of the PWS message by parsing the SIB1, so as to receive the PWS message according to the scheduling information, for example, the system message block indicated by the scheduling information is received to obtain the PWS message.
  • Forged PWS messages convey false disaster information to users, which can easily cause users to panic.
  • receiving fake PWS messages will also cause power consumption issues for user equipment.
  • a legitimate base station sends a system message (for example, a system message carrying a paging channel configuration) to the user equipment, it is sent in clear text. Therefore, a hacker can obtain the paging channel configuration of a legitimate base station, and thus page the legitimate base station.
  • the channel performs interference, and sends a paging message to the user equipment to instruct the user equipment to receive the PWS message.
  • the user equipment After receiving the system message, the user equipment starts to receive the PWS message according to the PWS message, which is also a PWS message forged by a hacker. So far, the user equipment has received a fake PWS message.
  • the content of the PWS message usually contains information about the disaster that caused the panic. After receiving the PWS message, the public will cause unnecessary panic.
  • it is difficult for the user equipment to identify the source of the PWS message it will also cause the user equipment to frequently receive PWS messages forged by hackers, which will increase the power consumption of the user equipment.
  • the pseudo base station may send a paging message to the user equipment to instruct the user equipment to receive the PWS message.
  • the user equipment starts to receive the PWS message after receiving the PWS message, and the PWS message is also a PWS message forged by a hacker. So far, the user equipment has received a fake PWS message, and the content of the PWS message can be disaster information that caused panic among the people, or spam information (such as advertisements, fraud information, etc.).
  • the user equipment may cause the user to panic or cause the user equipment to receive spam information.
  • the user equipment will always reside in the pseudo base station cell and frequently receive fake PWS messages, thereby increasing the power consumption of the user equipment.
  • the user equipment cannot determine the source of the message through the plain text message. Therefore, when receiving the PWS message, the user equipment cannot distinguish the authenticity of the PWS message.
  • embodiments of the present application provide a method and apparatus for identifying a pseudo base station, which is used for user equipment to identify a source of a message after receiving a paging message for instructing to receive a PWS message, or to avoid receiving a forgery.
  • PWS messages cause panic problems for the people, while avoiding the frequent power consumption of user devices by receiving fake PWS messages.
  • the method and the device are based on the same inventive concept. Since the principle of the method and the device for solving the problem is similar, the implementation of the device and the method can be referred to each other, and duplicated details will not be repeated.
  • the embodiment of the present application can be applied to the communication system shown in FIG. 1.
  • the communication system includes an alarm server, a core network element, a base station, and user equipment.
  • the alarm server can be regarded as an application server, which can be a third-party application control platform, or it can be deployed in the operator's network to provide public warning services for user equipment in the communication system. It should be noted that the alarm server is only an expression used in the embodiments of the present application. In different network systems or network environments, the alarm server in the embodiments of the present application may be replaced with other expressions as long as the expression is used. It is sufficient to indicate a physical entity (or a virtual entity) that provides an alarm service to user equipment in the system. For example, the alarm server may also be replaced by a cell broadcast center (CBC), a cell broadcast entity (CBE), a mobile switching center (MSC), and other expressions.
  • CBC cell broadcast center
  • CBE cell broadcast entity
  • MSC mobile switching center
  • the core network element is used to deliver the PWS message sent by the alarm server to the base station, which is then sent by the base station to the user equipment.
  • the type of core network element used to receive the PWS message sent by the alarm server and sent to the base station may be different.
  • LTE long term evolution
  • the diagram The core network element in 1 may be a mobility management entity (MME)
  • the base station may be a pseudo base station or a legal base station.
  • the base station is a legitimate base station, the PWS message sent by the base station to the user equipment comes from the alarm server; when the base station is a fake base station, the PWS message sent by the base station to the user equipment comes from a fake base station, that is, the PWS message is a fake PWS message, which is not from the alarm server.
  • the base station Before sending the PWS message to the user equipment, the base station first sends a paging message to the user equipment to instruct the user equipment to receive the PWS message. After receiving the paging message, the user equipment may use the solution provided in the embodiment of the present application to determine whether the currently camping cell is a pseudo base station cell (that is, to determine the authenticity of the PWS message), and prompt the user with the fake PWS message. , To avoid fake PWS messages causing user panic.
  • the base station in FIG. 1 may be a network device (base transceiver (BTS)) in code division multiple access (CDMA), or may be a wideband band-code division multiple access (wide-band).
  • network equipment (NodeB) in code division multiple access (WCDMA) or time division synchronization-multiple access (TD-SCDMA) can also be long term evolution (LTE)
  • LTE long term evolution
  • the user equipment in FIG. 1 may be a device that provides voice and / or data connectivity to a user, a handheld device corresponding to a wireless connection function, or another processing device connected to a wireless modem.
  • the user equipment can communicate with one or more core networks via a radio access network (RAN).
  • RAN radio access network
  • the user equipment can be a mobile terminal, such as a mobile phone (or a "cellular" phone) and a computer corresponding to the mobile terminal.
  • it can be a portable, compact, handheld, computer-built or vehicle-mounted mobile device that exchanges language and / or data with a wireless access network.
  • the terminal device can also be called a system, a subscriber unit, a subscriber station, a mobile station, a mobile station, a remote station, an access point,
  • the remote terminal, the access terminal, the user terminal, the user agent, or the user equipment are not limited in the embodiments of the present application.
  • the communication standard of the user equipment includes, but is not limited to, CDMA, WCDMA, TD-SCDMA, LTE, 5G, and the like.
  • FIG. 2 it is a schematic flowchart of a pseudo base station identification method according to an embodiment of the present application. The method includes the following steps:
  • S201 The user equipment receives a paging message sent by a base station to which the currently camping first cell belongs.
  • the paging message is used to instruct the user equipment to receive the PWS message.
  • the base station instructs the user equipment to receive the PWS message through the paging message.
  • the user equipment may receive a PWS message.
  • the base station sending the paging message is a pseudo base station. Therefore, when the base station is determined to be a pseudo base station, the user equipment can selectively receive the PWS message, that is, The user equipment may choose to receive the PWS message or not to receive the first PWS. The specific implementation details of the user equipment selectively receiving the PWS message will be described later, and will not be repeated here.
  • S202 The user equipment determines whether the message type of the PWS message is consistent with the type of the PWS message supported by the operator providing services for the user equipment.
  • the message type of the PWS message is used to indicate a system message block that carries the PWS message.
  • PWS message types include, but are not limited to, commercial mobile early warning system (commercial mobile alert service (CMAS)), earthquake tsunami warning system (earthquake and tsunami warning system (ETWS)), European public warning system (european public warning system (EU-Alert), Korea) Korean public alert system (KPAS), disaster and emergency early warning network (DEWN).
  • CMAS commercial mobile alert service
  • EWS earthquake tsunami warning system
  • EU-Alert European public warning system
  • KPAS Korean public alert system
  • DEWN disaster and emergency early warning network
  • the PWS message type supported by the US operator is CMAS
  • the PWS message type supported by the Japanese operator is ETWS
  • the PWS message type supported by the European operator may be EU-Alert.
  • the PWS message types in the embodiments of the present application are not limited to the types in the above examples.
  • the PWS message types described in the embodiments of the present application may also include other PWS message types proposed by other countries, regions, and operators.
  • the PWS message types in the embodiments of the present application may further include the types of these newly launched PWS messages.
  • the above-mentioned different types of PWS messages such as CMAS, ETWS, EU-Alert, KPAS, DEWN are usually carried in different system message blocks.
  • ETWS is carried in SIB10 and SIB11
  • CMAS is carried in SIB12. Therefore, in the embodiment of the present application, the type of the PWS message can be identified by a system message block carrying the PWS message.
  • a PWS message type supported by an operator serving a user equipment may be determined in the following manner: the user equipment determines a message type of the PWS message in S202 and a PWS message supported by an operator serving a user equipment Before the types are the same, the user equipment may determine, according to the configuration information of the first cell and the message type configuration list, a PWS message type supported by an operator that provides services to the user equipment.
  • the message type configuration list is used to indicate a correspondence between at least one operator and a message type of a PWS message supported by the operator.
  • the configuration information of the first cell includes at least one of the following: a public land mobile network (PLMN) identifier of the first cell; a tracking area code (TAC) of the first cell; and a first cell Cell identification code (Cell ID); location information of the first cell.
  • PLMN public land mobile network
  • TAC tracking area code
  • Cell ID first cell Cell identification code
  • the location information of the first cell may be acquired by means of satellite positioning, base station-based measurement, and the like.
  • the user equipment when the user equipment leaves the factory and / or when the user equipment accesses the network, the user equipment obtains the above message type configuration list, which is used to indicate the PWS messages supported by different operators (in each country or region) Message type.
  • the message type configuration list may be used to indicate that the PWS message type supported by the US operator is CMAS, and the PWS message type supported by the Japanese operator is ETWS.
  • the user equipment can learn the current location of the user equipment (for example, the current country, region, city, etc.) through the configuration information of the first cell, and then determine that it is currently the user based on the current location of the user equipment. The operator that the device provides services to. Then, the user equipment can obtain the PWS message type supported by the operator currently serving the user equipment by querying the message type configuration list.
  • the message type configuration list in user equipment A is used to indicate that the message type of PWS messages supported by operator 1 is a, the message types of PWS messages supported by operator 2 are b and c, and the PWS messages supported by operator 3
  • the message has a message type of d.
  • the user equipment A determines that the operator currently serving the user equipment A is the operator 2 according to the configuration information of the first cell. Then, the user equipment may determine the PWS message types supported by the operator currently serving the user equipment as b and c by querying the message type configuration list saved by itself.
  • the user equipment may also update the message type configuration list, so that the user equipment can update the message type configuration list in time, so that the The types of PWS messages supported by the operators that the equipment provides are more accurate.
  • the user equipment may update the message type configuration list according to an instruction of the base station.
  • the upper-layer application server such as the alarm server
  • the user equipment After receiving the instruction from the base station, the user equipment can update the message.
  • Type configuration list is updated.
  • the user equipment may update the message type configuration list by querying an alarm server, which is an application server providing a public early warning service.
  • an alarm server which is an application server providing a public early warning service.
  • the user equipment may also actively query whether the message type configuration list is updated.
  • the user equipment may update the message type configuration list through a software upgrade process of the user equipment.
  • the user equipment performs a software package upgrade, it can update the message type configuration list saved by itself at the same time.
  • the user equipment may update the message type configuration list through a software upgrade process of a subscriber identification (SIM) card in the user equipment.
  • SIM subscriber identification
  • the specific method of obtaining the PWS message types supported by the operator that provides services for user equipment has been described above.
  • determining whether the base station is a pseudo base station it is further determined according to the message type of the PWS message.
  • the following describes the specific manner in which the user equipment obtains the message type of the PWS message.
  • the specific manner in which the user equipment obtains the message type of the PWS message includes, but is not limited to, the following two types.
  • the message type of the PWS message can be determined according to the paging message.
  • the paging message is used to instruct the user equipment to receive the PWS message.
  • the paging message carries the indication information of the PWS message.
  • the user equipment can determine the message type of the PWS message.
  • the user equipment may determine the message type of the PWS message according to the SIB1 in the system message. After receiving the paging message, the user equipment triggers the user equipment to receive the PWS message.
  • PWS messages can be regarded as a type of system messages (that is, PWS messages are carried in a certain system message block).
  • the user equipment When receiving a PWS message, the user equipment first receives the MIB and SIB1 in the system message, and then receives the PWS message according to the dispatching letter of the PWS message carried in the SIB1.
  • the scheduling information of the PWS message includes, but is not limited to, the message type of the PWS message and the indication information of the system message block carrying the PWS message. Therefore, after receiving the SIB1, the user equipment can determine the message type of the PWS message according to the scheduling information of the PWS message.
  • the user equipment determines that the message type of the PWS message is inconsistent with the type of the PWS message supported by the operator providing the user equipment, it determines that the base station is a pseudo base station.
  • the meaning of the pseudo base station is various.
  • the pseudo base station here can understand the real pseudo base station equipment, and can also be understood as a pseudo base station simulated by a hacker.
  • the user equipment when the user equipment determines that the base station is a pseudo base station in S203, it can selectively receive a PWS message.
  • the user equipment after receiving the paging message in S201, the user equipment does not need to receive the PWS message immediately, as in the prior art, but instead first determines the message type of the PWS message and the operator that provides services to the user equipment. The supported PWS message types are compared; if the two are the same, then the PWS message is received, and if the two are not the same, the PWS message may not be received.
  • the user equipment may also choose to receive the PWS message, which is not specifically limited in the comparison of the embodiments of this application.
  • the user equipment After determining the PWS message type and the PWS message type supported by the operator providing the user equipment, the user equipment can determine whether the message type of the PWS message is consistent with the PWS message type supported by the operator providing the user equipment. , So as to determine whether the base station is a pseudo base station according to the determination result. When the user equipment determines that the message type of the PWS message is inconsistent with the type of PWS message supported by the operator providing the user equipment, it determines that the base station is a pseudo base station.
  • the user equipment may further prompt the user to camp on the pseudo base station cell, and / or prompt the user that the PWS message is a fake PWS message. After seeing the prompt, the user will not cause panic because of the content of the PWS message.
  • an application processor (AP) in the user equipment may prompt the user through the interface pop-up display, sound, vibration, and flash.
  • the user equipment determines that the base station is a pseudo base station when determining that the message type of the PWS message is inconsistent with the type of the PWS message supported by the operator providing the user equipment.
  • the user equipment cannot judge that the base station is not a pseudo base station. This is because when a fake base station forges a PWS message, the message type of the fake PWS message may be consistent with the PWS message type supported by the operator that provides service to the user equipment. In this case, it can be further determined whether the base station is a pseudo base station through other embodiments provided in this application.
  • the user equipment determines that the base station is a fake base station, it can take corresponding measures to restrict the communication of the user equipment on the base station to prevent the user equipment from staying in the fake base station cell for a long time, thereby preventing the user equipment from frequently receiving fake PWS messages. Brings power consumption issues to user equipment.
  • the user equipment may add the cell information of the first cell to a prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit camping on the cell information recorded in the prohibited camping list. Corresponding cell.
  • the banned list is only an expression provided in the embodiments of the present application, and it can also be replaced by other expressions, such as a cell restricted list or a bar list, as long as the expression can be used to indicate that the user is forbidden
  • the cell information of the cell where the device resides is sufficient.
  • the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a physical cell ID (PCI) of the first cell; and an E- UTRA absolute radio frequency channel number (E-UTRA absolute frequency channel number, EARFCN).
  • the user equipment After adding the cell information of the first cell to the forbidden camping list, the user equipment will no longer reside in the first cell, thereby preventing the user from staying in the pseudo base station cell for a long time and frequently receiving fake PWS messages.
  • the user equipment may perform a cell search again in the current system. If the user equipment searches for available cells in the current system, the cell search results are based on the cell search results. Camping to a second cell, and the cell information of the second cell is not recorded in the prohibited camping list.
  • the user equipment after adding the cell information of the first cell to the forbidden camping list, when the user equipment performs a cell search again, it needs to delete the cells in the forbidden camping list (that is, the first cell), and only searches under the current system. Only when the available cell (that is, the second cell) is not on the camping list, the cell is selected to camp on the cell.
  • the user equipment can perform network search again under the current system, so that the user equipment can camp on a legal base station cell for normal communication.
  • the user equipment may switch to a system other than the current system for the cell search. For example, when the current communication standard is long-term evolution LTE, the user equipment may disable LIE and trigger a search to the 2G or 3G standard network.
  • the user equipment may delete the cell information of the first cell from the forbidden camping list and camp on the first cell again.
  • switching to another system for cell search can prevent the user equipment from camping in the pseudo base station cell; if the available cell is not available in the current system, the first cell is re-residented, which can avoid the user equipment. No cell is available under the current system.
  • the method shown in FIG. 2 may be executed through cooperation between an AP in a user equipment and a cellular processor (CP) (also referred to as a modem).
  • the AP can be regarded as a processor for performing data plane processing in the user equipment;
  • the CP can be regarded as a processor for performing signal plane processing in the user equipment.
  • the message type configuration list may be stored in the AP.
  • the AP delivers the message type configuration list to the CP.
  • the CP may perform subsequent operations to determine whether the base station is a pseudo base station, and may perform corresponding processing when the base station is a pseudo base station, so as to prevent the user equipment from staying in the pseudo base station cell for a long time.
  • the user equipment can determine the message type of the PWS message and the type of PWS message supported by the operator that provides service to the user equipment. In the case of inconsistency, it is determined that the base station is a pseudo base station. Because the type of PWS messages supported by an operator is limited, when the paging message indicates that the type of PWS message received by the user equipment is a type that is not supported by the current operator, the user equipment can determine that the PWS message is not from the operator's network. That is, it is determined that the PWS message is a fake PWS message. Therefore, the method shown in FIG. 2 can be used to accurately identify whether the base station is a fake base station (that is, to determine the source of the PWS message), and then determine the authenticity of the PWS message to avoid the panic caused by the fake PWS message.
  • using the solution of the first embodiment can also perform corresponding processing on the pseudo base station cell to prevent the user equipment from camping on the pseudo base station cell again, thereby preventing the user equipment from receiving the fake PWS message on the pseudo base cell again, thereby avoiding causing The user panics, and at the same time, reduces the power consumption of the user equipment caused by receiving fake PWS messages.
  • FIG. 3 it is a schematic flowchart of a pseudo base station identification method according to an embodiment of the present application. The method includes the following steps:
  • S301 The user equipment receives a PWS message sent by a base station to which the currently camping first cell belongs.
  • the user equipment Before the user equipment receives a PWS message sent by the base station to which the currently camping first cell belongs, the user equipment may receive a paging message sent by the base station, and the paging message is used to instruct the user equipment to receive the PWS message.
  • the base station instructs the user equipment to receive the PWS message through a paging message.
  • the user equipment may receive a PWS message.
  • the base station determines that the base station is a pseudo base station.
  • the meaning of the pseudo base station is various.
  • the pseudo base station here can understand the real pseudo base station equipment, and can also be understood as a pseudo base station simulated by a hacker.
  • the user equipment determines that the base station is a pseudo base station. For example, the user equipment may determine that the content of the PWS message is spam if the content of the PWS message contains advertising information or contains information such as pornography, reaction, and violence, and then determine that the base station is a pseudo base station.
  • the user equipment may further prompt the user to camp on the pseudo base station cell, and / or prompt the user that the PWS message is a fake PWS message. After seeing the prompt, the user will not cause panic because of the content of the PWS message.
  • the AP in the user equipment may prompt the user through the interface popup display, sound, vibration, and flash.
  • the user equipment determines that the content of the PWS message is spam, it determines that the base station is a pseudo base station.
  • the user equipment cannot judge based on this that the base station is not a pseudo base station. This is because the content of the PWS message forged by the fake base station may be false information, such as fictional earthquake and tsunami disaster information.
  • the user equipment is difficult to distinguish the source of the message and the authenticity of the message content. Therefore, in the second embodiment, when the content of the PWS message is not spam, it is difficult for the user equipment to determine whether the base station is a pseudo base station. In this case, it can be further determined whether the base station is a pseudo base station through other embodiments provided in this application.
  • the user equipment determines that the base station is a fake base station, it can take corresponding measures to restrict the communication of the user equipment on the base station to prevent the user equipment from staying in the fake base station cell for a long time, thereby preventing the user equipment from frequently receiving fake PWS. Messages cause power consumption issues for user equipment.
  • the user equipment may add the cell information of the first cell to a prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit camping on the cell information recorded in the prohibited camping list. Corresponding cell.
  • the function of the banned list is the same as the function of the banned list in the first embodiment.
  • the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
  • the user equipment After adding the cell information of the first cell to the forbidden camping list, the user equipment will no longer reside in the first cell, thereby preventing the user from staying in the pseudo base station cell for a long time and frequently receiving fake PWS messages.
  • the user equipment may perform a cell search again in the current system. If the user equipment searches for available cells in the current system, the cell search results are based on the cell search results. Camping to a second cell, and the cell information of the second cell is not recorded in the prohibited camping list.
  • the user equipment after adding the cell information of the first cell to the forbidden camping list, when the user equipment performs a cell search again, it needs to delete the cells in the forbidden camping list (that is, the first cell), and only searches under the current system. Only when the available cell (that is, the second cell) is not on the camping list, the cell is selected to camp on the cell.
  • the user equipment can perform network search again under the current system, so that the user equipment can camp on a legal base station cell for normal communication.
  • the user equipment may switch to a system other than the current system for the cell search. For example, when the current communication standard is long-term evolution LTE, the user equipment may disable LIE and trigger a search to the 2G or 3G standard network.
  • the user equipment may delete the cell information of the first cell from the forbidden camping list and camp on the first cell again.
  • switching to another system for cell search can prevent the user equipment from camping in the pseudo base station cell; if the available cell is not available in the current system, the first cell is re-residented, which can avoid the user equipment. No cell is available under the current system.
  • the method shown in FIG. 3 may also be executed by cooperation between an AP and a CP in a user equipment.
  • the CP in the user equipment can report the PWS message to the AP after receiving the PWS message, and the AP recognizes the content of the PWS message. If the AP recognizes that the content of the PWS message is spam, it reports it to the CP and the CP performs the Handle accordingly.
  • the user equipment may determine that the base station is a pseudo base station in a case where the content of the PWS message is determined to be spam. Since the alarm server does not push spam information to the user equipment through the operator's network, when the content of the PWS message is spam, the user equipment can determine that the PWS message does not come from the operator's network, that is, the PWS message is judged to be fake PWS message. Therefore, the method shown in Figure 3 can be used to accurately identify whether the base station is a fake base station (that is, to determine the source of the PWS message), and then determine the authenticity of the PWS message to avoid the panic caused by the fake PWS message.
  • using the solution of the second embodiment can also perform corresponding processing on the pseudo base station cell to prevent the user equipment from camping on the pseudo base station cell again, thereby preventing the user equipment from receiving the fake PWS message on the pseudo base cell again, thereby preventing the The user panics, and at the same time, reduces the power consumption of the user equipment caused by receiving fake PWS messages.
  • the difference between the first embodiment and the second embodiment is that in the first embodiment, the message type of the PWS message can be performed after receiving the paging message. Determine, and further determine whether the base station is a pseudo base station.
  • the user equipment may choose not to receive the PWS message, and then selectively receive the PWS message according to the judgment result after determining the above judgment result.
  • the user equipment may only receive the PWS message after receiving the PWS message.
  • the content of the PWS message determines whether the base station is a pseudo base station.
  • the first embodiment or the second embodiment may be selected according to different scenarios and needs, or the first implementation and the second implementation may be executed, which is not specifically limited in this application.
  • FIG. 4 it is a schematic flowchart of a pseudo base station identification method according to an embodiment of the present application. The method includes the following steps:
  • S401 The user equipment receives a PWS message sent by a base station to which the currently camping first cell belongs.
  • the user equipment Before the user equipment receives a PWS message sent by the base station to which the currently camping first cell belongs, the user equipment may receive a paging message sent by the base station, and the paging message is used to instruct the user equipment to receive the PWS message.
  • the base station instructs the user equipment to receive the PWS message through a paging message.
  • the user equipment may receive a PWS message.
  • the alarm server is an application server that provides public early warning services.
  • the alarm server please refer to the related description in the application scenario shown in FIG. 1, which will not be repeated here.
  • the process that the user equipment receives the paging message and the PWS message are both passive receiving processes. After the user equipment camps in the first cell, it passively receives the paging message, and then receives the PWS according to the instruction of the paging message. Message. It is difficult for the user equipment to know the source of the paging message and the PWS message. In S402, the user equipment actively communicates with the alarm server used to trigger the sending of PWS messages, so that it can actively obtain the real PWS message, and then based on the real PWS message obtained from the alarm server to the previously received PWS message. To identify the source and authenticity. The specific implementation manner will be described in detail in the introduction later in the third embodiment, and will not be repeated here.
  • the communication between the user equipment and the alarm server can be performed through the base station and the core network.
  • the intermediate process is omitted, and the interaction between the user equipment and the alarm server is directly indicated.
  • the base station that establishes a connection with the user equipment is a legal base station, and the user equipment can communicate with the alarm server through the legal base station and the core network.
  • the meaning of the legal base station here is different from that of the base station that sends the PWS message to the user equipment in S401.
  • the base station in S401 may be the legal base station or a pseudo base station simulated by a hacker.
  • the case where the base station is a pseudo base station simulated by a hacker may be: a hacker obtains a system message and a paging message carrying a paging channel configuration sent by a legitimate base station (established a connection with the user equipment) in plain text, and thus The hacker can simulate the paging channel configuration of the legitimate base station to send a paging message to the user equipment, and then send a PWS message.
  • the user equipment may still receive a fake PWS message sent by a fake base station simulated by a hacker.
  • the method shown in Figure 4 is set up to identify this situation.
  • the user equipment actively initiates communication with the alarm server in the connected state, and the signaling interaction between the user equipment and the legitimate base station is performed through a dedicated channel, and it is difficult for a hacker to interfere with the dedicated channel.
  • the information obtained by the user equipment from the alarm server is non-interfering information, so the authenticity of the previously received PWS message can be judged based on this information.
  • the user equipment determines that the base station is a pseudo base station if the alarm server does not trigger a PWS message update or the PWS message is a tampered PWS message.
  • the user equipment in S403 determines that the base station is a pseudo base station when the alarm server does not trigger the PWS message or the PWS message is a tampered PWS message.
  • the meaning of the pseudo base station is various.
  • the pseudo base station here can understand the real pseudo base station equipment, and can also be understood as a pseudo base station simulated by a hacker.
  • the user equipment queries that the alarm server does not trigger the PWS message or that the PWS message is a tampered PWS message, it indicates that the PWS message does not come from the alarm server, which means that the base station is a pseudo base station. This is because: It is difficult for the base station to interfere with the communication initiated by the connected user equipment with the alarm server, so the information obtained by the user equipment by querying the alarm server is uninterrupted information. When the uninterfered information does not match the PWS message, it means that the PWS message is forged, that is, the base station is a fake base station.
  • the user equipment queries whether the alarm server triggers a PWS message update within the first set time period.
  • the first set duration can be configured.
  • the user equipment queries that the alarm server is within the first set time period and triggers a PWS message update (that is, the PWS message is not issued), it can be determined that the PWS message is a fake PWS message, and then the base station is determined to be a fake base station .
  • the user equipment queries the content of the second PWS message sent by the alarm server last time, and compares the content of the second PWS message with the content of the PWS message.
  • the user equipment may determine that the PWS message is a fake PWS message, It is further determined that the base station is a pseudo base station; if the content of the second PWS message is found to be consistent with the content of the PWS message, it may be determined that the PWS message is a real PWS message, and then it is determined that the base station is not a pseudo base station.
  • the user equipment instructs the alarm server to resend the third PWS message and / or the third PWS message check code stream that was sent last in an asymmetric encryption and decryption method; the user equipment compares the content of the third PWS message with the content of the PWS message Yes, and / or, the check code stream of the third PWS message is compared with the check code stream of the PWS message.
  • the understanding of the asymmetric encryption and decryption method may be: the alarm server uses the public key to encrypt the third PWS message and / or the check code stream of the third PWS message; the user device uses the private key to decrypt the received information To obtain a third PWS message and / or a check code stream of the third PWS message. Because the public key used by the alarm server and the private key used by the user device are a key pair, the public key is the public part of the key pair, and the private key is the non-public part, which is stored only by the user device. Only the private key saved by the user device can be used to decrypt the information encrypted by the public key.
  • the asymmetric encryption and decryption method can be used to prevent the third PWS message and / or the check code stream of the third PWS message from being tampered with, and improve the check code stream of the third PWS message and / or the third PWS message received by the user equipment. Authenticity and accuracy.
  • the user equipment After the user equipment decrypts and obtains the third PWS message, it can compare the content of the third PWS message with the content of the PWS message; after decrypting and obtaining the check code stream of the third PWS message, the user equipment can calculate the PWS in the same way.
  • the check code stream of the message can further compare the check code stream of the third PWS message with the check code stream of the PWS message.
  • the user equipment finds that the PWS message is inconsistent with the third PWS message, or finds that the check code stream of the third PWS message is inconsistent with the check code stream of the PWS message, the user equipment can judge that the PWS message is a fake PWS message, and further It is determined that the base station is a pseudo base station. If the above-mentioned inconsistency does not exist, the user equipment may judge the PWS message to be a real PWS message according to this, and then determine that the base station is not a pseudo base station.
  • the alarm server may also learn from the integrity check method when sending the third PWS message and / or the check code stream of the third PWS message.
  • the alarm server uses the public key to encrypt the digest value of the third PWS message, and then sends the third PWS message and the encrypted third PWS message to the user device. Summary value.
  • the user equipment may use the private key to decrypt the encrypted digest value of the third PWS message to obtain the digest value of the third PWS message.
  • the user equipment may use the same algorithm to calculate the digest value of the received third PWS message.
  • the user equipment compares the decrypted digest value with the calculated digest value. If they are the same, it means that the third PWS message has not lost data during transmission (that is, the third PWS message is complete).
  • the content of the third PWS message can be compared with the content of the PWS message.
  • the user equipment may further prompt the user to camp on the pseudo base station cell, and / or prompt the user that the PWS message is a fake PWS message. After seeing the prompt, the user will not cause panic because of the content of the PWS message.
  • the AP in the user equipment may prompt the user through the interface popup display, sound, vibration, and flash.
  • the user equipment when the user equipment queries that the alarm server does not trigger the PWS message or finds that the PWS message is a tampered PWS message, it determines that the base station is a pseudo base station. In addition, when the user equipment queries that the PWS message has been triggered by the alarm server, and the PWS message is consistent with the content of the PWS message most recently issued by the alarm server, the user equipment can judge that the base station is not a pseudo base station.
  • the base station is a pseudo base station.
  • the user equipment can take corresponding measures to restrict the communication of the user equipment on the base station to prevent the user equipment from staying in the fake base station cell for a long time, thereby preventing the user equipment from frequently receiving fake PWS messages. Brings power consumption issues to user equipment.
  • the user equipment may add the cell information of the first cell to a prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit camping on the cell information recorded in the prohibited camping list. Corresponding cell.
  • the function of the banned list is the same as that of the banned list in the first embodiment.
  • the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
  • the user equipment After adding the cell information of the first cell to the forbidden camping list, the user equipment will no longer reside in the first cell, thereby preventing the user from staying in the pseudo base station cell for a long time and frequently receiving fake PWS messages.
  • the user equipment may perform a cell search again in the current system. If the user equipment searches for available cells in the current system, the cell search results are based on the cell search results. Camping to a second cell, and the cell information of the second cell is not recorded in the prohibited camping list.
  • the user equipment after adding the cell information of the first cell to the forbidden camping list, when the user equipment performs a cell search again, it needs to delete the cells in the forbidden camping list (that is, the first cell), and only searches under the current system. Only when the available cell (that is, the second cell) is not on the camping list, the cell is selected to camp on the cell.
  • the user equipment can perform network search again under the current system, so that the user equipment can camp on a legal base station cell for normal communication.
  • the user equipment may switch to a system other than the current system for the cell search. For example, when the current communication standard is long-term evolution LTE, the user equipment may disable LIE and trigger a search to the 2G or 3G standard network.
  • the user equipment may delete the cell information of the first cell from the forbidden camping list and camp on the first cell again.
  • switching to another system for cell search can prevent the user equipment from camping in the pseudo base station cell; if the available cell is not available in the current system, the first cell is re-residented, which can avoid the user equipment. No cell is available under the current system.
  • the following method can be used to identify whether the base station is a pseudo base station: After the user equipment receives a PWS message sent by the base station to which the currently camping first cell belongs, when the user equipment is in the idle state , The user equipment may trigger the establishment of the chain; then, if the user equipment fails to establish the chain, the base station determines that the base station is a pseudo base station.
  • the chain establishment between the user equipment and the base station is successful, so that the user equipment can be switched to a connected state for normal communication with the base station; while the user equipment resides in the In the case of a pseudo base station cell, since it is difficult for the pseudo base station to perform two-way authentication with the user equipment, if the user equipment actively initiates a chain establishment, the chain establishment may fail. Therefore, in the third embodiment, it can be determined whether the base station is a legitimate base station by triggering whether the user equipment successfully establishes the chain.
  • the user equipment when the user equipment triggers the chain establishment, it may trigger the chain establishment after waiting for a second set time.
  • the second setting duration may be configured by the user equipment, may be configured by the network, or may be configured by the user equipment and the network together.
  • the second set duration may be set as T * Rand.
  • T can adopt the network configuration, the unit is ms; Rand can generate a random number between 0 and 1 for the user equipment.
  • the user equipment if the user equipment successfully establishes a chain, it does not mean that the base station is a legitimate base station. This is because the legal base station may be successfully established with the user equipment, but the base station sending the PWS message to the user equipment may be a pseudo base station simulated by a hacker.
  • the hacker obtains the paging channel configuration system message and paging message sent by the legitimate base station (which successfully established a link with the user equipment) in clear text, so the hacker can simulate the paging channel configuration of the legitimate base station and send it to the user equipment. Paging message, and then send PWS message.
  • the user equipment may still receive a fake PWS message sent by a fake base station simulated by a hacker.
  • the user equipment successfully establishes the chain, it can be further judged whether the base station is a pseudo base station through a similar method as described above. That is, after the user equipment triggers the chain establishment, the user equipment can communicate with the alarm server after the chain establishment is successful. Then, when the user equipment queries that the alarm server has not triggered the PWS message update or the PWS message is a tampered PWS message, To determine that the base station is a pseudo base station.
  • the user equipment is already in a connected state.
  • the user equipment communicates with the alarm server, and determines that the base station is a pseudo base station when it is found that the alarm server has not triggered the PWS message update or the PWS message is a tampered PWS message.
  • the relevant steps in S402 and S403. The description is not repeated here.
  • the user equipment can actively communicate with the alarm server, and determine whether the alarm server has not triggered the PWS message update or the PWS message is a tampered PWS message.
  • the base station is a pseudo base station. Since it is difficult for the pseudo base station to interfere with the communication initiated by the connected user equipment with the alarm server, the information obtained by the user equipment by querying the alarm server is non-interfering information. When the uninterfered information does not match the PWS message, it means that the PWS message is forged, that is, the base station is a fake base station. Therefore, the method shown in FIG. 4 can be used to accurately identify whether the base station is a fake base station (that is, to determine the source of the PWS message), and then determine the authenticity of the PWS message to avoid the panic caused by the fake PWS message.
  • using the solution of the third embodiment can also perform corresponding processing on the pseudo base station cell to prevent the user equipment from camping on the pseudo base station cell again, thereby preventing the user equipment from receiving the fake PWS message on the pseudo base cell again, thereby avoiding causing The user panics, and at the same time, reduces the power consumption of the user equipment caused by receiving fake PWS messages.
  • the implementation of the first and the second embodiments is relatively simple, but the first and the second embodiments can only be performed when certain conditions are met. It is judged that the base station is a pseudo base station, but it cannot be accurately identified as a legitimate base station.
  • the base station not only can the base station be judged to be a pseudo base station, but also the base station can be determined to be a legitimate base station if certain conditions are met.
  • This solution is relatively comprehensive.
  • the first embodiment, the second embodiment, or the third embodiment may be selected and executed according to different scenarios and needs, or any two or three of the first embodiment, the second embodiment, and the third embodiment may be used in combination. This embodiment of the present application does not specifically limit this.
  • the user equipment may first determine whether the type of the received PWS message indicated by the paging message is consistent with the type of the PWS message supported by the operator providing the user equipment. When the two are consistent, the user equipment may further identify the content of the PWS message. If the content of the PWS message is identified as spam, it may be determined that the base station sending the paging message is a pseudo base station. Of course, the user equipment may also first determine whether the base station is a pseudo base station according to the solution provided in the second embodiment, and then determine according to the solution provided in the first embodiment.
  • FIG. 5 Exemplarily, a schematic flow chart of the solution using the first embodiment and the second embodiment in combination can be shown in FIG. 5.
  • the user equipment may first determine whether the type of the received PWS message is indicated by the paging message and the type of the PWS message supported by the operator providing the user equipment. Consistent. If the two are consistent, the user equipment may further identify the content of the PWS message. If it is identified that the content of the PWS message is not spam, the user equipment can actively communicate with the alarm server when it is connected. If it is found that the alarm server has not triggered the PWS message update or the PWS message received by the user equipment has been tampered, then The user equipment may determine that the base station sending the PWS message is a pseudo base station.
  • FIG. 6 Exemplarily, a schematic flowchart of the foregoing solution of combining the first embodiment, the second embodiment, and the third embodiment may be shown in FIG. 6.
  • an embodiment of the present application further provides a pseudo base station identification device, which can be used to execute any one of the methods shown in FIG. 2, FIG. 3, and FIG. 4.
  • the apparatus 700 includes a transceiver module 701 and a processing module 702.
  • the transceiver module 701 is configured to receive a paging message sent by a base station to which the currently camping first cell belongs, and the paging message is used to instruct a user equipment to receive a public early warning system.
  • PWS message is used to instruct a user equipment to receive a public early warning system.
  • Processing module 702 is configured to determine whether the message type of the PWS message is consistent with the type of PWS message supported by the operator that provides service to the user equipment; the message type of the PWS message is supported by the operator that provides service to the user equipment When the types of PWS messages are inconsistent, it is determined that the base station is a pseudo base station.
  • the message type of the PWS message is used to indicate a system message block that carries the PWS message.
  • the message type of the PWS message is any one of the following: CMAS; ETWS; EU-Alert; KPAS; DEWN.
  • the processing module 702 may prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
  • processing module 702 is further configured to: after determining whether the message type of the PWS message is consistent with the PWS message type supported by the operator, and when the message type of the PWS message is consistent with the PWS message type supported by the operator, The content of the message is identified; then, if the content of the PWS message is spam, it is determined that the base station is a pseudo base station.
  • the processing module 702 is further configured to: after determining whether the message type of the PWS message is consistent with the PWS message type supported by the operator, and when the message type of the PWS message is consistent with the PWS message type supported by the operator, when the user When the device is in the connected state, it communicates with the alarm server through the transceiver module 701, which is an application server that provides public warning services; then, when the alarm server is queried, the PWS message update is not triggered or the PWS message is queried as a tampered PWS. In the case of a message, it is determined that the base station is a pseudo base station.
  • the processing module 702 is further configured to: before determining whether the message type of the PWS message is consistent with the PWS message type supported by the operator 70, determine the operator according to the configuration information of the first cell and the message type configuration list Supported PWS message types.
  • the message type configuration list is used to indicate the correspondence between at least one operator and the message types of PWS messages supported by the operator; and to obtain the message types of PWS messages.
  • the configuration information of the first cell includes at least one of the following: a PLMN identity of the first cell; a TAC of the first cell; a Cell ID of the first cell; and location information of the first cell.
  • the processing module 702 is further configured to: after determining that the base station is a pseudo base station, add the cell information of the first cell to the prohibition list, and the prohibition list is used to indicate the user equipment It is forbidden to camp on the cell corresponding to the cell information recorded in the forbidden camping list.
  • the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
  • processing module 702 is further configured to: after adding the cell information of the first cell to the forbidden camping list, perform a cell search in the current system; if an available cell is found in the current system, camp on the cell according to the cell search result.
  • the second cell the cell information of the second cell is not recorded in the prohibited camping list.
  • the processing module 702 is further configured to: switch to a system other than the current system to perform a cell search; or delete the cell information of the first cell from the forbidden camping list. And residing in the first cell.
  • processing module 702 is further configured to: update the message type configuration list.
  • the processing module 702 may update the message type configuration list in at least one of the following ways: the processing module 702 updates the message type configuration list according to an instruction of the base station; the processing module 702 queries the alarm server to configure the message type configuration The list is updated, and the alarm server is an application server that provides public warning services; the processing module 702 updates the message type configuration list through the software upgrade process of the user device; the processing module 702 configures the message type through the software upgrade process of the SIM card in the user device The list is updated.
  • the transceiver module 701 is configured to receive a PWS message sent by a base station to which the first cell currently resides; and the processing module 702 is configured to determine that the content of the PWS message is In the case of spam, it is determined that the base station is a pseudo base station.
  • the processing module 702 may prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
  • the transceiver module 701 is further configured to: before receiving a PWS message sent by the base station to which the currently camping first cell belongs, receive a paging message sent by the base station, and the paging message is used to instruct the user equipment to receive the PWS message.
  • the processing module 702 is further configured to: after determining that the base station is a pseudo base station, add the cell information of the first cell to the prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit A cell corresponding to the cell information recorded in the forbidden camping list.
  • the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
  • processing module 702 is further configured to: after adding the cell information of the first cell to the forbidden camping list, perform a cell search in the current system; if an available cell is found in the current system, camp on the cell according to the cell search result.
  • the second cell the cell information of the second cell is not recorded in the prohibited camping list.
  • the processing module 702 is further configured to: switch to a system other than the current system to perform a cell search; or delete the cell information of the first cell from the forbidden camping list. And residing in the first cell.
  • the transceiver module 701 is configured to receive a PWS message sent by a base station to which the currently camping first cell belongs; a processing module 702 is configured to be used when the user equipment is in a connected state. Communicate with the alarm server through the transceiver module 701.
  • the alarm server is an application server that provides public warning services.
  • the processing module 702 is also used to query that the alarm server does not trigger a PWS message update or that the PWS message is a tampered PWS message. In this case, it is determined that the base station is a pseudo base station.
  • the processing module 702 may prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
  • the processing module 702 When the device 700 is used to execute the method shown in FIG. 4, when the processing module 702 communicates with the alarm server through the transceiver module 701, it is specifically used for: the processing module 702 queries the alarm server through the transceiver module 701 whether the alarm server is within the first set duration.
  • the processing module 702 queries the content of the second PWS message sent by the alarm server through the transceiver module 701, and compares the content of the second PWS message with the content of the PWS message; or, the processing module 702 passes The transceiver module 701 instructs the alarm server to resend the third PWS message and / or the third PWS message check code stream that was sent last in an asymmetric encryption and decryption manner; the processing module 702 compares the content of the third PWS message with the content of the PWS message Compare, and / or, compare the check code stream of the third PWS message with the check code stream of the PWS message.
  • the transceiver module 701 is further configured to: before receiving a PWS message sent by a base station to which the first cell currently resides, receive a paging message sent by the base station, and the paging message is used to instruct the user equipment to receive the PWS message.
  • the processing module 702 is further configured to: after determining that the base station is a pseudo base station, add the cell information of the first cell to the forbidden list, and the forbidden list is used to indicate the user equipment. It is forbidden to camp on the cell corresponding to the cell information recorded in the forbidden camping list.
  • the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
  • processing module 702 is further configured to: after adding the cell information of the first cell to the forbidden camping list, perform a cell search in the current system; if an available cell is found in the current system, camp on the cell according to the cell search result.
  • the second cell the cell information of the second cell is not recorded in the prohibited camping list.
  • the processing module 702 is further configured to: switch to a system other than the current system to perform a cell search; or delete the cell information of the first cell from the forbidden camping list. And residing in the first cell.
  • the processing module 702 For the user equipment in the idle state, after receiving the PWS message sent by the base station to which the first cell currently resides, if the user equipment is in the idle state, the processing module 702 triggers the establishment of a chain through the transceiver module 701; then, the processing module 702 In the case that the link establishment fails, the base station is determined to be a pseudo base station.
  • the processing module 702 when the processing module 702 triggers the chain establishment through the transceiver module 701, the processing module 702 is specifically configured to: the processing module 702 triggers the chain establishment through the transceiver module 701 after waiting for the second set duration.
  • the processing module 702 is further configured to: after triggering the chain establishment, communicate with the alarm server through the transceiver module 701 after the chain establishment is successful; when the query of the alarm server does not trigger the PWS message update or the query of the PWS message as a tampered PWS When the message is received, it is determined that the base station is a pseudo base station.
  • the division of the modules in the embodiments of the present application is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
  • the functional modules in the embodiments of the present application may be integrated into one processing module, or each module may exist separately physically, or two or more modules may be integrated into one module.
  • the above integrated modules may be implemented in the form of hardware or software functional modules.
  • the integrated module is implemented in the form of a software functional module and sold or used as an independent product, it can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially a part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium.
  • a computer device which may be a personal computer, a server, or a network device
  • the aforementioned storage media include: U disks, mobile hard disks, read-only memories (ROMs), random access memories (RAMs), magnetic disks or compact discs and other media that can store program codes .
  • the pseudo base station identification device 700 can be used to execute the method provided by the embodiment corresponding to FIG. 2, FIG. 3, or FIG. 4. Therefore, implementation methods and technologies not described in detail in the pseudo base station identification device 700 shown in FIG. 7. For the effect, refer to the related description in the method shown in FIG. 2, FIG. 3, or FIG. 4.
  • an embodiment of the present application further provides a pseudo base station identification device, which is applied to user equipment.
  • the pseudo base station identification device is configured to perform the pseudo base station identification method shown in FIG. 2, FIG. 3, or FIG. 4.
  • FIG. 8 exemplarily shows a schematic structural diagram of a pseudo base station identification device provided in the present application.
  • the pseudo base station identification device 800 includes a processor, a memory, a control circuit, and an antenna.
  • the processor is mainly used to process the communication protocol and communication data, and control the entire pseudo base station identification device 800, execute a software program, and process the data of the software program, for example, to support the pseudo base station identification device 800 to execute FIGS. 2 and 3 Or the pseudo base station identification method shown in FIG. 4.
  • the memory is mainly used for storing software programs and data.
  • the control circuit is mainly used for conversion of baseband signals and radio frequency signals and processing of radio frequency signals.
  • the control circuit and the antenna together can also be called a transceiver, which is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • the processor can read the software program in the memory, interpret and execute the instructions of the software program, and process the data of the software program.
  • the processor performs baseband processing on the data to be sent, and then outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit processes the baseband signal, the radio frequency signal is sent out in the form of electromagnetic waves through the antenna.
  • the RF circuit receives the RF signal through the antenna, converts the RF signal into a baseband signal, and outputs the baseband signal to the processor.
  • the processor converts the baseband signal into data and processes the data. For processing.
  • FIG. 8 shows only one memory and a processor.
  • the memory may also be referred to as a storage medium or a storage device, which is not limited in this application.
  • the processor may include a baseband processor and a central processor.
  • the baseband processor is mainly used to process communication protocols and communication data
  • the central processor is mainly used to perform the entire pseudo base station identification device 800. Control, execute software programs, and process software program data.
  • the processor in FIG. 8 integrates the functions of the baseband processor and the central processing unit.
  • the baseband processor and the central processing unit may also be independent processors, which are interconnected through technologies such as a bus.
  • the pseudo base station identification device 800 may include multiple baseband processors to adapt to different network standards.
  • the pseudo base station identification device 800 may include multiple central processors to enhance its processing capabilities.
  • the various components can be connected via various buses.
  • the baseband processor may also be expressed as a baseband processing circuit or a baseband processing chip.
  • the central processing unit may also be expressed as a central processing circuit or a central processing chip.
  • the function of processing communication protocols and communication data may be built in the processor or stored in the storage unit in the form of a software program, and the processor executes the software program to implement the baseband processing function.
  • the antenna and the control circuit having a transmitting and receiving function may be regarded as the transmitting and receiving unit of the pseudo base station identification device 800, and the processor having the processing function may be regarded as the processing unit of the pseudo base station identification device 800.
  • the transceiver unit may also be referred to as a transceiver, a transceiver, a transceiver device, and the like.
  • a device for implementing a receiving function in the transceiver unit may be regarded as a receiving unit
  • a device for implementing a transmitting function in the transceiver unit may be regarded as a transmitting unit, that is, the transceiver unit includes a receiving unit and a transmitting unit.
  • the receiving unit may also be called a receiver, a receiver, a receiving circuit, etc.
  • the sending unit may be called a transmitter, a transmitter, or a transmitting circuit.
  • a downlink signal (including data and / or control information) sent by a network device (such as a base station) is received through an antenna, and on the uplink, an uplink is sent to a network device (such as a base station) through an antenna
  • Signals (including data and / or control information) are processed in the processor by service data and signaling messages. These units are based on the radio access technology (e.g., LTE, NR, and other evolved systems) used by the radio access network. Access technology).
  • the processor is further configured to control and manage the actions of the pseudo base station identification device 800, and to execute the processing performed by the pseudo base station identification device 800 in the foregoing embodiment.
  • the processor is further configured to support the pseudo base station identification apparatus 800 to execute the execution method related to the user equipment in FIG. 2, FIG. 3, or FIG. 4.
  • FIG. 8 only shows a simplified design of the pseudo base station identification device 800.
  • the pseudo base station identification device 800 may include any number of antennas, memories, processors, and the like, and all pseudo base station identification devices 800 that can implement the present application are within the protection scope of the present application.
  • the transceiver unit as a transceiver and the processing unit as a processor as an example
  • the transceiver executes the pseudo base station identification method shown in FIG. 2
  • the transceiver is configured to receive the current resident
  • the paging message sent by the base station to which the first cell belongs the paging message is used to instruct the user equipment to receive the PWS message of the public early warning system.
  • the processor is used to determine the message type of the PWS message and the operator support to provide services for the user equipment When the types of PWS messages are inconsistent, it is determined that the base station is a pseudo base station.
  • the transceiver unit as a transceiver and the processing unit as a processor as an example
  • the pseudo base station identification device 800 executes the pseudo base station identification method shown in FIG. 3, the transceiver is configured to receive the current camping.
  • the transceiver when the pseudo base station identification device 800 executes the pseudo base station identification method shown in FIG. 4, the transceiver is configured to receive the current resident The PWS message sent by the base station to which the first cell belongs; the processor is used to communicate with the alarm server through the transceiver when the user equipment is in a connected state, the alarm server is an application server that provides public warning services; the processor is also used to When the query of the alarm server does not trigger the PWS message update or the query that the PWS message is a tampered PWS message, it is determined that the base station is a pseudo base station.
  • the processor may also implement any detailed functions of the user equipment in the method embodiments shown in FIG. 2, FIG. 3, or FIG. 4, which are not described in detail here, and may refer to the methods shown in FIG. 2, FIG. 3, or FIG. 4 described above.
  • the processing steps performed by the user equipment in the embodiment may also implement any detailed functions of the user equipment in the method embodiments shown in FIG. 2, FIG. 3, or FIG. 4, which are not described in detail here, and may refer to the methods shown in FIG. 2, FIG. 3, or FIG. 4 described above.
  • pseudo base station identification device shown in FIG. 7 to FIG. 8 may be regarded as an integrated chip in user equipment, and may also be regarded as user equipment.
  • the user equipment includes, but is not limited to, a smart phone, a smart watch, a tablet computer, a VR device, an AR device, a personal computer, a handheld computer, and a personal digital assistant.
  • this application may be provided as a method, a system, or a computer program product. Therefore, this application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, this application may take the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a particular manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions
  • the device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
  • this application may be provided as a method, a system, or a computer program product. Therefore, this application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, this application may take the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a particular manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions
  • the device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.

Abstract

Disclosed are a pseudo base station identification method and apparatus, wherein same are used for identifying a message source after a user equipment receives a paging message for instructing reception of a PWS message or receives the PWS message, avoiding the problem of causing public panic due to the fact that a forged PWS message is received. The method comprises: a user equipment receiving a paging message sent by a base station to which a first cell currently camped belongs, wherein the paging message is used for instructing the user equipment to receive a public warning system (PWS) message; the user equipment determining whether the message type of the PWS message is consistent with a PWS message type supported by an operator supplying a service to the user equipment; and where the message type of the PWS message is inconsistent with the PWS message type supported by the operator supplying a service to the user equipment, the user equipment determining that the base station is a pseudo base station.

Description

一种伪基站识别方法及装置Method and device for identifying pseudo base station 技术领域Technical field
本申请涉及通信技术领域,尤其涉及一种伪基站识别方法及装置。The present application relates to the field of communication technologies, and in particular, to a method and a device for identifying a pseudo base station.
背景技术Background technique
公共预警系统(public warning system,PWS)的目的是通过已经架设的通信网络,将诸如地震、海啸、飓风、火灾和恐怖袭击等突发情况的相关信息及时、有效地通报给用户,使得用户能及时采取相应避险措施,降低灾害对公众造成的影响,从而达到预警的目的。在PWS中,通常通过向用户设备发送PWS消息来告知灾害的相关信息。The purpose of the public warning system (PWS) is to inform users in a timely and effective manner of emergency, such as earthquakes, tsunamis, hurricanes, fires, and terrorist attacks, through communication networks that have been set up, so that users can Take appropriate risk avoidance measures in time to reduce the impact of the disaster on the public, so as to achieve the purpose of early warning. In PWS, information related to disasters is usually notified by sending PWS messages to user equipment.
第三代合作伙伴计划(3rd generation partnership project,3GPP)协议中规定,基站可通过如下方式向用户设备发送PWS消息:当发生突发情况需要通过PWS消息通知用户时,基站会向用户设备发送寻呼(Paging)消息,以指示用户设备接收PWS消息;用户设备在接收到该寻呼消息后,用户设备中的调制解调器(Modem)接收基站下发的PWS消息并发送给应用处理器(application processor,AP),AP在用户设备的显示界面上显示该PWS消息的内容。According to the 3rd Generation Partnership Project (3GPP) agreement, the base station can send a PWS message to the user equipment in the following way: When an unexpected situation needs to be notified to the user through the PWS message, the base station will send a search request to the user equipment. A Paging message to instruct the user equipment to receive the PWS message; after the user equipment receives the paging message, a modem in the user equipment receives the PWS message issued by the base station and sends it to the application processor (application processor, AP). The AP displays the content of the PWS message on the display interface of the user equipment.
由于寻呼(Paging)消息以及系统消息(例如,携带寻呼信道配置的系统消息)均通过明文方式发送,因而实际应用中,会存在恶意伪造PWS消息的情况,这不仅会引起民众恐慌,用户设备还会因接收该PWS消息带来功耗问题。Because paging messages and system messages (for example, system messages with paging channel configuration) are sent in plain text, there will be cases of malicious forgery of PWS messages in actual applications, which will not only cause panic among the people, users The device will also cause power consumption problems due to receiving the PWS message.
比如,合法基站向用户设备发送系统消息(例如,携带寻呼信道配置的系统消息)时是以明文方式发送的,因而黑客可获取到该合法基站的寻呼信道配置,从而对合法基站的寻呼信道进行干扰,向用户设备发送用于指示用户设备接收PWS消息的寻呼消息以及伪造的PWS消息(此时可认为用户设备接收到的PWS消息是黑客模拟的伪基站发送的)。For example, when a legitimate base station sends a system message (for example, a system message with a paging channel configuration) to the user equipment, it is sent in clear text. Therefore, a hacker can obtain the paging channel configuration of the legitimate base station, and search for a legitimate base station. The paging channel interferes, and sends a paging message to the user equipment to instruct the user equipment to receive the PWS message and a fake PWS message (at this time, the PWS message received by the user equipment may be considered to be sent by a pseudo base station simulated by a hacker).
再比如,若用户设备驻留在伪基站小区,伪基站可向用户设备发送用于指示用户设备接收PWS消息的寻呼消息以及伪造的PWS消息。For another example, if the user equipment resides in a pseudo base station cell, the pseudo base station may send a paging message to the user equipment to instruct the user equipment to receive a PWS message and a fake PWS message.
在上述两个示例中,寻呼消息和PWS消息均是以明文方式发送的,而用户设备无法通过明文消息判断消息来源,也就无法辨别PWS消息的真伪。In the above two examples, the paging message and the PWS message are both sent in plain text, and the user equipment cannot determine the source of the message through the plain text message, and thus cannot distinguish the authenticity of the PWS message.
因此,亟需一种伪基站识别方案,用于在用户设备接收到用于指示PWS消息更新的寻呼消息或者接收到PWS消息后对消息来源进行识别,避免伪造的PWS消息造成民众恐慌。Therefore, there is an urgent need for a pseudo base station identification scheme for identifying a source of a message after a user equipment receives a paging message for instructing an update of a PWS message or a PWS message is received, so as to prevent the fake PWS message from causing panic among the public.
发明内容Summary of the Invention
本申请实施例提供一种伪基站识别方法及装置,用于用户设备接收到用于指示接收PWS消息的寻呼消息或者接收到PWS消息后对消息来源进行识别,避免接收到伪造的PWS消息造成民众恐慌的问题。The embodiments of the present application provide a method and a device for identifying a pseudo base station, which are used by a user equipment to identify a source of a message after receiving a paging message for instructing to receive a PWS message or after receiving a PWS message, so as to avoid receiving the fake PWS message. The problem of public panic.
第一方面,本申请实施例提供一种伪基站识别方法,该方法包括如下步骤:In a first aspect, an embodiment of the present application provides a method for identifying a pseudo base station. The method includes the following steps:
用户设备接收当前驻留的第一小区所属的基站发送的寻呼消息,该寻呼消息用于用户设备接收公共预警系统PWS消息;用户设备判断该PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型是否一致;在该PWS消息的消息类型与为用户设备 提供服务的运营商支持的PWS消息类型不一致的情况下,用户设备确定基站为伪基站。The user equipment receives a paging message sent by a base station to which the currently camping first cell belongs, and the paging message is used for the user equipment to receive a PWS message of the public early warning system; the user equipment determines that the message type of the PWS message is related to the service provided to the user equipment. Whether the type of PWS message supported by the operator is consistent; and when the message type of the PWS message is inconsistent with the type of PWS message supported by the operator providing the user equipment, the user equipment determines that the base station is a pseudo base station.
其中,该PWS消息的消息类型可用于指示承载所述PWS消息的系统消息块。The message type of the PWS message may be used to indicate a system message block that carries the PWS message.
示例性地,用户设备接收到的PWS消息的消息类型为以下任一种:商用移动预警系统CMAS;地震海啸警报系统ETWS;欧洲公共预警系统EU-Alert;韩国公共预警系统KPAS;灾害和应急预警网络DEWN。Exemplarily, the message type of the PWS message received by the user equipment is any of the following: commercial mobile early warning system CMAS; earthquake and tsunami warning system ETWS; European public early warning system EU-Alert; Korean public early warning system KPAS; disaster and emergency early warning Network DEWN.
采用上述方案,用户设备接收到(用于指示用户设备接收PWS消息的)寻呼消息之后,可在判断PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型不一致的情况下,确定该基站为伪基站。由于一个运营商支持的PWS消息类型有限,因而在寻呼消息指示用户设备接收的PWS消息的类型为当前运营商不支持的类型的情况下,用户设备可判断该PWS消息并非来自运营商网络,即判断该PWS消息为伪造的PWS消息。因此,第一方面提供的方法可以准确识别基站是否为伪基站(即对PWS消息的来源进行判断),进而判断该PWS消息的真伪,避免伪造的PWS消息造成民众恐慌。With the above solution, after receiving the paging message (for instructing the user equipment to receive the PWS message), the user equipment may determine that the message type of the PWS message is inconsistent with the type of the PWS message supported by the operator that provides service to the user equipment. To determine that the base station is a pseudo base station. Because the type of PWS messages supported by an operator is limited, when the paging message indicates that the type of PWS message received by the user equipment is a type that is not supported by the current operator, the user equipment can determine that the PWS message is not from the operator's network. That is, it is determined that the PWS message is a fake PWS message. Therefore, the method provided in the first aspect can accurately identify whether the base station is a fake base station (that is, judge the source of the PWS message), and then determine the authenticity of the PWS message to avoid the panic caused by the fake PWS message.
在用户设备确定该基站为伪基站之后,用户设备可对用户设备的用户进行提示:用户设备当前驻留在伪基站小区。用户在看到提示后,则不会因为该PWS消息的内容造成恐慌。After the user equipment determines that the base station is a pseudo base station, the user equipment may prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell. After seeing the prompt, the user will not cause panic because of the content of the PWS message.
在一种可能的设计中,在用户设备判断该PWS消息的消息类型与运营商支持的PWS消息类型是否一致之前,用户设备可根据第一小区的配置信息和消息类型配置列表确定运营商支持的PWS消息类型,该消息类型配置列表用于指示至少一个运营商与该运营商支持的PWS消息的消息类型的对应关系;然后,用户设备获取该PWS消息的消息类型。In a possible design, before the user equipment determines whether the message type of the PWS message is consistent with the PWS message type supported by the operator, the user equipment may determine the information supported by the operator according to the configuration information of the first cell and the message type configuration list. PWS message type, the message type configuration list is used to indicate the correspondence between at least one operator and the message type of the PWS message supported by the operator; then, the user equipment obtains the message type of the PWS message.
其中,第一小区的配置信息包括以下至少一种:第一小区的公共陆地移动网络PLMN标识;第一小区的跟踪区代码TAC;第一小区的小区识别码Cell ID;第一小区的位置信息。The configuration information of the first cell includes at least one of the following: a public land mobile network PLMN identification of the first cell; a tracking area code TAC of the first cell; a cell identification code CellID of the first cell; and location information of the first cell .
采用上述方案,可以获取为用户设备提供服务的运营商支持的PWS消息类型以及PWS消息的消息类型,进而可用于判断二者的类型是否一致。With the above solution, the PWS message types and PWS message message types supported by the operator that provides services for user equipment can be obtained, and then can be used to determine whether the types are the same.
为了避免用户设备长时间驻留在伪基站小区,在用户设备确定该基站为伪基站之后,用户设备可将第一小区的小区信息加入禁止驻留列表,该禁止驻留列表用于指示用户设备禁止驻留在禁止驻留列表中记录的小区信息所对应的小区。In order to prevent the user equipment from staying in the pseudo base station cell for a long time, after the user equipment determines that the base station is a pseudo base station, the user equipment may add the cell information of the first cell to the forbidden camp list, and the forbidden camp list is used to indicate the user equipment It is forbidden to camp on the cell corresponding to the cell information recorded in the forbidden camping list.
其中,第一小区的小区信息包括以下至少一种:第一小区的小区频点;第一小区的小区频段;第一小区的物理小区标识PCI、第一小区的绝对无线频率信道号EARFCN。The cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a physical cell identification PCI of the first cell; and an absolute radio frequency channel number EARFCN of the first cell.
将第一小区的小区信息加入禁止驻留列表后,用户设备则不会再驻留在第一小区,因而可以避免用户设备长期驻留在伪基站小区并频繁接收到伪造PWS消息而导致的用户设备功耗增加的问题。After adding the cell information of the first cell to the forbidden camping list, the user equipment will no longer reside in the first cell, thereby preventing the user from staying in the pseudo base station cell for a long time and frequently receiving fake PWS messages. The problem of increased device power consumption.
此外,在用户设备将第一小区的小区信息加入禁止驻留列表之后,用户设备可在当前制式下进行小区搜索;若用户设备在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,该第二小区的小区信息未记录在禁止驻留列表中。In addition, after the user equipment adds the cell information of the first cell to the forbidden camping list, the user equipment can perform a cell search in the current system; if the user equipment searches for an available cell in the current system, it camps on the cell according to the cell search result. The second cell, the cell information of the second cell is not recorded in the prohibited camping list.
采用上述方案,用户设备可在当前制式下重新进行搜网,从而使得用户设备可以驻留到合法基站小区,进行正常通信。With the above solution, the user equipment can perform network search again under the current system, so that the user equipment can camp on a legal base station cell for normal communication.
在一种可能的设计中,在用户设备在当前制式下进行小区搜索之后,若用户设备在当前制式下未搜索到可用小区,则切换到当前制式之外的其他制式进行小区搜索,或者则将第一小区的小区信息从禁止驻留列表中删除,并重新驻留第一小区。In a possible design, after the user equipment performs a cell search in the current system, if the user equipment does not search for an available cell in the current system, it switches to a system other than the current system for the cell search, or The cell information of the first cell is deleted from the forbidden camping list, and the first cell is camped again.
采用上述方案,在当前制式下没有可用小区的情况下切换到其他制式进行小区搜索, 可以避免用户设备驻留在伪基站小区;在当前制式下没有可用小区的情况下重新驻留第一小区,可以避免用户设备在当前制式下无可用小区。By adopting the above scheme, switching to another system for cell search if there is no available cell under the current system can prevent the user equipment from camping on the pseudo base station cell; if the available cell is not available under the current system, the first cell is camped again. This can prevent the user equipment from having no available cells under the current system.
在第一方面提供的伪基站识别方法中,用户设备还可对消息类型配置列表进行更新。In the pseudo base station identification method provided in the first aspect, the user equipment may further update the message type configuration list.
具体地,用户设备可采用以下方式中的至少一种对消息类型配置列表进行更新:用户设备根据基站的指示对消息类型配置列表进行更新;用户设备通过查询告警服务器对消息类型配置列表进行更新,告警服务器为提供公共预警服务的应用服务器;用户设备通过用户设备的软件升级过程对消息类型配置列表进行更新;用户设备通过用户设备中用户身份识别SIM卡的软件升级过程对消息类型配置列表进行更新。Specifically, the user equipment may update the message type configuration list in at least one of the following ways: the user equipment updates the message type configuration list according to an instruction of the base station; the user equipment updates the message type configuration list by querying the alarm server, The alarm server is an application server that provides public warning services; the user device updates the message type configuration list through the software upgrade process of the user device; the user device updates the message type configuration list through the software upgrade process of the user identification SIM card in the user device .
此外,在采用第一方面提供的伪基站识别方案未能确定发送寻呼消息的基站为伪基站时,还可结合其他方法再次判断。In addition, when the pseudo base station identification scheme provided in the first aspect fails to determine that the base station sending the paging message is a pseudo base station, another method may be used to determine again.
示例性地,在PWS消息的消息类型与为运营商支持的PWS消息类型一致的情况下,还可采用如下方法进一步判断该基站是否为伪基站:用户设备对PWS消息的内容进行识别;在PWS消息的内容为垃圾信息的情况下,用户设备确定该基站为伪基站。Exemplarily, when the message type of the PWS message is consistent with the PWS message type supported by the operator, the following method can be further used to determine whether the base station is a pseudo base station: the user equipment identifies the content of the PWS message; in the PWS When the content of the message is spam, the user equipment determines that the base station is a pseudo base station.
示例性地,在PWS消息的消息类型与为运营商支持的PWS消息类型一致的情况下,还可采用如下方法进一步判断该基站是否为伪基站:当用户设备处于连接态时,用户设备与告警服务器进行通信,告警服务器为提供公共预警服务的应用服务器;用户设备在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息的情况下,确定基站为伪基站。Exemplarily, when the message type of the PWS message is the same as the PWS message type supported by the operator, the following method can be further used to determine whether the base station is a pseudo base station: When the user equipment is in a connected state, the user equipment and the alarm The server communicates, and the alarm server is an application server that provides public early warning services. The user equipment determines that the base station is a pseudo base station if the query of the alarm server does not trigger the PWS message update or the PWS message is a tampered PWS message.
上面两个示例中的判断方法将分别在第二方面和第三方面提供的伪基站识别方法中进行介绍,此处不再赘述。The judgment methods in the above two examples will be introduced in the pseudo base station identification methods provided in the second aspect and the third aspect, respectively, and will not be repeated here.
第二方面,本申请实施例提供一种伪基站识别方法,该方法包括如下步骤:用户设备接收当前驻留的第一小区所属的基站发送的PWS消息;用户设备在判断PWS消息的内容为垃圾信息的情况下,确定基站为伪基站。In a second aspect, an embodiment of the present application provides a method for identifying a pseudo base station. The method includes the following steps: a user equipment receives a PWS message sent by a base station to which a currently camping first cell belongs; the user equipment determines that the content of the PWS message is junk In the case of information, it is determined that the base station is a pseudo base station.
采用上述方案,用户设备接收到PWS消息之后,可在判断PWS消息的内容为垃圾信息的情况下,确定该基站为伪基站。由于告警服务器不会通过运营商网络向用户设备推送垃圾信息,因而在PWS消息的内容为垃圾信息的情况下,用户设备可判断该PWS消息并非来自运营商网络,即判断该PWS消息为伪造的PWS消息。因此,采用第二方面提供的方法可以准确识别基站是否为伪基站(即对PWS消息的来源进行判断),进而判断PWS消息的真伪,避免伪造的PWS消息造成民众恐慌。With the above solution, after receiving the PWS message, the user equipment may determine that the base station is a pseudo base station in a case where the content of the PWS message is determined to be spam. Since the alarm server does not push spam information to the user equipment through the operator's network, when the content of the PWS message is spam, the user equipment can determine that the PWS message does not come from the operator's network, that is, the PWS message is judged to be fake PWS message. Therefore, the method provided in the second aspect can accurately identify whether the base station is a fake base station (that is, judge the source of the PWS message), and then determine the authenticity of the PWS message to avoid the panic caused by the fake PWS message.
在用户设备确定该基站为伪基站之后,用户设备可对用户设备的用户进行提示:用户设备当前驻留在伪基站小区。用户在看到提示后,则不会因为PWS消息的内容造成恐慌。After the user equipment determines that the base station is a pseudo base station, the user equipment may prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell. After seeing the prompt, the user will not cause panic because of the content of the PWS message.
在一种可能的设计中,在用户设备接收当前驻留的第一小区所属的该基站发送的PWS消息之前,用户设备可接收该基站发送的寻呼消息,寻呼消息用于指示用户设备接收PWS消息。In a possible design, before the user equipment receives a PWS message sent by the base station to which the currently camping first cell belongs, the user equipment may receive a paging message sent by the base station, and the paging message is used to instruct the user equipment to receive PWS message.
也就是说,用户设备可在接收到寻呼消息之后,根据寻呼消息的指示接收PWS消息。That is, after receiving the paging message, the user equipment may receive the PWS message according to the indication of the paging message.
为了避免用户设备长时间驻留在伪基站小区,在用户设备确定该基站为伪基站之后,用户设备可将第一小区的小区信息加入禁止驻留列表,该禁止驻留列表用于指示用户设备禁止驻留在禁止驻留列表中记录的小区信息所对应的小区。In order to prevent the user equipment from staying in the pseudo base station cell for a long time, after the user equipment determines that the base station is a pseudo base station, the user equipment may add the cell information of the first cell to the forbidden camping list, and the forbidden camping list is used to instruct the user equipment It is forbidden to camp on the cell corresponding to the cell information recorded in the forbidden camping list.
其中,第一小区的小区信息包括以下至少一种:第一小区的小区频点;第一小区的小区频段;第一小区的物理小区标识PCI、第一小区的绝对无线频率信道号EARFCN。The cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a physical cell identification PCI of the first cell; and an absolute radio frequency channel number EARFCN of the first cell.
将第一小区的小区信息加入禁止驻留列表后,用户设备则不会再驻留在第一小区,因而可以避免用户设备长期驻留在伪基站小区并频繁接收到伪造PWS消息而导致的用户设备功耗增加的问题。After adding the cell information of the first cell to the forbidden camping list, the user equipment will no longer reside in the first cell, thereby preventing the user from staying in the pseudo base station cell for a long time and frequently receiving fake PWS messages. The problem of increased device power consumption.
此外,在用户设备将第一小区的小区信息加入禁止驻留列表之后,用户设备可在当前制式下进行小区搜索;若用户设备在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,该第二小区的小区信息未记录在禁止驻留列表中。In addition, after the user equipment adds the cell information of the first cell to the forbidden camping list, the user equipment can perform a cell search in the current system; if the user equipment searches for an available cell in the current system, it camps on the cell according to the cell search result. The second cell, the cell information of the second cell is not recorded in the prohibited camping list.
采用上述方案,用户设备可在当前制式下重新进行搜网,从而使得用户设备可以驻留到合法基站小区,进行正常通信。With the above solution, the user equipment can perform network search again under the current system, so that the user equipment can camp on a legal base station cell for normal communication.
在一种可能的设计中,在用户设备在当前制式下进行小区搜索之后,若用户设备在当前制式下未搜索到可用小区,则切换到当前制式之外的其他制式进行小区搜索,或者则将第一小区的小区信息从禁止驻留列表中删除,并重新驻留第一小区。In a possible design, after the user equipment performs a cell search in the current system, if the user equipment does not search for an available cell in the current system, it switches to a system other than the current system for the cell search, or The cell information of the first cell is deleted from the forbidden camping list, and the first cell is camped again.
采用上述方案,在当前制式下没有可用小区的情况下切换到其他制式进行小区搜索,可以避免用户设备驻留在伪基站小区;在当前制式下没有可用小区的情况下重新驻留第一小区,可以避免用户设备在当前制式下无可用小区。By adopting the above scheme, switching to another system to perform a cell search when there is no available cell in the current system can prevent the user equipment from camping on the pseudo base station cell; if the available cell is not available in the current system, the first cell is camped again. This can prevent the user equipment from having no available cells under the current system.
第三方面,本申请实施例提供一种伪基站识别方法,该方法包括如下步骤:用户设备接收当前驻留的第一小区所属的基站发送的PWS消息;当用户设备处于连接态时,用户设备与告警服务器进行通信,告警服务器为提供公共预警服务的应用服务器;用户设备在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息的情况下,确定该基站为伪基站。According to a third aspect, an embodiment of the present application provides a pseudo base station identification method. The method includes the following steps: a user equipment receives a PWS message sent by a base station to which a first cell that currently resides; when the user equipment is in a connected state, the user equipment Communicate with the alarm server. The alarm server is an application server that provides public warning services. The user equipment determines that the base station is a pseudo base station if the alarm server does not trigger the PWS message update or the PWS message is a tampered PWS message. .
采用上述方案,用户设备接收到PWS消息之后,可主动与告警服务器进行通信,在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息的情况下,确定该基站为伪基站。由于伪基站难以对连接态的用户设备主动发起的、与告警服务器的通信进行干扰,因而用户设备通过查询告警服务器获得的信息为未经干扰的信息。在该未经干扰的信息与PWS消息不符时,说明PWS消息是伪造的,也就说明该基站为伪基站。因此,采用第三方面提供的方法,可以准确识别基站是否为伪基站(即对PWS消息的来源进行判断),进而判断PWS消息的真伪,避免伪造的PWS消息造成民众恐慌。With the above solution, after receiving the PWS message, the user equipment can actively communicate with the alarm server, and determine that the base station is false if the alarm server is not triggered to update the PWS message or the PWS message is a tampered PWS message. Base station. Since it is difficult for the pseudo base station to interfere with the communication initiated by the connected user equipment with the alarm server, the information obtained by the user equipment by querying the alarm server is non-interfering information. When the uninterfered information does not match the PWS message, it means that the PWS message is forged, that is, the base station is a fake base station. Therefore, the method provided in the third aspect can accurately identify whether the base station is a fake base station (that is, judge the source of the PWS message), and then determine the authenticity of the PWS message, thereby avoiding the panic caused by the fake PWS message.
具体地,在第三方面提供的方法中,用户设备与告警服务器进行通信,可以采用如下方式中的任一种:用户设备查询告警服务器在第一设定时长内是否触发PWS消息更新;用户设备查询告警服务器最近一次发送的第二PWS消息的内容,将第二PWS消息的内容与PWS消息的内容进行比对;用户设备指示告警服务器采用非对称加解密方式重新发送最近一次发送的第三PWS消息和/或第三PWS消息的校验码流;用户设备将第三PWS消息的内容与PWS消息的内容进行比对,和/或,将第三PWS消息的校验码流与PWS消息的校验码流进行比对。Specifically, in the method provided by the third aspect, the user equipment communicates with the alarm server in any of the following ways: the user equipment queries whether the alarm server triggers a PWS message update within the first set time period; the user equipment Query the content of the second PWS message sent by the alarm server last time, and compare the content of the second PWS message with the content of the PWS message; the user equipment instructs the alarm server to resend the third PWS sent last time by using asymmetric encryption and decryption Message and / or check code stream of the third PWS message; the user equipment compares the content of the third PWS message with the content of the PWS message, and / or, compares the check code stream of the third PWS message with the content of the PWS message Check the code stream for comparison.
在用户设备确定该基站为伪基站之后,用户设备可对用户设备的用户进行提示:用户设备当前驻留在伪基站小区。用户在看到提示后,则不会因为PWS消息的内容造成恐慌。After the user equipment determines that the base station is a pseudo base station, the user equipment may prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell. After seeing the prompt, the user will not cause panic because of the content of the PWS message.
在一种可能的设计中,在用户设备接收当前驻留的第一小区所属的该基站发送的PWS消息之前,用户设备可接收该基站发送的寻呼消息,寻呼消息用于指示用户设备接收PWS消息。In a possible design, before the user equipment receives a PWS message sent by the base station to which the currently camping first cell belongs, the user equipment may receive a paging message sent by the base station, and the paging message is used to instruct the user equipment to receive PWS message.
也就是说,用户设备可在接收到寻呼消息之后,根据寻呼消息的指示接收PWS消息。That is, after receiving the paging message, the user equipment may receive the PWS message according to the indication of the paging message.
为了避免用户设备长时间驻留在伪基站小区,在用户设备确定该基站为伪基站之后, 用户设备可将第一小区的小区信息加入禁止驻留列表,该禁止驻留列表用于指示用户设备禁止驻留在禁止驻留列表中记录的小区信息所对应的小区。In order to prevent the user equipment from staying in the pseudo base station cell for a long time, after the user equipment determines that the base station is a pseudo base station, the user equipment may add the cell information of the first cell to the forbidden camping list, and the forbidden camping list is used to indicate the user equipment. It is forbidden to camp on the cell corresponding to the cell information recorded in the forbidden camping list.
其中,第一小区的小区信息包括以下至少一种:第一小区的小区频点;第一小区的小区频段;第一小区的物理小区标识PCI、第一小区的绝对无线频率信道号EARFCN。The cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a physical cell identification PCI of the first cell; and an absolute radio frequency channel number EARFCN of the first cell.
将第一小区的小区信息加入禁止驻留列表后,用户设备则不会再驻留在第一小区,因而可以避免用户设备长期驻留在伪基站小区并频繁接收到伪造PWS消息而导致的用户设备功耗增加的问题。After adding the cell information of the first cell to the forbidden camping list, the user equipment will no longer reside in the first cell, thereby preventing the user from staying in the pseudo base station cell for a long time and frequently receiving fake PWS messages. The problem of increased device power consumption.
此外,在用户设备将第一小区的小区信息加入禁止驻留列表之后,用户设备可在当前制式下进行小区搜索;若用户设备在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,该第二小区的小区信息未记录在禁止驻留列表中。In addition, after the user equipment adds the cell information of the first cell to the forbidden camping list, the user equipment can perform a cell search in the current system; if the user equipment searches for an available cell in the current system, it camps on the cell according to the cell search result. The second cell, the cell information of the second cell is not recorded in the prohibited camping list.
采用上述方案,用户设备可在当前制式下重新进行搜网,从而使得用户设备可以驻留到合法基站小区,进行正常通信。With the above solution, the user equipment can perform network search again under the current system, so that the user equipment can camp on a legal base station cell for normal communication.
在一种可能的设计中,在用户设备在当前制式下进行小区搜索之后,若用户设备在当前制式下未搜索到可用小区,则切换到当前制式之外的其他制式进行小区搜索,或者则将第一小区的小区信息从禁止驻留列表中删除,并重新驻留第一小区。In a possible design, after the user equipment performs a cell search in the current system, if the user equipment does not search for an available cell in the current system, it switches to a system other than the current system for the cell search, or The cell information of the first cell is deleted from the forbidden camping list, and the first cell is camped again.
采用上述方案,在当前制式下没有可用小区的情况下切换到其他制式进行小区搜索,可以避免用户设备驻留在伪基站小区;在当前制式下没有可用小区的情况下重新驻留第一小区,可以避免用户设备在当前制式下无可用小区。By adopting the above scheme, switching to another system to perform a cell search when there is no available cell in the current system can prevent the user equipment from camping on the pseudo base station cell; if the available cell is not available in the current system, the first cell is camped again. This can prevent the user equipment from having no available cells under the current system.
此外,在本身实施例中,若用户设备在接收到PWS消息时处于空闲态,则可采用如下方案判断该基站是否为伪基站:在用户设备接收当前驻留的第一小区所属的基站发送的PWS消息之后,若用户设备处于空闲态,用户设备则触发建链;用户设备在建链失败的情况下确定该基站为伪基站。In addition, in its own embodiment, if the user equipment is in an idle state when receiving the PWS message, the following scheme can be used to determine whether the base station is a pseudo base station: The user equipment receives a message sent by the base station to which the first cell currently camping belongs. After the PWS message, if the user equipment is in an idle state, the user equipment triggers a chain establishment; the user equipment determines that the base station is a pseudo base station if the chain establishment fails.
当用户设备驻留在合法基站小区时,若用户设备主动发起建链,用户设备与基站间会建链成功,使得用户设备可转换为连接态与基站进行正常通信;而在用户设备驻留在伪基站小区的情况下,由于伪基站难以与用户设备进行双向鉴权,因而在用户设备主动发起建链的情况下,会导致建链失败。因此,在第三方面提供的方法中,可通过用户设备触发建链是否成功来判断该基站是否为合法基站。When the user equipment resides in a legal base station cell, if the user equipment actively initiates a chain establishment, the chain establishment between the user equipment and the base station is successful, so that the user equipment can be switched to a connected state for normal communication with the base station; while the user equipment resides in the In the case of a pseudo base station cell, since it is difficult for the pseudo base station to perform two-way authentication with the user equipment, if the user equipment actively initiates a chain establishment, the chain establishment may fail. Therefore, in the method provided in the third aspect, whether the base station is a legitimate base station may be determined by whether the user equipment triggers the establishment of the chain successfully.
此外,为了避免多个用户设备同时触发建链,用户设备在触发建链时,可在等待第二设定时长后触发建链。In addition, in order to prevent multiple user equipments from triggering the chain establishment at the same time, when the user equipment triggers the chain establishment, it may trigger the chain establishment after waiting for a second set time.
其中,第二设定时长可以由用户设备配置,也可以由网络配置,也可以由用户设备和网络共同配置。The second setting duration may be configured by the user equipment, may be configured by the network, or may be configured by the user equipment and the network together.
在用户设备触发建链后,若用户设备建链成功,可通过如下方案进一步判断该基站是否为伪基站:用户设备在建链成功后与告警服务器进行通信;用户设备在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息时,确定该基站为伪基站。After the user equipment triggers the chain establishment, if the user equipment chain establishment is successful, the following scheme can be used to further determine whether the base station is a pseudo base station: the user equipment communicates with the alarm server after the chain establishment is successful; the user equipment does not trigger the query when the alarm server is found When the PWS message is updated or it is found that the PWS message is a tampered PWS message, it is determined that the base station is a pseudo base station.
在这种实现方式中,用户设备建链成功可能是如下情况:用户设备接收到的PWS消息为伪基站对合法基站的寻呼信道进行干扰后向用户设备发送的;用户设备触发建链时,合法基站会与用户设备建立连接,此时用户设备仍可通过查询告警服务器来判断之前收到的PWS消息是否为伪基站发送的PWS消息。In this implementation, the success of the user equipment chain establishment may be as follows: the PWS message received by the user equipment is sent to the user equipment after the pseudo base station interferes with the paging channel of the legitimate base station; when the user equipment triggers the chain establishment, A legitimate base station will establish a connection with the user equipment. At this time, the user equipment can still query the alarm server to determine whether the previously received PWS message is a PWS message sent by a pseudo base station.
第四方面,本申请实施例提供一种伪基站识别装置,该装置应用于用户设备中,包括 收发模块和处理模块。In a fourth aspect, an embodiment of the present application provides a pseudo base station identification device, which is applied to user equipment and includes a transceiver module and a processing module.
收发模块,用于接收当前驻留的第一小区所属的该基站发送的寻呼消息,寻呼消息用于指示用户设备接收公共预警系统PWS消息。The transceiver module is configured to receive a paging message sent by the base station to which the currently camping first cell belongs, and the paging message is used to instruct the user equipment to receive a public early warning system PWS message.
处理模块,用于判断所述PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型是否一致;在PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型不一致的情况下,确定该基站为伪基站。A processing module, configured to determine whether a message type of the PWS message is consistent with a PWS message type supported by an operator serving a user equipment; a message type of the PWS message and a PWS message type supported by an operator serving the user equipment In the case of inconsistency, it is determined that the base station is a pseudo base station.
其中,PWS消息的消息类型用于指示承载该PWS消息的系统消息块。The message type of the PWS message is used to indicate a system message block that carries the PWS message.
在一种可能的设计中,处理模块还用于:在判断所述PWS消息的消息类型与所述运营商支持的PWS消息类型是否一致之前,根据第一小区的配置信息和消息类型配置列表确定运营商支持的PWS消息类型,消息类型配置列表用于指示至少一个运营商与该运营商支持的PWS消息的消息类型的对应关系;获取PWS消息的消息类型。In a possible design, the processing module is further configured to: before determining whether the message type of the PWS message is consistent with the PWS message type supported by the operator, determine according to the configuration information of the first cell and the message type configuration list The PWS message type supported by the operator. The message type configuration list is used to indicate the correspondence between at least one operator and the message type of the PWS message supported by the operator; obtain the message type of the PWS message.
在一种可能的设计中,处理模块还用于:在判断PWS消息的消息类型与运营商支持的PWS消息类型是否一致之后,在PWS消息的消息类型与为运营商支持的PWS消息类型一致的情况下,对PWS消息的内容进行识别;然后,在PWS消息的内容为垃圾信息的情况下,确定该基站为伪基站。In a possible design, the processing module is further configured to: after determining whether the message type of the PWS message is consistent with the PWS message type supported by the operator, after the message type of the PWS message is consistent with the PWS message type supported by the operator In this case, the content of the PWS message is identified; then, if the content of the PWS message is spam, it is determined that the base station is a pseudo base station.
在一种可能的设计中,处理模块还用于:在判断PWS消息的消息类型与运营商支持的PWS消息类型是否一致之后,在PWS消息的消息类型与为运营商支持的PWS消息类型一致的情况下,当用户设备处于连接态时,通过收发模块与告警服务器进行通信,该告警服务器为提供公共预警服务的应用服务器;然后,在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息的情况下,确定基站为伪基站。In a possible design, the processing module is further configured to: after determining whether the message type of the PWS message is consistent with the PWS message type supported by the operator, after the message type of the PWS message is consistent with the PWS message type supported by the operator In the case, when the user equipment is in the connected state, it communicates with the alarm server through the transceiver module. The alarm server is an application server that provides public warning services. Then, the PWS message update is not triggered when the alarm server is queried or the PWS message is queried as In the case of a tampered PWS message, it is determined that the base station is a pseudo base station.
在一种可能的设计中,处理模块还用于:在确定该基站为伪基站之后,将第一小区的小区信息加入禁止驻留列表,禁止驻留列表用于指示用户设备禁止驻留在禁止驻留列表中记录的小区信息所对应的小区。In a possible design, the processing module is further configured to: after determining that the base station is a pseudo base station, add the cell information of the first cell to a prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit camping on the prohibited The cell corresponding to the cell information recorded in the camping list.
在一种可能的设计中,处理模块还用于:在将第一小区的小区信息加入禁止驻留列表之后,在当前制式下进行小区搜索;若在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,第二小区的小区信息未记录在禁止驻留列表中。In a possible design, the processing module is further configured to: after adding the cell information of the first cell to the forbidden camping list, perform a cell search in the current system; if an available cell is searched in the current system, according to the cell The search result is camped on the second cell, and the cell information of the second cell is not recorded in the prohibited camping list.
在一种可能的设计中,处理模块还用于:在进行小区搜索之后,若在当前制式下未搜索到可用小区,则切换到当前制式之外的其他制式进行小区搜索;或者,在进行小区搜索之后,若在当前制式下未搜索到可用小区,则将第一小区的小区信息从禁止驻留列表中删除,并重新驻留第一小区。In a possible design, the processing module is further configured to: after performing a cell search, if no available cell is found in the current system, switch to a system other than the current system to perform a cell search; or, perform a cell search After searching, if no available cell is found in the current system, the cell information of the first cell is deleted from the forbidden camping list, and the first cell is camped again.
在一种可能的设计中,处理模块还用于:对消息类型配置列表进行更新。In a possible design, the processing module is further configured to: update the message type configuration list.
在一种可能的设计中,处理模块采用以下方式中的至少一种对消息类型配置列表进行更新:处理模块根据该基站的指示对消息类型配置列表进行更新;处理模块通过查询告警服务器对消息类型配置列表进行更新,告警服务器为提供公共预警服务的应用服务器;处理模块通过用户设备的软件升级过程对消息类型配置列表进行更新;处理模块通过用户设备中用户身份识别SIM卡的软件升级过程对消息类型配置列表进行更新。In a possible design, the processing module updates the message type configuration list in at least one of the following ways: the processing module updates the message type configuration list according to an instruction of the base station; the processing module queries the alarm server for the message type The configuration list is updated. The alarm server is an application server that provides public warning services. The processing module updates the message type configuration list through the software upgrade process of the user device. The processing module updates the message through the software upgrade process of the user identification SIM card in the user device. Type configuration list is updated.
在一种可能的设计中,第一小区的配置信息包括以下至少一种:第一小区的公共陆地移动网络PLMN标识;第一小区的跟踪区代码TAC;第一小区的小区识别码Cell ID;第一小区的位置信息。In a possible design, the configuration information of the first cell includes at least one of the following: a public land mobile network PLMN identification of the first cell; a tracking area code TAC of the first cell; a cell identification code CellID of the first cell; Location information of the first cell.
在一种可能的设计中,第一小区的小区信息包括以下至少一种:第一小区的小区频点; 第一小区的小区频段;第一小区的物理小区标识PCI;第一小区的E-UTRA绝对无线频率信道号EARFCN。In a possible design, the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a physical cell identifier PCI of the first cell; and an E- of the first cell UTRA absolute radio frequency channel number EARFCN.
在一种可能的设计中,处理模块还用于:在确定该基站为伪基站之后,提示用户设备的用户:用户设备当前驻留在伪基站小区。In a possible design, the processing module is further configured to: after determining that the base station is a pseudo base station, prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
在一种可能的设计中,PWS消息的消息类型为以下任一种:商用移动预警系统CMAS;地震海啸警报系统ETWS;欧洲公共预警系统EU-Alert;韩国公共预警系统KPAS;灾害和应急预警网络DEWN。In a possible design, the message type of the PWS message is any of the following: commercial mobile early warning system CMAS; earthquake and tsunami warning system ETWS; European public early warning system EU-Alert; Korean public early warning system KPAS; disaster and emergency early warning network DEWN.
第五方面,本申请实施例提供一种伪基站识别装置,其特征在于,该装置应用于用户设备中,包括收发模块和处理模块。In a fifth aspect, an embodiment of the present application provides a pseudo base station identification apparatus, which is characterized in that the apparatus is applied to user equipment and includes a transceiver module and a processing module.
收发模块,用于接收当前驻留的第一小区所属的该基站发送的PWS消息。The transceiver module is configured to receive a PWS message sent by the base station to which the currently camping first cell belongs.
处理模块,用于在判断PWS消息的内容为垃圾信息的情况下,确定该基站为伪基站。A processing module is configured to determine that the base station is a pseudo base station when the content of the PWS message is judged as spam.
在一种可能的设计中,收发模块还用于:在接收当前驻留的第一小区所属的该基站发送的PWS消息之前,接收该基站发送的寻呼消息,该寻呼消息用于指示用户设备接收PWS消息。In a possible design, the transceiver module is further configured to: before receiving a PWS message sent by the base station to which the first cell currently resides, receive a paging message sent by the base station, the paging message is used to indicate a user The device receives a PWS message.
在一种可能的设计中,处理模块还用于:在确定该基站为伪基站之后,将第一小区的小区信息加入禁止驻留列表,禁止驻留列表用于指示用户设备禁止驻留在禁止驻留列表中记录的小区信息所对应的小区。In a possible design, the processing module is further configured to: after determining that the base station is a pseudo base station, add the cell information of the first cell to a prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit camping on the prohibited The cell corresponding to the cell information recorded in the camping list.
在一种可能的设计中,处理模块还用于:在将第一小区的小区信息加入禁止驻留列表之后,还在当前制式下进行小区搜索;若在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,第二小区的小区信息未记录在禁止驻留列表中。In a possible design, the processing module is further configured to: after adding the cell information of the first cell to the forbidden camping list, perform a cell search in the current system; if an available cell is searched in the current system, according to The cell search result is camped on the second cell, and the cell information of the second cell is not recorded in the prohibited camping list.
在一种可能的设计中,处理模块还用于:在进行小区搜索之后,若在当前制式下未搜索到可用小区,则切换到当前制式之外的其他制式进行小区搜索;或者,在进行小区搜索之后,若在当前制式下未搜索到可用小区,则将第一小区的小区信息从禁止驻留列表中删除,并重新驻留第一小区。In a possible design, the processing module is further configured to: after performing a cell search, if no available cell is found in the current system, switch to a system other than the current system to perform a cell search; or, perform a cell search After searching, if no available cell is found in the current system, the cell information of the first cell is deleted from the forbidden camping list, and the first cell is camped again.
在一种可能的设计中,第一小区的小区信息包括以下至少一种:第一小区的小区频点;第一小区的小区频段;第一小区的PCI;第一小区的EARFCN。In a possible design, the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
在一种可能的设计中,处理模块还用于:在确定该基站为伪基站之后,提示用户设备的用户:用户设备当前驻留在伪基站小区。In a possible design, the processing module is further configured to: after determining that the base station is a pseudo base station, prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
第六方面,本申请实施例提供一种伪基站识别装置,该装置应用于用户设备中,包括收发模块和处理模块。In a sixth aspect, an embodiment of the present application provides a pseudo base station identification apparatus, which is applied to user equipment and includes a transceiver module and a processing module.
收发模块,用于接收当前驻留的第一小区所属的基站发送的PWS消息。The transceiver module is configured to receive a PWS message sent by a base station to which the currently camping first cell belongs.
处理模块,用于在用户设备处于连接态时通过收发模块与告警服务器进行通信,告警服务器为提供公共预警服务的应用服务器。The processing module is configured to communicate with the alarm server through the transceiver module when the user equipment is in a connected state, and the alarm server is an application server that provides a public early warning service.
处理模块,还用于在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息的情况下,确定该基站为伪基站。The processing module is further configured to determine that the base station is a pseudo base station when the alarm server is not triggered to update the PWS message or the PWS message is a tampered PWS message.
在一种可能的设计中,收发模块还用于:在接收当前驻留的第一小区所属的该基站发送的PWS消息之前,接收该基站发送的寻呼消息,寻呼消息用于指示用户设备接收PWS消息。In a possible design, the transceiver module is further configured to: before receiving a PWS message sent by the base station to which the currently camping first cell belongs, receive a paging message sent by the base station, and the paging message is used to indicate the user equipment Receive PWS messages.
在一种可能的设计中,处理模块在通过收发模块与告警服务器进行通信时,具体用于:处理模块通过收发模块查询告警服务器在第一设定时长内是否触发PWS消息更新;或者, 处理模块通过收发模块查询告警服务器最近一次发送的第二PWS消息的内容,将第二PWS消息的内容与PWS消息的内容进行比对;或者,处理模块通过收发模块指示告警服务器采用非对称加解密方式重新发送最近一次发送的第三PWS消息和/或第三PWS消息的校验码流;处理模块将第三PWS消息的内容与PWS消息的内容进行比对,和/或,将第三PWS消息的校验码流与PWS消息的校验码流进行比对。In a possible design, when the processing module communicates with the alarm server through the transceiver module, the processing module is specifically used for: the processing module queries the alarm server whether to trigger the PWS message update within the first set time period through the transceiver module; or, the processing module Query the content of the second PWS message sent by the alarm server through the transceiver module, and compare the content of the second PWS message with the content of the PWS message; or, the processing module instructs the alarm server to re-use the asymmetric encryption and decryption method through the transceiver module Send the third PWS message and / or the checksum stream of the third PWS message sent last time; the processing module compares the content of the third PWS message with the content of the PWS message, and / or, compares the content of the third PWS message The check code stream is compared with the check code stream of the PWS message.
在一种可能的设计中,处理模块还用于:在确定该基站为伪基站之后,将第一小区的小区信息加入禁止驻留列表,禁止驻留列表用于指示用户设备禁止驻留在禁止驻留列表中记录的小区信息所对应的小区。In a possible design, the processing module is further configured to: after determining that the base station is a pseudo base station, add the cell information of the first cell to a prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit camping on the prohibited The cell corresponding to the cell information recorded in the camping list.
在一种可能的设计中,处理模块还用于:在将第一小区的小区信息加入禁止驻留列表之后,在当前制式下进行小区搜索;若在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,第二小区的小区信息未记录在禁止驻留列表中。In a possible design, the processing module is further configured to: after adding the cell information of the first cell to the forbidden camping list, perform a cell search in the current system; if an available cell is searched in the current system, according to the cell The search result is camped on the second cell, and the cell information of the second cell is not recorded in the prohibited camping list.
在一种可能的设计中,处理模块还用于:在进行小区搜索之后,若在当前制式下未搜索到可用小区,则切换到当前制式之外的其他制式进行小区搜索;或者,在进行小区搜索之后,若在当前制式下未搜索到可用小区,则将第一小区的小区信息从禁止驻留列表中删除,并重新驻留第一小区。In a possible design, the processing module is further configured to: after performing a cell search, if no available cell is found in the current system, switch to a system other than the current system to perform a cell search; or, perform a cell search After searching, if no available cell is found in the current system, the cell information of the first cell is deleted from the forbidden camping list, and the first cell is camped again.
在一种可能的设计中,处理模块还用于:在接收当前驻留的第一小区所属的该基站发送的PWS消息之后,若用户设备处于空闲态,则通过收发模块触发建链;在建链失败的情况下确定基站为伪基站。In a possible design, the processing module is further configured to: after receiving the PWS message sent by the base station to which the first cell currently resides, if the user equipment is in an idle state, triggering a chain establishment through the transceiver module; In the case of a chain failure, the base station is determined to be a pseudo base station.
在一种可能的设计中,处理模块还用于:在触发建链之后,在建链成功后通过收发模块与告警服务器进行通信;在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息时,确定该基站为伪基站。In a possible design, the processing module is further configured to: after triggering the chain establishment, communicate with the alarm server through the transceiver module after the chain establishment is successful; when the query of the alarm server does not trigger the PWS message update or the query of the PWS message is When the tampered PWS message is determined, the base station is determined to be a pseudo base station.
在一种可能的设计中,处理模块通过收发模块触发建链,包括:处理模块在等待第二设定时长后通过收发模块触发建链。In a possible design, the processing module triggers chain establishment through the transceiver module, including: the processing module triggers chain establishment through the transceiver module after waiting for the second set time.
在一种可能的设计中,第一小区的小区信息包括以下至少一种:第一小区的小区频点;第一小区的小区频段;第一小区的PCI;第一小区的EARFCN。In a possible design, the cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
在一种可能的设计中,处理模块还用于:在确定该基站为伪基站之后,提示用户设备的用户:用户设备当前驻留在伪基站小区。In a possible design, the processing module is further configured to: after determining that the base station is a pseudo base station, prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
第七方面,本申请实施例提供一种伪基站识别装置,该装置包括处理器,所述处理器与存储器耦合,并读取所述存储器中的指令,用于执行上述第一方面至第三方面中任一方面或任一方面的任意一种设计所述的方法。According to a seventh aspect, an embodiment of the present application provides a pseudo base station identification device. The device includes a processor, the processor is coupled to a memory, and reads an instruction in the memory, for executing the first aspect to the third aspect. Any of the aspects or any of the aspects design a method as described.
其中,该伪基站识别装置可以是用户设备,也可以是用户设备中的芯片。The pseudo base station identification device may be a user equipment or a chip in the user equipment.
具体地,该用户设备包括但不限于智能手机、智能手表、平板电脑、虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、个人计算机、手持式计算机、个人数字助理。Specifically, the user equipment includes, but is not limited to, a smart phone, a smart watch, a tablet computer, a virtual reality (VR) device, an augmented reality (AR) device, a personal computer, a handheld computer, and a personal digital assistant.
第八方面,本申请实施例还提供了一种计算机可读存储介质,用于存储为执行上述第一方面至第三方面中任一方面或任一方面的任意一种设计的功能所用的程序,该程序被处理器执行时,用于实现上述第一方面至第三方面中任一方面或任一方面的任意一种设计所述的方法。According to an eighth aspect, an embodiment of the present application further provides a computer-readable storage medium for storing a program for executing a function designed in any one of the first to third aspects or any one of the aspects. When the program is executed by a processor, it is used to implement the method described in any one of the first to third aspects or any one of the aspects.
需要说明的是,第八方面提供的计算机可读存储介质可仅用于存储第一方面或第一方面的任意一种设计的功能所用的程序、第二方面或第二方面的任意一种设计的功能所用的 程序以及第三方面或第三方面的任意一种设计的功能所用的程序中的一种程序,也可以存储上述三种程序中的两种或三种程序。也就是说,当该程序被处理器调用时,可用于实现上述第一方面或第一方面的任意一种设计所述的方法、上述第二方面或第二方面的任意一种设计所述的方法以及上述第三方面或第三方面的任意一种设计所述的方法这三类方法中的一种或多种。It should be noted that the computer-readable storage medium provided in the eighth aspect may only be used to store a program used for the functions of the first aspect or any one of the designs of the first aspect, the second aspect or any of the designs of the second aspect One of the programs used for the functions of the third aspect or the functions designed for the third aspect or any one of the third aspects may also store two or three of the above three types of programs. That is, when the program is called by the processor, it can be used to implement the method described in the first aspect or any one of the first aspects, and the method described in the second aspect or any one of the second aspects. One or more of the three types of methods, including the method and the method described in the third aspect or any one of the third aspects.
第九方面,本申请实施例提供了一种包含程序代码的计算机程序产品,当其包含的程序代码在计算机上运行时,使得计算机执行上述第一方面至第三方面中任一方面或任一方面的任意一种设计所述的方法。In a ninth aspect, an embodiment of the present application provides a computer program product including a program code, and when the program code contained in the computer program product runs on a computer, the computer executes any one of the first to third aspects or any one of the foregoing aspects. Any of the aspects design the method described.
需要说明的是,第九方面提供的计算机程序产品包含的程序代码在计算机上运行时,该计算机可执行上述第一方面或第一方面的任意一种设计所述的方法、上述第二方面或第二方面的任意一种设计所述的方法以及上述第三方面或第三方面的任意一种设计所述的方法这三类方法中的一种或多种。It should be noted that, when the program code included in the computer program product provided in the ninth aspect runs on a computer, the computer can execute the method described in the first aspect or any one of the first aspects, the second aspect, or One or more of the three types of methods described in any one of the second aspect designing the method and the third aspect or any one of the third aspect designing the method.
另外,第四方面至第九方面中任一种可能设计方式所带来的技术效果可参见第一方面至第三方面中不同设计方式所带来的技术效果,此处不再赘述。In addition, for the technical effects brought by any of the possible design manners in the fourth aspect to the ninth aspect, refer to the technical effects brought by the different design manners in the first aspect to the third aspect, and are not repeated here.
此外,需要说明的是,本申请实施例提供的伪基站识别方案是在用户设备接收到PWS消息后触发的,通过识别PWS消息的一些特征以及通过后续用户设备与基站的交互过程来确定PWS消息的来源。在实际应用中,伪基站也可通过向用户设备发送其他类型的消息来推送虚假信息,例如小区广播业务(cell broadcast service,CBS)消息。由于这类型消息(例如,CBS消息)与PWS消息的传输方式、传输时机等类似,用户设备在接收到这类型消息(例如,CBS消息)后,也可采用与上述实施例中类似的方式来判断消息的来源。也就是说,本申请实施例不仅可用于判断PWS消息的来源,还可用于判断伪基站用于推送虚假信息的其他类型消息的来源。由于判断过程相似,本申请实施例中以PWS消息来源的判断为例进行说明。In addition, it should be noted that the pseudo base station identification scheme provided in the embodiment of the present application is triggered after the user equipment receives the PWS message. The PWS message is determined by identifying some characteristics of the PWS message and the subsequent interaction process between the user equipment and the base station. origin of. In practical applications, the pseudo base station can also push false information by sending other types of messages to the user equipment, such as a cell broadcast service (CBS) message. Since this type of message (for example, CBS message) is similar to the transmission mode and transmission timing of PWS message, after receiving this type of message (for example, CBS message), the user equipment can also use a similar method to the above embodiment to Determine the source of the message. That is, the embodiments of the present application can be used not only to judge the source of PWS messages, but also to judge the sources of other types of messages used by pseudo base stations to push false information. Since the judgment process is similar, the judgment of the source of the PWS message is taken as an example for description in the embodiment of the present application.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1为本申请实施例提供的一种本申请实施例的应用场景的示意图;FIG. 1 is a schematic diagram of an application scenario according to an embodiment of the present application;
图2为本申请实施例提供的第一种伪基站识别方法的流程示意图;2 is a schematic flowchart of a first pseudo base station identification method according to an embodiment of the present application;
图3为本申请实施例提供的第二种伪基站识别方法的流程示意图;3 is a schematic flowchart of a second pseudo base station identification method according to an embodiment of the present application;
图4为本申请实施例提供的第三种伪基站识别方法的流程示意图;4 is a schematic flowchart of a third pseudo base station identification method according to an embodiment of the present application;
图5为本申请实施例提供的第四种伪基站识别方法的流程示意图;5 is a schematic flowchart of a fourth pseudo base station identification method according to an embodiment of the present application;
图6为本申请实施例提供的第五种伪基站识别方法的流程示意图;6 is a schematic flowchart of a fifth pseudo base station identification method according to an embodiment of the present application;
图7为本申请实施例提供的一种用户设备的结构示意图;7 is a schematic structural diagram of a user equipment according to an embodiment of the present application;
图8为本申请实施例提供的另一种用户设备的结构示意图。FIG. 8 is a schematic structural diagram of another user equipment according to an embodiment of the present application.
具体实施方式detailed description
如背景技术中所述,3GPP协议中规定,基站向用户设备发送PWS消息的方式可以是:当发生突发情况需要通过PWS消息通知用户时,基站会向用户设备发送寻呼(Paging)消息,以指示用户设备接收PWS消息;用户设备在接收到该寻呼消息后,立即接收基站下发的PWS消息并在显示界面上显示PWS消息的内容。As described in the background art, the 3GPP protocol specifies that a base station may send a PWS message to a user equipment by using a PWS message to notify the user when an unexpected situation occurs. The base station may send a paging message to the user equipment. To instruct the user equipment to receive the PWS message; after receiving the paging message, the user equipment immediately receives the PWS message issued by the base station and displays the content of the PWS message on the display interface.
其中,PWS消息可以视为系统消息中的一种。系统消息可以包含一个主信息块(master information block,MIB)以及至少一个系统消息块(system information block,SIB),例如SIB1、SIB2、SIB3......。其中,SIB1中包含用户设备小区接入所需信息以及其他SIB的调度信息。通常,用户设备在接收系统消息时,先接收MIB,再接收SIB1,然后再接收其他系统消息块。其中,PWS消息可承载在除MIB和SIB1之外的某个系统消息块中,例如承载在SIB10、SIB11或SIB12中。Among them, the PWS message can be regarded as one of the system messages. The system message may include a master information block (master information block, MIB) and at least one system message block (system information block, SIB), such as SIB1, SIB2, SIB3, etc. Among them, SIB1 includes information required for user equipment cell access and scheduling information of other SIBs. Generally, when a user equipment receives a system message, it first receives the MIB, then the SIB1, and then receives other system message blocks. The PWS message may be carried in a system message block other than MIB and SIB1, for example, SIB10, SIB11, or SIB12.
具体地,用户设备接收PWS消息的方式可以是:用户设备先接收MIB,再接收SIB1,SIB1中携带PWS消息的调度信息,该调度信息包括但不限于PWS消息的消息类型、承载PWS消息的系统消息块的指示信息;用户设备通过对SIB1进行解析,可以获取PWS消息的调度信息,从而根据该调度信息接收PWS消息,例如接收该调度信息指示的系统消息块以获取PWS消息。Specifically, the manner in which the user equipment receives the PWS message may be: the user equipment first receives the MIB and then the SIB1, and the SIB1 carries scheduling information of the PWS message, and the scheduling information includes, but is not limited to, the message type of the PWS message and the system carrying the PWS message The indication information of the message block; the user equipment can obtain the scheduling information of the PWS message by parsing the SIB1, so as to receive the PWS message according to the scheduling information, for example, the system message block indicated by the scheduling information is received to obtain the PWS message.
由于黑客、伪基站等设备恶意的攻击,在实际应用场景中存在伪造PWS消息的现象。伪造的PWS消息向用户传达虚假的灾情信息,易造成用户的恐慌。此外,接收伪造的PWS消息还会带来用户设备的功耗问题。Due to malicious attacks by hackers, pseudo base stations, and other equipment, there is a phenomenon of forging PWS messages in actual application scenarios. Forged PWS messages convey false disaster information to users, which can easily cause users to panic. In addition, receiving fake PWS messages will also cause power consumption issues for user equipment.
比如,合法基站向用户设备发送系统消息(例如,携带寻呼信道配置的系统消息)时是以明文方式发送的,因而黑客可获取到合法基站的寻呼信道配置,从而对合法基站的寻呼信道进行干扰,向用户设备发送用于指示用户设备接收PWS消息的寻呼消息。用户设备在接收到该系统消息后即根据开始接收PWS消息,该PWS消息也是黑客伪造的PWS消息。至此,用户设备接收到伪造的PWS消息,该PWS消息的内容通常包含制造民众恐慌的灾情信息,民众收到该PWS消息后会引起不必要的恐慌。此外,若用户设备难以识别PWS消息的来源,也会导致用户设备频繁接收到黑客伪造的PWS消息,增加用户设备的功耗。For example, when a legitimate base station sends a system message (for example, a system message carrying a paging channel configuration) to the user equipment, it is sent in clear text. Therefore, a hacker can obtain the paging channel configuration of a legitimate base station, and thus page the legitimate base station. The channel performs interference, and sends a paging message to the user equipment to instruct the user equipment to receive the PWS message. After receiving the system message, the user equipment starts to receive the PWS message according to the PWS message, which is also a PWS message forged by a hacker. So far, the user equipment has received a fake PWS message. The content of the PWS message usually contains information about the disaster that caused the panic. After receiving the PWS message, the public will cause unnecessary panic. In addition, if it is difficult for the user equipment to identify the source of the PWS message, it will also cause the user equipment to frequently receive PWS messages forged by hackers, which will increase the power consumption of the user equipment.
再比如,若用户设备驻留在伪基站小区,伪基站可向用户设备发送用于指示用户设备接收PWS消息的寻呼消息。用户设备在接收到该PWS消息后开始接收PWS消息,该PWS消息也是黑客伪造的PWS消息。至此,用户设备接收到伪造的PWS消息,该PWS消息的内容可以是制造民众恐慌的灾情信息,也可以是垃圾信息(例如广告、诈骗信息等)。用户设备在接收到该PWS消息后,会造成用户恐慌或造成用户设备接收垃圾信息。此外,若用户设备难以识别PWS消息的来源,用户设备会一直驻留在伪基站小区并频繁接收到伪造的PWS消息,从而增加用户设备的功耗。As another example, if the user equipment resides in a pseudo base station cell, the pseudo base station may send a paging message to the user equipment to instruct the user equipment to receive the PWS message. The user equipment starts to receive the PWS message after receiving the PWS message, and the PWS message is also a PWS message forged by a hacker. So far, the user equipment has received a fake PWS message, and the content of the PWS message can be disaster information that caused panic among the people, or spam information (such as advertisements, fraud information, etc.). After receiving the PWS message, the user equipment may cause the user to panic or cause the user equipment to receive spam information. In addition, if it is difficult for the user equipment to identify the source of the PWS message, the user equipment will always reside in the pseudo base station cell and frequently receive fake PWS messages, thereby increasing the power consumption of the user equipment.
由于寻呼消息和PWS消息均是以明文方式发送的,而用户设备无法通过明文消息判断消息来源,因而在接收到PWS消息时,用户设备也就无法辨别PWS消息的真伪。Because the paging message and the PWS message are both sent in plain text, the user equipment cannot determine the source of the message through the plain text message. Therefore, when receiving the PWS message, the user equipment cannot distinguish the authenticity of the PWS message.
基于上述问题,本申请实施例提供一种伪基站识别方法及装置,用于用户设备接收到用于指示接收PWS消息的寻呼消息或者接收到PWS消息后对消息来源进行识别,避免接收到伪造的PWS消息造成民众恐慌的问题,同时避免用户设备频繁接收伪造的PWS消息带来用户设备的功耗问题。Based on the above problems, embodiments of the present application provide a method and apparatus for identifying a pseudo base station, which is used for user equipment to identify a source of a message after receiving a paging message for instructing to receive a PWS message, or to avoid receiving a forgery. PWS messages cause panic problems for the people, while avoiding the frequent power consumption of user devices by receiving fake PWS messages.
其中,方法和装置是基于同一发明构思的,由于方法及装置解决问题的原理相似,因此装置与方法的实施可以相互参见,重复之处不再赘述。Among them, the method and the device are based on the same inventive concept. Since the principle of the method and the device for solving the problem is similar, the implementation of the device and the method can be referred to each other, and duplicated details will not be repeated.
需要说明的是,本申请实施例中,多个是指两个或两个以上。另外,需要理解的是,在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述的目的,而不能理解为指示或暗示相对重要性,也不能理解为指示或暗示顺序。It should be noted that, in the embodiments of the present application, multiple means two or more. In addition, it should be understood that in the description of this application, the words "first" and "second" are used only for the purpose of distinguishing descriptions, and cannot be understood as indicating or implying relative importance, nor as indicating Or imply order.
下面,对本申请实施例的应用场景加以介绍。Application scenarios of the embodiments of the present application are described below.
本申请实施例可应用于图1所示的通信系统中。该通信系统中包含告警服务器、核心网网元、基站以及用户设备。The embodiment of the present application can be applied to the communication system shown in FIG. 1. The communication system includes an alarm server, a core network element, a base station, and user equipment.
其中,告警服务器可以视为一种应用服务器,其可以是第三方的应用控制平台,也可以部署在运营商网络中,用于为通信系统中的用户设备提供公共预警服务。需要说明的是,告警服务器只是本申请实施例中采用的一种表达方式,在不同的网络制式或网络环境中,本申请实施例中的告警服务器可以用其他表达方式替代,只要该表达方式用于指示为系统中的用户设备提供告警服务的物理实体(或虚拟实体)即可。例如告警服务器还可以由小区广播中心(cell broadcast center,CBC)、小区广播实体(cell broadcast entity,CBE)移动交换中心(mobile switching center,MSC)等表达方式替代。The alarm server can be regarded as an application server, which can be a third-party application control platform, or it can be deployed in the operator's network to provide public warning services for user equipment in the communication system. It should be noted that the alarm server is only an expression used in the embodiments of the present application. In different network systems or network environments, the alarm server in the embodiments of the present application may be replaced with other expressions as long as the expression is used. It is sufficient to indicate a physical entity (or a virtual entity) that provides an alarm service to user equipment in the system. For example, the alarm server may also be replaced by a cell broadcast center (CBC), a cell broadcast entity (CBE), a mobile switching center (MSC), and other expressions.
其中,核心网网元用于将告警服务器发送的PWS消息下发给基站,进而由基站发送给用户设备。同样地,在不同的网络制式中,用于接收告警服务器发送的PWS消息并发送给基站的核心网网元的类型可能有所不同,例如在长期演进(long term evolution,LTE)系统中,图1中的核心网网元可以是移动性管理实体(mobility management entity,MME)The core network element is used to deliver the PWS message sent by the alarm server to the base station, which is then sent by the base station to the user equipment. Similarly, in different network standards, the type of core network element used to receive the PWS message sent by the alarm server and sent to the base station may be different. For example, in a long term evolution (LTE) system, the diagram The core network element in 1 may be a mobility management entity (MME)
其中,基站可以是伪基站,也可以是合法基站。当该基站为合法基站时,基站向用户设备发送的PWS消息来自于告警服务器;当该基站为伪基站时,该基站向用户设备发送的PWS消息来自于伪基站,即该PWS消息为伪造的PWS消息,该PWS消息并非来自告警服务器。The base station may be a pseudo base station or a legal base station. When the base station is a legitimate base station, the PWS message sent by the base station to the user equipment comes from the alarm server; when the base station is a fake base station, the PWS message sent by the base station to the user equipment comes from a fake base station, that is, the PWS message is a fake PWS message, which is not from the alarm server.
基站在向用户设备发送PWS消息之前,首先向用户设备发送寻呼消息,以指示用户设备接收PWS消息。用户设备在接收到该寻呼消息后,可采用本申请实施例提供的方案判断当前驻留小区是否为伪基站小区(即判断该PWS消息的真伪),并针对伪造的PWS消息给用户提示,避免伪造的PWS消息造成用户恐慌。Before sending the PWS message to the user equipment, the base station first sends a paging message to the user equipment to instruct the user equipment to receive the PWS message. After receiving the paging message, the user equipment may use the solution provided in the embodiment of the present application to determine whether the currently camping cell is a pseudo base station cell (that is, to determine the authenticity of the PWS message), and prompt the user with the fake PWS message. , To avoid fake PWS messages causing user panic.
具体地,图1中的基站可以是码分多址接入(code division multiple access,CDMA)中的网络设备(base transceiver station,BTS),也可以是带宽码分多址接入(wide-band code division multiple access,WCDMA)或时分同步码分多址接入(time division-synchronous code division multiple access,TD-SCDMA)中的网络设备(NodeB),还可以是长期演进(long term evolution,LTE)系统中的演进型网络设备(evolutional node B,eNB或e-NodeB)、5G网络架构(next generation system)中的5G基站,也可是家庭演进基站(home evolved node B,HeNB)、家庭基站(femto)、微微基站(pico)等,本申请实施例中对基站的类型不做具体限定。Specifically, the base station in FIG. 1 may be a network device (base transceiver (BTS)) in code division multiple access (CDMA), or may be a wideband band-code division multiple access (wide-band). network equipment (NodeB) in code division multiple access (WCDMA) or time division synchronization-multiple access (TD-SCDMA) can also be long term evolution (LTE) The evolutionary network equipment (evolutionary node B, eNB or e-NodeB) in the system, the 5G base station in the 5G network architecture (next generation system), or the home evolved node (HeNB), or the home base station (femto ), Pico base stations (pico), etc., the types of base stations are not specifically limited in the embodiments of the present application.
具体地,图1中的用户设备可以是向用户提供语音和/或数据连通性的设备,对应无线连接功能的手持式设备、或连接到无线调制解调器的其他处理设备。用户设备可以经无线接入网(radio access network,RAN)与一个或多个核心网进行通信,用户设备可以是移动终端,如移动电话(或称为“蜂窝”电话)和对应移动终端的计算机,例如,可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置,它们与无线接入网交换语言和/或数据。例如,个人通信业务(personal communication service,PCS)电话、无绳电话、会话发起协议(session initiated protocol,SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)等设备。终端设备也可以称为系统、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、 移动台(mobile)、远程站(remote station)、接入点(access point)、远程终端(remote terminal)、接入终端(access terminal)、用户终端(user terminal)、用户代理(user agent)或用户装备(user equipment),本申请实施例中并不限定。Specifically, the user equipment in FIG. 1 may be a device that provides voice and / or data connectivity to a user, a handheld device corresponding to a wireless connection function, or another processing device connected to a wireless modem. The user equipment can communicate with one or more core networks via a radio access network (RAN). The user equipment can be a mobile terminal, such as a mobile phone (or a "cellular" phone) and a computer corresponding to the mobile terminal. For example, it can be a portable, compact, handheld, computer-built or vehicle-mounted mobile device that exchanges language and / or data with a wireless access network. For example, personal communication service (PCS) phones, cordless phones, session initiated protocol (SIP) phones, wireless local loop (WLL) stations, personal digital assistants, PDA) and other devices. The terminal device can also be called a system, a subscriber unit, a subscriber station, a mobile station, a mobile station, a remote station, an access point, The remote terminal, the access terminal, the user terminal, the user agent, or the user equipment are not limited in the embodiments of the present application.
本申请实施例中,用户设备的通信制式包括但不限于CDMA、WCDMA、TD-SCDMA、LTE、5G等。In the embodiments of the present application, the communication standard of the user equipment includes, but is not limited to, CDMA, WCDMA, TD-SCDMA, LTE, 5G, and the like.
下面,将分三个实施例对本申请提供的伪基站识别方案进行详细介绍。In the following, the pseudo base station identification scheme provided in this application will be described in detail in three embodiments.
实施例一Example one
参见图2,为本申请实施例提供的一种伪基站识别方法的流程示意图。该方法包括如下步骤:Referring to FIG. 2, it is a schematic flowchart of a pseudo base station identification method according to an embodiment of the present application. The method includes the following steps:
S201:用户设备接收当前驻留的第一小区所属的基站发送的寻呼消息。S201: The user equipment receives a paging message sent by a base station to which the currently camping first cell belongs.
其中,该寻呼消息用于指示用户设备接收PWS消息。The paging message is used to instruct the user equipment to receive the PWS message.
如前所述,基站在向用户设备发送PWS消息之前,会先通过寻呼消息指示用户设备接收PWS消息。用户设备在接收到该寻呼消息之后,可接收PWS消息。As mentioned before, before sending the PWS message to the user equipment, the base station instructs the user equipment to receive the PWS message through the paging message. After receiving the paging message, the user equipment may receive a PWS message.
需要说明的是,本申请实施例中,S202中会对发送寻呼消息的基站是否为伪基站进行判断,因而在判断基站为伪基站的情况下,用户设备可选择性地接收PWS消息,即用户设备可选择接收PWS消息,也可选择不接收第一PWS。用户设备选择性地接收PWS消息的具体实施细节将在后面介绍,此处不再赘述。It should be noted that, in the embodiment of the present application, in S202, it is determined whether the base station sending the paging message is a pseudo base station. Therefore, when the base station is determined to be a pseudo base station, the user equipment can selectively receive the PWS message, that is, The user equipment may choose to receive the PWS message or not to receive the first PWS. The specific implementation details of the user equipment selectively receiving the PWS message will be described later, and will not be repeated here.
S202:用户设备判断PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型是否一致。S202: The user equipment determines whether the message type of the PWS message is consistent with the type of the PWS message supported by the operator providing services for the user equipment.
其中,PWS消息的消息类型用于指示承载所述PWS消息的系统消息块。The message type of the PWS message is used to indicate a system message block that carries the PWS message.
在实际应用中,不同国家地区的不同运营商支持的PWS消息类型通常不同。PWS消息类型包括但不限于商用移动预警系统(commercial mobile alert service,CMAS)、地震海啸警报系统(earthquake and tsunami warning system,ETWS)、欧洲公共预警系统(european public warning system,EU-Alert)、韩国公共预警系统(korean public alert system,KPAS)、灾害和应急预警网络(disaster and emergency warning network,DEWN)。In practical applications, different operators in different countries and regions support different types of PWS messages. PWS message types include, but are not limited to, commercial mobile early warning system (commercial mobile alert service (CMAS)), earthquake tsunami warning system (earthquake and tsunami warning system (ETWS)), European public warning system (european public warning system (EU-Alert), Korea) Korean public alert system (KPAS), disaster and emergency early warning network (DEWN).
示例性地,美国运营商支持的PWS消息类型为CMAS,日本运营商支持的PWS消息类型为ETWS,欧洲运营商支持的PWS消息类型可以是EU-Alert。Exemplarily, the PWS message type supported by the US operator is CMAS, the PWS message type supported by the Japanese operator is ETWS, and the PWS message type supported by the European operator may be EU-Alert.
当然,本申请实施例中的PWS消息类型并不限定为上述举例中的种类。本申请实施例中所述的PWS消息类型还可以包括其他国家、地区、运营商提出的其他PWS消息类型。例如,随着各个国家、地区推出不同的公共告警系统,本申请实施例中的PWS消息类型还可包括新推出的这些PWS消息的类型。Of course, the PWS message types in the embodiments of the present application are not limited to the types in the above examples. The PWS message types described in the embodiments of the present application may also include other PWS message types proposed by other countries, regions, and operators. For example, as different public alarm systems are introduced in various countries and regions, the PWS message types in the embodiments of the present application may further include the types of these newly launched PWS messages.
实际应用中,上述CMAS、ETWS、EU-Alert、KPAS、DEWN等不同类型的PWS消息通常承载在不同的系统消息块中。例如,ETWS承载在SIB10和SIB11中,CMAS承载在SIB12中。因此,本申请实施例中,可通过承载PWS消息的系统消息块来识别该PWS消息的类型。In practical applications, the above-mentioned different types of PWS messages such as CMAS, ETWS, EU-Alert, KPAS, DEWN are usually carried in different system message blocks. For example, ETWS is carried in SIB10 and SIB11, and CMAS is carried in SIB12. Therefore, in the embodiment of the present application, the type of the PWS message can be identified by a system message block carrying the PWS message.
当然,随着PWS消息类型越来越多,可能出现采用同一系统消息块来承载两个类型的PWS消息的情况,这时,可采用其他特征来标识PWS消息的类型,只要该特征可用于区分CMAS、ETWS、EU-Alert、KPAS、DEWN等不同类型的PWS消息即可。Of course, with the increasing number of PWS message types, it may happen that the same system message block is used to carry two types of PWS messages. At this time, other characteristics can be used to identify the type of PWS messages, as long as the characteristics can be used to distinguish CMAS, ETWS, EU-Alert, KPAS, DEWN and other different types of PWS messages are sufficient.
下面对获取为用户设备提供服务的运营商支持的PWS消息类型以及PWS消息的消息 类型的具体方式进行介绍。The following describes the specific ways to obtain the PWS message types supported by the operators that provide services for user equipment and the message types of PWS messages.
一、获取为用户设备提供服务的运营商支持的PWS消息类型的具体方式I. Specific ways to obtain PWS message types supported by operators that provide services for user equipment
本申请实施例中,可采用如下方式确定为用户设备提供服务的运营商支持的PWS消息类型:在用户设备在S202中判断PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型是否一致之前,用户设备可根据第一小区的配置信息和消息类型配置列表确定为用户设备提供服务的运营商支持的PWS消息类型。其中,该消息类型配置列表用于指示至少一个运营商与该运营商支持的PWS消息的消息类型的对应关系。In the embodiment of the present application, a PWS message type supported by an operator serving a user equipment may be determined in the following manner: the user equipment determines a message type of the PWS message in S202 and a PWS message supported by an operator serving a user equipment Before the types are the same, the user equipment may determine, according to the configuration information of the first cell and the message type configuration list, a PWS message type supported by an operator that provides services to the user equipment. The message type configuration list is used to indicate a correspondence between at least one operator and a message type of a PWS message supported by the operator.
其中,第一小区的配置信息包括以下至少一种:第一小区的公共陆地移动网络(public land mobile network,PLMN)标识;第一小区的跟踪区代码(tracking area code,TAC);第一小区的小区识别码小区标识(Cell ID);第一小区的位置信息。The configuration information of the first cell includes at least one of the following: a public land mobile network (PLMN) identifier of the first cell; a tracking area code (TAC) of the first cell; and a first cell Cell identification code (Cell ID); location information of the first cell.
具体地,第一小区的位置信息可通过基于卫星定位、基于基站位置的测量等方式获取。Specifically, the location information of the first cell may be acquired by means of satellite positioning, base station-based measurement, and the like.
通常,在用户设备出厂时和/或用户设备接入网络时,用户设备会获取上述消息类型配置列表,该消息类型配置列表用于指示(各个国家或地区的)不同运营商所支持的PWS消息的消息类型。例如,该消息类型配置列表可用于指示美国运营商支持的PWS消息类型为CMAS、日本运营商支持的PWS消息类型为ETWS。在用户设备接收到寻呼消息之后,用户设备可通过第一小区的配置信息获知用户设备当前所在的位置(例如当前所在国家、地区、城市等),进而根据用户设备的当前位置确定当前为用户设备提供服务的运营商。然后,用户设备可通过查询消息类型配置列表获取到当前为用户设备提供服务的运营商支持的PWS消息类型。Generally, when the user equipment leaves the factory and / or when the user equipment accesses the network, the user equipment obtains the above message type configuration list, which is used to indicate the PWS messages supported by different operators (in each country or region) Message type. For example, the message type configuration list may be used to indicate that the PWS message type supported by the US operator is CMAS, and the PWS message type supported by the Japanese operator is ETWS. After the user equipment receives the paging message, the user equipment can learn the current location of the user equipment (for example, the current country, region, city, etc.) through the configuration information of the first cell, and then determine that it is currently the user based on the current location of the user equipment. The operator that the device provides services to. Then, the user equipment can obtain the PWS message type supported by the operator currently serving the user equipment by querying the message type configuration list.
示例性地,用户设备A中的消息类型配置列表用于指示运营商1支持的PWS消息的消息类型为a、运营商2支持的PWS消息的消息类型为b和c、运营商3支持的PWS消息的消息类型为d。用户设备A在接收到寻呼消息之后,根据第一小区的配置信息确定当前为用户设备A提供服务的运营商为运营商2。然后,用户设备可通过查询自身保存的消息类型配置列表确定当前为用户设备提供服务的运营商支持的PWS消息类型为b和c。Exemplarily, the message type configuration list in user equipment A is used to indicate that the message type of PWS messages supported by operator 1 is a, the message types of PWS messages supported by operator 2 are b and c, and the PWS messages supported by operator 3 The message has a message type of d. After receiving the paging message, the user equipment A determines that the operator currently serving the user equipment A is the operator 2 according to the configuration information of the first cell. Then, the user equipment may determine the PWS message types supported by the operator currently serving the user equipment as b and c by querying the message type configuration list saved by itself.
此外,本申请实施例中,用户设备(例如用户设备中的应用处理器)还可对消息类型配置列表进行更新,以便用户设备可及时更新消息类型配置列表,使得用户设备获取到的、为用户设备提供服务的运营商支持的PWS消息类型更为准确。In addition, in the embodiment of the present application, the user equipment (for example, an application processor in the user equipment) may also update the message type configuration list, so that the user equipment can update the message type configuration list in time, so that the The types of PWS messages supported by the operators that the equipment provides are more accurate.
具体地,用户设备在对消息类型配置列表进行更新时,可以采用的方式有多种。下面列举其中四种。Specifically, when the user equipment updates the message type configuration list, there are multiple ways that the user equipment can adopt. Here are four of them.
示例性地,用户设备可根据该基站的指示对消息类型配置列表进行更新。当消息类型配置列表发生更新时,上层的应用服务器(例如告警服务器)会通过核心网网元及基站通知用户设备对消息类型配置列表进行更新,用户设备在接收到基站的指示后,可对消息类型配置列表进行更新。Exemplarily, the user equipment may update the message type configuration list according to an instruction of the base station. When the message type configuration list is updated, the upper-layer application server (such as the alarm server) will notify the user equipment to update the message type configuration list through the core network element and the base station. After receiving the instruction from the base station, the user equipment can update the message. Type configuration list is updated.
示例性地,用户设备可通过查询告警服务器对消息类型配置列表进行更新,告警服务器为提供公共预警服务的应用服务器。除了上述用户设备被动接收消息类型配置列表更新的方式,用户设备还可主动查询消息类型配置列表是否更新。Exemplarily, the user equipment may update the message type configuration list by querying an alarm server, which is an application server providing a public early warning service. In addition to the manner in which the user equipment passively receives the update of the message type configuration list, the user equipment may also actively query whether the message type configuration list is updated.
示例性地,用户设备可通过用户设备的软件升级过程对消息类型配置列表进行更新。也就是说,用户设备在进行软件包升级时,可同时更新自身保存的消息类型配置列表。Exemplarily, the user equipment may update the message type configuration list through a software upgrade process of the user equipment. In other words, when the user equipment performs a software package upgrade, it can update the message type configuration list saved by itself at the same time.
示例性地,用户设备可通过用户设备中用户身份识别(subscriber identification module,SIM)卡的软件升级过程对消息类型配置列表进行更新。也就是说,用户设备在对SIM卡 进行软件包升级时,可同时更新自身保存的消息类型配置列表。Exemplarily, the user equipment may update the message type configuration list through a software upgrade process of a subscriber identification (SIM) card in the user equipment. In other words, when the user equipment performs software package upgrade on the SIM card, it can update the message type configuration list saved by itself at the same time.
二、获取PWS消息的消息类型的具体方式Second, the specific way to get the message type of the PWS message
前面已经介绍了获取为用户设备提供服务的运营商支持的PWS消息类型的具体方式。判断该基站是否为伪基站时还根据PWS消息的消息类型进行判断。下面对用户设备获取PWS消息的消息类型的具体方式加以介绍。The specific method of obtaining the PWS message types supported by the operator that provides services for user equipment has been described above. When determining whether the base station is a pseudo base station, it is further determined according to the message type of the PWS message. The following describes the specific manner in which the user equipment obtains the message type of the PWS message.
本申请实施例中,用户设备获取PWS消息的消息类型的具体方式包括但不限于如下两种。In the embodiment of the present application, the specific manner in which the user equipment obtains the message type of the PWS message includes, but is not limited to, the following two types.
方式一method one
在方式一中,可根据寻呼消息来判断PWS消息的消息类型。如前所述,寻呼消息用于指示用户设备接收PWS消息。在寻呼消息中携带有PWS消息的指示信息,用户设备在接收到寻呼消息之后,可以确定PWS消息的消息类型。In the first method, the message type of the PWS message can be determined according to the paging message. As mentioned before, the paging message is used to instruct the user equipment to receive the PWS message. The paging message carries the indication information of the PWS message. After receiving the paging message, the user equipment can determine the message type of the PWS message.
方式二Way two
在方式二中,用户设备在接收到寻呼消息之后,可根据系统消息中的SIB1来判断PWS消息的消息类型。用户设备在接收到寻呼消息之后,会触发用户设备接收PWS消息。前面介绍过,PWS消息可以视为系统消息的一种(即PWS消息承载在某个系统消息块中)。用户设备在接收PWS消息时,首先接收系统消息中的MIB及SIB1,然后根据SIB1中携带的PWS消息的调度信接收PWS消息。其中,PWS消息的调度信息包括但不限于PWS消息的消息类型、承载PWS消息的系统消息块的指示信息。因此,用户设备在接收到SIB1后,即可根据PWS消息的调度信息确定PWS消息的消息类型。In the second method, after receiving the paging message, the user equipment may determine the message type of the PWS message according to the SIB1 in the system message. After receiving the paging message, the user equipment triggers the user equipment to receive the PWS message. As mentioned earlier, PWS messages can be regarded as a type of system messages (that is, PWS messages are carried in a certain system message block). When receiving a PWS message, the user equipment first receives the MIB and SIB1 in the system message, and then receives the PWS message according to the dispatching letter of the PWS message carried in the SIB1. The scheduling information of the PWS message includes, but is not limited to, the message type of the PWS message and the indication information of the system message block carrying the PWS message. Therefore, after receiving the SIB1, the user equipment can determine the message type of the PWS message according to the scheduling information of the PWS message.
S203:在PWS消息的消息类型与为所述运营商支持的PWS消息类型不一致的情况下,用户设备确定该基站为伪基站。S203: When the message type of the PWS message is inconsistent with the PWS message type supported by the operator, the user equipment determines that the base station is a pseudo base station.
需要说明的是,S203中,用户设备在判断PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型不一致的情况下,判断基站为伪基站。这里,伪基站的含义有多种,例如,这里的伪基站可以理解真实的伪基站设备,也可以理解为黑客模拟的伪基站。It should be noted that in S203, when the user equipment determines that the message type of the PWS message is inconsistent with the type of the PWS message supported by the operator providing the user equipment, it determines that the base station is a pseudo base station. Here, the meaning of the pseudo base station is various. For example, the pseudo base station here can understand the real pseudo base station equipment, and can also be understood as a pseudo base station simulated by a hacker.
如前所述,用户设备在S203中判断该基站为伪基站的情况下,可选择性地接收PWS消息。在一种可能的示例中,用户设备在S201中接收到寻呼消息之后,可不必像现有技术那样立即接收PWS消息,而是先对PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型进行对比;在二者一致的情况下再接收PWS消息,在二者不一致的情况下可不接收PWS消息。As described above, when the user equipment determines that the base station is a pseudo base station in S203, it can selectively receive a PWS message. In a possible example, after receiving the paging message in S201, the user equipment does not need to receive the PWS message immediately, as in the prior art, but instead first determines the message type of the PWS message and the operator that provides services to the user equipment. The supported PWS message types are compared; if the two are the same, then the PWS message is received, and if the two are not the same, the PWS message may not be received.
当然,在S203中判断该基站为伪基站的情况下,用户设备也可以选择接收PWS消息,本申请实施例对比并不做具体限定。Of course, in the case that the base station is determined to be a pseudo base station in S203, the user equipment may also choose to receive the PWS message, which is not specifically limited in the comparison of the embodiments of this application.
在确定为用户设备提供服务的运营商支持的PWS消息类型和PWS消息的消息类型后,用户设备可对PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型是否一致进行判断,从而根据判断结果确定该基站是否为伪基站。用户设备在判断PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型不一致的情况下,确定该基站为伪基站。After determining the PWS message type and the PWS message type supported by the operator providing the user equipment, the user equipment can determine whether the message type of the PWS message is consistent with the PWS message type supported by the operator providing the user equipment. , So as to determine whether the base station is a pseudo base station according to the determination result. When the user equipment determines that the message type of the PWS message is inconsistent with the type of PWS message supported by the operator providing the user equipment, it determines that the base station is a pseudo base station.
在实际实现时,用户设备在判断该基站为伪基站之后,还可对提示用户当前驻留伪基站小区,和/或提示用户PWS消息为伪造的PWS消息。用户在看到提示后,则不会因为PWS消息的内容造成恐慌。具体地,用户设备中的应用处理器(application processor,AP) 可通过界面弹框显示、声音、振动、闪光灯等形式对用户进行提示。In actual implementation, after determining that the base station is a pseudo base station, the user equipment may further prompt the user to camp on the pseudo base station cell, and / or prompt the user that the PWS message is a fake PWS message. After seeing the prompt, the user will not cause panic because of the content of the PWS message. Specifically, an application processor (AP) in the user equipment may prompt the user through the interface pop-up display, sound, vibration, and flash.
需要说明的是,本申请提供的实施例一中,用户设备在判断PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型不一致的情况下,确定该基站为伪基站。但是,在PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型一致的情况下,用户设备并不能据此判断该基站不是伪基站。这是因为:伪基站在伪造PWS消息时,伪造的PWS消息的消息类型可能与为用户设备提供服务的运营商支持的PWS消息类型一致。在这种情况下,可通过本申请提供的其他实施例来进一步判断该基站是否为伪基站。It should be noted that, in the first embodiment provided by the present application, the user equipment determines that the base station is a pseudo base station when determining that the message type of the PWS message is inconsistent with the type of the PWS message supported by the operator providing the user equipment. However, when the message type of the PWS message is consistent with the type of the PWS message supported by the operator providing the user equipment, the user equipment cannot judge that the base station is not a pseudo base station. This is because when a fake base station forges a PWS message, the message type of the fake PWS message may be consistent with the PWS message type supported by the operator that provides service to the user equipment. In this case, it can be further determined whether the base station is a pseudo base station through other embodiments provided in this application.
此外,用户设备在确定基站为伪基站之后,可采取相应措施对用户设备在该基站上的通信进行限制,避免用户设备长时间驻留在伪基站小区,进而避免用户设备频繁接收伪造的PWS消息带来用户设备的功耗问题。In addition, after the user equipment determines that the base station is a fake base station, it can take corresponding measures to restrict the communication of the user equipment on the base station to prevent the user equipment from staying in the fake base station cell for a long time, thereby preventing the user equipment from frequently receiving fake PWS messages. Brings power consumption issues to user equipment.
在用户设备确定该基站为伪基站之后,用户设备可将第一小区的小区信息加入禁止驻留列表,该禁止驻留列表用于指示用户设备禁止驻留在禁止驻留列表中记录的小区信息所对应的小区。After the user equipment determines that the base station is a pseudo base station, the user equipment may add the cell information of the first cell to a prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit camping on the cell information recorded in the prohibited camping list. Corresponding cell.
需要说明的是,禁止驻留列表仅为本申请实施例中提供的一种表达方式,其也可以用其他表达方式替代,例如小区受限列表或者bar列表,只要该表达方式可用于指示禁止用户设备驻留小区的小区信息即可。It should be noted that the banned list is only an expression provided in the embodiments of the present application, and it can also be replaced by other expressions, such as a cell restricted list or a bar list, as long as the expression can be used to indicate that the user is forbidden The cell information of the cell where the device resides is sufficient.
其中,第一小区的小区信息包括以下至少一种:第一小区的小区频点;第一小区的小区频段;第一小区的物理小区标识(physical cell ID,PCI)、第一小区的E-UTRA绝对无线频率信道号(E-UTRA absolute radio frequency channel number,EARFCN)。The cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a physical cell ID (PCI) of the first cell; and an E- UTRA absolute radio frequency channel number (E-UTRA absolute frequency channel number, EARFCN).
将第一小区的小区信息加入禁止驻留列表后,用户设备则不会再驻留在第一小区,因而可以避免用户设备长期驻留在伪基站小区并频繁接收到伪造PWS消息而导致的用户设备功耗增加的问题。After adding the cell information of the first cell to the forbidden camping list, the user equipment will no longer reside in the first cell, thereby preventing the user from staying in the pseudo base station cell for a long time and frequently receiving fake PWS messages. The problem of increased device power consumption.
进一步地,在用户设备将第一小区的小区信息加入禁止驻留列表之后,用户设备还可在当前制式下重新进行小区搜索,若用户设备在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,该第二小区的小区信息未记录在禁止驻留列表中。Further, after the user equipment adds the cell information of the first cell to the forbidden camping list, the user equipment may perform a cell search again in the current system. If the user equipment searches for available cells in the current system, the cell search results are based on the cell search results. Camping to a second cell, and the cell information of the second cell is not recorded in the prohibited camping list.
也就是说,将第一小区的小区信息加入禁止驻留列表之后,用户设备在重新进行小区搜索时,需要将禁止驻留列表中的小区(即第一小区)剔除,只有在当前制式下搜索到禁止驻留列表之外的可用小区(即第二小区)时,才选择驻留到该小区。That is, after adding the cell information of the first cell to the forbidden camping list, when the user equipment performs a cell search again, it needs to delete the cells in the forbidden camping list (that is, the first cell), and only searches under the current system. Only when the available cell (that is, the second cell) is not on the camping list, the cell is selected to camp on the cell.
采用上述方案,用户设备可在当前制式下重新进行搜网,从而使得用户设备可以驻留到合法基站小区,进行正常通信。With the above solution, the user equipment can perform network search again under the current system, so that the user equipment can camp on a legal base station cell for normal communication.
此外,在用户设备在当前制式下进行小区搜索之后,若用户设备在当前制式下未搜索到可用小区,则用户设备可切换到当前制式之外的其他制式进行小区搜索。例如,当前通信制式为长期演进LTE时,用户设备可禁用(disable)LIE,并触发去2G或3G制式搜网。或者,在用户设备进行小区搜索之后,若用户设备在当前制式下未搜索到可用小区,用户设备可将第一小区的小区信息从禁止驻留列表中删除,并重新驻留第一小区。In addition, after the user equipment performs a cell search in the current system, if the user equipment does not search for an available cell in the current system, the user equipment may switch to a system other than the current system for the cell search. For example, when the current communication standard is long-term evolution LTE, the user equipment may disable LIE and trigger a search to the 2G or 3G standard network. Alternatively, after the user equipment performs a cell search, if the user equipment does not search for an available cell under the current system, the user equipment may delete the cell information of the first cell from the forbidden camping list and camp on the first cell again.
在当前制式下没有可用小区的情况下切换到其他制式进行小区搜索,可以避免用户设备驻留在伪基站小区;在当前制式下没有可用小区的情况下重新驻留第一小区,可以避免用户设备在当前制式下无可用小区。When there is no available cell in the current system, switching to another system for cell search can prevent the user equipment from camping in the pseudo base station cell; if the available cell is not available in the current system, the first cell is re-residented, which can avoid the user equipment. No cell is available under the current system.
在实际实现时,图2所示的方法可通过用户设备中的AP和蜂窝处理器(cellular  processor,CP)(又可以称为modem)配合执行。其中,AP可视为用户设备中用于进行数据面处理的处理器;CP可视为用户设备中用于进行信令面处理的处理器。图2所示的方法中,消息类型配置列表可保存在AP中。用户设备接收到寻呼消息之后,AP将消息类型配置列表下发给CP。CP可执行后续判断该基站是否为伪基站的操作,并可在该基站为伪基站的情况下进行相应处理,避免用户设备长时间驻留在伪基站小区。In actual implementation, the method shown in FIG. 2 may be executed through cooperation between an AP in a user equipment and a cellular processor (CP) (also referred to as a modem). Among them, the AP can be regarded as a processor for performing data plane processing in the user equipment; the CP can be regarded as a processor for performing signal plane processing in the user equipment. In the method shown in FIG. 2, the message type configuration list may be stored in the AP. After the user equipment receives the paging message, the AP delivers the message type configuration list to the CP. The CP may perform subsequent operations to determine whether the base station is a pseudo base station, and may perform corresponding processing when the base station is a pseudo base station, so as to prevent the user equipment from staying in the pseudo base station cell for a long time.
采用图2所示的方法,用户设备接收到(用于指示用户设备接收PWS消息的)寻呼消息之后,可在判断PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型不一致的情况下,确定该基站为伪基站。由于一个运营商支持的PWS消息类型有限,因而在寻呼消息指示用户设备接收的PWS消息的类型为当前运营商不支持的类型的情况下,用户设备可判断该PWS消息并非来自运营商网络,即判断该PWS消息为伪造的PWS消息。因此,采用图2所示的方法可以准确识别基站是否为伪基站(即对PWS消息的来源进行判断),进而判断PWS消息的真伪,避免伪造的PWS消息造成民众恐慌。Using the method shown in FIG. 2, after receiving a paging message (for instructing the user equipment to receive a PWS message), the user equipment can determine the message type of the PWS message and the type of PWS message supported by the operator that provides service to the user equipment. In the case of inconsistency, it is determined that the base station is a pseudo base station. Because the type of PWS messages supported by an operator is limited, when the paging message indicates that the type of PWS message received by the user equipment is a type that is not supported by the current operator, the user equipment can determine that the PWS message is not from the operator's network. That is, it is determined that the PWS message is a fake PWS message. Therefore, the method shown in FIG. 2 can be used to accurately identify whether the base station is a fake base station (that is, to determine the source of the PWS message), and then determine the authenticity of the PWS message to avoid the panic caused by the fake PWS message.
进一步地,采用实施例一的方案还可针对伪基站小区进行相应处理,避免用户设备再次在驻留在伪基站小区,从而避免用户设备再次接收到伪基小区上伪造的PWS消息,从而避免引起用户恐慌,同时,降低用户设备因接收伪造PWS消息而带来的功耗。Further, using the solution of the first embodiment can also perform corresponding processing on the pseudo base station cell to prevent the user equipment from camping on the pseudo base station cell again, thereby preventing the user equipment from receiving the fake PWS message on the pseudo base cell again, thereby avoiding causing The user panics, and at the same time, reduces the power consumption of the user equipment caused by receiving fake PWS messages.
实施例二Example two
参见图3,为本申请实施例提供的一种伪基站识别方法的流程示意图。该方法包括如下步骤:Referring to FIG. 3, it is a schematic flowchart of a pseudo base station identification method according to an embodiment of the present application. The method includes the following steps:
S301:用户设备接收当前驻留的第一小区所属的基站发送的PWS消息。S301: The user equipment receives a PWS message sent by a base station to which the currently camping first cell belongs.
在用户设备接收当前驻留的第一小区所属的该基站发送的PWS消息之前,用户设备可接收该基站发送的寻呼消息,寻呼消息用于指示用户设备接收PWS消息。Before the user equipment receives a PWS message sent by the base station to which the currently camping first cell belongs, the user equipment may receive a paging message sent by the base station, and the paging message is used to instruct the user equipment to receive the PWS message.
也就是说,与现有技术类似,图3所示的方法中,基站在向用户设备发送PWS消息之前,会先通过寻呼消息指示用户设备接收PWS消息。用户设备在接收到该寻呼消息之后,可接收PWS消息。That is, similar to the prior art, in the method shown in FIG. 3, before sending a PWS message to the user equipment, the base station instructs the user equipment to receive the PWS message through a paging message. After receiving the paging message, the user equipment may receive a PWS message.
S302:用户设备在判断PWS消息的内容为垃圾信息的情况下,确定该基站为伪基站。S302: When determining that the content of the PWS message is spam, the user equipment determines that the base station is a pseudo base station.
需要说明的是,S302中,用户设备在判断PWS消息的内容为垃圾信息的情况下判断该基站为伪基站。这里,伪基站的含义有多种,例如,这里的伪基站可以理解真实的伪基站设备,也可以理解为黑客模拟的伪基站。It should be noted that, in S302, when the user equipment determines that the content of the PWS message is spam, the base station determines that the base station is a pseudo base station. Here, the meaning of the pseudo base station is various. For example, the pseudo base station here can understand the real pseudo base station equipment, and can also be understood as a pseudo base station simulated by a hacker.
S302中,用户设备在判断PWS消息的内容为垃圾信息的情况下,确定该基站为伪基站。示例性地,用户设备可在PWS消息的内容包含广告信息或者包含色情、反动、暴力等信息的情况下,判断PWS消息的内容为垃圾信息,进而判断该基站为伪基站。In S302, when determining that the content of the PWS message is spam, the user equipment determines that the base station is a pseudo base station. For example, the user equipment may determine that the content of the PWS message is spam if the content of the PWS message contains advertising information or contains information such as pornography, reaction, and violence, and then determine that the base station is a pseudo base station.
在实际实现时,用户设备在判断该基站为伪基站之后,还可对提示用户当前驻留伪基站小区,和/或提示用户PWS消息为伪造的PWS消息。用户在看到提示后,则不会因为PWS消息的内容造成恐慌。具体地,用户设备中的AP可通过界面弹框显示、声音、振动、闪光灯等形式对用户进行提示。In actual implementation, after determining that the base station is a pseudo base station, the user equipment may further prompt the user to camp on the pseudo base station cell, and / or prompt the user that the PWS message is a fake PWS message. After seeing the prompt, the user will not cause panic because of the content of the PWS message. Specifically, the AP in the user equipment may prompt the user through the interface popup display, sound, vibration, and flash.
需要说明的是,本申请提供的实施例二中,用户设备在判断PWS消息的内容为垃圾信息的情况下,确定该基站为伪基站。但是,在PWS消息的内容不是垃圾信息的情况下,用户设备并不能据此判断该基站不是伪基站。这是因为:伪基站伪造的PWS消息的内容可能为虚假信息,例如虚构的地震、海啸等灾情信息。用户设备在接收到这种内容的PWS 消息后,难以对消息的来源以及消息内容的真伪进行辨别。因而,在实施例二中,在PWS消息的内容不是垃圾信息的情况下,用户设备难以确定该基站是否为伪基站。在这种情况下,可通过本申请提供的其他实施例来进一步判断该基站是否为伪基站。It should be noted that in the second embodiment provided in this application, when the user equipment determines that the content of the PWS message is spam, it determines that the base station is a pseudo base station. However, when the content of the PWS message is not spam, the user equipment cannot judge based on this that the base station is not a pseudo base station. This is because the content of the PWS message forged by the fake base station may be false information, such as fictional earthquake and tsunami disaster information. After receiving the PWS message of such content, the user equipment is difficult to distinguish the source of the message and the authenticity of the message content. Therefore, in the second embodiment, when the content of the PWS message is not spam, it is difficult for the user equipment to determine whether the base station is a pseudo base station. In this case, it can be further determined whether the base station is a pseudo base station through other embodiments provided in this application.
此外,用户设备在确定该基站为伪基站之后,可采取相应措施对用户设备在该基站上的通信进行限制,避免用户设备长时间驻留在伪基站小区,进而避免用户设备频繁接收伪造的PWS消息带来用户设备的功耗问题。In addition, after the user equipment determines that the base station is a fake base station, it can take corresponding measures to restrict the communication of the user equipment on the base station to prevent the user equipment from staying in the fake base station cell for a long time, thereby preventing the user equipment from frequently receiving fake PWS. Messages cause power consumption issues for user equipment.
在用户设备确定该基站为伪基站之后,用户设备可将第一小区的小区信息加入禁止驻留列表,该禁止驻留列表用于指示用户设备禁止驻留在禁止驻留列表中记录的小区信息所对应的小区。After the user equipment determines that the base station is a pseudo base station, the user equipment may add the cell information of the first cell to a prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit camping on the cell information recorded in the prohibited camping list. Corresponding cell.
其中,该禁止驻留列表与实施例一中的禁止驻留列表的功能是相同的,相关描述可参见实施例一,此处不再赘述。The function of the banned list is the same as the function of the banned list in the first embodiment. For related description, refer to the first embodiment, and details are not described herein again.
其中,第一小区的小区信息包括以下至少一种:第一小区的小区频点;第一小区的小区频段;第一小区的PCI、第一小区的EARFCN。The cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
将第一小区的小区信息加入禁止驻留列表后,用户设备则不会再驻留在第一小区,因而可以避免用户设备长期驻留在伪基站小区并频繁接收到伪造PWS消息而导致的用户设备功耗增加的问题。After adding the cell information of the first cell to the forbidden camping list, the user equipment will no longer reside in the first cell, thereby preventing the user from staying in the pseudo base station cell for a long time and frequently receiving fake PWS messages. The problem of increased device power consumption.
进一步地,在用户设备将第一小区的小区信息加入禁止驻留列表之后,用户设备还可在当前制式下重新进行小区搜索,若用户设备在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,该第二小区的小区信息未记录在禁止驻留列表中。Further, after the user equipment adds the cell information of the first cell to the forbidden camping list, the user equipment may perform a cell search again in the current system. If the user equipment searches for available cells in the current system, the cell search results are based on the cell search results. Camping to a second cell, and the cell information of the second cell is not recorded in the prohibited camping list.
也就是说,将第一小区的小区信息加入禁止驻留列表之后,用户设备在重新进行小区搜索时,需要将禁止驻留列表中的小区(即第一小区)剔除,只有在当前制式下搜索到禁止驻留列表之外的可用小区(即第二小区)时,才选择驻留到该小区。That is, after adding the cell information of the first cell to the forbidden camping list, when the user equipment performs a cell search again, it needs to delete the cells in the forbidden camping list (that is, the first cell), and only searches under the current system. Only when the available cell (that is, the second cell) is not on the camping list, the cell is selected to camp on the cell.
采用上述方案,用户设备可在当前制式下重新进行搜网,从而使得用户设备可以驻留到合法基站小区,进行正常通信。With the above solution, the user equipment can perform network search again under the current system, so that the user equipment can camp on a legal base station cell for normal communication.
此外,在用户设备在当前制式下进行小区搜索之后,若用户设备在当前制式下未搜索到可用小区,则用户设备可切换到当前制式之外的其他制式进行小区搜索。例如,当前通信制式为长期演进LTE时,用户设备可禁用(disable)LIE,并触发去2G或3G制式搜网。或者,在用户设备进行小区搜索之后,若用户设备在当前制式下未搜索到可用小区,用户设备可将第一小区的小区信息从禁止驻留列表中删除,并重新驻留第一小区。In addition, after the user equipment performs a cell search in the current system, if the user equipment does not search for an available cell in the current system, the user equipment may switch to a system other than the current system for the cell search. For example, when the current communication standard is long-term evolution LTE, the user equipment may disable LIE and trigger a search to the 2G or 3G standard network. Alternatively, after the user equipment performs a cell search, if the user equipment does not search for an available cell under the current system, the user equipment may delete the cell information of the first cell from the forbidden camping list and camp on the first cell again.
在当前制式下没有可用小区的情况下切换到其他制式进行小区搜索,可以避免用户设备驻留在伪基站小区;在当前制式下没有可用小区的情况下重新驻留第一小区,可以避免用户设备在当前制式下无可用小区。When there is no available cell in the current system, switching to another system for cell search can prevent the user equipment from camping in the pseudo base station cell; if the available cell is not available in the current system, the first cell is re-residented, which can avoid the user equipment. No cell is available under the current system.
同样地,在实际实现时,图3所示的方法也可通过用户设备中的AP和CP配合执行。其中,用户设备中的CP在接收到PWS消息之后可将PWS消息上报给AP,AP对PWS消息的内容进行识别,如果AP识别出PWS消息的内容为垃圾信息,则上报给CP,由CP进行相应处理。Similarly, in actual implementation, the method shown in FIG. 3 may also be executed by cooperation between an AP and a CP in a user equipment. Among them, the CP in the user equipment can report the PWS message to the AP after receiving the PWS message, and the AP recognizes the content of the PWS message. If the AP recognizes that the content of the PWS message is spam, it reports it to the CP and the CP performs the Handle accordingly.
采用图3所示的方法,用户设备接收到PWS消息之后,可在判断PWS消息的内容为垃圾信息的情况下,确定该基站为伪基站。由于告警服务器不会通过运营商网络向用户设备推送垃圾信息,因而在PWS消息的内容为垃圾信息的情况下,用户设备可判断该PWS消息并非来自运营商网络,即判断该PWS消息为伪造的PWS消息。因此,采用图3所示 的方法可以准确识别基站是否为伪基站(即对PWS消息的来源进行判断),进而判断PWS消息的真伪,避免伪造的PWS消息造成民众恐慌。With the method shown in FIG. 3, after receiving the PWS message, the user equipment may determine that the base station is a pseudo base station in a case where the content of the PWS message is determined to be spam. Since the alarm server does not push spam information to the user equipment through the operator's network, when the content of the PWS message is spam, the user equipment can determine that the PWS message does not come from the operator's network, that is, the PWS message is judged to be fake PWS message. Therefore, the method shown in Figure 3 can be used to accurately identify whether the base station is a fake base station (that is, to determine the source of the PWS message), and then determine the authenticity of the PWS message to avoid the panic caused by the fake PWS message.
进一步地,采用实施例二的方案还可针对伪基站小区进行相应处理,避免用户设备再次在驻留在伪基站小区,从而避免用户设备再次接收到伪基小区上伪造的PWS消息,从而避免引起用户恐慌,同时,降低用户设备因接收伪造PWS消息而带来的功耗。Further, using the solution of the second embodiment can also perform corresponding processing on the pseudo base station cell to prevent the user equipment from camping on the pseudo base station cell again, thereby preventing the user equipment from receiving the fake PWS message on the pseudo base cell again, thereby preventing the The user panics, and at the same time, reduces the power consumption of the user equipment caused by receiving fake PWS messages.
通过上述对实施例一和实施例二的介绍可以看出,实施例一与实施例二的区别之处在于:实施例一中,在接收到寻呼消息之后即可对PWS消息的消息类型进行判断,进而判断该基站是否为伪基站。在这个过程中,用户设备可以选择不接收PWS消息,在确定上述判断结果后再根据判断结果选择性地接收PWS消息;而在实施例二中,用户设备需在接收到PWS消息之后才可根据PWS消息的内容对该基站是否为伪基站进行判断。实际实现时,可根据不同的场景和需要选择执行实施例一或实施例二,或者可选择先执行实施一、再执行实施例二,本申请对此不做具体限定。It can be seen from the above description of the first embodiment and the second embodiment that the difference between the first embodiment and the second embodiment is that in the first embodiment, the message type of the PWS message can be performed after receiving the paging message. Determine, and further determine whether the base station is a pseudo base station. In this process, the user equipment may choose not to receive the PWS message, and then selectively receive the PWS message according to the judgment result after determining the above judgment result. In the second embodiment, the user equipment may only receive the PWS message after receiving the PWS message. The content of the PWS message determines whether the base station is a pseudo base station. In actual implementation, the first embodiment or the second embodiment may be selected according to different scenarios and needs, or the first implementation and the second implementation may be executed, which is not specifically limited in this application.
实施例三Example three
参见图4,为本申请实施例提供的一种伪基站识别方法的流程示意图。该方法包括如下步骤:Referring to FIG. 4, it is a schematic flowchart of a pseudo base station identification method according to an embodiment of the present application. The method includes the following steps:
S401:用户设备接收当前驻留的第一小区所属的基站发送的PWS消息。S401: The user equipment receives a PWS message sent by a base station to which the currently camping first cell belongs.
在用户设备接收当前驻留的第一小区所属的该基站发送的PWS消息之前,用户设备可接收该基站发送的寻呼消息,寻呼消息用于指示用户设备接收PWS消息。Before the user equipment receives a PWS message sent by the base station to which the currently camping first cell belongs, the user equipment may receive a paging message sent by the base station, and the paging message is used to instruct the user equipment to receive the PWS message.
也就是说,与现有技术类似,图4所示的方法中,基站在向用户设备发送PWS消息之前,会先通过寻呼消息指示用户设备接收PWS消息。用户设备在接收到该寻呼消息之后,可接收PWS消息。That is, similar to the prior art, in the method shown in FIG. 4, before sending a PWS message to the user equipment, the base station instructs the user equipment to receive the PWS message through a paging message. After receiving the paging message, the user equipment may receive a PWS message.
S402:当用户设备处于连接态时,用户设备与告警服务器进行通信。S402: When the user equipment is in a connected state, the user equipment communicates with the alarm server.
其中,告警服务器为提供公共预警服务的应用服务器。告警服务器的部署和功能等可参见图1所示的应用场景中的相关描述,此处不再赘述。Among them, the alarm server is an application server that provides public early warning services. For the deployment and functions of the alarm server, please refer to the related description in the application scenario shown in FIG. 1, which will not be repeated here.
不难看出,用户设备接收寻呼消息和PWS消息的过程均为被动接收的过程,用户设备在驻留到第一小区之后,被动接收到寻呼消息,进而根据寻呼消息的指示接收到PWS消息。用户设备难以获知寻呼消息和PWS消息的来源。而在S402中,用户设备主动与用于触发PWS消息发送的告警服务器进行通信,从而可以主动获取到真实的PWS消息,进而根据从告警服务器获取到的真实的PWS消息对之前接收到的PWS消息的来源和真伪进行辨别。具体实现方式将在实施例三后面的介绍中详细描述,此处不再赘述。It is not difficult to see that the process that the user equipment receives the paging message and the PWS message are both passive receiving processes. After the user equipment camps in the first cell, it passively receives the paging message, and then receives the PWS according to the instruction of the paging message. Message. It is difficult for the user equipment to know the source of the paging message and the PWS message. In S402, the user equipment actively communicates with the alarm server used to trigger the sending of PWS messages, so that it can actively obtain the real PWS message, and then based on the real PWS message obtained from the alarm server to the previously received PWS message. To identify the source and authenticity. The specific implementation manner will be described in detail in the introduction later in the third embodiment, and will not be repeated here.
需要说明的是,S402中,用户设备与告警服务器之间的通信可以通过基站和核心网进行,图4中为了示意简便,略去了中间过程,直接示意用户设备与告警服务器之间的交互。It should be noted that, in S402, the communication between the user equipment and the alarm server can be performed through the base station and the core network. For simplicity and simplicity in FIG. 4, the intermediate process is omitted, and the interaction between the user equipment and the alarm server is directly indicated.
应理解,当用户设备处于连接态时,与用户设备建立连接的基站为合法基站,用户设备可通过该合法基站以及核心网与告警服务器进行通信。这里所说的合法基站和S401中向用户设备发送PWS消息的该基站含义有所不同,S401中的基站可能为该合法基站,也可能为黑客模拟的伪基站。It should be understood that when the user equipment is in a connected state, the base station that establishes a connection with the user equipment is a legal base station, and the user equipment can communicate with the alarm server through the legal base station and the core network. The meaning of the legal base station here is different from that of the base station that sends the PWS message to the user equipment in S401. The base station in S401 may be the legal base station or a pseudo base station simulated by a hacker.
示例性地,该基站为黑客模拟的伪基站的情况可以是:黑客获取到(与该用户设备建立连接的)合法基站以明文方式发送的携带寻呼信道配置的系统消息以及寻呼消息,因而黑客可模拟该合法基站的寻呼信道配置向该用户设备发送寻呼消息,进而再发送PWS消 息。在这种情况下,用户设备虽然与合法基站建立连接,但是该用户设备还是可能会收到黑客模拟的伪基站发送的伪造的PWS消息。图4所示的方法正是为了识别这种情况而设置的。S402中,用户设备在连接态主动发起与告警服务器的通信,用户设备与合法基站之间的信令交互是通过专有信道进行,黑客难以对该专有信道进行干扰。在这种情况下,用户设备从告警服务器获取到的信息为未经干扰的信息,因而可据此信息对之前收到的PWS消息的真伪进行判断。Exemplarily, the case where the base station is a pseudo base station simulated by a hacker may be: a hacker obtains a system message and a paging message carrying a paging channel configuration sent by a legitimate base station (established a connection with the user equipment) in plain text, and thus The hacker can simulate the paging channel configuration of the legitimate base station to send a paging message to the user equipment, and then send a PWS message. In this case, although the user equipment establishes a connection with a legitimate base station, the user equipment may still receive a fake PWS message sent by a fake base station simulated by a hacker. The method shown in Figure 4 is set up to identify this situation. In S402, the user equipment actively initiates communication with the alarm server in the connected state, and the signaling interaction between the user equipment and the legitimate base station is performed through a dedicated channel, and it is difficult for a hacker to interfere with the dedicated channel. In this case, the information obtained by the user equipment from the alarm server is non-interfering information, so the authenticity of the previously received PWS message can be judged based on this information.
S403:用户设备在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息的情况下,确定该基站为伪基站。S403: The user equipment determines that the base station is a pseudo base station if the alarm server does not trigger a PWS message update or the PWS message is a tampered PWS message.
需要说明的是,S403中用户设备在查询到告警服务器未触发PWS消息或者查询到PWS消息为经过篡改的PWS消息的情况下,判断该基站为伪基站。这里,伪基站的含义有多种,例如,这里的伪基站可以理解真实的伪基站设备,也可以理解为黑客模拟的伪基站。It should be noted that the user equipment in S403 determines that the base station is a pseudo base station when the alarm server does not trigger the PWS message or the PWS message is a tampered PWS message. Here, the meaning of the pseudo base station is various. For example, the pseudo base station here can understand the real pseudo base station equipment, and can also be understood as a pseudo base station simulated by a hacker.
S403中,若用户设备查询到告警服务器未触发PWS消息或者查询到PWS消息为经过篡改的PWS消息,则说明PWS消息并非来自该告警服务器,也就说明该基站为伪基站,这是因为:伪基站难以对连接态的用户设备主动发起的、与告警服务器的通信进行干扰,因而用户设备通过查询告警服务器获得的信息为未经干扰的信息。在该未经干扰的信息与PWS消息不符时,说明PWS消息是伪造的,也就说明该基站为伪基站。In S403, if the user equipment queries that the alarm server does not trigger the PWS message or that the PWS message is a tampered PWS message, it indicates that the PWS message does not come from the alarm server, which means that the base station is a pseudo base station. This is because: It is difficult for the base station to interfere with the communication initiated by the connected user equipment with the alarm server, so the information obtained by the user equipment by querying the alarm server is uninterrupted information. When the uninterfered information does not match the PWS message, it means that the PWS message is forged, that is, the base station is a fake base station.
S403中,用户设备与告警服务器进行通信的方式有多种,下面列举其中三种。In S403, there are multiple ways for the user equipment to communicate with the alarm server, three of which are listed below.
第一种The first
用户设备查询告警服务器在第一设定时长内是否触发PWS消息更新。其中,第一设定时长可进行配置。The user equipment queries whether the alarm server triggers a PWS message update within the first set time period. The first set duration can be configured.
例如,若用户设备查询到告警服务器在第一设定时长内并为触发PWS消息更新(即并未下发PWS消息),则可以确定PWS消息为伪造的PWS消息,进而确定该基站为伪基站。For example, if the user equipment queries that the alarm server is within the first set time period and triggers a PWS message update (that is, the PWS message is not issued), it can be determined that the PWS message is a fake PWS message, and then the base station is determined to be a fake base station .
第二种Second
用户设备查询告警服务器最近一次发送的第二PWS消息的内容,将第二PWS消息的内容与PWS消息的内容进行比对。The user equipment queries the content of the second PWS message sent by the alarm server last time, and compares the content of the second PWS message with the content of the PWS message.
示例性地,用户设备在将第二PWS消息的内容与PWS消息的内容进行比对之后,若发现第二PWS消息的内容与PWS消息的内容不一致,则可以确定PWS消息为伪造的PWS消息,进而确定基站是伪基站;若发现第二PWS消息的内容与PWS消息的内容一致,则可以确定PWS消息为真实的PWS消息,进而确定该基站不是伪基站。Exemplarily, after comparing the content of the second PWS message with the content of the PWS message, if the content of the second PWS message is found to be inconsistent with the content of the PWS message, the user equipment may determine that the PWS message is a fake PWS message, It is further determined that the base station is a pseudo base station; if the content of the second PWS message is found to be consistent with the content of the PWS message, it may be determined that the PWS message is a real PWS message, and then it is determined that the base station is not a pseudo base station.
第三种Third
用户设备指示告警服务器采用非对称加解密方式重新发送最近一次发送的第三PWS消息和/或第三PWS消息的校验码流;用户设备将第三PWS消息的内容与PWS消息的内容进行比对,和/或,将第三PWS消息的校验码流与PWS消息的校验码流进行比对。The user equipment instructs the alarm server to resend the third PWS message and / or the third PWS message check code stream that was sent last in an asymmetric encryption and decryption method; the user equipment compares the content of the third PWS message with the content of the PWS message Yes, and / or, the check code stream of the third PWS message is compared with the check code stream of the PWS message.
其中,关于非对称加解密方式的理解可以是:告警服务器采用公钥对第三PWS消息和/或第三PWS消息的校验码流进行加密;用户设备采用私钥对接收到的信息进行解密,得到第三PWS消息和/或第三PWS消息的校验码流。由于告警服务器采用的公钥和用户设备采用的私钥是一个密钥对,公钥是密钥对中公开的部分,私钥则是非公开的部分,仅由该用户设备保存。只有采用用户设备保存的私钥才可对公钥加密后的信息进行解密。因而 采用非对称加解密方式可以避免第三PWS消息和/或第三PWS消息的校验码流被篡改,提高用户设备接收到的第三PWS消息和/或第三PWS消息的校验码流的真实性和准确性。The understanding of the asymmetric encryption and decryption method may be: the alarm server uses the public key to encrypt the third PWS message and / or the check code stream of the third PWS message; the user device uses the private key to decrypt the received information To obtain a third PWS message and / or a check code stream of the third PWS message. Because the public key used by the alarm server and the private key used by the user device are a key pair, the public key is the public part of the key pair, and the private key is the non-public part, which is stored only by the user device. Only the private key saved by the user device can be used to decrypt the information encrypted by the public key. Therefore, the asymmetric encryption and decryption method can be used to prevent the third PWS message and / or the check code stream of the third PWS message from being tampered with, and improve the check code stream of the third PWS message and / or the third PWS message received by the user equipment. Authenticity and accuracy.
用户设备在解密得到第三PWS消息后,可将第三PWS消息的内容与PWS消息的内容进行比对;用户设备在解密得到第三PWS消息的校验码流后,可采用同样方式计算PWS消息的校验码流,进而可将第三PWS消息的校验码流与PWS消息的校验码流进行比对。After the user equipment decrypts and obtains the third PWS message, it can compare the content of the third PWS message with the content of the PWS message; after decrypting and obtaining the check code stream of the third PWS message, the user equipment can calculate the PWS in the same way. The check code stream of the message can further compare the check code stream of the third PWS message with the check code stream of the PWS message.
若用户设备发现PWS消息与第三PWS消息不一致,或发现第三PWS消息的校验码流与PWS消息的校验码流不一致,则用户设备可据此判断PWS消息为伪造的PWS消息,进而确定该基站是伪基站。若不存在上述不一致的情况,则用户设备可据此判断PWS消息为真实的PWS消息,进而确定该基站不是伪基站。If the user equipment finds that the PWS message is inconsistent with the third PWS message, or finds that the check code stream of the third PWS message is inconsistent with the check code stream of the PWS message, the user equipment can judge that the PWS message is a fake PWS message, and further It is determined that the base station is a pseudo base station. If the above-mentioned inconsistency does not exist, the user equipment may judge the PWS message to be a real PWS message according to this, and then determine that the base station is not a pseudo base station.
此外,在第三种方式中,告警服务器在发送第三PWS消息和/或第三PWS消息的校验码流时还可借鉴完整性校验的方式进行。以第三PWS消息为例,告警服务器在发送第三PWS消息时,采用公钥对第三PWS消息的摘要值进行加密,进而向用户设备发送第三PWS消息以及加密后的第三PWS消息的摘要值。用户设备在接收到告警服务器发送的信息后,可采用私钥对加密后的第三PWS消息的摘要值进行解密,得到第三PWS消息的摘要值。同时,用户设备可使用相同算法计算接收到的第三PWS消息的摘要值。然后,用户设备将解密得到的摘要值和计算得到的摘要值进行对比,若二者一致,则说明第三PWS消息在传输过程中未丢失数据(即第三PWS消息是完整的)。进而可将第三PWS消息的内容与PWS消息的内容进行对比。In addition, in the third method, the alarm server may also learn from the integrity check method when sending the third PWS message and / or the check code stream of the third PWS message. Taking the third PWS message as an example, when sending the third PWS message, the alarm server uses the public key to encrypt the digest value of the third PWS message, and then sends the third PWS message and the encrypted third PWS message to the user device. Summary value. After receiving the information sent by the alarm server, the user equipment may use the private key to decrypt the encrypted digest value of the third PWS message to obtain the digest value of the third PWS message. At the same time, the user equipment may use the same algorithm to calculate the digest value of the received third PWS message. Then, the user equipment compares the decrypted digest value with the calculated digest value. If they are the same, it means that the third PWS message has not lost data during transmission (that is, the third PWS message is complete). The content of the third PWS message can be compared with the content of the PWS message.
在实际实现时,用户设备在S403中判断该基站为伪基站之后,还可对提示用户当前驻留伪基站小区,和/或提示用户PWS消息为伪造的PWS消息。用户在看到提示后,则不会因为PWS消息的内容造成恐慌。具体地,用户设备中的AP可通过界面弹框显示、声音、振动、闪光灯等形式对用户进行提示。In actual implementation, after determining that the base station is a pseudo base station in S403, the user equipment may further prompt the user to camp on the pseudo base station cell, and / or prompt the user that the PWS message is a fake PWS message. After seeing the prompt, the user will not cause panic because of the content of the PWS message. Specifically, the AP in the user equipment may prompt the user through the interface popup display, sound, vibration, and flash.
需要说明的是,本申请提供的实施例三中,用户设备在查询到告警服务器未触发PWS消息或者查询到PWS消息为经过篡改的PWS消息的情况下,确定该基站为伪基站。此外,在用户设备查询到告警服务器已触发PWS消息、且PWS消息与告警服务器最近一次下发的PWS消息内容一致的情况下,用户设备可据此判断该基站不是伪基站。It should be noted that in the third embodiment provided by the present application, when the user equipment queries that the alarm server does not trigger the PWS message or finds that the PWS message is a tampered PWS message, it determines that the base station is a pseudo base station. In addition, when the user equipment queries that the PWS message has been triggered by the alarm server, and the PWS message is consistent with the content of the PWS message most recently issued by the alarm server, the user equipment can judge that the base station is not a pseudo base station.
也就是说,通过本申请提供的实施例三,可以准确地判断该基站是否为伪基站。That is, according to the third embodiment provided in this application, it can be accurately determined whether the base station is a pseudo base station.
此外,用户设备在确定该基站为伪基站之后,可采取相应措施对用户设备在基站上的通信进行限制,避免用户设备长时间驻留在伪基站小区,进而避免用户设备频繁接收伪造的PWS消息带来用户设备的功耗问题。In addition, after determining that the base station is a fake base station, the user equipment can take corresponding measures to restrict the communication of the user equipment on the base station to prevent the user equipment from staying in the fake base station cell for a long time, thereby preventing the user equipment from frequently receiving fake PWS messages. Brings power consumption issues to user equipment.
在用户设备确定该基站为伪基站之后,用户设备可将第一小区的小区信息加入禁止驻留列表,该禁止驻留列表用于指示用户设备禁止驻留在禁止驻留列表中记录的小区信息所对应的小区。After the user equipment determines that the base station is a pseudo base station, the user equipment may add the cell information of the first cell to a prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit camping on the cell information recorded in the prohibited camping list. Corresponding cell.
其中,该禁止驻留列表与实施例一中的禁止驻留列表的功能是相同的,相关描述可参见实施例一,此处不再赘述。The function of the banned list is the same as that of the banned list in the first embodiment. For related description, refer to the first embodiment, and details are not described herein again.
其中,第一小区的小区信息包括以下至少一种:第一小区的小区频点;第一小区的小区频段;第一小区的PCI、第一小区的EARFCN。The cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
将第一小区的小区信息加入禁止驻留列表后,用户设备则不会再驻留在第一小区,因而可以避免用户设备长期驻留在伪基站小区并频繁接收到伪造PWS消息而导致的用户设备功耗增加的问题。After adding the cell information of the first cell to the forbidden camping list, the user equipment will no longer reside in the first cell, thereby preventing the user from staying in the pseudo base station cell for a long time and frequently receiving fake PWS messages. The problem of increased device power consumption.
进一步地,在用户设备将第一小区的小区信息加入禁止驻留列表之后,用户设备还可在当前制式下重新进行小区搜索,若用户设备在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,该第二小区的小区信息未记录在禁止驻留列表中。Further, after the user equipment adds the cell information of the first cell to the forbidden camping list, the user equipment may perform a cell search again in the current system. If the user equipment searches for available cells in the current system, the cell search results are based on the cell search results. Camping to a second cell, and the cell information of the second cell is not recorded in the prohibited camping list.
也就是说,将第一小区的小区信息加入禁止驻留列表之后,用户设备在重新进行小区搜索时,需要将禁止驻留列表中的小区(即第一小区)剔除,只有在当前制式下搜索到禁止驻留列表之外的可用小区(即第二小区)时,才选择驻留到该小区。That is, after adding the cell information of the first cell to the forbidden camping list, when the user equipment performs a cell search again, it needs to delete the cells in the forbidden camping list (that is, the first cell), and only searches under the current system. Only when the available cell (that is, the second cell) is not on the camping list, the cell is selected to camp on the cell.
采用上述方案,用户设备可在当前制式下重新进行搜网,从而使得用户设备可以驻留到合法基站小区,进行正常通信。With the above solution, the user equipment can perform network search again under the current system, so that the user equipment can camp on a legal base station cell for normal communication.
此外,在用户设备在当前制式下进行小区搜索之后,若用户设备在当前制式下未搜索到可用小区,则用户设备可切换到当前制式之外的其他制式进行小区搜索。例如,当前通信制式为长期演进LTE时,用户设备可禁用(disable)LIE,并触发去2G或3G制式搜网。或者,在用户设备进行小区搜索之后,若用户设备在当前制式下未搜索到可用小区,用户设备可将第一小区的小区信息从禁止驻留列表中删除,并重新驻留第一小区。In addition, after the user equipment performs a cell search in the current system, if the user equipment does not search for an available cell in the current system, the user equipment may switch to a system other than the current system for the cell search. For example, when the current communication standard is long-term evolution LTE, the user equipment may disable LIE and trigger a search to the 2G or 3G standard network. Alternatively, after the user equipment performs a cell search, if the user equipment does not search for an available cell under the current system, the user equipment may delete the cell information of the first cell from the forbidden camping list and camp on the first cell again.
在当前制式下没有可用小区的情况下切换到其他制式进行小区搜索,可以避免用户设备驻留在伪基站小区;在当前制式下没有可用小区的情况下重新驻留第一小区,可以避免用户设备在当前制式下无可用小区。When there is no available cell in the current system, switching to another system for cell search can prevent the user equipment from camping in the pseudo base station cell; if the available cell is not available in the current system, the first cell is re-residented, which can avoid the user equipment. No cell is available under the current system.
以上是在用户设备处理连接态时对实施例三提供的伪基站识别方法进行的介绍。在用户设备处理空闲态的情况下,可采用如下方式识别该基站是否为伪基站:在用户设备接收当前驻留的第一小区所属的该基站发送的PWS消息之后,当用户设备处于空闲态时,用户设备可触发建链;然后,用户设备在建链失败的情况下确定该基站为伪基站。The above is the description of the pseudo base station identification method provided in the third embodiment when the user equipment processes the connection state. In the case where the user equipment handles the idle state, the following method can be used to identify whether the base station is a pseudo base station: After the user equipment receives a PWS message sent by the base station to which the currently camping first cell belongs, when the user equipment is in the idle state , The user equipment may trigger the establishment of the chain; then, if the user equipment fails to establish the chain, the base station determines that the base station is a pseudo base station.
当用户设备驻留在合法基站小区时,若用户设备主动发起建链,用户设备与基站间会建链成功,使得用户设备可转换为连接态与基站进行正常通信;而在用户设备驻留在伪基站小区的情况下,由于伪基站难以与用户设备进行双向鉴权,因而在用户设备主动发起建链的情况下,会导致建链失败。因此,在实施例三中,可通过用户设备触发建链是否成功来判断该基站是否为合法基站。When the user equipment resides in a legal base station cell, if the user equipment actively initiates a chain establishment, the chain establishment between the user equipment and the base station is successful, so that the user equipment can be switched to a connected state for normal communication with the base station; while the user equipment resides in the In the case of a pseudo base station cell, since it is difficult for the pseudo base station to perform two-way authentication with the user equipment, if the user equipment actively initiates a chain establishment, the chain establishment may fail. Therefore, in the third embodiment, it can be determined whether the base station is a legitimate base station by triggering whether the user equipment successfully establishes the chain.
此外,为了避免多个用户设备同时触发建链,用户设备在触发建链时,可在等待第二设定时长后触发建链。In addition, in order to prevent multiple user equipments from triggering the chain establishment at the same time, when the user equipment triggers the chain establishment, it may trigger the chain establishment after waiting for a second set time.
其中,第二设定时长可以由用户设备配置,也可以由网络配置,也可以由用户设备和网络共同配置。The second setting duration may be configured by the user equipment, may be configured by the network, or may be configured by the user equipment and the network together.
示例性地,第二设定时长可以设置为T*Rand。其中,T可以采用网络配置,单位为ms;Rand可以为用户设备生成的一个0到1间的随机数。Exemplarily, the second set duration may be set as T * Rand. Among them, T can adopt the network configuration, the unit is ms; Rand can generate a random number between 0 and 1 for the user equipment.
需要说明的是,在实施例三中,若用户设备建链成功,并不能说明该基站是合法基站。这是因为:与用户设备成功建链的可能是合法基站,但是向用户设备发送PWS消息的基站可能是黑客模拟的伪基站。黑客获取到(与该用户设备成功建链的)合法基站以明文方式发送的携带寻呼信道配置的系统消息以及寻呼消息,因而黑客可模拟该合法基站的寻呼信道配置向该用户设备发送寻呼消息,进而再发送PWS消息。在这种情况下,用户设备虽然与合法基站建立连接,但是该用户设备还是可能会收到黑客模拟的伪基站发送的伪造的PWS消息。It should be noted that, in the third embodiment, if the user equipment successfully establishes a chain, it does not mean that the base station is a legitimate base station. This is because the legal base station may be successfully established with the user equipment, but the base station sending the PWS message to the user equipment may be a pseudo base station simulated by a hacker. The hacker obtains the paging channel configuration system message and paging message sent by the legitimate base station (which successfully established a link with the user equipment) in clear text, so the hacker can simulate the paging channel configuration of the legitimate base station and send it to the user equipment. Paging message, and then send PWS message. In this case, although the user equipment establishes a connection with a legitimate base station, the user equipment may still receive a fake PWS message sent by a fake base station simulated by a hacker.
那么,在用户设备建链成功的情况下,可通过前述类似方法进一步判断该基站是否为伪基站。即,在用户设备触发建链之后,用户设备可在建链成功后与告警服务器进行通信; 然后,用户设备在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息时,确定该基站为伪基站。Then, in the case that the user equipment successfully establishes the chain, it can be further judged whether the base station is a pseudo base station through a similar method as described above. That is, after the user equipment triggers the chain establishment, the user equipment can communicate with the alarm server after the chain establishment is successful. Then, when the user equipment queries that the alarm server has not triggered the PWS message update or the PWS message is a tampered PWS message, To determine that the base station is a pseudo base station.
在这种实现方式中,用户设备已处于连接态。用户设备与告警服务器进行通信、以及在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息时确定该基站为伪基站,其具体实现方式可参见S402和S403中的相关描述,此处不再赘述。In this implementation, the user equipment is already in a connected state. The user equipment communicates with the alarm server, and determines that the base station is a pseudo base station when it is found that the alarm server has not triggered the PWS message update or the PWS message is a tampered PWS message. For specific implementations, refer to the relevant steps in S402 and S403. The description is not repeated here.
采用图4所示的方法,用户设备接收到PWS消息之后,可主动与告警服务器进行通信,在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息的情况下,确定该基站为伪基站。由于伪基站难以对连接态的用户设备主动发起的、与告警服务器的通信进行干扰,因而用户设备通过查询告警服务器获得的信息为未经干扰的信息。在该未经干扰的信息与PWS消息不符时,说明PWS消息是伪造的,也就说明该基站为伪基站。因此,采用图4所示的方法,可以准确识别基站是否为伪基站(即对PWS消息的来源进行判断),进而判断PWS消息的真伪,避免伪造的PWS消息造成民众恐慌。Using the method shown in FIG. 4, after receiving the PWS message, the user equipment can actively communicate with the alarm server, and determine whether the alarm server has not triggered the PWS message update or the PWS message is a tampered PWS message. The base station is a pseudo base station. Since it is difficult for the pseudo base station to interfere with the communication initiated by the connected user equipment with the alarm server, the information obtained by the user equipment by querying the alarm server is non-interfering information. When the uninterfered information does not match the PWS message, it means that the PWS message is forged, that is, the base station is a fake base station. Therefore, the method shown in FIG. 4 can be used to accurately identify whether the base station is a fake base station (that is, to determine the source of the PWS message), and then determine the authenticity of the PWS message to avoid the panic caused by the fake PWS message.
进一步地,采用实施例三的方案还可针对伪基站小区进行相应处理,避免用户设备再次在驻留在伪基站小区,从而避免用户设备再次接收到伪基小区上伪造的PWS消息,从而避免引起用户恐慌,同时,降低用户设备因接收伪造PWS消息而带来的功耗。Further, using the solution of the third embodiment can also perform corresponding processing on the pseudo base station cell to prevent the user equipment from camping on the pseudo base station cell again, thereby preventing the user equipment from receiving the fake PWS message on the pseudo base cell again, thereby avoiding causing The user panics, and at the same time, reduces the power consumption of the user equipment caused by receiving fake PWS messages.
通过上述对实施例一、实施例二和实施例三的介绍可以看出,实施例一与实施例二的实现方式较为简单,但是实施例一和实施例二中仅能在满足特定条件的情况下判断该基站为伪基站,但并不能准确认定该基站为合法基站。而实施例三提供的方案中,不仅能判断该基站为伪基站,还能在满足特定条件的情况下确定该基站为合法基站,该方案对较为全面。实际实现时,可根据不同的场景和需要选择执行实施例一、实施例二或实施例三,或者可将实施例一、实施例二和实施例三中的任意两个或三个结合使用,本申请实施例对此不做具体限定。It can be seen from the foregoing descriptions of the first, second, and third embodiments that the implementation of the first and the second embodiments is relatively simple, but the first and the second embodiments can only be performed when certain conditions are met. It is judged that the base station is a pseudo base station, but it cannot be accurately identified as a legitimate base station. In the solution provided in the third embodiment, not only can the base station be judged to be a pseudo base station, but also the base station can be determined to be a legitimate base station if certain conditions are met. This solution is relatively comprehensive. In actual implementation, the first embodiment, the second embodiment, or the third embodiment may be selected and executed according to different scenarios and needs, or any two or three of the first embodiment, the second embodiment, and the third embodiment may be used in combination. This embodiment of the present application does not specifically limit this.
具体地,当实施例一和实施例二结合使用时,用户设备可先判断寻呼消息指示接收的PWS消息的类型与为用户设备提供服务的运营商支持的PWS消息的类型是否一致。在二者一致的情况下,用户设备可进一步对该PWS消息的内容进行识别,若识别出该PWS消息的内容为垃圾信息,则可以确定发送上述寻呼消息的基站为伪基站。当然,用户设备也可先根据实施例二提供的方案对该基站是否为伪基站进行判断,再根据实施例一提供的方案进行判断。Specifically, when the first embodiment and the second embodiment are used in combination, the user equipment may first determine whether the type of the received PWS message indicated by the paging message is consistent with the type of the PWS message supported by the operator providing the user equipment. When the two are consistent, the user equipment may further identify the content of the PWS message. If the content of the PWS message is identified as spam, it may be determined that the base station sending the paging message is a pseudo base station. Of course, the user equipment may also first determine whether the base station is a pseudo base station according to the solution provided in the second embodiment, and then determine according to the solution provided in the first embodiment.
示例性地,上述将实施例一和实施例二结合使用的方案的流程示意图可以如图5所示。Exemplarily, a schematic flow chart of the solution using the first embodiment and the second embodiment in combination can be shown in FIG. 5.
具体地,当实施例一、实施例二和实施例三结合使用时,用户设备可先判断寻呼消息指示接收的PWS消息的类型与为用户设备提供服务的运营商支持的PWS消息的类型是否一致。在二者一致的情况下,用户设备可进一步对该PWS消息的内容进行识别。若识别出该PWS消息的内容不是垃圾信息,用户设备可在连接态时主动与告警服务器进行通信,若查询到告警服务器未触发PWS消息更新或查询到用户设备接收到的PWS消息经过篡改,则用户设备可判断发送该PWS消息的基站为伪基站。Specifically, when the first embodiment, the second embodiment, and the third embodiment are used in combination, the user equipment may first determine whether the type of the received PWS message is indicated by the paging message and the type of the PWS message supported by the operator providing the user equipment. Consistent. If the two are consistent, the user equipment may further identify the content of the PWS message. If it is identified that the content of the PWS message is not spam, the user equipment can actively communicate with the alarm server when it is connected. If it is found that the alarm server has not triggered the PWS message update or the PWS message received by the user equipment has been tampered, then The user equipment may determine that the base station sending the PWS message is a pseudo base station.
示例性地,上述将实施例一、实施例二和实施例三结合使用的方案的流程示意图可以如图6所示。Exemplarily, a schematic flowchart of the foregoing solution of combining the first embodiment, the second embodiment, and the third embodiment may be shown in FIG. 6.
基于同一发明构思,本申请实施例还提供一种伪基站识别装置,该装置可用于执行图 2所示方法、图3所示方法以及图4所示方法中的任一种方法。参见图7,该装置700包括收发模块701和处理模块702。Based on the same inventive concept, an embodiment of the present application further provides a pseudo base station identification device, which can be used to execute any one of the methods shown in FIG. 2, FIG. 3, and FIG. 4. Referring to FIG. 7, the apparatus 700 includes a transceiver module 701 and a processing module 702.
具体地,该装置700用于执行图2所示方法时,收发模块701用于接收当前驻留的第一小区所属的基站发送的寻呼消息,寻呼消息用于指示用户设备接收公共预警系统PWS消息.处理模块702,用于判断所述PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型是否一致;在PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型不一致的情况下,确定该基站为伪基站。Specifically, when the apparatus 700 is configured to execute the method shown in FIG. 2, the transceiver module 701 is configured to receive a paging message sent by a base station to which the currently camping first cell belongs, and the paging message is used to instruct a user equipment to receive a public early warning system. PWS message. Processing module 702 is configured to determine whether the message type of the PWS message is consistent with the type of PWS message supported by the operator that provides service to the user equipment; the message type of the PWS message is supported by the operator that provides service to the user equipment When the types of PWS messages are inconsistent, it is determined that the base station is a pseudo base station.
其中,PWS消息的消息类型用于指示承载该PWS消息的系统消息块。示例性地,PWS消息的消息类型为以下任一种:CMAS;ETWS;EU-Alert;KPAS;DEWN。其中,在确定基站为伪基站之后,处理模块702可提示用户设备的用户:用户设备当前驻留在伪基站小区。The message type of the PWS message is used to indicate a system message block that carries the PWS message. Exemplarily, the message type of the PWS message is any one of the following: CMAS; ETWS; EU-Alert; KPAS; DEWN. After determining that the base station is a pseudo base station, the processing module 702 may prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
此外,处理模块702还用于:在判断PWS消息的消息类型与运营商支持的PWS消息类型是否一致之后,在PWS消息的消息类型与为运营商支持的PWS消息类型一致的情况下,对PWS消息的内容进行识别;然后,在PWS消息的内容为垃圾信息的情况下,确定该基站为伪基站。In addition, the processing module 702 is further configured to: after determining whether the message type of the PWS message is consistent with the PWS message type supported by the operator, and when the message type of the PWS message is consistent with the PWS message type supported by the operator, The content of the message is identified; then, if the content of the PWS message is spam, it is determined that the base station is a pseudo base station.
此外,处理模块702还用于:在判断PWS消息的消息类型与运营商支持的PWS消息类型是否一致之后,在PWS消息的消息类型与为运营商支持的PWS消息类型一致的情况下,当用户设备处于连接态时,通过收发模块701与告警服务器进行通信,该告警服务器为提供公共预警服务的应用服务器;然后,在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息的情况下,确定基站为伪基站。In addition, the processing module 702 is further configured to: after determining whether the message type of the PWS message is consistent with the PWS message type supported by the operator, and when the message type of the PWS message is consistent with the PWS message type supported by the operator, when the user When the device is in the connected state, it communicates with the alarm server through the transceiver module 701, which is an application server that provides public warning services; then, when the alarm server is queried, the PWS message update is not triggered or the PWS message is queried as a tampered PWS. In the case of a message, it is determined that the base station is a pseudo base station.
可选地,处理模块702还用于:在判断所述PWS消息的消息类型与所述运营商支持的PWS消息类型是否一致70之前,根据第一小区的配置信息和消息类型配置列表确定运营商支持的PWS消息类型,消息类型配置列表用于指示至少一个运营商与该运营商支持的PWS消息的消息类型的对应关系;获取PWS消息的消息类型。Optionally, the processing module 702 is further configured to: before determining whether the message type of the PWS message is consistent with the PWS message type supported by the operator 70, determine the operator according to the configuration information of the first cell and the message type configuration list Supported PWS message types. The message type configuration list is used to indicate the correspondence between at least one operator and the message types of PWS messages supported by the operator; and to obtain the message types of PWS messages.
其中,第一小区的配置信息包括以下至少一种:第一小区的PLMN标识;第一小区的TAC;第一小区的Cell ID;第一小区的位置信息。The configuration information of the first cell includes at least one of the following: a PLMN identity of the first cell; a TAC of the first cell; a Cell ID of the first cell; and location information of the first cell.
为了避免用户设备长期驻留在伪基站小区,处理模块702还用于:在确定该基站为伪基站之后,将第一小区的小区信息加入禁止驻留列表,禁止驻留列表用于指示用户设备禁止驻留在禁止驻留列表中记录的小区信息所对应的小区。In order to prevent the user equipment from staying in the pseudo base station cell for a long time, the processing module 702 is further configured to: after determining that the base station is a pseudo base station, add the cell information of the first cell to the prohibition list, and the prohibition list is used to indicate the user equipment It is forbidden to camp on the cell corresponding to the cell information recorded in the forbidden camping list.
其中,第一小区的小区信息包括以下至少一种:第一小区的小区频点;第一小区的小区频段;第一小区的PCI;第一小区的EARFCN。The cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
此外,处理模块702还用于:在将第一小区的小区信息加入禁止驻留列表之后,在当前制式下进行小区搜索;若在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,第二小区的小区信息未记录在禁止驻留列表中。In addition, the processing module 702 is further configured to: after adding the cell information of the first cell to the forbidden camping list, perform a cell search in the current system; if an available cell is found in the current system, camp on the cell according to the cell search result. The second cell, the cell information of the second cell is not recorded in the prohibited camping list.
若在当前制式下未搜索到可用小区,则处理模块702还用于:切换到当前制式之外的其他制式进行小区搜索;或者,则将第一小区的小区信息从禁止驻留列表中删除,并重新驻留第一小区。If no available cell is found in the current system, the processing module 702 is further configured to: switch to a system other than the current system to perform a cell search; or delete the cell information of the first cell from the forbidden camping list. And residing in the first cell.
可选地,处理模块702还用于:对消息类型配置列表进行更新。Optionally, the processing module 702 is further configured to: update the message type configuration list.
具体地,处理模块702可采用以下方式中的至少一种对消息类型配置列表进行更新:处理模块702根据该基站的指示对消息类型配置列表进行更新;处理模块702通过查询告 警服务器对消息类型配置列表进行更新,告警服务器为提供公共预警服务的应用服务器;处理模块702通过用户设备的软件升级过程对消息类型配置列表进行更新;处理模块702通过用户设备中SIM卡的软件升级过程对消息类型配置列表进行更新。Specifically, the processing module 702 may update the message type configuration list in at least one of the following ways: the processing module 702 updates the message type configuration list according to an instruction of the base station; the processing module 702 queries the alarm server to configure the message type configuration The list is updated, and the alarm server is an application server that provides public warning services; the processing module 702 updates the message type configuration list through the software upgrade process of the user device; the processing module 702 configures the message type through the software upgrade process of the SIM card in the user device The list is updated.
具体地,该装置700用于执行图3所示方法时,收发模块701用于接收当前驻留的第一小区所属的基站发送的PWS消息;处理模块702,用于在判断PWS消息的内容为垃圾信息的情况下,确定该基站为伪基站。Specifically, when the apparatus 700 is configured to execute the method shown in FIG. 3, the transceiver module 701 is configured to receive a PWS message sent by a base station to which the first cell currently resides; and the processing module 702 is configured to determine that the content of the PWS message is In the case of spam, it is determined that the base station is a pseudo base station.
其中,在确定该基站为伪基站之后,处理模块702可提示用户设备的用户:用户设备当前驻留在伪基站小区。After determining that the base station is a pseudo base station, the processing module 702 may prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
收发模块701还用于:在接收当前驻留的第一小区所属的该基站发送的PWS消息之前,接收该基站发送的寻呼消息,寻呼消息用于指示用户设备接收PWS消息。The transceiver module 701 is further configured to: before receiving a PWS message sent by the base station to which the currently camping first cell belongs, receive a paging message sent by the base station, and the paging message is used to instruct the user equipment to receive the PWS message.
为了避免用户设备长期驻留在伪基站小区,处理模块702还用于:在确定基站为伪基站之后,将第一小区的小区信息加入禁止驻留列表,禁止驻留列表用于指示用户设备禁止驻留在禁止驻留列表中记录的小区信息所对应的小区。In order to prevent the user equipment from staying in the pseudo base station cell for a long time, the processing module 702 is further configured to: after determining that the base station is a pseudo base station, add the cell information of the first cell to the prohibited camping list, and the prohibited camping list is used to instruct the user equipment to prohibit A cell corresponding to the cell information recorded in the forbidden camping list.
其中,第一小区的小区信息包括以下至少一种:第一小区的小区频点;第一小区的小区频段;第一小区的PCI;第一小区的EARFCN。The cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
此外,处理模块702还用于:在将第一小区的小区信息加入禁止驻留列表之后,在当前制式下进行小区搜索;若在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,第二小区的小区信息未记录在禁止驻留列表中。In addition, the processing module 702 is further configured to: after adding the cell information of the first cell to the forbidden camping list, perform a cell search in the current system; if an available cell is found in the current system, camp on the cell according to the cell search result. The second cell, the cell information of the second cell is not recorded in the prohibited camping list.
若在当前制式下未搜索到可用小区,则处理模块702还用于:切换到当前制式之外的其他制式进行小区搜索;或者,则将第一小区的小区信息从禁止驻留列表中删除,并重新驻留第一小区。If no available cell is found in the current system, the processing module 702 is further configured to: switch to a system other than the current system to perform a cell search; or delete the cell information of the first cell from the forbidden camping list. And residing in the first cell.
具体地,该装置700用于执行图4所示方法时,收发模块701用于接收当前驻留的第一小区所属的基站发送的PWS消息;处理模块702,用于在用户设备处于连接态时通过收发模块701与告警服务器进行通信,告警服务器为提供公共预警服务的应用服务器;处理模块702,还用于在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息的情况下,确定该基站为伪基站。Specifically, when the apparatus 700 is configured to execute the method shown in FIG. 4, the transceiver module 701 is configured to receive a PWS message sent by a base station to which the currently camping first cell belongs; a processing module 702 is configured to be used when the user equipment is in a connected state. Communicate with the alarm server through the transceiver module 701. The alarm server is an application server that provides public warning services. The processing module 702 is also used to query that the alarm server does not trigger a PWS message update or that the PWS message is a tampered PWS message. In this case, it is determined that the base station is a pseudo base station.
其中,在确定该基站为伪基站之后,处理模块702可提示用户设备的用户:用户设备当前驻留在伪基站小区。After determining that the base station is a pseudo base station, the processing module 702 may prompt the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
在装置700用于执行图4所示方法时,处理模块702在通过收发模块701与告警服务器进行通信时,具体用于:处理模块702通过收发模块701查询告警服务器在第一设定时长内是否触发PWS消息更新;或者,处理模块702通过收发模块701查询告警服务器最近一次发送的第二PWS消息的内容,将第二PWS消息的内容与PWS消息的内容进行比对;或者,处理模块702通过收发模块701指示告警服务器采用非对称加解密方式重新发送最近一次发送的第三PWS消息和/或第三PWS消息的校验码流;处理模块702将第三PWS消息的内容与PWS消息的内容进行比对,和/或,将第三PWS消息的校验码流与PWS消息的校验码流进行比对。When the device 700 is used to execute the method shown in FIG. 4, when the processing module 702 communicates with the alarm server through the transceiver module 701, it is specifically used for: the processing module 702 queries the alarm server through the transceiver module 701 whether the alarm server is within the first set duration. Trigger a PWS message update; or, the processing module 702 queries the content of the second PWS message sent by the alarm server through the transceiver module 701, and compares the content of the second PWS message with the content of the PWS message; or, the processing module 702 passes The transceiver module 701 instructs the alarm server to resend the third PWS message and / or the third PWS message check code stream that was sent last in an asymmetric encryption and decryption manner; the processing module 702 compares the content of the third PWS message with the content of the PWS message Compare, and / or, compare the check code stream of the third PWS message with the check code stream of the PWS message.
此外,收发模块701还用于:在接收当前驻留的第一小区所属的基站发送的PWS消息之前,接收基站发送的寻呼消息,寻呼消息用于指示用户设备接收PWS消息。In addition, the transceiver module 701 is further configured to: before receiving a PWS message sent by a base station to which the first cell currently resides, receive a paging message sent by the base station, and the paging message is used to instruct the user equipment to receive the PWS message.
为了避免用户设备长期驻留在伪基站小区,处理模块702还用于:在确定该基站为伪基站之后,将第一小区的小区信息加入禁止驻留列表,禁止驻留列表用于指示用户设备禁 止驻留在禁止驻留列表中记录的小区信息所对应的小区。In order to prevent the user equipment from staying in the pseudo base station cell for a long time, the processing module 702 is further configured to: after determining that the base station is a pseudo base station, add the cell information of the first cell to the forbidden list, and the forbidden list is used to indicate the user equipment. It is forbidden to camp on the cell corresponding to the cell information recorded in the forbidden camping list.
其中,第一小区的小区信息包括以下至少一种:第一小区的小区频点;第一小区的小区频段;第一小区的PCI;第一小区的EARFCN。The cell information of the first cell includes at least one of the following: a cell frequency point of the first cell; a cell frequency band of the first cell; a PCI of the first cell; and an EARFCN of the first cell.
此外,处理模块702还用于:在将第一小区的小区信息加入禁止驻留列表之后,在当前制式下进行小区搜索;若在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,第二小区的小区信息未记录在禁止驻留列表中。In addition, the processing module 702 is further configured to: after adding the cell information of the first cell to the forbidden camping list, perform a cell search in the current system; if an available cell is found in the current system, camp on the cell according to the cell search result. The second cell, the cell information of the second cell is not recorded in the prohibited camping list.
若在当前制式下未搜索到可用小区,则处理模块702还用于:切换到当前制式之外的其他制式进行小区搜索;或者,则将第一小区的小区信息从禁止驻留列表中删除,并重新驻留第一小区。If no available cell is found in the current system, the processing module 702 is further configured to: switch to a system other than the current system to perform a cell search; or delete the cell information of the first cell from the forbidden camping list. And residing in the first cell.
对于处于空闲态的用户设备,在接收当前驻留的第一小区所属的该基站发送的PWS消息之后,若用户设备处于空闲态,则处理模块702通过收发模块701触发建链;然后,处理模块702在建链失败的情况下确定该基站为伪基站。For the user equipment in the idle state, after receiving the PWS message sent by the base station to which the first cell currently resides, if the user equipment is in the idle state, the processing module 702 triggers the establishment of a chain through the transceiver module 701; then, the processing module 702 In the case that the link establishment fails, the base station is determined to be a pseudo base station.
为了避免多个用户设备同时触发建链,处理模块702在通过收发模块701触发建链时,具体用于:处理模块702在等待第二设定时长后通过收发模块701触发建链。In order to prevent multiple user equipments from triggering the chain establishment at the same time, when the processing module 702 triggers the chain establishment through the transceiver module 701, the processing module 702 is specifically configured to: the processing module 702 triggers the chain establishment through the transceiver module 701 after waiting for the second set duration.
其中,处理模块702还用于:在触发建链之后,在建链成功后通过收发模块701与告警服务器进行通信;在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息时,确定该基站为伪基站。Among them, the processing module 702 is further configured to: after triggering the chain establishment, communicate with the alarm server through the transceiver module 701 after the chain establishment is successful; when the query of the alarm server does not trigger the PWS message update or the query of the PWS message as a tampered PWS When the message is received, it is determined that the base station is a pseudo base station.
需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。在本申请的实施例中的各功能模块可以集成在一个处理模块中,也可以是各个模块单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。It should be noted that the division of the modules in the embodiments of the present application is schematic, and is only a logical function division. In actual implementation, there may be another division manner. The functional modules in the embodiments of the present application may be integrated into one processing module, or each module may exist separately physically, or two or more modules may be integrated into one module. The above integrated modules may be implemented in the form of hardware or software functional modules.
集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated module is implemented in the form of a software functional module and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application is essentially a part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium. , Including a number of instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor to perform all or part of the steps of the methods of the embodiments of the present application. The aforementioned storage media include: U disks, mobile hard disks, read-only memories (ROMs), random access memories (RAMs), magnetic disks or compact discs and other media that can store program codes .
同样需要说明的是,伪基站识别装置700可用于执行图2、图3或图4对应的实施例提供的方法,因此图7所示的伪基站识别装置700中未详尽描述的实现方式及技术效果可参见图2、图3或图4所示方法中的相关描述。It should also be noted that the pseudo base station identification device 700 can be used to execute the method provided by the embodiment corresponding to FIG. 2, FIG. 3, or FIG. 4. Therefore, implementation methods and technologies not described in detail in the pseudo base station identification device 700 shown in FIG. 7. For the effect, refer to the related description in the method shown in FIG. 2, FIG. 3, or FIG. 4.
基于相同构思,本申请实施例还提供一种伪基站识别装置,该装置应用于用户设备,该伪基站识别装置用于执行图2、图3或图4所示的伪基站识别方法,可以是与图7所示的伪基站识别装置700相同的装置。Based on the same concept, an embodiment of the present application further provides a pseudo base station identification device, which is applied to user equipment. The pseudo base station identification device is configured to perform the pseudo base station identification method shown in FIG. 2, FIG. 3, or FIG. 4. The same device as the pseudo base station identification device 700 shown in FIG. 7.
图8示例性示出了本申请提供的一种伪基站识别装置的结构示意图,如图8所示,伪基站识别装置800包括处理器、存储器、控制电路以及天线。处理器主要用于对通信协议以及通信数据进行处理,以及对整个伪基站识别装置800进行控制,执行软件程序,处理软件程序的数据,例如用于支持伪基站识别装置800执行图2、图3或图4所示的伪基站 识别方法。存储器主要用于存储软件程序和数据。控制电路主要用于基带信号与射频信号的转换以及对射频信号的处理。控制电路和天线一起也可以叫做收发器,主要用于收发电磁波形式的射频信号。FIG. 8 exemplarily shows a schematic structural diagram of a pseudo base station identification device provided in the present application. As shown in FIG. 8, the pseudo base station identification device 800 includes a processor, a memory, a control circuit, and an antenna. The processor is mainly used to process the communication protocol and communication data, and control the entire pseudo base station identification device 800, execute a software program, and process the data of the software program, for example, to support the pseudo base station identification device 800 to execute FIGS. 2 and 3 Or the pseudo base station identification method shown in FIG. 4. The memory is mainly used for storing software programs and data. The control circuit is mainly used for conversion of baseband signals and radio frequency signals and processing of radio frequency signals. The control circuit and the antenna together can also be called a transceiver, which is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
当用户设备开机后,处理器可以读取存储器中的软件程序,解释并执行软件程序的指令,处理软件程序的数据。当需要通过无线发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到伪基站识别装置800时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。After the user equipment is powered on, the processor can read the software program in the memory, interpret and execute the instructions of the software program, and process the data of the software program. When the data needs to be sent wirelessly, the processor performs baseband processing on the data to be sent, and then outputs the baseband signal to the radio frequency circuit. After the radio frequency circuit processes the baseband signal, the radio frequency signal is sent out in the form of electromagnetic waves through the antenna. When data is sent to the pseudo base station identification device 800, the RF circuit receives the RF signal through the antenna, converts the RF signal into a baseband signal, and outputs the baseband signal to the processor. The processor converts the baseband signal into data and processes the data. For processing.
本领域技术人员可以理解,为了便于说明,图8仅示出了一个存储器和处理器。在实际的伪基站识别装置800中,可以存在多个处理器和存储器。存储器也可以称为存储介质或者存储设备等,本申请对此不做限制。Those skilled in the art can understand that, for ease of description, FIG. 8 shows only one memory and a processor. In the actual pseudo base station identification apparatus 800, there may be multiple processors and memories. The memory may also be referred to as a storage medium or a storage device, which is not limited in this application.
作为一种可选的实现方式,处理器可以包括基带处理器和中央处理器,基带处理器主要用于对通信协议以及通信数据进行处理,中央处理器主要用于对整个伪基站识别装置800进行控制,执行软件程序,处理软件程序的数据。图8中的处理器集成了基带处理器和中央处理器的功能,本领域技术人员可以理解,基带处理器和中央处理器也可以是各自独立的处理器,通过总线等技术互联。本领域技术人员可以理解,伪基站识别装置800可以包括多个基带处理器以适应不同的网络制式,伪基站识别装置800可以包括多个中央处理器以增强其处理能力,伪基站识别装置800的各个部件可以通过各种总线连接。所述基带处理器也可以表述为基带处理电路或者基带处理芯片。所述中央处理器也可以表述为中央处理电路或者中央处理芯片。对通信协议以及通信数据进行处理的功能可以内置在处理器中,也可以以软件程序的形式存储在存储单元中,由处理器执行软件程序以实现基带处理功能。As an optional implementation manner, the processor may include a baseband processor and a central processor. The baseband processor is mainly used to process communication protocols and communication data, and the central processor is mainly used to perform the entire pseudo base station identification device 800. Control, execute software programs, and process software program data. The processor in FIG. 8 integrates the functions of the baseband processor and the central processing unit. Those skilled in the art can understand that the baseband processor and the central processing unit may also be independent processors, which are interconnected through technologies such as a bus. Those skilled in the art can understand that the pseudo base station identification device 800 may include multiple baseband processors to adapt to different network standards. The pseudo base station identification device 800 may include multiple central processors to enhance its processing capabilities. The various components can be connected via various buses. The baseband processor may also be expressed as a baseband processing circuit or a baseband processing chip. The central processing unit may also be expressed as a central processing circuit or a central processing chip. The function of processing communication protocols and communication data may be built in the processor or stored in the storage unit in the form of a software program, and the processor executes the software program to implement the baseband processing function.
在本申请实施例中,可以将具有收发功能的天线和控制电路视为伪基站识别装置800的收发单元,将具有处理功能的处理器视为伪基站识别装置800的处理单元。收发单元也可以称为收发器、收发机、收发装置等。可选地,可以将收发单元中用于实现接收功能的器件视为接收单元,将收发单元中用于实现发送功能的器件视为发送单元,即收发单元包括接收单元和发送单元。示例性的,接收单元也可以称为接收机、接收器、接收电路等,发送单元可以称为发射机、发射器或者发射电路等。In the embodiment of the present application, the antenna and the control circuit having a transmitting and receiving function may be regarded as the transmitting and receiving unit of the pseudo base station identification device 800, and the processor having the processing function may be regarded as the processing unit of the pseudo base station identification device 800. The transceiver unit may also be referred to as a transceiver, a transceiver, a transceiver device, and the like. Optionally, a device for implementing a receiving function in the transceiver unit may be regarded as a receiving unit, and a device for implementing a transmitting function in the transceiver unit may be regarded as a transmitting unit, that is, the transceiver unit includes a receiving unit and a transmitting unit. Exemplarily, the receiving unit may also be called a receiver, a receiver, a receiving circuit, etc., and the sending unit may be called a transmitter, a transmitter, or a transmitting circuit.
在下行链路上,通过天线接收网络设备(例如基站)发送的下行链路信号(包括数据和/或控制信息),在上行链路上,通过天线向网络设备(例如基站)发送上行链路信号(包括数据和/或控制信息),在处理器中,对业务数据和信令消息进行处理,这些单元根据无线接入网采用的无线接入技术(例如,LTE、NR及其他演进系统的接入技术)来进行处理。所述处理器还用于对伪基站识别装置800的动作进行控制管理,用于执行上述实施例中由伪基站识别装置800进行的处理。处理器还用于支持伪基站识别装置800执行图2、图3或图4中涉及用户设备的执行方法。On the downlink, a downlink signal (including data and / or control information) sent by a network device (such as a base station) is received through an antenna, and on the uplink, an uplink is sent to a network device (such as a base station) through an antenna Signals (including data and / or control information) are processed in the processor by service data and signaling messages. These units are based on the radio access technology (e.g., LTE, NR, and other evolved systems) used by the radio access network. Access technology). The processor is further configured to control and manage the actions of the pseudo base station identification device 800, and to execute the processing performed by the pseudo base station identification device 800 in the foregoing embodiment. The processor is further configured to support the pseudo base station identification apparatus 800 to execute the execution method related to the user equipment in FIG. 2, FIG. 3, or FIG. 4.
可以理解的是,图8仅仅示出了伪基站识别装置800的简化设计。在实际应用中,伪基站识别装置800可以包含任意数量的天线,存储器,处理器等,而所有可以实现本申请的伪基站识别装置800都在本申请的保护范围之内。It can be understood that FIG. 8 only shows a simplified design of the pseudo base station identification device 800. In practical applications, the pseudo base station identification device 800 may include any number of antennas, memories, processors, and the like, and all pseudo base station identification devices 800 that can implement the present application are within the protection scope of the present application.
具体地,本申请中,以收发单元称为收发器,处理单元称为处理器为例,则伪基站识 别装置800在执行图2所示的伪基站识别方法时,收发器用于接收当前驻留的第一小区所属的基站发送的寻呼消息,寻呼消息用于指示用户设备接收公共预警系统PWS消息.处理器,用于在判断PWS消息的消息类型与为用户设备提供服务的运营商支持的PWS消息类型不一致的情况下,确定该基站为伪基站。Specifically, in this application, taking the transceiver unit as a transceiver and the processing unit as a processor as an example, when the pseudo base station identification device 800 executes the pseudo base station identification method shown in FIG. 2, the transceiver is configured to receive the current resident The paging message sent by the base station to which the first cell belongs, the paging message is used to instruct the user equipment to receive the PWS message of the public early warning system. The processor is used to determine the message type of the PWS message and the operator support to provide services for the user equipment When the types of PWS messages are inconsistent, it is determined that the base station is a pseudo base station.
具体地,本申请中,以收发单元称为收发器,处理单元称为处理器为例,则伪基站识别装置800在执行图3所示的伪基站识别方法时,收发器用于接收当前驻留的第一小区所属的基站发送的PWS消息;处理器,用于在判断PWS消息的内容为垃圾信息的情况下,确定该基站为伪基站。Specifically, in this application, taking the transceiver unit as a transceiver and the processing unit as a processor as an example, when the pseudo base station identification device 800 executes the pseudo base station identification method shown in FIG. 3, the transceiver is configured to receive the current camping. A PWS message sent by a base station to which the first cell belongs; a processor, configured to determine that the base station is a pseudo base station when determining that the content of the PWS message is spam.
具体地,本申请中,以收发单元称为收发器,处理单元称为处理器为例,则伪基站识别装置800在执行图4所示的伪基站识别方法时,收发器用于接收当前驻留的第一小区所属的基站发送的PWS消息;处理器,用于在用户设备处于连接态时通过收发器与告警服务器进行通信,告警服务器为提供公共预警服务的应用服务器;处理器,还用于在查询到告警服务器未触发PWS消息更新或者查询到PWS消息为经过篡改的PWS消息的情况下,确定该基站为伪基站。Specifically, in this application, taking the transceiver unit as a transceiver and the processing unit as a processor as an example, when the pseudo base station identification device 800 executes the pseudo base station identification method shown in FIG. 4, the transceiver is configured to receive the current resident The PWS message sent by the base station to which the first cell belongs; the processor is used to communicate with the alarm server through the transceiver when the user equipment is in a connected state, the alarm server is an application server that provides public warning services; the processor is also used to When the query of the alarm server does not trigger the PWS message update or the query that the PWS message is a tampered PWS message, it is determined that the base station is a pseudo base station.
处理器还可以实现上述图2、图3或图4所示的方法实施例中用户设备的任意详细功能,在此不再详尽赘述,可以参照上述图2、图3或图4所示的方法实施例中用户设备执行的处理步骤。The processor may also implement any detailed functions of the user equipment in the method embodiments shown in FIG. 2, FIG. 3, or FIG. 4, which are not described in detail here, and may refer to the methods shown in FIG. 2, FIG. 3, or FIG. 4 described above. The processing steps performed by the user equipment in the embodiment.
需要说明的是,图7~图8中所示的伪基站识别装置可视为用户设备中的集成芯片,也可以也视为用户设备。It should be noted that the pseudo base station identification device shown in FIG. 7 to FIG. 8 may be regarded as an integrated chip in user equipment, and may also be regarded as user equipment.
具体地,该用户设备包括但不限于智能手机、智能手表、平板电脑、VR设备、AR设备、个人计算机、手持式计算机、个人数字助理。Specifically, the user equipment includes, but is not limited to, a smart phone, a smart watch, a tablet computer, a VR device, an AR device, a personal computer, a handheld computer, and a personal digital assistant.
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present application may be provided as a method, a system, or a computer program product. Therefore, this application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, this application may take the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code.
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。This application is described with reference to flowcharts and / or block diagrams of methods, devices (systems), and computer program products according to embodiments of the present application. It should be understood that each process and / or block in the flowcharts and / or block diagrams, and combinations of processes and / or blocks in the flowcharts and / or block diagrams can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general-purpose computer, special-purpose computer, embedded processor, or other programmable data processing device to produce a machine, so that the instructions generated by the processor of the computer or other programmable data processing device are used to generate instructions Means for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a particular manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions The device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个 方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
显然,本领域的技术人员可以对本申请实施例进行各种改动和变型而不脱离本申请实施例的精神和范围。这样,倘若本申请实施例的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various modifications and variations to the embodiments of the present application without departing from the spirit and scope of the embodiments of the present application. In this way, if these modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalent technologies, the present application also intends to include these changes and variations.
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present application may be provided as a method, a system, or a computer program product. Therefore, this application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, this application may take the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code.
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。This application is described with reference to flowcharts and / or block diagrams of methods, devices (systems), and computer program products according to embodiments of the present application. It should be understood that each process and / or block in the flowcharts and / or block diagrams, and combinations of processes and / or blocks in the flowcharts and / or block diagrams can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general-purpose computer, special-purpose computer, embedded processor, or other programmable data processing device to produce a machine, so that the instructions generated by the processor of the computer or other programmable data processing device are used to generate instructions Means for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a particular manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions The device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
显然,本领域的技术人员可以对本申请实施例进行各种改动和变型而不脱离本申请实施例的精神和范围。这样,倘若本申请实施例的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various modifications and variations to the embodiments of the present application without departing from the spirit and scope of the embodiments of the present application. In this way, if these modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalent technologies, the present application also intends to include these changes and variations.

Claims (18)

  1. 一种伪基站识别方法,其特征在于,包括:A method for identifying a pseudo base station, comprising:
    用户设备接收当前驻留的第一小区所属的基站发送的寻呼消息,所述寻呼消息用于指示所述用户设备接收公共预警系统PWS消息;Receiving, by a user equipment, a paging message sent by a base station to which a first cell currently camping belongs, where the paging message is used to instruct the user equipment to receive a public early warning system PWS message;
    所述用户设备判断所述PWS消息的消息类型与为所述用户设备提供服务的运营商支持的PWS消息类型是否一致;Determining, by the user equipment, whether a message type of the PWS message is consistent with a PWS message type supported by an operator providing services for the user equipment;
    在所述PWS消息的消息类型与所述运营商支持的PWS消息类型不一致的情况下,所述用户设备确定所述基站为伪基站。When the message type of the PWS message is inconsistent with the PWS message type supported by the operator, the user equipment determines that the base station is a pseudo base station.
  2. 如权利要求1所述的方法,其特征在于,所述PWS消息的消息类型用于指示承载所述PWS消息的系统消息块。The method according to claim 1, wherein a message type of the PWS message is used to indicate a system message block carrying the PWS message.
  3. 如权利要求1或2所述的方法,其特征在于,在所述用户设备判断所述PWS消息的消息类型与所述运营商支持的PWS消息类型是否一致之后,还包括:The method according to claim 1 or 2, wherein after the user equipment determines whether a message type of the PWS message is consistent with a PWS message type supported by the operator, further comprising:
    在所述PWS消息的消息类型与为所述运营商支持的PWS消息类型一致的情况下,所述用户设备对所述PWS消息的内容进行识别;When the message type of the PWS message is consistent with the PWS message type supported by the operator, the user equipment identifies the content of the PWS message;
    在所述PWS消息的内容为垃圾信息的情况下,所述用户设备确定所述基站为伪基站。When the content of the PWS message is spam, the user equipment determines that the base station is a pseudo base station.
  4. 如权利要求1~3任一项所述的方法,其特征在于,在所述用户设备判断所述PWS消息的消息类型与所述运营商支持的PWS消息类型是否一致之后,还包括:The method according to any one of claims 1 to 3, wherein after the user equipment determines whether a message type of the PWS message is consistent with a PWS message type supported by the operator, further comprising:
    在所述PWS消息的消息类型与为所述运营商支持的PWS消息类型一致的情况下,当所述用户设备处于连接态时,所述用户设备与告警服务器进行通信,所述告警服务器为提供公共预警服务的应用服务器;When the message type of the PWS message is consistent with the PWS message type supported by the operator, when the user equipment is in a connected state, the user equipment communicates with an alarm server, and the alarm server provides Application server for public warning services;
    所述用户设备在查询到所述告警服务器未触发PWS消息更新或者查询到所述PWS消息为经过篡改的PWS消息的情况下,确定所述基站为伪基站。The user equipment determines that the base station is a pseudo base station in the case that the alarm server does not trigger a PWS message update or the PWS message is a tampered PWS message.
  5. 如权利要求1~4任一项所述的方法,其特征在于,在所述用户设备判断所述PWS消息的消息类型与所述运营商支持的PWS消息类型是否一致之前,还包括:The method according to any one of claims 1 to 4, before the user equipment determines whether a message type of the PWS message is consistent with a PWS message type supported by the operator, further comprising:
    所述用户设备根据所述第一小区的配置信息和消息类型配置列表确定所述运营商支持的PWS消息类型,所述消息类型配置列表用于指示至少一个运营商与该运营商支持的PWS消息的消息类型的对应关系;Determining, by the user equipment, a PWS message type supported by the operator according to the configuration information of the first cell and a message type configuration list, where the message type configuration list is used to indicate at least one operator and PWS messages supported by the operator Correspondence of message types;
    所述用户设备获取所述PWS消息的消息类型。Obtaining, by the user equipment, a message type of the PWS message.
  6. 如权利要求1~5任一项所述的方法,其特征在于,在所述用户设备确定所述基站为伪基站之后,还包括:The method according to any one of claims 1 to 5, after the user equipment determines that the base station is a pseudo base station, further comprising:
    所述用户设备将所述第一小区的小区信息加入禁止驻留列表,所述禁止驻留列表用于指示所述用户设备禁止驻留在所述禁止驻留列表中记录的小区信息所对应的小区。Adding, by the user equipment, the cell information of the first cell to a prohibited camping list, where the prohibited camping list is used to instruct the user equipment to prohibit camping on the cell information corresponding to the cell information recorded in the prohibited camping list Plot.
  7. 如权利要求6所述的方法,其特征在于,在所述用户设备将所述第一小区的小区信息加入禁止驻留列表之后,还包括:The method according to claim 6, wherein after the user equipment adds the cell information of the first cell to a forbidden camp list, further comprising:
    所述用户设备在当前制式下进行小区搜索;The user equipment performs a cell search under the current standard;
    若所述用户设备在当前制式下搜索到可用小区,则根据小区搜索结果驻留到第二小区,所述第二小区的小区信息未记录在所述禁止驻留列表中。If the user equipment searches for an available cell under the current system, it camps on the second cell according to the cell search result, and the cell information of the second cell is not recorded in the forbidden camping list.
  8. 如权利要求7所述的方法,其特征在于,在所述用户设备在当前制式下进行小区搜索之后,还包括:The method according to claim 7, further comprising: after the user equipment performs a cell search under a current standard, further comprising:
    若所述用户设备在当前制式下未搜索到可用小区,则切换到当前制式之外的其他制式进行小区搜索;或者,If the user equipment does not search for an available cell under the current system, switching to a system other than the current system for cell search; or,
    若所述用户设备在当前制式下未搜索到可用小区,则将所述第一小区的小区信息从所述禁止驻留列表中删除,并重新驻留所述第一小区。If the user equipment does not search for an available cell under the current system, the cell information of the first cell is deleted from the forbidden camp list, and the first cell is camped again.
  9. 如权利要求5~8任一项所述的方法,其特征在于,还包括:The method according to any one of claims 5 to 8, further comprising:
    所述用户设备对所述消息类型配置列表进行更新。Updating, by the user equipment, the message type configuration list.
  10. 如权利要求9所述的方法,其特征在于,所述用户设备采用以下方式中的至少一种对所述消息类型配置列表进行更新:The method according to claim 9, wherein the user equipment updates the message type configuration list in at least one of the following ways:
    所述用户设备根据所述基站的指示对所述消息类型配置列表进行更新;Updating, by the user equipment, the message type configuration list according to an instruction of the base station;
    所述用户设备通过查询告警服务器对所述消息类型配置列表进行更新,所述告警服务器为提供公共预警服务的应用服务器;Updating, by the user equipment, the message type configuration list by querying an alarm server, which is an application server providing a public early warning service;
    所述用户设备通过所述用户设备的软件升级过程对所述消息类型配置列表进行更新;Updating, by the user equipment, the message type configuration list through a software upgrade process of the user equipment;
    所述用户设备通过所述用户设备中用户身份识别SIM卡的软件升级过程对所述消息类型配置列表进行更新。The user equipment updates the message type configuration list through a software upgrade process of a user identification SIM card in the user equipment.
  11. 如权利要求1~10任一项所述的方法,其特征在于,所述PWS消息的消息类型为以下任一种:The method according to any one of claims 1 to 10, wherein a message type of the PWS message is any one of the following:
    商用移动预警系统CMAS;Commercial mobile early warning system CMAS;
    地震海啸警报系统ETWS;Earthquake and Tsunami Warning System ETWS;
    欧洲公共预警系统EU-Alert;European Public Alert System EU-Alert;
    韩国公共预警系统KPAS;Korean public early warning system KPAS;
    灾害和应急预警网络DEWN。Disaster and emergency warning network DEWN.
  12. 如权利要求5~11任一项所述的方法,其特征在于,所述第一小区的配置信息包括以下至少一种:The method according to any one of claims 5 to 11, wherein the configuration information of the first cell includes at least one of the following:
    所述第一小区的公共陆地移动网络PLMN标识;The public land mobile network PLMN identity of the first cell;
    所述第一小区的跟踪区代码TAC;The tracking area code TAC of the first cell;
    所述第一小区的小区识别码Cell ID;A cell identification code CellID of the first cell;
    所述第一小区的位置信息。Location information of the first cell.
  13. 如权利要求6~12任一项所述的方法,其特征在于,所述第一小区的小区信息包括以下至少一种:The method according to any one of claims 6 to 12, wherein the cell information of the first cell includes at least one of the following:
    所述第一小区的小区频点;A cell frequency of the first cell;
    所述第一小区的小区频段;A cell frequency band of the first cell;
    所述第一小区的物理小区标识PCI;The physical cell identifier PCI of the first cell;
    所述第一小区的E-UTRA绝对无线频率信道号EARFCN。The E-UTRA absolute radio frequency channel number of the first cell is EARFCN.
  14. 如权利要求1~13任一项所述的方法,其特征在于,在所述用户设备确定所述基站为伪基站之后,还包括:The method according to any one of claims 1 to 13, after the user equipment determines that the base station is a pseudo base station, further comprising:
    所述用户设备提示所述用户设备的用户:所述用户设备当前驻留在伪基站小区。The user equipment prompts the user of the user equipment that the user equipment currently resides in a pseudo base station cell.
  15. 一种伪基站识别装置,其特征在于,包括处理器,所述处理器与存储器耦合,并读取所述存储器中的指令,用于执行如权利要求1~14任一项所述的方法。A pseudo base station identification device, comprising a processor, the processor is coupled to a memory, and reads instructions in the memory, for performing the method according to any one of claims 1 to 14.
  16. 如权利要求15所述的装置,其特征在于,所述装置为用户设备或者所述装置为芯片。The device according to claim 15, wherein the device is a user equipment or the device is a chip.
  17. 一种计算机存储介质,其特征在于,所述计算机存储介质上存储有程序,所述程序被处理器执行时,用于实现如权利要求1~14任一项所述的方法。A computer storage medium, characterized in that a program is stored on the computer storage medium, and when the program is executed by a processor, it is used to implement the method according to any one of claims 1 to 14.
  18. 一种计算机程序产品,其特征在于,所述计算机程序产品包含的程序代码在计算机上运行时,使得所述计算机执行如权利要求1~14任一项所述的方法。A computer program product, characterized in that when the program code contained in the computer program product runs on a computer, the computer causes the computer to execute the method according to any one of claims 1 to 14.
PCT/CN2018/101203 2018-08-17 2018-08-17 Pseudo base station identification method and apparatus WO2020034228A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/101203 WO2020034228A1 (en) 2018-08-17 2018-08-17 Pseudo base station identification method and apparatus
CN201880096528.XA CN112567780B (en) 2018-08-17 2018-08-17 Pseudo base station identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/101203 WO2020034228A1 (en) 2018-08-17 2018-08-17 Pseudo base station identification method and apparatus

Publications (1)

Publication Number Publication Date
WO2020034228A1 true WO2020034228A1 (en) 2020-02-20

Family

ID=69524589

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/101203 WO2020034228A1 (en) 2018-08-17 2018-08-17 Pseudo base station identification method and apparatus

Country Status (2)

Country Link
CN (1) CN112567780B (en)
WO (1) WO2020034228A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114245380A (en) * 2021-12-31 2022-03-25 无锡神探电子科技有限公司 Design method of handheld whole-network wireless signal acquisition equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104010285A (en) * 2014-06-18 2014-08-27 中国联合网络通信集团有限公司 Short message filtering method and system, short message service center and terminal
WO2016096836A1 (en) * 2014-12-19 2016-06-23 Telefonaktiebolaget Lm Ericsson (Publ) Network node and method for detecting false base stations
CN106131851A (en) * 2016-08-17 2016-11-16 北京安信创基信息科技有限公司 A kind of flow-type pseudo-base station tracking positioning method and system
CN106211173A (en) * 2016-09-05 2016-12-07 努比亚技术有限公司 Prevent from accessing the method for pseudo-base station and there is the terminal preventing accessing pseudo-base station system
CN106211171A (en) * 2016-09-05 2016-12-07 努比亚技术有限公司 Prevent from accessing the method for pseudo-base station and there is the terminal preventing accessing pseudo-base station system
CN106255117A (en) * 2016-08-30 2016-12-21 北京小米移动软件有限公司 Pseudo-base station recognition methods and device
CN106332027A (en) * 2016-09-26 2017-01-11 惠州Tcl移动通信有限公司 Message analysis method and intelligent terminal capable of performing message analysis
CN107911822A (en) * 2017-10-31 2018-04-13 珠海市魅族科技有限公司 Pseudo-base station detection method and device, terminal and computer-readable recording medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857884B (en) * 2011-06-27 2018-02-09 中兴通讯股份有限公司 Transmission, processing method, network side equipment and the terminal of the main advertised informations of PWS
CN103108346B (en) * 2011-11-11 2016-05-11 上海贝尔股份有限公司 In wireless communication system, remove the method and apparatus that business moves early warning system service
EP3117635A4 (en) * 2014-03-13 2017-08-09 LG Electronics Inc. Method and apparatus for transmitting multimedia broadcast supplement for public warning system in wireless communication system
CN106658508B (en) * 2016-09-27 2020-12-04 华为技术有限公司 Method, equipment and system for pseudo base station identification and pseudo base station information sharing
CN107959936B (en) * 2017-12-19 2021-09-21 努比亚技术有限公司 Method, system, terminal and computer storage medium for identifying 4G pseudo base station

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104010285A (en) * 2014-06-18 2014-08-27 中国联合网络通信集团有限公司 Short message filtering method and system, short message service center and terminal
WO2016096836A1 (en) * 2014-12-19 2016-06-23 Telefonaktiebolaget Lm Ericsson (Publ) Network node and method for detecting false base stations
CN106131851A (en) * 2016-08-17 2016-11-16 北京安信创基信息科技有限公司 A kind of flow-type pseudo-base station tracking positioning method and system
CN106255117A (en) * 2016-08-30 2016-12-21 北京小米移动软件有限公司 Pseudo-base station recognition methods and device
CN106211173A (en) * 2016-09-05 2016-12-07 努比亚技术有限公司 Prevent from accessing the method for pseudo-base station and there is the terminal preventing accessing pseudo-base station system
CN106211171A (en) * 2016-09-05 2016-12-07 努比亚技术有限公司 Prevent from accessing the method for pseudo-base station and there is the terminal preventing accessing pseudo-base station system
CN106332027A (en) * 2016-09-26 2017-01-11 惠州Tcl移动通信有限公司 Message analysis method and intelligent terminal capable of performing message analysis
CN107911822A (en) * 2017-10-31 2018-04-13 珠海市魅族科技有限公司 Pseudo-base station detection method and device, terminal and computer-readable recording medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114245380A (en) * 2021-12-31 2022-03-25 无锡神探电子科技有限公司 Design method of handheld whole-network wireless signal acquisition equipment
CN114245380B (en) * 2021-12-31 2024-04-02 无锡神探电子科技有限公司 Design method of handheld full-network wireless signal acquisition equipment

Also Published As

Publication number Publication date
CN112567780B (en) 2022-08-09
CN112567780A (en) 2021-03-26

Similar Documents

Publication Publication Date Title
CN102239719B (en) Verifying neighbor cell
CN106028331B (en) Method and equipment for identifying pseudo base station
EP2283668B1 (en) Providing fresh security context during intersystem mobility
KR101215231B1 (en) RRC messages and procedures
CN110419248B (en) Method and apparatus for privacy protection in user equipment paging
Lee et al. This is your president speaking: Spoofing alerts in 4G LTE networks
US20160037416A1 (en) Method, apparatus and computer program for operating a user equipment
CN104270762A (en) Method for detecting false station in GSM and LTE network
WO2020042176A1 (en) Pseudo base station identification method and device
WO2018103655A1 (en) Method of accessing network apparatus, terminal apparatus thereof, and network apparatus
JP4820448B2 (en) Notification signal transmission method and mobile station
US9801079B2 (en) Method and apparatus for obtaining neighboring cell information
WO2020034228A1 (en) Pseudo base station identification method and apparatus
CN111565478B (en) Pseudo network equipment identification method, device, equipment and storage medium
WO2021000319A1 (en) Method, apparatus, and system for ensuring terminal security
TWI604743B (en) Dynamic public warning system deactivation
WO2020253661A1 (en) Method, device and system for determining false base station
Hollingsworth et al. This is your president speaking: Spoofing alerts in 4G LTE networks
WO2020019329A1 (en) Paging message processing method and apparatus
US10382967B2 (en) Location information protection
WO2021018069A1 (en) Method, apparatus and system for cell access
Lee et al. Securing the wireless emergency alerts system
Hollingsworth et al. DEMO–This is Your President Speaking: Spoofing Alerts in 4G LTE Networks
CN114514767A (en) Pseudo base station identification method and device, terminal equipment and network equipment
KR20150016799A (en) Method of transmission and reception secure message using checksum and a mobile communication terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18930236

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18930236

Country of ref document: EP

Kind code of ref document: A1