WO2020113522A1 - Procédé et dispositif d'identification d'une pseudo-station de base, terminal mobile et support d'informations - Google Patents

Procédé et dispositif d'identification d'une pseudo-station de base, terminal mobile et support d'informations Download PDF

Info

Publication number
WO2020113522A1
WO2020113522A1 PCT/CN2018/119589 CN2018119589W WO2020113522A1 WO 2020113522 A1 WO2020113522 A1 WO 2020113522A1 CN 2018119589 W CN2018119589 W CN 2018119589W WO 2020113522 A1 WO2020113522 A1 WO 2020113522A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
cell
redirection
mobile terminal
signal strength
Prior art date
Application number
PCT/CN2018/119589
Other languages
English (en)
Chinese (zh)
Inventor
李伟清
Original Assignee
深圳市欢太科技有限公司
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市欢太科技有限公司, Oppo广东移动通信有限公司 filed Critical 深圳市欢太科技有限公司
Priority to PCT/CN2018/119589 priority Critical patent/WO2020113522A1/fr
Priority to CN201880098549.5A priority patent/CN112806043B/zh
Publication of WO2020113522A1 publication Critical patent/WO2020113522A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Definitions

  • the present application relates to the technical field of electronic equipment, and more specifically, to a method, device, mobile terminal, and storage medium for identifying a pseudo base station.
  • Mobile terminals such as mobile phones and tablet computers, have become one of the most commonly used consumer electronic products in people’s daily lives. People are more and more accustomed to performing various life-related operations through mobile terminals. Mobile terminals usually require operators The base station communicates. In some lucrative commercial areas, fake base stations disguised as operator base stations are often set up, because these fake base stations often impersonate other people’s mobile phone numbers and forcefully send spam messages such as fraud and advertising to the terminal, so in order to protect the data security of the terminal It is necessary to identify these pseudo base stations that cause trouble to people's lives.
  • the present application proposes a pseudo base station identification method, device, mobile terminal, and storage medium to solve the above problems.
  • an embodiment of the present application provides a method for identifying a pseudo base station, which is applied to a mobile terminal.
  • the method includes: when redirecting from a first cell of a first base station to a second cell of a second base station is required, Obtain the current signal strength of the third cell accessed by the mobile terminal before accessing the first cell; determine whether the current signal strength meets a specified condition; if the specified condition is met, initiate tracking to the first cell Area update; if the tracking area update fails, the first base station is identified as a pseudo base station.
  • an embodiment of the present application provides a pseudo base station identification device, which is applied to a mobile terminal.
  • the device includes: a signal acquisition module, a signal judgment module, a tracking area tracking new module, and a determination module, wherein the signal
  • the obtaining module is used to obtain the current signal strength of the third cell that the mobile terminal accesses before accessing the first cell when the first cell of the first base station needs to be redirected to the second cell of the second base station.
  • the signal judgment module is used to judge whether the current signal strength meets a specified condition; the tracking area and new module are used to initiate a tracking area update to the first cell if the specified condition is met; the determination module uses If the tracking area update fails, the first base station is identified as a pseudo base station.
  • an embodiment of the present application provides an electronic device, including: one or more processors; a memory; one or more application programs, wherein the one or more application programs are stored in the memory and Is configured to be executed by the one or more processors, and the one or more programs are configured to perform the method for identifying a pseudo base station provided in the first aspect described above.
  • an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a program code, and the program code can be called by a processor to execute the pseudo provided by the first aspect Base station identification method.
  • the solution provided in this application is to determine the current signal strength of the third cell that the mobile terminal accesses before accessing the first cell when it needs to be redirected from the cell of the first base station to the second cell of the second base station Whether the current signal strength meets the specified condition, if the specified condition is met, the tracking area update is initiated to the first cell, and if the tracking area update fails, the first base station can be identified as a pseudo base station, so that the pseudo base station can be accurately identified , To avoid troubles caused by pseudo base stations to users.
  • FIG. 1 shows a schematic diagram of a system architecture of a mobile communication network provided by an embodiment of the present application.
  • FIG. 2 shows a schematic diagram of a system architecture of another mobile communication network provided by an embodiment of the present application.
  • FIG. 3 shows a flowchart of a method for identifying a pseudo base station according to an embodiment of the present application.
  • FIG. 4 shows a flowchart of a method for identifying a pseudo base station according to another embodiment of the present application.
  • FIG. 5 shows a flowchart of step S220 in the method for identifying a pseudo base station according to an embodiment of the present application.
  • FIG. 6 shows another flowchart of step S220 in the method for identifying a pseudo base station according to an embodiment of the present application.
  • FIG. 7 shows a flowchart of step S250 in the method for identifying a pseudo base station according to an embodiment of the present application.
  • FIG. 8 shows a flowchart of a method for identifying a pseudo base station according to yet another embodiment of the present application.
  • FIG. 9 shows a block diagram of a pseudo base station identification device according to an embodiment of the present application.
  • FIG. 10 shows a block diagram of signal judgment in a device for identifying a pseudo base station according to an embodiment of the present application.
  • FIG. 11 shows another block diagram of signal judgment in a device for identifying a pseudo base station according to an embodiment of the present application.
  • FIG. 12 is a block diagram of a mobile terminal for performing a method for identifying a pseudo base station according to an embodiment of the present application.
  • 13 is a storage unit for storing or carrying a program code for implementing a method for identifying a pseudo base station according to an embodiment of the present application.
  • the base station is A more important communication device.
  • GSM Global System for Mobile Communication
  • CDMA Code Division Multiple Access
  • LTE long term evolution
  • FIG. 1 a schematic diagram of the architecture of the 2G mobile communication system shown in FIG. 1.
  • the base station BTS base transceiver
  • BSC Base Station Controller
  • MSC mobile switching center
  • FIG. 2 Another example is the schematic diagram of the 4G mobile communication system architecture shown in FIG. 2.
  • the base station eNB evolved node B
  • MME Mobility Management Entity
  • the MME is connected to the serving gateway Serving Gateway. It can be seen from FIGS. 1 and 2 that in the mobile communication system, the base station, as a device that directly establishes a connection with the mobile terminal, has a relatively important position in the entire system architecture.
  • a base station generally refers to a "public mobile communication base station", and its role is mainly used to provide signals to mobile terminals such as mobile phones and tablet computers.
  • Base station facilities are not only in the hands of major operators and equipment manufacturers, they can often be seen in major universities, research institutes, and scientific research institutions, which accelerates the frequency of communication technology updates and shortens the commercial development. The transition time, therefore, and with the development of communication technology, the inventor discovered that a pseudo base station appeared.
  • the fake base station uses the signal strength, location area, system message and other parameters to fake the mobile communication network of the existing network to trick the user to access within its coverage area to obtain the user's IMSI (International Mobile Subscriber Identification Number). , IMEI (International Mobile Identity, International Mobile Equipment Identity) and other information.
  • IMSI International Mobile Subscriber Identification Number
  • IMEI International Mobile Identity, International Mobile Equipment Identity
  • the criminals can use the pseudo base station to collect user information, and also use the pseudo base station to maliciously send junk advertisements, fraud and other short messages or make harassing calls, which seriously affects the normal communication of users.
  • low-standard mobile communication technologies such as 2G (2-Generation wireless telephone technology, second-generation mobile communication technology), 3G (3rd-Generation, third-generation mobile communication technology), etc.
  • the high-standard communication technology may specifically be an LTE network standard, such as 4G (the 4th Generation, mobile communication technology), 4G+, and 5G (5th-Generation, fifth generation mobile communication technology).
  • 4G the 4th Generation, mobile communication technology
  • 4G+ the 5G (5th-Generation, fifth generation mobile communication technology
  • the authentication and protection of the network are better, so it is generally considered safe under high-standard communication networks. Therefore, the low-standard mobile communication technology has a relatively low security level compared with the high-standard mobile communication technology, and it is easier for criminals to use the pseudo-base station of the low-standard mobile communication network to realize their illegal activities.
  • the inventor found that criminals often increase the transmission power of the pseudo base station of the high-standard mobile communication network to enable mobile terminals to access the high-standard mobile communication network and redirect to the pseudo-base station of the low-standard mobile communication network.
  • the inventor proposes a pseudo base station identification method, device, mobile terminal, and storage medium provided by embodiments of the present application.
  • the mobile terminal By redirecting from the cell of the first base station to the cell of the second base station, the mobile terminal The current signal strength of the third cell that was accessed before accessing the first cell. If the current signal strength meets the specified conditions, a tracking area update is initiated to the first cell. If the tracking area update fails, the first base station is identified as a pseudo base station, thereby Realize accurate identification of pseudo base stations.
  • an embodiment of the present application provides a method for identifying a pseudo base station, which can be applied to a mobile terminal.
  • the method for identifying a pseudo base station may include:
  • Step S110 When it is necessary to redirect from the first cell of the first base station to the second cell of the second base station, obtain the current signal strength of the third cell that the mobile terminal accesses before accessing the first cell.
  • the low-standard mobile communication technology may be 2G or 3G, so as to achieve illegal behavior. Therefore, it is possible to detect the cell redirection of the base station during the use of the mobile terminal to determine the situation where cell redirection is required, and to perform further confirmation when the cell is redirected to determine the cell of the pseudo base station Redirect.
  • the cell refers to the area covered by the base station in the mobile communication system, and the mobile terminal can reliably communicate with the base station through the wireless channel in the cell.
  • the first base station may establish an RRC (Radio Resource Control, unlimited resource control) connection with the mobile terminal.
  • RRC Radio Resource Control, unlimited resource control
  • the control plane between UE (User Equipment) and eNodeB (Evolved Node-B) includes the first layer, the second layer, and the third layer.
  • the first layer is the physical layer
  • the second layer is the media access control layer.
  • the third The layer is RRC.
  • RRC is used to handle layer 3 information of the control plane between UE (User Equipment) and eNodeB (Evolved Node-B), RRC allocates wireless resources and sends related signaling, UE and UTRAN (Evolved Universal Terrestrial Radio Access Access Network)
  • the main part of the inter-control signaling is the RRC message.
  • the RRC message carries all the parameters needed to establish, modify, and release the media access control layer and physical layer protocol entities. It also carries some NAS (non-access layer) messages. make.
  • RRC processes the layer 3 information of the control plane between the terminal and the base station, RRC allocates radio resources and sends related signaling.
  • the RRC connection establishment process between the first base station and the mobile terminal includes several steps of reselection of available cells, access admission control, and establishment of a layer 2 signal link.
  • the first cell of the first base station may issue a redirection instruction to the mobile terminal.
  • the mobile terminal may determine The first cell of a base station is redirected to the second cell of a second base station, and the second base station is the target base station to which to redirect.
  • the first cell of the first base station may issue the redirection instruction through the above-mentioned RRC connection.
  • the mobile terminal needs to be redirected from the first cell of the first base station to the second cell of the second base station, or when the location of the mobile terminal changes, or due to fluctuations in the wireless environment (ie, signal strength and interference level Changes) while actively performing the redirection of the cell.
  • the criminals usually attract the mobile terminal to access the cell of the pseudo base station by increasing the transmission power of the pseudo base station. Therefore, it is possible to determine whether the current redirection is performed after the mobile terminal is attracted to the pseudo base station according to the current signal strength of the third cell by detecting the current signal strength of the third cell accessed by the mobile terminal before accessing the first cell Redirection, that is, the pseudo base station of the LTE network is redirected to a 2G pseudo base station or a 3G pseudo base station.
  • the third cell is a cell where the mobile terminal is successfully registered before accessing the first cell.
  • the mobile terminal may query the historical cell record, and the historical cell record may include information about the historical cell that the mobile terminal has switched to, the location at the time of switching, and the time at the time of switching.
  • the information of the historical cell may include characteristic parameters of the historical cell, for example, location area code (LAC, location code), location area identification (TAI, Tracking Area, Identity), absolute video channel number (EARFCN, eutra, absolute, radio, frequency, channel) number), physical unit identification (PCI, physical identity), cell identity (CID, cell identity), etc.
  • information of the third cell that the mobile terminal accesses before accessing the first cell can be obtained.
  • the current signal strength of the third cell can be detected.
  • the current signal strength of the third cell can be obtained according to SIB (System Information Blocks) and the information of the third cell.
  • SIB System Information Blocks
  • a power scan can be initiated to obtain SI information of the first cell that needs to be accessed currently. It can be understood that, after initiating power scan, the terminal device will scan information of multiple cells, that is, receive signal strength of multiple cells.
  • SIB2 ⁇ 11 are carried in the System Information (SI) message, and the mapping of SIB2 ⁇ 11 to SI message is flexibly configured, which is configured by the schedulingInfoList included in SIB1.
  • SI information please refer to the provisions in 3GPP TS44.018, which will not be repeated here.
  • the way to obtain the current signal strength of the third cell that the mobile terminal accesses before accessing the first cell may not be limited in the embodiments of the present application.
  • Step S120 determine whether the current signal strength meets a specified condition.
  • the designated condition may be a condition characterizing that the current signal strength of the third cell is better. In other words, when the current signal strength of the third cell meets the specified condition, it means that the current signal strength of the third cell is good and meets the conditions of normal use.
  • the above redirection may be performed after the mobile terminal is attracted to the pseudo base station Redirection; when the current signal strength of the third cell does not meet the specified condition, it means that the current signal strength of the third cell is poor and does not meet the conditions of normal use.
  • the above redirection is performed by the normal base station.
  • the specified condition may be a set signal strength value, and by comparing the current signal strength with the set signal strength value, it may be determined whether the specified condition is satisfied.
  • the specific designation conditions may not be limited in the embodiments of the present application.
  • Step S130 If the specified condition is met, a tracking area update is initiated to the first cell.
  • the current signal strength of the third cell when the current signal strength of the third cell meets the specified condition, it means that the current signal strength of the third cell is good and meets the conditions of normal use.
  • the above redirection may cause the mobile terminal to be attracted to the false The redirection performed after the base station, that is, the pseudo base station cell of the high-standard mobile communication network, is redirected to the cell of the 2G base station or the cell of the 3G base station.
  • the current redirection may also be normal redirection, such as the redirection that occurs when the mobile terminal has just been turned on and the current base station signal is poor. Therefore, the first base station is a suspected pseudo base station, and the first base station may be further detected to determine whether the first base station is a pseudo base station.
  • the mobile terminal Since the cell location area code (TAC) of the pseudo base station will be deliberately set to the same TAC as the operator's base station, the mobile terminal will not initiate a tracking area update (TAU).
  • TAU tracking area update
  • LTE Long Term Evolution
  • the tracking area update in Long Term Evolution (LTE) refers to that when a mobile terminal moves from a cell location area (TA) to another TA, it must relocate on the new TA Register to notify the network to change the location information of the mobile terminal he stored. For example, when the mobile terminal detects a new cell and finds that the TAC of the cell is different from the TAC of the current cell, it initiates TAU. To determine the location of the mobile terminal, the coverage area of the LTE network will be divided into multiple TAs.
  • the TA functions are similar to the 3G location area and routing area. It is the basic unit of location update and paging in the LTE system. TA is identified by TAC. A TA may contain one or more cells, and TAC is broadcast in SIB1 of these cells. TAI is used as the unique identifier of TA during network operation.
  • TAU security verification processes such as authentication and integrity protection are performed. If the pseudo base station performs TAU, the TAU update fails because it cannot pass the security verification process described above. Therefore, when it is determined that the current signal strength of the third cell meets the specified condition, a tracking area follow-up can be initiated to the first cell of the first base station to determine whether the first base station is a pseudo base station.
  • the mobile terminal may be attracted to access the pseudo base station of the LTE network, and may be quickly redirected to a more dangerous pseudo base station cell.
  • the TAC of the pseudo base station coincides with the TAC of the operator, TAU will not be performed. Therefore, the mobile terminal may perform TAU when it is determined that the first cell of the first base station needs to be redirected to the second cell of the second base station, and the current signal strength of the third cell satisfies the above specified conditions. Whether a base station is a pseudo base station.
  • a TAU request may be sent to the first cell of the first base station, where the TAU request is used to instruct the first base station to perform TAU related operations.
  • the current signal strength does not meet the specified conditions, it indicates that the above redirection is a normal redirection.
  • Step S140 If the tracking area update fails, the first base station is identified as a pseudo base station.
  • the mobile terminal may receive the tracking area update result returned by the first cell of the first base station.
  • the mobile terminal may receive the tracking area update result returned by the first cell of the first base station.
  • the first base station may be identified as a pseudo base station. It is understandable that mobile terminals are often attracted to pseudo base stations of the LTE network with increased power, and access to the pseudo base stations of the LTE network, and the pseudo base stations of the LTE network will redirect the mobile terminal to a more dangerous pseudo base station cell. Therefore, when it is determined that the first cell of the first base station needs to be redirected to the second cell of the second base station, the current signal strength of the third cell accessed by the mobile terminal before accessing the first cell satisfies the specified condition, and the The first cell of a base station cannot update the tracking area, so it can be determined that the first base station is a pseudo base station.
  • the method for identifying a pseudo base station provided by the embodiment of the present application, because the pseudo base station is identified when the redirection is required, so that the pseudo base station can be identified before the pseudo base station cell is redirected to a more dangerous base station cell , To facilitate subsequent rapid decision-making and avoid user losses. And through the multiple characteristics of the pseudo base station, the pseudo base station is identified, so that the accuracy of identifying the pseudo base station is high.
  • another embodiment of the present application provides a method for identifying a pseudo base station, which can be applied to a mobile terminal.
  • the method for identifying a pseudo base station may include:
  • Step S200 When it is necessary to redirect from the first cell of the first base station to the second cell of the second base station, determine whether the redirection is a redirection that occurs when a communication network is used for a call.
  • the first base station when the cell currently accessed by the mobile terminal is the first cell of the first base station, the first base station may establish an RRC connection with the mobile terminal.
  • the first base station needs to redirect the mobile terminal from the first cell of the first base station to the second cell of the second base station, it can transmit a redirection instruction to the mobile terminal through an RRC connection. Therefore, as an implementation manner, the mobile terminal determining that the first cell of the first base station needs to be redirected to the second cell of the second base station may include:
  • the first cell of the first base station after the first cell of the first base station establishes an RRC (Radio Resource Control) connection with the mobile terminal, it can send the instruction carrying the redirection instruction by releasing the RRC connection of the mobile terminal through control
  • the release information is used to instruct the mobile terminal to redirect from the first cell of the first base station to the second cell of the second base station.
  • the mobile terminal can receive the release information sent by the first cell of the first base station in the process of releasing the RRC connection.
  • the mobile terminal is attracted by the pseudo base station of the high-standard mobile communication network after increasing the transmission power, and needs to redirect the mobile terminal to the low-standard mobile communication network when accessing the pseudo base station of the high-standard mobile communication network
  • the pseudo base station where the high-standard mobile communication network may be an LTE network (for example, 4G), and the low-standard mobile communication network may be 2G or 3G. Therefore, before acquiring the current signal strength of the third cell that the mobile terminal accesses before accessing the first cell, to determine whether the above redirection is a redirection performed after the mobile terminal is attracted to the pseudo base station, it can also determine whether it is necessary Whether the redirected second base station is a 2G base station or a 3G base station. Therefore, the method for identifying the pseudo base station may further include:
  • the second base station is a base station of the second generation mobile communication technology or the third generation mobile communication technology; if it is a base station of the second generation mobile communication technology or the third generation mobile communication technology, execute the acquiring the mobile The step of the current signal strength of the third cell that the terminal accesses before accessing the first cell.
  • the characteristic parameters of the second base station are consistent with the characteristic parameters of the 2G base station or the 3G base station according to the characteristic parameters of the second base station, thereby determining whether the second base station is a 2G base station or a 3G base station.
  • the characteristic parameters include location area code (LAC, location, area code), location area identification (TAI, Tracking Area, Identity), absolute video channel number (EARFCN, eutra, absolute frequency, channel number), physical unit identification (PCI, physical) cell identity), cell identity (CID, cell identity), etc.
  • the 2G network stipulates that the LAC uses BCD encoding (binary-coded decimal, Binary-Coded Decimal).
  • the 2G LAC range is hexadecimal [0x1000-0x1999], [0x2000-0x2999], ..., [0x9000-0x9999 ].
  • the LAC range of WCDMA and TD-SCDMA is [0xa000-0xffff]. Therefore, it can be determined whether the LAC is within the above-mentioned LAC range according to the LAC of the second base station.
  • the LAC of the second base station is within the above-mentioned LAC range, it can be determined that the second base station is a 2G base station or a 3G base station.
  • the manner of specifically determining whether the second base station is a 2G base station or a 3G base station may not be limited in the embodiments of the present application.
  • the first base station may also be determined whether the first base station is a 4G base station, a 4G+ base station, or a 5G base station, to further determine that the above redirection is that the base station cell under the LTE network is redirected to a 2G or 3G base station cell.
  • the manner of specifically determining whether the first base station is a 4G base station, a 4G+ base station, or a 5G base station may not be limited in the embodiments of the present application.
  • the pseudo base station of the high-standard communication network redirects the mobile terminal to the pseudo base station of the low-standard communication network, it is not a redirection that occurs during a voice call made by the communication network. Therefore, before acquiring the current signal strength of the third cell that the mobile terminal accesses before accessing the first cell, it can also be determined whether the above redirection is a redirection that occurs when a communication network is used for a call. The above redirection is the reason The first cell of the first base station is redirected to the second cell of the second base station.
  • the redirection that occurs when using the communication network to make a call may include:
  • LTE Long-term evolution
  • 2G/3G dual-mode terminal wireless communication is a single wireless mode (Signal-radio mode)
  • CS Voice and other circuit domain
  • PS Packet
  • the CSFB process includes three stages: 1) The mobile terminal initiates a call on the LTE network, corresponding to the originator of the phone, namely the calling (MO, Mobile), or receiving a page, corresponding to the recipient of the phone, namely the called ( MT, Mobile Termination); 2) Mobile terminal falls back under the guidance of LTE network and searches for suitable 2G/3G cells, such as GSM cell/WCDMA cell for access; 3) UE reads the GSM cell/WCDMA cell system broadcast message and establishes Voice calls.
  • 2G/3G cells such as GSM cell/WCDMA cell for access
  • UE reads the GSM cell/WCDMA cell system broadcast message and establishes Voice calls.
  • the CSFB needs to redirect the mobile terminal to the 2G/3G cell, and the above redirection will be performed when using the CFSB to make a call. Therefore, as an implementation manner, it may be determined whether the mobile terminal initiated a call request within the LTE coverage within the first set time before determining that the above redirection is required. If a call request is initiated, it is determined that the above redirection is a redirection during a call provided by CSFB, and if no call request is initiated, it is determined that the above redirection is not provided by CSFB. Redirection during the call. As another implementation manner, it may be determined whether the mobile terminal has received the paging request within the LTE coverage within the first set time before determining that the redirection is required.
  • a paging request has been received, it is determined that the above redirection is a redirection during a call provided by CSFB, and if a paging request has not been received, it is determined that the above redirection is not CSFB.
  • Provide redirection during the call the above call request and paging request may be that the service request carries the CSFB indicator parameter.
  • CSFB circuit domain fallback
  • the redirection that occurs when a communication network is used for a call may include:
  • Single wireless mode voice call continuity provides redirection during calls.
  • SRVCC refers to the service continuity of voice calls when a single wireless mode terminal switches from a Time Division LongTerm Evolution (TD-LTE) network to UTRAN/GERAN.
  • TD-LTE Time Division LongTerm Evolution
  • eNB evolved Node B
  • MME Mobility Management Entity
  • SRVCC capability information When a user requests, the Mobility Management Entity (MME) will integrate its own SRVCC capability information and the UE's SRVCC capability information to obtain Synthesize the SRVCC capability information, and then notify the eNB of the information.
  • the eNB performs handover judgment. Only when both the MME and the UE support the SRVCC capability, the eNB can initiate an SRVCC handover request for the UE.
  • MME Mobility Management Entity
  • SRVCC needs to redirect the mobile terminal to the 2G/3G cell.
  • the above redirection will be performed. Therefore, as an implementation manner, it can be determined whether the mobile terminal initiates a call request within the first set time before determining that the above redirection needs to be performed when the EPC completes attachment and wireless bearer. If a call request is initiated, it is determined that the above redirection is a redirection during a call provided by SRVCC, and if no call request is initiated, it is determined that the above redirection is not a redirection during a call provided by SRVCC.
  • the redirection is a redirection that occurs during a call using a communication network through the above method.
  • it is determined whether the redirection is a redirection method that occurs during a call using a communication network.
  • this embodiment of the present application Can not be limited.
  • the pseudo base station cell when the mobile terminal is attracted by the pseudo base station of the LTE network after increasing the transmission power, when accessing the pseudo base station of the LTE network, the pseudo base station cell will be registered. Since the pseudo base station of the LTE network cannot pass the authentication After the security process, the registration cannot be successful, so the pseudo base station of the LTE network usually redirects the mobile terminal to a 2G pseudo base station or a 3G pseudo base station before the registration is successful. Therefore, before determining whether the redirection is a redirection that occurs during a voice call, it can further determine whether the redirection is a redirection by a pseudo base station of the LTE network according to the registration result of the first cell.
  • the method for identifying the pseudo base station may further include:
  • Register the first cell of the first base station when receiving the indication information sent by the first cell to indicate that the mobile terminal needs to be redirected to the second cell of the second base station, determine whether it is received The information representing the success of registering the first cell; if the information representing the success of registering the first cell is not received, perform the step of determining whether the redirection is a redirection that occurs during a voice call.
  • the cell of the first base station may be registered.
  • the cell of the base station needs to perform an initial access process when registering, for example, the above-mentioned RRC connection.
  • the attach process is required.
  • the attachment process is a necessary process in the registration process. Only after the attachment is successful can subsequent services be performed.
  • mutual authentication of the mobile terminal and the network is required, and the mobile terminal and the MM (Mobility Management Entity) establish an MM (mobile management) context.
  • the MME establishes a default bearer for the mobile terminal, and the mobile terminal obtains the IP address assigned by the network side.
  • User location registration and temporary identification (S-TMSI) allocation are also required.
  • the registration result returned by the first cell may be received.
  • the registration result may be information characterizing the success of registering the first cell, or may be information characterizing the failure of registering the first cell.
  • the indication information sent by the first cell to indicate that the mobile terminal needs to be redirected to the second cell of the second base station that is, when it is determined that the second cell needs to be redirected to the second base station In the second cell, it can be judged whether the information indicating the successful registration of the first cell is received.
  • the above redirection may be a case where the pseudo base station of the LTE network is not successfully registered
  • redirect the mobile terminal to a 2G pseudo base station or a 3G pseudo base station.
  • a step of determining whether the above redirection is a redirection that occurs during a voice call may be performed to further determine whether the first base station is a pseudo base station. If it is judged that the information indicative of successful registration of the first cell is received, it indicates that the first base station is a legitimate base station, so the above redirection is a normal redirection.
  • the method for identifying the pseudo base station may further include:
  • the cell of the first base station may be registered.
  • the specific registration method please refer to the content of the above-mentioned embodiments, which will not be repeated here.
  • the registration result returned by the first cell may be received.
  • the registration result may be information characterizing the success of registering the first cell, or may be information characterizing the failure of registering the first cell.
  • the instruction of the second cell of the second base station also indicates that the above redirection may be that the pseudo base station of the LTE network redirects the mobile terminal to the 2G pseudo base station or the 3G pseudo base station in the case of unsuccessful registration.
  • a step of determining whether the above redirection is a redirection that occurs during a voice call may be performed to further determine whether the first base station is a pseudo base station.
  • the release information carrying the above instruction instruction is not received, it indicates that the first base station is a legal base station, so the above redirection is a normal redirection.
  • Step S210 If the redirection is not a redirection that occurs during a voice call, obtain the current signal strength of a third cell that the mobile terminal accesses before accessing the first cell.
  • obtaining the current signal strength of the third cell that the mobile terminal accesses before accessing the first cell can participate in the content of the previous embodiment, which will not be repeated here.
  • Step S220 determine whether the current signal strength meets a specified condition.
  • the mobile terminal after acquiring the current signal strength of the third cell that the mobile terminal accesses before accessing the first cell, it may be determined whether the current signal strength meets a specified condition to determine the above redirection, Whether it is the redirection after the mobile terminal is attracted to the pseudo base station.
  • step S220 may include:
  • Step S221 Determine whether the current signal strength is greater than a preset threshold.
  • Step S222 If the current signal strength is greater than the preset threshold, determine that the current signal strength meets a specified condition.
  • the current signal strength is greater than the preset threshold, and if it is judged that it is greater than the preset threshold, it means that the signal strength of the third cell is at a high normal level, that is, the current of the third cell.
  • the signal strength is good, which satisfies the conditions of normal use, rather than the third cell's low signal strength resulting in access to the first cell. Therefore, the current signal strength meets the specified conditions, and the above redirection may cause the mobile terminal to be attracted to false Redirection after the base station.
  • the specific preset threshold may not be used as a limitation, and may be a signal strength characterizing a situation where the mobile terminal can communicate well.
  • the preset threshold may be 110 dBm, 120 dBm, 125 dBm, and so on.
  • step S220 may include:
  • Step S223 Determine whether the current signal strength is not lower than the historical signal strength of the third cell when the mobile terminal accesses the third cell.
  • Step S224 If the current signal strength is not lower than the historical signal strength, it is determined that the specified condition is satisfied.
  • the mobile terminal may store the detected signal strength of the third cell as the historical signal strength.
  • it may be determined whether the current signal strength is not lower than the historical signal strength. If it is judged that the current signal strength is not lower than the historical signal strength, it means that the current signal strength of the third cell has not deteriorated, that is, it is not that the signal strength of the third cell has become low, resulting in access to the first cell, so the current signal The strength meets the specified condition.
  • the above redirection may be a redirection performed after the mobile terminal is attracted to the pseudo base station.
  • the current signal strength is lower than the historical signal strength, it indicates that the mobile terminal accesses the first base station, possibly because the third cell does not meet the conditions for normal communication. Therefore, the current signal strength does not meet the specified conditions. Redirect to the normal base station.
  • Step S230 If the specified condition is met, the redirection operation is suspended.
  • the redirection is a non-call redirection, and it is determined that the current signal strength of the third cell satisfies a specified condition, It means that the current redirection may be a cell of a pseudo base station under the LTE network, and redirect to a more dangerous base station cell.
  • the current signal strength of the third cell can be determined When the specified conditions are met, the redirection operation is suspended to avoid user losses.
  • Step S240 Initiate a tracking area update to the first cell.
  • the pseudo base station redirects the mobile terminal to a 2G pseudo base station cell or a 3G pseudo base station cell, so the first base station is a suspected pseudo base station.
  • the tracking area update may be initiated to the first cell of the first base station to further detect the first base station to determine whether the first base station is a pseudo base station, specifically to the first cell of the first base station.
  • Step S250 If the tracking area update fails, the first base station is identified as a pseudo base station.
  • step S240 may include:
  • Step S251 Receive an update result returned by the first cell of the first base station.
  • Step S252 When the update result includes the reason value of the update failure, it is determined that the tracking area has failed to track.
  • the mobile terminal may receive the update result returned by the first cell of the first base station.
  • the update result delivered by the LTE network is usually a tracking area update rejection message, and the tracking area update rejection message usually carries a rejection reason value, and different rejection reason values indicate different rejection reasons. For example, a rejection reason value of #15 indicates that there is no suitable cell in the tracking area.
  • the mobile terminal can parse the tracking area update rejection message to obtain the base station identification and rejection reason value. Therefore, when the received update result is a tracking area update rejection message, and the tracking area update rejection message carries a rejection reason value, it can be determined that the tracking area update failed.
  • the TAU security verification processes such as authentication and integrity protection are performed, and if the pseudo base station performs TAU, the TAU update fails because it cannot pass the security verification process described above. Therefore, when it is determined that the tracking area update fails, the first base station can be identified as a pseudo base station. Understandably, when accessing the pseudo base station of the LTE network, the mobile terminal will quickly redirect to the more dangerous 2G pseudo base station cell or 3G pseudo base station cell without successfully registering the pseudo base station cell, and the mobile terminal connects When entering a pseudo base station cell, TAU will not be performed.
  • the first cell of the first base station needs to be redirected to the second cell of the second base station, the current signal strength of the third cell accessed by the mobile terminal before accessing the first cell satisfies the specified condition, and the The first cell of a base station cannot update the tracking area, so it can be determined that the first base station is a pseudo base station.
  • Step S260 Identify the second base station as a pseudo base station.
  • the first base station when it is determined that the first base station is a pseudo base station, it indicates that the above redirection is to redirect to a more dangerous 2G pseudo base station cell or 3G pseudo base station cell when the mobile terminal accesses the pseudo base station of the LTE network. Therefore, it can be determined that the second base station is also a pseudo base station.
  • Step S270 Access to the cell managed by the first base station and the second base station is prohibited.
  • the first base station and the second base station are pseudo base stations, in order to prevent users from being attacked by criminals, therefore, access to the cells of the first base station and the second base station may be prohibited.
  • a method for prohibiting a mobile terminal from accessing the cells of the first base station and the second base station includes the mobile terminal prohibiting detection of characteristic parameters corresponding to the first base station and the second base station, where the characteristic parameters include a location area identifier ( TAI, Tracking Area, Identity), absolute video channel number (EARFCN, eutra, absolute frequency, channel number), physical unit identification (PCI, physical, cell identity), cell identity (CID, cell identity), etc.
  • the first base station and the first The characteristic parameters corresponding to the second base station may also include other, which will not be repeated here.
  • the first base station and the second base station may be identified by the characteristic parameters corresponding to the first base station and the second base station, and the mobile terminal is prohibited from accessing the first base station and the second base station based on the identification.
  • the first base station and the second base station are directly prohibited completely, although the possibility of the mobile terminal being attacked by the first base station and the second base station can be avoided again, it also completely prohibits the mobile terminal from being subject to security
  • the monitoring and tracking of the monitoring system will also cause bad influence.
  • the mobile terminal after the mobile terminal is prohibited from accessing the cells of the first base station and the second base station, the mobile terminal may be prohibited from accessing the cells managed by the first base station and the second base station under certain circumstances. Therefore, the method for identifying the pseudo base station may further include:
  • the duration of the mobile terminal's access to the first base station and the second base station is prohibited and monitored, and the monitored
  • the method may include real-time monitoring, interval monitoring at predetermined intervals, or monitoring at intervals set by the user.
  • real-time monitoring may be used.
  • the mobile terminal is prohibited from accessing the first base station and the second base station, that is, the mobile terminal is no longer restricted on the first base station and the registered network of the second base station , In order to cooperate with the information required for reporting the security monitoring system. It can be understood that the above method can reduce the attack of the mobile terminal by the pseudo base station, and at the same time, the mobile terminal is not completely prohibited from accessing the pseudo base station to ensure that the mobile terminal is monitored and tracked by the security monitoring system.
  • Step S280 refuse to camp on the first cell and redirect to other cells except the cell managed by the first base station and the cell managed by the second base station.
  • the mobile terminal when the first base station is determined, can directly refuse to camp on the cell managed by the first base station.
  • the first base station is a pseudo base station
  • the second base station can also be recognized as a pseudo base station Therefore, it can be redirected to other cells except the cell of the first base station and the cell of the second base station, and the effect of preventing camping on the pseudo base station is achieved.
  • UMTS Universal Mobile Telecommunications System
  • it can be redirected to a cell managed by a Universal Mobile Telecommunications System (UMTS, Universal Telecommunications System) base station that is not managed by the first base station or the second base station, or a cell managed by an LTE base station.
  • UMTS Universal Mobile Telecommunications System
  • Step S290 If the tracking area update is successful, continue the redirection operation.
  • the first base station after the tracking area update is initiated to the cell of the first base station, if the update is successful, it indicates that the first base station can implement a security verification process such as authentication and integrity protection that can be performed by the normal base station, and it can be determined
  • the first base station is a legal base station. Therefore, the above redirection from the cell of the first base station to the cell of the second base station is a redirection in normal use, for example, when the signal in the LTE network is poor, the redirection is to a 3G or 2G network, so the above redirection operation can be continued To meet the normal use requirements.
  • the method for identifying a pseudo base station because when redirection is required, the redirection is judged, and the current signal strength of the third cell accessed before accessing the first cell is also determined, in addition, Perform tracking area update.
  • the current cell is determined to be a pseudo base station, so that the pseudo base station can be identified before the pseudo base station cell is redirected to a more dangerous base station cell, and the redirect operation is suspended to avoid User losses.
  • the pseudo base station is identified, so that the accuracy of identifying the pseudo base station is high.
  • the pseudo base station when the pseudo base station is also identified, by prohibiting the pseudo base station, and refusing to reside in the pseudo base station cell and redirecting to another cell, the pseudo base station can prevent the user from attacking and ensure the security of the user.
  • another embodiment of the present application provides a method for identifying a pseudo base station, which can be applied to a mobile terminal.
  • the method may include:
  • Step S310 when it is necessary to redirect from the first cell of the first base station to the second cell of the second base station, determine whether the redirection is a redirection that occurs when a communication network is used for a call.
  • Step S320 If the redirection is not a redirection that occurs during a voice call, obtain the current signal strength of a third cell that the mobile terminal accesses before accessing the first cell.
  • Step S330 Determine whether the current signal strength meets a specified condition.
  • steps S310 to S320 can refer to the content of the previous embodiment, which will not be repeated here.
  • Step S340 If the specified condition is satisfied, cancel the redirect operation.
  • the redirection is a non-call redirection, and it is determined When the current signal strength of the third cell satisfies the specified condition, it indicates the current redirection, which may be a cell of a pseudo base station under the LTE network, and redirects to a more dangerous base station cell.
  • the redirection operation can be cancelled, that is, the redirection operation can no longer be performed, to avoid the cell redirected to the cell of the 2G base station or the cell of the 3G base station. To attack and cause loss of users.
  • Step S350 Initiate a tracking area update to the first cell.
  • Step S360 If the tracking area update fails, identify the first base station as a pseudo base station.
  • Step S370 Identify the second base station as a pseudo base station.
  • Step S380 Access to the cell managed by the first base station and the second base station is prohibited.
  • Step S390 Refuse to camp on the first cell and redirect to other cells except the cell managed by the first base station and the cell managed by the second base station.
  • steps S340 to S390 can refer to the content of the previous embodiment, and will not be repeated here.
  • the method for identifying a pseudo base station because when redirection is required, the redirection is judged, and the current signal strength of the third cell accessed before accessing the first cell is also determined, in addition, Perform tracking area update.
  • the current cell is determined to be a pseudo base station, so that the pseudo base station can be identified before the pseudo base station cell is redirected to a more dangerous base station cell, and the redirection operation is canceled to avoid User losses.
  • the pseudo base station is identified, so that the accuracy of identifying the pseudo base station is high.
  • the pseudo base station when the pseudo base station is also identified, by prohibiting the pseudo base station, and refusing to reside in the pseudo base station cell and redirecting to another cell, the pseudo base station can prevent the user from attacking and ensure the security of the user.
  • FIG. 9 shows a block diagram of a device 400 for identifying a pseudo base station according to an embodiment of the present application.
  • the pseudo base station identification device 400 is applied to the above mobile terminal. The following describes the device shown in FIG. 9.
  • the pseudo base station identification device 400 includes: a signal acquisition module 410, a signal judgment module 420, a tracking area and a new module 430 ⁇ Determination Module 440.
  • the signal acquisition module 410 is used to acquire the first cell that the mobile terminal accesses before accessing the first cell when it needs to be redirected from the first cell of the first base station to the second cell of the second base station
  • the current signal strength of three cells the signal judgment module 420 is used to judge whether the current signal strength meets a specified condition; the tracking area follow-up module 430 is used to initiate tracking to the first cell if the specified condition is met Area update; the determining module 440 is used to identify the first base station as a pseudo base station if the tracking area update fails.
  • the signal judgment module 420 may include: a first judgment unit 421 and a first result determination unit 422.
  • the first determining unit 421 is used to determine whether the current signal strength is greater than a preset threshold.
  • the first result determining unit 422 is configured to determine that the current signal strength meets a specified condition if the current signal strength is greater than the preset threshold, and determine the if the current signal strength is not greater than the preset threshold The current signal strength does not meet the specified conditions.
  • the signal judgment module 420 may include: a second judgment unit 423 and a second result determination unit 424.
  • the second judgment unit 423 is used to judge whether the current signal strength is not lower than the historical signal strength of the third cell when the mobile terminal accesses the third cell.
  • the second result determination unit 424 is configured to determine that the specified condition is satisfied if the current signal strength is not lower than the historical signal strength, and determine that the specified condition is not satisfied if the current signal strength is lower than the historical signal strength.
  • the apparatus 400 for identifying a pseudo base station may further include: a redirection suspension module.
  • the redirection pause module is used to pause the redirection operation if the specified condition is met.
  • the device 400 for identifying a pseudo base station may further include: a redirection execution module.
  • the redirection execution module is used to continue the redirection operation if the tracking area update is successful.
  • the apparatus 400 for identifying a pseudo base station may further include: a redirection cancellation module.
  • the redirection cancellation module is used to cancel the redirection operation if the cell of the first base station has not been successfully registered.
  • the apparatus 400 for identifying a pseudo base station may further include: a redirection judgment module.
  • the redirection determination module is used to determine whether the redirection is a redirection that occurs during a voice call. If the redirection is not a redirection that occurs during a voice call, the signal acquisition module 410 acquires the current signal strength of the third cell that the mobile terminal accessed before accessing the first cell.
  • the pseudo base station identification device 400 may further include: a cell registration module and an information judgment module.
  • the cell registration module is used to register the first cell of the first base station.
  • the information judgment module is used for judging whether the first cell is successfully received when indicating information sent by the first cell indicating that the mobile terminal needs to be redirected to the second cell of the second base station Information. If the information indicative of successful registration of the first cell is not received, the redirection judgment module judges whether the redirection is a redirection that occurred during a voice call.
  • the apparatus 400 for identifying a pseudo base station may further include: a release information receiving module. After the cell registration module registers the first cell of the first base station, the release information receiving module is used to receive the release of the first cell and the Release information sent during the connection of radio resource control between mobile terminals. When the release information carries an instruction instruction indicating that the mobile terminal needs to be redirected to the second cell of the second base station, the redirection determination module determines whether the redirection is a redirection that occurs during a voice call.
  • the redirection that occurs during a voice call includes: redirection during a voice call provided by CSFB; or voice provided by single wireless mode voice call continuity (SRVCC) Redirection during the call.
  • CSFB single wireless mode voice call continuity
  • the pseudo base station identification device 400 may further include: a base station judgment module.
  • the base station judgment module is used to judge whether the second base station is a base station of the second generation mobile communication technology or the third generation mobile communication technology. If it is a base station of the second-generation mobile communication technology or the third-generation mobile communication technology, the signal acquisition module 410 acquires the current signal strength of the third cell that the mobile terminal accesses before accessing the first cell.
  • the pseudo base station identification device 400 may further include: a base station identification module.
  • the base station identification module is used to identify the second base station as a pseudo base station.
  • the apparatus 400 for identifying a pseudo base station may further include: a cell barring module.
  • the cell prohibition module is used to prohibit access to the cells managed by the first base station and the second base station.
  • the cell prohibition module may specifically: prohibit detection of characteristic parameters corresponding to the first base station and the second base station, where the characteristic parameters include location area identifiers, absolute video channel numbers, physical unit identifiers, and cell identifiers. At least one.
  • the apparatus 400 for identifying a pseudo base station may further include: a prohibition cancellation module.
  • the prohibition cancellation module is used to cancel prohibition of access to the cell managed by the first base station and the second base station when the set condition is satisfied.
  • the pseudo base station identification device 400 may further include: a rejection module.
  • the rejection module is used to refuse to camp on the first cell and redirect to other cells except the cell managed by the first base station and the cell managed by the second base station.
  • the apparatus 400 for identifying a pseudo base station may further include: an update result receiving module and an update determining module.
  • the update result receiving module is used to receive the update result returned by the first cell of the first base station; the update determination module is used to determine that the tracking area has failed to track when the update result includes the reason value of the update failure.
  • the coupling between the modules may be electrical, mechanical, or other forms of coupling.
  • each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module.
  • the above integrated modules may be implemented in the form of hardware or software function modules.
  • the solution provided by the present application obtains the third cell of the third cell accessed by the mobile terminal before accessing the first cell when the cell of the first base station needs to be redirected to the second cell of the second base station.
  • the current signal strength to determine whether the current signal strength meets the specified conditions. If the specified conditions are met, the tracking area update is initiated to the first cell. If the tracking area update fails, the first base station can be identified as a pseudo base station, so that Accurately identify the pseudo base station to avoid the trouble caused by the pseudo base station to users.
  • the mobile terminal 100 may be a mobile terminal capable of running application programs such as a smart phone, a tablet computer, and an e-book.
  • the mobile terminal 100 in this application may include one or more of the following components: a processor 110, a memory 120, and one or more application programs, where one or more application programs may be stored in the memory 120 and configured to be configured by one Executed by one or more processors 110, and one or more programs are configured to execute the method as described in the foregoing method embodiments.
  • the processor 110 may include one or more processing cores.
  • the processor 110 connects various parts of the entire mobile terminal 100 using various interfaces and lines, executes or executes instructions, programs, code sets or instruction sets stored in the memory 120, and calls data stored in the memory 120 to execute Various functions and processing data of the mobile terminal 100.
  • the processor 110 may adopt at least one of digital signal processing (Digital Signal Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA) Various hardware forms.
  • the processor 110 may integrate one or a combination of a central processing unit (Central Processing Unit, CPU), an image processing unit (Graphics Processing Unit, GPU), and a modem.
  • CPU Central Processing Unit
  • GPU Graphics Processing Unit
  • modem modem
  • CPU mainly deals with operating system, user interface and application program, etc.
  • GPU is used for rendering and rendering of display content
  • modem is used for handling wireless communication. It can be understood that the above-mentioned modem may not be integrated into the processor 110, and may be implemented by a communication chip alone.
  • the memory 120 may include random access memory (RAM) or read-only memory (Read-Only Memory).
  • the memory 120 may be used to store instructions, programs, codes, code sets, or instruction sets.
  • the memory 120 may include a storage program area and a storage data area, where the storage program area may store instructions for implementing an operating system and instructions for implementing at least one function (such as a touch function, a sound playback function, an image playback function, etc.) , Instructions for implementing the following method embodiments.
  • the storage data area may also store data created by the terminal 100 in use (such as a phone book, audio and video data, and chat history data).
  • FIG. 13 shows a structural block diagram of a computer-readable storage medium provided by an embodiment of the present application.
  • the computer readable medium 800 stores program codes, and the program codes can be called by a processor to execute the method described in the above method embodiments.
  • the computer-readable storage medium 800 may be an electronic memory such as flash memory, EEPROM (Electrically Erasable Programmable Read Only Memory), EPROM, hard disk, or ROM.
  • the computer-readable storage medium 800 includes a non-transitory computer-readable storage medium.
  • the computer-readable storage medium 800 has a storage space for the program code 810 that performs any of the method steps described above. These program codes can be read from or written into one or more computer program products.
  • the program code 810 may be compressed in an appropriate form, for example.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé d'identification d'une pseudo-station de base, un dispositif, un terminal mobile et un support d'information, lesquels sont appliqués à un terminal mobile, le procédé consistant : à acquérir, lorsqu'il est nécessaire de rediriger vers une deuxième cellule d'une seconde station de base à partir d'une première cellule d'une première station de base, l'intensité de signal actuelle d'une troisième cellule accédée par le terminal mobile avant d'accéder à la première cellule ; à déterminer si l'intensité de signal actuelle satisfait une condition spécifiée ; à lancer, lorsque la condition spécifiée est satisfaite, une mise à jour de zone de suivi vers la première cellule ; à identifier, si la mise à jour de zone de suivi échoue, la première station de base en tant que pseudo-station de base. Ce procédé permet d'identifier avec précision une pseudo-station de base.
PCT/CN2018/119589 2018-12-06 2018-12-06 Procédé et dispositif d'identification d'une pseudo-station de base, terminal mobile et support d'informations WO2020113522A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/119589 WO2020113522A1 (fr) 2018-12-06 2018-12-06 Procédé et dispositif d'identification d'une pseudo-station de base, terminal mobile et support d'informations
CN201880098549.5A CN112806043B (zh) 2018-12-06 2018-12-06 伪基站的识别方法、装置、移动终端及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/119589 WO2020113522A1 (fr) 2018-12-06 2018-12-06 Procédé et dispositif d'identification d'une pseudo-station de base, terminal mobile et support d'informations

Publications (1)

Publication Number Publication Date
WO2020113522A1 true WO2020113522A1 (fr) 2020-06-11

Family

ID=70975073

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/119589 WO2020113522A1 (fr) 2018-12-06 2018-12-06 Procédé et dispositif d'identification d'une pseudo-station de base, terminal mobile et support d'informations

Country Status (2)

Country Link
CN (1) CN112806043B (fr)
WO (1) WO2020113522A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114760631A (zh) * 2020-12-25 2022-07-15 北京神州泰岳软件股份有限公司 一种干扰源识别方法和装置

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347634B (zh) * 2021-08-04 2022-01-04 中国科学院信息工程研究所 一种基于信号及信令指纹的4g、5g空口攻击检测方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107466041A (zh) * 2017-09-30 2017-12-12 奇酷互联网络科技(深圳)有限公司 识别伪基站方法、装置及移动终端
CN107959936A (zh) * 2017-12-19 2018-04-24 努比亚技术有限公司 4g伪基站的识别方法、系统、终端和计算机存储介质
CN108012271A (zh) * 2016-10-28 2018-05-08 中国移动通信有限公司研究院 一种伪基站发现方法及装置
WO2018144356A1 (fr) * 2017-02-05 2018-08-09 Alcatel-Lucent Usa Inc. Redirection de cellule sécurisée dans des réseaux sans fil
CN108696872A (zh) * 2017-03-06 2018-10-23 中国移动通信有限公司研究院 一种重定向方法及装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3258719A1 (fr) * 2016-06-13 2017-12-20 Gemalto M2M GmbH Procédé pour faire fonctionner un dispositif de communication sans fil
CN106211157B (zh) * 2016-06-30 2019-08-27 北京奇虎科技有限公司 基站重定向方法和基站重定向装置
CN108093404B (zh) * 2016-11-21 2021-06-18 中国移动通信有限公司研究院 一种信息处理方法及装置
CN107071775B (zh) * 2017-05-15 2020-10-09 奇酷互联网络科技(深圳)有限公司 移动终端及其重定向接入基站的方法和装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108012271A (zh) * 2016-10-28 2018-05-08 中国移动通信有限公司研究院 一种伪基站发现方法及装置
WO2018144356A1 (fr) * 2017-02-05 2018-08-09 Alcatel-Lucent Usa Inc. Redirection de cellule sécurisée dans des réseaux sans fil
CN108696872A (zh) * 2017-03-06 2018-10-23 中国移动通信有限公司研究院 一种重定向方法及装置
CN107466041A (zh) * 2017-09-30 2017-12-12 奇酷互联网络科技(深圳)有限公司 识别伪基站方法、装置及移动终端
CN107959936A (zh) * 2017-12-19 2018-04-24 努比亚技术有限公司 4g伪基站的识别方法、系统、终端和计算机存储介质

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114760631A (zh) * 2020-12-25 2022-07-15 北京神州泰岳软件股份有限公司 一种干扰源识别方法和装置
CN114760631B (zh) * 2020-12-25 2024-06-04 北京神州泰岳软件股份有限公司 一种干扰源识别方法和装置

Also Published As

Publication number Publication date
CN112806043B (zh) 2023-05-30
CN112806043A (zh) 2021-05-14

Similar Documents

Publication Publication Date Title
US9277460B2 (en) System and method for providing voice service in a multimedia mobile network
US8094620B2 (en) System and method for providing voice service in a multimedia mobile network
WO2020113519A1 (fr) Procédé et appareil d'identification d'une pseudo-station de base, terminal mobile et support de stockage
WO2020113530A1 (fr) Procédé et appareil de traitement de communication, terminal mobile et support d'informations
WO2020113522A1 (fr) Procédé et dispositif d'identification d'une pseudo-station de base, terminal mobile et support d'informations
US20210329519A1 (en) Cell Connection Processing Method and Mobile Terminal
WO2019061410A1 (fr) Procédé et dispositif de détection de fréquence anormal, et support de stockage informatique
JP2013520849A (ja) 移動側着信制御方法、および関連するネットワーク装置
US10285100B2 (en) Indication of IMEISV over map for inter-MSC handover
WO2019061421A1 (fr) Procédé et dispositif de détection du résultat de repli d'un repli par commutation de circuits, et support de stockage
WO2019061425A1 (fr) Procédé et dispositif de détection de résultat csfb et support de stockage informatique
EP3062576B1 (fr) Dispositif et procédé d'identification de dispositif utilisateur en repli par commutation de circuit
WO2019061486A1 (fr) Procédé de détection de résultat de repli csfb, dispositif associé et support de stockage informatique
WO2019061431A1 (fr) Procédé et dispositif de détection du résultat de repli d'un repli par commutation de circuits (csfb), et support de stockage informatique
WO2019061490A1 (fr) Procédé et appareil de détection de terminal reposant sur un csfb, et support de stockage informatique
WO2020087413A1 (fr) Procédé et appareil de traitement d'informations de cellule, dispositif électronique et support d'informations lisible
WO2020113479A1 (fr) Procédé et dispositif d'identification de pseudo-station de base, terminal mobile et support de stockage
WO2020133117A1 (fr) Procédé et dispositif de traitement de connexion de cellule, terminal mobile et support d'informations
WO2020087417A1 (fr) Procédé et dispositif d'identification de pseudostation de base, terminal mobile et support de stockage
AU2013216641B2 (en) System and Method for Providing Voice Service in a Multimedia Mobile Network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18942434

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 15/10/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 18942434

Country of ref document: EP

Kind code of ref document: A1