CN110312259A - Pseudo-base station recognition methods, device, terminal and storage medium - Google Patents
Pseudo-base station recognition methods, device, terminal and storage medium Download PDFInfo
- Publication number
- CN110312259A CN110312259A CN201910769065.5A CN201910769065A CN110312259A CN 110312259 A CN110312259 A CN 110312259A CN 201910769065 A CN201910769065 A CN 201910769065A CN 110312259 A CN110312259 A CN 110312259A
- Authority
- CN
- China
- Prior art keywords
- base station
- pseudo
- terminal
- doubtful
- doubtful pseudo
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the present application discloses a kind of pseudo-base station recognition methods, device, terminal and storage medium, belong to field of computer technology, the described method includes: being established after radio resource control RRC connect in terminal and base station, the number of Attachments failure is counted, the attachment is occurred before the base station and the terminal successful authentication;If the number is more than predetermined threshold, the base station is determined as doubtful pseudo-base station;The doubtful pseudo-base station is verified, determines whether the doubtful pseudo-base station is pseudo-base station according to verification result.The accuracy of pseudo-base station identification can be improved in the embodiment of the present application.
Description
Technical field
The invention relates to field of computer technology, in particular to a kind of pseudo-base station recognition methods, device, terminal and
Storage medium.
Background technique
Pseudo-base station refers to personation normal Base Station and terminal establishes connection, and sends the refuse messages such as swindle, distribution to terminal
Or dial the base station of harassing call.Since pseudo-base station has seriously affected the normal communication of terminal, it is therefore desirable to be carried out to pseudo-base station
Identification accesses pseudo-base station to avoid terminal.
Currently, terminal can preferentially select to establish connection with LTE (Long Term Evolution, long term evolution) base station, and
Introduce bi-directional authentification mechanism in LTE, i.e., terminal and LTE base station need to establish connection after bi-directional authentification success, in this way can be with
Guarantee that being successfully established the LTE base station of connection with terminal is not pseudo-base station.
However, if LTE base station makes terminal and GSM (Global System after terminal and LTE base station establish connection
For Mobile Communication, global system for mobile communications) base station establishes connection, since terminal is not necessarily to the base station GSM
Connection can be established with the base station GSM by carrying out authentication, so, if the base station GSM for being successfully established connection with terminal is pseudo-base station, that
The LTE base station is also pseudo-base station, and this kind of LTE base station can not be identified as pseudo-base station at present.
Summary of the invention
The embodiment of the present application provides a kind of pseudo-base station recognition methods, device, terminal and storage medium, and can solve can not
The problem of LTE base station is identified as pseudo-base station.The technical solution is as follows:
According to the one aspect of the application, a kind of pseudo-base station recognition methods is provided, which comprises
It is established after radio resource control RRC connect in terminal and base station, the number of statistics Attachments failure is described attached
Be unsuccessfully to occur before the base station and the terminal successful authentication;
If the number is more than predetermined threshold, the base station is determined as doubtful pseudo-base station;
The doubtful pseudo-base station is verified, determines whether the doubtful pseudo-base station is pseudo-base station according to verification result.
According to the another aspect of the application, a kind of pseudo-base station identification device is provided, described device includes:
Statistical module, for establishing statistics Attachments failure after radio resource control RRC connect in terminal and base station
Number, the attachment is occurred before the base station and the terminal successful authentication;
First determining module, when the number for obtaining in the statistical module is more than predetermined threshold, by the base
Station is determined as doubtful pseudo-base station;
Authentication module, the doubtful pseudo-base station for determining to first determining module is verified, according to verifying
As a result determine whether the doubtful pseudo-base station is pseudo-base station.
According to the application's in another aspect, providing a kind of terminal, the terminal includes processor and memory, described to deposit
At least one instruction is stored in reservoir, described instruction is loaded by the processor and executed to realize pseudo-base station as described above
Recognition methods.
According to the another aspect of the application, a kind of computer readable storage medium is provided, is stored in the storage medium
There is at least one instruction, described instruction is loaded by processor and executed to realize pseudo-base station recognition methods as described above.
Technical solution bring beneficial effect provided by the embodiments of the present application includes at least:
If base station is pseudo-base station, established after RRC connect in terminal and base station, base station may successfully reflect with terminal
Lead to terminal attachment failure before power, so that terminal and the base station GSM be made to establish connection, which is pseudo-base station.Based on pseudo- base
The above-mentioned characteristic stood, terminal can count the number of Attachments failure, since attachment is unsuccessfully successfully to reflect in base station with terminal
Occur before power, so, if number is more than predetermined threshold, base station can be determined as to doubtful pseudo-base station, then, terminal can
To continue to verify doubtful pseudo-base station, and determine whether doubtful pseudo-base station is pseudo-base station according to verification result, in this way, both may be used
Normal Base Station is avoided to be identified as pseudo-base station so that the number by Attachments failure is more than this condition of predetermined threshold, it can also
To verify whether base station is pseudo-base station from many aspects, to improve the accuracy of pseudo-base station identification.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 is the schematic diagram for the communication system that one exemplary embodiment of the application provides;
Fig. 2 is the pseudo-base station recognition methods flow chart that one exemplary embodiment of the application provides;
Fig. 3 is the pseudo-base station recognition methods flow chart that one exemplary embodiment of the application provides;
Fig. 4 is the pseudo-base station recognition methods flow chart that one exemplary embodiment of the application provides;
Fig. 5 is the structural block diagram for the pseudo-base station identification device that one exemplary embodiment of the application provides;
Fig. 6 is the structural block diagram for the pseudo-base station identification device that one exemplary embodiment of the application provides;
Fig. 7 is the structural block diagram for the pseudo-base station identification device that one exemplary embodiment of the application provides;
Fig. 8 is the structural block diagram for the pseudo-base station identification device that one exemplary embodiment of the application provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the application embodiment party
Formula is described in further detail.
Referring to FIG. 1, it is the schematic diagram for the communication system that one exemplary embodiment of the application provides.As shown in Figure 1,
The communication system includes first base station 110, the second base station 120 and at least one terminal 130, and at least one terminal 130 is equal
In the coverage area of first base station 110 and the second base station 120.It is illustrated in Fig. 1 with a terminal.
Terminal 130 is referred to as user equipment (User Equipment, UE), access terminal, subscriber unit, user
It stands, movement station, mobile station, mobile device, user terminal, terminal, wireless telecom equipment, user agent or user apparatus.Terminal
It can be smart phone, cellular phone, wireless phone, personal digital assistant (Personal Digital Assistant, PDA)
Equipment, the handheld device with wireless communication function or be connected to other processing equipments of radio modem, mobile unit,
Wearable device etc..
First base station 110 is that have the base station of bi-directional authentification mechanism.When terminal 130 is selected or cell reselection by cell
After mode has selected the corresponding cell of first base station 110, terminal 130 first establishes RRC (Radio with first base station 110
Resource Control, wireless heterogeneous networks) connection, then carry out bi-directional authentification with first base station 110, i.e., it is true in terminal 130
Fixed authenticating successfully and after the determining authentication success to terminal 130 of first base station 110 to first base station 110, completes cell selection
The position update flow after register flow path or cell reselection afterwards.Optionally, first base station 110 can be LTE base station.
If first base station 110 is pseudo-base station, the main function of first base station 110 is that terminal 130 is attracted to access, and is rebooted
Terminal 130 accesses the second base station 120.Wherein, if the second base station 120 is pseudo-base station, the second base station 120 is that have unidirectional authentication
The base station of mechanism.When terminal 130 accesses the second base station 120, terminal 130 is established RRC with the second base station 120 and is connect, the second base
120 pairs of terminals 130 of standing unidirectionally are authenticated, i.e., after the second base station 120 is determined to the authentication success of terminal 130, complete registration
Process.Subsequent, the second base station 120 can send the refuse messages such as swindle, distribution to terminal 130 or dial harassing and wrecking to terminal 130
Phone, to influence the normal communication of terminal 130.Optionally, the second base station 120 can be the base station GSM.
Referring to FIG. 2, it is the flow chart for the pseudo-base station recognition methods that one exemplary embodiment of the application provides.The puppet
Base station identification approach can be applied in the terminal 130 shown in above-mentioned, and the base station in the present embodiment is the first base station in Fig. 1
110.In Fig. 2, pseudo-base station recognition methods includes:
Step 210, it is established after RRC connect in terminal and base station, the number of statistics Attachments failure, attachment failure
It is to occur before base station and terminal successful authentication.
Terminal selects a cell by way of cell selection or cell reselection, and base station corresponding with the cell is established
RRC connection.Wherein, the present embodiment does not limit RRC establishment of connection process.
It is established after RRC connect in terminal and base station, if terminal has selected a cell by cell selection mode, after
Continuous terminal needs to carry out network registry;If terminal has selected a cell by cell reselection mode, subsequent terminal need into
Row location updating.Either network registry or location updating, terminal require to send attach request to base station, and base station is according to this
Attach request is authenticated with terminal, continues attachment flow if authenticating successfully, if failed authentication thinks attachment failure.
Since the main function of pseudo-base station is to attract terminal access, reboots terminal and access another pseudo-base station, so, if with
The base station that terminal establishes RRC connection is pseudo-base station, then the base station can not be authenticated with terminal, is failed so as to cause attachment,
It reboots terminal and accesses another pseudo-base station.That is, fail if just having adhered to before base station and terminal successful authentication, terminal can be with
Using the base station as doubtful pseudo-base station.Wherein, it may include: that base station is authenticated with terminal that base station does not carry out authentication with terminal
Release RRC connection before is so as to cause attachment failure, alternatively, base station can not initiate authentication so as to cause failed authentication, alternatively,
Base station can send the authentication information of mistake to terminal and lead to failed authentication.
Normal base station may also can because of leading to failed authentication due to certain, and pseudo-base station can continuous several times cause
Attachment failure, so, it, can be by continuous several times in the present embodiment in order to avoid being doubtful pseudo-base station by normal identification of base stations
The base station for causing attachment to fail is determined as doubtful pseudo-base station, to improve the accuracy of doubtful pseudo-base station identification.
In an alternative embodiment, terminal can count the number of Attachments failure, then by the number and make a reservation for
Threshold value is compared;When the number is more than predetermined threshold, base station is determined as doubtful pseudo-base station, i.e. execution step 220;When this
When number is less than predetermined threshold, the step of counting the number that Attachments fail is continued to execute, until the number is more than predetermined
Threshold value or terminal stop when adhering to successfully.Predetermined threshold is illustrated below.
It is provided in relevant communication standards, when continuous 5 attachments of terminal and base station fail, meeting opening timing device, by base station
Corresponding cell can just reactivate after forbidding scheduled duration.If base station is pseudo-base station, which can lead to terminal continuous 5
Secondary attachment failure, thus make terminal in cell reselection gravity treatment to the corresponding cell of another pseudo-base station, so, can be set predetermined
Threshold value is less than 5, for example predetermined threshold can be 4 or 3 or 2 etc., and this embodiment is not limited.
Step 220, if number is more than predetermined threshold, base station is determined as doubtful pseudo-base station.
Step 230, doubtful pseudo-base station is verified, determines whether doubtful pseudo-base station is pseudo-base station according to verification result.
Normal base station may also can because of leading to failed authentication due to certain, in order to avoid normal base
Station is identified as pseudo-base station, and terminal can also continue to verify doubtful pseudo-base station, and is determined according to verification result doubtful
Pseudo-base station is pseudo-base station or normal base station, to improve the accuracy of pseudo-base station identification.
In conclusion pseudo-base station recognition methods provided in this embodiment is built if base station is pseudo-base station in terminal and base station
After vertical RRC connection, base station may lead to terminal attachment failure before with terminal successful authentication, to make terminal and GSM
Connection is established in base station, which is pseudo-base station.Above-mentioned characteristic based on pseudo-base station, terminal can count Attachments failure
Number, due to attachment be unsuccessfully occur before base station and terminal successful authentication, so, if number is more than predetermined threshold,
Base station can be then determined as to doubtful pseudo-base station, then, terminal can continue to verify doubtful pseudo-base station, and according to verifying
As a result determine whether doubtful pseudo-base station is pseudo-base station, in this way, both can be more than predetermined threshold by the number of Attachments failure
This condition avoids normal Base Station from being identified as pseudo-base station, can also verify whether base station is pseudo-base station from many aspects, from
And improve the accuracy of pseudo-base station identification.
Fig. 3 is referred to, is the pseudo-base station recognition methods flow chart that one exemplary embodiment of the application provides.The puppet base
Recognition methods of standing can apply in the terminal 130 shown in above-mentioned, and the base station in the present embodiment is the first base station in Fig. 1
110.In Fig. 3, which includes:
Step 310, it is established after RRC connect in terminal and base station, if the RRC for receiving base station transmission before authentication connects
Connect release information, it is determined that attachment failure;Alternatively, if base station does not initiate the authorizing procedure with terminal, it is determined that attachment failure.
Terminal selects a cell by way of cell selection or cell reselection, and base station corresponding with the cell is established
RRC connection.Wherein, the present embodiment does not limit RRC establishment of connection process.
It is established after RRC connect in terminal and base station, if terminal has selected a cell by cell selection mode, after
Continuous terminal needs to carry out network registry;If terminal has selected a cell by cell reselection mode, subsequent terminal need into
Row location updating.Either network registry or location updating, terminal require to send attach request to base station, and base station is according to this
Attach request is authenticated with terminal, continues attachment flow if authenticating successfully, if failed authentication thinks attachment failure.
Since the main function of pseudo-base station is to attract terminal access, reboots terminal and access another pseudo-base station, so, if with
The base station that terminal establishes RRC connection is pseudo-base station, then the base station can not be authenticated with terminal, is failed so as to cause attachment,
It reboots terminal and accesses another pseudo-base station.That is, fail if just having adhered to before base station and terminal successful authentication, terminal can be with
Using the base station as doubtful pseudo-base station.Authentication is not carried out with terminal to base station below to be illustrated.
In an alternative embodiment, base station does not carry out authentication with terminal can be base station and is carrying out authenticating it with terminal
Preceding release RRC connection is so as to cause attachment failure, if then terminal receives the RRC Connection Release letter of base station transmission before authentication
Breath, then terminal determines attachment failure.
Wherein, base station can carry out cause specific value refusal to network registry or location updating before authentication, and to end
End sends RRC Connection Release information, if carrying GSM frequency point in the RRC Connection Release information, terminal can be according to GSM frequency
Point is redirected to the base station GSM;If not carrying GSM frequency point in the RRC Connection Release information, terminal can be connect by cell reselection
Enter the base station GSM.Wherein, which is pseudo-base station.
In another alternative embodiment, base station does not carry out authentication and can be base station not initiating authentication to leading with terminal
Failed authentication is caused, if then base station does not initiate the authorizing procedure with terminal, terminal determines attachment failure.
In LTE, the bi-directional authentification of base station and terminal is initiated by base station, if base station does not initiate the authentication stream with terminal
Journey, then the timer in terminal can be overtime, so as to cause failed authentication, eventually leads to attachment failure.Subsequent, terminal can pass through
Cell reselection accesses the base station GSM, which is pseudo-base station.
It, can be by the network registry of NAS (Non-Access Stratum, Non-Access Stratum) or position more in the present embodiment
It newly arrives and identifies doubtful pseudo-base station.
Step 320, the number of statistics Attachments failure, which sent out before base station and terminal successful authentication
Raw.
Normal base station may also can because of leading to failed authentication due to certain, and pseudo-base station can continuous several times cause
Attachment failure, so, it, can be by continuous several times in the present embodiment in order to avoid being doubtful pseudo-base station by normal identification of base stations
The base station for causing attachment to fail is determined as doubtful pseudo-base station, to improve the accuracy of doubtful pseudo-base station identification.
In an alternative embodiment, terminal can count the number of Attachments failure, then by the number and make a reservation for
Threshold value is compared;When the number is more than predetermined threshold, base station is determined as doubtful pseudo-base station, i.e. execution step 330;When this
When number is less than predetermined threshold, the step of counting the number that Attachments fail is continued to execute, until the number is more than predetermined
Threshold value or terminal stop when adhering to successfully.Predetermined threshold is illustrated below.
It is provided in relevant communication standards, when continuous 5 attachments of terminal and base station fail, meeting opening timing device, by base station
Corresponding cell can just reactivate after forbidding scheduled duration.If base station is pseudo-base station, which can lead to terminal continuous 5
Secondary attachment failure, thus make terminal in cell reselection gravity treatment to the corresponding cell of another pseudo-base station, so, can be set predetermined
Threshold value is less than 5, for example predetermined threshold can be 4 or 3 or 2 etc., and this embodiment is not limited.
Step 330, if number is more than predetermined threshold, base station is determined as doubtful pseudo-base station.
Step 340, doubtful pseudo-base station is verified, determines whether doubtful pseudo-base station is pseudo-base station according to verification result.
Normal base station may also can because of leading to failed authentication due to certain, in order to avoid normal base
Station is identified as pseudo-base station, and terminal can also continue to verify doubtful pseudo-base station, and is determined according to verification result doubtful
Pseudo-base station is pseudo-base station or normal base station, to improve the accuracy of pseudo-base station identification.
In conclusion pseudo-base station recognition methods provided in this embodiment is built if base station is pseudo-base station in terminal and base station
After vertical RRC connection, base station may lead to terminal attachment failure before with terminal successful authentication, to make terminal and GSM
Connection is established in base station, which is pseudo-base station.Above-mentioned characteristic based on pseudo-base station, terminal can count Attachments failure
Number, due to attachment be unsuccessfully occur before base station and terminal successful authentication, so, if number is more than predetermined threshold,
Base station can be then determined as to doubtful pseudo-base station, then, terminal can continue to verify doubtful pseudo-base station, and according to verifying
As a result determine whether doubtful pseudo-base station is pseudo-base station, in this way, both can be more than predetermined threshold by the number of Attachments failure
This condition avoids normal Base Station from being identified as pseudo-base station, can also verify whether base station is pseudo-base station from many aspects, from
And improve the accuracy of pseudo-base station identification.
The process of the doubtful pseudo-base station of terminal authentication is illustrated below.
In an alternative embodiment, terminal can be according to the LAI (Location of the corresponding cell of doubtful pseudo-base station
Area Identity, Location Area Identification) verify doubtful pseudo-base station, then step 340 may include the following steps:
Step 341, the Location Area Identification LAI list of terminal, the cell accessed in the LAI list comprising terminal are obtained
LAI.
Terminal obtains the LAI of the cell, and the LAI is added after one corresponding cell in normal base station of every access
Into LAI list, then the LAI of the cell accessed in the LAI list comprising terminal.
Terminal can obtain the LAI of the corresponding cell of the doubtful pseudo-base station after getting doubtful pseudo-base station, and detect
Whether include the LAI in LAI list, if including the LAI in LAI list, thens follow the steps 342, it should if not including in LAI list
LAI thens follow the steps 343.
Step 342, if including the LAI of cell corresponding to doubtful pseudo-base station in LAI list, doubtful pseudo-base station is generated not
It is the verification result of pseudo-base station.
If in LAI list including the LAI, it can determine and access the corresponding cell of the doubtful pseudo-base station before terminal,
Also it can think that the doubtful pseudo-base station is normal base station, it is the verification result of pseudo-base station that terminal, which generates doubtful pseudo-base station not,.
Step 343, if not including the LAI of cell corresponding to doubtful pseudo-base station in LAI list, doubtful pseudo-base station is generated
It is the verification result of pseudo-base station.
If in LAI list including the LAI, it is corresponding small can to determine that terminal did not accessed the doubtful pseudo-base station before
Area can also think that the doubtful pseudo-base station is pseudo-base station, and terminal generates the verification result that doubtful pseudo-base station is pseudo-base station.
In another alternative embodiment, terminal can disappear according to the system of AS (Access Stratum, access layer)
Breath is to verify doubtful pseudo-base station, then step 340 may include the following steps:
Step 344, the system message that base station is sent is received.
In the present embodiment with system message for for SIB (System information block, system information block) 1 into
Row explanation.
Step 345, doubtful pseudo-base station is verified according to system message.
Due to may include much information in SIB1, below to the stream for verifying doubtful pseudo-base station by taking wherein several information as an example
Journey is illustrated.
In the first implementation, step 345 may include the following steps:
Step 3451, public land mobile network PLMN (Land Mobile Network, the public land in SIB1 are obtained
Ground mobile network) mark.
In general, a normal base station can provide service to the user of an operator, and an operator corresponds to one
A PLMN mark, so, a PLMN mark can be carried in the SIB1 that normal base station is sent to terminal.If being carried in SIB1
There is at least two PLMN mark, it may be considered that the base station is pseudo-base station, so, terminal can be identified according to the PLMN in SIB1
Quantity verify doubtful pseudo-base station.
Wherein, the PLMN mark in the available SIB1 of terminal, and compare the quantity and 1 of PLMN mark, if PLMN is identified
Quantity be equal to 1, then follow the steps 3452;If the quantity of PLMN mark is greater than 1,3453 are thened follow the steps.
Step 3452, if the quantity of PLMN mark is equal to 1, generating doubtful pseudo-base station not is the verification result of pseudo-base station.
Step 3453, if the quantity of PLMN mark is greater than 1, the verification result that doubtful pseudo-base station is pseudo-base station is generated.
In the second implementation, step 345 may include the following steps:
Step 3454, it determines whether configured with SIB5 in SIB1, and determines whether to receive what doubtful pseudo-base station was sent
SIB5。
In general, base station if normal needs to send SIB5 to terminal, then SIB5 can be configured in SIB1, and send to terminal
SIB5;Alternatively, base station if normal is not required to send SIB5 to terminal, then SIB5 will not be configured in SIB1, it will not be to terminal
Send SIB5, that is, whether in SIB1 configure SIB5 with whether issue SIB5 need it is corresponding.And if base station be pseudo-base station, can
To configure SIB5 in SIB1 but not send SIB5 to terminal, alternatively, configure SIB5 not in SIB1 but send SIB5 to terminal,
So whether terminal can be according to whether configuring SIB5 in SIB1 and issuing SIB5 and verify doubtful pseudo-base station.
Step 3455, if configured with SIB5 and SIB5 is received in SIB1, alternatively, if SIB5 being not configured in SIB1 and does not connect
SIB5 is received, then generating doubtful pseudo-base station not is the verification result of pseudo-base station.
Step 3456, if SIB5 is not received configured with SIB5 and in SIB1, alternatively, if SIB5 being not configured in SIB1 and connects
SIB5 is received, then generates the verification result that doubtful pseudo-base station is pseudo-base station.
In the third implementation, step 345 may include the following steps:
Step 3457, the configuration parameter of the intra-frequency measurement in SIB1 is obtained.
Intra-frequency measurement is referred to as intra-freq reselect, and the configuration parameter of intra-frequency measurement may include
Allow and not allow, wherein configuration parameter is that allow is used to indicate permission intra-frequency measurement, and configuration parameter is not allow
It is used to indicate and forbids intra-frequency measurement.
Normal base station can allow terminal to carry out intra-frequency measurement, and pseudo-base station can forbid terminal to carry out intra-frequency measurement, so,
Terminal can be according to whether allow intra-frequency measurement to verify doubtful pseudo-base station.
Step 3458, if configuration parameter is used to indicate permission intra-frequency measurement, generating doubtful pseudo-base station is not pseudo-base station
Verification result.
If configuration parameter is allow, it is the verification result of pseudo-base station that terminal, which generates doubtful pseudo-base station not,.
Step 3459, if configuration parameter, which is used to indicate, forbids intra-frequency measurement, generating doubtful pseudo-base station is testing for pseudo-base station
Demonstrate,prove result.
If configuration parameter is not allow, terminal generates the verification result that doubtful pseudo-base station is pseudo-base station.
It should be noted that terminal can be according to one or both of above-mentioned three kinds of implementations or three kinds of implementations
To verify doubtful pseudo-base station.When terminal according at least two implementations to verify doubtful pseudo-base station when, can be according to any
When kind implementation determines that doubtful pseudo-base station is pseudo-base station, the verification result that doubtful pseudo-base station is pseudo-base station is generated;According to institute
Implementation determines doubtful pseudo-base station not when being pseudo-base station, and generating doubtful pseudo-base station not is the verification result of pseudo-base station.
For example, terminal verifies doubtful pseudo-base station with the third implementation according to the first, then terminal can be in determination
The quantity of PLMN mark is greater than 1, or, configuration parameter, which is used to indicate, forbids intra-frequency measurement, or, the quantity of PLMN mark be greater than 1 and
Configuration parameter is used to indicate when forbidding intra-frequency measurement, generates the verification result that doubtful pseudo-base station is pseudo-base station;Determining PLMN mark
The quantity of knowledge is equal to 1 and configuration parameter is used to indicate when allowing intra-frequency measurement, and generating doubtful pseudo-base station not is the verifying of pseudo-base station
As a result.
In the present embodiment, terminal can identify whether base station is pseudo-base station, increases pseudo- base by NAS layers and AS layers of joint
Stand identification accuracy.In addition, being identified for pseudo-base station compared in terms of single, can effectively reduce to normal base station
Erroneous judgement, thus reduce because normal base station be mistaken for pseudo-base station, and cause terminal can not normal registration into network, thus
There is the problem of no-service situation.
Terminal can be combined with two kinds of optional embodiments above to verify doubtful pseudo-base station.For example, terminal can be with
Doubtful pseudo-base station is first verified according to the LAI of the corresponding cell of doubtful pseudo-base station, doubtful pseudo- base is verified further according to system message
It stands;Doubtful pseudo-base station can also be first verified according to system message, verified further according to the LAI of the corresponding cell of doubtful pseudo-base station
Doubtful pseudo-base station, this embodiment is not limited.It is first doubtful to verify according to the LAI of the corresponding cell of doubtful pseudo-base station to terminal below
Like pseudo-base station, the process that doubtful pseudo-base station is verified further according to system message is illustrated, and please refers to Fig. 4.
Step 401, terminal is from first service cell reselection to second service cell.
Step 402, it after RRC connection is established in terminal base station corresponding with second service cell, detects whether because not authenticating
And continuous 4 attachments is caused to fail, if continuous 4 attachments is caused to fail because of not authenticating, then follow the steps 403.
Step 403, terminal detection terminal storage LAI list in whether include second service cell LAI, if LAI arrange
The LAI for not including second service cell in table, thens follow the steps 404.
If including the LAI of second service cell in LAI list, terminal determines that base station is not pseudo-base station, terminates process.
Step 404, whether special parameter is carried in the system information of terminal detection second service cell, if carrying special ginseng
Number, thens follow the steps 405.
Wherein, special parameter includes: that the quantity of PLMN mark is greater than in 1, SIB1 configured with SIB5 and does not receive SIB5,
Alternatively, if SIB5 being not configured in SIB1 and receives SIB5, the configuration parameter of intra-frequency measurement is not allow.
If not carrying special parameter, terminal determines that base station is not pseudo-base station, terminates process.
Step 405, terminal determines that the corresponding base station of second service cell is pseudo-base station.
If realizing Fig. 4 using module, in an alternative embodiment, terminal may include attachment failure detection mould
Block, the first memory module, LAI comparison module, the second memory module, system message comparison module and determining module, these modules
Between connection relationship may refer to Fig. 5.
Wherein, attachment failure detection module is used to screen the base station of the continuous several times attachment failure before successful authentication, and
The base station is classified as doubtful pseudo-base station;First memory module is used to store the base station information of doubtful pseudo-base station, including the doubtful puppet
The system message that the LAI of the corresponding cell in base station and the doubtful pseudo-base station are sent;LAI comparison module is for comparing the LAI and LAI
List deletes the base station information of the doubtful pseudo-base station stored in the first memory module if LAI list includes the LAI, if
LAI list does not include the LAI, then the base station information of the doubtful pseudo-base station is sent to the second memory module;Second memory module
For storing the base station information of the doubtful pseudo-base station of LAI comparison module transmission;System message comparison module is for comparing second
Parameter in system message and default special parameter in memory module are deleted if the parameter is different from default special parameter
The base station information of the doubtful pseudo-base station in second memory module is deposited if the parameter is identical as default special parameter by second
The base station information of the doubtful pseudo-base station in storage module is sent to determining module;Determining module is used for the base to the doubtful pseudo-base station
Information of standing is arranged, and carries out pseudo-base station confirmation, and outputting base station is the judgement result of pseudo-base station.
It, in another alternative embodiment, can be by the LAI comparison module in Fig. 5 if realizing Fig. 4 using module
Information comparison module is merged into system message detection module and is compared simultaneously, then terminal may include attachment failure detection
Module, the first memory module, information comparison module, the second memory module and determining module, the connection relationship between these modules
It may refer to Fig. 6.
Wherein, attachment failure detection module is used to screen the base station of the continuous several times attachment failure before successful authentication, and
The base station is classified as doubtful pseudo-base station;First memory module is used to store the base station information of doubtful pseudo-base station, including the doubtful puppet
The system message that base station is sent;Second memory module is used to store the LAI of the corresponding cell of the doubtful pseudo-base station;Information comparison mould
Block compares the parameter in the system message in the second memory module and presets special ginseng for comparing LAI the and LAI list
Number, if LAI list includes the LAI, and the parameter in the system message in the second memory module is different with default special parameter, then
The base station information of the doubtful pseudo-base station stored in the first memory module is deleted, and retains the LAI in the second memory module, is given over to
Identification next time pseudo-base station compares information;If LAI list does not include LAI, and the ginseng in the system message in the second memory module
Several and default special parameter is identical, then the base station information of the doubtful pseudo-base station in the first memory module is sent to determining mould
Block, and special marking is carried out to the LAI in the second memory module, it is convenient for subsequent identification pseudo-base station;Determining module is used to doubt this
It is arranged like the base station information of pseudo-base station, carries out pseudo-base station confirmation, and outputting base station is the judgement result of pseudo-base station.
Following is the application Installation practice, can be used for executing the application embodiment of the method.It is real for the application device
Undisclosed details in example is applied, the application embodiment of the method is please referred to.
Fig. 7 shows the structural block diagram of the pseudo-base station identification device of one exemplary embodiment of the application offer.The puppet base
Stand identification device can by software, hardware or both be implemented in combination with as terminal all or part of.The device packet
It includes:
Statistical module 710, for establishing after RRC connect in terminal and base station, the number of statistics Attachments failure is attached
Be unsuccessfully to occur before base station and terminal successful authentication;
First determining module 720 determines base station when the number for obtaining in statistical module 710 is more than predetermined threshold
For doubtful pseudo-base station;
Authentication module 730, the doubtful pseudo-base station for determining to the first determining module 720 are verified, and are tied according to verifying
Fruit determines whether doubtful pseudo-base station is pseudo-base station.
In an alternative embodiment, authentication module 730 is also used to:
Obtain the LAI list of terminal, the LAI of the cell accessed in LAI list comprising terminal;
If the LAI comprising cell corresponding to doubtful pseudo-base station in LAI list, generating doubtful pseudo-base station is not pseudo-base station
Verification result;
If not including the LAI of cell corresponding to doubtful pseudo-base station in LAI list, generating doubtful pseudo-base station is pseudo-base station
Verification result.
In an alternative embodiment, authentication module 730 is also used to:
Receive the system message that base station is sent;
Doubtful pseudo-base station is verified according to system message.
In an alternative embodiment, when system message includes SIB1, authentication module 730 is also used to:
Obtain the PLMN mark in SIB1;
If the quantity of PLMN mark is equal to 1, generating doubtful pseudo-base station not is the verification result of pseudo-base station;
If the quantity of PLMN mark is greater than 1, the verification result that doubtful pseudo-base station is pseudo-base station is generated.
In an alternative embodiment, when system message includes system information block SIB1, authentication module 730 is also used
In:
It determines whether configured with SIB5 in SIB1, and determines whether to receive the SIB5 that doubtful pseudo-base station is sent;
If configured with SIB5 and receiving SIB5 in SIB1, alternatively, if SIB5 is not configured in SIB1 and does not receive SIB5,
Then generating doubtful pseudo-base station not is the verification result of pseudo-base station;
If not receiving configured with SIB5 and SIB5 in SIB1, alternatively, if SIB5 is not configured in SIB1 and receives SIB5,
Then generate the verification result that doubtful pseudo-base station is pseudo-base station.
In an alternative embodiment, when system message includes system information block SIB1, authentication module 730 is also used
In:
Obtain the configuration parameter of the intra-frequency measurement in SIB1;
If configuration parameter is used to indicate permission intra-frequency measurement, generating doubtful pseudo-base station not is the verification result of pseudo-base station;
If configuration parameter, which is used to indicate, forbids intra-frequency measurement, the verification result that doubtful pseudo-base station is pseudo-base station is generated.
Referring to FIG. 8, in an alternative embodiment, the device further include:
Second determining module 740, if the RRC Connection Release information for receiving base station transmission before authentication, really
Fixed attachment failure;Alternatively,
Third determining module 750, if not initiating the authorizing procedure with terminal for base station, it is determined that attachment failure.
In conclusion pseudo-base station identification device provided in this embodiment is built if base station is pseudo-base station in terminal and base station
After vertical RRC connection, base station may lead to terminal attachment failure before with terminal successful authentication, to make terminal and GSM
Connection is established in base station, which is pseudo-base station.Above-mentioned characteristic based on pseudo-base station, terminal can count Attachments failure
Number, due to attachment be unsuccessfully occur before base station and terminal successful authentication, so, if number is more than predetermined threshold,
Base station can be then determined as to doubtful pseudo-base station, then, terminal can continue to verify doubtful pseudo-base station, and according to verifying
As a result determine whether doubtful pseudo-base station is pseudo-base station, in this way, both can be more than predetermined threshold by the number of Attachments failure
This condition avoids normal Base Station from being identified as pseudo-base station, can also verify whether base station is pseudo-base station from many aspects, from
And improve the accuracy of pseudo-base station identification.
The embodiment of the present application also provides a kind of computer-readable medium, which has at least one
Instruction, at least one instruction are loaded as the processor and are executed to realize that pseudo-base station described in as above each embodiment is known
Other method.
The embodiment of the present application also provides a kind of computer program product, which is stored at least one
Instruction, at least one instruction are loaded as the processor and are executed to realize that pseudo-base station described in as above each embodiment is known
Other method.
It should be understood that pseudo-base station identification device provided by the above embodiment is when executing pseudo-base station recognition methods, only
The example of the division of the above functional modules, in practical application, can according to need and by above-mentioned function distribution by
Different functional modules is completed, i.e., the internal structure of equipment is divided into different functional modules, described above complete to complete
Portion or partial function.In addition, pseudo-base station identification device provided by the above embodiment belongs to pseudo-base station recognition methods embodiment
Same design, specific implementation process are detailed in embodiment of the method, and which is not described herein again.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The above is not to limit the application, within the spirit and principles of this application, made any modification,
Equivalent replacement, improvement etc., should be included within the scope of protection of this application.
Claims (10)
1. a kind of pseudo-base station recognition methods, which is characterized in that the described method includes:
It is established after radio resource control RRC connect in terminal and base station, the number of statistics Attachments failure, the attachment mistake
Lose is occurred before the base station and the terminal successful authentication;
If the number is more than predetermined threshold, the base station is determined as doubtful pseudo-base station;
The doubtful pseudo-base station is verified, determines whether the doubtful pseudo-base station is pseudo-base station according to verification result.
2. the method according to claim 1, wherein described verify the doubtful pseudo-base station, comprising:
The Location Area Identification LAI list of the terminal is obtained, includes the cell that the terminal had accessed in the LAI list
LAI;
If the LAI comprising cell corresponding to the doubtful pseudo-base station in the LAI list, generates the doubtful pseudo-base station not
It is the verification result of pseudo-base station;
If not including the LAI of cell corresponding to the doubtful pseudo-base station in the LAI list, the doubtful pseudo-base station is generated
It is the verification result of pseudo-base station.
3. the method according to claim 1, wherein described verify the doubtful pseudo-base station, comprising:
Receive the system message that the base station is sent;
The doubtful pseudo-base station is verified according to the system message.
4. according to the method described in claim 3, it is characterized in that, when the system message includes system information block SIB1,
It is described that the doubtful pseudo-base station is verified according to the system message, comprising:
Obtain the public land mobile network PLMN mark in the SIB1;
If the quantity of the PLMN mark is equal to 1, the verification result that the doubtful pseudo-base station is not pseudo-base station is generated;
If the quantity of the PLMN mark is greater than 1, the verification result that the doubtful pseudo-base station is pseudo-base station is generated.
5. according to the method described in claim 3, it is characterized in that, when the system message includes system information block SIB1,
It is described that the doubtful pseudo-base station is verified according to the system message, comprising:
It determines whether configured with SIB5 in the SIB1, and determines whether to receive the described of the doubtful pseudo-base station transmission
SIB5;
If configured with SIB5 and the SIB5 is received in the SIB1, alternatively, if SIB5 being not configured in the SIB1 and does not connect
The SIB5 is received, then generates the verification result that the doubtful pseudo-base station is not pseudo-base station;
If the SIB5 is not received configured with SIB5 and in the SIB1, alternatively, if SIB5 being not configured in the SIB1 and connects
The SIB5 is received, then generates the verification result that the doubtful pseudo-base station is pseudo-base station.
6. according to the method described in claim 3, it is characterized in that, when the system message includes system information block SIB1,
It is described that the doubtful pseudo-base station is verified according to the system message, comprising:
Obtain the configuration parameter of the intra-frequency measurement in the SIB1;
If the configuration parameter is used to indicate permission intra-frequency measurement, the verifying knot that the doubtful pseudo-base station is not pseudo-base station is generated
Fruit;
If the configuration parameter, which is used to indicate, forbids intra-frequency measurement, the verifying knot that the doubtful pseudo-base station is pseudo-base station is generated
Fruit.
7. method according to any one of claims 1 to 6, which is characterized in that the method also includes:
If receiving the RRC Connection Release information that the base station is sent before authentication, it is determined that attachment failure;Alternatively,
If the base station does not initiate the authorizing procedure with the terminal, it is determined that attachment failure.
8. a kind of pseudo-base station identification device, which is characterized in that described device includes:
Statistical module, for establishing time of statistics Attachments failure after radio resource control RRC connect in terminal and base station
Number, the attachment are occurred before the base station and the terminal successful authentication;
First determining module, it is when the number for obtaining in the statistical module is more than predetermined threshold, the base station is true
It is set to doubtful pseudo-base station;
Authentication module, the doubtful pseudo-base station for determining to first determining module is verified, according to verification result
Determine whether the doubtful pseudo-base station is pseudo-base station.
9. a kind of terminal, which is characterized in that the terminal includes processor and memory, and at least one is stored in the memory
Item instruction, described instruction are loaded by the processor and are executed to realize the pseudo-base station identification as described in claim 1 to 7 is any
Method.
10. a kind of computer readable storage medium, which is characterized in that be stored at least one instruction, institute in the storage medium
Instruction is stated to be loaded by processor and executed to realize the pseudo-base station recognition methods as described in claim 1 to 7 is any.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910769065.5A CN110312259B (en) | 2019-08-20 | 2019-08-20 | Pseudo base station identification method, pseudo base station identification device, terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910769065.5A CN110312259B (en) | 2019-08-20 | 2019-08-20 | Pseudo base station identification method, pseudo base station identification device, terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110312259A true CN110312259A (en) | 2019-10-08 |
CN110312259B CN110312259B (en) | 2023-03-24 |
Family
ID=68083648
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910769065.5A Active CN110312259B (en) | 2019-08-20 | 2019-08-20 | Pseudo base station identification method, pseudo base station identification device, terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110312259B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111988784A (en) * | 2020-08-04 | 2020-11-24 | 深圳传音控股股份有限公司 | Information processing method, terminal equipment and storage medium |
WO2021093823A1 (en) * | 2019-11-14 | 2021-05-20 | 中兴通讯股份有限公司 | Pseudo base station identification method and system, and computer readable storage medium |
CN113068192A (en) * | 2021-03-17 | 2021-07-02 | Oppo广东移动通信有限公司 | Pseudo base station identification method and device, terminal and storage medium |
CN113099455A (en) * | 2021-03-15 | 2021-07-09 | 重庆邮电大学 | Method for capturing and resisting capture of mobile phone number of LTE terminal user |
WO2023160339A1 (en) * | 2022-02-22 | 2023-08-31 | 华为技术有限公司 | Communication method and apparatus |
WO2024104082A1 (en) * | 2022-11-16 | 2024-05-23 | 维沃移动通信有限公司 | Information processing method and apparatus, and terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106358199A (en) * | 2016-09-30 | 2017-01-25 | 维沃移动通信有限公司 | Method for recognizing pseudo base station by mobile terminal and mobile terminal |
CN107567030A (en) * | 2017-10-19 | 2018-01-09 | 中国电信股份有限公司南京分公司 | A kind of method and system investigated with evading pseudo-base station interference |
CN107911822A (en) * | 2017-10-31 | 2018-04-13 | 珠海市魅族科技有限公司 | Pseudo-base station detection method and device, terminal and computer-readable recording medium |
CN109195217A (en) * | 2018-10-23 | 2019-01-11 | Oppo广东移动通信有限公司 | The processing method and processing device of LTE network refusal behavior |
-
2019
- 2019-08-20 CN CN201910769065.5A patent/CN110312259B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106358199A (en) * | 2016-09-30 | 2017-01-25 | 维沃移动通信有限公司 | Method for recognizing pseudo base station by mobile terminal and mobile terminal |
CN107567030A (en) * | 2017-10-19 | 2018-01-09 | 中国电信股份有限公司南京分公司 | A kind of method and system investigated with evading pseudo-base station interference |
CN107911822A (en) * | 2017-10-31 | 2018-04-13 | 珠海市魅族科技有限公司 | Pseudo-base station detection method and device, terminal and computer-readable recording medium |
CN109195217A (en) * | 2018-10-23 | 2019-01-11 | Oppo广东移动通信有限公司 | The processing method and processing device of LTE network refusal behavior |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021093823A1 (en) * | 2019-11-14 | 2021-05-20 | 中兴通讯股份有限公司 | Pseudo base station identification method and system, and computer readable storage medium |
CN111988784A (en) * | 2020-08-04 | 2020-11-24 | 深圳传音控股股份有限公司 | Information processing method, terminal equipment and storage medium |
CN113099455A (en) * | 2021-03-15 | 2021-07-09 | 重庆邮电大学 | Method for capturing and resisting capture of mobile phone number of LTE terminal user |
CN113068192A (en) * | 2021-03-17 | 2021-07-02 | Oppo广东移动通信有限公司 | Pseudo base station identification method and device, terminal and storage medium |
WO2023160339A1 (en) * | 2022-02-22 | 2023-08-31 | 华为技术有限公司 | Communication method and apparatus |
WO2024104082A1 (en) * | 2022-11-16 | 2024-05-23 | 维沃移动通信有限公司 | Information processing method and apparatus, and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN110312259B (en) | 2023-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110312259A (en) | Pseudo-base station recognition methods, device, terminal and storage medium | |
US20150105080A1 (en) | Method for Handover Between Operator Networks, User Equipment, and Remote Management Platform | |
US20090163173A1 (en) | Unauthorized call activity detection in a cellular communication system | |
EP2389032A1 (en) | Realization method and related device for switching control | |
CN106878988A (en) | Register method | |
CN108462972A (en) | Method and apparatus for handling NAS signaling request in a wireless communication system | |
US9232440B2 (en) | Method and apparatus for controlling system overload in a wireless communication system | |
CN106211167A (en) | A kind of terminal, pseudo-base station recognition methods and system | |
CN107948976A (en) | The detection method and device of LTE network access result, computer-readable storage medium | |
WO2016173339A1 (en) | Network access method and mobile communication terminal | |
CN111278036B (en) | Method and device for acquiring MAC address | |
CN107820716A (en) | The falling result detection method and device of CSFB a kind of, computer-readable storage medium | |
CN111787575B (en) | Network access management method and device for terminal equipment | |
CN113206814A (en) | Network event processing method and device and readable storage medium | |
US6161006A (en) | System and method for the early detection of cellular telephone piracy | |
CN110351722B (en) | Information sending method, key generation method and device | |
CN109195203A (en) | Method for parameter configuration, device, terminal and the storage medium of WLAN | |
CN107948994A (en) | The detection method and device of network insertion result, computer-readable storage medium | |
CN107980232A (en) | The falling result detection method and device of CSFB a kind of, computer-readable storage medium | |
CN107071807A (en) | A kind of method for network access and mobile terminal | |
CN103458499A (en) | Off-line processing method and equipment | |
CN110475380A (en) | Control method and user equipment in user equipment | |
CN108040336A (en) | The detection method and device of network insertion result, computer-readable storage medium | |
CN107948995A (en) | The detection method and device of LTE network access result, computer-readable storage medium | |
CN107995635A (en) | The detection method and device of network insertion result, computer-readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |