CN110312259A - Pseudo-base station recognition methods, device, terminal and storage medium - Google Patents

Pseudo-base station recognition methods, device, terminal and storage medium Download PDF

Info

Publication number
CN110312259A
CN110312259A CN201910769065.5A CN201910769065A CN110312259A CN 110312259 A CN110312259 A CN 110312259A CN 201910769065 A CN201910769065 A CN 201910769065A CN 110312259 A CN110312259 A CN 110312259A
Authority
CN
China
Prior art keywords
base station
pseudo
terminal
doubtful
doubtful pseudo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910769065.5A
Other languages
Chinese (zh)
Other versions
CN110312259B (en
Inventor
王振宇
马剑钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201910769065.5A priority Critical patent/CN110312259B/en
Publication of CN110312259A publication Critical patent/CN110312259A/en
Application granted granted Critical
Publication of CN110312259B publication Critical patent/CN110312259B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the present application discloses a kind of pseudo-base station recognition methods, device, terminal and storage medium, belong to field of computer technology, the described method includes: being established after radio resource control RRC connect in terminal and base station, the number of Attachments failure is counted, the attachment is occurred before the base station and the terminal successful authentication;If the number is more than predetermined threshold, the base station is determined as doubtful pseudo-base station;The doubtful pseudo-base station is verified, determines whether the doubtful pseudo-base station is pseudo-base station according to verification result.The accuracy of pseudo-base station identification can be improved in the embodiment of the present application.

Description

Pseudo-base station recognition methods, device, terminal and storage medium
Technical field
The invention relates to field of computer technology, in particular to a kind of pseudo-base station recognition methods, device, terminal and Storage medium.
Background technique
Pseudo-base station refers to personation normal Base Station and terminal establishes connection, and sends the refuse messages such as swindle, distribution to terminal Or dial the base station of harassing call.Since pseudo-base station has seriously affected the normal communication of terminal, it is therefore desirable to be carried out to pseudo-base station Identification accesses pseudo-base station to avoid terminal.
Currently, terminal can preferentially select to establish connection with LTE (Long Term Evolution, long term evolution) base station, and Introduce bi-directional authentification mechanism in LTE, i.e., terminal and LTE base station need to establish connection after bi-directional authentification success, in this way can be with Guarantee that being successfully established the LTE base station of connection with terminal is not pseudo-base station.
However, if LTE base station makes terminal and GSM (Global System after terminal and LTE base station establish connection For Mobile Communication, global system for mobile communications) base station establishes connection, since terminal is not necessarily to the base station GSM Connection can be established with the base station GSM by carrying out authentication, so, if the base station GSM for being successfully established connection with terminal is pseudo-base station, that The LTE base station is also pseudo-base station, and this kind of LTE base station can not be identified as pseudo-base station at present.
Summary of the invention
The embodiment of the present application provides a kind of pseudo-base station recognition methods, device, terminal and storage medium, and can solve can not The problem of LTE base station is identified as pseudo-base station.The technical solution is as follows:
According to the one aspect of the application, a kind of pseudo-base station recognition methods is provided, which comprises
It is established after radio resource control RRC connect in terminal and base station, the number of statistics Attachments failure is described attached Be unsuccessfully to occur before the base station and the terminal successful authentication;
If the number is more than predetermined threshold, the base station is determined as doubtful pseudo-base station;
The doubtful pseudo-base station is verified, determines whether the doubtful pseudo-base station is pseudo-base station according to verification result.
According to the another aspect of the application, a kind of pseudo-base station identification device is provided, described device includes:
Statistical module, for establishing statistics Attachments failure after radio resource control RRC connect in terminal and base station Number, the attachment is occurred before the base station and the terminal successful authentication;
First determining module, when the number for obtaining in the statistical module is more than predetermined threshold, by the base Station is determined as doubtful pseudo-base station;
Authentication module, the doubtful pseudo-base station for determining to first determining module is verified, according to verifying As a result determine whether the doubtful pseudo-base station is pseudo-base station.
According to the application's in another aspect, providing a kind of terminal, the terminal includes processor and memory, described to deposit At least one instruction is stored in reservoir, described instruction is loaded by the processor and executed to realize pseudo-base station as described above Recognition methods.
According to the another aspect of the application, a kind of computer readable storage medium is provided, is stored in the storage medium There is at least one instruction, described instruction is loaded by processor and executed to realize pseudo-base station recognition methods as described above.
Technical solution bring beneficial effect provided by the embodiments of the present application includes at least:
If base station is pseudo-base station, established after RRC connect in terminal and base station, base station may successfully reflect with terminal Lead to terminal attachment failure before power, so that terminal and the base station GSM be made to establish connection, which is pseudo-base station.Based on pseudo- base The above-mentioned characteristic stood, terminal can count the number of Attachments failure, since attachment is unsuccessfully successfully to reflect in base station with terminal Occur before power, so, if number is more than predetermined threshold, base station can be determined as to doubtful pseudo-base station, then, terminal can To continue to verify doubtful pseudo-base station, and determine whether doubtful pseudo-base station is pseudo-base station according to verification result, in this way, both may be used Normal Base Station is avoided to be identified as pseudo-base station so that the number by Attachments failure is more than this condition of predetermined threshold, it can also To verify whether base station is pseudo-base station from many aspects, to improve the accuracy of pseudo-base station identification.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is the schematic diagram for the communication system that one exemplary embodiment of the application provides;
Fig. 2 is the pseudo-base station recognition methods flow chart that one exemplary embodiment of the application provides;
Fig. 3 is the pseudo-base station recognition methods flow chart that one exemplary embodiment of the application provides;
Fig. 4 is the pseudo-base station recognition methods flow chart that one exemplary embodiment of the application provides;
Fig. 5 is the structural block diagram for the pseudo-base station identification device that one exemplary embodiment of the application provides;
Fig. 6 is the structural block diagram for the pseudo-base station identification device that one exemplary embodiment of the application provides;
Fig. 7 is the structural block diagram for the pseudo-base station identification device that one exemplary embodiment of the application provides;
Fig. 8 is the structural block diagram for the pseudo-base station identification device that one exemplary embodiment of the application provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the application embodiment party Formula is described in further detail.
Referring to FIG. 1, it is the schematic diagram for the communication system that one exemplary embodiment of the application provides.As shown in Figure 1, The communication system includes first base station 110, the second base station 120 and at least one terminal 130, and at least one terminal 130 is equal In the coverage area of first base station 110 and the second base station 120.It is illustrated in Fig. 1 with a terminal.
Terminal 130 is referred to as user equipment (User Equipment, UE), access terminal, subscriber unit, user It stands, movement station, mobile station, mobile device, user terminal, terminal, wireless telecom equipment, user agent or user apparatus.Terminal It can be smart phone, cellular phone, wireless phone, personal digital assistant (Personal Digital Assistant, PDA) Equipment, the handheld device with wireless communication function or be connected to other processing equipments of radio modem, mobile unit, Wearable device etc..
First base station 110 is that have the base station of bi-directional authentification mechanism.When terminal 130 is selected or cell reselection by cell After mode has selected the corresponding cell of first base station 110, terminal 130 first establishes RRC (Radio with first base station 110 Resource Control, wireless heterogeneous networks) connection, then carry out bi-directional authentification with first base station 110, i.e., it is true in terminal 130 Fixed authenticating successfully and after the determining authentication success to terminal 130 of first base station 110 to first base station 110, completes cell selection The position update flow after register flow path or cell reselection afterwards.Optionally, first base station 110 can be LTE base station.
If first base station 110 is pseudo-base station, the main function of first base station 110 is that terminal 130 is attracted to access, and is rebooted Terminal 130 accesses the second base station 120.Wherein, if the second base station 120 is pseudo-base station, the second base station 120 is that have unidirectional authentication The base station of mechanism.When terminal 130 accesses the second base station 120, terminal 130 is established RRC with the second base station 120 and is connect, the second base 120 pairs of terminals 130 of standing unidirectionally are authenticated, i.e., after the second base station 120 is determined to the authentication success of terminal 130, complete registration Process.Subsequent, the second base station 120 can send the refuse messages such as swindle, distribution to terminal 130 or dial harassing and wrecking to terminal 130 Phone, to influence the normal communication of terminal 130.Optionally, the second base station 120 can be the base station GSM.
Referring to FIG. 2, it is the flow chart for the pseudo-base station recognition methods that one exemplary embodiment of the application provides.The puppet Base station identification approach can be applied in the terminal 130 shown in above-mentioned, and the base station in the present embodiment is the first base station in Fig. 1 110.In Fig. 2, pseudo-base station recognition methods includes:
Step 210, it is established after RRC connect in terminal and base station, the number of statistics Attachments failure, attachment failure It is to occur before base station and terminal successful authentication.
Terminal selects a cell by way of cell selection or cell reselection, and base station corresponding with the cell is established RRC connection.Wherein, the present embodiment does not limit RRC establishment of connection process.
It is established after RRC connect in terminal and base station, if terminal has selected a cell by cell selection mode, after Continuous terminal needs to carry out network registry;If terminal has selected a cell by cell reselection mode, subsequent terminal need into Row location updating.Either network registry or location updating, terminal require to send attach request to base station, and base station is according to this Attach request is authenticated with terminal, continues attachment flow if authenticating successfully, if failed authentication thinks attachment failure.
Since the main function of pseudo-base station is to attract terminal access, reboots terminal and access another pseudo-base station, so, if with The base station that terminal establishes RRC connection is pseudo-base station, then the base station can not be authenticated with terminal, is failed so as to cause attachment, It reboots terminal and accesses another pseudo-base station.That is, fail if just having adhered to before base station and terminal successful authentication, terminal can be with Using the base station as doubtful pseudo-base station.Wherein, it may include: that base station is authenticated with terminal that base station does not carry out authentication with terminal Release RRC connection before is so as to cause attachment failure, alternatively, base station can not initiate authentication so as to cause failed authentication, alternatively, Base station can send the authentication information of mistake to terminal and lead to failed authentication.
Normal base station may also can because of leading to failed authentication due to certain, and pseudo-base station can continuous several times cause Attachment failure, so, it, can be by continuous several times in the present embodiment in order to avoid being doubtful pseudo-base station by normal identification of base stations The base station for causing attachment to fail is determined as doubtful pseudo-base station, to improve the accuracy of doubtful pseudo-base station identification.
In an alternative embodiment, terminal can count the number of Attachments failure, then by the number and make a reservation for Threshold value is compared;When the number is more than predetermined threshold, base station is determined as doubtful pseudo-base station, i.e. execution step 220;When this When number is less than predetermined threshold, the step of counting the number that Attachments fail is continued to execute, until the number is more than predetermined Threshold value or terminal stop when adhering to successfully.Predetermined threshold is illustrated below.
It is provided in relevant communication standards, when continuous 5 attachments of terminal and base station fail, meeting opening timing device, by base station Corresponding cell can just reactivate after forbidding scheduled duration.If base station is pseudo-base station, which can lead to terminal continuous 5 Secondary attachment failure, thus make terminal in cell reselection gravity treatment to the corresponding cell of another pseudo-base station, so, can be set predetermined Threshold value is less than 5, for example predetermined threshold can be 4 or 3 or 2 etc., and this embodiment is not limited.
Step 220, if number is more than predetermined threshold, base station is determined as doubtful pseudo-base station.
Step 230, doubtful pseudo-base station is verified, determines whether doubtful pseudo-base station is pseudo-base station according to verification result.
Normal base station may also can because of leading to failed authentication due to certain, in order to avoid normal base Station is identified as pseudo-base station, and terminal can also continue to verify doubtful pseudo-base station, and is determined according to verification result doubtful Pseudo-base station is pseudo-base station or normal base station, to improve the accuracy of pseudo-base station identification.
In conclusion pseudo-base station recognition methods provided in this embodiment is built if base station is pseudo-base station in terminal and base station After vertical RRC connection, base station may lead to terminal attachment failure before with terminal successful authentication, to make terminal and GSM Connection is established in base station, which is pseudo-base station.Above-mentioned characteristic based on pseudo-base station, terminal can count Attachments failure Number, due to attachment be unsuccessfully occur before base station and terminal successful authentication, so, if number is more than predetermined threshold, Base station can be then determined as to doubtful pseudo-base station, then, terminal can continue to verify doubtful pseudo-base station, and according to verifying As a result determine whether doubtful pseudo-base station is pseudo-base station, in this way, both can be more than predetermined threshold by the number of Attachments failure This condition avoids normal Base Station from being identified as pseudo-base station, can also verify whether base station is pseudo-base station from many aspects, from And improve the accuracy of pseudo-base station identification.
Fig. 3 is referred to, is the pseudo-base station recognition methods flow chart that one exemplary embodiment of the application provides.The puppet base Recognition methods of standing can apply in the terminal 130 shown in above-mentioned, and the base station in the present embodiment is the first base station in Fig. 1 110.In Fig. 3, which includes:
Step 310, it is established after RRC connect in terminal and base station, if the RRC for receiving base station transmission before authentication connects Connect release information, it is determined that attachment failure;Alternatively, if base station does not initiate the authorizing procedure with terminal, it is determined that attachment failure.
Terminal selects a cell by way of cell selection or cell reselection, and base station corresponding with the cell is established RRC connection.Wherein, the present embodiment does not limit RRC establishment of connection process.
It is established after RRC connect in terminal and base station, if terminal has selected a cell by cell selection mode, after Continuous terminal needs to carry out network registry;If terminal has selected a cell by cell reselection mode, subsequent terminal need into Row location updating.Either network registry or location updating, terminal require to send attach request to base station, and base station is according to this Attach request is authenticated with terminal, continues attachment flow if authenticating successfully, if failed authentication thinks attachment failure.
Since the main function of pseudo-base station is to attract terminal access, reboots terminal and access another pseudo-base station, so, if with The base station that terminal establishes RRC connection is pseudo-base station, then the base station can not be authenticated with terminal, is failed so as to cause attachment, It reboots terminal and accesses another pseudo-base station.That is, fail if just having adhered to before base station and terminal successful authentication, terminal can be with Using the base station as doubtful pseudo-base station.Authentication is not carried out with terminal to base station below to be illustrated.
In an alternative embodiment, base station does not carry out authentication with terminal can be base station and is carrying out authenticating it with terminal Preceding release RRC connection is so as to cause attachment failure, if then terminal receives the RRC Connection Release letter of base station transmission before authentication Breath, then terminal determines attachment failure.
Wherein, base station can carry out cause specific value refusal to network registry or location updating before authentication, and to end End sends RRC Connection Release information, if carrying GSM frequency point in the RRC Connection Release information, terminal can be according to GSM frequency Point is redirected to the base station GSM;If not carrying GSM frequency point in the RRC Connection Release information, terminal can be connect by cell reselection Enter the base station GSM.Wherein, which is pseudo-base station.
In another alternative embodiment, base station does not carry out authentication and can be base station not initiating authentication to leading with terminal Failed authentication is caused, if then base station does not initiate the authorizing procedure with terminal, terminal determines attachment failure.
In LTE, the bi-directional authentification of base station and terminal is initiated by base station, if base station does not initiate the authentication stream with terminal Journey, then the timer in terminal can be overtime, so as to cause failed authentication, eventually leads to attachment failure.Subsequent, terminal can pass through Cell reselection accesses the base station GSM, which is pseudo-base station.
It, can be by the network registry of NAS (Non-Access Stratum, Non-Access Stratum) or position more in the present embodiment It newly arrives and identifies doubtful pseudo-base station.
Step 320, the number of statistics Attachments failure, which sent out before base station and terminal successful authentication Raw.
Normal base station may also can because of leading to failed authentication due to certain, and pseudo-base station can continuous several times cause Attachment failure, so, it, can be by continuous several times in the present embodiment in order to avoid being doubtful pseudo-base station by normal identification of base stations The base station for causing attachment to fail is determined as doubtful pseudo-base station, to improve the accuracy of doubtful pseudo-base station identification.
In an alternative embodiment, terminal can count the number of Attachments failure, then by the number and make a reservation for Threshold value is compared;When the number is more than predetermined threshold, base station is determined as doubtful pseudo-base station, i.e. execution step 330;When this When number is less than predetermined threshold, the step of counting the number that Attachments fail is continued to execute, until the number is more than predetermined Threshold value or terminal stop when adhering to successfully.Predetermined threshold is illustrated below.
It is provided in relevant communication standards, when continuous 5 attachments of terminal and base station fail, meeting opening timing device, by base station Corresponding cell can just reactivate after forbidding scheduled duration.If base station is pseudo-base station, which can lead to terminal continuous 5 Secondary attachment failure, thus make terminal in cell reselection gravity treatment to the corresponding cell of another pseudo-base station, so, can be set predetermined Threshold value is less than 5, for example predetermined threshold can be 4 or 3 or 2 etc., and this embodiment is not limited.
Step 330, if number is more than predetermined threshold, base station is determined as doubtful pseudo-base station.
Step 340, doubtful pseudo-base station is verified, determines whether doubtful pseudo-base station is pseudo-base station according to verification result.
Normal base station may also can because of leading to failed authentication due to certain, in order to avoid normal base Station is identified as pseudo-base station, and terminal can also continue to verify doubtful pseudo-base station, and is determined according to verification result doubtful Pseudo-base station is pseudo-base station or normal base station, to improve the accuracy of pseudo-base station identification.
In conclusion pseudo-base station recognition methods provided in this embodiment is built if base station is pseudo-base station in terminal and base station After vertical RRC connection, base station may lead to terminal attachment failure before with terminal successful authentication, to make terminal and GSM Connection is established in base station, which is pseudo-base station.Above-mentioned characteristic based on pseudo-base station, terminal can count Attachments failure Number, due to attachment be unsuccessfully occur before base station and terminal successful authentication, so, if number is more than predetermined threshold, Base station can be then determined as to doubtful pseudo-base station, then, terminal can continue to verify doubtful pseudo-base station, and according to verifying As a result determine whether doubtful pseudo-base station is pseudo-base station, in this way, both can be more than predetermined threshold by the number of Attachments failure This condition avoids normal Base Station from being identified as pseudo-base station, can also verify whether base station is pseudo-base station from many aspects, from And improve the accuracy of pseudo-base station identification.
The process of the doubtful pseudo-base station of terminal authentication is illustrated below.
In an alternative embodiment, terminal can be according to the LAI (Location of the corresponding cell of doubtful pseudo-base station Area Identity, Location Area Identification) verify doubtful pseudo-base station, then step 340 may include the following steps:
Step 341, the Location Area Identification LAI list of terminal, the cell accessed in the LAI list comprising terminal are obtained LAI.
Terminal obtains the LAI of the cell, and the LAI is added after one corresponding cell in normal base station of every access Into LAI list, then the LAI of the cell accessed in the LAI list comprising terminal.
Terminal can obtain the LAI of the corresponding cell of the doubtful pseudo-base station after getting doubtful pseudo-base station, and detect Whether include the LAI in LAI list, if including the LAI in LAI list, thens follow the steps 342, it should if not including in LAI list LAI thens follow the steps 343.
Step 342, if including the LAI of cell corresponding to doubtful pseudo-base station in LAI list, doubtful pseudo-base station is generated not It is the verification result of pseudo-base station.
If in LAI list including the LAI, it can determine and access the corresponding cell of the doubtful pseudo-base station before terminal, Also it can think that the doubtful pseudo-base station is normal base station, it is the verification result of pseudo-base station that terminal, which generates doubtful pseudo-base station not,.
Step 343, if not including the LAI of cell corresponding to doubtful pseudo-base station in LAI list, doubtful pseudo-base station is generated It is the verification result of pseudo-base station.
If in LAI list including the LAI, it is corresponding small can to determine that terminal did not accessed the doubtful pseudo-base station before Area can also think that the doubtful pseudo-base station is pseudo-base station, and terminal generates the verification result that doubtful pseudo-base station is pseudo-base station.
In another alternative embodiment, terminal can disappear according to the system of AS (Access Stratum, access layer) Breath is to verify doubtful pseudo-base station, then step 340 may include the following steps:
Step 344, the system message that base station is sent is received.
In the present embodiment with system message for for SIB (System information block, system information block) 1 into Row explanation.
Step 345, doubtful pseudo-base station is verified according to system message.
Due to may include much information in SIB1, below to the stream for verifying doubtful pseudo-base station by taking wherein several information as an example Journey is illustrated.
In the first implementation, step 345 may include the following steps:
Step 3451, public land mobile network PLMN (Land Mobile Network, the public land in SIB1 are obtained Ground mobile network) mark.
In general, a normal base station can provide service to the user of an operator, and an operator corresponds to one A PLMN mark, so, a PLMN mark can be carried in the SIB1 that normal base station is sent to terminal.If being carried in SIB1 There is at least two PLMN mark, it may be considered that the base station is pseudo-base station, so, terminal can be identified according to the PLMN in SIB1 Quantity verify doubtful pseudo-base station.
Wherein, the PLMN mark in the available SIB1 of terminal, and compare the quantity and 1 of PLMN mark, if PLMN is identified Quantity be equal to 1, then follow the steps 3452;If the quantity of PLMN mark is greater than 1,3453 are thened follow the steps.
Step 3452, if the quantity of PLMN mark is equal to 1, generating doubtful pseudo-base station not is the verification result of pseudo-base station.
Step 3453, if the quantity of PLMN mark is greater than 1, the verification result that doubtful pseudo-base station is pseudo-base station is generated.
In the second implementation, step 345 may include the following steps:
Step 3454, it determines whether configured with SIB5 in SIB1, and determines whether to receive what doubtful pseudo-base station was sent SIB5。
In general, base station if normal needs to send SIB5 to terminal, then SIB5 can be configured in SIB1, and send to terminal SIB5;Alternatively, base station if normal is not required to send SIB5 to terminal, then SIB5 will not be configured in SIB1, it will not be to terminal Send SIB5, that is, whether in SIB1 configure SIB5 with whether issue SIB5 need it is corresponding.And if base station be pseudo-base station, can To configure SIB5 in SIB1 but not send SIB5 to terminal, alternatively, configure SIB5 not in SIB1 but send SIB5 to terminal, So whether terminal can be according to whether configuring SIB5 in SIB1 and issuing SIB5 and verify doubtful pseudo-base station.
Step 3455, if configured with SIB5 and SIB5 is received in SIB1, alternatively, if SIB5 being not configured in SIB1 and does not connect SIB5 is received, then generating doubtful pseudo-base station not is the verification result of pseudo-base station.
Step 3456, if SIB5 is not received configured with SIB5 and in SIB1, alternatively, if SIB5 being not configured in SIB1 and connects SIB5 is received, then generates the verification result that doubtful pseudo-base station is pseudo-base station.
In the third implementation, step 345 may include the following steps:
Step 3457, the configuration parameter of the intra-frequency measurement in SIB1 is obtained.
Intra-frequency measurement is referred to as intra-freq reselect, and the configuration parameter of intra-frequency measurement may include Allow and not allow, wherein configuration parameter is that allow is used to indicate permission intra-frequency measurement, and configuration parameter is not allow It is used to indicate and forbids intra-frequency measurement.
Normal base station can allow terminal to carry out intra-frequency measurement, and pseudo-base station can forbid terminal to carry out intra-frequency measurement, so, Terminal can be according to whether allow intra-frequency measurement to verify doubtful pseudo-base station.
Step 3458, if configuration parameter is used to indicate permission intra-frequency measurement, generating doubtful pseudo-base station is not pseudo-base station Verification result.
If configuration parameter is allow, it is the verification result of pseudo-base station that terminal, which generates doubtful pseudo-base station not,.
Step 3459, if configuration parameter, which is used to indicate, forbids intra-frequency measurement, generating doubtful pseudo-base station is testing for pseudo-base station Demonstrate,prove result.
If configuration parameter is not allow, terminal generates the verification result that doubtful pseudo-base station is pseudo-base station.
It should be noted that terminal can be according to one or both of above-mentioned three kinds of implementations or three kinds of implementations To verify doubtful pseudo-base station.When terminal according at least two implementations to verify doubtful pseudo-base station when, can be according to any When kind implementation determines that doubtful pseudo-base station is pseudo-base station, the verification result that doubtful pseudo-base station is pseudo-base station is generated;According to institute Implementation determines doubtful pseudo-base station not when being pseudo-base station, and generating doubtful pseudo-base station not is the verification result of pseudo-base station.
For example, terminal verifies doubtful pseudo-base station with the third implementation according to the first, then terminal can be in determination The quantity of PLMN mark is greater than 1, or, configuration parameter, which is used to indicate, forbids intra-frequency measurement, or, the quantity of PLMN mark be greater than 1 and Configuration parameter is used to indicate when forbidding intra-frequency measurement, generates the verification result that doubtful pseudo-base station is pseudo-base station;Determining PLMN mark The quantity of knowledge is equal to 1 and configuration parameter is used to indicate when allowing intra-frequency measurement, and generating doubtful pseudo-base station not is the verifying of pseudo-base station As a result.
In the present embodiment, terminal can identify whether base station is pseudo-base station, increases pseudo- base by NAS layers and AS layers of joint Stand identification accuracy.In addition, being identified for pseudo-base station compared in terms of single, can effectively reduce to normal base station Erroneous judgement, thus reduce because normal base station be mistaken for pseudo-base station, and cause terminal can not normal registration into network, thus There is the problem of no-service situation.
Terminal can be combined with two kinds of optional embodiments above to verify doubtful pseudo-base station.For example, terminal can be with Doubtful pseudo-base station is first verified according to the LAI of the corresponding cell of doubtful pseudo-base station, doubtful pseudo- base is verified further according to system message It stands;Doubtful pseudo-base station can also be first verified according to system message, verified further according to the LAI of the corresponding cell of doubtful pseudo-base station Doubtful pseudo-base station, this embodiment is not limited.It is first doubtful to verify according to the LAI of the corresponding cell of doubtful pseudo-base station to terminal below Like pseudo-base station, the process that doubtful pseudo-base station is verified further according to system message is illustrated, and please refers to Fig. 4.
Step 401, terminal is from first service cell reselection to second service cell.
Step 402, it after RRC connection is established in terminal base station corresponding with second service cell, detects whether because not authenticating And continuous 4 attachments is caused to fail, if continuous 4 attachments is caused to fail because of not authenticating, then follow the steps 403.
Step 403, terminal detection terminal storage LAI list in whether include second service cell LAI, if LAI arrange The LAI for not including second service cell in table, thens follow the steps 404.
If including the LAI of second service cell in LAI list, terminal determines that base station is not pseudo-base station, terminates process.
Step 404, whether special parameter is carried in the system information of terminal detection second service cell, if carrying special ginseng Number, thens follow the steps 405.
Wherein, special parameter includes: that the quantity of PLMN mark is greater than in 1, SIB1 configured with SIB5 and does not receive SIB5, Alternatively, if SIB5 being not configured in SIB1 and receives SIB5, the configuration parameter of intra-frequency measurement is not allow.
If not carrying special parameter, terminal determines that base station is not pseudo-base station, terminates process.
Step 405, terminal determines that the corresponding base station of second service cell is pseudo-base station.
If realizing Fig. 4 using module, in an alternative embodiment, terminal may include attachment failure detection mould Block, the first memory module, LAI comparison module, the second memory module, system message comparison module and determining module, these modules Between connection relationship may refer to Fig. 5.
Wherein, attachment failure detection module is used to screen the base station of the continuous several times attachment failure before successful authentication, and The base station is classified as doubtful pseudo-base station;First memory module is used to store the base station information of doubtful pseudo-base station, including the doubtful puppet The system message that the LAI of the corresponding cell in base station and the doubtful pseudo-base station are sent;LAI comparison module is for comparing the LAI and LAI List deletes the base station information of the doubtful pseudo-base station stored in the first memory module if LAI list includes the LAI, if LAI list does not include the LAI, then the base station information of the doubtful pseudo-base station is sent to the second memory module;Second memory module For storing the base station information of the doubtful pseudo-base station of LAI comparison module transmission;System message comparison module is for comparing second Parameter in system message and default special parameter in memory module are deleted if the parameter is different from default special parameter The base station information of the doubtful pseudo-base station in second memory module is deposited if the parameter is identical as default special parameter by second The base station information of the doubtful pseudo-base station in storage module is sent to determining module;Determining module is used for the base to the doubtful pseudo-base station Information of standing is arranged, and carries out pseudo-base station confirmation, and outputting base station is the judgement result of pseudo-base station.
It, in another alternative embodiment, can be by the LAI comparison module in Fig. 5 if realizing Fig. 4 using module Information comparison module is merged into system message detection module and is compared simultaneously, then terminal may include attachment failure detection Module, the first memory module, information comparison module, the second memory module and determining module, the connection relationship between these modules It may refer to Fig. 6.
Wherein, attachment failure detection module is used to screen the base station of the continuous several times attachment failure before successful authentication, and The base station is classified as doubtful pseudo-base station;First memory module is used to store the base station information of doubtful pseudo-base station, including the doubtful puppet The system message that base station is sent;Second memory module is used to store the LAI of the corresponding cell of the doubtful pseudo-base station;Information comparison mould Block compares the parameter in the system message in the second memory module and presets special ginseng for comparing LAI the and LAI list Number, if LAI list includes the LAI, and the parameter in the system message in the second memory module is different with default special parameter, then The base station information of the doubtful pseudo-base station stored in the first memory module is deleted, and retains the LAI in the second memory module, is given over to Identification next time pseudo-base station compares information;If LAI list does not include LAI, and the ginseng in the system message in the second memory module Several and default special parameter is identical, then the base station information of the doubtful pseudo-base station in the first memory module is sent to determining mould Block, and special marking is carried out to the LAI in the second memory module, it is convenient for subsequent identification pseudo-base station;Determining module is used to doubt this It is arranged like the base station information of pseudo-base station, carries out pseudo-base station confirmation, and outputting base station is the judgement result of pseudo-base station.
Following is the application Installation practice, can be used for executing the application embodiment of the method.It is real for the application device Undisclosed details in example is applied, the application embodiment of the method is please referred to.
Fig. 7 shows the structural block diagram of the pseudo-base station identification device of one exemplary embodiment of the application offer.The puppet base Stand identification device can by software, hardware or both be implemented in combination with as terminal all or part of.The device packet It includes:
Statistical module 710, for establishing after RRC connect in terminal and base station, the number of statistics Attachments failure is attached Be unsuccessfully to occur before base station and terminal successful authentication;
First determining module 720 determines base station when the number for obtaining in statistical module 710 is more than predetermined threshold For doubtful pseudo-base station;
Authentication module 730, the doubtful pseudo-base station for determining to the first determining module 720 are verified, and are tied according to verifying Fruit determines whether doubtful pseudo-base station is pseudo-base station.
In an alternative embodiment, authentication module 730 is also used to:
Obtain the LAI list of terminal, the LAI of the cell accessed in LAI list comprising terminal;
If the LAI comprising cell corresponding to doubtful pseudo-base station in LAI list, generating doubtful pseudo-base station is not pseudo-base station Verification result;
If not including the LAI of cell corresponding to doubtful pseudo-base station in LAI list, generating doubtful pseudo-base station is pseudo-base station Verification result.
In an alternative embodiment, authentication module 730 is also used to:
Receive the system message that base station is sent;
Doubtful pseudo-base station is verified according to system message.
In an alternative embodiment, when system message includes SIB1, authentication module 730 is also used to:
Obtain the PLMN mark in SIB1;
If the quantity of PLMN mark is equal to 1, generating doubtful pseudo-base station not is the verification result of pseudo-base station;
If the quantity of PLMN mark is greater than 1, the verification result that doubtful pseudo-base station is pseudo-base station is generated.
In an alternative embodiment, when system message includes system information block SIB1, authentication module 730 is also used In:
It determines whether configured with SIB5 in SIB1, and determines whether to receive the SIB5 that doubtful pseudo-base station is sent;
If configured with SIB5 and receiving SIB5 in SIB1, alternatively, if SIB5 is not configured in SIB1 and does not receive SIB5, Then generating doubtful pseudo-base station not is the verification result of pseudo-base station;
If not receiving configured with SIB5 and SIB5 in SIB1, alternatively, if SIB5 is not configured in SIB1 and receives SIB5, Then generate the verification result that doubtful pseudo-base station is pseudo-base station.
In an alternative embodiment, when system message includes system information block SIB1, authentication module 730 is also used In:
Obtain the configuration parameter of the intra-frequency measurement in SIB1;
If configuration parameter is used to indicate permission intra-frequency measurement, generating doubtful pseudo-base station not is the verification result of pseudo-base station;
If configuration parameter, which is used to indicate, forbids intra-frequency measurement, the verification result that doubtful pseudo-base station is pseudo-base station is generated.
Referring to FIG. 8, in an alternative embodiment, the device further include:
Second determining module 740, if the RRC Connection Release information for receiving base station transmission before authentication, really Fixed attachment failure;Alternatively,
Third determining module 750, if not initiating the authorizing procedure with terminal for base station, it is determined that attachment failure.
In conclusion pseudo-base station identification device provided in this embodiment is built if base station is pseudo-base station in terminal and base station After vertical RRC connection, base station may lead to terminal attachment failure before with terminal successful authentication, to make terminal and GSM Connection is established in base station, which is pseudo-base station.Above-mentioned characteristic based on pseudo-base station, terminal can count Attachments failure Number, due to attachment be unsuccessfully occur before base station and terminal successful authentication, so, if number is more than predetermined threshold, Base station can be then determined as to doubtful pseudo-base station, then, terminal can continue to verify doubtful pseudo-base station, and according to verifying As a result determine whether doubtful pseudo-base station is pseudo-base station, in this way, both can be more than predetermined threshold by the number of Attachments failure This condition avoids normal Base Station from being identified as pseudo-base station, can also verify whether base station is pseudo-base station from many aspects, from And improve the accuracy of pseudo-base station identification.
The embodiment of the present application also provides a kind of computer-readable medium, which has at least one Instruction, at least one instruction are loaded as the processor and are executed to realize that pseudo-base station described in as above each embodiment is known Other method.
The embodiment of the present application also provides a kind of computer program product, which is stored at least one Instruction, at least one instruction are loaded as the processor and are executed to realize that pseudo-base station described in as above each embodiment is known Other method.
It should be understood that pseudo-base station identification device provided by the above embodiment is when executing pseudo-base station recognition methods, only The example of the division of the above functional modules, in practical application, can according to need and by above-mentioned function distribution by Different functional modules is completed, i.e., the internal structure of equipment is divided into different functional modules, described above complete to complete Portion or partial function.In addition, pseudo-base station identification device provided by the above embodiment belongs to pseudo-base station recognition methods embodiment Same design, specific implementation process are detailed in embodiment of the method, and which is not described herein again.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The above is not to limit the application, within the spirit and principles of this application, made any modification, Equivalent replacement, improvement etc., should be included within the scope of protection of this application.

Claims (10)

1. a kind of pseudo-base station recognition methods, which is characterized in that the described method includes:
It is established after radio resource control RRC connect in terminal and base station, the number of statistics Attachments failure, the attachment mistake Lose is occurred before the base station and the terminal successful authentication;
If the number is more than predetermined threshold, the base station is determined as doubtful pseudo-base station;
The doubtful pseudo-base station is verified, determines whether the doubtful pseudo-base station is pseudo-base station according to verification result.
2. the method according to claim 1, wherein described verify the doubtful pseudo-base station, comprising:
The Location Area Identification LAI list of the terminal is obtained, includes the cell that the terminal had accessed in the LAI list LAI;
If the LAI comprising cell corresponding to the doubtful pseudo-base station in the LAI list, generates the doubtful pseudo-base station not It is the verification result of pseudo-base station;
If not including the LAI of cell corresponding to the doubtful pseudo-base station in the LAI list, the doubtful pseudo-base station is generated It is the verification result of pseudo-base station.
3. the method according to claim 1, wherein described verify the doubtful pseudo-base station, comprising:
Receive the system message that the base station is sent;
The doubtful pseudo-base station is verified according to the system message.
4. according to the method described in claim 3, it is characterized in that, when the system message includes system information block SIB1, It is described that the doubtful pseudo-base station is verified according to the system message, comprising:
Obtain the public land mobile network PLMN mark in the SIB1;
If the quantity of the PLMN mark is equal to 1, the verification result that the doubtful pseudo-base station is not pseudo-base station is generated;
If the quantity of the PLMN mark is greater than 1, the verification result that the doubtful pseudo-base station is pseudo-base station is generated.
5. according to the method described in claim 3, it is characterized in that, when the system message includes system information block SIB1, It is described that the doubtful pseudo-base station is verified according to the system message, comprising:
It determines whether configured with SIB5 in the SIB1, and determines whether to receive the described of the doubtful pseudo-base station transmission SIB5;
If configured with SIB5 and the SIB5 is received in the SIB1, alternatively, if SIB5 being not configured in the SIB1 and does not connect The SIB5 is received, then generates the verification result that the doubtful pseudo-base station is not pseudo-base station;
If the SIB5 is not received configured with SIB5 and in the SIB1, alternatively, if SIB5 being not configured in the SIB1 and connects The SIB5 is received, then generates the verification result that the doubtful pseudo-base station is pseudo-base station.
6. according to the method described in claim 3, it is characterized in that, when the system message includes system information block SIB1, It is described that the doubtful pseudo-base station is verified according to the system message, comprising:
Obtain the configuration parameter of the intra-frequency measurement in the SIB1;
If the configuration parameter is used to indicate permission intra-frequency measurement, the verifying knot that the doubtful pseudo-base station is not pseudo-base station is generated Fruit;
If the configuration parameter, which is used to indicate, forbids intra-frequency measurement, the verifying knot that the doubtful pseudo-base station is pseudo-base station is generated Fruit.
7. method according to any one of claims 1 to 6, which is characterized in that the method also includes:
If receiving the RRC Connection Release information that the base station is sent before authentication, it is determined that attachment failure;Alternatively,
If the base station does not initiate the authorizing procedure with the terminal, it is determined that attachment failure.
8. a kind of pseudo-base station identification device, which is characterized in that described device includes:
Statistical module, for establishing time of statistics Attachments failure after radio resource control RRC connect in terminal and base station Number, the attachment are occurred before the base station and the terminal successful authentication;
First determining module, it is when the number for obtaining in the statistical module is more than predetermined threshold, the base station is true It is set to doubtful pseudo-base station;
Authentication module, the doubtful pseudo-base station for determining to first determining module is verified, according to verification result Determine whether the doubtful pseudo-base station is pseudo-base station.
9. a kind of terminal, which is characterized in that the terminal includes processor and memory, and at least one is stored in the memory Item instruction, described instruction are loaded by the processor and are executed to realize the pseudo-base station identification as described in claim 1 to 7 is any Method.
10. a kind of computer readable storage medium, which is characterized in that be stored at least one instruction, institute in the storage medium Instruction is stated to be loaded by processor and executed to realize the pseudo-base station recognition methods as described in claim 1 to 7 is any.
CN201910769065.5A 2019-08-20 2019-08-20 Pseudo base station identification method, pseudo base station identification device, terminal and storage medium Active CN110312259B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910769065.5A CN110312259B (en) 2019-08-20 2019-08-20 Pseudo base station identification method, pseudo base station identification device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910769065.5A CN110312259B (en) 2019-08-20 2019-08-20 Pseudo base station identification method, pseudo base station identification device, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN110312259A true CN110312259A (en) 2019-10-08
CN110312259B CN110312259B (en) 2023-03-24

Family

ID=68083648

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910769065.5A Active CN110312259B (en) 2019-08-20 2019-08-20 Pseudo base station identification method, pseudo base station identification device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN110312259B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111988784A (en) * 2020-08-04 2020-11-24 深圳传音控股股份有限公司 Information processing method, terminal equipment and storage medium
WO2021093823A1 (en) * 2019-11-14 2021-05-20 中兴通讯股份有限公司 Pseudo base station identification method and system, and computer readable storage medium
CN113068192A (en) * 2021-03-17 2021-07-02 Oppo广东移动通信有限公司 Pseudo base station identification method and device, terminal and storage medium
CN113099455A (en) * 2021-03-15 2021-07-09 重庆邮电大学 Method for capturing and resisting capture of mobile phone number of LTE terminal user
WO2023160339A1 (en) * 2022-02-22 2023-08-31 华为技术有限公司 Communication method and apparatus
WO2024104082A1 (en) * 2022-11-16 2024-05-23 维沃移动通信有限公司 Information processing method and apparatus, and terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106358199A (en) * 2016-09-30 2017-01-25 维沃移动通信有限公司 Method for recognizing pseudo base station by mobile terminal and mobile terminal
CN107567030A (en) * 2017-10-19 2018-01-09 中国电信股份有限公司南京分公司 A kind of method and system investigated with evading pseudo-base station interference
CN107911822A (en) * 2017-10-31 2018-04-13 珠海市魅族科技有限公司 Pseudo-base station detection method and device, terminal and computer-readable recording medium
CN109195217A (en) * 2018-10-23 2019-01-11 Oppo广东移动通信有限公司 The processing method and processing device of LTE network refusal behavior

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106358199A (en) * 2016-09-30 2017-01-25 维沃移动通信有限公司 Method for recognizing pseudo base station by mobile terminal and mobile terminal
CN107567030A (en) * 2017-10-19 2018-01-09 中国电信股份有限公司南京分公司 A kind of method and system investigated with evading pseudo-base station interference
CN107911822A (en) * 2017-10-31 2018-04-13 珠海市魅族科技有限公司 Pseudo-base station detection method and device, terminal and computer-readable recording medium
CN109195217A (en) * 2018-10-23 2019-01-11 Oppo广东移动通信有限公司 The processing method and processing device of LTE network refusal behavior

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021093823A1 (en) * 2019-11-14 2021-05-20 中兴通讯股份有限公司 Pseudo base station identification method and system, and computer readable storage medium
CN111988784A (en) * 2020-08-04 2020-11-24 深圳传音控股股份有限公司 Information processing method, terminal equipment and storage medium
CN113099455A (en) * 2021-03-15 2021-07-09 重庆邮电大学 Method for capturing and resisting capture of mobile phone number of LTE terminal user
CN113068192A (en) * 2021-03-17 2021-07-02 Oppo广东移动通信有限公司 Pseudo base station identification method and device, terminal and storage medium
WO2023160339A1 (en) * 2022-02-22 2023-08-31 华为技术有限公司 Communication method and apparatus
WO2024104082A1 (en) * 2022-11-16 2024-05-23 维沃移动通信有限公司 Information processing method and apparatus, and terminal

Also Published As

Publication number Publication date
CN110312259B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
CN110312259A (en) Pseudo-base station recognition methods, device, terminal and storage medium
US20150105080A1 (en) Method for Handover Between Operator Networks, User Equipment, and Remote Management Platform
US20090163173A1 (en) Unauthorized call activity detection in a cellular communication system
EP2389032A1 (en) Realization method and related device for switching control
CN106878988A (en) Register method
CN108462972A (en) Method and apparatus for handling NAS signaling request in a wireless communication system
US9232440B2 (en) Method and apparatus for controlling system overload in a wireless communication system
CN106211167A (en) A kind of terminal, pseudo-base station recognition methods and system
CN107948976A (en) The detection method and device of LTE network access result, computer-readable storage medium
WO2016173339A1 (en) Network access method and mobile communication terminal
CN111278036B (en) Method and device for acquiring MAC address
CN107820716A (en) The falling result detection method and device of CSFB a kind of, computer-readable storage medium
CN111787575B (en) Network access management method and device for terminal equipment
CN113206814A (en) Network event processing method and device and readable storage medium
US6161006A (en) System and method for the early detection of cellular telephone piracy
CN110351722B (en) Information sending method, key generation method and device
CN109195203A (en) Method for parameter configuration, device, terminal and the storage medium of WLAN
CN107948994A (en) The detection method and device of network insertion result, computer-readable storage medium
CN107980232A (en) The falling result detection method and device of CSFB a kind of, computer-readable storage medium
CN107071807A (en) A kind of method for network access and mobile terminal
CN103458499A (en) Off-line processing method and equipment
CN110475380A (en) Control method and user equipment in user equipment
CN108040336A (en) The detection method and device of network insertion result, computer-readable storage medium
CN107948995A (en) The detection method and device of LTE network access result, computer-readable storage medium
CN107995635A (en) The detection method and device of network insertion result, computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant