CN112655237A - Pseudo base station prevention method and device, mobile terminal and storage medium - Google Patents

Pseudo base station prevention method and device, mobile terminal and storage medium Download PDF

Info

Publication number
CN112655237A
CN112655237A CN201880097378.4A CN201880097378A CN112655237A CN 112655237 A CN112655237 A CN 112655237A CN 201880097378 A CN201880097378 A CN 201880097378A CN 112655237 A CN112655237 A CN 112655237A
Authority
CN
China
Prior art keywords
control switch
sub
mobile terminal
base station
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201880097378.4A
Other languages
Chinese (zh)
Inventor
李伟清
唐凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd, Shenzhen Huantai Technology Co Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN112655237A publication Critical patent/CN112655237A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application discloses a pseudo base station prevention method and device, a mobile terminal and a storage medium, and relates to the technical field of mobile terminals. The method is applied to the mobile terminal, and comprises the following steps: detecting the state of a control switch of the mobile terminal, wherein the control switch is used for controlling the starting or closing of the pseudo base station precaution function of the mobile terminal, judging whether the state of the control switch is in the opening state or not, and controlling the mobile terminal to enter the pseudo base station precaution mode when the state of the control switch is in the opening state. According to the pseudo base station precaution method and device, the mobile terminal and the storage medium, the pseudo base station precaution control switch is additionally arranged on the mobile terminal, and a user can control the control switch to be turned on and off so as to precaution the pseudo base station, and information safety of the mobile terminal is improved.

Description

Pseudo base station prevention method and device, mobile terminal and storage medium Technical Field
The present application relates to the field of mobile terminal technologies, and in particular, to a method and an apparatus for preventing a pseudo base station, a mobile terminal, and a storage medium.
Background
The pseudo base station is a pseudo base station, the pseudo base station generally comprises a host and a notebook computer, mobile phone card information within a certain radius range centered on the pseudo base station can be searched by related equipment such as a short message group sender, a short message sender and the like, and by utilizing the defects of mobile communication, the pseudo base station serves as a base station of an operator and forces to send short messages such as fraud, advertising promotion and the like to a mobile phone of a user by pretending to be the mobile phone number of other people.
Disclosure of Invention
In view of the above problems, the present application provides a method, an apparatus, a mobile terminal and a storage medium for preventing a pseudo base station, so as to solve the above problems.
In a first aspect, an embodiment of the present application provides a pseudo base station precaution method, which is applied to a mobile terminal, and the method includes: detecting the state of a control switch of the mobile terminal, wherein the control switch is used for controlling the start or the close of a pseudo base station prevention function of the mobile terminal; judging whether the state of the control switch is in an open state or not; and when the state of the control switch is in an opening state, controlling the mobile terminal to enter a pseudo base station prevention mode.
In a second aspect, an embodiment of the present application provides a pseudo base station precaution device, which is applied to a mobile terminal, and the device includes: the detection module is used for detecting the state of a control switch of the mobile terminal, and the control switch is used for controlling the start or the stop of the pseudo base station prevention function of the mobile terminal; the judging module is used for judging whether the state of the control switch is in an opening state or not; and the control module is used for controlling the mobile terminal to enter a pseudo base station prevention mode when the state of the control switch is in an open state.
In a third aspect, an embodiment of the present application provides a mobile terminal, including: a memory; one or more processors coupled with the memory; one or more programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the above-described methods.
In a fourth aspect, the present application provides a computer-readable storage medium, in which a program code is stored, and the program code can be called by a processor to execute the above method.
The embodiment of the application provides a pseudo base station precaution method, a device, a mobile terminal and a storage medium, the state of a control switch of the mobile terminal is detected, the control switch is used for controlling the pseudo base station precaution function of turning on or turning off the mobile terminal, whether the state of the control switch is in an on state or not is judged, when the state of the control switch is in the on state, the mobile terminal is controlled to enter a pseudo base station precaution mode, and therefore the control switch for pseudo base station precaution is added on the mobile terminal, a user can control the on and off of the control switch to precaution against a pseudo base station, and the information safety of the mobile terminal is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram illustrating a system architecture of a mobile communication network according to an embodiment of the present application;
fig. 2 is a schematic system architecture diagram of another mobile communication network provided in the embodiment of the present application;
fig. 3 is a schematic flowchart illustrating a method for preventing a pseudo base station according to an embodiment of the present application;
fig. 4 is a schematic interface diagram of a mobile terminal according to an embodiment of the present application;
fig. 5 is a schematic flowchart illustrating a false base station prevention method according to another embodiment of the present application;
fig. 6 is a schematic diagram illustrating still another interface of a mobile terminal according to an embodiment of the present application;
fig. 7 is a schematic interface diagram of a mobile terminal according to an embodiment of the present application;
fig. 8 is a schematic flowchart illustrating a method for preventing a pseudo base station according to still another embodiment of the present application;
fig. 9 is a flowchart illustrating a step S350 of the pseudo base station prevention method illustrated in fig. 8 of the present application;
fig. 10 is a schematic flowchart illustrating a method for preventing a pseudo base station according to another embodiment of the present application;
fig. 11 is a flowchart illustrating a step S450 of the pseudo base station prevention method illustrated in fig. 10 of the present application;
fig. 12 is a schematic flowchart illustrating a method for preventing false base station according to still another embodiment of the present application;
fig. 13 is a schematic flowchart illustrating a false base station prevention method according to yet another embodiment of the present application;
FIG. 14 is a block diagram of a pseudo base station prevention apparatus according to an embodiment of the present disclosure;
FIG. 15 is a block diagram of a control module of a pseudo base station prevention device according to an embodiment of the present disclosure;
fig. 16 is a block diagram of an electronic device according to an embodiment of the present application, configured to execute a pseudo base station prevention method according to an embodiment of the present application;
fig. 17 shows a storage unit for storing or carrying a program code for implementing the pseudo base station prevention method according to the embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
With the great development of mobile communication technology, mobile communication has undergone the development of multiple versions, 2G, 3G, and 4G. Regardless of the gsm (global System for Mobile communication) communication System or cdma (code Division Multiple access) communication System in the early 2G era, or the LTE (long term evolution) System architecture in the later 4G era, the base station is an important communication device.
For example, the 2G mobile communication system architecture diagram shown in fig. 1. BTS Base Station 99(Base Station Controller) is connected to Base Station Controller 98 as an access device for mobile communication, then Base Station Controller 98 is connected to mobile switching center 97, and mobile switching center 97 is also connected to public switched telephone network 96. For another example, fig. 2 is a schematic diagram of a 4G mobile communication system architecture. The eNB base station 95 is connected to an MME (mobility Management entity), namely a mobility Management node 94, the MME is connected to a serving gateway 93, the serving gateway 93 is connected to a packet data gateway 92, and the packet data gateway 92 is connected to a packet data network 91. As can be seen from fig. 1 and 2, in the mobile communication system, the base station is a device that directly establishes a connection with the mobile terminal, and has a relatively important position in the whole system architecture. The base station, generally referred to as a "public mobile communication base station," is mainly used for providing signals to mobile terminals such as mobile phones and tablet computers. As communication technology has advanced, the inventors have discovered the presence of a pseudo base station.
The pseudo base station is an illegal base station outside a mobile communication network, generally comprises a host and a notebook computer, can search mobile phone card information within a certain radius range by taking the pseudo base station as a center through related equipment such as a short message group sender, a short message sender and the like, and forcibly sends short messages such as fraud, advertising promotion and the like to a mobile phone of a user by pretending to be a base station of an operator through the defect of 2G mobile communication by pretending to be a mobile phone number of other people.
When the pseudo base station equipment runs, a wireless signal sent by the mobile terminal is forcibly connected to the equipment, so that the mobile terminal cannot normally use services provided by an operator, the mobile terminal is normally recovered after temporarily disconnecting the network for 8-12 seconds, and part of the mobile terminals need to be turned on and off to access the network again. In addition, it may cause the mobile terminal user to frequently update the location, so that the wireless network resources in the area are strained and network congestion occurs, which affects the normal communication of the user.
In view of the above problems, the inventor has made long-term research and has proposed a method and an apparatus for preventing a pseudo base station, a mobile terminal, and a storage medium, in which a control switch for preventing a pseudo base station is added to a mobile terminal, so that a user can control the control switch to be turned on and off to prevent the pseudo base station and improve the information security of the mobile terminal.
Examples
Referring to fig. 3, fig. 3 is a schematic flowchart illustrating a pseudo base station precaution method according to an embodiment of the present application, where the pseudo base station precaution method is used to add a control switch for pseudo base station precaution to a mobile terminal, and a user may control the control switch to be turned on and off to precaution the pseudo base station, so as to improve information security of the mobile terminal. In a specific embodiment, the pseudo base station precaution method is applied to the pseudo base station precaution device 200 shown in fig. 14 and the mobile terminal 100 (fig. 16) configured with the pseudo base station precaution device 200, and a specific flow of the embodiment will be described below by taking the mobile terminal as an example. As will be described in detail with respect to the flow shown in fig. 3, the method for guarding against the pseudo base station may specifically include the following steps:
step S110: and detecting the state of a control switch of the mobile terminal, wherein the control switch is used for controlling the start or the stop of the pseudo base station precaution function of the mobile terminal.
In this embodiment, the mobile terminal is provided with a control switch, as shown in fig. 4, and fig. 4 shows an interface schematic diagram of the mobile terminal provided in this embodiment of the present application. The control switch may be formed on the display interface of the mobile terminal in the form of a control, or may be formed on the display interface of the mobile terminal in the form of a card, which is not limited herein. In addition, the control switch may be located at the same level as the display interface, or may be suspended above the display interface, which is not limited herein.
As one approach, the mobile terminal may establish a variable and then use the variable value to identify the state of the control switch. For example, the variable value may include 1 and 0, where if the variable value is 1, it indicates that the control switch is in an open state, and accordingly, the control switch controls to turn on a pseudo base station prevention function of the mobile terminal; if the variable value is 0, the control switch is in a closed state, and correspondingly, the control switch controls the pseudo base station prevention function of the mobile terminal to be closed.
In addition, as a first embodiment, the control switch of the mobile terminal may be turned on or off by a user manual control. Specifically, the control switch is displayed on an interface of the mobile terminal, for example, a setting interface of the mobile terminal, and then a touch operation acting on the control switch is detected, wherein the touch operation may include a click operation, a press operation, and the like. As one mode, the control switch includes a first display position and a second display position, and the first display position and the second display position are not overlapped, when a touch operation acting on the first display position of the control switch is detected, the control switch is turned on by representing the touch operation instruction, and when a touch operation acting on the second display position of the control switch is detected, the control switch is turned off by representing the touch operation instruction. As another mode, the control switch includes a third display position, and when the control switch is in the off state and a touch operation acting on the third display position is detected, the control switch is turned on by the representation of the touch operation instruction, and when the control switch is in the on state and a touch operation acting on the third display position is detected, the control switch is turned off by the representation of the touch operation instruction.
As a second implementation manner, the control switch of the mobile terminal may be turned on or off by a user voice control. Specifically, voice information input into the mobile terminal is received, the voice information is analyzed, and when the analysis result shows that the voice information comprises instruction information indicating to turn on the control switch, the voice information is represented to indicate to turn on the control switch; and when the analysis result shows that the voice information comprises instruction information indicating to close the control switch, representing that the voice information indicates to close the control switch.
As a third implementation, the control switch of the mobile terminal may be automatically controlled to be turned on or off by the mobile terminal. Specifically, the mobile terminal may configure a time for automatically turning on the control switch, a time for automatically turning off the control switch, a place for automatically turning on the control switch, a place for automatically turning off the control switch, or the like, which is not limited herein. For example, taking a place where an automatic on/off control switch is configured as an example, when the mobile terminal is configured with a home-off control switch and a home-away on control switch, the mobile terminal may collect its location information by using a GPS (Global Positioning System) function, turn off the control switch when the location information indicates that the mobile terminal is located at home, and turn on the control switch when the location information indicates that the mobile terminal is not located at home.
Step S120: and judging whether the state of the control switch is in an opening state or not.
Further, based on the above embodiments, the state of the control switch of the mobile terminal may be determined by detecting a state value of the mobile terminal, wherein when the state value of the mobile terminal is detected to be 1, the control switch of the current mobile terminal may be determined to be in an on state, and when the state value of the mobile terminal is detected to be 0, the control switch of the current mobile terminal may be determined to be in an off state.
Step S130: and when the state of the control switch is in an opening state, controlling the mobile terminal to enter a pseudo base station prevention mode.
In this embodiment, when it is determined that the state value of the mobile terminal is 1, the state representing the control switch is in an open state, and accordingly, the mobile terminal enters a pseudo base station prevention mode to prevent the pseudo base station from attacking the mobile terminal.
As a way, when the mobile terminal is normally turned on or restarted, the control switch is turned on, that is, the control switch is turned on by default.
An embodiment of the present application provides a pseudo base station precaution method, detect the state of mobile terminal's control switch, this control switch is used for controlling the pseudo base station precaution function who opens or closes mobile terminal, judge whether this control switch's state is in the on-state, when this control switch's state is in the on-state, control mobile terminal gets into pseudo base station precaution mode, thereby through the control switch who increases pseudo base station precaution at mobile terminal, the user can control opening and closing of this control switch, in order to take precautions against pseudo base station, promote mobile terminal's information security.
Referring to fig. 5, fig. 5 is a schematic flowchart illustrating a false base station prevention method according to another embodiment of the present application. The control switch includes a plurality of sub-control switches, the pseudo base station precaution mode includes a plurality of sub-precaution modes, and the following will explain in detail with respect to the flow shown in fig. 5, and the pseudo base station precaution method specifically may include the following steps:
step S210: and detecting the state of a control switch of the mobile terminal, wherein the control switch is used for controlling the start or the stop of the pseudo base station precaution function of the mobile terminal.
Step S220: and judging whether the state of the control switch is in an opening state or not.
For the detailed description of steps S210 to S220, refer to steps S110 to S120, which are not described herein again.
Step S230: detecting the states of the plurality of sub control switches when the state of the control switch is in an open state.
In this embodiment, the control switch includes a plurality of sub-control switches, wherein when the control switch is in an open state, each of the plurality of sub-control switches may be in an open state or a closed state, and when the control switch is in a closed state, each of the plurality of sub-control switches is in a closed state. As one way, as shown in fig. 6, fig. 6 shows another interface schematic diagram of a mobile terminal provided in the embodiment of the present application, where when the control switch is in an open state, the mobile terminal may display a setting interface of a plurality of sub-control switches below the control switch. As another way, as shown in fig. 7, fig. 7 shows another interface schematic diagram of a mobile terminal provided in the embodiment of the present application, where when the control switch is in an off state, the mobile terminal may jump from the display interface of the control switch to the setting interface of the multiple sub-control switches.
It can be understood that, when the control switch is in the open state, each of the plurality of sub-control switches may be in the open state or in the closed state. Therefore, when it is determined that the control switch is in the on state, the states of the plurality of sub control switches may be detected respectively, as a mode, the mobile terminal may set a variable value for each sub control switch, and then determine whether the sub control switch is in the on state by detecting the variable value of each sub control switch, where a specific determination mode is similar to the determination mode of the control switch, and is not described herein again.
Step S240: and acquiring a target sub-control switch of the plurality of sub-control switches, wherein the state of the sub-control switch is in an open state.
Further, the states of the plurality of sub-control switches are detected respectively, the state of each sub-control switch is obtained, and the sub-control switch in the open state is obtained from the plurality of sub-control switches according to the detection result and is marked as the target sub-control switch. It is understood that the number of the sub control switches in the open state among the plurality of sub control switches may be 0, 1 or more, and thus, the target sub control switch may be 0, 1 or more, which is not limited herein. For example, the sub control switches include a first sub control switch, a second sub control switch, and a third sub control switch, and the first sub control switch and the third sub control switch are in an open state, and the second sub control switch is in a closed state, then the target sub control switch may include the first sub control switch and the third sub control switch.
Step S250: and determining a target sub-precaution mode corresponding to the target sub-control switch from the plurality of sub-precaution modes.
In this embodiment, the pseudo base station precaution mode includes a plurality of sub precaution modes, where each sub control switch in the plurality of sub control switches may correspond to one or more sub precaution modes, and in addition, each sub precaution mode in the plurality of sub precaution modes may also correspond to one or more sub control switches.
As one mode, the mobile terminal may preset a mapping relationship table, where the mapping relationship table includes a corresponding relationship between the sub-control switches and the sub-precaution modes, as shown in table 1, where a first sub-control switch corresponds to a first sub-precaution mode, a second sub-control switch corresponds to a second sub-precaution mode, a third sub-control switch corresponds to a third sub-precaution mode, and a fourth sub-control switch corresponds to a fourth sub-precaution mode. Therefore, after the target sub-control switch is determined, the sub-control switch that is consistent with the target sub-control switch may be searched from the mapping relation table, and then the sub-protection mode corresponding to the target sub-control switch may be searched as the target sub-protection mode based on the corresponding relation in the mapping relation table.
TABLE 1
Sub-control switch Sub-prevention mode
First sub-control switch First sub-prevention mode
Second sub-control switch Second sub-prevention mode
Third sub-control switch Third sub-prevention mode
Fourth sub-control switch Fourth sub-prevention mode
...... ......
For example, when the target sub control switch includes the first sub control switch and the third sub control switch, then the target sub prevention mode includes the first sub prevention mode and the third sub prevention mode.
Step S260: and controlling the mobile terminal to enter the target sub-precaution mode.
Further, the mobile terminal is controlled to enter the sub precaution mode corresponding to the opened sub control switch, and it can be understood that the number of the sub precaution modes may be one, or may be multiple, and is not limited herein. When the number of the sub precaution modes is one, the mobile terminal is controlled to enter the sub precaution mode, and when the number of the sub precaution modes is multiple, the mobile terminal is controlled to simultaneously enter a plurality of sub precaution modes. For example, when the target sub precaution mode includes a first sub precaution mode and a third sub precaution mode, the mobile terminal is controlled to enter the first sub precaution mode and the third sub precaution mode simultaneously.
Step S270: detecting a touch operation acting on the control switch.
As a mode, after the mobile terminal enters the target sub-precaution mode, the touch operation acting on the control switch is detected, where the touch operation may include single-finger click, continuous long-time click, continuous ultra-long-time click, double-finger long-time click, multi-finger continuous click, and the like, where the single-finger click refers to single-finger click on the control switch, the continuous long-time click refers to a continuous pressing time length exceeding a preset time length, the continuous ultra-long-time click refers to a pressing time length exceeding a preset ultra-long time length, the double-finger long-time click refers to a simultaneous pressing time length exceeding a preset time length, and the multi-finger continuous connection refers to a number of continuous clicks exceeding a preset number.
Step S280: and when the touch operation indicates to close the control switch, closing the control switch in response to the touch operation and controlling the mobile terminal to exit the pseudo base station precaution mode.
If the control switch is in the on state and the touch operation acting on the control switch is detected, it may be determined that the touch operation indicates to turn off the control switch, and then the mobile terminal may turn off the control switch in response to the touch operation.
In this embodiment, when the touch operation indicates to turn off the control switch, since the control switch includes a plurality of sub-control switches, all the sub-control switches need to be turned off correspondingly. And when the touch operation acts on the sub-control switches, the sub-control switches indicated by the touch operation are correspondingly closed, and other sub-control switches are not required to be closed.
In another embodiment of the present application, a method for guarding against a pseudo base station is provided, where a state of a control switch of a mobile terminal is detected, the control switch is used to control a function of guarding against a pseudo base station of turning on or off the mobile terminal, and determine whether the state of the control switch is in an on state, when the state of the control switch is in the on state, the states of a plurality of sub-control switches are detected, a target sub-control switch of the plurality of sub-control switches, the state of which is in the on state, is obtained, a target sub-guard mode corresponding to the target sub-control switch is determined from the plurality of sub-guard modes, a touch operation applied to the control switch is detected, and when the touch operation indicates to turn off the control switch, the control switch is turned off in response to the touch operation and the mobile terminal is controlled to exit. Compared with the pseudo base station precaution method shown in fig. 3, the control switch in this embodiment further includes a plurality of sub-control switches, and different pseudo base station precaution functions of the mobile terminal can be turned on or turned off through the plurality of sub-control switches respectively, so that the pseudo base station can be prevented in different modes, and the precaution rationality of the pseudo base station is improved.
Referring to fig. 8, fig. 8 is a schematic flowchart illustrating a method for preventing false base station according to still another embodiment of the present application. The sub-control switch includes a first sub-control switch, and a sub-precaution mode corresponding to the first sub-control switch is a network logout flight mode, which will be described in detail with reference to the flow shown in fig. 8, where the pseudo base station precaution method specifically includes the following steps:
step S310: and detecting the state of a control switch of the mobile terminal, wherein the control switch is used for controlling the start or the stop of the pseudo base station precaution function of the mobile terminal.
Step S320: and judging whether the state of the control switch is in an opening state or not.
Step S330: detecting the states of the plurality of sub control switches when the state of the control switch is in an open state.
Step S340: and acquiring a target sub-control switch of the plurality of sub-control switches, wherein the state of the sub-control switch is in an open state.
For detailed description of steps S310 to S340, refer to steps S210 to S240, which are not described herein again.
Step S350: and when the target sub-control switch comprises a first sub-control switch, controlling the mobile terminal to log off the network and enter a flight mode.
As a mode, the sub-control switch includes a first sub-control switch, where a sub-precaution mode corresponding to the first sub-control switch is that the injector pin network enters a flight mode, and in this embodiment, when the target sub-control switch includes the first sub-control switch, it represents that the first sub-control switch is in an open state, so that the mobile terminal may be controlled to enter the sub-precaution mode corresponding to the first sub-control switch, that is, the mobile terminal is controlled to logout the network and enter the flight mode. Specifically, because the area where the mobile terminal is located may have the pseudo base station, and the pseudo base station attacks the mobile terminal through the network, the mobile terminal may be attacked by the pseudo base station at any time in the network using process in the area, and therefore, in order to avoid the mobile terminal being attacked by the pseudo base station, the mobile terminal may be controlled to log off the network and enter the flight mode, so that the pseudo base station may be prevented from attacking the mobile terminal through the network, and the information security of the mobile terminal is improved.
Referring to fig. 9, fig. 9 is a flowchart illustrating a step S350 of the pseudo base station prevention method illustrated in fig. 8 according to the present application. As will be explained in detail with respect to the flow shown in fig. 9, the method may specifically include the following steps:
step S351: and when the target sub-control switch comprises a first sub-control switch, acquiring the current time.
In this embodiment, when it is determined that the target sub-control switch includes the first sub-control switch, the current time is obtained, where the current time may be obtained by a clock of the mobile terminal itself
Step S352: and judging whether the current time reaches a first preset time.
As a mode, the mobile terminal stores a first preset time, which is used as a judgment basis for the current time, where the first preset time may be automatically generated by the mobile terminal, or may be manually configured by a user, and the like, and is not limited herein. In this embodiment, the first preset time may be considered as a time for the user to prepare for a rest, and at this time, the user generally does not use the mobile terminal any more, for example, the first preset time may be 10 pm, 11 pm, or the like. Specifically, after the current time is obtained, the current time is compared with a first preset time, when the current time is not earlier than the first preset time, it is determined that the current time reaches the first preset time, and when the current time is earlier than the first preset time, it is determined that the current time does not reach the first preset time.
Step S353: and when the current time reaches the first preset time, controlling the mobile terminal to log off the network and enter the flight mode.
Further, when the current time reaches the first preset time, it represents that the current user does not use the mobile terminal any more, so that the mobile terminal can be controlled to log off the network and enter the flight mode.
Step S354: and judging whether the current time reaches a second preset time, wherein the second preset time is later than the first preset time.
In addition, the mobile terminal stores a second preset time, which is used as a judgment basis for the current time, wherein the second preset time is later than the first preset time, and the second preset time may be automatically generated by the mobile terminal or manually configured by a user, and the like, which is not limited herein. In this embodiment, the second preset time may be considered as a time when the user gets up or works, and at this time, the user may use the mobile terminal again, for example, the second preset time may be 6 am, 7 am, and the like. Specifically, after the current time is obtained, the current time is compared with a second preset time, when the current time is not earlier than the second preset time, it is determined that the current time reaches the second preset time, and when the current time is earlier than the second preset time, it is determined that the current time does not reach the second preset time.
Step S355: and when the current time reaches the second preset time, controlling the mobile terminal to release the flight mode and access the network.
Furthermore, when the current time reaches a second preset time, the representation that the current user can use the mobile terminal again is carried out, so that the mobile terminal can be controlled to release the flight mode and access the network, and the normal network use of the mobile terminal is ensured.
In another embodiment of the present application, a method for preventing a pseudo base station includes detecting a state of a control switch of a mobile terminal, where the control switch is used to control a pseudo base station prevention function of turning on or off the mobile terminal, determining whether the state of the control switch is in an on state, detecting states of a plurality of sub-control switches when the state of the control switch is in the on state, obtaining a target sub-control switch of the plurality of sub-control switches, where the state of the sub-control switch is in the on state, and controlling a mobile terminal to logout a network to enter a flight mode when the target sub-control switch includes a first sub-control switch. Compared with the method for preventing the pseudo base station shown in fig. 3, the embodiment may control the mobile terminal to logout the network to enter the flight mode through the first sub-control switch, so as to shield the pseudo base station and prevent the pseudo base station from attacking.
Referring to fig. 10, fig. 10 is a schematic flowchart illustrating a method for preventing false base station according to another embodiment of the present application. The sub-control switch includes a second sub-control switch, and the sub-precaution mode corresponding to the second sub-control switch is to access the 4G network and prohibit the 2G network and the 3G network from entering the VOLTE mode, which will be described in detail with reference to the flow shown in fig. 10, where the pseudo base station precaution method specifically includes the following steps:
step S410: and detecting the state of a control switch of the mobile terminal, wherein the control switch is used for controlling the start or the stop of the pseudo base station precaution function of the mobile terminal.
Step S420: and judging whether the state of the control switch is in an opening state or not.
Step S430: detecting the states of the plurality of sub control switches when the state of the control switch is in an open state.
Step S440: and acquiring a target sub-control switch of the plurality of sub-control switches, wherein the state of the sub-control switch is in an open state.
For the detailed description of steps S410 to S440, refer to steps S210 to S240, which are not described herein again.
Step S450: and when the target sub-control switch comprises a second sub-control switch, controlling the mobile terminal to access the 4G network, prohibiting the 2G network and the 3G network from accessing the 4G network, and entering a VOLTE mode.
As a mode, the sub-control switch includes a second sub-control switch, where a sub-precaution mode corresponding to the second sub-control switch is to access the 4G network and prohibit the 2G network and the 3G network, and enter the VOLTE mode, then, in this embodiment, when the target sub-control switch includes the second sub-control switch, it represents that the second sub-control switch is in an open state, so that the mobile terminal may be controlled to enter the sub-precaution mode corresponding to the second sub-control switch, that is, the mobile terminal is controlled to access the 4G network and prohibit the 2G network and the 3G network, and enters the VOLTE mode.
It should be noted that the sub-precaution modes corresponding to the second sub-control switch may further include an IMS mode, where the IMS mode includes a VOLTE mode, a VOWIFI mode, and even a vonr (voice Over New radio) mode, and the like, which is not limited herein.
Specifically, since most of the pseudo base stations used by the illegal molecules are 2G and 3G networks, and the 4G network is only used by a very small number of pseudo base stations, for example, the pseudo base station used by the security monitoring system is the 4G network, but the pseudo base station is used for security monitoring of the mobile terminal and does not cause property loss to the mobile terminal user, as a way, after the mobile terminal is prohibited to access the 2G network and the 3G network, the mobile terminal may be set to connect the 4G network to enter a VOLTE mode, where VOLTE, i.e., Voice over LTE, is a Voice service based on IMS. The method is an IP data transmission technology, does not need a 2G network/a 3G network, all services are borne on the 4G network, and unification of data and voice services under the same network can be realized, so that a pseudo base station adopted by an illegal molecule can be prevented from attacking a mobile terminal through the 2G network or the 3G network, and the mobile terminal is allowed to normally surf the internet.
Referring to fig. 11, fig. 11 is a flowchart illustrating a step S450 of the pseudo base station prevention method shown in fig. 10 according to the present application. As will be described in detail with respect to the flow shown in fig. 11, the method may specifically include the following steps:
step S451: and when the target sub-control switch comprises a second sub-control switch, acquiring the current time.
In this embodiment, when it is determined that the target sub-control switch includes the second sub-control switch, the current time is obtained, where the current time may be obtained by a clock of the mobile terminal itself.
Step S452: and judging whether the current time reaches a third preset time.
As a mode, the mobile terminal stores a third preset time, which is used as a judgment basis for the current time, where the third preset time may be automatically generated by the mobile terminal, or may be manually configured by a user, and the like, and is not limited herein. In this embodiment, the third preset time may be equal to or unequal to the first preset time, where the third preset time may be considered as a time for a user to prepare for a rest, and at this time, the user generally does not use the mobile terminal any more, for example, the third preset time may be 10 pm, 11 pm, and the like. Specifically, after the current time is obtained, the current time is compared with a third preset time, when the current time is not earlier than the third preset time, it is determined that the current time reaches the third preset time, and when the current time is earlier than the third preset time, it is determined that the current time does not reach the third preset time.
Step S453: and when the current time reaches the third preset time, controlling the mobile terminal to access the 4G network, prohibiting the 2G network and the 3G network from accessing the 4G network, and entering a VOLTE mode.
Further, when the current time reaches a third preset time, the current user is represented to no longer use the mobile terminal, so that the mobile terminal can be controlled to access the 4G network and prohibit the 2G network and the 3G network from entering the VOLTE mode.
Step S454: and judging whether the current time reaches a fourth preset time, wherein the fourth preset time is later than the third preset time.
In addition, the mobile terminal stores a fourth preset time, which is used as a judgment basis for the current time, wherein the fourth preset time is later than the third preset time, and the fourth preset time may be automatically generated by the mobile terminal or manually configured by a user, and the like, which is not limited herein. In this embodiment, the fourth preset time may be equal to or unequal to the second preset time, where the fourth preset time may be considered as a time when the user gets up or works, and at this time, the user may use the mobile terminal again, for example, the fourth preset time may be 6 am, 7 am, and the like. Specifically, after the current time is obtained, the current time is compared with a fourth preset time, when the current time is not earlier than the fourth preset time, it is determined that the current time reaches the fourth preset time, and when the current time is earlier than the fourth preset time, it is determined that the current time does not reach the fourth preset time.
Step S455: and when the current time reaches the fourth preset time, controlling the mobile terminal to remove the VOLTE mode.
Further, when the current time reaches a fourth preset time, the current user is represented to reuse the mobile terminal, so that the mobile terminal may be controlled to release the setting of the VOLTE mode, for example, contact the prohibition of the 2G network and the 3G network, and resume the original voice call mode, the CS voice mode, and the like, so as to allow the mobile terminal to normally switch networks.
In another embodiment of the present application, a method for preventing a pseudo base station includes detecting a state of a control switch of a mobile terminal, where the control switch is used to control a pseudo base station prevention function of turning on or off the mobile terminal, determining whether the state of the control switch is in an on state, detecting states of a plurality of sub-control switches when the state of the control switch is in the on state, obtaining a target sub-control switch of the plurality of sub-control switches, where the state of the sub-control switch is in the on state, and controlling the mobile terminal to access a 4G network and prohibit a 2G network and a 3G network from entering a VOLTE mode when the target sub-control switch includes a second sub-control switch. Compared with the pseudo base station prevention method shown in fig. 3, in the embodiment, the second sub-control switch can control the mobile terminal to access the 4G network, prohibit the 2G network and the 3G network, and enter the VOLTE mode, so that the probability of accessing the pseudo base station by the mobile terminal is reduced, and the attack frequency of the pseudo base station is reduced.
Referring to fig. 12, fig. 12 is a schematic flowchart illustrating a pseudo base station prevention method according to yet another embodiment of the present application. The sub control switch includes a third sub control switch, and the sub precaution mode corresponding to the third sub control switch is to perform pseudo base station detection and send alarm information, which will be described in detail with respect to the flow shown in fig. 12, and the pseudo base station precaution method specifically includes the following steps:
step S510: and detecting the state of a control switch of the mobile terminal, wherein the control switch is used for controlling the start or the stop of the pseudo base station precaution function of the mobile terminal.
Step S520: and judging whether the state of the control switch is in an opening state or not.
Step S530: detecting the states of the plurality of sub control switches when the state of the control switch is in an open state.
Step S540: and acquiring a target sub-control switch of the plurality of sub-control switches, wherein the state of the sub-control switch is in an open state.
For detailed description of steps S310 to S340, refer to steps S210 to S240, which are not described herein again.
Step S550: and when the target sub-control switch comprises a third sub-control switch, controlling the mobile terminal to detect whether the detected base station is a pseudo base station.
In this embodiment, the sub control switch includes a third sub control switch, and the sub precaution mode corresponding to the third sub control switch is to perform pseudo base station detection and send out alarm information. The third sub-control switch can be turned off by default and turned on according to instruction information triggered by a user, and the instruction information can include touch instruction information and voice instruction information.
Step S560: and when the detected base station is detected to be a pseudo base station, sending alarm information.
Generally, a network air interface is used to enable information interaction between a mobile terminal and a base station of a mobile communication network, and information on the network air interface is carried by various logical channels. The logical channels are divided into two categories, namely Traffic Channels (TCH) and Control Channels (CCH), where the TCH is mainly used for transmitting Traffic, such as voice and data, between the network and the mobile terminal; the CCH is a Channel for transmitting signaling information and short packet data, and a Broadcast Channel (BCH) in the CCH is used for transmitting information by broadcasting, and a Broadcast Control Channel (BCCH) in the BCH is used for broadcasting common information, such as system messages, to the mobile terminals by the base station. Therefore, the mobile terminal can detect the base station by monitoring the broadcast information of the base station and register in the base station according to the detection result.
However, the base stations detected by the mobile terminal may include a pseudo base station, and thus, the mobile terminal may register with the pseudo base station and be attacked by the pseudo base station. Therefore, as one mode, it may be determined whether the base station detected by the mobile terminal is a pseudo base station, for example, the mobile terminal may obtain broadcast information of the base station, extract identification information of the base station from the broadcast information, and determine whether the base station is a pseudo base station according to the identification information. Specifically, the identification information may include a cell location area (TAC) of a base station cell corresponding to the base station, a Location Area Code (LAC), a Cell Identity (CID), and the like, so that, as a manner, when the mobile terminal detects a new base station, the mobile terminal may calculate a difference between the TAC/LAC/CID of the base station cell corresponding to the base station and the TAC/LAC/CID of the base station cell that the mobile terminal has successfully registered recently, and if the difference is greater than a set threshold, it may be determined that the base station detected by the mobile terminal is a pseudo base station.
When the detected base station is determined to be a pseudo base station, the mobile terminal can send alarm information to the public security organization so as to inform the public security organization of attack time, attack place, attack mode and other characteristic information of the pseudo base station through the alarm information, so that the public security organization can remove the pseudo base station according to the alarm information of the mobile terminal and report the information security of a user of the mobile terminal. The alarm information may include an alarm telephone and/or an alarm short message. In addition, after the mobile terminal sends alarm information, the mobile terminal can be controlled to log off the network so as to prevent the network from being attacked by a pseudo base station.
In another embodiment of the present application, a method for guarding against a pseudo base station is provided, where a state of a control switch of a mobile terminal is detected, the control switch is used to control a function of guarding against a pseudo base station of turning on or off the mobile terminal, and determine whether the state of the control switch is in an on state, when the state of the control switch is in the on state, the states of a plurality of sub-control switches are detected, a target sub-control switch of the plurality of sub-control switches, the state of the sub-control switch being in the on state, when the target sub-control switch includes a third sub-control switch, the control mobile terminal detects whether a detected base station is a pseudo base station, and when the detected base station is a pseudo base station, an alarm message is sent. Compared with the pseudo base station prevention method shown in fig. 3, in the embodiment, the mobile terminal can be controlled by the third sub-control switch to detect and alarm the pseudo base station, so as to perform troubleshooting and attack on the pseudo base station, and improve the information security of the mobile terminal.
Referring to fig. 13, fig. 13 is a schematic flowchart illustrating a method for preventing false base station according to yet another embodiment of the present application. The sub-control switch includes a fourth sub-control switch, and the sub-precaution mode corresponding to the fourth sub-control switch is to lock in the resident cell and turn off the neighbor cell measurement, which will be described in detail with respect to the flow shown in fig. 13, and the pseudo base station precaution method specifically includes the following steps:
step S610: and detecting the state of a control switch of the mobile terminal, wherein the control switch is used for controlling the start or the stop of the pseudo base station precaution function of the mobile terminal.
Step S620: and judging whether the state of the control switch is in an opening state or not.
Step S630: detecting the states of the plurality of sub control switches when the state of the control switch is in an open state.
Step S640: and acquiring a target sub-control switch of the plurality of sub-control switches, wherein the state of the sub-control switch is in an open state.
Step S650: and when the target sub-control switch comprises a fourth sub-control switch, controlling the mobile terminal to lock in a resident cell and close the neighbor cell measurement.
In this embodiment, the sub-control switch includes a fourth sub-control switch, and the sub-precaution mode corresponding to the fourth sub-control switch is to lock in the resident cell and close the measurement of the neighboring cell, so in this embodiment, when the target sub-control switch includes the fourth sub-control switch, it represents that the fourth sub-control switch is in an on state, and therefore, the mobile terminal can be controlled to enter the sub-precaution mode corresponding to the fourth sub-control switch, that is, to lock in the resident cell and close the measurement of the neighboring cell, so as to avoid the mobile terminal from accessing the pseudo base station.
In this application, the first sub-control switch and the second sub-control switch may be selectively turned on, and the first sub-control switch or the second sub-control switch may be turned on simultaneously with the third sub-control switch and the fourth sub-control switch, which is not limited herein.
In yet another embodiment of the present application, a pseudo base station detects a state of a control switch of a mobile terminal, where the control switch is used to control a pseudo base station precaution function of turning on or off the mobile terminal, determine whether the state of the control switch is in an on state, detect states of a plurality of sub-control switches when the state of the control switch is in the on state, obtain a target sub-control switch of the plurality of sub-control switches, where the state of the sub-control switch is in the on state, and control the mobile terminal to lock in a resident cell and turn off neighbor cell measurement when the target sub-control switch includes a fourth sub-control switch. Compared with the pseudo base station prevention method shown in fig. 3, in this embodiment, the fourth sub-control switch may control the mobile terminal to lock in the resident cell and close the neighbor cell measurement, so as to prevent the mobile terminal from being connected to the pseudo base station, and improve the information security of the mobile terminal.
Referring to fig. 14, fig. 14 is a block diagram of a pseudo base station apparatus 200 according to an embodiment of the present disclosure. The pseudo base station prevention apparatus 200 is applied to the above-mentioned mobile terminal, and will be explained with reference to the block diagram shown in fig. 14, where the pseudo base station prevention apparatus 200 includes: a detection module 210, a determination module 220, and a control module 230, wherein:
the detecting module 210 is configured to detect a state of a control switch of the mobile terminal, where the control switch is used to control turning on or off a pseudo base station prevention function of the mobile terminal.
The determining module 220 is configured to determine whether the state of the control switch is in an open state.
A control module 230, configured to control the mobile terminal to enter a pseudo base station precaution mode when the state of the control switch is in an on state. Further, please refer to fig. 15, fig. 15 shows a block diagram of a control module of the guard device for the pseudo base station according to the embodiment of the present application, where the control switch includes a plurality of sub-control switches, the guard mode for the pseudo base station includes a plurality of sub-guard modes, and the control module 230 includes: a detection submodule 231, an acquisition submodule 232, a determination submodule 233, and a control submodule 234, wherein:
a detection submodule 231, configured to detect states of the plurality of sub control switches when the states of the control switches are in an open state.
The obtaining submodule 232 is configured to obtain a target sub-control switch in which the sub-control switches of the plurality of sub-control switches are in an on state.
A determination submodule 233 for determining a target sub prevention mode corresponding to the target sub control switch from among the plurality of sub prevention modes.
A control sub-module 234, configured to control the mobile terminal to enter the target sub-precaution mode. Furthermore, the sub-control switches comprise a first sub-control switch, a second sub-control switch, a third sub-control switch and a fourth sub-control switch, and a sub-precaution mode corresponding to the first sub-control switch is a network logout flight mode; the sub-prevention mode corresponding to the second sub-control switch is to access the 4G network, forbid the 2G network and the 3G network and enter the VOLTE mode; the sub-prevention mode corresponding to the third sub-control switch is used for detecting a pseudo base station and sending alarm information; and the sub-precaution mode corresponding to the fourth sub-control switch is locking in a resident cell and closing the neighbor cell measurement. The control sub-module 234 includes: first control unit, second control unit, third control unit, alarm unit and fourth control unit, wherein:
and the first control unit is used for controlling the mobile terminal to log off the network and enter a flight mode. Further, the first control unit includes: the first time obtaining subunit, the first time judging subunit, the first control subunit, the second time judging subunit and the second control subunit, wherein:
and the first time acquisition subunit is used for acquiring the current time.
And the first time judgment subunit is used for judging whether the current time reaches a first preset time.
And the first control subunit is used for controlling the mobile terminal to log off the network to enter the flight mode when the current time reaches the first preset time.
And the second time judging subunit is used for judging whether the current time reaches a second preset time, wherein the second preset time is later than the first preset time.
And the second control subunit is used for controlling the mobile terminal to release the flight mode and access the network when the current time reaches the second preset time.
And the second control unit is used for controlling the mobile terminal to access the 4G network, forbidding the 2G network and the 3G network and entering the VOLTE mode. Further, the second control unit includes: a second time acquisition subunit, a third time judgment subunit, a third control subunit, a fourth time judgment subunit, and a fourth control subunit, wherein:
and the second time acquisition subunit is used for acquiring the current time.
And the third time judging subunit is used for judging whether the current time reaches a third preset time.
And the third control subunit is used for controlling the mobile terminal to access the 4G network and forbid the 2G network and the 3G network from entering a VOLTE mode when the current time reaches the third preset time.
And the fourth time judging subunit is configured to judge whether the current time reaches a fourth preset time, where the fourth preset time is later than the third preset time.
And the fourth control subunit is configured to control the mobile terminal to release the VOLTE mode when the current time reaches the fourth preset time.
And the third control unit is used for controlling the mobile terminal to detect whether the detected base station is a pseudo base station.
And the alarm unit is used for sending alarm information when the detected base station is detected to be a pseudo base station. Further, the alarm unit includes: an alarm subunit, wherein:
and the alarm subunit is used for sending alarm information and controlling the mobile terminal to log off the network when the detected base station is a pseudo base station.
And the fourth control unit is used for controlling the mobile terminal to lock in the resident cell and close the neighbor cell measurement.
Further, the pseudo base station guarding apparatus 200 further includes: touch-control operation detection module and precautionary mode exit module, wherein:
and the touch operation detection module is used for detecting the touch operation acted on the control switch.
And the precaution mode exit module is used for responding to the touch operation to close the control switch and controlling the mobile terminal to exit the pseudo base station precaution mode when the touch operation indicates to close the control switch. Further, the precautionary mode exit module includes: closing the sub-module, wherein:
and the closing submodule is used for closing all the sub-control switches when the touch operation indicates to close the control switches.
Further, the pseudo base station prevention apparatus 200 further includes: an opening module, wherein:
and the opening module is used for opening the control switch when the mobile terminal is normally started up or restarted.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, the coupling between the modules may be electrical, mechanical or other type of coupling.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Referring to fig. 16, a block diagram of a mobile terminal 100 according to an embodiment of the present disclosure is shown. The mobile terminal 100 may be a smart phone, a tablet computer, an electronic book, or other mobile terminal capable of running an application. The mobile terminal 100 in the present application may include one or more of the following components: a processor 110, a memory 120, a screen 130, and one or more applications, wherein the one or more applications may be stored in the memory 120 and configured to be executed by the one or more processors 110, the one or more programs configured to perform the methods as described in the aforementioned method embodiments.
Processor 110 may include one or more processing cores, among other things. The processor 110 interfaces with various components throughout the mobile terminal 100 using various interfaces and lines, and performs various functions of the mobile terminal 100 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 120 and invoking data stored in the memory 120. Alternatively, the processor 110 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 110 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 110, but may be implemented by a communication chip.
The Memory 120 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory 120 may be used to store instructions, programs, code sets, or instruction sets. The memory 120 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The storage data area may also store data created by the terminal 100 in use, such as a phonebook, audio-video data, chat log data, and the like.
Further, the screen 130 may be a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. The screen 130 is used to display information input by a user, information provided to the user, and various graphic user interfaces of the mobile terminal, which may be composed of graphics, text, icons, numbers, video, and any combination thereof.
Referring to fig. 17, a block diagram of a computer-readable storage medium according to an embodiment of the present application is shown. The computer-readable medium 300 has stored therein a program code that can be called by a processor to execute the method described in the above-described method embodiments.
The computer-readable storage medium 300 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 300 includes a non-volatile computer-readable storage medium. The computer readable storage medium 300 has storage space for program code 310 for performing any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 310 may be compressed, for example, in a suitable form.
To sum up, the pseudo base station precaution method, the apparatus, the mobile terminal and the storage medium provided by the embodiment of the application detect the state of a control switch of the mobile terminal, the control switch is used for controlling the pseudo base station precaution function of turning on or off the mobile terminal, and determine whether the state of the control switch is in an on state, when the state of the control switch is in the on state, the mobile terminal is controlled to enter a pseudo base station precaution mode, so that a user can control the on and off of the control switch by adding the control switch for pseudo base station precaution on the mobile terminal, thereby precaution is performed on the pseudo base station, and the information security of the mobile terminal is improved.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (20)

  1. A false base station prevention method is applied to a mobile terminal, and comprises the following steps:
    detecting the state of a control switch of the mobile terminal, wherein the control switch is used for controlling the start or the close of a pseudo base station prevention function of the mobile terminal;
    judging whether the state of the control switch is in an open state or not;
    and when the state of the control switch is in an opening state, controlling the mobile terminal to enter a pseudo base station prevention mode.
  2. The method according to claim 1, wherein the control switch comprises a plurality of sub-control switches, the pseudo base station precaution mode comprises a plurality of sub-precaution modes, and the controlling the mobile terminal to enter the pseudo base station precaution mode when the state of the control switch is in an open state comprises:
    detecting the states of the plurality of sub control switches when the state of the control switch is in an open state;
    acquiring a target sub-control switch of the plurality of sub-control switches, wherein the state of the sub-control switch is in an open state;
    determining a target sub-precaution mode corresponding to the target sub-control switch from the plurality of sub-precaution modes;
    and controlling the mobile terminal to enter the target sub-precaution mode.
  3. The method of claim 2, wherein the plurality of sub-control switches and the plurality of sub-precaution modes correspond one-to-one.
  4. The method according to claim 2 or 3, wherein the sub-control switch comprises a first sub-control switch, the sub-protection mode corresponding to the first sub-control switch is a cancellation network entry flight mode, and when the target sub-control switch comprises the first sub-control switch, the controlling the mobile terminal to enter the target sub-protection mode comprises:
    and controlling the mobile terminal to log off the network to enter a flight mode.
  5. The method of claim 4, wherein said controlling the mobile terminal to deregister the network into an airplane mode comprises:
    acquiring current time;
    judging whether the current time reaches a first preset time or not;
    and when the current time reaches the first preset time, controlling the mobile terminal to log off the network and enter the flight mode.
  6. The method according to claim 5, wherein after controlling the mobile terminal to log off the network from the airplane mode when the current time reaches the first preset time, further comprising:
    judging whether the current time reaches a second preset time, wherein the second preset time is later than the first preset time;
    and when the current time reaches the second preset time, controlling the mobile terminal to release the flight mode and access the network.
  7. The method according to claim 2 or 3, wherein the sub-control switch comprises a second sub-control switch, the sub-protection mode corresponding to the second sub-control switch is to access a 4G network and disable a 2G network and a 3G network, and enter a VOLTE mode, and when the target sub-control switch comprises the second sub-control switch, the controlling the mobile terminal to enter the target sub-protection mode comprises:
    and controlling the mobile terminal to access the 4G network, prohibiting the 2G network and the 3G network from entering a VOLTE mode.
  8. The method of claim 7, wherein the controlling the mobile terminal to access the 4G network and to disable the 2G network and the 3G network to enter the VOLTE mode comprises:
    acquiring current time;
    judging whether the current time reaches a third preset time or not;
    and when the current time reaches the third preset time, controlling the mobile terminal to access the 4G network, prohibiting the 2G network and the 3G network from accessing the 4G network, and entering a VOLTE mode.
  9. The method according to claim 8, wherein when the current time reaches the third preset time, controlling the mobile terminal to access a 4G network and disable a 2G network and a 3G network, and after entering a VOLTE mode, further comprising:
    judging whether the current time reaches a fourth preset time, wherein the fourth preset time is later than the third preset time;
    and when the current time reaches the fourth preset time, controlling the mobile terminal to remove the VOLTE mode.
  10. The method according to any one of claims 2 to 9, wherein the sub-control switch further includes a third sub-control switch, a sub-precaution mode corresponding to the third sub-control switch is for performing pseudo base station detection and sending alarm information, and when the target sub-control switch includes the third sub-control switch, the controlling the mobile terminal to enter the target sub-precaution mode includes:
    controlling the mobile terminal to detect whether the detected base station is a pseudo base station or not;
    and when the detected base station is detected to be a pseudo base station, sending alarm information.
  11. The method of claim 10, wherein the sending an alarm message when the detected base station is detected as a fake base station comprises:
    and when the detected base station is detected to be a pseudo base station, sending alarm information and controlling the mobile terminal to logout the network.
  12. The method of claim 10 or 11, wherein the alert information comprises at least one of an alert phone or an alert text message.
  13. The method according to any one of claims 2 to 12, wherein the sub-control switch further includes a fourth sub-control switch, and a sub-protection mode corresponding to the fourth sub-control switch is locking in a resident cell and turning off neighbor cell measurement, and when the target sub-control switch includes the fourth sub-control switch, the controlling the mobile terminal to enter the target sub-protection mode includes:
    and controlling the mobile terminal to lock in the resident cell and closing the neighbor cell measurement.
  14. The method according to any one of claims 2 to 13, wherein after controlling the mobile terminal to enter a pseudo base station prevention mode when the state of the control switch is in an open state, the method further comprises:
    detecting a touch operation acting on the control switch;
    and when the touch operation indicates to close the control switch, closing the control switch in response to the touch operation and controlling the mobile terminal to exit the pseudo base station precaution mode.
  15. The method of claim 14, further comprising:
    and when the touch operation indicates to close the control switch, closing all the sub-control switches.
  16. The method according to any one of claims 1-15, further comprising:
    and when the mobile terminal is normally started or restarted, the control switch is turned on.
  17. A pseudo base station prevention device is applied to a mobile terminal, and the device comprises:
    the detection module is used for detecting the state of a control switch of the mobile terminal, and the control switch is used for controlling the start or the stop of the pseudo base station prevention function of the mobile terminal;
    the judging module is used for judging whether the state of the control switch is in an opening state or not;
    and the control module is used for controlling the mobile terminal to enter a pseudo base station prevention mode when the state of the control switch is in an open state.
  18. The apparatus of claim 17, wherein the control switch comprises a plurality of sub-control switches, wherein the pseudo base station precaution mode comprises a plurality of sub-precaution modes, and wherein the control module comprises:
    the detection submodule is used for detecting the states of the plurality of sub control switches when the states of the control switches are in an open state;
    the acquisition submodule is used for acquiring the target sub-control switch of the plurality of sub-control switches, wherein the sub-control switches are in an open state;
    the determining submodule is used for determining a target sub-precaution mode corresponding to the target sub-control switch from the plurality of sub-precaution modes;
    and the control sub-module is used for controlling the mobile terminal to enter the target sub-precaution mode.
  19. A mobile terminal, comprising:
    a memory;
    one or more processors coupled with the memory;
    one or more programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of claims 1-16.
  20. A computer-readable storage medium having program code stored therein, the program code being invoked by a processor to perform the method of any one of claims 1 to 16.
CN201880097378.4A 2018-10-31 2018-10-31 Pseudo base station prevention method and device, mobile terminal and storage medium Pending CN112655237A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/113210 WO2020087420A1 (en) 2018-10-31 2018-10-31 Pseudo base station prevention method and apparatus, mobile terminal, and storage medium

Publications (1)

Publication Number Publication Date
CN112655237A true CN112655237A (en) 2021-04-13

Family

ID=70463534

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880097378.4A Pending CN112655237A (en) 2018-10-31 2018-10-31 Pseudo base station prevention method and device, mobile terminal and storage medium

Country Status (2)

Country Link
CN (1) CN112655237A (en)
WO (1) WO2020087420A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939517A (en) * 2016-06-29 2016-09-14 努比亚技术有限公司 Method and device for preventing mobile terminal from accessing pseudo base station
CN205902085U (en) * 2016-06-24 2017-01-18 南京欣网通信科技股份有限公司 Pseudo - basic station perception identification system
US20180095518A1 (en) * 2015-04-14 2018-04-05 Huawei Technologies Co., Ltd. Terminal control method and apparatus, and terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131852A (en) * 2016-08-29 2016-11-16 努比亚技术有限公司 A kind of pseudo-base station protection state synchronizing apparatus, system and method
CN106535197A (en) * 2017-01-18 2017-03-22 北京奇虎科技有限公司 Method and device for identifying pseudo base station based on network type
CN106851654B (en) * 2017-04-13 2020-08-18 Oppo广东移动通信有限公司 Pseudo base station identification method, pseudo base station identification device and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180095518A1 (en) * 2015-04-14 2018-04-05 Huawei Technologies Co., Ltd. Terminal control method and apparatus, and terminal
CN205902085U (en) * 2016-06-24 2017-01-18 南京欣网通信科技股份有限公司 Pseudo - basic station perception identification system
CN105939517A (en) * 2016-06-29 2016-09-14 努比亚技术有限公司 Method and device for preventing mobile terminal from accessing pseudo base station

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHRIS LIU: "*** 2G 用户将 SIM 卡更换为 USIM 卡可以防范伪基站问题吗?", pages 1 - 2, Retrieved from the Internet <URL:https://www.zhihu.com/question/22557096/answer/48869120> *
CHRIS LIU: "关于伪基站冒充10086发钓鱼网站,移动一点办法都没有吗?", pages 1 - 2, Retrieved from the Internet <URL:https://www.zhihu.com/question/30279378> *

Also Published As

Publication number Publication date
WO2020087420A1 (en) 2020-05-07

Similar Documents

Publication Publication Date Title
CN112020152B (en) Data processing method and terminal equipment
CN106488456B (en) Base station registration method and device and mobile terminal
WO2023061279A1 (en) Ims network registration method and apparatus, and terminal and readable storage medium
CN112806073A (en) Communication processing method, communication processing device, mobile terminal and storage medium
CN112423289B (en) Method and device for preventing application from being blocked, equipment and storage medium
CN112806044B (en) Pseudo base station identification method and device, mobile terminal and storage medium
CN110121896A (en) A kind of communication means and mobile terminal
CN104166591A (en) Method and device for avoiding forced interruption of game
US11736945B2 (en) Method for handling pseudo base station, mobile terminal, and storage medium
US20210329519A1 (en) Cell Connection Processing Method and Mobile Terminal
CN112673663B (en) Pseudo base station processing method, pseudo base station processing device, mobile terminal and storage medium
WO2019047170A1 (en) Pseudo base station identification method and terminal
CN105657733B (en) Network stability control device and method
CN112789877B (en) Cell interference detection method, device, mobile terminal and storage medium
CN112655237A (en) Pseudo base station prevention method and device, mobile terminal and storage medium
WO2020007250A1 (en) Pseudo base station identification on-off control method and device, mobile terminal, and storage medium
US11812270B2 (en) Method for identifying pseudo base station, apparatus, and mobile terminal
CN112399515B (en) Communication processing method and device
CN108347740B (en) Processing method for network communication function abnormity and application processor
CN115884281A (en) Switching method and device of IMS (IP multimedia subsystem) call network, terminal and readable storage medium
CN112868247B (en) Cell connection processing method, device, mobile terminal and storage medium
CN112771907B (en) Pseudo base station identification method, pseudo base station identification device, mobile terminal and storage medium
CN110291815B (en) Method, device and medium for improving service continuity
CN112889315B (en) Cell information processing method and device, electronic equipment and readable storage medium
WO2020087417A1 (en) Pseudo base station identification method and device, mobile terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination