WO2020087420A1 - Procédé et appareil de prévention de pseudo-station de base, terminal mobile et support d'informations - Google Patents

Procédé et appareil de prévention de pseudo-station de base, terminal mobile et support d'informations Download PDF

Info

Publication number
WO2020087420A1
WO2020087420A1 PCT/CN2018/113210 CN2018113210W WO2020087420A1 WO 2020087420 A1 WO2020087420 A1 WO 2020087420A1 CN 2018113210 W CN2018113210 W CN 2018113210W WO 2020087420 A1 WO2020087420 A1 WO 2020087420A1
Authority
WO
WIPO (PCT)
Prior art keywords
sub
control switch
mobile terminal
base station
control
Prior art date
Application number
PCT/CN2018/113210
Other languages
English (en)
Chinese (zh)
Inventor
李伟清
唐凯
Original Assignee
深圳市欢太科技有限公司
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市欢太科技有限公司, Oppo广东移动通信有限公司 filed Critical 深圳市欢太科技有限公司
Priority to PCT/CN2018/113210 priority Critical patent/WO2020087420A1/fr
Priority to CN201880097378.4A priority patent/CN112655237A/zh
Publication of WO2020087420A1 publication Critical patent/WO2020087420A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Definitions

  • the present application relates to the technical field of mobile terminals, and more specifically, to a method, device, mobile terminal, and storage medium for preventing pseudo base stations.
  • “Pseudo base station” is a fake base station.
  • the pseudo base station is generally composed of a host computer and a laptop computer. It can retrieve mobile phone card information centered on it and within a certain radius through the SMS group sender, SMS sender and other related equipment, using mobile communications.
  • the shortcomings of the system by disguising themselves as the base station of the operator, used the mobile phone numbers of others to forcibly send short messages such as scams and advertisement sales to the user's mobile phone.
  • this application proposes a method, device, mobile terminal, and storage medium for preventing pseudo base stations to solve the above problems.
  • an embodiment of the present application provides a pseudo base station defense method, which is applied to a mobile terminal.
  • the method includes: detecting a state of a control switch of the mobile terminal, where the control switch is used to control turning on or off the The pseudo base station defense function of the mobile terminal; judging whether the state of the control switch is on; when the state of the control switch is on, controlling the mobile terminal to enter the pseudo base station defense mode.
  • an embodiment of the present application provides a pseudo base station defense device, which is applied to a mobile terminal.
  • the device includes: a detection module, configured to detect a state of a control switch of the mobile terminal, and the control switch is used to control Turn on or off the pseudo base station defense function of the mobile terminal; a judgment module for judging whether the state of the control switch is on; a control module for controlling the state when the state of the control switch is on The mobile terminal enters the pseudo base station defense mode.
  • an embodiment of the present application provides a mobile terminal, including: a memory; one or more processors coupled to the memory; one or more programs, wherein the one or more application programs are Stored in the memory and configured to be executed by the one or more processors, the one or more programs are configured to perform the above method.
  • an embodiment of the present application provides a computer-readable storage medium.
  • the computer-readable storage medium stores program code, and the program code can be called by a processor to execute the above method.
  • a method, device, mobile terminal and storage medium for preventing false base stations detect the state of the control switch of the mobile terminal, the control switch is used to control turning on or off the false base station preventing function of the mobile terminal, and judge the control Whether the state of the switch is on, when the state of the control switch is on, the mobile terminal is controlled to enter the pseudo base station defense mode, so that by adding a control switch for pseudo base station defense to the mobile terminal, the user can control the opening and closing of the control switch Close to prevent pseudo base stations and improve the information security of mobile terminals.
  • FIG. 1 shows a schematic diagram of a system architecture of a mobile communication network provided by an embodiment of the present application
  • FIG. 2 shows a schematic diagram of another mobile communication network system architecture provided by an embodiment of the present application
  • FIG. 3 shows a schematic flowchart of a method for preventing pseudo base stations according to an embodiment of the present application
  • FIG. 4 shows a schematic diagram of an interface of a mobile terminal provided by an embodiment of the present application
  • FIG. 5 shows a schematic flowchart of a method for preventing a pseudo base station according to another embodiment of the present application
  • FIG. 6 shows another schematic diagram of an interface of a mobile terminal provided by an embodiment of the present application.
  • FIG. 7 shows another schematic diagram of the interface of the mobile terminal provided by the embodiment of the present application.
  • FIG. 8 shows a schematic flowchart of a method for preventing a pseudo base station according to another embodiment of the present application.
  • FIG. 9 shows a schematic flowchart of step S350 of the pseudo base station defense method shown in FIG. 8 of the present application.
  • FIG. 10 is a schematic flowchart of a method for preventing a pseudo base station according to another embodiment of the present application.
  • FIG. 11 shows a schematic flowchart of step S450 of the pseudo base station defense method shown in FIG. 10 of the present application;
  • FIG. 12 shows a schematic flowchart of a method for preventing a pseudo base station according to yet another embodiment of the present application
  • FIG. 13 is a schematic flowchart of a method for preventing a pseudo base station according to yet another embodiment of the present application.
  • FIG. 14 shows a block diagram of a pseudo base station defense device provided by an embodiment of the present application.
  • FIG. 15 shows a block diagram of a control module of a pseudo base station defense device provided by an embodiment of the present application
  • 16 shows a block diagram of an electronic device for implementing a method for preventing a pseudo base station according to an embodiment of the present application
  • FIG. 17 shows a storage unit for storing or carrying a program code for implementing a method for preventing a pseudo base station according to an embodiment of the present application.
  • the base station is A more important communication device.
  • GSM Global System for Mobile
  • CDMA Code Division Multiple Access
  • LTE long term evolution
  • FIG. 1 a schematic diagram of the architecture of the 2G mobile communication system shown in FIG. 1.
  • the BTS base station 99 Base Station
  • the base station controller 98 is connected to the base station controller 98 as an access device for mobile communication, and then the base station controller 98 is connected to the mobile switching center 97, and the mobile switching center 97 is also connected to the public switched telephone network 96. Wait for connection.
  • Another example is the schematic diagram of the architecture of the 4G mobile communication system shown in FIG. 2.
  • the eNB base station 95 is connected to an MME (Mobility Management Entity), that is, a mobile management node 94, and the MME is connected to a serving gateway 93, which is then connected to a packet data gateway 92, and the packet data gateway 92 is connected to a packet data network 91.
  • MME Mobility Management Entity
  • the base station as a device that directly establishes a connection with the mobile terminal, has a relatively important position in the entire system architecture.
  • a base station generally refers to a "public mobile communication base station", and its role is mainly used to provide signals to mobile terminals such as mobile phones and tablet computers. With the development of communication technology, the inventor discovered that pseudo base stations appeared.
  • Pseudo base station is a fake base station, which is an illegal base station outside the mobile communication network.
  • the pseudo base station is generally composed of a host computer and a laptop computer, and can be retrieved through a SMS group sender, a SMS sender and other related equipment within a certain radius.
  • Mobile phone card information using the defects of 2G mobile communication, by disguising as the base station of the operator, using the mobile phone number of others to forcibly send short messages such as fraud and advertising to the user's mobile phone.
  • the wireless signal sent by the mobile terminal is forced to connect to the device, resulting in the mobile terminal not being able to use the services provided by the operator normally.
  • the mobile terminal will temporarily go offline for 8 to 12 seconds and return to normal. Some mobile terminals Then you must switch on and off to reconnect to the network. In addition, it will cause mobile terminal users to frequently update their locations, making the wireless network resources in this area tight and causing network congestion, affecting the user's normal communication.
  • the inventor has made a long-term research and proposed the method, device, mobile terminal and storage medium for the pseudo base station defense provided by the embodiments of the present application.
  • the control switch for the pseudo base station defense to the mobile terminal, the user can control the control The switch is turned on and off to prevent the pseudo base station and improve the information security of the mobile terminal.
  • FIG. 3 shows a schematic flowchart of a method for preventing a pseudo base station according to an embodiment of the present application.
  • the method for preventing a pseudo base station is used to add a control switch for preventing a pseudo base station in a mobile terminal, and the user can control the control.
  • the switch is turned on and off to prevent the pseudo base station and improve the information security of the mobile terminal.
  • the pseudo base station defense method is applied to the pseudo base station defense apparatus 200 shown in FIG. 14 and the mobile terminal 100 (FIG. 16) configured with the pseudo base station defense apparatus 200. As an example, the specific process of this embodiment will be described.
  • the mobile terminal applied in this embodiment may be a smart phone, a tablet computer, a wearable electronic device, etc., which is not specifically limited herein.
  • the method for preventing pseudo base stations may specifically include the following steps:
  • Step S110 Detect the state of the control switch of the mobile terminal, where the control switch is used to control turning on or off the pseudo base station defense function of the mobile terminal.
  • the mobile terminal is provided with a control switch, as shown in FIG. 4, and FIG. 4 shows a schematic diagram of an interface of the mobile terminal provided by an embodiment of the present application.
  • the control switch may be formed on the display interface of the mobile terminal in the form of a control, or may be formed on the display interface of the mobile terminal in the form of a card, which is not limited herein.
  • the control switch may be located at the same level as the display interface, or may be suspended above the display interface, which is not limited herein.
  • the mobile terminal can create a variable and then use the variable value to identify the state of the control switch.
  • the variable value may include 1 and 0, where if the variable value is 1, it means that the control switch is in an open state, and correspondingly, the control switch controls to turn on the pseudo base station defense function of the mobile terminal; if the variable value If it is 0, it means that the control switch is in the off state. Correspondingly, the control switch controls to turn off the pseudo base station defense function of the mobile terminal.
  • the control switch of the mobile terminal may be manually turned on or off by the user.
  • the control switch is displayed on the interface of the mobile terminal, for example, on the setting interface of the mobile terminal, and then detects a touch operation acting on the control switch, where the touch operation may include a click operation, Press operation, etc.
  • the control switch includes a first display position and a second display position, and the first display position and the second display position do not coincide, when a touch operation acting on the first display position of the control switch is detected At this time, it means that the touch operation instruction indicates turning on the control switch, and when a touch operation acting on the second display position of the control switch is detected, characterizing the touch operation instruction indicates turning off the control switch.
  • control switch includes a third display position.
  • the touch operation is indicated to indicate that the control switch is turned on.
  • the touch operation is characterized to indicate that the control switch is turned off.
  • the control switch of the mobile terminal may be turned on or off by user voice control.
  • the voice information input to the mobile terminal is received, and the voice information is analyzed.
  • the analysis result indicates that the voice information includes instruction information indicating that the control switch is turned on
  • the voice information is indicated to indicate that the control switch is turned on.
  • the analysis result indicates that the voice information includes instruction information indicating that the control switch is closed
  • characterizing the voice information indicates that the control switch is closed.
  • the control switch of the mobile terminal may be automatically turned on or off by the mobile terminal.
  • the mobile terminal may be configured with a time to automatically open the control switch, a time to automatically close the control switch, a place to automatically open the control switch or a place to automatically close the control switch, etc., which is not limited herein.
  • the mobile terminal can use its own global positioning system (Global Positioning System) , GPS) function to collect its location information, when the location information indicates that the mobile terminal is at home, close the control switch, when the location information indicates that the mobile terminal is not at home, open the control switch.
  • Global Positioning System Global Positioning System
  • Step S120 Determine whether the state of the control switch is in an open state.
  • the state of the control switch of the mobile terminal can be determined by detecting the state value of the mobile terminal, wherein when the state value of the mobile terminal is detected as 1, the current control switch of the mobile terminal can be determined In the open state, when the state value of the mobile terminal is detected to be 0, it can be determined that the current control switch of the mobile terminal is in the closed state.
  • Step S130 When the state of the control switch is on, control the mobile terminal to enter a pseudo base station defense mode.
  • the mobile terminal when it is determined that the state value of the mobile terminal is 1, it indicates that the state of the control switch is turned on. Correspondingly, the mobile terminal enters the pseudo base station defense mode to prevent the pseudo base station from attacking the mobile terminal .
  • the control switch is turned on, that is, the control switch is turned on by default.
  • the pseudo base station defense method detects the state of the control switch of the mobile terminal.
  • the control switch is used to control the pseudo base station defense function of the mobile terminal to be turned on or off, and determine whether the state of the control switch is on.
  • the mobile terminal is controlled to enter a pseudo base station defense mode, so that by adding a control switch for the pseudo base station defense to the mobile terminal, the user can control the control switch to be turned on and off to prevent the pseudo base station.
  • FIG. 5 shows a schematic flowchart of a method for preventing a pseudo base station according to another embodiment of the present application.
  • the control switch includes multiple sub-control switches
  • the pseudo base station defense mode includes multiple sub-defense modes.
  • the process shown in FIG. 5 will be described in detail below.
  • the pseudo base station defense method may specifically include the following steps:
  • Step S210 Detect the state of the control switch of the mobile terminal, where the control switch is used to control turning on or off the pseudo base station defense function of the mobile terminal.
  • Step S220 determine whether the state of the control switch is in an open state.
  • steps S210-S220 please refer to steps S110-S120, which will not be repeated here.
  • Step S230 When the state of the control switch is in the open state, detect the state of the plurality of sub-control switches.
  • the control switch includes multiple sub-control switches, wherein, when the control switch is in an open state, each of the multiple sub-control switches may be in an open state or may be in a closed state When the control switch is in the off state, the multiple sub-control switches are in the off state.
  • FIG. 6 shows another schematic diagram of the interface of the mobile terminal provided by the embodiment of the present application.
  • the control switch is turned on, the mobile terminal may correspond to the The setting interface of multiple sub-control switches is displayed below the control switch.
  • FIG. 7 shows another schematic diagram of the interface of the mobile terminal provided by the embodiment of the present application.
  • the control switch is turned off, the mobile terminal can be controlled from The display interface of the switch jumps to the setting interface of multiple sub-control switches.
  • each of the plurality of sub-control switches may be in an open state or may be in a closed state. Therefore, when it is determined that the control switch is in an open state, the states of the plurality of sub-control switches can be separately detected. As a way, the mobile terminal can set a variable value for each sub-control switch, and then detect The variable value is used to determine whether the sub-control switch is in an open state. The specific determination method is similar to that of the control switch and will not be repeated here.
  • Step S240 Acquire a target sub-control switch whose state of the sub-control switch is in the open state among the plurality of sub-control switches.
  • the states of the plurality of sub-control switches are respectively detected to obtain the state of each sub-control switch, and the sub-control switch in the open state is obtained from the plurality of sub-control switches according to the detection result, and is recorded as the target sub-control switch.
  • the number of sub-control switches in the open state among the plurality of sub-control switches may be 0, 1 or more, therefore, the target sub-control switch may be 0, 1 or more, here No limitation.
  • the sub-control switch includes a first sub-control switch, a second sub-control switch, and a third sub-control switch, and the first sub-control switch and the third sub-control switch are in an open state, and the second sub-control switch is in an off state.
  • the target sub-control switch may include a first sub-control switch and a third sub-control switch.
  • Step S250 Determine a target sub-prevention mode corresponding to the target sub-control switch from the plurality of sub-prevention modes.
  • the pseudo base station defense mode includes a plurality of sub-defense modes, where each sub-control switch in the plurality of sub-control switches may correspond to one or more sub-defense modes.
  • each of the multiple sub-defense modes may also correspond to one or more sub-control switches.
  • the multiple sub-control switches correspond to the multiple sub-prevention modes one by one, that is, one sub-control switch corresponds to one Sub-defense mode.
  • the mobile terminal may set a mapping relationship table in advance, and the mapping relationship table includes the correspondence between the sub-control switch and the sub-defense mode, as shown in Table 1, where the first sub-control switch corresponds to the first The sub-prevention mode, the second sub-control switch corresponds to the second sub-prevention mode, the third sub-control switch corresponds to the third sub-prevention mode, the fourth sub-control switch corresponds to the fourth sub-prevention mode, etc. Therefore, after determining the target sub-control switch, the sub-control switch consistent with the target sub-control switch can be searched from the mapping relationship table, and then the target sub-control switch phase can be searched based on the correspondence in the mapping relationship table.
  • the corresponding sub-defense mode is regarded as the target sub-defense mode.
  • Sub-control switch Sub-defense mode The first sub-control switch First sub-prevention mode Second sub-control switch Second sub-prevention mode
  • the third sub-control switch The third sub-prevention model Fourth sub-control switch Fourth sub-prevention model ... ...
  • the target sub-control switch includes a first sub-control switch and a third sub-control switch
  • the target sub-prevention mode includes a first sub-prevention mode and a third sub-prevention mode
  • Step S260 Control the mobile terminal to enter the target sub-defense mode.
  • the mobile terminal is controlled to enter a sub-defense mode corresponding to the opened sub-control switch.
  • the sub-defense mode may be one or multiple, which is not limited herein.
  • the mobile terminal is controlled to enter the sub-defense mode, and when there are multiple sub-defense modes, the mobile terminal is controlled to enter multiple sub-defense modes at the same time.
  • the target sub-defense mode includes a first sub-defense mode and a third sub-defense mode
  • the mobile terminal is controlled to enter the first sub-defense mode and the third sub-defense mode at the same time.
  • Step S270 Detect the touch operation on the control switch.
  • the touch operation on the control switch is detected, where the touch operation may include single-finger click, continuous long press, continuous super long press, double Refers to long-press, multi-finger continuous click, etc.
  • single-finger click refers to single-finger single click on the control switch
  • continuous long-press refers to the continuous pressing duration exceeds the preset duration
  • continuous super-long-press refers to the pressing duration exceeds the preset duration Set an ultra-long duration.
  • Two-finger long press means that the duration of simultaneous pressing of two fingers exceeds the preset time
  • multi-finger continuous connection means that the number of consecutive clicks exceeds the preset number of times.
  • Step S280 When the touch operation instruction turns off the control switch, turn off the control switch in response to the touch operation and control the mobile terminal to exit the pseudo base station defense mode.
  • the control switch may be determined that the touch operation instruction is to close the control switch, then the mobile terminal may respond to the touch operation Turning off the control switch, it can be understood that when the control switch is switched from the on state to the off state, the mobile terminal is controlled to exit the pseudo base station defense mode.
  • the touch operation instruction is to close the control switch
  • the control switch since the control switch includes a plurality of sub-control switches, it is necessary to close all the sub-control switches accordingly.
  • the touch operation is applied to the sub-control switch, the sub-control switch indicated by the touch operation is correspondingly turned off without turning off other sub-control switches.
  • the pseudo base station defense method detects the state of the control switch of the mobile terminal, and the control switch is used to control the pseudo base station defense function of the mobile terminal to be turned on or off, and determine whether the state of the control switch is on.
  • the state of the control switch is in the open state
  • the state of the multiple sub-control switches is detected, and the target sub-control switch in which the state of the sub-control switch is in the open state among the multiple sub-control switches is acquired, and the target The target sub-defense mode corresponding to the control switch detects the touch operation on the control switch, when the touch operation instructs to turn off the control switch, the control switch is turned off in response to the touch operation and the mobile terminal is controlled to exit the pseudo base station defense mode .
  • control switch in this embodiment also includes multiple sub-control switches, which can be used to turn on or off different pseudo base station defense functions of the mobile terminal to select different methods. Prevent pseudo base stations and improve the rationality of pseudo base stations.
  • FIG. 8 shows a schematic flowchart of a method for preventing a pseudo base station according to another embodiment of the present application.
  • the sub-control switch includes a first sub-control switch, and the sub-defense mode corresponding to the first sub-control switch is log-off network for flight mode, and the flow shown in FIG. 8 will be described in detail below. It can include the following steps:
  • Step S310 Detect the state of the control switch of the mobile terminal, where the control switch is used to control turning on or off the pseudo base station defense function of the mobile terminal.
  • Step S320 Determine whether the state of the control switch is in an open state.
  • Step S330 When the state of the control switch is in an open state, detect the states of the plurality of sub-control switches.
  • Step S340 Acquire a target sub-control switch whose state of the sub-control switch is in the open state among the plurality of sub-control switches.
  • steps S310-S340 please refer to steps S210-S240, which will not be repeated here.
  • Step S350 When the target sub-control switch includes the first sub-control switch, control the mobile terminal to log out of the network and enter the flight mode.
  • the sub-control switch includes a first sub-control switch, wherein the sub-defense mode corresponding to the first sub-control switch is to log off the network and enter the flight mode, then, in this embodiment, when the target sub-control When the switch includes a first sub-control switch, it means that the first sub-control switch is in an open state. Therefore, the mobile terminal can be controlled to enter a sub-defense mode corresponding to the first sub-control switch, that is, the mobile terminal is controlled to log out The network enters flight mode.
  • the mobile terminal since there may be a pseudo base station in the area where the mobile terminal is located, and the pseudo base station attacks the mobile terminal through the network, the mobile terminal may be attacked by the pseudo base station at any time during the process of using the network in the area Therefore, in order to prevent the mobile terminal from being attacked by the pseudo base station, the mobile terminal can be controlled to log out of the network to enter the flight mode, thereby preventing the pseudo base station from attacking the mobile terminal through the network and improving the information security of the mobile terminal.
  • FIG. 9 shows a schematic flowchart of step S350 of the pseudo base station defense method shown in FIG. 8 of the present application.
  • the process shown in FIG. 9 will be described in detail below.
  • the method may specifically include the following steps:
  • Step S351 When the target sub-control switch includes the first sub-control switch, obtain the current time.
  • the current time is obtained, where the current time may be obtained by a clock provided by the mobile terminal
  • Step S352 Determine whether the current time reaches the first preset time.
  • the mobile terminal stores a first preset time as a basis for determining the current time, where the first preset time may be automatically generated by the mobile terminal or manually configured by the user, etc. , Not limited here.
  • the first preset time may be regarded as the time when the user is ready to take a break. At this time, the user generally no longer uses the mobile terminal.
  • the first preset time may be 10 pm and 11 pm Wait.
  • the current time is compared with the first preset time, and when the current time is not earlier than the first preset time, it is determined that the current time reaches the first The preset time, when the current time is earlier than the first preset time, it is determined that the current time does not reach the first preset time.
  • Step S353 When the current time reaches the first preset time, control the mobile terminal to log out of the network and enter the flight mode.
  • the mobile terminal can be controlled to log out of the network and enter the flight mode.
  • Step S354 Determine whether the current time reaches the second preset time, where the second preset time is later than the first preset time.
  • the mobile terminal stores a second preset time for judging the current time, wherein the second preset time is later than the first preset time, and the second preset time can be determined by the mobile terminal It is automatically generated, and can also be manually configured by the user, etc., which is not limited here.
  • the second preset time may be considered as the time for the user to get up or work. At this time, the user will use the mobile terminal again.
  • the second preset time may be 6 a.m. and 7 a.m. Wait.
  • the current time and the second preset time are compared, and when the current time is not earlier than the second preset time, it is determined that the current time reaches the second The preset time, when the current time is earlier than the second preset time, it is determined that the current time does not reach the second preset time.
  • Step S355 When the current time reaches the second preset time, control the mobile terminal to release the flight mode and access the network.
  • the mobile terminal can be controlled to release the flight mode and access the network to ensure the normal network usage of the mobile terminal.
  • the pseudo base station defense method detects the state of the control switch of the mobile terminal, the control switch is used to control the pseudo base station defense function of the mobile terminal to be turned on or off, and determine whether the state of the control switch is in the open state.
  • the state of the control switch is in the open state, the state of the plurality of sub-control switches is detected, and the target sub-control switch in which the state of the sub-control switch is in the open state among the plurality of sub-control switches is acquired.
  • the switch is controlled, the mobile terminal is controlled to log out of the network and enter the flight mode.
  • the mobile terminal can be controlled to log out of the network and enter the flight mode through the first sub-control switch to shield the pseudo base station and prevent the pseudo base station from attacking.
  • FIG. 10 is a schematic flowchart of a method for preventing a pseudo base station according to another embodiment of the present application.
  • the sub-control switch includes a second sub-control switch, and the sub-defense mode corresponding to the second sub-control switch is to access the 4G network and prohibit the 2G network and the 3G network, and enter the VOLTE mode.
  • the following will proceed according to the process shown in FIG. 10
  • the method for preventing pseudo base stations shown may specifically include the following steps:
  • Step S410 Detect the state of the control switch of the mobile terminal, where the control switch is used to control turning on or off the pseudo base station defense function of the mobile terminal.
  • Step S420 Determine whether the state of the control switch is in an open state.
  • Step S430 When the state of the control switch is in the open state, detect the state of the plurality of sub-control switches.
  • Step S440 Acquire a target sub-control switch whose state of the sub-control switch is in the open state among the plurality of sub-control switches.
  • steps S410-S440 please refer to steps S210-S240, which will not be repeated here.
  • Step S450 When the target sub-control switch includes a second sub-control switch, control the mobile terminal to access the 4G network and prohibit the 2G network and the 3G network to enter the VOLTE mode.
  • the sub-control switch includes a second sub-control switch, where the sub-defense mode corresponding to the second sub-control switch is to access the 4G network and prohibit the 2G network and the 3G network to enter the VOLTE mode, then, in this
  • the target sub-control switch includes a second sub-control switch
  • the sub-defense mode corresponding to the second sub-control switch may also include an IMS mode, where the IMS mode includes a VOLTE mode, a VOWIFI mode, or even a VONR (Voice Over New Radio) mode, etc. Be limited.
  • IMS mode includes a VOLTE mode, a VOWIFI mode, or even a VONR (Voice Over New Radio) mode, etc. Be limited.
  • the pseudo base stations used by most illegal elements are 2G and 3G networks, and 4G networks have only a few pseudo base stations.
  • the pseudo base stations used in security monitoring systems are 4G networks, but this kind of The pseudo base station is used to monitor the security of the mobile terminal and will not cause property damage to the mobile terminal user. Therefore, as a way, after the mobile terminal is prohibited from accessing the 2G network and the 3G network, the mobile terminal can be set to connect to the 4G network Enter VOLTE mode, in which VOLTE is Voice over LTE, which is a voice service based on IMS.
  • the network or 3G network attacks the mobile terminal, and at the same time allows the mobile terminal to access the Internet normally.
  • FIG. 11 shows a schematic flowchart of step S450 of the pseudo base station defense method shown in FIG. 10 of the present application.
  • the process shown in FIG. 11 will be described in detail below.
  • the method may specifically include the following steps:
  • Step S451 When the target sub-control switch includes the second sub-control switch, obtain the current time.
  • the current time is obtained, where the current time may be obtained by a clock provided by the mobile terminal.
  • Step S452 Determine whether the current time reaches the third preset time.
  • the mobile terminal stores a third preset time, which is used as a basis for judging the current time, wherein the third preset time may be automatically generated by the mobile terminal, or may be manually configured by the user, etc. , Not limited here.
  • the third preset time may be equal to the first preset time, or may not be equal, where the third preset time may be considered as the time when the user is ready to rest, at this time, The user generally no longer uses the mobile terminal.
  • the third preset time may be 10 pm, 11 pm, etc.
  • the current time and the third preset time are compared, and when the current time is not earlier than the third preset time, it is determined that the current time reaches the third The preset time, when the current time is earlier than the third preset time, it is determined that the current time does not reach the third preset time.
  • Step S453 When the current time reaches the third preset time, control the mobile terminal to access the 4G network and prohibit the 2G network and the 3G network to enter the VOLTE mode.
  • the mobile terminal can be controlled to access the 4G network and the 2G network and the 3G network are prohibited to enter the VOLTE mode.
  • Step S454 Determine whether the current time reaches the fourth preset time, where the fourth preset time is later than the third preset time.
  • the mobile terminal stores a fourth preset time, which is used as a basis for determining the current time, wherein the fourth preset time is later than the third preset time, and the fourth preset time can be determined by the mobile terminal It is automatically generated, and can also be manually configured by the user, etc., which is not limited here.
  • the fourth preset time may be equal to or different from the second preset time, where the fourth preset time may be considered as the time when the user gets up or works. At this time, the user The mobile terminal will be used again, for example, the fourth preset time may be 6 am, 7 am, etc.
  • the current time and the fourth preset time are compared, and when the current time is not earlier than the fourth preset time, it is determined that the current time reaches the fourth The preset time, when the current time is earlier than the fourth preset time, it is determined that the current time does not reach the fourth preset time.
  • Step S455 When the current time reaches the fourth preset time, control the mobile terminal to release the VOLTE mode.
  • the mobile terminal can be controlled to release the setting of the VOLTE mode, for example, contact with the prohibition of 2G network and 3G network , To restore the original voice call mode, CS voice mode, etc., to allow the mobile terminal to switch the network normally.
  • the pseudo base station defense method detects the state of the control switch of the mobile terminal, and the control switch is used to control the pseudo base station defense function of the mobile terminal to be turned on or off, and determine whether the state of the control switch is on.
  • the state of the control switch is in the open state
  • the state of the plurality of sub-control switches is detected, and the target sub-control switch in which the state of the sub-control switch is in the open state among the plurality of sub-control switches is acquired.
  • the target sub-control switch includes the second sub-control
  • the switch controls the mobile terminal to access the 4G network and prohibits the 2G network and the 3G network to enter the VOLTE mode.
  • the second sub-control switch can be used to control the mobile terminal to access the 4G network and prohibit the 2G network and the 3G network to enter the VOLTE mode to reduce the mobile terminal access to the pseudo base station The probability of reducing the attack frequency of pseudo base stations.
  • FIG. 12 is a schematic flowchart of a method for preventing a pseudo base station according to still another embodiment of the present application.
  • the sub-control switch includes a third sub-control switch, and the sub-defense mode corresponding to the third sub-control switch is to detect the pseudo base station and send out an alarm message.
  • the base station defense method may specifically include the following steps:
  • Step S510 Detect the state of the control switch of the mobile terminal, where the control switch is used to control turning on or off the pseudo base station defense function of the mobile terminal.
  • Step S520 Determine whether the state of the control switch is in an open state.
  • Step S530 When the state of the control switch is in the open state, detect the state of the plurality of sub-control switches.
  • Step S540 Acquire a target sub-control switch whose state of the sub-control switch is in the open state among the plurality of sub-control switches.
  • steps S310-S340 please refer to steps S210-S240, which will not be repeated here.
  • Step S550 When the target sub-control switch includes a third sub-control switch, control the mobile terminal to detect whether the detected base station is a pseudo base station.
  • the sub-control switch includes a third sub-control switch, and the sub-defense mode corresponding to the third sub-control switch is to detect the pseudo base station and issue an alarm message. Then, in this embodiment, when When the target sub-control switch includes a third sub-control switch, it signifies that the third sub-control switch is in an open state. Therefore, the mobile terminal can be controlled to enter a sub-defense mode corresponding to the third sub-control switch, that is, a pseudo base station Detect and issue alarm information.
  • the third sub-control switch can be turned off by default and turned on according to the instruction information triggered by the user, and the instruction information may include touch instruction information and voice instruction information.
  • Step S560 When it is detected that the detected base station is a pseudo base station, an alarm message is issued.
  • the network air interface is used to implement information interaction between the mobile terminal and the base station of the mobile communication network, and the information on the network air interface is carried by various logical channels.
  • logical channels are divided into two major categories: traffic channels (TCH, Traffic) and control channels (CCH, Control).
  • TCH mainly transmits services between the network and mobile terminals, such as voice and data;
  • CCH is used For transmitting signaling information and short packet data channels, the broadcast channel (BCH, Broadcast) in CCH is used to transmit information by broadcast, and the broadcast control channel (BCCH, Broadcast) in BCH is used by the base station to Mobile terminals broadcast common information, such as system messages. Therefore, the mobile terminal can detect the base station by monitoring the broadcast information of the base station, and register with the base station according to the result of the detection.
  • the base station detected by the mobile terminal may include a pseudo base station. Therefore, the mobile terminal may register with the pseudo base station and be attacked by the pseudo base station. Therefore, as a way, it can be judged whether the base station detected by the mobile terminal is a pseudo base station.
  • the mobile terminal can obtain broadcast information of the base station and extract the identification information of the base station from the broadcast information.
  • the identification information determines whether the base station is a pseudo base station.
  • the identification information may include the cell location area (TAC, tracking), location area code (LAC, location area code), cell identification (CID, cell identity) of the base station cell corresponding to the base station.
  • the mobile terminal when the mobile terminal detects a new base station, it can calculate the difference between the TAC / LAC / CID of the base station cell corresponding to the base station and the TAC / LAC / CID of the base station cell that the mobile terminal has recently successfully registered, if If the difference is greater than the set threshold, it can be determined that the base station detected by the mobile terminal is a pseudo base station.
  • the mobile terminal may send an alarm message to the public security organ to inform the public security organ of the attack time, attack location, attack method, and other characteristic information of the pseudo base station through the alarm information , So that the public security organ can remove the pseudo base station according to the alarm information of the mobile terminal and report the information security of the mobile terminal user.
  • the alarm information may include an alarm phone and / or an alarm short message.
  • the mobile terminal can be controlled to log off the network to prevent being attacked by a pseudo base station.
  • the pseudo base station defense method detects the state of the control switch of the mobile terminal, and the control switch is used to control the pseudo base station defense function of the mobile terminal to be turned on or off, and determine whether the state of the control switch is on ,
  • the state of the control switch is in the open state, detect the state of the plurality of sub-control switches, and obtain the target sub-control switch in which the state of the sub-control switch is in the open state among the plurality of sub-control switches.
  • the switch is controlled, the mobile terminal is controlled to detect whether the detected base station is a pseudo base station, and when it is detected that the detected base station is a pseudo base station, an alarm message is issued.
  • the third sub-control switch can be used to control the mobile terminal to detect and alarm the pseudo base station, so as to check and attack the pseudo base station and improve the information security of the mobile terminal.
  • FIG. 13 is a schematic flowchart of a method for preventing a pseudo base station according to yet another embodiment of the present application.
  • the sub-control switch includes a fourth sub-control switch, and the sub-defense mode corresponding to the fourth sub-control switch is to lock in the resident cell and close the neighboring cell measurement.
  • the method for preventing false base stations may specifically include the following steps:
  • Step S610 Detect the state of the control switch of the mobile terminal, where the control switch is used to control turning on or off the pseudo base station defense function of the mobile terminal.
  • Step S620 Determine whether the state of the control switch is in an open state.
  • Step S630 When the state of the control switch is in the open state, detect the state of the plurality of sub-control switches.
  • Step S640 Acquire a target sub-control switch whose state of the sub-control switch is in the open state among the plurality of sub-control switches.
  • Step S650 When the target sub-control switch includes a fourth sub-control switch, control the mobile terminal to lock in the resident cell and turn off neighbor cell measurement.
  • the sub-control switch includes a fourth sub-control switch, and the sub-defense mode corresponding to the fourth sub-control switch is to lock in the resident cell and turn off neighboring cell measurement.
  • the target sub-control switch includes a fourth sub-control switch, it means that the fourth sub-control switch is in an open state, therefore, the mobile terminal can be controlled to enter a sub-defense mode corresponding to the fourth sub-control switch, that is, locked In the resident cell and close the neighboring cell measurement, so as to avoid the mobile terminal from accessing the pseudo base station.
  • the first sub-control switch and the second sub-control switch can be selectively opened, and the first sub-control switch or the second sub-control switch can be turned on with the third sub-control switch
  • the control switch and the fourth sub-control switch are turned on at the same time, which is not limited herein.
  • the pseudo base station detects the state of the control switch of the mobile terminal, and the control switch is used to control the pseudo base station defense function of the mobile terminal to be turned on or off, and determine whether the state of the control switch is on.
  • the state of the control switch is on, detect the state of multiple sub-control switches to obtain the target sub-control switch in which the state of the sub-control switch is on among the multiple sub-control switches.
  • the target sub-control switch includes the fourth sub-control switch
  • the mobile terminal is controlled to lock in the resident cell and turn off the neighbor cell measurement.
  • the mobile terminal can be locked in the resident cell and the neighboring cell measurement can be turned off through the fourth sub-control switch to prevent the mobile terminal from connecting to the pseudo base station and improve the mobile terminal ’s Information security.
  • FIG. 14 illustrates a block diagram of a pseudo base station defense apparatus 200 provided by an embodiment of the present application.
  • the pseudo base station defense device 200 is applied to the above mobile terminal. The following will describe the block diagram shown in FIG. 14.
  • the pseudo base station defense device 200 includes a detection module 210, a judgment module 220, and a control module 230, where:
  • the detection module 210 is configured to detect the state of the control switch of the mobile terminal, and the control switch is used to control turning on or off the pseudo base station defense function of the mobile terminal.
  • the determining module 220 is used to determine whether the state of the control switch is in an open state.
  • the control module 230 is configured to control the mobile terminal to enter a pseudo base station defense mode when the state of the control switch is on. Further, please refer to FIG. 15, which shows a block diagram of a control module of a pseudo base station defense device according to an embodiment of the present application.
  • the control switch includes multiple sub-control switches, and the pseudo base station defense mode includes multiple sub-defenses.
  • the control module 230 includes: a detection submodule 231, an acquisition submodule 232, a determination submodule 233, and a control submodule 234, wherein:
  • the detection sub-module 231 is configured to detect the state of the plurality of sub-control switches when the state of the control switch is in an open state.
  • the obtaining sub-module 232 is configured to obtain a target sub-control switch whose state of the sub-control switch in the plurality of sub-control switches is in an open state.
  • the determination sub-module 233 is configured to determine a target sub-prevention mode corresponding to the target sub-control switch from the plurality of sub-prevention modes.
  • the control sub-module 234 is used to control the mobile terminal to enter the target sub-defense mode.
  • the sub-control switch includes a first sub-control switch, a second sub-control switch, a third sub-control switch, and a fourth sub-control switch, and the sub-defense mode corresponding to the first sub-control switch is log-off network for flight mode ;
  • the sub-defense mode corresponding to the second sub-control switch is to access the 4G network and prohibit the 2G network and the 3G network to enter the VOLTE mode;
  • the sub-defense mode corresponding to the third sub-control switch is to detect the pseudo base station and issue an alarm Information;
  • the sub-defense mode corresponding to the fourth sub-control switch is to lock in the resident cell and turn off neighbor cell measurement.
  • the control sub-module 234 includes: a first control unit, a second control unit, a third control unit, an alarm unit, and a fourth control unit, wherein:
  • the first control unit is used to control the mobile terminal to log out of the network and enter the flight mode. Further, the first control unit includes: a first time acquisition subunit, a first time judgment subunit, a first control subunit, a second time judgment subunit, and a second control subunit, wherein:
  • the first time obtaining subunit is used to obtain the current time.
  • the first time judgment subunit is used to judge whether the current time reaches the first preset time.
  • the first control subunit is configured to control the mobile terminal to log out of the network and enter the flight mode when the current time reaches the first preset time.
  • the second time judgment subunit is used to judge whether the current time reaches a second preset time, wherein the second preset time is later than the first preset time.
  • the second control subunit is configured to control the mobile terminal to release the flight mode and access the network when the current time reaches the second preset time.
  • the second control unit is used to control the mobile terminal to access the 4G network and prohibit the 2G network and the 3G network from entering the VOLTE mode. Further, the second control unit includes: a second time acquisition subunit, a third time judgment subunit, a third control subunit, a fourth time judgment subunit, and a fourth control subunit, wherein:
  • the second time obtaining subunit is used to obtain the current time.
  • the third time judgment subunit is used to judge whether the current time reaches the third preset time.
  • the third control subunit is configured to control the mobile terminal to access the 4G network and prohibit the 2G network and the 3G network to enter the VOLTE mode when the current time reaches the third preset time.
  • the fourth time judgment subunit is used to judge whether the current time reaches a fourth preset time, wherein the fourth preset time is later than the third preset time.
  • the fourth control subunit is configured to control the mobile terminal to release the VOLTE mode when the current time reaches the fourth preset time.
  • the third control unit is configured to control the mobile terminal to detect whether the detected base station is a pseudo base station.
  • the alarm unit is used to issue an alarm message when the detected base station is a pseudo base station. Further, the alarm unit includes: an alarm subunit, wherein:
  • the alarm subunit is used for sending out alarm information and controlling the mobile terminal to log off the network when the detected base station is a pseudo base station.
  • the fourth control unit is used to control the mobile terminal to lock in the resident cell and turn off neighbor cell measurement.
  • the pseudo base station defense device 200 further includes: a touch operation detection module and a defense mode exit module, wherein:
  • the touch operation detection module is used for detecting the touch operation acting on the control switch.
  • the defense mode exit module is configured to, when the touch operation instruction turns off the control switch, turn off the control switch and control the mobile terminal to exit the pseudo base station defense mode in response to the touch operation. Further, the prevention mode exit module includes: closing a submodule, wherein:
  • the closing sub-module is used to close all sub-control switches when the touch operation instruction instructs to close the control switches.
  • the pseudo base station prevention device 200 further includes: an opening module, wherein:
  • the opening module is used to turn on the control switch when the mobile terminal is normally turned on or restarted.
  • the coupling between the modules may be electrical, mechanical, or other forms of coupling.
  • each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module.
  • the above integrated modules may be implemented in the form of hardware or software function modules.
  • FIG. 16 shows a structural block diagram of a mobile terminal 100 provided by an embodiment of the present application.
  • the mobile terminal 100 may be a mobile terminal capable of running application programs such as a smart phone, a tablet computer, and an e-book.
  • the mobile terminal 100 in this application may include one or more of the following components: a processor 110, a memory 120, a screen 130, and one or more application programs, where one or more application programs may be stored in the memory 120 and configured To be executed by one or more processors 110, one or more programs are configured to perform the method as described in the foregoing method embodiments.
  • the processor 110 may include one or more processing cores.
  • the processor 110 connects various parts of the entire mobile terminal 100 using various interfaces and lines, executes or executes instructions, programs, code sets or instruction sets stored in the memory 120, and calls data stored in the memory 120 to execute Various functions and processing data of the mobile terminal 100.
  • the processor 110 may use at least one of digital signal processing (Digital Signal Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), and programmable logic array (Programmable Logic Array, PLA).
  • DSP Digital Signal Processing
  • FPGA field programmable gate array
  • PLA programmable logic array
  • the processor 110 may integrate one or a combination of one of a central processing unit (Central Processing Unit, CPU), a graphics processing unit (Graphics Processing Unit, GPU), and a modem.
  • CPU Central Processing Unit
  • GPU Graphics Processing Unit
  • modem modem
  • CPU mainly deals with operating system, user interface and application program, etc .
  • GPU is used for rendering and rendering of display content
  • modem is used for handling wireless communication. It can be understood that the above-mentioned modem may not be integrated into the processor 110, and may be implemented by a communication chip alone.
  • the memory 120 may include random access memory (RAM) or read-only memory (Read-Only Memory).
  • the memory 120 may be used to store instructions, programs, codes, code sets, or instruction sets.
  • the memory 120 may include a storage program area and a storage data area, where the storage program area may store instructions for implementing an operating system and instructions for implementing at least one function (such as a touch function, a sound playback function, an image playback function, etc.) , Instructions for implementing the following method embodiments.
  • the storage data area may also store data created by the terminal 100 in use (such as a phone book, audio and video data, and chat history data).
  • the screen 130 may be a liquid crystal display (Liquid Crystal) (LCD), may be an organic light-emitting diode (Organic Light-Emitting Diode, OLED), or the like.
  • LCD liquid crystal display
  • OLED Organic Light-Emitting Diode
  • the screen 130 is used to display information input by the user, information provided to the user, and various graphical user interfaces of the mobile terminal. These graphical user interfaces may be composed of graphics, text, icons, numbers, video, and any combination thereof Pose.
  • FIG. 17 shows a structural block diagram of a computer-readable storage medium provided by an embodiment of the present application.
  • the computer readable medium 300 stores program codes, and the program codes can be called by a processor to execute the method described in the above method embodiments.
  • the computer-readable storage medium 300 may be an electronic memory such as flash memory, EEPROM (Electrically Erasable Programmable Read Only Memory), EPROM, hard disk, or ROM.
  • the computer-readable storage medium 300 includes a non-transitory computer-readable storage medium.
  • the computer-readable storage medium 300 has a storage space for the program code 310 that performs any of the method steps described above. These program codes can be read from or written into one or more computer program products.
  • the program code 310 may be compressed in an appropriate form, for example.
  • the method, device, mobile terminal and storage medium for preventing false base stations detect the state of the control switch of the mobile terminal. Determine whether the state of the control switch is on, when the state of the control switch is on, control the mobile terminal to enter the pseudo base station defense mode, so that by adding a control switch for pseudo base station defense to the mobile terminal, the user can control the control switch To open and close to prevent false base stations and improve the information security of mobile terminals.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Des modes de réalisation de la présente invention se rapportent au domaine technique des terminaux mobiles. L'invention concerne un procédé et un appareil de prévention de pseudo-station de base, un terminal mobile et un support d'informations. Selon le procédé et l'appareil de prévention de pseudo-station de base, le terminal mobile et le support d'informations des modes de réalisation de la présente invention, par l'ajout dans le terminal mobile d'un commutateur de commande de prévention de pseudo-station de base, un utilisateur peut commander la mise sous tension et la mise hors tension du commutateur de commande, de façon à empêcher une pseudo-station de base et à améliorer la sécurité des informations du terminal mobile.
PCT/CN2018/113210 2018-10-31 2018-10-31 Procédé et appareil de prévention de pseudo-station de base, terminal mobile et support d'informations WO2020087420A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/113210 WO2020087420A1 (fr) 2018-10-31 2018-10-31 Procédé et appareil de prévention de pseudo-station de base, terminal mobile et support d'informations
CN201880097378.4A CN112655237A (zh) 2018-10-31 2018-10-31 伪基站防范方法、装置、移动终端以及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/113210 WO2020087420A1 (fr) 2018-10-31 2018-10-31 Procédé et appareil de prévention de pseudo-station de base, terminal mobile et support d'informations

Publications (1)

Publication Number Publication Date
WO2020087420A1 true WO2020087420A1 (fr) 2020-05-07

Family

ID=70463534

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/113210 WO2020087420A1 (fr) 2018-10-31 2018-10-31 Procédé et appareil de prévention de pseudo-station de base, terminal mobile et support d'informations

Country Status (2)

Country Link
CN (1) CN112655237A (fr)
WO (1) WO2020087420A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131852A (zh) * 2016-08-29 2016-11-16 努比亚技术有限公司 一种伪基站防护状态同步装置、***及方法
CN205902085U (zh) * 2016-06-24 2017-01-18 南京欣网通信科技股份有限公司 伪基站感知识别***
CN106535197A (zh) * 2017-01-18 2017-03-22 北京奇虎科技有限公司 基于网络制式识别伪基站的方法及装置
CN106851654A (zh) * 2017-04-13 2017-06-13 广东欧珀移动通信有限公司 伪基站识别方法、装置及终端

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102050945B1 (ko) * 2015-04-14 2019-12-02 후아웨이 테크놀러지 컴퍼니 리미티드 단말기 제어 방법 및 장치, 그리고 단말기
CN105939517B (zh) * 2016-06-29 2019-03-01 努比亚技术有限公司 一种防止移动终端接入伪基站的方法和装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205902085U (zh) * 2016-06-24 2017-01-18 南京欣网通信科技股份有限公司 伪基站感知识别***
CN106131852A (zh) * 2016-08-29 2016-11-16 努比亚技术有限公司 一种伪基站防护状态同步装置、***及方法
CN106535197A (zh) * 2017-01-18 2017-03-22 北京奇虎科技有限公司 基于网络制式识别伪基站的方法及装置
CN106851654A (zh) * 2017-04-13 2017-06-13 广东欧珀移动通信有限公司 伪基站识别方法、装置及终端
EP3389300A1 (fr) * 2017-04-13 2018-10-17 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Procédé et appareil pour identifier une pseudo-station de base et terminal

Also Published As

Publication number Publication date
CN112655237A (zh) 2021-04-13

Similar Documents

Publication Publication Date Title
US10462764B2 (en) Method and apparatus for identifying pseudo base-station, and terminal
CN107797841B (zh) 窗口控制方法、装置、终端设备及存储介质
WO2023061279A1 (fr) Procédé et appareil d'enregistrement de réseau ims, et terminal et support de stockage lisible
CN106488456B (zh) 一种基站注册方法和装置、及移动终端
WO2020113530A1 (fr) Procédé et appareil de traitement de communication, terminal mobile et support d'informations
CN106454968A (zh) 一种基于csfb的主叫方法及装置
WO2024001955A1 (fr) Procédé et appareil de traitement de communications et dispositif et support de stockage lisible
CN104166591A (zh) 一种避免游戏被迫中断的方法及装置
US11736945B2 (en) Method for handling pseudo base station, mobile terminal, and storage medium
WO2019047170A1 (fr) Procédé et terminal d'identification de pseudo-station de base
US20210329519A1 (en) Cell Connection Processing Method and Mobile Terminal
WO2020087419A1 (fr) Procédé et appareil de traitement de fausse station de base, terminal mobile et support de stockage
WO2020124388A1 (fr) Procédé et dispositif de détection de brouillage de cellules, terminal mobile et support de stockage
WO2021057219A1 (fr) Procédé de traitement d'informations de réseau et dispositif terminal
WO2020007250A1 (fr) Procédé et dispositif de commande marche-arrêt d'identification de pseudo-station de base, terminal mobile et support d'informations
CN111966425A (zh) 进程清理方法、装置、存储介质及移动终端
WO2020087420A1 (fr) Procédé et appareil de prévention de pseudo-station de base, terminal mobile et support d'informations
CN112399515B (zh) 通信处理方法及装置
WO2020087415A1 (fr) Procédé d'identification d'une pseudo-station de base, dispositif et terminal mobile associés
WO2020113479A1 (fr) Procédé et dispositif d'identification de pseudo-station de base, terminal mobile et support de stockage
CN113079500A (zh) 一种终端激活方法、装置、存储介质及电子设备
WO2020087417A1 (fr) Procédé et dispositif d'identification de pseudostation de base, terminal mobile et support de stockage
CN110291815B (zh) 一种提高业务连续性的方法、装置及介质
WO2020133117A1 (fr) Procédé et dispositif de traitement de connexion de cellule, terminal mobile et support d'informations
US20220053077A1 (en) Method for detecting the completion of a telephone call initiated from a web browser of a mobile communication device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18938315

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 09.09.2021)

122 Ep: pct application non-entry in european phase

Ref document number: 18938315

Country of ref document: EP

Kind code of ref document: A1