CN112806044A - Pseudo base station identification method and device, mobile terminal and storage medium - Google Patents

Pseudo base station identification method and device, mobile terminal and storage medium Download PDF

Info

Publication number
CN112806044A
CN112806044A CN201880098555.0A CN201880098555A CN112806044A CN 112806044 A CN112806044 A CN 112806044A CN 201880098555 A CN201880098555 A CN 201880098555A CN 112806044 A CN112806044 A CN 112806044A
Authority
CN
China
Prior art keywords
base station
cell
pseudo
redirection
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201880098555.0A
Other languages
Chinese (zh)
Other versions
CN112806044B (en
Inventor
李伟清
张涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd, Shenzhen Huantai Technology Co Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN112806044A publication Critical patent/CN112806044A/en
Application granted granted Critical
Publication of CN112806044B publication Critical patent/CN112806044B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a pseudo base station identification method, a pseudo base station identification device, a mobile terminal and a storage medium, wherein the pseudo base station identification method is applied to the mobile terminal, and the method comprises the following steps: when the cell of a first base station needs to be redirected to the cell of a second base station, judging whether the cell of the first base station is successfully registered; if the cell of the first base station is not successfully registered, initiating tracking area update to the cell of the first base station; and if the updating of the tracking area fails, identifying the first base station as a pseudo base station. The method can accurately identify the pseudo base station.

Description

Pseudo base station identification method and device, mobile terminal and storage medium Technical Field
The present application relates to the field of mobile terminal technologies, and in particular, to a method and an apparatus for identifying a pseudo base station, a mobile terminal, and a storage medium.
Background
Mobile terminals, such as mobile phones, tablet computers, etc., have become one of the most common consumer electronic products in daily life, and people are increasingly used to perform various life-related operations through mobile terminals, which generally need to communicate through a base station of an operator. In some bustling zones, pseudo base stations disguised as operator base stations are often arranged, and as the pseudo base stations often pretend to mobile phone numbers of other people to forcibly send spam short messages such as fraud, advertising promotion and the like to the terminal, the pseudo base stations which bring troubles to the lives of people need to be identified in order to protect the data security of the terminal.
Disclosure of Invention
In view of the above problems, the present application provides a method and an apparatus for identifying a pseudo base station, a mobile terminal, and a storage medium to solve the above problems.
In a first aspect, an embodiment of the present application provides a method for identifying a pseudo base station, which is applied to a mobile terminal, and the method includes: when the cell of a first base station needs to be redirected to the cell of a second base station, judging whether the cell of the first base station is successfully registered; if the cell of the first base station is not successfully registered, initiating tracking area update to the cell of the first base station; and if the updating of the tracking area fails, identifying the first base station as a pseudo base station.
In a second aspect, an embodiment of the present application provides an apparatus for identifying a pseudo base station, which is applied to a mobile terminal, and the apparatus includes: the device comprises a cell judgment module, a tracking area updating module and a determination module, wherein when the cell of a first base station needs to be redirected to a cell of a second base station, whether the cell of the first base station is successfully registered is judged; if the cell of the first base station is not successfully registered, initiating tracking area update to the cell of the first base station; and if the updating of the tracking area fails, identifying the first base station as a pseudo base station.
In a third aspect, an embodiment of the present application provides a mobile terminal, including: one or more processors; a memory; one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the pseudo base station identification method provided in the above first aspect.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, where a program code is stored in the computer-readable storage medium, and the program code may be called by a processor to execute the method for identifying a pseudo base station provided in the first aspect.
The scheme provided by the application judges whether the cell of the first base station is successfully registered or not when the cell of the first base station is required to be redirected to the cell of the second base station, if the cell of the first base station is not successfully registered, the cell of the first base station is initiated to update the tracking area, and if the updating of the tracking area fails, the first base station can be identified as a pseudo base station, so that the pseudo base station can be accurately identified, and troubles brought to users by the pseudo base station are avoided.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 shows a system architecture diagram of a mobile communication network according to an embodiment of the present application.
Fig. 2 is a schematic system architecture diagram of another mobile communication network provided in the embodiment of the present application.
Fig. 3 shows a flow chart of a pseudo base station identification method according to an embodiment of the present application.
Fig. 4 shows a flow chart of a pseudo base station identification method according to another embodiment of the present application.
Fig. 5 shows a flowchart of step S210 in the identification method of the pseudo base station according to the embodiment of the present application.
Fig. 6 shows a flowchart of step S240 in the pseudo base station identification method according to the embodiment of the present application.
Fig. 7 is a flowchart illustrating a pseudo base station identification method according to another embodiment of the present application.
Fig. 8 shows a block diagram of an identification apparatus of a pseudo base station according to an embodiment of the present application.
Fig. 9 is a block diagram illustrating a cell judgment in an identification apparatus of a pseudo base station according to an embodiment of the present application.
Fig. 10 is a block diagram of a mobile terminal for performing an identification method of a pseudo base station according to an embodiment of the present application.
Fig. 11 is a storage unit according to an embodiment of the present application, configured to store or carry program codes for implementing an identification method of a pseudo base station according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
With the great development of mobile communication technology, mobile communication has undergone the development of multiple versions, 2G, 3G, and 4G. Regardless of the gsm (global System for Mobile communication) communication System or cdma (code Division Multiple access) communication System in the early 2G era, or the LTE (long term evolution) System architecture in the later 4G era, the base station is an important communication device.
For example, the 2G mobile communication system architecture diagram shown in fig. 1. A base Station bts (base transceiver Station) is connected to a BSC (base Station controller) as an access device of a mobile communication path, and then the BSC is connected to an MSC (mobile switching center). For another example, fig. 2 is a schematic diagram of a 4G mobile communication system architecture. The base station eNB (evolved node B) is connected with the MME (mobility Management entity), and the MME is connected with the Serving Gateway. As can be seen from fig. 1 and 2, in the mobile communication system, the base station is a device that directly establishes a connection with the mobile terminal, and has a relatively important position in the whole system architecture. The base station, generally referred to as a "public mobile communication base station," is mainly used for providing signals to mobile terminals such as mobile phones and tablet computers. The base station facility does not only grasp the appearances of the operators and equipment manufacturers in the colleges and universities, research institutes and scientific research institutes, which accelerates the frequency of the update of the communication technology and shortens the transition time of the commercial development, and therefore, the inventor found that the pseudo base station appeared with the development of the communication technology.
The pseudo base station uses the parameters of signal strength, location area, system information, etc. to induce the user to access in the coverage area of the pseudo base station through the Mobile communication network of the current network, so as to obtain the information of the user such as International Mobile Subscriber Identity (IMSI), International Mobile Equipment Identity (IMEI), etc. Lawless persons can collect user information by using the pseudo base station, and maliciously send short messages such as spam advertisements, fraud and the like or dial harassing calls by using the pseudo base station, so that the normal communication of the users is seriously influenced.
Currently, low-standard mobile communication technologies, such as 2G (2-Generation wireless telephone technology, second Generation mobile communication technology), 3G (3rd-Generation, third Generation mobile communication technology), etc., have poor authentication and protection for networks, which causes lawless persons to often perform illegal activities through 2G pseudo base stations and 3G pseudo base stations, especially to maliciously send spam advertisements, fraud and other short messages by using 2G pseudo base stations. The high-standard communication technology may specifically be an LTE network standard, for example, 4G (the 4th Generation mobile communication technology), 4G +, 5G (5th-Generation, fifth Generation mobile communication technology), etc., which are better for authentication and protection of the network, so that the mobile terminal may fail to register a cell of a pseudo base station of the high-standard mobile communication technology, and therefore, the mobile terminal may be considered to be safe in the high-standard communication network. Therefore, the low-standard mobile communication technology has relatively low safety compared with the high-standard mobile communication technology, and lawless persons can more easily realize illegal activities by using the pseudo base station of the low-standard mobile communication network.
The inventor finds that many pseudo base stations of the high-standard mobile communication network are redirected to the pseudo base stations of the low-standard mobile communication network in the registration process of authentication so as to realize illegal activities through long-term research. Based on the above problem, the inventor proposes a method, an apparatus, a mobile terminal, and a storage medium for identifying a pseudo base station according to embodiments of the present application, where when a cell of a first base station needs to be redirected to a cell of a second base station and the cell of the first base station is not successfully registered, a tracking area update is initiated to the cell of the first base station, and if the tracking area update fails, the first base station is identified as the pseudo base station, so as to accurately identify the pseudo base station.
The following describes a method for identifying a pseudo base station in the embodiment of the present application in detail.
Referring to fig. 3, an embodiment of the present application provides a pseudo base station identification method, which is applicable to a mobile terminal, and the pseudo base station identification method may include:
step S110: when the cell of the first base station needs to be redirected to the cell of the second base station, whether the cell of the first base station is successfully registered is judged.
In the embodiment of the application, as most of the pseudo base stations need to orient the mobile terminal to the pseudo base station of the low-standard mobile communication technology, the low-standard mobile communication technology can be 2G or 3G, so that illegal actions can be realized. Therefore, the cell redirection of the base station can be detected during the use process of the mobile terminal, so as to determine the condition that the cell redirection is needed, and further confirmation is performed during the cell redirection, so as to determine the cell redirection of the pseudo base station. Here, a cell refers to an area covered by a base station in a mobile communication system, and a mobile terminal can reliably communicate with the base station through a wireless channel in the cell.
When the cell to which the mobile terminal is currently accessed is the cell of the first base station, the first base station may establish an RRC (Radio Resource Control) connection with the mobile terminal. The control plane between the ue (user equipment) and the eNodeB (Evolved Node-B) includes a first layer, a second layer, and a third layer, where the first layer is a physical layer, the second layer is a medium access control layer, and the third layer is an RRC. The RRC is used to process the third layer information of the control plane between the UE (user equipment) and the eNodeB (Evolved Node-B), the RRC allocates Radio resources and sends related signaling, the main part of the control signaling between the UE and the utran (Evolved Universal Radio Access network) is RRC message, and the RRC message carries all parameters required for establishing, modifying and releasing the mac layer and the physical layer protocol entity, and also carries some signaling of the NAS (non-Access stratum).
Wherein, the RRC processes the third layer information of the control plane between the terminal and the base station, and allocates the radio resource and sends the related signaling. The RRC connection setup procedure of the first base station with the mobile terminal includes several steps of reselection of available cells, access admission control and establishment of a layer 2 signal link.
In some embodiments, the cell of the first base station may issue a redirection instruction to the mobile terminal, and when the mobile terminal receives the redirection instruction issued by the cell of the first base station, it may determine that the cell of the first base station needs to be redirected to a cell of a second base station, where the second base station is a target base station that needs to be redirected to. The cell of the first base station may issue the redirection instruction through the RRC connection. Of course, the mobile terminal needs to be redirected from the cell of the first base station to the cell of the second base station, or may be a redirected cell actively executed due to fluctuation of a wireless environment (i.e., change of signal strength and interference level) when the location of the mobile terminal changes.
When the mobile terminal accesses the cell of the pseudo base station, the cell of the pseudo base station is often redirected to the cell of the more dangerous pseudo base station under the condition of unsuccessful registration so as to realize illegal actions of the mobile terminal. That is, after the mobile terminal accesses to the cell of the pseudo base station of 4G or higher standard, the mobile terminal is redirected to the pseudo base station cell of the lower standard mobile communication network, such as the 2G or 3G pseudo base station cell, which is more dangerous, usually within the time that the cell of the pseudo base station utilizes the registration cell. Therefore, in the embodiment of the present application, when the mobile terminal determines that redirection from the cell of the first base station to the cell of the second base station is needed, it may be determined whether the cell of the first base station is successfully registered, so as to determine that the current redirection may be redirection performed by the pseudo base station.
When registering, the cell of the base station needs to perform an initial access procedure, for example, the RRC connection described above. After the initial access procedure is performed, an attach procedure needs to be performed. The attach procedure is a necessary procedure in the registration procedure, and subsequent services can be performed only after the attach is successful. When the attachment process is performed, mutual authentication between the mobile terminal and the network is required, and the mobile terminal and the mm (mobility Management entity) establish an mm (mobile Management) context. The MME establishes a default bearer for the mobile terminal, and the mobile terminal obtains an IP address allocated by a network side. User location registration and allocation of temporary identity (S-TMSI) is also required.
In this embodiment of the present application, it is determined whether to successfully register the cell of the first base station, and whether to receive a result returned by the registration may be determined, for example, if a result indicating that the registration is successful is received, it may be determined that the cell of the first base station is successfully registered, and if a result indicating that the registration is successful is not received, it may be determined that the cell of the first base station is not successfully registered. Or by judging the result generated in the above attachment process, for example, by judging whether the authentication is successful, if the authentication is successful, it is determined that the cell of the first base station is successfully registered, and if the authentication is not successful, it is determined that the cell of the first base station is not successfully registered. Or by judging whether an IP address is currently allocated, if the IP address is currently allocated, it indicates that the cell is successfully registered, and if the IP address is not currently allocated, it indicates that the cell is not successfully registered. Of course, the specific manner of determining whether to successfully register the cell of the first base station may not be limited in this embodiment of the application.
Step S120: and if the cell of the first base station is not successfully registered, initiating tracking area update to the cell of the first base station.
In this embodiment of the present application, when it is required to be redirected from a cell of a first base station to a cell of a second base station and it is determined that the cell of the first base station is not successfully registered, it indicates that the current redirection is performed, and when it may be that the cell of the pseudo base station is intentionally not successfully registered, the redirection is performed to a cell of a base station of a more dangerous low-standard mobile communication network, for example, when the cell of the 4G pseudo base station is not successfully registered, the redirection is performed to a cell of a 2G base station or a cell of a 3G base station. Of course, the redirection that needs to be performed currently may also be a normal redirection, such as a redirection that occurs when the mobile terminal is just powered on and the signal of the current base station is poor. Therefore, the first base station is a suspected pseudo base station, and the first base station may be further detected to determine whether the first base station is a pseudo base station.
Since the cell location Area code (TAC) of the pseudo base station is intentionally set to the same TAC as the operator base station, the mobile terminal does not initiate Tracking Area Update (TAU). Here, the tracking area update in the Long Term Evolution (LTE) network means that when a mobile terminal moves from one cell location area (TA) to another TA, the location registration must be performed again on the new TA to notify the network to change the location information of the mobile terminal stored in the new TA. For example, when the mobile terminal detects a new cell and finds that the TAC of the cell is different from the TAC of the current cell, it may initiate a TAU. To determine the location of the mobile terminal, the coverage area of the LTE network will be divided into a plurality of TAs, which, like the location area and routing area of 3G, are the basic units for location update and paging in the LTE system. The TAs are identified with the TACs, and a TA may contain one or more cells whose SIBs 1 broadcast by the TAC. The network operates with the TAI as the unique identity of the TA.
When performing TAU, security verification procedures such as authentication and integrity protection are performed, and if the pseudo base station performs TAU, the TAU update fails because the pseudo base station cannot pass the security verification procedures. Therefore, when it is determined that the cell of the first base station is not successfully registered, tracking area update may be initiated to the cell of the first base station to determine whether the first base station is a pseudo base station.
It can be understood that when accessing a pseudo base station of an LTE network, a mobile terminal may be quickly redirected to a more dangerous pseudo base station cell without successfully registering the pseudo base station cell because it cannot successfully register the pseudo base station cell. In addition, since the TAC of the pseudo base station coincides with the TAC of the operator, TAU is not performed. Therefore, when the mobile terminal determines that the cell of the first base station needs to be redirected to the cell of the second base station and the cell of the first base station is not successfully registered, the mobile terminal may perform TAU to determine whether the first base station is a pseudo base station. When initiating a TAU to a cell of a first base station, the TAU may be sent to the cell of the first base station, where the TAU is used to instruct the first base station to perform a TAU related operation. When the cell of the first base station is successfully registered, the redirection is normal redirection.
Step S130: and if the updating of the tracking area fails, identifying the first base station as a pseudo base station.
In this embodiment of the present application, after initiating a TAU to a cell of a first base station, a mobile terminal may receive a tracking area update result returned by the cell of the first base station, and when receiving update rejection information returned by the cell of the first base station, it indicates that tracking area update fails.
Further, when it is determined that the tracking area update fails, the first base station may be identified as a pseudo base station. It can be understood that when the mobile terminal accesses the pseudo base station of the LTE network, the mobile terminal may be quickly redirected to a more dangerous pseudo base station cell without successfully registering the pseudo base station cell. Therefore, when it is determined that the cell of the first base station needs to be redirected to the cell of the second base station, the cell of the first base station is not successfully registered, and the cell of the first base station cannot implement tracking area update, so that it can be determined that the first base station is a pseudo base station.
According to the pseudo base station identification method provided by the embodiment of the application, the pseudo base station is identified when redirection is needed, so that the pseudo base station can be identified before the pseudo base station cell is redirected to a more dangerous base station cell, subsequent quick decision making is facilitated, and the loss of a user is avoided. And the pseudo base station is identified through the multiple characteristics of the pseudo base station, so that the accuracy of identifying the pseudo base station is higher.
Referring to fig. 4, another embodiment of the present application provides a pseudo base station identification method, which is applicable to a mobile terminal, and the pseudo base station identification method includes:
step S200: when the cell of the first base station needs to be redirected to the cell of the second base station, whether the redirection is the redirection occurring when the communication network is used for communication is judged.
In this embodiment, when the cell to which the mobile terminal is currently accessed is the cell of the first base station, the first base station may establish an RRC connection with the mobile terminal. The first base station may transmit a redirection instruction to the mobile terminal through the RRC connection when the mobile terminal needs to be redirected from the cell of the first base station to the cell of the second base station. Therefore, as an embodiment, the determining, by the mobile terminal, that the cell redirection from the cell of the first base station to the cell of the second base station is required may include:
receiving release information sent by a cell of the first base station in a process of releasing the connection of the radio resource control with the mobile terminal; and when the release information carries an instruction indicating that the mobile terminal needs to be redirected to a cell of a second base station, determining that the cell of the first base station needs to be redirected to the cell of the second base station.
It can be understood that, after establishing an RRC (Radio Resource Control) connection with the mobile terminal, the cell of the first base station may send release information carrying a redirection instruction in a process of controlling to release the RRC connection of the mobile terminal, where the redirection instruction is used to instruct the mobile terminal to be redirected from the cell of the first base station to the cell of the second base station. Correspondingly, the mobile terminal may receive release information sent by the cell of the first base station in the process of releasing the RRC connection, and when it is determined that the received release information includes the instruction, it may be determined that the cell of the first base station needs to be redirected to the cell of the second base station. Therefore, after establishing RRC connection with the cell of the first base station, by receiving a message sent by the cell of the first base station in the process of controlling release of the RRC connection of the mobile terminal, it is possible to determine that the cell of the first base station needs to be redirected to the cell of the second base station.
Further, when the mobile terminal accesses the pseudo base station of the high-standard mobile communication network, the mobile terminal needs to be redirected to the pseudo base station of the low-standard mobile communication network, where the high-standard mobile communication network may be an LTE network (e.g. 4G), and the low-standard mobile communication network may be 2G or 3G. Therefore, before determining whether the cell of the first base station is successfully registered, it can be further determined whether the second base station to which redirection is required is a 2G base station or a 3G base station. Therefore, the method for identifying a pseudo base station may further include:
judging whether the second base station is a base station of a second generation mobile communication technology or a third generation mobile communication technology; and if the mobile communication terminal is a base station of the second generation mobile communication technology or the third generation mobile communication technology, the step of judging whether the cell of the first base station is successfully registered is carried out.
In this embodiment, it may be determined whether the characteristic parameter of the second base station matches the characteristic parameter of the 2G base station or the 3G base station according to the characteristic parameter of the second base station, so as to determine whether the second base station is the 2G base station or the 3G base station. The characteristic parameters include a Location Area Code (LAC), a location Area Identity (TAI), an absolute video channel number (EARFCN), a Physical Cell Identity (PCI), a Cell Identity (CID), and the like. Specifically, taking LAC as an illustration, since the operator allocates LAC codes at the initial stage of network establishment, each region is allocated a certain number of LACs. The 2G network specifies that LAC uses BCD coding (Binary-Coded Decimal), and that LAC for 2G ranges from [0x1000-0x1999], [0x2000-0x2999], …, [0x9000-0x9999] in hexadecimal. In 3G networks, the LAC range for WCDMA and TD-SCDMA is [0xa000-0xffff ]. Therefore, whether the LAC is within the LAC range can be determined according to the LAC of the second base station, and when the LAC of the second base station is within the LAC range, it can be determined that the second base station is a 2G base station or a 3G base station. Of course, the manner of specifically determining whether the second base station is a 2G base station or a 3G base station may not be limited in the embodiment of the present application.
In this embodiment of the present application, it may also be determined whether the first base station is a 4G base station, a 4G + base station, or a 5G base station, so as to further determine that the redirection is a base station cell redirection to a 2G or 3G base station cell in the LTE network. Likewise, it may be determined whether the first base station is a pseudo base station according to the characteristic parameter of the first base station. For example, whether the TAC of the first base station is within the TAC range of the 4G base station may be determined, and if the TAC of the first base station is within the TAC range of the 4G base station, the first base station may be determined to be the 4G base station. Of course, the manner of specifically determining whether the first base station is a 4G base station, a 4G + base station, or a 5G base station may not be limited in this embodiment of the application.
The pseudo base station of the high-standard communication network redirects the mobile terminal to the pseudo base station of the low-standard communication network, but not to the pseudo base station of the communication network during voice communication. Therefore, before determining whether the cell of the first base station is successfully registered, it may be determined whether the redirection is a redirection occurring when a call is made using a communication network, where the redirection is a redirection from the cell of the first base station to the cell of the second base station.
As one way, redirection that occurs when a call is made using a communication network may include:
redirection of calls provided by Circuit Switched Fallback (CSFB) is employed.
Since wireless communication between a Long Term Evolution (LTE) and a 2G/3G dual-mode terminal is a single-radio mode (Signal-radio mode), when LTE access is used, a dual-mode or multi-mode terminal with LTE and 2G/3G access capabilities cannot transmit a 2G/3G circuit domain service Signal. In order to enable a terminal (UE) to perform Circuit domain (CS) services such as voice services under LTE access or camping, and to correctly handle Packet domain (PS) services being performed by the UE under LTE access, a CSFB technique has been developed.
The CSFB procedure comprises three phases: 1) the Mobile terminal initiates a call in the LTE network, corresponding to an initiator of the call, namely, a calling party (MO), or receives a page, corresponding to a recipient of the call, namely, a called party (MT); 2) the mobile terminal falls back under the guidance of the LTE network and searches for a proper 2G/3G cell, such as a GSM cell/WCDMA cell for access; 3) the UE reads the GSM cell/WCDMA cell system broadcast message and establishes a voice call.
The CSFB needs to redirect the mobile terminal to a 2G/3G cell, which is done when talking with the CFSB. Therefore, as an embodiment, it may be determined whether the mobile terminal initiates a call request within the LTE coverage area within a first set time period before determining that the redirection is needed. If the call request is initiated, the redirection is determined to be the redirection provided by the Circuit Switched Fallback (CSFB) when the call is in progress, and if the call request is not initiated, the redirection is determined not to be the redirection provided by the Circuit Switched Fallback (CSFB) when the call is in progress. As another embodiment, it may be determined whether the mobile terminal has received the paging request within the LTE coverage within a first set time period before determining that the redirection is needed. If the paging request is received, the redirection is determined to be the redirection of the call provided by the Circuit Switched Fallback (CSFB), and if the paging request is not received, the redirection is determined not to be the redirection of the call provided by the Circuit Switched Fallback (CSFB). The call request and the paging request may be service requests carrying CSFB indicator parameters. Of course, the way of specifically determining whether the redirection is redirection in call provided by Circuit Switched Fallback (CSFB) may not be limited in this embodiment of the application.
As another way, the redirection that occurs when a call is made using a communication network may include:
redirection of call time provided with single radio mode voice call continuity (SRVCC).
SRVCC refers to service continuity of a voice call when a single radio mode terminal is handed over from a Time Division long term Evolution (TD-LTE) network to UTRAN/GERAN. The decision of SRVCC is completed at the evolved Node B (eNB), when there is a user request, a Mobility Management Entity (MME) can synthesize the SRVCC capability information of itself and the SRVCC capability information of UE to obtain the integrated SRVCC capability information, then inform the information to the eNB, and the eNB carries out switching judgment, only when the MME and the UE both support the SRVCC capability, the eNB can initiate an SRVCC switching request for the UE.
SRVCC needs to redirect the mobile terminal to a 2G/3G cell, which is performed when the SRVCC is used for a call. Therefore, as an embodiment, it may be determined whether the mobile terminal initiates a call request when the EPC completes attachment and radio bearer within a first set time before the mobile terminal determines that the redirection is required. If a call request is initiated, the redirection is determined to be the redirection of the call provided by the SRVCC, and if the call request is not initiated, the redirection is determined not to be the redirection of the call provided by the SRVCC. As another embodiment, it may be determined whether the mobile terminal has received the paging request when the EPC completes attachment and radio bearer within a first set time before the mobile terminal determines that the redirection is required. If the paging request is received, the redirection is determined to be the redirection of the call provided by the SRVCC, and if the paging request is not received, the redirection is determined not to be the redirection of the call provided by the SRVCC. The call request and the paging request may be service requests carrying SRVCC indicator parameters. Of course, the manner of specifically determining whether the redirection is redirection in the call provided by SRVCC may not be limited in the embodiment of the present application.
Therefore, whether the redirection is a redirection occurring when a call is made using a communication network can be determined in the above manner, and of course, the manner of determining whether the redirection is a redirection occurring when a call is made using a communication network may not be limited in the embodiment of the present application.
Step S210: and if the redirection is not the redirection generated when the communication network is used for communication, judging whether the cell of the first base station is successfully registered.
When it is determined that the cell of the first base station is redirected to the cell of the second base station, which is not redirected during the call using the communication network, it indicates that the current redirection may be the redirection of the pseudo base station cell in the LTE network to the 2G or 3G pseudo base station cell. At this point, it may be determined whether the cell of the first base station was successfully registered to further determine that the current redirection may be a redirection by the pseudo base station. And when the redirection is determined to be the redirection occurring when the communication network is used for communication, indicating that the redirection is normal redirection.
As an embodiment, referring to fig. 5, the determining whether the cell of the first base station is successfully registered may include:
step S211: a record of successfully registered cells is obtained.
It will be appreciated that in determining whether to successfully register with the cell of the first base station, the currently stored record of successfully registered cells may be read. The record may be a stored list of successfully registered cells, and the cell list may store therein identity information of the successfully registered cells, such as cell identification information.
Step S212: and judging whether the cell of the first base station exists in the record.
After the record of the successfully registered cell is obtained, the identity information of the cell of the first base station may be compared with the identity information of the successfully registered cell in the record to determine whether the record includes the cell of the first base station. I.e. if the identity information of the cell of the first base station matches the identity information of any successfully registered cell in the record, it is determined that the cell of the first base station is present in the record.
Step S213: if the cell of the first base station exists, determining that the cell of the base station is successfully registered; if the cell of the first base station does not exist, determining that the cell of the base station is not successfully registered.
It can be understood that if it is determined that the cell of the first base station exists in the record, it indicates that the cell of the first base station has been successfully registered, and therefore, the first base station is a normal base station. If the fact that the cell of the first base station exists in the record is determined, the fact that the cell of the first base station is not successfully registered is indicated, and the redirection is possible to be that the pseudo base station cell in the LTE network is redirected to a 2G or 3G pseudo base station cell. Of course, the specific manner of determining whether to successfully register the cell of the first base station may not be limited in this embodiment of the application. And if the cell of the first base station is successfully registered, indicating that the redirection is normal redirection.
Step S220: suspending the operation of redirection if the cell of the first base station is not successfully registered.
When the cell of the first base station needs to be redirected to the cell of the second base station, the redirection is determined to be redirection during non-call, and the cell of the first base station is determined to be unsuccessfully registered, the current redirection is indicated, and the cell of the base station which is possibly a pseudo base station in the LTE network is redirected to a cell of a more dangerous base station when the cell is intentionally unsuccessfully registered, for example, the cell of the 2G base station or the cell of the 3G base station is redirected when the cell of the 4G pseudo base station is unsuccessfully registered.
In the embodiment of the application, in order to ensure the safety of the user, a lawless person is prevented from realizing the lawless action by redirecting the mobile terminal to the cell of the 2G base station or the cell of the 3G base station, and the redirecting operation can be suspended when the situation that the cell of the first base station is not successfully registered is determined, so that the loss of the user is avoided.
Step S230: and initiating tracking area update to the cell of the first base station.
When the redirection is determined to be that the mobile terminal is possibly accessed to a pseudo base station cell of an LTE network, the pseudo base station redirects the mobile terminal to a 2G pseudo base station cell or a 3G pseudo base station cell, so that the first base station is a suspected pseudo base station. In this embodiment of the present application, tracking area update may be initiated to a cell of a first base station, so as to further detect the first base station, so as to determine whether the first base station is a pseudo base station, and specifically, content of initiating tracking area update to the cell of the first base station may refer to content of the foregoing embodiment, which is not described herein again.
Step S240: and if the updating of the tracking area fails, identifying the first base station as a pseudo base station.
After initiating the tracking area update request, the tracking area update result may be determined according to information returned by the cell of the first base station. In the embodiment of the present application, please refer to fig. 6, step S240 may include:
step S241: and receiving an updating result returned by the cell of the first base station.
Step S242: and when the updating result comprises a reason value of updating failure, determining that the tracking of the tracking area fails.
It is understood that the cell of the first base station returns the update result after receiving the tracking area update requested by the mobile terminal, and correspondingly, the mobile terminal may receive the update result returned by the cell of the first base station. When the tracking area update fails, the update result sent by the LTE network is usually a tracking area update reject message, and the tracking area update reject message usually carries a reject cause value, where different reject cause values indicate different reject causes. For example, a reject cause value of #15 indicates that the tracking area has no suitable cell, etc. In practical application, the mobile terminal can analyze the tracking area update rejection message to obtain the base station identifier and the rejection reason value. Therefore, when the received update result is the tracking area update rejection message and the tracking area update rejection message carries the rejection reason value, it can be determined that the tracking area update fails.
Since the security verification process such as authentication and integrity protection is performed when the TAU is performed, if the pseudo base station performs the TAU, the TAU update fails because the pseudo base station cannot pass the security verification process. Therefore, when it is determined that the tracking area update fails, the first base station can be identified as a pseudo base station. It can be understood that when the mobile terminal accesses to the pseudo base station of the LTE network, the mobile terminal may be quickly redirected to the more dangerous 2G pseudo base station cell or 3G pseudo base station cell without successfully registering the pseudo base station cell, and when the mobile terminal accesses to the pseudo base station cell, the TAU may not be performed. Therefore, when it is determined that redirection from the cell of the first base station to the cell of the second base station is required, the redirection is redirection during non-call, the cell of the first base station is not successfully registered, and the cell of the first base station cannot realize tracking area update, so that it can be determined that the first base station is a pseudo base station.
Step S250: access to the cell of the first base station is barred.
It is understood that when the first base station is determined to be a pseudo base station, access to the cell of the first base station may be prohibited to avoid the user from being attacked by a lawless person.
As an implementation manner, the manner for prohibiting the mobile terminal from accessing the cell of the first base station includes that the mobile terminal prohibits detecting the characteristic parameters corresponding to the first base station, where the characteristic parameters include a location Area Identity (TAI), an absolute video channel number (EARFCN), a Physical Cell Identity (PCI), a Cell Identity (CID), and the like, and of course, the characteristic parameters corresponding to the first base station may also include other parameters, which are not described herein again. In this embodiment, the first base station may be identified by using the characteristic parameter corresponding to the first base station, and the mobile terminal is prohibited from accessing the first base station based on the identification.
In the embodiment of the present application, if the first base station is directly and completely prohibited, although the possibility that the mobile terminal is attacked by the first base station can be avoided, the mobile terminal is completely prohibited from being monitored and tracked by the security monitoring system, which also causes adverse effects.
In this embodiment, after prohibiting the mobile terminal from accessing the cell of the first base station, the prohibition of the mobile terminal from accessing the cell of the first base station may be cancelled in certain situations. Therefore, the method for identifying a pseudo base station may further include:
and when a specified condition is met, canceling the cell prohibited from accessing the first base station.
As an implementation manner, after prohibiting the mobile terminal from accessing the cell of the first base station, monitoring and recording a duration that the mobile terminal is prohibited from accessing the first base station, where the monitoring manner may include real-time monitoring, monitoring at a predetermined interval duration, or monitoring at a time interval set by a user, and optionally, in order to improve accuracy of the duration obtained by monitoring, a real-time monitoring manner may be adopted. And when the monitored duration exceeds the designated duration, forbidding the mobile terminal to access the first base station is cancelled, namely, the registered network of the mobile terminal on the first base station is not limited any more so as to cooperatively report the information required by the security monitoring system. It can be understood that, by the above method, the mobile terminal can be prevented from being attacked by the pseudo base station, and meanwhile, the mobile terminal is not completely prohibited from accessing the pseudo base station, thereby ensuring that the mobile terminal is monitored and tracked by the security monitoring system.
Step S260: identifying the second base station as a pseudo base station.
In the embodiment of the application, when the first base station is determined to be the pseudo base station, it means that the redirection is a pseudo base station of the mobile terminal accessing the LTE network, and the cell is quickly redirected to a more dangerous 2G pseudo base station cell or 3G pseudo base station cell. Therefore, it can be determined that the second base station is also a pseudo base station.
Step S270: access to the cell of the second base station is barred.
In the embodiment of the present application, when the second base station is determined to be a pseudo base station, in order to avoid the user from being attacked by a lawless person, the access to the cell of the second base station may be prohibited.
As an implementation manner, the manner for prohibiting the mobile terminal from accessing the cell of the second base station includes that the mobile terminal prohibits detecting the characteristic parameters corresponding to the second base station, where the characteristic parameters include a location Area Identity (TAI), an absolute video channel number (EARFCN), a Physical Cell Identity (PCI), a Cell Identity (CID), and the like, and of course, the characteristic parameters corresponding to the second base station may also include other parameters, which are not described herein again. In this embodiment, the second base station may be identified by using the characteristic parameter corresponding to the second base station, and the mobile terminal is prohibited from accessing the second base station based on the identification.
In this embodiment, after prohibiting the mobile terminal from accessing the cell of the second base station, the prohibition of the mobile terminal from accessing the cell of the second base station may be cancelled in certain situations. Therefore, the method for identifying a pseudo base station may further include:
and when a specified condition is met, canceling the cell prohibited from accessing the second base station.
As an implementation manner, after the mobile terminal is prohibited from accessing the cell of the second base station, monitoring and recording a duration that the mobile terminal is prohibited from accessing the second base station is started, where the monitoring manner may include real-time monitoring, monitoring at a predetermined interval duration, or monitoring at a time interval set by a user, and optionally, in order to improve accuracy of the duration obtained by monitoring, a real-time monitoring manner may be adopted. And when the monitored duration exceeds the specified duration, forbidding the mobile terminal to access the second base station is cancelled, namely, the registered network of the mobile terminal on the second base station is not limited any more so as to cooperatively report the information required by the security monitoring system. It can be understood that, by the above method, the mobile terminal can be prevented from being attacked by the pseudo base station, and meanwhile, the mobile terminal is not completely prohibited from accessing the pseudo base station, thereby ensuring that the mobile terminal is monitored and tracked by the security monitoring system.
Step S280: rejecting cells camped on the first base station and redirecting to cells other than the cell of the first base station and the cell of the second base station.
In the embodiment of the present application, when the first base station is determined, the mobile terminal may directly refuse to camp on the cell managed by the first base station, and in addition, when the first base station is a pseudo base station, the second base station may also be identified as a pseudo base station, so that the mobile terminal may be redirected to other cells except the cell of the first base station and the cell of the second base station, thereby achieving an effect of preventing the pseudo base station from camping. For example, the cell list may be redirected to a cell managed by a Universal Mobile Telecommunications System (UMTS) base station that is not managed by the first base station and the second base station, a cell managed by an LTE base station, or the like. The execution sequence of step S250, step S260, and step S280 may not be limited in the embodiment of the present application.
Step S290: if the tracking area update is successful, continuing the operation of redirecting.
In the embodiment of the present application, after the tracking area update is initiated to the cell of the first base station, if the update is successful, it indicates that the first base station can implement security verification processes such as authentication and integrity protection that can be performed by a normal base station, and it can be determined that the first base station is a legitimate base station. Therefore, the cell redirected from the first base station to the cell of the second base station is redirected in normal use, for example, when the signal in the LTE network is not good, the cell is redirected to the 3G or 2G network, so that the redirection operation can be continued to meet the normal use requirement.
According to the pseudo base station identification method, when redirection is needed, redirection is judged, whether the current cell is registered successfully is judged, in addition, tracking area updating is also carried out, and when the tracking area updating fails, the current cell is determined to be the pseudo base station, so that the pseudo base station can be identified before the pseudo base station cell is redirected to a more dangerous base station cell, redirection operation is suspended, and user loss is avoided. And the pseudo base station is identified through the multiple characteristics of the pseudo base station, so that the accuracy of identifying the pseudo base station is higher. In addition, when the pseudo base station is identified, the pseudo base station is forbidden, the pseudo base station is refused to reside in the pseudo base station cell and is redirected to other cells, the pseudo base station is prevented from attacking the user, and the safety of the user is ensured.
Referring to fig. 7, another embodiment of the present application provides a pseudo base station identification method, which is applicable to a mobile terminal, and the pseudo base station identification method may include:
step S310: when the cell of the first base station needs to be redirected to the cell of the second base station, whether the redirection is the redirection occurring when the communication network is used for communication is judged.
Step S320: and if the redirection is not the redirection generated when the communication network is used for communication, judging whether the cell of the first base station is successfully registered.
In the embodiment of the present application, step S310 and step S320 may refer to the contents of the previous embodiment, and are not described herein again.
Step S330: and if the cell of the first base station is not successfully registered, canceling the redirection operation.
It should be noted that, different from the previous embodiment, when it is required to be redirected from the cell of the first base station to the cell of the second base station, it is determined that the redirection is a redirection during non-call, and it is determined that the cell of the first base station is not successfully registered, it indicates a current redirection, and when it may be that the cell of the pseudo base station in the LTE network is intentionally unsuccessfully registered, it is redirected to a cell of a more dangerous base station, for example, the cell of the 4G pseudo base station is redirected to the cell of the 2G base station or the cell of the 3G base station when the cell of the 4G pseudo base station is unsuccessfully registered.
In the embodiment of the application, in order to ensure the safety of the user, a lawless person is prevented from realizing the lawless action by redirecting the mobile terminal to the cell of the 2G base station or the cell of the 3G base station. Therefore, when it is determined that the cell of the first base station is not successfully registered, the redirection operation is cancelled, that is, the redirection operation is not executed any more, so that the user loss caused by an attack after redirection to the cell of the 2G base station or the cell of the 3G base station can be avoided.
Step S340: and initiating tracking area update to the cell of the first base station.
Step S350: and if the updating of the tracking area fails, identifying the first base station as a pseudo base station.
Step S360: access to the cell of the first base station is barred.
Step S370: identifying the second base station as a pseudo base station.
Step S380: access to the cell of the second base station is barred.
Step S390: rejecting cells camped on the first base station and redirecting to cells other than the cell of the first base station and the cell of the second base station.
In the embodiment of the present application, steps S340 to S390 may refer to the contents of the previous embodiment, which are not described herein again.
According to the pseudo base station identification method, when redirection is needed, redirection is judged, whether the current cell is registered successfully is judged, in addition, tracking area updating is also carried out, and when the tracking area updating fails, the current cell is determined to be the pseudo base station, so that the pseudo base station can be identified before the pseudo base station cell is redirected to a more dangerous base station cell, redirection operation is cancelled, and user loss is avoided. And the pseudo base station is identified through the multiple characteristics of the pseudo base station, so that the accuracy of identifying the pseudo base station is higher. In addition, when the pseudo base station is identified, the pseudo base station is forbidden, the pseudo base station is refused to reside in the pseudo base station cell and is redirected to other cells, the pseudo base station is prevented from attacking the user, and the safety of the user is ensured.
Referring to fig. 8, fig. 8 is a block diagram illustrating an apparatus 400 for identifying a pseudo base station according to an embodiment of the present application. The pseudo base station identification apparatus 400 is applied to the mobile terminal, and will be explained below with respect to the apparatus shown in fig. 8, where the pseudo base station identification apparatus 400 includes: a cell determination module 410, a tracking area update module 420, and a determination module 430. The cell determining module 410 is configured to determine whether the cell of the first base station is successfully registered when the cell of the first base station needs to be redirected to the cell of the second base station; the tracking area update module 420 is configured to initiate a tracking area update to the cell of the first base station if the cell of the first base station is not successfully registered; the determining module 430 is configured to identify the first base station as a pseudo base station if the tracking area update fails.
In this embodiment of the present application, the apparatus 400 for identifying a pseudo base station may further include: a redirection suspension module. The redirection suspending module is used for suspending the operation of redirection if the cell of the first base station is not successfully registered.
Further, the pseudo base station identification apparatus 400 may further include: and a redirection execution module. And the redirection execution module is used for continuing the redirection operation if the tracking area is updated successfully.
In this embodiment of the present application, the apparatus 400 for identifying a pseudo base station may further include: and a redirection cancellation module. The redirection canceling module is used for canceling the redirection operation if the cell of the first base station is not successfully registered.
In this embodiment, please refer to fig. 9, the cell determining module 410 may include: a redirection determination unit 411 and a cell determination execution unit 412. The redirection judging unit 411 is configured to judge whether the redirection is a redirection occurring when a call is made using a communication network; the cell determination executing unit 412 is configured to determine whether the cell of the first base station is successfully registered if the redirection is not redirection occurring when the call is made using the communication network.
Further, the redirecting occurring when the call is made using the communication network includes: redirection during call provided by Circuit Switched Fallback (CSFB); or redirection of calls while using single radio mode voice call continuity (SRVCC) provisioning.
In this embodiment of the present application, the apparatus 400 for identifying a pseudo base station may further include: the device comprises a release information receiving module and a redirection determining module. The release information receiving module is used for receiving release information sent by the cell of the first base station in the process of releasing the connection of the radio resource control with the mobile terminal; and the redirection determining module is used for determining that the cell of the first base station needs to be redirected to the cell of the second base station when the release information carries an instruction indicating that the mobile terminal needs to be redirected to the cell of the second base station.
In this embodiment of the present application, the apparatus 400 for identifying a pseudo base station may further include: a first cell barring module. The first cell barring module is configured to bar access to a cell of the first base station.
Further, the first cell barring module is specifically configured to: and prohibiting detecting characteristic parameters corresponding to the first base station, wherein the characteristic parameters comprise at least one of a location area identifier, an absolute video channel number, a physical unit identifier and a cell identifier.
In some embodiments, the pseudo base station identification apparatus 400 may further include: a first inhibit cancellation module. The first forbidding cancellation module is used for canceling the cell forbidding to be accessed to the first base station when a specified condition is met.
In this embodiment of the present application, the apparatus 400 for identifying a pseudo base station may further include: and a base station judging module. The base station judging module is used for judging whether the second base station is a base station of the second generation mobile communication technology or the third generation mobile communication technology. If the base station is judged to be the base station of the second generation mobile communication technology or the third generation mobile communication technology, the cell judging module judges whether the cell of the first base station is successfully registered.
In this embodiment of the present application, the apparatus 400 for identifying a pseudo base station may further include: and a base station identification module. And the base station identification module is used for identifying the second base station as a pseudo base station.
Further, the pseudo base station identification apparatus 400 may further include: and a second cell barring module. The second cell barring module is configured to bar access to a cell of the second base station.
In some embodiments, the pseudo base station identification apparatus 400 may further include: a second inhibit cancellation module. And the second forbidding cancellation module is used for canceling the cell which is forbidden to be accessed to the second base station when a specified condition is met.
In this embodiment of the present application, the apparatus 400 for identifying a pseudo base station may further include: an update result receiving module and an update determining module. The updating result receiving module is used for receiving the updating result returned by the cell of the first base station; and the updating determining module is used for determining that the tracking area fails to track when the updating result comprises a reason value of updating failure.
In this embodiment, the cell determining module 410 may be specifically configured to: acquiring records of cells which are successfully registered; judging whether the record has the cell of the first base station or not; if the cell of the first base station exists, determining that the cell of the base station is successfully registered; if the cell of the first base station does not exist, determining that the cell of the base station is not successfully registered.
In this embodiment of the present application, the apparatus 400 for identifying a pseudo base station may further include: and a rejection module. The rejecting module is used for rejecting the cell residing in the first base station and redirecting to other cells except the cell of the first base station and the cell of the second base station.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, the coupling between the modules may be electrical, mechanical or other type of coupling.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
To sum up, the scheme provided by the application judges whether the cell of the first base station is successfully registered or not when the cell of the first base station needs to be redirected to the cell of the second base station, if the cell of the first base station is not successfully registered, the tracking area update is initiated to the cell of the first base station, and if the tracking area update fails, the first base station can be identified as a pseudo base station, so that the pseudo base station can be accurately identified, and the trouble brought to a user by the pseudo base station is avoided.
Referring to fig. 10, a block diagram of a mobile terminal according to an embodiment of the present application is shown. The mobile terminal 100 may be a smart phone, a tablet computer, an electronic book, or other mobile terminal capable of running an application. The mobile terminal 100 in the present application may include one or more of the following components: a processor 110, a memory 120, and one or more applications, wherein the one or more applications may be stored in the memory 120 and configured to be executed by the one or more processors 110, the one or more programs configured to perform a method as described in the aforementioned method embodiments.
Processor 110 may include one or more processing cores. The processor 110 interfaces with various components throughout the mobile terminal 100 using various interfaces and lines, and performs various functions of the mobile terminal 100 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 120 and invoking data stored in the memory 120. Alternatively, the processor 110 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 110 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 110, but may be implemented by a communication chip.
The Memory 120 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory 120 may be used to store instructions, programs, code sets, or instruction sets. The memory 120 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The storage data area may also store data created by the terminal 100 in use, such as a phonebook, audio-video data, chat log data, and the like.
Referring to fig. 11, a block diagram of a computer-readable storage medium according to an embodiment of the present application is shown. The computer-readable medium 800 has stored therein a program code that can be called by a processor to execute the method described in the above-described method embodiments.
The computer-readable storage medium 800 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 800 includes a non-volatile computer-readable storage medium. The computer readable storage medium 800 has storage space for program code 810 to perform any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 810 may be compressed, for example, in a suitable form.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (20)

  1. A pseudo base station identification method is applied to a mobile terminal, and comprises the following steps:
    when the cell of a first base station needs to be redirected to the cell of a second base station, judging whether the cell of the first base station is successfully registered;
    if the cell of the first base station is not successfully registered, initiating tracking area update to the cell of the first base station;
    and if the updating of the tracking area fails, identifying the first base station as a pseudo base station.
  2. The method of claim 1, wherein if the cell of the first base station is not successfully registered, the method further comprises:
    suspending operation of the redirection.
  3. The method of claim 2, further comprising:
    if the tracking area update is successful, continuing the operation of redirecting.
  4. The method of claim 1, wherein if the cell of the first base station is not successfully registered, the method further comprises:
    canceling the redirecting operation.
  5. The method of claim 1, wherein the determining whether the cell of the first base station is successfully registered comprises:
    judging whether the redirection is generated when a communication network is used for communication or not;
    and if the redirection is not the redirection generated when the communication network is used for communication, judging whether the cell of the first base station is successfully registered.
  6. The method of claim 5, wherein the redirecting that occurs while the call is being conducted using the communication network comprises:
    redirection during call provided by Circuit Switched Fallback (CSFB); or
    Redirection of call time provided with single radio mode voice call continuity (SRVCC).
  7. The method of claim 1, wherein before the determining whether the cell of the first base station is successfully registered when redirection from the cell of the first base station to the cell of the second base station is required, the method further comprises:
    receiving release information sent by a cell of the first base station in a process of releasing the connection of the radio resource control with the mobile terminal;
    and when the release information carries an instruction indicating that the mobile terminal needs to be redirected to a cell of a second base station, determining that the cell of the first base station needs to be redirected to the cell of the second base station.
  8. The method according to any of claims 1-7, wherein after said identifying said first base station as a pseudo base station if a tracking area update fails, the method further comprises:
    barring access to a cell of the first base station.
  9. The method of claim 8, wherein the barring access to the cell of the first base station comprises:
    and prohibiting detecting characteristic parameters corresponding to the first base station, wherein the characteristic parameters comprise at least one of a location area identifier, an absolute video channel number, a physical unit identifier and a cell identifier.
  10. The method according to claim 8 or 9, characterized in that the method further comprises:
    and when a specified condition is met, canceling the cell prohibited from accessing the first base station.
  11. The method according to any of claims 1-7, wherein before determining whether the cell of the first base station is successfully registered, the method further comprises:
    judging whether the second base station is a base station of a second generation mobile communication technology or a third generation mobile communication technology;
    and if the mobile communication terminal is a base station of the second generation mobile communication technology or the third generation mobile communication technology, the step of judging whether the cell of the first base station is successfully registered is carried out.
  12. The method of claim 11, wherein after identifying the first base station as a pseudo base station if the tracking area update fails, the method further comprises:
    identifying the second base station as a pseudo base station.
  13. The method of claim 12, wherein after said identifying the second base station as a pseudo base station, the method further comprises:
    prohibiting access to a cell of the second base station.
  14. The method of claim 13, further comprising:
    and when a specified condition is met, canceling the cell prohibited from accessing the second base station.
  15. The method according to any of claims 1-7, wherein before said identifying said first base station as a pseudo base station if the tracking area update fails, the method further comprises:
    receiving an updating result returned by the cell of the first base station;
    and when the updating result comprises a reason value of updating failure, determining that the tracking of the tracking area fails.
  16. The method according to any of claims 1-7, wherein the determining whether the cell of the first base station is successfully registered comprises:
    acquiring records of cells which are successfully registered;
    judging whether the record has the cell of the first base station or not;
    if the cell of the first base station exists, determining that the cell of the base station is successfully registered;
    if the cell of the first base station does not exist, determining that the cell of the base station is not successfully registered.
  17. The method according to any one of claims 1-16, further comprising:
    rejecting cells camped on the first base station and redirecting to cells other than the cell of the first base station and the cell of the second base station.
  18. An identification device of a pseudo base station, which is applied to a mobile terminal, and is characterized in that the device comprises: a cell judging module, a tracking area updating module and a determining module, wherein,
    when the cell of the first base station needs to be redirected to the cell of the second base station, whether the cell of the first base station is successfully registered is judged;
    if the cell of the first base station is not successfully registered, initiating tracking area update to the cell of the first base station;
    and if the updating of the tracking area fails, identifying the first base station as a pseudo base station.
  19. A mobile terminal, comprising:
    one or more processors;
    a memory;
    one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of claims 1-17.
  20. A computer-readable storage medium having program code stored therein, the program code being invoked by a processor to perform the method of any one of claims 1 to 17.
CN201880098555.0A 2018-12-06 2018-12-06 Pseudo base station identification method and device, mobile terminal and storage medium Active CN112806044B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/119579 WO2020113519A1 (en) 2018-12-06 2018-12-06 Method and apparatus for identifying pseudo base station, mobile terminal and storage medium

Publications (2)

Publication Number Publication Date
CN112806044A true CN112806044A (en) 2021-05-14
CN112806044B CN112806044B (en) 2023-06-13

Family

ID=70975252

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880098555.0A Active CN112806044B (en) 2018-12-06 2018-12-06 Pseudo base station identification method and device, mobile terminal and storage medium

Country Status (2)

Country Link
CN (1) CN112806044B (en)
WO (1) WO2020113519A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923665A (en) * 2021-11-11 2022-01-11 中国联合网络通信集团有限公司 Method and device for identifying flower arrangement base station, electronic equipment and storage medium
CN114286344A (en) * 2021-12-14 2022-04-05 中国联合网络通信集团有限公司 Pseudo base station determination method, pseudo base station determination device, server and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073971A (en) * 2020-09-16 2020-12-11 北京亚鸿世纪科技发展有限公司 Pseudo base station trajectory tracking method and device based on ticket
CN113055934B (en) * 2021-03-26 2022-06-10 RealMe重庆移动通信有限公司 Method and device for processing redirection information, terminal equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106358199A (en) * 2016-09-30 2017-01-25 维沃移动通信有限公司 Method for recognizing pseudo base station by mobile terminal and mobile terminal
CN106686601A (en) * 2017-03-16 2017-05-17 珠海市魅族科技有限公司 Pseudo base station protection method and device
CN107071779A (en) * 2017-04-13 2017-08-18 广东欧珀移动通信有限公司 Pseudo-base station recognition methods, device and terminal
CN107071778A (en) * 2016-12-12 2017-08-18 西安汇龙科技股份有限公司 Pseudo-base station recognition methods and data analysing method
CN107466041A (en) * 2017-09-30 2017-12-12 奇酷互联网络科技(深圳)有限公司 Identify pseudo-base station method, device and mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10334435B2 (en) * 2016-04-27 2019-06-25 Qualcomm Incorporated Enhanced non-access stratum security
CN108235312A (en) * 2018-01-16 2018-06-29 奇酷互联网络科技(深圳)有限公司 Communication control method, device and the mobile terminal of mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106358199A (en) * 2016-09-30 2017-01-25 维沃移动通信有限公司 Method for recognizing pseudo base station by mobile terminal and mobile terminal
CN107071778A (en) * 2016-12-12 2017-08-18 西安汇龙科技股份有限公司 Pseudo-base station recognition methods and data analysing method
CN106686601A (en) * 2017-03-16 2017-05-17 珠海市魅族科技有限公司 Pseudo base station protection method and device
CN107071779A (en) * 2017-04-13 2017-08-18 广东欧珀移动通信有限公司 Pseudo-base station recognition methods, device and terminal
CN107466041A (en) * 2017-09-30 2017-12-12 奇酷互联网络科技(深圳)有限公司 Identify pseudo-base station method, device and mobile terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923665A (en) * 2021-11-11 2022-01-11 中国联合网络通信集团有限公司 Method and device for identifying flower arrangement base station, electronic equipment and storage medium
CN113923665B (en) * 2021-11-11 2023-06-06 中国联合网络通信集团有限公司 Flower arrangement base station identification method and device, electronic equipment and storage medium
CN114286344A (en) * 2021-12-14 2022-04-05 中国联合网络通信集团有限公司 Pseudo base station determination method, pseudo base station determination device, server and storage medium
CN114286344B (en) * 2021-12-14 2023-07-28 中国联合网络通信集团有限公司 Pseudo base station determining method, pseudo base station determining device, server and storage medium

Also Published As

Publication number Publication date
WO2020113519A1 (en) 2020-06-11
CN112806044B (en) 2023-06-13

Similar Documents

Publication Publication Date Title
US8259673B2 (en) System and method for providing voice service in a mobile network with multiple wireless technologies
TWI397339B (en) Method of setting radio access capability and related communication device
CN112806044B (en) Pseudo base station identification method and device, mobile terminal and storage medium
CN108696872B (en) Redirection method and device
KR102146494B1 (en) A method and system to minimize delay in circuit-switched fallback (csfb) procedure
CN112806073B (en) Communication processing method, device, mobile terminal and storage medium
CN107333302B (en) Service processing method and device
WO2020042176A1 (en) Pseudo base station identification method and device
CN108124511B (en) CSFB (Circuit switched Fall Back) result detection method and device and storage medium
CN112806043B (en) Pseudo base station identification method and device, mobile terminal and storage medium
US20210329519A1 (en) Cell Connection Processing Method and Mobile Terminal
JP6473171B2 (en) Indication of IMEISV via MAP for inter-MSC handover
US8583116B2 (en) Method and apparatus for communicating network features during a routing area update procedure
WO2019061482A1 (en) Csfb result detection method and device, and computer storage medium
WO2019061410A1 (en) Abnormal frequency point detection method and device, and computer storage medium
WO2019061440A1 (en) Csfb result detection method and device, and storage medium
CN105122926B (en) A kind of method and apparatus of circuit domain dropping user equipment identification
WO2019061421A1 (en) Method and device for detecting fallback result of circuit switched fallback, and storage medium
CN108064461A (en) The falling result detection method and device of CSFB a kind of, computer storage media
CN108135018B (en) CSFB (Circuit switched Fall Back) fall result detection method and device and computer storage medium
WO2019061486A1 (en) Csfb fallback result detecting method, device thereof and computer storage medium
WO2019061431A1 (en) Method and device for detecting fallback result of csfb, and computer storage medium
WO2019061490A1 (en) Csfb-based terminal detection method and apparatus, and computer storage medium
WO2020113479A1 (en) Method and device for identifying pseudo base station, mobile terminal storage medium
WO2020133117A1 (en) Cell connection processing method and device, mobile terminal, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant