Initial access control method and device, terminal, intelligent card and storage medium

An initial access and control method technology, applied in the field of communication, can solve the problems of unprotected pseudo base station attack, low security of the terminal initial access process, etc., and achieve the effect of improving security

Active Publication Date: 2019-12-03
ZTE CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The initial access control method, device, terminal, smart card, and storage medium provided by the embodiments of the present invention mainly solve the technical problem of: There are no measures to prevent fake base station attacks at the stage before accessing the core network, resulting in low security in the initial access process of terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Initial access control method and device, terminal, intelligent card and storage medium
  • Initial access control method and device, terminal, intelligent card and storage medium
  • Initial access control method and device, terminal, intelligent card and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Aiming at the problem in the related art that during the initial access process of the terminal accessing the core network, the preventive control for the base station is blank, this embodiment provides an initial access control method, which can be implemented in the terminal During the initial access process of accessing the core network, attacks by pseudo base stations on the terminal are avoided as much as possible, thereby improving the security of the initial access of the terminal and the satisfaction of user experience.

[0031] For ease of understanding, this embodiment follows the figure 1 The initial access control method shown is an example for illustration, see figure 1 shown, which includes:

[0032] S101: Receive a message from a base station before initial access is completed.

[0033] Before the initial access in this step is completed, it means that the terminal is before initial access to the core network to be accessed; the base station in this ste...

Embodiment 2

[0068] This embodiment provides an initial access control device, the initial access control device can be directly set in the terminal, or set in a component that can be separated from the terminal, see image 3 shown, which includes:

[0069] The message receiving module 301 is configured to receive a message from the base station before the initial access of the terminal is completed.

[0070] The control module 302 is configured to determine not to process the message when the message received by the message receiving module 301 is not a message of an initial access registration process.

[0071] In an example of this embodiment, when the received message is a message of an initial access registration procedure, the control module 302 may be configured to process the message. The processing can be normal processing of the message.

[0072] In an example of this embodiment, when the control module 302 receives a message sent by the base station that is not a message of a ...

Embodiment 3

[0090] This embodiment provides a terminal. The terminal in this embodiment can be a variety of communication terminals that can communicate with the core network through the base station, and can include various mobile terminals, and can also be non- mobile terminal. see Figure 4 As shown, it includes a first processor 401, a first memory 402 and a first communication bus 403;

[0091] The first communication bus 403 is used to connect the first processor 401 and the first memory 402;

[0092] The first processor 401 is configured to execute the computer program stored in the first memory 402, so as to implement the steps of the initial access control method shown in the above embodiments. The first memory 402 here may be the terminal's own memory; it may not include the memory provided on the terminal part that can be separated from the terminal; of course, it can also be set to include the memory provided on the terminal part that can be separated from the terminal accor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an initial access control method and device, a terminal, an intelligent card and a storage medium. Before the initial access is completed, when a message is received from a base station, if it is judged that the received message is a message of a non-initial access registration process, the message is determined not to be processed. In some implementation processes, the situation that the terminal is attacked by the pseudo base station when processing the message of the non-initial access registration process sent by the pseudo base station before the initial access is completed can be avoided, so that the security of the initial access process of the terminal is improved.

Description

technical field [0001] Embodiments of the present invention relate to but are not limited to the communication field, and specifically, relate to but are not limited to an initial access control method, device, terminal, smart card, and storage medium. Background technique [0002] The 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) has formulated various mobile network specifications, and mobile networks deployed according to these specifications are also being attacked by various pseudo base stations. [0003] At present, the defense against the attack of the fake base station is mainly carried out for the stage after the mobile terminal accesses the core network; the prevention and control in the initial access process stage of the mobile terminal accessing the core network is blank. In related technologies, before the initial access to the core network is completed (that is, during the initial access process), the mobile terminal does not ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/12H04W48/08H04W12/069H04W12/122
CPCH04W12/06H04W12/12H04W48/08
Inventor 彭锦谢振华游世林余万涛林兆骥
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products