18516476. COMMUNICATION METHOD AND COMMUNICATION APPARATUS simplified abstract (Huawei Technologies Co., Ltd.)
COMMUNICATION METHOD AND COMMUNICATION APPARATUS
Organization Name
Inventor(s)
COMMUNICATION METHOD AND COMMUNICATION APPARATUS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18516476 titled 'COMMUNICATION METHOD AND COMMUNICATION APPARATUS
Simplified Explanation
The abstract of the patent application describes a terminal device that detects abnormal local first system information to determine if it is being attacked by a rogue base station.
- Terminal device detects abnormal local first system information.
- Criteria for abnormality include excessive signaling, service unavailability, abnormal tag value trends, and excessive changes within a preset duration.
- Terminal device receives second system information from an access network device to update local system information.
- Early detection of rogue base station attacks is possible.
Potential Applications
The technology can be applied in telecommunications, network security, and mobile device protection.
Problems Solved
1. Early detection of rogue base station attacks. 2. Preventing unauthorized access to user data. 3. Enhancing network security measures.
Benefits
1. Improved network security. 2. Enhanced user privacy protection. 3. Early detection of potential threats.
Potential Commercial Applications
Enhancing Mobile Network Security Measures for Rogue Base Station Detection
Original Abstract Submitted
A terminal device determines that local first system information is abnormal in the case of any of the following: a quantity of times of sending first signaling is greater than or equal to a first preset threshold within first preset duration; a time length in which a first service is unavailable is greater than or equal to a second preset threshold; a change trend of a tag value of a same system information block is abnormal; or a quantity of changes in a tag value of a same system information block is greater than or equal to a third preset threshold within second preset duration. The terminal device receives, from an access network device, second system information that is used to update the local first system information. Therefore, the terminal device can determine as soon as possible whether the terminal device is being attacked by a rogue base station.