Apparatus and method for detecting a cloned base station
First Claim
Patent Images
1. A method of detecting a cloned base station:
- establishing communications with a first base station, the communications including first validation information associated with the first base station;
obtaining second validation information and storing the second validation information in a data structure, the second validation information being associated with a second and valid base station;
comparing the first validation information to the second validation information stored in the data structure and determining whether the first base station is valid based upon the comparing;
when the comparing indicates that the first base station is not valid, initiating a warning to a user; and
scanning for a presence of a neighboring base station identified in the data structure and when a signal strength level of the neighboring base station obtained by the scanning is below a predetermined threshold level, initiating a warning to the user that a cloned base station has been detected.
1 Assignment
0 Petitions
Accused Products
Abstract
Communications are established with a first base station and the communications include first validation information associated with the first base station. Second validation information is obtained and the second validation information is stored in a data structure. The second validation information is associated with a second and valid base station. The first validation information is compared to the second validation information stored in the data structure and it is determined whether the first base station is valid based upon the comparison. When the comparing indicates that the first base station is not valid, a warning is initiated to a user.
21 Citations
17 Claims
-
1. A method of detecting a cloned base station:
-
establishing communications with a first base station, the communications including first validation information associated with the first base station; obtaining second validation information and storing the second validation information in a data structure, the second validation information being associated with a second and valid base station; comparing the first validation information to the second validation information stored in the data structure and determining whether the first base station is valid based upon the comparing; when the comparing indicates that the first base station is not valid, initiating a warning to a user; and scanning for a presence of a neighboring base station identified in the data structure and when a signal strength level of the neighboring base station obtained by the scanning is below a predetermined threshold level, initiating a warning to the user that a cloned base station has been detected. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer usable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method of detecting a cloned base station from a vehicle, the method comprising:
-
establishing communications between the vehicle and a first base station, the communications including first validation information associated with the first base station; obtaining second validation information and storing the second validation information in a data structure at the vehicle, the second validation information being associated with a second and valid base station; comparing the first validation information to the second validation information stored in the data structure and determining whether the first base station is valid based upon the comparing; when the comparing indicates that the first base station is not valid, initiating a warning to a user at the vehicle; and scanning for a presence of a neighboring base station identified in the data structure and when a signal strength level of the neighboring base station obtained by the scanning is below a predetermined threshold level, initiating a warning to the user that a cloned base station has been detected. - View Dependent Claims (8, 9, 10, 11)
-
-
12. An apparatus for detecting a cloned base station:
-
a communication interface configured to establish communications with a first base station, the communications including first validation information associated with the first base station; a memory comprising a data structure; a warning indicator; a controller coupled to the communication interface, the memory, and the warning indicator, the controller configured to obtain second validation information via the communication interface and store the second validation information in the data structure in the memory, the second validation information being associated with a second and valid base station, the controller being further configured to compare the first validation information to the second validation information stored in the data structure and determine whether the first base station is valid based upon the comparison, the controller being further configured to, when the comparing indicates that the first base station is not valid, initiate a warning to a user via the warning indicator, wherein the controller is further configured to scan for a presence of a neighboring base station identified in the data structure via the communication interface and when a signal strength level of the neighboring base station obtained by the scanning is below a predetermined threshold level, initiate a warning to the user via the warning indicator that a cloned base station has been detected. - View Dependent Claims (13, 14, 15, 16)
-
-
17. An apparatus for detecting a cloned base station:
-
a communication interface configured to establish communications with a first base station, the communications including first validation information associated with the first base station; a memory comprising a data structure; a warning indicator; a controller coupled to the communication interface, the memory, and the warning indicator, the controller configured to obtain second validation information via the communication interface and store the second validation information in the data structure in the memory, the second validation information being associated with a second and valid base station, the controller being further configured to compare the first validation information to the second validation information stored in the data structure and determine whether the first base station is valid based upon the comparison, the controller being further configured to, when the comparing indicates that the first base station is not valid, initiate a warning to a user via the warning indicator, wherein the warning indicator is configured to be actuated before a user exits the vehicle.
-
Specification