Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

36results about How to "Avoid misconfiguration" patented technology

Measurement configuration method, user equipment, network equipment and storage medium

The invention discloses a measurement configuration method, and belongs to the field of communication. The measurement configuration method comprises the steps: UE sends measurement capability information; and the UE receives a measurement configuration instruction, wherein the measurement cooperation instruction is generated based on the measurement capability information, and the measurement configuration instruction is used for providing measurement configuration for the UE. In the embodiments of the present invention, UE reports measurement capability related information to network equipment, so that the network equipment can generate a measurement configuration instruction based on the measurement capability related information and send the measurement configuration instruction to theUE. For the UE supporting the per-BWP measurement gap, the network equipment can generate a per-BWP-based measurement gap configuration instruction, so as to enable the configuration of the measurement gap based on the per-BWP to be fused into the current measurement gap configuration flow, so that the original measurement gap configuration flow is changed a little, and the error configuration ofthe UE which does not support the per-BWP measurement gap is effectively avoided.
Owner:VIVO MOBILE COMM CO LTD

Method and apparatus of service configuration in network cutover

The invention discloses a configuration method of network service cutover in an embodiment. The method comprises: a network apparatus creates apparatus information of a virtual one board and records the selected slot position and the selected type of the virtual one board as responding to a first remote instruction received; the network apparatus performs service configuration on the virtual one board on a logic interface collecting to the selected type as responding to a second remote instruction received, in order to generate first to-be-verified configuration information; the network apparatus verifies whether the first to-be-verified configuration information satisfies a target verification condition by taking a preset verification condition corresponding to both the selected slot position and the selected type as the target verification condition; and the network apparatus, responding to that the first to-be-verified configuration information completely satisfies the target verification condition, records the first to-be-verified configuration information as the verified configuration information of the virtual one board so as to form the configuration information of service configuration on a real one board corresponding to the virtual single board. Besides, the embodiment of the invention further discloses a configuration apparatus of network service cutover.
Owner:HUAWEI TECH CO LTD

Penetration attack detection method for intelligent Internet of Things terminal container

The invention discloses a penetration attack detection method for an intelligent Internet of Things terminal container, which comprises the following steps of: 1) performing penetration attack on the container through security vulnerabilities, and detecting whether the container escapes or not; and 2) triggering escape of the container through wrong configuration, and performing penetration attack detection on the container. Through the penetration attack detection of the intelligent Internet of Things terminal container, the security problem of the container can be found in time, and the loss of a company caused by container escape due to wrong configuration and security vulnerabilities in the future is avoided; meanwhile, a safe use container manual can be made, wrong configuration of container escape caused by penetration attack is written, and the situation that the container escape is caused by wrong configuration in the container use process of a user is avoided; permeation attack detection is carried out on the container for many times, security problems caused by vulnerabilities are found in time, security threats faced by the container are analyzed, the container is prevented from external attacks, and safe and stable operation of a server is guaranteed.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING) +3

Method for preventing parameter of family base station from being tampered and family base station server

ActiveCN108235349AEnhanced anti-tamper securityConvenient open station configurationData switching networksWireless communicationMobile WebFemtocell
The invention provides a method for preventing a parameter of a family base station from being tampered. The method comprises the following steps that a server receives a change request of the parameter of the family base station; the server sends a confirmation request carrying the change request to an authorized user terminal to which the family base station belongs; and the server sends a change instruction corresponding to the change request to the family base station according to a first confirmation result fed back by the authorized user terminal in response to the confirmation request,so that the family base station changes the relevant parameter according to the change instruction. According to the method, an authorized user to which the family base station belongs participates inconfirming whether the relevant parameter of the family base station is changed and recovered, a function of carrying out optimization configuration on the family base station remotely is supported,and the anti-tamper safety of the parameter of the family base station is enhanced. The method and the family base station bring obvious technical advantages to the anti-tamper and recovery capabilityof the family base station and also bring the convenience to the maintenance of a mobile network.
Owner:COMBA TELECOM SYST CHINA LTD

Method and device for service configuration in network cutover

The embodiment of the invention discloses a configuration method for network service cutover. The method includes: in response to receiving the first remote command, the network device creates device information of the virtual single board and records the selected slot and the selected type of the virtual single board; in response to receiving the second remote command, the network device creates Perform service configuration on the virtual single board on the logical interface corresponding to the specified type to generate the first configuration information to be verified; the network device uses the preset verification conditions corresponding to the selected slot and the selected type as the target verification The condition is to verify whether the first configuration information to be verified meets the target verification condition; the network device responds to the first configuration information to be verified completely meeting the target verification condition, and records the first configuration information to be verified as the virtual single board The verified configuration information is used to form the configuration information of the service configuration for the real board corresponding to the virtual board. In addition, the embodiment of the invention also discloses a configuration device for network service cutover.
Owner:HUAWEI TECH CO LTD

Resource management method and device for flexible Ethernet FlexE

The embodiment of the invention provides a FlexE resource management method. A first communication device allocates all bandwidth resources of a first FlexE group to N FlexE clients within a first communication duration, wherein N is an integer greater than or equal to 1. The N FlexE clients are composed of a first FlexE client and other (N-1) FlexE clients, the first bandwidth resource of the first FlexE group is allocated to the (N-1) FlexE clients, the first FlexE client occupies the remaining second bandwidth resource of the first FlexE group, and all the bandwidth resources of the first FlexE group are the sum of the first bandwidth resource and the second bandwidth resource. The first communication device allocates all bandwidth resources of the first FlexE group to M FlexE clients within a second communication duration, M is an integer greater than or equal to 1, the M FlexE clients are composed of the first FlexE client and other (M-1) FlexE clients, third bandwidth resources of the first FlexE group are allocated to the (M-1) FlexE clients, the first FlexE client occupies the remaining fourth bandwidth resources in the first FlexE group, and all bandwidth resources of the first FlexE group are the sum of the third bandwidth resources and the fourth bandwidth resources.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products