False alarm information detection method and user equipment

A technology for information detection and user equipment, applied in the field of communication, can solve the problems of data transmission stability and other users' access, and save resources, improve stability, and reduce abnormal processes.

Active Publication Date: 2010-09-08
HONOR DEVICE CO LTD
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the case that there is no change in the test environment, if the UE (User Equipment, user equipment) triggers abnormal random access by the false alarm information of DCI1A, it will affect the stability of the entire data transmission and affect the Access by other users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • False alarm information detection method and user equipment
  • False alarm information detection method and user equipment
  • False alarm information detection method and user equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] figure 1 A schematic diagram of a random access process triggered by false alarm information provided by an embodiment of the present invention, the method includes:

[0021] S11: The user equipment performs data transmission with the base station.

[0022] S12: The user equipment detects false alarm information, and parses to obtain random access related information. During the blind detection process, the UE may detect a PDCCH command that is not is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a false alarm information detection method and user equipment, which belongs to the technical field of communications. The method comprises the following steps: obtaining 1A-format physical downlink control channel commands; and judging whether the setup of bit information in the 1A-format physical downlink control channel commands meets preset conditionsor not, if not, determining the 1A-format physical downlink control channel commands as false alarm information, or judging whether lead code serial numbers indicated by the 1 A-format physical downlink control channel commands belong to the preset lead code serial number set or not, if the lead code serial number is not zero and does not belong to the preset lead code serial number set, determining the 1A-format physical downlink control channel commands as false alarm information. With the technical scheme, the false alarm information can be identified, and the abnormal flow triggered by the false alarm information can be reduced.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method for detecting false alarm information and user equipment. Background technique [0002] In the LTE (Long Term Evolution, long-term evolution) system, there are random access triggered by various conditions, such as initial random access, random access during handover, and random access triggered by MAC (Media Access Control, media access control). In addition, random access triggered by PDCCH (Physical Downlink Control Channel, physical downlink control channel) Order (command), etc., also exists random access caused by false alarm information. In the process of data transmission, since the UE uses a blind detection algorithm when demodulating and decoding the PDCCH channel, the UE cannot guarantee that the demodulated information is delivered by the eNB (eNodeB, evolved base station), so the solution cannot be guaranteed. The transferred information is c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W24/00
Inventor 东宁
Owner HONOR DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products