User filtering method and base station for user filtering
A screening method and user technology, applied in security devices, network traffic/resource management, access restrictions, etc., can solve problems affecting device access, high system load, etc., to reduce false alarms, reduce impact, and improve system performance Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0022] figure 1 It is a flowchart of a user screening method provided by an embodiment of the present invention. In this embodiment, the execution subject may be a base station, or a module or device set on or connected to the base station. Such as figure 1 As shown, user screening methods include:
[0023] Step 11, judging whether the number of users detected in the current transmission time interval (Transmission Time Interval, TTI) exceeds the upper limit of ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 