Method and device for processing user resources

A technology of user resources and processing methods, which is applied in the field of user resource processing methods and devices, can solve problems such as unreasonable distribution of wireless resources, and achieve the effect of improving user experience

Active Publication Date: 2012-10-03
ZTE CORP
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem of unreasonable wireless resource distribution in the related art, the present invention provides a user resource processing method and device to at least solve the problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing user resources
  • Method and device for processing user resources
  • Method and device for processing user resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] This embodiment provides a method for controlling user resources. In this embodiment, malicious users are identified and their resource occupation capabilities are limited to ensure reasonable distribution of wireless resources, increase network capacity, and improve user awareness. Compared with traditional methods such as capacity expansion, the input cost is low, and it is more direct and effective.

[0071] The characteristics of the malicious users in this embodiment are shown in Table 1. Such users consume too many wireless resources such as carrier scheduling time slots and wireless traffic, and have a long connection time, which leads to a decrease in the usage perception of other online users. According to the analysis of existing network resources, under normal circumstances, the connection times of malicious users only account for 1% of the total connection times, and the proportion of users does not exceed 10%, but it occupies more than 70% of scheduling reso...

Embodiment 2

[0082] This embodiment provides a user resource control method, which includes the following steps S2 to S8.

[0083] Step S2: Monitor wireless network resource distribution.

[0084] Step S4: Judging whether the restriction strategy activation condition is satisfied.

[0085] Step S6: updating the malicious user list.

[0086] Step S8: reducing the ability of malicious users to occupy wireless resources.

[0087] The advantage of this preferred embodiment is that malicious users can be effectively identified, and whether to enable a restriction policy to weaken the ability of malicious users to occupy resources is selected according to the distribution of wireless resources. While improving the usage perception of most users, it also ensures the reasonable distribution of wireless resources and improves the wireless network capacity to a certain extent.

Embodiment 3

[0089] This embodiment provides a user resource control method, Figure 4 is a flowchart of a user resource processing method according to a preferred embodiment of the present invention, such as Figure 4 As shown, the method includes step S402 to step S416.

[0090] Step S402: Monitor wireless network resource occupancy, including the ratio of the number of bearer users to the bearer scheduling time slot, and the wireless resource occupancy, traffic, and connection duration of all users under the bearer.

[0091] Step S404: Judging whether to activate the vicious user restriction strategy, the restriction strategy is only activated when the number of carrier users is greater than 5 and the carrier scheduling time slot ratio is less than 80%, if the judgment result is yes, execute step S406, otherwise execute step S408.

[0092] Step S406: The processing branch belonging to the activation restriction strategy screens all users under the download fan, and locks malicious user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for processing user resources. The method comprises the following steps: judging occupation of wireless network resources to meet conditions of startup for controlling the user resources; determining users which meet resource restriction conditions; and controlling the resources of the users which meet the resource restriction conditions. According to the invention, the infinite resources are reasonably distributed, and user experience is improved.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a user resource processing method and device. Background technique [0002] With the popularization of 3G applications, the service subject of wireless networks is gradually shifting from voice to data services. More and more users use smart terminals or data cards to enjoy data services, including web browsing, online video, Weibo, instant messaging, and email. etc. However, Code Division Multiple Access (CDMA) EVDO (Evolution, Data Only) wireless resources are not unlimited. In the live network, there are some malicious users who use BT (Bit-Torrent) or ftp to download for a long time. , occupying most of the wireless network resources, such as carrier scheduling time slots, business traffic, etc., resulting in a decrease in the usage perception of other nearby users. Under the current scheduling rules, even if the capacity of busy stations is expanded, malicious users will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W28/16
CPCH04W28/16H04W72/00
Inventor 罗旭耀
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products