Full-format network-wide base station type shielding control conference system and shielding control method

A conference system, a full-scale technology, applied in the field of full-scale network-wide base station shielded management and control conference systems, can solve the problems of insufficient shielding effect, high cost, inability to achieve management and call bill analysis, etc.

Inactive Publication Date: 2016-09-28
SHANDONG CHUANGHUI TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, there are different methods of shielding and anti-leakage measures on the market: 1. Mobile communication jammers, the disadvantage is that if the signal of a secret-related mobile phone is strong, the shielding effect cannot be achieved; 2. Mobile phone shielding cabinets, the disadvantage is that the person under inspection needs to actively cooperate , actively store mobile phones; 3. Mobile phone intranet management system, t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Full-format network-wide base station type shielding control conference system and shielding control method
  • Full-format network-wide base station type shielding control conference system and shielding control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Such as figure 1 As shown, the present invention provides a full-standard full-network base station shielding management and control conference system, including a shielding subsystem, a detection and positioning subsystem, and an integrated data processing subsystem; the shielding subsystem is used for mobile communication in the entire network Signal shielding and control; the detecting and positioning subsystem is used to detect mobile terminals and obtain positioning information; the comprehensive data processing subsystem is used to collect, summarize, analyze, warn and manage equipment configuration.

[0032] The shielding subsystem is composed of a shielding master device 107 , a shielding slave device and a covering antenna. The shielding slave device is used for shielding and controlling the covering antenna, and uploads shielding and controlling information to the shielding master device 107 .

[0033] The shielding slave equipment includes an indoor shieldin...

Embodiment 2

[0037] On the basis of the above embodiments, the present invention also provides a shielding control method for a full-standard, full-network, base station-type shielding control conference system, including the following steps:

[0038] Step 1: Confirm the mobile phone user;

[0039] Step 2: Attract mobile phone users;

[0040] Step 3: Conduct code detection and capture on the traction user;

[0041] Step 4: Carry out communication management and control for the users captured by the detection code, enter step 5 for mobile phone users who are not among the preset personnel; enter step 6 for mobile phone users among the preset personnel;

[0042] Step 5: Perform personnel control on the mobile phone user;

[0043] Step 6: Carry out list judgment, and proceed to step 7 according to the information after the list judgment;

[0044] Step 7: Carry out management and control processing, specifically step 701: signal shielding; step 702: information push

[0045] Send; step 703...

Embodiment 3

[0051] On the basis of the above embodiments, it is further described that the system and method of the present invention is a high-performance, scalable defined radio (SDR) platform, which can be used to design and deploy the next generation wireless communication system. Its hardware architecture combines two extended bandwidth daughterboard slots covering DC-6GHz or even up to 120MHz baseband bandwidth, multiple high-speed interface options (PCIe, dual 10 Gigabit Ethernet, dual 1 Gigabit Ethernet), and A large user-programmable Kintex-7FPGA in a convenient desktop or rack-mountable half-width 1U form factor. In addition to providing best-in-class hardware performance, the open source software architecture provides cross-platform UHD driver support making it compatible with a large number of supporting development frameworks, reference architectures and open source projects.

[0052] The signal shielding: refers to the whole network (2G / 3G / 4G) wireless communication signal s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a full-format network-wide base station type shielding control conference system and a shielding control method. The system comprises a shielding subsystem, a detection and location subsystem, and an integrated data processing subsystem. The shielding subsystem is used for shielding and controlling network-wide mobile communication signals. The detection and location subsystem is used for detecting mobile terminals and acquiring location information. The integrated data processing subsystem is used for carrying out information collection, summarization, analysis, warning, and equipment management configuration. By adopting the scheme, GSM (Mobile + Unicom) + CDMA (2G+3G) Telecom + TD-SCDMA (Mobile 3G) +WCDMA (Unicom 3G) + TDD-LTE (Mobile 4G) + FDD-LTE (Unicom 4G) + FDD-LTE (Telecom 4G) + WIFI acquiring and shielding can be realized, and call bill analysis can be conducted.

Description

technical field [0001] The invention belongs to the technical field of base station type shielding management and control, and in particular relates to a full-standard and full-network base station type shielding management and control conference system and method. Background technique [0002] With the rapid development of mobile communication technology, the popularity of mobile terminals such as mobile phones. Mobile phones and some other wireless mobile terminals have become an important channel for information leakage, posing a great threat to information security in confidential areas such as security conferences. As long as you carry a mobile phone in a secret-related place, no matter whether you use it or not, it is very likely to cause content leakage, which will bring serious harm to the unit or individual, or even the party and the country. Therefore, it is only through special means to control and shield the mobile phone communication of the participants. In or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04K3/00H04W24/04
CPCH04W24/04H04K3/68
Inventor 高广顺
Owner SHANDONG CHUANGHUI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products