Method and device for processing of covering vulnerability based on terminal
A technology covering loopholes and terminals, applied in electrical components, wireless communication, network planning, etc., can solve problems such as fuzzy scope of coverage loopholes, inability to locate certain coverage loopholes, large amount of data, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0102] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0103] At present, MDT (Minimization of Drive-Tests), a measurement solution for coverage vulnerabilities, starts automatic drive tests for terminals in the idle state and connected state, and the terminals that are required to be tested report their geographic location information and coverage signals Intensity, but no coverage vulnerability judgment process is performed, and the terminals that deliver measurements are not screened. It can be understood that after the measurement is delivered, the terminal must continue to measure, and if in addition to recording the signal measurement information, it is also necessary to record the location measurement information of the terminal. It is said that the burden is relatively large. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


