Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for processing of covering vulnerability based on terminal

A technology covering loopholes and terminals, applied in electrical components, wireless communication, network planning, etc., can solve problems such as fuzzy scope of coverage loopholes, inability to locate certain coverage loopholes, large amount of data, etc.

Active Publication Date: 2017-11-17
DATANG MOBILE COMM EQUIP CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] But the current coverage vulnerability measurement scheme has many defects
For example, in an LTE (Long Term Evolution, Long Term Evolution) network, it is possible to confirm whether there is a coverage hole through large-area measurement, but this large-area measurement method can only determine a very vague coverage hole range, and cannot Specific positioning to determine the location of the coverage vulnerability
If all terminals are required to report specific location information, the amount of data is huge, and it needs to be collected and processed for a long time, which is a great burden on terminals and network-side devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing of covering vulnerability based on terminal
  • Method and device for processing of covering vulnerability based on terminal
  • Method and device for processing of covering vulnerability based on terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0103] At present, MDT (Minimization of Drive-Tests), a measurement solution for coverage vulnerabilities, starts automatic drive tests for terminals in the idle state and connected state, and the terminals that are required to be tested report their geographic location information and coverage signals Intensity, but no coverage vulnerability judgment process is performed, and the terminals that deliver measurements are not screened. It can be understood that after the measurement is delivered, the terminal must continue to measure, and if in addition to recording the signal measurement information, it is also necessary to record the location measurement information of the terminal. It is said that the burden is relatively large. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and device for processing of a covering vulnerability based on a terminal. The method comprises: obtaining signal measurement information of a terminal at a certain position point; employing the signal measurement information to determine whether the position point is a covering vulnerability point or not; when determining the position point is the covering vulnerability point, obtaining the position measurement information of the terminal at the covering vulnerability point; obtaining the communication state information of the terminal at the covering vulnerability point; employing the communication state information to determine the processing priority of the covering vulnerability point; and providing the processing priority and the position measurement information of the covering vulnerability point. According to the embodiment of the invention, the method and device for processing of a covering vulnerability based on a terminal provide the processing priority and the position measurement information of the covering vulnerability point for related operation personnel.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of mobile communications, and in particular, relate to a terminal-based coverage hole processing method and a terminal-based coverage hole processing device. Background technique [0002] With the continuous development of mobile communication technology, the scale of the mobile communication network is getting larger and larger, and users have higher and higher requirements on the mobile communication network. Generally speaking, the user's evaluation of the mobile communication network is often judged by the user experience when conducting business. Therefore, optimizing the quality of network communication, reducing coverage holes, and improving network quality has become a key factor in the development of mobile communication. important topic. [0003] But the current coverage vulnerability measurement scheme has many defects. For example, in an LTE (Long Term Evolution, Long Term...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W16/18H04W24/02
CPCH04W16/18H04W24/02
Inventor 姚潇辛马忱
Owner DATANG MOBILE COMM EQUIP CO LTD