A terminal-based coverage vulnerability processing method and device
A technology covering loopholes and terminals, applied in wireless communication, electrical components, network planning, etc., can solve the problems of fuzzy coverage loophole range, large amount of data, inability to locate certain coverage loopholes, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0102] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0103] At present, MDT (Minimization of Drive-Tests), a measurement solution for coverage vulnerabilities, starts automatic drive tests for terminals in the idle state and connected state, and the terminals that are required to be tested report their geographic location information and coverage signals Intensity, but no coverage vulnerability judgment process is performed, and the terminals that deliver measurements are not screened. It can be understood that after the measurement is delivered, the terminal must continue to measure, and if in addition to recording the signal measurement information, it is also necessary to record the location measurement information of the terminal. It is said that the burden is relatively large. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


