CN102664936A - Method and device for controlling base station - Google Patents

Method and device for controlling base station Download PDF

Info

Publication number
CN102664936A
CN102664936A CN2012101017693A CN201210101769A CN102664936A CN 102664936 A CN102664936 A CN 102664936A CN 2012101017693 A CN2012101017693 A CN 2012101017693A CN 201210101769 A CN201210101769 A CN 201210101769A CN 102664936 A CN102664936 A CN 102664936A
Authority
CN
China
Prior art keywords
base station
encrypted message
ping
password policy
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101017693A
Other languages
Chinese (zh)
Other versions
CN102664936B (en
Inventor
吴水华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201210101769.3A priority Critical patent/CN102664936B/en
Publication of CN102664936A publication Critical patent/CN102664936A/en
Application granted granted Critical
Publication of CN102664936B publication Critical patent/CN102664936B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for controlling a base station. The method comprises the following steps: receiving a PING request, extracting password information in a PING message; matching the password information with related information in a strategy pool, and carrying out corresponding operation according to the password strategy under the condition of successfully matching. The invention also discloses a device for controlling the base station. The device achieves the beneficial effects of improving the security of controlling the base station by the method for obtaining the password information from the PING message, matching with the password information in the strategy pool and carrying out the operation of controlling the base station corresponding to the password information under the condition of successfully matching.

Description

The method and the device of control base station
Technical field
The present invention relates to network communications technology field, relate in particular to a kind of method and device of controlling the base station.
Background technology
ICMP (Internet Control Message Protocol; Internet Control Message Protocol) is TCP/IP (Transmission Control Protocol/Internet Protocol; Transmission control protocol/Internet protocol) sub-protocol of protocol suite is used for transmitting control message between IP main frame, router.The message of network such as control messages is meant whether network is unimpeded, whether main frame can reach, whether route is available itself.
PING (Packet Internet Grope, internet packets survey meter) is used for the program of test network connection amount.PING sends an ICMP echo request message and whether receives desirable ICMP Echo Reply for destination and report.PING refers to end-to-end connection, is commonly used to the inspection as availability.The mode of ping testing network is: whether a network address, detecting the other side's network address has response and counting response time if being sent test packet.
In the prior art, the control base station mainly is the mode that gets into debugging mode or backstage access through TELNET (Telnet), serial ports.All there is certain defective in these modes, possibly be under an embargo in network environment like the port of TELNET, and Serial Port Line is not suitable for external in reality, and the mode that the backstage is inserted then needs complicated program and communication; On the other hand, the mode of traditional control base station also exists certain potential safety hazard.
Summary of the invention
Main purpose of the present invention provides a kind of method of controlling the base station, is intended to through the PING message corresponding control information imported in the base station, improves the fail safe of control base station.
The invention provides a kind of method of controlling the base station, may further comprise the steps:
The encrypted message in the PING message is extracted in receiving internet bag survey meter PING request;
Relevant information in said encrypted message and the tactful pond is mated; Under the coupling case of successful, carry out corresponding operating according to Password Policy.
Preferably, said relevant information in encrypted message and the tactful pond is mated; Under the coupling case of successful, the step of carrying out corresponding operating according to Password Policy specifically comprises:
Relevant information in said encrypted message and the tactful pond is mated;
Judge whether said encrypted message coupling is successful; If, then write down said encrypted message, carry out the Password Policy coupling;
Judge whether said Password Policy coupling is successful;
Under said Password Policy coupling case of successful,, carry out corresponding operating according to Password Policy.
Preferably, said reception PING request, the step of extracting the encrypted message in the PING message also comprises step before:
PING is carried out in the base station to be handled.
Preferably, said step is carried out also comprising before the PING processed steps in the base station:
The allocation of code strategy produces tactful pond.
Preferably, said tactful pond comprises the Password Policy that the base station is all; Said Password Policy is the encrypted message that is associated and the combination of said encrypted message control information corresponding.
The present invention also provides a kind of device of controlling the base station, comprising:
Information extraction modules is used to receive the PING request, extracts the encrypted message in the PING message;
The information matches module is used for said encrypted message and tactful pond relevant information are mated; Under the coupling case of successful, carry out corresponding operating according to Password Policy.
Preferably, said information matches module specifically comprises:
The encrypted message matching unit is used for said encrypted message and tactful pond relevant information are mated;
The match information judging unit is used to judge whether said encrypted message coupling is successful; If, then write down said encrypted message, carry out the Password Policy coupling;
The matching strategy judging unit is used to judge whether said Password Policy coupling is successful; Under said Password Policy coupling case of successful,, carry out corresponding operating according to Password Policy.
Preferably, the device of said control base station also comprises:
Base station processing module is used for that PING is carried out in the base station and handles.
Preferably, the device of said control base station also comprises:
The policy configurations module is used for the allocation of code strategy, produces tactful pond.
Preferably, said tactful pond comprises the Password Policy that the base station is all; Said Password Policy is the encrypted message that is associated and the combination of said encrypted message control information corresponding.
The present invention is through obtaining encrypted message and being complementary with encrypted message in the tactful pond from the PING message; Under the coupling case of successful; Carry out the method for operating of the pairing control of said encrypted message base station, realized improving the beneficial effect of control base station fail safe.
Description of drawings
Fig. 1 is the method first embodiment schematic flow sheet that the present invention controls the base station;
Fig. 2 is that the present invention controls in the method for base station relevant information in said encrypted message and the tactful pond is mated; Under the coupling case of successful, carry out corresponding operating one embodiment schematic flow sheet according to Password Policy;
Fig. 3 is that the present invention controls the whole schematic flow sheet that the PING message is handled in the method for base station;
Fig. 4 is the method second embodiment schematic flow sheet that the present invention controls the base station;
Fig. 5 is method the 3rd embodiment schematic flow sheet that the present invention controls the base station;
Fig. 6 is the device first example structure sketch map that the present invention controls the base station;
Fig. 7 is that the present invention controls information matches module one example structure sketch map in the device of base station;
Fig. 8 is the device second example structure sketch map that the present invention controls the base station;
Fig. 9 is device the 3rd example structure sketch map that the present invention controls the base station.
The realization of the object of the invention, functional characteristics and advantage will combine embodiment, further specify with reference to accompanying drawing.
Embodiment
Further specify technical scheme of the present invention below in conjunction with Figure of description and specific embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
With reference to Fig. 1, Fig. 1 is the method first embodiment schematic flow sheet that the present invention controls the base station.As shown in Figure 1, the method that the present invention controls the base station may further comprise the steps:
The encrypted message in the PING message is extracted in step S01, reception PING request;
The base station obtains password unit after receiving PING request from the PING message, a plurality of continuous PING messages can obtain encrypted message, thereby matees with encrypted message in the tactful pond.In a preferred embodiment, said password unit refers to the information that single PING message is contained, like the message number of PING message length, accumulative total etc.
Step S02, relevant information in said encrypted message and the tactful pond is mated; Under the coupling case of successful, carry out corresponding operating according to Password Policy.
With reference to Fig. 2, Fig. 2 is that the present invention controls in the method for base station relevant information in said encrypted message and the tactful pond is mated; Under the coupling case of successful, carry out corresponding operating one embodiment schematic flow sheet according to Password Policy; As shown in Figure 2, the present invention controls in the method for base station, and step S02 specifically comprises:
Step S021, relevant information in said encrypted message and the tactful pond is mated;
Step S022, judge the whether success of said encrypted message coupling; If, execution in step S023 then; If not, execution in step S024 then;
Step S023, write down said encrypted message, carry out the Password Policy coupling;
Step S024, transmission PING reply;
Whether all encrypted messages have coupling in encrypted message that judgement is obtained from the PING message and the tactful pond; If have encrypted message to be hit in the tactful pond, promptly have with the said encrypted message that from the PING message, obtains to be complementary, then write down said encrypted message, carry out the Password Policy coupling simultaneously; If said encrypted message does not mate success, then handle, and send corresponding PING and reply according to common PING message.
Step S025, judge the whether success of said Password Policy coupling; If, execution in step S026 then; As not, then return execution in step S024,
Step S024, transmission PING reply;
Step S026, according to Password Policy, carry out corresponding operating.
After the encrypted message in encrypted message that from the PING message, obtains and the tactful pond matees successfully, write down said encrypted message, and carry out the Password Policy coupling.In a preferred embodiment; Said concise and to the point process of carrying out Password Policy coupling is: judge all included in Password Policy encrypted messages whether have with the PING message in the consistent encrypted message of encrypted message that obtains; If exist; Then said Password Policy matees successfully, the base station according in the Password Policy with the encrypted message control information corresponding, operate accordingly; If in the said Password Policy included all encrypted messages all with the PING message in the encrypted message that obtains inconsistent, then said password matching gets nowhere, processing is replied accordingly according to common PING message in the base station.
With reference to Fig. 3, Fig. 3 is that the present invention controls the whole schematic flow sheet that the PING message is handled in the method for base station.As shown in Figure 3, the present invention imports corresponding information through the PING message information to the base station, thereby reaches the purpose of control base station.
In a preferred embodiment, said encrypted message is made up of a plurality of passwords unit, generally is that contained password unit can form an encrypted message in the continuous PING message.Can be defined as an encrypted message like " N continuous is individual, size is the PING message of xBYTE (byte) "; Or " N continuous, size be the PING message of x BYTE, and then are continuous N, big or smallly are the PING message of y BYTE " made up and can be defined as an encrypted message.Encrypted message can respective base station a function or a special operational.
The method that the present invention controls the base station is through obtaining encrypted message and being complementary with encrypted message in the tactful pond from the PING message; Under the coupling case of successful; Carry out the method for operating of the pairing control of said encrypted message base station, realized improving the beneficial effect of control base station fail safe.
With reference to Fig. 4, Fig. 4 is the method second embodiment schematic flow sheet that the present invention controls the base station.As shown in Figure 4, the present invention controls the method for base station in step S01, reception PING request, and the encrypted message that extracts in the PING message also comprises step before:
Step S11, PING is carried out in the base station handle.
In a preferred embodiment, handle through PING being carried out in the base station with the continuous terminal of PC (Personal Computer, PC), specify the message size and corresponding message amount of each PING bag.The order operation of serial-port that said PING can carry through the terminal also can be carried out through batch processing mode.
The method that the present invention controls the base station is through carrying out PING and handle, from the PING message, obtain encrypted message and being complementary with encrypted message in the tactful pond to the base station; Under the coupling case of successful; Carry out the method for operating of the pairing control of encrypted message base station, realized improving the beneficial effect of control base station fail safe.
With reference to Fig. 5, Fig. 5 is method the 3rd embodiment schematic flow sheet that the present invention controls the base station.As shown in Figure 5, the method that the present invention controls the base station also comprised step before step S11:
S21, allocation of code strategy produce tactful pond.
Said Password Policy is the encrypted message that is associated and the combination of said encrypted message control information corresponding.In a preferred embodiment, the definition encrypted message is " in 3 minutes, receive that length is 111,222,333 respectively, 4 continuous PING request messages of 444BYTE length "; With said encrypted message control information corresponding be " carrying out active and standby plate information synchronization ", then said Password Policy is " in 3 minutes, receive that length is respectively 111; 222; 333,4 continuous PING request messages of 444BYTE length carry out active and standby plate information synchronization ".In a preferred embodiment, said encrypted message control information corresponding can be defined as the password action.The corresponding password action of encrypted message, i.e. a base stations control action.Said password action can be to open certain function or accomplish certain operation, also can be to send certain incident to other processes, triggers concrete action and implements.As restart certain process, change to certain version, carry out masterslave switchover or configuration synchronization etc., can be defined as a password action.The content of said password action also can be orientated as and notify other processes, encrypted message to compare successful incident.
In a preferred embodiment, Password Policy can be handled static defining on the level at PING, also can carry out dynamic registration from other processes and generate.Said tactful pond comprises the Password Policy that the base station is all.
The method that the present invention controls the base station through the allocation of code strategy, produce tactful pond; PING is carried out in the base station to be handled, from the PING message, obtains encrypted message and be complementary with encrypted message in the tactful pond; Under the coupling case of successful; Carry out the method for operating of the pairing control of encrypted message base station, realized improving the beneficial effect of control base station fail safe.
With reference to Fig. 6, Fig. 6 is the device first example structure sketch map that the present invention controls the base station.As shown in Figure 6, the device that the present invention controls the base station comprises:
Information extraction modules 01 is used to receive the PING request, extracts the encrypted message in the PING message;
Information extraction modules 01 is obtained password unit after receiving PING request from the PING message, a plurality of continuous PING messages can obtain encrypted message, thereby matees with encrypted message in the tactful pond.In a preferred embodiment, said password unit refers to the information that single PING message is contained, like the message number of PING message length, accumulative total etc.
Information matches module 02 is used for said encrypted message and tactful pond relevant information are mated; Under the coupling case of successful, carry out corresponding operating according to Password Policy.
With reference to Fig. 7, Fig. 7 is that the present invention controls information matches module one example structure sketch map in the device of base station.As shown in Figure 7, the present invention controls in the device of base station, and information matches module 02 specifically comprises:
Encrypted message matching unit 021 is used for said encrypted message and tactful pond relevant information are mated:
Match information judging unit 022 is used to judge whether said encrypted message coupling is successful; If, then write down said encrypted message, carry out the Password Policy coupling;
Matching strategy judging unit 023 is used to judge whether said Password Policy coupling is successful; Under said Password Policy coupling case of successful,, carry out corresponding operating according to Password Policy.
All encrypted messages mate in encrypted message that encrypted message matching unit 021 will obtain from the PING message and the tactful pond, and match information judging unit 022 judges whether the relevant information in said encrypted message and tactful pond has coupling; If have encrypted message to be hit in the tactful pond, promptly have with the said encrypted message that from the PING message, obtains to be complementary, then the said encrypted message of match information judging unit 022 record carries out the Password Policy coupling simultaneously; If said encrypted message does not mate success, then handle, and send corresponding PING and reply according to common PING message.
After match information judging unit 022 judges that the encrypted message that from the PING message, obtains matees successfully with the encrypted message in the tactful pond, write down said encrypted message, matching strategy judging unit 023 carries out Password Policy and matees.In a preferred embodiment; The concise and to the point process that said matching strategy judging unit 023 carries out Password Policy coupling is: judge all included in Password Policy encrypted messages whether have with the PING message in the consistent encrypted message of encrypted message that obtains; If exist; Then said Password Policy matees successfully, the base station according in the Password Policy with the encrypted message control information corresponding, operate accordingly; If in the said Password Policy included all encrypted messages all with the PING message in the encrypted message that obtains inconsistent, then said password matching gets nowhere, processing is replied accordingly according to common PING message in the base station.
The device that the present invention controls the base station is through obtaining encrypted message and being complementary with encrypted message in the tactful pond from the PING message; Under the coupling case of successful; Carry out the method for operating of the pairing control of said encrypted message base station, realized improving the beneficial effect of control base station fail safe.
With reference to Fig. 8, Fig. 8 is the device second example structure sketch map that the present invention controls the base station.As shown in Figure 8, the device that the present invention controls the base station also comprises:
Base station processing module 03 is used for that PING is carried out in the base station and handles.
The PING processing is carried out in 03 pair of base station of base station processing module, in a preferred embodiment, handles through with the continuous terminal of PC (Personal Computer, PC) PING being carried out in the base station, specifies the message size and corresponding message amount of each PING bag.The order operation of serial-port that said PING can carry through the terminal also can be carried out through batch processing mode.
The device that the present invention controls the base station is through carrying out PING and handle, from the PING message, obtain encrypted message and being complementary with encrypted message in the tactful pond to the base station; Under the coupling case of successful; Carry out the method for operating of the pairing control of encrypted message base station, realized improving the beneficial effect of control base station fail safe.
With reference to Fig. 9, Fig. 9 is device the 3rd example structure sketch map that the present invention controls the base station.As shown in Figure 9, the device that the present invention controls the base station also comprises:
Policy configurations module 04 is used for the allocation of code strategy, produces tactful pond.
Policy configurations module 04 allocation of code strategy produces tactful pond.Said Password Policy is the encrypted message that is associated and the combination of said encrypted message control information corresponding.In a preferred embodiment, policy configurations module 05 definition encrypted message is " in 3 minutes, receive that length is 111,222,333 respectively, 4 continuous PING request messages of 444BYTE length "; With said encrypted message control information corresponding be " carrying out active and standby plate information synchronization ", then said Password Policy is " in 3 minutes, receive that length is respectively 111; 222; 333,4 continuous PING request messages of 444BYTE length carry out active and standby plate information synchronization ".In a preferred embodiment, said encrypted message control information corresponding can be defined as the password action.The corresponding password action of encrypted message, i.e. a base stations control action.Said password action can be to open certain function or accomplish certain operation, also can be to send certain incident to other processes, triggers concrete action and implements.As restart certain process, change to certain version, carry out masterslave switchover or configuration synchronization etc., can be defined as a password action.The content of said password action also can be orientated as and notify other processes, encrypted message to compare successful incident.
In a preferred embodiment, policy configurations module 04 can be handled static defining Password Policy on the level at PING, also can carry out dynamic registration from other processes and generate Password Policy.Said tactful pond comprises the Password Policy that the base station is all.
The device that the present invention controls the base station through the allocation of code strategy, produce tactful pond; PING is carried out in the base station to be handled, from the PING message, obtains encrypted message and be complementary with encrypted message in the tactful pond; Under the coupling case of successful; Carry out the method for operating of the pairing control of encrypted message base station, realized improving the beneficial effect of control base station fail safe.
The above is merely the preferred embodiments of the present invention; Be not so limit its claim; Every equivalent structure or equivalent flow process conversion that utilizes specification of the present invention and accompanying drawing content to be done; Directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.Simultaneously, control method of the present invention is not limited to control the base station, and the equipment of all supported protocol programmed process can use technical scheme of the present invention to control.

Claims (10)

1. a method of controlling the base station is characterized in that, may further comprise the steps:
The encrypted message in the PING message is extracted in receiving internet bag survey meter PING request;
Relevant information in said encrypted message and the tactful pond is mated; Under the coupling case of successful, carry out corresponding operating according to Password Policy.
2. the method for control according to claim 1 base station is characterized in that, said relevant information in encrypted message and the tactful pond is mated; Under the coupling case of successful, the step of carrying out corresponding operating according to Password Policy specifically comprises:
Relevant information in said encrypted message and the tactful pond is mated;
Judge whether said encrypted message coupling is successful; If, then write down said encrypted message, carry out the Password Policy coupling;
Judge whether said Password Policy coupling is successful;
Under said Password Policy coupling case of successful,, carry out corresponding operating according to Password Policy.
3. the method for control according to claim 1 base station is characterized in that, said reception PING request, and the step of extracting the encrypted message in the PING message also comprises step before:
PING is carried out in the base station to be handled.
4. the method for control according to claim 3 base station is characterized in that, said step is carried out also comprising before the PING processed steps in the base station:
The allocation of code strategy produces tactful pond.
5. according to the method for each described control base station of claim 1 to 4, it is characterized in that said tactful pond comprises the Password Policy that the base station is all; Said Password Policy is the encrypted message that is associated and the combination of said encrypted message control information corresponding.
6. a device of controlling the base station is characterized in that, comprising:
Information extraction modules is used to receive the PING request, extracts the encrypted message in the PING message;
The information matches module is used for said encrypted message and tactful pond relevant information are mated; Under the coupling case of successful, carry out corresponding operating according to Password Policy.
7. the device of control according to claim 6 base station is characterized in that, said information matches module specifically comprises:
The encrypted message matching unit is used for said encrypted message and tactful pond relevant information are mated;
The match information judging unit is used to judge whether said encrypted message coupling is successful; If, then write down said encrypted message, carry out the Password Policy coupling;
The matching strategy judging unit is used to judge whether said Password Policy coupling is successful; Under said Password Policy coupling case of successful,, carry out corresponding operating according to Password Policy.
8. the device of control according to claim 7 base station is characterized in that, also comprises:
Base station processing module is used for that PING is carried out in the base station and handles.
9. the device of control according to claim 8 base station is characterized in that, also comprises:
The policy configurations module is used for the allocation of code strategy, produces tactful pond.
10. according to the device of each described control base station of claim 6 to 9, it is characterized in that said tactful pond comprises the Password Policy that the base station is all; Said Password Policy is the encrypted message that is associated and the combination of said encrypted message control information corresponding.
CN201210101769.3A 2012-04-09 2012-04-09 Control method and the device of base station Active CN102664936B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210101769.3A CN102664936B (en) 2012-04-09 2012-04-09 Control method and the device of base station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210101769.3A CN102664936B (en) 2012-04-09 2012-04-09 Control method and the device of base station

Publications (2)

Publication Number Publication Date
CN102664936A true CN102664936A (en) 2012-09-12
CN102664936B CN102664936B (en) 2016-01-20

Family

ID=46774345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210101769.3A Active CN102664936B (en) 2012-04-09 2012-04-09 Control method and the device of base station

Country Status (1)

Country Link
CN (1) CN102664936B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104809538A (en) * 2014-01-29 2015-07-29 携程计算机技术(上海)有限公司 Service consultation system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040235424A1 (en) * 2003-05-20 2004-11-25 Jong-Kwang Kim System and method for controlling a mobile terminal located remote from a user
CN101039221A (en) * 2007-04-27 2007-09-19 华为技术有限公司 Method for detecting fault and network equipment and network system
CN101656801A (en) * 2008-08-22 2010-02-24 中兴通讯股份有限公司 Method for identifying user key-press meanings in automatic service system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040235424A1 (en) * 2003-05-20 2004-11-25 Jong-Kwang Kim System and method for controlling a mobile terminal located remote from a user
CN101039221A (en) * 2007-04-27 2007-09-19 华为技术有限公司 Method for detecting fault and network equipment and network system
CN101656801A (en) * 2008-08-22 2010-02-24 中兴通讯股份有限公司 Method for identifying user key-press meanings in automatic service system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104809538A (en) * 2014-01-29 2015-07-29 携程计算机技术(上海)有限公司 Service consultation system and method

Also Published As

Publication number Publication date
CN102664936B (en) 2016-01-20

Similar Documents

Publication Publication Date Title
CN105227383B (en) A kind of device of network topology investigation
CN109495870B (en) Bluetooth test method and device
CN103379009B (en) SSL VPN communication method based on data link layers
CN107438074A (en) The means of defence and device of a kind of ddos attack
CN105607086B (en) A kind of automated detection method on GNSS receiver
CN112333019B (en) Router configuration and test method and system and readable storage medium
Al-Dalky et al. A Modbus traffic generator for evaluating the security of SCADA systems
CN109787849A (en) A kind of OLT logical network test method
CN103368849A (en) OAM (Operations, Administration and Management) message processing method and device
CN107005430A (en) A kind of communication means based on data link layer, equipment and system
CN111917741B (en) Micro-grid security defense system and method based on Dos and virtual data injection attack
CN108200128A (en) A kind of remote meter reading method and system based on eLTE-IoT technologies
CN112165408A (en) Test method and device for simulating client serial deployment environment
CN102143070B (en) Remote traffic acquisition method, device and system
CN102664936A (en) Method and device for controlling base station
CN107342994A (en) Intelligent sound authentication method, intelligent sound, terminal device and system
CN109587204B (en) Method and device for accessing public network and electronic equipment
CN109861877A (en) A kind of distribution network terminal wireless public network communication test system based on cloud service
CN105391720A (en) User terminal login method and device
CN103634365A (en) Third party application platform in wireless access network and communication method thereof
CN113079565B (en) LTE edge user network access method and device
CN102497439B (en) Geographical position information acquisition method and intranet and extranet communicator
Yang et al. Design of communication interface for M2M-based positioning and monitoring system
CN109286575A (en) Message priority configuration method, device and the network equipment
CN212992342U (en) Attack defense reliability test system for network solution

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant