CN113068207B - Computer network security management method and system based on wireless communication system - Google Patents

Computer network security management method and system based on wireless communication system Download PDF

Info

Publication number
CN113068207B
CN113068207B CN202110369910.7A CN202110369910A CN113068207B CN 113068207 B CN113068207 B CN 113068207B CN 202110369910 A CN202110369910 A CN 202110369910A CN 113068207 B CN113068207 B CN 113068207B
Authority
CN
China
Prior art keywords
mobile terminal
base station
relay mobile
response
computer network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110369910.7A
Other languages
Chinese (zh)
Other versions
CN113068207A (en
Inventor
曲佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengde North Network Communication Engineering Co ltd
Original Assignee
Chengde Petroleum College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengde Petroleum College filed Critical Chengde Petroleum College
Priority to CN202110369910.7A priority Critical patent/CN113068207B/en
Publication of CN113068207A publication Critical patent/CN113068207A/en
Application granted granted Critical
Publication of CN113068207B publication Critical patent/CN113068207B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a computer network security management method based on a wireless communication system, which comprises the following steps: collecting computer network security information by the first mobile terminal and the second mobile terminal; a first mobile terminal sends a request message of a side link communication resource pool to a base station; sending a side link communication resource pool request message to the base station by the second mobile terminal; allocating, by the base station, a sidelink communication resource pool to the first mobile terminal in response to receiving the sidelink communication resource pool request message; allocating, by the base station, a sidelink communication resource pool to the second mobile terminal in response to receiving the sidelink communication resource pool request message; in response to receiving the allocated sidelink communication resource pool, transmitting, by the first mobile terminal, first sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool.

Description

Computer network security management method and system based on wireless communication system
Technical Field
The present invention relates to the field of computer security technologies, and in particular, to a computer network security management method and system based on a wireless communication system.
Background
The computer network security means that the confidentiality, integrity and usability of data are protected in a network environment by using network management control and technical measures.
The prior art CN107959690A discloses a software-defined network-based DDoS attack cross-layer cooperative defense method, which aims to solve the problems that the communication pressure of a southbound interface and a control layer is too large and the calculation pressure of an SDN controller is too large. The technical scheme includes that a DDoS attack cross-layer cooperative defense framework based on the SDN and composed of a data layer and a control layer is constructed, the data layer conducts coarse grain detection on data flow to obtain DDoS attack abnormal flow data, and the control layer conducts fine grain detection on the DDoS attack abnormal flow data.
The information disclosed in this background section is only for enhancement of understanding of the general background of the invention and should not be taken as an acknowledgement or any form of suggestion that this information forms the prior art already known to a person skilled in the art.
Disclosure of Invention
The invention aims to provide a computer network security management method and system based on a wireless communication system, which can overcome the defects of the prior art.
In order to achieve the above object, the present invention provides a computer network security management method based on a wireless communication system, which is characterized in that the computer network security management method based on the wireless communication system comprises the following steps:
collecting computer network security information by the first mobile terminal and the second mobile terminal;
a first mobile terminal sends a request message of a side link communication resource pool to a base station;
sending a side link communication resource pool request message to the base station by the second mobile terminal;
allocating, by the base station, a sidelink communication resource pool to the first mobile terminal in response to receiving the sidelink communication resource pool request message;
allocating, by the base station, a sidelink communication resource pool to the second mobile terminal in response to receiving the sidelink communication resource pool request message;
in response to receiving the allocated sidelink communication resource pool, sending, by the first mobile terminal, first sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool;
in response to receiving the allocated sidelink communication resource pool, sending, by the second mobile terminal, second sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool;
in response to sending second sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool, monitoring, by the second mobile terminal, sidelink control information sent by other mobile terminals over a second time period and a first set of frequency resources in the sidelink communication resource pool;
transmitting, by the second mobile terminal, a repetition of the second sidelink control information to the relay mobile terminal over a third time period in the sidelink communication resource pool and the second set of frequency resources, if the sidelink control information transmitted by the first mobile terminal is heard over the second time period in the sidelink communication resource pool and the first set of frequency resources.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
sending, by the first mobile terminal, computer network security information to the relay mobile terminal on a first set of frequency resources in a sidelink communications resource pool in response to sending the first sidelink control information to the relay mobile terminal on the first set of frequency resources;
sending, by the second mobile terminal, computer network security information to the relay mobile terminal on a second set of frequency resources in the sidelink communication resource pool in response to sending the second sidelink control information to the relay mobile terminal on the second set of frequency resources;
sending, by the relay mobile terminal, a scheduling request to the base station in response to receiving the computer network security information;
transmitting, by the base station, a first uplink grant to the relay mobile terminal in response to receiving the scheduling request;
sending, by the relay mobile terminal, a size of the computer network security information to the base station in response to receiving the first uplink grant;
in response to receiving the size of the computer network security information, the base station determines whether the size of the computer network security information is greater than a first threshold;
if the size of the computer network security information is judged to be larger than a first threshold, the base station sends a first MACCE to the relay mobile terminal, wherein the first MACCE indicates the relay mobile terminal to communicate with the base station at a first subcarrier interval;
in response to transmitting the first MACCE to the relay mobile terminal, transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a first set of subcarriers in a first time period, wherein carriers in the first set of subcarriers have a first subcarrier spacing;
computer network security information is sent by the relay mobile terminal to the base station over the second coincident set and the first set of subcarriers in the first time period in response to receiving the downlink control information.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
determining, by the relay mobile terminal, whether there is further data to be transmitted to the base station in response to transmitting the computer network security information to the base station on the second conforming set in the first time period;
if the relay mobile terminal judges that data to be sent to the base station exist, the relay mobile terminal sends a scheduling request to the base station;
transmitting, by the base station, a second uplink grant to the relay mobile terminal in response to receiving the scheduling request;
transmitting, by the relay mobile terminal, to the base station, a size of data to be transmitted to the base station in response to receiving the second uplink grant;
in response to receiving the size of the data to be transmitted to the base station, determining, by the base station, whether the size of the data to be transmitted to the base station is greater than a first threshold;
if the size of the data to be sent to the base station is smaller than the first threshold and larger than the second threshold, the base station sends a second MACCE to the relay mobile terminal, wherein the second MACCE indicates the relay mobile terminal to communicate with the base station at a second subcarrier interval to the relay mobile terminal, and the second subcarrier interval is smaller than the first subcarrier interval;
in response to sending the second MACCE to the relay mobile terminal, sending, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a second set of subcarriers in a second time period, wherein the carriers in the second set of subcarriers have a second subcarrier spacing;
in response to receiving the downlink control information, transmitting, by the relay mobile terminal, data to be transmitted to the base station on a second coincident set and a second set of subcarriers in a second time period.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
in response to receiving the size of the computer network security information, the base station determines whether the size of the computer network security information is greater than a first threshold;
if the size of the computer network security information is judged to be smaller than the first threshold and larger than the second threshold, the base station sends a third MACCE to the relay mobile terminal, wherein the third MACCE indicates the relay mobile terminal to communicate with the base station at a second subcarrier interval to the relay mobile terminal, and the second subcarrier interval is smaller than the first subcarrier interval;
in response to sending the third MACCE to the relay mobile terminal, sending, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a third set of subcarriers in a first time period, wherein the carriers in the third set of subcarriers have a second subcarrier spacing;
in response to receiving the downlink control information, computer network security information is sent by the relay mobile terminal to the base station on the second coincident set and the third set of subcarriers in the first time period.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
in response to receiving the size of the computer network security information, the base station judges whether the size of the computer network security information is larger than a second threshold;
if the size of the computer network safety information is judged to be smaller than the second threshold, the base station sends a fourth MACCE to the relay mobile terminal, wherein the fourth MACCE indicates the relay mobile terminal to communicate with the base station at a third subcarrier interval to the relay mobile terminal, and the third subcarrier interval is smaller than the second subcarrier interval;
in response to sending the fourth MACCE to the relay mobile terminal, sending, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a fourth set of subcarriers in a first time period, wherein the carriers in the fourth set of subcarriers have a second subcarrier spacing;
in response to receiving the downlink control information, computer network security information is sent by the relay mobile terminal to the base station on the second coincident set and the fourth set of subcarriers in the first time period.
The invention provides a computer network security management system based on a wireless communication system, which is characterized in that the computer network security management system based on the wireless communication system comprises:
means for collecting computer network security information by the first mobile terminal and the second mobile terminal;
means for sending, by a first mobile terminal, a sidelink communication resource pool request message to a base station;
means for sending, by the second mobile terminal, a sidelink communication resource pool request message to the base station;
means for allocating, by the base station, a sidelink communication resource pool to the first mobile terminal in response to receiving the sidelink communication resource pool request message;
means for allocating, by the base station, a sidelink communication resource pool to the second mobile terminal in response to receiving the sidelink communication resource pool request message;
means for transmitting, by the first mobile terminal, first sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool in response to receiving the allocated sidelink communication resource pool;
means for transmitting, by the second mobile terminal, second sidelink control information to the relay mobile terminal over the first time period and the first set of frequency resources in the sidelink communication resource pool in response to receiving the allocated sidelink communication resource pool;
means for monitoring, by the second mobile terminal, for sidelink control information sent by other mobile terminals over a second time period in the sidelink communication resource pool and the first set of frequency resources in response to sending the second sidelink control information to the relay mobile terminal over the first time period in the sidelink communication resource pool and the first set of frequency resources;
means for transmitting, by the second mobile terminal, a repetition of the second sidelink control information to the relay mobile terminal over a third time period in the sidelink communication resource pool and the second set of frequency resources if the sidelink control information transmitted by the first mobile terminal is heard over the second time period in the sidelink communication resource pool and the first set of frequency resources.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for transmitting, by the first mobile terminal, computer network security information to the relay mobile terminal on a first set of frequency resources in a sidelink communications resource pool in response to transmitting the first sidelink control information to the relay mobile terminal on the first set of frequency resources;
means for sending, by the second mobile terminal, computer network security information to the relay mobile terminal on a second set of frequency resources in the sidelink communications resource pool in response to sending the second sidelink control information to the relay mobile terminal on the second set of frequency resources;
means for transmitting, by the relay mobile terminal, a scheduling request to the base station in response to receiving the computer network security information;
means for transmitting, by the base station, a first uplink grant to the relay mobile terminal in response to receiving the scheduling request;
means for transmitting, by the relay mobile terminal, a size of the computer network security information to the base station in response to receiving the first uplink grant;
means for determining, by the base station, whether the size of the computer network security information is greater than a first threshold in response to receiving the size of the computer network security information;
a unit for sending a first MACCE to the relay mobile terminal by the base station if it is determined that the size of the computer network security information is greater than a first threshold, wherein the first MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a first subcarrier interval;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a first set of subcarriers in a first time period in response to transmitting the first MACCE to the relay mobile terminal, wherein carriers in the first set of subcarriers have a first subcarrier spacing;
means for transmitting, by the relay mobile terminal, computer network security information to the base station over the second set of coincidences and the first set of subcarriers in the first time period in response to receiving the downlink control information.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for determining, by the relay mobile terminal, whether there is more data to send to the base station in response to sending the computer network security information to the base station on the second conforming set in the first time period;
a unit for transmitting a scheduling request to the base station by the relay mobile terminal if it is determined that there is more data to be transmitted to the base station;
means for transmitting, by the base station, a second uplink grant to the relay mobile terminal in response to receiving the scheduling request;
means for transmitting, by the relay mobile terminal, to the base station, a size of data to be transmitted to the base station in response to receiving the second uplink grant;
means for determining, by the base station, whether a size of the data to be transmitted to the base station is greater than a first threshold in response to receiving the size of the data to be transmitted to the base station;
means for sending, by the base station, a second MACCE to the relay mobile terminal if it is determined that the size of the data to be sent to the base station is less than a first threshold and greater than a second threshold, wherein the second MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a second subcarrier spacing, wherein the second subcarrier spacing is less than the first subcarrier spacing;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a second set of subcarriers in a second time period in response to transmitting a second MACCE to the relay mobile terminal, wherein the carriers in the second set of subcarriers have a second subcarrier spacing;
means for transmitting, by the relay mobile terminal, data to be transmitted to the base station on a second set of subcarriers and a second set of symbols in a second time period in response to receiving the downlink control information.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for determining, by the base station, whether the size of the computer network security information is greater than a first threshold in response to receiving the size of the computer network security information;
means for sending, by the base station, a third MACCE to the relay mobile terminal if it is determined that the size of the computer network security information is less than the first threshold and greater than a second threshold, wherein the third MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a second subcarrier spacing, wherein the second subcarrier spacing is less than the first subcarrier spacing;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a third set of subcarriers in a first time period in response to transmitting a third MACCE to the relay mobile terminal, wherein carriers in the third set of subcarriers have a second subcarrier spacing;
means for transmitting, by the relay mobile terminal, computer network security information to the base station on the second coincident set and the third set of subcarriers in the first time period in response to receiving the downlink control information.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for determining, by the base station, whether the size of the computer network security information is greater than a second threshold in response to receiving the size of the computer network security information;
a unit configured to send, by the base station, a fourth MACCE to the relay mobile terminal if it is determined that the size of the computer network security information is smaller than the second threshold, where the fourth MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a third subcarrier interval, where the third subcarrier interval is smaller than the second subcarrier interval;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a fourth set of subcarriers in a first time period in response to transmitting a fourth MACCE to the relay mobile terminal, wherein the carriers in the fourth set of subcarriers have a second subcarrier spacing;
means for transmitting, by the relay mobile terminal, computer network security information to the base station on the second coincident set and the fourth set of subcarriers in the first time period in response to receiving the downlink control information.
Compared with the prior art, the invention has the following advantages that the computer network security is more and more emphasized along with the rise and popularization of online shopping, online payment and online banking. It is desirable to have a method and system for collecting and rapidly uploading network security information in real time. Aiming at the requirements of the prior art, the application provides a computer network security management method and system based on a wireless communication system.
Drawings
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present invention.
FIG. 2 is a flow diagram of a method according to an embodiment of the invention.
Detailed Description
The following detailed description of the present invention is provided in conjunction with the accompanying drawings, but it should be understood that the scope of the present invention is not limited to the specific embodiments.
Throughout the specification and claims, unless explicitly stated otherwise, the word "comprise", or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated element or component but not the exclusion of any other element or component.
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present invention.
FIG. 2 is a flow diagram of a method according to an embodiment of the invention. As shown in the figure, the method of the present invention comprises the steps of:
step 101: collecting computer network security information by the first mobile terminal and the second mobile terminal;
step 102: a first mobile terminal sends a request message of a side link communication resource pool to a base station;
step 103: sending a side link communication resource pool request message to the base station by the second mobile terminal;
step 104: allocating, by the base station, a sidelink communication resource pool to the first mobile terminal in response to receiving the sidelink communication resource pool request message;
step 105: allocating, by the base station, a sidelink communication resource pool to the second mobile terminal in response to receiving the sidelink communication resource pool request message;
step 106: in response to receiving the allocated sidelink communication resource pool, sending, by the first mobile terminal, first sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool;
step 107: in response to receiving the allocated sidelink communication resource pool, sending, by the second mobile terminal, second sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool;
step 108: in response to sending second sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool, monitoring, by the second mobile terminal, sidelink control information sent by other mobile terminals over a second time period and a first set of frequency resources in the sidelink communication resource pool;
step 109: transmitting, by the second mobile terminal, a repetition of the second sidelink control information to the relay mobile terminal over a third time period in the sidelink communication resource pool and the second set of frequency resources, if the sidelink control information transmitted by the first mobile terminal is heard over the second time period in the sidelink communication resource pool and the first set of frequency resources.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
sending, by the first mobile terminal, computer network security information to the relay mobile terminal on a first set of frequency resources in a sidelink communications resource pool in response to sending the first sidelink control information to the relay mobile terminal on the first set of frequency resources;
sending, by the second mobile terminal, computer network security information to the relay mobile terminal on a second set of frequency resources in the sidelink communication resource pool in response to sending the second sidelink control information to the relay mobile terminal on the second set of frequency resources;
sending, by the relay mobile terminal, a scheduling request to the base station in response to receiving the computer network security information;
transmitting, by the base station, a first uplink grant to the relay mobile terminal in response to receiving the scheduling request;
sending, by the relay mobile terminal, a size of the computer network security information to the base station in response to receiving the first uplink grant;
in response to receiving the size of the computer network security information, the base station determines whether the size of the computer network security information is greater than a first threshold;
if the size of the computer network security information is judged to be larger than a first threshold, the base station sends a first MACCE to the relay mobile terminal, wherein the first MACCE indicates the relay mobile terminal to communicate with the base station at a first subcarrier interval;
in response to transmitting the first MACCE to the relay mobile terminal, transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a first set of subcarriers in a first time period, wherein carriers in the first set of subcarriers have a first subcarrier spacing;
computer network security information is sent by the relay mobile terminal to the base station over the second coincident set and the first set of subcarriers in the first time period in response to receiving the downlink control information.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
determining, by the relay mobile terminal, whether there is further data to be transmitted to the base station in response to transmitting the computer network security information to the base station on the second conforming set in the first time period;
if the relay mobile terminal judges that data to be sent to the base station exist, the relay mobile terminal sends a scheduling request to the base station;
transmitting, by the base station, a second uplink grant to the relay mobile terminal in response to receiving the scheduling request;
transmitting, by the relay mobile terminal, to the base station, a size of data to be transmitted to the base station in response to receiving the second uplink grant;
in response to receiving the size of the data to be transmitted to the base station, determining, by the base station, whether the size of the data to be transmitted to the base station is greater than a first threshold;
if the size of the data to be sent to the base station is smaller than the first threshold and larger than the second threshold, the base station sends a second MACCE to the relay mobile terminal, wherein the second MACCE indicates the relay mobile terminal to communicate with the base station at a second subcarrier interval to the relay mobile terminal, and the second subcarrier interval is smaller than the first subcarrier interval;
in response to sending the second MACCE to the relay mobile terminal, sending, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a second set of subcarriers in a second time period, wherein the carriers in the second set of subcarriers have a second subcarrier spacing;
in response to receiving the downlink control information, transmitting, by the relay mobile terminal, data to be transmitted to the base station on a second coincident set and a second set of subcarriers in a second time period.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
in response to receiving the size of the computer network security information, the base station determines whether the size of the computer network security information is greater than a first threshold;
if the size of the computer network security information is judged to be smaller than the first threshold and larger than the second threshold, the base station sends a third MACCE to the relay mobile terminal, wherein the third MACCE indicates the relay mobile terminal to communicate with the base station at a second subcarrier interval to the relay mobile terminal, and the second subcarrier interval is smaller than the first subcarrier interval;
in response to sending the third MACCE to the relay mobile terminal, sending, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a third set of subcarriers in a first time period, wherein the carriers in the third set of subcarriers have a second subcarrier spacing;
in response to receiving the downlink control information, computer network security information is sent by the relay mobile terminal to the base station on the second coincident set and the third set of subcarriers in the first time period.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
in response to receiving the size of the computer network security information, the base station judges whether the size of the computer network security information is larger than a second threshold;
if the size of the computer network safety information is judged to be smaller than the second threshold, the base station sends a fourth MACCE to the relay mobile terminal, wherein the fourth MACCE indicates the relay mobile terminal to communicate with the base station at a third subcarrier interval to the relay mobile terminal, and the third subcarrier interval is smaller than the second subcarrier interval;
in response to sending the fourth MACCE to the relay mobile terminal, sending, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a fourth set of subcarriers in a first time period, wherein the carriers in the fourth set of subcarriers have a second subcarrier spacing;
in response to receiving the downlink control information, computer network security information is sent by the relay mobile terminal to the base station on the second coincident set and the fourth set of subcarriers in the first time period.
The invention provides a computer network security management system based on a wireless communication system, which is characterized in that the computer network security management system based on the wireless communication system comprises:
means for collecting computer network security information by the first mobile terminal and the second mobile terminal;
means for sending, by a first mobile terminal, a sidelink communication resource pool request message to a base station;
means for sending, by the second mobile terminal, a sidelink communication resource pool request message to the base station;
means for allocating, by the base station, a sidelink communication resource pool to the first mobile terminal in response to receiving the sidelink communication resource pool request message;
means for allocating, by the base station, a sidelink communication resource pool to the second mobile terminal in response to receiving the sidelink communication resource pool request message;
means for transmitting, by the first mobile terminal, first sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool in response to receiving the allocated sidelink communication resource pool;
means for transmitting, by the second mobile terminal, second sidelink control information to the relay mobile terminal over the first time period and the first set of frequency resources in the sidelink communication resource pool in response to receiving the allocated sidelink communication resource pool;
means for monitoring, by the second mobile terminal, for sidelink control information sent by other mobile terminals over a second time period in the sidelink communication resource pool and the first set of frequency resources in response to sending the second sidelink control information to the relay mobile terminal over the first time period in the sidelink communication resource pool and the first set of frequency resources;
means for transmitting, by the second mobile terminal, a repetition of the second sidelink control information to the relay mobile terminal over a third time period in the sidelink communication resource pool and the second set of frequency resources if the sidelink control information transmitted by the first mobile terminal is heard over the second time period in the sidelink communication resource pool and the first set of frequency resources.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for transmitting, by the first mobile terminal, computer network security information to the relay mobile terminal on a first set of frequency resources in a sidelink communications resource pool in response to transmitting the first sidelink control information to the relay mobile terminal on the first set of frequency resources;
means for sending, by the second mobile terminal, computer network security information to the relay mobile terminal on a second set of frequency resources in the sidelink communications resource pool in response to sending the second sidelink control information to the relay mobile terminal on the second set of frequency resources;
means for transmitting, by the relay mobile terminal, a scheduling request to the base station in response to receiving the computer network security information;
means for transmitting, by the base station, a first uplink grant to the relay mobile terminal in response to receiving the scheduling request;
means for transmitting, by the relay mobile terminal, a size of the computer network security information to the base station in response to receiving the first uplink grant;
means for determining, by the base station, whether the size of the computer network security information is greater than a first threshold in response to receiving the size of the computer network security information;
a unit for sending a first MACCE to the relay mobile terminal by the base station if it is determined that the size of the computer network security information is greater than a first threshold, wherein the first MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a first subcarrier interval;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a first set of subcarriers in a first time period in response to transmitting the first MACCE to the relay mobile terminal, wherein carriers in the first set of subcarriers have a first subcarrier spacing;
means for transmitting, by the relay mobile terminal, computer network security information to the base station over the second set of coincidences and the first set of subcarriers in the first time period in response to receiving the downlink control information.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for determining, by the relay mobile terminal, whether there is more data to send to the base station in response to sending the computer network security information to the base station on the second conforming set in the first time period;
a unit for transmitting a scheduling request to the base station by the relay mobile terminal if it is determined that there is more data to be transmitted to the base station;
means for transmitting, by the base station, a second uplink grant to the relay mobile terminal in response to receiving the scheduling request;
means for transmitting, by the relay mobile terminal, to the base station, a size of data to be transmitted to the base station in response to receiving the second uplink grant;
means for determining, by the base station, whether a size of the data to be transmitted to the base station is greater than a first threshold in response to receiving the size of the data to be transmitted to the base station;
means for sending, by the base station, a second MACCE to the relay mobile terminal if it is determined that the size of the data to be sent to the base station is less than a first threshold and greater than a second threshold, wherein the second MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a second subcarrier spacing, wherein the second subcarrier spacing is less than the first subcarrier spacing;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a second set of subcarriers in a second time period in response to transmitting a second MACCE to the relay mobile terminal, wherein the carriers in the second set of subcarriers have a second subcarrier spacing;
means for transmitting, by the relay mobile terminal, data to be transmitted to the base station on a second set of subcarriers and a second set of symbols in a second time period in response to receiving the downlink control information.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for determining, by the base station, whether the size of the computer network security information is greater than a first threshold in response to receiving the size of the computer network security information;
means for sending, by the base station, a third MACCE to the relay mobile terminal if it is determined that the size of the computer network security information is less than the first threshold and greater than a second threshold, wherein the third MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a second subcarrier spacing, wherein the second subcarrier spacing is less than the first subcarrier spacing;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a third set of subcarriers in a first time period in response to transmitting a third MACCE to the relay mobile terminal, wherein carriers in the third set of subcarriers have a second subcarrier spacing;
means for transmitting, by the relay mobile terminal, computer network security information to the base station on the second coincident set and the third set of subcarriers in the first time period in response to receiving the downlink control information.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for determining, by the base station, whether the size of the computer network security information is greater than a second threshold in response to receiving the size of the computer network security information;
a unit configured to send, by the base station, a fourth MACCE to the relay mobile terminal if it is determined that the size of the computer network security information is smaller than the second threshold, where the fourth MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a third subcarrier interval, where the third subcarrier interval is smaller than the second subcarrier interval;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a fourth set of subcarriers in a first time period in response to transmitting a fourth MACCE to the relay mobile terminal, wherein the carriers in the fourth set of subcarriers have a second subcarrier spacing;
means for transmitting, by the relay mobile terminal, computer network security information to the base station on the second coincident set and the fourth set of subcarriers in the first time period in response to receiving the downlink control information.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing descriptions of specific exemplary embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teaching. The exemplary embodiments were chosen and described in order to explain certain principles of the invention and its practical application to enable one skilled in the art to make and use various exemplary embodiments of the invention and various alternatives and modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims and their equivalents.

Claims (4)

1. A computer network security management method based on a wireless communication system is characterized by comprising the following steps:
collecting computer network security information by the first mobile terminal and the second mobile terminal;
a first mobile terminal sends a request message of a side link communication resource pool to a base station;
sending a side link communication resource pool request message to the base station by the second mobile terminal;
allocating, by the base station, a sidelink communication resource pool to the first mobile terminal in response to receiving the sidelink communication resource pool request message;
allocating, by the base station, a sidelink communication resource pool to the second mobile terminal in response to receiving the sidelink communication resource pool request message;
in response to receiving the allocated sidelink communication resource pool, sending, by the first mobile terminal, first sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool;
in response to receiving the allocated sidelink communication resource pool, sending, by the second mobile terminal, second sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool;
in response to sending second sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool, monitoring, by the second mobile terminal, sidelink control information sent by other mobile terminals over a second time period and a first set of frequency resources in the sidelink communication resource pool;
transmitting, by the second mobile terminal, a repetition of the second sidelink control information to the relay mobile terminal over a third time period in the sidelink communication resource pool and the second set of frequency resources if the sidelink control information transmitted by the first mobile terminal is heard over the second time period in the sidelink communication resource pool and the first set of frequency resources,
sending, by the first mobile terminal, computer network security information to the relay mobile terminal on a first set of frequency resources in a sidelink communications resource pool in response to sending the first sidelink control information to the relay mobile terminal on the first set of frequency resources;
sending, by the second mobile terminal, computer network security information to the relay mobile terminal on a second set of frequency resources in the sidelink communication resource pool in response to sending the second sidelink control information to the relay mobile terminal on the first set of frequency resources;
sending, by a relay mobile terminal, a scheduling request to the base station in response to receiving the computer network security information;
transmitting, by a base station, a first uplink grant to the relay mobile terminal in response to receiving the scheduling request;
sending, by a relay mobile terminal, a size of the computer network security information to the base station in response to receiving the first uplink grant;
in response to receiving the size of the computer network security information, judging, by the base station, whether the size of the computer network security information is greater than a first threshold;
if the size of the computer network security information is judged to be larger than a first threshold, sending a first MAC CE to the relay mobile terminal by the base station, wherein the first MAC CE indicates the relay mobile terminal to communicate with the base station at a first subcarrier interval;
transmitting, by a base station, downlink control information to the relay mobile terminal on a first set of symbols and a first set of subcarriers in a first time period, wherein carriers in the first set of subcarriers have a first subcarrier spacing, in response to transmitting a first MAC CE to the relay mobile terminal;
sending, by the relay mobile terminal, the computer network security information to the base station over the second set of symbols and the first set of subcarriers in the first time period in response to receiving the downlink control information.
2. The computer network security management method based on a wireless communication system according to claim 1, wherein the computer network security management method based on a wireless communication system comprises the steps of:
determining, by the relay mobile terminal, whether there is more data to send to the base station in response to sending the computer network security information to the base station on a second set of symbols in a first time period;
if the relay mobile terminal judges that data to be transmitted to the base station exist, the relay mobile terminal transmits a scheduling request to the base station;
transmitting, by the base station, a second uplink grant to the relay mobile terminal in response to receiving the scheduling request;
transmitting, by a relay mobile terminal to the base station, a size of the data to be transmitted to the base station in response to receiving the second uplink grant;
in response to receiving the size of the data to be transmitted to the base station, determining, by the base station, whether the size of the data to be transmitted to the base station is greater than a first threshold;
if the size of the data to be transmitted to the base station is judged to be smaller than a first threshold and larger than a second threshold, transmitting a second MAC CE to the relay mobile terminal by the base station, wherein the second MAC CE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a second subcarrier spacing, and the second subcarrier spacing is smaller than the first subcarrier spacing;
transmitting, by a base station, downlink control information to the relay mobile terminal on a first set of symbols and a second set of subcarriers in a second time period, wherein the carriers in the second set of subcarriers have a second subcarrier spacing, in response to transmitting a second MAC CE to the relay mobile terminal;
transmitting, by the relay mobile terminal, the data to be transmitted to the base station on a second set of symbols and a second set of subcarriers in a second time period in response to receiving the downlink control information.
3. The computer network security management method based on a wireless communication system according to claim 2, wherein the computer network security management method based on a wireless communication system comprises the steps of:
in response to receiving the size of the computer network security information, judging, by the base station, whether the size of the computer network security information is greater than a first threshold;
if the size of the computer network security information is judged to be smaller than a first threshold and larger than a second threshold, sending a third MAC CE to the relay mobile terminal by the base station, wherein the third MAC CE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a second subcarrier interval, and the second subcarrier interval is smaller than the first subcarrier interval;
transmitting, by a base station, downlink control information to the relay mobile terminal on a first set of symbols in a first time period and a third set of subcarriers in response to transmitting a third MAC CE to the relay mobile terminal, wherein carriers in the third set of subcarriers have a second subcarrier spacing;
sending, by the relay mobile terminal, the computer network security information to the base station on the second set of symbols and the third set of subcarriers in the first time period in response to receiving the downlink control information.
4. The computer network security management method based on a wireless communication system according to claim 3, wherein the computer network security management method based on a wireless communication system comprises the steps of:
in response to receiving the size of the computer network security information, judging, by the base station, whether the size of the computer network security information is greater than a second threshold;
if the size of the computer network security information is judged to be smaller than a second threshold, transmitting, by the base station, a fourth MAC CE to the relay mobile terminal, wherein the fourth MAC CE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a third subcarrier interval, wherein the third subcarrier interval is smaller than the second subcarrier interval;
transmitting, by a base station, downlink control information to the relay mobile terminal on a first set of symbols in a first time period and a fourth set of subcarriers in response to transmitting a fourth MAC CE to the relay mobile terminal, wherein the carriers in the fourth set of subcarriers have a second subcarrier spacing;
sending, by the relay mobile terminal, the computer network security information to the base station on the second set of symbols and the fourth set of subcarriers in the first time period in response to receiving the downlink control information.
CN202110369910.7A 2021-04-07 2021-04-07 Computer network security management method and system based on wireless communication system Active CN113068207B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110369910.7A CN113068207B (en) 2021-04-07 2021-04-07 Computer network security management method and system based on wireless communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110369910.7A CN113068207B (en) 2021-04-07 2021-04-07 Computer network security management method and system based on wireless communication system

Publications (2)

Publication Number Publication Date
CN113068207A CN113068207A (en) 2021-07-02
CN113068207B true CN113068207B (en) 2022-01-28

Family

ID=76566157

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110369910.7A Active CN113068207B (en) 2021-04-07 2021-04-07 Computer network security management method and system based on wireless communication system

Country Status (1)

Country Link
CN (1) CN113068207B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113543344B (en) * 2021-07-27 2022-02-15 西安交通大学医学院第一附属医院 Internet of things-based critical patient information acquisition method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104488244A (en) * 2013-03-22 2015-04-01 华为技术有限公司 Uplink data transmission method and apparatus
CN110830952A (en) * 2018-08-10 2020-02-21 中兴通讯股份有限公司 Resource allocation method and device for direct link in Internet of vehicles

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017055157A1 (en) * 2015-10-01 2017-04-06 Sony Corporation Telecommunications apparatuses and methods
CN108370561B (en) * 2015-12-30 2021-02-12 华为技术有限公司 Link resource request method, user equipment and base station
US11665730B2 (en) * 2017-01-09 2023-05-30 Interdigital Patent Holdings, Inc. Relay for wireless communication system
EP3609259A4 (en) * 2017-05-11 2020-04-01 LG Electronics Inc. -1- Method and apparatus for allocating sidelink resource using relay ue in wireless communication system
WO2019136626A1 (en) * 2018-01-10 2019-07-18 Zte Corporation Methods, apparatus and systems for device-to-device communications
CN110381463B (en) * 2018-04-12 2021-02-26 维沃移动通信有限公司 Method and equipment for transmitting sidelink information
US20200146048A1 (en) * 2018-11-01 2020-05-07 Lg Electronics Inc. Deactivation of configured grant
US11985717B2 (en) * 2019-02-14 2024-05-14 Lg Electronics Inc. Handling minimum required communication range in sidelink communication
CN112367618A (en) * 2020-10-30 2021-02-12 南通新飓计算机信息科技有限公司 Passenger positioning information transmission method and system for intelligent rail transit
CN112616135A (en) * 2021-01-11 2021-04-06 南通新飓计算机信息科技有限公司 Intelligent building monitoring command transmission method and transmission system based on inter-equipment communication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104488244A (en) * 2013-03-22 2015-04-01 华为技术有限公司 Uplink data transmission method and apparatus
CN110830952A (en) * 2018-08-10 2020-02-21 中兴通讯股份有限公司 Resource allocation method and device for direct link in Internet of vehicles

Also Published As

Publication number Publication date
CN113068207A (en) 2021-07-02

Similar Documents

Publication Publication Date Title
EP2879106B1 (en) Method and system for emergency alerts in a cellular system
CN112203336B (en) Wireless access control method, device and system
CN108419290B (en) Paging monitoring method, device, terminal, base station, system and storage medium
EP3780688B1 (en) Method and apparatus for restricting access of terminal device
CN108093089B (en) Paging monitoring method, device, system and storage medium
EP2874367B1 (en) Call authentication method, device, and system
CN113068207B (en) Computer network security management method and system based on wireless communication system
US20230239693A1 (en) Association control method and related apparatus
WO2016019551A1 (en) Power control method, communication system and related device
CN109803456B (en) Method and device for requesting to recover connection
AU2019254040B2 (en) Method for secure handling of early data transmission
CN113099539A (en) Big data transmission method and system for intelligent mine management
WO2017185896A1 (en) Scheduling information processing and delivering method, device, system, and storage medium
CN110087338B (en) Method and equipment for authenticating narrowband Internet of things
CN111314909A (en) Method and system for transmitting industrial park prevention and control monitoring information
CN112953694A (en) Method for uploading big data to block chain system
CN109246847A (en) Method for network access and system
CN106454776B (en) Pseudo base station protection method and device
CN112954674B (en) Remote data security encryption method and system
CN110958637A (en) Quick response method and system for intelligent cell
CN105554727B (en) Mobile phone card security verification method, mobile phone card security verification device and terminal
CN104994225A (en) Short message sending control method and short message sending control device
CN109803260A (en) Refuse cut-in method, apparatus and system
CN110621035A (en) Beam failure recovery method, base station and user equipment
CN113519173B (en) Wireless device and network node for verifying device class and corresponding method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220429

Address after: 067000 14 / F, xiaerdao Hezi Bida business office building, Shuangqiao District, Chengde City, Hebei Province

Patentee after: Chengde North Network Communication Engineering Co.,Ltd.

Address before: 067000 No. 2 College Road, Chengde High-tech Industrial Development Zone, Hebei Province

Patentee before: Hebei Petroleum University of Technology

TR01 Transfer of patent right