CN107969013B - Method and device for detecting network access result and computer storage medium - Google Patents

Method and device for detecting network access result and computer storage medium Download PDF

Info

Publication number
CN107969013B
CN107969013B CN201711233098.5A CN201711233098A CN107969013B CN 107969013 B CN107969013 B CN 107969013B CN 201711233098 A CN201711233098 A CN 201711233098A CN 107969013 B CN107969013 B CN 107969013B
Authority
CN
China
Prior art keywords
terminal
network
attach
message
attachment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711233098.5A
Other languages
Chinese (zh)
Other versions
CN107969013A (en
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201711233098.5A priority Critical patent/CN107969013B/en
Publication of CN107969013A publication Critical patent/CN107969013A/en
Application granted granted Critical
Publication of CN107969013B publication Critical patent/CN107969013B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0061Transmission or use of information for re-establishing the radio link of neighbour cell information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration

Abstract

The embodiment of the invention discloses a method and a device for detecting a network access result and a computer storage medium. The method is applied to the process that the terminal executes network access by adopting a preset optimization scheme, and comprises the following steps: receiving a first attach request message of the terminal; the first attach request message is sent after the terminal is registered in an LTE network, is switched to an out-of-service (OOS) state, and selects a GSM cell as a neighbor cell after the signal strength of the GSM cell is improved; sending a first attach rejection message representing the abnormality of the GPRS network to the terminal; repeatedly detecting whether a second attachment request of the terminal is obtained before the timing time of the first timer is reached, and sending a second attachment refusing message to the terminal; the first timer is started when a first attachment rejection message/a second attachment rejection message is sent to the terminal; and determining whether the terminal is successfully accessed to the GSM cell based on the detection result.

Description

Method and device for detecting network access result and computer storage medium
Technical Field
The present invention relates to network access technologies in the field of mobile communications, and in particular, to a method and an apparatus for detecting a network access result, and a computer storage medium.
Background
With the improvement of the data service demand of the user, the coverage and quality of a Long Term Evolution (LTE) network need to meet higher requirements. Meanwhile, a Global system for Mobile Communication (GSM)/Time Division Synchronous Code Division Multiple Access (TDSCDMA) network is still used, and for this reason, it is a better transition scheme for the LTE network and the TDSCDMA/GSM network to perform co-site deployment based on the original network system.
For the LTE/TDSCDMA/GSM network, the co-sited deployment scheme may share part of the network elements, resulting in a higher coupling degree of a multi-Radio Access Technology (RAT) system. In the optimization process of each RAT system, unpredictable problems are often caused to shared network elements of other RAT systems, so that the optimization process fails or the optimization time is long.
In order to solve the problem caused by the incompatibility of network deployment, various optimization means are adopted by each terminal (UE) manufacturer to improve the User experience of the network. However, since the occurrence of various abnormal situations may probabilistically cause the UE to fail to access the LTE network, it is particularly necessary to effectively detect the LTE network access result in an abnormal scenario.
Disclosure of Invention
The embodiment of the invention provides a method and a device for detecting a network access result and a computer storage medium, which can effectively detect the LTE network access result in an abnormal scene.
In order to achieve the above purpose, the technical solution of the embodiment of the present invention is realized as follows:
the embodiment of the invention provides a method for detecting a network access result, which is applied to a process that a terminal executes network access by adopting a preset optimization scheme, and comprises the following steps:
receiving a first attach request message of the terminal; the first attach request message is sent after the terminal is registered in an LTE network, is switched to an out-of-service (OOS) state, and selects a GSM cell as a neighbor cell after the signal strength of the GSM cell is improved;
sending a first attach rejection message representing General Packet Radio Service (GPRS) network abnormity to the terminal;
repeatedly detecting whether a second attachment request of the terminal is obtained before the timing time of the first timer is reached, and sending a second attachment refusing message to the terminal; the first timer is started when a first attachment rejection message/a second attachment rejection message is sent to the terminal;
and determining whether the terminal is successfully accessed to the GSM cell based on the detection result.
In the foregoing solution, the determining whether the terminal successfully accesses the GSM cell based on the detection result includes:
and when the detection result is that a second attachment request of the terminal is obtained before the timing time of the first timer reaches and the repetition times of sending a second attachment rejection message to the terminal reaches a preset threshold value, determining that the terminal is successfully accessed into the GSM cell.
In the foregoing solution, the determining whether the terminal successfully accesses the GSM cell based on the detection result includes:
and when the detection result is that the second attachment request of the terminal is not obtained before the timing time of the first timer is reached, determining that the terminal does not successfully access the GSM cell.
In the foregoing solution, the determining whether the terminal successfully accesses the GSM cell based on the detection result includes:
and when the detection result is that the repetition times of obtaining a second attachment request of the terminal and sending a second attachment rejection message to the terminal do not reach a preset threshold value before the timing time of the first timer reaches, determining that the terminal does not successfully access the adjacent cell.
In the above scheme, the method further comprises: establishing a simulation network environment, wherein the simulation network environment at least comprises the following network structures: the System comprises an LTE network, a TDSCDMA network and a GSM network, wherein TDSCDMA neighboring cell Information is configured in a System message Block (SIB, System Information Block)5 of the LTE network, GSM neighboring cell Information is configured in an SIB7 of the LTE network, and LTE neighboring cell Information is configured in a System message (SI, System Information) of the GSM network;
accordingly, the network interacting with the terminal is the network in the simulated network environment.
The embodiment of the invention also provides a device for detecting the network access result, which is applied to the process that a terminal adopts a preset optimization scheme to execute network access, and the device comprises: a receiving unit, a transmitting unit and a detecting unit; wherein the content of the first and second substances,
the receiving unit is configured to receive a first attach request message of the terminal; the first attach request message is sent after the terminal is registered in an LTE network and switched to an OOS state and a GSM cell serving as a neighbor cell is selected after the signal intensity of the GSM cell is improved;
the sending unit is used for sending a first attach rejection message representing the GPRS network abnormity to the terminal;
the detecting unit is configured to repeatedly detect whether a second attach request of the terminal is obtained by the receiving unit before the timing time of the first timer reaches, and send a second attach reject message to the terminal by the sending unit; the first timer is started when a first attachment rejection message/a second attachment rejection message is sent to the terminal; and determining whether the terminal is successfully accessed to the GSM cell based on the detection result.
In the foregoing solution, the detecting unit is configured to determine that the terminal successfully accesses the GSM cell when the detection result is that the receiving unit obtains the second attach request of the terminal before the timing time of the first timer reaches, and the number of times that the sending unit sends the second attach reject message to the terminal reaches a preset threshold.
In the foregoing solution, the detecting unit is configured to determine that the terminal has not successfully accessed the GSM cell when the detection result is that the receiving unit does not obtain the second attach request of the terminal before the timing time of the first timer reaches.
In the foregoing solution, the detecting unit is configured to determine that the terminal does not successfully access the GSM cell when the detection result is that the receiving unit obtains the second attach request of the terminal before the timing time of the first timer reaches, and the number of times that the sending unit sends the second attach reject message to the terminal does not reach a preset threshold.
In the above scheme, the apparatus further comprises:
the simulation unit is used for establishing a simulation network environment, and the simulation network environment at least comprises the following network structures: the system comprises an LTE network, a TDSCDMA network and a GSM network, wherein the SIB5 of the LTE network is configured with TDSCDMA neighboring cell information, the SIB7 of the LTE network is configured with GSM neighboring cell information, and the SI of the GSM network is configured with LTE neighboring cell information;
accordingly, the network interacting with the terminal is the network in the simulated network environment.
The embodiment of the invention also provides a device for detecting the network access result, which is applied to the process that a terminal adopts a preset optimization scheme to execute network access, and the device comprises: a processor and a memory for storing a computer program capable of running on the processor,
wherein the processor is configured to execute the steps of the method according to the embodiment of the present invention when the processor runs the computer program.
Embodiments of the present invention also provide a computer storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the method according to the embodiments of the present invention.
According to the method and the device for detecting the network access result and the computer storage medium provided by the embodiment of the invention, the terminal receives a first attachment request message of the terminal in the process of executing network access by adopting a preset optimization scheme; the first attachment request message is sent after the terminal is registered in a Long Term Evolution (LTE) network, is switched to a state not in a service area (OOS), and selects a global system for mobile communications (GSM) cell as a neighbor cell after the signal strength of the GSM cell is improved; sending a first attach rejection message representing the abnormality of a General Packet Radio Service (GPRS) network to the terminal; repeatedly detecting whether a second attachment request of the terminal is obtained before the timing time of the first timer is reached, and sending a second attachment refusing message to the terminal; the first timer is started when a first attachment rejection message/a second attachment rejection message is sent to the terminal; and determining whether the terminal is successfully accessed to the GSM cell based on the detection result. By adopting the scheme of the embodiment of the invention, the terminal executes the network access process by adopting the preset optimization scheme, and reselects to the scene of abnormal access of the GPRS data network when the terminal is in the OOS state due to the loss of the original RAT signal, and under the abnormal scene, the network side configuration error causes the repeated refusal of the attachment request of the terminal, so as to stably reproduce the situation that the small probability of the network appears because the OOS reselects to the abnormal GPRS data access, and detect whether the times of repeatedly receiving the attachment request of the terminal reaches the optimized maximum network accommodating times, thereby verifying the effectiveness and rationality of the optimization scheme, providing a basis for further perfecting the optimization scheme, and improving the internet experience of users.
Drawings
FIG. 1 is a schematic diagram of a SIB5 displayed via a computer display screen;
FIG. 2 is a schematic diagram of a SIB7 displayed via a computer display screen;
fig. 3 is a flowchart illustrating a method for detecting a network access result according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of an abnormal cause value carried by an attach rejection message displayed on a computer display screen;
fig. 5 is a schematic structural diagram of a device for detecting a network access result according to an embodiment of the present invention;
fig. 6 is a schematic diagram illustrating a hardware structure of a device for detecting a network access result according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
In the technical scheme of the embodiment of the invention, an abnormal access scene is simulated, namely: and reselecting to a scene of abnormal access of the GPRS data network under the condition that the terminal is in an OOS state due to the loss of the original RAT signal.
Aiming at the abnormal access scene, the network side configuration error causes the repeated refusal of the attachment request of the terminal, so as to stably reappear the condition that the small probability of the occurrence of the network is abnormal due to the fact that the OOS reselects to the GPRS data access, and detect whether the times of repeatedly receiving the attachment request of the terminal reaches the optimized maximum network accommodating times, thereby verifying the effectiveness and the rationality of the optimization scheme.
In the embodiment of the present invention, a network environment (referred to as a simulation network environment) may be constructed by a simulation platform, where the simulation network environment at least includes the following network structures: the system comprises an LTE network, a TDSCDMA network and a GSM network, wherein TDSCDMA neighboring cell information is configured in SIB5 of the LTE network, GSM neighboring cell information is configured in SIB7 of the LTE network, and LTE neighboring cell information is configured in SI of the GSM network. FIG. 1 is a schematic illustration of the display of SIB5 through a computer display screen, and FIG. 2 is a schematic illustration of the display of SIB7 through a computer display screen.
And then, executing a network access process based on the constructed network environment, wherein main objects involved in the LTE network access process comprise a terminal and a network, wherein the terminal can be realized by adopting a mobile phone but not limited to be realized by adopting the mobile phone, and the network can be realized by adopting a simulation platform. Here, since the network is implemented by using a simulation platform, the network can stably reproduce an abnormal access scenario with the terminal, thereby verifying feasibility and stability of the optimization scheme.
Based on the above simulated network environment, the following describes the technical solution of the embodiment of the present invention in detail.
Example one
Fig. 3 is a schematic flow chart of a method for detecting a network access result according to an embodiment of the present invention; as shown in fig. 3, the method includes:
step 101: receiving a first attach request message of the terminal; the first attach request message is sent after the terminal is registered in an LTE network, is switched to an OOS state, and selects a GSM cell as a neighbor cell after the signal strength of the GSM cell is improved.
Step 102: and sending a first attach rejection message representing the abnormity of the GPRS network to the terminal.
Step 103: repeatedly detecting whether a second attachment request of the terminal is obtained before the timing time of the first timer is reached, and sending a second attachment refusing message to the terminal; the first timer is started when the first/second attach reject message is sent to the terminal.
Step 104: and determining whether the terminal is successfully accessed to the GSM cell based on the detection result.
In the embodiment of the invention, based on the constructed simulation network environment, the terminal registers to the LTE network and establishes the bearing based on the LTE. The LTE-based bearer may be a Default Evolved Packet System (EPS) bearer (Default EPS bearer), and activates user plane data of the LTE network.
Here, before the terminal registers to the LTE network, a network access procedure of the LTE network needs to be performed, where the network access procedure may include: detecting system message broadcasting, cell selection, an initial access process and an RRC connection process; the simulation platform simulates a network side to send system message broadcast, and the terminal performs cell selection based on the system message broadcast, wherein in the embodiment, the terminal selects an LTE network; and the terminal and the LTE network complete an initial access process, and the terminal and the LTE network establish RRC connection.
In the embodiment of the invention, the terminal is switched to the OOS state based on the reduction of the signal intensity of the LTE service cell where the terminal is located; on the other hand, if the signal strength of the GSM cell, which is the neighboring cell, is increased to the access threshold, the terminal reselects the cell and selects the GSM cell for access.
In practical applications, as an implementation manner, before receiving the first attach request message of the terminal, the method further includes: receiving a first measurement report of the terminal, wherein the first measurement report indicates that the quality of a service cell is lower than a certain threshold and the quality of an inter-system adjacent cell is higher than a certain threshold; as an example, the first measurement report may be a B2measurement report (B2 MeasurementReport). And receiving the first measurement report or sending the first measurement report by the terminal to indicate that the terminal is to perform cell reselection to select the adjacent cell with good signal quality. And the LTE network simulated by the simulation platform receives a first measurement report of the terminal. After the terminal reselects the cell to select the GSM cell with better signal quality, the GSM network simulated by the simulation platform receives a first attachment request message of the terminal.
In practical application, after receiving a first attach request message sent by a terminal, a network device (e.g., a GSM base station) simulated by a simulation platform forwards the first attach request message to an MME, and the network device (e.g., the MME and an HSS) performs attach-related processing on the terminal in a GSM network, including authentication, location management, and the like, so as to complete registration in the GSM network.
In the embodiment of the invention, a first attach rejection message representing the abnormal GPRS network is sent to the terminal. As an embodiment, before sending the first attach reject message indicating the GPRS network anomaly to the terminal, the method further includes: encapsulating a first attach rejection message, wherein the first attach rejection message carries an attach rejection cause value, and the attach rejection cause value is used for representing an attach rejection cause; wherein the cause value of the attach reject in the attach reject message is used for characterizing a GPRS network anomaly.
In practical application, taking an example that a GMM cause value encapsulated in the attach reject message is "GPRS service not allowed (7)", where "GPRS service not allowed" indicates a GPRS network anomaly. Fig. 4 is a schematic diagram of an abnormal GMM cause value carried by an attach rejection message displayed on a computer display screen.
In the embodiment of the invention, based on the first attachment rejection message sent to the terminal, whether a second attachment request of the terminal is obtained before the timing time of a first timer is reached or not is detected repeatedly, and a second attachment rejection message is sent to the terminal; the first timer is started when the first/second attach reject message is sent to the terminal.
Here, verifying whether the optimization scheme is successful may include the following several embodiments:
as a first implementation manner, the determining whether the terminal successfully accesses the GSM cell based on the detection result includes: and when the detection result is that a second attachment request of the terminal is obtained before the timing time of the first timer reaches and the repetition times of sending a second attachment rejection message to the terminal reaches a preset threshold value, determining that the terminal is successfully accessed into the GSM cell.
In this embodiment, when sending the first attach rejection message to the terminal, the first timer may be started, and the second attach rejection message may be sent to the terminal after receiving the second attach request from the terminal before the timing time of the first timer is reached; and further starting the first timer when sending a second attachment rejection message, receiving a second attachment request of the terminal before the timing time of the first timer reaches, sending the second attachment rejection message to the terminal, repeating the operations, and repeatedly detecting that the second attachment request of the terminal is received before the timing time of the first timer reaches until the repetition times reaches a preset threshold value, so that the success of the optimization scheme can be judged. The determining whether the terminal successfully accesses the GSM cell based on the detection result includes: receiving a second attachment request of the terminal after the repetition times reach a preset threshold value, authenticating the terminal based on the second attachment request, and obtaining an authentication success result; allocating downlink resources to the terminal to complete the terminal access process; sending an attachment success message to the terminal; and detecting the residence time of the terminal residing in the GSM cell, and determining that the terminal successfully accesses the GSM cell when the residence time reaches the preset time.
Wherein, the cause value of the attach rejection carried by the second attach rejection message and the cause value of the attach rejection carried by the first attach rejection message may be the same.
As a second implementation manner, the determining whether the terminal successfully accesses the GSM cell based on the detection result includes: and when the detection result is that the second attachment request of the terminal is not obtained before the timing time of the first timer is reached, determining that the terminal does not successfully access the GSM cell.
In this embodiment, when the first attach reject message is sent to the terminal, the first timer may be started, and if the second attach request of the terminal is not received before the timing time of the first timer reaches, it may be determined that the optimization scheme fails, that is, it is determined that the terminal does not successfully access the GSM cell.
As a third implementation manner, the determining whether the terminal successfully accesses the GSM cell based on the detection result includes: and when the detection result is that the repetition times of obtaining a second attachment request of the terminal and sending a second attachment rejection message to the terminal do not reach a preset threshold value before the timing time of the first timer reaches, determining that the terminal does not successfully access the adjacent cell.
In this embodiment, when sending the first attach rejection message to the terminal, the first timer may be started, and the second attach rejection message may be sent to the terminal after receiving the second attach request from the terminal before the timing time of the first timer is reached; and further starting the first timer when sending a second attachment rejection message, receiving a second attachment request of the terminal before the timing time of the first timer reaches, sending the second attachment rejection message to the terminal, repeating the above operations, repeatedly detecting that the second attachment request of the terminal is received before the timing time of the first timer reaches, and judging that the optimization scheme fails when detecting that the repetition times does not reach a preset threshold value, namely before the repetition times reaches the preset threshold value, and not receiving the second attachment request of the terminal before the timing time of the first timer reaches.
In the embodiment of the invention, the preset threshold corresponding to the repetition times is the preset maximum network accommodating times, and the preset threshold can be obtained and set in advance in an optimization process in an experimental mode or a test mode.
Based on this, in an embodiment, the method may further include: establishing a simulation network environment, wherein the simulation network environment at least comprises the following network structures: the system comprises an LTE network, a TDSCDMA network and a GSM network, wherein the SIB5 of the LTE network is configured with TDSCDMA neighboring cell information, the SIB7 of the LTE network is configured with GSM neighboring cell information, and the SI of the GSM network is configured with LTE neighboring cell information;
accordingly, the network interacting with the terminal is the network in the simulated network environment.
By adopting the scheme of the embodiment of the invention, the terminal executes the network access process by adopting the preset optimization scheme, and reselects to the scene of abnormal access of the GPRS data network when the terminal is in the OOS state due to the loss of the original RAT signal, and under the abnormal scene, the network side configuration error causes the repeated refusal of the attachment request of the terminal, so as to stably reproduce the situation that the small probability of the network appears because the OOS reselects to the abnormal GPRS data access, and detect whether the times of repeatedly receiving the attachment request of the terminal reaches the optimized maximum network accommodating times, thereby verifying the effectiveness and rationality of the optimization scheme, providing a basis for further perfecting the optimization scheme, and improving the internet experience of users.
In addition, the network interacting with the terminal is a network in a simulation network environment, a simulation mode is adopted, workers do not need to go to the site, and other factors influencing detection can be removed, so that the personnel cost can be greatly reduced, and meanwhile, the influence of other factors on the detection result under the scene described by the embodiment of the invention can be eliminated.
The invention is described in more detail below with reference to an application example.
In this embodiment of the application, a network environment is constructed through the simulation platform, and the construction of the network environment may refer to the foregoing construction method, which is not described in detail in this embodiment. The method for detecting the network access result in the application embodiment comprises the following steps:
step 201: and triggering the UE to start and register to the LTE cell, establishing a Default EPS bearer, and activating user plane data.
Step 202: the signal strength of a serving cell (LTE cell) of the UE is reduced, the signal strength is maintained for a period of time, and the UE is triggered to enter an OOS state.
Step 203: the signal strength of the neighboring cell (GSM cell) of the UE is increased to be higher than the access threshold TH1, and the UE starts to initiate an Attach Request (i.e. Attach Request) message to the GSM cell, where the Attach Request message carries an access cause value. In this embodiment, the access cause value may be that the quality of the current serving cell is lower than the access threshold, and the signal strength of the neighboring cell is higher than the access threshold.
Step 204: the simulation system starts to detect whether an Attach Request (i.e., Attach Request) message of the UE is received at the GSM layer, and executes step 205 after detecting that the Attach Request (i.e., Attach Request) message of the UE is received.
Step 205: the simulation system simulates the network equipment of the GSM network to start the subsequent process of cell reselection and execute the Authentication process.
Step 206: the simulation system simulates an abnormal situation, rejects the Attach request of the UE, and sends an Attach Reject (i.e., Attach Reject) message to the UE, where the Attach Reject message carries a cause (cause) value, and in this embodiment, the cause (cause) value may be "GPRS Services not allowed," which may be specifically shown in fig. 4.
Step 207: the simulation system starts to detect whether the attachment Request (i.e. Attach Request) of the UE can be received again before the timing time of a specified timer (timer) arrives at the GSM layer; if an Attach Request (i.e., Attach Request) of the UE is received before the timing time of the timer arrives, the simulation system simulates the abnormal situation again, and resends an Attach Reject (i.e., Attach Request) message, which may carry the same cause value. Repeating the abnormal simulation times to N-1 times (wherein N is the optimized maximum network accommodation times), until after the attachment rejection message is sent in the N-1 th simulated abnormal scene, still receiving the attachment Request (namely the Attach Request) of the UE before the timing time of the timer is reached, and then indicating that the optimization scheme is successful.
Step 208: if the Attach Request (i.e., Attach Request) of the UE is not received before the timing time of the designated timer (timer) is reached, it is determined that the optimization scheme fails.
Step 209: and if the repeated abnormal simulation times do not reach N-1 times, judging that the optimization scheme fails.
Example two
The embodiment of the invention also provides a device for detecting the network access result, which is applied to the process that the terminal adopts the preset optimization scheme to execute the network access. Fig. 5 is a schematic structural diagram of a device for detecting a network access result according to an embodiment of the present invention; as shown in fig. 5, the apparatus includes: a receiving unit 32, a transmitting unit 31, and a detecting unit 33; wherein the content of the first and second substances,
the receiving unit 32 is configured to receive a first attach request message of the terminal; the first attach request message is sent after the terminal is registered in an LTE network and switched to an OOS state and a GSM cell serving as a neighbor cell is selected after the signal intensity of the GSM cell is improved;
the sending unit 31 is configured to send a first attach rejection message indicating that a GPRS network is abnormal to the terminal;
the detecting unit 33 is configured to repeatedly detect whether a second attach request of the terminal is obtained by the receiving unit 32 before the timing time of the first timer reaches, and send a second attach reject message to the terminal by the sending unit 31; the first timer is started when a first attachment rejection message/a second attachment rejection message is sent to the terminal; and determining whether the terminal is successfully accessed to the GSM cell based on the detection result.
In this embodiment of the present invention, as an implementation manner, the detecting unit 33 is configured to determine that the terminal successfully accesses the GSM cell when the detection result is that the receiving unit 32 obtains the second attach request of the terminal before the timing time of the first timer reaches, and the number of times that the sending unit 31 sends the second attach reject message to the terminal reaches a preset threshold.
As another embodiment, the detecting unit 33 is configured to determine that the terminal does not successfully access the GSM cell when the detection result is that the receiving unit 32 does not obtain the second attach request of the terminal before the timing time of the first timer reaches.
As another embodiment, the detecting unit 33 is configured to determine that the terminal has not successfully accessed the GSM cell when the detection result is that the receiving unit 32 obtains the second attach request of the terminal before the timing time of the first timer reaches, and the number of times of the sending unit 31 sends the second attach reject message to the terminal does not reach a preset threshold.
In an embodiment, the apparatus further includes an encapsulating unit 34, configured to encapsulate a first attach rejection message, where the first attach rejection message carries a cause value of attach rejection, and the cause value of attach rejection is used to characterize a cause of attach rejection; wherein the cause value of the attach reject in the attach reject message is used for characterizing a GPRS network anomaly.
In one embodiment, the apparatus further comprises:
the simulation unit 35 is configured to establish a simulated network environment, where the simulated network environment at least includes the following network structures: the system comprises an LTE network, a TDSCDMA network and a GSM network, wherein the SIB5 of the LTE network is configured with TDSCDMA neighboring cell information, the SIB7 of the LTE network is configured with GSM neighboring cell information, and the SI of the GSM network is configured with LTE neighboring cell information; accordingly, the network interacting with the terminal is the network in the simulated network environment.
In the embodiment of the present invention, the detection Unit 33, the encapsulation Unit 34, and the analog Unit 35 of the apparatus may be implemented by a Central Processing Unit (CPU), a Digital Signal Processor (DSP), a Micro Control Unit (MCU), or a Programmable Gate Array (FPGA) in practical application; the transmitting unit 31 and the receiving unit 32 in the device can be realized by a communication module (including a basic communication suite, an operating system, a communication module, a standardized interface, a protocol and the like) and a transceiving antenna in practical application.
It should be noted that: in the above embodiment, when the network access result detection device detects the network access result, only the division of the program modules is used as an example, and in practical applications, the processing distribution may be completed by different program modules according to needs, that is, the internal structure of the device is divided into different program modules, so as to complete all or part of the processing described above. In addition, the network access result detection apparatus and the network access result detection method provided in the foregoing embodiments belong to the same concept, and specific implementation processes thereof are described in detail in the method embodiments and are not described herein again.
EXAMPLE III
Based on the implementation of each unit in the detection apparatus for the network access result, an embodiment of the present invention further provides a detection apparatus for a network access result, fig. 6 is a schematic diagram illustrating a hardware structure of the detection apparatus for a network access result according to the embodiment of the present invention, and as shown in fig. 6, the apparatus 40 includes: a processor 41 and a memory 42 for storing computer programs capable of running on the processor,
wherein, the processor 41 is configured to execute, when running the computer program: the method comprises the steps that a terminal receives a first attachment request message of the terminal in the process of executing network access by adopting a preset optimization scheme; the first attachment request message is sent after the terminal is registered in a Long Term Evolution (LTE) network, is switched to an OOS state and selects a global system for mobile communications (GSM) cell as a neighbor cell due to the fact that the signal intensity of the GSM cell is improved; sending a first attach rejection message representing the abnormality of the GPRS network to the terminal; repeatedly detecting whether a second attachment request of the terminal is obtained before the timing time of the first timer is reached, and sending a second attachment refusing message to the terminal; the first timer is started when a first attachment rejection message/a second attachment rejection message is sent to the terminal; and determining whether the terminal is successfully accessed to the GSM cell based on the detection result.
In an embodiment, the processor 41 is configured to execute, when running the computer program, the following steps: and when the detection result is that a second attachment request of the terminal is obtained before the timing time of the first timer reaches and the repetition times of sending a second attachment rejection message to the terminal reaches a preset threshold value, determining that the terminal is successfully accessed into the GSM cell.
In an embodiment, the processor 41 is configured to execute, when running the computer program, the following steps: and when the detection result is that the second attachment request of the terminal is not obtained before the timing time of the first timer is reached, determining that the terminal does not successfully access the GSM cell.
In an embodiment, the processor 41 is configured to execute, when running the computer program, the following steps: and when the detection result is that the repetition times of obtaining a second attachment request of the terminal and sending a second attachment rejection message to the terminal do not reach a preset threshold value before the timing time of the first timer reaches, determining that the terminal does not successfully access the adjacent cell.
In an embodiment, the processor 41 is configured to execute, when running the computer program, the following steps: encapsulating a first attach rejection message, wherein the first attach rejection message carries an attach rejection cause value, and the attach rejection cause value is used for representing an attach rejection cause; wherein the cause value of the attach reject in the attach reject message is used for characterizing a GPRS network anomaly.
In an embodiment, the processor 41 is configured to execute, when running the computer program, the following steps: establishing a simulation network environment, wherein the simulation network environment at least comprises the following network structures: the system comprises an LTE network, a TDSCDMA network and a GSM network, wherein the SIB5 of the LTE network is configured with TDSCDMA neighboring cell information, the SIB7 of the LTE network is configured with GSM neighboring cell information, and the SI of the GSM network is configured with LTE neighboring cell information; accordingly, the network interacting with the terminal is the network in the simulated network environment.
In practice, the various components of the device 40 are coupled together by a bus system 43, as shown in FIG. 6. It will be appreciated that the bus system 43 is used to enable communications among the components. The bus system 43 includes a power bus, a control bus, and a status signal bus in addition to the data bus. For clarity of illustration, however, the various buses are labeled as bus system 43 in fig. 6.
It will be appreciated that the memory 42 may be implemented by any type of volatile or non-volatile storage device, or combination thereof. The nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a magnetic Random Access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical Disc, or a Compact Disc Read-Only Memory (CD-ROM); the magnetic surface storage may be disk storage or tape storage. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data rate Synchronous Dynamic Random Access Memory (DDRSDRAM, Double Data Random Access Memory), Enhanced Synchronous Dynamic Random Access Memory (ESDRAM, Enhanced Synchronous Dynamic Random Access Memory), Synchronous link Dynamic Random Access Memory (SLDRAM, Synchronous Dynamic Random Access Memory), Direct Memory (DRmb Access Memory, Random Access Memory). The memory 42 described in connection with the embodiments of the invention is intended to comprise, without being limited to, these and any other suitable types of memory.
The method disclosed in the above embodiments of the present invention may be applied to the processor 41, or implemented by the processor 41. The processor 41 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 41. The processor 41 described above may be a general purpose processor, a DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. Processor 41 may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present invention. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed by the embodiment of the invention can be directly implemented by a hardware decoding processor, or can be implemented by combining hardware and software modules in the decoding processor. The software modules may be located in a storage medium located in memory 42, where processor 41 reads the information in memory 42 and in combination with its hardware performs the steps of the method described above.
In an exemplary embodiment, the apparatus 40 may be implemented by one or more Application Specific Integrated Circuits (ASICs), DSPs, Programmable Logic Devices (PLDs), Complex Programmable Logic Devices (CPLDs), FPGAs, general purpose processors, controllers, MCUs, microprocessors (microprocessors), or other electronic components for performing the aforementioned methods.
Example four
In an exemplary embodiment, the present invention further provides a computer storage medium, for example, a memory including a computer program, which is executable by a processor of a device for detecting a network access result, so as to complete the steps of the foregoing method. The computer storage medium can be FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface Memory, optical disk, or CD-ROM; or may be various devices including one or any combination of the above memories.
An embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, performs: the method comprises the steps that a terminal receives a first attachment request message of the terminal in the process of executing network access by adopting a preset optimization scheme; the first attachment request message is sent after the terminal is registered in a Long Term Evolution (LTE) network, is switched to an OOS state and selects a global system for mobile communications (GSM) cell as a neighbor cell due to the fact that the signal intensity of the GSM cell is improved; sending a first attach rejection message representing the abnormality of the GPRS network to the terminal; repeatedly detecting whether a second attachment request of the terminal is obtained before the timing time of the first timer is reached, and sending a second attachment refusing message to the terminal; the first timer is started when a first attachment rejection message/a second attachment rejection message is sent to the terminal; and determining whether the terminal is successfully accessed to the GSM cell based on the detection result.
In one embodiment, the computer program, when executed by the processor, performs: and when the detection result is that a second attachment request of the terminal is obtained before the timing time of the first timer reaches and the repetition times of sending a second attachment rejection message to the terminal reaches a preset threshold value, determining that the terminal is successfully accessed into the GSM cell.
In one embodiment, the computer program, when executed by the processor, performs: and when the detection result is that the second attachment request of the terminal is not obtained before the timing time of the first timer is reached, determining that the terminal does not successfully access the GSM cell.
In one embodiment, the computer program, when executed by the processor, performs: and when the detection result is that the repetition times of obtaining a second attachment request of the terminal and sending a second attachment rejection message to the terminal do not reach a preset threshold value before the timing time of the first timer reaches, determining that the terminal does not successfully access the adjacent cell.
In one embodiment, the computer program, when executed by the processor, performs: encapsulating a first attach rejection message, wherein the first attach rejection message carries an attach rejection cause value, and the attach rejection cause value is used for representing an attach rejection cause; wherein the cause value of the attach reject in the attach reject message is used for characterizing a GPRS network anomaly.
In one embodiment, the computer program, when executed by the processor, performs: establishing a simulation network environment, wherein the simulation network environment at least comprises the following network structures: the system comprises an LTE network, a TDSCDMA network and a GSM network, wherein the SIB5 of the LTE network is configured with TDSCDMA neighboring cell information, the SIB7 of the LTE network is configured with GSM neighboring cell information, and the SI of the GSM network is configured with LTE neighboring cell information; accordingly, the network interacting with the terminal is the network in the simulated network environment.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (12)

1. A method for detecting a network access result is applied to a process that a terminal executes network access by adopting a preset optimization scheme, and is based on interaction between a network in a simulation network environment and the terminal, and the method comprises the following steps:
receiving a first attach request message of the terminal; the first attachment request message is sent after the terminal is registered in a Long Term Evolution (LTE) network, is switched to a state not in a service area (OOS), and selects a global system for mobile communications (GSM) cell as a neighbor cell after the signal strength of the GSM cell is improved;
simulating an abnormal condition and sending a first attach rejection message representing the abnormality of the General Packet Radio Service (GPRS) network to the terminal;
repeatedly detecting whether a second attachment request of the terminal is obtained before the timing time of the first timer is reached, and simulating an abnormal condition to send a second attachment rejection message to the terminal; the first timer is started when a first attachment rejection message/a second attachment rejection message is sent to the terminal;
determining whether the preset optimization scheme is successful or not based on the detection result; specifically, when the detection result is that a second attach request of the terminal is obtained before the timing time of the first timer reaches, and the repetition number of sending a second attach reject message to the terminal reaches a preset threshold value, it is determined that the preset optimization scheme is successful.
2. The method of claim 1, wherein the determining whether the preset optimization scheme is successful based on the detection result comprises:
and when the detection result is that the second attachment request of the terminal is not obtained before the timing time of the first timer is reached, determining that the preset optimization scheme is unsuccessful.
3. The method of claim 1, wherein the determining whether the preset optimization scheme is successful based on the detection result comprises:
and when the detection result is that the repetition times of obtaining a second attachment request of the terminal and sending a second attachment rejection message to the terminal before the timing time of the first timer reaches reach a preset threshold value, determining that the preset optimization scheme is unsuccessful.
4. The method of claim 1, further comprising:
encapsulating a first attach rejection message, wherein the first attach rejection message carries an attach rejection cause value, and the attach rejection cause value is used for representing an attach rejection cause;
wherein the cause value of the attach reject in the attach reject message is used for characterizing a GPRS network anomaly.
5. The method according to any one of claims 1 to 4, further comprising:
establishing a simulation network environment, wherein the simulation network environment at least comprises the following network structures: the system comprises an LTE network, a Time Division Synchronous Code Division Multiple Access (TDSCDMA) network and a global system for mobile communications (GSM) network, wherein TDSCDMA neighbor cell information is configured in a system message block SIB5 of the LTE network, GSM neighbor cell information is configured in an SIB7 of the LTE network, and LTE neighbor cell information is configured in a system message SI of the GSM network;
accordingly, the network interacting with the terminal is the network in the simulated network environment.
6. A device for detecting a network access result is applied to a process that a terminal executes network access by adopting a preset optimization scheme, and comprises: a receiving unit, a transmitting unit and a detecting unit; wherein the content of the first and second substances,
the receiving unit is configured to receive a first attach request message of the terminal; the first attach request message is sent after the terminal is registered in an LTE network and switched to an OOS state and a GSM cell serving as a neighbor cell is selected after the signal intensity of the GSM cell is improved;
the sending unit is used for simulating an abnormal condition and sending a first attach rejection message representing the abnormity of the GPRS network to the terminal;
the detecting unit is used for repeatedly detecting whether a second attachment request of the terminal is obtained through the receiving unit before the timing time of the first timer is reached, and sending a second attachment refusing message to the terminal through the sending unit in a mode of simulating an abnormal condition; the first timer is started when a first attachment rejection message/a second attachment rejection message is sent to the terminal; determining whether the preset optimization scheme is successful or not based on the detection result; specifically, the determining unit is configured to determine that the preset optimization scheme is successful when the detection result is that a second attach request of the terminal is obtained before the timing time of the first timer reaches and the repetition number of sending a second attach reject message to the terminal reaches a preset threshold;
the receiving unit and the transmitting unit interact with the terminal based on a network in a simulated network environment.
7. The apparatus according to claim 6, wherein the detecting unit is specifically configured to determine that the preset optimization scheme is unsuccessful when the detection result is that a second attach request of the terminal is not obtained before the timing time of the first timer reaches.
8. The apparatus according to claim 6, wherein the detecting unit is specifically configured to determine that the preset optimization scheme is unsuccessful when the detection result is that a second attach request of the terminal is obtained before the timing time of the first timer reaches, and the number of repetitions of sending a second attach reject message to the terminal does not reach a preset threshold.
9. The apparatus according to claim 6, wherein the sending unit is further configured to encapsulate a first attach reject message, where the first attach reject message carries a cause value of attach reject, and the cause value of attach reject is used to characterize a cause of attach reject;
wherein the cause value of the attach reject in the attach reject message is used for characterizing a GPRS network anomaly.
10. The apparatus of any one of claims 6 to 9, further comprising:
the simulation unit is used for establishing a simulation network environment, and the simulation network environment at least comprises the following network structures: the system comprises an LTE network, a TDSCDMA network and a GSM network, wherein the SIB5 of the LTE network is configured with TDSCDMA neighboring cell information, the SIB7 of the LTE network is configured with GSM neighboring cell information, and the SI of the GSM network is configured with LTE neighboring cell information;
accordingly, the network interacting with the terminal is the network in the simulated network environment.
11. A device for detecting a network access result is applied to a process that a terminal executes network access by adopting a preset optimization scheme, and comprises: a processor and a memory for storing a computer program capable of running on the processor,
wherein the processor is adapted to perform the steps of the method of any one of claims 1 to 5 when running the computer program.
12. A computer storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
CN201711233098.5A 2017-11-30 2017-11-30 Method and device for detecting network access result and computer storage medium Active CN107969013B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711233098.5A CN107969013B (en) 2017-11-30 2017-11-30 Method and device for detecting network access result and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711233098.5A CN107969013B (en) 2017-11-30 2017-11-30 Method and device for detecting network access result and computer storage medium

Publications (2)

Publication Number Publication Date
CN107969013A CN107969013A (en) 2018-04-27
CN107969013B true CN107969013B (en) 2020-08-18

Family

ID=61999142

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711233098.5A Active CN107969013B (en) 2017-11-30 2017-11-30 Method and device for detecting network access result and computer storage medium

Country Status (1)

Country Link
CN (1) CN107969013B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE112019005926B4 (en) * 2018-11-28 2023-01-19 Kyocera Corporation COMMUNICATION DEVICE, VEHICLE AND METHOD
CN112074001A (en) * 2020-08-27 2020-12-11 展讯半导体(成都)有限公司 Network access method and communication device
CN113660201B (en) * 2021-07-08 2023-05-30 上海二三四五网络科技有限公司 Control method and control device for high concurrency primary key conflict

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217767A (en) * 2008-01-03 2008-07-09 中兴通讯股份有限公司 An indication test method and system for CDMA system data service calling
WO2011160308A1 (en) * 2010-06-25 2011-12-29 华为技术有限公司 Method for processing network congestion, network device and network system
CN104080105A (en) * 2013-03-28 2014-10-01 电信科学技术研究院 Method and device of optimizing switchover performance in dynamic simulation platform
CN105848179A (en) * 2015-01-16 2016-08-10 中兴通讯股份有限公司 Cell switching optimization evaluation method and device
CN106851755A (en) * 2017-01-19 2017-06-13 广东欧珀移动通信有限公司 A kind of cell registration method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI123336B (en) * 2009-12-23 2013-02-28 7Signal Oy A method for monitoring and intelligently adjusting radio network parameters

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217767A (en) * 2008-01-03 2008-07-09 中兴通讯股份有限公司 An indication test method and system for CDMA system data service calling
WO2011160308A1 (en) * 2010-06-25 2011-12-29 华为技术有限公司 Method for processing network congestion, network device and network system
CN104080105A (en) * 2013-03-28 2014-10-01 电信科学技术研究院 Method and device of optimizing switchover performance in dynamic simulation platform
CN105848179A (en) * 2015-01-16 2016-08-10 中兴通讯股份有限公司 Cell switching optimization evaluation method and device
CN106851755A (en) * 2017-01-19 2017-06-13 广东欧珀移动通信有限公司 A kind of cell registration method and device

Also Published As

Publication number Publication date
CN107969013A (en) 2018-04-27

Similar Documents

Publication Publication Date Title
KR102146494B1 (en) A method and system to minimize delay in circuit-switched fallback (csfb) procedure
CN107969013B (en) Method and device for detecting network access result and computer storage medium
CN107820716B (en) CSFB (Circuit switched Fall Back) fall result detection method and device and computer storage medium
CN112806073B (en) Communication processing method, device, mobile terminal and storage medium
CN112806044B (en) Pseudo base station identification method and device, mobile terminal and storage medium
CN107948997B (en) Method and device for detecting network access result and computer storage medium
CN108064454B (en) CSFB (Circuit switched Fall Back) result detection method and device and storage medium
CN108156638B (en) Detection method and device and computer storage medium
CN107980232B (en) CSFB (Circuit switched Fall Back) fall result detection method and device and computer storage medium
CN108064463B (en) CSFB (Circuit switched Fall Back) result detection method and device and storage medium
CN111278003B (en) Position updating processing method and mobile terminal
CN107995638B (en) Method and device for detecting LTE network access result and computer storage medium
CN107948995B (en) Method and device for detecting LTE network access result and computer storage medium
CN112806043B (en) Pseudo base station identification method and device, mobile terminal and storage medium
CN107864484B (en) Method and device for detecting LTE network access result and storage medium
CN107948998B (en) Method and device for detecting network access result and computer storage medium
CN108093429B (en) Method and device for detecting LTE network access result and computer storage medium
CN108064462B (en) CSFB (Circuit switched Fall Back) result detection method and device and storage medium
CN107995652B (en) Method and device for detecting network access result and computer storage medium
CN107889109B (en) Method and device for detecting network access result and computer storage medium
CN107896378B (en) Detection method and device, storage medium
CN108040348B (en) Method and device for detecting network access result and computer storage medium
CN107949009B (en) Method and device for detecting LTE network access result and computer storage medium
CN110167048B (en) Communication method and system, base station and mobile switching center
CN108064458B (en) CSFB (Circuit switched Fall Back) fall result detection method and device and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

GR01 Patent grant
GR01 Patent grant