CN111970700A - Femto architecture based wireless communication system and method - Google Patents

Femto architecture based wireless communication system and method Download PDF

Info

Publication number
CN111970700A
CN111970700A CN202010845420.5A CN202010845420A CN111970700A CN 111970700 A CN111970700 A CN 111970700A CN 202010845420 A CN202010845420 A CN 202010845420A CN 111970700 A CN111970700 A CN 111970700A
Authority
CN
China
Prior art keywords
module
account
femto
program
wireless communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010845420.5A
Other languages
Chinese (zh)
Inventor
周锋
王媛媛
方忠庆
陈传杰
王如刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yancheng Institute of Technology
Original Assignee
Yancheng Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yancheng Institute of Technology filed Critical Yancheng Institute of Technology
Priority to CN202010845420.5A priority Critical patent/CN111970700A/en
Publication of CN111970700A publication Critical patent/CN111970700A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the technical field of wireless communication, and discloses a Femto-architecture-based wireless communication system and a Femto-architecture-based wireless communication method, wherein the Femto-architecture-based wireless communication system comprises the following components: the system comprises a network coverage module, an account setting module, an account management module, a central control module, an identity authentication module, a visitor login module, an internal sharing module, a transmission rate measuring module, a transmission optimization module, a foreign device detection module and a safety protection module. According to the invention, the private account and the public account are set through the account setting module, and the account is selected according to the requirement, so that the network using requirements of families and visitors can be met; the identity authentication module and the visitor login module are arranged, so that identity authentication of family members and visitors can be realized, account login is realized, and information sharing is safer; the wireless communication system provided by the invention is realized based on Femto, has various functions, is simple in communication method and good in safety, and can effectively protect user information.

Description

Femto architecture based wireless communication system and method
Technical Field
The invention belongs to the technical field of wireless communication, and particularly relates to a Femto-architecture-based wireless communication system and method.
Background
At present, with the rapid development of mobile Communication technology, the network structure of the mobile Communication System is gradually evolving from the complex open network structure of GSM (Global System for mobile Communication) to the LTE (Long Term Evolution) flat network structure of all-IP (Internet protocol). The flat network architecture has the advantages of simple protocol flow, few protocol entities, few intermediate network nodes, low service processing delay and network transmission delay and the like, and can support high-speed data service and improve user perception.
In the communication field, a system close to an LTE flat structure is provided, namely a Femto system which is commonly used at present, and a Femto home base station can provide mobile communication capability in a house at the maximum data rate and does not need to install a micro cellular node. The operation process of the Femto system is that a terminal sends service information to a Femto base station through a Uu interface, after receiving the service information of the terminal, the Femto base station sends the service information of the terminal to a security gateway through an Iuh interface, the security gateway authenticates and manages the terminal and the service information initiated by the terminal together with a Femto HLR and a Femto AAA, and after the authentication is passed, the Femto gateway sends the service information of the terminal to a core network through an Iu interface. In the Operation process of the 3G Femto System, the Femto network manager manages other gateways in the Femto System, interacts with an OSS (Operation Support System) and a BOSS (Business & Operation Support System) in a core network, and completes the charging of terminal services. However, the currently used Femto system only performs home internal login and resource sharing, and cannot meet the network utilization requirements when visitors visit the Femto system, so that the Femto system is inconvenient to use.
Through the above analysis, the problems and defects of the prior art are as follows: currently, a Femto system only performs home internal login and resource sharing, and cannot meet the network utilization requirement when a visitor visits, so that the use is inconvenient.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a Femto-architecture-based wireless communication system and a Femto-architecture-based wireless communication method.
The invention is realized in such a way that a Femto-architecture-based wireless communication method comprises the following steps:
setting a template account in advance by using an account setting program through an account setting module; setting an account private rule and a public account rule according to the set template account, and generating a private account which only allows family members to log in and a public account which comprises a family mode and a visitor mode;
step two, processing the information related to the generated private account and the generated public account; providing a private account entrance for a user, and receiving an instruction of the user to switch accounts; managing a private account and a public account by using an account management program through an account management module, and selecting to start the private account or start the public account;
acquiring first behavior data of a user to be authenticated when the user performs identity authentication operation by using a family member identity authentication program through an identity authentication module; acquiring training data comprising a plurality of second behavior characteristic sequences of a plurality of users; carrying out segmented feature extraction on the first behavior data to obtain a first behavior feature sequence;
combining the second behavior characteristic sequences of the same user in the training data in pairs, and randomly adding one second behavior characteristic sequence of another user to each combination to obtain a plurality of training sample combinations containing three second behavior characteristic sequences;
step five, combining the training samples of the second behavior characteristic sequence obtained in the step four and inputting the combination into a neural network model to obtain a corresponding second result sequence, and obtaining a loss value according to the second result sequence and a preset loss function;
step six, updating parameters of the neural network model through a gradient descent algorithm according to the loss value, and performing iterative training on the training sample combination to obtain a trained neural network model;
step seven, inputting the first behavior characteristic sequence into the neural network model trained in advance in the step six to obtain a first result sequence; calculating a difference value between the first result sequence and a pre-stored result sequence, and judging whether the difference value is smaller than a preset threshold value;
step eight, if the difference value is smaller than a preset threshold value, judging that the identity authentication of the user to be authenticated passes, and logging in a private account after the authentication passes; logging in the public account by using a visitor logging program through a visitor logging module, and entering a visitor mode;
step nine, Femto equipment utilizing an internal shared program receives a downloading instruction from an external equipment end through an internal shared module; analyzing the downloading instruction to obtain a downloading address and a downloading type; starting a resource sharing module of the Femto equipment for downloading according to the acquired downloading address and the downloading type;
step ten, storing the downloaded resources corresponding to the download address and the download type in a Femto storage device through an external storage device interface, and sharing the internal information of the private account or sharing part of the internal information of the public account;
step eleven, measuring the transmission rate by using a transmission rate measuring program through a transmission rate measuring module; optimizing and improving the transmission rate by using a transmission optimization program through a transmission optimization module;
step twelve, the detection of the external equipment is carried out by using an external equipment detection program through an external equipment detection module, and whether the condition of the login of the external equipment exists is determined; and the security protection module is used for carrying out security protection on the private account by using a security protection program, and deleting or blacking the terminal for logging in the private account.
Further, the first step also comprises: and utilizing the Femto to cover the indoor and outdoor networks through the network coverage module.
Further, in the first step, the home mode and the visitor mode of the public account correspond to an account and a password respectively.
Further, in the first step, the setting of the account private rule and the public account rule according to the set template account, and the generation of the private account which only allows the family members to log in and the public account including the family mode and the visitor mode specifically include:
will submit the template account to the user; switching the current account to the template account selected by the user; and setting an account private rule or a public account rule.
Further, in step eight, the logging in the public account by the visitor logging in module through the visitor logging in program specifically includes: and the external visitor makes an access login request, and the system makes an authorization permission after performing security check.
Further, in step nine, the download type includes: bit stream BT download, hypertext transfer protocol HTTP download, file transfer protocol FTP download.
Further, in step ten, the sharing of the internal information of the private account or the sharing of the internal partial information of the public account further includes:
when the downloading is interrupted temporarily in the downloading process and is restarted, the breakpoint continuous transmission is utilized to carry out subsequent downloading, which specifically comprises the following steps:
after the downloading is restarted, detecting the downloading type:
if the file is downloaded by HTTP or FTP, when the server is connected again for downloading, the last modification time of the temporary file downloaded to the local is compared with the last modification time of the file at the server end to judge whether the file at the server end is modified within the period of time when the downloading is interrupted: if the last modification time of the file at the server side is later than that of the local temporary file, the local temporary file is deleted and then completely downloaded again so as to ensure the correctness of the downloaded file; if the last modification time of the file at the server side is earlier than or equal to the last modification time of the local temporary file, starting downloading from the size of the local temporary file;
if the BT download mode is adopted, when the BT download mode is connected with the server again for downloading, before the BT download mode is downloaded, each file block of the local temporary file is checked once through a character string checking algorithm: if the check code is the same as the check value provided in the seed file, the file block is completely obtained without downloading again; if the check code is different from the check value provided in the seed file, the file block is not completely downloaded, and the file block is downloaded again.
Another object of the present invention is to provide a Femto-architecture based wireless communication system for implementing the Femto-architecture based wireless communication method, comprising:
the system comprises a network coverage module, an account setting module, an account management module, a central control module, an identity authentication module, a visitor login module, an internal sharing module, a transmission rate measuring module, a transmission optimization module, a foreign device detection module and a safety protection module;
the network coverage module is connected with the central control module and is used for covering indoor and outdoor networks through the Femto;
the account setting module is connected with the central control module and is used for setting a private account or a public account through an account setting program;
the account management module is connected with the central control module and is used for managing the private account and the public account through an account management program;
the central control module is connected with the network coverage module, the account setting module, the account management module, the identity authentication module, the visitor login module, the internal sharing module, the transmission rate measuring module, the transmission optimization module, the external equipment detection module and the safety protection module and is used for controlling the normal operation of each module through the main control computer;
the identity authentication module is connected with the central control module and is used for authenticating the identity of the family member through a family member identity authentication program, and if the authentication is passed, the login of a private account is carried out;
the visitor login module is connected with the central control module and used for logging in the public account through a visitor login program and entering a visitor mode;
the internal sharing module is connected with the central control module and is used for sharing internal information of the private account or sharing internal partial information of the public account through an internal sharing program;
the transmission rate measuring module is connected with the central control module and is used for measuring the transmission rate through a transmission rate measuring program;
the transmission optimization module is connected with the central control module and used for optimizing and improving the transmission rate through a transmission optimization program;
the external device detection module is connected with the central control module and used for detecting the external device through an external device detection program and determining whether the external device is logged in;
and the safety protection module is connected with the central control module and is used for carrying out safety protection on the private account through a safety protection program, and deleting or blacking the terminal for logging in the private account.
By combining all the technical schemes, the invention has the advantages and positive effects that: according to the invention, the private account and the public account are set through the account setting module, different accounts are selected according to actual requirements, and the network using requirements of families and visitors can be met; the identity authentication module and the visitor login module are arranged, so that identity authentication of family members and visitors can be realized, login of account numbers is further realized, and information sharing is safer; and transmission optimization is carried out after the transmission rate is determined, so that the transmission rate can be improved, and better experience is provided for users. The wireless communication system provided by the invention is realized based on Femto, has various functions, is simple in communication method, has good safety performance and can effectively protect user information.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained from the drawings without creative efforts.
Fig. 1 is a flowchart of a Femto-architecture-based wireless communication method according to an embodiment of the present invention.
Fig. 2 is a block diagram of a Femto-architecture based wireless communication system according to an embodiment of the present invention.
Fig. 3 is a flowchart illustrating setting of a private account or a public account by an account setting module using an account setting program according to an embodiment of the present invention.
Fig. 4 is a flowchart of performing identity authentication of a family member by using a family member identity authentication program through an identity authentication module according to an embodiment of the present invention.
Fig. 5 is a flowchart of acquiring training data according to an embodiment of the present invention.
In fig. 2: 1. a network overlay module; 2. an account setting module; 3. an account management module; 4. a central control module; 5. an identity authentication module; 6. a visitor login module; 7. an internal sharing module; 8. a transmission rate measurement module; 9. a transmission optimization module; 10. a foreign device detection module; 11. and a safety protection module.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In view of the problems in the prior art, the present invention provides a Femto-architecture based wireless communication system and a communication method, and the present invention is described in detail below with reference to the accompanying drawings.
As shown in fig. 1, a Femto-architecture-based wireless communication method provided by an embodiment of the present invention includes the following steps:
s101, utilizing a Femto to cover indoor and outdoor networks through a network coverage module;
s102, setting a private account or a public account by an account setting program through an account setting module; the private account only allows the family members to log in; the public account comprises a family mode and a visitor mode, and the two modes respectively correspond to an account and a password;
s103, managing the private account and the public account by using an account management program through an account management module, and selecting to start the private account or start the public account;
s104, the identity authentication of the family members is carried out by utilizing a family member identity authentication program through an identity authentication module, and if the authentication is passed, the login of a private account is carried out;
s105, logging in a public account by using a visitor logging program through a visitor logging module, and entering a visitor mode; sharing internal information of a private account or sharing internal part of information of a public account by using an internal sharing program through an internal sharing module;
s106, measuring the transmission rate by using a transmission rate measuring program through a transmission rate measuring module; optimizing and improving the transmission rate by using a transmission optimization program through a transmission optimization module;
s107, detecting the external equipment by using an external equipment detection program through an external equipment detection module, and determining whether the external equipment logs in; and the security protection module is used for carrying out security protection on the private account by using a security protection program, and deleting or blacking the terminal for logging in the private account.
As shown in fig. 2, a Femto-architecture based wireless communication system provided by an embodiment of the present invention includes:
the system comprises a network coverage module 1, an account setting module 2, an account management module 3, a central control module 4, an identity authentication module 5, a visitor login module 6, an internal sharing module 7, a transmission rate measuring module 8, a transmission optimization module 9, a foreign device detection module 10 and a safety protection module 11;
the network coverage module 1 is connected with the central control module 4 and is used for covering indoor and outdoor networks through the Femto;
the account setting module 2 is connected with the central control module 4 and is used for setting a private account or a public account through an account setting program;
the account management module 3 is connected with the central control module 4 and used for managing the private account and the public account through an account management program;
the central control module 4 is connected with the network coverage module 1, the account setting module 2, the account management module 3, the identity authentication module 5, the visitor login module 6, the internal sharing module 7, the transmission rate measuring module 8, the transmission optimization module 9, the external equipment detection module 10 and the safety protection module 11, and is used for controlling each module to normally operate through a main control computer;
the identity authentication module 5 is connected with the central control module 4 and is used for performing identity authentication of family members through a family member identity authentication program, and if the authentication is passed, logging in of a private account is performed;
the visitor login module 6 is connected with the central control module 4 and used for logging in a public account through a visitor login program and entering a visitor mode;
the internal sharing module 7 is connected with the central control module 4 and is used for sharing internal information of a private account or sharing internal part of information of a public account through an internal sharing program;
a transmission rate measuring module 8 connected to the central control module 4 for measuring a transmission rate by a transmission rate measuring program;
the transmission optimization module 9 is connected with the central control module 4 and used for optimizing and improving the transmission rate through a transmission optimization program;
a foreign device detection module 10 connected to the central control module 4 for detecting a foreign device through a foreign device detection program and determining whether a foreign device login situation exists;
and the safety protection module 11 is connected with the central control module 4 and is used for carrying out safety protection on the private account through a safety protection program, and deleting or blacking a terminal for logging in the private account.
The technical solution of the present invention is further illustrated by the following specific examples.
Example 1
As shown in fig. 1 and as a preferred embodiment, in step S102, the Femto architecture-based wireless communication method provided in the embodiment of the present invention sets a private account or a public account by using an account setting program through an account setting module, which is specifically included in fig. 3, and specifically includes:
s201, setting a template account in advance;
s202, setting an account privacy rule according to the template account to generate a private account;
s203, processing the information related to the private account;
and S204, providing the private account entrance for the user, and receiving the instruction of the user to switch the account.
In step S202, the setting of the account privacy rule according to the template account and generating the private account provided in the embodiment of the present invention specifically includes: submitting the template account to the user; switching the current account to the template account selected by the user; and setting an account privacy rule.
Example 2
Fig. 1 shows a Femto-architecture-based wireless communication method according to an embodiment of the present invention, which is a preferred embodiment, and fig. 4 shows a method for authenticating identities of family members by using a family member identity authentication program through an identity authentication module in step S104, where the method includes:
s301, acquiring first behavior data of a user to be authenticated when the user performs identity authentication operation;
s302, performing segmented feature extraction on the first behavior data to obtain a first behavior feature sequence;
s303, inputting the first behavior characteristic sequence into a pre-trained neural network model to obtain a first result sequence;
s304, calculating a difference value between the first result sequence and a pre-stored result sequence, and judging whether the difference value is smaller than a preset threshold value;
s305, if the difference value is smaller than a preset threshold value, the identity authentication of the user to be authenticated is judged to be passed.
As shown in fig. 5, in step S301, before acquiring the first behavior data of the user to be authenticated when performing the identity authentication operation, the method further includes acquiring training data, specifically:
s401, the training data comprise a plurality of second behavior characteristic sequences of a plurality of users;
s402, combining the second behavior characteristic sequences in the training data according to a preset rule to obtain a plurality of training sample combinations;
s403, inputting the training sample combination into a neural network model to obtain an output result, and obtaining a loss value according to the output result and a preset loss function;
s404, updating parameters of the neural network model through a gradient descent algorithm according to the loss value, and performing iterative training on the training sample combination to obtain the trained neural network model.
In step S402, the combining the second behavior feature sequences in the training data according to the preset rule to obtain a plurality of training sample combinations according to the embodiment of the present invention includes:
and combining the second behavior characteristic sequences of the same user in the training data in pairs, and randomly adding one second behavior characteristic sequence of another user into each combination to obtain a plurality of training sample combinations containing three second behavior characteristic sequences.
In step S403, the combining and inputting the training samples into a neural network model to obtain an output result, and obtaining a loss value according to the output result and a preset loss function according to the embodiment of the present invention includes:
and combining the training samples of the second behavior characteristic sequence and inputting the combination into a neural network model to obtain a corresponding second result sequence, and obtaining a loss value according to the second result sequence and a preset loss function.
Example 3
As shown in fig. 1, as a preferred embodiment, in step S105, the Femto-architecture-based wireless communication method provided in the embodiment of the present invention logs in a public account by using a guest login program through a guest login module, which specifically includes: and the external visitor makes an access login request, and the system makes an authorization permission after performing security check.
Example 4
As shown in fig. 1, as a preferred embodiment, in step S105, the Femto architecture-based wireless communication method provided in the embodiment of the present invention uses an internal sharing program to share internal information of a private account or share internal partial information of a public account through an internal sharing module, which is specifically:
femto equipment receives a downloading instruction from an external equipment terminal; analyzing the downloading instruction to obtain a downloading address and a downloading type;
and starting a resource sharing module of the Femto equipment for downloading according to the downloading address and the downloading type, and storing the downloaded resource corresponding to the downloading address and the downloading type in the Femto storage equipment through an external storage equipment interface.
The download types provided by the embodiment of the invention comprise: bit stream BT download, hypertext transfer protocol HTTP download, file transfer protocol FTP download.
The sharing of the internal information of the private account or the sharing of the internal part of the information of the public account by using the internal sharing program through the internal sharing module provided by the embodiment of the invention further comprises the following steps:
when the downloading is interrupted temporarily in the downloading process and is restarted, the breakpoint continuous transmission is utilized to carry out subsequent downloading, which specifically comprises the following steps:
after the downloading is restarted, detecting the downloading type:
if the file is downloaded by HTTP or FTP, when the server is connected again for downloading, the last modification time of the temporary file downloaded to the local is compared with the last modification time of the file at the server end to judge whether the file at the server end is modified within the period of time when the downloading is interrupted: if the last modification time of the file at the server side is later than that of the local temporary file, the local temporary file is deleted and then completely downloaded again so as to ensure the correctness of the downloaded file; if the last modification time of the file at the server side is earlier than or equal to the last modification time of the local temporary file, starting downloading from the size of the local temporary file;
if the BT download mode is adopted, when the BT download mode is connected with the server again for downloading, before the BT download mode is downloaded, each file block of the local temporary file is checked once through a character string checking algorithm: if the check code is the same as the check value provided in the seed file, the file block is completely obtained without downloading again; if the check code is different from the check value provided in the seed file, the file block is not completely downloaded, and the file block is downloaded again.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention, and the scope of the present invention is not limited thereto, and any modification, equivalent replacement, and improvement made by those skilled in the art within the technical scope of the present invention disclosed herein, which is within the spirit and principle of the present invention, should be covered by the present invention.

Claims (10)

1. A Femto architecture based wireless communication method is characterized in that the Femto architecture based wireless communication method comprises the following steps:
setting a template account in advance by using an account setting program through an account setting module; setting an account private rule and a public account rule according to the set template account, and generating a private account which only allows family members to log in and a public account which comprises a family mode and a visitor mode;
step two, processing the information related to the generated private account and the generated public account; providing a private account entrance for a user, and receiving an instruction of the user to switch accounts; managing a private account and a public account by using an account management program through an account management module, and selecting to start the private account or start the public account;
acquiring first behavior data of a user to be authenticated when the user performs identity authentication operation by using a family member identity authentication program through an identity authentication module; acquiring training data comprising a plurality of second behavior characteristic sequences of a plurality of users; carrying out segmented feature extraction on the first behavior data to obtain a first behavior feature sequence;
combining the second behavior characteristic sequences of the same user in the training data in pairs, and randomly adding one second behavior characteristic sequence of another user to each combination to obtain a plurality of training sample combinations containing three second behavior characteristic sequences;
step five, combining the training samples of the second behavior characteristic sequence obtained in the step four and inputting the combination into a neural network model to obtain a corresponding second result sequence, and obtaining a loss value according to the second result sequence and a preset loss function;
step six, updating parameters of the neural network model through a gradient descent algorithm according to the loss value, and performing iterative training on the training sample combination to obtain a trained neural network model;
step seven, inputting the first behavior characteristic sequence into the neural network model trained in advance in the step six to obtain a first result sequence; calculating a difference value between the first result sequence and a pre-stored result sequence, and judging whether the difference value is smaller than a preset threshold value;
step eight, if the difference value is smaller than a preset threshold value, judging that the identity authentication of the user to be authenticated passes, and logging in a private account after the authentication passes; logging in the public account by using a visitor logging program through a visitor logging module, and entering a visitor mode;
step nine, Femto equipment utilizing an internal shared program receives a downloading instruction from an external equipment end through an internal shared module; analyzing the downloading instruction to obtain a downloading address and a downloading type; starting a resource sharing module of the Femto equipment for downloading according to the acquired downloading address and the downloading type;
step ten, storing the downloaded resources corresponding to the download address and the download type in a Femto storage device through an external storage device interface, and sharing the internal information of the private account or sharing part of the internal information of the public account;
step eleven, measuring the transmission rate by using a transmission rate measuring program through a transmission rate measuring module; optimizing and improving the transmission rate by using a transmission optimization program through a transmission optimization module;
step twelve, the detection of the external equipment is carried out by using an external equipment detection program through an external equipment detection module, and whether the condition of the login of the external equipment exists is determined; and the security protection module is used for carrying out security protection on the private account by using a security protection program, and deleting or blacking the terminal for logging in the private account.
2. The Femto architecture based wireless communication method of claim 1, wherein said step one is preceded by the step of:
and utilizing the Femto to cover the indoor and outdoor networks through the network coverage module.
3. The Femto architecture based wireless communication method of claim 1, wherein in step one, said open account home mode and said visitor mode correspond to an account and a password, respectively.
4. The Femto-architecture-based wireless communication method of claim 1, wherein in the first step, the setting of the account private rule and the public account rule according to the set template account, and the generating of the private account allowing only the family members to log in and the public account including the family mode and the guest mode specifically includes:
will submit the template account to the user; switching the current account to the template account selected by the user; and setting an account private rule or a public account rule.
5. The Femto architecture based wireless communication method of claim 1, wherein in step eight, said logging in the public account with the guest login procedure through the guest login module specifically comprises: and the external visitor makes an access login request, and the system makes an authorization permission after performing security check.
6. The Femto infrastructure based wireless communication method of claim 1, wherein in step nine, said download type includes: bit stream BT download, hypertext transfer protocol HTTP download, file transfer protocol FTP download.
7. The Femto-architecture-based wireless communication method of claim 1, wherein in the tenth step, the sharing of internal information of a private account or internal partial information of a public account is performed, and further comprising:
when the downloading is interrupted temporarily in the downloading process and is restarted, the breakpoint continuous transmission is utilized to carry out subsequent downloading, which specifically comprises the following steps:
after the downloading is restarted, detecting the downloading type:
if the file is downloaded by HTTP or FTP, when the server is connected again for downloading, the last modification time of the temporary file downloaded to the local is compared with the last modification time of the file at the server end to judge whether the file at the server end is modified within the period of time when the downloading is interrupted: if the last modification time of the file at the server side is later than that of the local temporary file, the local temporary file is deleted and then completely downloaded again so as to ensure the correctness of the downloaded file; if the last modification time of the file at the server side is earlier than or equal to the last modification time of the local temporary file, starting downloading from the size of the local temporary file;
if the BT download mode is adopted, when the BT download mode is connected with the server again for downloading, before the BT download mode is downloaded, each file block of the local temporary file is checked once through a character string checking algorithm: if the check code is the same as the check value provided in the seed file, the file block is completely obtained without downloading again; if the check code is different from the check value provided in the seed file, the file block is not completely downloaded, and the file block is downloaded again.
8. A Femto infrastructure based wireless communication system for implementing the Femto infrastructure based wireless communication method according to claims 1 to 7, wherein said Femto infrastructure based wireless communication system comprises:
the system comprises a network coverage module, an account setting module, an account management module, a central control module, an identity authentication module, a visitor login module, an internal sharing module, a transmission rate measuring module, a transmission optimization module, a foreign device detection module and a safety protection module;
the network coverage module is connected with the central control module and is used for covering indoor and outdoor networks through the Femto;
the account setting module is connected with the central control module and is used for setting a private account or a public account through an account setting program;
the account management module is connected with the central control module and is used for managing the private account and the public account through an account management program;
the central control module is connected with the network coverage module, the account setting module, the account management module, the identity authentication module, the visitor login module, the internal sharing module, the transmission rate measuring module, the transmission optimization module, the external equipment detection module and the safety protection module and is used for controlling the normal operation of each module through the main control computer;
the identity authentication module is connected with the central control module and is used for authenticating the identity of the family member through a family member identity authentication program, and if the authentication is passed, the login of a private account is carried out;
the visitor login module is connected with the central control module and used for logging in the public account through a visitor login program and entering a visitor mode;
the internal sharing module is connected with the central control module and is used for sharing internal information of the private account or sharing internal partial information of the public account through an internal sharing program;
the transmission rate measuring module is connected with the central control module and is used for measuring the transmission rate through a transmission rate measuring program;
the transmission optimization module is connected with the central control module and used for optimizing and improving the transmission rate through a transmission optimization program;
the external device detection module is connected with the central control module and used for detecting the external device through an external device detection program and determining whether the external device is logged in;
and the safety protection module is connected with the central control module and is used for carrying out safety protection on the private account through a safety protection program, and deleting or blacking the terminal for logging in the private account.
9. A computer program product stored on a computer readable medium, comprising computer readable program for providing a user input interface for implementing a Femto architecture based wireless communication method as claimed in any one of claims 1 to 7 when executed on an electronic device.
10. A computer-readable storage medium storing instructions that, when executed on a computer, cause the computer to perform the Femto infrastructure based wireless communication method according to any one of claims 1 to 7.
CN202010845420.5A 2020-08-20 2020-08-20 Femto architecture based wireless communication system and method Pending CN111970700A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010845420.5A CN111970700A (en) 2020-08-20 2020-08-20 Femto architecture based wireless communication system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010845420.5A CN111970700A (en) 2020-08-20 2020-08-20 Femto architecture based wireless communication system and method

Publications (1)

Publication Number Publication Date
CN111970700A true CN111970700A (en) 2020-11-20

Family

ID=73389731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010845420.5A Pending CN111970700A (en) 2020-08-20 2020-08-20 Femto architecture based wireless communication system and method

Country Status (1)

Country Link
CN (1) CN111970700A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102209137A (en) * 2011-05-26 2011-10-05 朱莉君 Private account system of mobile terminal private account system and realization method
CN102299961A (en) * 2011-08-25 2011-12-28 邦讯技术股份有限公司 Method for Femto equipment to realize sharing network resources and Femto equipment
WO2016101272A1 (en) * 2014-12-26 2016-06-30 华为技术有限公司 Method and apparatus for adjusting network mode
CN109977639A (en) * 2018-10-26 2019-07-05 招商银行股份有限公司 Identity identifying method, device and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102209137A (en) * 2011-05-26 2011-10-05 朱莉君 Private account system of mobile terminal private account system and realization method
CN102299961A (en) * 2011-08-25 2011-12-28 邦讯技术股份有限公司 Method for Femto equipment to realize sharing network resources and Femto equipment
WO2016101272A1 (en) * 2014-12-26 2016-06-30 华为技术有限公司 Method and apparatus for adjusting network mode
CN109977639A (en) * 2018-10-26 2019-07-05 招商银行股份有限公司 Identity identifying method, device and computer readable storage medium

Similar Documents

Publication Publication Date Title
Bui et al. Data-driven evaluation of anticipatory networking in LTE networks
US9380038B2 (en) Bootstrap authentication framework
CN113545018A (en) Protecting a telecommunications network using network components as blockchain nodes
CN103929748A (en) Internet of things wireless terminal, configuration method thereof and wireless network access point
CN111262865B (en) Method, device and system for making access control strategy
US12075342B2 (en) Cellular network onboarding through wireless local area network
CN113411286B (en) Access processing method and device based on 5G technology, electronic equipment and storage medium
CN111951455A (en) Method, system, equipment and storage medium for remotely authorizing visitor to pass
CN113709736A (en) Network authentication method, device and system
CN114205815A (en) Method and system for authentication control of 5G private network
CN106982430B (en) Portal authentication method and system based on user use habits
CN113271299B (en) Login method and server
Ling et al. Hash access in blockchain radio access networks: Characterization and optimization
CN110798835A (en) Public wifi access method, mobile terminal and readable storage medium
CN111970700A (en) Femto architecture based wireless communication system and method
CN106537962B (en) Wireless network configuration, access and access method, device and equipment
US11837239B2 (en) Systems and methods for secure authentication based on machine learning techniques
CN112738281B (en) Service calling system
CN116963055A (en) Authentication method, authentication device, authentication apparatus, authentication storage medium, and authentication program product
CN114423007A (en) Terminal access point determining method, terminal access point determining device, electronic equipment and storage medium
CN112417403A (en) Automatic system authentication and authorization processing method based on GitLab API
CN115086956A (en) Network access method, network access device, medium, and electronic device for communication network
US20240305606A1 (en) System, method and non-transitory computer readable medium for an internet-enabled network radio node
CN113840285B (en) Physical layer collaborative authentication method and system based on 5G and electronic equipment
US12047458B2 (en) Systems and methods for preventing abuse of traffic categories and network slices by applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201120