CN114786237B - Data processing method, device, base station and storage medium - Google Patents

Data processing method, device, base station and storage medium Download PDF

Info

Publication number
CN114786237B
CN114786237B CN202210694428.5A CN202210694428A CN114786237B CN 114786237 B CN114786237 B CN 114786237B CN 202210694428 A CN202210694428 A CN 202210694428A CN 114786237 B CN114786237 B CN 114786237B
Authority
CN
China
Prior art keywords
terminal
cell
admission
base station
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210694428.5A
Other languages
Chinese (zh)
Other versions
CN114786237A (en
Inventor
王传宝
魏进武
冯立华
张伦泳
蔡凯
赵海超
肖瑞
刘建玲
彭伶珊
马德旺
李冉
李纪华
赵斌
李萌
徐戬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202210694428.5A priority Critical patent/CN114786237B/en
Publication of CN114786237A publication Critical patent/CN114786237A/en
Application granted granted Critical
Publication of CN114786237B publication Critical patent/CN114786237B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a data processing method, a device, a base station and a storage medium, which relate to the field of electric digital data processing, when a terminal enters an inlet area of a target area, the terminal reselects or selects a target cell covering the inlet area, the base station of the target cell obtains a terminal identifier of the terminal in the process of terminal reselection or selection, the terminal identifier is used for obtaining access information of the terminal, and an alarm device executes alarm operation when the access information does not meet the access condition.

Description

Data processing method, device, base station and storage medium
Technical Field
The present application relates to the field of electrical digital data processing, and in particular, to a data processing method, apparatus, base station, and storage medium.
Background
In the modern society, the admission regulation of key areas is more and more strict, and especially under the condition of severe epidemic situations, the admission standards of different areas are different.
When a user enters a key area with an admission supervision system, corresponding admission information needs to be presented for checking, and the presentation process of the admission information needs to be actively provided by the user, so that the information checking time is longer, and the checking efficiency is low. For example: in the epidemic prevention process, the presentation and the verification of epidemic prevention information need personnel to participate, the passing efficiency is reduced, and the risk that visitors spread epidemic situations mutually due to gathering at an entrance to wait for verification travel codes and health codes is increased.
Disclosure of Invention
The application provides a data processing method, a data processing device, a base station and a storage medium, which are used for solving the technical problem of low efficiency of checking access information of users in a target area.
In a first aspect, the present application provides a data processing method, where the method is applied to a base station, and a target cell corresponding to the base station covers an entry area of a target area, and the method includes:
when the terminal reselects or selects a target cell, acquiring a terminal identifier of the terminal;
the terminal identification is used for obtaining the access information of the terminal and enabling the alarm device to execute alarm operation when the access information does not meet the access condition;
wherein the target cell covers an area larger than the entrance area and smaller than the target area.
In the above technical solution, in the process of reselecting or selecting a target cell in which a base station is disposed in an inlet area by a terminal, the base station can automatically obtain a terminal identifier of the terminal, so that a device for storing admission information determines corresponding admission information according to the terminal identifier, thereby checking the corresponding admission qualification, saving the processes of manually presenting the admission information and checking the admission qualification for a user, improving the checking efficiency of the admission information, enabling an alarm device to perform an alarm operation when the admission information does not satisfy the admission condition, preventing the terminal that does not satisfy the admission condition of the target area from mistakenly entering the inlet area, protecting the safety of the target area, and in addition, the target cell disposed in the inlet area is larger than the inlet area and smaller than the target area, ensuring that the obtaining position of the terminal identifier is located in the inlet area, and avoiding confusion with the position of the adjacent area of the target area, so as to ensure the accuracy of access qualification inspection.
Optionally, after the terminal reselects or selects the target cell, obtaining the terminal identifier of the terminal specifically includes:
after the terminal reselects to a first cell providing service, acquiring a terminal identifier sent by the terminal;
wherein the target cell comprises a first cell.
Optionally, after the terminal reselects to the first cell providing the service, obtaining the terminal identifier sent by the terminal specifically includes:
after the terminal in the connection state reselects the first cell and establishes connection with the base station, generating and sending an identification acquisition request to the terminal; the identification acquisition request is used for controlling the terminal to send the terminal identification to the base station;
and acquiring the terminal identification sent by the terminal.
Optionally, the terminal identifier is configured to obtain access information of the terminal, and when the access information does not satisfy an access condition, the core network generates a call holding instruction, a call release instruction, and a call establishment instruction, the core network sends the call holding instruction to a call opposite end of the terminal to retain a call relationship, the core network sends the call release instruction to the terminal to stop a call state thereof, and the core network uses the call establishment instruction to control the terminal to perform a ringing operation, and restores a call between the terminal and the call opposite end after the terminal performs a connection operation.
Optionally, after the terminal reselects to the first cell providing the service, obtaining the terminal identifier sent by the terminal specifically includes:
after a terminal in an idle state reselects a first cell, acquiring a tracking area updating request instruction sent by the terminal;
and obtaining the terminal identification from the tracking area updating request instruction.
Optionally, after the terminal reselects or selects the target cell, obtaining the terminal identifier of the terminal specifically includes:
when a terminal performs registration operation in a first cell providing service, acquiring a registration request instruction sent by the terminal;
acquiring a terminal identifier from a registration request instruction; wherein the target cell comprises a first cell.
In the above technical solution, the base station corresponding to the target cell covering the inlet area is set in the inlet area of the target area, and the base station is set to provide services for all devices entering the target cell, so that the base station can obtain the terminal identifiers of all terminals during the process of reselecting or selecting the base station by the terminal, and the device storing the access information automatically checks the access qualification of the terminal to enter the target area according to the terminal identifier.
Optionally, after the terminal reselects or selects the target cell, obtaining the terminal identifier of the terminal specifically includes:
after the terminal reselects to a second cell which does not provide service, acquiring a terminal identifier of the terminal;
wherein the target cell comprises a second cell.
Optionally, after the terminal reselects to the second cell that does not provide the service, obtaining the terminal identifier of the terminal specifically includes:
after the terminal in an idle state reselects an area covered by a second cell, acquiring a tracking area updating request instruction sent by the terminal;
and obtaining the terminal identification from the tracking area updating request instruction, and refusing to provide the tracking area updating service for the terminal in the second cell.
Optionally, after the terminal reselects or selects the target cell, obtaining the terminal identifier of the terminal specifically includes:
when the terminal performs registration operation in a second cell which does not provide service, acquiring a registration request instruction sent by the terminal;
obtaining a terminal identifier from the registration request instruction, and refusing registration; wherein the target cell comprises a second cell; the second cell is a cell with the highest priority in the target area, or a cell with the shortest duration in which the received power determined by the terminal is continuously in a preset power range under the condition that the priorities in the cells covering the target area are the same, or a cell with the highest radio frequency transmission power under the conditions that the priorities are the same and the durations are the same.
Optionally, the method further comprises:
generating an admission information query instruction according to the terminal identification, and sending the admission information query instruction to the gateway equipment;
the admission information query instruction is used for controlling the verification server to locally query admission information associated with the terminal identification according to the information obtained by the gateway equipment, and controlling the alarm device to execute corresponding alarm operation when the admission information does not meet the admission condition of the target area.
Optionally, an admission information query instruction is generated according to the terminal identifier, and the admission information query instruction is sent to the gateway device, which specifically includes:
generating an admission information query instruction according to the terminal identifier and the cell identifier of the target cell;
sending the admission information query instruction to gateway equipment;
the admission information query instruction is used for controlling the verification server to locally query admission information associated with the terminal identification according to the information obtained by the gateway equipment, query admission conditions associated with the cell identification of the target cell, and control the alarm device to execute corresponding alarm operation when the admission information does not meet the admission conditions.
Optionally, when the alarm device supports the fifth generation mobile communication technology, an admission check application program is installed in the alarm device; the access information is also used for controlling the core network to generate and send an application awakening instruction to the alarm device when the verification server determines that the access information of the terminal does not meet the access condition, so that the alarm device runs an access checking application program at the front end, and the alarm device executes alarm operation and/or displays the access information.
Optionally, an admission checking application program is installed in the alarm device, and the application server provides network service support for the admission checking application program; the admission information is also used for controlling the verification server to send a wake-up control instruction to the application server when the admission information of the terminal is determined not to meet the admission condition, and the wake-up control instruction is used for controlling the application server to send an application wake-up instruction to the alarm device, so that the alarm device runs an admission checking application program at the front end, and the alarm device executes alarm operation and/or displays the admission information.
Optionally, the method further comprises:
sending the terminal identification to the gateway equipment;
the terminal identification is used for enabling the gateway equipment to inquire the telephone number corresponding to the terminal identification and sending the telephone number to the verification server, and the telephone number is used for enabling the verification server to locally inquire the access information corresponding to the telephone number and controlling the alarm device to execute corresponding alarm operation when the access information does not meet the access condition of the target area.
Optionally, the method further comprises:
locally inquiring a terminal access information mapping table by using a terminal identifier to obtain access information associated with the terminal identifier;
comparing the access information with the access condition, generating an alarm request when the access information does not meet the access condition, and sending the alarm request to the gateway equipment; the alarm request is used for enabling the gateway equipment to control the alarm device to execute corresponding alarm operation.
Optionally, the method further comprises:
locally inquiring a terminal access information mapping table by using a terminal identifier to obtain access information associated with the terminal identifier;
and comparing the admission information with the admission conditions, and executing corresponding alarm operation when the admission information does not meet the admission conditions.
In the above technical solution, when a terminal enters an inlet area of a target area, a base station of a target cell covering the inlet area is reselected or selected, and the base station obtains a terminal identifier of the terminal in the terminal reselection or selection process, so as to obtain access information associated with the terminal identifier in any device storing the access information, and when the access information does not satisfy the access condition, the alarm device is caused to perform an alarm operation.
In a second aspect, the present application provides a data processing method, which is applied to a base station of a third cell, and includes:
when the terminal determines and reports that the reference signal received power of the third cell is lower than a preset power threshold to a base station of the third cell, the terminal is instructed to generate a measurement report of a target cell;
obtaining a measurement report sent by a terminal, and obtaining a terminal identifier of the terminal from the measurement report; the terminal identification is used for obtaining the access information of the terminal and enabling the alarm device to execute alarm operation when the access information does not meet the access condition;
the target cell covers an inlet area of a target area, and the area covered by the target cell is larger than the inlet area and smaller than the target area; the third cell is a neighboring cell of the target cell.
Optionally, the method further comprises:
sending the terminal identification to the gateway equipment;
the terminal identification is used for enabling the gateway equipment to inquire the telephone number corresponding to the terminal identification and sending the telephone number to the verification server, and the telephone number is used for enabling the verification server to locally inquire the access information corresponding to the telephone number and controlling the alarm device to execute corresponding alarm operation when the access information does not meet the access condition of the target area.
Optionally, the method further comprises:
generating an admission information query instruction according to the terminal identification, and sending the admission information query instruction to the gateway equipment;
the admission information query instruction is used for controlling the verification server to locally query admission information associated with the terminal identification according to the information obtained by the gateway equipment, and controlling the alarm device to execute corresponding alarm operation when the admission information does not meet the admission condition of the target area.
Optionally, the method further comprises:
sending the terminal identification to a base station of a target cell;
the terminal identification is used for enabling a base station of the target cell to locally inquire the admission information corresponding to the terminal identification, and when the admission information does not meet the admission condition corresponding to the target area, the base station controls the alarm device to execute corresponding alarm operation.
Optionally, when the admission information does not satisfy the admission condition of the target area and the terminal is in a connected state, the base station of the target cell generates an alarm request and sends the alarm request to the gateway device, wherein the alarm request is used for controlling the gateway device to generate and send a voice call interruption control instruction to the core network;
the voice call interruption control instruction is used for controlling a core network to generate a call holding instruction, a call release instruction and a call establishment instruction, the core network sends the call holding instruction to a call opposite end of the terminal to keep a call relation, the core network sends the call release instruction to the terminal to stop the call state of the terminal, and the core network uses the call establishment instruction to control the terminal to execute ringing operation and restore the call between the terminal and the call opposite end after the terminal executes a connection operation.
Optionally, the terminal identifier is specifically configured to, when the admission information does not satisfy the admission condition of the target area and the terminal is in a connected state, generate and send a call hold instruction to the target base station, stop a call state of the terminal, hold a call state between the terminal and a call peer, and send a voice call to the terminal, where the voice call is used to control the terminal to perform a ringing operation, and resume a call between the terminal and the call peer after the terminal performs a connection operation; the call hold command is used for enabling the target base station to reserve the conversation relationship between the terminal and the conversation pair end of the terminal.
Optionally, the terminal identifier is further configured to compare the admission information with the admission condition by the base station of the target cell, and execute a corresponding alarm operation when the admission information does not satisfy the admission condition, where the alarm device is the base station.
In the above technical solution, the base station of the third cell obtains the identifier information of the terminal through the measurement report of the terminal to the target cell, so that the device storing the access information queries the identifier of the terminal to automatically determine the access information of the terminal user, and when the access information does not satisfy the access condition of the target region, the alarm control device is used to control the alarm device to alarm, which not only improves the checking efficiency of the access qualification of the terminal, but also prevents the terminal with abnormal access qualification from entering the target region by mistake.
In a third aspect, the present application provides a data processing apparatus comprising:
the processing module is used for obtaining a terminal identifier of the terminal when the terminal reselects or selects a target cell;
the terminal identification is used for obtaining the access information of the terminal and enabling the alarm device to execute alarm operation when the access information does not meet the access condition; wherein the target cell covers an entrance area of the target area, and the target cell covers an area larger than the entrance area and smaller than the target area.
In a fourth aspect, the present application provides a data processing apparatus comprising:
the processing module is used for indicating the terminal to generate a measurement report of the target cell when the terminal determines and reports that the reference signal received power of the third cell is lower than a preset power threshold to the base station of the third cell;
the acquisition module is used for acquiring a measurement report sent by a terminal;
the processing module is further used for obtaining the terminal identification of the terminal from the measurement report; the terminal identification is used for obtaining the access information of the terminal and enabling the alarm device to execute alarm operation when the access information does not meet the access condition;
the target cell covers an inlet area of a target area, and the area covered by the target cell is larger than the inlet area and smaller than the target area; the third cell is a neighbor cell of the target cell.
In a fifth aspect, the present application provides a base station, comprising: a processor and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor is configured to implement the data processing method according to the first aspect when executing the computer-executable instructions.
In a sixth aspect, the present application provides a computer-readable storage medium, in which computer instructions are stored, and the computer instructions are used for implementing the data processing method according to the first aspect or the second aspect when executed by a processor.
According to the data processing method, the data processing device, the base station and the storage medium, when the terminal enters the inlet area of the target area and reselects or selects the target cell covering the inlet area, the base station of the target cell obtains the terminal identification of the terminal in the terminal reselection or selection process, the terminal identification is used for obtaining the access information of the terminal, and the alarm device is used for executing alarm operation when the access information does not meet the access condition.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic view of an application scenario of a data processing method provided in the present application according to an exemplary embodiment;
FIG. 2 is a schematic flow chart diagram of a data processing method provided herein according to an exemplary embodiment;
FIG. 3 is a schematic flow chart diagram of a data processing method provided by the present application according to another exemplary embodiment;
FIG. 4 is a schematic flow chart diagram of a data processing method provided in the present application according to another exemplary embodiment;
FIG. 5 is a schematic flow chart diagram of a data processing method provided in the present application according to another exemplary embodiment;
fig. 6 is a schematic diagram illustrating a base station cell location deployment of a data processing method according to another exemplary embodiment;
FIG. 7 is a schematic flow chart diagram of a data processing method provided in the present application according to another exemplary embodiment;
FIG. 8 is a schematic flow chart diagram of a data processing method provided in accordance with another exemplary embodiment of the present application;
FIG. 9 is a schematic flow chart diagram of a data processing method provided in the present application according to another exemplary embodiment;
FIG. 10 is a schematic flow chart diagram of a data processing method provided in accordance with another exemplary embodiment of the present application;
FIG. 11 is a block diagram illustrating a first data processing apparatus according to an exemplary embodiment of the present application;
FIG. 12 is a schematic block diagram of a second data processing apparatus provided herein according to another exemplary embodiment;
fig. 13 is a schematic structural diagram of a base station provided in the present application according to an exemplary embodiment.
With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
The embodiment of the application provides a data processing method, a data processing device, a base station and a storage medium, and aims to solve the technical problem of low efficiency of checking access information of users in a target area. The technical idea of the application is as follows: setting base station near the target area, the area covered by the base station is full covered in the target area under the condition that the area covered by the base station is not beyond the target area, when the terminal in any state is close to or enters the area covered by the cell, the base station or the adjacent base station acquires the terminal identification information in the process of reselecting or selecting the cell, then inquiring the terminal identification in the device for storing the access information to automatically determine the access information of the terminal user, and when the access information does not meet the access condition of the target area, controlling the alarm device to alarm by using the alarm control device.
Fig. 1 is a schematic view of an application scenario of the data processing method provided in the present application, as shown in fig. 1, in the application scenario, the application scenario includes: the base station 10 and other base stations 11 adjacent to the base station 10, the terminal 12, the gateway device 13, the verification server 14, the alarm device 15 and the core network 16, wherein the base station 10 and other base stations 11 are respectively in communication connection with the gateway device 13, the gateway device 13 is in communication connection with the verification server 14, the verification server 14 is respectively in communication connection with the core network 16 and the terminal 12, the core network 16 is respectively in communication connection with the base station 10 and other base stations 11, and the terminal 12 can be in communication connection with the base station 10 and other base stations 11.
The base station 10 is installed near the target area 17, and the base station 10 corresponds to a generated target cell, and in an embodiment, the first cell includes a first cell 101, the first cell 101 is larger than an entrance area 18 of the target area 17 and smaller than the target area 17, and more specifically, the first cell 101 fully covers the entrance area 18 of the target area 17, and the target area 17 fully covers the first cell 101. The other base stations 11 are installed in the vicinity of the target area 17 or the other area 19, and generate a third cell 111 that fully covers the target area 17 and the other area 19, i.e. the coverage area of the third cell 111 is larger than that of the first cell 101. The first cell 101 has a higher priority than the third cell 111, and the tracking area of the third cell 111 is different from that of the first cell 101.
In the process that the terminal 12 moves within the range covered by the third cell 111, when the terminal 12 is ready to enter the entry area 18, the terminal 12 approaches or enters the first cell 101, because the priority of the first cell 101 is higher than that of the third cell 111, the terminal 12 reselects or selects the first cell 101, and in the process of requesting reselection or selection, the base station 10 or other base stations 11 obtains the terminal identifier of the terminal 12 and sends the terminal identifier to the gateway device 13, so that the gateway device 13 obtains the corresponding mobile phone number and the operator after analyzing the terminal identifier. Wherein reselection is the terminal 12 selecting the cell tuned to provide its service, i.e. reselecting from the third cell 111 to the first cell 101; after the terminal 12, which is selected to be in the power-off state or in the flight state, changes the current state, a registration operation is performed in the first cell 101 of the base station 10.
After the gateway device 13 finishes the analysis, the obtained information is sent to the verification server 14, so that the verification server 14 obtains the access information corresponding to the terminal identifier through local query, compares the access information with the access condition of the target area 17, and controls the alarm device 15 to perform corresponding alarm operation when the access information does not meet the access condition. Wherein, the alarm device 15 includes an electronic device disposed in the inlet area, a terminal 12 and a base station 10 with the alarm device, the electronic device disposed in the inlet area includes: floodgate machine, security inspection door, PC, warning light.
In one embodiment, the verification server 14 may directly control the alarm device 15 to perform an alarm operation; in another embodiment, the verification server 14 may control the core network 16 to send an alarm command to the alarm device 15 through an Application Layer Gateway (ALG) to enable the alarm device 15 to perform an alarm operation; in another embodiment, the verification server 14 controls the gateway device 13 to send an alarm instruction to the alarm apparatus 15, so that the alarm apparatus 15 performs an alarm operation. When the alarm device is a terminal, the operator of the core network is the same as the operator of the mobile phone number of the terminal.
Fig. 2 is a schematic flowchart of a data processing method according to an exemplary embodiment of the present application, and as shown in fig. 2, the method includes:
s201, when the terminal reselects or selects the target cell, the base station obtains the terminal identification of the terminal.
The target cell corresponding to the base station covers the entrance area of the target area, and more specifically, the target cell covers an area larger than the entrance area and smaller than the target area, so as to prevent the base station from being confused with its neighboring cells when determining the position of the target cell.
The reselection operation performed by the terminal is that the terminal and the target cell complete time-frequency synchronization, namely, the terminal and the target cell perform time-frequency synchronization after entering the area covered by the target cell from the area covered by the cell where the terminal is currently located, and the cell where the terminal is currently located is different from the target cell; the selection operation is an operation in which the terminal in the power-off state performs a power-on operation, or the terminal in the flight state performs registration in the target cell of the base station after leaving the flight mode.
The terminal identification of the terminal is the unique terminal identification capable of representing the terminal identity information and also represents the unique identification information of the terminal holder identity. In one embodiment, the terminal sends the terminal identification directly to the base station, and in another embodiment, the base station obtains the terminal identification from the information sent by the terminal.
The terminal identification is used for obtaining the access information of the terminal and enabling the alarm device to execute the alarm operation when the access information does not meet the access condition.
The admission information is information required to be provided by the terminal to enter the target area, and the admission condition is a condition which needs to be met by the admission information of the terminal.
In the above technical solution, in the process that the terminal reselects or selects the target cell in which the base station is disposed in the inlet area, the base station may automatically obtain the terminal identifier of the terminal, and the terminal identifier is used to determine the access information of the user, thereby checking the access qualification corresponding to the user, saving the processes of manually presenting the access information and checking the access qualification of the user, and improving the checking efficiency of the access information.
In an embodiment, when a verification server including an epidemic prevention system determines whether the admission information satisfies the admission condition according to the admission information related to the terminal identifier, a corresponding data processing method is as shown in fig. 3. In fig. 3, the method comprises:
s301, after the terminal reselects or selects the target cell, the base station obtains the terminal identifier of the terminal.
This step is the same as step S201, and is not described here again.
S302, the base station generates an admission information query instruction according to the terminal identification and sends the admission information query instruction to the gateway equipment.
The admission information query instruction is used for controlling the verification server to locally query admission information associated with the terminal identification according to the information obtained by the gateway equipment, and controlling the alarm device to execute corresponding alarm operation when the admission information does not meet the admission condition of the target area.
More specifically, the base station generates an admission information query instruction according to the terminal identifier, and sends the admission information query instruction to the gateway device, and the gateway device locally queries a mobile phone number corresponding to the terminal identifier according to the instruction, and generates an admission qualification query instruction according to the mobile phone number and the cell identifier of the target cell.
The gateway equipment sends the admission qualification inquiry instruction to the verification server, the verification server obtains the mobile phone number and the cell identification from the admission qualification inquiry instruction, locally inquires the admission information corresponding to the mobile phone number and inquires the admission condition corresponding to the cell identification respectively, and after judging the admission information by using the admission condition, the admission qualification of the terminal is obtained, namely when the admission information meets the admission condition, the terminal has the admission qualification of the target area. And when the terminal does not have the access qualification, the verification server controls the alarm device to execute the corresponding alarm operation. In one embodiment, the alarm device is a terminal, and the verification server directly or indirectly sends voice call or information to the terminal so that the terminal vibrates and/or makes sound to realize that the alarm device executes alarm operation. In another embodiment, the verification server can also control the terminal to display the access information, which is beneficial for the monitoring personnel to perform secondary verification on the access information, and compared with the situation that the monitoring personnel perform verification on the access information of all the personnel entering the target area, the verification efficiency is improved.
In one embodiment, when the alarm device supports the fifth generation mobile communication technology, the admission checking application program is installed in the alarm device; the admission information is also used for controlling the core network to generate and send an application awakening instruction to the alarm device when the check server determines that the admission information of the terminal does not meet the admission condition, so that the alarm device runs an admission checking application program on an upper layer, and the alarm device executes alarm operation and/or displays the admission information.
In another embodiment, an admission checking application program is installed in the alarm device, and an application server provides network side service support for the admission checking application program; the admission information is also used for controlling the verification server to send a wake-up control instruction to the application server when the admission information of the terminal is determined not to meet the admission condition, and the wake-up control instruction is used for controlling the application server to send an application wake-up instruction to the alarm device, so that the alarm device runs an admission checking application program at the front end, and the alarm device executes alarm operation and/or displays the admission information. In some embodiments, step S302 may also be replaced with:
and sending the terminal identification to the gateway equipment, wherein the terminal identification is used for enabling the gateway equipment to inquire the telephone number corresponding to the terminal identification and sending the telephone number to the verification server, and the telephone number is used for enabling the verification server to locally inquire the access information corresponding to the telephone number and controlling the alarm device to execute corresponding alarm operation when the access information does not meet the access condition of the target area. When the gateway equipment obtains the telephone number corresponding to the terminal identification, if the mapping relation between the terminal identification and the telephone number is stored in the gateway equipment, the gateway equipment can directly inquire and obtain the telephone number locally according to the terminal identification; if the telephone number corresponding to the terminal identification is not inquired in the gateway equipment, the terminal determines a core network to which the terminal belongs according to the terminal identification and sends the terminal identification to the core network, and the core network inquires the terminal identification locally to obtain the corresponding telephone number and sends the telephone number to the gateway equipment.
In some embodiments, step S302 may also be replaced with:
and the base station locally inquires a terminal access information mapping table by using the terminal identifier to obtain access information associated with the terminal identifier. And the base station compares the admission information with the admission conditions, generates an alarm request when the admission information does not meet the admission conditions, and sends the alarm request to the gateway equipment. The gateway equipment controls the alarm device to execute corresponding alarm operation.
In some embodiments, step S302 may also be replaced with:
and the base station locally inquires a terminal access information mapping table by using the terminal identifier to obtain access information associated with the terminal identifier. And the base station compares the access information with the access condition and executes corresponding alarm operation when the access information does not meet the access condition. Namely, the base station is provided with an alarm unit, and when the access information does not meet the access condition, the base station controls the alarm unit to execute corresponding alarm operation.
In the above technical solution, when a terminal enters an inlet area of a target area, a target cell covering the inlet area is reselected or selected, and a base station obtains a terminal identifier of the terminal in the terminal reselection or selection process, so as to obtain access information associated with the terminal identifier in a device for storing access information, and when the access information does not satisfy access conditions, an alarm device is made to perform an alarm operation.
When a target cell of a base station can provide a service for a terminal entering a coverage area of the base station, as shown in fig. 4, a data processing method provided in an embodiment of the present application includes:
s401, after the terminal reselects to the first cell providing the service, the base station obtains the terminal identifier of the terminal.
In this step, the terminal reselects from the third cell to the first cell providing service, where the cells providing service for the terminal in the target cell include the first cell, the third cell is a cell where the terminal is currently located, the third cell is a neighboring cell of the first cell, and a priority of the third cell is lower than that of the first cell.
The service provided by the first cell is a wireless communication service based on a wireless communication network. The function of the target cell to provide service can be set in its built-in system before the base station is used. After the terminal in the connected state enters the coverage area of the target cell from the third cell, the terminal already establishes the RRC connection with the base station of the third cell, the base station of the third cell sends an RRC reconfiguration message to the terminal, and the RRC reconfiguration message carries a connection handover instruction to instruct the terminal to handover the connection relationship to the base station of the target cell.
When a third cell moves to a target cell, a terminal in an idle state searches or monitors a Broadcast Channel (BCH) of a radio access network, after the terminal enters the target cell, a main System Information Block (MIB) of the cell where the terminal is located is analyzed from the BCH, a System Information Block (SIB) is further obtained to obtain cell priority from the MIB, the terminal completes time-frequency synchronization with the target cell according to the priority, and after random access, the terminal sends a TAU request to the target cell in a position updating process, wherein the third cell is a cell adjacent to the target cell.
In an embodiment, when the terminal is in a connected state, the process of the base station acquiring the terminal identifier of the terminal specifically includes: and when the terminal in the connection state reselects the first cell and establishes connection with the base station, generating and sending an identifier acquisition request to the terminal. The base station obtains the terminal identification sent by the terminal.
After the terminal enters the area covered by the first cell, the terminal in the connection state receives a terminal connection control instruction sent by the base station corresponding to the third cell, the connection relation is handed over to the base station corresponding to the first cell, and after the hand-over is completed, the base station corresponding to the first cell sends an identifier acquisition request to the terminal. The identifier acquisition request is used for controlling the terminal to send the terminal identifier to the base station. In one embodiment, the terminal identity is an international mobile subscriber identity.
When the terminal is in an idle state, the process of the base station acquiring the terminal identifier of the terminal specifically includes: and after the terminal in the idle state is reconnected to the first cell, the base station acquires a tracking area updating request instruction sent by the terminal. And the base station obtains the terminal identification from the tracking area updating request instruction.
Wherein the third cell is different from the first cell in tracking area. Therefore, after the terminal enters the first cell from the third cell, the Tracking Area (TA) currently held by the terminal is inconsistent with the TA of the first cell, and the terminal initiates a Tracking Area update request instruction. The tracking area update request instruction includes a terminal identifier of the terminal. The tracking Area can also be described as a Location Area (LA).
S402, the base station generates an admission information query instruction according to the terminal identification and sends the admission information query instruction to the gateway equipment.
In some embodiments, if the admission information of the terminal does not satisfy the admission condition, the core network may control the base station to perform paging in the first cell, and initiate a call request to the terminal after obtaining the information corresponding to the terminal.
When a target cell of a base station can provide a service for a terminal entering its coverage area, a flowchart of a data processing method provided in another embodiment of the present application is shown in fig. 5, where the data processing method includes:
s403, when the terminal performs the registration operation in the first cell providing the service, the base station obtains the terminal identification of the terminal.
The registration operation is an operation that the terminal performs a power-on operation in the target cell or performs registration in the cell with the highest priority in the area where the terminal is located after exiting the flight mode.
When the terminal is in the overlapping area of the third cell and the target cell, the terminal is started or exits from the flight mode, the terminal searches the wireless signals on the broadcast channel of the wireless access network, analyzes the main system information block of the cell in which the terminal is located, and further obtains the system information block to obtain the cell priority. And the priority of the target cell is greater than that of the third cell, and accordingly, the terminal sends a selection request to the base station corresponding to the target cell. The target cell includes a first cell.
More specifically, in the process of obtaining the terminal identifier of the base station through the registration operation of the terminal, the base station first obtains a registration request instruction sent by the terminal, and then obtains the terminal identifier from the registration request instruction.
S404, the base station generates an admission information query instruction according to the terminal identification and sends the admission information query instruction to the gateway equipment.
In the above technical solution, the base station corresponding to the target cell is set in the inlet area of the target area, and the base station is set to provide services for all devices entering the target cell, so that the base station can obtain the terminal identifiers of all terminals during the process of reselecting or selecting the base station by the terminal, so that the verification server can automatically obtain the access qualification of the terminal to enter the target area, which does not affect the current operation process of the terminal, avoids the poor quality of service obtained during the process of crossing the terminal, and can improve the checking efficiency of the access information.
In order to ensure that the base station can obtain all the identification information of the terminals entering the coverage entry area, another embodiment of the present application provides a schematic diagram of base station cell deployment in a data processing method. The base station cell deployment diagram is shown in fig. 6. In contrast to the deployment scenario of the base station cell in the application scenario diagram of fig. 1, fig. 6 further provides a second cell 102 in the entry area, and the target cell includes the second cell 102, and the coverage area of the second cell 102 is smaller than that of the first cell 101, but it still needs to ensure that the second cell 102 can fully cover the entry area 18. Wherein the base station 10 can still serve the terminals 12 entering the coverage of the first cell 101, but refuse to serve the terminals 12 entering the coverage of the second cell 102. The first cell 101 and the second cell 102 may obtain the terminal identity of the terminal 12 in different states as it enters the entry area 18, respectively.
It should be noted that in the scenario shown in fig. 6, the first cell 101 and the second cell 102 belong to the same base station, and in another scenario, the first cell 101 and the second cell 102 may also belong to separate base stations, where the base station of the first cell 101 in this application performs an operation associated with the first cell 101, and the base station of the second cell 102 in this application performs an operation associated with the second cell 102.
Fig. 7 is a flowchart illustrating a data processing method according to another exemplary embodiment of the present application, where the method in this embodiment may be executed in the application scenario shown in fig. 6. The data processing method provided by the application comprises the following steps:
s501, after the terminal reselects a second cell which does not provide service, the base station obtains a terminal identifier of the terminal.
The target cell comprises a first cell and a second cell, the third cell is a neighboring cell of the first cell and the second cell, the priority of the third cell is lower than that of the first cell, the priority of the third cell is lower than that of the second cell, the tracking areas of the third cell and the first cell are different, and the tracking areas of the third cell and the second cell are different.
The base station can limit the coverage range of the first cell and the second cell through the radio frequency transmission power of the first cell and the second cell, the radio frequency transmission power of indoor coverage is strengthened by the first cell, under the condition that the first cell provides service and the second cell does not provide service, the problem that the second cell with lower radio frequency transmission power provides service for the terminal, so that user experience is influenced can be avoided, and at the moment, the terminal requesting reselection selects the first cell after the cell is reselected.
More specifically, when the terminal is in a connected state, and the terminal enters the target area from the third cell, the terminal first enters the first cell with a larger coverage area, and the base station performs RRC connection with the first cell, and in this process, obtains the terminal identifier of the terminal. The terminal identification comprises an international mobile subscriber identity or a temporary mobile subscriber identity.
In another embodiment, in the process of reselecting the terminal from the base station where the third cell is located to the base station where the first cell is located, the base station corresponding to the first cell obtains the terminal identifier from an instruction sent by the base station of the third cell.
When the terminal is in an idle state, the process of the base station acquiring the terminal identifier of the terminal specifically includes steps S5011 to S5012:
s5011, after the terminal in the idle state reselects to the second cell, the base station obtains a tracking area update request instruction sent by the terminal.
When the terminal enters the tracking area of the second cell, because the tracking areas of the second cell and the third cell are different, and the tracking areas of the first cell and the third cell are different, the terminal sends a tracking area update request instruction to the target cell of the base station.
In an embodiment, a duration that the reference signal received power of the first cell is continuously in the preset power range is set to be less than a duration that the reference signal received power of the second cell is continuously in the preset power range. When the priorities of the first cell and the second cell are the same, the terminal preferentially sends a tracking area update request instruction to the second cell of the base station because the duration that the reference signal received power of the first cell is continuously in the preset power range is shorter than the duration that the reference signal received power of the second cell is continuously in the preset power range.
S5012, the base station obtains the terminal identifier from the tracking area update request command, and rejects to provide the tracking area update service for the terminal in the second cell.
The tracking area update request command is a request command transmitted from the terminal in the second cell to the base station in step S5011. The tracking area update request instruction includes a terminal identifier.
Since the second cell of the base station does not provide a service for the terminal, the second cell of the base station rejects providing the tracking area update service for the second cell even if the tracking area update request command is obtained.
S502, the base station generates an admission information query instruction according to the terminal identification and sends the admission information query instruction to the gateway equipment.
Wherein, the terminal identifier is the terminal identifier obtained in step S502.
More specifically, the base station generates an admission information query instruction according to the terminal identifier and the cell identifier of the target cell, and transmits the admission information query instruction to the gateway device, wherein the admission information query instruction is used for controlling the verification server to locally query admission information associated with the terminal identifier according to the information obtained and transmitted by the gateway device, query admission conditions associated with the cell identifier of the target cell, and control the alarm device to execute corresponding alarm operation when the admission information does not meet the admission conditions.
In an embodiment, the information obtained and sent by the gateway device is a mobile phone number and a cell identifier corresponding to the terminal identifier.
The admission condition is a condition for admitting into the target area, the admission condition comprises an admission parameter, and the admission information is actual information corresponding to the admission parameter by the terminal. In an embodiment, the admission parameters include time information, such as: in an epidemic prevention environment, if a device for storing nucleic acid detection information is a base station, the admission condition of a public place is that the time of nucleic acid detection is less than 48 hours, the admission parameter of the admission condition is the time of meeting the preset nucleic acid detection, the admission information of a terminal is the actual nucleic acid detection result and the time information of nucleic acid detection, and when the actual nucleic acid detection result is the preset nucleic acid detection result, namely negative, and the time difference between the time information of the terminal identification obtained by the base station and the current system time information of the base station is less than 48 hours, the terminal meets the admission condition of entering a target area.
In an epidemic prevention application scenario, the admission information comprises a health code and/or a travel code; in a defense application scenario, the admission information includes defense information in a terminal carried by a defense person.
In an embodiment, if the admission information of the terminal does not satisfy the admission condition, the core network may control the base station to page in the second cell and the third cell, and initiate a call request to the terminal after obtaining the information corresponding to the terminal.
Fig. 8 is a schematic flowchart of a data processing method provided by the present application according to another exemplary embodiment, where the method in the present embodiment may operate in the application scenario shown in fig. 6. The data processing method provided by the application comprises the following steps:
s503, when the terminal performs the registration operation in the second cell which does not provide the service, the base station obtains the terminal identification of the terminal in the registration operation process.
More specifically, when the terminal is in a power-off state or in a flight mode, after entering the second cell, the terminal performs a power-on operation or exits the flight mode in the second cell, the terminal registers in a base station covering the current region, and when the second cell is a cell with the highest priority in the target region, the terminal registers in the second cell; when the priorities of all cells covering the target area are the same, the second cell is the cell with the shortest duration and the received power of the cell is continuously within the preset power range, and the terminal registers in the second cell; and when the priorities of all the cells in the target area are the same and the durations are the same, the second cell is the cell with the maximum radio frequency transmission power, and the terminal registers in the second cell.
In the process of the registration operation of the terminal, a registration request instruction is sent to the terminal, and after receiving the registration request instruction, the base station obtains the terminal identification from the registration request instruction. The base station rejects the terminal to register in the second cell since the second cell does not provide service.
S504, an admission information query instruction is generated according to the terminal identification, and the admission information query instruction is sent to the gateway equipment.
Wherein, the terminal identifier is the terminal identifier obtained in step S503.
The processing procedure of this step is the same as that of step S502, and is not described here again.
In the above technical solution, two cells are set in the inlet area of the target area, and the service standards of the cells are set respectively, so that the base station can more specifically acquire the identification information of the terminals in different states, thereby improving the checking efficiency of the access information on the basis of ensuring the information acquisition amount of all the terminals entering the target area by the base station.
Fig. 9 is a schematic flowchart of a data processing method provided by this application according to another exemplary embodiment, where the method in this embodiment may operate in any of the two application scenarios, and an execution subject of the method is a base station of a third cell, and the data processing method provided by this application includes:
s601, when the terminal determines and reports that the reference signal received power of the third cell is lower than a preset power threshold to the base station of the third cell, the terminal is instructed to generate a measurement report of the target cell.
More specifically, when the terminal is located within the coverage of the third cell, the same-frequency measurement may be continuously performed on the third cell to generate a measurement report, and when the reference signal received power in the measurement report for the third cell by the terminal is lower than a preset power threshold, the third cell may instruct the terminal to search for broadcast information of the target cell, and when the terminal searches for the broadcast information, the measurement report is generated and then sent to the base station of the third cell, and the base station of the third cell may extract the terminal identifier from the measurement report. In an embodiment, the information of the target cell is information of inter-frequency measurement, including: reference signal received power, reference signal received quality, path loss of the target cell.
If the terminal cannot search the information of the target cell, in one case, the terminal will not generate and send the measurement report to the base station of the third cell, and in another case, the reference signal received power in the measurement report generated and sent by the terminal to the base station of the third cell is null, and in this case, the base station of the third cell will not process the measurement report.
S602, obtaining a measurement report sent by the terminal, and obtaining the terminal identification of the terminal from the measurement report.
The terminal identification is used for inquiring the access information of the terminal and enabling the alarm device to execute the alarm operation when the access information does not meet the access condition. The target cell covers the inlet area of the target area, the area covered by the target cell is larger than the inlet area and smaller than the target area, and the third cell is the adjacent cell of the target cell.
In the above technical solution, the base station of the third cell obtains the identifier information of the terminal through the measurement report of the terminal to the target cell, so that the device storing the access information queries the identifier of the terminal to automatically determine the access information of the terminal user, and when the access information does not satisfy the access condition of the target region, the alarm control device is used to control the alarm device to alarm, which not only improves the checking efficiency of the access qualification of the terminal, but also prevents the terminal with abnormal access qualification from entering the target region by mistake.
Fig. 10 is a flowchart illustrating a data processing method according to another exemplary embodiment of the present application. The execution subject of the method is a base station of a third cell, and the data processing method provided by the application comprises the following steps:
s701, when the terminal determines and reports that the reference signal received power of the third cell is lower than a preset power threshold to the base station of the third cell, the terminal is instructed to generate a measurement report of the target cell.
This step is the same as step S601, and is not described here again.
S702, obtaining the measurement report sent by the terminal, and obtaining the terminal identification of the terminal from the measurement report.
And S703, sending the terminal identification to the access information checking device.
The admission information checking device comprises gateway equipment or a base station of a target cell.
In an embodiment, when the admission information checking device is a gateway device, the base station of the third cell directly transmits the terminal identifier to the gateway device, the terminal identifier is used for enabling the gateway device to inquire the telephone number corresponding to the terminal identifier and transmit the telephone number to the checking server, and the telephone number is used for enabling the checking server to locally inquire the admission information corresponding to the telephone number and control the alarm device to execute the corresponding alarm operation when the admission information does not meet the admission condition of the target area.
In another embodiment, when the admission information verifying device is a gateway device, the base station of the third cell generates an admission information query instruction according to the terminal identifier, and sends the admission information query instruction to the gateway device.
The admission information query instruction is used for controlling the verification server to query admission information associated with the terminal identification according to the information obtained by the gateway equipment, and controlling the alarm device to execute corresponding alarm operation when the admission information does not meet the admission condition of the target area. The gateway device may query the admission information locally or in the core network.
In another embodiment, when the admission information verifying device is the base station of the target cell, the base station of the third cell sends the terminal identifier to the base station of the target cell, and the terminal identifier is used for enabling the base station of the target cell to locally query the admission information corresponding to the terminal identifier, and when the admission information does not meet the admission condition corresponding to the target area, the base station of the third cell controls the alarm device to execute the corresponding alarm operation.
More specifically, the terminal identifier is specifically configured to, when the admission information does not satisfy the admission condition of the target area and the terminal is in a connected state, generate an alarm request by a base station of the target cell and send the alarm request to the gateway device, where the alarm request is used to control the gateway device to generate and send a voice call interruption control instruction to the core network, the voice call interruption control instruction is used to control the core network to generate a call hold instruction, a call release instruction, and a call setup instruction, the core network sends the call hold instruction to a call opposite end of the terminal to retain a call relationship, the core network sends the call release instruction to the terminal to stop a call state thereof, and the core network uses the call setup instruction to control the terminal to perform a ringing operation and restore a call between the terminal and the call opposite end after the terminal performs a connection operation.
The terminal identifier is specifically used for enabling a base station of a target cell to generate and send a call holding instruction to the target base station when the access information does not meet the access condition of the target area and the terminal is in a connected state, then stopping the call state of the terminal, holding the call state between the terminal and a call opposite end, and sending a voice call to the terminal, wherein the voice call is used for controlling the terminal to execute ringing operation, and restoring the call between the terminal and the call opposite end after the terminal executes a connection operation, and the call holding instruction is used for enabling the target base station to keep the call relation between the terminal and the call opposite end of the terminal. The target base station is a base station connected with the terminal call opposite terminal.
The terminal identification is also used for enabling the base station of the target cell to compare the access information with the access condition, and when the access information does not meet the access condition, corresponding alarm operation is executed, wherein the alarm device is the base station.
More specifically, when the terminal identifier is a temporary mobile subscriber identifier, the admission information verifying device firstly queries a locally stored identifier mapping table in a base station of a third cell, determines an international mobile subscriber identity associated with the temporary mobile subscriber identifier, and generates and sends a voice call interruption control instruction to a core network according to the international mobile subscriber identity; the voice call interruption control instruction is used for controlling a core network to generate a call holding instruction, a call release instruction and a call establishment instruction, the core network sends the call holding instruction to a call opposite end of the terminal to keep a call relation, the core network sends the call release instruction to the terminal to stop the call state of the terminal, and the core network uses the call establishment instruction to control the terminal to execute ringing operation and restore the call between the terminal and the call opposite end after the terminal executes a connection operation. The identification information mapping table represents the mapping relation between the international mobile subscriber identity and the temporary mobile subscriber identity, and the identification information mapping table represents the mapping relation between the international mobile subscriber identity and the temporary mobile subscriber identity. The gateway equipment converts the temporary mobile subscriber identity into an international mobile subscriber identity, which is helpful for determining the core network corresponding to the terminal more accurately.
In the above technical solution, when the terminal enters or approaches the target cell, the base station of the third cell obtains the identification information of the terminal by using the measurement report of the terminal to the target cell to determine that the terminal is to enter the target area, so that the apparatus for storing the admission information checks the admission qualification of the terminal according to the admission conditions preset in the base station, thereby ensuring the accuracy of the admission information check, and the apparatus for automatically obtaining and storing the admission information checks the terminal identification, thereby improving the efficiency of checking the admission information.
Fig. 11 is a schematic structural diagram of a first data processing apparatus 800 according to an embodiment of the present application, the first data processing apparatus 800 includes a first processing module 802, wherein,
a first processing module 802, configured to obtain a terminal identifier of a terminal when the terminal reselects or selects a target cell.
The terminal identification is used for obtaining the access information of the terminal and enabling the alarm device to execute alarm operation when the access information does not meet the access condition; wherein the target cell covers an entrance area of the target area, and the target cell covers an area larger than the entrance area and smaller than the target area.
Fig. 12 is a schematic structural diagram of a second data processing apparatus provided in the present application according to another embodiment, where the second data processing apparatus 900 includes a second processing module 901 and a second obtaining module 902, where,
a second processing module 901, configured to instruct the terminal to generate a measurement report of the target cell when the terminal determines and reports to the base station of the third cell that the reference signal received power of the third cell is lower than a preset power threshold.
A second obtaining module 902, configured to obtain a measurement report sent by the terminal.
The second processing module 901 is further configured to obtain a terminal identifier of the terminal from the measurement report; the terminal identification is used for obtaining the access information of the terminal and enabling the alarm device to execute the alarm operation when the access information does not meet the access condition.
The target cell covers an inlet area of a target area, and the area covered by the target cell is larger than the inlet area and smaller than the target area; the third cell is a neighboring cell of the target cell.
Fig. 13 is a schematic structural diagram of a base station provided in the present application according to an exemplary embodiment, and the base station 903 includes a processor 904 and a memory 905 communicatively connected to the processor.
The memory 905 is used for storing computer instructions executable by the processor.
The processor 904 when executing the computer instructions implements the steps of any of the data processing methods described above in the embodiments that are subject to execution by the base station of the first cell. Reference may be made in particular to the description relating to the method embodiments described above.
Optionally, the memory 905 may be separate or integrated with the processor 904. When the memory 905 is provided separately, the base station 903 further includes a bus for connecting the memory 905 and the processor 904.
The embodiment of the present application further provides a computer-readable storage medium, in which computer instructions are stored, and when a processor executes the computer instructions, the steps in the data processing method in the foregoing embodiment are implemented.
The embodiment of the present application further provides a computer program product, which includes computer instructions, and the computer instructions, when executed by a processor, implement the steps in the data processing method in the foregoing embodiments.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. Such variations, uses, or adaptations follow the general principles of the application and include common general knowledge in the art or use of conventional techniques not disclosed herein. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (27)

1. A data processing method applied to a base station, wherein a target cell corresponding to the base station covers an entry area of a target area, the method comprising:
when the terminal reselects or selects the target cell, acquiring a terminal identifier of the terminal;
the terminal identification is used for obtaining access information of the terminal and enabling the alarm device to execute alarm operation when the access information does not meet the access condition; wherein the target cell covers an area larger than the entry area and smaller than the target area.
2. The method according to claim 1, wherein obtaining the terminal identifier of the terminal after the terminal reselects or selects the target cell specifically comprises:
after the terminal reselects a first cell providing service, acquiring the terminal identifier sent by the terminal;
wherein the target cell comprises the first cell.
3. The method according to claim 2, wherein obtaining the terminal identifier sent by the terminal after the terminal reselects to the first cell providing service includes:
after the terminal in a connection state reselects the first cell and establishes connection with the base station, generating and sending an identifier acquisition request to the terminal; the identification obtaining request is used for controlling the terminal to send the terminal identification to the base station;
and acquiring the terminal identification sent by the terminal.
4. The method according to claim 3, wherein the terminal identifier is used to obtain admission information of the terminal, and when the admission information does not satisfy the admission condition, a core network is enabled to generate a call hold instruction, a call release instruction, and a call setup instruction, the core network sends the call hold instruction to a call opposite end of the terminal to retain a call relationship, the core network sends the call release instruction to the terminal to stop its call state, the core network uses the call setup instruction to control the terminal to perform a ringing operation, and after the terminal performs a connection operation, the call between the terminal and the call opposite end is restored.
5. The method according to claim 2, wherein obtaining the terminal identifier sent by the terminal after the terminal reselects to the first cell providing the service includes:
after the terminal in an idle state reselects the first cell, acquiring a tracking area updating request instruction sent by the terminal;
and obtaining the terminal identification from the tracking area updating request instruction.
6. The method according to claim 1, wherein obtaining the terminal identifier of the terminal after the terminal reselects or selects the target cell specifically comprises:
when the terminal performs registration operation in a first cell providing service, acquiring a registration request instruction sent by the terminal;
obtaining the terminal identification from the registration request instruction; wherein the target cell comprises the first cell.
7. The method according to claim 1, wherein obtaining the terminal identifier of the terminal after the terminal reselects or selects the target cell specifically comprises:
when the terminal reselects a second cell which does not provide service, acquiring a terminal identifier of the terminal;
wherein the target cell comprises the second cell.
8. The method according to claim 7, wherein obtaining the terminal identifier of the terminal after the terminal reselects to the second cell that does not provide service specifically comprises:
after the terminal in an idle state reselects the second cell, acquiring a tracking area updating request instruction sent by the terminal;
and obtaining the terminal identification from the tracking area updating request instruction, and refusing to provide tracking area updating service for the terminal in the second cell.
9. The method according to claim 1, wherein obtaining the terminal identifier of the terminal after the terminal reselects or selects the target cell specifically comprises:
when the terminal performs registration operation in a second cell which does not provide service, acquiring a registration request instruction sent by the terminal;
obtaining a terminal identifier from the registration request instruction, and refusing registration; wherein the target cell comprises the second cell; the second cell is a cell with the highest priority in a target area, or a cell with the shortest duration when the received power determined by the terminal is continuously in a preset power range under the condition that the priorities in the cells covering the target area are the same, or a cell with the largest radio frequency transmitting power under the conditions that the priorities are the same and the durations are the same.
10. The method of claim 1, further comprising:
generating an access information query instruction according to the terminal identification, and sending the access information query instruction to gateway equipment;
and the admission information query instruction is used for controlling a verification server to locally query admission information associated with the terminal identification according to the information obtained by the gateway equipment, and controlling an alarm device to execute corresponding alarm operation when the admission information does not meet the admission condition of the target area.
11. The method according to claim 10, wherein generating an admission information query instruction according to the terminal identifier, and sending the admission information query instruction to a gateway device specifically includes:
generating the access information query instruction according to the terminal identification and the cell identification of the target cell;
sending the access information query instruction to the gateway equipment;
the admission information query instruction is used for controlling the verification server to locally query admission information associated with the terminal identification according to the information obtained by the gateway equipment, query admission conditions associated with the cell identification of the target cell, and control the alarm device to execute corresponding alarm operation when the admission information does not meet the admission conditions.
12. The method of claim 11, wherein when the alerting device supports a fifth generation mobile communication technology, an admission check application is installed in the alerting device; the admission information is also used for controlling the core network to generate and send an application awakening instruction to the alarm device when the verification server determines that the admission information of the terminal does not meet the admission condition, so that the alarm device runs the admission checking application program at the front end to perform alarm operation and/or display the admission information.
13. The method of claim 11, wherein an admission check application is installed in the alarm device, and an application server provides network side service support for the admission check application; the admission information is also used for controlling the check server to send a wake-up control instruction to the application server when the admission information of the terminal is determined not to meet the admission condition, and the wake-up control instruction is used for controlling the application server to send an application wake-up instruction to the alarm device so that the alarm device runs the admission check application program at the front end to enable the alarm device to execute alarm operation and/or display the admission information.
14. The method of claim 1, further comprising:
sending the terminal identification to gateway equipment;
the terminal identification is used for enabling the gateway equipment to inquire the telephone number corresponding to the terminal identification and sending the telephone number to the verification server, the telephone number is used for enabling the verification server to inquire the access information corresponding to the telephone number locally, and when the access information does not meet the access condition of the target area, the alarm device is controlled to execute corresponding alarm operation.
15. The method of claim 1, further comprising:
locally inquiring a terminal access information mapping table by using the terminal identifier to obtain access information associated with the terminal identifier;
comparing the access information with the access condition, generating an alarm request when the access information does not meet the access condition, and sending the alarm request to gateway equipment; the alarm request is used for enabling the gateway equipment to control the alarm device to execute corresponding alarm operation.
16. The method of claim 1, further comprising:
locally inquiring a terminal access information mapping table by using the terminal identifier to obtain access information associated with the terminal identifier;
and comparing the admission information with the admission conditions, and executing corresponding alarm operation when the admission information does not meet the admission conditions.
17. A data processing method applied to a base station of a third cell, the method comprising:
when the terminal determines and reports that the reference signal received power of the third cell is lower than a preset power threshold to the base station of the third cell, the terminal is instructed to generate a measurement report of a target cell;
obtaining a measurement report sent by the terminal, and obtaining a terminal identifier of the terminal from the measurement report; the terminal identification is used for obtaining access information of the terminal and enabling the alarm device to execute alarm operation when the access information does not meet the access condition;
wherein the target cell covers an entrance area of a target area, the target cell covering an area larger than the entrance area and smaller than the target area; the third cell is a neighboring cell of the target cell.
18. The method of claim 17, further comprising:
sending the terminal identification to gateway equipment;
the terminal identification is used for enabling the gateway equipment to inquire the telephone number corresponding to the terminal identification and sending the telephone number to the verification server, the telephone number is used for enabling the verification server to inquire the access information corresponding to the telephone number locally, and when the access information does not meet the access condition of the target area, the alarm device is controlled to execute corresponding alarm operation.
19. The method of claim 17, further comprising:
generating an access information query instruction according to the terminal identification, and sending the access information query instruction to gateway equipment;
the admission information query instruction is used for controlling a verification server to inquire admission information associated with the terminal identification according to the information obtained by the gateway equipment, and controlling the alarm device to execute corresponding alarm operation when the admission information does not meet the admission condition of the target area.
20. The method of claim 17, further comprising:
sending the terminal identification to a base station of the target cell;
the terminal identification is used for enabling the base station of the target cell to locally inquire the access information corresponding to the terminal identification, and when the access information does not meet the access condition corresponding to the target area, the base station controls the alarm device to execute corresponding alarm operation.
21. The method according to claim 20, wherein the terminal identifier is specifically configured to, when the admission information does not satisfy the admission condition of the target area and the terminal is in a connected state, generate an alarm request by a base station of the target cell, and send the alarm request to a gateway device, where the alarm request is used to control the gateway device to generate and send a voice call interruption control instruction to a core network;
the voice call interruption control instruction is used for controlling the core network to generate a call holding instruction, a call release instruction and a call establishment instruction, the core network sends the call holding instruction to a call opposite terminal of the terminal to keep a call relation, the core network sends the call release instruction to the terminal to stop the call state of the terminal, and the core network uses the call establishment instruction to control the terminal to execute ringing operation and restore the call between the terminal and the call opposite terminal after the terminal executes a connection operation.
22. The method according to claim 20, wherein the terminal identifier is specifically configured to enable a base station of the target cell to stop a call state of a terminal, maintain a call state between the terminal and a call peer, and send a voice call to the terminal after generating and sending a call hold instruction to a target base station when the admission information does not satisfy the admission condition of the target area and the terminal is in a connected state, the voice call being used to control the terminal to perform a ringing operation and resume the call between the terminal and the call peer after the terminal performs a connection operation; and the call holding instruction is used for enabling the target base station to reserve the call relation between the terminal and the call opposite end of the terminal.
23. The method of claim 20, wherein the terminal identifier is further configured to enable the base station of the target cell to compare the admission information with the admission condition, and perform a corresponding alarm operation when the admission information does not satisfy the admission condition, wherein the alarm device is the base station.
24. A data processing apparatus, characterized by comprising:
the processing module is used for obtaining a terminal identifier of the terminal when the terminal reselects or selects a target cell;
the terminal identification is used for obtaining access information of the terminal and enabling the alarm device to execute alarm operation when the access information does not meet the access condition; wherein the target cell covers an entrance area of a target area, the target cell covering an area larger than the entrance area and smaller than the target area.
25. A data processing apparatus, comprising:
the processing module is used for indicating the terminal to generate a measurement report of a target cell when the terminal determines and reports that the reference signal received power of a third cell is lower than a preset power threshold to a base station of the third cell;
an obtaining module, configured to obtain a measurement report sent by the terminal;
the processing module is further configured to obtain a terminal identifier of the terminal from the measurement report; the terminal identification is used for obtaining access information of the terminal and enabling the alarm device to execute alarm operation when the access information does not meet the access condition;
wherein the target cell covers an entrance area of a target area, the target cell covering an area larger than the entrance area and smaller than the target area; the third cell is a neighboring cell of the target cell.
26. A base station, comprising: a processor and a memory communicatively coupled to the processor;
the memory stores computer execution instructions;
the processor, when executing the computer executable instructions, is configured to implement a data processing method as claimed in any one of claims 1 to 16.
27. A computer-readable storage medium, having stored thereon computer instructions, which, when executed by a processor, are adapted to implement the method of any one of claims 1 to 16, or the method of data processing according to any one of claims 17 to 23.
CN202210694428.5A 2022-06-20 2022-06-20 Data processing method, device, base station and storage medium Active CN114786237B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210694428.5A CN114786237B (en) 2022-06-20 2022-06-20 Data processing method, device, base station and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210694428.5A CN114786237B (en) 2022-06-20 2022-06-20 Data processing method, device, base station and storage medium

Publications (2)

Publication Number Publication Date
CN114786237A CN114786237A (en) 2022-07-22
CN114786237B true CN114786237B (en) 2022-09-13

Family

ID=82422209

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210694428.5A Active CN114786237B (en) 2022-06-20 2022-06-20 Data processing method, device, base station and storage medium

Country Status (1)

Country Link
CN (1) CN114786237B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN212061244U (en) * 2020-05-26 2020-12-01 成都中科大旗软件股份有限公司 Electronic ticketing device supporting health codes
CN113033293A (en) * 2021-02-03 2021-06-25 北京睿家科技有限公司 Access & exit management equipment, system and method
CN114443977A (en) * 2022-01-21 2022-05-06 支付宝(杭州)信息技术有限公司 Method, device, equipment and medium for acquiring and sending place information

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170142766A1 (en) * 2015-11-17 2017-05-18 Electronics And Telecommunications Research Institute Method and apparatus for controlling access of terminal equipment in wireless communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN212061244U (en) * 2020-05-26 2020-12-01 成都中科大旗软件股份有限公司 Electronic ticketing device supporting health codes
CN113033293A (en) * 2021-02-03 2021-06-25 北京睿家科技有限公司 Access & exit management equipment, system and method
CN114443977A (en) * 2022-01-21 2022-05-06 支付宝(杭州)信息技术有限公司 Method, device, equipment and medium for acquiring and sending place information

Also Published As

Publication number Publication date
CN114786237A (en) 2022-07-22

Similar Documents

Publication Publication Date Title
US8351900B2 (en) Man-in-the-middle detector and a method using it
EP2389032A1 (en) Realization method and related device for switching control
US20120100856A1 (en) Mobile communication system, terminal device, and base station
KR100735664B1 (en) Apparatus and method for providing service status using access class barred list in mobile communication system
KR20090080727A (en) Apparatus and method for terminal handover to different type of system in a broadband wireless access communication system
US9301224B2 (en) Method and apparatus in a network node for establishing neighbor cell relations in a wireless network
CN105704734A (en) Specified type cell detection method, device and communication terminal
CN101141760A (en) Wireless communication terminal and method for checking wireless broadband internet service area using position detection system
CN105722153B (en) Cell reselection method for CE-MTC UE
KR101527551B1 (en) Process for updating additional information stored in a terminal for terminal-based recognition of home base stations in a cellular land mobile system
WO2011069405A1 (en) Handover preprocessing method
US11337054B2 (en) System and method for obtaining an identifier of a mobile communication terminal at a control checkpoint
CN114786237B (en) Data processing method, device, base station and storage medium
KR100938907B1 (en) Apparatus for managing neighbor list and method thereof
US20090325569A1 (en) System and method for device-assisted measurement of neighboring wireless environment
CN107241772B (en) Method for establishing and using neighbor cells of small cell
KR20200009772A (en) Automatically Changing Method of Networks and Terminal device supporting the same
KR20100076264A (en) System and method for network registration in mobile telecommunication
US8676200B2 (en) Mobile communication system, base station device, mobile station device, and handover method
KR101429091B1 (en) Apparatus and method for determining radio access technology for high speed data service in communication system
CN114401537A (en) Network redirection method, device and user equipment
CN108449781B (en) Method and system for realizing roaming of terminal in narrow-band wireless digital communication system
KR20090026877A (en) Mobile terminal unit for managing neighbor list information and method thereof
CN112889315B (en) Cell information processing method and device, electronic equipment and readable storage medium
CN114258111B (en) Method and communication device for determining anchor point cell under non-independent networking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant