CN115297466B - Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station - Google Patents

Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station Download PDF

Info

Publication number
CN115297466B
CN115297466B CN202210920097.2A CN202210920097A CN115297466B CN 115297466 B CN115297466 B CN 115297466B CN 202210920097 A CN202210920097 A CN 202210920097A CN 115297466 B CN115297466 B CN 115297466B
Authority
CN
China
Prior art keywords
base station
small base
identification code
real
management server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210920097.2A
Other languages
Chinese (zh)
Other versions
CN115297466A (en
Inventor
孙丽楠
朱红绿
赵莹莹
郑语晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202210920097.2A priority Critical patent/CN115297466B/en
Publication of CN115297466A publication Critical patent/CN115297466A/en
Application granted granted Critical
Publication of CN115297466B publication Critical patent/CN115297466B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/14Mobility data transfer between corresponding nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an anti-theft method, a system, equipment and a storage medium of an integrated small base station, wherein the method comprises the following steps: the small base station monitors and analyzes the synchronous signals of surrounding neighbor stations, and acquires a real-time neighbor station physical cell identification code set to report to a network management server; the network management server compares the real-time neighbor station physical cell identification code set with the corresponding preset cell identification code set to judge whether the two sets are overlapped or not; when the preset overlapping condition is not met, a deactivation instruction is sent to the small base station, and the small base station is disconnected; the invention can reduce the risk of losing the small base station, does not need to disassemble and assemble the physical anti-theft device, and does not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the flexibility of small base station deployment is improved.

Description

Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station
Technical Field
The invention relates to the field of communication, in particular to an anti-theft method, an anti-theft system, anti-theft equipment and a storage medium for an integrated small base station.
Background
In the construction of a communication network, a base station that performs a radio signal transmitting/receiving function is of no importance. In practice, there are four types of base stations, which are macro base stations, micro base stations, pico base stations and femto base stations, respectively, and correspond to different single carrier transmitting powers and communication coverage radii. The outdoor signal tower is of course the macro base station. The micro base station, the pico base station and the femto base station are small base stations. Of course, since it is 5G, it is a 5G small cell.
The macro base station has the advantages of high transmitting power, wide coverage range, more supportable carrier frequency and user number and larger capacity. However, the macro base station needs to be provided with a separate machine room and an iron tower, so that the volume and the occupied area are not small, and the defects of difficult installation, poor flexibility and the like exist. Therefore, the method is generally applied to outdoor wide area. The small base station can only support one carrier frequency, and can provide smaller capacity, so that the small base station is much smaller than the macro base station in aspects of appearance form, transmitting power, coverage area and the like, and has the characteristics of higher cost performance, easiness in deployment and the like. So that it is mainly applied to indoor scenes as well. Compared with a macro base station, the small base station can deeply penetrate into a room to perform fixed-point deep coverage in weak signals and blind areas. In addition, in some hot spot areas with dense people flow or large data traffic transmission requirements, the small base station can also help the macro base station to share traffic load, so that the system capacity is improved. Thus, the pain points such as poor penetrability, difficult site selection and the like of the 5G macro base station can be effectively solved.
At present, the integrated small base station may be deployed in public places such as factories, small offices, district parking lots, small business spaces and the like, and the integrated small base station is convenient to install, plug and play and has a theft risk. The traditional base station anti-theft method comprises the steps of adding video monitoring, power environment monitoring, access control management, security alarm, linkage and the like, and a physical device is needed to be added for implementation. For the integrated small base station, the deployment cost is increased, and the installation convenience is reduced.
In view of the above, the present invention provides an anti-theft method, system, device and storage medium for an integrated small cell.
It should be noted that the information disclosed in the foregoing background section is only for enhancement of understanding of the background of the invention and thus may include information that does not form the prior art that is already known to those of ordinary skill in the art.
Disclosure of Invention
Aiming at the problems in the prior art, the invention aims to provide an anti-theft method, system, equipment and storage medium of an integrated small base station, which overcome the difficulties in the prior art, can reduce the risk of losing the small base station, does not need to disassemble and assemble a physical anti-theft device, and does not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the flexibility of small base station deployment is improved.
The embodiment of the invention provides an anti-theft method of an integrated small base station, which comprises the following steps:
The small base station monitors and analyzes the synchronous signals of surrounding neighbor stations, and acquires a real-time neighbor station physical cell identification code set to report to a network management server;
the network management server compares the physical cell identification code set of the real-time neighbor station with a corresponding preset cell identification code set to judge whether the two sets are overlapped or not; and
And when the preset overlapping condition is not met, sending a deactivation instruction to the small base station, and enabling the small base station to be offline.
Preferably, the small base station monitors and analyzes synchronization signals of surrounding neighboring stations, obtains a real-time neighboring station physical cell identification code set, and reports the real-time neighboring station physical cell identification code set to a network management server, including:
After the small base station is started, the master synchronizing signal and the auxiliary synchronizing signal of surrounding adjacent stations are intercepted and analyzed;
obtaining a physical cell identification code of each adjacent station according to the primary synchronization signal and the secondary synchronization signal;
And establishing a real-time neighbor station physical cell identification code set and reporting the set to a network management server.
Preferably, the network management server compares the real-time neighboring station physical cell identifier set with a corresponding preset cell identifier set, and determines whether the two sets overlap, including:
Acquiring a union set of the network management server based on the real-time neighbor station physical cell identification code set and a corresponding preset cell identification code set;
acquiring an intersection of the network management server based on the real-time neighbor physical cell identification code set and a corresponding preset cell identification code set;
the obtained percentage of all cell identification codes in the intersection to all cell identification codes in the union;
and when the percentage is smaller than a preset threshold value, the preset overlapping condition is not met.
Preferably, the obtaining the union set of the real-time neighbor physical cell identifier set and the corresponding preset cell identifier set by the network management server further includes:
the preset cell identification code set is a real-time neighbor station physical cell identification code set uploaded when the small base station is started for the first time or started for the last time; or alternatively
And the intersection of the preset cell identification code sets is a set of all adjacent station physical cell identification codes with occurrence frequencies exceeding a preset threshold value in all adjacent station physical cell identification code sets uploaded by the small base station historically.
Preferably, when the preset overlapping condition is not satisfied, sending a deactivation instruction to the small base station, and making the small base station offline, including:
when the small base station does not meet the preset overlapping condition, the network management server sends a deactivation instruction to the small base station;
and the small base station executes the offline operation according to the received deactivation instruction.
Preferably, the method further comprises: and after the small base station is activated by the authorized user, transmitting authorized mobile authentication information to the network management server, and updating the corresponding preset cell identification code set.
Preferably, after the small base station is activated by an authorized user, the small base station sends authorized mobile authentication information to the network management server, and updates a corresponding preset cell identification code set, including:
The small base station is activated by an authorized user;
after the small base station is activated, monitoring and analyzing synchronous signals of surrounding neighbor stations to obtain a real-time neighbor station physical cell identification code set;
The small base station sends authorization mobile authentication information to the network management server, wherein the authorization mobile authentication information comprises small base station activation information, authorization user information for activation and a real-time neighbor station physical cell identification code set after activation;
and the network management server updates the preset cell identification code set corresponding to the small base station into the activated real-time neighbor physical cell identification code set.
The embodiment of the invention provides another anti-theft method of an integrated small base station, which is implemented in the small base station and comprises the following steps of:
monitoring and analyzing synchronous signals of surrounding neighbor stations, obtaining a real-time neighbor station physical cell identification code set and reporting the real-time neighbor station physical cell identification code set to a network management server;
executing offline operation according to the received deactivation instruction; and
And when receiving the operation of activating the cell after receiving the authorized login, transmitting authorized mobile authentication information to the network management server.
The embodiment of the invention provides another anti-theft method of an integrated small base station, which is implemented in a network management server and comprises the following steps:
Receiving a real-time neighbor station physical cell identification code set uploaded by the small base station;
based on the comparison between the real-time neighbor station physical cell identification code set and the corresponding preset cell identification code set, judging whether the two sets are overlapped; and
And when the preset overlapping condition is not met, sending a deactivation instruction to the small base station, and enabling the small base station to be offline.
The embodiment of the invention also provides an anti-theft system of the integrated small base station, which is used for realizing the anti-theft method of the integrated small base station, and comprises the following steps:
The small base station monitors and analyzes synchronous signals of surrounding neighbor stations, obtains a real-time neighbor station physical cell identification code set and reports the real-time neighbor station physical cell identification code set to the network management server;
the network management server judges whether the two sets overlap or not based on the comparison between the real-time neighbor physical cell identification code set and the corresponding preset cell identification code set;
and the deactivation instruction module is used for sending a deactivation instruction to the small base station when the preset overlapping condition is not met, so that the small base station is disconnected.
The embodiment of the invention also provides anti-theft equipment of the integrated small base station, which comprises:
A processor;
A memory having stored therein executable instructions of the processor;
Wherein the processor is configured to perform the steps of the above-described theft prevention method of an integrated small cell via execution of the executable instructions.
Embodiments of the present invention also provide a computer-readable storage medium storing a program that, when executed, implements the steps of the antitheft method of an integrated small base station described above.
The invention aims to provide an anti-theft method, an anti-theft system, anti-theft equipment and a storage medium for an integrated small base station, which can reduce the risk of losing the small base station, do not need to disassemble and assemble a physical anti-theft device, and do not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the flexibility of small base station deployment is improved.
Drawings
Other features, objects and advantages of the present invention will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings.
Fig. 1 is a flow chart of an anti-theft method of an integrated small cell of the present invention.
Fig. 2 is a flowchart of step S110 in an embodiment of the anti-theft method of the integrated small cell of the present invention.
Fig. 3 is a flowchart of step S120 in an embodiment of the anti-theft method of the integrated small cell of the present invention.
Fig. 4 is a flowchart of step S130 in an embodiment of the anti-theft method of the integrated small cell of the present invention.
Fig. 5 is another flow chart of the theft prevention method of the integrated small cell of the present invention.
Fig. 6 is a flowchart of step S140 in an embodiment of the anti-theft method of the integrated small cell of the present invention.
Fig. 7 is another flow chart of the theft prevention method of the integrated small cell of the present invention.
Fig. 8 is a further flowchart of the theft prevention method of the integrated small cell of the present invention.
Fig. 9 is a schematic block diagram of an anti-theft system of an integrated small cell of the present invention.
Fig. 10 is a block diagram of a network access module in an embodiment of the anti-theft system of an integrated small cell of the present invention.
Fig. 11 is a block diagram of a network configuration module in an embodiment of the antitheft system of the integrated small base station of the invention.
Fig. 12 is a schematic block diagram of a communication detection module in an embodiment of the anti-theft system of the integrated small cell of the present invention.
Fig. 13 is another block diagram of the anti-theft system of the integrated small cell of the present invention.
Fig. 14 is a schematic block diagram of an active reporting module in an embodiment of the anti-theft system of the integrated small cell of the present invention.
Fig. 15 is a schematic diagram of a small cell listening to surrounding base stations during implementation of the anti-theft method of the integrated small cell of the present invention.
Fig. 16 is a schematic diagram of main modules of each part in the implementation process of the anti-theft method of the integrated small base station.
Fig. 17 is a timing chart of an implementation procedure of the antitheft method of the integrated small base station of the invention.
Fig. 18 is a schematic view of an anti-theft device of the integrated small cell of the present invention.
Detailed Description
Other advantages and effects of the present application will be readily apparent to those skilled in the art from the following disclosure, which describes the embodiments of the present application by way of specific examples. The application may be practiced or carried out in other embodiments and with various details, and various modifications and alterations may be made to the details of the application from various points of view and applications without departing from the spirit of the application. It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other.
The embodiments of the present application will be described in detail below with reference to the attached drawings so that those skilled in the art to which the present application pertains can easily implement the present application. This application may be embodied in many different forms and is not limited to the embodiments described herein.
In the context of the present description, reference to the terms "one embodiment," "some embodiments," "examples," "particular examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. Furthermore, the particular features, structures, materials, or characteristics may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples, as well as features of various embodiments or examples, presented herein may be combined and combined by those skilled in the art without conflict.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the context of the present application, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
For the purpose of clarity of explanation of the present application, components that are not related to the explanation are omitted, and the same or similar components are given the same reference numerals throughout the description.
Throughout the specification, when a device is said to be "connected" to another device, this includes not only the case of "direct connection" but also the case of "indirect connection" with other elements interposed therebetween. In addition, when a certain component is said to be "included" in a certain device, unless otherwise stated, other components are not excluded, but it means that other components may be included.
When a device is said to be "on" another device, this may be directly on the other device, but may also be accompanied by other devices therebetween. When a device is said to be "directly on" another device in contrast, there is no other device in between.
Although the terms first, second, etc. may be used herein to connote various elements in some instances, the elements should not be limited by the terms. These terms are only used to distinguish one element from another element. For example, a first interface, a second interface, etc. Furthermore, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," and/or "including" specify the presence of stated features, steps, operations, elements, components, items, categories, and/or groups, but do not preclude the presence, presence or addition of one or more other features, steps, operations, elements, components, items, categories, and/or groups. The terms "or" and/or "as used herein are to be construed as inclusive, or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a, A is as follows; b, a step of preparing a composite material; c, performing operation; a and B; a and C; b and C; A. b and C). An exception to this definition will occur only when a combination of elements, functions, steps or operations are in some way inherently mutually exclusive.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the language clearly indicates the contrary. The meaning of "comprising" in the specification is to specify the presence of stated features, regions, integers, steps, operations, elements, and/or components, but does not preclude the presence or addition of other features, regions, integers, steps, operations, elements, and/or components.
Although not differently defined, including technical and scientific terms used herein, all have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The term addition defined in the commonly used dictionary is interpreted as having a meaning conforming to the contents of the related art document and the current hint, so long as no definition is made, it is not interpreted as an ideal or very formulaic meaning too much.
Fig. 1 is a flow chart of an anti-theft method of an integrated small cell of the present invention. As shown in fig. 1, the invention relates to the field of network configuration, and discloses an anti-theft method of an integrated small base station, which comprises the following steps:
S110, the small base station monitors and analyzes the synchronous signals of surrounding neighbor stations, and acquires a real-time neighbor station physical cell identification code set to report to a network management server.
S120, the network management server compares the physical cell identification code set of the real-time neighbor station with the corresponding preset cell identification code set to judge whether the two sets are overlapped. And
And S130, when the preset overlapping condition is not met, sending a deactivation instruction to the small base station, and enabling the small base station to be offline.
The anti-theft method of the integrated small base station can reduce the risk of losing the small base station, does not need to disassemble and assemble a physical anti-theft device, and does not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the flexibility of small base station deployment is improved.
According to the invention, a physical anti-theft device is not required to be added, the position information is automatically reported to the small base station network manager through the integrated small base station, once the network manager discovers that the position information of the small base station is changed, a configuration command is issued to deactivate a cell, and the small base station cannot work after being stolen, so that the loss probability is reduced. The traditional base station anti-theft method adopts physical devices, and is inconvenient if the mobile small base station needs to remove the devices and reinstall the devices. The invention controls whether the small base station is allowed to work or not through the network management or the local Web, thereby facilitating the movement of the small base station by the client.
Fig. 2 is a flowchart of step S110 in an embodiment of the anti-theft method of the integrated small cell of the present invention. Fig. 3 is a flowchart of step S120 in an embodiment of the anti-theft method of the integrated small cell of the present invention. Fig. 4 is a flowchart of step S130 in an embodiment of the anti-theft method of the integrated small cell of the present invention. As shown in fig. 2 to 4, in the embodiment of fig. 1, steps S110, S120, S130, S140, S150 are replaced with steps S111, S112, S113, steps S120 are replaced with steps S121, S122, S123, S124, steps S130 are replaced with steps S131, S132, and each step is described below:
S111, after the small base station is started, the Primary Synchronization Signal (PSS) and the Secondary Synchronization Signal (SSS) of surrounding neighbor stations are intercepted and analyzed.
S112, the physical cell identification code of each adjacent station is obtained according to the primary synchronization signal and the secondary synchronization signal. In LTE networks, pci=pss+3 sss. PSS (Primary Synchronization Signal) primary synchronization signals occupy 6 RBs, namely 72sc, of the system bandwidth in the frequency domain, and indicate ID PHYSICAL-layer id in one physical cell group: 0,1,2 (3). PSS values of 0..2 (3 different PSS sequences in practice) SSS values of 0..167 (168 different SSS sequences in practice) PCI can be obtained ranging from 0..503 using the above formula, so there are 504 PCIs in the physical layer. Wherein, the PSS is collectively referred to as Primary Synchronization Signal, namely, a primary synchronization signal, and is used for transmitting an intra-group ID, namely, N (2) _ID value. The SSS is collectively referred to as Secondary Synchronization Signal, a secondary synchronization signal, for transmitting the group ID, N (1) _ID value. RSRP (REFERENCE SIGNAL RECEIVED Power ), -44 to-140 dBm, the larger the value is, the better. RSSI (RECEIVED SIGNAL STRENGTHEN Indicator), range of values: -110-90. RSRQ (REFERENCE SIGNAL RECEIVED Quality ), range of values: -3 to-19.5, the larger the value, the better rsrq=n RSRP/RSSI. SINR (Signal to Interference & Noise Ratio) is the Ratio of the useful signal power to the sum of the interference and Noise power, directly reflecting the quality of the received signal. SNR is an abbreviation of signal to noise ratio, signal-to-noise ratio, which refers to the ratio between the level of a useful signal measured under specified conditions and the level of electromagnetic noise. The ratio of the amplitude of the useful signal at any point to the amplitude of the noise signal at the same point is expressed in decibels (dB). The peak value is associated with impulse noise and the effective value is associated with random noise.
S113, establishing a real-time neighbor station physical cell identification code set and reporting the set to a network management server.
S121, obtaining a union set of the network management server based on the real-time neighbor station physical cell identification code set and the corresponding preset cell identification code set. The preset cell identification code set is a real-time neighbor station physical cell identification code set uploaded when the small base station is started for the first time or started for the last time; or the preset cell identification code set is a set of all adjacent station physical cell identification codes with occurrence frequencies exceeding a preset threshold value in all adjacent station physical cell identification code sets uploaded by the small base station historically.
S122, acquiring an intersection set of the network management server based on the real-time neighbor station physical cell identification code set and the corresponding preset cell identification code set.
S123, the obtained cell identification codes in the intersection account for the percentage of all the cell identification codes in the union.
And S124, when the percentage is smaller than a preset threshold value, the preset overlapping condition is not met. For example: the preset cell identification code sets are { A1, A2, A3, A4 and A5}, the network management server is based on the fact that the real-time neighbor station physical cell identification code sets are { A1, A2, A3 and A4}, the intersection of the two sets is the union { A1, A2, A3, A4 and A5}, the percentage of the cell identification codes in the intersection to the cell identification codes in the union is 80%, if the preset threshold value is 75%, the actual measurement result is greater than the preset threshold value by 75%, and the condition that the preset overlapping condition is met is considered to be met, so that no movement occurs. If the percentage of the actual measurement result is 60% and is smaller than the preset threshold value, the preset overlapping condition is considered not to be met, and the small base station is considered to be moved.
In a preferred embodiment, in order to avoid the situation that other surrounding base stations are mistakenly considered to be moved (the neighboring base station sets where the surrounding base stations can receive the synchronization signal are all changed) due to the temporary outage or failure of the respective small base stations, when the network management server does not include all the cell identifiers in the preset cell identifier set based on the physical cell identifier set of the real-time neighboring base stations, the network management server trains whether the other surrounding small base stations of the non-included small base stations can obtain the cell identifier of the non-included small base station, and if not, temporarily deletes the cell identifier of the non-included small base station from the preset cell identifier set, thereby avoiding the interference to the identification accuracy in the case of temporary outage.
S131, when the small base station does not meet the preset overlapping condition, the network management server sends a deactivation instruction to the small base station.
S132, the small base station executes the offline operation according to the received deactivation instruction.
When the small base station is started and electrified, the synchronous signals of the adjacent cells are monitored, PCI of the adjacent cells are analyzed and reported to a network manager, the network manager identifies the PCI change condition and judges whether the small base station is changed in position, if the small base station is considered to be changed in position, the small base station is possibly stolen, a command for deactivating the cell is issued, and the small base station is disabled. If the mobile small base station is a client, once the small base station is disabled, identity authentication can be performed through a local Web, and then a cell is activated, so that the small base station is re-started; meanwhile, the small base station sends a message to the network manager, and considers that the situation belongs to normal position movement, the network manager updates the initial PCI set, and the cell deactivation operation is not executed.
Fig. 5 is another flow chart of the theft prevention method of the integrated small cell of the present invention. As shown in fig. 5, the present invention relates to the field of network configuration, and is a method for preventing theft of an integrated small base station, and the flow of the present invention is shown in fig. 5, in the embodiment of fig. 1, on the basis of steps S110, S120, and S130, step S140 is added, after the small base station is activated by an authorized user, authorized mobile authentication information is sent to a network management server, and a corresponding preset cell identification code set is updated. At this time, the network manager does not execute the deactivation operation any more, and the small base station can be normally used. And after updating the corresponding preset cell identification code set, the network manager can continue the anti-theft method of the integrated small base station of the invention, but not limited to the method.
Fig. 6 is a flowchart of step S140 in an embodiment of the anti-theft method of the integrated small cell of the present invention. As shown in fig. 6, step S140 includes the steps of:
S141, the small base station is activated by the authorized user.
S142, after the small base station is activated, monitoring and analyzing synchronous signals of surrounding neighbor stations to obtain a real-time neighbor station physical cell identification code set.
S143, the small base station sends authorization mobile authentication information to the network management server, wherein the authorization mobile authentication information comprises small base station activation information, authorization user information for activation and a real-time neighbor station physical cell identification code set after activation.
S144, the network management server updates the preset cell identification code set corresponding to the small base station into the activated real-time neighbor physical cell identification code set.
After the user can move the small base station by himself to obtain a new place (the small base station is deactivated), logging in the local web of the small base station through the authorized account, and activating the small base station locally. Because the neighbor physical cell identification codes around the new place are completely different from the previous place, the preset cell identification code set corresponding to the activated small base station after being moved needs to be updated, and the real-time neighbor physical cell identification code set needs to be added into the authorized mobile authentication information through the reporting activation, so that the network management server updates the preset cell identification code set corresponding to the small base station into the activated real-time neighbor physical cell identification code set, thereby enabling the small base station to be normally started up for use in the new place and continuing the anti-theft method of the integrated small base station.
Fig. 7 is another flow chart of the theft prevention method of the integrated small cell of the present invention. As shown in fig. 7, the present invention relates to the field of network configuration, and is a method for an integrated small base station anti-theft method applied to a small base station, and the flow of the present invention includes:
s210, monitoring and analyzing synchronous signals of surrounding neighbor stations, obtaining a real-time neighbor station physical cell identification code set and reporting the real-time neighbor station physical cell identification code set to a network management server;
S220, executing offline operation according to the received deactivation instruction; and
S230, when receiving the operation of activating the cell after receiving the authorized login, transmitting the authorized mobile authentication information to the network management server.
The implementation principle of the above steps is referred to the related description in the anti-theft method of the integrated small base station, and will not be repeated here.
Fig. 8 is a further flowchart of the theft prevention method of the integrated small cell of the present invention. As shown in fig. 8, the present invention relates to the field of network configuration, and is a method for preventing theft of an integrated small base station applied to a network management server, wherein the process of the present invention includes:
S310, receiving a real-time neighbor station physical cell identification code set uploaded by a small base station;
S320, comparing the real-time neighbor station physical cell identification code set with a corresponding preset cell identification code set, and judging whether the two sets are overlapped; and
S330, when the preset overlapping condition is not met, a deactivation instruction is sent to the small base station, and the small base station is disconnected.
The implementation principle of the above steps is referred to the related description in the anti-theft method of the integrated small base station, and will not be repeated here.
Fig. 9 is a schematic block diagram of an anti-theft system of an integrated small cell of the present invention. As shown in fig. 9, the anti-theft system of the integrated small base station of the present invention includes, but is not limited to:
The identification code analyzing module 51 is used for the small base station to monitor and analyze the synchronous signals of the surrounding neighbor stations, obtain a real-time neighbor station physical cell identification code set and report the real-time neighbor station physical cell identification code set to the network management server;
The similarity judging module 52 is used for comparing the real-time neighbor physical cell identification code set with the corresponding preset cell identification code set by the network management server to judge whether the two sets are overlapped or not; and
And the deactivation instruction module 53 sends a deactivation instruction to the small base station to enable the small base station to be offline when the preset overlapping condition is not met.
The implementation principle of the above module is referred to the related description in the anti-theft method of the integrated small base station, and will not be repeated here.
The anti-theft system of the integrated small base station can reduce the risk of losing the small base station, does not need to disassemble and assemble a physical anti-theft device, and does not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the flexibility of small base station deployment is improved.
Fig. 10 is a block diagram of a network access module in an embodiment of the anti-theft system of an integrated small cell of the present invention. Fig. 11 is a block diagram of a network configuration module in an embodiment of the antitheft system of the integrated small base station of the invention. Fig. 12 is a schematic block diagram of a communication detection module in an embodiment of the anti-theft system of the integrated small cell of the present invention. As shown in fig. 10 to 12, on the basis of the embodiment of the apparatus of fig. 9, the anti-theft system of the integrated small base station of the present invention replaces the identification code analysis module 51 by the signal interception module 511, the identification code calculation module 512 and the collection reporting module 513. The similarity determination module 52 is replaced by an identification code union module 521, an identification code intersection module 522, a percentage of overlap module 523, and an overlap determination module 524. The deactivation instruction module 53 is replaced by the deactivation sending module 531, the offline operation module 532. The following is described for each module:
the signal interception module 511 intercepts and parses a Primary Synchronization Signal (PSS) and a Secondary Synchronization Signal (SSS) of surrounding neighbor stations when the small base station is started.
The identifier calculation module 512 obtains the physical cell identifier of each neighboring station according to the primary synchronization signal and the secondary synchronization signal. In LTE networks, pci=pss+3 sss. PSS (Primary Synchronization Signal) primary synchronization signals occupy 6 RBs, namely 72sc, of the system bandwidth in the frequency domain, and indicate ID PHYSICAL-layer id in one physical cell group: 0,1,2 (3). PSS values of 0..2 (3 different PSS sequences in practice) SSS values of 0..167 (168 different SSS sequences in practice) PCI can be obtained ranging from 0..503 using the above formula, so there are 504 PCIs in the physical layer.
And the collection reporting module 513 establishes a real-time neighbor physical cell identification code collection and reports the collection to the network management server.
The identifier union module 521 obtains a union of the network management server based on the real-time neighboring station physical cell identifier set and the corresponding preset cell identifier set. The preset cell identification code set is a real-time neighbor station physical cell identification code set uploaded when the small base station is started for the first time or started for the last time; or the preset cell identification code set is a set of all adjacent station physical cell identification codes with occurrence frequencies exceeding a preset threshold value in all adjacent station physical cell identification code sets uploaded by the small base station historically.
The identifier intersection module 522 obtains an intersection of the network management server based on the real-time neighbor physical cell identifier set and the corresponding preset cell identifier set.
The overlap percentage module 523 obtains the percentage of all cell identities in the intersection to all cell identities in the union.
And an overlap determination module 524, configured to consider that the preset overlap condition is not satisfied when the percentage is less than the preset threshold.
And the deactivation sending module 531 sends a deactivation instruction to the small base station by the network management server when the small base station does not meet the preset overlapping condition.
And an offline operation module 532, where the small base station performs offline operation according to the received deactivation instruction.
The implementation principle of the above steps is referred to the related description in the anti-theft method of the integrated small base station, and will not be repeated here.
Fig. 13 is another block diagram of the anti-theft system of the integrated small cell of the present invention. Fig. 13 shows that, based on the embodiment of the apparatus of fig. 9, the anti-theft system of the integrated small cell of the present invention further comprises an activation reporting module 54. The following is described for each module: the activation reporting module 54 sends the authorized mobile authentication information to the network management server after the small base station is activated by the authorized user, and updates the corresponding preset cell identification code set, so that the corresponding preset cell identification code set can be updated again after the user replaces the small base station, and the anti-theft method of the integrated small base station can be continued.
Fig. 14 is a schematic block diagram of an active reporting module in an embodiment of the anti-theft system of the integrated small cell of the present invention. As shown in fig. 14, the active reporting module 54 includes the following modules:
and an authorization activation module 541, where the small cell is activated by an authorized user.
And activating a interception module 542, and intercepting and analyzing the synchronous signals of surrounding neighbor stations after the small base station is activated to obtain a real-time neighbor station physical cell identification code set.
The authorization authentication module 543 sends authorization mobile authentication information to the network management server, where the authorization mobile authentication information includes the activation information of the small base station, the activated authorization user information, and the activated set of physical cell identifiers of the real-time neighboring station.
And an identification updating module 544, wherein the network management server updates the preset cell identification code set corresponding to the small base station into the activated real-time neighbor physical cell identification code set.
Fig. 15 is a schematic diagram of a small cell listening to surrounding base stations during implementation of the anti-theft method of the integrated small cell of the present invention. Fig. 16 is a schematic diagram of main modules of each part in the implementation process of the anti-theft method of the integrated small base station. Fig. 17 is a timing chart of an implementation procedure of the antitheft method of the integrated small base station of the invention. Fig. 15, 16, and 17 are schematic diagrams of implementation procedures of the anti-theft method of the integrated small cell of the present invention. The specific implementation flow of the anti-theft method of the integrated small base station is shown in fig. 15, 16 and 17 (only the part related to the invention is described as follows:
Referring to fig. 15 and 16, the integrated small base station 3 (not shown) listens to and records PCI information of surrounding base stations, and reports the PCI information set to the network management server 4. The network management server 4 records the PCI information set reported by the integrated small base station 3, and if the number of the PCI changed in the PCI information set exceeds a certain threshold, the position of the small base station 3 is considered to be changed. The network management server 4 issues a cell deactivation instruction to the integrated small cell 3. If the client wants to manually move the position of the integrated small base station 3, the client can log in the local Web2, and after the identity information is verified, the local Web2 issues an instruction for activating the cell. After the method is used, a physical device is not required to be added, the small base station 3 reports the PCI information of the adjacent station 1, and the network management server 4 automatically controls the small base station 3 at the moved position to be inoperable according to the information change, so that the loss probability is reduced. If the customer himself wants to move the small base station 3, the small base station 3 is reconfigured to work after the identity information is verified through the local Web 2.
Compared with the prior art, the small base station 3 is additionally provided with a synchronous signal interception and analysis module for
(A) After the small base station 3 is powered on, the synchronous signals of surrounding neighbor stations 1 are intercepted, the PCI of the neighbor cells are analyzed according to PSS and SSS and recorded to the PCI set of the neighbor cells, and the PCI set is reported to the network management server 4.
(B) When the client performs identity verification through the local Web2 and performs cell activation operation, the small base station 3 reports the autonomous position mobile message to the network management server 4, and the autonomous position mobile message carries identity authentication information and cell activation information.
And a new small base station 3 position identification module and a modification configuration module are added in the network management server 4.
(1) A small base station 3 position identification module, configured to:
a) And presetting a PCI number change threshold value in the PCI set, and judging whether the small base station 3 moves or not. And taking the PCI set reported by the small base station 3 when the small base station is powered on for the first time as an initial PCI set. If the number of the PCI which changes in the PCI set which is subsequently reported by the small base station 3 is larger than the threshold value compared with the initial PCI set, the small base station 3 is considered to be moved, and if the small base station 3 is possibly stolen, a configuration module is informed to deactivate the cell of the small base station 3; otherwise, the processing is not performed.
B) And the network management server 4 considers that the position movement is reasonable after receiving the autonomous position movement message reported by the small base station 3, updates the initial PCI set and does not issue the configuration of the deactivated cell.
(2) A modification configuration module for: and after receiving the information of deactivating the small base station 3 sent by the small base station 3 position identification module, executing a deactivation command.
A client identity authentication module and a configuration modification module are newly added in the local Web 2.
(1) A client identity authentication module for: the authentication of the customer identity can be an identity card, a telephone number, a password and the like, and the operation of activating the cell can be performed through the local Web2 after the authentication is passed.
(2) A modification configuration module for: after the identity of the client passes, the operation of activating the cell can be executed; otherwise, the operation is not allowed to be performed.
Referring to fig. 17, the implementation procedure is as follows:
Step 1, the small base station 3 monitors the synchronous signal of the adjacent station 1, analyzes the PCI and reports the adjacent cell PCI set to the network management server 4.
And 2, the network management server 4 takes the PCI set reported by the small base station 3 after the first power-on as an initial PCI set, and if the PCI set reported by the subsequent small base station 3 is compared with the initial PCI set, the changed PCI number exceeds a certain threshold value, the small base station 3 is considered to move, the possibility of theft exists, and a command for deactivating the cell is issued to the small base station 3.
And 3, if the client moves the position of the small base station 3, the client identity authentication can be performed through the local Web2, and after the client passes the authentication, a command for activating the cell is issued to the small base station 3.
And step 4, the small base station 3 receives the cell activating command issued by the local Web2, executes the cell activating action, and reports the client identity authentication information and the cell activating information to the network management server 4.
And step 5, after receiving the identity authentication information and the cell activation information of the small cell 3, the network management server 4 considers that the client manually moves the position of the small cell 3 and updates the initial PCI set.
Compared with the prior art, the invention has the technical key points that:
the integrated small base station has the characteristics of plug and play, convenient installation and use and the like, and is easy to be stolen when being applied to public places such as small factories, small commercial spaces, district parking lots and the like.
The existing base station anti-theft scheme comprises: the video monitoring, the power environment monitoring, the access control management, the security alarm, the linkage and the like are added, and the base station is prevented from being lost by adding a physical device. If applied to an integrated small cell, the following problems exist:
1. The integrated small base station has the advantages of low cost, convenience in installation, reduction in construction, additional cost introduced by adding the physical anti-theft device, complexity in physical construction, and poorer experience along with the increase of the deployment quantity of the small base station.
2. When some customers use the integrated small base station, the deployment position of the small base station can be changed according to service requirements, and if a physical anti-theft device is adopted, the anti-theft device also needs to move along with the small base station when the position of the small base station is changed, so that the convenience is poor.
After the method of the invention is applied, the small base station cannot be used after being stolen, and the probability of being stolen can be greatly reduced:
1. the method of the invention can reduce the risk of losing the small base station without adding a physical anti-theft device, and the small base station and the neighbor station as well as the information interaction between the small base station and the network manager as well as the local Web, thereby not affecting the convenience of the small base station and not increasing the cost.
2. For small base station clients, the method does not need to disassemble and assemble the physical anti-theft device, is more convenient for moving the installation position of the integrated small base station, and improves the flexibility of use.
The embodiment of the invention also provides anti-theft equipment of the integrated small base station, which comprises a processor. A memory having stored therein executable instructions of a processor. Wherein the processor is configured to execute the steps of the theft prevention method of the integrated small cell via execution of the executable instructions.
As described above, the anti-theft system of the integrated small base station of the embodiment of the invention can reduce the risk of losing the small base station, does not need to disassemble and assemble the physical anti-theft device, and does not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the flexibility of small base station deployment is improved.
Those skilled in the art will appreciate that the various aspects of the invention may be implemented as a system, method, or program product. Accordingly, aspects of the invention may be embodied in the following forms, namely: an entirely hardware embodiment, an entirely software embodiment (including firmware, micro-code, etc.) or an embodiment combining hardware and software aspects may be referred to herein as a "circuit," module "or" platform.
Fig. 18 is a schematic view of an anti-theft device of the integrated small cell of the present invention. An electronic device 600 according to this embodiment of the invention is described below with reference to fig. 18. The electronic device 600 shown in fig. 18 is merely an example, and should not be construed as limiting the functionality and scope of use of embodiments of the present invention.
As shown in fig. 18, the electronic device 600 is in the form of a general purpose computing device. Components of electronic device 600 may include, but are not limited to: at least one processing unit 610, at least one memory unit 620, a bus 630 connecting the different platform components (including memory unit 620 and processing unit 610), a display unit 640, etc.
Wherein the storage unit stores program code executable by the processing unit 610 such that the processing unit 610 performs the steps according to various exemplary embodiments of the present invention described in the above-described electronic prescription flow processing method section of the present specification. For example, the processing unit 610 may perform the steps as shown in fig. 1.
The storage unit 620 may include readable media in the form of volatile storage units, such as Random Access Memory (RAM) 6201 and/or cache memory unit 6202, and may further include Read Only Memory (ROM) 6203.
The storage unit 620 may also include a program/utility 6204 having a set (at least one) of program modules 6205, such program modules 6205 including, but not limited to: processing systems, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 630 may be a local bus representing one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or using any of a variety of bus architectures.
The electronic device 600 may also communicate with one or more external devices 700 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with the electronic device 600, and/or any device (e.g., router, modem, etc.) that enables the electronic device 600 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 650. Also, electronic device 600 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 660. The network adapter 660 may communicate with other modules of the electronic device 600 over the bus 630. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 600, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage platforms, and the like.
The embodiment of the invention also provides a computer readable storage medium for storing a program, and the steps of the anti-theft method of the integrated small base station are realized when the program is executed. In some possible embodiments, the aspects of the present invention may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps according to the various exemplary embodiments of the invention as described in the electronic prescription stream processing method section of this specification, when the program product is run on the terminal device.
As described above, the anti-theft system of the integrated small base station of the embodiment of the invention can reduce the risk of losing the small base station, does not need to disassemble and assemble the physical anti-theft device, and does not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the flexibility of small base station deployment is improved.
The program product 800 for implementing the above-described method according to an embodiment of the present invention may employ a portable compact disc read-only memory (CD-ROM) and include program code and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out processes of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
In summary, the present invention aims to provide an anti-theft method, system, device and storage medium for an integrated small base station, which can reduce the risk of small base station loss, without the need of disassembling and assembling a physical anti-theft device, and without increasing the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the flexibility of small base station deployment is improved.
The foregoing is a further detailed description of the invention in connection with the preferred embodiments, and it is not intended that the invention be limited to the specific embodiments described. It will be apparent to those skilled in the art that several simple deductions or substitutions may be made without departing from the spirit of the invention, and these should be considered to be within the scope of the invention.

Claims (9)

1. An anti-theft method of an integrated small base station is characterized by comprising the following steps:
The small base station monitors and analyzes the synchronous signals of surrounding neighbor stations, and acquires a real-time neighbor station physical cell identification code set to report to a network management server;
Acquiring a union set of the real-time neighbor physical cell identifier set and a corresponding preset cell identifier set by the network management server, acquiring the intersection set of the real-time neighbor physical cell identifier set and the corresponding preset cell identifier set by the network management server, wherein all cell identifiers in the intersection set acquired account for the percentage of all cell identifiers in the union set, when the percentage is smaller than a preset threshold value, the preset overlapping condition is considered not met, and when the real-time neighbor physical cell identifier set does not contain all cell identifiers in the preset cell identifier set by the network management server, polling whether other surrounding small base stations of the small base stations which are not contained can acquire the cell identifiers of the small base stations which are not contained or not, and if not, temporarily deleting the cell identifiers of the small base stations which are not contained from the preset cell identifier set; and
And when the preset overlapping condition is not met, sending a deactivation instruction to the small base station, and enabling the small base station to be offline.
2. The antitheft method of an integrated small base station according to claim 1, wherein the small base station listens to and analyzes synchronization signals of surrounding neighboring stations, obtains a real-time neighboring station physical cell identification code set, and reports the real-time neighboring station physical cell identification code set to a network management server, and comprises:
After the small base station is started, the master synchronizing signal and the auxiliary synchronizing signal of surrounding adjacent stations are intercepted and analyzed;
obtaining a physical cell identification code of each adjacent station according to the primary synchronization signal and the secondary synchronization signal;
And establishing a real-time neighbor station physical cell identification code set and reporting the set to a network management server.
3. The antitheft method of the integrated small base station according to claim 1, wherein said obtaining the union of the real-time neighbor physical cell identifier set and the corresponding preset cell identifier set by the network management server further comprises:
the preset cell identification code set is a real-time neighbor station physical cell identification code set uploaded when the small base station is started for the first time or started for the last time; or alternatively
And the intersection of the preset cell identification code sets is a set of all adjacent station physical cell identification codes with occurrence frequencies exceeding a preset threshold value in all adjacent station physical cell identification code sets uploaded by the small base station historically.
4. The antitheft method of an integrated small base station according to claim 1, wherein when a preset overlap condition is not satisfied, sending a deactivation instruction to the small base station to take the small base station off line includes:
when the small base station does not meet the preset overlapping condition, the network management server sends a deactivation instruction to the small base station;
and the small base station executes the offline operation according to the received deactivation instruction.
5. The antitheft method of an integrated small base station according to claim 1, characterized by further comprising: and after the small base station is activated by the authorized user, transmitting authorized mobile authentication information to the network management server, and updating the corresponding preset cell identification code set.
6. The antitheft method of the integrated small base station according to claim 5, wherein after the small base station is activated by an authorized user, transmitting authorized mobile authentication information to the network management server, updating a corresponding preset cell identification code set, comprising:
The small base station is activated by an authorized user;
after the small base station is activated, monitoring and analyzing synchronous signals of surrounding neighbor stations to obtain a real-time neighbor station physical cell identification code set;
The small base station sends authorization mobile authentication information to the network management server, wherein the authorization mobile authentication information comprises small base station activation information, authorization user information for activation and a real-time neighbor station physical cell identification code set after activation;
and the network management server updates the preset cell identification code set corresponding to the small base station into the activated real-time neighbor physical cell identification code set.
7. An antitheft system of an integrated small base station, comprising
The small base station monitors and analyzes synchronous signals of surrounding neighbor stations, obtains a real-time neighbor station physical cell identification code set and reports the real-time neighbor station physical cell identification code set to the network management server;
The network management server obtains the intersection of the physical cell identifier set of the real-time neighbor station and the corresponding preset cell identifier set based on the union of the physical cell identifier set of the real-time neighbor station and the corresponding preset cell identifier set, obtains the percentage of all cell identifiers in the intersection to all cell identifiers in the union, considers that the preset overlapping condition is not met when the percentage is smaller than a preset threshold value, and polls other cell identifiers around the non-contained cell base station to obtain the cell identifier of the non-contained cell base station when the network management server does not contain all cell identifiers in the preset cell identifier set based on the physical cell identifier set of the real-time neighbor station, and temporarily deletes the cell identifier of the non-contained cell base station from the preset cell identifier set if the cell identifier of the non-contained cell base station cannot be obtained; and
And the deactivation instruction module is used for sending a deactivation instruction to the small base station when the preset overlapping condition is not met, so that the small base station is disconnected.
8. An antitheft device of an integrated small base station, characterized by comprising:
A processor;
A memory having stored therein executable instructions of the processor;
wherein the processor is configured to perform the steps of the theft prevention method of the integrated small cell of any one of claims 1 to 6 via execution of the executable instructions.
9. A computer-readable storage medium storing a program, characterized in that the program when executed by a processor realizes the steps of the theft prevention method of an integrated small base station according to any one of claims 1 to 6.
CN202210920097.2A 2022-08-01 2022-08-01 Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station Active CN115297466B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210920097.2A CN115297466B (en) 2022-08-01 2022-08-01 Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210920097.2A CN115297466B (en) 2022-08-01 2022-08-01 Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station

Publications (2)

Publication Number Publication Date
CN115297466A CN115297466A (en) 2022-11-04
CN115297466B true CN115297466B (en) 2024-05-14

Family

ID=83825512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210920097.2A Active CN115297466B (en) 2022-08-01 2022-08-01 Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station

Country Status (1)

Country Link
CN (1) CN115297466B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116112970A (en) * 2023-04-03 2023-05-12 北京市大数据中心 Small base station management method and device, network equipment, small base station and terminal

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166133A (en) * 2007-09-26 2008-04-23 中兴通讯股份有限公司 Location limit method and system for home base station
CN102104928A (en) * 2009-12-22 2011-06-22 中国联合网络通信集团有限公司 Method and system for limiting access position of home nodeB in WCDMA mobile system
CN103517369A (en) * 2012-06-18 2014-01-15 中国移动通信集团江苏有限公司 Method for restricting femtocell roaming, network management system and femtocell
WO2014071562A1 (en) * 2012-11-07 2014-05-15 Broadcom Corporation Small cell initial access and physical cell identity determination
CN103987041A (en) * 2014-05-07 2014-08-13 京信通信系统(中国)有限公司 Small Cell base station position access limiting method, device and system
CN104185245A (en) * 2014-08-26 2014-12-03 京信通信系统(中国)有限公司 Method, device and system for limiting access position of base station
CN104581875A (en) * 2015-01-14 2015-04-29 广州杰赛科技股份有限公司 Miniature base station accessing method and system
CN106101995A (en) * 2016-05-20 2016-11-09 京信通信技术(广州)有限公司 Location-authentication method and system
CN108271181A (en) * 2016-12-30 2018-07-10 上海大唐移动通信设备有限公司 A kind of PCI optimization method and devices of wireless network

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166133A (en) * 2007-09-26 2008-04-23 中兴通讯股份有限公司 Location limit method and system for home base station
CN102104928A (en) * 2009-12-22 2011-06-22 中国联合网络通信集团有限公司 Method and system for limiting access position of home nodeB in WCDMA mobile system
CN103517369A (en) * 2012-06-18 2014-01-15 中国移动通信集团江苏有限公司 Method for restricting femtocell roaming, network management system and femtocell
WO2014071562A1 (en) * 2012-11-07 2014-05-15 Broadcom Corporation Small cell initial access and physical cell identity determination
CN103987041A (en) * 2014-05-07 2014-08-13 京信通信系统(中国)有限公司 Small Cell base station position access limiting method, device and system
CN104185245A (en) * 2014-08-26 2014-12-03 京信通信系统(中国)有限公司 Method, device and system for limiting access position of base station
CN104581875A (en) * 2015-01-14 2015-04-29 广州杰赛科技股份有限公司 Miniature base station accessing method and system
CN106101995A (en) * 2016-05-20 2016-11-09 京信通信技术(广州)有限公司 Location-authentication method and system
CN108271181A (en) * 2016-12-30 2018-07-10 上海大唐移动通信设备有限公司 A kind of PCI optimization method and devices of wireless network

Also Published As

Publication number Publication date
CN115297466A (en) 2022-11-04

Similar Documents

Publication Publication Date Title
US20090286484A1 (en) Method and system for performing onsite maintenance of wireless communication systems
CN1783810B (en) Method used for determining
EP2870790B1 (en) Use of licensed shared spectrum in a radio access network where signal propagation is unknown
US7808958B1 (en) Rogue wireless access point detection
US8583192B2 (en) Base station device, mobile communication method, and mobile communication system
CN115297466B (en) Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station
US9763169B2 (en) Geographical detection of mobile terminals
CN102959898A (en) Femto backhaul fault detection and recovery
US8644814B2 (en) Automated fault reporting in femto cells
US11250172B2 (en) Handling wireless client devices associated with a role indicating a stolen device
US8219139B2 (en) Radio base station accommodating method and network device
CN110087242B (en) Method for rapidly judging legality of wireless access equipment in industrial control environment
CN104080087A (en) Wireless access method and device of video monitoring system
KR101013301B1 (en) System and method for managing location of femto cell access point and authenticating femto cell access point using the location
US10645666B2 (en) System and method for radio node location
KR100862747B1 (en) Method and apparatus for measuring air interface quality based on oma dm
CN104637135A (en) Method for controlling semi-offline manhole covers via Bluetooth in power monitoring field
CN113286265B (en) CPE device, control device, communication method, communication system and storage medium
CN111741473B (en) Method and device for controlling wireless coverage and network security
CN110087243B (en) Pseudo base station judgment method and device
KR20210046179A (en) Method and Apparatus for Adjusting Network Function
CN113347634B (en) 4G and 5G air interface attack detection method based on signal and signaling fingerprint
KR102479425B1 (en) Method and apparatus for detecting and blocking illegal devices in wired and wireless networks
CN117750468A (en) Management operation and maintenance system and method for trusted Wi-Fi power private network
DE102022126090A1 (en) SENSOR-BASED IDENTIFICATION OF ROAMING ISSUES IN A WIRELESS NETWORK

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant