CN115499788B - Distributed node-based risk area determination method and device - Google Patents

Distributed node-based risk area determination method and device Download PDF

Info

Publication number
CN115499788B
CN115499788B CN202211430811.6A CN202211430811A CN115499788B CN 115499788 B CN115499788 B CN 115499788B CN 202211430811 A CN202211430811 A CN 202211430811A CN 115499788 B CN115499788 B CN 115499788B
Authority
CN
China
Prior art keywords
node
cell
risk
message
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211430811.6A
Other languages
Chinese (zh)
Other versions
CN115499788A (en
Inventor
刘绪崇
彭祖怡
苏欣
卢庆
沈芙辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Intelligent Police Public Security Technology Research Institute Co ltd
Hunan Police Academy
Original Assignee
Hunan Intelligent Police Public Security Technology Research Institute Co ltd
Hunan Police Academy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Intelligent Police Public Security Technology Research Institute Co ltd, Hunan Police Academy filed Critical Hunan Intelligent Police Public Security Technology Research Institute Co ltd
Priority to CN202211430811.6A priority Critical patent/CN115499788B/en
Publication of CN115499788A publication Critical patent/CN115499788A/en
Application granted granted Critical
Publication of CN115499788B publication Critical patent/CN115499788B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/80ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for detecting, monitoring or modelling epidemics or pandemics, e.g. flu
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]

Abstract

The application provides a risk area determination method and device based on distributed nodes, so that the risk areas are efficiently divided and notified. The method comprises the following steps: under the condition that a risk user exists in a first cell of a first node, an access and mobility management network element determines a first message, wherein the first message is used for indicating that the risk user exists in the first cell; the access and mobility management network element sends a first message to the first node, so as to trigger the first node to broadcast risk information in the first cell, wherein the risk information is used for indicating that a risk user exists in the first cell. It can be understood that, when a network element on a network side, such as an access and mobility management network element, learns that a risk user exists in a first cell of a first node, the access and mobility management network element may instruct the first node to determine the first area as a risk area, so as to notify users in the first area through broadcasting, thereby implementing efficient division and notification of the risk area.

Description

Distributed node-based risk area determination method and device
Technical Field
The present application relates to the field of communications, and in particular, to a method and an apparatus for determining a risk area based on distributed nodes.
Background
At present, if an epidemic infection patient is found in an area, the area (such as a street, a community and the like) where the epidemic infection patient is located needs to be classified as a risk area as soon as possible, so as to manage the population in the risk area and prevent the spread of the epidemic.
However, at present, the risk area is mainly divided and notified manually, which is inefficient and not real-time enough.
Disclosure of Invention
The embodiment of the application provides a risk area determination method and device based on distributed nodes, so that the risk areas are efficiently divided and notified.
In order to achieve the purpose, the following technical scheme is adopted in the application:
in a first aspect, a risk area determination method based on distributed nodes is provided. The method comprises the following steps: under the condition that a risk user exists in a first cell of a first node, an access and mobility management network element determines a first message, wherein the first message is used for indicating that the risk user exists in the first cell; the access and mobility management network element sends a first message to the first node, so as to trigger the first node to broadcast risk information in the first cell, wherein the risk information is used for indicating that a risk user exists in the first cell.
Based on the method in the first aspect, it can be known that, when a network element on a network side, such as an access and mobility management network element, learns that a risk user exists in a first cell of a first node, the access and mobility management network element may instruct the first node to determine the first area as a risk area, so as to notify users in the first area through broadcasting, thereby efficiently dividing and notifying the risk area.
In a possible design, the routing information of the first message includes routing identifiers of N layers of nodes, a cell of an ith layer node in the N layers of nodes is adjacent to a cell of an i +1 th layer node in the N layers of nodes, i is an integer greater than 1 from 1 to N-1,N, and the first node is a first layer node in the N layers of nodes. The number of N layers of nodes is positively correlated with the number of risk users. That is, the access and mobility management network element may further determine, according to the number of the risky users, the number of layers of the cell to which the first message needs to be sent, such as an N-layer cell. Therefore, the node corresponding to the N-layer cell forwards the first message through the route, so that the node corresponding to the N-layer cell to which the first message is sent can be sent without encapsulating the first message by the node, and the communication overhead of the node can be reduced.
In a second aspect, a risk area determination method based on distributed nodes is provided. The method comprises the following steps: under the condition that a risk user exists in a first cell of a first node, the first node receives a first message from an access and mobility management network element, wherein the first message is used for indicating that the risk user exists in the first cell; and the first node broadcasts risk information in the first cell according to the first message, wherein the risk information is used for indicating that risk users exist in the first cell.
In one possible embodiment, the method according to the second aspect may further include: the first node sends a second message to the second node according to the first message, so as to trigger the second node to broadcast the risk information in a second cell of the second node, wherein the second cell is adjacent to the first cell, the second cell is located in the position of the risk user, and the location of the second cell in the position of the risk user means that: the second cell is located at the position where the center of the first cell points to the risky users, and the second message is used for indicating that the risky users exist in the first cell. That is, the first node may trigger only the node in the position where the risky user is located, for example, the second node broadcasts the risky information, and the node in the position where the non-risky user is located may not send the broadcast risky information, so as to reduce the communication overhead. Or, the first node may also trigger all nodes corresponding to cells adjacent to the first cell to broadcast the risk information, which is not limited.
Optionally, the first message is also used to indicate the location of the at-risk user. The first node sends a second message to the second node according to the first message, and the method comprises the following steps: the first node determines a second node located on the position of the risk user according to the position of the risk user; the first node sends a second message to the second node.
For example, the determining, by the first node, the second node located in the direction in which the risky user is located according to the location of the risky user includes: the first node determines a second node located in the position of the risk user according to the position of the risk user and a routing rule, wherein the routing rule is used for indicating that: a node i in the N layers of nodes needs to trigger a node i +1 in the N layers of nodes to broadcast risk information in an area of the node i +1, a cell of an ith layer of nodes in the N layers of nodes is adjacent to a cell of an i +1 layer of nodes in the N layers of nodes, i is an integer from 1 to N-1,N which is larger than 1, and the first node is a first layer of node in the N layers of nodes. The routing rule may be predefined protocol, or may be pre-configured to the first node by the network side, without limitation. At this time, when the first node is the nth layer node, the first node may no longer trigger the lower layer node to broadcast the risk information according to the indication of the routing rule, that is, the broadcast is ended, so that the ordered broadcast may be implemented.
Optionally, the routing information of the first message includes a routing identifier of the N layers of nodes, the second node is a second layer node in the N layers of nodes, and before the first node sends the second message to the second node, the method according to the second aspect may further include: the first node strips the route identification of the first node in the first message to obtain a second message. That is, since the access and mobility management network element encapsulates all the routing identifiers of the nodes corresponding to the N-layer cells into the routing information of the first message, the first node can forward the second message to the lower-layer node, such as the second node, only by deleting the routing identifier of the first node, so that the communication overhead can be reduced.
Optionally, the number of layers of the N layers of nodes is positively correlated with the number of the risky users.
In a third aspect, an apparatus for determining risk regions based on distributed nodes is provided. Applied to the access and mobility management network element, the device comprises: the mobile node comprises a receiving and sending module and a processing module, wherein the processing module is used for accessing and determining a first message by a mobility management network element under the condition that a risk user exists in a first cell of a first node, wherein the first message is used for indicating that the risk user exists in the first cell; the access and mobility management network element sends a first message to the first node to trigger the first node to broadcast risk information in the first cell, wherein the risk information is used for indicating that a risk user exists in the first cell.
In a possible design scheme, the routing information of the first message includes routing identifiers of nodes in N layers, a cell of an ith layer node in the nodes in N layers is adjacent to a cell of an i +1 th layer node in the nodes in N layers, i is an integer greater than 1 from 1 to N-1,N, and the first node is a first layer node in the nodes in N layers. The number of N layers of nodes is positively correlated with the number of risk users.
Optionally, the risk area updating apparatus according to the third aspect may further include a storage module, which stores a program or instructions. The processing module, when executing the program or instructions, causes the risk area updating means to perform the distributed node-based risk area determination method of the first aspect.
It should be noted that the risk area updating apparatus described in the third aspect may be a network device, a chip (system) or other component or assembly that can be disposed in the network device, or an apparatus including the network device, which is not limited in this application.
In addition, for the technical effect of the risk area updating apparatus according to the third aspect, reference may be made to the technical effect of the risk area determining method based on distributed nodes according to the first aspect, and details are not repeated here.
In a fourth aspect, an apparatus for determining risk regions based on distributed nodes is provided. Applied to a first node, the apparatus comprising: the system comprises a transceiving module and a processing module, wherein the transceiving module is used for the first node to receive a first message from an access and mobility management network element under the condition that a risk user exists in a first cell of the first node, wherein the first message is used for indicating that the risk user exists in the first cell; and the processing module is used for the first node to broadcast risk information in the first cell according to the first message, wherein the risk information is used for indicating that a risk user exists in the first cell.
In a possible design, the processing module is further configured to send, by the first node, a second message to the second node according to the first message, so as to trigger the second node to broadcast the risk information in a second cell of the second node, where the second cell is adjacent to the first cell, the second cell is located in the position where the risk user is located, and the location of the second cell in the position where the risk user is located is: the second cell is located at the position where the center of the first cell points to the risky users, and the second message is used for indicating that the risky users exist in the first cell.
Optionally, the first message is also used to indicate the location of the at risk user. The processing module is also used for determining a second node positioned on the position of the risk user by the first node according to the position of the risk user; and the transceiver module is also used for the first node to send a second message to the second node. For example, the processing module is further configured to determine, by the first node, a second node located in the direction where the risky user is located according to the location of the risky user and a routing rule, where the routing rule is used to indicate: a node i in the N layers of nodes needs to trigger a node i +1 in the N layers of nodes to broadcast risk information in an area of the node i +1, a cell of an ith layer of nodes in the N layers of nodes is adjacent to a cell of an i +1 layer of nodes in the N layers of nodes, i is an integer from 1 to N-1,N which is larger than 1, and the first node is a first layer of node in the N layers of nodes. The routing rule may be predefined protocol, or may be pre-configured to the first node by the network side, without limitation.
Optionally, the processing module is further configured to strip off, by the first node, the routing identifier of the first node in the first message, so as to obtain the second message.
Optionally, the number of layers of the N layers of nodes is positively correlated with the number of the risky users.
Optionally, the risk area updating apparatus according to the fourth aspect may further include a storage module, where the storage module stores a program or instructions. The processing module, when executing the program or instructions, causes the risk area updating apparatus to perform the distributed node-based risk area determination method of the second aspect.
It should be noted that the risk area updating apparatus according to the fourth aspect may be a network device, a chip (system) or other component or assembly that can be disposed in the network device, or an apparatus including the network device, and the present application is not limited thereto.
In addition, for the technical effect of the risk area updating apparatus according to the fourth aspect, reference may be made to the technical effect of the risk area determining method based on distributed nodes according to the second aspect, and details are not repeated here.
In a fifth aspect, there is provided a risk area updating apparatus, comprising: a processor and a memory; the memory is configured to store a computer program that, when executed by the processor, causes the risk area updating apparatus to perform the distributed node-based risk area determination method of any one of the first to second aspects.
In a possible design, the risk area updating apparatus according to the fifth aspect may further include a transceiver. The transceiver may be a transmit-receive circuit or an interface circuit. The transceiver may be for the risk area updating device of the fifth aspect to communicate with other risk area updating devices.
In this application, the risk area updating apparatus according to the fifth aspect may be a network device, or a chip (system) or other component or assembly that can be disposed in the network device, or an apparatus that includes the network device.
In addition, for technical effects of the risk area updating apparatus according to the fifth aspect, reference may be made to technical effects of the risk area determining method based on distributed nodes according to any one of the first to second aspects, and details are not repeated here.
In a sixth aspect, a computer-readable storage medium is provided, comprising: computer programs or instructions; the computer program or instructions, when run on a computer, cause the computer to perform the distributed node based risk zone determination method of any of the first to second aspects.
In a seventh aspect, a computer program product is provided, comprising: computer program or instructions which, when run on a computer, cause the computer to perform the distributed node-based risk region determination method of any one of the first to second aspects.
Drawings
Fig. 1 is an architecture diagram of 5GS, in which (a) is an architecture diagram of 5GS for non-roaming scenarios, and (b) is an architecture diagram of 5GS for roaming scenarios;
fig. 2 is a schematic architecture diagram of a communication system according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a risk area determining method based on distributed nodes according to an embodiment of the present application;
fig. 4 is a schematic application scenario diagram of a risk area determining method based on distributed nodes according to an embodiment of the present application;
FIG. 5 is a first schematic structural diagram of a risk area updating apparatus according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a risk area updating apparatus according to an embodiment of the present application.
Detailed Description
For convenience of understanding, technical terms related to the embodiments of the present application will be described below.
1. Fifth generation (5th generation, 5g) mobile communication system (abbreviated as 5G system, 5gsystem, 5gs)):
fig. 1 is a schematic diagram of the architecture of 5 GS. As shown in fig. 1, the 5GS includes: AN Access Network (AN) and a Core Network (CN), which may further include: and (4) a terminal.
The terminal may be a terminal having a transceiving function, or a chip or a system-on-chip that can be installed in the terminal. The terminal can also be referred to as a User Equipment (UE), an access terminal, a subscriber unit (subscriber unit), a subscriber station, a Mobile Station (MS), a mobile station, a remote terminal, a mobile device, a user terminal, a wireless communication device, a user agent, or a user device. The terminal in the embodiment of the present application may be a mobile phone (mobile phone), a cellular phone (cellular phone), a smart phone (smart phone), a tablet computer (Pad), a wireless data card, a Personal Digital Assistant (PDA), a wireless modem (modem), a handheld device (handset), a laptop computer (laptop), a Machine Type Communication (MTC) terminal, a computer with wireless transceiving function, a Virtual Reality (VR) terminal, an Augmented Reality (AR) terminal, a wireless terminal in industrial control (industrial control), a wireless terminal in unmanned driving (self driving), a wireless terminal in remote medical (remote medical), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation security (transportation), a wireless terminal in city (city) and a wireless terminal in roadside) and the like, and the wireless terminal in roadside and the like. The terminal of the present application may also be an on-board module, an on-board component, an on-board chip, or an on-board unit built into a vehicle as one or more components or units.
The AN is used for implementing access-related functions, providing a network access function for authorized users in a specific area, and determining transmission links of different qualities according to user levels, service requirements and the like to transmit user data. The AN forwards control signals and user data between the terminal and the CN. The AN may include: access network equipment, which may also be referred to as Radio Access Network (RAN) equipment. The CN is mainly responsible for maintaining subscription data of the mobile network, and provides functions of session management, mobility management, policy management, security authentication, and the like for the terminal. The CN mainly comprises the following network elements: a User Plane Function (UPF) network element, an authentication service function (AUSF) network element, an access and mobility management function (AMF) network element, a Session Management Function (SMF) network element, a Network Slice Selection Function (NSSF) network element, a network open function (NEF) network element, a network function storage function (NF) network element, an NRF) network element, a Policy Control Function (PCF) network element, an Unified Data Management (UDM) network element, an unified data storage (UDR), and an Application Function (AF).
As shown in fig. 1 (a), a UE accesses a 5G network through a RAN device, and communicates with an AMF network element through an N1 interface (referred to as N1 for short); the RAN network element communicates with the AMF network element through an N2 interface (N2 for short); the RAN network element communicates with the UPF network element through an N3 interface, N3 for short; the SMF communicates with a UPF network element through an N4 interface (referred to as N4 for short), and the UPF network element accesses a Data Network (DN) through an N6 interface (referred to as N6 for short). In addition, control plane functions such as an AUSF network element, an AMF network element, an SMF network element, an NSSF network element, an NEF network element, an NRF network element, a PCF network element, a UDM network element, a UDR network element, or an AF shown in (a) in fig. 1 use a service interface for interaction. For example, the serving interface provided by the AUSF network element to the outside is Nausf; the serving interface externally provided by the AMF network element is Namf; the serving interface externally provided by the SMF network element is Nsmf; the external service interface provided by the NSSF is Nnssf; the serving interface externally provided by the NEF network element is Nnef; the NRF network element provides a service interface for the outside as Nnrf; the service interface externally provided by the PCF network element is Npcf; the serving interface externally provided by the UDM network element is Nudm; a serving interface externally provided by the UDR network element is Nudr; the service interface provided by the AF to the outside is Naf. In addition, as shown in (b) of fig. 1, network elements such as an NSSF network element, an AUSF network element, an UDM network element, a UE, a RAN network element, a PCF network element, and an SMF network element can also communicate with an AMF network element. The AUSF network element can also communicate with the UDM network element, the UDM can also communicate with the SMF network element, and the SMF network element can also communicate with the UPF network element and the PCF network element in addition to the AMF network element and the UDM network element. The PCF network element is also capable of communicating with AF and NEF network elements. The NEF network elements are also able to communicate with AFs. The UPF network element is capable of communicating with the RAN device as well as the DN. As shown in fig. 1 (b), "Nxx" between two network elements represents an interface between the two network elements. For example, N22 denotes an interface between an NSSF network element and an AMF network element, N12 denotes an interface between an AUSF network element and an AMF network element, and N8 denotes an interface between a UDM network element and an AMF network element, which are not listed here.
The RAN device may be a device providing access for the terminal. For example, the RAN equipment may include: the next generation mobile communication system, for example, the access network device of 6G, for example, the 6G base station, or in the next generation mobile communication system, the network device may also have other naming manners, which are all covered by the protection scope of the embodiments of the present application, and the present application does not limit this aspect at all. Alternatively, the RAN device may also include 5G, such as a gNB in a New Radio (NR) system, or one or a group (including multiple antenna panels) of base stations in the 5G, or may also be a network node forming the gNB, a transmission point (TRP or transmission point, TP) or a Transmission Measurement Function (TMF), such as a baseband unit (BBU), or a Centralized Unit (CU) or a Distributed Unit (DU), an RSU with a base station function, or a wired access gateway, or a core network element of the 5G. Alternatively, the RAN device may also include an Access Point (AP) in a wireless fidelity (WiFi) system, a wireless relay node, a wireless backhaul node, various forms of macro base stations, micro base stations (also referred to as small stations), relay stations, access points, wearable devices, vehicle-mounted devices, and so on.
The UPF network element is mainly responsible for user data processing (forwarding, receiving, charging, etc.). For example, a UPF network element may receive user data from a Data Network (DN), which is forwarded to a terminal through an access network device. The UPF network element may also receive user data from the terminal through the access network device and forward the user data to the DN. The DN network element refers to an operator network providing a data transmission service to a user. Such as Internet Protocol (IP) multimedia service (IMS), internet (internet), etc. The DN may be an operator external network or an operator-controlled network, and is used to provide a service to the terminal device.
The AUSF network element is mainly used to perform security authentication of the terminal.
The AMF network element is mainly used for mobility management in a mobile network. Such as user location updates, user registration with the network, user handoffs, etc.
SMF network elements are mainly used for session management in mobile networks. Such as session establishment, modification, release. The specific functions include, for example, allocating an Internet Protocol (IP) address to a user, selecting a UPF network element providing a packet forwarding function, and the like.
The PCF network element mainly supports providing a unified policy framework to control network behavior, providing policy rules to the control layer network function, and is responsible for obtaining user subscription information related to policy decisions. The PCF network element may provide policies, such as quality of service (QoS) policies, slice selection policies, etc., to the AMF network element, the SMF network element.
The NSSF network element is mainly used for selecting network slices for the terminal.
The NEF network elements are mainly used to support the opening of capabilities and events.
The UDM network elements are mainly used for storing user data, such as subscription data, authentication/authorization data, etc.
The UDR network element is mainly used for storing structured data, and the stored content includes subscription data and policy data, externally exposed structured data and application-related data.
The AF mainly supports interaction with the CN to provide services, such as some services that affect data routing decisions, policy control functions, or provide third parties to the network side.
The technical solution of the embodiment of the present application may be applied to various communication systems, for example, a wireless fidelity (WiFi) system, a vehicle to any object (V2X) communication system, a device-to-device (D2D) communication system, a vehicle networking communication system, a 4G communication system such as an LTE system, a Worldwide Interoperability for Microwave Access (WiMAX) communication system, a 5G communication system such as an NR system, and a future communication system such as a sixth generation (6G) mobile communication system, and the like.
This application is intended to present various aspects, embodiments or features around a system that may include a number of devices, components, modules, and the like. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules etc. discussed in connection with the figures. Furthermore, a combination of these schemes may also be used.
Additionally, in the subject application, the words "exemplary," "for example," and "such as" are used herein to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, the word using examples is intended to present concepts in a concrete fashion.
In the embodiment of the present invention, "information", "signal", "message", "channel", "signaling" may be used in combination, and it should be noted that the meaning to be expressed is matched when the difference is not emphasized. "of", "corresponding", "canceling" and "corresponding" may sometimes be used in combination, it being noted that the intended meaning of "and" corresponding "matches when the distinction is not emphasized. Furthermore, a "/" mentioned in this application may be used to indicate a relationship of "or".
The network architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and it can be known by a person of ordinary skill in the art that the technical solution provided in the embodiment of the present application is also applicable to similar technical problems with the evolution of the network architecture and the occurrence of a new service scenario.
For the purpose of understanding the embodiments of the present application, a communication system applicable to the embodiments of the present application will be first described in detail by taking the communication system shown in fig. 2 as an example. Fig. 2 is a schematic structural diagram of a communication system to which the distributed node-based risk area determining method provided in the embodiment of the present application is applied.
As shown in fig. 2, the communication system may be applied to the above 5GS, and mainly includes: an access and mobility management network element, and a first node. Under the architecture of 5GS, the access and mobility management network element may be an AMF network element, and the first node may be a RAN device.
In this embodiment of the application, when the access and mobility management network element learns that a risk user exists in the first cell of the first node, the access and mobility management network element may instruct the first node to determine the first area as a risk area, so as to notify the user in the first area through broadcasting, thereby efficiently dividing and notifying the risk area.
For convenience of understanding, the interaction flow between network elements/devices in the above communication system will be specifically described below by way of method embodiments in conjunction with fig. 3 to 4. The communication method provided by the embodiment of the present application may be applied to the above-mentioned communication system, and is specifically applied to various scenarios mentioned in the above-mentioned communication system, which are specifically described below.
Exemplarily, fig. 3 is a schematic flowchart of a risk area determining method based on distributed nodes according to an embodiment of the present application. The risk area determination method based on the distributed nodes is mainly suitable for communication between the access and mobility management network element and the first node in the communication system.
Specifically, as shown in fig. 3, the flow of the method is as follows:
s301, when there is a risk user in the first cell of the first node, the access and mobility management network element determines the first message.
The first message is used for indicating that the risk user exists in the first cell. The first cell may be an area served by the first node, i.e. a serving cell. The first message may be a non-access stratum message, such as an N2 message. The routing information of the first message may include: and (4) route identification of the nodes of the N layers. The cell of the ith layer node in the N layers of nodes is adjacent to the cell of the (i + 1) th layer node in the N layers of nodes, i is an integer from 1 to N-1,N which is greater than 1, and the first node is the first layer node in the N layers of nodes. The number of N layers of nodes is positively correlated with the number of risk users. For example, the number of at-risk users is 1-5, and N is 2; the number of the risk users is 6-10, and N is 3; the number of risky users is 11-15, N is 4, and so on. That is to say, the access and mobility management network element may also determine, according to the number of the risky users, the number of layers of the cell, such as an N-layer cell, to which the first message needs to be sent. Therefore, the node corresponding to the N-layer cell forwards the first message through the route, so that the node corresponding to the N-layer cell to which the first message is sent can be sent without encapsulating the first message by the node, and the communication overhead of the node can be reduced. Optionally, the first message may include the location of the at-risk user, such as latitude and longitude coordinates.
The access and mobility management network element may determine that a risky user is present in the first cell by means of an application function, such as an AF indication. For example, the application function may send an identifier of the risky user to the access and mobility management network element, and the access and mobility management network element may determine, according to the identifier of the risky user, a cell (risky area) where the risky user is located and nodes corresponding to the risky area, that is, the first cell and the first node, so that the first node obtains the location of the risky user.
S302, the access and mobility management network element sends a first message to the first node, and the first node receives the first message from the access and mobility management network element.
And S303, the first node broadcasts the risk information in the first cell according to the first message.
The risk information may be used to indicate the presence of a risk user in the first cell. That is, the act of the access and mobility management network element sending the first message to the first node may be understood as: the method is used for triggering the first node to broadcast the risk information in the first cell, so that users in the first cell can know that the area where the first node is located is a risk area.
Optionally, the first node may further send a second message to the second node according to the first message, so as to trigger the second node to broadcast the risk information in a second cell of the second node, where the second cell is adjacent to the first cell, and the second cell is located in the direction where the risk user is located, and the location of the second cell in the direction where the risk user is located means: the second cell is located at the position where the center of the first cell points to the risky users, and the second message is used for indicating that the risky users exist in the first cell. That is, the first node may trigger only the node in the position where the risky user is located, for example, the second node broadcasts the risky information, and the node in the position where the non-risky user is located may not send the broadcast risky information, so as to reduce the communication overhead. Or, the first node may also trigger all nodes corresponding to cells adjacent to the first cell to broadcast the risk information, which is not limited.
The first node determines a second node located in the direction of the risk user according to the position of the risk user; the first node sends a second message to the second node. For example, the first node may determine the second node located at the position of the risky user according to the position of the risky user and a routing rule, where the routing rule may be used to indicate: the node i in the N layers of nodes needs to trigger the node i +1 in the N layers of nodes to broadcast risk information in the area of the node i +1, the cell of the ith layer of nodes in the N layers of nodes is adjacent to the cell of the (i + 1) th layer of nodes in the N layers of nodes, i is an integer from 1 to N-1,N which is greater than 1, and the first node is the first layer of nodes in the N layers of nodes. The routing rule may be predefined by a protocol, or may be pre-configured to the first node by the network side, without limitation. At this time, when the first node is the nth layer node, the first node may no longer trigger the lower layer node to broadcast the risk information according to the indication of the routing rule, that is, the broadcast is ended, so that the ordered broadcast may be implemented. The first node may strip off the routing identifier of the first node in the first message to obtain the second message. That is, since the access and mobility management network element encapsulates all the routing identifiers of the nodes corresponding to the N-layer cells into the routing information of the first message, the first node can forward the second message to the lower-layer node, such as the second node, only by deleting the routing identifier of the first node, so that the communication overhead can be reduced. Optionally, the first node may also be in the same hierarchy as the second node, and delete the route identifier of another node that is not located in the position of the risky user, so as to prevent the second message from being forwarded to another node by mistake.
For example, as shown in fig. 4, there are 2 risky users in cell 0, such as risky user U1 and risky user U2, where N =2, indicating that there is a 2-tier cell. The cells of the first layer, e.g., cell 0 of node 1, and the cells of the second layer, e.g., the respective cells of nodes 1-6, are cell 1-cell 6, respectively. The routing information of the first message encapsulated by the access and mobility management network element may include first layer routing information, which may include the routing identity of node 0 and second layer routing information, which may include the routing identities of nodes 1-6, respectively. After receiving the first message, the node 0 may determine that the cell 4 and the cell 5 are located at the position where the center point O of the cell 0 points to the risky user U1, and the cell 3 is located at the position where the center point O of the cell 0 points to the risky user U2. Node 0 may strip the respective routing identities of node 0, node 1-node 3, and node 6 in the first message, thereby sending the second message #1 to nodes 4 and 5, and the routing information of the second message #1 may include the routing identity of node 4 and the routing identity of node 5. And, the node 0 may strip the respective routing identities of the node 0-node 2, and the node 4-node 6 in the first message, so as to send the second message #2 to the node 3, and the routing information of the second message #2 may include the routing identity of the node 3.
In summary, when the network element on the network side, such as the access and mobility management network element, learns that the risk user exists in the first cell of the first node, the access and mobility management network element may instruct the first node to determine the first area as the risk area, so as to notify the user in the first area through broadcasting, thereby efficiently dividing and notifying the risk area.
The distributed node-based risk area determination method provided by the embodiment of the present application is described in detail above with reference to fig. 3 to 4. The distributed node-based risk area determination apparatus for performing the embodiments of the present application is described in detail below with reference to fig. 5 to 6. The distributed node based risk area determining apparatus 500 is applicable to an access and mobility management network element or a first node in the communication system, and includes a transceiver module 501 and a processing module 502.
In one embodiment, the distributed node-based risk area determining apparatus 500 is applied to the access and mobility management network element in the communication system.
When a risky user exists in a first cell of a first node, a processing module 502 is configured to access and determine a first message by a mobility management network element, where the first message is used to indicate that the risky user exists in the first cell; a transceiver module 501, configured to send a first message to a first node by an access and mobility management network element, so as to trigger the first node to broadcast risk information in a first cell, where the risk information is used to indicate that a risk user exists in the first cell.
In a possible design, the routing information of the first message includes routing identifiers of N layers of nodes, a cell of an ith layer node in the N layers of nodes is adjacent to a cell of an i +1 th layer node in the N layers of nodes, i is an integer greater than 1 from 1 to N-1,N, and the first node is a first layer node in the N layers of nodes. The number of N layers of nodes is positively correlated with the number of risk users.
Optionally, the distributed node-based risk region determining apparatus 500 may further include a storage module storing a program or instructions. The processing module, when executing the program or instructions, enables the distributed node based risk area determination apparatus 500 to perform the functions of the access and mobility management network elements in the method as shown in fig. 3.
It should be noted that the risk area determining apparatus 500 based on distributed nodes may be a network device, a chip (system) or other component or assembly that can be disposed in the network device, or an apparatus including the network device, which is not limited in this application.
In addition, the technical effect of the risk area determining apparatus 500 based on distributed nodes may refer to the technical effect of the method shown in fig. 3, and is not described herein again.
In another embodiment, the distributed node based risk zone determination apparatus 500 is adapted for use with the first node in the communication system described above.
When a risk user exists in a first cell of a first node, a transceiver module 501, configured to receive, by the first node, a first message from an access and mobility management network element, where the first message is used to indicate that the risk user exists in the first cell; a processing module 502, configured to broadcast, by the first node, risk information in the first cell according to the first message, where the risk information is used to indicate that a risk user exists in the first cell.
In a possible design, the processing module 502 is further configured to send, by the first node, a second message to the second node according to the first message, so as to trigger the second node to broadcast the risk information in a second cell of the second node, where the second cell is adjacent to the first cell, the second cell is located in the position where the risk user is located, and the location of the second cell in the position where the risk user is located is: the second cell is located at the position where the center of the first cell points to the risky users, and the second message is used for indicating that the risky users exist in the first cell.
Optionally, the first message is also used to indicate the location of the at-risk user. The processing module 502 is further configured to determine, by the first node, a second node located in the direction where the risky user is located according to the location of the risky user; the transceiver module 501 is further configured to send a second message to the second node by the first node. For example, the processing module 502 is further configured to, by the first node, determine, according to the location of the risky user and a routing rule, a second node located at the position of the risky user, where the routing rule is used to indicate: the node i in the N layers of nodes needs to trigger the node i +1 in the N layers of nodes to broadcast risk information in the area of the node i +1, the cell of the ith layer of nodes in the N layers of nodes is adjacent to the cell of the (i + 1) th layer of nodes in the N layers of nodes, i is an integer from 1 to N-1,N which is greater than 1, and the first node is the first layer of nodes in the N layers of nodes. The routing rule may be predefined by a protocol, or may be pre-configured to the first node by the network side, without limitation.
Optionally, the processing module 502 is further configured to strip off, by the first node, the routing identifier of the first node in the first message, so as to obtain the second message.
Optionally, the number of layers of the N layers of nodes is positively correlated with the number of the risky users.
Optionally, the distributed node-based risk region determining apparatus 500 may further include a storage module storing a program or instructions. The program or instructions, when executed by the processing module, enable the distributed node based risk area determination apparatus 500 to perform the functions of the first node in the method as shown in fig. 3.
It should be noted that the risk area determining apparatus 500 based on distributed nodes may be a network device, a chip (system) or other component or assembly that can be disposed in the network device, or an apparatus including the network device, which is not limited in this application.
In addition, for technical effects of the distributed node-based risk region determining apparatus 500, reference may be made to technical effects of the method illustrated in fig. 3, which is not described herein again.
Fig. 6 is a schematic structural diagram of a user position tracking apparatus according to an embodiment of the present application. The user position tracking device may be a terminal, or may be a chip (system) or other component or assembly that may be disposed on the terminal. As shown in FIG. 6, user position tracking device 600 may include a processor 601. Optionally, the user position tracking device 600 may also include a memory 602 and/or a transceiver 603. Wherein the processor 601 is coupled to the memory 602 and the transceiver 603, such as may be connected via a communication bus.
The following describes the components of the user position tracking device 600 in detail with reference to fig. 6:
the processor 601 is a control center of the user position tracking apparatus 600, and may be a single processor or a collective term for a plurality of processing elements. For example, the processor 601 is one or more Central Processing Units (CPUs), or may be A Specific Integrated Circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present application, such as: one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs).
Alternatively, the processor 601 may perform various functions of the user position tracking device 600, such as performing the method illustrated in FIG. 2 described above, by running or executing software programs stored in the memory 602, and invoking data stored in the memory 602.
In a particular implementation, processor 601 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 6, for example, as an embodiment.
In particular implementations, user location tracking device 600 may also include multiple processors, such as processor 601 and processor 604 shown in FIG. 6, as an example. Each of these processors may be a single-core processor (single-CPU) or a multi-core processor (multi-CPU). A processor herein may refer to one or more devices, circuits, and/or processing cores that process data (e.g., computer program instructions).
The memory 602 is configured to store a software program for executing the scheme of the present application, and the processor 601 controls the execution of the software program.
Alternatively, memory 602 may be a read-only memory (ROM) or other type of static storage device that may store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that may store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these. The memory 602 may be integrated with the processor 601, or may exist independently, and is coupled to the processor 601 through an interface circuit (not shown in fig. 6) of the user position tracking apparatus 600, which is not specifically limited in this embodiment of the present application.
A transceiver 603 for communication with other user position tracking devices. For example, where the user location tracking device 600 is a terminal, the transceiver 603 may be used to communicate with a network device or with another terminal device. As another example, where the user location tracking device 600 is a network device, the transceiver 603 may be used to communicate with a terminal or with another network device.
Optionally, the transceiver 603 may include a receiver and a transmitter (not separately shown in fig. 6). Wherein the receiver is configured to implement a receive function and the transmitter is configured to implement a transmit function.
Alternatively, the transceiver 603 may be integrated with the processor 601, or may be independent and coupled to the processor 601 through an interface circuit (not shown in fig. 6) of the user position tracking apparatus 600, which is not particularly limited in this embodiment of the present application.
It should be noted that the structure of the user position tracking device 600 shown in fig. 6 does not constitute a limitation of the user position tracking device, and an actual user position tracking device may include more or less components than those shown, or some components may be combined, or a different arrangement of components.
In addition, for the technical effect of the user location tracking apparatus 600, reference may be made to the technical effect of the user location tracking method based on a star chain described in the foregoing method embodiment, and details are not repeated here.
It should be understood that the processor in the embodiments of the present application may be a Central Processing Unit (CPU), and the processor may also be other general purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It will also be appreciated that the memory in the embodiments of the subject application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example, but not limitation, many forms of Random Access Memory (RAM) are available, such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchlink DRAM (SLDRAM), and direct bus RAM (DR RAM).
The above embodiments may be implemented in whole or in part by software, hardware (e.g., circuitry), firmware, or any combination thereof. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions or computer programs. The procedures or functions according to the embodiments of the present application are wholly or partially generated when the computer instructions or the computer program are loaded or executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more collections of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a solid state disk.
It should be understood that the term "and/or" herein is only one kind of association relationship describing the association object, and means that there may be three kinds of relationships, for example, a and/or B, and may mean: a exists singly, A and B exist simultaneously, and B exists singly, wherein A and B can be singular or plural. In addition, the "/" in this document generally indicates that the former and latter associated objects are in an "or" relationship, but may also indicate an "and/or" relationship, and may be understood with particular reference to the former and latter contexts.
In the present application, "at least one" means one or more, "a plurality" means two or more. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

1. A distributed node-based risk area update method, the method comprising:
the method comprises the steps that under the condition that a risk user exists in a first cell of a first node, an access and mobility management network element determines a first message, wherein the first message is used for indicating that the risk user exists in the first cell;
the access and mobility management network element sends a first message to the first node, so as to trigger the first node to broadcast risk information in the first cell, wherein the risk information is used for indicating that a risk user exists in the first cell;
the routing information of the first message comprises routing identifiers of N layers of nodes, a cell of an ith layer node in the N layers of nodes is adjacent to a cell of an i +1 th layer node in the N layers of nodes, i is an integer from 1 to N-1,N which is greater than 1, and the first node is a first layer node in the N layers of nodes.
2. A distributed node-based risk area update method, the method comprising:
under the condition that a risk user exists in a first cell of a first node, the first node receives a first message from an access and mobility management network element, wherein the first message is used for indicating that the risk user exists in the first cell;
the first node broadcasts risk information in the first cell according to the first message, wherein the risk information is used for indicating that a risk user exists in the first cell;
and, the method further comprises:
the first node sends a second message to a second node according to the first message, so as to trigger the second node to broadcast the risk information in a second cell of the second node, wherein the second cell is adjacent to the first cell, the second cell is located in the position of the risk user, and the location of the second cell in the position of the risk user is as follows: the second cell is located in a position where the center of the first cell points to the risky user, and the second message is used for indicating that the risky user exists in the first cell.
3. The method of claim 2, wherein the first message is further used for indicating a location of the at-risk user, and wherein the first node sends a second message to a second node according to the first message, comprising:
the first node determines the second node located on the position of the risk user according to the position of the risk user;
the first node sends the second message to a second node.
4. The method of claim 3, wherein the determining, by the first node, the second node located at the position of the at-risk user according to the position of the at-risk user comprises:
the first node determines the second node located in the position of the risk user according to the position of the risk user and a routing rule, wherein the routing rule is used for indicating: a node i in N layers of nodes needs to trigger a node i +1 in the N layers of nodes to broadcast the risk information in an area of the node i +1, a cell of an ith layer of nodes in the N layers of nodes is adjacent to a cell of an i +1 layer of nodes in the N layers of nodes, i is an integer greater than 1 to N-1,N, and the first node is a first layer of nodes in the N layers of nodes.
5. The method of claim 4, wherein the routing information of the first message comprises a routing identifier of a node of N layers, wherein the second node is a second node of the nodes of N layers, and wherein before the first node sends the second message to the second node, the method further comprises:
and the first node strips the route identifier of the first node in the first message to obtain the second message.
6. The method according to claim 4 or 5, wherein the number of layers of the N layers of nodes is positively correlated to the number of the at-risk users.
7. A distributed node-based risk area update apparatus, applied to an access and mobility management network element, the apparatus comprising: a transceiver module and a processing module, wherein,
the processing module is configured to, when a risky user exists in a first cell of a first node, access and determine a first message by a mobility management network element, where the first message is used to indicate that the risky user exists in the first cell;
the transceiver module is configured to send, by the access and mobility management network element, a first message to the first node, so as to trigger the first node to broadcast risk information in the first cell, where the risk information is used to indicate that a risk user exists in the first cell;
the routing information of the first message comprises routing identifiers of N layers of nodes, a cell of an ith layer node in the N layers of nodes is adjacent to a cell of an i +1 th layer node in the N layers of nodes, i is an integer from 1 to N-1,N which is greater than 1, and the first node is a first layer node in the N layers of nodes.
8. A risk area updating device based on distributed nodes is applied to a first node and comprises the following components: a transceiver module and a processing module, wherein,
the receiving and sending module is configured to, when a risky user exists in a first cell of a first node, receive a first message from an access and mobility management network element by the first node, where the first message is used to indicate that the risky user exists in the first cell;
the processing module is configured to broadcast, by the first node, risk information in the first cell according to the first message, where the risk information is used to indicate that a risk user exists in the first cell;
and, the apparatus further comprises:
the processing module is further configured to send, by the first node, a second message to a second node according to the first message, so as to trigger the second node to broadcast the risk information in a second cell of the second node, where the second cell is adjacent to the first cell, the second cell is located in a position where the risk user is located, and the location of the second cell in the position where the risk user is located is: the second cell is located at the position where the center of the first cell points to the risky user, and the second message is used for indicating that the risky user exists in the first cell.
CN202211430811.6A 2022-11-16 2022-11-16 Distributed node-based risk area determination method and device Active CN115499788B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211430811.6A CN115499788B (en) 2022-11-16 2022-11-16 Distributed node-based risk area determination method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211430811.6A CN115499788B (en) 2022-11-16 2022-11-16 Distributed node-based risk area determination method and device

Publications (2)

Publication Number Publication Date
CN115499788A CN115499788A (en) 2022-12-20
CN115499788B true CN115499788B (en) 2023-04-07

Family

ID=85115820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211430811.6A Active CN115499788B (en) 2022-11-16 2022-11-16 Distributed node-based risk area determination method and device

Country Status (1)

Country Link
CN (1) CN115499788B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114710772A (en) * 2021-12-24 2022-07-05 瓴盛科技有限公司 Method and device for receiving public message

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106102032A (en) * 2016-06-15 2016-11-09 中国铁道科学研究院通信信号研究所 High speed rail earthquake pre-warning monitoring information wireless transmission system
WO2019055425A1 (en) * 2017-09-12 2019-03-21 John Mezzalingua Associates, LLC Edge-based location-specific warning system for lte networks
US10911924B2 (en) * 2017-10-06 2021-02-02 Nokia Solutions And Networks Oy Method and apparatus for a generic service interface for a public warning system management and notification
US10805784B2 (en) * 2018-02-07 2020-10-13 Qualcomm Incorporated Methods and systems for efficient location support for wireless emergency alerts
US20230116112A1 (en) * 2020-03-24 2023-04-13 Qualcomm Incorporated Convergence of public warning system (pws) and multimedia service for emergency broadcast
CN111556095A (en) * 2020-03-31 2020-08-18 世强先进(深圳)科技股份有限公司 Infectious disease epidemic situation early warning method and system based on positioning technology
US20210375484A1 (en) * 2020-05-28 2021-12-02 Global Payments Gaming Services Inc. Object-based contact tracing
CN115223725A (en) * 2022-07-19 2022-10-21 中国银行股份有限公司 User state processing method and device, storage medium and electronic equipment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114710772A (en) * 2021-12-24 2022-07-05 瓴盛科技有限公司 Method and device for receiving public message

Also Published As

Publication number Publication date
CN115499788A (en) 2022-12-20

Similar Documents

Publication Publication Date Title
CN113630749A (en) Method and device for acquiring edge service
CN111405637B (en) Communication method and device
CN115499788B (en) Distributed node-based risk area determination method and device
US20210314774A1 (en) Methods, apparatuses, computer readable media and computer programs for performing admission control for limited access service
CN115499470B (en) Storage management method and device for intelligent ammeter data
CN117221884B (en) Base station system information management method and system
CN114640988B (en) Information processing method and device based on implicit indication encryption
CN117202287B (en) Order distribution management method and device based on big data analysis
CN115567899B (en) Error analysis method and device for intelligent ammeter
CN117528462B (en) Industrial Internet of things data transmission method realized by multi-network networking
CN117478431B (en) Industrial Internet of things control method based on trusted network
CN117580146B (en) Control method and device for servo motor cluster
CN117439819B (en) PDU cabinet safety monitoring method
CN116887009B (en) End cloud integrated video structuring method and system based on 5G network
CN114584969B (en) Information processing method and device based on associated encryption
EP4297470A1 (en) Server, request entity, and method therefor
CN117062015A (en) Data connection distribution method and device using Beidou positioning and short message system
CN117336167A (en) Network distribution method and system for Internet of things equipment
WO2022261972A1 (en) Apparatus, methods, and computer programs
CN117440356A (en) Communication method and device
CN117156610A (en) Transmission control method for heterogeneous fusion of space network and ground multi-hop network
CN117768965A (en) High-performance connection and transmission method of bonding silver wire equipment
CN117560743A (en) Trusted data storage method and device based on blockchain
CN116996985A (en) Communication method and device based on edge network
CN117478588A (en) High-availability redundant route switching method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant