CN115297466A - Anti-theft method, system, equipment and storage medium of integrated small base station - Google Patents

Anti-theft method, system, equipment and storage medium of integrated small base station Download PDF

Info

Publication number
CN115297466A
CN115297466A CN202210920097.2A CN202210920097A CN115297466A CN 115297466 A CN115297466 A CN 115297466A CN 202210920097 A CN202210920097 A CN 202210920097A CN 115297466 A CN115297466 A CN 115297466A
Authority
CN
China
Prior art keywords
base station
small base
identification code
cell identification
code set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210920097.2A
Other languages
Chinese (zh)
Other versions
CN115297466B (en
Inventor
孙丽楠
朱红绿
赵莹莹
郑语晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202210920097.2A priority Critical patent/CN115297466B/en
Publication of CN115297466A publication Critical patent/CN115297466A/en
Application granted granted Critical
Publication of CN115297466B publication Critical patent/CN115297466B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/14Mobility data transfer between corresponding nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an anti-theft method, an anti-theft system, anti-theft equipment and a storage medium of an integrated small base station, wherein the method comprises the following steps: the small base station monitors and analyzes the synchronous signals of the surrounding adjacent stations to obtain a real-time adjacent station physical cell identification code set and reports the real-time adjacent station physical cell identification code set to the network management server; the network management server compares the real-time neighbor station physical cell identification code set with a corresponding preset cell identification code set, and judges whether the two sets are overlapped; when the preset overlapping condition is not met, sending a deactivation instruction to the small base station, and enabling the small base station to be offline; the invention can reduce the risk of losing the small base station without dismounting a physical anti-theft device and increasing the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the deployment flexibility of the small base station is improved.

Description

Anti-theft method, system, equipment and storage medium of integrated small base station
Technical Field
The invention relates to the field of communication, in particular to an anti-theft method, an anti-theft system, anti-theft equipment and a storage medium for an integrated small base station.
Background
In the construction of communication networks, the importance of base stations which undertake the function of transmitting and receiving wireless signals is irreplaceable. In fact, the base stations are of four types, namely a macro base station, a micro base station, a pico base station and a femto base station, which correspond to different single carrier transmission powers and communication coverage radiuses respectively. The outdoor beacon is of course the macro base station. And the micro base station, the pico base station and the femto base station are small base stations. Of course, the base station is a 5G small base station because the base station is used for 5G.
The macro base station has the advantages of large transmitting power, wide coverage range, more supportable carrier frequency and user number and larger capacity. However, the macro base station needs to be configured with a separate machine room and an iron tower, so that the size and the occupied area are not small, and the defects of difficult installation, poor flexibility and the like exist. Therefore, the method is generally applied to an outdoor wide area. The small base station generally can only support one carrier frequency, and the capacity provided by the small base station is smaller, so that the small base station is much smaller than a macro base station in aspects of appearance, transmitting power, coverage range and the like, and has the characteristics of high cost performance, easiness in deployment and the like. And therefore also has a major application in indoor scenarios. Compared with a macro base station, the small base station can deeply enter the room and perform fixed-point deep coverage in weak signals and blind areas. In addition, in some hot spot areas with dense people flow or large data traffic transmission requirements, the small base station can help the macro base station to share traffic load, and system capacity is improved. Therefore, pain points such as poor penetrability and difficult site selection of the 5G macro base station can be effectively solved.
At present, the integrated small base station can be deployed in public places such as factories, small offices, cell parking lots, small commercial spaces and the like, and the integrated small base station is convenient to install, is plug and play and has a theft risk. The traditional base station anti-theft method comprises the steps of adding video monitoring, dynamic environment monitoring, access control management, security alarm, linkage and the like, and needs to be realized by adding a physical device. For the integrated small base station, the cost of deployment can be increased, and the convenience of installation is reduced.
In view of this, the invention provides an anti-theft method, system, device and storage medium for an integrated small base station.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the invention and therefore may include information that does not constitute prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
Aiming at the problems in the prior art, the invention aims to provide an anti-theft method, an anti-theft system, an anti-theft device and a storage medium of an integrated small base station, which overcome the difficulties in the prior art, can reduce the risk of losing the small base station, do not need to disassemble and assemble a physical anti-theft device and do not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the flexibility of the deployment of the small base station is improved.
The embodiment of the invention provides an anti-theft method of an integrated small base station, which comprises the following steps:
the small base station monitors and analyzes the synchronous signals of the surrounding adjacent stations to obtain a real-time adjacent station physical cell identification code set and reports the real-time adjacent station physical cell identification code set to the network management server;
the network management server compares the real-time neighbor station physical cell identification code set with a corresponding preset cell identification code set to judge whether the two sets are overlapped; and
and when the preset overlapping condition is not met, sending a deactivation instruction to the small base station, and enabling the small base station to be offline.
Preferably, the method for intercepting and analyzing the synchronization signals of the neighboring stations around the small base station to obtain the real-time physical cell identification code set of the neighboring stations and report the real-time physical cell identification code set to the network management server includes:
after the small base station is started, monitoring and analyzing a main synchronizing signal and an auxiliary synchronizing signal of surrounding adjacent stations;
acquiring a physical cell identification code of each adjacent station according to the primary synchronization signal and the secondary synchronization signal;
and establishing a real-time neighbor station physical cell identification code set and reporting to a network management server.
Preferably, the comparing, by the webmaster server, the real-time neighbor station physical cell identifier set with the corresponding preset cell identifier set, and determining whether the two sets overlap includes:
acquiring a union set of the network management server based on the real-time neighbor station physical cell identification code set and a corresponding preset cell identification code set;
acquiring the intersection of the network management server based on the real-time neighbor station physical cell identification code set and the corresponding preset cell identification code set;
the obtained percentage of all the cell identification codes in the intersection to all the cell identification codes in the union;
and when the percentage is smaller than a preset threshold value, the preset overlapping condition is not met.
Preferably, the obtaining the union of the network management server based on the real-time neighbor station physical cell identification code set and the corresponding preset cell identification code set further includes:
the preset cell identification code set is a real-time neighbor station physical cell identification code set uploaded when the small base station is started for the first time or started for the last time; or
And the intersection of the preset cell identification code sets is a set of all the neighbor station physical cell identification codes with the occurrence frequency exceeding a preset threshold in all the neighbor station physical cell identification code sets uploaded by the cell base station in history.
Preferably, when the preset overlapping condition is not satisfied, the sending a deactivation instruction to the small cell to take the small cell offline includes:
when the small base station does not meet the preset overlapping condition, the network management server sends a deactivation instruction to the small base station;
and the small base station executes offline operation according to the received deactivation instruction.
Preferably, the method further comprises the following steps: and after the small base station is activated by an authorized user, sending authorized mobile authentication information to the network management server, and updating a corresponding preset cell identification code set.
Preferably, after the small cell is activated by the authorized user, the method sends authorized mobile authentication information to the network management server, and updates a corresponding preset cell identity set, including:
the small base station is activated by an authorized user;
after the small base station is activated, monitoring and analyzing synchronous signals of surrounding adjacent stations to obtain a real-time adjacent station physical cell identification code set;
the small base station sends authorized mobile authentication information to the network management server, wherein the authorized mobile authentication information comprises small base station activation information, activated authorized user information and an activated real-time adjacent station physical cell identification code set;
and the network management server updates a preset cell identification code set corresponding to the cell base station into an activated real-time neighbor station physical cell identification code set.
The embodiment of the invention provides another anti-theft method of an integrated small base station, which is implemented in the small base station and comprises the following steps:
monitoring and analyzing synchronous signals of surrounding adjacent stations to obtain a real-time adjacent station physical cell identification code set and report the real-time adjacent station physical cell identification code set to a network management server;
executing offline operation according to the received deactivation instruction; and
and when receiving the cell activation operation after receiving the authorized login, sending authorized mobile authentication information to the network management server.
The embodiment of the invention provides another anti-theft method of an integrated small base station, which is implemented in a network management server and comprises the following steps:
receiving a real-time neighbor station physical cell identification code set uploaded by the small base station;
comparing the real-time neighbor station physical cell identification code set with a corresponding preset cell identification code set, and judging whether the two sets are overlapped; and
and when the preset overlapping condition is not met, sending a deactivation instruction to the small base station, and enabling the small base station to be offline.
The embodiment of the present invention further provides an anti-theft system for an integrated small base station, which is used for implementing the anti-theft method for the integrated small base station, and the anti-theft system for the integrated small base station includes:
the identification code analysis module is used for monitoring and analyzing the synchronous signals of the surrounding adjacent stations by the small base station to obtain a real-time physical cell identification code set of the adjacent stations and reporting the real-time physical cell identification code set to the network management server;
the network management server compares the real-time neighbor station physical cell identification code set with a corresponding preset cell identification code set based on the similarity judgment module, and judges whether the two sets are overlapped;
and the deactivation instruction module is used for sending a deactivation instruction to the small base station and enabling the small base station to be offline when the preset overlapping condition is not met.
The embodiment of the invention also provides an anti-theft device of the integrated small base station, which comprises:
a processor;
a memory having stored therein executable instructions of the processor;
wherein the processor is configured to perform the steps of the above-mentioned anti-theft method of an integrated small cell base station via execution of the executable instructions.
An embodiment of the present invention further provides a computer-readable storage medium for storing a program, which when executed, implements the steps of the above-mentioned anti-theft method for an integrated small cell.
The invention aims to provide an anti-theft method, an anti-theft system, an anti-theft device and a storage medium of an integrated small base station, which can reduce the risk of losing the small base station, do not need to disassemble and assemble a physical anti-theft device and do not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the deployment flexibility of the small base station is improved.
Drawings
Other features, objects and advantages of the present invention will become more apparent upon reading of the detailed description of non-limiting embodiments thereof, with reference to the following drawings.
Fig. 1 is a flowchart of an anti-theft method of an integrated small base station of the present invention.
Fig. 2 is a flowchart of step S110 in the embodiment of the anti-theft method for an integrated small base station of the present invention.
Fig. 3 is a flowchart illustrating step S120 in the embodiment of the anti-theft method for an integrated small cell base station according to the present invention.
Fig. 4 is a flowchart illustrating step S130 in the embodiment of the anti-theft method for an integrated small cell base station according to the present invention.
Fig. 5 is another flowchart of the anti-theft method of the integrated small cell base station of the present invention.
Fig. 6 is a flowchart illustrating step S140 in the embodiment of the anti-theft method for an integrated small cell base station according to the present invention.
Fig. 7 is another flowchart of the anti-theft method of the integrated small cell base station of the present invention.
Fig. 8 is still another flowchart of the anti-theft method of the integrated small cell base station of the present invention.
Fig. 9 is a block diagram of the anti-theft system of the integrated small base station of the present invention.
Fig. 10 is a block diagram of a network access module in an embodiment of the anti-theft system of the integrated small cell base station of the present invention.
Fig. 11 is a block diagram of a network configuration module in an embodiment of the anti-theft system of the integrated small cell base station of the present invention.
Fig. 12 is a block diagram of a communication detection module in an embodiment of the anti-theft system of the integrated small base station of the present invention.
Fig. 13 is another block diagram of the anti-theft system of the integrated small base station of the present invention.
Fig. 14 is a schematic block diagram of an activated reporting module in an embodiment of the anti-theft system of the integrated small base station of the present invention.
Fig. 15 is a schematic diagram of a small base station listening to surrounding base stations in the implementation process of the anti-theft method of the integrated small base station of the present invention.
Fig. 16 is a schematic diagram of main modules of each part in the implementation process of the anti-theft method of the integrated small base station of the invention.
Fig. 17 is a timing chart showing an implementation process of the anti-theft method of the integrated small base station of the present invention.
Fig. 18 is a schematic view of the anti-theft device of the integrated small base station of the present invention.
Detailed Description
The following description of the embodiments of the present application is provided by way of specific examples, and other advantages and effects of the present application will be readily apparent to those skilled in the art from the disclosure herein. The present application is capable of other and different embodiments and of being practiced or being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present application. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
Embodiments of the present application will be described in detail below with reference to the accompanying drawings so that those skilled in the art to which the present application pertains can easily carry out the present application. The present application may be embodied in many different forms and is not limited to the embodiments described herein.
In the expressions of the present application, reference to expressions of "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. Furthermore, the particular features, structures, materials, or characteristics illustrated may be combined in any suitable manner in any one or more embodiments or examples. Moreover, various embodiments or examples and features of different embodiments or examples presented in this application can be combined and combined by those skilled in the art without contradiction.
Furthermore, the terms "first", "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the expressions of the present application, "plurality" means two or more unless specifically defined otherwise.
In order to clearly explain the present application, components that are not related to the description are omitted, and the same reference numerals are given to the same or similar components throughout the specification.
Throughout the specification, when a device is referred to as being "connected" to another device, this includes not only the case of being "directly connected" but also the case of being "indirectly connected" with another element interposed therebetween. In addition, when a device "includes" a certain component, unless otherwise stated, the device does not exclude other components, but may include other components.
When a device is said to be "on" another device, this may be directly on the other device, but may also be accompanied by other devices in between. When a device is said to be "directly on" another device, there are no other devices in between.
Although the terms first, second, etc. may be used herein to describe various elements in some instances, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, the first interface and the second interface are represented. Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, items, species, and/or groups thereof. The terms "or" and/or "as used herein are to be construed as inclusive or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a; b; c; a and B; a and C; b and C; A. b and C ". An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used herein, the singular forms "a", "an" and "the" include plural forms as long as the words do not expressly indicate a contrary meaning. The term "comprises/comprising" when used in this specification is taken to specify the presence of stated features, regions, integers, steps, operations, elements, and/or components, but does not exclude the presence or addition of other features, regions, integers, steps, operations, elements, and/or components.
Although not defined differently, including technical and scientific terms used herein, all terms have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. Terms defined in commonly used dictionaries are to be additionally interpreted as having meanings consistent with those of related art documents and the contents of the present prompts, and must not be excessively interpreted as having ideal or very formulaic meanings unless defined.
Fig. 1 is a flowchart of an anti-theft method of an integrated small base station of the present invention. As shown in fig. 1, the present invention relates to the field of network configuration, and is a method for preventing theft of an integrated small base station, and the flow of the present invention includes:
s110, the small base station monitors and analyzes the synchronous signals of the surrounding adjacent stations to obtain a real-time adjacent station physical cell identification code set and reports the real-time adjacent station physical cell identification code set to the network management server.
S120, the network management server compares the real-time neighbor station physical cell identification code set with the corresponding preset cell identification code set, and judges whether the two sets are overlapped. And
and S130, when the preset overlapping condition is not met, sending a deactivation instruction to the small base station, and enabling the small base station to be offline.
The anti-theft method of the integrated small base station can reduce the risk of losing the small base station, does not need to disassemble and assemble a physical anti-theft device, and does not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the deployment flexibility of the small base station is improved.
According to the invention, a physical anti-theft device is not required to be added, the position information is automatically reported to the network manager of the small base station through the integrated small base station, once the network manager finds that the position information of the small base station is changed, the network manager issues a configuration command to deactivate the cell, the small base station cannot work after being stolen, and the loss probability is reduced. The traditional base station anti-theft method adopts physical devices, and if the mobile small base station needs to dismantle the devices and reinstall the devices, the mobile small base station is inconvenient. The invention controls whether the small base station is allowed to work or not through network management or local Web, thereby facilitating the customer to move the small base station.
Fig. 2 is a flowchart illustrating step S110 in the embodiment of the anti-theft method for an integrated small cell base station according to the present invention. Fig. 3 is a flowchart illustrating step S120 in the embodiment of the anti-theft method for an integrated small cell base station according to the present invention. Fig. 4 is a flowchart illustrating step S130 in the embodiment of the anti-theft method for an integrated small cell base station according to the present invention. As shown in fig. 2 to 4, in the embodiment of fig. 1, on the basis of steps S110, S120, S130, S140, and S150, step S110 is replaced by S111, S112, and S113, step S120 is replaced by S121, S122, S123, and S124, and step S130 is replaced by S131 and S132, and each step is explained below:
and S111, after the small base station is started, monitoring and analyzing a Primary Synchronization Signal (PSS) and a Secondary Synchronization Signal (SSS) of a peripheral adjacent station.
And S112, acquiring the physical cell identification code of each adjacent station according to the primary synchronization signal and the secondary synchronization signal. In LTE networks, PCI = PSS +3 sss. PSS (Primary Synchronization Signal) main Synchronization Signal occupies 6 RBs (radio blocks) of a system bandwidth, namely 72sc, in a frequency domain, and indicates ID Physical-layer ID in one Physical cell group: 0,1,2 (3). PSS is taken to be 0.. 2 (actually 3 different PSS sequences), SSS is taken to be 0.. 167 (actually 168 different SSS sequences), and the range of PCIs obtained using the above formula is from 0.. 503, so there are 504 PCIs in the physical layer. The PSS is called Primary Synchronization Signal, i.e. Primary Synchronization Signal, for transmitting the intra-group ID, i.e. N (2) _ ID value. The SSS is collectively referred to as a Secondary Synchronization Signal, i.e., a Secondary Synchronization Signal, used to transmit a group ID, i.e., an N (1) _ ID value. RSRP (Reference Signal Received Power), 44 dBm to 140dBm, the larger the value, the better. RSSI (Received Signal strength Indicator) value range: 110-90. RSRQ (Reference Signal Received Quality), range: -3 to-19.5, the larger the value the better, RSRQ = N RSRP/RSSI. SINR (Signal to Interference & Noise Ratio) is the Ratio of the power of the desired Signal to the sum of the Interference and Noise power, and directly reflects the quality of the received Signal. SNR is an abbreviation for signal to noise ratio, which refers to the ratio between the level of a useful signal and the level of electromagnetic noise measured under specified conditions. The ratio of the amplitude of the desired signal at any point to the amplitude of the noise signal at the same point is expressed in decibels (dB). The peak is associated with impulse noise and the effective value is associated with random noise.
And S113, establishing a real-time neighbor station physical cell identification code set and reporting to a network management server.
S121, acquiring a union set of a network management server based on a real-time neighbor station physical cell identification code set and a corresponding preset cell identification code set. The preset cell identification code set is a real-time neighbor station physical cell identification code set uploaded when the small base station is started for the first time or started for the last time; or the preset cell identification code set is a set of all the neighbor station physical cell identification codes with the occurrence frequency exceeding a preset threshold value in all the neighbor station physical cell identification code sets uploaded by the small base station in history.
And S122, acquiring the intersection of the network management server based on the real-time neighbor station physical cell identification code set and the corresponding preset cell identification code set.
And S123, the obtained identification codes of all the cells in the intersection account for the percentage of the identification codes of all the cells in the union.
And S124, when the percentage is smaller than the preset threshold value, the preset overlapping condition is not met. For example: the preset cell identification code set is { A1, A2, A3, A4, A5}, the network management server is { A1, A2, A3, A4}, the network management server is based on the real-time neighbor station physical cell identification code set, the intersection of the two sets is { A1, A2, A3, A4}, the intersection of the two sets is a union { A1, A2, A3, A4, A5}, the percentage of the cell identification codes in the intersection to the cell identification codes in the union is 80%, if the preset threshold is 75%, the measured result is greater than the preset threshold and is 75%, the preset overlapping condition is considered to be met, and the network management server can be considered as not moving. If the percentage of the actual measurement result is 60% and is smaller than the preset threshold, the preset overlapping condition is considered not to be met, and the small base station is considered to move.
In a preferred embodiment, in order to avoid the situation that the respective cell site should be temporarily powered off or fail to cause the other surrounding cell sites to be mistakenly considered to move (the neighboring cell site set where the surrounding cell sites can receive the synchronization signal will change), when the network management server does not include all the cell identifiers in the preset cell identifier set based on the real-time physical cell identifier set of the neighboring cell sites, it is trained whether the other surrounding cell sites of the cell site that is not included can obtain the cell identifiers of the cell site that is not included, and if not, the cell identifiers of the cell site that is not included are temporarily deleted from the preset cell identifier set, thereby avoiding the interference to the identification accuracy in the case of temporary power off.
S131, when the small base station does not meet the preset overlapping condition, the network management server sends a deactivation instruction to the small base station.
And S132, the small base station executes offline operation according to the received deactivation instruction.
When the small base station is powered on, the synchronous signal of the adjacent cell is intercepted, the PCI of the adjacent cell is analyzed and reported to a network manager, the network manager identifies the change condition of the PCI, judges whether the position of the small base station is changed or not, if the position of the small base station is changed, the small base station is possible to be stolen, and issues a command for deactivating the cell, so that the small base station is forbidden. If the small base station is manually moved by a client, once the small base station is forbidden, identity authentication can be carried out through local Web, and then the cell is activated, so that the small base station is enabled again; and meanwhile, the small base station sends a message to the network management, the network management considers that the situation belongs to normal position movement, and the network management updates the initial PCI set and does not execute cell deactivation operation any more.
Fig. 5 is another flowchart of the anti-theft method of the integrated small cell base station of the present invention. As shown in fig. 5, the present invention relates to the field of network configuration, and is an anti-theft method for an integrated small cell, and the flow of the present invention is as shown in fig. 5, and in the embodiment of fig. 1, on the basis of steps S110, S120, and S130, step S140 is added, and after the small cell is activated by an authorized user, authorized mobile authentication information is sent to a network management server, and a corresponding preset cell identification code set is updated. At this time, the network manager does not execute the deactivation operation any more, and the small cell can be used normally. And after the network manager updates the corresponding preset cell identification code set, the anti-theft method of the integrated small cell base station of the invention can be continuously performed subsequently, but not limited thereto.
Fig. 6 is a flowchart illustrating step S140 in the embodiment of the anti-theft method for an integrated small cell base station according to the present invention. As shown in fig. 6, step S140 includes the steps of:
and S141, the small base station is activated by an authorized user.
And S142, after the small base station is activated, the small base station monitors and analyzes the synchronous signals of the surrounding adjacent stations to obtain a real-time adjacent station physical cell identification code set.
S143, the small base station sends the authorized mobile authentication information to the network management server, and the authorized mobile authentication information comprises the small base station activation information, the activated authorized user information and the activated real-time adjacent station physical cell identification code set.
S144, the network management server updates the preset cell identification code set corresponding to the small base station into the activated real-time adjacent station physical cell identification code set.
After the user can move the small base station by himself to obtain a new place (the small base station is deactivated), the user logs in a local web of the small base station through an authorized account, and the small base station is activated locally. Since the adjacent station physical cell identification code around the new location is completely different from the previous one, the preset cell identification code set corresponding to the activated mobile base station needs to be updated, so that the network management server updates the preset cell identification code set corresponding to the mobile base station into the activated real-time adjacent station physical cell identification code set by reporting the activated authorized mobile authentication information, thereby enabling the mobile base station to be normally started up and used in the new location, and continuing to perform the anti-theft method of the integrated mobile base station.
Fig. 7 is another flowchart of the anti-theft method of the integrated small base station of the present invention. As shown in fig. 7, the present invention relates to the field of network configuration, and is a method for preventing theft of an integrated small base station applied to a small base station, and the flow of the present invention includes:
s210, monitoring and analyzing synchronous signals of surrounding adjacent stations, acquiring a real-time adjacent station physical cell identification code set and reporting the real-time adjacent station physical cell identification code set to a network management server;
s220, executing offline operation according to the received deactivation instruction; and
s230, when receiving the cell activating operation after receiving the authorized login, sending the authorized mobile authentication information to the network management server.
The implementation principle of the above steps is described in the anti-theft method of the integrated small base station, and is not described herein again.
Fig. 8 is still another flowchart of the anti-theft method of the integrated small cell base station of the present invention. As shown in fig. 8, the present invention relates to the field of network configuration, and is a method for preventing theft of an integrated small base station applied to a network management server, and the flow of the present invention includes:
s310, receiving a real-time neighbor station physical cell identification code set uploaded by a small base station;
s320, comparing the real-time neighbor station physical cell identification code set with a corresponding preset cell identification code set, and judging whether the two sets are overlapped; and
s330, when the preset overlapping condition is not met, sending a deactivation instruction to the small base station, and enabling the small base station to be offline.
The implementation principle of the above steps is described in the anti-theft method of the integrated small base station, and is not described herein again.
Fig. 9 is a block diagram of the anti-theft system of the integrated small base station of the present invention. As shown in fig. 9, the anti-theft system of the integrated small base station of the present invention includes, but is not limited to:
the identification code analysis module 51 monitors and analyzes the synchronous signals of the surrounding adjacent stations by the small base station to obtain a real-time adjacent station physical cell identification code set and report the real-time adjacent station physical cell identification code set to the network management server;
the similarity judging module 52 compares the network management server with the corresponding preset cell identification code set based on the real-time neighbor physical cell identification code set to judge whether the two sets are overlapped; and
and the deactivation instruction module 53, when the preset overlap condition is not met, sends a deactivation instruction to the small base station, and takes the small base station offline.
The implementation principle of the above modules is described in the anti-theft method of the integrated small base station, and is not described herein again.
The integrated small base station anti-theft system can reduce the risk of losing the small base station, does not need to disassemble and assemble a physical anti-theft device, and does not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the deployment flexibility of the small base station is improved.
Fig. 10 is a block diagram of a network access module in an embodiment of the anti-theft system of the integrated small cell base station of the present invention. Fig. 11 is a block diagram of a network configuration module in the embodiment of the anti-theft system of the integrated small base station of the present invention. Fig. 12 is a block diagram of a communication detection module in an embodiment of the anti-theft system of the integrated small base station of the present invention. As shown in fig. 10 to 12, based on the embodiment of the apparatus in fig. 9, the anti-theft system of the integrated small base station of the present invention replaces the identification code analysis module 51 with the signal interception module 511, the identification code calculation module 512, and the set reporting module 513. The similarity judging module 52 is replaced by an identification code union module 521, an identification code intersection module 522, an overlap percentage module 523 and an overlap judging module 524. The deactivation command module 53 is replaced by deactivating the sending module 531 and the downline operation module 532. The following is described for each module:
the signal interception module 511 intercepts and analyzes a Primary Synchronization Signal (PSS) and a Secondary Synchronization Signal (SSS) of a neighboring cell when the small cell is activated.
And the identification code calculation module 512 is used for obtaining the physical cell identification code of each adjacent station according to the primary synchronization signal and the secondary synchronization signal. In LTE networks, PCI = PSS +3 sss. PSS (Primary Synchronization Signal) main Synchronization Signal occupies 6 RBs (radio blocks) of a system bandwidth, namely 72sc, in a frequency domain, and indicates ID Physical-layer ID in one Physical cell group: 0,1,2 (3). PSS is taken to be 0.. 2 (actually 3 different PSS sequences), SSS is taken to be 0.. 167 (actually 168 different SSS sequences), and the range of PCIs obtained using the above formula is from 0.. 503, so there are 504 PCIs in the physical layer.
And a set reporting module 513, which establishes a real-time neighbor physical cell identity set and reports the set to the network management server.
The identifier union module 521 obtains a union of the network management server based on the real-time neighbor physical cell identifier set and the corresponding preset cell identifier set. The preset cell identification code set is a real-time neighbor station physical cell identification code set uploaded when a small base station is started for the first time or started for the last time; or the preset cell identification code set is a set of all the neighbor physical cell identification codes with the occurrence frequency exceeding a preset threshold value in all the neighbor physical cell identification code sets uploaded by the small base station in history.
And the identifier intersection module 522 is used for obtaining the intersection of the network management server based on the real-time neighbor physical cell identifier set and the corresponding preset cell identifier set.
The overlap percentage module 523 obtains the percentage of all cell ids in the intersection to all cell ids in the union.
The overlap determination module 524 determines that the preset overlap condition is not satisfied when the percentage is smaller than the preset threshold.
The deactivating sending module 531 sends a deactivating instruction to the small cell when the small cell does not meet the preset overlapping condition.
And a offline operation module 532, which executes the offline operation according to the received deactivation instruction.
The implementation principle of the above steps is referred to the related introduction in the anti-theft method of the integrated small base station, and is not described herein again.
Fig. 13 is another block diagram of the anti-theft system of the integrated small base station of the present invention. As shown in fig. 13, on the basis of the embodiment of the apparatus in fig. 9, the anti-theft system of an integrated small base station of the present invention further includes an activation reporting module 54. The following is described for each module: and activating the reporting module 54, and after the small cell is activated by the authorized user, sending the authorized mobile authentication information to the network management server to update the corresponding preset cell identification code set, so that the corresponding preset cell identification code set can be updated again after the user replaces the small cell, and the integrated small cell anti-theft method can be continued.
Fig. 14 is a schematic block diagram of an activated reporting module in an embodiment of the anti-theft system of the integrated small base station of the present invention. As shown in fig. 14, the activation reporting module 54 includes the following modules:
and an authorized activation module 541, the small cell is activated by an authorized user.
And activating an interception module 542, and intercepting and analyzing the synchronization signals of the surrounding adjacent stations after the small base station is activated to obtain a real-time adjacent station physical cell identification code set.
And the authorization authentication module 543, where the small cell sends authorization mobile authentication information to the network management server, where the authorization mobile authentication information includes small cell activation information, activation authorization user information, and activated real-time neighbor cell identity set.
In the identification updating module 544, the network management server updates the preset cell identity set corresponding to the cell base station to the activated real-time physical cell identity set of the neighboring station.
Fig. 15 is a schematic diagram of a small base station listening to surrounding base stations in the implementation process of the anti-theft method of the integrated small base station of the present invention. Fig. 16 is a schematic diagram of main modules of each part in the implementation process of the anti-theft method of the integrated small base station of the invention. Fig. 17 is a sequence diagram illustrating an implementation procedure of the anti-theft method of the integrated small cell station according to the present invention. Fig. 15, 16 and 17 are schematic diagrams of implementation processes of the anti-theft method of the integrated small base station. The specific implementation flow of the anti-theft method of the integrated small base station of the present invention is shown in fig. 15, 16 and 17 (only the relevant parts of the present invention are described), and the flow is described as follows:
referring to fig. 15 and 16, the integrated small cell 3 (not shown in the figure) listens and records PCI information of surrounding base stations, and reports the PCI information to the network management server 4 in a set. The network management server 4 records the PCI information set reported by the integrated small base station 3, and if the number of the changed PCIs in the PCI information set exceeds a certain threshold value, the position of the small base station 3 is considered to be changed. The network management server 4 issues a cell deactivation instruction to the integrated small cell 3. If the customer wants to manually move the position of the integrated small base station 3, the customer can log in the local Web2, and after the identity information is verified, the local Web2 issues a cell activating instruction. After the method is used, a small base station 3 reports PCI information of an adjacent station 1 without adding a physical device, and a network management server 4 automatically controls the small base station 3 at the moved position to be incapable of working according to information change, so that the loss probability is reduced. If the client wants to move the small base station 3, the identity information can be verified through the local Web2, and then the small base station 3 is reconfigured to work.
Compared with the prior art, a synchronous signal interception and analysis module is newly added in the small base station 3 and used for intercepting the synchronous signals
(a) After the small cell 3 is powered on, the synchronization signals of the surrounding adjacent stations 1 are monitored, the PCI of the adjacent cell is analyzed according to the PSS and the SSS and recorded to the PCI set of the adjacent cell, and the PCI set is reported to the network management server 4.
(b) When the client performs identity verification through the local Web2 and executes the cell activation operation, the small base station 3 reports the autonomous position mobile message to the network management server 4, and the autonomous position mobile message carries identity authentication information and cell activation information.
And a position identification module and a modification configuration module of the newly added small base station 3 in the network management server 4.
(1) A small cell 3 location identification module, configured to:
a) And presetting a PCI number change threshold in the PCI set for judging whether the small base station 3 moves. And taking the PCI set reported when the small base station 3 is powered on for the first time as an initial PCI set. If the number of the changed PCIs in the PCI set subsequently reported by the small base station 3 is larger than the threshold value compared with the initial PCI set, the small base station 3 is considered to move and possibly stolen, and the configuration module is notified to deactivate the cell of the small base station 3; otherwise, no processing is performed.
b) And after receiving the autonomous position movement message reported by the small base station 3, the network management server 4 considers that the position movement is reasonable, updates the initial PCI set and does not issue the deactivated cell configuration.
(2) A modify configuration module to: and after receiving the message for deactivating the small base station 3 sent by the small base station 3 position identification module, executing a deactivation command.
And a client identity authentication module and a configuration modification module are added in the local Web 2.
(1) A client identity authentication module to: the identity of the client is authenticated, such as an identity card, a telephone number, a password and the like, and after the authentication is passed, the local Web2 can be used for activating the cell.
(2) A modify configuration module to: after the identity authentication of the client is passed, the cell activating operation can be executed; otherwise, the operation is not allowed to be performed.
Referring to fig. 17, the implementation is as follows:
step 1, the small base station 3 monitors the synchronous signal of the adjacent station 1, analyzes the PCI, and reports the PCI set of the adjacent station to the network management server 4.
And 2, the network management server 4 takes the PCI set reported after the small base station 3 is electrified for the first time as an initial PCI set, if the number of the changed PCIs in the PCI set reported by the subsequent small base station 3 is more than a certain threshold value compared with the initial PCI set, the small base station 3 is considered to move and possibly stolen, and a command for deactivating the cell is issued to the small base station.
And 3, if the customer moves the position of the small base station 3 manually, the customer identity authentication can be carried out through the local Web2, and after the customer identity authentication passes, a cell activating command is issued to the small base station 3.
And 4, the small base station 3 receives the cell activating command issued by the local Web2, executes the cell activating action, and reports the client identity authentication information and the cell activating information to the network management server 4.
And 5, after receiving the identity authentication information and the cell activation information of the small cell 3, the network management server 4 considers that the client artificially moves the position of the small cell 3 and updates the initial PCI set.
Compared with the prior art, the technical key points of the invention comprise:
the integrated small base station has the characteristics of plug and play, convenience in installation and use and the like, and is easy to steal when being applied to public places such as small factories, small commercial spaces, small parking lots and the like.
Existing base station anti-theft schemes include: video monitoring, dynamic environment monitoring, entrance guard management, security alarm, linkage and the like are added, and the loss of the base station is prevented by adding a physical device. If the method is applied to the integrated small base station, the following problems can exist:
1. the integrated small base station has the advantages of low cost, convenience in installation, reduction in construction, additional cost caused by the addition of a physical anti-theft device, complexity in physical construction, and worse experience along with the increase of the number of the small base stations in deployment.
2. When some customers use the integrated small base station, the deployment positions of the integrated small base station can be changed according to business requirements, and if a physical anti-theft device is adopted, the anti-theft device also needs to move along with the integrated small base station when the position of the integrated small base station is changed, so that the convenience is poor.
After the method of the invention is applied, the small base station can not be used after being stolen, thus greatly reducing the probability of being stolen:
1. the method of the invention can reduce the risk of losing the small base station without increasing physical anti-theft devices and without influencing the convenience of using the small base station and increasing the cost through the information interaction between the small base station and the adjacent station as well as between the small base station and the network management and the local Web.
2. For small base station customers, the method of the invention does not need to disassemble and assemble the physical anti-theft device, is more convenient to move the installation position of the integrated small base station, and improves the use flexibility.
The embodiment of the invention also provides anti-theft equipment of the integrated small base station, which comprises a processor. A memory having stored therein executable instructions of the processor. Wherein the processor is configured to perform the steps of the anti-theft method of the integrated small cell base station via execution of executable instructions.
As described above, the antitheft system of the integrated small base station according to the embodiment of the present invention can reduce the risk of losing the small base station without detaching or attaching a physical antitheft device, and does not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the deployment flexibility of the small base station is improved.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or program product. Thus, various aspects of the invention may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.), or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module, "or" platform.
Fig. 18 is a schematic view of the anti-theft device of the integrated small base station of the present invention. An electronic device 600 according to this embodiment of the invention is described below with reference to fig. 18. The electronic device 600 shown in fig. 18 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 18, the electronic device 600 is embodied in the form of a general purpose computing device. The components of the electronic device 600 may include, but are not limited to: at least one processing unit 610, at least one memory unit 620, a bus 630 connecting the different platform components (including the memory unit 620 and the processing unit 610), a display unit 640, etc.
Wherein the storage unit stores program code executable by the processing unit 610 to cause the processing unit 610 to perform steps according to various exemplary embodiments of the present invention described in the above-mentioned electronic prescription flow processing method section of the present specification. For example, processing unit 610 may perform the steps as shown in fig. 1.
The storage unit 620 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM) 6201 and/or a cache memory unit 6202, and may further include a read-only memory unit (ROM) 6203.
The memory unit 620 may also include a program/utility 6204 having a set (at least one) of program modules 6205, such program modules 6205 including, but not limited to: a processing system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 630 can be any bus representing one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 600 may also communicate with one or more external devices 700 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 600, and/or with any device (e.g., router, modem, etc.) that enables the electronic device 600 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 650. Also, the electronic device 600 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 660. The network adapter 660 may communicate with other modules of the electronic device 600 via the bus 630. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 600, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage platforms, to name a few.
The embodiment of the invention also provides a computer readable storage medium for storing the program, and the steps of the anti-theft method of the integrated small cell base station are realized when the program is executed. In some possible embodiments, the aspects of the present invention may also be implemented in the form of a program product comprising program code for causing a terminal device to perform the steps according to various exemplary embodiments of the present invention described in the above-mentioned electronic prescription flow processing method section of this specification, when the program product is run on the terminal device.
As described above, the antitheft system of the integrated small base station according to the embodiment of the present invention can reduce the risk of losing the small base station without detaching or attaching a physical antitheft device, and does not increase the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the deployment flexibility of the small base station is improved.
The program product 800 for implementing the above method according to an embodiment of the present invention may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited in this respect, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out processes of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In summary, the present invention is directed to an integrated small cell antitheft method, system, device and storage medium, which can reduce the risk of losing a small cell without requiring the physical antitheft apparatus to be detached and installed, and without increasing the cost. Meanwhile, the installation position of the integrated small base station is more convenient for a user to manually move, and the flexibility of the deployment of the small base station is improved.
The foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.

Claims (12)

1. An anti-theft method of an integrated small base station is characterized by comprising the following steps:
the small base station monitors and analyzes the synchronous signals of the surrounding adjacent stations to obtain a real-time adjacent station physical cell identification code set and reports the real-time adjacent station physical cell identification code set to the network management server;
the network management server compares the real-time neighbor station physical cell identification code set with a corresponding preset cell identification code set to judge whether the two sets are overlapped; and
and when the preset overlapping condition is not met, sending a deactivation instruction to the small base station, and enabling the small base station to be offline.
2. The anti-theft method for integrated small base station according to claim 1, wherein the small base station monitors and analyzes the synchronization signal of the neighboring stations around to obtain the real-time neighboring station physical cell identification code set and reports it to the network management server, comprising:
after the small base station is started, monitoring and analyzing a main synchronizing signal and an auxiliary synchronizing signal of surrounding adjacent stations;
acquiring a physical cell identification code of each adjacent station according to the primary synchronization signal and the secondary synchronization signal;
and establishing a real-time neighbor station physical cell identification code set and reporting to a network management server.
3. The anti-theft method for integrated small cell as claimed in claim 1, wherein the step of the network management server determining whether the two sets overlap based on the comparison between the set of the physical cell identification codes of the real-time neighboring station and the corresponding set of the preset cell identification codes comprises:
acquiring a union set of the network management server based on the real-time neighbor station physical cell identification code set and a corresponding preset cell identification code set;
acquiring the intersection of the network management server based on the real-time neighbor station physical cell identification code set and the corresponding preset cell identification code set;
the obtained percentage of all the cell identification codes in the intersection to all the cell identification codes in the union;
and when the percentage is smaller than a preset threshold value, the preset overlapping condition is not met.
4. The method of claim 3, wherein the obtaining the network management server based on the union of the real-time neighbor physical cell identity set and the corresponding preset cell identity set further comprises:
the preset cell identification code set is a real-time neighbor station physical cell identification code set uploaded when the small base station is started for the first time or started for the last time; or
And the intersection of the preset cell identification code sets is a set of all the neighbor station physical cell identification codes with the occurrence frequency exceeding a preset threshold in all the neighbor station physical cell identification code sets uploaded by the cell base station in history.
5. The integrated small cell antitheft method according to claim 1, wherein the sending a deactivation command to the small cell to take the small cell offline when the preset overlap condition is not met comprises:
when the small base station does not meet the preset overlapping condition, the network management server sends a deactivation instruction to the small base station;
and the small base station executes offline operation according to the received deactivation instruction.
6. The integrated small cell base station antitheft method according to claim 1, further comprising: and after the small base station is activated by an authorized user, sending authorized mobile authentication information to the network management server, and updating a corresponding preset cell identification code set.
7. The method of claim 6, wherein the step of sending an authorized mobile authentication message to the webmaster server after the femtocell is activated by an authorized user, and updating the corresponding set of preset cell identifiers comprises:
the small base station is activated by an authorized user;
after the small base station is activated, monitoring and analyzing synchronous signals of surrounding adjacent stations to obtain a real-time adjacent station physical cell identification code set;
the small base station sends authorized mobile authentication information to the network management server, wherein the authorized mobile authentication information comprises small base station activation information, activated authorized user information and an activated real-time adjacent station physical cell identification code set;
and the network management server updates a preset cell identification code set corresponding to the cell base station into an activated real-time neighbor station physical cell identification code set.
8. An anti-theft method of an integrated small base station is characterized by comprising the following steps:
monitoring and analyzing synchronous signals of surrounding adjacent stations to obtain a real-time adjacent station physical cell identification code set and report the real-time adjacent station physical cell identification code set to a network management server;
executing offline operation according to the received deactivation instruction;
and when receiving the cell activation operation after receiving the authorized login, sending authorized mobile authentication information to the network management server.
9. An anti-theft method of an integrated small base station is characterized by comprising the following steps:
receiving a real-time neighbor station physical cell identification code set uploaded by the small base station;
comparing the real-time neighbor station physical cell identification code set with a corresponding preset cell identification code set, and judging whether the two sets are overlapped;
and when the preset overlapping condition is not met, sending a deactivation instruction to the small base station, and enabling the small base station to be offline.
10. An anti-theft system of an integrated small base station is characterized by comprising
The identification code analysis module is used for monitoring and analyzing the synchronous signals of the surrounding adjacent stations by the small base station to obtain a real-time physical cell identification code set of the adjacent stations and reporting the real-time physical cell identification code set to the network management server;
the network management server compares the real-time neighbor station physical cell identification code set with a corresponding preset cell identification code set based on the similarity judgment module, and judges whether the two sets are overlapped; and
and the deactivation instruction module is used for sending a deactivation instruction to the small base station and enabling the small base station to be offline when the preset overlapping condition is not met.
11. An anti-theft device of an integrated small base station, comprising:
a processor;
a memory having stored therein executable instructions of the processor;
wherein the processor is configured to perform the steps of the anti-theft method of the integrated small cell base station of any one of claims 1 to 8 via execution of the executable instructions.
12. A computer-readable storage medium storing a program, characterized in that the program, when executed by a processor, implements the steps of the anti-theft method of an integrated small cell base station of any one of claims 1 to 8.
CN202210920097.2A 2022-08-01 2022-08-01 Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station Active CN115297466B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210920097.2A CN115297466B (en) 2022-08-01 2022-08-01 Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210920097.2A CN115297466B (en) 2022-08-01 2022-08-01 Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station

Publications (2)

Publication Number Publication Date
CN115297466A true CN115297466A (en) 2022-11-04
CN115297466B CN115297466B (en) 2024-05-14

Family

ID=83825512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210920097.2A Active CN115297466B (en) 2022-08-01 2022-08-01 Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station

Country Status (1)

Country Link
CN (1) CN115297466B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116112970A (en) * 2023-04-03 2023-05-12 北京市大数据中心 Small base station management method and device, network equipment, small base station and terminal

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166133A (en) * 2007-09-26 2008-04-23 中兴通讯股份有限公司 Location limit method and system for home base station
CN102104928A (en) * 2009-12-22 2011-06-22 中国联合网络通信集团有限公司 Method and system for limiting access position of home nodeB in WCDMA mobile system
CN103517369A (en) * 2012-06-18 2014-01-15 ***通信集团江苏有限公司 Method for restricting femtocell roaming, network management system and femtocell
WO2014071562A1 (en) * 2012-11-07 2014-05-15 Broadcom Corporation Small cell initial access and physical cell identity determination
CN103987041A (en) * 2014-05-07 2014-08-13 京信通信***(中国)有限公司 Small Cell base station position access limiting method, device and system
CN104185245A (en) * 2014-08-26 2014-12-03 京信通信***(中国)有限公司 Method, device and system for limiting access position of base station
CN104581875A (en) * 2015-01-14 2015-04-29 广州杰赛科技股份有限公司 Miniature base station accessing method and system
CN106101995A (en) * 2016-05-20 2016-11-09 京信通信技术(广州)有限公司 Location-authentication method and system
CN108271181A (en) * 2016-12-30 2018-07-10 上海大唐移动通信设备有限公司 A kind of PCI optimization method and devices of wireless network

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166133A (en) * 2007-09-26 2008-04-23 中兴通讯股份有限公司 Location limit method and system for home base station
CN102104928A (en) * 2009-12-22 2011-06-22 中国联合网络通信集团有限公司 Method and system for limiting access position of home nodeB in WCDMA mobile system
CN103517369A (en) * 2012-06-18 2014-01-15 ***通信集团江苏有限公司 Method for restricting femtocell roaming, network management system and femtocell
WO2014071562A1 (en) * 2012-11-07 2014-05-15 Broadcom Corporation Small cell initial access and physical cell identity determination
CN103987041A (en) * 2014-05-07 2014-08-13 京信通信***(中国)有限公司 Small Cell base station position access limiting method, device and system
CN104185245A (en) * 2014-08-26 2014-12-03 京信通信***(中国)有限公司 Method, device and system for limiting access position of base station
CN104581875A (en) * 2015-01-14 2015-04-29 广州杰赛科技股份有限公司 Miniature base station accessing method and system
CN106101995A (en) * 2016-05-20 2016-11-09 京信通信技术(广州)有限公司 Location-authentication method and system
CN108271181A (en) * 2016-12-30 2018-07-10 上海大唐移动通信设备有限公司 A kind of PCI optimization method and devices of wireless network

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116112970A (en) * 2023-04-03 2023-05-12 北京市大数据中心 Small base station management method and device, network equipment, small base station and terminal

Also Published As

Publication number Publication date
CN115297466B (en) 2024-05-14

Similar Documents

Publication Publication Date Title
US9949136B2 (en) Closed loop heterogeneous network for automatic cell planning
US11409881B2 (en) Method and apparatus for wireless signal based location security system
US9332553B2 (en) Use of licensed shared spectrum in a radio access network where signal propagation is unknown
US8526984B2 (en) Managing interference due to low power BSs
US20090286484A1 (en) Method and system for performing onsite maintenance of wireless communication systems
WO2010016123A1 (en) Base station device, mobile communication method and mobile communication system
US9763169B2 (en) Geographical detection of mobile terminals
US11082861B2 (en) Methods and apparatus for facilitating configuration, testing and/or deployment of a wireless system including a wireless extender
US8644814B2 (en) Automated fault reporting in femto cells
US8219139B2 (en) Radio base station accommodating method and network device
CN115297466B (en) Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station
US20190332824A1 (en) Handling wireless client devices associated with a role indicating a stolen device
CN102625230A (en) Building system communication method, apparatus and system thereof
KR101597272B1 (en) Method and Apparatus for Automatic Quality Control of Beacon Device for Location-Based Service
KR20150041407A (en) Trust Access Point connection Apparatus and Method
KR101013301B1 (en) System and method for managing location of femto cell access point and authenticating femto cell access point using the location
US10645666B2 (en) System and method for radio node location
CN111741473B (en) Method and device for controlling wireless coverage and network security
US10904852B2 (en) Method for positioning pico remote radio unit and system for positioning pico remote radio unit
US8805422B2 (en) Network device to monitor radio base station and a method thereof
KR100862747B1 (en) Method and apparatus for measuring air interface quality based on oma dm
KR20160092330A (en) Base station and control method thereof
CN113347634B (en) 4G and 5G air interface attack detection method based on signal and signaling fingerprint
KR20220169448A (en) Method and apparatus for detecting and blocking illegal devices in wired and wireless networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant