Stealing situation processing and optimizing method and system applied to burglar proofing of node B

An optimization method and base station technology, applied in electrical components, wireless communication, etc., can solve problems such as inability to effectively assign responsibilities, inability to handle major accidents in a timely manner, and inability to notify the scene of theft in time, to avoid untimely processing, clear responsibilities, and Optimizing the effect of processing functions

Active Publication Date: 2011-07-13
GOSUNCN TECH GRP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the implementation of the anti-theft process, electronic monitoring is not perfect because of its own implementation process. figure 1 As shown, after the theft occurs, the responsible person cannot be notified in time to remedy the theft scene, the responsibility cannot be effectively assigned, and it can only be completed through manual notification, which is inefficient. Wasting manpower or causing major accidents that cannot be dealt with in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stealing situation processing and optimizing method and system applied to burglar proofing of node B
  • Stealing situation processing and optimizing method and system applied to burglar proofing of node B
  • Stealing situation processing and optimizing method and system applied to burglar proofing of node B

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described below in conjunction with the accompanying drawings.

[0028] The processing flow of the present invention is as attached figure 2 As shown, in terms of base station responsibilities, first of all, through the authority of the system administrator, manually enter the personnel information involved in the anti-theft software system platform as the central software system, such as name, mobile phone, etc. This information specifies the scope of the responsible person. Responsibility designation adopts the method of combining two modes: first, the system administrator directly designates the person in charge of management for different base stations on the system, the purpose is to designate the person in charge of the base station for a long time; second, the relevant personnel can use SMS via mobile phone Log in via SMS and associate with the base station, and also log out via SMS to cancel the responsibility association. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a steaming situation processing and optimizing method and system applied to burglar proofing of a node B. The system comprises a central software system and a stealing situation alarm system, wherein the central software system and the stealing situation alarm system are connected through a wired or wireless network; the stealing situation alarm system is connected with burglarproof monitoring equipment of the node B and transmits stealing situation information sent by the monitoring equipment to the central software system; and the central software system generates stealing situation alarm information. Additionally, the system also comprises a responsible person configuration module and a communication module, wherein the responsible person configuration module can manually or automatically configure responsible person information corresponding to the node B, and the central software system is in direct communication with a responsible person through the communication module after generating the stealing situation alarm information.

Description

[0001] technical field [0002] The invention belongs to the technical field of anti-theft for remote base stations in the mobile communication industry, and in particular relates to an optimization system and method for effectively maintaining and processing generated theft alarms. Background technique [0003] At present, the wireless network has covered every corner, and major telecom operators continue to expand base stations to meet the needs of a wider group of people. Especially in the 3G era, the three major telecom operators are accelerating the expansion or reconstruction of base stations nationwide, and the total number of base stations in the country continues to expand. However, telecom operators also need to increase the anti-theft monitoring of base stations while meeting the needs of a wider range of users. [0004] In reality, the theft of base stations is very serious, especially in remote areas. Stealing methods are also becoming more and more profession...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W24/04
Inventor 喻越甘勇华涛李海辉王彦耀刘双广
Owner GOSUNCN TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products