Stealing situation processing and optimizing method and system applied to burglar proofing of node B

A base station and stealing technology, applied in electrical components, wireless communication, etc., can solve the problems of wasting manpower, false alarms of anti-theft software systems, and inability to notify in time, and achieve the effect of flexible methods, reduction of redundant links, and optimization of processing functions.

Active Publication Date: 2015-05-20
GOSUNCN TECH GRP
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the implementation of the anti-theft process, electronic monitoring is not perfect because of its own implementation process. figure 1 As shown, after the theft occurs, the responsible person cannot be notified in time to remedy the theft scene, the responsibility cannot be effectively assigned, and it can only be completed through manual notification, which is inefficient. Wasting manpower or causing major accidents that cannot be dealt with in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stealing situation processing and optimizing method and system applied to burglar proofing of node B
  • Stealing situation processing and optimizing method and system applied to burglar proofing of node B

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with the drawings.

[0027] The processing flow of the present invention is as attached figure 2 As shown, in terms of the responsibility of the base station, first, the personnel information involved, such as name, mobile phone, etc., is manually entered in the anti-theft software system platform as the central software system through the authority of the system administrator. This information defines the scope of the responsible person. Responsibility designation adopts a combination of two modes: First, the system administrator directly designates the responsible person for different base stations on the system, the purpose is to designate the long-term responsible person for the base station; Second, the relevant personnel can use SMS via mobile phones Log in to the base station in the same way, log out by SMS, and cancel the responsibility association. The purpose is for short-term temporary managem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a steaming situation processing and optimizing method and system applied to burglar proofing of a node B. The system comprises a central software system and a stealing situation alarm system, wherein the central software system and the stealing situation alarm system are connected through a wired or wireless network; the stealing situation alarm system is connected with burglarproof monitoring equipment of the node B and transmits stealing situation information sent by the monitoring equipment to the central software system; and the central software system generates stealing situation alarm information. Additionally, the system also comprises a responsible person configuration module and a communication module, wherein the responsible person configuration module can manually or automatically configure responsible person information corresponding to the node B, and the central software system is in direct communication with a responsible person through the communication module after generating the stealing situation alarm information.

Description

Technical field [0001] The invention belongs to the technical field of implementing anti-theft on remote base stations in the mobile communication industry, and particularly relates to an optimization system and method for effective maintenance processing of generated theft alarms. Background technique [0002] At present, wireless networks have covered every corner, and major telecom operators have continued to expand base stations to satisfy a wider audience. Especially in the 3G era, the three major telecom operators are accelerating the expansion or reconstruction of base stations nationwide, and the total number of base stations in the country continues to expand. However, while meeting the needs of a wider range of users, telecom operators also need to increase the anti-theft monitoring of base stations. [0003] In reality, the theft of base stations is very serious, especially in remote areas. Stealing techniques are becoming more and more professional. Correspondingly, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W24/04
Inventor 喻越甘勇华涛李海辉王彦耀刘双广
Owner GOSUNCN TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products