US 11,985,029 B2
Pico-base station configuration method and apparatus, storage medium and electronic apparatus
Hai Wang, Zhejiang (CN); Gang Liang, Zhejiang (CN); Deming Wang, Zhejiang (CN); and Yang Deng, Zhejiang (CN)
Assigned to SUNWAVE COMMUNICATIONS CO., LTD., Zhejiang (CN); BTI WIRELESS LTD., Hong Kong (CN); and BRAVO TECH INC, La Mirada, CA (US)
Appl. No. 17/926,143
Filed by SUNWAVE COMMUNICATIONS CO., LTD., Zhejiang (CN); BTI WIRELESS LTD, Hong Kong (CN); and BRAVO TECH INC, La Mirada, CA (US)
PCT Filed Apr. 29, 2021, PCT No. PCT/CN2021/090882
§ 371(c)(1), (2) Date Nov. 18, 2022,
PCT Pub. No. WO2022/033079, PCT Pub. Date Feb. 17, 2022.
Claims priority of application No. 202010820529.3 (CN), filed on Aug. 14, 2020.
Prior Publication US 2023/0198841 A1, Jun. 22, 2023
Int. Cl. H04L 41/28 (2022.01); G06F 16/25 (2019.01); H04L 41/082 (2022.01)
CPC H04L 41/082 (2013.01) [G06F 16/252 (2019.01); H04L 41/28 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A pico-base station configuration method, comprising
acquiring a request message for requesting data configuration of a pico-base station, wherein the request message comprises parameters of a pico-base station configuration model object and a pico-base station configuration model sub-object;
verifying the request message;
calling a thread corresponding to the request message in a sqlite database to execute warehousing processing on the parameters of the pico-base station configuration model object and the pico-base station configuration model sub-object, in a case where the request message passes the verification; and
carrying out configuration validation processing on the pico-base station configuration model object and the pico-base station configuration model sub-object, in a case of determining that the warehousing processing is executed successfully;
wherein verifying the request message comprises: parsing the request message, and determining a command word of the request message; comparing the command word with an authentication command word loaded in a system starting process, and judging whether the command word is legal or not based on a comparison result;
wherein the method further comprises: parsing the request message, determining a command code of the request message, and determining the pico-base station configuration model object and the pico-base station configuration model sub-object corresponding to the request message according to the command code; after judging whether the command word of the request message is legal or not based on the comparison result, the method further comprises: sending a configuration instruction to the pico-base station configuration model object and the pico-base station configuration model sub-object based on the request message to indicate the pico-base station configuration model object and the pico-base station configuration model sub-object to carry out target configuration processing based on the configuration instruction, in a case where the command word of the request message is legal; and, feeding back authentication failure information, in a case where the command word of the request message is not legal.