CPC H04L 41/082 (2013.01) [G06F 16/252 (2019.01); H04L 41/28 (2013.01)] | 14 Claims |
1. A pico-base station configuration method, comprising
acquiring a request message for requesting data configuration of a pico-base station, wherein the request message comprises parameters of a pico-base station configuration model object and a pico-base station configuration model sub-object;
verifying the request message;
calling a thread corresponding to the request message in a sqlite database to execute warehousing processing on the parameters of the pico-base station configuration model object and the pico-base station configuration model sub-object, in a case where the request message passes the verification; and
carrying out configuration validation processing on the pico-base station configuration model object and the pico-base station configuration model sub-object, in a case of determining that the warehousing processing is executed successfully;
wherein verifying the request message comprises: parsing the request message, and determining a command word of the request message; comparing the command word with an authentication command word loaded in a system starting process, and judging whether the command word is legal or not based on a comparison result;
wherein the method further comprises: parsing the request message, determining a command code of the request message, and determining the pico-base station configuration model object and the pico-base station configuration model sub-object corresponding to the request message according to the command code; after judging whether the command word of the request message is legal or not based on the comparison result, the method further comprises: sending a configuration instruction to the pico-base station configuration model object and the pico-base station configuration model sub-object based on the request message to indicate the pico-base station configuration model object and the pico-base station configuration model sub-object to carry out target configuration processing based on the configuration instruction, in a case where the command word of the request message is legal; and, feeding back authentication failure information, in a case where the command word of the request message is not legal.
|