[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN101778396A - Method for detecting cognitive user in opportunity spectrum sharing system - Google Patents

Method for detecting cognitive user in opportunity spectrum sharing system Download PDF

Info

Publication number
CN101778396A
CN101778396A CN201010018323A CN201010018323A CN101778396A CN 101778396 A CN101778396 A CN 101778396A CN 201010018323 A CN201010018323 A CN 201010018323A CN 201010018323 A CN201010018323 A CN 201010018323A CN 101778396 A CN101778396 A CN 101778396A
Authority
CN
China
Prior art keywords
user
time
channel
inferior
main
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201010018323A
Other languages
Chinese (zh)
Other versions
CN101778396B (en
Inventor
孙君
朱洪波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN2010100183235A priority Critical patent/CN101778396B/en
Publication of CN101778396A publication Critical patent/CN101778396A/en
Application granted granted Critical
Publication of CN101778396B publication Critical patent/CN101778396B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for detecting a cognitive user in an opportunity spectrum sharing system, which relates to a design method for detecting a master user and sending data information frame length by the cognitive user (secondary user) in a system based on an opportunity spectrum access (OSA) technique in a cognitive network. The method comprises the following steps of: firstly, analyzing the testing frequency based the signal interference noise ratio of the secondary user; and secondly, defining the frame length of data transmission of the secondary user based on the testing frequency and the spectral optimization. A control channel is needed to be added in a single-channel multi-user scene, the selection and the scheduling of users are performed first, and then a method for detecting a single user is implemented. The basic thought of the method that the occupation condition of an authorized channel by the master user and the influence on the signal interference noise ratio (SINR) of the secondary user by the master user are analyzed, and thus the detection frequency and the transmission frame length of the secondary user are designed, and an optimizing and compromising scheme is found between the throughput of the secondary user and the collision probability with the master user.

Description

The detection method of cognitive user in opportunity spectrum sharing system
Technical field
The present invention relates generally to the method for designing that based on cognitive user (inferior user) in opportunistic spectrum access (OSA) technological system main user is detected and sends the data message frame length in a kind of cognition network.The basic thought of this method is to analyze main user influence to inferior subscriber signal interference-to-noise ratio (SINR) is appearred in the occupancy of authorization channel and main user, and design time user with this and detect frequency and transmission frame length, inferior user throughput and and main user's collision probability between find and optimize and the scheme of compromise.
Background technology
Opportunistic spectrum access (OSA) technology is meant and need not cooperation between the primary and secondary user that inferior user acts according to circumstances and uses main user's frequency spectrum resource.Main user need not to know time user's existence, brings extra expense can for main user.Inferior user at first intercepts local frequency spectrum, searching idle channel before access; If there is idle channel, just inferior user inserts; If temporarily do not have, just inferior user waits for that main user discharges channel; In inferior telex network process, in case main user need take the channel that time user is using, inferior user this channel of rapid release at the appointed time uses for main user.Therefore, in the OSA system, inferior user need detect in time to main user, and inferior user's detection time, the frame length that detects frequency and inferior user data transmission all have fundamental influence to inferior user's transmission quality itself and to main user's interference and transmission quality.
If detection time is long, frequency is high, the detection probability height of cognitive nodes is just can protect authorized user better.Simultaneously, this can bring time user to transmit the increase of interruption frequency, and the throughput of inferior user service data transmission reduces, and brings time delay thus.Therefore, for inferior user, hope has a rational transmission time and detection frequency, makes time user that as far as possible more chances of transmitting data continuously can be arranged, and transmits more business datum, and try one's best minimizing and main user's collision.
Same problem is present in single user's single channel applied environment and the multi-user competes the single channel environment, and the basic thought of the design under the different scenes is consistent, but needs to carry out necessary scheduling and coordination between the multi-user.
Summary of the invention
Technical problem: the purpose of this invention is to provide the detection method of a kind of cognitive user in opportunity spectrum sharing system, this method is based on cognitive user (inferior user) in opportunistic spectrum access (OSA) technological system main user to be detected and sends the method for designing of data message frame length in the cognition network, this method addresses the above problem and/or shortcoming, and the detection method that time user takes into account the increase throughput, reduces interference and conflict in a kind of cognition network is provided.
Technical scheme: the detection method of cognitive user of the present invention in opportunity spectrum sharing system is based on above consideration, solution is in wireless cognition network, between inferior user or inferior user, main user is detected the design of frequency and time user's transmission frame length, reach time user throughput and and main user's collision probability between optimization and compromise.
This method comprises two parts: the one, detect frequency from inferior subscriber signal interference-to-noise ratio angle analysis; The 2nd, from detecting the frame length of frequency and frequency spectrum optimization viewpoint definition time user data transmission; In single channel multi-user scene, need to increase control channel, at first carry out user's selection and scheduling, implement the detection method of unique user again, be specially:
1). single channel list user scene
Step 1: inferior user detects main user in the time at i, judges whether to exist main user, if exist main user to continue the detection of next i time; If there is no then time user according to main user to channel take rule and the channel conditions of self calculates its frame length T;
Step 2: according to Mathematical Modeling and the probabilistic method of main user to channel occupancy, calculate the average time user of time user when bumping Signal Interference and Noise Ratio SINR with main user, and the average SINR of inferior user when not bumping with main user;
Step 3: calculate the average boundary that can reach maximum throughput when time user and main user do not bump according to the average SINR of inferior user when not bumping with main user;
Step 4:, obtain the optimum time user's frame length that obtains from the spectrum efficiency optimal angle according to optimization criterion;
Step 5: according to the average SINR of inferior user when bumping with main user, and the average SINR of inferior user when not bumping with main user, in conjunction with the second-order statistics of SINR, calculate the inferior user who obtains from the SINR statistical property and detect frequency;
Step 6: detect at optimum the user's frame length that obtains from the spectrum efficiency optimal angle with from the inferior user that the SINR statistical property obtains and to get minimum value between frequency and obtain final inferior user's frame length T; After calculating T, carry out transfer of data in the time at T-i; After the transfer of data of a frame is intact, judge whether time user's data has been transmitted, if transmitted, inferior user sends CTS message to authorization channel, withdraws from this authorization channel; If inferior user data has not transmitted, then repeat above detection and transmission course,
2). single channel multi-user scene
In single channel multi-user scene, the concrete implementation step of inferior user's detection method is:
Step 7: distribute time slot i by control channel, N time user who exists in the current system in time at i carries out joint-detection to authorization channel, and the result fed back to control channel, carry out data fusion and judge whether main user exists by control channel, if exist then proceed joint-detection in the next i time; If there is no, control channel is according to optimizing utility function
Figure G2010100183235D00021
Select best access time user i, and send RTS/CTS message to i;
Step 8: selected inferior user carries out the detection step in single user's scene after receiving the message of control channel, and inferior user i calculates its frame length T according to main user to the channel conditions that takies rule and self of channel i, and at T iThe data of transmission time user i in the-i;
Step 9: when a frame data end of transmission, system judges whether all data of time user i have been transmitted, if transmitted, inferior user sends CTS message to control channel, withdraw from this authorization channel, control channel upgrades user's combination, and enters new round detection and transmission course; If inferior user data has not transmitted, then continue to repeat above the detection and transmission course.
Beneficial effect: experimental result proves, this scheme has realized that the effective collision between inferior user and main user suppresses, frequency spectrum share efficiently, and realized the fairness and the low probability conflict of competition between inferior user.And the not extra expense that increases the primary and secondary user of the scheme that the present invention proposes only need increase a control channel in multi-user's scene, realizes that cost and complexity are low.
Description of drawings
By below in conjunction with the accompanying drawing and the detailed description of carrying out, it is clearer that above and other objects of the present invention, characteristics and advantage will become, wherein;
Fig. 1 shows single CU authorization channel and detects the frame structure case of authorization channel.
Fig. 2 shows the frame structure case that the multi-user takies authorization channel and detects authorization channel.
Fig. 3 shows scheme flow chart among Fig. 1.
Fig. 4 shows scheme flow chart among Fig. 2.
Embodiment
Fig. 1 shows that single main CU authorization channel and single user detect authorization channel and in the frame structure case of authorization channel transmission data.With reference to Fig. 1, main user takies index of coincidence on-off discharge model to authorization channel.Main CU channel in this model, the average duration of promptly opening is β 0Main user is busy channel not, and promptly the average duration of Guaning is β i, main user is t by busy channel to discharging the used time of channel, its obeys index distribution.Suppose that time user's frame length is T, the t millisecond time is used for the detection to main subscriber channel before the transmission data.When detecting main user and not existing, transmit time user data in the time at T-i, in the transmission data procedures, main user can occur at any time, and the primary and secondary user data package can bump and made time user's data packet loss this moment.Frame length T has not only determined inferior user to transmit data length (inferior user throughput) but also has determined the frequency (collision probability) that inferior user detects main user.Fig. 2 shows single authorization channel multi-user's case.With reference to Fig. 2, also there is race problem between time user simultaneously in the same problem of determining frame length T that exists.
At first, here Ding Yi term definition is as follows:
SINR: inferior user's Signal Interference and Noise Ratio
γ:SINR
β 0: the average duration of main CU channel
β i: main user discharges the average duration of channel
T: main user by busy channel to discharging the used time of channel
Tt: main user is by discharging channel to the used time of busy channel
I: inferior user is to main user's detection time
T: inferior user's frame length
I: i time user
T i: the frame length of inferior user i
P 0: main user is in the received power of inferior user's receiving terminal
P s: inferior user is in the received power of inferior user's receiving terminal
N: system is number of users last time
N 0: AWGN power
N j: the SINR level passes through SINR thresholding γ jLevel crossing rate
P (): probability density function
F (): exponential distribution function
B: the channel width of authorization channel
γ c(T, τ, P s, P 0): time user's instantaneous SINR when bumping with main user
Figure G2010100183235D00041
Time user's average SINR when bumping with main user
γ Nc(T, τ, P s, P 0): time user's instantaneous SINR when not bumping with main user
Figure G2010100183235D00042
Time user's average SINR when not bumping with main user
Figure G2010100183235D00043
Time user can reach the on average lower bound of throughput when not bumping with main user
Figure G2010100183235D00044
I user can reach the on average lower bound of throughput when not bumping with main user when optimum frame length
T *: the inferior user's that the optimization throughput obtains optimum frame length
T i *: i time user's that the optimization throughput obtains optimum frame length
DF (P s, P 0): the inferior user's who obtains according to second-order statistics frame length
f D: the maximum doppler frequency of fading channel
Figure G2010100183235D00045
The average SINR of fading channel
RTS/CTS: request transmission/clear to send
The design that inferior user detected and sent the data message frame length is as follows:
1. single user's single channel scenario:
With reference to Fig. 1, in the time, when main user occurred, inferior user's SINR was expressed as at T
Figure G2010100183235D00046
Because t obeys following exponential distribution
Figure G2010100183235D00047
Average SINR when bumping at this moment, is expressed as
Figure G2010100183235D00048
Figure G2010100183235D00049
Figure G2010100183235D000410
Similarly, in the time, when main user did not occur, inferior user's SINR was expressed as at T
Figure G2010100183235D00051
Tt obeys following exponential distribution
f ( tt ) = 1 β 1 exp ( - tt β 1 ) dt
Average SINR when not bumping at this moment, is expressed as
Figure G2010100183235D00053
Figure G2010100183235D00054
The corresponding time user of this SINR can reach one of throughput on average lower bound, promptly
Inferior user is in the wireless authorization channel, and its characteristic of channel is consistent with the fading channel characteristic, and under the fading channel condition, the second-order statistics of inferior user SINR comprises two important parameters of the level crossing rate and the average duration of fading.
Inferior user's frame length T is by following formula definition
T=min(T *,DF(P s,P 0))
T *Obtain by following optimization
Figure G2010100183235D00056
DF (P s, P 0) obtain by following formula
Figure G2010100183235D00057
At this,
N j = 2 π γ j γ ‾ f D e - γ j / γ ‾
2. multi-user's single channel scenario
Each time user's frame length is definite consistent with single user's single channel scenario in multi-user's single channel scenario, and different is scheduling and the distribution that has increased MAC between inferior user, to avoid the collision between time user.For this reason, need a control channel.With reference to Fig. 2, participate in the individual time joint detection of users authorization channel of N of application authorization channel in time and testing result is sent to control channel at i, control channel obtains result that main user is detected by data fusion, if main user does not occur, according to the utility function of the maximization availability of frequency spectrum
arg max i ( R min ‾ ( T i * ) ) i
Select the best channel time user i that uses, and by send the RTS/CTS order to inferior user i.When the frame length end of transmission of inferior user i, above process repeats, and selects the use time user and the corresponding frame length of next frame.
Preferential embodiment of the present invention is here described below with reference to accompanying drawings.Because known function and structure make the present invention fuzzy in unnecessary details, therefore they are described no longer in the following description.
A. single channel list user scene
With reference to Fig. 3, the concrete implementation step of time user's detection scheme is in single channel list user scene:
In step 310, inferior user detects main user in the time at i.In step 312, judge whether to have main user, if having main user then return step 310; If there is no then time user carries out transfer of data at the T-i that calculates in the time.After the transfer of data of a frame is intact, judge in step 316 whether all data of time user have been transmitted, enter step 318 if transmitted, inferior user sends CTS message to authorization channel, withdraws from this authorization channel.If inferior user data has not transmitted, then enter step 310, repeat above the detection and transmission course.
B. single channel multi-user scene
With reference to Fig. 4, the concrete implementation step of time user's detection scheme is in single channel multi-user scene: in step 410, distribute time slot i by control channel, N time user who exists in the current system in time at i carries out joint-detection to authorization channel, and the result fed back to control channel, carry out data fusion and judge in step 412 whether main user exists by control channel.If exist then return step 410; If there is no, in step 414, control channel is according to utility function
Figure G2010100183235D00062
Select best access time user i, and send RTS/CTS message to i.After receiving message, inferior user i is according to the corresponding frame length T of state computation of oneself i, and in Ti-i the data of transmission time user i.Whether all data of judging time user i in step 418 have been transmitted, and enter step 420 if transmitted, and inferior user sends CTS message to control channel, withdraws from this authorization channel, and control channel upgrades user's combination in step 422, and reenters step 410.If inferior user data has not transmitted, then enter step 410, repeat above the detection and transmission course.

Claims (1)

1. the detection method of a cognitive user in opportunity spectrum sharing system is characterized in that this method comprises two parts: the one, detect frequency from inferior subscriber signal interference-to-noise ratio angle analysis; The 2nd, from detecting the frame length of frequency and frequency spectrum optimization viewpoint definition time user data transmission; In single channel multi-user scene, need to increase control channel, at first carry out user's selection and scheduling, implement the detection method of unique user again, be specially:
1). single channel list user scene
Step 1: inferior user detects main user in the time at ι, judges whether to exist main user, if exist main user to continue the detection of next ι time; If there is no then time user according to main user to channel take rule and the channel conditions of self calculates its frame length T;
Step 2: according to Mathematical Modeling and the probabilistic method of main user to channel occupancy, calculate the average time user of time user when bumping Signal Interference and Noise Ratio SINR with main user, and the average SINR of inferior user when not bumping with main user;
Step 3: calculate the average boundary that can reach maximum throughput when time user and main user do not bump according to the average SINR of inferior user when not bumping with main user;
Step 4:, obtain the optimum time user's frame length that obtains from the spectrum efficiency optimal angle according to optimization criterion;
Step 5: according to the average SINR of inferior user when bumping with main user, and the average SINR of inferior user when not bumping with main user, in conjunction with the second-order statistics of SINR, calculate the inferior user who obtains from the SINR statistical property and detect frequency;
Step 6: detect at optimum the user's frame length that obtains from the spectrum efficiency optimal angle with from the inferior user that the SINR statistical property obtains and to get minimum value between frequency and obtain final inferior user's frame length T; After calculating T, in the T-ι time, carry out transfer of data; After the transfer of data of a frame is intact, judge whether time user's data has been transmitted, if transmitted, inferior user sends CTS message to authorization channel, withdraws from this authorization channel; If inferior user data has not transmitted, then repeat above detection and transmission course,
2). single channel multi-user scene
In single channel multi-user scene, the concrete implementation step of inferior user's detection method is:
Step 7: distribute time slot ι by control channel, N time user who exists in the current system in time at ι carries out joint-detection to authorization channel, and the result fed back to control channel, carry out data fusion and judge whether main user exists by control channel, if exist then proceed joint-detection in the next ι time; If there is no, control channel is according to optimizing utility function
Figure F2010100183235C00011
Select best access time user i, and send RTS/CTS message to i;
Step 8: selected inferior user is after receiving the message of control channel, carry out the detection step in single user's scene, inferior user i calculates its frame length Ti according to main user to the channel conditions that takies rule and self of channel, and in Ti-ι the data of transmission time user i;
Step 9: when a frame data end of transmission, system judges whether all data of time user i have been transmitted, if transmitted, inferior user sends CTS message to control channel, withdraw from this authorization channel, control channel upgrades user's combination, and enters new round detection and transmission course; If inferior user data has not transmitted, then continue to repeat above the detection and transmission course.
CN2010100183235A 2010-01-13 2010-01-13 Detection method for cognitive user in opportunity spectrum sharing system Expired - Fee Related CN101778396B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010100183235A CN101778396B (en) 2010-01-13 2010-01-13 Detection method for cognitive user in opportunity spectrum sharing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010100183235A CN101778396B (en) 2010-01-13 2010-01-13 Detection method for cognitive user in opportunity spectrum sharing system

Publications (2)

Publication Number Publication Date
CN101778396A true CN101778396A (en) 2010-07-14
CN101778396B CN101778396B (en) 2012-05-09

Family

ID=42514674

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010100183235A Expired - Fee Related CN101778396B (en) 2010-01-13 2010-01-13 Detection method for cognitive user in opportunity spectrum sharing system

Country Status (1)

Country Link
CN (1) CN101778396B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102711120A (en) * 2012-05-23 2012-10-03 西安电子科技大学 Cooperative frequency spectrum sensing method based on DS (Dempter-Shafer) evidence theory
CN102883451A (en) * 2012-10-12 2013-01-16 南京邮电大学 Cross layer design method of up resources of shared system by terminal direction connection technology
CN104244431A (en) * 2013-06-24 2014-12-24 电信科学技术研究院 Transmission scheduling method and device in cognitive radio system
CN104702395A (en) * 2015-03-26 2015-06-10 山东大学 Fair and high-energy-efficiency united resource allocation method adopted in collaborative cognitive network
CN105592563A (en) * 2014-10-21 2016-05-18 中国人民解放军理工大学 Multi-user opportunity spectrum access method
CN106464429A (en) * 2014-03-31 2017-02-22 瑞典爱立信有限公司 Enhanced grant detection method
CN110214456A (en) * 2017-01-13 2019-09-06 高通股份有限公司 Transmitting in (NR-SS) from primary uplink (UL) is shared in new radio-frequency spectrum

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404513B (en) * 2008-10-21 2012-05-30 浙江大学 Fast multi-signal channel combined detection method based on illation in cognition radio communication system
CN101489234B (en) * 2009-01-16 2010-06-02 清华大学 Opportunistic spectrum access method based on collision probability constraint

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102711120B (en) * 2012-05-23 2014-11-12 西安电子科技大学 Cooperative frequency spectrum sensing method based on DS (Dempter-Shafer) evidence theory
CN102711120A (en) * 2012-05-23 2012-10-03 西安电子科技大学 Cooperative frequency spectrum sensing method based on DS (Dempter-Shafer) evidence theory
CN102883451A (en) * 2012-10-12 2013-01-16 南京邮电大学 Cross layer design method of up resources of shared system by terminal direction connection technology
CN102883451B (en) * 2012-10-12 2015-04-15 南京邮电大学 Cross layer design method of up resources of shared system by terminal direction connection technology
CN104244431B (en) * 2013-06-24 2017-12-19 电信科学技术研究院 Transmission dispatching method and device in cognitive radio system
CN104244431A (en) * 2013-06-24 2014-12-24 电信科学技术研究院 Transmission scheduling method and device in cognitive radio system
CN106464429B (en) * 2014-03-31 2019-11-05 Oppo 广东移动通信有限公司 Enhancing authorization detection method
CN106464429A (en) * 2014-03-31 2017-02-22 瑞典爱立信有限公司 Enhanced grant detection method
CN105592563A (en) * 2014-10-21 2016-05-18 中国人民解放军理工大学 Multi-user opportunity spectrum access method
CN105592563B (en) * 2014-10-21 2018-12-14 中国人民解放军理工大学 A kind of multi-user's opportunistic spectrum access method
CN104702395B (en) * 2015-03-26 2018-06-05 山东大学 Fair and high efficiency federated resource distribution method in a kind of cooperative cognitive network
CN104702395A (en) * 2015-03-26 2015-06-10 山东大学 Fair and high-energy-efficiency united resource allocation method adopted in collaborative cognitive network
CN110214456A (en) * 2017-01-13 2019-09-06 高通股份有限公司 Transmitting in (NR-SS) from primary uplink (UL) is shared in new radio-frequency spectrum

Also Published As

Publication number Publication date
CN101778396B (en) 2012-05-09

Similar Documents

Publication Publication Date Title
CN101778396B (en) Detection method for cognitive user in opportunity spectrum sharing system
CN1921421B (en) Method and apparatus for measuring quality of wireless channels
US9706575B2 (en) Multiple access method and system with frequency multiplexing of several request to send messages per source node
CN101527915A (en) Band dynamic selecting and time scheduling method in heterogeneous network
CN107222869A (en) Radio communication in the environment with electronic interferences
CN104994591A (en) Adjustment method, adjustment system of channel acquisition probability and base station
CN101098301A (en) Two-layer congestion control method of wireless network
WO2016070772A1 (en) Method and device for performing carrier scheduling
CN108401277A (en) The method and device of wireless network access, terminal device
CN109548156B (en) Single-channel Time Division Multiple Access (TDMA) satellite cluster ad hoc network time slot resource allocation method
EP3247157B1 (en) Method for managing wireless resources, and access point using same
Li et al. An RSU-coordinated synchronous multi-channel MAC scheme for vehicular ad hoc networks
Kim et al. Performance analysis of fair medium access control protocol for asymmetric full duplex in WLAN
CN104394534A (en) Two-stage central cooperative frequency spectrum sharing mechanism based on priority queue
CN107211459B (en) Access point AP, station STA, communication system and data transmission method
CN107750057B (en) Method for establishing control channel in cognitive radio network
EP2359543B1 (en) A method for estimation of residual bandwitdth
CN103024796A (en) Bandwidth estimation method for wireless Mesh network
CN101646176A (en) Distance tree protocol frame of medium access control (MAC) layer based on opportunistic spectrum access (OSA) technology
Aydogdu et al. Goodput and throughput comparison of single‐hop and multi‐hop routing for IEEE 802.11 DCF‐based wireless networks under hidden terminal existence
CN106686699B (en) A kind of more AP selection methods based on available bandwidth
Hung et al. Performance modeling and analysis of the IEEE 802.11 distribution coordination function in presence of hidden stations
Khalaf et al. Throughput and delay analysis of multihop IEEE 802.11 networks with capture
CN109951864A (en) The system performance analysis method coexisted based on the imperfect spectrum detection of LAA and WiFi
Chen et al. Improved MAC protocols for DCF and PCF modes over fading channels in wireless LANs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20100714

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000207

Denomination of invention: Method for detecting cognitive user in opportunity spectrum sharing system

Granted publication date: 20120509

License type: Common License

Record date: 20161109

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EC01 Cancellation of recordation of patent licensing contract
EC01 Cancellation of recordation of patent licensing contract

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000207

Date of cancellation: 20180116

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120509

Termination date: 20180113