Network signal measuring method
Technical Field
The invention relates to the technical field of computers, in particular to a network signal measuring method.
Background
With the development of the internet, the processing capacity and the storage capacity of the terminal have also been rapidly developed. More and more people carry out various activities such as entertainment, reading, office and the like through the terminal, and the life of the terminal and the people is more and more compact. Meanwhile, people put forth higher demands on the endurance time of the terminal. In the conventional manner, when the terminal is in the ENDC (EUTRAwithNRDualConnection, 4G and 5GNR dual connectivity) mode and is in a non-connectivity state with the 5G wireless network, the terminal continuously measures the 5G wireless network signal according to the measurement configuration information.
A wireless network signal measuring method, apparatus, computer device and storage medium as disclosed in the prior art with publication number CN 113676941A. The method comprises the steps of receiving a 5G wireless network signal measurement instruction when the 5G wireless network is in a non-connection state, enabling the 5G wireless network signal measurement instruction to carry measurement configuration information, obtaining a first measurement period according to the 5G wireless network signal measurement instruction, measuring network signals of the 5G wireless network according to the first measurement period and the measurement configuration information to obtain a measurement result, comparing the measurement result with a preset signal threshold to obtain a comparison result, obtaining a second measurement period according to the 5G wireless network signal measurement instruction, and adjusting the second measurement period according to the comparison result. By adopting the method, the power consumption of the terminal can be reduced so as to prolong the endurance time of the terminal.
Although the foregoing technical solution reduces the power consumption of the terminal through signal measurement, when the 5G wireless network is in a non-connection state, if there is not enough security verification in this process, a malicious third party sends a fake measurement instruction, which may cause the terminal to execute unexpected operations, and meanwhile, the foregoing technical solution adjusts the second measurement period according to the comparison result, if there is no security policy, the second measurement period may be maliciously utilized to interfere with the normal operation of the network.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a network signal measuring method which has the advantages of safety verification, prevention of the invasion of a terminal by a third party fake instruction, no interference of a safety strategy to network operation and the like when receiving a measuring instruction, and solves the problems of the prior art.
In order to achieve the above purpose, the invention provides a network signal measuring method, which comprises the following steps:
When the 5G wireless network is in a non-connection state, the terminal receives a 5G wireless network signal measurement instruction, the instruction carries measurement configuration information, and a public key infrastructure is used for verifying the identity of an entity sending the measurement instruction;
Acquiring and applying a measurement period, namely acquiring a first measurement period according to the verified measurement instruction, measuring network signals of the 5G wireless network according to the first measurement period and measurement configuration information, and recording a measurement result;
Comparing the measurement result with a preset signal threshold to obtain a comparison result, acquiring a second measurement period according to a measurement instruction, and adjusting the second measurement period by using a predefined strategy in a security strategy module to ensure that the adjustment process does not interfere with the normal operation of the network;
Monitoring and exception handling, namely monitoring the processing of the measurement instruction and the adjustment process of the measurement period in real time, identifying the measurement period adjustment request with frequent exception, triggering an alarm mechanism, starting an additional safety examination flow, and taking corresponding safety measures according to examination results.
Preferably, the 5G wireless network signal measurement instruction received by the terminal in the step one is expressed asThe carried measurement configuration information is;
Verifying the identity of an entity sending a measurement instruction, and performing identity verification by using a public key infrastructure, wherein the expression is as follows:
Wherein, Is the public key of the instruction sending entity E,Is a function for verifying the identity of the entity that issued the instruction.
Preferably, in the first step, the digital signature verification expression for the measurement instruction is:
Wherein: is a function for verifying the digital signature of the instruction; is a digital signature of the instruction, used to prove the origin and integrity of the instruction; is the original data of the instruction For ensuring that the data is not tampered with during transmission,Is the public key of the entity that issued the instruction for verifying the validity of the digital signature.
Preferably, the obtaining the first measurement period expression in the second step is:
wherein, the method comprises the steps of, Is a first measurement period; Representing an operation of extracting a measurement cycle from instruction I;
measuring according to the first measurement period and measurement configuration information:
using measuring periods And measurement configuration informationMeasuring 5G network signals:
wherein R is the recorded measurement result; expressed in cycles Internal according to the configurationAnd (3) performing signal measurement.
Preferably, the comparing result in the third step and adjusting the measurement period expression is:
comparing the measurement result R with a preset signal threshold L:
wherein C is the comparison result; Indicating that the measurement result R is compared with the signal threshold L, and the result may be a boolean value or a comparison indicator;
Acquiring a second measurement period from the measurement instruction:
wherein, the method comprises the steps of, Is a second measurement period; representing slave instructions The operation of extracting the second measurement period.
Preferably, in the third step, the second measurement period expression is obtained according to the measurement instruction, where:
wherein, the method comprises the steps of, Is a second measurement period; representing slave instructions Extracting a second measurement period;
in the third step, a predefined strategy in the security strategy module is used for adjusting the second measurement period, and the expression is:
wherein, the method comprises the steps of, Is the adjusted measurement period; Representing usage security policies For the second measuring periodAnd (5) adjusting.
Preferably, the expression for ensuring that the adjustment process does not interfere with the normal operation of the network in the third step is as follows:
wherein, the method comprises the steps of, Is a boolean value indicating whether the adjusted period is valid; representing the adjusted period And (5) verifying to ensure that the normal operation of the network is not affected.
Preferably, the real-time monitoring expression in the fourth step is:
wherein, the method comprises the steps of, Representing a measurement instruction, C representing measurement period adjustment;
in the fourth step, the measurement period adjustment request with abnormal frequency is identified, and the adjustment request frequency in the time period T is calculated:
wherein N is the number of adjustment requests in the time period T;
Setting a threshold value And detecting whether it is abnormal:
If (3) Greater thanThenTrue, otherwise false.
Preferably, the conditional expression triggering the alarm and starting the examination in the fourth step is:
; And wherein: is a variable to indicate whether an alarm needs to be triggered, if If true, thenAnd is also set to true, indicating that the system needs to trigger an alarm mechanism, otherwise,If false, not triggering an alarm; to initiate a security audit, it is an operation or process in the text that is used to indicate that it is triggered when a network behavioral anomaly is detected.
Preferably, in the third step, a corresponding security measure expression is adopted according to the examination result, where:
determining a safety measure: wherein, the method comprises the steps of, Is based onA function of the security measure is determined.
Compared with the prior art, the invention provides a network signal measuring method, which has the following beneficial effects:
1. The invention performs identity verification by the measurement instruction carrying the public key infrastructure in step one, which means that the system uses the public key of the instruction sending entity To verify its identityIn this way, it is ensured that the instruction is indeed sent by a legitimate, trusted entity, thus preventing counterfeiting, the measurement instruction also undergoes digital signature verificationDigital signature of instructionsTo prove the origin and integrity of instructionsIs the hash value of the original data of the instruction, is used for ensuring that the data is not tampered in the transmission process, ensures that the instruction is not tampered in the transmission process, and is really from the purported sender, and uses an encryption protocol SSL to protect the security of the instruction. The method ensures that data cannot be intercepted and tampered by a third party in the instruction transmission process, and achieves the beneficial effects of safety verification and prevention of terminal intrusion by fake instructions of the third party when receiving the measurement instructions.
2. The present invention adjusts the measurement period by using a predefined policy in the security policy module in step threeThe predefined strategy is carefully designed to minimize interference with the normal operation of the network when the measurement period is adjusted, and generally includes consideration of network load, data traffic, and other critical metrics to ensure that the adjustment does not negatively impact network performance, and validity verification is performed after the measurement period is adjustedThis step checks whether the adjusted measurement period would interfere with the normal operation of the network,The function ensures that the function cannot cause network performance degradation or other negative effects by evaluating the influence of the adjusted period on the network, verifies and avoids network problems caused by improper adjustment, and achieves the beneficial effect that the network operation cannot be interfered by the security policy.
Drawings
FIG. 1 is a schematic diagram of the method of the present invention;
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a network signal measurement method includes the following steps:
When the 5G wireless network is in a non-connection state, the terminal receives a 5G wireless network signal measurement instruction, the instruction carries measurement configuration information, and a public key infrastructure is used for verifying the identity of an entity sending the measurement instruction;
Acquiring and applying a measurement period, namely acquiring a first measurement period according to the verified measurement instruction, measuring network signals of the 5G wireless network according to the first measurement period and measurement configuration information, and recording a measurement result;
Comparing the measurement result with a preset signal threshold to obtain a comparison result, acquiring a second measurement period according to a measurement instruction, and adjusting the second measurement period by using a predefined strategy in a security strategy module to ensure that the adjustment process does not interfere with the normal operation of the network;
Monitoring and exception handling, namely monitoring the processing of the measurement instruction and the adjustment process of the measurement period in real time, identifying the measurement period adjustment request with frequent exception, triggering an alarm mechanism, starting an additional safety examination flow, and taking corresponding safety measures according to examination results.
Preferably, the 5G wireless network signal measurement instruction received by the terminal in the step one is expressed asThe carried measurement configuration information is;
Verifying the identity of an entity sending a measurement instruction, and performing identity verification by using a public key infrastructure, wherein the expression is as follows:
wherein, the method comprises the steps of, Is the public key of the instruction sending entity E,Is a function for verifying the identity of the entity that issued the instruction.
Preferably, in the first step, the digital signature verification expression for the measurement instruction is:
And wherein: is a function for verifying the digital signature of the instruction; is a digital signature of the instruction, used to prove the origin and integrity of the instruction; is the original data of the instruction For ensuring that the data is not tampered with during transmission,Is the public key of the entity that issued the instruction for verifying the validity of the digital signature.
Preferably, the obtaining the first measurement period expression in the second step is:
wherein, the method comprises the steps of, Is a first measurement period; representing slave instructions Extracting a measurement period;
measuring according to the first measurement period and measurement configuration information:
using measuring periods And measurement configuration informationMeasuring 5G network signals:
wherein R is the recorded measurement result; expressed in cycles Internal according to the configurationAnd (3) performing signal measurement.
Preferably, the comparing result in the third step and adjusting the measurement period expression is:
comparing the measurement result R with a preset signal threshold L:
wherein C is the comparison result; Indicating that the measurement result R is compared with the signal threshold L, and the result may be a boolean value or a comparison indicator;
Acquiring a second measurement period from the measurement instruction:
wherein, the method comprises the steps of, Is a second measurement period; representing slave instructions The operation of extracting the second measurement period.
Preferably, in the third step, the second measurement period expression is obtained according to the measurement instruction, where:
wherein, the method comprises the steps of, Is a second measurement period; representing slave instructions Extracting a second measurement period;
in the third step, a predefined strategy in the security strategy module is used for adjusting the second measurement period, and the expression is:
wherein, the method comprises the steps of, Is the adjusted measurement period; Representing usage security policies For the second measuring periodAnd (5) adjusting.
Preferably, the expression for ensuring that the adjustment process does not interfere with the normal operation of the network in the third step is as follows:
wherein, the method comprises the steps of, Is a boolean value indicating whether the adjusted period is valid; representing the adjusted period And (5) verifying to ensure that the normal operation of the network is not affected.
Preferably, the real-time monitoring expression in the fourth step is:
wherein, the method comprises the steps of, Indicating that the measurement instruction is to be given,Representing measurement period adjustment;
In the fourth step, the measurement period adjustment request with abnormal frequency is identified, and the measurement period adjustment request is calculated in the time period Internal adjustment request frequency:
wherein, the method comprises the steps of, Is a time period ofThe number of adjustment requests in the network;
Setting a threshold value And detecting whether it is abnormal:
If (3) Greater thanThenTrue, otherwise false.
Preferably, the conditional expression triggering the alarm and starting the examination in the fourth step is:
; And wherein: is a variable to indicate whether an alarm needs to be triggered, if If true, thenAnd is also set to true, indicating that the system needs to trigger an alarm mechanism, otherwise,If false, not triggering an alarm; to initiate a security audit, it is an operation or process in the text that is used to indicate that it is triggered when a network behavioral anomaly is detected.
Preferably, in the third step, a corresponding security measure expression is adopted according to the examination result, where:
determining a safety measure:
wherein, the method comprises the steps of, Is based onA function of the security measure is determined.
In step three, the measurement period is adjusted using a predefined policy in the security policy moduleThe predefined strategy is carefully designed to minimize interference with the proper operation of the network when adjusting the measurement period, and generally includes consideration of network load, data traffic, and other critical metrics to ensure that the adjustment does not negatively impact network performance.
After adjusting the measurement period, validity verification is performedThis step checks whether the adjusted measurement period would interfere with the normal operation of the network.The function ensures that it does not cause network performance degradation or other negative effects by evaluating the impact of the adjusted period on the network. Such verification avoids network problems due to improper adjustment.
In step four, the system monitors the processing of the measurement instruction and the adjustment process of the measurement period in real time. The real-time monitoring mechanism timely finds any abnormal adjustment behaviors or potential problems and responds quickly.
Monitoring the frequency of measurement period adjustment requestsAnd is compared with a preset threshold value. If frequent adjustment requests are detected, the system may trigger an alarm and initiate additional security screening procedures. The mechanism timely discovers and processes the interference problem possibly caused and ensures the network stability.
The security policy takes network load and performance into consideration during design, ensuring that the adjustment process minimizes interference to network operation. The control measures of the adjustment process include:
Evaluation of the adjustment procedure by evaluating the actual impact of the adjustment on the network, it is ensured that the adjustment is safe and does not cause performance problems.
Policy adaptability, namely dynamically adjusting the policy according to the actual network operation condition, and further reducing the interference to the network operation.
When an abnormal situation is detected, the system initiates additional security screening procedures to analyze and handle the abnormal situation. And according to the examination result, the system can take corresponding safety measures to further ensure the stability of network operation.
Determining appropriate security measures based on inspection resultsAnd implements measures to prevent potential network interference that ensure that anomalies are handled or measurement cycles are adjusted without adversely affecting network operation.
Although an embodiment of the present invention has been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the spirit and scope of the invention as defined by the appended claims and their equivalents.