CN110582105A - access technology selection method of dual-card dual-standby terminal - Google Patents

access technology selection method of dual-card dual-standby terminal Download PDF

Info

Publication number
CN110582105A
CN110582105A CN201910999971.4A CN201910999971A CN110582105A CN 110582105 A CN110582105 A CN 110582105A CN 201910999971 A CN201910999971 A CN 201910999971A CN 110582105 A CN110582105 A CN 110582105A
Authority
CN
China
Prior art keywords
access technology
dual
data exchange
card
entering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910999971.4A
Other languages
Chinese (zh)
Inventor
毕帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lusheng Technology Co Ltd
Original Assignee
Lusheng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lusheng Technology Co Ltd filed Critical Lusheng Technology Co Ltd
Priority to CN201910999971.4A priority Critical patent/CN110582105A/en
Publication of CN110582105A publication Critical patent/CN110582105A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • H04W36/0085Hand-off measurements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/16Performing reselection for specific purposes
    • H04W36/165Performing reselection for specific purposes for reducing network power consumption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/30Reselection being triggered by specific parameters by measured or perceived connection quality data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an access technology selection method of a dual-card dual-standby terminal, which comprises the following steps: a. setting the load bearing of the data exchange service of the terminal in a first access technology associated with a first user identity identification card; b. monitoring a first access technology and a second access technology associated with a second user identification card; c. monitoring the signal intensity of the first access technology and the signal intensity of the second access technology associated with the second user identification card; d. judging whether the access technology set and the signal strength simultaneously meet the conditions, if so, returning to the step a, otherwise, entering the step e; e. judging whether the second access technology belongs to a recommended access technology set associated with the data exchange service, if so, entering the step f, otherwise, returning to the step a; f. judging whether the signal intensity of the second access technology is greater than or equal to a second intensity threshold value, if so, entering a step g, otherwise, returning to the step a; g. and switching the bearing of the data exchange service of the terminal into the second access technology.

Description

Access technology selection method of dual-card dual-standby terminal
Technical Field
The invention mainly relates to the field of wireless communication, in particular to an access technology selection method of a dual-card dual-standby terminal.
Background
In a commercial dual-card dual-Standby mobile terminal, a common method is to let a user set a certain Standby as a Primary Standby (PS), and fix a data exchange service to the Standby, while the other Standby is a secondary Standby.
Another existing data exchange service switching method mainly uses the remaining traffic of two traffic packages to be ordered as a threshold value to perform the determination. And when the remaining flow of the main standby is insufficient and the remaining flow of the auxiliary standby is sufficient, switching the data exchange service from the main standby to the auxiliary standby. However, this method does not fully utilize the advantages of the dual-card dual-standby mobile terminal of LTE + LTE or LTE + WCDMA that has been gradually marketed, i.e. the secondary standby may also reside in LTE/WCDMA and provide the same quality of data exchange service bearer as the primary standby. Therefore, the scheme using the remaining traffic of the ordered traffic package as the threshold value may have poor quality of the main standby signal or poor quality of the data exchange service when residing in the 2G network, and may not respond to the change of the network signal quality in time.
In addition, in the field of multimode terminals, chinese patent "multimode terminal service switching method and apparatus" (application number: 201110307810.8) realizes mapping of a single PDP (Packet Data Protocol) and multiple PDPs by introducing a Virtual Private Network (VPN). When other available networks are found, a new PDP link is established, and the aim of simultaneously existing a plurality of PDP links is achieved.
chinese patent "multimode terminal service switching method and apparatus" (application number: 201210006013.0) introduces "activating the second PDP link corresponding to the network with the best signal quality", and then switches the data exchange service to the second PDP link. It only considers the signal quality and does not give priority to the Radio Access Technology (RAT) which has a great influence on the service quality and the remaining traffic of the two-standby package.
The Chinese patent system switching method and device (application number: 201210061551.X) is similar to the multimode terminal service switching method and device, and only the signal quality is changed into the data bandwidth. And judging whether the current data bandwidth meets the requirement or not according to the size of the residual data in the cache of the mobile terminal. However, the index of data bandwidth has a certain hysteresis and cannot reflect the difference of service quality of 4G/3G/2G in the aspect of network real-time performance and the like.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an access technology selection method of a dual-card dual-standby terminal, which can provide a higher-quality data exchange service.
In order to solve the technical problem, the invention provides an access technology selection method of a dual-card dual-standby terminal, which comprises the following steps: a. setting the load bearing of the data exchange service of the terminal in a first access technology associated with a first user identity identification card; b. monitoring the first access technology and a second access technology associated with a second user identification card; c. monitoring the signal intensity of the first access technology and the signal intensity of a second access technology associated with a second user identification card; d. judging whether the following two conditions are both satisfied, if so, returning to the step a, otherwise, entering the step e: the first access technology belongs to a set of recommended access technologies associated with the data exchange service; a signal strength of the first access technology is greater than or equal to a first strength threshold; e. judging whether the second access technology belongs to a recommended access technology set associated with the data exchange service, if so, entering a step f, otherwise, returning to the step a; f. judging whether the signal intensity of the second access technology is greater than or equal to a second intensity threshold value, if so, entering a step g, otherwise, returning to the step a; g. and switching the bearing of the data exchange service of the terminal into the second access technology.
In an embodiment of the present invention, the method further includes: if the judgment in the step d is negative, starting a delay timer before entering the step e, returning to the step a in the timing process of the delay timer, and entering the step e when the timing of the delay timer is finished; and d, judging whether the delay timer runs or not when the judgment in the step d is yes, and stopping and resetting the delay timer if the judgment is yes.
In an embodiment of the present invention, in the step d, it is further determined whether the following conditions are satisfied: and the residual flow of the ordered flow package of the first subscriber identity card is greater than or equal to a first flow threshold value.
In an embodiment of the present invention, when the step e determines yes, before entering the step f, the method further includes: and f, judging whether the residual flow of the ordered flow package of the second user identification card is greater than or equal to a second flow threshold value, if so, entering the step f, otherwise, returning to the step a.
in an embodiment of the invention, the first strength threshold is related to a quality level of data exchange traffic of the first access technology; and/or the second strength threshold is related to a quality level of data exchange traffic of the second access technology.
in an embodiment of the present invention, the higher the quality level of the data exchange service of the first access technology is, the lower the first strength threshold is; and/or the higher the quality level of data exchange traffic of the second access technology, the lower the second strength threshold.
In an embodiment of the present invention, the recommended access technology set includes 3G, 4G and 5G.
Another aspect of the present invention provides an access technology selection apparatus for a dual-card dual-standby terminal, including: a memory for storing instructions executable by the processor; a processor for executing the instructions to implement the method as described above.
Another aspect of the invention provides a computer readable medium having stored thereon computer program code which, when executed by a processor, implements a method as described above.
Compared with the prior art, the invention has the following advantages:
the access technology selection method of the dual-card dual-standby terminal can realize the switching of the data exchange service between the first access technology and the second access technology by monitoring the first access technology and the second access technology and monitoring the signal intensity of the first access technology and the signal intensity of the second access technology, thereby providing the data exchange service with higher quality for users.
drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the principle of the invention. In the drawings:
Fig. 1 is a flowchart of an access technology selection method of a dual-card dual-standby terminal according to an embodiment of the present invention;
Fig. 2 is a flowchart of an access technology selection method of another dual-card dual-standby terminal according to an embodiment of the present invention;
Fig. 3 is a flowchart of an access technology selection method of another dual-card dual-standby terminal according to an embodiment of the present invention;
Fig. 4 is a schematic diagram of an access technology selection apparatus of a dual-card dual-standby terminal according to an embodiment of the present invention.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments will be briefly introduced below. It is obvious that the drawings in the following description are only examples or embodiments of the application, from which the application can also be applied to other similar scenarios without inventive effort for a person skilled in the art. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
As used in this application and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
The relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present application unless specifically stated otherwise. Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description. Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate. In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
in the description of the present application, it is to be understood that the orientation or positional relationship indicated by the directional terms such as "front, rear, upper, lower, left, right", "lateral, vertical, horizontal" and "top, bottom", etc., are generally based on the orientation or positional relationship shown in the drawings, and are used for convenience of description and simplicity of description only, and in the case of not making a reverse description, these directional terms do not indicate and imply that the device or element being referred to must have a particular orientation or be constructed and operated in a particular orientation, and therefore, should not be considered as limiting the scope of the present application; the terms "inner and outer" refer to the inner and outer relative to the profile of the respective component itself.
Spatially relative terms, such as "above … …," "above … …," "above … …," "above," and the like, may be used herein for ease of description to describe one device or feature's spatial relationship to another device or feature as illustrated in the figures. It will be understood that the spatially relative terms are intended to encompass different orientations of the device in use or operation in addition to the orientation depicted in the figures. For example, if a device in the figures is turned over, devices described as "above" or "on" other devices or configurations would then be oriented "below" or "under" the other devices or configurations. Thus, the exemplary term "above … …" can include both an orientation of "above … …" and "below … …". The device may be otherwise variously oriented (rotated 90 degrees or at other orientations) and the spatially relative descriptors used herein interpreted accordingly.
it will be understood that when an element is referred to as being "on," "connected to," "coupled to" or "contacting" another element, it can be directly on, connected or coupled to, or contacting the other element or intervening elements may be present. In contrast, when an element is referred to as being "directly on," "directly connected to," "directly coupled to" or "directly contacting" another element, there are no intervening elements present. Similarly, when a first component is said to be "in electrical contact with" or "electrically coupled to" a second component, there is an electrical path between the first component and the second component that allows current to flow. The electrical path may include capacitors, coupled inductors, and/or other components that allow current to flow even without direct contact between the conductive components.
It should be noted that the terms "first", "second", and the like are used to define the components, and are only used for convenience of distinguishing the corresponding components, and the terms have no special meanings unless otherwise stated, and therefore, the scope of protection of the present application is not to be construed as being limited. Further, although the terms used in the present application are selected from publicly known and used terms, some of the terms mentioned in the specification of the present application may be selected by the applicant at his or her discretion, the detailed meanings of which are described in relevant parts of the description herein. Further, it is required that the present application is understood not only by the actual terms used but also by the meaning of each term lying within.
The following embodiments of the present invention provide an access technology selection method for a dual-card dual-standby terminal, which can provide a higher quality data exchange service.
It is to be understood that the following description is merely exemplary, and that variations may be made by those skilled in the art without departing from the spirit of the invention.
the access technology selection method of the dual-card dual-standby terminal comprises the following steps: a. setting the load bearing of the data exchange service of the terminal in a first access technology associated with a first user identity identification card; b. monitoring a first access technology and a second access technology associated with a second user identification card; c. monitoring the signal intensity of the first access technology and the signal intensity of the second access technology associated with the second user identification card; d. judging whether the following two conditions are both satisfied, if so, returning to the step a, otherwise, entering the step e: the first access technology belongs to a recommended access technology set associated with the data exchange service; the signal strength of the first access technology is greater than or equal to a first strength threshold; e. judging whether the second access technology belongs to a recommended access technology set associated with the data exchange service, if so, entering the step f, otherwise, returning to the step a; f. judging whether the signal intensity of the second access technology is greater than or equal to a second intensity threshold value, if so, entering a step g, otherwise, returning to the step a; g. and switching the bearing of the data exchange service of the terminal into the second access technology.
Fig. 1 is a flowchart of an access technology selection method of a dual-card dual-standby terminal according to an embodiment of the present invention. The access technology selection method of the dual-card dual-standby terminal is described below with reference to fig. 1.
Step 110, setting the bearer of the data exchange service of the terminal in the first access technology associated with the first subscriber identity module card.
The terminal refers to a mobile device having a communication module, including but not limited to a mobile phone, a tablet computer, a notebook computer, and the like. The subscriber identity module card may be a sim (subscriber identity module) card with various sizes and standards, or may be a virtual subscriber identity module card integrated in the mobile device, but the embodiment is not limited thereto.
here, the first access technology associated with the first subscriber identity card may be an access technology used by the first subscriber identity card. It should be understood that the access technology may refer to wireless access technologies including 2G, 3G, 4G, and 5G networks. A typical radio access technology system is mainly composed of a controller, an operation and maintenance center, a base station, a fixed subscriber unit, and a mobile terminal.
Step 120, the first access technology and the second access technology associated with the second subscriber identity card are monitored.
After the data exchange service of the terminal is carried in a first access technology associated with a first user identification card, the first access technology and a second access technology associated with a second user identification card are monitored.
The second access technology may be the same as or different from the first access technology. Preferably, in the following embodiments of the present invention, the quality level of the data exchange service of the second access technology is lower than the quality level of the data exchange service of the first access technology, but the present embodiment is not limited thereto.
Step 130, monitoring the signal strength of the first access technology and the signal strength of the second access technology associated with the second subscriber identity card.
Signal strength refers to the wideband received power over the channel bandwidth received by the forward link or reverse link receiver. The forward link receiver (e.g., terminal) is typically represented by rx (received power), and the reverse link receiver (e.g., base station) is typically represented by reverse rssi (received Signal Strength indication).
Step 140, determine whether the access technology set and the signal strength satisfy the conditions at the same time.
Judging whether the following two conditions are met: the first access technology belongs to a set of recommended access technologies associated with the data exchange service and a signal strength of the first access technology is greater than or equal to a first strength threshold. When the two conditions are met, returning to the step 110; when at least one of the two conditions is not satisfied, the process proceeds to step 150.
In an embodiment of the invention, the set of recommended access technologies may include 3G, 4G and 5G. The 3G is, for example, WCDMA and the 4G is, for example, LTE.
LTE (Long Term Evolution) is a Long Term Evolution of UMTS (Universal mobile telecommunications System) access technology standard, which is established by The 3rd Generation Partnership Project (3 GPP) organization. WCDMA (Wideband Code Division Multiple Access) is a Wideband spread spectrum 3G mobile communication Access technology using a Code Division Multiple Access multiplexing method, and uses a part of protocols in accordance with the standard of the GSM network Access technology of 2G.
In some embodiments of the invention, the first strength threshold may relate to a quality level of data exchange traffic of the first access technology. Preferably, the first strength threshold is lower when the quality level of the data exchange traffic of the first access technology is higher. In this way, the lower first strength threshold may enable the data exchange traffic of the terminal to be carried as much as possible in the first access technology associated with the first subscriber identity card when the quality level of the data exchange traffic of the first access technology is significantly higher than the quality level of the data exchange traffic of the second access technology.
In an embodiment of the present invention, step 140 further includes determining whether a condition that a remaining flow of the ordered flow package of the first subscriber identity card is greater than or equal to a first flow threshold is satisfied.
Exemplarily, when it is simultaneously satisfied that the first access technology belongs to the recommended access technology set associated with the data exchange service, the signal strength of the first access technology is greater than or equal to the first strength threshold, and the remaining traffic of the ordered traffic package of the first subscriber identity card is greater than or equal to the first traffic threshold, returning to step 110; when at least one of the above three conditions is not satisfied, the process proceeds to step 150.
Step 150, it is determined whether the second access technology belongs to a set of recommended access technologies associated with the data exchange service.
When the second access technology belongs to the set of recommended access technologies associated with the data exchange service, step 160 is entered; when the second access technology does not belong to the set of recommended access technologies associated with the data exchange service, return to step 110.
Step 160, determine whether the signal strength of the second access technology is greater than or equal to the second strength threshold.
When the signal strength of the second access technology is greater than or equal to the second strength threshold, go to step 170; when the signal strength of the second access technology is less than the second strength threshold, return to step 110.
in some embodiments of the invention, the second strength threshold may relate to a quality level of data exchange traffic of the second access technology. Preferably, the second strength threshold is lower when the quality level of the data exchange traffic of the second access technology is higher. In this way, when the quality level of the data exchange service of the second access technology is close to the quality level of the data exchange service of the first access technology or when the quality level of the data exchange service of the second access technology is the same as the quality level of the data exchange service of the first access technology, the lower second strength threshold value enables the data exchange service of the terminal to be switched to the second access technology associated with the second subscriber identity card as soon as possible when the second access technology meets the requirement that the second access technology belongs to the recommended set of access technologies associated with the data exchange service.
step 170, the bearer of the data exchange service of the terminal is switched to the second access technology.
The bearer of the data exchange traffic of the terminal is switched from a first access technology associated with a first subscriber identity card to a second access technology associated with a second subscriber identity card.
Fig. 2 is a flowchart of an access technology selection method of a dual-card dual-standby terminal according to another embodiment of the present invention.
Referring to fig. 2, in an embodiment of the present invention, the method for selecting an access technology of a dual-card dual-standby terminal further includes step 145a, starting a delay timer; and step 145b, judging whether the delay timer runs.
In step 145a, a delay timer is started.
If the determination in step 140 is no, the routine proceeds to step 145a, where a delay timer is started. And returns to step 110 during the timing of the delay timer, and proceeds to step 150 when the timing of the delay timer is over.
Step 145b, determine whether the delay timer is running.
If yes in step 140, the process proceeds to step 145b, where it is determined whether or not the delay timer is running. The delay timer is stopped and reset if it runs and then returns to step 110. If the delay timer is not running, the process returns directly to step 110.
By setting the delay timer, the ping-pong effect of the data exchange service of the terminal switching back and forth between the first access technology and the second access technology can be prevented.
In an embodiment of the present invention, step 140 shown in fig. 2 may further include determining whether a condition that a remaining flow of the ordered flow package of the first subscriber identity card is greater than or equal to the first flow threshold is satisfied.
Illustratively, when the first access technology belongs to the recommended access technology set associated with the data exchange service, the signal strength of the first access technology is greater than or equal to the first strength threshold, and the remaining flow of the ordered flow package of the first subscriber identity card is greater than or equal to the first flow threshold, step 145b is entered, whether the delay timer is running is determined, if the delay timer is running, the delay timer is stopped and reset, and then step 110 is returned. If the delay timer is not running, the process returns directly to step 110.
When at least one of the three conditions is not satisfied, the process proceeds to step 145a, and a delay timer is started. And returns to step 110 during the timing of the delay timer, and proceeds to step 150 when the timing of the delay timer is over.
Fig. 3 is a flowchart of an access technology selection method of a dual-card dual-standby terminal according to another embodiment of the present invention.
Referring to fig. 3, in an embodiment of the present invention, when the determination in step 150 is yes, step 155 is further included before step 160 is entered, and it is determined whether the remaining flow of the subscription flow package of the second subscriber identity card is greater than or equal to the second flow threshold.
Step 155, determine whether the remaining flow of the ordered flow package of the second subscriber identity card is greater than or equal to the second flow threshold.
When the remaining flow of the ordered flow package of the second subscriber identity card is greater than or equal to the second flow threshold, step 160 is entered; and when the residual flow of the ordered flow package of the second subscriber identity card is smaller than the second flow threshold value, returning to the step 110.
in an embodiment of the present invention, step 140 shown in fig. 3 may further include determining whether a condition that a remaining flow of the ordered flow package of the first subscriber identity card is greater than or equal to the first flow threshold is satisfied.
Exemplarily, when it is simultaneously satisfied that the first access technology belongs to the recommended access technology set associated with the data exchange service, the signal strength of the first access technology is greater than or equal to the first strength threshold, and the remaining traffic of the ordered traffic package of the first subscriber identity card is greater than or equal to the first traffic threshold, returning to step 110; when at least one of the above three conditions is not satisfied, the process proceeds to step 150.
Flowcharts such as those shown in fig. 1-3 are used herein to illustrate operations performed by methods according to embodiments of the present application. It should be understood that the preceding operations are not necessarily performed in the exact order in which they are performed. Rather, various steps may be processed in reverse order or simultaneously. Meanwhile, other operations are added to or removed from these processes.
The above embodiments of the present invention provide an access technology selection method for a dual-card dual-standby terminal, which can provide a higher quality data exchange service.
another aspect of the present invention provides an access technology selection apparatus for a dual-card dual-standby terminal, which can provide a higher quality data exchange service.
fig. 4 is a schematic diagram of an access technology selection apparatus of a dual-card dual-standby terminal according to an embodiment of the present invention. Referring to fig. 4, the access technology selection apparatus 400 of the dual card dual standby terminal includes a memory 410 and a processor 420.
The memory 410 is used to store instructions that are executable by the processor 420. The processor 420 is configured to execute instructions to implement the access technology selection method of the dual-card dual-standby terminal.
In some embodiments of the present invention, the access technology selection apparatus 400 of the dual card dual standby terminal further includes a communication port 430, an input/output device 440, and an internal communication bus 450.
the communication port 430 may be responsible for data communication between the access technology selection apparatus 400 of the dual card dual standby terminal and an external device (not shown). The input/output device 440 may support input/output data flow between the access technology selection apparatus 400 and other components of the dual card dual standby terminal. By way of example, the input/output device 440 may include one or more of the following components: input devices such as a keyboard, mouse, camera, display, scanner, touch screen, handwriting input pad, and microphone, or any combination thereof. The input/output device 440 may input various numerical data or various non-numerical data, such as graphics, images, voice, etc., into the access technology selection apparatus 400 of the dual card dual standby terminal. The internal communication bus 450 may enable data communication between various components in the access technology selection apparatus 400 of the dual card dual standby terminal.
It can be understood that the access technology selection method of the dual card dual standby terminal of the present application is not limited to be implemented by the access technology selection apparatus of one dual card dual standby terminal (e.g., the access technology selection apparatus 400 of the dual card dual standby terminal), but may be implemented cooperatively by the access technology selection apparatuses of a plurality of online dual card dual standby terminals. The access technology selection device of the online dual-card dual-standby terminal can be connected and communicated through a local area network or a wide area network.
Further implementation details of the access technology selection apparatus of the dual-card dual-standby terminal of the present embodiment may refer to the embodiments described in fig. 1 to 3, and are not expanded herein.
The above embodiments of the present invention provide an access technology selection apparatus for a dual-card dual-standby terminal, which can provide a higher quality data exchange service.
Another aspect of the present invention provides a computer readable medium storing computer program code, which when executed by a processor implements the above-mentioned access technology selection method of a dual card dual standby terminal.
In an embodiment of the present invention, the computer program code may implement the above-mentioned access technology selection method of the dual-card dual-standby terminal when being executed by the processor 420 in the access technology selection apparatus 400 of the dual-card dual-standby terminal shown in fig. 4.
For example, the access technology selection method of the dual-card dual-standby terminal of the present application may be implemented as a program of the access technology selection method of the dual-card dual-standby terminal, stored in the memory 410, and loaded into the processor 420 for execution, so as to implement the method of the present application.
When the access technology selection method of the dual-card dual-standby terminal is implemented as a computer program, the computer program can also be stored in a computer readable medium with computer program codes as a product. For example, computer-readable storage media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips), optical disks (e.g., Compact Disk (CD), Digital Versatile Disk (DVD)), smart cards, and flash memory devices (e.g., electrically Erasable Programmable Read Only Memory (EPROM), card, stick, key drive). In addition, various storage media described herein can represent one or more devices and/or other machine-readable media for storing information. The term "machine-readable medium" can include, without being limited to, wireless channels and various other media (and/or storage media) capable of storing, containing, and/or carrying code and/or instructions and/or data.
It should be understood that the above-described embodiments are illustrative only. The embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, and/or other electronic units designed to perform the functions described herein, or a combination thereof.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing disclosure is by way of example only, and is not intended to limit the present application. Various modifications, improvements and adaptations to the present application may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present application and thus fall within the spirit and scope of the exemplary embodiments of the present application.
Also, this application uses specific language to describe embodiments of the application. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the present application is included in at least one embodiment of the present application. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the present application may be combined as appropriate.
Computer program code required for the operation of various portions of the present application may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages, and the like. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
The computer readable medium may comprise a propagated data signal with the computer program code embodied therein, for example, on a baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, and the like, or any suitable combination. The computer readable medium can be any computer readable medium that can communicate, propagate, or transport the program for use by or in connection with an instruction execution system, apparatus, or device. Program code on a computer readable medium may be propagated over any suitable medium, including radio, electrical cable, fiber optic cable, radio frequency signals, or the like, or any combination of the preceding.
Additionally, the order in which elements and sequences of the processes described herein are processed, the use of alphanumeric characters, or the use of other designations, is not intended to limit the order of the processes and methods described herein, unless explicitly claimed. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing server or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the application, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to require more features than are expressly recited in the claims. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
Numerals describing the number of components, attributes, etc. are used in some embodiments, it being understood that such numerals used in the description of the embodiments are modified in some instances by the use of the modifier "about", "approximately" or "substantially". Unless otherwise indicated, "about", "approximately" or "substantially" indicates that the number allows a variation of ± 20%. Accordingly, in some embodiments, the numerical parameters used in the specification and claims are approximations that may vary depending upon the desired properties of the individual embodiments. In some embodiments, the numerical parameter should take into account the specified significant digits and employ a general digit preserving approach. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of the range are approximations, in the specific examples, such numerical values are set forth as precisely as possible within the scope of the application.
Although the present application has been described with reference to the present specific embodiments, it will be recognized by those skilled in the art that the foregoing embodiments are merely illustrative of the present application and that various changes and substitutions of equivalents may be made without departing from the spirit of the application, and therefore, it is intended that all changes and modifications to the above-described embodiments that come within the spirit of the application fall within the scope of the claims of the application.

Claims (9)

1. A method for selecting an access technology of a dual-card dual-standby terminal comprises the following steps:
a. Setting the load bearing of the data exchange service of the terminal in a first access technology associated with a first user identity identification card;
b. Monitoring the first access technology and a second access technology associated with a second user identification card;
c. Monitoring the signal intensity of the first access technology and the signal intensity of a second access technology associated with a second user identification card;
d. Judging whether the following two conditions are both satisfied, if so, returning to the step a, otherwise, entering the step e:
The first access technology belongs to a set of recommended access technologies associated with the data exchange service;
A signal strength of the first access technology is greater than or equal to a first strength threshold;
e. Judging whether the second access technology belongs to a recommended access technology set associated with the data exchange service, if so, entering a step f, otherwise, returning to the step a;
f. judging whether the signal intensity of the second access technology is greater than or equal to a second intensity threshold value, if so, entering a step g, otherwise, returning to the step a;
g. And switching the bearing of the data exchange service of the terminal into the second access technology.
2. The method of claim 1, further comprising:
If the judgment in the step d is negative, starting a delay timer before entering the step e, returning to the step a in the timing process of the delay timer, and entering the step e when the timing of the delay timer is finished;
And d, judging whether the delay timer runs or not when the judgment in the step d is yes, and stopping and resetting the delay timer if the judgment is yes.
3. the method of claim 1, wherein in step d, it is further determined whether the following conditions are satisfied:
And the residual flow of the ordered flow package of the first subscriber identity card is greater than or equal to a first flow threshold value.
4. The method of claim 1, wherein if step e is yes, before entering step f, further comprising: and f, judging whether the residual flow of the ordered flow package of the second user identification card is greater than or equal to a second flow threshold value, if so, entering the step f, otherwise, returning to the step a.
5. The method of claim 1, wherein the first strength threshold is related to a quality level of data exchange traffic of the first access technology; and/or the second strength threshold is related to a quality level of data exchange traffic of the second access technology.
6. the method of claim 1,
The higher the quality level of data exchange traffic of the first access technology, the lower the first intensity threshold; and/or
the higher the quality level of data exchange traffic of the second access technology, the lower the second strength threshold.
7. The method of claim 1, wherein the set of recommended access technologies comprises 3G, 4G, and 5G.
8. An access technology selection device of a dual-card dual-standby terminal comprises:
A memory for storing instructions executable by the processor;
A processor for executing the instructions to implement the method of any one of claims 1-7.
9. A computer-readable medium having stored thereon computer program code which, when executed by a processor, implements the method of any of claims 1-7.
CN201910999971.4A 2019-10-21 2019-10-21 access technology selection method of dual-card dual-standby terminal Pending CN110582105A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910999971.4A CN110582105A (en) 2019-10-21 2019-10-21 access technology selection method of dual-card dual-standby terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910999971.4A CN110582105A (en) 2019-10-21 2019-10-21 access technology selection method of dual-card dual-standby terminal

Publications (1)

Publication Number Publication Date
CN110582105A true CN110582105A (en) 2019-12-17

Family

ID=68815128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910999971.4A Pending CN110582105A (en) 2019-10-21 2019-10-21 access technology selection method of dual-card dual-standby terminal

Country Status (1)

Country Link
CN (1) CN110582105A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2712235A2 (en) * 2012-09-19 2014-03-26 Samsung Electronics Co., Ltd Electronic device and method for changing network connection
CN104244447A (en) * 2013-06-18 2014-12-24 展讯通信(上海)有限公司 Communication terminal and method and device for having access to user identification module of communication terminal remotely
CN107071760A (en) * 2017-03-31 2017-08-18 努比亚技术有限公司 Data service automatic switching method and mobile terminal
CN108834089A (en) * 2018-06-28 2018-11-16 努比亚技术有限公司 SIM card switching method, mobile terminal and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2712235A2 (en) * 2012-09-19 2014-03-26 Samsung Electronics Co., Ltd Electronic device and method for changing network connection
CN104244447A (en) * 2013-06-18 2014-12-24 展讯通信(上海)有限公司 Communication terminal and method and device for having access to user identification module of communication terminal remotely
CN107071760A (en) * 2017-03-31 2017-08-18 努比亚技术有限公司 Data service automatic switching method and mobile terminal
CN108834089A (en) * 2018-06-28 2018-11-16 努比亚技术有限公司 SIM card switching method, mobile terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN105406889B (en) A kind of determination method, device and mobile terminal of network formats
US20210289108A1 (en) Electromagnetic interference control method and related electromagnetic interference control device
CN108495344B (en) Network switching method, device and terminal
CN105517081B (en) Method for processing business, device and mobile terminal under a kind of hybrid network standard
CN105406892B (en) A kind of determination method, device and mobile terminal of network formats
RU2638945C2 (en) MANAGEMENT METHOD FOR MULTIPLE USE OF LTE WITH Wi-Fi AND TERMINAL DEVICE
CN106961676B (en) Network searching method, device and medium
CN106413036B (en) Network access processing method and terminal equipment
CN105357728A (en) Network type switching method, device and mobile terminal
US10959228B2 (en) Method for transmitting carrier combination for carrier aggregation and electronic device therefor
CN106792625A (en) Small region search method, device and mobile terminal
CN111066348B (en) Network access method and terminal equipment
CN105530676A (en) Service processing method and device in hybrid network standard and mobile terminal
CN105517084B (en) Method for processing business, device and mobile terminal under a kind of hybrid network standard
US20210195671A1 (en) Control Method for Displaying Service Identifier in Electronic Device, Electronic Device, and Storage
EP3376821A1 (en) Wireless communication network registration method and terminal
CN105430718A (en) Network access method and device and communication terminal
CN107466087B (en) Network searching method and mobile terminal
US9883051B2 (en) Method and system for usage of manual PLMN selection mode
CN114745782A (en) Direct current position processing method and related equipment
CN110582105A (en) access technology selection method of dual-card dual-standby terminal
US11012835B2 (en) Method and terminal for acquiring transmission resource in vehicle to everything
CN105611052B (en) A kind of information processing method and electronic equipment
WO2020048339A1 (en) Method and apparatus for displaying service identifier, electronic device, and storage medium
US20150113595A1 (en) Network access method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191217