CN112423289B - Method and device for preventing application from being blocked, equipment and storage medium - Google Patents

Method and device for preventing application from being blocked, equipment and storage medium Download PDF

Info

Publication number
CN112423289B
CN112423289B CN202011241182.3A CN202011241182A CN112423289B CN 112423289 B CN112423289 B CN 112423289B CN 202011241182 A CN202011241182 A CN 202011241182A CN 112423289 B CN112423289 B CN 112423289B
Authority
CN
China
Prior art keywords
cell
card
identification card
terminal
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011241182.3A
Other languages
Chinese (zh)
Other versions
CN112423289A (en
Inventor
谢梦迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202011241182.3A priority Critical patent/CN112423289B/en
Publication of CN112423289A publication Critical patent/CN112423289A/en
Application granted granted Critical
Publication of CN112423289B publication Critical patent/CN112423289B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/30Reselection being triggered by specific parameters by measured or perceived connection quality data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application discloses a method and a device for preventing application from being blocked, a terminal and a storage medium, wherein the method comprises the following steps: when a first application uses a data network of a first identity identification card of a terminal, determining whether a second identity identification card of the terminal meets a first condition; and if the second identification card meets the first condition, switching the current service cell of the second identification card.

Description

Method and device for preventing application from being blocked, equipment and storage medium
Technical Field
Embodiments of the present application relate to electronic technology, and relate to, but are not limited to, a method, an apparatus, a device, and a storage medium for preventing application from being blocked.
Background
Currently, most of mobile phones in the market are of a DSDS (Dual SIM Dual Standby, dual-card Dual-standby) type or a DR-DSDS (Dual Receive-Dual SIM Dual Standby) type, two SIM (Subscriber Identity Module ) cards can be inserted at the same time, and the two SIM cards can belong to different operators or the same operator, so that the use of users is greatly facilitated.
The mobile phone has only one set of radio frequency device, and can not receive and transmit data from two SIM cards at the same time. When the auxiliary card receives the paging message (paging) of the network side, the antenna radio frequency resource is temporarily switched from the main card to the auxiliary card, and the auxiliary card is switched back to the main card after the paging message is processed. This causes the master card to fail to transmit and receive data during this period, and to be in a disconnected state.
In order to solve the above problem, some mobile phone manufacturers design a function of disabling the sub-card in the game space APP (Application), and avoid the influence of the sub-card receiving the paging message on the main card by closing the use of the sub-card after the game is started. However, the dual-card scene is artificially limited to a single-card scene, so that the sub-card cannot be used at all, and the user cannot receive any information from the sub-card, thereby seriously affecting the user experience.
Disclosure of Invention
In view of this, embodiments of the present application provide a method, an apparatus, a device, and a storage medium for preventing application from being blocked.
The technical scheme of the embodiment of the application is realized as follows:
in a first aspect, an embodiment of the present application provides a method for preventing application from being blocked, where the method includes:
When a first application uses a data network of a first identity identification card of a terminal, determining whether a second identity identification card of the terminal meets a first condition;
and if the second identification card meets the first condition, switching the current service cell of the second identification card.
In a second aspect, an embodiment of the present application provides an apparatus for preventing application jamming, where the apparatus includes:
a determining unit, configured to determine, when a first application of a terminal uses a data network of a first identification card of the terminal, whether a second identification card of the terminal meets a first condition;
and the switching unit is used for switching the current service cell of the second identification card if the second identification card meets the first condition.
In a third aspect, an embodiment of the present application provides a terminal, including a memory and a processor, where the memory stores a computer program that can be executed on the processor, and the processor executes the program to implement the steps in the method for preventing application jamming.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs steps in the above-described method of preventing application jamming.
The embodiment of the application provides a method and a device for preventing application from being blocked, a terminal and a storage medium, wherein when a first application uses a data network of a first identity identification card of the terminal, whether a second identity identification card of the terminal meets a first condition is determined; if the second identity card meets the first condition, the current service cell of the second identity card is switched, so that the influence of the second identity card of the terminal on the first identity card can be effectively slowed down, a user can not feel the first application is blocked in the process of using the data network of the first identity card, and the second identity card can also normally receive information.
Drawings
Fig. 1 is a schematic implementation flow diagram of a method for preventing application blocking according to an embodiment of the present application;
fig. 2 is a second implementation flow chart of a method for preventing application blocking according to an embodiment of the present application;
fig. 3 is a schematic diagram of an implementation flow chart of a method for preventing application blocking according to an embodiment of the present application;
fig. 4 is a schematic diagram of an implementation flow of a method for preventing application blocking according to an embodiment of the present application;
FIG. 5A is a schematic diagram of a dual card usage status of a terminal in the related art;
Fig. 5B is a schematic diagram of an implementation flow of a method for preventing application blocking according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an apparatus for preventing application jamming according to an embodiment of the present application;
fig. 7 is a schematic diagram of a hardware entity of a terminal according to an embodiment of the present application.
Detailed Description
Paging is a message issued to a user when the network needs to establish a connection with the user. The network initiates a paging procedure such that the paged terminal initiates a signaling connection establishment procedure with the network. The vast majority of intelligent terminals on the market at present are terminals of the DSDS or DR-DSDS type based on the consideration of technology and cost, and the terminals have only one set of transmitting antenna and cannot realize a double-card scene, namely two SIM cards can simultaneously do data service. Because of the limitation of single radio frequency resource, if one SIM card receives the paging message issued by the network, the radio frequency resource of the other SIM card is preempted, and the temporary loss of the radio frequency resource can cause the incapacitation of receiving and transmitting data, thereby causing the blocking of the intelligent terminal (such as high game delay, incapacitation of playing video, etc.). For example, a user suddenly gets stuck during the process of a joker glowing in the game, resulting in the person not being able to operate.
Therefore, the embodiment of the application program provides a method for preventing application from blocking, which divides paging messages issued by a network side into useful paging messages and useless paging messages, screens out base station cells which frequently issue the useless paging messages to users through setting of a timer and a threshold, temporarily adds the cells into a blacklist, and simultaneously, re-searches the network until a new base station cell meets a judging condition. Therefore, the influence of the SIM card which frequently receives the paging message on the data service of another SIM card which is being used by the user can be effectively reduced.
The technical solutions of the present application are further described in detail below with reference to the drawings and examples. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments of the present application without making any inventive effort, are intended to be within the scope of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is to be understood that "some embodiments" can be the same subset or different subsets of all possible embodiments and can be combined with one another without conflict.
In the following description, suffixes such as "module", "component", or "unit" for representing elements are used only for facilitating the description of the present application, and are not of specific significance per se. Thus, "module," "component," or "unit" may be used in combination.
It should be noted that the term "first\second\third" in relation to the embodiments of the present application is merely to distinguish similar objects and does not represent a specific ordering for the objects, it being understood that the "first\second\third" may be interchanged in a specific order or sequence, where allowed, to enable the embodiments of the present application described herein to be practiced in an order other than that illustrated or described herein.
The embodiment of the application provides a method for preventing application from being blocked, which is applied to a terminal, and the functions realized by the method can be realized by calling program codes by a processor in the terminal, and the program codes can be stored in a storage medium of the terminal. Fig. 1 is a schematic implementation flow diagram of a method for preventing application blocking according to an embodiment of the present application, as shown in fig. 1, where the method includes:
step S101, when a first application uses a data network of a first identity card of a terminal, determining whether a second identity card of the terminal meets a first condition;
The terminal may be various types of devices with information processing capabilities, such as a smart phone, PDA (Personal Digital Assistant ), navigator, digital phone, video phone, smart watch, smart bracelet, wearable device, tablet computer, all-in-one, etc.
In this embodiment of the present application, the terminal has two identification cards, a first identification card and a second identification card, and the two identification cards share the same radio frequency device. Here, the two identification cards share the same radio frequency device, which means that at the same time, a data network with only one identification card can send and receive data.
For example, if a user is playing a game on a terminal and is playing data traffic on a first identification card, it is determined whether a second identification card of the terminal satisfies a first condition.
In some embodiments, the first application may be a time-sensitive application. For example, some gaming applications, some video communication applications, some navigation applications, etc. For example, the first application is a game application, and if the user is operating a game character and the data flow is insufficient and the network is not good, the user can cause the game character to be blocked, and the team game task of other members in the team cannot be followed, the game application belongs to a time-delay sensitive application.
In a mobile communication system, an access network may send paging messages to terminals according to different demands of services. While paging messages are of two types, one being useful paging messages and the other being useless paging messages. The useful paging messages can be classified into short message type paging messages and paging terminal type paging messages. For example, the system information update, the earthquake tsunami warning system information and other paging information belonging to the short message class, and the incoming call belongs to the paging information of the paging terminal class. Whereas useless paging messages may include empty paging messages, route advertisement paging messages, and the like. If the second identification card receives an unwanted paging message at this time, the shared radio frequency device is occupied by the second identification card, thereby affecting the quality of the data network of the first identification card, and therefore, the first condition in the example of the present application may be related to the second identification card receiving the unwanted paging message.
Step S102, if the second identification card meets the first condition, switching the current service cell of the second identification card.
In this embodiment of the present application, the current serving cell of the second identification card refers to a cell where the second identification card resides currently. The serving cell before handover and the serving cell after handover may be cells on different base stations, or may be different cells on the same base station.
Here, the useful paging messages mainly include two types, a short message type paging message and a paging terminal type paging message, and the useless paging messages are various. Therefore, after the second identification card receives the paging message sent by the first cell, it can determine whether the paging message belongs to the paging message of the short message class or the paging message of the paging terminal class, if the paging message is not a paging message of the short message class or the paging message of the paging terminal class, the paging message is considered to be a useless paging message, i.e. a paging message of a specific type. Furthermore, the second identification card satisfies the first condition, and may receive a specific type of paging message for a preset number of times within a preset duration for the second identification card.
For example, if the user is playing a game on a terminal and is playing data traffic on a first identification card. At this time, if the second identification card of the terminal receives the paging message of the specific type more than 10 times within 5 minutes, the serving cell corresponding to the second identification card is switched from the current serving cell to other cells, so as to avoid the problem that the second identification card frequently receives the paging message to occupy the radio frequency resource of the main card, thereby causing insufficient data flow on the main card and causing the user to feel the game card.
In some embodiments, the first identification card and the second identification card may be identification cards of fifth generation mobile communication technology;
correspondingly, the step S102 of switching the current serving cell of the second identification card includes: and switching the service cell corresponding to the second identification card from the first cell providing the fifth generation mobile communication technology to the second cell providing the fourth generation mobile communication technology.
It should be noted that, the first identification card and the second identification card may be identification cards of the same system, and the first identification card and the second identification card may also be identification cards of different systems.
In this embodiment of the present application, the first identification card and the second identification card share a set of radio frequency devices. Here, the sharing of the set of radio frequency devices may be sharing of a set of radio frequency antennas.
In some embodiments, the first application is a latency sensitive application.
In the embodiment of the application, when a first application uses a data network of a first identity identification card of a terminal, whether a second identity identification card of the terminal meets a first condition is determined; if the second identity card meets the first condition, the current service cell of the second identity card is switched, so that the influence of the second identity card of the terminal on the first identity card can be effectively slowed down, a user can not feel the first application is blocked in the process of using the data network of the first identity card, and the second identity card can also normally receive information.
Based on the foregoing embodiments, the embodiments of the present application further provide a method for preventing application blocking, and fig. 2 is a second implementation flow chart of the method for preventing application blocking according to the embodiments of the present application, as shown in fig. 2, where the method includes:
step S201, when a first application uses a data network of a first identity card of a terminal, determining whether a second identity card of the terminal meets a first condition; the first condition comprises that the number of times of receiving the paging message of the specific type sent by the current service cell in a first preset time period is larger than a preset number of times;
here, the first identification card and the second identification card share a set of radio frequency devices.
Step S202, if the second identification card meets the first condition, switching the current service cell of the second identification card.
For example, if the user is using a navigation class application during a drive, and the navigation class application uses data traffic on the first identity card. At this time, if the second identification card of the terminal receives the paging message sent by the current service cell, judging whether the paging message is a specific type paging message, and if so, starting counting the times of receiving the specific type paging message in the subsequent 1 minute. If the number of times is greater than 6, switching the service cell corresponding to the second identity card from the current service cell to other cells so as to avoid the problems that the second identity card frequently receives paging messages and preempting radio frequency resources of the first identity card, thereby causing insufficient data flow on the first identity card, causing navigation blocking, delayed navigation and the like.
In the embodiment of the application, when a first application uses a data network of a first identity identification card of a terminal, whether a second identity identification card of the terminal meets a first condition is determined; the first condition comprises that the number of times of receiving the paging message of the specific type sent by the current service cell in a first preset time period is larger than a preset number of times; if the second identity card meets the first condition, the current service cell of the second identity card is switched, so that the second identity card can be prevented from residing in a cell which frequently issues useless paging messages by counting the times that the second identity card receives the paging messages of a specific type within a preset time, the first application is not felt to be blocked by a user in the process of using the data network of the first identity card, and the second identity card can also normally receive information.
Based on the foregoing embodiments, the embodiments of the present application further provide a method for preventing application blocking, and fig. 3 is a schematic implementation flow chart of a method for preventing application blocking according to the embodiments of the present application, as shown in fig. 3, where the method includes:
Step 301, when the second identification card receives a paging message sent by a current serving cell, determining whether the second identification card receives specific information within a second preset time period after receiving the paging message;
step S302, if the specific information is received, determining that the paging message is a paging message of a specific type;
here, the steps S301 to S302 are methods of determining the type of the paging message. The terminal cannot know what the paging message is transmitted to when it receives the paging message according to the protocol. Therefore, after the second identification card receives the paging message, it initiates random access to enter the connection state of the radio resource control, and attempts to receive the packet sent by the network to know the type of the paging message. I.e. the packet carries the content of the paging message, and the type of the paging message can be judged by the content of the paging message.
For example, if the second identification card receives a paging message, it continues to determine whether specific information (the specific information may be information other than an incoming call and a short message) is received within 20 seconds after the paging message is received, and if the specific information is received, the paging message is considered to be a specific type of paging message.
Step S303, when a first application uses a data network of a first identity identification card of a terminal, determining whether the number of times that a second identity identification card of the terminal receives a specific type of paging message sent by a current serving cell within a first preset time period is larger than a preset number of times;
here, the first identification card and the second identification card share a set of radio frequency devices. The first application is a time-sensitive application.
Step S304, if the number of times of the specific type paging message is larger than the preset number of times, the current service cell of the second identity card is switched.
In this embodiment, if the first identity card and the second identity card of the terminal share a set of radio frequency device, the second identity card is counted to receive the number of times of the specific type of paging message in the preset time, so as to avoid the second identity card residing in a cell where the useless paging message is frequently issued, so that the user can not feel that the first application is blocked in the process of using the data network of the first identity card, and meanwhile, the second identity card can also normally receive information.
Based on the foregoing embodiments, embodiments of the present application further provide a method for preventing application from being blocked, where the method includes:
step S311, when a first application uses a data network of a first identity card of a terminal, determining whether a second identity card of the terminal meets a first condition;
step S312, if the second identification card meets the first condition, the current service cell of the second identification card is switched from a first cell to a second cell by using a cell reselection mode; or, using the full-band searching mode to switch the current service cell of the second identity card from the first cell to the second cell.
Here, the second identification card of the terminal may perform cell reselection after the first condition is satisfied, and select a cell for handover in the cell reselection neighbor cell frequency point configuration table. The "full-band search" may also be performed after the first condition is satisfied, which increases the search range and the search strength of the cell relative to the cell reselection.
Of course, the second identification card of the terminal may also execute cell reselection first after the first condition is satisfied, and select the cell to be switched in the cell reselection neighboring cell frequency point configuration table. If the proper cell is not switched, the full-band searching network is executed, and the full-band searching network increases the searching range and searching strength of the cell relative to the cell reselection.
Based on the foregoing embodiments, embodiments of the present application further provide a method for preventing application from being blocked, where the method includes:
step S321, when a first application uses a data network of a first identity card of a terminal, determining whether a second identity card of the terminal meets a first condition;
here, the first identification card and the second identification card share a set of radio frequency devices.
Step S322, if the second identification card meets the first condition, switching the current service cell of the second identification card from a first cell to a second cell by using a cell reselection mode; or, using full-band searching mode to switch the current service cell of the second identification card from the first cell to the second cell;
step S323, after the current service cell of the second identity card is switched from a first cell to a second cell, adding the first cell into a forbidden cell list;
here, if the current serving cell of the second identification card is handed over from a first cell to a second cell, the first cell is added to a forbidden cell list, so that the second identification card cannot reside on the first cell for a period of time.
Step S324, if the time of the first cell joining the forbidden cell list exceeds a third preset time, the first cell is removed from the forbidden cell list.
In this embodiment of the present application, it may be configured to remove the first cell from the forbidden cell list if a duration of the first cell joining the forbidden cell list exceeds a third preset duration, so after the third preset duration, if the first cell does not frequently issue useless paging messages, the second identification card may also reside on the first cell.
Based on the foregoing embodiments, the embodiments of the present application further provide a method for preventing application blocking, and fig. 4 is a schematic implementation flow chart of the method for preventing application blocking according to the embodiments of the present application, as shown in fig. 4, where the method includes:
step S401, when the second identification card receives the paging message sent by the current service cell, determining whether the second identification card receives specific information within a second preset time period after receiving the paging message;
step S402, if the specific information is received, determining that the paging message is a paging message of a specific type;
Step S403, when a first application uses a data network of a first identity identification card of a terminal, determining whether the number of times that a second identity identification card of the terminal receives a specific type of paging message sent by a current serving cell within a first preset time period is greater than a preset number of times;
here, the first identification card and the second identification card share a set of radio frequency devices.
In this embodiment of the present application, after the second identification card receives the paging message of the specific type for the first time, timing may be started, and the number of times that the second identification card receives the paging message of the specific type is determined within a first preset time period after timing.
Step S404, if the number of times of the paging message of the specific type is larger than the preset number of times, determining the type of the first application;
step S405, determining whether the first application is sensitive to delay according to the type of the first application;
step S406, if the first application is an application sensitive to time delay, the current service cell of the second identity card is switched.
In this embodiment, if the first identity card and the second identity card of the terminal share a set of radio frequency device, and the first application is an application sensitive to time delay, the second identity card is prevented from residing in a cell where useless paging messages are frequently issued by counting the number of times that the second identity card receives the paging messages of a specific type within a preset time period, so that a user can not feel that the application sensitive to time delay is blocked when using the data network of the first identity card, and meanwhile, the second identity card can also normally receive information.
Basically, the paging procedure is that the network side sends a paging message to the terminal side at a specific moment to inform the terminal to execute corresponding operation or update related parameters. The paging message from the network side can be received whether the terminal is in an RRC (Radio Resource Control ) idle state or an RRC connected state. The terminal in the RRC connected state can determine whether the current system information has changed by decoding the paging message, and once the terminal detects that the system information has changed, it re-interprets the system information. The terminal in the RRC idle state can know whether the current system information message is changed, and also know whether the current incoming call of the terminal exists, and once the terminal detects the incoming call, the terminal triggers the random access process, that is, enters the RRC connection state from the RRC idle state.
If the terminal is in a dual-card mode (i.e. the terminal comprises a main card and a sub-card), the sub-card is powered on at the moment, and the sub-card enters an RRC connection state to preempt the radio frequency resource of the main card, so that the main card cannot receive and transmit data.
Paging messages are classified into PS (Packet Switch) paging messages and CS (Circuit Switch) paging messages. Incoming calls under 2G (2-Generation Wireless Telephone Technology, second generation mobile communication technology) or 3G (3-Generation Wireless Telephone Technology, third generation mobile communication technology), the network pages the terminal via CS paging messages. And an incoming call under 4G (The 4th Generation Mobile Communication Technology, fourth generation mobile communication technology), the network pages The terminal through PS paging messages. The existing terminal generally supports double 4G double high-definition voice, namely, two SIM cards are in a 4G state, and the auxiliary card can also enjoy high-definition voice and video call services when in power-on.
When the terminal resides in a specific cell of the base station, the PS paging received by the secondary card in the RRC idle state may be, in addition to the useful incoming call and the short message, in many cases, an useless high-definition voice packet or an IPv6 (Internet Protocol Version, internet protocol sixth edition) routing announcement, or even an empty paging message without carrying any network data. According to the protocol, when the terminal receives the PS paging message, it can not know what the paging message is transmitted to, so when the sub-card receives the PS paging message, it must make the sub-card initiate random access to enter RRC connection state, and attempt to receive the packet sent by the network can know whether it is incoming call or short message. Because the single radio frequency resource limitation can certainly influence the data service of the main card at the moment, besides PS paging messages of incoming calls and short messages, other paging messages are useless messages issued by a network side, but still can influence the use of the main card.
According to a large amount of experimental data, the issuing of PS paging messages is related to the base station cells of the SIM card resident network, and some base station cells can not issue useless PS paging messages, while some base station cells can issue useless paging messages frequently, even once every tens of seconds. The base station cells are identified and distinguished by PCI (Physical Cell Identifier, physical cell identity number) and EARFCH (4G cell frequency point information).
Fig. 5A is a schematic diagram of a dual card usage state of a terminal in the related art, as shown in fig. 5A, during a period when a module 51 uses data traffic for a main card of the terminal, during a period when a module 52 preempting radio frequency resources for a sub-card of the terminal receives a paging message, and during a period when the main card preempts radio frequency resources by the sub-card. Because only one SIM card can use data at the same time, the main card occupies the radio frequency resource of the main card at the moment when the auxiliary card receives the paging during the data service. More importantly, each time the secondary card receives the PS paging message and goes into RRC connection state to detect whether the packet is useful information, the secondary card occupies the radio resource for about 3s (seconds), i.e. the primary card has 3s of unusable data. The delay of the game network, which is sensitive to the delay, is about 100ms (milliseconds) or less, which causes serious problems such as the player being unable to operate the game when the main card is playing the game.
Therefore, based on the foregoing embodiment, the embodiment of the present application further provides a method for preventing application blocking, and the solution in the embodiment of the present application provides a complete set of detection processing solutions based on avoiding the secondary blocking in the problem cell. The method and the device not only protect the main card from frequently suffering from the interference of the useless PS paging message issued by the problematic cell, but also protect the auxiliary card from normally receiving the incoming call and the short message.
The detailed design logic is as follows:
(1) The PS paging message is issued by the network side, and the terminal side can not control the passive reception only. Because only incoming calls and short messages are useful information for users, the users can understand the situation that the incoming calls and short messages interrupt the main card service. Thus, PS paging messages are broadly divided into two categories in the embodiments of the present application: the first PS paging message includes an incoming call and a short message, and is considered as useful information. The second type of PS paging message contains route advertisement and high definition voice packets, as well as null paging messages without any information, which are considered as useless information.
(2) And the terminal chip side (namely the modem side) receives the base station data and the signaling, judges the PS paging message received by the cell corresponding to the current auxiliary card and records and reports the PS paging message, wherein:
A. after the assistant card successfully resides in a specific base station cell, when the assistant card receives a PS paging message once, a timer T1 is started;
B. and after the auxiliary card enters the RRC connection state, detecting whether an incoming call or a short message is received in a T1 time period. If the received paging message indicates that the paging message is a valid paging message, the timer T1 is emptied and then the next time the network side waits for issuing a PS paging message;
C. If the incoming call and the short message are not received within the time T1, the PS paging message is regarded as useless paging message, the Count value Count (the initial value of the Count value Count is 0) is increased by 1, and a timer T2 is started;
D. if the Count value Count exceeds a threshold value in the T2 time, setting an indication parameter and reporting the indication parameter to a system side of the terminal. This parameter may be obtained AT the RIL (Radio Interface Layer, radio access layer) of the system, for example, by an AT (Attention) command.
(3) The logic scheme of the terminal system side (such as android operating system) is as follows:
A. after receiving the reported indication parameters, judging whether the user is in an application period (such as a real-time competitive game, an automatic driving application and the like) with sensitive use delay.
B. And if the indication parameters in the use delay sensitive application period and the received reporting indication parameters are satisfied, adding the cell information (PCI and EARFCH) where the current sub-card is positioned into a blacklist. Wherein cells in the blacklist may be set to restrict access for 2 hours.
C. Likewise, the RIL module may allow the secondary card to re-search the network, i.e. to select another base station cell for access (where the cells in the blacklist are not selected).
(4) If the sub-card receives the useless PS paging message again at a certain time after entering the new cell, the steps are circulated until the sub-card does not receive a certain number of useless paging messages.
Fig. 5B is a schematic diagram of an implementation flow chart of a method for preventing application blocking according to an embodiment of the present application, as shown in fig. 5B, where the method includes:
step S501, if a chip side corresponding to a terminal sub-card receives a paging message, a timer T1 is started, and an initial value of a Count value Count is set to 0;
step S502, if the useful information is received within the time T1, judging the paging message to be the useful paging message, and clearing the timer T1;
step S503, if no useful information is received within the time T1, the paging message is judged to be useless, the Count value Count is increased by 1, and a timer T2 is started;
step S504, in the time of T2, if the Count value Count is smaller than a preset threshold value, the timer T2 is emptied;
step S505, if the Count value Count is greater than or equal to the preset threshold in the time T2, reporting the result to the operating system side of the terminal;
step S506, if the operation system receives the report and the delay sensitive application on the main card is not in a use state, the report is ignored;
Step S507, if the operation system receives the report and the delay sensitive application on the main card is in a use state, adding the cell where the auxiliary card is positioned into a blacklist, and issuing a command to enable the auxiliary card to search the network again to enter a new base station cell;
step S508, if the secondary card receives useless paging information on the new base station cell, the secondary card polls the detection again.
Here, the re-polling detection means that the steps S501 to S507 are repeated.
In some embodiments, letting the secondary card "re-search" may include multiple recovery actions. Such as cell reselection or full band scanning. Of course, the triggering condition of the step can be designed, for example, the searching can be firstly performed on a plurality of cells frequently used by the user, if no suitable cell exists, the searching can be continuously performed on the frequency band frequently used by the user, and if no suitable cell exists, the full-band network sweeping can be performed. Further, the means of disabling the sub card is taken as a choice which is not the final means.
In some embodiments, for the following dual 5G (5 th Generation Wireless Systems, fifth generation mobile communication technology), i.e. the primary and secondary cards reside in the 5G network, a milder approach such as temporarily turning off the secondary card 5G capability first may be adopted.
In the embodiment of the application, the paging message issued by the network side is divided into useful information and useless information, and then the base station cell which can frequently issue useless paging messages to the user is screened out through setting of a timer and a threshold. And temporarily adding the cell to the blacklist, and allowing the secondary card to reselect a new cell until the new cell meets the judgment condition.
Of course, if the network searching operation is performed too frequently, the power consumption of the terminal is increased, and the sensitivity is too low, so that the improving effect is lost. Therefore, in the embodiment of the application, the sensitivity of the whole set of scheme can be adjusted by adjusting the Count value Count, the preset threshold value, the values of the T1 timer and the T2 timer, so that the performance and the power consumption are balanced and optimized.
According to the scheme in the embodiment of the application, the influence of the double-card scene auxiliary card on the main card caused by the limitation of the radio frequency antenna can be reduced as much as possible, compared with the existing scheme of disabling the auxiliary card, the scheme in the embodiment of the application can ensure that a user can not miss incoming calls and short messages from the auxiliary card while considering the performance, and belongs to a warm and effective new scheme.
By statistically analyzing the existing usage conditions of the user, a part of reasons for complaints of the user are poor game playing experience, and a phenomenon of jamming often occurs, which is caused by the limitation of the terminal radio frequency antenna under the double-card. The method provided by the embodiment of the application can effectively slow down the influence of the auxiliary card on the main card, greatly improve the game scene experience of the user, and simultaneously, compared with the prior technical scheme, can perfectly give consideration to the incoming call and the short message of the auxiliary card which are not missed by the user.
Based on the foregoing embodiments, the embodiments of the present application provide an apparatus for preventing application blocking, where the apparatus includes units included, modules included in the units, and components included in the modules, and may be implemented by a processor in a terminal; of course, the method can also be realized by a specific logic circuit; in an implementation, the processor may be a CPU (Central Processing Unit ), MPU (Microprocessor Unit, microprocessor), DSP (Digital Signal Processing, digital signal processor), or FPGA (Field Programmable Gate Array ), or the like.
Fig. 6 is a schematic structural diagram of an apparatus for preventing application jamming according to an embodiment of the present application, as shown in fig. 6, the apparatus 600 includes:
a determining unit 601, configured to determine, when a first application of a terminal uses a data network of a first identification card of the terminal, whether a second identification card of the terminal meets a first condition;
and a switching unit 602, configured to switch a current serving cell of the second identification card if the second identification card meets the first condition.
In some embodiments, the first condition comprises: the number of times of receiving the paging message of the specific type sent by the current serving cell in the first preset time period is larger than the preset number of times.
In some embodiments, the apparatus further comprises:
the specific information determining unit is used for determining whether the second identity card receives specific information within a second preset time length after receiving the paging message when the second identity card receives the paging message sent by the current service cell;
and the paging message determining unit is used for determining that the paging message is a paging message of a specific type if the specific information is received.
In some embodiments, the switching unit 602 includes:
the first switching module is used for switching the current service cell of the second identity card from a first cell to a second cell by using a cell reselection mode;
and the second switching module is used for switching the current service cell of the second identity card from the first cell to the second cell by using a full-band searching mode.
In some embodiments, the apparatus further comprises:
a joining unit, configured to join a forbidden cell list in a first cell after a current serving cell of the second identity card is switched from the first cell to a second cell;
and the removing unit is used for removing the first cell from the forbidden cell list if the time for the first cell to join the forbidden cell list exceeds a third preset time.
In some embodiments, the first identification card and the second identification card share a set of radio frequency devices.
In some embodiments, the first application is a latency sensitive application.
The description of the apparatus embodiments above is similar to that of the method embodiments above, with similar advantageous effects as the method embodiments. For technical details not disclosed in the device embodiments of the present application, please refer to the description of the method embodiments of the present application for understanding.
It should be noted that, in the embodiment of the present application, if the method for preventing application from being blocked is implemented in the form of a software functional module, the method may also be stored in a computer readable storage medium when sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present application may be embodied in essence or in a part contributing to the prior art in the form of a software product stored in a storage medium, including several instructions for causing an electronic device (which may be a personal computer, a server, etc.) to perform all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a ROM (Read Only Memory), a magnetic disk, or an optical disk. Thus, embodiments of the present application are not limited to any specific combination of hardware and software.
Correspondingly, the embodiment of the application provides a terminal, which comprises a memory and a processor, wherein the memory stores a computer program capable of running on the processor, and the processor realizes the steps in the method for preventing application from being blocked provided in the embodiment when executing the program.
Correspondingly, the embodiment of the application provides a readable storage medium, on which a computer program is stored, which when being executed by a processor, implements the steps in the method for preventing application from being blocked.
It should be noted here that: the description of the storage medium and apparatus embodiments above is similar to that of the method embodiments described above, with similar benefits as the method embodiments. For technical details not disclosed in the embodiments of the storage medium and the apparatus of the present application, please refer to the description of the method embodiments of the present application for understanding.
It should be noted that fig. 7 is a schematic diagram of a hardware entity of a terminal according to an embodiment of the present application, as shown in fig. 7, the hardware entity of the terminal 700 includes: a processor 701, a communication interface 702 and a memory 703, wherein
The processor 701 generally controls the overall operation of the terminal 700.
Communication interface 702 may enable terminal 700 to communicate with other terminals or servers over a network.
The memory 703 is configured to store instructions and applications executable by the processor 701, and may also cache data (e.g., image data, audio data, voice communication data, and video communication data) to be processed or processed by each module in the processor 701 and the terminal 700, and may be implemented by FLASH (FLASH) or RAM (Random Access Memory ).
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above described device embodiments are only illustrative, e.g. the division of the units is only one logical function division, and there may be other divisions in practice, such as: multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed.
In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or units, whether electrically, mechanically, or otherwise. The units described as separate units may or may not be physically separate, and units displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units; some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing module, or each unit may be separately used as one unit, or two or more units may be integrated in one unit; the integrated units may be implemented in hardware or in hardware plus software functional units.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware associated with program instructions, where the foregoing program may be stored in a computer readable storage medium, and when executed, the program performs steps including the above method embodiments; and the aforementioned storage medium includes: a removable storage device, ROM, RAM, magnetic or optical disk, or other medium capable of storing program code.
The methods disclosed in the several method embodiments provided in the present application may be arbitrarily combined without collision to obtain a new method embodiment.
The features disclosed in the several product embodiments provided in the present application may be combined arbitrarily without conflict to obtain new product embodiments.
The features disclosed in the several method or apparatus embodiments provided in the present application may be arbitrarily combined without conflict to obtain new method embodiments or apparatus embodiments.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (9)

1. A method of preventing application jamming, the method comprising:
when a first application uses a data network of a first identity identification card of a terminal, determining whether a second identity identification card of the terminal meets a first condition; wherein the first condition includes: the times of receiving the paging message of the specific type sent by the current service cell in the first preset time length are larger than the preset times;
and if the second identification card meets the first condition, switching the current service cell of the second identification card.
2. The method according to claim 1, wherein the method further comprises:
When the second identity card receives the paging message sent by the current service cell, determining whether the second identity card receives specific information within a second preset time length after receiving the paging message;
and if the specific information is received, determining that the paging message is a paging message of a specific type.
3. The method of claim 1, wherein said switching the current serving cell of the second identification card comprises:
switching the current service cell of the second identity card from a first cell to a second cell by using a cell reselection mode;
or, using the full-band searching mode to switch the current service cell of the second identity card from the first cell to the second cell.
4. A method according to claim 3, characterized in that the method further comprises:
after a current serving cell of the second identity card is switched from a first cell to a second cell, adding the first cell into a forbidden cell list;
and if the time period of the first cell joining the forbidden cell list exceeds a third preset time period, removing the first cell from the forbidden cell list.
5. The method of any one of claims 1 to 4, wherein the first identification card and the second identification card share a set of radio frequency devices.
6. The method of claim 5, wherein the first application is a latency sensitive application.
7. An apparatus for preventing application jamming, the apparatus comprising:
a determining unit, configured to determine, when a first application of a terminal uses a data network of a first identification card of the terminal, whether a second identification card of the terminal meets a first condition; wherein the first condition includes: the times of receiving the paging message of the specific type sent by the current service cell in the first preset time length are larger than the preset times;
and the switching unit is used for switching the current service cell of the second identification card if the second identification card meets the first condition.
8. A terminal comprising a memory and a processor, the memory storing a computer program executable on the processor, the processor implementing the steps in the method of preventing application jamming as claimed in any one of claims 1 to 6 when the program is executed.
9. A computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps in the method of preventing application jamming as claimed in any one of claims 1 to 6.
CN202011241182.3A 2020-11-09 2020-11-09 Method and device for preventing application from being blocked, equipment and storage medium Active CN112423289B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011241182.3A CN112423289B (en) 2020-11-09 2020-11-09 Method and device for preventing application from being blocked, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011241182.3A CN112423289B (en) 2020-11-09 2020-11-09 Method and device for preventing application from being blocked, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112423289A CN112423289A (en) 2021-02-26
CN112423289B true CN112423289B (en) 2023-06-27

Family

ID=74780852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011241182.3A Active CN112423289B (en) 2020-11-09 2020-11-09 Method and device for preventing application from being blocked, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112423289B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114401538B (en) * 2022-01-06 2024-02-06 北京小米移动软件有限公司 Network switching method, device, electronic equipment and storage medium
CN115134901B (en) * 2022-06-28 2024-06-14 维沃移动通信有限公司 Communication processing method and device, terminal and readable storage medium
CN116489634B (en) * 2023-06-25 2023-10-17 深圳传音控股股份有限公司 Service processing method, intelligent terminal and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1627837A (en) * 2003-12-09 2005-06-15 华为技术有限公司 Method for seeking mobile station
CN110730445A (en) * 2019-09-28 2020-01-24 RealMe重庆移动通信有限公司 Paging processing method, device, electronic equipment and storage medium
CN111278106A (en) * 2019-01-18 2020-06-12 维沃软件技术有限公司 Paging indication method, paging method, terminal and network side equipment
CN111316724A (en) * 2018-09-17 2020-06-19 华为技术有限公司 Network selection method and device applied to mobile terminal
CN111479309A (en) * 2020-04-15 2020-07-31 维沃移动通信有限公司 Service processing method, user equipment and computer readable storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3179791B1 (en) * 2015-12-11 2021-01-27 Alcatel Lucent Paging with optimized transmission resources in a mobile network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1627837A (en) * 2003-12-09 2005-06-15 华为技术有限公司 Method for seeking mobile station
CN111316724A (en) * 2018-09-17 2020-06-19 华为技术有限公司 Network selection method and device applied to mobile terminal
CN111278106A (en) * 2019-01-18 2020-06-12 维沃软件技术有限公司 Paging indication method, paging method, terminal and network side equipment
CN110730445A (en) * 2019-09-28 2020-01-24 RealMe重庆移动通信有限公司 Paging processing method, device, electronic equipment and storage medium
CN111479309A (en) * 2020-04-15 2020-07-31 维沃移动通信有限公司 Service processing method, user equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN112423289A (en) 2021-02-26

Similar Documents

Publication Publication Date Title
CN112423289B (en) Method and device for preventing application from being blocked, equipment and storage medium
EP3764723B1 (en) Data processing method, computer-readable storage medium and terminal device
KR101763988B1 (en) Method and apparatus for communicating neighbor cells
US20150163827A1 (en) Apparatus and Method for Paging for Mutli-Standby Devices
CN111788848B (en) Network exception handling method and device
CN106413036B (en) Network access processing method and terminal equipment
CN105657861A (en) UE management method, UE and base station
CN110677900A (en) Paging processing method and related device
US20230254817A1 (en) Method and apparatus for user equipment sidelink communication, user equipment and storage medium
CN113038476A (en) Pseudo base station cell identification method and device
CN111954278A (en) Information reporting method and device, mobile terminal and storage medium
CN102137432A (en) Method, device and system for terminal to access network
CN111787596A (en) Cell residence method, device, terminal and storage medium
WO2024199158A1 (en) Cell switching method and apparatus, and electronic device
CN106231600A (en) Terminal and information processing method
CN113382433A (en) Method and device for adjusting data transmission path
US20210329519A1 (en) Cell Connection Processing Method and Mobile Terminal
CN112399515B (en) Communication processing method and device
CN113891371A (en) Frequency point measuring method and related product
CN111356231A (en) Method and apparatus for detecting paging message, storage medium and electronic device
CN112789877B (en) Cell interference detection method, device, mobile terminal and storage medium
CN107431524A (en) A kind of antenna allocation method and terminal
US20140348072A1 (en) Scheduling modification for expected public warning system message
CN109257135B (en) Mobile terminal shielding method and interference base station
CN115209531A (en) Method for receiving paging message, terminal equipment and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant