CN118301242A - Working mode switching method and device, electronic equipment and storage medium - Google Patents

Working mode switching method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN118301242A
CN118301242A CN202410182286.3A CN202410182286A CN118301242A CN 118301242 A CN118301242 A CN 118301242A CN 202410182286 A CN202410182286 A CN 202410182286A CN 118301242 A CN118301242 A CN 118301242A
Authority
CN
China
Prior art keywords
private network
target
working mode
identifier
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410182286.3A
Other languages
Chinese (zh)
Inventor
谌颖
李爽
江呈
张莹莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Radio And Television Mobile Network Co ltd
Original Assignee
China Radio And Television Mobile Network Co ltd
Filing date
Publication date
Application filed by China Radio And Television Mobile Network Co ltd filed Critical China Radio And Television Mobile Network Co ltd
Publication of CN118301242A publication Critical patent/CN118301242A/en
Pending legal-status Critical Current

Links

Abstract

The application discloses a working mode switching method and device, electronic equipment and a storage medium, and belongs to the technical field of mobile communication. The method comprises the following steps: receiving a broadcast message sent by a base station; the broadcast message includes an identification of the private network; under the condition that the private network identification is a target identification, matching from a preset mapping relation between the private network identification and the working mode to obtain a target working mode corresponding to the target identification; and switching the mode to a target working mode. According to the embodiment of the application, the private network identification is increased by deploying the private network of the government and enterprise, and the mapping relation between the private network identification and the working mode is increased by function customization in advance, and after the private network identification is found by the terminal, the current position can be considered as the factory, so that the mode can be automatically switched to the target working mode, the automatic mode switching is realized, the switching efficiency of the working mode is improved, and the working efficiency is further improved.

Description

Working mode switching method and device, electronic equipment and storage medium
Technical Field
The present application belongs to the technical field of mobile communications, and in particular, relates to a method and apparatus for switching a working mode, an electronic device, and a storage medium.
Background
Private government networks refer to communication networks specifically tailored to governments and businesses, often with greater security, reliability, and customized services to meet the specific needs of the government and business.
When an enterprise deploys an enterprise private network, employees need to use the enterprise network and related applications. To achieve this goal, employees typically need to actively identify the current location and enter or close private network modes and government applications accordingly. For example, a government or enterprise employee may use a dual system handset that first needs to identify the location where they are currently located as the factory when they enter the factory, and then manually switch the system of the handset to the government or enterprise mode so that they can use the specific functions and services provided by the private network. Once leaving the factory, they also need to manually exit the government and enterprise mode to restore the handset to the normal terminal state.
There are some inconveniences with this way of manually switching modes. The staff needs to pay attention to the position of the staff at any time so as to switch modes at any time, if the staff forgets to switch modes, the staff can possibly cause the fact that the government enterprise network and the application cannot be used, and therefore the work efficiency is affected.
Disclosure of Invention
The present application aims to solve at least one of the technical problems existing in the prior art. Therefore, the application provides a working mode switching method, a device, electronic equipment and a storage medium, so as to improve the switching efficiency of the working mode and further improve the working efficiency.
In a first aspect, the present application provides a method for switching a working mode, including:
receiving a broadcast message sent by a base station; the broadcast message comprises an identifier of a private network;
under the condition that the private network identification is a target identification, matching from a preset mapping relation between the private network identification and the working mode to obtain a target working mode corresponding to the target identification;
and switching the mode to the target working mode.
According to the working mode switching method, the broadcasting message sent by the base station is received; the broadcast message comprises an identifier of a private network; under the condition that the private network identification is a target identification, matching from a preset mapping relation between the private network identification and the working mode to obtain a target working mode corresponding to the target identification; and switching the mode to the target working mode. According to the embodiment of the application, the private network identification is increased by deploying the private network of the government and enterprise, and the mapping relation between the private network identification and the working mode is increased by function customization in advance, and after the private network identification is found by the terminal, the current position can be considered as the factory, so that the mode can be automatically switched to the target working mode, the automatic mode switching is realized, the switching efficiency of the working mode is improved, and the working efficiency is further improved.
According to one embodiment of the application, the identity is a public land mobile network identity.
By setting the public land mobile network identifier, the embodiment can help to distinguish different networks, particularly can avoid confusion and conflict under the condition that a plurality of private networks coexist, can also strengthen the security of the network, and is helpful to prevent unauthorized equipment or users from accessing the private networks, thereby protecting the network security.
According to an embodiment of the present application, in the case that the identifier of the private network is a target identifier, the matching, from a mapping relationship between a preset identifier of the private network and a working mode, to obtain a target working mode corresponding to the target identifier includes:
Connecting the private network under the condition that the identifier of the private network is a target identifier;
And under the condition of successfully connecting the private network, matching the preset mapping relation between the private network identifier and the working mode to obtain a target working mode corresponding to the target identifier.
In the embodiment, if the identification of the private network is identified as the target identification, the private network is accessed first, so that the target working mode is matched from the mapping relation under the condition of connecting to the private network, the mode switching is safer, and the safety risk is reduced.
According to an embodiment of the present application, the connecting the private network in the case that the identifier of the private network is the target identifier includes:
Acquiring the signal strength of the private network under the condition that the identifier of the private network is a target identifier;
and connecting the private network under the condition that the signal strength is greater than or equal to a preset threshold value.
In this embodiment, the signal strength can be used to indicate the distance from the factory, and the stronger the signal strength, the closer the signal strength is to the factory, and when the signal strength is weaker than a certain value, the signal strength can be considered to have left the factory, so that the private network is connected under the condition that the signal strength is greater than or equal to a preset threshold value, the current position can be considered to be in the factory, the security is further improved, and the security risk is reduced.
According to one embodiment of the application, in said target operating mode, at least one of the following functions is activated:
Collecting data and reporting;
starting a work APP;
The right to open the target application is granted.
In this embodiment, by switching to the target operation mode, some functions are turned on, which helps to protect the data security of the enterprise and reduce the risk brought by manual operation.
According to one embodiment of the application, the functions that are turned on in the different modes of operation are different.
In this embodiment, by setting the opened functions differently for different working modes, for example, more functions and rights can be opened for a terminal with higher rights, and fewer functions and rights can be opened for a terminal with lower rights, so that security hierarchical protection can be realized, and security is further improved.
According to one embodiment of the application, in the target working mode, if the connected network identifier is detected not to be the target identifier, the target working mode is closed.
In this embodiment, when the terminal is in the target working mode, if it is detected that the identifier of the connected network is not the target identifier, the current location can be considered to have left the factory, and at this time, the target working mode can be automatically closed, so that automatic mode switching is realized, and further safety is improved.
In a second aspect, the present application provides an operation mode switching device, including:
the receiving module is used for receiving the broadcast message sent by the base station; the broadcast message comprises an identifier of a private network;
the matching module is used for matching the preset mapping relation between the private network identification and the working mode to obtain a target working mode corresponding to the target identification under the condition that the private network identification is the target identification;
and the switching module is used for switching the mode into the target working mode.
According to the working mode switching device, the broadcasting message sent by the base station is received; the broadcast message comprises an identifier of a private network; under the condition that the private network identification is a target identification, matching from a preset mapping relation between the private network identification and the working mode to obtain a target working mode corresponding to the target identification; and switching the mode to the target working mode. According to the embodiment of the application, the private network identification is increased by deploying the private network of the government and enterprise, and the mapping relation between the private network identification and the working mode is increased by function customization in advance, and after the private network identification is found by the terminal, the current position can be considered as the factory, so that the mode can be automatically switched to the target working mode, the automatic mode switching is realized, the switching efficiency of the working mode is improved, and the working efficiency is further improved.
In a third aspect, the present application provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the method for switching operation modes according to the first aspect when executing the computer program.
In a fourth aspect, the present application provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of operating mode switching as described in the first aspect above.
In a fifth aspect, the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method for switching an operating mode according to the first aspect.
In a sixth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the method of operating mode switching as described in the first aspect above.
The above technical solutions in the embodiments of the present application have at least one of the following technical effects:
According to the working mode switching method, the broadcasting message sent by the base station is received; the broadcast message comprises an identifier of a private network; under the condition that the private network identification is a target identification, matching from a preset mapping relation between the private network identification and the working mode to obtain a target working mode corresponding to the target identification; and switching the mode to the target working mode. According to the embodiment of the application, the private network identification is increased by deploying the private network of the government and enterprise, and the mapping relation between the private network identification and the working mode is increased by function customization in advance, and after the private network identification is found by the terminal, the current position can be considered as the factory, so that the mode can be automatically switched to the target working mode, the automatic mode switching is realized, the switching efficiency of the working mode is improved, and the working efficiency is further improved.
Further, in some embodiments, by setting the public land mobile network identifier, not only can different networks be differentiated, but also confusion and collision can be avoided, especially in the case that a plurality of private networks coexist, and the security of the network can be enhanced, so that unauthorized devices or users can be prevented from accessing the private networks, and network security is protected.
Further, in some embodiments, if the identifier of the private network is identified as the target identifier, the private network is accessed first, so that the target working mode is matched from the mapping relationship under the condition of connecting to the private network, so that the mode switching is safer, and the safety risk is reduced.
Further, in some embodiments, the signal strength can be used to indicate the distance from the factory, and the stronger the signal strength, the closer the signal strength is to the factory, when the signal strength is weaker than a certain value, the signal strength can be considered to have left the factory, so that the private network is connected under the condition that the signal strength is greater than or equal to a preset threshold value, the current position can be considered to be in the factory, further improving the security and reducing the security risk.
Still further, in some embodiments, by switching to the target operating mode, some functions are turned on, which helps to protect data security of the enterprise and reduce risks caused by manual operations.
Still further, in some embodiments, by setting the functions that are opened differently for different working modes, for example, more functions and rights may be opened for a terminal with higher rights, and fewer functions and rights may be opened for a terminal with lower rights, so that security hierarchical protection may be implemented, and security may be further improved.
Still further, in some embodiments, when the terminal is in the target working mode, if it is detected that the identifier of the connected network is not the target identifier, the current location may be considered to have left the factory, and at this time, the target working mode may be automatically closed, so that automatic mode switching is implemented, and further security is improved.
Additional aspects and advantages of the application will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application.
Drawings
The foregoing and/or additional aspects and advantages of the application will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
fig. 1 is a flow chart of a method for switching operation modes according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an operation mode switching device according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions of the embodiments of the present application will be clearly described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which are obtained by a person skilled in the art based on the embodiments of the present application, fall within the scope of protection of the present application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged, as appropriate, such that embodiments of the present application may be implemented in sequences other than those illustrated or described herein, and that the objects identified by "first," "second," etc. are generally of a type, and are not limited to the number of objects, such as the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/", generally means that the associated object is an "or" relationship.
Private networks refer to private communication networks that are specifically tailored to a particular organization or a particular user. Such networks typically have higher security, reliability, and customized services to meet the specific needs of a particular organization or user. The private network may be based on a wired network or may be based on a wireless network, such as a mobile communication network.
The reason that private networks have access to specific functions and services is due to their customized nature. Because private networks are customized for a particular organization or user, specific functions and services may be customized according to their needs. These functions and services may include specific network connections, security protocols, priority communications, specific applications, etc. In contrast, public networks cannot provide such highly personalized services, as public networks are required to meet the needs of a wider population of users, and are therefore typically provided with generic services.
In addition, private networks often have higher security, which is also an important reason for their ability to access specific functions and services. Because private networks are proprietary, more stringent security measures and encryption mechanisms may be employed to secure networks and data. This enables private networks to provide access to sensitive data and applications that may not be secured as well over public networks.
Private government networks refer to communication networks specifically tailored to governments and businesses, often with greater security, reliability, and customized services to meet the specific needs of the government and business, such as specific network connections, security agreements, or specific applications.
After the enterprise deploys the private government enterprise network, the employee uses the private government enterprise network and related applications, and relies on the employee to actively identify the current location, and enter or close the private government enterprise network mode and the private government enterprise applications. For example, when entering a factory, starting a government enterprise mode, leaving the factory, manually exiting the government enterprise mode to become a normal terminal. The manual switching mode needs staff to pay attention to the position of the staff at any time so as to switch modes at any time, and if the staff forgets to switch the modes, the staff can possibly cause the fact that the government enterprise network and the application cannot be used, so that the working efficiency is affected.
The application considers that if the position of the staff can be automatically identified by a technical means and the working mode of the mobile phone is automatically switched, the problem of low working efficiency caused by the manual switching of the staff in the prior art is hopeful to be solved.
The method, the device, the electronic equipment and the storage medium for switching the working modes provided by the embodiment of the application are described in detail through specific embodiments and application scenes thereof with reference to the accompanying drawings.
The working mode switching method can be applied to the terminal, and can be specifically executed by hardware or software in the terminal.
The terminal includes, but is not limited to, a portable communication device such as a mobile phone or tablet having a touch sensitive surface (e.g., a touch screen display and/or a touch pad). It should also be appreciated that in some embodiments, the terminal may not be a portable communication device, but rather a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or a touch pad).
In the following various embodiments, a terminal including a display and a touch sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and joystick.
The execution main body of the working mode switching method provided by the embodiment of the application can be an electronic device or a functional module or a functional entity capable of realizing the working mode switching method in the electronic device, and the electronic device provided by the embodiment of the application comprises, but is not limited to, a mobile phone, a tablet computer, a camera, a wearable device and the like.
As shown in fig. 1, the operation mode switching method includes: step 110, step 120 and step 130.
Step 110, receiving a broadcast message sent by a base station; the broadcast message includes an identification of the private network.
The base station is an important component of the wireless communication system, and provides wireless access between the electronic equipment and the private network core network, thereby realizing mobile communication service. For example, the base station may transmit data in the private network of the government enterprise through a wireless signal, including transmitting user communication data, implementing data exchange between the mobile device and the private network core network, and may support the mobile device in the private network of the government enterprise to access the private network core network through a wireless access technology (such as LTE, 5G, etc.), implementing communication between devices, and so on.
In a mobile communication network, base stations periodically transmit broadcast messages, which are referred to as system information (System Information). The purpose of the broadcast message is to broadcast information about the network to the mobile device so that the mobile device can find and access the network. The broadcast message may include some basic information of the network, such as network identification, coverage, service type, etc., and the mobile device may obtain the information by receiving the broadcast message.
In the implementation of the application, an operator can deploy a government enterprise private network for a factory in advance and increase the identification of the private network, so that the broadcast message sent by the base station in the preset range of the factory can contain the identification of the private network. The identifier is used to uniquely identify a network, and the identifier may be, for example, a number, a letter number, or a combination of numbers and letters, which is not limited by the embodiment of the present application.
In some embodiments, the identity may be a public land mobile network (Public Land Mobile Network, PLMN) identity. PLMNs are wireless communication systems that tend to face mobile subscribers on land, such as in vehicles or walking. The PLMN identity consists of MCC (Mobile Country Code) and MNC (Mobile Network Code) for identifying the mobile network operator and the country or region in which it is located. In this embodiment, the private network may be preset with its PLMN identifier, for example, the private network identifier 46015, the private network identifier 46016, etc., and of course, the identifier may also be other expression modes, for example, may be a number, a letter number, or a combination of numbers and letters, etc., which is not limited in the embodiment of the present application.
By setting the public land mobile network identifier, the embodiment can help to distinguish different networks, particularly can avoid confusion and conflict under the condition that a plurality of private networks coexist, can also strengthen the security of the network, and is helpful to prevent unauthorized equipment or users from accessing the private networks, thereby protecting the network security. Also, in this embodiment, by setting the public land mobile network identity, the current location can be identified.
In the embodiment of the application, the electronic equipment can select the most suitable network for access by receiving the broadcast message, and can update the position of the electronic equipment by receiving the broadcast message.
And 120, under the condition that the private network identifier is a target identifier, matching from a preset mapping relation between the private network identifier and the working mode to obtain a target working mode corresponding to the target identifier.
The operation mode may be a state in which a system, a function, an application, etc. of the electronic device are located, for example, in one operation mode, the electronic device may enter a factory system, open certain functions, open certain rights, etc. Taking an electronic device as a mobile phone for example, the mobile phone of a government enterprise staff can comprise a dual system, when entering a factory, the work mode of the mobile phone can be switched to the government enterprise mode, and the mobile phone enters a factory system, in the factory system, the government enterprise staff can have the authority to access internal files and open certain functions, and when leaving the factory, the mobile phone exits the government enterprise mode, enters a common mode and becomes daily electronic equipment.
In the embodiment of the application, the mapping relation between the private network identification and the working mode can be preset, so that the electronic equipment can be automatically switched to the target working mode corresponding to the target identification under the condition that the private network identification is identified as the target identification. For example, if the electronic device identifies that the identifier of the private network is 46016, a target working mode corresponding to the identifier 46016 can be found from a preset mapping relationship between the identifier of the private network and the working mode, and the electronic device automatically switches to the target working mode.
In some embodiments, the mapping between the identifiers of the private network and the operating mode may be established and stored in the following manner: the identification of the private network and the working mode can be associated in a data table mode, one column of the data table stores the identification of the private network, the other column stores the working mode identification, the working mode identification is used for uniquely identifying the working mode, and the identification of the private network with the mapping relation and the working mode identification are in the same row. Or the identity of the private network may be stored in association with an index of the operating mode. Specifically, the local database may store the private network identifier set in advance, and assign numbers to the private network identifiers in the private network identifier set, where the numbers are indexes of the corresponding working modes, and the corresponding working modes may be uniquely determined by the indexes, and the private network identifiers and the indexes of the working modes are stored in association, so that the working modes corresponding to the private network identifiers may be uniquely determined. Of course, the establishing manner of the mapping relationship between the identifier of the private network and the working mode is not limited to the above examples, and other modifications are possible by those skilled in the art in light of the technical spirit of the present application, but all the functions and effects implemented by the private network are the same as or similar to those of the present application, and are covered in the protection scope of the present application.
And 130, switching the mode into a target working mode.
According to the working mode switching method, the broadcasting message sent by the base station is received; the broadcast message includes an identification of the private network; under the condition that the private network identification is a target identification, matching from a preset mapping relation between the private network identification and the working mode to obtain a target working mode corresponding to the target identification; and switching the mode to a target working mode. According to the embodiment of the application, the private network identification is increased by deploying the private network of the government and enterprise, and the mapping relation between the private network identification and the working mode is increased by function customization in advance, and after the private network identification is found by the terminal, the current position can be considered as the factory, so that the mode can be automatically switched to the target working mode, the automatic mode switching is realized, the switching efficiency of the working mode is improved, and the working efficiency is further improved.
In some embodiments, in the target operating mode, at least one of the following functions is turned on:
Collecting data and reporting;
starting a work APP;
The right to open the target application is granted.
Specifically, for the electronic device in the target working mode, some functions may be started, for example, functions of collecting data report, starting work APP, authorizing to start permission of the target application, or starting some other functions. For example, after a user enters a factory, the electronic device automatically switches a mode to a target working mode, where the target working mode may be a government enterprise mode, and in this mode, the user may access internal information of an enterprise through the electronic device, such as accessing an internal database, viewing an internal file, editing an internal file, or the like, or use functions of some applications, such as a screenshot function, a search function, an intercom function, or the like, or authorize permission to open some applications, such as opening editing permission of the database, opening screenshot permission, opening downloading permission, or the like.
In this embodiment, by switching to the target operation mode, some functions are turned on, which helps to protect the data security of the enterprise and reduce the risk brought by manual operation.
In some embodiments, the functions that are turned on in different modes of operation are different.
Specifically, in an enterprise, different working modes can be customized for different staff, and functions started in the different working modes are different. For example, for a general employee of an enterprise, the function that is started by the working mode may be a basic function that needs to be started for normal operation, for an IT employee of an enterprise, the working mode may start functions of editing a network, modifying network information, and the like in addition to the basic function, and for a lead layer, the working mode may start higher-level functions or rights in addition to the basic function, for example, may view or edit confidential files, and the like. Of course, different modes of operation may also be set according to different departments, or according to other dimensions.
In this embodiment, different working modes may be obtained by matching from a preset mapping relationship between the private network identifiers and the working modes based on different private network identifiers, and in the case that multiple target identifiers are provided, the identity of the user may be verified first to determine which private network corresponds to the target identifier that the user matches. Specifically, after receiving the broadcast message sent by the base station, the electronic device discovers that the broadcast message includes a plurality of private network identifiers, for example, a plurality of PLMN identifiers are preset, and are respectively a private network identifier 46015 and a private network identifier 46016, and the private network identifiers are all target identifiers, that is, private networks corresponding to the identifiers are private networks of a government enterprise deployed in advance in a factory, in this case, identity verification may be performed first to verify whether the electronic device is an illegal user, for example, the private network identifier 46015 corresponds to a working mode of a common employee, the private network identifier 46016 corresponds to a working mode of a pilot layer, if the user of the electronic device is a common employee, then the network of the private network identifier 46016 is an illegal user, and the private network identifier 46015 is a registered user, so that the network of the private network identifier 46015 can be accessed, and further, the working mode corresponding to the network of the private network identifier 46015 is obtained by matching from the mapping relationship between the preset private network identifiers and the working mode.
In this embodiment, by setting the opened functions differently for different working modes, for example, more functions and rights can be opened for a terminal with higher rights, and fewer functions and rights can be opened for a terminal with lower rights, so that security hierarchical protection can be realized, and security is further improved.
In some embodiments, in the case that the identifier of the private network is a target identifier, matching from a preset mapping relationship between the identifier of the private network and the working mode to obtain a target working mode corresponding to the target identifier includes:
Connecting the private network under the condition that the private network identification is a target identification;
And under the condition of successfully connecting the private network, matching the preset mapping relation between the private network identifier and the working mode to obtain a target working mode corresponding to the target identifier.
Specifically, if the identifier of the private network is identified as the target identifier, the electronic device may be considered to be in the factory area, and in this case, an access request may be initiated to connect to the private network. Under the condition of successfully connecting the private network, the user of the electronic equipment can be considered to belong to government and enterprise staff, not illegal users, so that the target working mode corresponding to the target identifier can be obtained by matching from the mapping relation between the preset private network identifier and the working mode, and the electronic equipment can be automatically switched to the target working mode.
In the embodiment, if the identification of the private network is identified as the target identification, the private network is accessed first, so that the target working mode is matched from the mapping relation under the condition of connecting to the private network, the mode switching is safer, and the safety risk is reduced.
In some embodiments, in a case where the identifier of the private network is the target identifier, connecting the private network includes:
Under the condition that the identifier of the private network is a target identifier, acquiring the signal strength of the private network;
and connecting the private network under the condition that the signal strength is greater than or equal to a preset threshold value.
The signal strength refers to the strength of a signal transmitted by the private network base station received by the mobile device. This signal strength is typically expressed in decibel milliwatts (dBm). The larger the value of the signal strength, the stronger the signal; the smaller the value, the weaker the signal. The signal strength of a private network has a direct impact on the communication quality and performance of mobile devices. In general, the higher the signal strength, the better the signal quality received by the mobile device and the higher the communication quality. And the lower the signal strength, the lower the communication quality may be, and even the normal communication may not be possible. In general, signal strengths between-50 dBm and-100 dBm are considered a good signal strength range, while signal strengths below-100 dBm may lead to reduced communication quality or even failure to communicate properly.
In this embodiment, in order to ensure the communication quality, a range in which the signal strength is greater than or equal to a preset threshold may be divided into a factory area range in advance, or the signal strength at a factory area boundary may be determined based on the range of the factory area, and the preset threshold may be determined based on the signal emphasis of the factory area boundary. When the signal strength is greater than or equal to the preset threshold, the location where the user of the electronic device is located may be considered as a factory area, and in this case, a private network may be connected. The preset threshold may be any value between-50 dBm and-100 dBm, for example, -50dBm, -70dBm, -80dBm, -100dBm, etc., which is not limited by the embodiment of the present application.
In this embodiment, the signal strength can be used to indicate the distance from the factory, and the stronger the signal strength, the closer the signal strength is to the factory, and when the signal strength is weaker than a certain value, the signal strength can be considered to have left the factory, so that the private network is connected under the condition that the signal strength is greater than or equal to a preset threshold value, the current position can be considered to be in the factory, the security is further improved, and the security risk is reduced.
In some embodiments, in the target operating mode, if it is detected that the identity of the connected network is not the target identity, the target operating mode is turned off.
Specifically, in the target working mode, the government staff leaves the factory area in some scenes, such as work, business trip, dining and the like, in this case, the electronic device disconnects from the private network and connects to other networks, so that the electronic device can recognize that the identifier of the connected network is not the target identifier, close the target working mode and switch the electronic device into the normal mode.
In this embodiment, when the terminal is in the target working mode, if it is detected that the identifier of the connected network is not the target identifier, the current location can be considered to have left the factory, and at this time, the target working mode can be automatically closed, so that automatic mode switching is realized, and further safety is improved.
According to the working mode switching method provided by the embodiment of the application, the execution main body can be a working mode switching device. In the embodiment of the present application, an example of a method for executing a working mode switching by a working mode switching device is described.
The embodiment of the application also provides a working mode switching device.
As shown in fig. 2, the operation mode switching device includes:
a receiving module 210, configured to receive a broadcast message sent by a base station; the broadcast message includes an identification of the private network;
the matching module 220 is configured to, when the identifier of the private network is a target identifier, match a preset mapping relationship between the identifier of the private network and the working mode to obtain a target working mode corresponding to the target identifier;
A switching module 230, configured to switch the mode to the target operation mode.
According to the working mode switching device, the broadcasting message sent by the base station is received; the broadcast message includes an identification of the private network; under the condition that the private network identification is a target identification, matching from a preset mapping relation between the private network identification and the working mode to obtain a target working mode corresponding to the target identification; and switching the mode to a target working mode. According to the embodiment of the application, the private network identification is increased by deploying the private network of the government and enterprise, and the mapping relation between the private network identification and the working mode is increased by function customization in advance, and after the private network identification is found by the terminal, the current position can be considered as the factory, so that the mode can be automatically switched to the target working mode, the automatic mode switching is realized, the switching efficiency of the working mode is improved, and the working efficiency is further improved.
In some embodiments, the matching module 220 is further configured to:
Connecting the private network under the condition that the private network identification is a target identification;
And under the condition of successfully connecting the private network, matching the preset mapping relation between the private network identifier and the working mode to obtain a target working mode corresponding to the target identifier.
In some embodiments, the matching module 220 is further configured to:
Under the condition that the identifier of the private network is a target identifier, acquiring the signal strength of the private network;
and connecting the private network under the condition that the signal strength is greater than or equal to a preset threshold value.
In some embodiments, the switching module 230 is further configured to:
and in the target working mode, if the connected network identifier is detected not to be the target identifier, closing the target working mode.
The working mode switching device in the embodiment of the application can be electronic equipment or a component in the electronic equipment, such as an integrated circuit or a chip. The electronic device may be a terminal, or may be other devices than a terminal. The electronic device may be a Mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted electronic device, a Mobile internet appliance (Mobile INTERNET DEVICE, MID), an augmented reality (augmented reality, AR)/Virtual Reality (VR) device, a robot, a wearable device, an ultra-Mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), etc., and may also be a server, a network attached storage (Network Attached Storage, NAS), a personal computer (personal computer, PC), a Television (TV), a teller machine, a self-service machine, etc., which are not particularly limited in the embodiments of the present application.
The working mode switching device in the embodiment of the application can be a device with an operating system. The operating system may be a microsoft (Windows) operating system, an Android operating system, an IOS operating system, or other possible operating systems, and the embodiment of the present application is not limited specifically.
In some embodiments, as shown in fig. 3, an electronic device 300 is further provided in the embodiments of the present application, which includes a processor 301, a memory 302, and a computer program stored in the memory 302 and capable of running on the processor 301, where the program, when executed by the processor 301, implements the respective processes of the embodiments of the method for switching an operation mode, and the same technical effects can be achieved, so that repetition is avoided and no further description is given here.
The electronic device in the embodiment of the application includes the mobile electronic device and the non-mobile electronic device.
The embodiment of the application also provides a non-transitory computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the processes of the working mode switching method embodiment described above, and can achieve the same technical effects, and in order to avoid repetition, the description is omitted here.
The processor is a processor in the electronic device in the above embodiment. Readable storage media include computer readable storage media such as computer readable memory ROM, random access memory RAM, magnetic or optical disks, and the like.
The embodiment of the application also provides a computer program product, which comprises a computer program, and the computer program realizes the working mode switching method when being executed by a processor.
The processor is a processor in the electronic device in the above embodiment. Readable storage media include computer readable storage media such as computer readable memory ROM, random access memory RAM, magnetic or optical disks, and the like.
The embodiment of the application further provides a chip, the chip comprises a processor and a communication interface, the communication interface is coupled with the processor, the processor is used for running programs or instructions, the processes based on the working mode switching method embodiment can be realized, the same technical effects can be achieved, and the repetition is avoided, and the description is omitted here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, chip systems, or system-on-chip chips, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in part in the form of a computer software product stored on a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method of the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.
In the description of the present specification, reference to the terms "one embodiment," "some embodiments," "illustrative embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present application have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the application, the scope of which is defined by the claims and their equivalents.

Claims (10)

1. A method for switching operation modes, comprising:
receiving a broadcast message sent by a base station; the broadcast message comprises an identifier of a private network;
under the condition that the private network identification is a target identification, matching from a preset mapping relation between the private network identification and the working mode to obtain a target working mode corresponding to the target identification;
and switching the mode to the target working mode.
2. The method of claim 1, wherein the identity is a public land mobile network identity.
3. The method according to claim 1, wherein, in the case that the identifier of the private network is a target identifier, the matching to obtain the target working mode corresponding to the target identifier from the mapping relationship between the preset identifier of the private network and the working mode includes:
Connecting the private network under the condition that the identifier of the private network is a target identifier;
And under the condition of successfully connecting the private network, matching the preset mapping relation between the private network identifier and the working mode to obtain a target working mode corresponding to the target identifier.
4. A method according to claim 3, wherein said connecting the private network in case the private network identity is a target identity comprises:
Acquiring the signal strength of the private network under the condition that the identifier of the private network is a target identifier;
and connecting the private network under the condition that the signal strength is greater than or equal to a preset threshold value.
5. The method according to claim 1, characterized in that in the target operating mode at least one of the following functions is turned on:
Collecting data and reporting;
starting a work APP;
The right to open the target application is granted.
6. The method of claim 1, wherein the functions that are turned on in different modes of operation are different.
7. The method according to claim 1, wherein in the target operating mode, if it is detected that the identity of the connected network is not the target identity, the target operating mode is switched off.
8. An operation mode switching device, characterized by comprising:
the receiving module is used for receiving the broadcast message sent by the base station; the broadcast message comprises an identifier of a private network;
the matching module is used for matching the preset mapping relation between the private network identification and the working mode to obtain a target working mode corresponding to the target identification under the condition that the private network identification is the target identification;
and the switching module is used for switching the mode into the target working mode.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1-7 when the program is executed by the processor.
10. A non-transitory computer readable storage medium, having stored thereon a computer program, which when executed by a processor, implements the method according to any of claims 1-7.
CN202410182286.3A 2024-02-18 Working mode switching method and device, electronic equipment and storage medium Pending CN118301242A (en)

Publications (1)

Publication Number Publication Date
CN118301242A true CN118301242A (en) 2024-07-05

Family

ID=

Similar Documents

Publication Publication Date Title
US7363056B2 (en) Method and system for secured duplication of information from a SIM card to at least one communicating object
CN104081403A (en) Mobile device-type locking
US20080090548A1 (en) Method for tracking mobile communication terminal
CN104462889A (en) Application authority management method and device
CN109245902A (en) Protection method and device for instant messaging information verification code
CN104185179A (en) Control apparatus and method for subscriber identity module, and subscriber identity module
CN104767713A (en) Account binding method, server and account binding system
CN106936802A (en) Mobile phone A PP information protecting methods and mobile phone A PP clients, system
EP2685780B1 (en) Mobile phone and data processing method therefor
US20230345356A1 (en) Distributed wireless communication access security
CN107172194B (en) Virtual SIM card management method and device and communication terminal
CN105933890A (en) Embedded SIM card realizing method and system, user terminal and server
CN108347730B (en) Wireless communication processing method and device
AU2010288520B2 (en) A chip card, an electronic system, a method being implemented by a chip card and a computer program product
CN104202462B (en) Communication control method and system
CN104581676A (en) Communication system, mobile communication device, and method for switching user identification information
CN105025548B (en) A kind of the connection control method and device of SIM card
CN110337087B (en) Air WiFi access method and system
WO2017127019A1 (en) A system and method for remotely controlling a mobile device
EP1582053A2 (en) System and method for distributed authorization for access to communications device
US20070072641A1 (en) Methods and Apparatus for Mobile Equipment Depersonalization
CN118301242A (en) Working mode switching method and device, electronic equipment and storage medium
CN111050323B (en) Terminal switching method, device and system
KR101075997B1 (en) Apparatus and method for service registration in multi mode portable terminal
KR101236487B1 (en) System and Method for Preventing use of Illegal Mobile Terminal

Legal Events

Date Code Title Description
PB01 Publication