Network searching method and electronic equipment

文档序号:144910 发布日期:2021-10-22 浏览:25次 中文

阅读说明:本技术 一种搜网方法与电子设备 (Network searching method and electronic equipment ) 是由 杨锐 杜旭阳 宋昊 窦凤辉 金辉 于 2021-03-29 设计创作,主要内容包括:本申请提供一种搜网方法与电子设备,该方法涉及人工智能(artificial intelligence,AI)、机器学习等相关领域。该方法包括:终端设备接入第一通信制式的网络;所述终端设备确定发生网络异常,所述网络异常包括:掉网或掉制式;所述终端设备搜索目标通信制式的网络,所述目标通信制式为不低于所述第一通信制式的通信制式;所述终端设备连接上所述目标通信制式的网络。通过这种方式,终端设备掉网或掉制式之后,可以尽快恢复到高制式网络,提升用户体验。(The application provides a network searching method and electronic equipment, and relates to the relevant fields of Artificial Intelligence (AI), machine learning and the like. The method comprises the following steps: the terminal equipment is accessed to a network of a first communication system; the terminal equipment determines that a network abnormity occurs, and the network abnormity comprises the following steps: dropping the network or the system; the terminal equipment searches a network of a target communication system, wherein the target communication system is a communication system not lower than the first communication system; and the terminal equipment is connected with the network of the target communication system. By the method, the terminal equipment can be restored to the high-standard network as soon as possible after the network or the standard of the terminal equipment is disconnected, and user experience is improved.)

1. A network searching method is characterized by comprising the following steps:

the terminal equipment is accessed to a network of a first communication system;

the terminal equipment determines that a network abnormity occurs, and the network abnormity comprises the following steps: dropping the network or the system;

the terminal equipment searches a network of a target communication system, wherein the target communication system is a communication system not lower than the first communication system;

and the terminal equipment is connected with the network of the target communication system.

2. The method of claim 1, wherein the terminal device searching for a network of a target communication system comprises:

when the terminal equipment is in a connected state, the terminal equipment searches a prestored first cell, and the communication system of the first cell is the target communication system; the first cell and the second cell are not identical, the second cell is a neighboring cell of a third cell configured by the network device, and the third cell is a cell connected when the terminal device is disconnected.

3. The method of claim 2, wherein the first cell is a cell searched in a history network searching process of the terminal device.

4. The method of claim 1, wherein the terminal device searching for a network of a target communication system comprises:

and when the terminal equipment is in an idle state, the terminal equipment searches the network of the target system at preset time intervals.

5. The method according to any one of claims 1 to 4, wherein the terminal device searching for the network of the target communication system includes:

and starting to search the network of the target communication system at a first time point, wherein a first time interval exists between the first time point and a second time point, the second time point is a time point when the terminal equipment is disconnected from the network or the system, and the first time point is a time point after the second time point, wherein the first time interval is greater than or equal to 5 seconds.

6. The method according to any one of claims 1 to 4, wherein the terminal device searching for the network of the target communication system includes:

if the terminal equipment is located in a ground library scene, the terminal equipment starts to search the network of the target communication system at a third time point, a second time interval exists between the third time point and a fourth time point, the fourth time point is a time point when the terminal equipment leaves the ground library, and the third time point is a time point after the fourth time point;

wherein the second time interval is greater than or equal to 5 seconds.

7. The method according to any one of claims 1 to 4, wherein the terminal device searching for the network of the target communication system includes:

judging whether the terminal equipment is in a ground library scene;

if the terminal equipment is not in the ground library scene, the terminal equipment starts to search the network of the target communication system at a first time point, a first time interval exists between the first time point and a second time point, the second time point is a time point when the terminal equipment is disconnected from the network or the system, and the first time point is a time point after the second time point;

if the terminal equipment is in the ground library scene, the terminal equipment starts to search the network of the target communication system at a third time point, a second time interval exists between the third time point and a fourth time point, the fourth time point is the time point when the terminal equipment leaves the ground library, and the third time point is the time point after the fourth time point;

wherein the first time interval is greater than or equal to 5 seconds, and/or the second time interval is greater than or equal to 5 seconds.

8. The method according to any of claims 5-7, wherein said initiating a search for a network of said target communication scheme at a first point in time comprises: if the network abnormality is network drop, starting to search the network of the target communication system at the first time point; and/or the presence of a gas in the gas,

the terminal equipment starts to search the network of the target communication system at a third time point, and the method comprises the following steps: and if the network abnormality is network drop, starting to search the network of the target communication system at the third time point.

9. The method according to any one of claims 1 to 8, wherein before the terminal device searches for a network of a target communication scheme, the method further comprises:

and the terminal equipment determines at least one target communication system based on the first communication system.

10. The method according to any one of claims 1 to 9, wherein the terminal device searching for a network of a target communication system includes:

the terminal equipment searches a network of a target communication system and does not search networks of other communication systems except the target communication system; or the like, or, alternatively,

the terminal equipment searches the network of the target communication system at least twice continuously; or the like, or, alternatively,

and the terminal equipment searches the network of the target communication system on the same frequency point within preset time.

11. The method of claim 10, wherein the terminal device searches for a network of a target communication system and does not search for networks of other systems other than the target communication system, comprising:

the terminal equipment adjusts the radio frequency to a frequency point corresponding to the target communication system, and the radio frequency is not switched to a frequency point outside the target communication system; and/or the presence of a gas in the gas,

and the terminal equipment controls the network searching function of the target communication system to be in an open state, and the searching functions of other target communication systems are in a closed state.

12. The method as claimed in claims 1-11, wherein the terminal device searching for the network of the target communication system comprises:

and if the terminal equipment is in a bright screen state when the network or the system is disconnected, the terminal equipment searches the network of the target communication system.

13. The method according to any one of claims 1 to 11, wherein the terminal device searching for a network of a target communication system includes:

judging whether the terminal equipment is in a call state or not;

and if the terminal equipment is in the call state, after the call is finished, the terminal equipment searches the network of the target communication system.

14. The method according to any of claims 1-13, wherein the location where the network abnormality occurs in the terminal device is a first location, and the first duration is a duration between a time point when the terminal device connects to the target communication system network and a time point when the network abnormality occurs in the terminal device;

after the terminal device is connected to the network of the target communication system, the method further includes:

controlling the terminal equipment to enter a default network searching mode;

when the terminal equipment reaches the first place again and network abnormality occurs, controlling the terminal equipment to search for the network in the default network searching mode and then connecting the network of the target communication system again; and the time length between the time point when the terminal equipment is connected with the target communication system network again and the time point when the terminal equipment reaches the first place again and the network abnormality occurs is a second time length, and the second time length is greater than the first time length.

15. The method according to claim 5, wherein the first time point is before a fifth time point, and the fifth time point is a time point when the terminal device successfully accesses to the target communication system network after the network abnormality historically occurs.

16. The method of claim 15, wherein the first point in time is a point in time between a historical maximum failure time and a historical minimum success time; the historical minimum success time is a time when the terminal device tries to search for the target communication system network earliest and searches for the target communication system network successfully after the network abnormality occurs in history, the historical maximum failure time is a time when the terminal device tries to search for the target communication system network latest and fails to search after the network abnormality occurs in history, the historical minimum success time is after the historical maximum failure time and before the fifth time point, and the historical maximum failure time is after the second time point.

17. The method of claim 6, wherein the method further comprises:

when the terminal equipment detects that the terminal equipment is currently located in a first fence corresponding to the underground garage, determining that the terminal equipment is located in a ground garage scene;

or the terminal equipment collects motion data and determines that the terminal equipment is in a ground library scene based on the motion data.

18. The method of any of claims 6-17, wherein the method further comprises:

the terminal device detects a time point when the terminal device leaves the underground garage scene based on currently collected motion data and historical ex-garage parameters, wherein the historical ex-garage parameters comprise motion data which are collected historically by the terminal device and used for representing that the terminal device is moved out of the underground garage; wherein the historical ex-warehouse parameters comprise at least one of the following parameters:

an attitude angle;

a time-dependent profile of the attitude angle;

beginning climbing time;

the attitude angle of the terminal equipment at the time of starting climbing and/or the change values of the attitude angles before and after the time of starting climbing;

stopping climbing time;

the attitude angle of the terminal equipment in the time of stopping climbing and/or the change value of the attitude angle before and after the time of stopping climbing;

the climbing time comprises the time from the beginning of climbing to the stopping of climbing;

alternatively, the first and second electrodes may be,

the terminal device detects a time point when the terminal device leaves the underground garage scene based on currently acquired cell information and historical cell information, wherein the historical cell information comprises cell information acquired when the terminal device historically moves out of the underground garage; wherein the cell information comprises at least one of cell identification information, cell signal strength information or cell signal strength change information;

the cell identification information comprises cell identifications of one or more cells detected when the terminal equipment leaves the ground bank scene historically;

the signal strength information comprises cell signal strengths of one or more cells detected by the terminal device historically leaving the vault scene;

the signal strength change information includes a change value of a first signal strength and a second signal strength, the first signal strength is a signal strength of a first cell detected at a first preset time before the terminal device leaves the basement scene historically, and the second signal strength is a signal strength of the first cell detected at a second preset time after the terminal device leaves the basement scene historically;

the terminal equipment successfully searches the target communication system network at a sixth time point;

and when the terminal equipment determines that the time difference between the historical minimum success time and the historical maximum failure time is greater than a threshold value, updating the historical minimum success time at the sixth time point.

19. An electronic device, comprising:

one or more processors;

a memory;

and one or more computer programs, wherein the one or more computer programs are stored in the memory, the one or more computer programs comprising instructions which, when executed by the electronic device, cause the electronic device to perform the method of any of claims 1-18.

20. A computer-readable storage medium comprising instructions that, when executed on an electronic device, cause the electronic device to perform the method of any of claims 1-18.

21. A chip coupled to a memory in an electronic device for invoking a computer program stored in the memory to perform the method of any one of claims 1-18.

Technical Field

The present application relates to the field of communications technologies, and in particular, to a network searching method and an electronic device.

Background

At present, although the network coverage is comprehensive, there still exist a plurality of areas without network coverage or weak coverage, such as an underground garage or a weak coverage or no coverage area on a driving line. When the terminal is in the areas, the network is easy to drop, the low system is easy to drop and the like.

Taking an underground garage as an example, suppose that the terminal device is disconnected from the network by 4G after entering the underground garage (entering the garage), when the terminal device is moved out of the underground garage (leaving the garage), the terminal device needs to search for the network again for registration, the network again for registration may reside in a low standard such as a 3G base station, that is, the terminal device is in 4G when entering the garage, the terminal device is surely dropped into the 3G standard when leaving the garage, and the terminal device may be recovered to 4G for a long time after leaving the garage, which affects user experience.

Disclosure of Invention

The application aims to provide a network searching method and device, which are used for recovering a high-standard network in time after a terminal loses a network or a standard is lost.

In a first aspect, an embodiment of the present application provides a network searching method, which may be implemented by a terminal device, where the terminal device is, for example, a mobile phone, a tablet computer, and the method includes: the terminal equipment is accessed to a network of a first communication system; the terminal equipment determines that a network abnormity occurs, and the network abnormity comprises the following steps: dropping the network or the system; the terminal equipment searches a network of a target communication system, wherein the target communication system is a communication system not lower than the first communication system; and the terminal equipment is connected with the network of the target communication system.

Therefore, in the embodiment of the present application, when the terminal device drops the network or drops the system, a designated network search may be performed, where the designated network search is a network of a search target communication system, for example, a network of only the search target communication system is used, so that the terminal device can be recovered to a high-system network as quickly as possible.

In a possible design, when the terminal device is in a connected state, the terminal device searches a pre-stored first cell, and a communication system of the first cell is the target communication system; the first cell and the second cell are not identical, the second cell is a neighboring cell of a third cell configured by the network device, and the third cell is a cell connected when the terminal device is disconnected.

That is to say, when the terminal device is in a connected state and the system is dropped, the pre-stored first cell may be searched, and the second cell may not be searched, because the second cell is a neighboring cell of a cell (i.e., a third cell) configured by the network device and connected when the system is dropped, and the second cell may not be a cell of the target system. Therefore, in this way, the network searching capability of the terminal device is relaxed, and not only the neighboring cell of the third cell is searched, but also the high standard can be recovered as soon as possible.

In a possible design, the first cell is a cell searched in a historical network searching process of the terminal device. For example, the terminal device has historically experienced the same network drop/system drop scenario, in this scenario, the terminal device searches that the cell corresponding to the network of the target system is cell 1, and then the first cell is cell 1.

In one possible design, the searching, by the terminal device, for the network of the target communication system includes: and when the terminal equipment is in an idle state, the terminal equipment searches the network of the target system at preset time intervals.

In the prior art, a terminal device searches for a network immediately after dropping the network, if the terminal device does not search for the network, the terminal device waits for 1s to continue searching for the network, and if the terminal device does not search for the network, the terminal device waits for 2s to continue searching for the network, and the time interval is gradually increased. In the embodiment of the application, when the terminal device is disconnected (in an idle state), the network of the target system is searched at preset time intervals, so that the possibility of searching the network of the target system is improved.

In one possible design, the searching, by the terminal device, for the network of the target communication system includes: starting to search the network of the target communication system at a first time point, wherein the first time point and a second time point have a first time interval, the second time point is a time point when the terminal device is disconnected from the network or the system, and the first time point is a time point after the second time point; wherein the first time interval is greater than or equal to 5 seconds.

In the embodiment of the application, after the terminal device drops the network or the system drops the network, the network searching is started at the first time point without searching the network of the target communication system immediately, so that the power consumption can be saved to a certain extent, wherein the first time point can be the best network searching time self-learned by the terminal device, the probability that the network is accessed to the network of the target system at the first time point is higher, namely the terminal device does not need to search the network ceaselessly, the network searching can be started at the more accurate network searching time point, and the probability of accessing to the network of the target system is higher.

In one possible design, the searching, by the terminal device, for the network of the target communication system includes: if the terminal equipment is located in a ground library scene, the terminal equipment starts to search the network of the target communication system at a third time point, a second time interval exists between the third time point and a fourth time point, the fourth time point is a time point when the terminal equipment leaves the ground library, and the third time point is a time point after the fourth time point; wherein the second time interval is greater than or equal to 5 seconds.

In the embodiment of the application, in a ground library scene, after the terminal equipment is disconnected from the network or the system is disconnected, the network of the target communication system does not need to be searched immediately, the network searching is started at the third time point, and the power consumption can be saved to a certain extent. Moreover, the probability of searching for the target standard network can be improved when the third time point is after the ex-warehouse time point (the fourth time point).

In one possible design, the searching, by the terminal device, for the network of the target communication system includes: judging whether the terminal equipment is in a ground library scene; if the terminal equipment is not in the ground library scene, the terminal equipment starts to search the network of the target communication system at a first time point, a first time interval exists between the first time point and a second time point, the second time point is a time point when the terminal equipment is disconnected from the network or the system, and the first time point is a time point after the second time point; if the terminal equipment is in the ground library scene, the terminal equipment starts to search the network of the target communication system at a third time point, a second time interval exists between the third time point and a fourth time point, the fourth time point is the time point when the terminal equipment leaves the ground library, and the third time point is the time point after the fourth time point; wherein the first time interval is greater than or equal to 5 seconds, and/or the second time interval is greater than or equal to 5 seconds.

In the embodiment of the application, the terminal equipment can identify scenes and judge whether the scenes are ground library scenes or non-ground library scenes. The network searching mechanism is different in different scenes. In a basement scene, the terminal equipment starts network searching at a third time point (after the time point of ex-warehouse), in a non-basement scene, the terminal equipment searches the network at a first time point (after the time point of network dropping or system dropping), and different network searching mechanisms are used in different scenes, so that the method is flexible.

In one possible design, the initiating the search for the network of the target communication system at the first time point includes: if the network abnormality is network drop, starting to search the network of the target communication system at the first time point; and/or, the terminal device starts to search the network of the target communication system at a third time point, including: and if the network abnormality is network drop, starting to search the network of the target communication system at the third time point.

In the prior art, after a network is dropped, the terminal device searches for a network immediately, and in this embodiment, after the network is dropped, the terminal device searches for a network at a first time point (non-basement scene) or a third time point (basement scene), and does not need to search for a network immediately, so that power consumption is saved.

In one possible design, before the terminal device searches for a network of a target communication system, the method further includes: and the terminal equipment determines at least one target communication system based on the first communication system.

In the embodiment of the application, after the terminal device is disconnected from the network or the system is disconnected, any system not lower than the first communication system may be searched, and a fixed communication system, for example, a 4G or 5G system may also be searched. Therefore, before searching the target communication system network, the terminal equipment determines the target communication system according to the first communication system. When the terminal equipment searches for any system not lower than the first communication system, on one hand, the terminal equipment can be ensured to be recovered to a high-system network, and on the other hand, the power consumption can be saved.

In one possible design, the searching, by the terminal device, for the network of the target communication system includes: and after the terminal equipment is in a system-off state, and when the terminal equipment is connected with a cell connected in the system-off state, the terminal equipment searches for the network of the target communication system.

In the embodiment of the application, after the terminal equipment is in the off-system state, when the terminal equipment is connected with the cell connected during the off-system state, the network of the target system can be searched. Therefore, in the process of switching off the system of the terminal equipment to recovering the high-system network, other low-system cells are not accessed, the time is saved, and the high-system network is ensured to be recovered as soon as possible.

In one possible design, the searching, by the terminal device, for the network of the target communication system includes: the terminal equipment searches a network of a target communication system and does not search networks of other communication systems except the target communication system; or the like, or, alternatively,

the terminal equipment searches the network of the target communication system at least twice continuously; or the like, or, alternatively,

and the terminal equipment searches the network of the target communication system on the same frequency point within preset time.

In the prior art, after a terminal device drops a network or a system, a network of any system is searched, generally, a high system is searched first and then a low system is searched, for example, 5G is searched first and then 4G is searched, and a frequency point when 5G is searched is different from a frequency point when 4G is searched. Therefore, in the embodiment of the application, the terminal equipment only searches the network of the target system, does not search the networks of other systems, and ensures that the network of the high system is recovered as fast as possible. Specifically, the terminal device may search for the network of the target communication system at least twice, instead of searching for the high system first and then searching for the low system, or the terminal device searches for the network at the same frequency point within a preset time, for example, if the frequency point corresponding to the target system is frequency point 1, the terminal device searches for the network of the target system using frequency point 1 within the preset time. That is, after the terminal device is disconnected from the network or the system is disconnected from the network, the network of the target communication system is directly searched, and the network of other systems is not searched in the middle.

Of course, after the preset time, if the terminal device does not search for the network of the target communication system, the low-system network is searched.

In one possible design, the searching, by the terminal device, for a network of a target communication system and not for networks of other systems other than the target communication system includes: the terminal equipment adjusts the radio frequency to a frequency point corresponding to the target communication system, and the radio frequency is not switched to a frequency point outside the target communication system; and/or the terminal equipment controls the network searching function of the target communication system to be in an open state, and the searching functions of other target communication systems are in a closed state.

For example, the terminal device may implement a network that searches only for a target communication system using at least one of the following manner 1 or manner 2. In the mode 1, the terminal equipment can adjust the radio frequency to the frequency point corresponding to the target communication system, and the radio frequency is not switched to the frequency point outside the target communication system; namely, the searching frequency point is adjusted to the frequency point corresponding to the target communication system. In the mode 2, the terminal device controls the network searching function for searching the target communication system to be in an open state, and the searching functions of other target communication systems are in a closed state. For example, the terminal device includes multiple modem modules, where different modem modules are used to perform network search of different communication systems, for example, the first modem module is used to search for a 3G system network, the second modem module is used to search for a 4G system network, and when the target communication system is a 4G system, the terminal device performs search for a 4G cell by using the second modem module, and may close the first modem module. In general, these two methods can be used in combination.

In one possible design, the searching, by the terminal device, for the network of the target communication system includes: and if the terminal equipment is in a bright screen state when the network or the system is disconnected, the terminal equipment searches the network of the target communication system.

Therefore, in the embodiment of the application, when the terminal device is determined to be in the bright screen state when the network abnormality occurs, the network of the target system is searched. Generally, when the terminal device is in the screen-off state, it indicates that the user does not operate the terminal device currently, and a target network does not need to be searched, so that power consumption is saved.

In one possible design, the searching, by the terminal device, for the network of the target communication system includes: judging whether the terminal equipment is in a call state or not; and if the terminal equipment is in the call state, after the call is finished, the terminal equipment searches the network of the target communication system.

Therefore, when the terminal device is in a call state, the possibility that the user uses the network is low, the terminal device can wait for the call to end and search the network of the target communication system, and power consumption is saved.

In one possible design, a place where the network abnormality occurs in the terminal device is a first place, and the first duration is a duration between a time point when the terminal device is connected to the target communication system network and a time point when the network abnormality occurs in the terminal device; after the terminal device is connected to the network of the target communication system, the method further includes: controlling the terminal equipment to enter a default network searching mode; when the first site is abnormal in network, the terminal equipment is controlled to search for the network in a default network searching mode, and then the network of the target communication system is connected again; and the time length between the time point when the terminal equipment is connected with the target communication system network again and the time point when the terminal equipment reaches the first place again and the network abnormality occurs is a second time length, and the second time length is less than the first time length.

In the embodiment of the application, the terminal device may include a designated network searching mode and a default network searching mode, where the designated network searching mode is that the terminal device only searches for a network of a target communication system, and does not search for networks of other systems; the default network searching mode, i.e. the existing network searching mechanism, is a neighbor list search (off-system condition) based on network device configuration, or a network of any system is searched, or a network of a high system is searched first and then a low system is searched (off-system condition). When network abnormality occurs in the same place and the terminal equipment uses the specified network searching mode, the time length required for recovering to the high-standard network is shorter than the time length required for recovering to the high-standard network under the condition of using the default network searching mode. Therefore, the embodiment of the application can realize that the terminal equipment can be recovered to the high-standard network as soon as possible after the network or the standard of the terminal equipment is disconnected.

In a possible design, the first time point is before a fifth time point, and the fifth time point is a time point when the terminal device successfully accesses to the target communication system network after the network abnormality occurs historically.

In this embodiment of the application, the first time point may be the best network searching time self-learned by the terminal device, and the first time point is after the second time point of the network drop or the network drop mode and before the fifth time point. Therefore, the terminal equipment does not need to search for the network ceaselessly, can start the network searching at a more accurate network searching time point, and has higher probability of accessing the target system network.

In one possible design, the first time point is a time point between a historical maximum failure time and a historical minimum success time; the historical minimum success time is a time when the terminal device tries to search for the target communication system network earliest and searches for the target communication system network successfully after the network abnormality occurs in history, the historical maximum failure time is a time when the terminal device tries to search for the target communication system network latest and fails to search after the network abnormality occurs in history, the historical minimum success time is after the historical maximum failure time and before the fifth time point, and the historical maximum failure time is after the second time point.

In this embodiment of the application, the first time point may be an optimal network searching time self-learned by the terminal device, and the optimal network searching time is a time point between a historical maximum failure time and a historical minimum success time. Therefore, the terminal equipment does not need to search for the network ceaselessly, can start the network searching at a more accurate network searching time point, and has higher probability of accessing the target system network.

In one possible design, the terminal device successfully searches the target communication system network at a sixth time point; and when the terminal equipment determines that the time difference between the historical minimum success time and the historical maximum failure time is greater than a threshold value, updating the historical minimum success time at the sixth time point.

In the embodiment of the application, the terminal device may update the historical minimum success time and also update the historical maximum failure time, and the updated historical minimum success time and the updated historical maximum failure time may be used to determine the optimal network searching time when the network abnormality occurs next time.

In one possible design, the method further includes: when the terminal equipment detects that the terminal equipment is currently located in a first fence corresponding to the underground garage, determining that the terminal equipment is located in a ground garage scene; or the terminal equipment collects motion data and determines that the terminal equipment is in a ground library scene based on the motion data.

In this embodiment of the application, the terminal device may identify the ground library scene based on fence detection, may also identify the ground library scene through the motion data, and of course, may also identify the ground library scene in other manners, which is not limited in this embodiment of the application.

In one possible design, the time point when the terminal device leaves the ground library scene is: the terminal equipment detects the ex-warehouse time point based on the currently collected motion data and historical ex-warehouse parameters, and the historical ex-warehouse parameters comprise motion data which are collected historically by the terminal equipment and used for representing that the terminal equipment moves out of the underground garage.

In the embodiment of the application, in a warehouse scene, the terminal equipment can detect the warehouse-out time point and search for the network based on the warehouse-out time point, namely, the network does not need to be searched immediately after the network or the system is dropped, and the power consumption can be saved to a certain extent. Moreover, the probability of searching the target standard network can be improved.

In one possible design, the detecting, by the terminal device, the ex-warehouse time point based on the currently acquired motion data and the historical ex-warehouse parameters includes: the terminal equipment judges whether the first curve is a delivery curve or not by using the historical delivery parameters; the first curve is a curve corresponding to the motion data currently acquired by the terminal equipment; when the terminal equipment determines that the first curve is a ex-warehouse curve, determining the climbing stopping time on the first curve as an ex-warehouse time point; the time to stop climbing is the time when the slope change value on the first curve meets a threshold value.

Generally, a terminal device can acquire a motion curve (a curve corresponding to acquired motion data) in real time, but whether the curve represents that the terminal device leaves a garage needs to be judged by using historical garage-out parameters, when the curve is judged to be a garage-out curve, the terminal device is considered to leave the garage, a garage-out time point is determined based on the curve, for example, the garage-out time point is a time point of stopping climbing on the curve, in this way, the terminal device can determine a more accurate garage-out time point, and when a network is searched based on the garage-out time point, the probability of searching a target system network is higher, and a high system network is recovered as soon as possible.

In one possible design, the historical ex-warehouse parameters include at least one of the following parameters:

an attitude angle;

a time-dependent profile of the attitude angle;

beginning climbing time;

the attitude angle of the terminal equipment at the time of starting climbing and/or the change values of the attitude angles before and after the time of starting climbing;

stopping climbing time;

the attitude angle of the terminal equipment in the time of stopping climbing and/or the change value of the attitude angle before and after the time of stopping climbing;

the climbing time comprises the time from the beginning of climbing to the stopping of climbing;

it should be noted that the above-mentioned several historical ex-warehouse parameters are merely examples, and are not limiting, and other parameters capable of detecting ex-warehouse are also possible.

In one possible design, the time point when the terminal device leaves the ground library scene is: the terminal equipment detects the ex-garage time point based on the currently collected cell information and historical cell information, and the historical cell information comprises cell information collected when the terminal equipment is moved out of the underground garage in a historical mode.

In the embodiment of the present application, taking a certain basement scene as an example, the terminal device acquires the historical cell information when leaving the basement scene historically, and records the acquisition time of the historical cell information. When the cell information acquired by the terminal equipment at present is consistent with the historical cell information, determining that the acquisition time of the historical cell information is a ex-warehouse time point, or determining that the time point of the terminal equipment for acquiring the current cell information is the ex-warehouse time point. Therefore, in a basement scene, the terminal equipment searches for the network based on the time point of leaving the basement, namely, the network does not need to be searched immediately after the network or the system is dropped, and the power consumption can be saved to a certain extent. Moreover, the probability of searching the target standard network can be improved.

In one possible design, the cell information includes at least one of cell identification information, cell signal strength information, or cell signal strength change information; the cell identification information comprises cell identifications of one or more cells detected when the terminal equipment leaves the ground bank scene historically; the signal strength information comprises cell signal strengths of one or more cells detected by the terminal device historically leaving the vault scene; the signal strength change information includes a change value of a first signal strength and a second signal strength, the first signal strength is a signal strength of a first cell detected at a first preset time before the terminal device leaves the basement scene historically, and the second signal strength is a signal strength of the first cell detected at a second preset time after the terminal device leaves the basement scene historically.

The above-described cell information is merely exemplary and not limited, and other cell information that can be used for detection of the cell information may be used.

In one possible design, the method further includes: when the terminal equipment detects that the current second fence corresponding to the non-ground-reservoir scene is located, determining that the second fence is not located in the ground-reservoir scene; or the terminal equipment collects motion data and determines that the terminal equipment is not in a ground library scene based on the motion data.

That is to say, after the terminal device is disconnected from the network or the system, it may be determined that the terminal device is not in the basement scene through fence detection or motion data, and of course, other manners that can determine that the terminal device is not in the basement scene are also possible, and the embodiment of the present application is not limited.

In one possible design, the historical ex-warehouse parameter is a first historical ex-warehouse parameter of the N historical ex-warehouse parameters; n is an integer greater than or equal to 2; wherein the first historical ex-warehouse parameter satisfies: the terminal equipment detects a delivery time point by using the first historical delivery parameter, and the time difference between the delivery time point and a network recovery point is smaller than a preset time difference; or, the time difference between the ex-warehouse time point and the network recovery point is the minimum time difference among N time differences, and each time difference among the N time differences is the time difference between the ex-warehouse time point and the network recovery time point detected by the terminal device by using one historical ex-warehouse parameter among the N historical ex-warehouse parameters; and the network recovery point is the time when the terminal equipment successfully accesses the target communication system network.

In the embodiment of the application, the terminal device learns the more accurate historical ex-warehouse parameters by self, so that the terminal device can determine the ex-warehouse time point of the terminal device more accurately by using the learned historical ex-warehouse parameters, and when the network is searched based on the ex-warehouse time point, the probability of searching the target system network is higher, and the high system network is recovered as soon as possible.

In a second aspect, there is also provided an electronic device, including:

one or more processors;

a memory;

and one or more computer programs, wherein the one or more computer programs are stored in the memory, the one or more computer programs comprising instructions which, when executed by the electronic device, cause the electronic device to perform the method of the first aspect as described above.

In a third aspect, an electronic device is further provided, including:

the communication unit is used for accessing a network of a first communication system;

a processing unit, configured to determine that a network exception occurs, where the network exception includes: dropping the network or the system;

and the communication unit is also used for searching a network of a target communication system and connecting the network of the target communication system, wherein the target communication system is a communication system not lower than the first communication system.

Illustratively, the communication unit may be, for example, a modem module, which may be connected with a radio frequency transceiver module (including a receiving module and a transmitting module) for transceiving information. The modem module can process information received by the radio transceiver module or the modem module can send information through the modem module. The processing unit may be an application processor, a central processing unit, or the like.

In one possible design, the communication unit is specifically configured to: when the terminal equipment is in a connected state, pre-storing a first cell, wherein the communication standard of the first cell is the target communication standard; the first cell and the second cell are not identical, the second cell is a neighboring cell of a third cell configured by the network device, and the third cell is a cell connected when the terminal device is disconnected.

In a possible design, the first cell is a cell searched in a historical network searching process of the terminal device.

In one possible design, the communication unit is specifically configured to: and searching the network of the target system at preset time intervals when the terminal equipment is in an idle state.

In one possible design, the communication unit is specifically configured to: and starting to search the network of the target communication system at a first time point, wherein a first time interval exists between the first time point and a second time point, the second time point is a time point when the terminal equipment is disconnected from the network or the system, and the first time point is a time point after the second time point, wherein the first time interval is greater than or equal to 5 seconds.

In one possible design, the communication unit is specifically configured to: if the terminal equipment is located in a basement scene, starting to search the network of the target communication system at a third time point, wherein a second time interval exists between the third time point and a fourth time point, the fourth time point is a time point when the terminal equipment leaves the basement, and the third time point is a time point after the fourth time point; wherein the second time interval is greater than or equal to 5 seconds.

In one possible design, the processing unit is further configured to: judging whether the terminal equipment is in a ground library scene;

the communication unit is specifically configured to: if the terminal equipment is not in the ground library scene, starting to search the network of the target communication system at a first time point, wherein the first time point has a first time interval with a second time point, the second time point is a time point when the terminal equipment is disconnected from the network or the system, and the first time point is a time point after the second time point; if the terminal equipment is in the basement scene, starting to search the network of the target communication system at a third time point, wherein a second time interval exists between the third time point and a fourth time point, the fourth time point is a time point when the terminal equipment leaves the basement, and the third time point is a time point after the fourth time point; wherein the first time interval is greater than or equal to 5 seconds, and/or the second time interval is greater than or equal to 5 seconds.

In one possible design, the initiating the search for the network of the target communication system at the first time point includes: if the network abnormality is network drop, starting to search the network of the target communication system at the first time point; and/or, the terminal device starts to search the network of the target communication system at a third time point, including: and if the network abnormality is network drop, starting to search the network of the target communication system at the third time point.

In one possible design, before the communication unit searches for the network of the target communication system, the processing unit is further configured to: and determining at least one target communication system based on the first communication system.

In one possible design, the communication unit is specifically configured to:

searching a network of a target communication system, and not searching networks of other communication systems except the target communication system; or the like, or, alternatively,

searching the network of the target communication system at least twice continuously; or the like, or, alternatively,

and searching the network of the target communication system on the same frequency point within preset time.

In one possible design, the communication unit is specifically configured to: adjusting the radio frequency to a frequency point corresponding to the target communication system, wherein the radio frequency is not switched to a frequency point outside the target communication system; and/or the processing unit is specifically configured to: and controlling the network searching function of the target communication system to be in an open state, and controlling the searching functions of other target communication systems to be in a closed state.

In one possible design, the processing unit is further configured to: and determining that the terminal equipment is in a bright screen state when the network or the system is disconnected, and searching the network of the target communication system through the communication unit.

In one possible design, the processing unit is further configured to: judging whether the terminal equipment is in a call state or not;

and if the terminal equipment is in the call state, searching the network of the target communication system through the communication unit after the call is finished.

In one possible design, a place where the network abnormality occurs in the terminal device is a first place, and the first duration is a duration between a time point when the terminal device is connected to the target communication system network and a time point when the network abnormality occurs in the terminal device;

the processing unit is further to: controlling the terminal equipment to enter a default network searching mode;

when the terminal equipment reaches the first place again and network abnormality occurs, controlling the communication unit to search for the network in the default network searching mode, and then connecting the network of the target communication system again; and the time length between the time point when the terminal equipment is connected with the target communication system network again and the time point when the terminal equipment reaches the first place again and the network abnormality occurs is a second time length, and the second time length is greater than the first time length.

In a fourth aspect, there is also provided a chip, coupled to a memory in an electronic device, for invoking a computer program stored in the memory to perform the method according to the first aspect.

In a fifth aspect, there is also provided a computer-readable storage medium comprising instructions which, when run on an electronic device, cause the electronic device to perform the method according to the first aspect.

In a sixth aspect, there is also provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method according to the first aspect.

The beneficial effects of the second to sixth aspects are described in the beneficial effects of the first aspect, and are not repeated herein.

Drawings

Fig. 1 is a schematic diagram of a network searching method according to an embodiment of the present application;

fig. 2 is a schematic diagram of a graphical user interface of a terminal device according to an embodiment of the present application;

fig. 3 is a schematic diagram of an application scenario provided in an embodiment of the present application;

fig. 4 is a schematic diagram of another application scenario provided in an embodiment of the present application;

fig. 5 is a schematic diagram of a fence collection process provided in an embodiment of the present application;

FIG. 6A is a schematic diagram of an ex-warehouse curve according to an embodiment of the present application;

FIG. 6B is a schematic diagram of an algorithm model provided in an embodiment of the present application;

fig. 7 is a schematic diagram of collecting ex-warehouse parameters according to an embodiment of the present application;

fig. 8 is a schematic view illustrating an effect of acquiring a self-learning ex-warehouse parameter of a terminal device according to an embodiment of the present application;

fig. 9 is a schematic diagram of a network searching method in a ground depot scene according to an embodiment of the present application;

FIG. 10 is a diagram illustrating a self-learning optimal network searching time in a basement scene according to an embodiment of the present application;

fig. 11 is a schematic diagram of another network searching method in a ground depot scene according to an embodiment of the present application;

FIG. 12 is a diagram illustrating another self-learning optimal network searching time in a basement scene according to an embodiment of the present application;

fig. 13 is a schematic diagram of selecting a first trigger policy or a second trigger policy according to an embodiment of the present application;

fig. 14 is a schematic diagram of a network searching method in a non-geosynchronous warehouse scenario according to an embodiment of the present application;

FIG. 15 is a diagram illustrating a self-learning optimal network searching time in a non-geosynchronous environment according to an embodiment of the present application;

FIG. 16 is a diagram illustrating another self-learning optimal network searching time in a non-geosynchronous environment according to an embodiment of the present application;

fig. 17 is a schematic diagram of selecting a third trigger policy or a fourth trigger policy according to an embodiment of the present application;

fig. 18 is a schematic diagram of another network searching method according to an embodiment of the present application;

fig. 19 is a schematic diagram of a structure of an electronic device according to an embodiment of the present application;

fig. 20 is an interaction diagram of a modem module and a processing module in an electronic device according to an embodiment of the present application;

fig. 21 is a schematic view of another structure of an electronic device according to an embodiment of the present application.

Detailed Description

In the following, some terms in the embodiments of the present application are explained to facilitate understanding by those skilled in the art.

1) Terminal equipment, including equipment providing voice and/or data connectivity to a user, in particular, including equipment providing voice to a user, or including equipment providing data connectivity to a user, or including equipment providing voice and data connectivity to a user. For example, may include a handheld device having wireless connection capability, or a processing device connected to a wireless modem. The terminal device may communicate with a core network via a Radio Access Network (RAN), exchange voice or data with the RAN, or interact with the RAN. The terminal device may include a User Equipment (UE), a wireless terminal device, a mobile terminal device, a device-to-device communication (D2D) terminal device, a vehicle-to-all (V2X) terminal device, a machine-to-machine/machine-type communication (M2M/MTC) terminal device, an internet of things (IoT) terminal device, a subscription unit (subscriber unit), a subscription station (IoT), a mobile station (mobile station), a remote station (remote station), an access point (access point, AP), a remote terminal (remote), an access terminal (access terminal), a user terminal (user terminal), a user agent (user agent), or user equipment (user), etc. For example, mobile telephones (or so-called "cellular" telephones), computers with mobile terminal equipment, portable, pocket, hand-held, computer-included mobile devices, and the like may be included. For example, Personal Communication Service (PCS) phones, cordless phones, Session Initiation Protocol (SIP) phones, Wireless Local Loop (WLL) stations, Personal Digital Assistants (PDAs), and the like. Also included are constrained devices, such as devices that consume less power, or devices that have limited storage capabilities, or devices that have limited computing capabilities, etc. Examples of information sensing devices include bar codes, Radio Frequency Identification (RFID), sensors, Global Positioning Systems (GPS), laser scanners, and the like.

By way of example and not limitation, in the embodiments of the present application, the terminal device may also be a wearable device. Wearable equipment can also be called wearable smart device or intelligent wearable equipment etc. is the general term of using wearable technique to carry out intelligent design, develop the equipment that can dress to daily wearing, like glasses, gloves, wrist-watch, dress and shoes etc.. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device includes full functionality, large size, and can implement full or partial functionality without relying on a smart phone, such as: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets, smart helmets, smart jewelry and the like for monitoring physical signs.

The various terminal devices described above, if located on a vehicle (e.g., placed in or installed in the vehicle), may be considered to be vehicle-mounted terminal devices, which are also referred to as on-board units (OBUs), for example.

In this embodiment, the terminal device may further include a relay (relay). Or, it is understood that any device capable of data communication with a base station may be considered a terminal device.

In the embodiment of the present application, the apparatus for implementing the function of the terminal device may be the terminal device, or may be an apparatus capable of supporting the terminal device to implement the function, for example, a chip system, and the apparatus may be installed in the terminal device. In the embodiment of the present application, the chip system may be composed of a chip, and may also include a chip and other discrete devices. In the technical solution provided in the embodiment of the present application, a device for implementing a function of a terminal is taken as an example of a terminal device, and the technical solution provided in the embodiment of the present application is described.

2) Network devices, including, for example, Access Network (AN) devices, such as base stations (e.g., access points), may refer to devices in AN access network that communicate with wireless terminal devices over one or more cells over the air, or, for example, a network device in vehicle-to-all (V2X) technology is a Road Side Unit (RSU). The base station may be configured to interconvert received air frames and IP packets as a router between the terminal device and the rest of the access network, which may include an IP network. The RSU may be a fixed infrastructure entity supporting the V2X application and may exchange messages with other entities supporting the V2X application. The network device may also coordinate attribute management for the air interface. For example, the network device may include an evolved Node B (NodeB) or eNB or e-NodeB in an LTE system or an LTE-a (long term evolution-advanced), or may also include a next generation Node B (gNB) in a 5th generation (5G) NR system (also referred to as an NR system) or may also include a Centralized Unit (CU) and a Distributed Unit (DU) in a Cloud access network (Cloud RAN) system, which is not limited in the embodiments.

The network device may further include a core network device, and in this embodiment, the core network device includes, for example, an access and mobility management function (AMF) or a User Plane Function (UPF) in a 5G system, or includes a Mobility Management Entity (MME) in a 4G system.

In the embodiment of the present application, the apparatus for implementing the function of the network device may be a network device, or may be an apparatus capable of supporting the network device to implement the function, for example, a system on chip, and the apparatus may be installed in the network device. In the technical solution provided in the embodiment of the present application, a device for implementing a function of a network device is taken as an example of a network device, and the technical solution provided in the embodiment of the present application is described.

3) Radio Resource Control (RRC), in LTE, two RRC states are supported, namely RRC IDLE (RRC _ IDLE) and RRC CONNECTED (RRC _ CONNECTED). In NR, an RRC INACTIVE state (RRC _ INACTIVE) is introduced, that is, three states are supported in NR, an RRC IDLE state (RRC _ IDLE), an RRC INACTIVE state (RRC _ INACTIVE), and an RRC CONNECTED state (RRC _ CONNECTED), wherein different RRC states can be switched.

4) Communication systems, including but not limited to: a 2nd-Generation wireless telephone technology, 2G network, a 3rd-Generation wireless telephone technology, 3G network, a 4th-Generation wireless telephone technology, 4G network, and a 5th-Generation wireless telephone technology, 5G network, and so on. Such as a global system for mobile communications (GSM) network, a Code Division Multiple Access (CDMA) network, a Wideband Code Division Multiple Access (WCDMA) network, a Universal Mobile Telecommunications System (UMTS) network, a Long Term Evolution (LTE) network, etc.

4.1) drop mode means that the terminal device switches from a high communication mode to a low communication mode, for example, switches from 5G to 4G or 3G, switches from 4G to 3G, or switches from 5G to 3G or 4G.

The terminal equipment is always in a connected state before and after the system is disconnected. Taking the example that the terminal device is switched from 5G to 4G, the system-off process comprises the following steps: the terminal device resides in the 5G base station, that is, the current communication system of the terminal device is 5G, and when the switching condition is satisfied, the terminal device performs cell switching, for example, switching to the 4G base station, and then the terminal device drops from 5G to 4G, and the terminal device is always in a connected (connected) state in the process of dropping from 5G to 4G. For example, the handover condition may be that the terminal device detects to move out of the coverage of the 5G base station (for example, the signal strength of the 5G base station is lower than a threshold), or the terminal device detects that the signal strength of the 4G base station is greater than a threshold, for example, the signal strength of the 5G base station is greater than the threshold, and so on.

4.2) network drop, which means that the terminal equipment is from network to network-free; different from the drop mode, before the network drop, the terminal device is in a connected (connected) state, and after the network drop, the terminal device is in an idle (idle) state. After the terminal device is disconnected from the network, if the network is to be recovered, a network searching and registering process needs to be executed. In short, the network searching and registering process may specifically include a network searching process and a network registering process. In the network searching process, the terminal equipment searches cells and executes a network registration process after searching a proper cell. In the network registration process, the terminal device sends identity information (such as identity information of an SIM card) to the network side device, and the network side device verifies the validity of the identity information and agrees that the terminal device resides in the cell after verifying the validity.

5) The mobility management mechanism of the terminal obtains continuous service of the wireless network through cell handover (handover) or cell reselection (reselection). Cell handover refers to a terminal device in a connected (connected) state being handed over from a current cell to another cell through neighbor cell measurement. Cell reselection refers to a process in which a terminal device in an RRC _ IDLE state selects a best cell to provide network services by monitoring signal quality of surrounding cells. Therefore, the terminal equipment with the dropped mode can be switched into the cell with the high mode based on the cell switching mode, and the terminal equipment with the dropped mode can be accessed into the cell with the high mode based on the cell reselection mode.

Taking cell handover as an example, the process of cell handover includes: the terminal equipment is accessed to a first cell, and the first cell can configure the terminal equipment for performing the neighbor cell measurement through RRC signaling (time-frequency resources for indicating the neighbor cell measurement). The terminal device reports the measurement result of the neighboring cell to the first cell, and the first cell switches the terminal device to the cell with better signal quality when the first cell determines that the switching condition is met (for example, the signal quality of the neighboring cell is higher than that of the first cell) according to the measurement result. Or, the terminal device may perform neighbor cell measurement after accessing the first cell, and switch to the neighbor cell when detecting that the switching condition is satisfied. The handover condition comprises that the signal quality of the first cell is below a certain threshold; or the signal quality of the neighborhood is higher than a threshold, and the like.

It is understood that the above-mentioned cell reselection or cell handover process is performed based on the measurement result of the neighboring cell.

6) And measuring the adjacent cell, wherein the terminal equipment measures the related information of the adjacent cell so as to be used as the basis for cell switching or cell reselection. The related information of the neighboring cell includes a communication system, a target frequency point, a Physical Cell Identifier (PCI), a signal strength, and the like of the neighboring cell.

7) In the embodiments of the present application, "a plurality" means two or more, and in view of this, the "plurality" may also be understood as "at least two". "at least one" is to be understood as meaning one or more, for example one, two or more. For example, the inclusion of at least one means that one, two or more are included, and does not limit which is included. For example, at least one of A, B and C is included, then inclusion can be A, B, C, A and B, A and C, B and C, or A and B and C. Similarly, the understanding of the description of "at least one" and the like is similar. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" generally indicates that the preceding and following related objects are in an "or" relationship, unless otherwise specified.

Unless stated to the contrary, the embodiments of the present application refer to the ordinal numbers "first", "second", etc., for distinguishing between a plurality of objects, and do not limit the sequence, timing, priority, or importance of the plurality of objects.

In the process of moving the terminal device, network abnormality (network drop or system drop) may occur. For example, when the terminal device enters an underground garage or passes through a problem area (a weak coverage area or a non-coverage area) on a vehicle driving route, a network abnormality occurs. In order to avoid the influence on the service of the terminal device, once a network abnormality occurs, the terminal device will try to recover the network as soon as possible.

Taking a drop system as an example, the existing network searching scheme is as follows: after the terminal device accesses the first cell (4G cell), the terminal device is switched from the first cell to the second cell (3G cell), that is, the terminal device is in a connected state. The terminal device may detect a plurality of neighboring cells of the second cell, and access to one of the neighboring cells when a handover condition (see the foregoing description) is satisfied. In general, the terminal device performs the neighbor cell measurement based on the neighbor cell list configured by the network device, for example, if the neighbor cell list includes 3 cells, the terminal device only searches for the 3 cells. That is, in this scheme, after the terminal device drops the system, the cells that can be searched are limited, and cells that are not in the neighbor cell list cannot be searched. Therefore, there is a case that there is no high-standard cell, such as a 4G cell, in the neighbor cell list configured by the terminal device. In this way, after the terminal device performs the neighbor cell measurement based on the neighbor cell list, the terminal device can only access to the low-system neighbor cell, if the terminal device wants to recover to the 4G system, the terminal device needs to continue the neighbor cell measurement in the neighbor cell, and when the switching condition is met, the cell switching process is performed again. Therefore, the terminal device needs a long time to recover the high-standard (original 4G) network.

In the above existing scheme, the change condition of the communication system identifier on the GUI in the system-off process of the terminal device is: assuming that the terminal device drops from 4G to 3G, the communication system identifier displayed in the GUI of the terminal device is changed from 4G to 3G, then the terminal device searches the cell in the neighbor cell list, and if another 3G cell is searched, the terminal device accesses the 3G cell, at this time, the GUI continues to display 3G until the terminal device searches the 4G cell at a certain moment, and the 4G is displayed in the status bar in the GUI. Therefore, the display variation of the communication system identifier in the GUI is: from 4G to 3G to 4G. Wherein, the time for displaying the 3G is longer, because the terminal device may switch to a different 3G cell during the process of continuously displaying the 3G. The manner of displaying the communication system identifier on the terminal device GUI can be seen in fig. 2 below.

Taking a network drop as an example, the existing network searching scheme is that after a terminal device drops the network, the network needs to be searched again. The network searching is continuously started from the moment of network dropping, and the network searching is carried out in any system. For example, a first network search is performed from 1s when the network is dropped, a second network search is performed if no network search is performed for 2s, a third network search is performed for 3s, and the waiting time interval is different and gradually increases. When a certain cell is searched, the cell is accessed. One case is that the searched communication system is random, and if a low system such as a 3G base station is searched first, the terminal device needs to perform a cell switching process to possibly switch to a high system cell. However, if there is no high-standard cell in the configured neighbor cell list, the high-standard cell cannot be recovered in time. In another case, after the terminal device drops from the 4G network, the high-standard network is searched first, and then the low-standard network is searched, and since the terminal device is in a motion state, the terminal device may miss the search of the high-standard network, and thus the high-standard network cannot be restored in time.

In the above existing scheme, the change condition of the communication system identifier on the GUI in the network disconnection process of the terminal device is as follows: assuming that the terminal device is disconnected from the 4G network, the communication system identifier displayed in the GUI of the terminal device is changed from 4G to no signal, then the terminal device searches the cell, assumes that the 3G cell is searched, accesses the 3G cell, displays 3G in the GUI until the terminal device searches the 4G cell at a certain moment and accesses the 4G cell, and displays 4G in the status bar in the GUI. Therefore, the display change of the communication system identifier in the GUI after the network drop is: from 4G to no signal to 3G to 4G. Therefore, it takes a long time for the terminal device to recover to 4G after the network is dropped.

Therefore, in the current scheme, after the network abnormality occurs in the terminal device, there is a problem of a high-standard network which cannot be recovered in time.

In view of this, the embodiment of the present application provides a network searching method, in which after a network abnormality occurs in a terminal device, a high-standard network can be recovered as soon as possible.

The technical scheme of the application is described in the following with reference to the accompanying drawings.

Example 1

Fig. 1 is a schematic diagram of a network searching method according to an embodiment of the present application. The method comprises the following steps:

s101, the terminal equipment determines that network abnormity occurs.

The network exception may include a network drop or a system drop. Assuming that the terminal equipment is accessed to a first cell, the communication system of the first cell is a first communication system, and the network disconnection comprises the following steps: the terminal equipment is switched to a state without any cell access from the first cell; the standard falling method comprises the following steps: the terminal equipment is switched from a first cell to a second cell, the communication system of the second cell is a second communication system, and the second communication system is lower than the first communication system; for example, the first communication system is 5G, and the second communication system is 3G or 4G; alternatively, the first communication scheme is 4G, the second communication scheme is 3G, and so on.

After the terminal device is disconnected from the network or the system, a Graphical User Interface (GUI) may change. Taking a terminal device offline as an example, referring to fig. 2(a), the terminal device accesses a first cell, for example, a 4G cell, and a communication system identifier 201 displayed by a status bar is a 4G identifier; after the terminal device is disconnected from the network, "no signal" is displayed in the status bar, see fig. 2 (b). Taking the terminal device off-system as an example, referring to fig. 2(c), the terminal device accesses the first cell, for example, the 4G cell, and the communication system identifier 203 displayed by the status bar is a 4G identifier; the terminal device switches from the first cell to a second cell, such as a 3G cell, and the communication system identifier 204 displayed in the status bar is a 3G identifier, see fig. 2 (d).

S102, the terminal device searches and accesses a target network.

In the embodiment of the present application, the searching for the target network by the terminal device includes at least one of the following situations:

1. and the terminal equipment searches for a network with a communication system as a target communication system.

The target communication system is any system higher than or equal to the first communication system, for example, the first communication system is 5G, and the target communication system is 5G; or the first communication system is 4G, and the target communication system is 4G or 5G; alternatively, the first communication system is 3G, the target communication system is 3G, 4G, or 5G, and so on.

Alternatively, the target communication system is a preset communication system such as 4G. That is, the terminal device only searches for and accesses to the cell of the 4G system.

In this embodiment, the searching for the network of the target communication system by the terminal device means that the terminal device only searches for the network of the target communication system. Specifically, the terminal device searches for a network of a target communication system and does not search for a network of another system other than the target communication system. For example, the terminal device may implement a network that only searches for the target communication system using at least one of the following modes 1 or 2. In the mode 1, the terminal equipment can adjust the radio frequency to the frequency point corresponding to the target communication system, and the radio frequency is not switched to the frequency point outside the target communication system; namely, the searching frequency point is adjusted to the frequency point corresponding to the target communication system. In the mode 2, the terminal device controls the network searching function for searching the target communication system to be in an open state, and the searching functions of other target communication systems are in a closed state. For example, the terminal device includes multiple modem modules, where different modem modules are used to perform network search of different communication systems, for example, the first modem module is used to search for a 3G system network, the second modem module is used to search for a 4G system network, and when the target communication system is a 4G system, the terminal device performs search for a 4G cell by using the second modem module, and may close the first modem module. In general, these two methods can be used in combination.

Or, the terminal device only searches for the network of the target communication system may also be understood as that, after the terminal device drops the network or the system drops the network, only the network of the target communication system is searched, and the network of other system is not searched in the middle (before the high target system is restored).

The above searching and accessing process of the target communication system network includes a searching process of the target communication system network and an accessing process of the target communication system network. The searching process of the target communication system network comprises the following steps: the application processor AP sends a network searching instruction to the modem module, and the network searching instruction can be used for instructing the modem to specifically search for a network of a target system, such as a 3G system or a 4G system. The modem module starts searching for the network. For example, a modem module in a terminal device receives a broadcast message sent by multiple cells, where the broadcast message includes a pilot code and synchronization information. And the terminal equipment synchronizes with the target cell corresponding to the target communication system network based on the synchronization information and then accesses the target cell. Because the radio frequency of the terminal equipment is adjusted to the frequency point corresponding to the target communication system, the terminal equipment can search the broadcast message of the cell corresponding to the target communication system network, but cannot search the broadcast message of the cell of the non-target communication system network, so that the terminal equipment only needs to be synchronized with the cell corresponding to the target communication system network.

The access procedure (or connection procedure) of the target communication system network includes: the Modem module sends an access request (connection request) message to a target cell corresponding to a target communication system network, if the target cell agrees to access, the Modem module sends a link response (connection setup) message to the Modem module, and the Modem module sends an access completion (connection setup complete) message to the target cell, namely, the terminal device is accessed to the target cell. Then the subsequent network service of the terminal device is provided by the target cell.

2. The terminal device searches for a target cell, wherein the target cell is a cell recorded by the terminal device and accessed once.

For example, the terminal device has historically experienced the same scenario in which the terminal device accesses the third cell, and the target cell is the third cell. Wherein, the same scene occurred historically can be understood as: assuming that the above network anomaly (S101) refers to the terminal device switching from the first cell to the second cell (the second cell has a lower standard than the first cell), the same scenario where the terminal device has historically switched from the first cell to the second cell refers to the scenario where the terminal device has historically switched from the first cell to the second cell. It is assumed that in the same scene where history occurs, the terminal device searches for and accesses to a third cell (the system of the third cell is not lower than that of the first cell). Then the terminal device searches for and accesses said third cell, i.e. the target cell is said third cell. Of course, if the terminal device searches for a neighboring cell with a communication standard higher than that of the third cell, the terminal device may access the neighboring cell.

Taking the network abnormality occurring in the process that the terminal device enters the underground garage as an example, the terminal device can record the cell accessed when the terminal device is moved out of the garage once (the communication system is higher than the cell accessed before the system is lost), and then the terminal device can access the recorded cell when detecting that the terminal device is moved out of the garage again.

Specifically, the terminal device may record a cell identity of each accessed cell, which includes but is not limited to the PCI. The terminal device records that the PCI of the accessed cell is the target PCI when the same scene which occurs historically is performed, performs neighbor cell measurement, detects neighbor cell information of a plurality of neighbor cells, wherein the neighbor cell information of each neighbor cell comprises the PCI of each neighbor cell, and the terminal device accesses the first neighbor cell if the PCI of the first neighbor cell in the plurality of neighbor cells is the target PCI.

3. The terminal equipment searches a target cell, wherein the target cell is a cell with a target frequency point. Assuming that a working frequency point before a network drop or a system drop of the terminal device occurs is a first frequency point, the target cell may be a cell with a working frequency higher than or equal to the first frequency point, that is, the terminal device is accessed to a cell with a working frequency higher than or equal to the first frequency point.

In some embodiments, the above three conditions may also be used in combination, for example, when the terminal device determines that there are multiple target cells that satisfy the target communication scheme, the terminal device may determine that the PCI is the target PCI (PCI of a cell that has been accessed historically) from the multiple target cells; and/or determining a cell with a target frequency point from a plurality of target cells.

Further, the terminal device may select a target cell in combination with other information, for example, when the terminal device determines that there are multiple target cells meeting the target communication system, the terminal device may select a cell with the highest communication system or a cell with the strongest signal strength from the multiple target cells as a final target cell. For another example, when the terminal device determines that the recorded cells accessed once include a plurality of cells, it determines the cell with the largest number of accesses or the cell with the strongest signal strength as the final target cell. For another example, if the terminal device determines that the cells with the target frequency points include a plurality of cells, the cell with the strongest signal strength is determined to be the final target cell. Or, when the terminal device determines that there are multiple target cells meeting the target communication system, the terminal device may select a cell with the highest communication system from the multiple target cells, and when there are multiple cells with the highest communication systems, the terminal device selects a cell with the strongest signal strength as a final target cell.

Considering that the network anomaly may include two cases, namely a network drop and a network dropping mode, network searching mechanisms in the two cases are respectively described below.

Case 1, take the drop-out system as an example

After the terminal equipment is switched from the first cell to the second cell (the communication system of the second cell is lower than that of the first cell), searching for a network of a target communication system, wherein the target communication system is not lower than the first communication system. In this way, after the terminal device drops the system, the network of the target communication system is searched, and the cell corresponding to the network of the target communication system may be a cell in the neighbor cell list or may not be a cell in the neighbor cell list. That is to say, in the present application, after the network is dropped, the search for the cell has no limitation on the neighbor cell list, and may not be limited to searching for the cell in the neighbor cell list, and may also search for the cell that is not in the neighbor cell list, as long as the high-standard cell is searched. For example, the terminal device may search for a cell in the neighbor cell list first, and then search for a cell that is not in the neighbor cell list if there is no high-standard cell.

For example, when the terminal device is in a connected state with a system lost, searching for pre-stored information of a cell, where the cell is a cell of the target system; the terminal device further stores information of a neighboring cell, where the information of the neighboring cell is information of a neighboring cell configured for the second cell by the network device, that is, information of a neighboring cell in a neighboring cell list. The cell corresponding to the pre-stored cell information may be a cell searched in the history process of the terminal device.

In addition, in the embodiment of the application, after the system is removed, the network search is started at a specified time (for example, the self-learned optimal network search time), optionally, the optimal network search time may be a starting time, the historical network recovery time is an ending time, a plurality of same time intervals are divided, and the time corresponding to each time interval is searched once until the target system network is searched.

In the embodiment of the application, after the terminal equipment is disconnected, when the terminal equipment is connected with a low-standard cell, a network of a target communication standard is searched. That is, the terminal device searches for the target network while maintaining the connection with the low-standard cell. For example, when the terminal device is switched from the first cell to the second cell, the system is removed, and then the terminal device searches for a target system network when being connected with the second cell. Before searching the target system network, the terminal equipment is not switched from the second cell to other low system cells, namely, the terminal equipment is not switched to other low system cells before recovering the high system. In this scheme, the change condition of the communication system identifier on the GUI in the system-off process of the terminal device is: if the terminal device drops from 4G to 3G, the communication system identifier displayed in the GUI of the terminal device is changed from 4G to 3G, then the terminal device searches for a target system network, if a 4G cell is searched, the terminal device accesses the 4G cell, and 4G is displayed in a status bar in the GUI. Therefore, the display variation of the communication system identifier in the GUI is: from 4G to 3G to 4G. Wherein, the time for displaying the 3G is shorter, because the terminal device is not switched to other 3G cells in the process of continuously displaying the 3G.

Case 2, take the network off as an example

In the embodiment of the application, after the network of the terminal equipment is disconnected, the network needs to be searched again, and the network searching mode during the network searching again is different from the network searching scheme after the network of the terminal equipment is disconnected in the existing scheme. On one hand, in the present application, after the terminal device drops the network, the design of the time for triggering the network search is different from the existing network search scheme, for example, the terminal device searches for the target network at preset time intervals. That is, in the present application, the terminal device searches for a network at the same time interval after dropping the network. In the existing network searching scheme, the network searching intervals of the terminal devices are different and gradually increased. In addition, the terminal device starts to trigger the search of the target network at intervals at the optimal network searching time, and the latest network searching time is the time which is learned by the terminal device and can be accessed to the high standard as soon as possible.

On the other hand, in the application, re-searching after the network drop of the terminal device refers to that the terminal device only searches for a network of a target system, and is different from searching for a network of any system after the network drop of the terminal device in the existing scheme. The manner in which the terminal device only searches for the network of the target system is as described above.

In the embodiment of the present application, the change condition of the communication system identifier on the GUI in the network disconnection process of the terminal device is: assuming that the terminal device drops the network from 4G, the communication system identifier displayed in the GUI of the terminal device is changed from 4G to no signal, and then the terminal device only searches for the target network, and when the 4G cell is searched, the terminal device accesses the 4G cell, and at this time, the GUI displays 4G, that is, after the network is dropped, the display change of the communication system identifier in the GUI is: from 4G to no signal to 4G, the network is not accessed to the low-standard network after being disconnected, but is directly recovered to the high-standard network, and the high-standard network can be recovered as soon as possible.

Therefore, in the embodiment of the application, after the terminal equipment generates the network abnormity, the high-standard network can be recovered as soon as possible.

For example, a network of a search target communication system is started at a first time point, a first time interval exists between the first time point and a second time point, the second time point is a time point at which a network anomaly occurs, and the first time point is a time point after the second time point. The first time interval is greater than or equal to 5 seconds.

Optionally, after the terminal device has a network abnormality, the target network is searched based on the network searching method of the present application, and a first time length required from a time when the network abnormality occurs to connection to the target network is recorded. The terminal device may control to use a default network searching mode, for example: a network searching mode switching button is displayed on an interface of the electronic equipment, and a user controls switching between a specified network searching mode and a default network searching mode by controlling the switching button, wherein the default network searching mode is, for example, the network searching mode in the prior art described above. And when the terminal equipment is in the designated network searching, connecting to the network of the target communication system in the system switching off or the first time after the network switching off. The subsequent terminal equipment can be controlled to be in a default network searching mode, when the terminal equipment is abnormal again, the terminal equipment is connected with the network of the target communication system at a second time length in the same place, and the second time length is longer than the first time length. That is to say, the network searching mode of the application can be recovered to the high-standard network as soon as possible. The first duration is, for example: 5s, 10s, etc., and the second duration is, for example: 15s, 20s, etc., embodiments of the present invention are not limited.

Optionally, when the terminal device is in a network abnormality, the terminal device is determined to be in a bright screen state, and then the target network is searched. Generally, when the terminal device is in the screen-off state, it indicates that the user does not operate the terminal device currently, and a target network does not need to be searched, so that power consumption is saved.

There is a possible case where the terminal device does not successfully search for the target network or searches for the target network but does not successfully access to the target network, and in this case, the terminal device may access to a low-standard network (i.e., a network having a communication standard lower than that before the network drop/the network drop). For example, after the terminal device starts to search for the target network, it waits for a preset duration, where the preset duration is, for example: 20s, 30s and the like, and when the target network is not searched or accessed within the preset time, accessing the low-standard network; or, after the number of times that the terminal device searches for the target network reaches a preset number of times, and the terminal device does not search for or access to the target network, the terminal device accesses to the low-standard network, where the preset number of times is, for example: 3 times, 7 times, 11 times, etc.

For convenience of description, the terminal device search target network may be simply referred to as a terminal device specified search network hereinafter.

The network searching method provided by the embodiment of the application can be applied to various application scenes, such as but not limited to the following scenes:

the first scenario is an underground garage. Referring to fig. 3, when a terminal device (e.g., a mobile phone) of a user enters an underground garage, a network abnormality, such as a network drop or a system drop, occurs. Once a network or a system is dropped, it may take a long time to restore to the original high system. Therefore, after a user drives a vehicle out of the underground garage, the terminal equipment needs a long time to recover to a high standard, and user experience is affected.

The second scenario is a non-ground library scenario such as a problem area on a driving route. Referring to fig. 4, there are one or more problem areas on the travel route from home to company. When the terminal device enters a problem area, a network abnormality (such as network drop or system drop) occurs, and when the terminal device moves out of the problem area, it may take a long time to recover to a high system, which affects user experience.

Example 2 fence

In this embodiment, the relevant contents of the fence are described, including the form of the fence, the collection of the fence, the marking of the fence, the use of the fence, and the like.

2.1 form of fence

The pen can be implemented in a variety of ways, and several examples are given below.

A first example of a fence:

the fence comprises a first cell identifier of a first cell and a second cell identifier of a second cell, wherein the first cell is accessed before the system of the terminal equipment is removed, and the second cell is accessed after the system of the terminal equipment is removed. The fence may be in the form of (first cell identity, second cell identity). For example, the terminal device accesses a first cell (4G cell) and then accesses a second cell (3G cell), that is, the system is dropped, and the fence may be identified as (cell identifier of the 4G cell, cell identifier of the 3G cell). For example, see table 1 below for an example of a plurality of pens. The cell ID is taken as an example of the cell ID.

TABLE 1

Taking the fence 1 in the table 1 as an example, the terminal device is accessed to the cell a before the network drop, the identifier of the cell a is cell ID a, the terminal device is accessed to the cell B after the network drop, and the identifier of the cell B is cell ID B.

A second example of a fence:

the fence includes a first cell identity of a serving cell and a second cell identity of at least one neighboring cell. For example, the fence may be in the form of (cell a identifier, and cell B identifier), where cell a is a serving cell of the terminal device, and cell B is a neighboring cell of cell a. For example, see table 2 below for an example of a plurality of pens. The cell ID is taken as an example of the cell ID.

TABLE 2

Fence mark Extent of enclosure
Fence 1 (cell ID A,cell ID B)
Fence 2 (cell ID B,cell ID C)

Taking the fence 1 in table 2 as an example, the serving cell of the terminal device is cell a, the identifier of cell a is cell ID a, the neighboring cell of the terminal device is cell B, and the identifier of cell B is cell ID B.

A third example of a fence:

the fence includes a first cell identifier of the serving cell, a first signal strength threshold of the serving cell, a second cell identifier of at least one neighboring cell, and a second signal strength threshold of the at least one neighboring cell, and may be in the form of a fence (e.g., an identifier of a cell a, a signal strength threshold of a cell a, an identifier of a cell B, and a signal strength threshold of a cell B), where the cell a is the serving cell of the terminal device, and the cell B is the neighboring cell of the cell a. For example, see table 3 below for a range of pens corresponding to a plurality of pens. The cell ID is taken as an example of the cell ID.

TABLE 3

Compared with the first example and the second example, the fence in the third example further includes a signal strength threshold of the serving cell and a signal strength threshold of the neighboring cell, so that whether the terminal device enters the fence can be identified more accurately.

Taking the fence 1 in table 3 as an example, the manner for the terminal device to determine whether to enter the fence 1 is as follows: the terminal device detects a first cell identifier, such as a cell ID a, of the serving cell, and further detects that the signal strength of the serving cell is X. The terminal device detects a second cell identifier of the neighboring cell, such as cell ID B, and also detects that the signal strength of the neighboring cell is Y. The method comprises the steps that the terminal device obtains cell ID A, cell ID X, cell ID B and cell ID Y, the cell ID A is consistent with the cell ID A in the fence 1, the cell ID B is consistent with the cell ID B in the fence 1, the cell ID A is larger than the signal intensity threshold of the cell ID A in the fence 1, the cell ID B is larger than the signal intensity threshold of the cell ID B in the fence 1, and the terminal device is determined to enter the fence 1.

In addition to the above examples, the fence may have other forms, for example, the fence may further include a GPS, and the like, which is not limited in this embodiment.

2.2 fence acquisition (or Collection)

Taking the second example of the fence (that is, the fence includes the first cell id of the serving cell and the second cell id of the second cell of the neighboring cell) as an example, referring to fig. 5, a schematic diagram of performing one fence acquisition for the terminal device is shown. Fig. 5 can be understood as an information interaction diagram of a processor and a modem (modem) module in a terminal device. The processor may be an Application Processor (AP) or other processors.

S501, a modem module in the terminal device detects information of a serving cell and a neighboring cell.

And the modem module is responsible for detecting the serving cell and the neighbor cell. The neighbor cell detection includes detecting a cell identifier, signal strength, operating frequency/frequency band, communication system, and the like of the neighbor cell. The modem module can detect the neighbor in real time or periodically.

S402, the modem module sends a first message to the processor.

In the first case, after the modem module detects information of the neighboring cell, if a handover condition is satisfied, the cell handover may be performed, for example, the modem module may handover from a first cell to a second cell, where a communication system of the second cell is lower than that of the first cell, and the modem module may notify the processor through a first message. The first message may be indication information for indicating that the terminal device is disconnected from the network/system. For example, when the first message is 0, the terminal device is instructed to drop the network, and when the first message is 1, the terminal device is instructed to drop the network, or the first message is used to instruct the network to be abnormal, and if the first message is 0, the terminal device is instructed to possibly drop the network or drop the network.

In the second case, the first message is information of the serving cell and the neighbor cell detected by the modem module. For example, when the modem module accesses the first cell, the modem module sends information (e.g., cell identifier, communication system, etc.) of the first cell and information of the first neighboring cell to the processor. And when the modem module is switched to the second cell, sending the information of the second cell and the information of the second adjacent cell to the processor. The processor compares the communication system of the first cell and the second cell and determines whether the communication system is reduced. Of course, the first message may also contain only the information of the serving cell.

S403, the processor determines the network drop/system drop.

For the first case, the processor can determine whether to drop the network/the system based on the first message more intuitively.

For the second case, the processor compares the communication systems of the first cell and the second cell, and determines whether the communication system is reduced.

S404, the processor records the information of the service cell and the adjacent cell to form a fence.

For the first case, the fence may include information of the serving cell and the neighboring cell before the network drop/system drop.

For the second case described above, the fence may include information of the first cell and the first neighboring cell.

S405, the processor records the abnormal times of the fence.

After the terminal device records the fence, the number of abnormal times corresponding to the fence may be recorded as 1.

S406, the processor receives a second message sent by the modem module.

The second message may be indication information for indicating the terminal device to recover the network, for example, when the second message is 10, the second message is used for indicating the network recovery, where the network recovery refers to that the terminal device accesses a network with a communication standard higher than or equal to a communication standard before a network drop/a system drop.

Or the modem module is accessed to the third cell, and the second message is information of the third cell and the third neighboring cell. And the processor compares the communication systems of the third cell and the second cell and determines whether to recover the network.

S406 is optional and is shown in dashed lines.

S407, the processor records the network recovery time point and/or the network recovery time length.

The network recovery time point refers to the time when the terminal device recovers the network. S407 is optional and is indicated by a dotted line in the figure. The network restoration time duration may be, for example, a time duration from the time of the network drop/system drop to the time point of the network restoration.

The process of collecting a pen is described above in fig. 5. The terminal device may capture multiple times to obtain multiple pens, or, capture multiple times may result in the same pen, then the abnormal number of times for that pen is updated (increased). Illustratively, see table 4 below, an example of a plurality of pens collected for a terminal device.

TABLE 4

Fence of collection Extent of enclosure Number of anomalies Recording the moment of recovery
Fence 1 (cell ID A,cell ID B) 5 a
Fence 2 (cell ID B,cell ID C) 1 b
Rail 3 (cell ID C,cell ID D) 2 c

2.3 scene recognition of fences

This section introduces the terminal device to identify which fences are of a first type (i.e., a basement scene) and which fences are of a second type (i.e., a non-basement scene such as problem areas on a driving route). The scene identification process of the fence can also be understood as a scene marking process of the fence.

Of course, there is a possible scenario where the terminal device only needs to identify which fences are basement scenes, and then the remaining fences are non-basement scenes.

There are various ways to identify the fence scene, such as but not limited to at least one of the following:

in the mode 1, a plurality of fences are stored in the terminal device, and the scene corresponding to each fence is marked in advance. For example, the terminal device is stored in the terminal device in advance when the terminal device is shipped from a factory. See, for example, table 5 below:

TABLE 5

The process that the terminal device stores a plurality of fences and the scene mark of each fence in advance comprises the following steps: taking a garage as an example, a tester carries a terminal device to enter the garage, the terminal device detects fences, the tester reads the fences detected by the terminal device and manually marks a scene corresponding to each fence, for example, if it is determined that a certain fence is a garage scene, the fence is marked as a garage scene, and then the marking result of each fence is written into the terminal device. Therefore, the terminal device stores a plurality of fences and scene marks corresponding to each fence before shipment.

Mode 2, the scene corresponding to each fence can be user-tagged. For example, the terminal device provides an app or interface for marking a fence, and the terminal device displays the detected fence in the app or interface, and the app or interface may further provide an input box for inputting a scene mark of the fence. For example, when a user drives into an underground garage of a residential quarter, the terminal device detects a fence and displays the fence in the app or the interface, the user can input a mark of "garage at home" in the input box, and the terminal device establishes a corresponding relationship between the fence and a garage scene after detecting an input operation of the user in the input box.

In mode 3, the scene corresponding to each fence is determined by the terminal device according to the motion data. And if the terminal device detects that the terminal device enters the first fence and judges that the terminal device is in the basement scene according to the motion data, determining that the scene of the first fence is the basement scene. The process of judging that the terminal device is in the ground library scene according to the motion data may refer to a mode 2 in 3.1 in embodiment 3 hereinafter.

Further, when the abnormal times corresponding to one fence are greater than the preset times, the fence is identified as a ground reservoir scene, otherwise, the fence is identified as a non-ground reservoir scene.

In a manner 4, similar to the manner 3, after the terminal device enters the first fence, the motion data is collected, if the terminal device is judged to be out of the warehouse according to the motion data, if so, the fence is identified as a ground warehouse scene, otherwise, the fence is identified as a non-ground warehouse scene. The process of the terminal device judging the library according to the motion data is described in 3.2.2 in embodiment 3 below.

2.4 use of pens

The fence is used for scene detection, namely the terminal equipment judges whether the terminal equipment is in a basement scene or a non-basement scene through fence detection. The terminal equipment can also determine a target cell for subsequent connection through the fence.

The labeling of the pens section above describes the scenario in which the pens are labeled differently. Therefore, when the terminal device detects that a fence is entered, whether the scene corresponding to the fence is a basement scene or a non-basement scene can be determined through the scene mark of the fence.

Example 3 ground library scenario

The network searching method for the terminal device in the basement scene is introduced in this embodiment, and the network searching method specifically includes warehousing detection, ex-warehouse network searching and the like.

3.1 identification of ground library scenes

In the mode 1, the terminal device detects that the mobile terminal enters the fence, and judges whether the mobile terminal is in a ground depot scene or not based on the fence. See in particular the description of 2.3 in example 2 above.

In the mode 2, considering that the entrance of the garage is usually set as a slope, the vehicle entering process is a process from flat ground to downhill, and in the process, the motion data collected by the motion sensor in the terminal device changes, so that the situation that the terminal device is in the garage can be judged through the motion data. Wherein the motion sensor comprises an accelerometer, a gyroscope, or the like.

For example, taking the motion data as an attitude angle as an example, the terminal device stores a preset attitude angle, where the preset attitude angle may be a default fixed value or an attitude angle collected by the terminal device when the terminal device is on a slope of the warehouse exit in advance. And when the difference value between the attitude angle acquired by the terminal equipment and the preset attitude angle is smaller than a threshold value, determining that the terminal equipment is put in storage.

Or the terminal equipment acquires a change curve of the attitude angle along with time, and if the curve is consistent with a preset curve, the terminal equipment determines to put in storage. The preset curve may be a default fixed curve, or a change curve of an attitude angle acquired by the terminal device in the process of warehousing along with time.

In some embodiments, the identification of the geospatial scene may be accomplished through a first algorithmic model.

As an example, the input parameters of the first algorithm model include a motion data stream collected by a motion sensor, and the output parameters include indication information, where the indication information is used to indicate warehousing or non-warehousing, for example, the indication information is X, it is determined that warehousing is performed, that is, an input warehouse scene, the indication information is Y, and it is determined that non-warehousing is performed, that is, it belongs to a non-warehouse scene. For example, the first algorithm module may compare the collected attitude angle with a preset attitude angle, or compare a variation curve of the collected attitude angle with time with a preset curve, and so on.

Alternatively, the input parameters of the first algorithmic model comprise a motion data stream and the output parameters comprise a motion profile. In this way, the first algorithm model compares the input parameters with a plurality of preset curves (curves corresponding to a plurality of ground library scenes), finds a preset curve matching the input parameters, and then outputs the preset curve. And when the preset curve is output, determining that the scene is in the ground reservoir.

In some embodiments, the input parameter of the first algorithm model may be raw motion data collected by a motion sensor, or may be data obtained by preprocessing the raw motion data, where the preprocessing may include performing coordinate transformation on the raw motion data, and transforming the raw motion data from a sensor coordinate system to a terminal device body coordinate system, for example, performing coordinate transformation by:

wherein, N represents the original motion data, and B represents the motion data obtained by converting the original motion data by a coordinate system. The intermediate matrix is referred to as a transformation matrix and may be preset.

The first algorithm model may be a decision tree, a Logistic Regression (LR), a Naive Bayes (NB) classification algorithm, a Random Forest (RF) algorithm, a Support Vector Machine (SVM) algorithm, a Histogram of Oriented Gradients (HOG), a neural network, a deep neural network, a convolutional neural network, or the like. The first algorithm model may be a model which is set up in advance before delivery and stored in the terminal device; or, the initial model is stored in the factory, and the first algorithm model is a model obtained after the initial model is trained. The training process can be understood as inputting input parameters (motion data) into the initial model, calculating to obtain an output result (a ground library scene or a non-ground library scene), if the output result is not accordant with the real result, adjusting the initial model to enable the output result obtained by the adjusted model to be accessed into the real result as much as possible, and the model after adjusting the model parameters is the first algorithm model.

3.2 Ex warehouse detection

In the embodiment of the application, the terminal device performs the ex-warehouse detection by using the ex-warehouse parameters, and the related contents of the ex-warehouse parameters are introduced in the embodiment and comprise the contents of the ex-warehouse parameters, the acquisition of the ex-warehouse parameters, the self-learning of the ex-warehouse parameters, the functions of the ex-warehouse parameters and the like.

3.2.1 contents of Exit parameters

For the first scenario, namely the warehouse scenario, the terminal device may perform warehouse-out detection by using the warehouse-out parameter, that is, determine whether the terminal device is out of the warehouse by using the warehouse-out parameter. The terminal device performs ex-warehouse detection by using the ex-warehouse parameters, which can be understood as that the terminal device detects the current ex-warehouse parameters, compares the current ex-warehouse parameters with the historical ex-warehouse parameters, determines that the terminal device is ex-warehouse if the current ex-warehouse parameters are consistent with the historical ex-warehouse parameters, and otherwise determines that the terminal device is not ex-warehouse. The contents of the current ex-warehouse parameters and the contents of the historical ex-warehouse parameters can be the same or similar, and only the detection time points are different. The historical ex-warehouse parameters can be understood as ex-warehouse parameters which are collected by the terminal device historically and can represent ex-warehouse, and are used as a reference for detecting whether the terminal device is ex-warehouse currently.

In consideration of the fact that the garage exit of the underground garage is designed to be a slope under normal conditions, a vehicle needs to climb in the process of driving the vehicle and leaving the garage, and in the process of climbing the vehicle, motion data collected by a motion sensor (an accelerometer, a gyroscope and the like) in terminal equipment (the terminal equipment is placed in the vehicle) can change, so that detection of leaving the garage can be performed through the motion data.

Thus, the ex-warehouse parameters (current ex-warehouse parameters or historical ex-warehouse parameters) may include at least one of:

1. the motion data and/or the data stream of the motion data, wherein the data stream of the motion data may be understood as a data stream of the motion data acquired by a motion sensor in the terminal device in real time, or may be referred to as a time variation curve of the motion data. For example, in a real ex-warehouse scene, the terminal device detects motion data in real time to obtain a time-dependent change curve of the motion data, and the curve is a standard curve corresponding to ex-warehouse. In practical application, the terminal device detects the motion data in real time to obtain a first curve of the motion data changing along with time, the terminal device judges whether the first curve is matched with the standard curve, if so, the terminal device determines to leave the warehouse, otherwise, the terminal device determines not to leave the warehouse.

Considering that the design of the warehouse-out ports of different warehouses is different, for example, the slope of the warehouse-out port of some warehouses is steeper, and the slope of some warehouses is flatter. Therefore, each ground bank corresponds to a standard curve, and the standard curve is used for detecting whether the terminal equipment moves out of the ground bank corresponding to the standard curve. As described above, each bank corresponds to one fence, so there is a correspondence between fences and standard curves. Taking table 5 above as an example, assuming that the terminal device detects entering the fence 1 and determines that the terminal device is in the basement 1, the terminal device may detect whether to move out of the basement 1 based on the standard curve corresponding to the fence 1.

The standard curve is described first.

Taking the example that the motion data includes the attitude angle of the terminal device, the attitude angle refers to: the terminal equipment comprises a right-hand coordinate system formed by a right direction, a front direction and an upper direction, and the attitude angle is a rotation angle rotating around a right axis. Therefore, the standard curve is a change curve of the attitude angle with time. For example, see FIG. 6A, which is an example of a standard curve.

There are various ways for the terminal device to obtain the standard curve.

For example, the standard curve is pre-stored in the terminal device, and a corresponding standard curve is stored for different ground pools, or a corresponding standard curve is stored for different fences.

Alternatively, the standard curve is drawn by the terminal device according to the attitude angle acquired in real time, and it should be noted that there is a possible case that the motion data acquired by the terminal device is raw data, and the raw data needs to be processed and converted into the attitude angle. Under the condition, after the terminal equipment collects the original data, the original data is processed to obtain the attitude angle, and then a change curve of the attitude angle along with time is drawn. The process of converting the original data into the attitude angle is not described in detail in the embodiment of the present application.

2. The climb (or hill climb) time is started.

The time to start climbing is the time to start climbing from the flat ground (flat ground in the warehouse). For example, the time to start climbing may be a first preset time after the terminal device detects the time to enter the fence, or a second preset time after the time to drop the network/the system is detected. In general, for example, a user carries a terminal device from home to an underground garage, and then the time for driving the vehicle out of the garage is relatively fixed, so that the terminal device can be driven out of the garage within a preset time after entering a fence or losing a network/system. Therefore, the climbing time can be used as a ex-warehouse parameter for detecting whether to ex-warehouse. Or, the time for starting climbing is the time when the slope of the change curve of the motion data acquired by the terminal device along with the time increases, or, if the change curve is a historical ex-warehouse parameter, the terminal device may further: after a fence entering a ground reservoir scene is detected, the determined time of increasing slope on a reservoir-exiting curve corresponding to the fence is the historical climbing starting time. For example, referring to fig. 6A, the climb time may be T1 on the graph.

3. And stopping the climbing time.

The time for stopping climbing is the time from the slope of leaving the garage to the flat ground outside the garage. For example, the time for stopping climbing may be a third preset time after the terminal device detects the time of entering the fence, where the third preset time is after the first preset time, or a fourth preset time after the network drop/system drop time is detected, where the fourth preset time is after the second preset time. Or the time for stopping climbing is the time for which the slope of the change curve of the motion data acquired by the terminal device along with the time decreases, or if the time is the historical departure parameter, the time for which the slope of the departure curve corresponding to the fence decreases is determined after the terminal device detects the fence entering the ground-garage scene, namely the historical time for stopping climbing. For example, referring to fig. 6A, the stop ramp time may be T2 on the graph.

4. The time to start climb corresponds to the motion data (such as attitude angle) and/or the change value of the motion data.

The motion data corresponding to the time to start climbing refers to the ordinate corresponding to T1 in fig. 6A. The motion data change value corresponding to the starting climb time refers to the difference value or the absolute value of the difference value between the ordinate of T3 before T1 and the ordinate of T4 after T1 in fig. 6A. Generally, when a vehicle starts to climb a slope (from a flat ground to a slope with a slope), motion data changes more significantly. For example, referring to fig. 6A, the slope (i.e., the change of the attitude angle) corresponding to the climbing time T1 is changed greatly, which may reflect that the terminal device starts climbing a slope, and may be used to detect whether to leave the warehouse.

5. The hill climbing time is stopped corresponding to the motion data (such as the attitude angle) and/or the change value of the motion data.

The motion data corresponding to the time to stop climbing is the ordinate corresponding to T2 in fig. 6A. The motion data change value corresponding to the time for stopping climbing is the difference value or the absolute value of the difference value between the ordinate of the time before T2 and the ordinate of the time after T2 in fig. 6A. In general, when the vehicle stops climbing a slope (from a slope with a slope to flat ground), the motion data changes more significantly. For example, as shown in fig. 6A, the slope (i.e., the change of the attitude angle) corresponding to the time T2 for stopping climbing is changed greatly, which may reflect that the terminal device stops climbing, and may be used to detect whether to leave the warehouse.

6. The outbound window, i.e., the time difference between the start climb time and the stop climb time, may be referred to as a ramp length. Taking FIG. 6A as an example, the time difference between the outbound windows T2 and T1.

7. Cell identification information.

The cell identification information comprises cell identifications of one or more cells detected in the process that the terminal equipment leaves the ground base scene historically; for example, the terminal device records a first cell identifier of a first cell accessed (and/or searched) within a first preset time before the terminal device is taken out of the warehouse, and records a second cell identifier of at least one second cell searched within a second preset time after the terminal device is taken out of the warehouse, and then the terminal device stores the cell identifier information as (the first cell identifier, the second cell identifier). The first preset time and the second preset time are the same or different, and are both 2s for example.

8. Signal strength information and/or signal strength change information.

The signal strength information comprises cell signal strengths of one or more cells detected by the terminal device in the process of historically leaving the ground base scene; for example, the terminal device records a first signal strength of a first cell accessed (and/or searched) within a first preset time before the terminal device leaves the warehouse, records a second signal strength of the first cell searched within a second preset time after the terminal device leaves the warehouse, that is, the first signal strength and the second signal strength are both signal strengths of the first cell, and the terminal device stores the signal strength information as (the first signal strength, the second signal strength).

The signal strength change information includes a change value of a first signal strength and a second signal strength, the first signal strength is a signal strength of a first cell detected at a first preset time before the terminal device leaves the basement scene historically, and the second signal strength is a signal strength of the first cell detected at a second preset time after the terminal device leaves the basement scene historically; for example, the terminal device records a first signal strength of a first cell accessed (and/or searched) within a first preset time before the terminal device is taken out of the warehouse, records a second signal strength of the first cell searched within a second preset time after the terminal device is taken out of the warehouse, and determines and records signal strength variation information of the first signal strength and the second signal strength.

3.2.2 effects of Ex warehouse parameters

And 1, detecting whether the terminal equipment is delivered from the warehouse or not by using the delivery parameters.

One way is that the terminal device detects the current ex-warehouse parameters, compares the current ex-warehouse parameters with the historical ex-warehouse parameters, if the current ex-warehouse parameters are consistent, the terminal device is determined to be ex-warehouse, otherwise, the terminal device is determined not to be ex-warehouse. The current ex-warehouse parameters and the historical ex-warehouse parameters can have the same content, but different detection time. The current ex-warehouse parameters may be ex-warehouse parameters acquired by the terminal device last time.

Taking the above-mentioned type 1 ex-warehouse parameter as an example, the type 1 ex-warehouse parameter includes motion data such as an attitude angle, and the process of the terminal device using the ex-warehouse parameter to perform ex-warehouse detection may include: and when the terminal equipment detects the first attitude angle at present, determining that the difference between the first attitude angle and the attitude angle in the historical ex-warehouse parameters is smaller than a threshold value, and determining that the terminal equipment is ex-warehouse. Assuming that the 1 st ex-warehouse parameter includes a standard curve, the process of the terminal device using the ex-warehouse parameter to perform ex-warehouse detection may include: the terminal equipment collects a first curve of the current attitude angle changing along with time, judges whether the first curve is matched with a standard curve in the historical ex-warehouse parameters or not, determines ex-warehouse if the first curve is matched with the standard curve, and otherwise, determines that the first curve is not ex-warehouse. The terminal device determines whether the first curve is matched with the standard curve in various ways. For example, it is determined whether the first curve and the standard curve have the same shape, for example, the first curve is a straight line, and the standard curve is the curve shown in fig. 6A, and it is determined that the library has not been made. For another example, if the attitude angle on the first curve has the same value as the attitude angle on the standard curve, the user is determined to be out of the warehouse.

Taking the above-mentioned 2nd ex-warehouse parameter as an example, the 2nd ex-warehouse parameter includes a climbing start time, and the process of the terminal device using the ex-warehouse parameter to perform ex-warehouse detection may include: and the terminal equipment detects the first climbing start time currently, and determines that the terminal equipment is taken out of the warehouse if the terminal equipment determines that the difference value between the first climbing start time and the climbing start time in the historical warehouse-out parameters is within a threshold value. The first time to start climbing may be a preset time length from the moment when the network drop or the system drop is detected or from the moment when the entrance into the basement fence is detected. Or the terminal device detects a first curve of the attitude angle changing along with time, and the first climbing starting time is the time when the slope on the ex-warehouse curve is increased. In this way, the ex-warehouse time point may be a time point recorded when the ex-warehouse is detected by using the ex-warehouse parameter, or may be a preset time length after the time point recorded when the ex-warehouse is detected by using the ex-warehouse parameter, where the preset time length is, for example, a time length corresponding to the ex-warehouse window.

Taking the above-mentioned 3rd ex-warehouse parameter as an example, the 3rd ex-warehouse parameter includes a climbing stopping time, and the process of the terminal device using the ex-warehouse parameter to perform ex-warehouse detection may include: and the terminal equipment detects the first climbing stopping time at present, and determines that the difference value between the first climbing stopping time and the climbing stopping time in the historical ex-warehouse parameters is within a threshold value, and then determines that the terminal equipment is out of the warehouse. The first climbing stopping time may be a preset time length from the moment when the network drop or the system drop is detected or from the moment when the entrance into the basement fence is detected. Or the terminal device detects the ex-warehouse curve, and the first climbing stopping time is the time when the slope on the ex-warehouse curve is reduced.

Taking the above-mentioned 4th ex-warehouse parameter as an example, assuming that the 4th ex-warehouse parameter includes motion data corresponding to the time of climbing, the process of the terminal device using the ex-warehouse parameter to perform ex-warehouse detection may include: the terminal device detects first climbing starting time, determines that an attitude angle corresponding to the first climbing starting time is a first attitude angle, compares the first attitude angle with a second attitude angle, and determines to leave the warehouse if a difference value is smaller than a threshold value, wherein the second attitude angle is the attitude angle corresponding to the climbing starting time in historical warehouse-out parameters. Assuming that the 4th ex-warehouse parameter includes a variation value of the motion data corresponding to the time for starting to climb, the process of the terminal device using the ex-warehouse parameter to perform ex-warehouse detection may include: and the terminal equipment detects the first time for starting climbing, determines that the attitude angle change value corresponding to the first time for starting climbing is the same as the attitude angle change value corresponding to the time for starting climbing in the historical ex-warehouse parameters or the difference is smaller than a threshold, and then determines ex-warehouse. The attitude angle or the attitude angle change value corresponding to the first time to climb is determined in the manner described above. In this way, the ex-warehouse time point may be a time point recorded when the ex-warehouse is detected by using the ex-warehouse parameter, or may be a preset time length after the time point recorded when the ex-warehouse is detected by using the ex-warehouse parameter, where the preset time length is, for example, a time length corresponding to the ex-warehouse window.

Taking the above-mentioned 5th ex-warehouse parameter as an example, assuming that the 5th ex-warehouse parameter includes motion data corresponding to a climbing stop time, the process of the terminal device using the ex-warehouse parameter to perform ex-warehouse detection may include: the terminal device detects first climbing stopping time, determines that an attitude angle corresponding to the first climbing stopping time is a first attitude angle, compares the first attitude angle with a second attitude angle, and determines ex-warehouse if the difference value is smaller than a threshold value, wherein the second attitude angle is the attitude angle corresponding to the climbing stopping time in historical ex-warehouse parameters. Assuming that the 5th ex-warehouse parameter includes a variation value of the motion data corresponding to the climbing stopping time, the process of the terminal device using the ex-warehouse parameter to perform ex-warehouse detection may include: and the terminal equipment detects the first climbing stopping time, determines that the attitude angle change value corresponding to the first climbing stopping time is the same as the attitude angle change value corresponding to the climbing stopping time in the historical ex-warehouse parameters or the difference is smaller than a threshold, and determines ex-warehouse. The determination manner of the attitude angle or the attitude angle change value corresponding to the first climb stop time is as described above.

Taking the above-mentioned warehouse-out parameter of the 6 th type as an example, the warehouse-out parameter of the 6 th type includes a climbing duration (i.e. a warehouse-out window), and the process of the terminal device using the warehouse-out parameter to perform warehouse-out detection may include: and the terminal equipment detects the first climbing time length, determines that the difference value between the first climbing time length and the climbing time length in the historical ex-warehouse parameters is less than a threshold value, and determines ex-warehouse.

Taking the above 7 th ex-warehouse parameter as an example, the 7 th ex-warehouse parameter includes cell identification information, and the process of the terminal device using the ex-warehouse parameter to perform ex-warehouse detection may include: the terminal device detects a cell in real time, and assumes that the detected current cell identification information is (a first cell identification, a second cell identification), for example, the first cell identification is an identification of a current serving cell, and the second cell identification is an identification of a neighboring cell. And the terminal equipment determines that the current cell identification information is consistent with the cell identification information in the historical ex-warehouse parameters, and then determines to ex-warehouse.

Taking the above 8 th ex-warehouse parameter as an example, assuming that the 8 th ex-warehouse parameter includes signal strength information, the process of the terminal device using the ex-warehouse parameter to perform ex-warehouse detection may include: and the terminal equipment detects the signal quality measurement of the cell in real time, and determines to be delivered if the detected current signal strength comprises a third signal strength and a fourth signal strength, the third signal strength is the current signal strength of the serving cell, the fourth signal strength is the current signal strength of the adjacent cell, and the terminal equipment determines that the current cell identification information is consistent with the cell identification information in the historical delivery parameters. Assuming that the 8 th ex-warehouse parameter includes a signal strength information variation value, the process of the terminal device using the ex-warehouse parameter to perform ex-warehouse detection may include: and the terminal equipment detects the signal quality measurement of the cell in real time, and determines to deliver the cell if the detected signal strength change value of one cell is a first signal strength change value which is consistent with the signal strength change value of the cell in the historical delivery parameters.

In the embodiment of the present application, the ex-warehouse detection of the terminal device may be implemented using the second algorithm model. For example, referring to fig. 6B, the second algorithm model may calculate input parameters by using the ex-warehouse parameters to obtain output parameters, where the input parameters include a change curve (such as the first curve) of motion data (such as an attitude angle) acquired by the terminal device with respect to time, and the output parameters are ex-warehouse or not ex-warehouse.

The second algorithm model may be a neural network, a deep neural network, a convolutional neural network, or the like, and the embodiments of the present application are not limited thereto. The second algorithm model may be a model which is set up in advance before delivery and stored in the terminal device; or the initial model is stored in the factory, and the second algorithm model is obtained after the initial model is trained. Wherein the training process may comprise a self-learning process of ex-warehouse parameters, i.e. embodiment 3.2.4, and the model after training may be used for ex-warehouse detection.

In case 1, the terminal device performs the ex-warehouse detection by using the ex-warehouse parameters, and when the ex-warehouse is detected, records the ex-warehouse time point, which is the ex-warehouse time point in the following text.

Case 2, ex-warehouse parameters are used for detecting ex-warehouse points.

In the first scheme, it is assumed that terminal equipment acquires ex-warehouse parameters on the spot to obtain a curve (a curve of change of an attitude angle along with time), and whether the curve is an ex-warehouse curve is judged according to historical ex-warehouse parameters, and the specific mode is as follows: assuming that the historical ex-warehouse parameters include (i ═ 1s, j ═ 5s, and k ═ 45 degrees), wherein the starting rise time is represented by i, the ex-warehouse window is represented by j, and the attitude angle is represented by k; the terminal device judges that the rising time starting on the curve collected on the spot is i 0-1.3 s, the ex-warehouse window is j 0-7 s, and the attitude angle is k 0-46 degrees, wherein i0 is greater than 1s, j0 is greater than 4, and k0 is greater than 45 degrees, and determines that the climbing stopping time (such as T2 in fig. 6A) on the curve is the ex-warehouse point. The historical ex-warehouse parameters may be ex-warehouse parameters self-learned by the terminal device, and the following description may be referred to in the self-learning process.

In this case, the ex-warehouse parameter is used to determine whether the curve acquired by the terminal device on the spot is an ex-warehouse curve, because the vehicle may acquire motion data in real time during moving, the curve formed by the motion data acquired at a certain time may not be an ex-warehouse curve, and if the ex-warehouse point is determined by the curve, the detected ex-warehouse point is inaccurate. Therefore, the terminal equipment judges whether the curve acquired by the terminal equipment on the spot is the ex-warehouse curve or not by utilizing the ex-warehouse parameters of the historical records, and determines ex-warehouse points according to the ex-warehouse curve, so that the accuracy of ex-warehouse point detection is improved.

In the second scheme, when the terminal equipment is determined to be in a ground warehouse scene, the terminal equipment determines a warehouse-out point by using the historical warehouse-out parameters (the historical warehouse-out curves). In this scheme, the terminal device may not need to collect the curve on the spot. The mode of determining the ex-warehouse point by using the historical curve is as follows: the terminal device detects that the terminal device enters a fence 1 (a fence of a basement scene), searches a historical ex-warehouse curve corresponding to the fence 1, and determines an ex-warehouse point T2 based on the historical ex-warehouse curve. The historical ex-warehouse curve is a curve corresponding to ex-warehouse parameters learned by the terminal equipment.

According to the third scheme, the ex-warehouse parameters comprise historical cell information, the terminal equipment can detect the ex-warehouse time point based on the currently collected cell information and the historical cell information, and the historical cell information comprises cell information collected when the terminal equipment moves out of the underground garage in a historical mode.

For example, taking a certain basement scene as an example, the terminal device acquires the historical cell information when leaving the basement scene historically, and records the acquisition time of the historical cell information. When the cell information acquired by the terminal equipment at present is consistent with the historical cell information, determining that the acquisition time of the historical cell information is a ex-warehouse time point, or determining that the time point of the terminal equipment for acquiring the current cell information is the ex-warehouse time point.

It should be noted that, in the first scheme above, the terminal device may continue to optimize the ex-warehouse parameters by using the curves collected on the spot and the historical ex-warehouse parameters, which will be described later in the self-learning process of the ex-warehouse parameters.

3.2.3 obtaining (or collecting) of ex-warehouse parameters

As previously described, the ex-warehouse parameters include historical ex-warehouse parameters and current ex-warehouse parameters. The historical ex-warehouse parameters may be collected by the terminal device and stored in the terminal device, for example, before leaving a factory, a tester uses the terminal device to collect the ex-warehouse parameters and stores the ex-warehouse parameters in the terminal device; or the terminal device collects and stores the ex-warehouse parameters in the history process of using the terminal device by a user (not a tester but a consumer purchasing the terminal device) after the terminal device is shipped.

Considering that the ex-warehouse parameters of each garage are different (such as different standard curves), for example, the terminal device may store a plurality of fences, scene identifiers corresponding to each fence, and ex-warehouse parameters corresponding to each fence marked as a basement scene.

See, for example, table 6 below:

TABLE 6

When the terminal device detects that the terminal device enters a certain fence, the terminal device can perform ex-warehouse detection based on the ex-warehouse parameters corresponding to the fence. For example, when the terminal device detects that the terminal device enters the fence 1, which indicates that the terminal device enters the garage 1, the terminal device uses the ex-garage parameter 1 to perform ex-garage detection. The process of using the ex-warehouse parameters by the terminal device to perform the ex-warehouse parameters can be referred to as the introduction of 3.2.2 in the foregoing.

The change curve of the attitude angle with time, which is the above-mentioned type 1 ex-warehouse parameter, is taken as an example. Referring to fig. 7, the process of acquiring the attitude angle for the terminal device: when the terminal device has network abnormality, it is determined that the terminal device is in a ground library scene based on the fence where the terminal device is located (embodiment 3.1), and motion data (such as attitude angle) is collected in real time. Optionally, when the terminal device is in a bright screen state, it indicates that the user is using the terminal device. Therefore, the terminal equipment can judge whether the screen is bright before entering the fence, if so, fence detection is carried out, and if not, fence detection is not needed. Or judging whether the screen is bright before the terminal equipment collects the attitude angle, if so, collecting the attitude angle, and otherwise, not collecting the attitude angle. And when the terminal equipment detects that the network is recovered, stopping collecting the motion data. On one hand, the terminal device can input the collected motion data into the algorithm model (such as the second algorithm model) in real time for ex-warehouse detection, and on the other hand, the terminal device can search for a target network based on the collected data (such as the time of dropping the network or the system, the time of entering the fence and the like).

Considering a possible scenario that the terminal device may be in a stationary state, the stationary state is understood as the terminal device staying in the garage for a long time and not going out of the garage. In this case, the terminal device still continuously collects the motion data, however, the motion data cannot be used for ex-warehouse detection. Therefore, after the terminal device starts to collect the motion data, the collection duration may be detected, and if the collection duration reaches a preset duration (for example, 15 minutes) but the network recovery is not detected, which indicates that the terminal device stays in the garage, the terminal device may discard the collected data, for example, discard the data collected within 15 minutes. And if the acquisition duration is less than the preset duration and the network recovery is detected, stopping acquiring the data and storing the acquired data.

3.2.4 self-learning of ex-warehouse parameters

The ex-warehouse parameters comprise historical ex-warehouse parameters and current ex-warehouse parameters. The historical ex-warehouse parameters are used as the reference for detecting whether the terminal equipment is ex-warehouse or not, so that more accurate historical ex-warehouse parameters are expected to be obtained to improve the accuracy of ex-warehouse detection, and therefore the terminal equipment can obtain ideal historical ex-warehouse parameters in a self-learning mode. The self-learning process of the ex-warehouse parameters is described below by taking the ex-warehouse parameters including attitude angle, climbing time and out-window (for convenience of description, the climbing time in the ex-warehouse parameters is represented by i, the ex-warehouse window is represented by j, and the attitude angle is represented by k).

The first ex-warehouse parameter self-learning method is that the terminal equipment verifies the ex-warehouse parameters every time the terminal equipment collects the ex-warehouse parameters, and the verification of the ex-warehouse parameters can be understood as verifying whether the ex-warehouse parameters are ideal ex-warehouse parameters. Suppose that the terminal device acquires ex-warehouse parameters i, j, k. The terminal equipment identifies and obtains a delivery point by using the delivery parameter, and records a network recovery point, wherein the network recovery point is a time point when the terminal equipment successfully accesses the high standard network. If the time difference between the ex-warehouse point and the network recovery point is greater than the threshold, determining that the ex-warehouse parameter is not ideal, acquiring the ex-warehouse parameter again, and verifying the acquired ex-warehouse parameter (the verification principle may be the same).

The second self-learning method of the ex-warehouse parameters is that after the terminal equipment collects the ex-warehouse parameters once, the ex-warehouse parameters are compared with the ex-warehouse parameters collected last time, and the optimal ex-warehouse parameters are determined. Suppose that the terminal device acquires the first ex-warehouse parameter last time and acquires the second ex-warehouse parameter next time. The terminal device identifies and obtains the first ex-warehouse point by using the first ex-warehouse parameter, records the first network recovery point (for example, through the first algorithm model shown in fig. 6B), and determines a first time difference between the first network recovery time point and the first ex-warehouse point. The terminal device identifies and obtains a second ex-warehouse point by using the second ex-warehouse parameter, records a second network recovery point (for example, through the first algorithm model shown in fig. 6B), and determines a second time difference between the second network recovery point and the second ex-warehouse point. And the terminal equipment determines the minimum time difference between the first time difference and the second time difference, wherein the ex-warehouse parameters corresponding to the minimum time difference are self-learned ex-warehouse parameters.

Corresponding to the situation 2 in the foregoing 3.2.2, the terminal device acquires the ex-warehouse parameters on the spot to obtain a curve, determines that the curve is an ex-warehouse curve by using the historical ex-warehouse parameters, and determines the ex-warehouse point based on the curve. The terminal device may compare the ex-warehouse parameters collected on the spot with the historical ex-warehouse parameters to determine the optimal ex-warehouse parameters, and the specific process refers to the description in the above paragraph.

The third self-learning method of the ex-warehouse parameters is that the terminal device sets (for example, manually sets) N ex-warehouse parameters (N is an integer greater than or equal to 2), and selects the best ex-warehouse parameter from the N ex-warehouse parameters. And the terminal equipment detects by using each set ex-warehouse parameter to obtain an ex-warehouse point and records a corresponding network recovery point. Illustratively, referring to table 7 below, for each ex-warehouse parameter, there is one ex-warehouse point and one network recovery point.

TABLE 7

Ex-warehouse parameters Warehouse-out point Network recovery point Time difference delta ═ T2-T1
First ex-warehouse parameter T11 T21 Δ1
Second ex-warehouse parameter T12 T22 Δ2
Third ex-warehouse parameter T13 T23 Δ3

For each ex-warehouse parameter, the terminal device can determine the time difference between the ex-warehouse point and the network recovery point, so the terminal device obtains three time differences Δ 1, Δ 2 and Δ 3. The terminal device may determine the ex-warehouse parameters corresponding to the time difference smaller than the threshold value in Δ 1, Δ 2, and Δ 3 as the self-learned ex-warehouse parameters. Or the terminal device determines the minimum value among Δ 1, Δ 2, and Δ 3, and the ex-warehouse parameter corresponding to the minimum value is the optimal ex-warehouse parameter. Taking table 7 above as an example, assuming that Δ 2 is the minimum, the second ex-warehouse parameter is the ex-warehouse parameter obtained by self-learning.

The fourth self-learning mode is that the terminal device sets (for example, manually sets) a plurality of ex-warehouse parameters, the terminal device performs ex-warehouse detection for a plurality of times by using each ex-warehouse parameter, one ex-warehouse point is obtained by each ex-warehouse detection, and the corresponding network recovery point is recorded. Taking four times as an example, the terminal device performs four times of ex-warehouse detection by using each ex-warehouse parameter to obtain four ex-warehouse points and four network recovery points. For example, referring to table 8 below, a plurality of ex-warehouse points and a plurality of network recovery points correspond for each ex-warehouse parameter.

TABLE 8

For the first ex-warehouse parameter, after each ex-warehouse detection, the time difference between the ex-warehouse point and the network recovery point is determined, so that 4 time differences Δ are obtained for each ex-warehouse parameter, and based on the 4 time differences Δ, the mean square difference (or mean square difference called time difference) can be obtained:

similarly, for the second ex-warehouse parameter, the mean square time difference is

For the third ex-warehouse parameter, the corresponding mean square time difference is

Therefore, the terminal device obtains three mean square time differences X1, X2 and X3, and if the terminal device judges that the value greater than the threshold value in X1, X2 and X34 is X2, the second ex-warehouse parameter is the ex-warehouse parameter obtained by self-learning. Alternatively, the terminal device determines the minimum mean square error among X1, X2, and X34, where the ex-warehouse parameter corresponding to the minimum mean square error is a self-learned ex-warehouse parameter, for example, X2 is the minimum with respect to X1 and X3 in table 8, and may determine the second ex-warehouse parameter as a self-learned ex-warehouse parameter.

It should be noted that, in the foregoing embodiment, the ex-warehouse point and the network recovery point may be relative times, for example, a time relative to a reference time, where the reference time of the ex-warehouse point includes a time when entering a fence is detected or a time when a network drop/system drop is detected; the reference time of the network recovery point comprises the time of leaving the warehouse, detecting the time of entering the fence or detecting the time of losing the network/the system.

As an effect display diagram, referring to (a) in fig. 8, a large number of ex-warehouse points detected by using different sets of values of ex-warehouse parameters are detected in the self-learning process of the terminal device, for example, an entity black point in the diagram represents an ex-warehouse position corresponding to an ex-warehouse point. For example, based on the first set of values, a partial black point is determined (four times of collection may correspond to 4 black points), and based on the second set of values, a partial black point is obtained (four times of collection may correspond to 4 black points). Wherein, part of the ex-warehouse positions are far away from the high-standard network, so that the probability that the ex-warehouse positions are accessed to the high-standard network as soon as possible is low; or part of the ex-warehouse positions are already in the coverage range of the high-standard network, and if the network searching is started by taking the ex-warehouse points corresponding to the ex-warehouse positions as the starting time, the network searching is delayed. Therefore, the method and the device for accessing the high-standard network obtain the more accurate value of the ex-warehouse parameter in a self-learning mode, and the more accurate value of the ex-warehouse parameter can be understood as that the ex-warehouse point capable of accessing the high-standard network as soon as possible can be obtained by utilizing the value of the ex-warehouse parameter. Referring to fig. 8 (b), the number of the outbound points is smaller and converged (or concentrated) relative to fig. 8(a), and the outbound points can access the high-standard network as soon as possible, and the outbound points are detected based on the outbound parameters obtained by self-learning.

The above process of the terminal device self-learning the dereferencing of the ex-warehouse parameter can be implemented by a loss function (loss function) or an objective function (objective function), where the loss function or the objective function is an important equation for finding the minimum mean-square time difference.

Optionally, the terminal device may self-learn the ex-warehouse parameters, or the terminal device may report the acquired data to the cloud, and the cloud self-learns the ex-warehouse parameters and sends the self-learning result to the terminal device.

3.3 Exit search network

Fig. 9 is a schematic flow chart of a network searching method according to an embodiment of the present application. The method comprises the following steps:

s901, the terminal equipment determines that network abnormity occurs.

For S901, reference may be made to the description of S101 in the embodiment shown in fig. 1, and details are not repeated here.

S902, the terminal device determines that the terminal device is in a ground library scene.

For S901, reference may be made to the description of 3.1 in the foregoing embodiment 3, and details are not repeated here.

And S903, the terminal equipment determines whether to go out of the warehouse.

For S903, reference may be made to the description of 3.2 in embodiment 3, and details are not repeated here.

And S904, when the terminal device detects the warehouse-out, searching and accessing the target network.

For S904, reference may be made to the description of S102 in embodiment 1, and details are not repeated here.

In the embodiment of the application, when the terminal device is located in a basement scene, a network of a search target communication system is started at a specified time (namely, the optimal network searching time), a time interval exists between the specified time and a warehouse-out time point of the terminal device, and the specified time is a time point after the warehouse-out time point. For example, the time interval is greater than or equal to 5 seconds.

The terminal device may perform a search for a target network (hereinafter, the search for the target network may also be referred to as a designated search network) based on a first network searching mechanism, where the first network searching mechanism is, for example, to start the designated search network at an optimal network searching time after the ex-warehouse time point, where the ex-warehouse time point may be understood as a time point when the terminal device detects the ex-warehouse. Certainly, the terminal device may also perform designated network searching based on a second network searching mechanism, where the second network searching mechanism refers to, for example, starting the designated network searching at the time of the network drop/system drop or at the optimal network searching time after the time of detecting the fence entering the basement scene.

For a first network searching mechanism; the optimal network searching time is any time between the historical minimum success time (recorded as minSus) and the historical maximum failure time (recorded as maxFail); minSus is later than maxFail. Taking a certain garage as an example, minSus is the moment when the terminal device tries to search for the target network at the earliest time and successfully accesses the target network after detecting moving out of the garage historically, and maxFail is the moment when the terminal device tries to search for the target network at the latest time and fails to access after detecting moving out of the garage historically. That is, the terminal device starts the designated network searching before minSus at a time after maxFail, and accesses to the target network as soon as possible. Therefore, the terminal device needs to determine the optimal network searching time, specifically, the optimal network searching time is determined in multiple ways, and the multiple determining ways of the optimal network searching time are introduced in the following first triggering strategy to fourth triggering strategy.

For the second network searching mechanism, the optimal network searching time is any time between the historical minimum success time (recorded as minSus) and the historical maximum failure time (recorded as maxFail); minSus is later than maxFail. minSus is the time when the terminal device tries to search for the target network earliest and successfully accesses the target network after the same network abnormal condition (the same as the network abnormal condition occurring in S901) has occurred historically, and maxFail is the time when the terminal device tries to search for the target network latest and fails to access after the same network abnormal condition has occurred historically.

Specifically, the optimal network searching time may be determined in various manners, and the first to fourth triggering strategies described below describe various determination manners of the optimal network searching time.

First trigger strategy

In the first trigger strategy, the terminal device can self-learn the optimal network searching time point, and the optimal network searching time point can be understood as that the terminal device triggers the designated network searching when waiting for reaching the optimal network searching time point after detecting the ex-warehouse point, so that the terminal device can access the high-standard network as soon as possible. And considering that different ground libraries correspond to different optimal network searching time points. Therefore, for each garage, the terminal device can self-learn an optimal network searching time point.

The following describes a process of the terminal device self-learning the optimal network searching time point, and refer to fig. 10, which is a schematic diagram of a first trigger strategy. In the first trigger strategy, a historical network recovery time is used, and is introduced first. Taking table 8 as an example, assuming that the terminal device learns the second ex-warehouse parameter as the best ex-warehouse parameter by itself, the average time of the four time differences (Δ 1e, Δ 1f, Δ 1g, Δ 1h) corresponding to the second ex-warehouse parameter is the historical network recovery time.

The following describes a process of self-learning the optimal network searching time point by the terminal device by taking a garage as an example. Therefore, each of the following self-learning processes is performed for the same garage, i.e., the garage. The first self-learning, the second self-learning, etc., refer to different self-learning, which may not be continuous in time.

Self-learning for the first time:

a user drives into a garage and network loss/system loss occurs. The terminal equipment detects a first ex-warehouse point, takes the first ex-warehouse point as a starting point and takes the historical network recovery time as an end point; or a preset time (e.g., 10s or 10ms after the historical network recovery time) after the historical network time is the end point. The terminal device determines a first intermediate point between the starting point and the end point, and equally divides L time intervals between the first intermediate point and the end point, wherein L is an integer greater than or equal to 2, such as L ═ 5. The L time intervals correspond to L trigger occasions, and then the terminal device triggers the first network search at the first trigger occasion (i.e., the first intermediate point). Assuming successful restoration of the network after the first intermediate point triggers the search, the first intermediate point is marked as the minimum successful attempt point (minSus).

Self-learning for the second time:

and the user drives the vehicle and enters the same garage again, and the network drop/system drop occurs again. The terminal device detects the second ex-warehouse point, the absolute time corresponding to the second ex-warehouse point is different from the absolute time corresponding to the first ex-warehouse point, the relative times may be the same or different, and the relative times may be as described above. A second intermediate point is determined between the second ex-warehouse point and minSus, i.e. the first intermediate point, and L time intervals (for example, L is 5) are equally divided between the second intermediate point and the historical network recovery time or a preset time (for example, the preset time is 10ms or 10s) before the historical network recovery time. The L time intervals correspond to L trigger occasions, and then the terminal device triggers the first network search at the first trigger occasion (i.e., the second intermediate point). If the triggering at the second intermediate point fails, the second intermediate point is recorded as a maximum failure attempt point (maxfail), then the terminal device triggers network search at a second triggering time (T in the figure), and if the network is successfully recovered, minSus is updated to a time (i.e., T) corresponding to the second triggering time, or to a time between the first intermediate point and T, for example, to an intermediate time between the first intermediate point and T.

Self-learning for the third time:

and the user drives the vehicle and enters the same garage again, and the network drop/system drop occurs again. When the terminal device detects a third ex-warehouse point, a third intermediate point is determined between maxfail (i.e., the second intermediate point) and updated minSus (i.e., a time T corresponding to the second trigger time), L time intervals are equally divided between the third intermediate point and the historical network recovery time or a preset time (for example, the preset time is 10ms or 10s) before the historical network recovery time, and network searching is triggered by adopting the same principle. And if the network is successfully recovered after the third intermediate point triggers the network searching, updating minSus to the third intermediate point. At this time, maxfail is updated to the second time point, and minSus is updated to the third intermediate point.

Assuming that the time difference between the updated maxfail (i.e., the second intermediate point) and the updated minSus (i.e., the third intermediate point) is less than the threshold, then maxfail and minSus need not be updated again. And the updated minSus is used as the optimal network searching time point learned by the terminal equipment.

In the subsequent process, after the terminal device detects the ex-warehouse point, the network searching is formulated based on L same time intervals, namely L trigger occasions, from the optimal network searching time to the historical network recovery time or a preset time (for example, the preset time is 10ms or 10s) before the historical network recovery time.

As shown in fig. 10, in the first self-learning, the terminal device starts the designated network search at the first intermediate point, in the second self-learning, the terminal device starts the designated network search at the second intermediate point, the time difference between the first intermediate point and the second intermediate point is large, and in the third self-learning, the terminal device starts the designated network search at the third intermediate point, and the difference between the third intermediate point and the second intermediate point becomes small. That is, as the number of times that the terminal device enters the garage increases, the time difference between two adjacent designated network searches is gradually shortened.

Second trigger strategy

Fig. 11 is a schematic flow chart of the second triggering strategy.

And S1100, the terminal equipment enters an underground garage.

S1101, after the terminal device detects the warehouse-out point, a timer is started to start timing.

And S1102, when the timer reaches the first Ttrigger, triggering the designated network searching.

Optionally, the first Ttrigger may be a default fixed value, such as a preset time after the ex-warehouse point; alternatively, the first Ttrigger may be an intermediate time between the historical network restoration time and the ex-warehouse point detected at S1101.

S1103, the terminal device determines whether to successfully recover the network, and if so, executes step 1104, and if not, executes step 1105.

And S1104, when the terminal device successfully recovers the network, setting a second Ttrrigger, where the second Ttrrigger is earlier than the first Ttrrigger. And the second Ttrigger is used for starting a timer when the terminal equipment detects that the terminal equipment is moved out of the garage next time and triggering the designated network searching when the timer reaches the second Ttrigger.

Since the terminal device successfully accesses the high-system network when the first Ttrigger triggers the designated network search, for an earlier access to the high-system network, the second Ttrigger may be a time before the first Ttrigger, that is, after the terminal device detects the ex-warehouse point, some designated network search may be triggered in advance with respect to the first Ttrigger. Alternatively, the second Ttrigger may be any time before the first Ttrigger, or the second Ttrigger may be an intermediate time between the first Ttrigger and the ex-warehouse point.

In the embodiment of the present application, step 1104 may not be executed, i.e., step 1104 is an optional step, so step 1104 is shown in a dotted line in fig. 11.

And S1105, when the terminal device does not successfully recover the network and the timer reaches a third Ttrigger, triggering the designated network searching again, wherein the third Ttrigger is later than the first Ttrigger.

Optionally, the third Ttrigger is a time after the first Ttrigger; alternatively, the third Ttrigger is an intermediate time between the first Ttrigger and the historical network restoration time.

Based on the principle of the second trigger policy, the terminal device may also self-learn the optimal network searching time point, as shown in fig. 12, which is an example of the terminal device self-learning the optimal network searching time point. Each self-learning process may be understood as a process in which the terminal device performs an outbound check and a designated search for the same garage. The first self-learning, the second self-learning, etc. may be discontinuous in time, such as the first self-learning occurring at month 1, am, the second self-learning occurring at month 1, am, etc.

Self-learning for the first time:

a user drives into a garage and network loss/system loss occurs. And when the terminal equipment detects the first ex-warehouse point, starting a timer, and triggering the appointed network searching when the timer reaches the first Ttrigger. Optionally, the first Ttrigger may be a default value, such as a preset time after the first ex-warehouse point; alternatively, the first Ttrigger may be an intermediate time between the historical network restoration time and the first ex-warehouse point. Assuming that the terminal device triggers the designated network searching and successfully recovers the network when the timer reaches the first Ttrigger, the following second self-learning process may be executed after the terminal device enters the garage next time.

Self-learning for the second time:

and the user drives the vehicle and enters the same garage again, and the network drop/system drop occurs again. And when the terminal equipment detects a second ex-warehouse point, starting a timer, and triggering the appointed network searching when the timer reaches a second Ttrigger. The second Ttrigger is earlier than the first Ttrigger. Alternatively, the second Ttrigger may be any time before the first Ttrigger, or the second Ttrigger may be an intermediate time between the first Ttrigger and the second ex-warehouse point. And if the timer reaches the second Ttrigger, the terminal equipment triggers the designated network searching but does not successfully recover the network, and executes a third self-learning process.

Self-learning for the third time:

and the user drives the vehicle and enters the same garage again, and the network drop/system drop occurs again. And when the terminal equipment detects the third ex-warehouse point, starting a timer, and triggering the appointed network searching when the timer reaches the third Ttrigger. The third Ttrigger is later than the second Ttrigger. Optionally, the third Ttrigger is a time after the second Ttrigger; alternatively, the third Ttrigger is an intermediate time between the second Ttrigger and the first Ttrigger.

And if the timer reaches the third Ttrigger, triggering the designated network searching and then successfully accessing the network, and the time difference between the third Ttrigger and the second Ttrigger is smaller than the threshold, determining the third Ttrigger as the best network searching time point self-learned by the terminal device.

As shown in fig. 12, in the first self-learning, the terminal device starts the designated search network at the first Ttrigger, in the second self-learning, the terminal device starts the designated search network at the second Ttrigger, the time difference between the first Ttrigger and the second Ttrigger is larger, and in the third self-learning, the terminal device starts the designated search network at the third Ttrigger, the difference between the third Ttrigger and the second Ttrigger becomes smaller, and it is seen that the time for starting the designated search network gradually converges to a smaller range, so the time for starting the designated search network determined by this way is more accurate. That is, as the number of times that the terminal device enters the garage increases, the time difference between two adjacent designated network searches is gradually shortened.

It should be noted that, in some embodiments, the terminal device may adopt any one of the first trigger policy and the second trigger policy, or, as shown in fig. 13, the terminal device determines whether the historical network recovery time length is less than a threshold, if so, uses the first trigger policy, and if not, uses the second trigger policy. And the historical network recovery time length is the time length between the ex-warehouse point and the historical network recovery time. This is because, if the historical network recovery duration is greater than the threshold, it indicates that the network recovery point is far away from the ex-warehouse point, and the range is large, and in order to quickly find the optimal network searching time point, the second Trigger policy (i.e., the manner of taking the intermediate time between the second Trigger and the first Trigger) is adopted to quickly locate the approximate range of the network searching time point. If the historical network recovery duration is smaller than the threshold, the network recovery point is closer to the ex-warehouse point and the range is smaller, and if a first trigger strategy (equally dividing the same time interval to trigger the network searching) is adopted, the network searching time point with fine granularity can be determined, namely, the accurate network searching time point can be obtained.

Example 4 non-geosyncline scenario

Non-local reservoir scenarios such as problem areas on formal routes in the foregoing. The embodiment introduces a network searching mode after network abnormality occurs to the terminal device in a non-ground-reservoir scene, which specifically includes identification of the non-ground-reservoir scene, a network searching process of the non-ground-reservoir scene, and the like.

4.1 identification of non-geosyncline scenes

Mode 1, the terminal device detects an entrance fence, and determines that the terminal device is in a non-ground-reservoir scene based on the fence.

In the mode 2, considering that the road is generally flat in the driving route, and the motion data (such as the attitude angle) does not change significantly in the driving process of the vehicle, it is possible to determine whether the terminal device is in a non-garage scene through the motion data. For example, on the driving route, the terminal device has a network abnormality, but the change of the motion data is determined to be small through the collected motion data (the driving route is relatively flat), and then the terminal device is determined to be in a non-ground-garage scene.

4.2 non-ground-reservoir scene network searching mode

Referring to fig. 14, a schematic flow chart of a network searching method provided in the embodiment of the present application is shown, where the flow of the method includes:

s1401, the terminal device determines that a network abnormality occurs.

S1402, the terminal device determines that the terminal device is in a non-ground library scene.

The implementation manner of S1402 may refer to the foregoing identification process of the non-geosyncline scene, and details are not repeated here.

S1403, the terminal device searches for and accesses the target network.

In the embodiment of the application, when the terminal device is located in a non-ground library scene, a network of a search target communication system is started at a specified time (namely, the optimal network searching time), a time interval exists between the specified time and a time point of the terminal device where a network abnormality occurs, and the specified time is a time point after the time point of the network abnormality. Wherein the time interval is greater than or equal to 5 seconds.

The terminal device can search and access the target network based on a second network searching mechanism, wherein the second network searching mechanism is that the terminal device starts appointed network searching at the best network searching time after the time of detecting the entering of the fence or the network drop/system drop time. Specifically, the terminal device has two trigger strategies to trigger the designated network searching, namely a third trigger strategy and a fourth trigger strategy.

Or when the terminal device determines that a network anomaly occurs, the terminal device does not need to determine whether the network anomaly is a non-basement scene, and directly starts the designated network searching at the optimal network searching time, wherein the optimal network searching time is after the network drop/system drop time or after the time of entering a non-basement fence is detected, and the determination mode of the optimal network searching time is referred to a third trigger strategy or a fourth trigger strategy in the following.

Third trigger strategy

Similar to the first trigger strategy, the terminal device learns the optimal network searching time point by self, the optimal network searching time point can be understood as the time when the terminal device loses the network or the system or the time when the terminal device enters the fence is detected and then waits for the optimal network searching time point to designate network searching, and the terminal device can access the high-system network as soon as possible.

Referring to fig. 15, a diagram of a third triggering strategy is shown. Fig. 15 shows a travel route including a 4G coverage area, a 2G/3G coverage area, and a 4G coverage area. Network abnormity occurs in the process from the 4G coverage area to the 2G/3G coverage area of the terminal equipment, and the network abnormity comprises network drop or system drop. And the terminal equipment recovers the network from the 2G/3G coverage area to the 4G coverage area.

Similar to the first trigger strategy, a third trigger strategy requires the use of a historical network restoration time. Taking the driving route shown in fig. 15 as an example, in the process of detecting the fence corresponding to the driving route, the terminal device records the time of dropping the network/system, and also records the time of recovering the network. Therefore, the terminal device may record at least one of the travel paths as the network restoration time. When there are a plurality of recorded network recovery times, the historical network recovery time may be an average time of the plurality of recorded network recovery times or an earliest time or a latest time of the plurality of recorded network recovery times.

The following describes a process of the terminal device self-learning the optimal network searching time by taking the driving route shown in fig. 15 as an example.

Self-learning for the first time:

when a user drives a vehicle to pass through the driving route of fig. 15, the terminal device is disconnected from the network/system, the terminal device detects a first network/system disconnection moment, the first network/system disconnection moment is taken as a starting point, and the historical network recovery moment is taken as an end point; or a preset time (e.g., 10s or 10ms after the historical network recovery time) after the historical network time is the end point. The terminal device determines a first intermediate point between the starting point and the end point, and equally divides L time intervals between the first intermediate point and the end point, wherein L is an integer greater than or equal to 2, such as L ═ 5. The L time intervals correspond to L trigger occasions, and then the terminal device triggers the first network search at the first trigger occasion (i.e., the first intermediate point). Assuming that the network is successfully restored after the first intermediate point triggers the search, the first intermediate point is called the minimum successful attempt point (minSus).

Self-learning for the second time:

the user drives the vehicle to pass through the driving route of fig. 15 again, the terminal device drops the network/system, the terminal device detects a second network/system dropping time, a second intermediate point is determined between the second network/system dropping time and minSus, namely the first intermediate point, and L time intervals are equally divided between the second intermediate point and the historical network recovery time or a preset time (for example, the preset time is 10ms or 10s) before the historical network recovery time. The L time intervals correspond to L trigger occasions, and then the terminal device triggers the first network search at the first trigger occasion (i.e., the second intermediate point).

If the triggering fails at the second intermediate point, the second intermediate point is referred to as a maximum failure test point (maxfail), then the terminal device triggers network search at a second triggering time (i.e. T in the figure), and if the network is successfully recovered, the minSus is updated to a time (i.e. T) corresponding to the second triggering time.

Self-learning for the third time:

the user drives the vehicle to pass through the driving route of fig. 15 again, the terminal device drops the network/system, the terminal device detects a third network/system dropping time, determines a third intermediate point between maxfail (i.e., the second intermediate point) and updated minSus (i.e., the time T corresponding to the second trigger time), equally divides L time intervals between the third intermediate point and the historical network recovery time or a preset time (for example, the preset time is 10ms or 10s) before the historical network recovery time, and triggers network searching by using the same principle. And if the network is successfully recovered after the third intermediate point triggers the network searching, updating minSus to the third intermediate point. At this time, maxfail is updated to the second time point, and minSus is updated to the third intermediate point.

Assuming that the time difference between the updated maxfail (i.e., the second intermediate point) and the updated minSus (i.e., the third intermediate point) is less than the threshold, then maxfail and minSus need not be updated again. And the updated minSus is used as the optimal network searching time point learned by the terminal equipment.

In the subsequent process, after detecting the network drop/system drop time, the terminal device equally divides L time intervals between the optimal network searching time point and the historical network recovery time or a preset time (for example, the preset time is 10ms or 10s) before the historical network recovery time, and triggers network searching by adopting the same principle.

Fourth trigger strategy

The terminal device in the fourth trigger strategy can also self-learn the optimal network searching time point. In the fourth trigger strategy, the process of self-learning the terminal device to the optimal network searching time point is described below. Referring to fig. 16, a diagram of a fourth triggering strategy is shown.

Self-learning for the first time:

when a user drives a vehicle to pass through the driving route shown in fig. 16, the terminal device generates a network drop/system drop, the terminal device detects a first network drop/system drop time, a timer is started, and when the timer reaches a first Ttrigger, designated network searching is triggered. Optionally, the first Ttrigger may be a default value, for example, a preset time after the network drop/system drop time; alternatively, the first Ttrigger may be an intermediate time between the historical network restoration time and the first dropped network/dropped network time. And if the terminal equipment triggers the designated network searching and successfully recovers the network when the timer reaches the first Ttrigger, executing the following second self-learning process. And if the timer reaches the first Ttrigger, the terminal device triggers the designated network searching and then does not successfully recover the network, and the following fourth self-learning process is executed.

Self-learning for the second time:

when the user drives the vehicle to pass through the driving route of fig. 16 again, the terminal device generates a network drop/system drop again, the terminal device detects a second network drop/system drop time, starts a timer, and triggers the designated network searching when the timer reaches a second Ttrigger. The second Ttrigger is earlier than the first Ttrigger. Alternatively, the second Ttrigger may be any time before the first Ttrigger, or the second Ttrigger may be an intermediate time between the first Ttrigger and the second network drop/system drop time. And if the timer reaches the second Ttrigger, the terminal equipment triggers the designated network searching but does not successfully recover the network, and executes a third self-learning process.

Self-learning for the third time:

when the user drives the vehicle to pass through the driving route of fig. 16 again, the terminal device generates a network drop/system drop again, the terminal device detects a third network drop/system drop time, starts a timer, and triggers the designated network searching when the timer reaches a third Ttrigger. The third Ttrigger is later than the second Ttrigger. Optionally, the third Ttrigger is a time after the second Ttrigger; alternatively, the third Ttrigger is an intermediate time between the second Ttrigger and the first Ttrigger. And if the timer reaches the third Ttrigger, triggering the designated network searching and then successfully accessing the network, and the time difference between the third Ttrigger and the second Ttrigger is smaller than the threshold, determining that the third Ttrigger is the best network searching time point.

Fourth self-learning:

when the user drives the vehicle to pass through the driving route of fig. 16 again, the terminal device generates network drop/system drop again, the terminal device detects a fourth network drop/system drop time, starts a timer, and when the timer reaches a fourth Ttrigger, the specified network searching is triggered. The fourth Ttrigger is later than the first Ttrigger. Optionally, the fourth Ttrigger may be any time after the first Ttrigger, or the fourth Ttrigger may be an intermediate time between the first Ttrigger and the historical network restoration time. And if the timer reaches the fourth Ttrigger, the terminal device triggers the designated network searching but fails to recover the network, and executes a fifth self-learning process.

Fifth self-learning:

when the user drives the vehicle to pass through the driving route of fig. 16 again, the terminal device generates network drop/system drop again, the terminal device detects the fifth network drop/system drop time, starts the timer, and triggers the designated network searching when the timer reaches the fifth Ttrigger. The fifth Ttrigger is later than the fourth Ttrigger. Optionally, the fifth Ttrigger is a time after the fourth Ttrigger; alternatively, the fifth Ttrigger is an intermediate time between the fourth Ttrigger and the historical network restoration time.

And if the timer reaches the fifth Ttrigger, triggering the designated network searching and then successfully accessing the network, and the time difference between the fifth Ttrigger and the fourth Ttrigger is smaller than the threshold, determining that the fifth Ttrigger is the optimal network searching time point.

In other embodiments, after a network drop or a system drop occurs, the terminal device may slow down, in this case, the terminal device may slow down, and may not successfully access the network until the optimal network searching time point, so that the terminal device may trigger the designated network searching when detecting that the signal strength transformation value of the serving cell and/or the neighboring cell is greater than the threshold value.

It should be noted that, in some embodiments, the terminal device may adopt any one of the third trigger policy and the fourth trigger policy, or, as shown in fig. 17, the terminal device determines whether the historical network recovery time length is less than a threshold, if so, uses the third trigger policy, and if not, uses the fourth trigger policy. The historical network recovery time length is the time length between the network disconnection/system disconnection time and the historical network recovery time. This is because, if the historical network recovery duration is greater than the threshold, it indicates that the network recovery point is far away from the ex-warehouse point, and the range is large, and in order to quickly find the optimal network searching time point, the fourth Trigger policy (i.e., the manner of taking the intermediate time between the second Trigger and the first Trigger) is adopted to quickly locate the approximate range of the network searching time point. If the historical network recovery duration is smaller than the threshold, the network recovery point is closer to the ex-warehouse point and the range is smaller, and if a third trigger strategy (equally dividing the same time interval to trigger the network searching) is adopted, the network searching time point with fine granularity can be determined, namely, the accurate network searching time point can be obtained.

In the above embodiment, as the learning times are increased, the difference between the two network searching time points (relative time points, for example, time points relative to network dropping or system dropping) is gradually reduced.

An example of one of the embodiments of the present application is described below. Fig. 18 is a schematic flow chart of a network searching method according to an embodiment of the present application. The method comprises the following steps:

s1801, the terminal device generates a network anomaly.

S1802, the terminal device judges whether the terminal device is in a ground library scene or a non-ground library scene.

S1803, when the terminal device determines that the terminal device is in the local warehouse scene, detecting whether the terminal device is out of the warehouse; if the ex-warehouse is detected, executing S1804; if it is detected that the library has not been taken out, execution continues with S1803.

In S1802, the target network may be directly searched without performing, that is, without making a scene judgment. Then S1803 is also an optional step.

And S1804, the terminal equipment searches and accesses the target network based on the first network searching mechanism.

S1805, the terminal device searches for and accesses the target network based on the second network searching mechanism.

If the terminal equipment is in a basement scene and the terminal equipment is in an idle state, searching for the network based on a first network searching mechanism, namely, the terminal equipment starts to search for the network of the target communication system at a third time point, wherein a second time interval exists between the third time point and a fourth time point, the fourth time point is the time point when the terminal equipment is taken out of the basement, and the third time point is the time point after the fourth time point; see in particular the introduction of the first web search mechanism.

If the terminal device is not in the basement scene and the terminal device is in the idle state, searching for the network based on the second network searching mechanism, that is, starting to search for the network of the target communication system at a first time point, where a first time interval exists between the first time point and a second time point, the second time point is a time point at which the terminal device has a network abnormality, and the first time point is a time point after the second time point, which is specifically referred to the introduction about the second network searching mechanism.

It should be noted that, in the embodiment of fig. 18, the execution sequence between S1801 and step S1802 is not limited, for example, the terminal device executes S1801 first and then executes S1802, that is, when a network anomaly occurs, scene detection is triggered; for another example, the terminal device first executes S1802 and then executes S1801, that is, the terminal device performs scene detection in real time, determines whether a network anomaly occurs when a basement scene is detected, and if so, executes step S1803. When a non-ground library scene is detected, whether a network anomaly occurs is judged, and if yes, step S1805 is executed.

Example 5

Referring to fig. 19, an exemplary structural diagram of a terminal device provided in the embodiment of the present application is shown. As shown in the figure, the terminal device comprises a sensor module, a modem module and a processing module. The sensor module includes various motion sensors, such as an accelerometer and a gyroscope, and is used for acquiring motion data. And the modem module is used for detecting the network or system drop of the terminal equipment and the search and access of a target network. The modem module may include one or more modems. The processing module is used for scene detection, ex-warehouse detection and the like. The processing module may include one or more processors, which may be application processors, central processing units, or the like.

Referring to fig. 20, a schematic flowchart of another network searching method provided in the embodiment of the present application is shown. As shown in fig. 20, the method includes:

s2001, the processing module generates a first instruction for instructing to search for the target network.

S2002, the processing module judges whether the current call scene is present.

One possible way is that the processing module may detect whether the current display interface is a call interface, and if so, determine that the current display interface is in a call scene, otherwise, determine that the current display interface is not in the call scene. Or, the processing module may detect whether the currently running application is a preset application, where the preset application includes a phone application, a wechat application, and other applications capable of performing a video or audio call. Specifically, the processing module may read an application package name of the currently running application, and determine whether the currently running application is a preset application through the application package name. Under the condition that the currently running application is determined to be a preset application, the terminal device detects whether a currently running process (process) in the currently running application is a call process; and if the call progress is the call progress, determining that the call is currently in the call scene, and otherwise, determining that the call is not currently in the call scene. Specifically, the terminal device can determine whether the currently running process is a call process by reading the process name.

And S2003, when the processing module determines that the current call scene is, storing a first instruction in a memory.

S2004, the processing module detects the end of the call.

In some embodiments, the processing module may detect the call scenario in real-time. One possible way is that when the processing module detects that the current display interface is not the call interface, it determines that the call is ended. Or, when the processing module detects that the preset application finishes running (for example, exits the application), it determines that the call is finished. Or, the processing module determines that the call is ended when detecting that the call process in the preset application is ended. The preset application comprises a telephone application, a WeChat application and other applications capable of carrying out video or audio call.

S2005, the processing module sends the first instruction in the memory to the modem module.

And S2006, the modem module searches a target network and accesses the target network after searching the target network.

The electronic device of the embodiment of the present application is described below. Fig. 21 shows a schematic structural diagram of the electronic device 100. The electronic device 100 may be the terminal device described above, or the components of the electronic device 100 and the components of the terminal device described above may be completely identical or not identical.

The following describes an embodiment specifically by taking the electronic device 100 as an example. It should be understood that the electronic device 100 shown in fig. 1 is merely an example, and that the electronic device 100 may have more or fewer components than shown in fig. 1, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.

The electronic device 100 may include: the mobile terminal includes a processor 110, an external memory interface 120, an internal memory 121, a Universal Serial Bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a button 190, a motor 191, an indicator 192, a camera 193, a display screen 194, a Subscriber Identity Module (SIM) card interface 195, and the like. The sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.

It is to be understood that the illustrated structure of the embodiment of the present invention does not specifically limit the electronic device 100. In other embodiments of the present application, electronic device 100 may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware. For a detailed structural description of the electronic device 100, please refer to the prior patent application: CN 201910430270.9.

The electronic device 100 shown in fig. 21 may correspond to the electronic device shown in fig. 19, where the processing module is the processor 100 in the electronic device 100, the modem module may be a modem (not shown) in the electronic device 100, may be integrated in the processor 110, or may be a device independent from the processor 110, and the sensor module may be the sensor module 180 in the electronic device 100.

In the embodiments provided in the present application, the method provided in the embodiments of the present application is described from the perspective of a terminal device (e.g., a mobile phone) as an execution subject. In order to implement the functions in the method provided by the embodiment of the present application, the terminal device may include a hardware structure and/or a software module, and implement the functions in the form of a hardware structure, a software module, or a hardware structure and a software module. Whether any of the above-described functions is implemented as a hardware structure, a software module, or a hardware structure plus a software module depends upon the particular application and design constraints imposed on the technical solution.

As used in the above embodiments, the terms "when …" or "after …" may be interpreted to mean "if …" or "after …" or "in response to determination …" or "in response to detection …", depending on the context. Similarly, depending on the context, the phrase "at the time of determination …" or "if (a stated condition or event) is detected" may be interpreted to mean "if the determination …" or "in response to the determination …" or "upon detection (a stated condition or event)" or "in response to detection (a stated condition or event)". In addition, in the above-described embodiments, relational terms such as first and second are used to distinguish one entity from another entity without limiting any actual relationship or order between the entities.

In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others. The aspects of the above embodiments may all be used in combination without conflict.

It is noted that a portion of this patent application contains material which is subject to copyright protection. The copyright owner reserves the copyright rights whatsoever, except for making copies of the patent files or recorded patent document contents of the patent office.

60页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:资源预留方法、装置及终端

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类