CN106550423A - A kind of access point management method and terminal - Google Patents

A kind of access point management method and terminal Download PDF

Info

Publication number
CN106550423A
CN106550423A CN201610974464.1A CN201610974464A CN106550423A CN 106550423 A CN106550423 A CN 106550423A CN 201610974464 A CN201610974464 A CN 201610974464A CN 106550423 A CN106550423 A CN 106550423A
Authority
CN
China
Prior art keywords
access point
access
inventory
terminal
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610974464.1A
Other languages
Chinese (zh)
Inventor
李海泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610974464.1A priority Critical patent/CN106550423A/en
Publication of CN106550423A publication Critical patent/CN106550423A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/17Selecting a data network PoA [Point of Attachment]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A kind of access point management method and terminal are embodiments provided, methods described includes:The access point inventory in terminal is obtained, N number of access point that described access point inventory connected comprising the terminal, each access point correspondence averagely access duration and access number of times, and the N is the integer more than 1;Determine M target access in N number of access point, wherein, the average access duration of each target access is less than the first predetermined threshold value and accesses number of times and is less than the second predetermined threshold value, and the M is the integer less than or equal to the N;At least one of described M target access is removed from described access point inventory.Operation can be purged to the access point that terminal connected by the embodiment of the present invention, so as to save the memory headroom of terminal.

Description

A kind of access point management method and terminal
Technical field
The present invention relates to Internet technical field, and in particular to a kind of access point management method and terminal.
Background technology
With the fast development of information technology, terminal (such as mobile phone, panel computer etc.) is used and is increasingly popularized, Yong Hushang Net mode also increasingly enriches, and user can lead to Wireless Fidelity (Wireless-Fidelity, Wi-Fi) connection online.At present, When terminal needs to carry out Wi-Fi connection, Wi-Fi connection request can be initiated, so as to carry out web search, often in search To multiple access points in choose before the access point that connected carry out trial connection.But, due to the free access point for preserving Being likely to be dynamic password causes connection failure, also has some access points only using once or reusing, and causes to preserve Excessive Wi-Fi Hotspot, takes more internal memory.
The content of the invention
A kind of access point management method and terminal are embodiments provided, the access point that can connect to terminal is carried out Clear operation, so as to save the memory headroom of terminal.
Embodiment of the present invention first aspect provides a kind of access point management method, including:
The access point inventory in terminal is obtained, described access point inventory includes N number of access point that the terminal connected, often One access point correspondence is average to be accessed duration and accesses number of times, and the N is the integer more than 1;
Determine M target access in N number of access point, wherein, the average access of each target access Duration is less than the first predetermined threshold value and accesses number of times and is less than the second predetermined threshold value, and the M is the integer less than or equal to the N;
At least one of described M target access is removed from described access point inventory.
Embodiment of the present invention second aspect provides a kind of terminal, including:
Acquiring unit, for obtaining the access point inventory in terminal, described access point inventory connected comprising the terminal N number of access point, each access point correspondence is average to be accessed duration and accesses number of times, and the N is the integer more than 1;
First determining unit, for determining M target access in N number of access point, wherein, each target The average access duration of access point be less than the first predetermined threshold value and access number of times be less than the second predetermined threshold value, the M be less than or Equal to the integer of the N;
Clearing cell, at least one of described M target access is removed from described access point inventory.
The embodiment of the present invention third aspect provides a kind of terminal, including:
Processor and memorizer;Wherein, the processor is by calling code in the memorizer or instruction to perform The some or all of step of the method described by first aspect.
Implement the embodiment of the present invention, have the advantages that:
As can be seen that the embodiment of the present invention, obtains the access point inventory in terminal, the access point inventory connects comprising terminal The N number of access point crossed, each access point correspondence is average to be accessed duration and accesses number of times, and N is the integer more than 1, determines N number of access M target access in point, wherein, the average access duration of each target access is less than the first predetermined threshold value and accesses secondary Less than the second predetermined threshold value, M is the integer less than or equal to N to number, remove from access point inventory in M target access to It is few one.So as to the memory headroom of terminal after the access point in access point inventory is removed, can be saved.
Description of the drawings
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to making needed for embodiment description Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for ability For the those of ordinary skill of domain, on the premise of not paying creative work, can be attached to obtain others according to these accompanying drawings Figure.
Fig. 1 is a kind of first embodiment schematic flow sheet of access point management method provided in an embodiment of the present invention;
Fig. 2 is a kind of second embodiment schematic flow sheet of access point management method provided in an embodiment of the present invention;
Fig. 3 is a kind of 3rd embodiment schematic flow sheet of access point management method provided in an embodiment of the present invention;
Fig. 4 a are a kind of first embodiment structural representations of terminal provided in an embodiment of the present invention;
Fig. 4 b are the structural representations of the clearing cell of the terminal described by Fig. 4 a provided in an embodiment of the present invention;
Fig. 4 c are the another structural representations of the clearing cell of the terminal described by Fig. 4 a provided in an embodiment of the present invention;
Fig. 4 d are the another structural representations of the terminal described by Fig. 4 a provided in an embodiment of the present invention;
Fig. 4 e are the another structural representations of the terminal described by Fig. 4 a provided in an embodiment of the present invention;
Fig. 5 is a kind of second embodiment structural representation of terminal provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than the embodiment of whole.Based on this Embodiment in bright, the every other enforcement obtained under the premise of creative work is not made by those of ordinary skill in the art Example, belongs to the scope of protection of the invention.
Term " first ", " second ", " the 3rd " in description and claims of this specification and the accompanying drawing and " Four " it is etc. for distinguishing different objects, rather than for describing particular order.Additionally, term " comprising " and " having " and it Any deformation, it is intended that cover and non-exclusive include.For example contain the process of series of steps or unit, method, be System, product or equipment are not limited to the step of listing or unit, but alternatively also include the step of not listing or list Unit, or alternatively also include other intrinsic for these processes, method, product or equipment step or unit.
Referenced herein " embodiment " is it is meant that the special characteristic, structure or the characteristic that describe can be wrapped in conjunction with the embodiments It is contained at least one embodiment of the present invention.It is identical that each position in the description shows that the phrase might not each mean Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly it is understood by, embodiment described herein can be combined with other embodiments.
Terminal described by the embodiment of the present invention can include smart mobile phone (such as Android phone, iOS mobile phones, Windows Phone mobile phones etc.), panel computer, palm PC, notebook computer, mobile internet device (MID, Mobile Internet Devices) or Wearable etc., above-mentioned is only citing, and non exhaustive, including but not limited to above-mentioned terminal.
Fig. 1 is referred to, is that a kind of first embodiment flow process of access point management method provided in an embodiment of the present invention is illustrated Figure.Access point management method described in the present embodiment, comprises the following steps:
101st, the access point inventory in terminal, N number of access that described access point inventory connected comprising the terminal are obtained Point, each access point correspondence is average to be accessed duration and accesses number of times, and the N is the integer more than 1.
Wherein, it is generally the case that user connects different Wi-Fi where difference, often connect a Wi-Fi, then may be used Retain an access point, by the access point and its corresponding password preserve in the terminal, so as to, in next connection procedure, can Network connection is carried out directly.Different access points can be saved as access point inventory by terminal, and the access point inventory can preserve terminal The all access points for connecting, or part access point.Further, when each access point can record its average access Long and access number of times, the number of times that accesses of a certain access point can be the total degree for accessing the access point, and a certain access point averagely connects Entering duration can be by the ratio of the total turn-on time and access number of times for accessing the access point.Only included with access point inventory in the present embodiment The access point that N number of terminal connected is illustrated, wherein, N is the integer more than 1.
Alternatively, step 101 can be comprised the steps of:
Current location is obtained, the access point being associated with the current location is generated into access point inventory.For example, a certain user Jing often goes on business, and in different countries, different areas, the Wi-Fi of connection are different, thus, the access point for being connected is inevitable Difference, thus, access point inventory can be determined according to customer location, thus, different access point inventories can be obtained.
102nd, determine M target access in N number of access point, wherein, each target access it is average Access duration to be less than the first predetermined threshold value and access number of times less than the second predetermined threshold value, the M is whole less than or equal to the N Number;
Wherein, for a user, in terminal, those seldom connect, and the access point of dynamic password often needs to reject , such access point often has following feature, and the average duration that accesses is shorter, and access number of times is less, thus, first can be arranged pre- If threshold value and the second predetermined threshold value, first predetermined threshold value and the second predetermined threshold value can be voluntarily set by system default or user Put.Terminal can to N number of access point in each access point detect whether detect the average access duration of each access point Less than the first predetermined threshold value, which accesses whether number of times is less than the second predetermined threshold value, if meeting the access point of two features, can It is marked as target access.There is M in assuming N number of access point for target access, certainly, the M is less than or equal to N's Positive integer.
103rd, at least one of described M target access is removed from described access point inventory.
Wherein, terminal can remove at least one target access from access point inventory, remove at least one mesh After tag splice access point, the available memory space of terminal can increase, and certainly, can also lift the networking efficiency of the terminal and reduce terminal Power consumption.Specifically, it is assumed that before the embodiment of the present invention is not carried out, terminal can search for 5 access points, wherein, 3 be In access point inventory (access point of 1 static password, the access point of 2 dynamic passwords), then, during networking, can be with 3 access points in access point inventory carry out trial connection, due to the access for having 2 dynamic passwords in the access point inventory Point, thus, it may be 3 times that connection number of times is the worst, thus, networking efficiency is reduced, meanwhile, also increase the power consumption of terminal.And The access point of 2 dynamic passwords after the embodiment of the present invention is performed, then can be rejected, then only needs to carry out 1 company of trial Connect, just can network, thus, networking efficiency is improved, meanwhile, reduce the power consumption of terminal.
Alternatively, step 103 can be comprised the steps of:
31), receive for removing the user instruction of target access j, wherein, target access j is the M mesh One in tag splice access point;
32) target access j is removed from described access point inventory,.
Wherein, user can choose one from M target access, then, carry out deletion action to which.For example, at end The display interface at end can show above-mentioned M target access, and user can select one from the M target access, generate one The individual user instruction for removing the target access, removes the target access from access point inventory.
Alternatively, step 103 can be comprised the steps of:
33), determine that usage frequency is less than the 3rd predetermined threshold value in preset time period from the M target access K target access, the K are the integer less than or equal to the M;
34) the K target access is removed from described access point inventory,.
Wherein, above-mentioned preset time period, can start the certain time period in current time for terminal from the date of production.In advance If the time period can be in 1 month of current time.3rd predetermined threshold value can be that system default or user are voluntarily arranged.Step In rapid 33, it may be determined that in the preset time period in M target access, usage frequency is connect less than K target of the 3rd predetermined threshold value Access point, wherein, K is the integer less than or equal to M.For example, within certain time, many only expendable accesses have been accessed Point, then can reject the part access point from access point inventory.
As can be seen that the embodiment of the present invention, obtains the access point inventory in terminal, the access point inventory connects comprising terminal The N number of access point crossed, each access point correspondence is average to be accessed duration and accesses number of times, and N is the integer more than 1, determines N number of access M target access in point, wherein, the average access duration of each target access is less than the first predetermined threshold value and accesses secondary Less than the second predetermined threshold value, M is the integer less than or equal to the N to number, is removed in M target access from access point inventory At least one.So as to the memory headroom of terminal after the access point in access point inventory is removed, can be saved.
Consistent with the abovely, Fig. 2 is referred to, is that the second of a kind of access point management method provided in an embodiment of the present invention is real Apply a schematic flow sheet.Access point management method described in the present embodiment, comprises the following steps:
201st, the access point inventory in terminal, N number of access that described access point inventory connected comprising the terminal are obtained Point, each access point correspondence is average to be accessed duration and accesses number of times, and the N is the integer more than 1;
202nd, determine M target access in N number of access point, wherein, each target access it is average Access duration to be less than the first predetermined threshold value and access number of times less than the second predetermined threshold value, the M is whole less than or equal to the N Number;
203rd, whether the memory size shared by all access points that detection described access point inventory is included is pre- more than the 4th If threshold value.
Wherein, it is generally the case that access point inventory need not remove access point the moment, but need in certain special time Access point is removed, or, the part access point in access point inventory is removed under user instruction.Therefore, in the embodiment of the present invention, One trigger condition for removing the access point in access point inventory can be set, for example, the 4th predetermined threshold value is set, should 4th predetermined threshold value can be that system default or user are voluntarily arranged.Multiple access points, each access are included in access point inventory Point occupies certain memory headroom.Memory size in access point inventory shared by all access points is more than the 4th default threshold During value, then step 204 is can perform, if the memory size in access point inventory shared by all access points is less than or equal to the 4th During predetermined threshold value, then can not execution step 204 for the time being, and detect in access point inventory later shared by all access points When memory size is more than four predetermined threshold values, ability execution step 204.
204th, the memory size shared by all access points included in described access point inventory is default more than the described 4th During threshold value, at least one of described M target access is removed from described access point inventory.
Wherein, above-mentioned steps 201-202 and step 204 refer to corresponding in the access point management method described by Fig. 1 Step 101- step 103.
As can be seen that in the embodiments of the present invention, shared by all access points that can be included in access point inventory in When size is deposited more than four predetermined threshold values, remove at least one of M target access from access point inventory.So as to can When the memory size of all access points included in access point inventory is more than a certain threshold value, then from removing portion in access point inventory Tap access point, thus, after the number of times for removing the access point in access point inventory can be reduced, meanwhile, it is clear access point is removed After access point in list, the memory headroom of terminal can be saved.
Consistent with the abovely, Fig. 3 is referred to, is that the 3rd of a kind of access point management method provided in an embodiment of the present invention is real Apply a schematic flow sheet.Access point management method described in the present embodiment, comprises the following steps:
301st, when the password of the access point i connected by terminal is static password, record accesses the access of described access point i Time point, wherein, described access point i is that the N number of of being connected with the terminal of including of the access point inventory in the terminal is connect One of access point, the N are positive integer.
Wherein, after terminal with a certain access point i successful connections, if the password of access point i is that static password is (i.e. close Code keeps constant) when, the turn-on time point for accessing access point i is can record, access point i is in access point inventory, Access point inventory can include N number of access point, and access point i is then in N number of access point.Certainly, if the password of access point i For dynamic password (be this access access point i be using password A, it is upper once access access point i when using password B, A and B is not When together), the embodiment of the present invention is not performed.
302nd, after the connection between disconnection and described access point i, record point turn-off time of described access point i.
Wherein, after the connection between terminal disconnection and access point i, then point turn-off time of access point i is can record, Certainly, once disconnection between correspondence one access duration adjacent with the access is once accessed, for example, access point i is accessed, is disconnected Comprising an access duration between access point i, that is, access the turn-on time length of access point i.Due to terminal can be it is mobile, And access point then has certain radiation scope, if terminal is not in the radiation scope, the connection between terminal and access point is Disconnect.
303rd, according to the turn-on time point and turn-off time point, determine the access duration of described access point i, update The access number of times of described access point i, and determine the average access duration of described access point i.
Wherein, terminal can calculate access duration, i.e. point turn-off time using point turn-off time and turn-on time point and deduct and connect The absolute value of the difference of angle of incidence point.If connecting above-mentioned access point i in the past, it is assumed that the access of access point i before step 301 Number of times is K time, then, after execution step 303, the access number of times of access point i is K+1.During the average access of a certain access point Length may be defined as ratio of total turn-on time length with the access number of times for accessing the access point for accessing the access point.Thus, terminal Only need to obtain the access number of times of total turn-on time length of a certain access point and the access point, just can determine and access the access The average access duration of point.
304th, described access point inventory is obtained, described access point inventory includes each access point pair in N number of access point Duration should averagely be accessed and number of times is accessed.
305th, determine M target access in N number of access point, wherein, each target access it is average Access duration to be less than the first predetermined threshold value and access number of times less than the second predetermined threshold value, the M is whole less than or equal to the N Number;
306th, at least one of described M target access is removed from described access point inventory.
Wherein, above-mentioned steps 304- step 306 refers to the step of correspondence in the access point management method described by Fig. 1 101- steps 103.
Alternatively, during the embodiment of the present invention is performed, if terminal accesses a certain access point, the access point is not connecing In access point inventory, then the access point can be added in access point inventory.
As can be seen that by the embodiments of the present invention, can be used to record the access of a certain access point in access point inventory Number of times and average access duration, thus, the access point inventory can be updated after the connection with a certain access point is disconnected every time, It is, of course, also possible to M target access in determining N number of access point, wherein, the average access duration of each target access is little The second predetermined threshold value is less than in the first predetermined threshold value and access number of times, M is the integer less than or equal to N, from access point inventory Remove at least one of M target access.So as to, not only it is capable of achieving the access point to being connected with terminal and is managed, And the memory headroom of terminal after the access point in access point inventory is removed, can be saved.
Consistent with the abovely, it is below to implement the device of above-mentioned access point management method, specific as follows:
Fig. 4 a are referred to, is a kind of first embodiment structural representation of terminal provided in an embodiment of the present invention.This enforcement Terminal described in example, including:Acquiring unit 401, the first determining unit 402 and clearing cell 403, it is specific as follows:
Acquiring unit 401, for obtaining the access point inventory in terminal, described access point inventory connects comprising the terminal The N number of access point crossed, each access point correspondence is average to be accessed duration and accesses number of times, and the N is the integer more than 1;
First determining unit 402, for determining M target access in N number of access point, wherein, it is each described The average access duration of target access is less than the first predetermined threshold value and accesses number of times and is less than the second predetermined threshold value, and the M is little In or equal to the integer of the N;
Clearing cell 403, at least one of described M target access is removed from described access point inventory.
Alternatively, such as Fig. 4 b, the clearing cell 403 of the terminal described in Fig. 4 a may include:Receiver module 4031 and One removes module 4032, specific as follows:
Receiver module, is used for the user instruction for removing target access j for receiving, wherein, target access j is One in the M target access;
First removes module, for target access j is removed from described access point inventory.
Alternatively, such as Fig. 4 c, the clearing cell 403 of the terminal described in Fig. 4 a may include:Determining module 4033 and Two remove module 4034, specific as follows:
Determining module 4033, for determining that usage frequency is less than in preset time period from the M target access K target access of the 3rd predetermined threshold value, the K are the integer less than or equal to the M;
Second removes module 4034, for the K target access is removed from described access point inventory.
Alternatively, as shown in figure 4d, Fig. 4 d are a kind of modification structures of the terminal described by Fig. 4 a, compared with Fig. 4 a, its Also include:Detector unit 404, it is specific as follows:
Detector unit 404, the M target for determining in N number of access point in first determining unit 402 are accessed After point, whether the memory size shared by all access points that detection described access point inventory is included is more than the 4th default threshold Value, is that internal memory shared by all access points for including of described access point inventory is big in the testing result of the detector unit 404 It is little more than four predetermined threshold value when, the M target is removed from described access point inventory by the clearing cell 403 and is connect Access point.
Alternatively, as shown in fig 4e, Fig. 4 e are a kind of modification structures of the terminal described by Fig. 4 a, compared with Fig. 4 a, its Also include:Recording unit 405 and the second determining unit 406, it is specific as follows:
Recording unit 405, for before the access point inventory that the acquiring unit 401 obtains in terminal, at the end When the password of the connected access point i in end is static password, record accesses the turn-on time point of described access point i, wherein, it is described Access point i is in N number of access point;
The recording unit 405 is additionally operable to:
After connection between disconnection and described access point i, point turn-off time of described access point is recorded;
Second determining unit 406, for according to the turn-on time point and turn-off time point, determining described access point The access duration of i, updates the access number of times of described access point i, and determines the average access duration of described access point i.
As can be seen that the terminal described by the embodiment of the present invention can obtain the access point inventory in the terminal, the access point N number of access point that inventory connected comprising terminal, each access point correspondence is average to be accessed duration and accesses number of times, and N is more than 1 Integer, determines M target access in N number of access point, wherein, the average access duration of each target access is less than first Predetermined threshold value and access number of times are less than the second predetermined threshold value, and M is the integer less than or equal to N, and M is removed from access point inventory At least one of target access.So as to the internal memory of terminal after the access point in access point inventory is removed, can be saved Space.
Consistent with the abovely, Fig. 5 is referred to, is that a kind of second embodiment structure of terminal provided in an embodiment of the present invention is shown It is intended to.Terminal described in the present embodiment, including:At least one input equipment 1000;At least one outut device 2000;Extremely A few processor 3000, such as CPU;With memorizer 4000, above-mentioned input equipment 1000, outut device 2000, processor 3000 and memorizer 4000 connected by bus 5000.
Wherein, above-mentioned input equipment 1000 concretely contact panel, physical button or mouse.
The concretely display screen of above-mentioned outut device 2000.
Above-mentioned memorizer 4000 can be high-speed RAM memorizer, alternatively nonvolatile storage (non-volatile Memory), such as disk memory.Above-mentioned memorizer 4000 is used to store batch processing code, above-mentioned input equipment 1000, defeated Go out the program code stored during equipment 2000 and processor 3000 are used to call memorizer 4000, perform following operation:
Above-mentioned processor 3000, is used for:
The access point inventory in terminal is obtained, described access point inventory includes N number of access point that the terminal connected, often One access point correspondence is average to be accessed duration and accesses number of times, and the N is the integer more than 1;
Determine M target access in N number of access point, wherein, the average access of each target access Duration is less than the first predetermined threshold value and accesses number of times and is less than the second predetermined threshold value, and the M is the integer less than or equal to the N;
At least one of described M target access is removed from described access point inventory.
Alternatively, above-mentioned processor 3000 is removed in the M target access from described access point inventory at least One, including:
Receive for removing the user instruction of target access j, wherein, target access j is connect for the M target One in access point;
Target access j is removed from described access point inventory.
Alternatively, above-mentioned processor 3000 is removed in the M target access from described access point inventory at least One, including:
Usage frequency K less than the 3rd predetermined threshold value in preset time period is determined from the M target access Target access, the K are the integer less than or equal to the M;
The K target access is removed from described access point inventory.
Alternatively, above-mentioned processor 3000 is after the M target access determined in N number of access point, with And before the M target access is removed from described access point inventory, also particularly useful for:
Whether the memory size shared by all access points that detection described access point inventory is included is more than the 4th default threshold Value, when the memory size shared by all access points that described access point inventory is included is more than four predetermined threshold value, holds The M target access is removed from described access point inventory described in row.
Alternatively, before above-mentioned processor 3000 obtains the access point inventory in terminal, also particularly useful for:
When the password of the access point i connected by the terminal is static password, record accesses the access of described access point i Time point, wherein, described access point i is in N number of access point;
After connection between disconnection and described access point i, point turn-off time of described access point is recorded;
According to the turn-on time point and turn-off time point, the access duration of described access point i is determined, update described The access number of times of access point i, and determine the average access duration of described access point i.
The embodiment of the present invention also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium can be stored with journey Sequence, includes the part or all of step of any access point management method described in said method embodiment during the program performing Suddenly.
Although here combines each embodiment, and invention has been described, however, implementing the present invention for required protection During, those skilled in the art are by checking the accompanying drawing, disclosure and appended claims, it will be appreciated that and it is real Other changes of the existing open embodiment.In the claims, " include " that (comprising) word is not excluded for other compositions Part or step, "a" or "an" are not excluded for multiple situations.Single processor or other units can realize claim In some functions enumerating.Mutually different has been recited in mutually different dependent some measures, it is not intended that these are arranged Apply to combine and produce good effect.
It will be understood by those skilled in the art that embodiments of the invention can be provided as method, device (equipment), or computer journey Sequence product.Therefore, the present invention can adopt complete hardware embodiment, complete software embodiment or with reference to software and hardware in terms of The form of embodiment.And, the present invention can be using the calculating for wherein including computer usable program code at one or more The computer program implemented in machine usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.) The form of product.Computer program is stored/distributed in suitable medium, is provided or as the one of hardware together with other hardware Part, it would however also be possible to employ other distribution forms, such as passes through Internet or other wired or wireless telecommunication systems.
The present invention be with reference to the embodiment of the present invention method, device (equipment) and computer program flow chart with/ Or block diagram is describing.It should be understood that can by each flow process in computer program instructions flowchart and/or block diagram and/ Or the combination of square frame and flow chart and/or flow process and/or square frame in block diagram.These computer program instructions can be provided Processor to general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is producing one Individual machine so that produced for realizing by the instruction of computer or the computing device of other programmable data processing devices The device of the function of specifying in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in and can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory is produced to be included referring to Make the manufacture of device, the command device realize in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or The function of specifying in multiple square frames.
These computer program instructions can be also loaded in computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented process, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow process of flow chart or multiple flow processs and/or block diagram one The step of function of specifying in individual square frame or multiple square frames.
Although with reference to specific features and embodiment, invention has been described, it is clear that, without departing from this In the case of bright spirit and scope, various modifications and combinations can be carried out to which.Correspondingly, the specification and drawings are only institute The exemplary illustration of the present invention defined by attached claim, and be considered as cover in the scope of the invention any and all and repair Change, change, combining or equivalent.Obviously, those skilled in the art the present invention can be carried out it is various change and modification and not Depart from the spirit and scope of the present invention.So, if the present invention these modification and modification belong to the claims in the present invention and its Within the scope of equivalent technologies, then the present invention is also intended to comprising these changes and modification.

Claims (11)

1. a kind of access point management method, it is characterised in that include:
Obtain the access point inventory in terminal, N number of access point that described access point inventory connected comprising the terminal, Mei Yijie Access point correspondence is average to be accessed duration and accesses number of times, and the N is the integer more than 1;
Determine M target access in N number of access point, wherein, the average access duration of each target access The second predetermined threshold value is less than less than the first predetermined threshold value and access number of times, the M is the integer less than or equal to the N;
At least one of described M target access is removed from described access point inventory.
2. method according to claim 1, it is characterised in that the M mesh is removed in the inventory from described access point At least one of tag splice access point, including:
Receive for removing the user instruction of target access j, wherein, target access j is the M target access In one;
Target access j is removed from described access point inventory.
3. method according to claim 1, it is characterised in that the M mesh is removed in the inventory from described access point At least one of tag splice access point, including:
K target of the usage frequency less than the 3rd predetermined threshold value in preset time period is determined from the M target access Access point, the K are the integer less than or equal to the M;
The K target access is removed from described access point inventory.
4. the method according to any one of claims 1 to 3, it is characterised in that determine N number of access point described After M target access, and before the M target access is removed in the inventory from described access point, the side Method also includes:
Whether the memory size shared by all access points that detection described access point inventory is included is more than the 4th predetermined threshold value, When the memory size shared by all access points that described access point inventory is included is more than four predetermined threshold value, perform described The M target access is removed from described access point inventory.
5. the method according to any one of claims 1 to 3, it is characterised in that the access point inventory in the acquisition terminal Before, methods described also includes:
When the password of the access point i connected by the terminal is static password, record accesses the turn-on time of described access point i Point, wherein, described access point i is in N number of access point;
After connection between disconnection and described access point i, point turn-off time of described access point is recorded;
According to the turn-on time point and turn-off time point, the access duration of described access point i is determined, update the access The access number of times of point i, and determine the average access duration of described access point i.
6. a kind of terminal, it is characterised in that include:
Acquiring unit, for obtaining the access point inventory in terminal, described access point inventory comprising the terminal connected it is N number of Access point, each access point correspondence is average to be accessed duration and accesses number of times, and the N is the integer more than 1;
First determining unit, for determining M target access in N number of access point, wherein, each target is accessed Point average access duration be less than the first predetermined threshold value and access number of times be less than the second predetermined threshold value, the M be less than or equal to The integer of the N;
Clearing cell, at least one of described M target access is removed from described access point inventory.
7. terminal according to claim 6, it is characterised in that the clearing cell includes:
Receiver module, is used for the user instruction for removing target access j for receiving, wherein, target access j is described One in M target access;
First removes module, for target access j is removed from described access point inventory.
8. terminal according to claim 6, it is characterised in that the clearing cell includes:
Determining module, for determining that from the M target access usage frequency is default less than the 3rd in preset time period K target access of threshold value, the K are the integer less than or equal to the M;
Second removes module, for the K target access is removed from described access point inventory.
9. the terminal according to any one of claim 6 to 8, it is characterised in that the terminal also includes:
Detector unit, for, after the M target access that first determining unit determines in N number of access point, examining The memory size shared by all access points that described access point inventory is included is surveyed whether more than the 4th predetermined threshold value, in the inspection The testing result for surveying unit is that the memory size shared by all access points that described access point inventory is included is more than the described 4th During predetermined threshold value, the M target access is removed from described access point inventory by the clearing cell.
10. the terminal according to any one of claim 6 to 8, it is characterised in that the terminal also includes:
Recording unit, for, before the access point inventory that the acquiring unit obtains in terminal, being connected in the terminal When the password of access point i is static password, record accesses the turn-on time point of described access point i, wherein, described access point i is One in N number of access point;
The recording unit is additionally operable to:
After connection between disconnection and described access point i, point turn-off time of described access point is recorded;
Second determining unit, for according to the turn-on time point and turn-off time point, determining the access of described access point i Duration, updates the access number of times of described access point i, and determines the average access duration of described access point i.
11. a kind of terminals, it is characterised in that include:
Processor and memorizer;Wherein, the processor is by calling code in the memorizer or instruction to perform such as power Profit requires the method described in 1 to 5 any one.
CN201610974464.1A 2016-11-04 2016-11-04 A kind of access point management method and terminal Pending CN106550423A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610974464.1A CN106550423A (en) 2016-11-04 2016-11-04 A kind of access point management method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610974464.1A CN106550423A (en) 2016-11-04 2016-11-04 A kind of access point management method and terminal

Publications (1)

Publication Number Publication Date
CN106550423A true CN106550423A (en) 2017-03-29

Family

ID=58394014

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610974464.1A Pending CN106550423A (en) 2016-11-04 2016-11-04 A kind of access point management method and terminal

Country Status (1)

Country Link
CN (1) CN106550423A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108882229A (en) * 2018-05-31 2018-11-23 上海连尚网络科技有限公司 Information processing method and device
CN110572861A (en) * 2018-06-05 2019-12-13 佛山市顺德区美的电热电器制造有限公司 information processing method, information processing apparatus, storage medium, and server
CN112261677A (en) * 2020-10-15 2021-01-22 北京小米移动软件有限公司 Hotspot information processing method and device, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103096423A (en) * 2011-11-04 2013-05-08 宏碁股份有限公司 Method helping users to clear up wireless access point lists and mobile device
CN104394263A (en) * 2014-09-30 2015-03-04 小米科技有限责任公司 Accessing point list displaying method and device
CN105101354A (en) * 2015-08-18 2015-11-25 小米科技有限责任公司 Wireless network connection method and device
CN105491642A (en) * 2015-11-25 2016-04-13 小米科技有限责任公司 Network connection method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103096423A (en) * 2011-11-04 2013-05-08 宏碁股份有限公司 Method helping users to clear up wireless access point lists and mobile device
CN104394263A (en) * 2014-09-30 2015-03-04 小米科技有限责任公司 Accessing point list displaying method and device
CN105101354A (en) * 2015-08-18 2015-11-25 小米科技有限责任公司 Wireless network connection method and device
CN105491642A (en) * 2015-11-25 2016-04-13 小米科技有限责任公司 Network connection method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108882229A (en) * 2018-05-31 2018-11-23 上海连尚网络科技有限公司 Information processing method and device
CN110572861A (en) * 2018-06-05 2019-12-13 佛山市顺德区美的电热电器制造有限公司 information processing method, information processing apparatus, storage medium, and server
CN110572861B (en) * 2018-06-05 2023-03-28 佛山市顺德区美的电热电器制造有限公司 Information processing method, information processing device, storage medium and server
CN112261677A (en) * 2020-10-15 2021-01-22 北京小米移动软件有限公司 Hotspot information processing method and device, terminal and storage medium

Similar Documents

Publication Publication Date Title
CN105117544B (en) Android platform App methods of risk assessment and device based on mobile cloud computing
CN108090567B (en) Fault diagnosis method and device for power communication system
CN106973384B (en) A kind of Wireless Fidelity Wi-Fi connection method and mobile terminal
CN106507445A (en) A kind of Wireless Fidelity Wi Fi scan methods and mobile terminal
CN106658672A (en) Wireless fidelity Wi-Fi connecting method and mobile terminal
CN106604362B (en) A kind of Wireless Fidelity Wi-Fi scan method and mobile terminal
CN111740992B (en) Website security vulnerability detection method, device, medium and electronic equipment
CN110674247A (en) Barrage information intercepting method and device, storage medium and equipment
CN106804055A (en) A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal
CN106682906A (en) Risk identification and business processing method and device
CN106096450A (en) A kind of application program freezing method and mobile terminal
CN106550423A (en) A kind of access point management method and terminal
CN106792699A (en) A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal
CN106569917A (en) Data backup method and mobile terminal
CN107679423A (en) Partition integrity inspection method and device
CN106686587A (en) Wireless fidelity Wi-Fi connecting method and mobile terminal
CN106569918A (en) Data backup method and mobile terminal
CN110688628B (en) Multimedia information processing method and device and server
CN106535102A (en) Mobile terminal positioning method and mobile terminal
CN106793015A (en) A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal
CN115828256B (en) Unauthorized and unauthorized logic vulnerability detection method
CN106445582A (en) Application copy deletion method and terminal
CN106604363A (en) Wireless fidelity Wi-Fi scanning method and mobile terminal
CN114553555B (en) Malicious website identification method and device, storage medium and electronic equipment
CN107315806B (en) Embedded storage method and device based on file system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170329

RJ01 Rejection of invention patent application after publication