Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Log acquisition method, terminal and computer readable storage medium

An acquisition method and log technology, applied in electrical components, transmission systems, etc., can solve problems such as inability to locate and solve network abnormalities, and failure to open wireless network logs in time, so as to improve network experience.

Inactive Publication Date: 2019-07-12
NUBIA TECHNOLOGY CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is: ordinary users will not open the wireless network log in time when the network is abnormal, so that the research and development personnel cannot locate and solve the network abnormal problem according to the wireless network log. Aiming at this technical problem, a log Acquisition method, terminal and computer-readable storage medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log acquisition method, terminal and computer readable storage medium
  • Log acquisition method, terminal and computer readable storage medium
  • Log acquisition method, terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0067] In order to solve the problem that the opening of the wireless network log in the prior art depends on the manual operation of the user, the wireless network log cannot be opened at the first time after the network abnormality, and the relevant information of the wireless network abnormality cannot be collected in time to provide R&D personnel with the ability to locate and solve problems. Based on the solution to the abnormal problem affecting the wireless network and the problem affecting the user's wireless network experience, this embodiment provides a log acquisition method, image 3 The basic flowchart of the log acquisition method provided in this embodiment:

[0068]S302: Monitor network anomalies through the wpa_supplicant process.

[0069] In the Android (Android) system, there is a wpa_supplicant process. The wpa_supplicant process is an independently running daemon process, and its core is a message loop, which processes WPA state machine, control commands,...

no. 2 example

[0092] In order to make the advantages and details of the log acquisition method provided in the first embodiment clearer to those skilled in the art, this embodiment will further illustrate the log acquisition method with examples, see Figure 7 A flow chart of the log acquisition method shown:

[0093]S702: The wpa_supplicant process performs network monitoring.

[0094] It can be understood that when the wpa_supplicant process monitors the abnormality of the wireless network, as long as one of the two situations of abnormal interruption of the wireless network and abnormal interruption of wireless network access occurs, it can be determined that there is currently an abnormality in the wireless network. Of course, under normal circumstances, these two situations will not occur at the same time.

[0095] Assuming that the terminal in this embodiment is the user's mobile phone, the user connects the mobile phone to the WiFi hotspot "11-12" at home, and then accesses the netw...

no. 3 example

[0114] This embodiment will provide a computer-readable storage medium and a terminal. First, the computer-readable storage medium will be introduced:

[0115] The computer-readable storage medium stores one or more computer programs that can be read, compiled or executed by the memory, including a log acquisition program, and the display control program can be executed by a processor to realize the first or second embodiment The log acquisition method provided in .

[0116] See Figure 8 Provided schematic diagram of the hardware structure of the terminal: the terminal 80 includes a processor 81, a memory 82, and a communication bus 83 for connecting the processor 81 and the memory 82, wherein the memory 82 can be the aforementioned computer-readable storage medium storing the log acquisition program. The processor 81 of the terminal 80 can execute the log acquisition program stored in the memory 82 to implement the log acquisition method in the foregoing embodiments:

[01...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a log acquisition method, a terminal and a computer readable storage medium. The method comprises the following steps: monitoring a network anomaly through a wpa_supplication process; and after the wpa_supplication process monitors the network abnormity, notifying the log acquisition daemon process of the current network exception through the socket, and then automaticallyacquiring the wireless network log by the log acquisition daemon process. The problem is solved that the user is required to manually open the wireless network log at the first time after the networkabnormality so that requirements on the user are quite high, and after the network abnormity, the wireless network log can be automatically started without manual operation of a user, so that relevantinformation of network abnormity is collected by utilizing the wireless network log, a basis is provided for research personnel to position a wireless network abnormity problem and solve the wirelessnetwork abnormity problem, the wireless network abnormity problem can be smoothly solved, and the network experience of the user is improved.

Description

technical field [0001] The present invention relates to the technical field of terminals, and more specifically, to a log acquisition method, a terminal, and a computer-readable storage medium. Background technique [0002] When a user is using a mobile phone, there may occasionally be abnormal interruption of the wireless network or abnormal interruption of network access. In order to locate and solve network anomalies, wireless network logs when network anomalies occur are very important. However, ordinary users lack professional network knowledge and cannot open relevant wireless network logs as soon as a network abnormality occurs, which makes it very difficult for R&D personnel to analyze and solve wireless network problems. Contents of the invention [0003] The technical problem to be solved by the present invention is: ordinary users will not open the wireless network log in time when the network is abnormal, so that the research and development personnel cannot l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 谭凯
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products