CN106572523B - Application program operation control method and device and terminal - Google Patents

Application program operation control method and device and terminal Download PDF

Info

Publication number
CN106572523B
CN106572523B CN201610934748.8A CN201610934748A CN106572523B CN 106572523 B CN106572523 B CN 106572523B CN 201610934748 A CN201610934748 A CN 201610934748A CN 106572523 B CN106572523 B CN 106572523B
Authority
CN
China
Prior art keywords
service
module
application program
identification information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610934748.8A
Other languages
Chinese (zh)
Other versions
CN106572523A (en
Inventor
张子敬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610934748.8A priority Critical patent/CN106572523B/en
Publication of CN106572523A publication Critical patent/CN106572523A/en
Application granted granted Critical
Publication of CN106572523B publication Critical patent/CN106572523B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • H04W52/0274Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof
    • H04W52/028Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof switching on or off only a part of the equipment circuit blocks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention provides an application program operation control method, an application program operation control device and a terminal, wherein the method comprises the following steps: after the freezing instruction is obtained, determining all services which are not supported by the user identity identification module; determining an application program for processing all the services as a redundant application program; and freezing all the background processes of the redundant application program to release the memory running resources of the terminal occupied by the background processes of the redundant application program. By the technical scheme, the waste of the memory operation resources of the terminal is reduced, and the operation efficiency of the terminal and the use experience of a user are improved.

Description

Application program operation control method and device and terminal
Technical Field
The invention relates to the technical field of terminals, in particular to an application program operation control method, an application program operation control device and a terminal.
Background
The mobile phone and the tablet computer are used as the most widely used terminals, and perform service Data interaction based on a Subscriber Identity Module (SIM) card and a Public access Network (PDN), and at the terminal side, the interaction is reflected as entry, editing, display, and the like of each process of an application program to service Data.
Wherein, whether some application programs installed in the terminal can realize corresponding service functions depends on whether the SIM card is preset with a corresponding communication protocol or a corresponding hardware module, for example, Vo-LTE service (Voice over Long Term release) does not have a circuit domain, and needs to provide IP Voice service based on a packet domain, support communication services such as high definition Voice and high definition video, meanwhile, the voice intercommunication with the current network 2G/3G can be realized, the core network determines whether the voice service of the terminal can be registered as the Vo-LTE service or not based on the SIM card capability information in the attachment request signaling reported by the terminal, or the user equipment is registered as a CSFB (Circuit Switched Fallback) service, and only when the SIM card supporting the Vo-LTE service is loaded to the mobile phone at the present stage, the application program corresponding to the Vo-LTE service can provide the IP voice service for the user.
However, even if the application program corresponding to the service not supported by the SIM card (i.e. the redundant application program in this application) cannot implement the service function, some processes of the redundant application program still occupy the memory operating resource of the terminal, which not only increases the operating power consumption of the terminal, but also seriously affects the operating efficiency of the terminal.
Disclosure of Invention
The present invention is based on at least one of the above technical problems, and provides a method, an apparatus, and a terminal for controlling the operation of an application program, which can effectively reduce the power consumption loss of the terminal, reduce the waste of memory operation resources of the terminal, and improve the operation efficiency of the terminal and the user experience by determining all services that cannot be supported by a subscriber identity module and freezing the application program corresponding to the services.
In view of this, according to an embodiment of the first aspect of the present invention, there is provided an operation control method for an application program, including: after the freezing instruction is obtained, determining all services which are not supported by the user identity identification module; determining an application program for processing all services as a redundant application program; and freezing the background processes of all the redundant application programs so as to release the memory running resources of the terminal occupied by the background processes of the redundant application programs.
In the technical scheme, by determining all services which cannot be supported by the user identification module and freezing the application program corresponding to the services, the power consumption loss of the terminal can be effectively reduced, the waste of memory running resources of the terminal is reduced, and the running efficiency of the terminal and the use experience of a user are improved.
In the above technical solution, optionally, after the freezing instruction is obtained, determining all services that are not supported by the user identity module includes the following specific steps: and after the freezing instruction is acquired, reading static identification information of the user identity identification module to determine a first type of service which is not supported by the user identity identification module according to the static identification information.
In this technical solution, the static Identifier of the SIM Card includes an ICCID (integrated Circuit Card Identity), an IMSI (International Mobile Subscriber Identity), a KI (Key Identifier), and a unique Identifier of a hardware module.
The static identifier of the SIM card and the mapping list of all services supported (or the names of applications to which the services belong) are preset in the memory module of the terminal, and after the static identifier of the SIM card is read, all services not supported by the SIM card can be determined through the history table 1.
TABLE 1
Concrete service Business related application process
RCS RcsSetting.apk,RcsService.apk,RcsStack.apk,RcsUI.apk
VoLTE ImsService.apk
VoWiFi WiFiOffLoad.apk
NFC NFC.apk,SmartCardService.apk,Tag.apk
By reading the static identification information of the subscriber identity module, it is possible to determine services that are not supported by the SIM card, such as NFC (Near Field Communication) services, including the following modules:
NFC Controller: namely, the NFC chip, realizes the processing of NFC card simulation, reader-writer, simulation, digital protocol and the like defined by a point-to-point mode;
NFC protocol stack: configuring an NFC chip working mode and realizing various standards defined by NFC Forum;
SE module: namely, a security chip, and all services (such as bank cards and bus cards) related to sensitive data, encryption operation and the like need to be processed by the security chip;
SE Module Access API (Application Programming Interface): opening an interface for accessing the SE module to the client to realize the functions of balance reading, air recharging and the like;
SE module access control: the access of the SE module is controlled and authorized, and the safety of the SE module is guaranteed;
AP access SE Module: when the client accesses the SE module through the application processor, the chip is different when the SE module is different in type, and if the SIM card is the SE module, the chip is the Modem.
On the premise of not considering the hardware limitation of the terminal, whether the hardware module is arranged in the terminal or not can be determined only by checking the static identification of the module, and then whether the NFC service can be supported or not is determined.
In any of the above technical solutions, optionally, reading static identification information of the user identity module to determine all services that are not supported by the user identity module according to the static identification information, further comprising the following specific steps: and when the read static identification information does not comprise the identification information of the security module, determining that the first type of service which is not supported by the user identity identification module is a near field communication service.
In the technical scheme, when the read static identification information is detected to not include the security module, the SIM card can be determined to not support the first-class service as the near field communication service, and then the process of the application program related to the near field communication service is frozen, so that the power consumption loss caused by the mistaken starting of the NFC module is reduced.
In any of the above technical solutions, optionally, after the freezing instruction is obtained, determining all services that are not supported by the user identity module includes the following specific steps: after the freezing instruction is obtained, sending the international mobile subscriber identity in the static identification information to the base station to request to process the second type of service; detecting whether an authentication response instruction sent by a base station is acquired within a preset time period; and when detecting that the authentication response instruction is not acquired within the preset time period, determining a second service which is not supported by the user identity identification module, wherein the second service comprises any one of a converged communication service, a Vo-LTE service, a Vo-Wi-Fi service and an IP multimedia subsystem service.
In the technical scheme, whether the authentication response instruction sent by the base station is acquired within the preset time period is detected, and if the authentication response instruction is not detected within the preset time period, the corresponding service request failure or network access attachment failure can be determined, so that the process of the application program related to the second type of service is frozen, and further, the power consumption loss and the waste of memory operation resources caused by re-registration for network access and background process are avoided.
Specifically, the step of the terminal requesting the attached base station to execute the second type of service includes the following steps:
(1) the terminal reads the IMSI from the SIM card and sends the IMSI to the server;
(2) the server generates a random number according to the IMSI and feeds the random number back to the SIM card;
(3) the SIM card generates an SRES (Signal Response) according to the random number and the KI and feeds back the SRES to the server;
(4) the server judges whether the terminal is allowed to attach or not by comparing whether the pre-stored SRES' is matched with the SRES, namely whether the SIM card supports related services or not.
For Vo-LTE service, a terminal needs to request to establish a communication connection with a PGW (public data network Gateway) through a base station, and implement registration and data interaction processes of the Vo-LTE service under the control of an aaa (Authentication Authorization Accounting) server, where Authentication is used to verify the authority of the terminal, Authorization is used to authenticate the terminal, that is, Authorization service, and Accounting is used to record a process in which the terminal uses network resources.
For the Vo-Wi-Fi service, the terminal needs to access the AAA server through the router, the WLAN, the ePDG (evolved packet data gateway), and the PGW to perform the registration and data interaction process of the Vo-Wi-Fi service.
TABLE 2
Figure GDA0003450816880000051
It is worth particularly pointing out that the types of the processes are further divided as shown in table 2, the frozen processes of the application programs are the first type of application processes unique to the first type of application processes, such as RCS service programs rccs setting.apk, rccsservice.apk, rccsstack.apk, and other processes, such as wifi offload.apk processes of Vo-Wi-Fi service programs, NFC service.apk, smartcardservice.apk, tag.apk, and other processes, because the freezing of the second type of application processes is common to multiple application programs, the second type of application processes is frozen only when all the application programs corresponding to the second type of application processes are determined not to be supported by the SIM card, so as to ensure that the reliability of the terminal operation is improved while the memory operation resources are released.
In any one of the above technical solutions, optionally, the method further includes: and generating a freezing instruction after detecting that the static identification information of the user identity identification module changes, wherein the static identification information comprises an international mobile subscriber identity and/or an integrated circuit card identity.
In the technical scheme, a freezing instruction is generated after a static Identification sending change of a user Identity Identification module is detected, so that the detection of the capacity of the SIM Card can be automatically triggered, and the static Identification of the SIM Card comprises an ICCID (Integrated Circuit Card Identity), an IMSI (International Mobile Subscriber Identity), a KI (Key Identifier) and the like, so that whether the static Identification changes or not can be compared, wherein the ICCID comprises 20-bit characters as the unique Identification of the SIM Card, the Identity of the SIM Card is uniquely identified, whether the SIM Card is replaced or not can be determined by comparing the ICCID in the simplest mode, so that the service function of the SIM Card is determined again, and the freezing instruction is generated to trigger the SIM Card after replacement to be checked.
According to an embodiment of the second aspect of the present invention, there is provided an operation control device of an application program, including: the determining unit is used for determining all services which are not supported by the user identity identification module after the freezing instruction is acquired; the determination unit is further configured to: determining an application program for processing all services as a redundant application program; the operation control device of the application program further includes: and the freezing unit is used for freezing the background processes of all the redundant application programs so as to release the memory running resources of the terminal occupied by the background processes of the redundant application programs.
In the technical scheme, by determining all services which cannot be supported by the user identification module and freezing the application program corresponding to the services, the power consumption loss of the terminal can be effectively reduced, the waste of memory running resources of the terminal is reduced, and the running efficiency of the terminal and the use experience of a user are improved.
In the foregoing technical solution, optionally, the determining unit includes: and the reading unit is used for reading the static identification information of the user identity identification module after the freezing instruction is obtained so as to determine the first type of service which is not supported by the user identity identification module according to the static identification information.
In this technical solution, the static Identifier of the SIM Card includes an ICCID (integrated Circuit Card Identity), an IMSI (International Mobile Subscriber Identity), a KI (Key Identifier), and a unique Identifier of a hardware module.
The static identifier of the SIM card and the mapping list of all services supported (or the names of applications to which the services belong) are preset in the memory module of the terminal, and after the static identifier of the SIM card is read, all services not supported by the SIM card can be determined through the history table 3.
TABLE 3
Concrete service Business related application process
RCS RcsSetting.apk,RcsService.apk,RcsStack.apk,RcsUI.apk
VoLTE ImsService.apk
VoWiFi WiFiOffLoad.apk
NFC NFC.apk,SmartCardService.apk,Tag.apk
By reading the static identification information of the subscriber identity module, it is possible to determine services that are not supported by the SIM card, such as NFC (Near Field Communication) services, including the following modules:
NFC Controller: namely, the NFC chip, realizes the processing of NFC card simulation, reader-writer, simulation, digital protocol and the like defined by a point-to-point mode;
NFC protocol stack: configuring an NFC chip working mode and realizing various standards defined by NFC Forum;
SE module: namely, a security chip, and all services (such as bank cards and bus cards) related to sensitive data, encryption operation and the like need to be processed by the security chip;
SE Module Access API (Application Programming Interface): opening an interface for accessing the SE module to the client to realize the functions of balance reading, air recharging and the like;
SE module access control: the access of the SE module is controlled and authorized, and the safety of the SE module is guaranteed;
AP access SE Module: when the client accesses the SE module through the application processor, the chip is different when the SE module is different in type, and if the SIM card is the SE module, the chip is the Modem.
On the premise of not considering the hardware limitation of the terminal, whether the hardware module is arranged in the terminal or not can be determined only by checking the static identification of the module, and then whether the NFC service can be supported or not is determined.
In any one of the above technical solutions, optionally, the determining unit is further configured to: and when the read static identification information does not comprise the identification information of the security module, determining that the first type of service which is not supported by the user identity identification module is a near field communication service.
In the technical scheme, when the read static identification information is detected to not include the security module, the SIM card can be determined to not support the first-class service as the near field communication service, and then the process of the application program related to the near field communication service is frozen, so that the power consumption loss caused by the mistaken starting of the NFC module is reduced.
In any one of the above technical solutions, optionally, the determining unit further includes: the sending unit is used for sending the international mobile subscriber identity in the static identification information to the base station to request to process the second type of service after the freezing instruction is obtained; the detection unit is used for detecting whether an authentication response instruction sent by the base station is acquired within a preset time period; the determination unit is further configured to: and when detecting that the authentication response instruction is not acquired within the preset time period, determining a second service which is not supported by the user identity identification module, wherein the second service comprises any one of a converged communication service, a Vo-LTE service, a Vo-Wi-Fi service and an IP multimedia subsystem service.
In the technical scheme, whether the authentication response instruction sent by the base station is acquired within the preset time period is detected, and if the authentication response instruction is not detected within the preset time period, the corresponding service request failure or network access attachment failure can be determined, so that the process of the application program related to the second type of service is frozen, and further, the power consumption loss and the waste of memory operation resources caused by re-registration for network access and background process are avoided.
Specifically, the step of the terminal requesting the attached base station to execute the second type of service includes the following steps:
(1) the terminal reads the IMSI from the SIM card and sends the IMSI to the server;
(2) the server generates a random number according to the IMSI and feeds the random number back to the SIM card;
(3) the SIM card generates an SRES (Signal Response) according to the random number and the KI and feeds back the SRES to the server;
(4) the server judges whether the terminal is allowed to attach or not by comparing whether the pre-stored SRES' is matched with the SRES, namely whether the SIM card supports related services or not.
For Vo-LTE service, a terminal needs to request to establish a communication connection with a PGW (public data network Gateway) through a base station, and implement registration and data interaction processes of the Vo-LTE service under the control of an aaa (Authentication Authorization Accounting) server, where Authentication is used to verify the authority of the terminal, Authorization is used to authenticate the terminal, that is, Authorization service, and Accounting is used to record a process in which the terminal uses network resources.
For the Vo-Wi-Fi service, the terminal needs to access the AAA server through the router, the WLAN, the ePDG (evolved packet data gateway), and the PGW to perform the registration and data interaction process of the Vo-Wi-Fi service.
TABLE 4
Figure GDA0003450816880000081
It is worth pointing out that, as shown in table 4, the frozen processes of the application programs are the first type of application processes unique to the first type of application processes, such as RCS business program processes of RCS, RCS service processes of apk, RCS stack processes of Vo-Wi-Fi business program processes of wifi, such as NFC business program processes of NFC, smartcardservice processes of apk, tag processes of tag, and the like, because the frozen processes of the second type of application processes are common to multiple application programs, the second type of application processes are frozen only when all the application programs corresponding to the second type of application processes are determined not to be supported by the SIM card, so as to ensure that the reliability of terminal operation is improved while the memory operation resources are released.
In any one of the above technical solutions, optionally, the method further includes: and the generating unit is used for generating a freezing instruction after detecting that the static identification information of the user identity identification module changes, wherein the static identification information comprises an international mobile subscriber identity and/or an integrated circuit card identity.
In the technical scheme, a freezing instruction is generated after a static Identification sending change of a user Identity Identification module is detected, so that the detection of the capacity of the SIM Card can be automatically triggered, and the static Identification of the SIM Card comprises an ICCID (Integrated Circuit Card Identity), an IMSI (International Mobile Subscriber Identity), a KI (Key Identifier) and the like, so that whether the static Identification changes or not can be compared, wherein the ICCID comprises 20-bit characters as the unique Identification of the SIM Card, the Identity of the SIM Card is uniquely identified, whether the SIM Card is replaced or not can be determined by comparing the ICCID in the simplest mode, so that the service function of the SIM Card is determined again, and the freezing instruction is generated to trigger the SIM Card after replacement to be checked.
According to an embodiment of the third aspect of the present invention, there is provided a terminal, including: an operation control device for an application program according to any one of the above aspects.
By the technical scheme, all services which cannot be supported by the user identification module are determined, and the application programs corresponding to the services are frozen, so that the power consumption loss of the terminal can be effectively reduced, the waste of memory running resources of the terminal is reduced, and the running efficiency of the terminal and the use experience of a user are improved.
Drawings
Fig. 1 is a flow chart of a first embodiment of an operation control method of an application program according to the present invention;
fig. 2 shows a schematic block diagram of an operation control device of an application according to an embodiment of the present invention;
fig. 3 shows a schematic block diagram of a first embodiment of a terminal according to the invention;
fig. 4 shows a schematic block diagram of an embodiment two of the terminal according to the invention;
fig. 5 shows a schematic block diagram of a third embodiment of the terminal according to the invention;
fig. 6 is a diagram illustrating data interaction between a terminal and a base station according to an embodiment of the present invention;
fig. 7 is a flowchart illustrating a second embodiment of the operation control method of the application program according to the present invention.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Fig. 1 is a flowchart illustrating a first embodiment of an operation control method of an application according to the present invention.
As shown in fig. 1, the method for controlling the operation of the application according to the present invention includes: step 102, after the freezing instruction is obtained, determining all services which are not supported by a user identity identification module; step 104, determining an application program for processing all services as a redundant application program; and step 106, freezing the background processes of all the redundant application programs so as to release the memory running resources of the terminal occupied by the background processes of the redundant application programs.
In the technical scheme, by determining all services which cannot be supported by the user identification module and freezing the application program corresponding to the services, the power consumption loss of the terminal can be effectively reduced, the waste of memory running resources of the terminal is reduced, and the running efficiency of the terminal and the use experience of a user are improved.
In the above technical solution, optionally, after the freezing instruction is obtained, determining all services that are not supported by the user identity module includes the following specific steps: and after the freezing instruction is acquired, reading static identification information of the user identity identification module to determine a first type of service which is not supported by the user identity identification module according to the static identification information.
In this technical solution, the static Identifier of the SIM Card includes an ICCID (integrated Circuit Card Identity), an IMSI (International Mobile Subscriber Identity), a KI (Key Identifier), and a unique Identifier of a hardware module.
The static identifier of the SIM card and the mapping list of all services supported (or the names of applications to which the services belong) are preset in the memory module of the terminal, and after the static identifier of the SIM card is read, all services not supported by the SIM card can be determined through the history table 5.
TABLE 5
Concrete service Business related application process
RCS RcsSetting.apk,RcsService.apk,RcsStack.apk,RcsUI.apk
VoLTE ImsService.apk
VoWiFi WiFiOffLoad.apk
NFC NFC.apk,SmartCardService.apk,Tag.apk
By reading the static identification information of the subscriber identity module, it is possible to determine services that are not supported by the SIM card, such as NFC (Near Field Communication) services, including the following modules:
NFC Controller: namely, the NFC chip, realizes the processing of NFC card simulation, reader-writer, simulation, digital protocol and the like defined by a point-to-point mode;
NFC protocol stack: configuring an NFC chip working mode and realizing various standards defined by NFC Forum;
SE module: namely, a security chip, and all services (such as bank cards and bus cards) related to sensitive data, encryption operation and the like need to be processed by the security chip;
SE Module Access API (Application Programming Interface): opening an interface for accessing the SE module to the client to realize the functions of balance reading, air recharging and the like;
SE module access control: the access of the SE module is controlled and authorized, and the safety of the SE module is guaranteed;
AP access SE Module: when the client accesses the SE module through the application processor, the chip is different when the SE module is different in type, and if the SIM card is the SE module, the chip is the Modem.
On the premise of not considering the hardware limitation of the terminal, whether the hardware module is arranged in the terminal or not can be determined only by checking the static identification of the module, and then whether the NFC service can be supported or not is determined.
In any of the above technical solutions, optionally, reading static identification information of the user identity module to determine all services that are not supported by the user identity module according to the static identification information, further comprising the following specific steps: and when the read static identification information does not comprise the identification information of the security module, determining that the first type of service which is not supported by the user identity identification module is a near field communication service.
In the technical scheme, when the read static identification information is detected to not include the security module, the SIM card can be determined to not support the first-class service as the near field communication service, and then the process of the application program related to the near field communication service is frozen, so that the power consumption loss caused by the mistaken starting of the NFC module is reduced.
In any of the above technical solutions, optionally, after the freezing instruction is obtained, determining all services that are not supported by the user identity module includes the following specific steps: after the freezing instruction is obtained, sending the international mobile subscriber identity in the static identification information to the base station to request to process the second type of service; detecting whether an authentication response instruction sent by a base station is acquired within a preset time period; and when detecting that the authentication response instruction is not acquired within the preset time period, determining a second service which is not supported by the user identity identification module, wherein the second service comprises any one of a converged communication service, a Vo-LTE service, a Vo-Wi-Fi service and an IP multimedia subsystem service.
In the technical scheme, whether the authentication response instruction sent by the base station is acquired within the preset time period is detected, and if the authentication response instruction is not detected within the preset time period, the corresponding service request failure or network access attachment failure can be determined, so that the process of the application program related to the second type of service is frozen, and further, the power consumption loss and the waste of memory operation resources caused by re-registration for network access and background process are avoided.
Specifically, the step of the terminal requesting the attached base station to execute the second type of service includes the following steps:
(1) the terminal reads the IMSI from the SIM card and sends the IMSI to the server;
(2) the server generates a random number according to the IMSI and feeds the random number back to the SIM card;
(3) the SIM card generates an SRES (Signal Response) according to the random number and the KI and feeds back the SRES to the server;
(4) the server judges whether the terminal is allowed to attach or not by comparing whether the pre-stored SRES' is matched with the SRES, namely whether the SIM card supports related services or not.
For Vo-LTE service, a terminal needs to request to establish a communication connection with a PGW (public data network Gateway) through a base station, and implement registration and data interaction processes of the Vo-LTE service under the control of an aaa (Authentication Authorization Accounting) server, where Authentication is used to verify the authority of the terminal, Authorization is used to authenticate the terminal, that is, Authorization service, and Accounting is used to record a process in which the terminal uses network resources.
For the Vo-Wi-Fi service, the terminal needs to access the AAA server through the router, the WLAN, the ePDG (evolved packet data gateway), and the PGW to perform the registration and data interaction process of the Vo-Wi-Fi service.
The PGW is configured to assign an IP address to the terminal after the access is successful.
TABLE 6
Figure GDA0003450816880000131
It is worth pointing out that, as shown in table 6, the frozen processes of the application programs are the first type of application processes unique to the first type of application processes, such as RCS business program processes of RCS, RCS service processes, apk, RCS stack processes, and the like, such as wifi offload processes of Vo-Wi-Fi business program processes, NFC business program processes, smartcardservice processes, tag processes, and the like, because the frozen processes of the second type of application processes are common to multiple application programs, the second type of application processes are frozen only when all the application programs corresponding to the second type of application processes are determined not to be supported by the SIM card, so as to ensure that the reliability of the terminal operation is improved while the memory operation resources are released.
In any one of the above technical solutions, optionally, the method further includes: and generating a freezing instruction after detecting that the static identification information of the user identity identification module changes, wherein the static identification information comprises an international mobile subscriber identity and/or an integrated circuit card identity.
In the technical scheme, a freezing instruction is generated after a static Identification sending change of a user Identity Identification module is detected, so that the detection of the capacity of the SIM Card can be automatically triggered, and the static Identification of the SIM Card comprises an ICCID (Integrated Circuit Card Identity), an IMSI (International Mobile Subscriber Identity), a KI (Key Identifier) and the like, so that whether the static Identification changes or not can be compared, wherein the ICCID comprises 20-bit characters as the unique Identification of the SIM Card, the Identity of the SIM Card is uniquely identified, whether the SIM Card is replaced or not can be determined by comparing the ICCID in the simplest mode, so that the service function of the SIM Card is determined again, and the freezing instruction is generated to trigger the SIM Card after replacement to be checked.
Fig. 2 shows a schematic block diagram of an operation control device of an application according to an embodiment of the present invention.
As shown in fig. 2, the operation control device 200 of the application according to the embodiment of the present invention includes: a determining unit 202, configured to determine all services that are not supported by the user identity module after the freezing instruction is obtained; the determining unit 202 is further configured to: determining an application program for processing all services as a redundant application program; the operation control device of the application program further includes: the freezing unit 204 is configured to freeze the background processes of all the redundant applications, so as to release the memory running resources of the terminal occupied by the background processes of the redundant applications.
In the technical scheme, by determining all services which cannot be supported by the user identification module and freezing the application program corresponding to the services, the power consumption loss of the terminal can be effectively reduced, the waste of memory running resources of the terminal is reduced, and the running efficiency of the terminal and the use experience of a user are improved.
In the foregoing technical solution, optionally, the determining unit 202 includes: the reading unit 206 is configured to read the static identification information of the user identity module after the freezing instruction is obtained, so as to determine, according to the static identification information, a first type of service that is not supported by the user identity module.
In this technical solution, the static Identifier of the SIM Card includes an ICCID (integrated Circuit Card Identity), an IMSI (International Mobile Subscriber Identity), a KI (Key Identifier), and a unique Identifier of a hardware module.
The static identifier of the SIM card and the mapping list of all services supported (or the names of applications to which the services belong) are preset in the memory module of the terminal, and after the static identifier of the SIM card is read, all services not supported by the SIM card can be determined through the history table 7.
TABLE 7
Concrete service Business related application process
RCS RcsSetting.apk,RcsService.apk,RcsStack.apk,RcsUI.apk
VoLTE ImsService.apk
VoWiFi WiFiOffLoad.apk
NFC NFC.apk,SmartCardService.apk,Tag.apk
By reading the static identification information of the subscriber identity module, it is possible to determine services that are not supported by the SIM card, such as NFC (Near Field Communication) services, including the following modules:
NFC Controller: namely, the NFC chip, realizes the processing of NFC card simulation, reader-writer, simulation, digital protocol and the like defined by a point-to-point mode;
NFC protocol stack: configuring an NFC chip working mode and realizing various standards defined by NFC Forum;
SE module: namely, a security chip, and all services (such as bank cards and bus cards) related to sensitive data, encryption operation and the like need to be processed by the security chip;
SE Module Access API (Application Programming Interface): opening an interface for accessing the SE module to the client to realize the functions of balance reading, air recharging and the like;
SE module access control: the access of the SE module is controlled and authorized, and the safety of the SE module is guaranteed;
AP access SE Module: when the client accesses the SE module through the application processor, the chip is different when the SE module is different in type, and if the SIM card is the SE module, the chip is the Modem.
On the premise of not considering the hardware limitation of the terminal, whether the hardware module is arranged in the terminal or not can be determined only by checking the static identification of the module, and then whether the NFC service can be supported or not is determined.
In any of the above technical solutions, optionally, the determining unit 202 is further configured to: and when the read static identification information does not comprise the identification information of the security module, determining that the first type of service which is not supported by the user identity identification module is a near field communication service.
In the technical scheme, when the read static identification information is detected to not include the security module, the SIM card can be determined to not support the first-class service as the near field communication service, and then the process of the application program related to the near field communication service is frozen, so that the power consumption loss caused by the mistaken starting of the NFC module is reduced.
In any one of the above technical solutions, optionally, the determining unit 202 further includes: a sending unit 2022, configured to send the international mobile subscriber identity in the static identification information to the base station to request to process the second type of service after the freezing instruction is obtained; the detecting unit 2024 is configured to detect whether an authentication response instruction sent by the base station is acquired within a preset time period; the determining unit 202 is further configured to: and when detecting that the authentication response instruction is not acquired within the preset time period, determining a second service which is not supported by the user identity identification module, wherein the second service comprises any one of a converged communication service, a Vo-LTE service, a Vo-Wi-Fi service and an IP multimedia subsystem service.
In the technical scheme, whether the authentication response instruction sent by the base station is acquired within the preset time period is detected, and if the authentication response instruction is not detected within the preset time period, the corresponding service request failure or network access attachment failure can be determined, so that the process of the application program related to the second type of service is frozen, and further, the power consumption loss and the waste of memory operation resources caused by re-registration for network access and background process are avoided.
Specifically, the step of the terminal requesting the attached base station to execute the second type of service includes the following steps:
(1) the terminal reads the IMSI from the SIM card and sends the IMSI to the server;
(2) the server generates a random number according to the IMSI and feeds the random number back to the SIM card;
(3) the SIM card generates an SRES (Signal Response) according to the random number and the KI and feeds back the SRES to the server;
(4) the server judges whether the terminal is allowed to attach or not by comparing whether the pre-stored SRES' is matched with the SRES, namely whether the SIM card supports related services or not.
For Vo-LTE service, a terminal needs to request to establish a communication connection with a PGW (public data network Gateway) through a base station, and implement registration and data interaction processes of the Vo-LTE service under the control of an aaa (Authentication Authorization Accounting) server, where Authentication is used to verify the authority of the terminal, Authorization is used to authenticate the terminal, that is, Authorization service, and Accounting is used to record a process in which the terminal uses network resources.
For the Vo-Wi-Fi service, the terminal needs to access the AAA server through the router, the WLAN, the ePDG (evolved packet data gateway), and the PGW to perform the registration and data interaction process of the Vo-Wi-Fi service.
It is worth pointing out that, as shown in table 8, the frozen processes of the application programs are the first type of application processes unique to the first type of application processes, such as RCS business program processes of RCS, RCS service processes, apk, RCS stack processes, and the like, such as wifi offload processes of Vo-Wi-Fi business programs, NFC business program processes, smartcardservice processes, tag processes, and the like, because the frozen processes of the second type of application processes are common to multiple application programs, the second type of application processes are frozen only when all the application programs corresponding to the second type of application processes are determined not to be supported by the SIM card, so as to ensure that the reliability of terminal operation is improved while the memory operation resources are released.
TABLE 8
Figure GDA0003450816880000171
In any one of the above technical solutions, optionally, the method further includes: the generating unit 208 is configured to generate a freeze instruction after detecting that static identification information of the subscriber identity module changes, where the static identification information includes an international mobile subscriber identity and/or an integrated circuit card identity.
In the technical scheme, a freezing instruction is generated after a static Identification sending change of a user Identity Identification module is detected, so that the detection of the capacity of the SIM Card can be automatically triggered, and the static Identification of the SIM Card comprises an ICCID (Integrated Circuit Card Identity), an IMSI (International Mobile Subscriber Identity), a KI (Key Identifier) and the like, so that whether the static Identification changes or not can be compared, wherein the ICCID comprises 20-bit characters as the unique Identification of the SIM Card, the Identity of the SIM Card is uniquely identified, whether the SIM Card is replaced or not can be determined by comparing the ICCID in the simplest mode, so that the service function of the SIM Card is determined again, and the freezing instruction is generated to trigger the SIM Card after replacement to be checked.
A terminal according to an embodiment of the present invention will be described with reference to fig. 1 to 3.
The first embodiment is as follows:
fig. 3 shows a schematic block diagram of a first embodiment of the terminal according to the invention.
As shown in fig. 3, a terminal 300 according to an embodiment of the present invention includes: the apparatus 200 for controlling the operation of an application according to any one of the above aspects.
Example two:
fig. 4 shows a schematic block diagram of an embodiment two of the terminal according to the invention.
As shown in fig. 4, a terminal 400 according to an embodiment of the present invention includes: an application control/operating system 402, an NFC Controller (i.e., NFC Controller)404, a security module 406, and a SIM card 408 carrying the security module 406, wherein the application control/operating system 402 is used to control application programs to process service data.
Example three:
fig. 5 shows a schematic block diagram of an embodiment three of the terminal according to the present invention.
As shown in fig. 5, a terminal 500 according to an embodiment of the present invention includes: an application control/operating system 502, an NFC Controller (i.e., NFC Controller)504, a security module 506, a Nano SIM card 508 carrying the security module 506, and a general SIM card 510, wherein the application control/operating system 502 is used for controlling application programs to process service data.
Fig. 6 is a diagram illustrating data interaction between a terminal and a base station according to an embodiment of the present invention.
As shown in fig. 6, a process of a terminal performing data interaction with a base station according to an embodiment of the present invention includes:
(1) for Vo-LTE service, the terminal 602 needs to request to create a communication connection with a PGW (PDN Gateway) 610 through a base station 614, and implement registration and data interaction processes of the Vo-LTE service under the control of an aaa (Authentication Authorization) server 610, where the Authorization is used to authenticate the terminal 602, that is, authorize a service, and the Authorization is used to record a process of using a network resource by the terminal 602.
(2) For the Vo-Wi-Fi service, the terminal 602 needs to access the AAA server 610 through the router 604, the WLAN606, the ePDG (evolved packet data gateway) 608, and the PGW610 to perform the registration and data interaction process of the Vo-Wi-Fi service.
The PGW610 is configured to assign an IP address to the terminal 602 after the access is successful.
Fig. 7 is a flowchart illustrating a second embodiment of the operation control method of the application program according to the present invention.
As shown in fig. 7, the method for controlling the operation of the application according to the embodiment of the present invention includes: step 702, detecting whether the SIM card changes, if so, executing step 704, and if not, ending; step 704, judging whether the terminal can reside in the network, if so, executing step 706, and if not, executing step 704 again; step 706, whether the terminal can reside in the network; step 708, traversing an association table corresponding to the service and the application program; step 710, freezing an application program corresponding to the unsupported service; and step 712, unfreezing the application program corresponding to the service with the satisfied capacity.
In consideration of the technical problem that the service of the application program supported by the terminal and the SIM service capability are not matched in the related technology, the invention provides a new method, a device and a terminal for controlling the operation of the application program.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The units in the terminal of the embodiment of the invention can be merged, divided and deleted according to actual needs.
It will be understood by those skilled in the art that all or part of the steps in the methods of the embodiments described above may be implemented by hardware instructions of a program, and the program may be stored in a computer-readable storage medium, where the storage medium includes Read-Only Memory (ROM), Random Access Memory (RAM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM), One-time Programmable Read-Only Memory (OTPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Compact Disc Read-Only Memory (CD-ROM), or other Memory, such as a magnetic disk, or a combination thereof, A tape memory, or any other medium readable by a computer that can be used to carry or store data.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (11)

1. An operation control method of an application program is suitable for a terminal loaded with a user identity identification module, and is characterized by comprising the following steps:
after the freezing instruction is obtained, determining all services which are not supported by the user identity identification module;
determining an application program for processing all the services as a redundant application program;
and freezing all the background processes of the redundant application program to release the memory running resources of the terminal occupied by the background processes of the redundant application program.
2. The method for controlling the operation of an application program according to claim 1, wherein after the freezing instruction is obtained, determining all services which are not supported by the subscriber identity module comprises the following specific steps:
and after the freezing instruction is obtained, reading static identification information of the user identity identification module so as to determine a first type of service which is not supported by the user identity identification module according to the static identification information.
3. The method for controlling the operation of an application according to claim 2, wherein the static identification information of the user id module is read to determine all services that are not supported by the user id module according to the static identification information, and further comprising the following specific steps:
and when the read static identification information does not include identification information of a security module, determining that the first type of service which is not supported by the user identity identification module is a near field communication service.
4. The method for controlling the operation of the application program according to claim 2, wherein after the freezing instruction is obtained, determining all services which are not supported by the subscriber identity module comprises the following specific steps:
after the freezing instruction is obtained, sending the international mobile subscriber identity in the static identification information to a base station to request to process a second type of service;
detecting whether an authentication response instruction sent by the base station is acquired within a preset time period;
determining the second type of service which is not supported by the user identity module when detecting that the authentication response instruction is not obtained in the preset time period,
the second type of service comprises any one of a converged communication service, a Vo-LTE service, a Vo-Wi-Fi service and an IP multimedia subsystem service.
5. The operation control method of the application program according to any one of claims 1 to 4, characterized by further comprising:
generating the freezing instruction after detecting that the static identification information of the user identity identification module changes,
wherein the static identification information includes an international mobile subscriber identity and/or an integrated circuit card identity.
6. An operation control device of an application program, which is suitable for a terminal loaded with a user identification module, is characterized by comprising:
the determining unit is used for determining all services which are not supported by the user identity identification module after the freezing instruction is obtained;
the determination unit is further configured to: determining an application program for processing all the services as a redundant application program;
the operation control device of the application program further includes:
and the freezing unit is used for freezing all the background processes of the redundant application program so as to release the memory running resources of the terminal occupied by the background processes of the redundant application program.
7. The apparatus for controlling the operation of an application according to claim 6, wherein the determining unit includes:
and the reading unit is used for reading the static identification information of the user identity identification module after the freezing instruction is obtained so as to determine the first type of service which is not supported by the user identity identification module according to the static identification information.
8. The apparatus for controlling an operation of an application according to claim 7,
the determination unit is further configured to: and when the read static identification information does not include identification information of a security module, determining that the first type of service which is not supported by the user identity identification module is a near field communication service.
9. The apparatus for controlling an operation of an application according to claim 7, wherein the determining unit further includes:
a sending unit, configured to send the international mobile subscriber identity in the static identification information to a base station to request to process a second type of service after the freezing instruction is obtained;
the detection unit is used for detecting whether an authentication response instruction sent by the base station is acquired within a preset time period;
the determination unit is further configured to: determining the second type of service which is not supported by the user identity module when detecting that the authentication response instruction is not obtained in the preset time period,
the second type of service comprises any one of a converged communication service, a Vo-LTE service, a Vo-Wi-Fi service and an IP multimedia subsystem service.
10. The apparatus for controlling an operation of an application according to any one of claims 6 to 9, characterized by further comprising:
a generating unit, configured to generate the freezing instruction after detecting that static identification information of the user identity module changes,
wherein the static identification information includes an international mobile subscriber identity and/or an integrated circuit card identity.
11. A terminal, comprising: an operation control apparatus of an application program according to any one of claims 6 to 10.
CN201610934748.8A 2016-10-31 2016-10-31 Application program operation control method and device and terminal Active CN106572523B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610934748.8A CN106572523B (en) 2016-10-31 2016-10-31 Application program operation control method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610934748.8A CN106572523B (en) 2016-10-31 2016-10-31 Application program operation control method and device and terminal

Publications (2)

Publication Number Publication Date
CN106572523A CN106572523A (en) 2017-04-19
CN106572523B true CN106572523B (en) 2022-04-19

Family

ID=58533485

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610934748.8A Active CN106572523B (en) 2016-10-31 2016-10-31 Application program operation control method and device and terminal

Country Status (1)

Country Link
CN (1) CN106572523B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107450998B (en) * 2017-07-31 2020-06-02 北京三快在线科技有限公司 Method, device, medium and electronic equipment for synchronizing information among multiple applications in real time

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200531493A (en) * 2003-11-27 2005-09-16 Nagracard Sa Method for authenticating applications
CN101511085A (en) * 2009-03-30 2009-08-19 深圳华为通信技术有限公司 Method and apparatus for limiting usage of mobile terminal function by using personal identification
CN103324867A (en) * 2012-03-21 2013-09-25 宇龙计算机通信科技(深圳)有限公司 Terminal and application program management method
CN105873028A (en) * 2016-03-28 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Terminal control method, terminal control device, and terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105988827B (en) * 2015-01-29 2019-07-05 阿里巴巴集团控股有限公司 A kind of method and device that application is freezed, thaws

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200531493A (en) * 2003-11-27 2005-09-16 Nagracard Sa Method for authenticating applications
CN101511085A (en) * 2009-03-30 2009-08-19 深圳华为通信技术有限公司 Method and apparatus for limiting usage of mobile terminal function by using personal identification
CN103324867A (en) * 2012-03-21 2013-09-25 宇龙计算机通信科技(深圳)有限公司 Terminal and application program management method
CN105873028A (en) * 2016-03-28 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Terminal control method, terminal control device, and terminal

Also Published As

Publication number Publication date
CN106572523A (en) 2017-04-19

Similar Documents

Publication Publication Date Title
US8509767B2 (en) Controlled access to a wireless network
US9705883B2 (en) Communications terminal and system and rights management method
CN105338515B (en) Data service transmission method and mobile communication equipment
JP6602475B2 (en) Method, device and system for authenticating to mobile network, and server for authenticating device to mobile network
US20200228981A1 (en) Authentication method and device
CN110944319B (en) 5G communication identity verification method, equipment and storage medium
EP3136800A1 (en) Method for updating rplmn information, and user equipment
US8606318B2 (en) Method and apparatus for determining validity of mobile subscriber identifier in mobile communication terminal
CN111050324B (en) 5G terminal equipment access method, equipment and storage medium
EP3206422A1 (en) Method and device for creating subscription resource
US10911945B1 (en) Automated eUICC service profile configuration in view of operational issue with respect to eUICC service profile
TW564627B (en) System and method for authentication in public networks
US10206077B2 (en) Identification of provisioning status for a subscriber identity module
CN103812653A (en) Method and system for automatically acquiring account information accessed into wireless network
CN106657154B (en) Wireless access method, system, WiFi platform and operator number taking platform
EP3993471B1 (en) Sim swap scam protection via passive monitoring
CN110839050B (en) Method, system and wireless access point for detecting user offline
CN106572523B (en) Application program operation control method and device and terminal
US20100009669A1 (en) Management of mobile station memory content
CN113810899A (en) eSIM device configuration system, method, apparatus and storage medium
CN104754689B (en) home gateway access management method and system
KR100865383B1 (en) Method for usage restriction of illegal mobile terminal and illegal smart card and system thereof
JP2020502894A (en) Service ordering method and device
CN106341374B (en) Method and device for limiting access of unlicensed user equipment to home gateway
US8875238B2 (en) Authentication servers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant