CN107070816B - Application identification method and device and mobile terminal - Google Patents

Application identification method and device and mobile terminal Download PDF

Info

Publication number
CN107070816B
CN107070816B CN201710209919.5A CN201710209919A CN107070816B CN 107070816 B CN107070816 B CN 107070816B CN 201710209919 A CN201710209919 A CN 201710209919A CN 107070816 B CN107070816 B CN 107070816B
Authority
CN
China
Prior art keywords
network interface
application
vpn
interface
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710209919.5A
Other languages
Chinese (zh)
Other versions
CN107070816A (en
Inventor
乜聚科
刘立伟
刘任
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710209919.5A priority Critical patent/CN107070816B/en
Publication of CN107070816A publication Critical patent/CN107070816A/en
Application granted granted Critical
Publication of CN107070816B publication Critical patent/CN107070816B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • H04L47/803Application aware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephone Function (AREA)

Abstract

The disclosure relates to an application identification method and device and a mobile terminal. The method comprises the following steps: acquiring a changed network interface, wherein the changed network interface comprises a newly added network interface or a deleted network interface; and when the changed network interface is a VPN interface, determining the identifier of the application corresponding to the changed network interface. According to the method, the mobile terminal does not need to match the preset VPN software list, the VPN application identification efficiency and accuracy are greatly improved, and the mobile terminal can avoid limiting application networking corresponding to the changed network interface when power consumption control is carried out.

Description

Application identification method and device and mobile terminal
Technical Field
The present disclosure relates to communication technologies, and in particular, to an application identification method and apparatus, and a mobile terminal.
Background
With the continuous development of communication technology, mobile terminals such as mobile phones and tablet computers become indispensable tools in people's lives, taking a mobile phone as an example, various Application programs (APP for short) are integrated on the mobile phone, and people can chat, shop, order tickets and the like through the APP, so that great convenience is brought to people's lives. In addition, as the user demand increases, for example, when the user wants to access a foreign website, some Virtual Private Network (VPN) software or VPN applications are often integrated on the mobile phone. The VPN application is responsible for constructing a new special network channel on a public network for other APPs needing to surf the internet.
Cell phone systems are used in certain scenarios, such as: the power consumption optimization control scenario can be as follows: and after the APP runs for a period of time in the background, the APP networking is prohibited, so that the power consumption of the mobile phone is controlled. However, since the VPN application requires special handling, if the VPN application is prohibited from networking while running in the background, other APPs that rely on the VPN application to network are affected.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides an application identification method, an application identification device and a mobile terminal.
According to a first aspect of the embodiments of the present disclosure, there is provided an application identification method, including:
acquiring a changed network interface, wherein the changed network interface comprises a newly added network interface or a deleted network interface;
and when the changed network interface is a VPN interface, determining the identifier of the application corresponding to the changed network interface.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: the method comprises the steps that when the mobile terminal monitors that a network interface changes, the changed network interface is obtained, and when the changed network interface is determined to be a VPN interface, an application identifier corresponding to the changed network interface is determined. In the embodiment, the mobile terminal does not need to match a preset VPN software list, so that the efficiency and accuracy of VPN application identification are greatly improved, and the mobile terminal can avoid limiting application networking corresponding to a changed network interface when power consumption is controlled.
Optionally, if the changed network interface is a newly added network interface, the determining the identifier of the application corresponding to the changed network interface includes:
acquiring current VPN configuration information, wherein the current VPN configuration information comprises a corresponding relation between a name of a VPN interface and an application identifier;
and determining the application identifier corresponding to the newly added network interface according to the name of the newly added network interface and the VPN configuration information.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: in this embodiment, the mobile terminal monitors that a network interface is newly added at present, and when it is determined that the newly added network interface is a VPN interface, obtains current VPN configuration information, and further determines, according to the VPN configuration information and a name of the newly added network interface, an identifier of an application requesting to establish the newly added network interface at present. Therefore, when the mobile terminal controls the power consumption, the limitation of application networking corresponding to the newly added network interface can be avoided, and the user experience is greatly improved; meanwhile, the method for identifying the VPN application does not need to match a preset VPN software list, and accuracy of VPN application identification is greatly improved.
Further, the method further comprises:
and establishing a first corresponding relation between the name of the newly added network interface and the application identifier corresponding to the newly added network interface, and storing the first corresponding relation.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: in this embodiment, each time a new VPN interface is added to the mobile terminal, the mobile terminal establishes a first correspondence between an interface name of the VPN interface and an identifier of an application requesting to establish the VPN interface. Based on the corresponding relation, the mobile terminal can acquire which VPN application corresponds to the currently deleted VPN interface, so that the situation that the mobile terminal cannot acquire which VPN application corresponds to the currently deleted VPN interface based on VPN configuration information is avoided, and the accuracy of VPN application identification is improved.
Optionally, if the changed network interface is the deleted network interface, the determining the identifier of the application corresponding to the changed network interface includes:
determining an application identifier corresponding to the deleted network interface according to a second corresponding relation stored in advance; the second correspondence includes a correspondence between the name of the deleted network interface and an identifier of an application corresponding to the deleted network interface, and the second correspondence is stored before the deleted network interface is deleted.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: in this embodiment, when the mobile terminal monitors that the network interface is currently deleted, and determines that the currently deleted network interface is a VPN interface, the mobile terminal determines, by combining the second correspondence stored in advance and the name of the deleted VPN interface, an identifier of an application corresponding to the deleted network interface, so as to determine that the application corresponding to the deleted network interface is a limitable VPN application, that is, the application corresponding to the deleted network interface does not currently provide a service of a VPN channel for other non-VPN applications, and therefore, when the mobile terminal performs power consumption control, networking of the application or other measures that may bring power consumption to the mobile terminal may be limited, and power consumption of the mobile terminal is further reduced.
Optionally, if the name of the changed network interface is in the tun X format, determining that the changed network interface is a VPN interface; wherein X is an integer of 0 or more.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: in this embodiment, the mobile terminal determines whether the changed network interface is a VPN interface by determining whether the name of the changed network interface is in the tun X format, and the determination method is simple, thereby greatly reducing the processing overhead of the mobile terminal.
According to a second aspect of the embodiments of the present disclosure, there is provided an apparatus for identifying an application, including:
the network interface processing module is configured to obtain changed network interfaces, wherein the changed network interfaces comprise added network interfaces or deleted network interfaces;
the determining module is configured to determine an identifier of an application corresponding to the changed network interface when the changed network interface is a VPN interface.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: when the mobile terminal monitors that the network interface changes, the changed network interface is obtained through the obtaining module, and when the changed network interface is determined to be the VPN interface, the application identifier corresponding to the changed network interface is determined. In the embodiment, the mobile terminal does not need to match a preset VPN software list, so that the efficiency and accuracy of VPN application identification are greatly improved, and the mobile terminal can avoid limiting application networking corresponding to a changed network interface when power consumption is controlled.
Optionally, if the changed network interface is a newly added network interface, the determining module includes:
the obtaining submodule is configured to obtain current VPN configuration information, wherein the current VPN configuration information comprises a corresponding relation between a name of a VPN interface and an application identifier;
and the first determining submodule is configured to determine the identifier of the application corresponding to the newly added network interface according to the name of the newly added network interface and the VPN configuration information.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: in this embodiment, the mobile terminal monitors that a network interface is newly added currently, and when it is determined that the newly added network interface is a VPN interface, obtains current VPN configuration information through the obtaining sub-module, and then the first determining sub-module determines, according to the VPN configuration information and the name of the newly added network interface, an identifier of an application requesting to establish the newly added network interface currently. Therefore, when the mobile terminal controls the power consumption, the limitation of application networking corresponding to the newly added network interface can be avoided, and the user experience is greatly improved; meanwhile, the method for identifying the VPN application does not need to match a preset VPN software list, and accuracy of VPN application identification is greatly improved.
Further, the apparatus further comprises:
the establishing module is configured to establish a first corresponding relation between the name of the newly added network interface and the application identifier corresponding to the newly added network interface;
a storage module configured to save the first correspondence.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: in this embodiment, each time a new VPN interface is added to the mobile terminal, the establishing module of the mobile terminal establishes a first corresponding relationship between the interface name of the VPN interface and the identifier of the application requesting to establish the VPN interface, and stores the first corresponding relationship in the storage module. Based on the corresponding relation, the mobile terminal can acquire which VPN application corresponds to the currently deleted VPN interface, so that the situation that the mobile terminal cannot acquire which VPN application corresponds to the currently deleted VPN interface based on VPN configuration information is avoided, and the accuracy of VPN application identification is improved.
Optionally, if the changed network interface is a deleted network interface, the determining module includes:
the second determining submodule is configured to determine, according to a second correspondence stored in advance, an identifier of an application corresponding to the deleted network interface; the second correspondence includes a correspondence between the name of the deleted network interface and an identifier of an application corresponding to the deleted network interface, and the second correspondence is stored before the deleted network interface is deleted.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: in this embodiment, when the mobile terminal monitors that the network interface is currently deleted, and determines that the currently deleted network interface is a VPN interface, the second determining sub-module determines, by combining the pre-stored second correspondence and the name of the deleted VPN interface, the identifier of the application corresponding to the deleted network interface, so as to determine that the application corresponding to the deleted network interface is a limitable VPN application, that is, the application corresponding to the deleted network interface does not currently provide a service of a VPN channel for other non-VPN applications, and therefore, when the mobile terminal performs power consumption control, the application may be limited from networking or other measures that may bring power consumption to the mobile terminal, and the power consumption of the mobile terminal is further reduced.
Optionally, the determining module is configured to determine that the changed network interface is a VPN interface when the name of the changed network interface is in a tun X format; wherein X is an integer of 0 or more.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: in this embodiment, the mobile terminal determines, by the determination module, whether the name of the changed network interface is in the tun X format to determine whether the changed network interface is the VPN interface, and the determination method is simple and greatly reduces the processing overhead of the mobile terminal.
According to a third aspect of the embodiments of the present disclosure, there is provided a mobile terminal including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring a changed network interface, wherein the changed network interface comprises a newly added network interface or a deleted network interface;
and when the changed network interface is a VPN interface, determining the identifier of the application corresponding to the changed network interface.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: when the mobile terminal monitors that the network interface changes, the processor acquires the changed network interface, and when the processor determines that the changed network interface is a VPN interface, the processor determines the application identifier corresponding to the changed network interface. In the embodiment, the mobile terminal does not need to match a preset VPN software list, so that the efficiency and accuracy of VPN application identification are greatly improved, and the mobile terminal can avoid limiting application networking corresponding to a changed network interface when power consumption is controlled.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow diagram illustrating a method for identification of an application in accordance with an exemplary embodiment;
FIG. 2 is a flow chart illustrating a method of identifying an application in accordance with another exemplary embodiment;
FIG. 3 is a flow chart illustrating a method of identifying an application in accordance with yet another exemplary embodiment;
FIG. 4 is a flow chart illustrating a method of identifying an application in accordance with yet another exemplary embodiment;
FIG. 5 is a block diagram illustrating an apparatus for identifying an application in accordance with an exemplary embodiment;
FIG. 6 is a block diagram illustrating an apparatus for identification of an application in accordance with another exemplary embodiment;
FIG. 7 is a block diagram illustrating an apparatus for identification of an application in accordance with yet another exemplary embodiment;
FIG. 8 is a block diagram illustrating an apparatus for identification of an application in accordance with yet another exemplary embodiment;
FIG. 9 is a block diagram illustrating entities of a mobile terminal in accordance with an exemplary embodiment;
fig. 10 is a block diagram illustrating a mobile terminal 1300 according to an example embodiment.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
Fig. 1 is a flowchart illustrating an application identification method according to an exemplary embodiment, where the application identification method is applied to a mobile terminal, for example, a mobile phone, a tablet computer, a personal digital assistant, and other terminals. The embodiment relates to a specific process of determining an application corresponding to a network interface according to a changed network interface when a current network interface of a mobile terminal is changed (for example, a new network interface is added or a certain network interface is deleted). As shown in fig. 1, the method comprises the steps of:
in step S101, a changed network interface is acquired; the changed network interfaces comprise added network interfaces or deleted network interfaces.
Before describing the specific technical solution of the present embodiment, an application background of the present embodiment is described:
when a user triggers an option switch of a data network of the mobile terminal, the mobile terminal establishes a data network interface with the internet, when the user triggers a WLAN option switch of the mobile terminal, the mobile terminal establishes a WLAN network interface with the internet, and when the user triggers a certain VPN application on the mobile terminal to connect with the network, the mobile terminal establishes a network interface between the mobile terminal and a VPN server through the internet, wherein the network interface is a VPN interface. Specifically, when the VPN network interface is established and deleted, the following may be performed: when the VPN application needs to establish a VPN channel, the VPN application sends an interface establishment request to an operating system of the mobile terminal, and the operating system establishes a VPN interface between the mobile terminal and a VPN server according to the interface establishment request; when the VPN application needs to cancel the VPN channel, the VPN application sends an interface canceling request to an operating system, and the operating system cancels the VPN interface between the mobile terminal and the VPN server according to the interface canceling request.
When the mobile terminal is in some scenes, for example, in a power consumption optimization control scene, the mobile terminal prohibits some APP networking running in the background, so as to control the power consumption of the mobile phone. However, if the VPN application is prohibited from networking while running in the background, other APPs that rely on the VPN application to network may be affected. Therefore, there is a need to identify the currently running VPN application. In the prior art, when identifying a VPN application, a currently running APP is generally matched with a VPN software list to identify the VPN application. However, since the VPN applications stored in the VPN software list are not comprehensive, the identification of the VPN applications is not accurate, and further, when the mobile phone restricts APP networking, a problem of false restriction on some VPN applications is caused, which affects user experience. The present embodiment is directed to solving the technical problems as described above.
In this step, the mobile terminal monitors the change state of the current network interface, that is, the mobile terminal monitors whether a new network interface is added to the current network interface or whether a certain network interface is deleted, where the network interface may be a data network interface, a WLAN network interface, or a VPN interface. Optionally, the mobile terminal may set a network interface listener through a basenetwork observer class of an android operating system (android) to monitor a change of the network interface, and of course, when the mobile terminal is a terminal device of another operating system, the mobile terminal may also monitor in another manner, which is not limited in this embodiment.
When the mobile terminal monitors that the network interface is added or one or more network interfaces are deleted, the mobile terminal acquires the changed network interfaces.
In step S102, when the changed network interface is a VPN interface, an identifier of an application corresponding to the VPN interface is determined.
In this step, after the mobile terminal acquires the changed network interface, the mobile terminal determines whether the changed network interface is a VPN interface, optionally, the mobile terminal may determine whether the changed network interface is a VPN interface according to the name of the changed network interface, and may also determine whether the current changed network interface is a VPN interface according to the character identifier of the name of the changed network interface, for example, if the first several characters of the name of the changed network interface are preset characters, it may be determined that the changed network interface is a VPN interface.
When the mobile terminal determines that the changed network interface is a VPN interface, the mobile terminal determines an identifier of an application corresponding to the changed network interface, and the application corresponding to the changed network interface is a VPN application. It should be noted that, when the changed network interface is the new network interface, the "identifier of the application corresponding to the changed network interface" may be an identifier of an application requesting to establish the new network interface, and when the changed network interface is the deleted network interface, the "identifier of the application corresponding to the changed network interface" is an identifier of an application requesting to delete the network interface.
Optionally, the mobile terminal may determine the identifier of the application corresponding to the changed network interface by using the name of the changed network interface, where in this case, the name of the changed network interface may be in a preset form including the identifier of the application; optionally, the mobile terminal may further determine the identifier of the application corresponding to the changed network interface according to the correspondence between the different network interfaces and the identifiers of the different applications.
When the mobile terminal determines the identifier of the application corresponding to the changed network interface, because the application is the VPN application, the mobile terminal can avoid limiting the application networking when performing power consumption control, thereby greatly improving the user experience.
In the application identification method provided in this embodiment, when the mobile terminal monitors that the network interface changes, the mobile terminal obtains the changed network interface, and when it is determined that the changed network interface is the VPN interface, determines the identifier of the application corresponding to the changed network interface. In the embodiment, the mobile terminal does not need to match a preset VPN software list, so that the efficiency and accuracy of VPN application identification are greatly improved, and the mobile terminal can avoid limiting application networking corresponding to a changed network interface when power consumption is controlled.
Fig. 2 is a flowchart illustrating an application identification method according to another exemplary embodiment, where the application identification method is applied to a mobile terminal, for example, a mobile phone, a tablet computer, a personal digital assistant, and the like. The embodiment relates to a specific process that a mobile terminal determines whether a currently changed network interface is a VPN interface. On the basis of the above embodiment, the method comprises the following steps:
in step S201, it is determined whether the name of the changed network interface is in the tun X format; wherein X is an integer of 0 or more.
In step S202, if the name of the changed network interface is tu X, the changed network interface is determined to be a VPN interface.
In this embodiment, when the mobile terminal establishes or deletes the virtual private network connection with the VPN server, a network interface is generally created or deleted, and the name of the network interface may be in the tun X format.
Therefore, in order to determine whether the currently changed network interface is the VPN interface, the mobile terminal may obtain the name of the currently changed network interface, and then determine whether the name of the currently changed network interface is in the tun X format. When the mobile terminal determines that the form of the first interface name is the tun X form, the mobile terminal determines that the changed network interface is the VPN interface.
In the method provided by this embodiment, the mobile terminal determines whether the changed network interface is a VPN interface by determining whether the name of the changed network interface is in a tun X format, and the determination method is simple and greatly reduces the processing overhead of the mobile terminal.
Fig. 3 is a flowchart illustrating an application identification method according to yet another exemplary embodiment, where the application identification method is applied to a mobile terminal, for example, a mobile phone, a tablet computer, a personal digital assistant, and the like. The embodiment relates to a specific process that when the changed network interface is the newly added network interface, the mobile terminal determines an identifier of an application corresponding to the changed network interface. On the basis of the above embodiment, the above S102 may include the following steps:
s301: and when the changed network interface is a VPN interface, acquiring current VPN configuration information, wherein the current VPN configuration information comprises a corresponding relation between the name of the VPN interface and the application identifier.
In this step, when the mobile terminal monitors that a network interface is newly added and the mobile terminal determines that the newly added network interface is a VPN interface, the mobile terminal may determine that an application initiating establishment of the newly added network interface is a VPN application. However, since the mobile terminal does not know which application the newly added network interface was initiated by at this time, the mobile terminal may obtain current VPN configuration information. Optionally, the mobile terminal may obtain current VPN configuration information through the get VPN config () interface, where the VPN configuration information includes a correspondence between a name of the VPN interface and an identifier of the application, that is, the name of the VPN interface included in the current VPN configuration information is an existing VPN interface of the current mobile terminal, and the identifier of the application corresponding to each VPN interface name is a VPN application that is currently running and provides a VPN channel for other non-VPN applications.
It should be noted that the correspondence between the names of different VPN interfaces and the identifiers of the applications included in the VPN configuration information is generated along with the establishment of the VPN interface and is deleted along with the deletion of the VPN interface, and a simple example is described here: assuming that a VPN application (assumed as an M application) requests to establish a new VPN interface (assumed as an a interface), the VPN configuration information generates a correspondence between the identifier of the M application and the name of the a interface. When the M application of the mobile terminal cancels the VPN tunnel, that is, deletes the VPN interface corresponding to the M application, the VPN configuration information does not have the correspondence between the identifier of the a interface and the identifier of the M application.
S302: and determining the application identifier corresponding to the newly added network interface according to the name of the newly added network interface and the VPN configuration information.
In this step, after the mobile terminal obtains the current VPN configuration information, the mobile terminal queries the VPN configuration information according to the name of the newly added network interface, so as to obtain an application identifier corresponding to the newly added network interface. Therefore, the mobile terminal can know which application the newly added network interface is initiated by and know that the application is VPN software. Therefore, when the mobile terminal controls the power consumption, the limitation of the application networking can be avoided, and the user experience is greatly improved; meanwhile, the method for identifying the VPN application does not need to match a preset VPN software list, and accuracy of VPN application identification is greatly improved.
Alternatively, the embodiment may be implemented by the following code, but is not limited to the form of the code.
Figure BDA0001260752390000091
Figure BDA0001260752390000101
The following is a partial code for determining the identifier of the application corresponding to the newly added network interface:
Figure BDA0001260752390000102
Figure BDA0001260752390000103
in the application identification method provided in this embodiment, the mobile terminal monitors that a network interface is newly added at present, and when it is determined that the newly added network interface is a VPN interface, obtains current VPN configuration information, and further determines, according to the VPN configuration information and a name of the newly added network interface, an identifier of an application that requests to establish the newly added network interface at present. Therefore, when the mobile terminal controls the power consumption, the limitation of application networking corresponding to the newly added network interface can be avoided, and the user experience is greatly improved; meanwhile, the method for identifying the VPN application does not need to match a preset VPN software list, and accuracy of VPN application identification is greatly improved.
As a possible implementation manner of the foregoing embodiment, when the changed network interface is a newly added network interface, the mobile terminal may establish a first corresponding relationship between the newly added network interface and an identifier of an application corresponding to the newly added network interface, and store the first corresponding relationship. The first corresponding relationship is different from the mapping relationship between the newly added network interface in the VPN configuration information and the identifier of the corresponding application in the storage type, and it can be known from the description of the above embodiment that all the corresponding relationships in the VPN configuration information are generated along with the establishment of the network interface and deleted along with the deletion of the network interface. The first corresponding relation enables the mobile terminal to directly know which application established VPN interface is deleted after a certain VPN interface is deleted, so that the mobile terminal can limit networking of the application and further control power consumption, and the scene can be specifically as follows:
when the mobile terminal monitors that a VPN interface is deleted, the mobile terminal cannot know which VPN application corresponds to the deleted VPN interface based on the current VPN configuration information (this is because the current VPN configuration information acquired by the mobile terminal does not include the name of the deleted VPN interface and the identifier of the application corresponding to the name), and therefore, the mobile terminal cannot know which VPN application corresponds to the currently deleted VPN interface, that is, cannot know which VPN application is no longer running at present, and cannot perform power consumption limitation on the VPN application that is no longer running. Based on this, after the mobile terminal determines, by combining the name of the newly added network interface and the current VPN configuration information, the identifier of the application that currently requests to establish the newly added network interface, the mobile terminal may establish and store the first corresponding relationship between the newly added network interface and the identifier of the corresponding application, which is referred to the code implementation in the embodiment shown in fig. 3.
In the above embodiment, each time a new VPN interface is added to the mobile terminal, the mobile terminal establishes a first correspondence between an interface name of the VPN interface and an identifier of an application requesting establishment of the VPN interface. Based on the first corresponding relation, the mobile terminal can acquire which VPN application corresponds to the currently deleted VPN interface, so that the situation that the mobile terminal cannot acquire which VPN application corresponds to the currently deleted VPN interface based on VPN configuration information is avoided, and the accuracy of VPN application identification is improved.
Fig. 4 is a flowchart illustrating an application identification method according to yet another exemplary embodiment, where the application identification method is applied to a mobile terminal, for example, a mobile phone, a tablet computer, a personal digital assistant, and the like. The embodiment relates to a specific process that when the changed network interface is a deleted network interface, the mobile terminal determines an identifier of an application corresponding to the deleted network interface. In addition to the above embodiment, the above S102 may be:
in step S401, when the changed network interface is a VPN interface, determining an identifier of an application corresponding to the deleted network interface according to a second correspondence stored in advance; the second correspondence includes a correspondence between the name of the deleted network interface and an identifier of an application corresponding to the deleted network interface, and the second correspondence is stored before the deleted network interface is deleted.
In this step, when the mobile terminal monitors that a certain network interface is currently deleted and the deleted network interface is a VPN interface, the mobile terminal may obtain an interface name of the currently deleted network interface and determine an application identifier corresponding to the deleted network interface by combining a second correspondence stored in advance. It should be noted that the second correspondence is stored before the deleted network interface is not deleted, for example, the deleted network interface is established and stored at the beginning of establishment, and the second correspondence exists all the time after the second correspondence is established from the beginning.
After the mobile terminal determines the identifier of the application corresponding to the deleted network interface, the mobile terminal learns that the application corresponding to the deleted network interface cancels the VPN channel with the VPN server, that is, the application does not currently provide a service of the VPN channel for other non-VPN applications, so that when the mobile terminal performs power consumption control, networking of the application or other measures which bring power consumption to the mobile terminal can be limited, and the power consumption of the mobile terminal is further reduced.
Alternatively, the embodiment may be implemented by the following code, but is not limited to the form of the code.
Figure BDA0001260752390000121
The following is a partial code to obtain the identity of the application corresponding to the deleted network interface:
Figure BDA0001260752390000122
Figure BDA0001260752390000131
in the application identification method provided by this embodiment, when the mobile terminal monitors that the network interface is currently deleted, and determines that the currently deleted network interface is the VPN interface, the mobile terminal determines, by combining with the second correspondence stored in advance and the name of the deleted VPN interface, the identifier of the application corresponding to the deleted network interface, so as to determine that the application corresponding to the deleted network interface is a limitable VPN application, that is, the application corresponding to the deleted network interface does not currently provide a service of a VPN channel for other non-VPN applications, and therefore, when the mobile terminal performs power consumption control, the application may be limited from networking or other measures that may bring power consumption to the mobile terminal, and the power consumption of the mobile terminal is further reduced.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
Fig. 5 is a block diagram illustrating an identification apparatus of an application, which may be implemented as part or all of a mobile terminal by software, hardware, or a combination of both, according to an example embodiment. As shown in fig. 5, the apparatus for identifying an application includes: an acquisition module 11 and a determination module 12.
The acquiring module 11 is configured to acquire a changed network interface, where the changed network interface includes a newly added network interface or a deleted network interface;
a determining module 12 configured to determine, when the changed network interface is a VPN interface, an identifier of an application corresponding to the changed network interface.
To sum up, according to the application identification apparatus provided in the embodiment of the present disclosure, when the mobile terminal monitors that the network interface changes, the mobile terminal acquires the changed network interface through the acquisition module, and when it is determined that the changed network interface is the VPN interface, determines the identifier of the application corresponding to the changed network interface. In the embodiment, the mobile terminal does not need to match a preset VPN software list, so that the efficiency and accuracy of VPN application identification are greatly improved, and the mobile terminal can avoid limiting application networking corresponding to a changed network interface when power consumption is controlled.
Fig. 6 is a block diagram illustrating an identification apparatus of an application, which may be implemented as part or all of a mobile terminal by software, hardware, or a combination of both, according to another exemplary embodiment. In this embodiment, the changed network interface is a newly added network interface, and on the basis of the embodiment shown in fig. 5, as further shown in fig. 6, the determining module 12 includes an obtaining sub-module 121 and a first determining sub-module 122.
The obtaining submodule 121 is configured to obtain current VPN configuration information, where the current VPN configuration information includes a correspondence between a name of a VPN interface and an identifier of an application;
the first determining sub-module 122 is configured to determine, according to the name of the newly added network interface and the VPN configuration information, an identifier of an application corresponding to the newly added network interface.
To sum up, in the application identification apparatus provided in the embodiment of the present disclosure, when the mobile terminal monitors that the network interface is newly added currently, and determines that the newly added network interface is a VPN interface, the obtaining sub-module obtains the current VPN configuration information, and then the first determining sub-module determines, according to the VPN configuration information and the name of the newly added network interface, the identifier of the application that currently requests to establish the newly added network interface. Therefore, when the mobile terminal controls the power consumption, the limitation of application networking corresponding to the newly added network interface can be avoided, and the user experience is greatly improved; meanwhile, the method for identifying the VPN application does not need to match a preset VPN software list, and accuracy of VPN application identification is greatly improved.
Fig. 7 is a block diagram illustrating an identification apparatus of an application, which may be implemented as part or all of a mobile terminal by software, hardware, or a combination of both, according to yet another exemplary embodiment. On the basis of the embodiment of fig. 6, as shown in fig. 7, the identification apparatus for the application may further include: a building module 13 and a storage module 14;
an establishing module 13 configured to establish a first correspondence between the name of the newly added network interface and an identifier of an application corresponding to the newly added network interface;
a storage module 14 configured to save the first correspondence.
To sum up, with the application identification apparatus provided in the embodiment of the present disclosure, each time a new VPN interface is added to the mobile terminal, the establishing module of the mobile terminal establishes a first corresponding relationship between the interface name of the VPN interface and the identifier of the application requesting to establish the VPN interface, and stores the first corresponding relationship in the storage module. Based on the corresponding relation, the mobile terminal can acquire which VPN application corresponds to the currently deleted VPN interface, so that the situation that the mobile terminal cannot acquire which VPN application corresponds to the currently deleted VPN interface based on VPN configuration information is avoided, and the accuracy of VPN application identification is improved.
Fig. 8 is a block diagram illustrating an identification means of an application, which may be implemented as part or all of a mobile terminal by software, hardware, or a combination of both, according to yet another exemplary embodiment. On the basis of the embodiment of fig. 5, as shown in fig. 8, the determining module 12 includes: a second determination sub-module 123;
the second determining sub-module 123 is configured to determine, according to a second correspondence stored in advance, an identifier of an application corresponding to the deleted network interface; the second correspondence includes a correspondence between the name of the deleted network interface and an identifier of an application corresponding to the deleted network interface, and the second correspondence is stored before the deleted network interface is deleted.
To sum up, according to the identification apparatus for VPN application provided in the embodiment of the present disclosure, when the mobile terminal monitors that the current deleted network interface is the VPN interface, the second determining sub-module determines, according to the second correspondence stored in advance and the name of the deleted VPN interface, the identifier of the application corresponding to the deleted network interface, so as to determine that the application corresponding to the deleted network interface is the limitable VPN application, that is, the application corresponding to the deleted network interface does not currently provide a service of a VPN channel for other non-VPN applications, and therefore, when the mobile terminal performs power consumption control, networking of the application or other measures that may bring power consumption to the mobile terminal may be limited, and power consumption of the mobile terminal is further reduced.
Optionally, the determining module is configured to determine that the changed network interface is a VPN interface when the name of the changed network interface is in a tun X format; wherein X is an integer of 0 or more.
In the optional mode, the mobile terminal judges whether the name of the changed network interface is in the tun X form or not through the determining module to determine whether the changed network interface is the VPN interface or not, and the determining mode is simple and greatly reduces the processing overhead of the mobile terminal.
With regard to the apparatus in the above-described embodiment, the specific manner in which the respective modules and units perform operations has been described in detail in the embodiment related to the method, and will not be elaborated upon here.
Having described the internal functional modules and structural schematic of the identification apparatus of the application, fig. 9 is a block diagram illustrating an entity of a mobile terminal according to an exemplary embodiment, as shown in fig. 9, the mobile terminal may include: a processor 21, a memory 22 for storing instructions executable by the processor 21;
wherein the processor 21 is configured to:
acquiring a changed network interface, wherein the changed network interface comprises a newly added network interface or a deleted network interface;
and when the changed network interface is a VPN interface, determining the identifier of the application corresponding to the changed network interface.
In the above-mentioned embodiment of the mobile terminal, it should be understood that the Processor 21 may be a Central Processing Unit (CPU), other general-purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. The general purpose processor may be a microprocessor, the processor may be any conventional processor, and the memory 22 may be a read-only memory (ROM), a Random Access Memory (RAM), a flash memory, a hard disk, or a solid state disk. SIM cards, also known as subscriber identity cards, smart cards, must be installed in a digital mobile phone for use. That is, the information of the digital mobile phone client, the encrypted key and the contents of the user's phone book are stored on the computer chip. The steps of a method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in the processor.
Fig. 10 is a block diagram illustrating a mobile terminal 1300 according to an example embodiment. For example, the mobile terminal 1300 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and so forth.
Referring to fig. 10, mobile terminal 1300 may include one or more of the following components: a processing component 1302, a memory 1304, a power component 1306, a multimedia component 1308, an audio component 1310, an input/output (I/O) interface 1312, a sensor component 1314, and a communication component 1316.
Processing component 1302 generally controls overall operation of mobile terminal 1300, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 1302 may include one or more processors 1320 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 1302 can include one or more modules that facilitate interaction between the processing component 1302 and other components. For example, the processing component 1302 may include a multimedia module to facilitate interaction between the multimedia component 1308 and the processing component 1302.
Memory 1304 is configured to store various types of data to support operation at mobile terminal 1300. Examples of such data include instructions for any application or method operating on mobile terminal 1300, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 1304 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power components 1306 provide power to the various components of the mobile terminal 1300. The power components 1306 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the mobile terminal 1300.
The multimedia component 1308 includes a touch-sensitive display screen between the mobile terminal 1300 and a user that provides an output interface. In some embodiments, the touch display screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 1308 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the mobile terminal 1300 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 1310 is configured to output and/or input audio signals. For example, audio component 1310 includes a Microphone (MIC) configured to receive external audio signals when mobile terminal 1300 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 1304 or transmitted via the communication component 1316. In some embodiments, the audio component 1310 also includes a speaker for outputting audio signals.
The I/O interface 1312 provides an interface between the processing component 1302 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
Sensor assembly 1314 includes one or more sensors for providing various aspects of state assessment for mobile terminal 1300. For example, sensor assembly 1314 may detect an open/closed state of mobile terminal 1300, the relative positioning of components, such as a display and keypad of mobile terminal 1300, sensor assembly 1314 may also detect a change in position of mobile terminal 1300 or a component of mobile terminal 1300, the presence or absence of user contact with mobile terminal 1300, orientation or acceleration/deceleration of mobile terminal 1300, and a change in temperature of mobile terminal 1300. The sensor assembly 1314 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 1314 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 1314 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 1316 is configured to facilitate communications between the mobile terminal 1300 and other devices in a wired or wireless manner. The mobile terminal 1300 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 1316 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 1316 also includes a Near Field Communications (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the mobile terminal 1300 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the identification methods of the above-described applications.
In an exemplary embodiment, a non-transitory computer readable storage medium including instructions, such as the memory 1304 including instructions, executable by the processor 1320 of the mobile terminal 1300 to perform the method of identifying an application described above is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer-readable storage medium, wherein instructions, when executed by a processor of a mobile terminal 1300, enable the mobile terminal 1300 to perform the above-described application identification method, the method comprising:
acquiring a changed network interface, wherein the changed network interface comprises a newly added network interface or a deleted network interface;
and when the changed network interface is a VPN interface, determining the identifier of the application corresponding to the changed network interface.
Optionally, if the changed network interface is a newly added network interface, the determining the identifier of the application corresponding to the changed network interface includes:
acquiring current VPN configuration information, wherein the current VPN configuration information comprises a corresponding relation between a name of a VPN interface and an application identifier;
and determining the application identifier corresponding to the newly added network interface according to the name of the newly added network interface and the VPN configuration information.
Further, the method further comprises:
and establishing a first corresponding relation between the name of the newly added network interface and the application identifier corresponding to the newly added network interface, and storing the first corresponding relation.
Optionally, if the changed network interface is the deleted network interface, the determining the identifier of the application corresponding to the changed network interface includes:
determining an application identifier corresponding to the deleted network interface according to a second corresponding relation stored in advance; the second correspondence includes a correspondence between the name of the deleted network interface and an identifier of an application corresponding to the deleted network interface, and the second correspondence is stored before the deleted network interface is deleted.
Optionally, if the name of the changed network interface is in the tun X format, determining that the changed network interface is a VPN interface; wherein X is an integer of 0 or more.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (11)

1. An identification method for an application, comprising:
acquiring a changed network interface, wherein the changed network interface comprises a newly added network interface or a deleted network interface;
determining whether the changed network interface is a VPN interface;
when the changed network interface is a VPN interface, determining an identifier of an application corresponding to the changed network interface so as to determine whether to limit corresponding application networking according to the identifier of the application, wherein the application is a VPN application;
wherein the determining whether to restrict the corresponding application networking according to the identification of the application comprises:
when the network interface corresponding to the application identifier is the newly added network interface, the corresponding application networking is not limited;
and when the network interface corresponding to the application identifier is the deleted network interface, limiting the networking of the corresponding application.
2. The method of claim 1, wherein if the changed network interface is a newly added network interface, the determining the identifier of the application corresponding to the changed network interface comprises:
acquiring current VPN configuration information, wherein the current VPN configuration information comprises a corresponding relation between a name of a VPN interface and an application identifier;
and determining the application identifier corresponding to the newly added network interface according to the name of the newly added network interface and the VPN configuration information.
3. The method of claim 2, further comprising:
and establishing a first corresponding relation between the name of the newly added network interface and the application identifier corresponding to the newly added network interface, and storing the first corresponding relation.
4. The method according to claim 1, wherein if the changed network interface is the deleted network interface, the determining the identifier of the application corresponding to the changed network interface comprises:
determining an application identifier corresponding to the deleted network interface according to a second corresponding relation stored in advance; the second correspondence includes a correspondence between the name of the deleted network interface and an identifier of an application corresponding to the deleted network interface, and the second correspondence is stored before the deleted network interface is deleted.
5. The method of claim 1, wherein determining whether the changed network interface is a VPN interface comprises:
if the name of the changed network interface is in the tun X form, determining that the changed network interface is a VPN interface; wherein X is an integer of 0 or more.
6. An apparatus for identifying an application, comprising:
the network interface processing module is configured to obtain changed network interfaces, wherein the changed network interfaces comprise added network interfaces or deleted network interfaces;
a processing module configured to determine whether the changed network interface is a VPN interface;
the determining module is configured to determine an identifier of an application corresponding to the changed network interface when the changed network interface is a VPN interface, so as to determine whether to limit networking of the corresponding application according to the identifier of the application, wherein the application is a VPN application;
wherein the determining whether to restrict the corresponding application networking according to the identification of the application comprises:
when the network interface corresponding to the application identifier is the newly added network interface, the corresponding application networking is not limited;
and when the network interface corresponding to the application identifier is the deleted network interface, limiting the networking of the corresponding application.
7. The apparatus of claim 6, wherein if the changed network interface is a newly added network interface, the determining module comprises:
the obtaining submodule is configured to obtain current VPN configuration information, wherein the current VPN configuration information comprises a corresponding relation between a name of a VPN interface and an application identifier;
and the first determining submodule is configured to determine the identifier of the application corresponding to the newly added network interface according to the name of the newly added network interface and the VPN configuration information.
8. The apparatus of claim 7, further comprising:
the establishing module is configured to establish a first corresponding relation between the name of the newly added network interface and the application identifier corresponding to the newly added network interface;
a storage module configured to save the first correspondence.
9. The apparatus of claim 6, wherein if the changed network interface is a deleted network interface, the determining module comprises:
the second determining submodule is configured to determine, according to a second correspondence stored in advance, an identifier of an application corresponding to the deleted network interface; the second correspondence includes a correspondence between the name of the deleted network interface and an identifier of an application corresponding to the deleted network interface, and the second correspondence is stored before the deleted network interface is deleted.
10. The apparatus of claim 6, wherein the processing module is specifically configured to determine that the changed network interface is a VPN interface when the name of the changed network interface is in tu X form; wherein X is an integer of 0 or more.
11. A mobile terminal, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring a changed network interface, wherein the changed network interface comprises a newly added network interface or a deleted network interface;
determining whether the changed network interface is a VPN interface;
when the changed network interface is a VPN interface, determining an identifier of an application corresponding to the changed network interface so as to determine whether to limit corresponding application networking according to the identifier of the application, wherein the application is a VPN application;
wherein the determining whether to restrict the corresponding application networking according to the identification of the application comprises:
when the network interface corresponding to the application identifier is the newly added network interface, the corresponding application networking is not limited;
and when the network interface corresponding to the application identifier is the deleted network interface, limiting the networking of the corresponding application.
CN201710209919.5A 2017-03-31 2017-03-31 Application identification method and device and mobile terminal Active CN107070816B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710209919.5A CN107070816B (en) 2017-03-31 2017-03-31 Application identification method and device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710209919.5A CN107070816B (en) 2017-03-31 2017-03-31 Application identification method and device and mobile terminal

Publications (2)

Publication Number Publication Date
CN107070816A CN107070816A (en) 2017-08-18
CN107070816B true CN107070816B (en) 2020-07-03

Family

ID=59602840

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710209919.5A Active CN107070816B (en) 2017-03-31 2017-03-31 Application identification method and device and mobile terminal

Country Status (1)

Country Link
CN (1) CN107070816B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108200011B (en) * 2017-12-11 2020-11-24 中国电子科技集团公司第三十二研究所 Method and system for identifying VPN application in Android system
CN113010000B (en) * 2021-02-22 2024-03-26 北京小米移动软件有限公司 Power consumption optimization method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984044A (en) * 2012-11-16 2013-03-20 深圳市深信服电子科技有限公司 Method and device based on virtual private network (VPN) to achieve data transmission security
CN103840994A (en) * 2012-11-23 2014-06-04 华耀(中国)科技有限公司 System and method for user side to access intranet through VPN
CN105516984A (en) * 2015-07-29 2016-04-20 哈尔滨工业大学(威海) Safe access system of public WiFi

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9143408B2 (en) * 2012-07-30 2015-09-22 Hewlett-Packard Development Company, L.P. Interprovider virtual private network path identification
US9001644B2 (en) * 2013-02-18 2015-04-07 Cisco Technology, Inc. Ethernet virtual private network system for providing fast protection for access rings

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984044A (en) * 2012-11-16 2013-03-20 深圳市深信服电子科技有限公司 Method and device based on virtual private network (VPN) to achieve data transmission security
CN103840994A (en) * 2012-11-23 2014-06-04 华耀(中国)科技有限公司 System and method for user side to access intranet through VPN
CN105516984A (en) * 2015-07-29 2016-04-20 哈尔滨工业大学(威海) Safe access system of public WiFi

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Block Cipher and Stream Cipher Algorithm Performance Comparison in a Personal VPN Gateway;Dimas Dwiki Ismoyo;《2016 International Seminar on Application for Technology of Information and Communication (ISemantic)》;20170309;第207-210页 *

Also Published As

Publication number Publication date
CN107070816A (en) 2017-08-18

Similar Documents

Publication Publication Date Title
EP2975821B1 (en) Network connection method and apparatus
US10608988B2 (en) Method and apparatus for bluetooth-based identity recognition
RU2644511C2 (en) Method and device for displaying router configuration interface
CN107094094B (en) Application networking method and device and terminal
CN106454998B (en) Wireless local area network access method, device and terminal
EP3010187A1 (en) Method for upgrading and device and apparatus thereof
EP3026876B1 (en) Method for acquiring recommending information, terminal and server
EP3226432A1 (en) Method and device for sharing media data between terminals
EP3553672B1 (en) Information interaction method and device and computer readable storage medium thereof
US10922444B2 (en) Method and apparatus for displaying application interface
CN106302528B (en) Short message processing method and device
CN107423146B (en) Method, device and system for controlling mutual calling of application programs
CN107070816B (en) Application identification method and device and mobile terminal
CN106506808B (en) Method and device for prompting communication message
CN109885360B (en) Data processing method, device and storage medium
CN109245992B (en) Request processing method and device, electronic equipment and storage medium
CN106658412B (en) Positioning method and device
CN106712960B (en) Processing method and device of verification code information
US20170316039A1 (en) Information acquisition method, device and system
CN109067959B (en) Address book management method and device
CN106951238B (en) Page display method and device
CN106484261B (en) Information acquisition method and device, information transmission method and device, and terminal
US20170187824A1 (en) Method, device, and computer-readable medium for acquiring user information
CN107645505B (en) Information acquisition method, device and storage medium
CN107087022B (en) Application program operation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant