CN107094094A - Networking methods, device and the terminal of application program - Google Patents
Networking methods, device and the terminal of application program Download PDFInfo
- Publication number
- CN107094094A CN107094094A CN201710241487.6A CN201710241487A CN107094094A CN 107094094 A CN107094094 A CN 107094094A CN 201710241487 A CN201710241487 A CN 201710241487A CN 107094094 A CN107094094 A CN 107094094A
- Authority
- CN
- China
- Prior art keywords
- application program
- network
- identification
- disabled state
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The disclosure is directed to a kind of networking methods of application program, device and terminal, wherein, this method includes:The access request for the access application that user sends is received, access request includes application program identification;According to application program identification, if it is determined that application program is the application program of disabled state, then it is determined that when in the blacklist list that application program identification is present in network firewall, it is labeled for the application program identification of disabled state application program that blacklist list includes at least one, application program networking request is initiated after preset time has been waited, so that application program connects network.So that terminal will not be when it is determined that application program mark be disabled state, the result of network can not be connected by just returning to the application program immediately, terminal is allowd to go the application program labeled as disabled state to be networked automatically, the success rate of the networking of the application program of disabled state is improved, Consumer's Experience is improved.
Description
Technical field
This disclosure relates to field of terminal technology, more particularly to application program networking methods, device and terminal.
Background technology
With the development of terminal technology, for example, smart mobile phone, tablet personal computer, desktop computer etc., terminal applies are extensive
It is applied in the live and work of people.Also types of applications program has been mounted in terminal, with the work and life of convenient people.
Application program is not after a period of time is used by a user, and the application program mark can be disabled state by the system of terminal,
And limit the application program and access network, and then save the system resource of terminal, reach the purpose for saving terminal power.
In correlation technique, terminal by application program mark be disabled state after, need to use this to apply journey in user
When sequence, terminal can go inquiry whether to limit the application program in the blacklist of network firewall and use network, if really
The definite limitation application program uses network, and directly to return to the application program can not connect the result of network;Then need to use
Family operates the application program again, goes to carry out the networking of application program.
But in correlation technique, terminal is by application program mark for after disabled state, the application program is not true
Positive can not connect network, but when user needs to use the application program, if it is determined that the application program mark is
Disabled state, can return to the application program can not connect the result of network, and then this can not be networked using line program, shadow
Consumer's Experience is rung.
The content of the invention
To overcome present in correlation technique when user needs to use the application program, if it is determined that this applies journey
Sequence is labeled as disabled state, and can return to the application program can not connect the result of network, so cause this using line program without
Method networks, the problem of have impact on Consumer's Experience, and the disclosure provides a kind of networking methods of application program, device and terminal.
According to the first aspect of the embodiment of the present disclosure there is provided a kind of networking methods of application program, including:
The access request for the access application that user sends is received, wherein, the access request includes application program
Mark;
According to the application program identification, judge the application program whether be disabled state application program;
If it is determined that the application program is the application program of disabled state, then inquire about whether the application program identification deposits
It is in the blacklist list in network firewall, wherein, it is labeled in order to not that the blacklist list includes at least one
The application program identification of active state application program;
If it is determined that the application program identification is present in the blacklist list in network firewall, then waiting default
Application program networking request is initiated after time, so that the application program connects network.
Further, methods described, in addition to:
The application program identification is removed from the blacklist list in the preset time, and removes described answer
With the mark of the disabled state of program.
Further, application program networking request is initiated after preset time has been waited described, so that the application
After program connection network, in addition to:
If the application program connection network is unsuccessful, the application program networking request of preset times is initiated again.
Further, application program networking request is initiated after preset time has been waited described, so that the application
After program connection network, in addition to:
If application program connection network is unsuccessful, being pushed to the user should with other of application program same type
With program, so that user determines whether to open the other applications.
Further, if the access request includes at least two application program identifications;
Accordingly, it is described that application program networking request is initiated after preset time has been waited, so that the application program
Network is connected, including:
After preset time has been waited, the preferential level of each application program according to corresponding to each application program identification
Sequence, initiates the application program networking request for each application program, so that each application program is sequentially connected net successively
Network.
Further, the priority order, including any one following:
The descending of the access times of each application program, the priority height order for each application program that user is set respectively should
With the order of the type of program.
The technical scheme provided by this disclosed embodiment can include the following benefits:By receiving the visit that user sends
The access request of application program is asked, wherein, access request includes application program identification;According to application program identification, judging should
With program whether be disabled state application program;If it is determined that application program is the application program of disabled state, then inquire about
Application program identification whether there is in the blacklist list in network firewall, wherein, blacklist list includes at least one
It is individual labeled for the application program identification of disabled state application program;If it is determined that application program identification is present in network fire prevention
In blacklist list in wall, then application program networking request is initiated after preset time has been waited, so that application program connects
Connect network.So as to which terminal can be gone to determine the application program when it is determined that application program is the application program of disabled state
Identify whether to be present in the blacklist list in network firewall, to determine whether the application program is forbidden by network firewall
Network is accessed, when it is determined that the application program forbids accessing network by network firewall, goes to wait hair after preset time automatically
Play application program networking request;So that terminal just will not immediately be returned when it is determined that application program mark is disabled state
The result of network can not be connected by returning the application program so that terminal automatically can go the application program labeled as disabled state
Networked, improve the success rate of the networking of the application program of disabled state, improve Consumer's Experience.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of networked devices of application program, including:
Receiving module, is configured as receiving the access request for the access application that user sends, wherein, the access please
Asking includes application program identification;
Judge module, is configured as according to the application program identification, and whether judge the application program is inactive shape
The application program of state;
Enquiry module, is configured as if it is determined that the application program is the application program of disabled state, then inquiry is described
Application program identification with the presence or absence of in blacklist list in network firewall, wherein, the blacklist list include to
Few one labeled for the application program identification of disabled state application program;
Link block, is configured as if it is determined that the application program identification is present in the blacklist list in network firewall
In, then application program networking request is initiated after preset time has been waited, so that the application program connects network.
Further, the link block, including:
Submodule is removed, is configured as if it is determined that the application program identification is present in the blacklist row in network firewall
In table, the application program identification is removed from the blacklist list in the preset time, and remove the application
The mark of the disabled state of program;
Submodule is connected, is configured as initiating application program networking request after preset time has been waited, so that described
Application program connects network.
Further, described device, in addition to:
Initiation module, is configured as initiating application program after preset time has been waited described in the link block
Networking request, so as to after application program connection network, if application program connection network is unsuccessful, initiate again
The application program networking request of preset times.
Further, described device, in addition to:
Pushing module, is configured as initiating application program after preset time has been waited described in the link block
Networking request, so as to after application program connection network, if application program connection network is unsuccessful, be used to described
Family pushes the other applications with application program same type, so that user determines whether to open the other applications.
Further, if the access request includes at least two application program identifications;
Accordingly, the link block, is specifically configured to:
If it is determined that the application program identification is present in the blacklist list in network firewall, then waiting default
After time, the priority order of each application program according to corresponding to each application program identification is initiated for described each successively
The application program networking request of application program, so that each application program is sequentially connected network.
Further, the priority order, including any one following:
The descending of the access times of each application program, the priority height order for each application program that user is set respectively should
With the order of the type of program.
The technical scheme provided by this disclosed embodiment can include the following benefits:By receiving the visit that user sends
The access request of application program is asked, wherein, access request includes application program identification;According to application program identification, judging should
With program whether be disabled state application program;If it is determined that application program is the application program of disabled state, then inquire about
Application program identification whether there is in the blacklist list in network firewall, wherein, blacklist list includes at least one
It is individual labeled for the application program identification of disabled state application program;If it is determined that application program identification is present in network fire prevention
In blacklist list in wall, then application program networking request is initiated after preset time has been waited, so that application program connects
Connect network.So as to which terminal can be gone to determine the application program when it is determined that application program is the application program of disabled state
Identify whether to be present in the blacklist list in network firewall, to determine whether the application program is forbidden by network firewall
Network is accessed, when it is determined that the application program forbids accessing network by network firewall, goes to wait hair after preset time automatically
Play application program networking request;So that terminal just will not immediately be returned when it is determined that application program mark is disabled state
The result of network can not be connected by returning the application program so that terminal automatically can go the application program labeled as disabled state
Networked, improve the success rate of the networking of the application program of disabled state, improve Consumer's Experience.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of terminal, including:
Processor, and for storing the memory of processor-executable instruction;
Wherein, the processor is configured as:The access request for the access application that user sends is received, wherein, institute
Stating access request includes application program identification;Whether according to the application program identification, it is not living to judge the application program
The application program of jump state;If it is determined that the application program is the application program of disabled state, then the application program is inquired about
Identify whether to be present in the blacklist list in network firewall, wherein, the blacklist list includes at least one quilt
The application program identification of disabled state application program is marked as;If it is determined that the application program identification is present in network fire prevention
In blacklist list in wall, then application program networking request is initiated after preset time has been waited, so that the application journey
Sequence connects network.
The technical scheme provided by this disclosed embodiment can include the following benefits:By receiving the visit that user sends
The access request of application program is asked, wherein, access request includes application program identification;According to application program identification, judging should
With program whether be disabled state application program;If it is determined that application program is the application program of disabled state, then inquire about
Application program identification whether there is in the blacklist list in network firewall, wherein, blacklist list includes at least one
It is individual labeled for the application program identification of disabled state application program;If it is determined that application program identification is present in network fire prevention
In blacklist list in wall, then application program networking request is initiated after preset time has been waited, so that application program connects
Connect network.So as to which terminal can be gone to determine the application program when it is determined that application program is the application program of disabled state
Identify whether to be present in the blacklist list in network firewall, to determine whether the application program is forbidden by network firewall
Network is accessed, when it is determined that the application program forbids accessing network by network firewall, goes to wait hair after preset time automatically
Play application program networking request;So that terminal just will not immediately be returned when it is determined that application program mark is disabled state
The result of network can not be connected by returning the application program so that terminal automatically can go the application program labeled as disabled state
Networked, improve the success rate of the networking of the application program of disabled state, improve Consumer's Experience.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not
The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the present invention
Example, and for explaining principle of the invention together with specification.
Fig. 1 is a kind of flow chart of the networking methods embodiment one of application program according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the networking methods embodiment two of application program according to an exemplary embodiment;
Fig. 3 is a kind of block diagram of the networked devices embodiment three of application program according to an exemplary embodiment;
Fig. 4 is a kind of block diagram of the networked devices example IV of application program according to an exemplary embodiment;
Fig. 5 is a kind of block diagram of the entity of terminal according to an exemplary embodiment;
Fig. 6 is a kind of block diagram of terminal device 800 according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the present invention.
Fig. 1 is a kind of flow chart of the networking methods embodiment one of application program according to an exemplary embodiment,
As shown in figure 1, the networking methods of application program are used in terminal, the terminal includes mobile terminal, personal terminal etc., for example, touch
Screen mobile phone, tablet personal computer, PC etc., this method comprises the following steps.
In step s 11, the access request for the access application that user sends is received, wherein, in the access request
Including application program identification.
In this step, user is when the application program in needing to use terminal, and user can be with touch terminal screen
The application program of upper display, or user send the speech message for opening application program to terminal, and terminal can get user
The access request of the access application of transmission, includes application program identification (Identification, letter in the access request
Claim ID).
In step s 12, whether according to the application program identification, it is answering for disabled state to judge the application program
Use program.
In this step, because application program is not after a period of time is used by a user, the system of terminal can answer this
It is disabled state with programming indicia, and limits application program access network so that application program can not accesses network, make
The system resource in application program using terminal is limited with methods such as operation dispatch services (Job Scheduler).So as to terminal
Need the application program identification ID in access request, judge on foreground application program whether be disabled state application journey
Sequence.
For example, the application program identification of the application program of multiple disabled states has been stored in the foreground of terminal
ID, thus terminal can judge on foreground current application program whether be disabled state application program.
In step s 13, however, it is determined that the application program is the application program of disabled state, then inquires about the application journey
Sequence identifies whether to be present in the blacklist list in network firewall, wherein, the blacklist list includes at least one
It is labeled for the application program identification of disabled state application program.
In this step, due to having in the network firewall of terminal in a blacklist list, the blacklist list
It is labeled for the application program identification of disabled state application program including at least one;Terminal is not if it is determined that application program is
The application program of active state, then terminal can just go in fire wall to go inquiry application to identify whether that being present in network prevents
In blacklist list in wall with flues.
Specifically, in terminal, especially mobile terminal, the system for largely using Android (Android) is being answered
With program after a period of time is not used by a user, application program can be marked as in Android source code in the terminal
AppInactive states, i.e. disabled state;Meanwhile, terminal can pass through terminal for the Network Control Segment of application program
The application program identification ID of the application program is added network firewall by the netd services of bottom, netd by iptables services
Fw_standby this chain blacklist list in, so as to reach that control application program accesses the purpose of network;Understand,
The blacklist list includes multiple labeled for the application program identification of disabled state application program.So, work as terminal
When determining the application program that application program is disabled state, it may be determined that application program accesses network and is rejected, terminal
It can first pass through and whether there is in the fw_standby of iptables service-seeking network firewalls this chain blacklist list
The application program identification ID of the application program.
In step S14, however, it is determined that the application program identification is present in the blacklist list in network firewall, then
Application program networking request is initiated after preset time has been waited, so that the application program connects network.
Wherein, in step S14 implementation process, terminal can perform procedure below:
The application program identification is removed from the blacklist list in the preset time, and removes described answer
With the mark of the disabled state of program.
In this step, terminal is if it is determined that application program identification is present in the blacklist list in network firewall, eventually
End can wait preset time, and then terminal initiates application program networking request after preset time has been waited so that current
Application program goes to connect network.Wherein, in this preset time, terminal can will remove the inactive of the application program on foreground
In the mark of state, and blacklist list in network firewall, the application program identification of the application program is removed.
Specifically, terminal is if it is determined that application program identification is present in the blacklist list in network firewall, now
The access request of application program can be put into a cache list, then wait preset time 500ms;When this is default
Between in 500ms, terminal can will remove the mark of the disabled state of the application program on foreground, and be serviced by iptables
From the fw_standby of network firewall this chain blacklist list, the application program identification ID of the application program is gone
Remove;Also, this preset time 500ms, is according to by collecting the big data summed up on a large number of users mobile phone and being analyzed
Draw afterwards, this preset time 500ms is to have arrived foreground for waiting the system framework layer of terminal to detect application program, will
The appInactive status indications of application program are removed, and release network control of the network firewall to application program.So that
After preset time 500ms, terminal initiates application program networking request, backward reference result so that application program connects network.
The present embodiment by receive user send access application access request, wherein, access request includes
Application program identification;According to application program identification, judge application program whether be disabled state application program;If it is determined that should
With the application program that program is disabled state, then inquiry application identifies whether to be present in the blacklist in network firewall
In list, wherein, it is labeled for the application program mark of disabled state application program that blacklist list includes at least one
Know;If it is determined that application program identification is present in the blacklist list in network firewall, then after preset time has been waited
Application program networking request is initiated, so that application program connects network.So as to which terminal can be it is determined that application program be inactive
During the application program of state, in the blacklist list for identifying whether to be present in network firewall for going the determination application program,
To determine whether the application program is forbidden accessing network by network firewall, it is determined that the application program is forbidden by network firewall
When accessing network, go after waiting preset time automatically to initiate application program networking request;So that terminal will not it is determined that using
When programming indicia is disabled state, the application program is just returned immediately can not connect the result of network so that terminal can
Automatically to go the application program labeled as disabled state to be networked, the networking of the application program of disabled state is improved
Success rate, improves Consumer's Experience.
On the basis of the embodiment shown in above-mentioned Fig. 1, Fig. 2 is one kind application journey according to an exemplary embodiment
The flow chart of the networking methods embodiment two of sequence, if as shown in Fig. 2 the access request includes at least two application program marks
Know;
Accordingly, step S14 is specifically included:
If it is determined that the application program identification is present in the blacklist list in network firewall, then waiting default
After time, the priority order of each application program according to corresponding to each application program identification is initiated for described each successively
The application program networking request of application program, so that each application program is sequentially connected network.
Wherein, the priority order, including any one following:
The descending of the access times of each application program, the priority height order for each application program that user is set respectively should
With the order of the type of program.
In this step, when access request includes the application program identification of multiple application programs, if terminal is really
Fixed each application program identification is present in the blacklist list in network firewall, and then terminal deposits each application program identification
In cache list, while setting priority order for each application program;Wherein, priority order can be each application program quilt
The descending of access times, or the priority height order for each application program that user is voluntarily set, or respectively should
With the order of the type of program.
Then terminal is after preset time has been waited, according to the priority order of each application program, goes to initiate pin successively
Application program networking request to each application program, and then cause each application program to go to be sequentially connected net according to the priority order
Network.
Also include after step s 14:
In the step s 21, if application program connection network is unsuccessful, the application program of preset times is initiated again
Networking request.
In this step, after step s 14, if terminal determines application program, connection network is unsuccessful, and terminal can be again
The secondary application program networking request initiated for the application program.Terminal can initiate repeatedly networking request.
Or, also include after step s 14:
In step S22, if application program connection network is unsuccessful, pushed to the user same with application program
The other applications of type, so that user determines whether to open the other applications.
In this step, after step s 14, if terminal determines application program, connection network is unsuccessful, and terminal can be true
The type of the fixed application program, then terminal can push that the terminal has been mounted with to user with the application program same type
Other applications, then user oneself choose whether to open and the other applications of the application program same type.
For example, after step s 14, if terminal determines application program, connection network is unsuccessful, and terminal can be determined
The type of the application program is " video type ", and then terminal can push " the video class that the terminal has been mounted with to user
The other applications of type ", then user oneself choose whether open should " video type " other applications.
The present embodiment by receive user send access application access request, wherein, access request includes
Application program identification;According to application program identification, judge application program whether be disabled state application program;If it is determined that should
With the application program that program is disabled state, then inquiry application identifies whether to be present in the blacklist in network firewall
In list, wherein, it is labeled for the application program mark of disabled state application program that blacklist list includes at least one
Know;If it is determined that application program identification is present in the blacklist list in network firewall, then after preset time has been waited
Application program networking request is initiated, so that application program connects network.So as to which terminal can be it is determined that application program be inactive
During the application program of state, in the blacklist list for identifying whether to be present in network firewall for going the determination application program,
To determine whether the application program is forbidden accessing network by network firewall, it is determined that the application program is forbidden by network firewall
When accessing network, go after waiting preset time automatically to initiate application program networking request;So that terminal will not it is determined that using
When programming indicia is disabled state, the application program is just returned immediately can not connect the result of network so that terminal can
Automatically to go the application program labeled as disabled state to be networked, the networking of the application program of disabled state is improved
Success rate, improves Consumer's Experience.If also, application program connection network is unsuccessful, and the application journey of preset times is initiated again
Sequence networking request;Or, if application program connection network it is unsuccessful, to user push with application program same type other should
With program, so that user determines whether to open other applications;And then current application program is successfully networked, or
Person is that user recommends other applications, improves Consumer's Experience.
Fig. 3 is a kind of block diagram of the networked devices embodiment three of application program according to an exemplary embodiment.Ginseng
According to Fig. 3, the device includes:
Receiving module 31, is configured as receiving the access request for the access application that user sends, wherein, it is described to access
Request includes application program identification;
Judge module 32, is configured as according to the application program identification, and whether judge the application program is inactive
The application program of state;
Enquiry module 33, be configured as if it is determined that the application program be disabled state application program, then inquire about institute
State in the blacklist list that application program identification whether there is in network firewall, wherein, the blacklist list includes
At least one is labeled for the application program identification of disabled state application program;
Link block 34, is configured as if it is determined that the application program identification is present in the blacklist row in network firewall
In table, then application program networking request is initiated after preset time has been waited, so that the application program connects network.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
Embodiment one in be described in detail, explanation will be not set forth in detail herein.
The present embodiment by receive user send access application access request, wherein, access request includes
Application program identification;According to application program identification, judge application program whether be disabled state application program;If it is determined that should
With the application program that program is disabled state, then inquiry application identifies whether to be present in the blacklist in network firewall
In list, wherein, it is labeled for the application program mark of disabled state application program that blacklist list includes at least one
Know;If it is determined that application program identification is present in the blacklist list in network firewall, then after preset time has been waited
Application program networking request is initiated, so that application program connects network.So as to which terminal can be it is determined that application program be inactive
During the application program of state, in the blacklist list for identifying whether to be present in network firewall for going the determination application program,
To determine whether the application program is forbidden accessing network by network firewall, it is determined that the application program is forbidden by network firewall
When accessing network, go after waiting preset time automatically to initiate application program networking request;So that terminal will not it is determined that using
When programming indicia is disabled state, the application program is just returned immediately can not connect the result of network so that terminal can
Automatically to go the application program labeled as disabled state to be networked, the networking of the application program of disabled state is improved
Success rate, improves Consumer's Experience.
On the basis of the embodiment shown in above-mentioned Fig. 3, Fig. 4 is one kind application journey according to an exemplary embodiment
The block diagram of the networked devices example IV of sequence.Reference picture 4, the link block 34, including:
Submodule 341 is removed, is configured as if it is determined that the application program identification is present in the black name in network firewall
In single-row table, the application program identification is removed from the blacklist list in the preset time, and removed described
The mark of the disabled state of application program;
Submodule 342 is connected, is configured as initiating application program networking request after preset time has been waited, so that institute
State application program connection network.
Described device, in addition to:
Initiation module 41, is configured as initiating application after preset time has been waited described in the link block 34
Program networking request, so that after application program connection network, if application program connection network is unsuccessful, again
Initiate the application program networking request of preset times.
Or, described device, in addition to:
Pushing module 42, is configured as initiating application after preset time has been waited described in the link block 34
Program networking request, so that after application program connection network, if application program connection network is unsuccessful, to institute
User's push and the other applications of application program same type are stated, so that user determines whether to open the other application journey
Sequence.
If the access request includes at least two application program identifications;
Accordingly, the link block 34, is specifically configured to:
If it is determined that the application program identification is present in the blacklist list in network firewall, then waiting default
After time, the priority order of each application program according to corresponding to each application program identification is initiated for described each successively
The application program networking request of application program, so that each application program is sequentially connected network.
Wherein, the priority order, including any one following:
The descending of the access times of each application program, the priority height order for each application program that user is set respectively should
With the order of the type of program.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
Embodiment two in be described in detail, explanation will be not set forth in detail herein.
The present embodiment by receive user send access application access request, wherein, access request includes
Application program identification;According to application program identification, judge application program whether be disabled state application program;If it is determined that should
With the application program that program is disabled state, then inquiry application identifies whether to be present in the blacklist in network firewall
In list, wherein, it is labeled for the application program mark of disabled state application program that blacklist list includes at least one
Know;If it is determined that application program identification is present in the blacklist list in network firewall, then after preset time has been waited
Application program networking request is initiated, so that application program connects network.So as to which terminal can be it is determined that application program be inactive
During the application program of state, in the blacklist list for identifying whether to be present in network firewall for going the determination application program,
To determine whether the application program is forbidden accessing network by network firewall, it is determined that the application program is forbidden by network firewall
When accessing network, go after waiting preset time automatically to initiate application program networking request;So that terminal will not it is determined that using
When programming indicia is disabled state, the application program is just returned immediately can not connect the result of network so that terminal can
Automatically to go the application program labeled as disabled state to be networked, the networking of the application program of disabled state is improved
Success rate, improves Consumer's Experience.If also, application program connection network is unsuccessful, and the application journey of preset times is initiated again
Sequence networking request;Or, if application program connection network it is unsuccessful, to user push with application program same type other should
With program, so that user determines whether to open other applications;And then current application program is successfully networked, or
Person is that user recommends other applications, improves Consumer's Experience.
Fig. 5 is a kind of block diagram of the entity of terminal according to an exemplary embodiment.Reference picture 5, the terminal can be with
It is implemented as:Processor 51, and it is configured as storing the memory 52 of processor-executable instruction;
Wherein, the processor 51 is configured as:The access request for the access application that user sends is received, wherein,
The access request includes application program identification;Whether according to the application program identification, it is not to judge the application program
The application program of active state;If it is determined that the application program is the application program of disabled state, then the application journey is inquired about
Sequence identifies whether to be present in the blacklist list in network firewall, wherein, the blacklist list includes at least one
It is labeled for the application program identification of disabled state application program;Prevent if it is determined that the application program identification is present in network
In blacklist list in wall with flues, then application program networking request is initiated after preset time has been waited, so that the application
Program connects network.
In the above-described embodiments, it should be appreciated that the processor can be CPU (English:Central
Processing Unit, referred to as:CPU), it can also be other general processors, digital signal processor (English:Digital
Signal Processor, referred to as:DSP), application specific integrated circuit (English:Application Specific Integrated
Circuit, referred to as:ASIC) etc..General processor can be microprocessor or the processor can also be any conventional place
Device etc. is managed, and foregoing memory can be read-only storage (English:Read-only memory, abbreviation:ROM), deposit at random
Access to memory (English:Random access memory, referred to as:RAM), flash memory, hard disk or solid state hard disc.SIM
Card is also referred to as subscriber identification card, smart card, and digital mobile telephone must load onto this card and can use.I.e. in computer chip
On store the information of digital mobile phone client, the content such as the key of encryption and the telephone directory of user.With reference to of the invention real
The step of applying the method disclosed in example can be embodied directly in hardware processor and perform completion, or with the hardware in processor and
Software module combination performs completion.
On the terminal in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
It is described in detail with the embodiment of device, explanation will be not set forth in detail herein.
The present embodiment by receive user send access application access request, wherein, access request includes
Application program identification;According to application program identification, judge application program whether be disabled state application program;If it is determined that should
With the application program that program is disabled state, then inquiry application identifies whether to be present in the blacklist in network firewall
In list, wherein, it is labeled for the application program mark of disabled state application program that blacklist list includes at least one
Know;If it is determined that application program identification is present in the blacklist list in network firewall, then after preset time has been waited
Application program networking request is initiated, so that application program connects network.So as to which terminal can be it is determined that application program be inactive
During the application program of state, in the blacklist list for identifying whether to be present in network firewall for going the determination application program,
To determine whether the application program is forbidden accessing network by network firewall, it is determined that the application program is forbidden by network firewall
When accessing network, go after waiting preset time automatically to initiate application program networking request;So that terminal will not it is determined that using
When programming indicia is disabled state, the application program is just returned immediately can not connect the result of network so that terminal can
Automatically to go the application program labeled as disabled state to be networked, the networking of the application program of disabled state is improved
Success rate, improves Consumer's Experience.
Fig. 6 is a kind of block diagram of terminal device 800 according to an exemplary embodiment.For example, terminal device 800 can
To be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices are good for
Body equipment, personal digital assistant etc..
Reference picture 6, terminal device 800 can include following one or more assemblies:Processing assembly 802, memory 804,
Power supply module 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814,
And communication component 816.
The integrated operation of the usual control terminal equipment 800 of processing assembly 802, such as with display, call, data are led to
Letter, the camera operation operation associated with record operation.Processing assembly 802 can include one or more processors 820 to hold
Row instruction, to complete all or part of step of above-mentioned method.In addition, processing assembly 802 can include one or more moulds
Block, is easy to the interaction between processing assembly 802 and other assemblies.For example, processing assembly 802 can include multi-media module, with
Facilitate the interaction between multimedia groupware 808 and processing assembly 802.
Memory 804 is configured as storing various types of data supporting the operation in terminal device 800.These data
Example include the instruction of any application program or method for being used to operate on terminal device 800, contact data, telephone directory
Data, message, picture, video etc..Memory 804 can by any kind of volatibility or non-volatile memory device or it
Combination realize that such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable
Except programmable read only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, soon
Flash memory, disk or CD.
Power supply module 806 provides electric power for the various assemblies of terminal device 800.Power supply module 806 can include power supply pipe
Reason system, one or more power supplys, and other components associated with generating, managing and distributing electric power for terminal device 800.
Multimedia groupware 808 is included in the screen of one output interface of offer between the terminal device 800 and user.
In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface
Plate, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch
Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip
The border of action, but also the detection duration related to the touch or slide and pressure.In certain embodiments,
Multimedia groupware 808 includes a front camera and/or rear camera.When terminal device 800 is in operator scheme, such as clap
When taking the photograph pattern or video mode, front camera and/or rear camera can receive the multi-medium data of outside.It is each preposition
Camera and rear camera can be a fixed optical lens systems or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike
Wind (MIC), when terminal device 800 is in operator scheme, when such as call model, logging mode and speech recognition mode, microphone
It is configured as receiving external audio signal.The audio signal received can be further stored in memory 804 or via logical
Letter component 816 is sent.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
I/O interfaces 812 is provide interface between processing assembly 802 and peripheral interface module, above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 814 includes one or more sensors, the state for providing various aspects for terminal device 800
Assess.For example, sensor cluster 814 can detect opening/closed mode of terminal device 800, the relative positioning of component, example
As described component be terminal device 800 display and keypad, sensor cluster 814 can also detect terminal device 800 or
The position of 800 1 components of terminal device changes, the existence or non-existence that user contacts with terminal device 800, terminal device 800
The temperature change of orientation or acceleration/deceleration and terminal device 800.Sensor cluster 814 can include proximity transducer, be configured
For the presence of object near being detected in not any physical contact.Sensor cluster 814 can also include optical sensor,
Such as CMOS or ccd image sensor, for being used in imaging applications.In certain embodiments, the sensor cluster 814 may be used also
With including acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between terminal device 800 and other equipment.
Terminal device 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.Show at one
In example property embodiment, communication component 816 receives broadcast singal or broadcast from external broadcasting management system via broadcast channel
Relevant information.In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, short to promote
Cheng Tongxin.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module
(UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal device 800 can be by one or more application specific integrated circuits (ASIC), number
Word signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of terminal device 800.Example
Such as, the non-transitorycomputer readable storage medium can be ROM, it is random access memory (RAM), CD-ROM, tape, soft
Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal
When device is performed so that mobile terminal is able to carry out a kind of networking methods of application program, and methods described includes:
The access request for the access application that user sends is received, wherein, the access request includes application program
Mark;
According to the application program identification, judge the application program whether be disabled state application program;
If it is determined that the application program is the application program of disabled state, then inquire about whether the application program identification deposits
It is in the blacklist list in network firewall, wherein, it is labeled in order to not that the blacklist list includes at least one
The application program identification of active state application program;
If it is determined that the application program identification is present in the blacklist list in network firewall, then waiting default
Application program networking request is initiated after time, so that the application program connects network.
Those skilled in the art will readily occur to its of the present invention after considering specification and putting into practice invention disclosed herein
Its embodiment.The application be intended to the present invention any modification, purposes or adaptations, these modifications, purposes or
Person's adaptations follow the general principle of the present invention and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is only limited by appended claim.
Claims (13)
1. a kind of networking methods of application program, it is characterised in that including:
The access request for the access application that user sends is received, wherein, the access request includes application program identification;
According to the application program identification, judge the application program whether be disabled state application program;
If it is determined that the application program be disabled state application program, then inquire about the application program identification whether there is in
In blacklist list in network firewall, wherein, it is labeled in order to inactive that the blacklist list includes at least one
The application program identification of state application;
If it is determined that the application program identification is present in the blacklist list in network firewall, then preset time is being waited
Application program networking request is initiated afterwards, so that the application program connects network.
2. according to the method described in claim 1, it is characterised in that methods described, in addition to:
The application program identification is removed from the blacklist list in the preset time, and removes the application journey
The mark of the disabled state of sequence.
3. according to the method described in claim 1, it is characterised in that initiate to apply journey after preset time has been waited described
Sequence networking request, so that after application program connection network, in addition to:
If the application program connection network is unsuccessful, the application program networking request of preset times is initiated again.
4. according to the method described in claim 1, it is characterised in that initiate to apply journey after preset time has been waited described
Sequence networking request, so that after application program connection network, in addition to:
If the application program connection network is unsuccessful, the other application journey with application program same type is pushed to the user
Sequence, so that user determines whether to open the other applications.
5. the method according to claim any one of 1-4, it is characterised in that if the access request includes at least two
Application program identification;
Accordingly, it is described that application program networking request is initiated after preset time has been waited, so that the application program is connected
Network, including:
After preset time has been waited, the priority order of each application program according to corresponding to each application program identification, according to
The secondary application program networking request initiated for each application program, so that each application program is sequentially connected network.
6. method according to claim 5, it is characterised in that the priority order, including any one following:
The descending of the access times of each application program, the priority height order for each application program that user is set, respectively using journey
The order of the type of sequence.
7. a kind of networked devices of application program, it is characterised in that including:
Receiving module, is configured as receiving the access request for the access application that user sends, wherein, in the access request
Including application program identification;
Judge module, is configured as according to the application program identification, and whether judge the application program is disabled state
Application program;
Enquiry module, be configured as if it is determined that the application program be disabled state application program, then inquire about the application
Program identification whether there is in the blacklist list in network firewall, wherein, the blacklist list includes at least one
It is individual labeled for the application program identification of disabled state application program;
Link block, is configured as if it is determined that the application program identification is present in the blacklist list in network firewall,
Application program networking request is then initiated after preset time has been waited, so that the application program connects network.
8. device according to claim 7, it is characterised in that the link block, including:
Submodule is removed, is configured as if it is determined that the application program identification is present in the blacklist list in network firewall
In, the application program identification is removed from the blacklist list in the preset time, and remove the application journey
The mark of the disabled state of sequence;
Submodule is connected, is configured as initiating application program networking request after preset time has been waited, so that the application
Program connects network.
9. device according to claim 7, it is characterised in that described device, in addition to:
Initiation module, is configured as initiating application program networking after preset time has been waited described in the link block
Request, so as to after application program connection network, if application program connection network is unsuccessful, initiate default again
The application program networking request of number of times.
10. device according to claim 7, it is characterised in that described device, in addition to:
Pushing module, is configured as initiating application program networking after preset time has been waited described in the link block
Request, so as to after application program connection network, if application program connection network is unsuccessful, be pushed away to the user
The other applications with application program same type are sent, so that user determines whether to open the other applications.
11. the device according to claim any one of 7-10, it is characterised in that if the access request includes at least two
Individual application program identification;
Accordingly, the link block, is specifically configured to:
If it is determined that the application program identification is present in the blacklist list in network firewall, then preset time is being waited
Afterwards, the priority order of each application program according to corresponding to each application program identification, initiates to be directed to each application successively
The application program networking request of program, so that each application program is sequentially connected network.
12. device according to claim 11, it is characterised in that the priority order, including any one following:
The descending of the access times of each application program, the priority height order for each application program that user is set, respectively using journey
The order of the type of sequence.
13. a kind of terminal, it is characterised in that including:
Processor, and for storing the memory of processor-executable instruction;
Wherein, the processor is configured as:The access request for the access application that user sends is received, wherein, it is described to visit
Ask that request includes application program identification;Whether according to the application program identification, it is inactive shape to judge the application program
The application program of state;If it is determined that the application program is the application program of disabled state, then the application program identification is inquired about
With the presence or absence of in the blacklist list in network firewall, wherein, the blacklist list includes at least one and is labeled
For the application program identification of disabled state application program;If it is determined that the application program identification is present in network firewall
Blacklist list in, then after preset time has been waited initiate application program networking request so that the application program connect
Connect network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710241487.6A CN107094094B (en) | 2017-04-13 | 2017-04-13 | Application networking method and device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710241487.6A CN107094094B (en) | 2017-04-13 | 2017-04-13 | Application networking method and device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107094094A true CN107094094A (en) | 2017-08-25 |
CN107094094B CN107094094B (en) | 2020-06-19 |
Family
ID=59638079
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710241487.6A Active CN107094094B (en) | 2017-04-13 | 2017-04-13 | Application networking method and device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107094094B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108259514A (en) * | 2018-03-26 | 2018-07-06 | 平安科技(深圳)有限公司 | Leak detection method, device, computer equipment and storage medium |
CN108391307A (en) * | 2018-02-09 | 2018-08-10 | 北京小米移动软件有限公司 | Power consumption management-control method, device and storage medium based on android system |
CN108934056A (en) * | 2018-06-20 | 2018-12-04 | 联想(北京)有限公司 | The control method and system of electronic equipment |
CN111162943A (en) * | 2019-12-27 | 2020-05-15 | 珠海格力电器股份有限公司 | Method and device for configuring application networking priority and electronic equipment |
CN112883073A (en) * | 2021-03-22 | 2021-06-01 | 北京同邦卓益科技有限公司 | Data screening method, device, equipment, readable storage medium and product |
US11375374B1 (en) * | 2021-03-24 | 2022-06-28 | Verizon Patent And Licensing Inc. | Systems and methods for temporarily barring UE network slice usage |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090019517A1 (en) * | 2007-07-10 | 2009-01-15 | Bhavin Turakhia | Method and System for Restricting Access of One or More Users to a Service |
CN101431473A (en) * | 2008-12-31 | 2009-05-13 | 深圳市迅雷网络技术有限公司 | Method and apparatus for implementing network speed limit |
US20100003980A1 (en) * | 2008-07-02 | 2010-01-07 | Johan Rune | Automatic configuration of inter-domain access technology neighbor relations |
CN102469093A (en) * | 2010-11-19 | 2012-05-23 | 中国电信股份有限公司 | System and method for controlling networking authorization on networking application |
US20130090115A1 (en) * | 2011-10-07 | 2013-04-11 | Giri Prassad Deivasigamani | Methods and apparatus for intelligent initiation of connections within a network |
CN103857008A (en) * | 2012-12-03 | 2014-06-11 | 电信科学技术研究院 | Access control method and device |
CN106059954A (en) * | 2016-05-27 | 2016-10-26 | 青岛海信电器股份有限公司 | Network bandwidth regulation method and device |
-
2017
- 2017-04-13 CN CN201710241487.6A patent/CN107094094B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090019517A1 (en) * | 2007-07-10 | 2009-01-15 | Bhavin Turakhia | Method and System for Restricting Access of One or More Users to a Service |
US20100003980A1 (en) * | 2008-07-02 | 2010-01-07 | Johan Rune | Automatic configuration of inter-domain access technology neighbor relations |
CN101431473A (en) * | 2008-12-31 | 2009-05-13 | 深圳市迅雷网络技术有限公司 | Method and apparatus for implementing network speed limit |
CN102469093A (en) * | 2010-11-19 | 2012-05-23 | 中国电信股份有限公司 | System and method for controlling networking authorization on networking application |
US20130090115A1 (en) * | 2011-10-07 | 2013-04-11 | Giri Prassad Deivasigamani | Methods and apparatus for intelligent initiation of connections within a network |
CN103857008A (en) * | 2012-12-03 | 2014-06-11 | 电信科学技术研究院 | Access control method and device |
CN106059954A (en) * | 2016-05-27 | 2016-10-26 | 青岛海信电器股份有限公司 | Network bandwidth regulation method and device |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108391307A (en) * | 2018-02-09 | 2018-08-10 | 北京小米移动软件有限公司 | Power consumption management-control method, device and storage medium based on android system |
CN108259514A (en) * | 2018-03-26 | 2018-07-06 | 平安科技(深圳)有限公司 | Leak detection method, device, computer equipment and storage medium |
CN108259514B (en) * | 2018-03-26 | 2020-11-24 | 平安科技(深圳)有限公司 | Vulnerability detection method and device, computer equipment and storage medium |
CN108934056A (en) * | 2018-06-20 | 2018-12-04 | 联想(北京)有限公司 | The control method and system of electronic equipment |
CN111162943A (en) * | 2019-12-27 | 2020-05-15 | 珠海格力电器股份有限公司 | Method and device for configuring application networking priority and electronic equipment |
CN111162943B (en) * | 2019-12-27 | 2021-02-09 | 珠海格力电器股份有限公司 | Method and device for configuring application networking priority and electronic equipment |
CN112883073A (en) * | 2021-03-22 | 2021-06-01 | 北京同邦卓益科技有限公司 | Data screening method, device, equipment, readable storage medium and product |
CN112883073B (en) * | 2021-03-22 | 2024-04-05 | 北京同邦卓益科技有限公司 | Data screening method, device, equipment, readable storage medium and product |
US11375374B1 (en) * | 2021-03-24 | 2022-06-28 | Verizon Patent And Licensing Inc. | Systems and methods for temporarily barring UE network slice usage |
Also Published As
Publication number | Publication date |
---|---|
CN107094094B (en) | 2020-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107094094A (en) | Networking methods, device and the terminal of application program | |
CN104780155B (en) | Apparatus bound method and device | |
CN103986969B (en) | application management method, device and system | |
CN103916829B (en) | A kind of desktop Notification Method of message and device | |
EP2975821A1 (en) | Network connection method and apparatus | |
CN108268322B (en) | Memory optimization method and device and computer readable storage medium | |
CN107608561A (en) | Touch-screen control method and device | |
CN107205084A (en) | Network speed processing method, device and the terminal of application program | |
CN103916468B (en) | Method for upgrading system, terminal, server and upgrade-system | |
CN104539812B (en) | Recommendation information acquisition methods, terminal and server | |
CN109117874A (en) | Operation behavior prediction technique and device | |
CN106209604A (en) | Add the method and device of good friend | |
CN107181671A (en) | Social information treating method and apparatus | |
CN105554215A (en) | Automatic selection dialing method and device, and mobile terminal | |
CN108476379A (en) | Information recording method and information record carrier | |
EP3160112B1 (en) | Reminding method and device | |
CN106412884A (en) | WIFI connection management method and apparatus thereof | |
CN106453774A (en) | Method and apparatus for displaying contact information | |
CN106412481B (en) | Reminding method, device and terminal based on VoLTE video calling | |
CN104780256A (en) | Address book management method and device and intelligent terminal | |
CN105554325A (en) | Blacklist number processing method and mobile terminal | |
CN106789554A (en) | The method and device of short message treatment | |
CN106293717A (en) | The processing method of the setting of terminal, device and terminal | |
CN105634928A (en) | Social reminding method and device based on wearable device | |
CN107527191A (en) | Return processing method, device, terminal and the server of red packet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |