CN107094094A - Networking methods, device and the terminal of application program - Google Patents

Networking methods, device and the terminal of application program Download PDF

Info

Publication number
CN107094094A
CN107094094A CN201710241487.6A CN201710241487A CN107094094A CN 107094094 A CN107094094 A CN 107094094A CN 201710241487 A CN201710241487 A CN 201710241487A CN 107094094 A CN107094094 A CN 107094094A
Authority
CN
China
Prior art keywords
application program
network
identification
disabled state
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710241487.6A
Other languages
Chinese (zh)
Other versions
CN107094094B (en
Inventor
邱子峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710241487.6A priority Critical patent/CN107094094B/en
Publication of CN107094094A publication Critical patent/CN107094094A/en
Application granted granted Critical
Publication of CN107094094B publication Critical patent/CN107094094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The disclosure is directed to a kind of networking methods of application program, device and terminal, wherein, this method includes:The access request for the access application that user sends is received, access request includes application program identification;According to application program identification, if it is determined that application program is the application program of disabled state, then it is determined that when in the blacklist list that application program identification is present in network firewall, it is labeled for the application program identification of disabled state application program that blacklist list includes at least one, application program networking request is initiated after preset time has been waited, so that application program connects network.So that terminal will not be when it is determined that application program mark be disabled state, the result of network can not be connected by just returning to the application program immediately, terminal is allowd to go the application program labeled as disabled state to be networked automatically, the success rate of the networking of the application program of disabled state is improved, Consumer's Experience is improved.

Description

Networking methods, device and the terminal of application program
Technical field
This disclosure relates to field of terminal technology, more particularly to application program networking methods, device and terminal.
Background technology
With the development of terminal technology, for example, smart mobile phone, tablet personal computer, desktop computer etc., terminal applies are extensive It is applied in the live and work of people.Also types of applications program has been mounted in terminal, with the work and life of convenient people. Application program is not after a period of time is used by a user, and the application program mark can be disabled state by the system of terminal, And limit the application program and access network, and then save the system resource of terminal, reach the purpose for saving terminal power.
In correlation technique, terminal by application program mark be disabled state after, need to use this to apply journey in user When sequence, terminal can go inquiry whether to limit the application program in the blacklist of network firewall and use network, if really The definite limitation application program uses network, and directly to return to the application program can not connect the result of network;Then need to use Family operates the application program again, goes to carry out the networking of application program.
But in correlation technique, terminal is by application program mark for after disabled state, the application program is not true Positive can not connect network, but when user needs to use the application program, if it is determined that the application program mark is Disabled state, can return to the application program can not connect the result of network, and then this can not be networked using line program, shadow Consumer's Experience is rung.
The content of the invention
To overcome present in correlation technique when user needs to use the application program, if it is determined that this applies journey Sequence is labeled as disabled state, and can return to the application program can not connect the result of network, so cause this using line program without Method networks, the problem of have impact on Consumer's Experience, and the disclosure provides a kind of networking methods of application program, device and terminal.
According to the first aspect of the embodiment of the present disclosure there is provided a kind of networking methods of application program, including:
The access request for the access application that user sends is received, wherein, the access request includes application program Mark;
According to the application program identification, judge the application program whether be disabled state application program;
If it is determined that the application program is the application program of disabled state, then inquire about whether the application program identification deposits It is in the blacklist list in network firewall, wherein, it is labeled in order to not that the blacklist list includes at least one The application program identification of active state application program;
If it is determined that the application program identification is present in the blacklist list in network firewall, then waiting default Application program networking request is initiated after time, so that the application program connects network.
Further, methods described, in addition to:
The application program identification is removed from the blacklist list in the preset time, and removes described answer With the mark of the disabled state of program.
Further, application program networking request is initiated after preset time has been waited described, so that the application After program connection network, in addition to:
If the application program connection network is unsuccessful, the application program networking request of preset times is initiated again.
Further, application program networking request is initiated after preset time has been waited described, so that the application After program connection network, in addition to:
If application program connection network is unsuccessful, being pushed to the user should with other of application program same type With program, so that user determines whether to open the other applications.
Further, if the access request includes at least two application program identifications;
Accordingly, it is described that application program networking request is initiated after preset time has been waited, so that the application program Network is connected, including:
After preset time has been waited, the preferential level of each application program according to corresponding to each application program identification Sequence, initiates the application program networking request for each application program, so that each application program is sequentially connected net successively Network.
Further, the priority order, including any one following:
The descending of the access times of each application program, the priority height order for each application program that user is set respectively should With the order of the type of program.
The technical scheme provided by this disclosed embodiment can include the following benefits:By receiving the visit that user sends The access request of application program is asked, wherein, access request includes application program identification;According to application program identification, judging should With program whether be disabled state application program;If it is determined that application program is the application program of disabled state, then inquire about Application program identification whether there is in the blacklist list in network firewall, wherein, blacklist list includes at least one It is individual labeled for the application program identification of disabled state application program;If it is determined that application program identification is present in network fire prevention In blacklist list in wall, then application program networking request is initiated after preset time has been waited, so that application program connects Connect network.So as to which terminal can be gone to determine the application program when it is determined that application program is the application program of disabled state Identify whether to be present in the blacklist list in network firewall, to determine whether the application program is forbidden by network firewall Network is accessed, when it is determined that the application program forbids accessing network by network firewall, goes to wait hair after preset time automatically Play application program networking request;So that terminal just will not immediately be returned when it is determined that application program mark is disabled state The result of network can not be connected by returning the application program so that terminal automatically can go the application program labeled as disabled state Networked, improve the success rate of the networking of the application program of disabled state, improve Consumer's Experience.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of networked devices of application program, including:
Receiving module, is configured as receiving the access request for the access application that user sends, wherein, the access please Asking includes application program identification;
Judge module, is configured as according to the application program identification, and whether judge the application program is inactive shape The application program of state;
Enquiry module, is configured as if it is determined that the application program is the application program of disabled state, then inquiry is described Application program identification with the presence or absence of in blacklist list in network firewall, wherein, the blacklist list include to Few one labeled for the application program identification of disabled state application program;
Link block, is configured as if it is determined that the application program identification is present in the blacklist list in network firewall In, then application program networking request is initiated after preset time has been waited, so that the application program connects network.
Further, the link block, including:
Submodule is removed, is configured as if it is determined that the application program identification is present in the blacklist row in network firewall In table, the application program identification is removed from the blacklist list in the preset time, and remove the application The mark of the disabled state of program;
Submodule is connected, is configured as initiating application program networking request after preset time has been waited, so that described Application program connects network.
Further, described device, in addition to:
Initiation module, is configured as initiating application program after preset time has been waited described in the link block Networking request, so as to after application program connection network, if application program connection network is unsuccessful, initiate again The application program networking request of preset times.
Further, described device, in addition to:
Pushing module, is configured as initiating application program after preset time has been waited described in the link block Networking request, so as to after application program connection network, if application program connection network is unsuccessful, be used to described Family pushes the other applications with application program same type, so that user determines whether to open the other applications.
Further, if the access request includes at least two application program identifications;
Accordingly, the link block, is specifically configured to:
If it is determined that the application program identification is present in the blacklist list in network firewall, then waiting default After time, the priority order of each application program according to corresponding to each application program identification is initiated for described each successively The application program networking request of application program, so that each application program is sequentially connected network.
Further, the priority order, including any one following:
The descending of the access times of each application program, the priority height order for each application program that user is set respectively should With the order of the type of program.
The technical scheme provided by this disclosed embodiment can include the following benefits:By receiving the visit that user sends The access request of application program is asked, wherein, access request includes application program identification;According to application program identification, judging should With program whether be disabled state application program;If it is determined that application program is the application program of disabled state, then inquire about Application program identification whether there is in the blacklist list in network firewall, wherein, blacklist list includes at least one It is individual labeled for the application program identification of disabled state application program;If it is determined that application program identification is present in network fire prevention In blacklist list in wall, then application program networking request is initiated after preset time has been waited, so that application program connects Connect network.So as to which terminal can be gone to determine the application program when it is determined that application program is the application program of disabled state Identify whether to be present in the blacklist list in network firewall, to determine whether the application program is forbidden by network firewall Network is accessed, when it is determined that the application program forbids accessing network by network firewall, goes to wait hair after preset time automatically Play application program networking request;So that terminal just will not immediately be returned when it is determined that application program mark is disabled state The result of network can not be connected by returning the application program so that terminal automatically can go the application program labeled as disabled state Networked, improve the success rate of the networking of the application program of disabled state, improve Consumer's Experience.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of terminal, including:
Processor, and for storing the memory of processor-executable instruction;
Wherein, the processor is configured as:The access request for the access application that user sends is received, wherein, institute Stating access request includes application program identification;Whether according to the application program identification, it is not living to judge the application program The application program of jump state;If it is determined that the application program is the application program of disabled state, then the application program is inquired about Identify whether to be present in the blacklist list in network firewall, wherein, the blacklist list includes at least one quilt The application program identification of disabled state application program is marked as;If it is determined that the application program identification is present in network fire prevention In blacklist list in wall, then application program networking request is initiated after preset time has been waited, so that the application journey Sequence connects network.
The technical scheme provided by this disclosed embodiment can include the following benefits:By receiving the visit that user sends The access request of application program is asked, wherein, access request includes application program identification;According to application program identification, judging should With program whether be disabled state application program;If it is determined that application program is the application program of disabled state, then inquire about Application program identification whether there is in the blacklist list in network firewall, wherein, blacklist list includes at least one It is individual labeled for the application program identification of disabled state application program;If it is determined that application program identification is present in network fire prevention In blacklist list in wall, then application program networking request is initiated after preset time has been waited, so that application program connects Connect network.So as to which terminal can be gone to determine the application program when it is determined that application program is the application program of disabled state Identify whether to be present in the blacklist list in network firewall, to determine whether the application program is forbidden by network firewall Network is accessed, when it is determined that the application program forbids accessing network by network firewall, goes to wait hair after preset time automatically Play application program networking request;So that terminal just will not immediately be returned when it is determined that application program mark is disabled state The result of network can not be connected by returning the application program so that terminal automatically can go the application program labeled as disabled state Networked, improve the success rate of the networking of the application program of disabled state, improve Consumer's Experience.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the present invention Example, and for explaining principle of the invention together with specification.
Fig. 1 is a kind of flow chart of the networking methods embodiment one of application program according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the networking methods embodiment two of application program according to an exemplary embodiment;
Fig. 3 is a kind of block diagram of the networked devices embodiment three of application program according to an exemplary embodiment;
Fig. 4 is a kind of block diagram of the networked devices example IV of application program according to an exemplary embodiment;
Fig. 5 is a kind of block diagram of the entity of terminal according to an exemplary embodiment;
Fig. 6 is a kind of block diagram of terminal device 800 according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the present invention.
Fig. 1 is a kind of flow chart of the networking methods embodiment one of application program according to an exemplary embodiment, As shown in figure 1, the networking methods of application program are used in terminal, the terminal includes mobile terminal, personal terminal etc., for example, touch Screen mobile phone, tablet personal computer, PC etc., this method comprises the following steps.
In step s 11, the access request for the access application that user sends is received, wherein, in the access request Including application program identification.
In this step, user is when the application program in needing to use terminal, and user can be with touch terminal screen The application program of upper display, or user send the speech message for opening application program to terminal, and terminal can get user The access request of the access application of transmission, includes application program identification (Identification, letter in the access request Claim ID).
In step s 12, whether according to the application program identification, it is answering for disabled state to judge the application program Use program.
In this step, because application program is not after a period of time is used by a user, the system of terminal can answer this It is disabled state with programming indicia, and limits application program access network so that application program can not accesses network, make The system resource in application program using terminal is limited with methods such as operation dispatch services (Job Scheduler).So as to terminal Need the application program identification ID in access request, judge on foreground application program whether be disabled state application journey Sequence.
For example, the application program identification of the application program of multiple disabled states has been stored in the foreground of terminal ID, thus terminal can judge on foreground current application program whether be disabled state application program.
In step s 13, however, it is determined that the application program is the application program of disabled state, then inquires about the application journey Sequence identifies whether to be present in the blacklist list in network firewall, wherein, the blacklist list includes at least one It is labeled for the application program identification of disabled state application program.
In this step, due to having in the network firewall of terminal in a blacklist list, the blacklist list It is labeled for the application program identification of disabled state application program including at least one;Terminal is not if it is determined that application program is The application program of active state, then terminal can just go in fire wall to go inquiry application to identify whether that being present in network prevents In blacklist list in wall with flues.
Specifically, in terminal, especially mobile terminal, the system for largely using Android (Android) is being answered With program after a period of time is not used by a user, application program can be marked as in Android source code in the terminal AppInactive states, i.e. disabled state;Meanwhile, terminal can pass through terminal for the Network Control Segment of application program The application program identification ID of the application program is added network firewall by the netd services of bottom, netd by iptables services Fw_standby this chain blacklist list in, so as to reach that control application program accesses the purpose of network;Understand, The blacklist list includes multiple labeled for the application program identification of disabled state application program.So, work as terminal When determining the application program that application program is disabled state, it may be determined that application program accesses network and is rejected, terminal It can first pass through and whether there is in the fw_standby of iptables service-seeking network firewalls this chain blacklist list The application program identification ID of the application program.
In step S14, however, it is determined that the application program identification is present in the blacklist list in network firewall, then Application program networking request is initiated after preset time has been waited, so that the application program connects network.
Wherein, in step S14 implementation process, terminal can perform procedure below:
The application program identification is removed from the blacklist list in the preset time, and removes described answer With the mark of the disabled state of program.
In this step, terminal is if it is determined that application program identification is present in the blacklist list in network firewall, eventually End can wait preset time, and then terminal initiates application program networking request after preset time has been waited so that current Application program goes to connect network.Wherein, in this preset time, terminal can will remove the inactive of the application program on foreground In the mark of state, and blacklist list in network firewall, the application program identification of the application program is removed.
Specifically, terminal is if it is determined that application program identification is present in the blacklist list in network firewall, now The access request of application program can be put into a cache list, then wait preset time 500ms;When this is default Between in 500ms, terminal can will remove the mark of the disabled state of the application program on foreground, and be serviced by iptables From the fw_standby of network firewall this chain blacklist list, the application program identification ID of the application program is gone Remove;Also, this preset time 500ms, is according to by collecting the big data summed up on a large number of users mobile phone and being analyzed Draw afterwards, this preset time 500ms is to have arrived foreground for waiting the system framework layer of terminal to detect application program, will The appInactive status indications of application program are removed, and release network control of the network firewall to application program.So that After preset time 500ms, terminal initiates application program networking request, backward reference result so that application program connects network.
The present embodiment by receive user send access application access request, wherein, access request includes Application program identification;According to application program identification, judge application program whether be disabled state application program;If it is determined that should With the application program that program is disabled state, then inquiry application identifies whether to be present in the blacklist in network firewall In list, wherein, it is labeled for the application program mark of disabled state application program that blacklist list includes at least one Know;If it is determined that application program identification is present in the blacklist list in network firewall, then after preset time has been waited Application program networking request is initiated, so that application program connects network.So as to which terminal can be it is determined that application program be inactive During the application program of state, in the blacklist list for identifying whether to be present in network firewall for going the determination application program, To determine whether the application program is forbidden accessing network by network firewall, it is determined that the application program is forbidden by network firewall When accessing network, go after waiting preset time automatically to initiate application program networking request;So that terminal will not it is determined that using When programming indicia is disabled state, the application program is just returned immediately can not connect the result of network so that terminal can Automatically to go the application program labeled as disabled state to be networked, the networking of the application program of disabled state is improved Success rate, improves Consumer's Experience.
On the basis of the embodiment shown in above-mentioned Fig. 1, Fig. 2 is one kind application journey according to an exemplary embodiment The flow chart of the networking methods embodiment two of sequence, if as shown in Fig. 2 the access request includes at least two application program marks Know;
Accordingly, step S14 is specifically included:
If it is determined that the application program identification is present in the blacklist list in network firewall, then waiting default After time, the priority order of each application program according to corresponding to each application program identification is initiated for described each successively The application program networking request of application program, so that each application program is sequentially connected network.
Wherein, the priority order, including any one following:
The descending of the access times of each application program, the priority height order for each application program that user is set respectively should With the order of the type of program.
In this step, when access request includes the application program identification of multiple application programs, if terminal is really Fixed each application program identification is present in the blacklist list in network firewall, and then terminal deposits each application program identification In cache list, while setting priority order for each application program;Wherein, priority order can be each application program quilt The descending of access times, or the priority height order for each application program that user is voluntarily set, or respectively should With the order of the type of program.
Then terminal is after preset time has been waited, according to the priority order of each application program, goes to initiate pin successively Application program networking request to each application program, and then cause each application program to go to be sequentially connected net according to the priority order Network.
Also include after step s 14:
In the step s 21, if application program connection network is unsuccessful, the application program of preset times is initiated again Networking request.
In this step, after step s 14, if terminal determines application program, connection network is unsuccessful, and terminal can be again The secondary application program networking request initiated for the application program.Terminal can initiate repeatedly networking request.
Or, also include after step s 14:
In step S22, if application program connection network is unsuccessful, pushed to the user same with application program The other applications of type, so that user determines whether to open the other applications.
In this step, after step s 14, if terminal determines application program, connection network is unsuccessful, and terminal can be true The type of the fixed application program, then terminal can push that the terminal has been mounted with to user with the application program same type Other applications, then user oneself choose whether to open and the other applications of the application program same type.
For example, after step s 14, if terminal determines application program, connection network is unsuccessful, and terminal can be determined The type of the application program is " video type ", and then terminal can push " the video class that the terminal has been mounted with to user The other applications of type ", then user oneself choose whether open should " video type " other applications.
The present embodiment by receive user send access application access request, wherein, access request includes Application program identification;According to application program identification, judge application program whether be disabled state application program;If it is determined that should With the application program that program is disabled state, then inquiry application identifies whether to be present in the blacklist in network firewall In list, wherein, it is labeled for the application program mark of disabled state application program that blacklist list includes at least one Know;If it is determined that application program identification is present in the blacklist list in network firewall, then after preset time has been waited Application program networking request is initiated, so that application program connects network.So as to which terminal can be it is determined that application program be inactive During the application program of state, in the blacklist list for identifying whether to be present in network firewall for going the determination application program, To determine whether the application program is forbidden accessing network by network firewall, it is determined that the application program is forbidden by network firewall When accessing network, go after waiting preset time automatically to initiate application program networking request;So that terminal will not it is determined that using When programming indicia is disabled state, the application program is just returned immediately can not connect the result of network so that terminal can Automatically to go the application program labeled as disabled state to be networked, the networking of the application program of disabled state is improved Success rate, improves Consumer's Experience.If also, application program connection network is unsuccessful, and the application journey of preset times is initiated again Sequence networking request;Or, if application program connection network it is unsuccessful, to user push with application program same type other should With program, so that user determines whether to open other applications;And then current application program is successfully networked, or Person is that user recommends other applications, improves Consumer's Experience.
Fig. 3 is a kind of block diagram of the networked devices embodiment three of application program according to an exemplary embodiment.Ginseng According to Fig. 3, the device includes:
Receiving module 31, is configured as receiving the access request for the access application that user sends, wherein, it is described to access Request includes application program identification;
Judge module 32, is configured as according to the application program identification, and whether judge the application program is inactive The application program of state;
Enquiry module 33, be configured as if it is determined that the application program be disabled state application program, then inquire about institute State in the blacklist list that application program identification whether there is in network firewall, wherein, the blacklist list includes At least one is labeled for the application program identification of disabled state application program;
Link block 34, is configured as if it is determined that the application program identification is present in the blacklist row in network firewall In table, then application program networking request is initiated after preset time has been waited, so that the application program connects network.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method Embodiment one in be described in detail, explanation will be not set forth in detail herein.
The present embodiment by receive user send access application access request, wherein, access request includes Application program identification;According to application program identification, judge application program whether be disabled state application program;If it is determined that should With the application program that program is disabled state, then inquiry application identifies whether to be present in the blacklist in network firewall In list, wherein, it is labeled for the application program mark of disabled state application program that blacklist list includes at least one Know;If it is determined that application program identification is present in the blacklist list in network firewall, then after preset time has been waited Application program networking request is initiated, so that application program connects network.So as to which terminal can be it is determined that application program be inactive During the application program of state, in the blacklist list for identifying whether to be present in network firewall for going the determination application program, To determine whether the application program is forbidden accessing network by network firewall, it is determined that the application program is forbidden by network firewall When accessing network, go after waiting preset time automatically to initiate application program networking request;So that terminal will not it is determined that using When programming indicia is disabled state, the application program is just returned immediately can not connect the result of network so that terminal can Automatically to go the application program labeled as disabled state to be networked, the networking of the application program of disabled state is improved Success rate, improves Consumer's Experience.
On the basis of the embodiment shown in above-mentioned Fig. 3, Fig. 4 is one kind application journey according to an exemplary embodiment The block diagram of the networked devices example IV of sequence.Reference picture 4, the link block 34, including:
Submodule 341 is removed, is configured as if it is determined that the application program identification is present in the black name in network firewall In single-row table, the application program identification is removed from the blacklist list in the preset time, and removed described The mark of the disabled state of application program;
Submodule 342 is connected, is configured as initiating application program networking request after preset time has been waited, so that institute State application program connection network.
Described device, in addition to:
Initiation module 41, is configured as initiating application after preset time has been waited described in the link block 34 Program networking request, so that after application program connection network, if application program connection network is unsuccessful, again Initiate the application program networking request of preset times.
Or, described device, in addition to:
Pushing module 42, is configured as initiating application after preset time has been waited described in the link block 34 Program networking request, so that after application program connection network, if application program connection network is unsuccessful, to institute User's push and the other applications of application program same type are stated, so that user determines whether to open the other application journey Sequence.
If the access request includes at least two application program identifications;
Accordingly, the link block 34, is specifically configured to:
If it is determined that the application program identification is present in the blacklist list in network firewall, then waiting default After time, the priority order of each application program according to corresponding to each application program identification is initiated for described each successively The application program networking request of application program, so that each application program is sequentially connected network.
Wherein, the priority order, including any one following:
The descending of the access times of each application program, the priority height order for each application program that user is set respectively should With the order of the type of program.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method Embodiment two in be described in detail, explanation will be not set forth in detail herein.
The present embodiment by receive user send access application access request, wherein, access request includes Application program identification;According to application program identification, judge application program whether be disabled state application program;If it is determined that should With the application program that program is disabled state, then inquiry application identifies whether to be present in the blacklist in network firewall In list, wherein, it is labeled for the application program mark of disabled state application program that blacklist list includes at least one Know;If it is determined that application program identification is present in the blacklist list in network firewall, then after preset time has been waited Application program networking request is initiated, so that application program connects network.So as to which terminal can be it is determined that application program be inactive During the application program of state, in the blacklist list for identifying whether to be present in network firewall for going the determination application program, To determine whether the application program is forbidden accessing network by network firewall, it is determined that the application program is forbidden by network firewall When accessing network, go after waiting preset time automatically to initiate application program networking request;So that terminal will not it is determined that using When programming indicia is disabled state, the application program is just returned immediately can not connect the result of network so that terminal can Automatically to go the application program labeled as disabled state to be networked, the networking of the application program of disabled state is improved Success rate, improves Consumer's Experience.If also, application program connection network is unsuccessful, and the application journey of preset times is initiated again Sequence networking request;Or, if application program connection network it is unsuccessful, to user push with application program same type other should With program, so that user determines whether to open other applications;And then current application program is successfully networked, or Person is that user recommends other applications, improves Consumer's Experience.
Fig. 5 is a kind of block diagram of the entity of terminal according to an exemplary embodiment.Reference picture 5, the terminal can be with It is implemented as:Processor 51, and it is configured as storing the memory 52 of processor-executable instruction;
Wherein, the processor 51 is configured as:The access request for the access application that user sends is received, wherein, The access request includes application program identification;Whether according to the application program identification, it is not to judge the application program The application program of active state;If it is determined that the application program is the application program of disabled state, then the application journey is inquired about Sequence identifies whether to be present in the blacklist list in network firewall, wherein, the blacklist list includes at least one It is labeled for the application program identification of disabled state application program;Prevent if it is determined that the application program identification is present in network In blacklist list in wall with flues, then application program networking request is initiated after preset time has been waited, so that the application Program connects network.
In the above-described embodiments, it should be appreciated that the processor can be CPU (English:Central Processing Unit, referred to as:CPU), it can also be other general processors, digital signal processor (English:Digital Signal Processor, referred to as:DSP), application specific integrated circuit (English:Application Specific Integrated Circuit, referred to as:ASIC) etc..General processor can be microprocessor or the processor can also be any conventional place Device etc. is managed, and foregoing memory can be read-only storage (English:Read-only memory, abbreviation:ROM), deposit at random Access to memory (English:Random access memory, referred to as:RAM), flash memory, hard disk or solid state hard disc.SIM Card is also referred to as subscriber identification card, smart card, and digital mobile telephone must load onto this card and can use.I.e. in computer chip On store the information of digital mobile phone client, the content such as the key of encryption and the telephone directory of user.With reference to of the invention real The step of applying the method disclosed in example can be embodied directly in hardware processor and perform completion, or with the hardware in processor and Software module combination performs completion.
On the terminal in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method It is described in detail with the embodiment of device, explanation will be not set forth in detail herein.
The present embodiment by receive user send access application access request, wherein, access request includes Application program identification;According to application program identification, judge application program whether be disabled state application program;If it is determined that should With the application program that program is disabled state, then inquiry application identifies whether to be present in the blacklist in network firewall In list, wherein, it is labeled for the application program mark of disabled state application program that blacklist list includes at least one Know;If it is determined that application program identification is present in the blacklist list in network firewall, then after preset time has been waited Application program networking request is initiated, so that application program connects network.So as to which terminal can be it is determined that application program be inactive During the application program of state, in the blacklist list for identifying whether to be present in network firewall for going the determination application program, To determine whether the application program is forbidden accessing network by network firewall, it is determined that the application program is forbidden by network firewall When accessing network, go after waiting preset time automatically to initiate application program networking request;So that terminal will not it is determined that using When programming indicia is disabled state, the application program is just returned immediately can not connect the result of network so that terminal can Automatically to go the application program labeled as disabled state to be networked, the networking of the application program of disabled state is improved Success rate, improves Consumer's Experience.
Fig. 6 is a kind of block diagram of terminal device 800 according to an exemplary embodiment.For example, terminal device 800 can To be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices are good for Body equipment, personal digital assistant etc..
Reference picture 6, terminal device 800 can include following one or more assemblies:Processing assembly 802, memory 804, Power supply module 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, And communication component 816.
The integrated operation of the usual control terminal equipment 800 of processing assembly 802, such as with display, call, data are led to Letter, the camera operation operation associated with record operation.Processing assembly 802 can include one or more processors 820 to hold Row instruction, to complete all or part of step of above-mentioned method.In addition, processing assembly 802 can include one or more moulds Block, is easy to the interaction between processing assembly 802 and other assemblies.For example, processing assembly 802 can include multi-media module, with Facilitate the interaction between multimedia groupware 808 and processing assembly 802.
Memory 804 is configured as storing various types of data supporting the operation in terminal device 800.These data Example include the instruction of any application program or method for being used to operate on terminal device 800, contact data, telephone directory Data, message, picture, video etc..Memory 804 can by any kind of volatibility or non-volatile memory device or it Combination realize that such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable Except programmable read only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, soon Flash memory, disk or CD.
Power supply module 806 provides electric power for the various assemblies of terminal device 800.Power supply module 806 can include power supply pipe Reason system, one or more power supplys, and other components associated with generating, managing and distributing electric power for terminal device 800.
Multimedia groupware 808 is included in the screen of one output interface of offer between the terminal device 800 and user. In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface Plate, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip The border of action, but also the detection duration related to the touch or slide and pressure.In certain embodiments, Multimedia groupware 808 includes a front camera and/or rear camera.When terminal device 800 is in operator scheme, such as clap When taking the photograph pattern or video mode, front camera and/or rear camera can receive the multi-medium data of outside.It is each preposition Camera and rear camera can be a fixed optical lens systems or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike Wind (MIC), when terminal device 800 is in operator scheme, when such as call model, logging mode and speech recognition mode, microphone It is configured as receiving external audio signal.The audio signal received can be further stored in memory 804 or via logical Letter component 816 is sent.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
I/O interfaces 812 is provide interface between processing assembly 802 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 814 includes one or more sensors, the state for providing various aspects for terminal device 800 Assess.For example, sensor cluster 814 can detect opening/closed mode of terminal device 800, the relative positioning of component, example As described component be terminal device 800 display and keypad, sensor cluster 814 can also detect terminal device 800 or The position of 800 1 components of terminal device changes, the existence or non-existence that user contacts with terminal device 800, terminal device 800 The temperature change of orientation or acceleration/deceleration and terminal device 800.Sensor cluster 814 can include proximity transducer, be configured For the presence of object near being detected in not any physical contact.Sensor cluster 814 can also include optical sensor, Such as CMOS or ccd image sensor, for being used in imaging applications.In certain embodiments, the sensor cluster 814 may be used also With including acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between terminal device 800 and other equipment. Terminal device 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.Show at one In example property embodiment, communication component 816 receives broadcast singal or broadcast from external broadcasting management system via broadcast channel Relevant information.In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, short to promote Cheng Tongxin.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal device 800 can be by one or more application specific integrated circuits (ASIC), number Word signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of terminal device 800.Example Such as, the non-transitorycomputer readable storage medium can be ROM, it is random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device is performed so that mobile terminal is able to carry out a kind of networking methods of application program, and methods described includes:
The access request for the access application that user sends is received, wherein, the access request includes application program Mark;
According to the application program identification, judge the application program whether be disabled state application program;
If it is determined that the application program is the application program of disabled state, then inquire about whether the application program identification deposits It is in the blacklist list in network firewall, wherein, it is labeled in order to not that the blacklist list includes at least one The application program identification of active state application program;
If it is determined that the application program identification is present in the blacklist list in network firewall, then waiting default Application program networking request is initiated after time, so that the application program connects network.
Those skilled in the art will readily occur to its of the present invention after considering specification and putting into practice invention disclosed herein Its embodiment.The application be intended to the present invention any modification, purposes or adaptations, these modifications, purposes or Person's adaptations follow the general principle of the present invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following Claim is pointed out.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is only limited by appended claim.

Claims (13)

1. a kind of networking methods of application program, it is characterised in that including:
The access request for the access application that user sends is received, wherein, the access request includes application program identification;
According to the application program identification, judge the application program whether be disabled state application program;
If it is determined that the application program be disabled state application program, then inquire about the application program identification whether there is in In blacklist list in network firewall, wherein, it is labeled in order to inactive that the blacklist list includes at least one The application program identification of state application;
If it is determined that the application program identification is present in the blacklist list in network firewall, then preset time is being waited Application program networking request is initiated afterwards, so that the application program connects network.
2. according to the method described in claim 1, it is characterised in that methods described, in addition to:
The application program identification is removed from the blacklist list in the preset time, and removes the application journey The mark of the disabled state of sequence.
3. according to the method described in claim 1, it is characterised in that initiate to apply journey after preset time has been waited described Sequence networking request, so that after application program connection network, in addition to:
If the application program connection network is unsuccessful, the application program networking request of preset times is initiated again.
4. according to the method described in claim 1, it is characterised in that initiate to apply journey after preset time has been waited described Sequence networking request, so that after application program connection network, in addition to:
If the application program connection network is unsuccessful, the other application journey with application program same type is pushed to the user Sequence, so that user determines whether to open the other applications.
5. the method according to claim any one of 1-4, it is characterised in that if the access request includes at least two Application program identification;
Accordingly, it is described that application program networking request is initiated after preset time has been waited, so that the application program is connected Network, including:
After preset time has been waited, the priority order of each application program according to corresponding to each application program identification, according to The secondary application program networking request initiated for each application program, so that each application program is sequentially connected network.
6. method according to claim 5, it is characterised in that the priority order, including any one following:
The descending of the access times of each application program, the priority height order for each application program that user is set, respectively using journey The order of the type of sequence.
7. a kind of networked devices of application program, it is characterised in that including:
Receiving module, is configured as receiving the access request for the access application that user sends, wherein, in the access request Including application program identification;
Judge module, is configured as according to the application program identification, and whether judge the application program is disabled state Application program;
Enquiry module, be configured as if it is determined that the application program be disabled state application program, then inquire about the application Program identification whether there is in the blacklist list in network firewall, wherein, the blacklist list includes at least one It is individual labeled for the application program identification of disabled state application program;
Link block, is configured as if it is determined that the application program identification is present in the blacklist list in network firewall, Application program networking request is then initiated after preset time has been waited, so that the application program connects network.
8. device according to claim 7, it is characterised in that the link block, including:
Submodule is removed, is configured as if it is determined that the application program identification is present in the blacklist list in network firewall In, the application program identification is removed from the blacklist list in the preset time, and remove the application journey The mark of the disabled state of sequence;
Submodule is connected, is configured as initiating application program networking request after preset time has been waited, so that the application Program connects network.
9. device according to claim 7, it is characterised in that described device, in addition to:
Initiation module, is configured as initiating application program networking after preset time has been waited described in the link block Request, so as to after application program connection network, if application program connection network is unsuccessful, initiate default again The application program networking request of number of times.
10. device according to claim 7, it is characterised in that described device, in addition to:
Pushing module, is configured as initiating application program networking after preset time has been waited described in the link block Request, so as to after application program connection network, if application program connection network is unsuccessful, be pushed away to the user The other applications with application program same type are sent, so that user determines whether to open the other applications.
11. the device according to claim any one of 7-10, it is characterised in that if the access request includes at least two Individual application program identification;
Accordingly, the link block, is specifically configured to:
If it is determined that the application program identification is present in the blacklist list in network firewall, then preset time is being waited Afterwards, the priority order of each application program according to corresponding to each application program identification, initiates to be directed to each application successively The application program networking request of program, so that each application program is sequentially connected network.
12. device according to claim 11, it is characterised in that the priority order, including any one following:
The descending of the access times of each application program, the priority height order for each application program that user is set, respectively using journey The order of the type of sequence.
13. a kind of terminal, it is characterised in that including:
Processor, and for storing the memory of processor-executable instruction;
Wherein, the processor is configured as:The access request for the access application that user sends is received, wherein, it is described to visit Ask that request includes application program identification;Whether according to the application program identification, it is inactive shape to judge the application program The application program of state;If it is determined that the application program is the application program of disabled state, then the application program identification is inquired about With the presence or absence of in the blacklist list in network firewall, wherein, the blacklist list includes at least one and is labeled For the application program identification of disabled state application program;If it is determined that the application program identification is present in network firewall Blacklist list in, then after preset time has been waited initiate application program networking request so that the application program connect Connect network.
CN201710241487.6A 2017-04-13 2017-04-13 Application networking method and device and terminal Active CN107094094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710241487.6A CN107094094B (en) 2017-04-13 2017-04-13 Application networking method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710241487.6A CN107094094B (en) 2017-04-13 2017-04-13 Application networking method and device and terminal

Publications (2)

Publication Number Publication Date
CN107094094A true CN107094094A (en) 2017-08-25
CN107094094B CN107094094B (en) 2020-06-19

Family

ID=59638079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710241487.6A Active CN107094094B (en) 2017-04-13 2017-04-13 Application networking method and device and terminal

Country Status (1)

Country Link
CN (1) CN107094094B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259514A (en) * 2018-03-26 2018-07-06 平安科技(深圳)有限公司 Leak detection method, device, computer equipment and storage medium
CN108391307A (en) * 2018-02-09 2018-08-10 北京小米移动软件有限公司 Power consumption management-control method, device and storage medium based on android system
CN108934056A (en) * 2018-06-20 2018-12-04 联想(北京)有限公司 The control method and system of electronic equipment
CN111162943A (en) * 2019-12-27 2020-05-15 珠海格力电器股份有限公司 Method and device for configuring application networking priority and electronic equipment
CN112883073A (en) * 2021-03-22 2021-06-01 北京同邦卓益科技有限公司 Data screening method, device, equipment, readable storage medium and product
US11375374B1 (en) * 2021-03-24 2022-06-28 Verizon Patent And Licensing Inc. Systems and methods for temporarily barring UE network slice usage

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090019517A1 (en) * 2007-07-10 2009-01-15 Bhavin Turakhia Method and System for Restricting Access of One or More Users to a Service
CN101431473A (en) * 2008-12-31 2009-05-13 深圳市迅雷网络技术有限公司 Method and apparatus for implementing network speed limit
US20100003980A1 (en) * 2008-07-02 2010-01-07 Johan Rune Automatic configuration of inter-domain access technology neighbor relations
CN102469093A (en) * 2010-11-19 2012-05-23 中国电信股份有限公司 System and method for controlling networking authorization on networking application
US20130090115A1 (en) * 2011-10-07 2013-04-11 Giri Prassad Deivasigamani Methods and apparatus for intelligent initiation of connections within a network
CN103857008A (en) * 2012-12-03 2014-06-11 电信科学技术研究院 Access control method and device
CN106059954A (en) * 2016-05-27 2016-10-26 青岛海信电器股份有限公司 Network bandwidth regulation method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090019517A1 (en) * 2007-07-10 2009-01-15 Bhavin Turakhia Method and System for Restricting Access of One or More Users to a Service
US20100003980A1 (en) * 2008-07-02 2010-01-07 Johan Rune Automatic configuration of inter-domain access technology neighbor relations
CN101431473A (en) * 2008-12-31 2009-05-13 深圳市迅雷网络技术有限公司 Method and apparatus for implementing network speed limit
CN102469093A (en) * 2010-11-19 2012-05-23 中国电信股份有限公司 System and method for controlling networking authorization on networking application
US20130090115A1 (en) * 2011-10-07 2013-04-11 Giri Prassad Deivasigamani Methods and apparatus for intelligent initiation of connections within a network
CN103857008A (en) * 2012-12-03 2014-06-11 电信科学技术研究院 Access control method and device
CN106059954A (en) * 2016-05-27 2016-10-26 青岛海信电器股份有限公司 Network bandwidth regulation method and device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108391307A (en) * 2018-02-09 2018-08-10 北京小米移动软件有限公司 Power consumption management-control method, device and storage medium based on android system
CN108259514A (en) * 2018-03-26 2018-07-06 平安科技(深圳)有限公司 Leak detection method, device, computer equipment and storage medium
CN108259514B (en) * 2018-03-26 2020-11-24 平安科技(深圳)有限公司 Vulnerability detection method and device, computer equipment and storage medium
CN108934056A (en) * 2018-06-20 2018-12-04 联想(北京)有限公司 The control method and system of electronic equipment
CN111162943A (en) * 2019-12-27 2020-05-15 珠海格力电器股份有限公司 Method and device for configuring application networking priority and electronic equipment
CN111162943B (en) * 2019-12-27 2021-02-09 珠海格力电器股份有限公司 Method and device for configuring application networking priority and electronic equipment
CN112883073A (en) * 2021-03-22 2021-06-01 北京同邦卓益科技有限公司 Data screening method, device, equipment, readable storage medium and product
CN112883073B (en) * 2021-03-22 2024-04-05 北京同邦卓益科技有限公司 Data screening method, device, equipment, readable storage medium and product
US11375374B1 (en) * 2021-03-24 2022-06-28 Verizon Patent And Licensing Inc. Systems and methods for temporarily barring UE network slice usage

Also Published As

Publication number Publication date
CN107094094B (en) 2020-06-19

Similar Documents

Publication Publication Date Title
CN107094094A (en) Networking methods, device and the terminal of application program
CN104780155B (en) Apparatus bound method and device
CN103986969B (en) application management method, device and system
CN103916829B (en) A kind of desktop Notification Method of message and device
EP2975821A1 (en) Network connection method and apparatus
CN108268322B (en) Memory optimization method and device and computer readable storage medium
CN107608561A (en) Touch-screen control method and device
CN107205084A (en) Network speed processing method, device and the terminal of application program
CN103916468B (en) Method for upgrading system, terminal, server and upgrade-system
CN104539812B (en) Recommendation information acquisition methods, terminal and server
CN109117874A (en) Operation behavior prediction technique and device
CN106209604A (en) Add the method and device of good friend
CN107181671A (en) Social information treating method and apparatus
CN105554215A (en) Automatic selection dialing method and device, and mobile terminal
CN108476379A (en) Information recording method and information record carrier
EP3160112B1 (en) Reminding method and device
CN106412884A (en) WIFI connection management method and apparatus thereof
CN106453774A (en) Method and apparatus for displaying contact information
CN106412481B (en) Reminding method, device and terminal based on VoLTE video calling
CN104780256A (en) Address book management method and device and intelligent terminal
CN105554325A (en) Blacklist number processing method and mobile terminal
CN106789554A (en) The method and device of short message treatment
CN106293717A (en) The processing method of the setting of terminal, device and terminal
CN105634928A (en) Social reminding method and device based on wearable device
CN107527191A (en) Return processing method, device, terminal and the server of red packet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant