CN109634677B - Background cleaning method, terminal and computer readable storage medium - Google Patents

Background cleaning method, terminal and computer readable storage medium Download PDF

Info

Publication number
CN109634677B
CN109634677B CN201811613188.1A CN201811613188A CN109634677B CN 109634677 B CN109634677 B CN 109634677B CN 201811613188 A CN201811613188 A CN 201811613188A CN 109634677 B CN109634677 B CN 109634677B
Authority
CN
China
Prior art keywords
state
application
game space
instruction
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811613188.1A
Other languages
Chinese (zh)
Other versions
CN109634677A (en
Inventor
王毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201811613188.1A priority Critical patent/CN109634677B/en
Publication of CN109634677A publication Critical patent/CN109634677A/en
Application granted granted Critical
Publication of CN109634677B publication Critical patent/CN109634677B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/442Shutdown

Abstract

The invention discloses a background cleaning method, a terminal and a computer readable storage medium, which are used for judging the state of an application; when the application is in a first state, receiving a message sent by the application, and analyzing the message to obtain first data; creating a game space list, and writing the first data into the game space list; and performing background cleaning according to the game space list, and preventing overseas applications downloaded and run by using the VPN from being killed while ensuring the game performance.

Description

Background cleaning method, terminal and computer readable storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method, a terminal, and a computer readable storage medium for background cleaning.
Background
Currently, with the development of science, technology and socioeconomic, various electronic games and electronic games are popular, and virtual entertainment has gradually taken up a part of people's lives.
In addition, when the VPN is used for downloading and running the overseas game application, after the competitive key is started to enter the game space, the game and VPN are killed, so that a user cannot run the game.
Disclosure of Invention
The main object of the present invention is to propose a method, a terminal and a computer readable storage medium for background cleaning, which are capable of preventing overseas applications downloaded and running using VPN from being killed while guaranteeing game performance.
In order to achieve the above object, the present invention provides a method for background cleaning, comprising the steps of:
judging the state of the application;
when the application is in a first state, receiving a message sent by the application, and analyzing the message to obtain first data;
creating a game space list, and writing the first data into the game space list;
and performing background cleaning according to the game space list.
Preferably, the judging application state specifically includes:
receiving instruction information;
and judging the state of the application according to the instruction information.
Preferably, the judging the state of the application according to the instruction information specifically includes:
if the instruction is a first instruction, judging that the state of the application is a first state;
and if the instruction is a second instruction, judging the state of the application to be a second state.
Preferably, the first instruction is a start instruction, the first state is a start state, the second instruction is a close instruction, and the second state is a close state.
Preferably, the first data includes state information and attribute information of the application.
Preferably, when the application is in the first state, receiving a message sent by the application, and analyzing the message to obtain the first data specifically includes:
when an application is in a starting state, receiving a message sent by the application, and analyzing the message to obtain first data;
and respectively recording the state and the attribute of the application according to the state information and the attribute information.
Preferably, the creating a game space list and writing the first data into the game space list specifically includes:
creating a game space list;
judging whether the application is downloaded and operated through VPN according to the first data, if so, writing the first data into the game space list.
Preferably, the performing background cleaning according to the game space list specifically includes:
setting keys;
and performing background cleaning according to the keys and the game space list.
Correspondingly, the invention also provides a terminal for background cleaning, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the following steps are realized when the processor executes the program:
Judging the state of the application;
when the application is in a first state, receiving a message sent by the application, and analyzing the message to obtain first data;
creating a game space list, and writing the first data into the game space list;
and performing background cleaning according to the game space list.
Accordingly, the present invention also provides a computer-readable storage medium storing one or more programs executable by one or more processors to implement the steps of:
judging the state of the application;
when the application is in a first state, receiving a message sent by the application, and analyzing the message to obtain first data;
creating a game space list, and writing the first data into the game space list;
and performing background cleaning according to the game space list.
By applying the scheme provided by the invention, the state of the application is judged; when the application is in a first state, receiving a message sent by the application, and analyzing the message to obtain first data; creating a game space list, and writing the first data into the game space list; and performing background cleaning according to the game space list, and preventing overseas applications downloaded and run by using the VPN from being killed while ensuring the game performance.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of a mobile terminal implementing various embodiments of the present invention;
fig. 2 is a schematic diagram of a wireless communication system of the mobile terminal shown in fig. 1;
FIG. 3 is a flowchart of a method for background cleaning according to a first embodiment of the present invention;
FIG. 4 is a flowchart of a method for background cleaning in accordance with a third embodiment of the present invention;
FIG. 5 is a flowchart of a method for background cleaning according to a fourth embodiment of the present invention;
FIG. 6 is a flowchart of a method for background cleaning in accordance with a fifth embodiment of the present invention;
fig. 7 is a schematic structural diagram of a terminal cleaned in the background according to the sixth embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In the following description, suffixes such as "module", "component", or "unit" for representing elements are used only for facilitating the description of the present invention, and have no specific meaning per se. Thus, "module," "component," or "unit" may be used in combination.
The terminal may be implemented in various forms. For example, the terminals described in the present invention may include mobile terminals such as cell phones, tablet computers, notebook computers, palm computers, personal digital assistants (Personal Digital Assistant, PDA), portable media players (Portable Media Player, PMP), navigation devices, wearable devices, smart bracelets, pedometers, and fixed terminals such as digital TVs, desktop computers, and the like.
The following description will be given taking a mobile terminal as an example, and those skilled in the art will understand that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for a moving purpose.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal implementing various embodiments of the present invention, the mobile terminal 100 may include: an RF (Radio Frequency) unit 101, a WiFi module 102, an audio output unit 103, an a/V (audio/video) input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110, and a power supply 111. Those skilled in the art will appreciate that the mobile terminal structure shown in fig. 1 is not limiting of the mobile terminal and that the mobile terminal may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
The following describes the components of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be used for receiving and transmitting signals during the information receiving or communication process, specifically, after receiving downlink information of the base station, processing the downlink information by the processor 110; and, the uplink data is transmitted to the base station. Typically, the radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication, global System for Mobile communications), GPRS (General Packet Radio Service ), CDMA2000 (Code Division Multiple Access, CDMA 2000), WCDMA (Wideband Code Division Multiple Access ), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, time Division synchronous code Division multiple Access), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency Division Duplex Long term evolution), and TDD-LTE (Time Division Duplexing-Long Term Evolution, time Division Duplex Long term evolution), etc.
WiFi belongs to a short-distance wireless transmission technology, and a mobile terminal can help a user to send and receive e-mails, browse web pages, access streaming media and the like through the WiFi module 102, so that wireless broadband Internet access is provided for the user. Although fig. 1 shows a WiFi module 102, it is understood that it does not belong to the necessary constitution of a mobile terminal, and can be omitted entirely as required within a range that does not change the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a talk mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output (e.g., a call signal reception sound, a message reception sound, etc.) related to a specific function performed by the mobile terminal 100. The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive an audio or video signal. The a/V input unit 104 may include a graphics processor (Graphics Processing Unit, GPU) 1041 and a microphone 1042, the graphics processor 1041 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphics processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 can receive sound (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, and the like, and can process such sound into audio data. The processed audio (voice) data may be converted into a format output that can be transmitted to the mobile communication base station via the radio frequency unit 101 in the case of a telephone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting the audio signal.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and the proximity sensor can turn off the display panel 1061 and/or the backlight when the mobile terminal 100 moves to the ear. The accelerometer sensor can detect the acceleration in all directions (generally three axes), can detect the gravity and the direction when the accelerometer sensor is static, can be used for identifying the gesture of a mobile phone (such as transverse and vertical screen switching, related games, magnetometer gesture calibration), vibration identification related functions (such as pedometer and knocking), and the like, and can be configured as other sensors such as fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors and the like, which are not repeated herein.
The display unit 106 is used to display information input by a user or information provided to the user. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the mobile terminal. In particular, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect touch operations thereon or thereabout by a user (e.g., operations of the user on the touch panel 1071 or thereabout by using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch azimuth of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts it into touch point coordinates, and sends the touch point coordinates to the processor 110, and can receive and execute commands sent from the processor 110. Further, the touch panel 1071 may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. The user input unit 107 may include other input devices 1072 in addition to the touch panel 1071. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, mouse, joystick, etc., as specifically not limited herein.
Further, the touch panel 1071 may overlay the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or thereabout, the touch panel 1071 is transferred to the processor 110 to determine the type of touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of touch event. Although in fig. 1, the touch panel 1071 and the display panel 1061 are two independent components for implementing the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 may be integrated with the display panel 1061 to implement the input and output functions of the mobile terminal, which is not limited herein.
The interface unit 108 serves as an interface through which at least one external device can be connected with the mobile terminal 100. For example, the external devices may include a wired or wireless headset port, an external power (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and an external device.
Memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area that may store an operating system, application programs required for at least one function (such as a sound playing function, an image playing function, etc.), and a storage data area; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. In addition, memory 109 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power source 111 (e.g., a battery) for supplying power to the respective components, and preferably, the power source 111 may be logically connected to the processor 110 through a power management system, so as to perform functions of managing charging, discharging, and power consumption management through the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based will be described below.
Referring to fig. 2, fig. 2 is a schematic diagram of a communication network system according to an embodiment of the present invention, where the communication network system is an LTE system of a general mobile communication technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network ) 202, an epc (Evolved Packet Core, evolved packet core) 203, and an IP service 204 of an operator that are sequentially connected in communication.
Specifically, the UE201 may be the terminal 100 described above, and will not be described herein.
The E-UTRAN202 includes eNodeB2021 and other eNodeB2022, etc. The eNodeB2021 may be connected with other eNodeB2022 by a backhaul (e.g., an X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide access from the UE201 to the EPC 203.
EPC203 may include MME (Mobility Management Entity ) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MMEs 2033, SGW (Serving Gate Way) 2034, PGW (PDN Gate Way) 2035 and PCRF (Policy and Charging Rules Function, policy and tariff function entity) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and EPC203, providing bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location registers (not shown) and to hold user specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034 and PGW2035 may provide IP address allocation and other functions for UE201, PCRF2036 is a policy and charging control policy decision point for traffic data flows and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem ), or other IP services, etc.
Although the LTE system is described above as an example, it should be understood by those skilled in the art that the present invention is not limited to LTE systems, but may be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above mobile terminal hardware structure and the communication network system, various embodiments of the method of the present invention are provided.
Example 1
Referring to fig. 3, a method for background cleaning includes the steps of:
judging the state of the application;
when the application is in a first state, receiving a message sent by the application, and analyzing the message to obtain first data;
specifically, the type of the message is preferably broadcast, encryption processing, such as digital signature processing, can be performed on the message according to the importance degree of the message contained in the message, so as to improve the security, and the state information of the application is specifically the running state of the application, such as foreground running, background running and closing state, and the attribute information includes the application name and whether the application is downloaded and run by the VPN;
digital signatures (also known as public-key digital signatures, electronic signatures) are a common physical signature written on paper, but are implemented using techniques in the field of public-key cryptography, a set of digital signatures generally defining two complementary operations, one for signature and the other for verification;
The integrity of digitally signed files is easily verified and the digital signature is non-repudiatable;
in short, a digital signature is some data attached to a data unit or a cryptographic transformation of the data unit that allows the recipient of the data unit to verify the source of the data unit and the integrity of the data unit and to protect the data from being counterfeited by a person (e.g., the recipient). The method is a method for signing electronic information, a signature information can be transmitted in a communication network, digital signatures can be obtained based on a public key cryptosystem and a private key cryptosystem, the digital signatures mainly comprise a common digital signature and a special digital signature, the common digital signature algorithm comprises a RSA, elGamal, fiat-Shamir, guillou-Quisquarter, schnorr, ong-Schnorr-Shamir digital signature algorithm, a Des/DSA, an elliptic curve digital signature algorithm, a finite automaton digital signature algorithm and the like, and the special digital signature comprises a blind signature, a proxy signature, a group signature, a non-repudiation signature, a fair blind signature, a threshold signature, a signature with a message recovery function and the like, and the signature is closely related to a specific application environment;
Creating a game space list, and writing the first data into the game space list;
performing background cleaning according to the game space list;
in the embodiment, by writing the first data into the game space list and performing background cleaning through the game space list, the game performance is ensured and overseas applications downloaded and run by using the VPN are prevented from being killed;
VPN generally refers to a virtual private network, the functions of which are: establishing a private network on a public network for encryption communication, and widely applying the private network in an enterprise network, wherein a VPN gateway realizes remote access by encrypting a data packet and converting a data packet target address, and the VPN has various classification modes, mainly classifying according to protocols, and can be realized by various modes such as a server, hardware, software and the like;
VPN belongs to the remote access technology, namely, a public network is utilized to erect a private network, for example, a staff of a certain company goes out to the outside, he wants to access the server resource of the enterprise intranet, and the access belongs to the remote access;
in conventional enterprise network configuration, to make remote access, the conventional method is to rent DDN (digital data network) private line or frame relay, such a communication scheme necessarily results in high network communication and maintenance cost, and for mobile users (mobile office staff) and remote personal users, the mobile users generally enter the local area network of the enterprise through dial-up line (Internet), but this necessarily brings about hidden safety hazards;
The method for solving the problem that the outside staff accesses to the intranet resources by utilizing the VPN is to erect a VPN server in the intranet, the outside staff is connected with the VPN server through the Internet after connecting with the Internet locally, then enters the enterprise intranet through the VPN server, in order to ensure the data security, the communication data between the VPN server and the client are encrypted, the data can be considered to be safely transmitted on a special data link just like a special private network is erected, but the VPN actually uses a public link on the Internet, so the VPN is called a virtual private network, the VPN is essentially to seal a data communication tunnel on the public network by utilizing the encryption technology, the VPN technology is provided, the user can access the intranet resources by utilizing the VPN no matter the outside is out of the ground or the user is in the office, and the VPN is widely applied in the enterprise.
Example two
The difference between the present embodiment and the first embodiment is that each step in the first embodiment is further refined, and in the second embodiment, the state of the judging application is specifically:
receiving instruction information;
Specifically, the instruction information may be customized by a user, such as a sliding operation, a clicking operation, or a preset value of a contact residence time, where the clicking operation may be a single-click operation or a double-click operation;
judging the state of the application according to the instruction information;
if the instruction is a first instruction, judging that the state of the application is a first state;
if the instruction is a second instruction, judging the state of the application to be a second state;
the first instruction is a starting instruction, the first state is a starting state, the second instruction is a closing instruction, and the second state is a closing state;
specifically, the first instruction and the second instruction may be set to different operations, for example, the first instruction is set to a preset value of contact residence time, the second instruction is set to a sliding operation, then when the contact residence time of the user on the application exceeds the preset value, the application is started, when the user performs the sliding operation, the application is closed, and the first instruction and the second instruction may be set to the same operation, for example, when the user double-click is received for the first time, the application is started, and when the user double-click is received again, the application is closed.
Example III
Referring to fig. 4, the difference between the present embodiment and the first embodiment is that, in the third embodiment, when the application is in the first state, the steps of receiving a message sent by the application and analyzing the message to obtain the first data specifically include:
When an application is in a starting state, receiving a message sent by the application, and analyzing the message to obtain first data, wherein the first data comprises state information and attribute information of the application;
specifically, the state information includes a state of the application, such as a start state or a shut state, and the attribute information includes whether the application is a VPN application, whether it is downloaded and run by the VPN, and a type of the application, and the type of the application includes, specifically, games, news, social, shopping, entertainment, weather, education, travel, and the like;
respectively recording the state and attribute of the application according to the state information and the attribute information;
in this embodiment, by recording the state and attribute information of the application, background cleaning is facilitated through the state and attribute information of the application, and accuracy of background cleaning is facilitated to be improved.
Example IV
Referring to fig. 5, the difference between the present embodiment and the first embodiment is that, in the fourth embodiment, the creating a game space list and writing the first data into the game space list specifically includes:
creating a game space list;
specifically, the user can manually add the application which does not need to be cleaned into the game space list;
Judging whether the application is downloaded and operated through VPN according to the first data, if so, writing the first data into the game space list;
when the VPN is downloaded, the VPN connection is usually required to be established firstly, and the Android mobile phone establishes the VPN connection as follows:
1. opening a main menu of the mobile phone, and selecting 'setting';
2. selecting "wireless and network";
3. selecting a virtual private network setting;
4. selecting "add virtual private network";
5. selecting a PPTP mode;
6. inputting a virtual private network name (such as VPN);
7. filling in a server domain name, clicking 'determining', pressing a menu key, and storing settings;
8, clicking to open the just-established connection, filling in a user name and a password, and clicking on 'connection';
the process of establishing VPN connection by the iOS mobile phone is as follows:
1. clicking a setting icon on the desktop to enter setting;
2. clicking "general" to enter a general setting;
4. clicking the network to enter network setting;
5. clicking on the VPN entry setting;
6. clicking "add VPN configuration";
selecting 'PPTP' on the protocol type, filling 'VPN' in the 'description' column, filling a server domain name in the server column, filling a user name and a password in the account and password column, keeping other settings unchanged, and then clicking 'store';
Clicking a VPN switch to start connection, and after connection is successful, a small icon appears in the upper right corner;
specifically, identification information can be added to an application downloaded and operated through the VPN so as to facilitate the subsequent judgment of whether the application is downloaded and operated through the VPN by the identification information;
in this embodiment, by determining, according to the first data, whether the application is downloaded and run through VPN, if yes, the first data is written into the game space list, so that the efficiency of performing subsequent background cleaning is effectively improved.
Example five
Referring to fig. 6, the difference between the present embodiment and the first embodiment is that, in the fifth embodiment, the performing the background cleaning according to the game space list specifically includes:
setting keys;
specifically, a cleaning shortcut key can be set on the display interface, and task cleaning is performed when a user clicks the cleaning shortcut key;
performing background cleaning according to the keys and the game space list;
in this embodiment, when the user starts the key, background cleaning is performed, and the system performs background cleaning, but adds the VPN application written in the game space list to the white list, and does not clean, but after the VPN exits, the associated application may be cleaned, and after the background cleaning, game performance may be prompted, so that user experience is improved;
The concept of a white list corresponds to a "black list", for example: in a computer system, a plurality of software are applied to a black-and-white list rule, and an operating system, a firewall, antivirus software, a mail system, application software and the like are almost applied to the black-and-white list rule in the aspect of control;
after the blacklist is started, users (or IP addresses, IP packets, mails, viruses and the like) listed in the blacklist cannot pass, if the whitelist is set up, the users (or IP addresses, IP packets, mails and the like) in the whitelist can pass preferentially and cannot be rejected as junk mails, and the safety and the rapidity are greatly improved.
Example six
Referring to fig. 7, a terminal for background cleaning includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, wherein the processor implements the following steps when executing the program:
judging the state of the application;
when the application is in a first state, receiving a message sent by the application, and analyzing the message to obtain first data;
specifically, the type of the message is preferably broadcast, encryption processing, such as digital signature processing, can be performed on the message according to the importance degree of the message contained in the message, so as to improve the security, and the state information of the application is specifically the running state of the application, such as foreground running, background running and closing state, and the attribute information includes the application name and whether the application is downloaded and run by the VPN;
Digital signatures (also known as public-key digital signatures, electronic signatures) are a common physical signature written on paper, but are implemented using techniques in the field of public-key cryptography, a set of digital signatures generally defining two complementary operations, one for signature and the other for verification;
the integrity of digitally signed files is easily verified and the digital signature is non-repudiatable;
in short, a digital signature is some data attached to a data unit or a cryptographic transformation of the data unit that allows the recipient of the data unit to verify the source of the data unit and the integrity of the data unit and to protect the data from being counterfeited by a person (e.g., the recipient). The method is a method for signing electronic information, a signature information can be transmitted in a communication network, digital signatures can be obtained based on a public key cryptosystem and a private key cryptosystem, the digital signatures mainly comprise a common digital signature and a special digital signature, the common digital signature algorithm comprises a RSA, elGamal, fiat-Shamir, guillou-Quisquarter, schnorr, ong-Schnorr-Shamir digital signature algorithm, a Des/DSA, an elliptic curve digital signature algorithm, a finite automaton digital signature algorithm and the like, and the special digital signature comprises a blind signature, a proxy signature, a group signature, a non-repudiation signature, a fair blind signature, a threshold signature, a signature with a message recovery function and the like, and the signature is closely related to a specific application environment;
Creating a game space list, and writing the first data into the game space list;
performing background cleaning according to the game space list;
in the embodiment, by writing the first data into the game space list and performing background cleaning through the game space list, the game performance is ensured and overseas applications downloaded and run by using the VPN are prevented from being killed;
VPN generally refers to a virtual private network, the functions of which are: establishing a private network on a public network for encryption communication, and widely applying the private network in an enterprise network, wherein a VPN gateway realizes remote access by encrypting a data packet and converting a data packet target address, and the VPN has various classification modes, mainly classifying according to protocols, and can be realized by various modes such as a server, hardware, software and the like;
VPN belongs to the remote access technology, namely, a public network is utilized to erect a private network, for example, a staff of a certain company goes out to the outside, he wants to access the server resource of the enterprise intranet, and the access belongs to the remote access;
in conventional enterprise network configuration, to make remote access, the conventional method is to rent DDN (digital data network) private line or frame relay, such a communication scheme necessarily results in high network communication and maintenance cost, and for mobile users (mobile office staff) and remote personal users, the mobile users generally enter the local area network of the enterprise through dial-up line (Internet), but this necessarily brings about hidden safety hazards;
The method for solving the problem that the outside staff accesses to the intranet resources by utilizing the VPN is to erect a VPN server in the intranet, the outside staff is connected with the VPN server through the Internet after connecting with the Internet locally, then enters the enterprise intranet through the VPN server, in order to ensure the data security, the communication data between the VPN server and the client are encrypted, the data can be considered to be safely transmitted on a special data link just like a special private network is erected, but the VPN actually uses a public link on the Internet, so the VPN is called a virtual private network, the VPN is essentially to seal a data communication tunnel on the public network by utilizing the encryption technology, the VPN technology is provided, the user can access the intranet resources by utilizing the VPN no matter the outside is out of the ground or the user is in the office, and the VPN is widely applied in the enterprise.
Example seven
A computer-readable storage medium storing one or more programs executable by one or more processors to implement the steps of:
Judging the state of the application;
when the application is in a first state, receiving a message sent by the application, and analyzing the message to obtain first data;
specifically, the type of the message is preferably broadcast, encryption processing, such as digital signature processing, can be performed on the message according to the importance degree of the message contained in the message, so as to improve the security, and the state information of the application is specifically the running state of the application, such as foreground running, background running and closing state, and the attribute information includes the application name and whether the application is downloaded and run by the VPN;
digital signatures (also known as public-key digital signatures, electronic signatures) are a common physical signature written on paper, but are implemented using techniques in the field of public-key cryptography, a set of digital signatures generally defining two complementary operations, one for signature and the other for verification;
the integrity of digitally signed files is easily verified and the digital signature is non-repudiatable;
in short, a digital signature is some data attached to a data unit or a cryptographic transformation of the data unit that allows the recipient of the data unit to verify the source of the data unit and the integrity of the data unit and to protect the data from being counterfeited by a person (e.g., the recipient). The method is a method for signing electronic information, a signature information can be transmitted in a communication network, digital signatures can be obtained based on a public key cryptosystem and a private key cryptosystem, the digital signatures mainly comprise a common digital signature and a special digital signature, the common digital signature algorithm comprises a RSA, elGamal, fiat-Shamir, guillou-Quisquarter, schnorr, ong-Schnorr-Shamir digital signature algorithm, a Des/DSA, an elliptic curve digital signature algorithm, a finite automaton digital signature algorithm and the like, and the special digital signature comprises a blind signature, a proxy signature, a group signature, a non-repudiation signature, a fair blind signature, a threshold signature, a signature with a message recovery function and the like, and the signature is closely related to a specific application environment;
Creating a game space list, and writing the first data into the game space list;
performing background cleaning according to the game space list;
in the embodiment, by writing the first data into the game space list and performing background cleaning through the game space list, the game performance is ensured and overseas applications downloaded and run by using the VPN are prevented from being killed;
VPN generally refers to a virtual private network, the functions of which are: establishing a private network on a public network for encryption communication, and widely applying the private network in an enterprise network, wherein a VPN gateway realizes remote access by encrypting a data packet and converting a data packet target address, and the VPN has various classification modes, mainly classifying according to protocols, and can be realized by various modes such as a server, hardware, software and the like;
VPN belongs to the remote access technology, namely, a public network is utilized to erect a private network, for example, a staff of a certain company goes out to the outside, he wants to access the server resource of the enterprise intranet, and the access belongs to the remote access;
in conventional enterprise network configuration, to make remote access, the conventional method is to rent DDN (digital data network) private line or frame relay, such a communication scheme necessarily results in high network communication and maintenance cost, and for mobile users (mobile office staff) and remote personal users, the mobile users generally enter the local area network of the enterprise through dial-up line (Internet), but this necessarily brings about hidden safety hazards;
The method for solving the problem that the outside staff accesses to the intranet resources by utilizing the VPN is to erect a VPN server in the intranet, the outside staff is connected with the VPN server through the Internet after connecting with the Internet locally, then enters the enterprise intranet through the VPN server, in order to ensure the data security, the communication data between the VPN server and the client are encrypted, the data can be considered to be safely transmitted on a special data link just like a special private network is erected, but the VPN actually uses a public link on the Internet, so the VPN is called a virtual private network, the VPN is essentially to seal a data communication tunnel on the public network by utilizing the encryption technology, the VPN technology is provided, the user can access the intranet resources by utilizing the VPN no matter the outside is out of the ground or the user is in the office, and the VPN is widely applied in the enterprise.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are to be protected by the present invention.

Claims (6)

1. A method of background cleaning comprising the steps of:
judging the state of the application;
when the application is in a first state, receiving a message sent by the application, and analyzing the message to obtain first data;
creating a game space list, and writing the first data into the game space list;
performing background cleaning according to the game space list;
the judging application state specifically includes:
receiving instruction information;
judging the state of the application according to the instruction information;
the judging of the application state according to the instruction information specifically includes:
if the instruction is a first instruction, judging that the state of the application is a first state;
if the instruction is a second instruction, judging the state of the application to be a second state;
the first instruction is a starting instruction, the first state is a starting state, the second instruction is a closing instruction, and the second state is a closing state;
the creating a game space list and writing the first data into the game space list specifically comprises:
creating a game space list;
judging whether the application is downloaded and operated through VPN according to the first data, if so, writing the first data into the game space list;
The step of performing background cleaning according to the game space list comprises the following steps: and adding the VPN application written into the game space list into a white list when the system carries out background cleaning, and eliminating the VPN application when the VPN exits.
2. The method of background cleaning of claim 1, wherein the first data includes state information and attribute information of the application.
3. The method for background cleaning according to claim 2, wherein when the application is in the first state, receiving a message sent by the application, and parsing the message to obtain the first data specifically includes:
when an application is in a starting state, receiving a message sent by the application, and analyzing the message to obtain first data;
and respectively recording the state and the attribute of the application according to the state information and the attribute information.
4. The method of background cleaning according to claim 1, wherein the performing background cleaning according to the game space list is specifically:
setting keys;
and performing background cleaning according to the keys and the game space list.
5. A terminal for background cleaning comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the following steps when executing the program:
Judging the state of the application;
when the application is in a first state, receiving a message sent by the application, and analyzing the message to obtain first data;
creating a game space list, and writing the first data into the game space list;
performing background cleaning according to the game space list;
the judging application state specifically includes:
receiving instruction information;
judging the state of the application according to the instruction information;
the judging of the application state according to the instruction information specifically includes:
if the instruction is a first instruction, judging that the state of the application is a first state;
if the instruction is a second instruction, judging the state of the application to be a second state;
the first instruction is a starting instruction, the first state is a starting state, the second instruction is a closing instruction, and the second state is a closing state;
the creating a game space list and writing the first data into the game space list specifically comprises:
creating a game space list;
judging whether the application is downloaded and operated through VPN according to the first data, if so, writing the first data into the game space list;
The step of performing background cleaning according to the game space list comprises the following steps: and adding the VPN application written into the game space list into a white list when the system carries out background cleaning, and eliminating the VPN application when the VPN exits.
6. A computer-readable storage medium storing one or more programs executable by one or more processors to perform the steps of:
judging the state of the application;
when the application is in a first state, receiving a message sent by the application, and analyzing the message to obtain first data;
creating a game space list, and writing the first data into the game space list;
performing background cleaning according to the game space list;
the judging application state specifically includes:
receiving instruction information;
judging the state of the application according to the instruction information;
the judging of the application state according to the instruction information specifically includes:
if the instruction is a first instruction, judging that the state of the application is a first state;
if the instruction is a second instruction, judging the state of the application to be a second state;
The first instruction is a starting instruction, the first state is a starting state, the second instruction is a closing instruction, and the second state is a closing state;
the creating a game space list and writing the first data into the game space list specifically comprises:
creating a game space list;
judging whether the application is downloaded and operated through VPN according to the first data, if so, writing the first data into the game space list;
the step of performing background cleaning according to the game space list comprises the following steps: and adding the VPN application written into the game space list into a white list when the system carries out background cleaning, and eliminating the VPN application when the VPN exits.
CN201811613188.1A 2018-12-27 2018-12-27 Background cleaning method, terminal and computer readable storage medium Active CN109634677B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811613188.1A CN109634677B (en) 2018-12-27 2018-12-27 Background cleaning method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811613188.1A CN109634677B (en) 2018-12-27 2018-12-27 Background cleaning method, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109634677A CN109634677A (en) 2019-04-16
CN109634677B true CN109634677B (en) 2023-10-17

Family

ID=66078377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811613188.1A Active CN109634677B (en) 2018-12-27 2018-12-27 Background cleaning method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109634677B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104142828A (en) * 2014-07-30 2014-11-12 北京奇虎科技有限公司 Application accelerating method and device
CN106155695A (en) * 2016-07-28 2016-11-23 努比亚技术有限公司 The removing control device and method of background application
CN106201600A (en) * 2016-06-30 2016-12-07 北京奇虎科技有限公司 Application program for mobile terminal progress control method and operating system
CN107045443A (en) * 2017-04-14 2017-08-15 北京安云世纪科技有限公司 background process control method, device and intelligent terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2464797A1 (en) * 2003-04-16 2004-10-16 Wms Gaming Inc. Remote authentication of gaming software in a gaming system environment
US9210128B2 (en) * 2012-10-25 2015-12-08 Check Point Software Technologies Ltd. Filtering of applications for access to an enterprise network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104142828A (en) * 2014-07-30 2014-11-12 北京奇虎科技有限公司 Application accelerating method and device
CN106201600A (en) * 2016-06-30 2016-12-07 北京奇虎科技有限公司 Application program for mobile terminal progress control method and operating system
CN106155695A (en) * 2016-07-28 2016-11-23 努比亚技术有限公司 The removing control device and method of background application
CN107045443A (en) * 2017-04-14 2017-08-15 北京安云世纪科技有限公司 background process control method, device and intelligent terminal

Also Published As

Publication number Publication date
CN109634677A (en) 2019-04-16

Similar Documents

Publication Publication Date Title
CN109800602B (en) Privacy protection method, mobile terminal and computer readable storage medium
CN107040543B (en) Single sign-on method, terminal and storage medium
CN108616499B (en) Authentication method of application program, terminal and computer readable storage medium
CN109033801B (en) Method for verifying user identity by application program, mobile terminal and storage medium
CN109618316B (en) Network sharing method, mobile terminal and storage medium
CN108833690B (en) Authority control method, terminal and computer readable storage medium
CN108075899B (en) Identity authentication method, mobile terminal and computer readable storage medium
CN110188524B (en) Information encryption method, information decryption method and terminal
CN108733811A (en) A kind of file access method, terminal and computer readable storage medium
CN111427709B (en) Application program splitting control method, device and computer readable storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN110062106B (en) Calling method of application program, mobile terminal and storage medium
CN112770279A (en) Network sharing method, mobile terminal and computer readable storage medium
CN109711850B (en) Secure payment method, device and computer readable storage medium
CN109889660B (en) Temporary information recording method, storage medium and mobile terminal
CN109711198B (en) Application management method, mobile terminal and storage medium
CN111931155A (en) Verification code input method, verification code input equipment and storage medium
CN107204977B (en) Interface security verification method and device and computer readable storage medium
CN108900696B (en) Data processing method, terminal and computer readable storage medium
CN108400994B (en) User authentication method, mobile terminal, server, and computer-readable storage medium
CN108040330B (en) WiFi directional transmission method, mobile terminal and readable storage medium
CN107172076B (en) Security verification method, mobile terminal and server side
CN109634677B (en) Background cleaning method, terminal and computer readable storage medium
CN108183833B (en) Response processing method and device and computer readable storage medium
CN107330319B (en) Interaction control method, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant