CN112241353B - Method, device, terminal and storage medium for checking running state - Google Patents

Method, device, terminal and storage medium for checking running state Download PDF

Info

Publication number
CN112241353B
CN112241353B CN201910640442.5A CN201910640442A CN112241353B CN 112241353 B CN112241353 B CN 112241353B CN 201910640442 A CN201910640442 A CN 201910640442A CN 112241353 B CN112241353 B CN 112241353B
Authority
CN
China
Prior art keywords
inspection
checking
item
inspection item
item list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910640442.5A
Other languages
Chinese (zh)
Other versions
CN112241353A (en
Inventor
方任扬
巨少飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910640442.5A priority Critical patent/CN112241353B/en
Publication of CN112241353A publication Critical patent/CN112241353A/en
Application granted granted Critical
Publication of CN112241353B publication Critical patent/CN112241353B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/328Computer systems status display

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a method, a device, a terminal and a storage medium for checking an operation state, and belongs to the technical field of Internet. The method comprises the following steps: acquiring an inspection item list and inspection strategy data configured by a server according to inspection requirements; checking each checking item in the checking item list according to the checking item policy data; and optimizing the running state of the terminal according to the checking result of each checking item. When the starting of the appointed application is detected, the invention acquires the inspection item list and the inspection strategy data, and further inspects each inspection item in the inspection item list based on the inspection strategy data. Because the inspection item list and the inspection strategy data are configured by the server according to the inspection requirements, when the inspection items are increased, the inspection strategies are changed or other customized requirements are met by a user, the inspection item list and the inspection strategy data can be directly configured and sent by the server without releasing a new version, so that the development cost of an application program is reduced, and the development efficiency is improved.

Description

Method, device, terminal and storage medium for checking running state
Technical Field
The present invention relates to the field of internet technologies, and in particular, to a method, an apparatus, a terminal, and a storage medium for checking an operation state.
Background
In the technical field of the internet, in order to ensure that a terminal can run smoothly, many application programs, especially security application programs, can check the running state of the terminal. By checking the operation state of the terminal, an inspection report can be generated, and based on the inspection report, the operation performance of the terminal can be improved by optimizing the corresponding inspection items.
At present, the process of checking the running state of the terminal based on the application program comprises the following steps: before the application program is released, a product personnel of the application program provides inspection items to be inspected and inspection strategies corresponding to each inspection item, and a technician of the application program writes program codes based on the inspection items provided by the product personnel and the inspection strategies corresponding to each inspection item so as to realize corresponding inspection functions. After the application program is released, the terminal installs the application program, and checks each checking item by item according to the checking strategy, and further optimizes the running state of the terminal based on the checking result of each checking item.
With the continuous update of the application program function, the inspection items are more and more, the inspection strategies of each inspection item are different, and meanwhile, the customization requirement can exist for each inspection item, however, the related technology can only be realized by releasing a new version of the application program, so that the development cost of the application program is increased intangibly, and the development efficiency is reduced.
Disclosure of Invention
In order to solve the problems of the related art, the embodiment of the invention provides an operation state checking method, an operation state checking device, a terminal and a storage medium. The technical scheme is as follows:
in one aspect, a method for checking an operating state is provided, the method comprising:
when the starting of a specified application is detected, acquiring an inspection item list and inspection strategy data, wherein the inspection item list and the inspection strategy data are configured by a server according to inspection requirements, the inspection item list comprises at least one inspection item, each inspection item represents one running state of a terminal, and the inspection strategy data are used for indicating an inspection form of each inspection item in the inspection item list;
checking each checking item in the checking item list according to the checking item policy data;
And optimizing the running state of the terminal according to the checking result of each checking item.
In another aspect, there is provided an inspection apparatus for an operating state, the apparatus comprising:
the system comprises an acquisition module, a detection module and a control module, wherein the acquisition module is used for acquiring a detection item list and detection policy data when a specified application is detected to be started, the detection item list and the detection policy data are configured by a server according to detection requirements, the detection item list comprises at least one detection item, each detection item represents one running state of a terminal, and the detection policy data are used for indicating a detection form of each detection item in the detection item list;
the checking module is used for checking each checking item in the checking item list according to the checking item policy data;
and the optimizing module is used for optimizing the running state of the terminal according to the checking result of each checking item.
In another aspect, a terminal is provided, the terminal comprising a processor and a memory, the memory storing at least one instruction, at least one program, a code set, or a set of instructions, the at least one instruction, the at least one program, the code set, or the set of instructions being loaded and executed by the processor to implement a method of checking an operational state.
In another aspect, a computer readable storage medium having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions loaded and executed by a processor to implement a method of checking a running state is provided.
The technical scheme provided by the embodiment of the invention has the beneficial effects that:
when the starting of the appointed application is detected, an inspection item list and inspection strategy data are acquired, and each inspection item in the inspection item list is inspected based on the inspection strategy data. Because the inspection item list and the inspection strategy data are configured by the server according to the inspection requirements, when the inspection items are increased, the inspection strategies are changed or other customized requirements are met by a user, the inspection item list and the inspection strategy data can be directly configured and sent by the server without releasing a new version, so that the development cost of an application program is reduced, and the development efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is an implementation environment for an operational state checking method according to an embodiment of the present invention;
FIG. 2 is a system architecture diagram of a method for checking an operation state according to an embodiment of the present invention;
FIG. 3 is a flow chart of a method for checking an operation state according to an embodiment of the present invention;
FIG. 4 is a timing diagram of a method for checking an operational status according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of an application interface of a mobile phone manager according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of another application interface of a mobile phone manager according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of another application interface of a mobile phone manager according to an embodiment of the present invention;
FIG. 8 is a schematic structural diagram of an inspection device for an operation state according to an embodiment of the present invention;
fig. 9 is a block diagram illustrating a structure of a terminal according to an exemplary embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the embodiments of the present invention will be described in further detail with reference to the accompanying drawings.
Before executing the examples of the present invention, the terms related to the present invention will be explained first.
The terminal operation state comprises the states of the following indexes: terminal performance metrics (e.g., remaining memory size, remaining disk size, etc.), security metrics (e.g., whether the terminal is virus, unsafe settings, whether to open terminal security, etc.), usage habit metrics (e.g., whether to periodically clean terminal garbage, etc.), etc.
The plug-in refers to dividing application program functions in the terminal according to the service, and all functions in the same service form a function set, namely, a plug-in. The plug-in generally includes a data store, a UI (User Interface) Interface, various resources used, and the like corresponding to the service. The plug-in can be independently issued, enabled or disabled as an independent business body.
The system API (Application Programming Interface ) refers to an interface provided by the operating system of the terminal to an application call.
Currently, for each inspection item of a security class application, attributes that can be changed mainly include an inspection score (an inspection score is a score that needs to be deducted if an inspection result of the inspection item is unhealthy), a security level (a security level is an alert level provided to a user if an inspection result of the inspection item is unhealthy), whether or not it is negligible (whether or not it can be ignored when inspecting the inspection item), a document (including an inspection item name, an inspection item description, and the like), a priority (a sequence of inspecting the inspection item), and the like. For each of the properties in the above-described inspection items, changes may be required frequently for the purpose of optimizing experience or operation. The existing technical scheme can only solve the problem of the change through release of the version, and the method increases the development cost of the application program and reduces the development efficiency of the application program. In addition, as the number of inspection items supported by the application program increases, the corresponding inspection logic is more complex, and in the existing technical scheme, the inspection logic of all the inspection items is realized by the inspection module, so that the development burden and the development risk of the inspection module are increased.
In order to solve the problems existing in the prior art, the embodiment of the invention provides an operation state checking method, which has the following improvement points compared with the prior art:
first, the embodiment of the invention realizes the standardization of the whole inspection process by standardizing the conventional requirements and the custom requirements of the inspection items.
Secondly, the embodiment of the invention configures the standard inspection items and inspection logic through the cloud platform of the server, meets the customization demand changing at any time, and does not depend on the release of new versions of application programs compared with the prior art.
Thirdly, according to the embodiment of the invention, the checking framework is optimized, the plug-in mechanism is introduced, the checking logic of the checking project is distributed to the corresponding plug-in and is realized by the corresponding plug-in, and the checking module only needs to realize the general logic and the scheduling logic.
Referring to fig. 1, an implementation environment related to an operation state checking method provided by an embodiment of the present invention is shown, where the implementation environment includes: a terminal 101 and a server 102.
The terminal 101 may be a smart phone, a tablet computer, a notebook computer, etc., and the embodiment of the present invention does not specifically limit the product type of the terminal 101. The terminal 101 has various applications installed therein, including security-type applications and the like. Based on the installed security application, it is possible to check whether the running state of the terminal is healthy or not when the security application is started.
Server 102 is a background server for security class applications and may provide security services for terminal 101 based on the security class applications.
The terminal 101 and the server 102 may communicate with each other via a wired network or a wireless network.
Based on the implementation environment shown in fig. 1, fig. 2 is a system architecture diagram of an inspection method of an operation state, referring to fig. 2, the system architecture includes: the system comprises an inspection configuration management cloud platform, an inspection module and a plug-in module.
The inspection configuration management cloud platform is located in the server and is used for configuring inspection items and inspection logic to obtain inspection item lists and inspection strategy data, the inspection item lists and the inspection strategy data are sent to the terminal through the network channel to meet the customization requirements of the terminal changing at any time, and the configuration process does not depend on release of new versions of application programs.
The inspection module and the plug-in module are located in the terminal. The checking module is used for realizing general checking logic and scheduling logic, and comprises a checking project list management sub-module, a checking strategy management sub-module, a checking execution scheduling center, a checking execution distribution sub-module and the like. The inspection item list management submodule is used for analyzing, storing and other management of the inspection item list sent by the server, and the inspection policy management submodule is used for analyzing, storing and other management of the inspection policy data sent by the server. When checking the running state, the checking execution scheduling center acquires a checking item list and checking policy data from the checking item list management sub-module and the checking policy management sub-module, and sends the checking item list and the checking policy data to the checking execution distribution sub-module. Based on the inspection item list and the inspection policy data, the inspection execution distribution submodule schedules different plug-ins in the plug-in module, and different inspection items in the inspection item list are inspected by executing different inspection logics. For example, a garbage cleaning plug-in the plug-in module is scheduled to check garbage cleaning check items by executing garbage cleaning check logic; the virus killing plug-in the scheduling plug-in module checks the virus killing check item by executing virus killing check logic, and so on.
The embodiment of the invention provides a method for checking an operation state, referring to fig. 3, the method provided by the embodiment of the invention comprises the following steps:
301. when the start of the designated application is detected, the terminal acquires the inspection item list and inspection policy data.
Wherein the inspection item list and the inspection policy data are configured by the server according to inspection requirements, the inspection item list includes at least one inspection item, each inspection item characterizes an operation state of the terminal, and the inspection policy data is used for indicating an inspection form, such as an inspection time, an inspection duration, etc., for each inspection item in the inspection item list.
Each inspection item has corresponding attribute information including an item identification (task_id), an inspection item classification (task_category), a plug-in identification (plugin_id) of the corresponding plug-in of the inspection item, an inspection score (task_score), a security level (task_level), whether negligible (igrated), priority (priority), excess time (timeout), a document (words), an extension field (extra_data), and the like. For the important properties of each inspection item and their description, see table 1 below.
TABLE 1
It should be noted that, in the embodiment of the present invention, each attribute of each inspection item may be dynamically configured, and meanwhile, an inspection item list may be updated (a certain inspection item may be added or deleted), but an inspection item implementing logic may not exist in a client of a newly added specific application program, and the newly added inspection item requires client embedded logic. Of course, if the client has the capability of adding scripts, the inspection items can be added without embedding logic in the client.
After the server configures the inspection item list and the inspection policy data according to specific inspection requirements, the configured inspection item list and inspection policy data can be stored in the server, or can be issued to the terminal, and the terminal stores the inspection item list and the inspection policy data in the cache. The inspection item list and the inspection strategy data configured by the server can meet the customization requirement of each inspection item, so that product personnel can realize the requirement of dynamic operation without releasing a new version, and the operation efficiency is greatly improved. Here, the configuration check item list and the check policy data configured by the server cannot be directly identified by the terminal, and need to be resolved to be identified.
Wherein the designated application may be a security class application or the like. When the start of the designated application is detected, the terminal automatically acquires the inspection item list and inspection policy data to start a program for inspecting its running state. For the storage positions of the inspection item list and the inspection strategy data, when the terminal acquires the inspection item list and the inspection strategy data, the following two modes can be adopted:
in the first mode, when the starting of a specified application is detected, a terminal acquires inspection item list data and inspection strategy data to be analyzed from a server, and analyzes the inspection item list data and the inspection strategy data to be analyzed to obtain an inspection item list and inspection strategy data.
When the terminal analyzes the inspection item list data and the inspection strategy data to be analyzed, key fields can be obtained from the inspection item list data and the inspection strategy data to be analyzed, and identifiable inspection item list and inspection strategy data can be generated based on the obtained key fields.
In the second mode, when the starting of the appointed application is detected, checking item list data and checking strategy data to be analyzed are obtained from the local cache, and the checking item list data and the checking strategy data to be analyzed are analyzed to obtain a checking item list and checking strategy data.
302. And the terminal checks each checking item in the checking item list according to the checking item policy data.
Considering that some of the inspection items in the inspection item list may be inspection items set to be negligible, for the negligible inspection items, the inspection may be directly ignored without being inspected. In order to avoid wasting inspection resources, the terminal will also detect whether a negligible inspection item is included in the inspection item list based on the attribute of each inspection item in the inspection item list before inspecting each inspection item in the inspection item list based on the inspection item policy data, and when the negligible inspection item is included in the inspection item list, the terminal may delete the inspection item directly from the inspection item list or mark the inspection item so as to ignore the inspection item when inspecting each inspection item in the inspection item list.
In the embodiment of the present invention, when the terminal performs inspection on each inspection item in the inspection item list according to the inspection item policy data, the following steps may be adopted:
3021. and the terminal determines whether the current moment reaches the checking time of the current checking item in the checking item list according to the checking strategy data.
Each inspection item has a corresponding inspection policy, based on the acquired inspection policy data, for a current inspection item to be inspected in the inspection item list at the current time, the terminal determines whether the current time reaches the inspection time of the current inspection item according to the inspection time indicated in the inspection policy data.
3022. And when the current time reaches the checking time of the current checking item, the terminal checks the current checking item.
If the current time reaches the checking time of the current checking item, the terminal checks the current checking item. During specific inspection, the terminal can acquire a target item identifier of a current inspection item, acquire a target plug-in identifier corresponding to the target item identifier from a corresponding relation between a preset item identifier and a plug-in identifier, and further inspect the current inspection item by calling a target plug-in corresponding to the target plug-in identifier according to the target plug-in identifier.
Before executing the step, the server also sets the corresponding relation between the item identifier and the plug-in identifier, and sends the set corresponding relation to the terminal, so that the terminal can acquire the target item identifier of the current inspection item based on the corresponding relation between the item identifier and the plug-in identifier. When the method is specifically set, the server can acquire the item identification of each inspection item, and set the corresponding relation between the item identification of the inspection item and the plug-in identification of the plug-in capable of achieving the inspection purpose according to the inspection purpose of each inspection item and the function of each plug-in. Typically, there is at least one of the number of inspection items for the same inspection purpose, and the functions that each plug-in can perform are determined, so that at least one item identification can correspond to the same plug-in identification.
In addition, the embodiment of the invention also defines a standard communication interface (i.e. a system API) for communication between the inspection module and each plug-in the plug-in module, based on the defined standard communication interface, the inspection module can call different plug-ins to realize specific inspection logic, and when the inspection of the corresponding inspection item is completed, the plug-in returns the corresponding inspection result to the inspection module, and the inspection module processes the inspection result, such as updating the inspection score, determining the risk level and the like.
The standard interface between the inspection module and the plug-in is as follows:
the parameter is a parameter sent to the plug-in by the checking module, and the parameter is a task_id parameter which is relatively more important, and is used for notifying the plug-in of checking items to be checked. In general, a task_id corresponds to a piece of check logic.
Retunen is the inspection result returned by the plug-in to the inspection module. The returned important checking results include is_health (representing whether the checking item has a problem), risk_score (risk score to be deducted), risk_level (risk level), and the like.
3023. When it is determined that the current time does not reach the inspection time of the current inspection item, the terminal acquires the next inspection item from the inspection item list, and performs an operation of determining whether the current time reaches the inspection time of the next inspection item.
When determining that the current time does not reach the checking time of the current checking item, the terminal does not check the current checking item any more, but acquires the next checking item from the checking item list, and determines whether the current time reaches the checking time of the next checking item, if so, the terminal checks the next checking item, which is the same as the checking process of the current checking item, specifically referring to the checking process of the current checking item, which is not repeated herein. If the current time does not reach the checking time of the next checking item, the next checking item is acquired, and the process is repeated.
The terminal acquires the inspection items from the inspection item list one by one until all the inspection items in the inspection item list are inspected. For the inspection items which are not reached before due to the inspection time, the terminal can preferentially inspect the inspection items when the inspection time is reached.
According to the embodiment of the invention, the functions of the original checking module are split, the checking module is responsible for checking the loading of the project and the general control logic after the splitting, and the plug-in is responsible for executing the specific checking logic. The embodiment of the invention also defines a standard interface between the checking module and each plug-in, the checking module calls the plug-in to execute specific checking logic according to the standard interface, and the plug-in returns a required checking result according to the convention. By decoupling the specific logic of the inspection project from the inspection module, the development experience and development efficiency of the application program are greatly improved. In addition, each plug-in can realize or change the logic of the plug-in by itself and issue and modify the logic independently without waiting for the version of the whole application program to issue, thereby leading the development and operation of the application program to be more flexible.
Fig. 4 shows a process for checking an operation state provided by an embodiment of the present invention, referring to fig. 4, the process of checking is as follows:
1. The server configures the inspection item data (corresponding to one inspection item list) and the inspection policy data in advance, and stores the configured data in the server or transmits the configured data to the terminal for buffering by the terminal.
2. When the security class application is detected to be started, the terminal acquires the checking item list and the checking strategy data from the server or the local cache.
3. Since the inspection item list and the inspection policy data cannot be identified, the terminal needs to parse the inspection item list and the inspection policy data to generate an identifiable inspection item list and inspection policy data.
4. And the terminal records data according to the user behaviors and filters out the inspection items ignored by the user.
5. The terminal acquires the next inspection item from the inspection item list, and determines whether the inspection item should be inspected at this time according to the inspection policy data.
6. When the inspection item should not be inspected at this time, the terminal continues to acquire the next inspection item from the inspection item list; when the inspection item should be inspected at this time, the terminal routes the inspection item to the corresponding plug-in, invokes the interface between the plug-ins (defined standard interface), inspects the inspection item by the corresponding plug-in, and returns the inspection result of the inspection item.
7. And the terminal updates the running state of the terminal according to the checking result returned by the plug-in, for example, updating checking scores, checking result lists, detecting strategies and the like.
8. When all the inspection items in the inspection item list are inspected, the process is finished.
303. And the terminal optimizes the running state of the terminal according to the checking result of each checking item.
When the inspection result of each inspection item is obtained, the terminal displays the inspection result on an application interface of the designated application. When the selected operation of different optimization options on the application interface is detected, optimizing the running state corresponding to the corresponding inspection item, and displaying the optimized inspection result. Wherein, the different optimization options comprise a one-key optimization option and other optimization options which need manual selection by a user. In order to better prompt the user, the terminal also displays the different inspection scores by adopting different display colors. For example, when the inspection score is 80 to 100, green is used for display; when the inspection score is 60-80, displaying by adopting orange; when the inspection score is 60 or less, the display is made in red.
Fig. 5, 6, 7 show the application interface of the cell phone manager. When the mobile phone manager starts, the operation state of the mobile phone is automatically checked, and after the checking is finished, the checking result shown in fig. 5 is obtained, wherein the checking result comprises checking scores and different optimization options. When it is detected that the one-touch optimization option shown in fig. 5 is selected, an inspection item (e.g., memory clean, etc.) that can be automatically optimized is optimized, fig. 6 shows an optimization process. Based on the optimization result shown in fig. 7, for an inspection item that needs manual optimization by a user, when a user's selection operation of any inspection item is detected, the inspection item is optimized, and the optimization result is displayed.
According to the method provided by the embodiment of the invention, when the starting of the appointed application is detected, the inspection item list and the inspection strategy data are obtained, and each inspection item in the inspection item list is inspected based on the inspection strategy data. Because the inspection item list and the inspection strategy data are configured by the server according to the inspection requirements, when the inspection items are increased, the inspection strategies are changed or other customized requirements are met by a user, the inspection item list and the inspection strategy data can be directly configured and sent by the server without releasing a new version, so that the development cost of an application program is reduced, and the development efficiency is improved.
In addition, the embodiment of the invention defines the standard interface between each plug-in, and the development burden of the inspection module is reduced and the open risk is dispersed by calling the corresponding plug-in to execute specific inspection logic.
Referring to fig. 8, an embodiment of the present invention provides an inspection apparatus for an operation state, the apparatus including:
an obtaining module 801, configured to obtain, when it is detected that a specified application is started, a check item list and check policy data, where the check item list and the check policy data are configured by a server according to a check requirement, the check item list includes at least one check item, each check item characterizes an operation state of a terminal, and the check policy data is used to indicate a check form for each check item in the check item list;
An inspection module 802 for inspecting each inspection item in the inspection item list according to the inspection item policy data;
and the optimizing module 803 is used for updating the running state of the terminal according to the checking result of each checking item.
In another embodiment of the present invention, an obtaining module 801 is configured to obtain, when it is detected that a specified application is started, inspection item list data and inspection policy data to be resolved from a server, and resolve the inspection item list data and the inspection policy data to be resolved to obtain an inspection item list and inspection policy data; or alternatively, the process may be performed,
the obtaining module 801 is configured to obtain, when it is detected that the designated application is started, inspection item list data and inspection policy data to be resolved from the local cache, and resolve the inspection item list data and the inspection policy data to be resolved to obtain an inspection item list and inspection policy data.
In another embodiment of the present invention, the apparatus further comprises:
a detection module for detecting whether the inspection item list comprises a negligible inspection item;
and an ignoring module for ignoring the inspection items when each inspection item in the inspection item list is inspected when the inspection item list includes the inspection items that can be ignored.
In another embodiment of the present invention, the checking module 802 is configured to determine, according to the checking policy data, whether the current time reaches a checking time of a current checking item in the checking item list; when the current time reaches the checking time of the current checking item, checking the current checking item; when it is determined that the current time does not reach the inspection time of the current inspection item, a next inspection item is acquired from the inspection item list, and an operation of determining whether the current time reaches the inspection time of the next inspection item is performed.
In another embodiment of the present invention, an inspection module 802 is configured to obtain a target item identifier of a current inspection item; obtaining a target plug-in identification corresponding to the target item identification from a corresponding relation between a preset item identification and a plug-in identification; and according to the target plug-in identification, the current inspection item is inspected by calling the target plug-in corresponding to the target plug-in identification.
In another embodiment of the present invention, the optimizing module is configured to display the inspection result on an application interface of a specified application; when detecting the selected operation of different optimization options on the application interface, optimizing the running state corresponding to the corresponding inspection item; and displaying the optimized checking result.
In summary, the device provided by the embodiment of the present invention acquires the inspection item list and the inspection policy data when detecting that the designated application is started, and further inspects each inspection item in the inspection item list based on the inspection policy data. Because the inspection item list and the inspection strategy data are configured by the server according to the inspection requirements, when the inspection items are increased, the inspection strategies are changed or other customized requirements are met by a user, the inspection item list and the inspection strategy data can be directly configured and sent by the server without releasing a new version, so that the development cost of an application program is reduced, and the development efficiency is improved.
Fig. 9 shows a block diagram of a terminal 900 according to an exemplary embodiment of the present invention. The terminal 900 may be: a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio Layer III, motion picture expert compression standard audio plane 3), an MP4 (Moving Picture Experts Group Audio Layer IV, motion picture expert compression standard audio plane 4) player, a notebook computer, or a desktop computer. Terminal 900 may also be referred to by other names of user devices, portable terminals, laptop terminals, desktop terminals, etc.
In general, the terminal 900 includes: a processor 901 and a memory 902.
Processor 901 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 901 may be implemented in at least one hardware form of DSP (Digital Signal Processing ), FPGA (Field-Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array ). The processor 901 may also include a main processor and a coprocessor, the main processor being a processor for processing data in an awake state, also referred to as a CPU (Central Processing Unit ); a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 901 may integrate a GPU (Graphics Processing Unit, image processor) for rendering and drawing of content required to be displayed by the display screen. In some embodiments, the processor 901 may also include an AI (Artificial Intelligence ) processor for processing computing operations related to machine learning.
The memory 902 may include one or more computer-readable storage media, which may be non-transitory. The memory 902 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 902 is used to store at least one instruction for execution by processor 901 to implement a method of checking an operational state provided by an embodiment of a method in the present application.
In some embodiments, the terminal 900 may further optionally include: a peripheral interface 903, and at least one peripheral. The processor 901, memory 902, and peripheral interface 903 may be connected by a bus or signal line. The individual peripheral devices may be connected to the peripheral device interface 903 via buses, signal lines, or circuit boards. Specifically, the peripheral device includes: at least one of radio frequency circuitry 904, a touch display 905, a camera 906, audio circuitry 907, and a power source 909.
The peripheral interface 903 may be used to connect at least one peripheral device associated with an I/O (Input/Output) to the processor 901 and the memory 902. In some embodiments, the processor 901, memory 902, and peripheral interface 903 are integrated on the same chip or circuit board; in some other embodiments, either or both of the processor 901, the memory 902, and the peripheral interface 903 may be implemented on separate chips or circuit boards, which is not limited in this embodiment.
The Radio Frequency circuit 904 is configured to receive and transmit RF (Radio Frequency) signals, also known as electromagnetic signals. The radio frequency circuit 904 communicates with a communication network and other communication devices via electromagnetic signals. The radio frequency circuit 904 converts an electrical signal into an electromagnetic signal for transmission, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 904 includes: antenna systems, RF transceivers, one or more amplifiers, tuners, oscillators, digital signal processors, codec chipsets, subscriber identity module cards, and so forth. The radio frequency circuit 904 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocol includes, but is not limited to: metropolitan area networks, various generations of mobile communication networks (2G, 3G, 4G, and 5G), wireless local area networks, and/or WiFi (Wireless Fidelity ) networks. In some embodiments, the radio frequency circuit 904 may also include NFC (Near Field Communication ) related circuits, which the present application is not limited to.
The display 905 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display 905 is a touch display, the display 905 also has the ability to capture touch signals at or above the surface of the display 905. The touch signal may be input as a control signal to the processor 901 for processing. At this time, the display 905 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, the display 905 may be one, providing a front panel of the terminal 900; in other embodiments, the display 905 may be at least two, respectively disposed on different surfaces of the terminal 900 or in a folded design; in still other embodiments, the display 905 may be a flexible display disposed on a curved surface or a folded surface of the terminal 900. Even more, the display 905 may be arranged in an irregular pattern other than rectangular, i.e., a shaped screen. The display 905 may be made of LCD (Liquid Crystal Display ), OLED (Organic Light-Emitting Diode) or other materials.
The camera assembly 906 is used to capture images or video. Optionally, the camera assembly 906 includes a front camera and a rear camera. Typically, the front camera is disposed on the front panel of the terminal and the rear camera is disposed on the rear surface of the terminal. In some embodiments, the at least two rear cameras are any one of a main camera, a depth camera, a wide-angle camera and a tele camera, so as to realize that the main camera and the depth camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize a panoramic shooting and Virtual Reality (VR) shooting function or other fusion shooting functions. In some embodiments, camera assembly 906 may also include a flash. The flash lamp can be a single-color temperature flash lamp or a double-color temperature flash lamp. The dual-color temperature flash lamp refers to a combination of a warm light flash lamp and a cold light flash lamp, and can be used for light compensation under different color temperatures.
The audio circuit 907 may include a microphone and a speaker. The microphone is used for collecting sound waves of users and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 901 for processing, or inputting the electric signals to the radio frequency circuit 904 for voice communication. For purposes of stereo acquisition or noise reduction, the microphone may be plural and disposed at different portions of the terminal 900. The microphone may also be an array microphone or an omni-directional pickup microphone. The speaker is used to convert electrical signals from the processor 901 or the radio frequency circuit 904 into sound waves. The speaker may be a conventional thin film speaker or a piezoelectric ceramic speaker. When the speaker is a piezoelectric ceramic speaker, not only the electric signal can be converted into a sound wave audible to humans, but also the electric signal can be converted into a sound wave inaudible to humans for ranging and other purposes. In some embodiments, the audio circuit 907 may also include a headphone jack.
The power supply 909 is used to supply power to the various components in the terminal 900. The power supply 909 may be an alternating current, a direct current, a disposable battery, or a rechargeable battery. When the power supply 909 includes a rechargeable battery, the rechargeable battery can support wired or wireless charging. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, terminal 900 can further include one or more sensors 910. The one or more sensors 910 include, but are not limited to: acceleration sensor 911, gyro sensor 912, pressure sensor 913, optical sensor 915, and proximity sensor 916.
The acceleration sensor 911 can detect the magnitudes of accelerations on three coordinate axes of the coordinate system established with the terminal 900. For example, the acceleration sensor 911 may be used to detect components of gravitational acceleration in three coordinate axes. The processor 901 may control the touch display 905 to display a user interface in a landscape view or a portrait view according to the gravitational acceleration signal acquired by the acceleration sensor 911. The acceleration sensor 911 may also be used for the acquisition of motion data of a game or a user.
The gyro sensor 912 may detect a body direction and a rotation angle of the terminal 900, and the gyro sensor 912 may collect a 3D motion of the user on the terminal 900 in cooperation with the acceleration sensor 911. The processor 901 may implement the following functions according to the data collected by the gyro sensor 912: motion sensing (e.g., changing UI according to a tilting operation by a user), image stabilization at shooting, game control, and inertial navigation.
The pressure sensor 913 may be provided at a side frame of the terminal 900 and/or a lower layer of the touch display 905. When the pressure sensor 913 is provided at a side frame of the terminal 900, a grip signal of the user to the terminal 900 may be detected, and the processor 901 performs left-right hand recognition or shortcut operation according to the grip signal collected by the pressure sensor 913. When the pressure sensor 913 is disposed at the lower layer of the touch display 905, the processor 901 performs control of the operability control on the UI interface according to the pressure operation of the user on the touch display 905. The operability controls include at least one of a button control, a scroll bar control, an icon control, and a menu control.
The optical sensor 915 is used to collect the intensity of ambient light. In one embodiment, the processor 901 may control the display brightness of the touch display 905 based on the intensity of ambient light collected by the optical sensor 915. Specifically, when the ambient light intensity is high, the display brightness of the touch display 905 is turned up; when the ambient light intensity is low, the display brightness of the touch display panel 905 is turned down. In another embodiment, the processor 901 may also dynamically adjust the shooting parameters of the camera assembly 906 based on the ambient light intensity collected by the optical sensor 915.
A proximity sensor 916, also referred to as a distance sensor, is typically provided on the front panel of the terminal 900. Proximity sensor 916 is used to collect the distance between the user and the front of terminal 900. In one embodiment, when the proximity sensor 916 detects that the distance between the user and the front face of the terminal 900 gradually decreases, the processor 901 controls the touch display 905 to switch from the bright screen state to the off screen state; when the proximity sensor 916 detects that the distance between the user and the front surface of the terminal 900 gradually increases, the processor 901 controls the touch display 905 to switch from the off-screen state to the on-screen state.
Those skilled in the art will appreciate that the structure shown in fig. 9 is not limiting and that more or fewer components than shown may be included or certain components may be combined or a different arrangement of components may be employed.
When the terminal provided by the embodiment of the invention detects that the appointed application is started, the inspection item list and the inspection strategy data are acquired, and each inspection item in the inspection item list is inspected based on the inspection strategy data. Because the inspection item list and the inspection strategy data are configured by the server according to the inspection requirements, when the inspection items are increased, the inspection strategies are changed or other customized requirements are met by a user, the inspection item list and the inspection strategy data can be directly configured and sent by the server without releasing a new version, so that the development cost of an application program is reduced, and the development efficiency is improved.
The computer readable storage medium provided by the embodiment of the invention stores at least one instruction, at least one section of program, a code set or an instruction set in the storage medium, and the at least one instruction, the at least one section of program, the code set or the instruction set is loaded and executed by a processor to implement the method for checking the running state shown in fig. 3.
The computer readable storage medium provided by the embodiment of the invention acquires the inspection item list and the inspection strategy data when the starting of the appointed application is detected, and further inspects each inspection item in the inspection item list based on the inspection strategy data. Because the inspection item list and the inspection strategy data are configured by the server according to the inspection requirements, when the inspection items are increased, the inspection strategies are changed or other customized requirements are met by a user, the inspection item list and the inspection strategy data can be directly configured and sent by the server without releasing a new version, so that the development cost of an application program is reduced, and the development efficiency is improved.
It should be noted that: in the method for checking an operation state provided in the above embodiment, only the division of each functional module is used for illustration when checking an operation state, and in practical application, the above functional allocation may be performed by different functional modules according to needs, that is, the internal structure of the operation state checking device is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the method for checking the running state provided in the above embodiment and the device for checking the running state belong to the same concept, and detailed implementation processes of the method embodiment are detailed in the above embodiment, and are not repeated here.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program for instructing relevant hardware, where the program may be stored in a computer readable storage medium, and the storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The foregoing description of the preferred embodiments of the invention is not intended to limit the invention to the precise form disclosed, and any such modifications, equivalents, and alternatives falling within the spirit and scope of the invention are intended to be included within the scope of the invention.

Claims (7)

1. A method of checking an operational condition, the method comprising:
the server respectively sends the inspection item list and the inspection strategy data to an inspection item list management sub-module and an inspection strategy management sub-module in the terminal;
the inspection item list management sub-module analyzes and stores the inspection item list, wherein the inspection item list comprises at least one inspection item, each inspection item is an operation index of the terminal, each inspection item comprises a plurality of attribute information, and each attribute information is configured by the server according to inspection requirements;
The inspection strategy management sub-module analyzes and stores the inspection strategy data, the inspection strategy data is configured by the server according to inspection requirements, the inspection strategy data is used for indicating an inspection form of each inspection item in the inspection item list, and the inspection form comprises inspection time and inspection duration;
when the starting of a specified application is detected, an inspection execution scheduling center in the terminal acquires the inspection item list and the inspection strategy data from the inspection item list management sub-module and the inspection strategy management sub-module respectively, and sends the inspection item list and the inspection strategy data to an inspection execution distribution sub-module in the terminal;
the checking execution distribution sub-module schedules a plug-in module in the terminal to check the checking items in the checking item list according to the checking item policy data, wherein the checking items checked by the plug-in module do not comprise negligible checking items filtered according to user behavior record data;
the terminal optimizes the running state of the terminal according to the checking result of each checked item;
The server only updates the inspection item list, and sends the updated inspection item list to the inspection item list management sub-module, or the server only updates the inspection policy data, and sends the updated inspection policy data to the inspection policy management sub-module.
2. The method of claim 1, wherein the inspection execution distribution sub-module schedules the plug-in module to inspect an inspection item in the inspection item list according to the inspection item policy data, comprising:
determining whether a negligible inspection item is included in the inspection item list based on user behavior record data;
if the inspection item list comprises the negligible inspection items, the negligible inspection items are ignored when the inspection items in the inspection item list are inspected.
3. The method of claim 1, wherein the inspection execution distribution sub-module schedules the plug-in module to inspect an inspection item in the inspection item list according to the inspection item policy data, comprising:
determining whether the current moment reaches the checking time of the current checking item in the checking item list according to the checking strategy data;
When determining that the current time reaches the checking time of the current checking item, checking the current checking item;
when it is determined that the current time does not reach the inspection time of the current inspection item, a next inspection item is acquired from the inspection item list, and an operation of determining whether the current time reaches the inspection time of the next inspection item is performed.
4. A method according to claim 3, wherein said checking said current check item comprises:
acquiring a target item identification of the current inspection item;
obtaining a target plug-in identification corresponding to the target item identification from a corresponding relation between a preset item identification and a plug-in identification;
and according to the target plug-in identification, the current inspection item is inspected by calling a target plug-in corresponding to the target plug-in identification.
5. The method according to any one of claims 1 to 4, wherein the terminal optimizes an operation state of the terminal according to an inspection result of each inspected item, comprising:
displaying the inspection result on an application interface of the appointed application;
When detecting the selected operation of different optimization options on the application interface, optimizing the running state corresponding to the corresponding inspection item;
and displaying the optimized checking result.
6. A terminal comprising a processor and a memory, wherein the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, the at least one instruction, the at least one program, the set of codes, or the set of instructions being loaded and executed by the processor to implement the method of checking an operational state of any one of claims 1 to 5.
7. A computer-readable storage medium, characterized in that at least one instruction, at least one program, a set of codes or a set of instructions is stored in the storage medium, which is loaded and executed by a processor to implement the checking method of an operation state according to any one of claims 1 to 5.
CN201910640442.5A 2019-07-16 2019-07-16 Method, device, terminal and storage medium for checking running state Active CN112241353B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910640442.5A CN112241353B (en) 2019-07-16 2019-07-16 Method, device, terminal and storage medium for checking running state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910640442.5A CN112241353B (en) 2019-07-16 2019-07-16 Method, device, terminal and storage medium for checking running state

Publications (2)

Publication Number Publication Date
CN112241353A CN112241353A (en) 2021-01-19
CN112241353B true CN112241353B (en) 2023-10-13

Family

ID=74167057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910640442.5A Active CN112241353B (en) 2019-07-16 2019-07-16 Method, device, terminal and storage medium for checking running state

Country Status (1)

Country Link
CN (1) CN112241353B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005094619A (en) * 2003-09-19 2005-04-07 Kyocera Communication Systems Co Ltd Terminal status authentication system and its method
JP2007304660A (en) * 2006-05-08 2007-11-22 Hitachi Information Systems Ltd Command execution result recording system and command execution result recording method
CN101123493A (en) * 2007-09-20 2008-02-13 杭州华三通信技术有限公司 Secure inspection method and secure policy server for network access control application system
CN102663298A (en) * 2012-04-06 2012-09-12 北京空间飞行器总体设计部 Safety online detecting system facing to terminal computers
CN102684911A (en) * 2012-03-14 2012-09-19 北京神州绿盟信息安全科技股份有限公司 Security configuration checking device and method and security configuration checking network system
JP2012256352A (en) * 2012-08-10 2012-12-27 Hitachi Ltd Security management device, method and program
WO2015043407A1 (en) * 2013-09-30 2015-04-02 Tencent Technology (Shenzhen) Company Limited Method, system, and apparatus for online service inspection
CN104978257A (en) * 2015-07-17 2015-10-14 北京奇虎科技有限公司 Computer device elastic scoring method and computer device elastic scoring device
CN106411650A (en) * 2016-10-19 2017-02-15 北京交通大学 Distributed security and confidentiality checking method
CN108536485A (en) * 2018-03-30 2018-09-14 全球能源互联网研究院有限公司 Big data platform configuration inspection method, apparatus, terminal and readable storage medium storing program for executing
CN109857629A (en) * 2017-11-30 2019-06-07 贵州白山云科技股份有限公司 A kind of scanning detection method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075347B (en) * 2010-11-18 2013-11-20 北京神州绿盟信息安全科技股份有限公司 Security configuration checking equipment and method, and network system adopting equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005094619A (en) * 2003-09-19 2005-04-07 Kyocera Communication Systems Co Ltd Terminal status authentication system and its method
JP2007304660A (en) * 2006-05-08 2007-11-22 Hitachi Information Systems Ltd Command execution result recording system and command execution result recording method
CN101123493A (en) * 2007-09-20 2008-02-13 杭州华三通信技术有限公司 Secure inspection method and secure policy server for network access control application system
CN102684911A (en) * 2012-03-14 2012-09-19 北京神州绿盟信息安全科技股份有限公司 Security configuration checking device and method and security configuration checking network system
CN102663298A (en) * 2012-04-06 2012-09-12 北京空间飞行器总体设计部 Safety online detecting system facing to terminal computers
JP2012256352A (en) * 2012-08-10 2012-12-27 Hitachi Ltd Security management device, method and program
WO2015043407A1 (en) * 2013-09-30 2015-04-02 Tencent Technology (Shenzhen) Company Limited Method, system, and apparatus for online service inspection
CN104978257A (en) * 2015-07-17 2015-10-14 北京奇虎科技有限公司 Computer device elastic scoring method and computer device elastic scoring device
CN106411650A (en) * 2016-10-19 2017-02-15 北京交通大学 Distributed security and confidentiality checking method
CN109857629A (en) * 2017-11-30 2019-06-07 贵州白山云科技股份有限公司 A kind of scanning detection method and device
CN108536485A (en) * 2018-03-30 2018-09-14 全球能源互联网研究院有限公司 Big data platform configuration inspection method, apparatus, terminal and readable storage medium storing program for executing

Also Published As

Publication number Publication date
CN112241353A (en) 2021-01-19

Similar Documents

Publication Publication Date Title
CN110232048B (en) Log file acquisition method, device and storage medium
CN108536463B (en) Method, device and equipment for acquiring resource package and computer readable storage medium
CN111597008A (en) Popup management method, popup management device, terminal and storage medium
CN110569220B (en) Game resource file display method and device, terminal and storage medium
CN108132790B (en) Method, apparatus and computer storage medium for detecting a garbage code
CN110147380B (en) Data updating method, device, server and storage medium
CN111062824B (en) Group member processing method, device, computer equipment and storage medium
CN112749362A (en) Control creating method, device, equipment and storage medium
CN108229171B (en) Driver processing method, device and storage medium
CN111737100A (en) Data acquisition method, device, equipment and storage medium
CN110677713A (en) Video image processing method and device and storage medium
CN111459466B (en) Code generation method, device, equipment and storage medium
CN112612539A (en) Data model unloading method and device, electronic equipment and storage medium
CN111061369B (en) Interaction method, device, equipment and storage medium
CN111857938A (en) Management method and device of popup view, terminal and storage medium
CN116700826A (en) Widget starting method, device, equipment and computer readable storage medium
CN112241353B (en) Method, device, terminal and storage medium for checking running state
CN112988177B (en) Application installation package release method, application program operation method, server and terminal
CN111580892B (en) Method, device, terminal and storage medium for calling service components
CN112783533A (en) Version information updating method, version information updating device, terminal and storage medium
CN111190751A (en) Task processing method and device based on song list, computer equipment and storage medium
CN112231619A (en) Conversion method, conversion device, electronic equipment and storage medium
CN113392120A (en) Method and device for acquiring execution information of SQLite
CN110458289B (en) Multimedia classification model construction method, multimedia classification method and device
CN112817768B (en) Animation processing method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant