CN114268690B - Application program control method and device, electronic equipment and storage medium - Google Patents

Application program control method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114268690B
CN114268690B CN202111558506.0A CN202111558506A CN114268690B CN 114268690 B CN114268690 B CN 114268690B CN 202111558506 A CN202111558506 A CN 202111558506A CN 114268690 B CN114268690 B CN 114268690B
Authority
CN
China
Prior art keywords
sim card
application program
flow control
time period
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111558506.0A
Other languages
Chinese (zh)
Other versions
CN114268690A (en
Inventor
钟志杰
王健
徐锐
张立波
丁航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111558506.0A priority Critical patent/CN114268690B/en
Publication of CN114268690A publication Critical patent/CN114268690A/en
Application granted granted Critical
Publication of CN114268690B publication Critical patent/CN114268690B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the application discloses a control method, a control device, electronic equipment and a storage medium of an application program, wherein the method comprises the following steps: recording a corresponding trigger time point based on user operation for triggering an application program in the running terminal equipment, and identifying an SIM card set in the terminal equipment, wherein the application program consumes data flow during running; if the SIM card is identified to carry the flow control identification, judging whether the trigger time point is in the flow control time period corresponding to the SIM card; if the judgment result is yes, the control application program does not respond to the user operation. According to the scheme, a green and healthy internet surfing environment can be provided for the user to be controlled, and the user to be controlled is prevented from being excessively enthusiasm for the internet.

Description

Application program control method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for controlling an application program, an electronic device, and a computer-readable storage medium.
Background
Modern society science and technology is developed, and the progress of computer technology gives more and more entertainment choices to teenagers, however, the contents on the Internet are good and varied, and adverse factors can bring negative effects to physical and mental health growth of the teenagers. In this critical form, how to effectively control the dissemination of bad information on the internet to avoid the addiction of teenagers to attract a wide attention of social circles.
The prior art can control the use duration and the viewing content of the application program by setting the teenager mode of the application program, and this way has certain limitations.
Disclosure of Invention
In order to solve the technical problem, embodiments of the present application provide a method and an apparatus for controlling an application program, an electronic device, and a computer-readable storage medium, which can effectively control a duration of a user to be controlled accessing the internet.
Other features and advantages of the present application will be apparent from the following detailed description, or may be learned by practice of the application.
According to an aspect of an embodiment of the present application, there is provided a method for controlling an application program, including: recording a corresponding trigger time point based on user operation for triggering an application program in the running terminal equipment, and identifying an SIM card set in the terminal equipment, wherein the application program consumes data flow during running; if the SIM card is identified to carry a flow control identifier, judging whether the trigger time point is in a flow control time period corresponding to the SIM card; if the judgment result is yes, the control application program does not respond to the user operation.
In an exemplary embodiment, if the trigger time point is not within the traffic control period corresponding to the SIM card, acquiring the cumulative usage data traffic of the SIM card set in the terminal device within a preset time period; and if the accumulated use data flow exceeds the total flow control amount corresponding to the SIM card in a preset time period, controlling the application program not to respond to the user operation.
In an exemplary embodiment, before recording a corresponding trigger time point based on a user operation triggering an application program in the terminal device to run, and identifying a SIM card set in the terminal device, the method further includes: receiving an account creating request, wherein the account creating request comprises a flow control identifier; the method comprises the steps that account opening processing is conducted on a blank number card according to an account creating request to obtain an SIM card, and a flow control identification is written into the SIM card to obtain the SIM card carrying the flow control identification; receiving and storing flow control configuration information set for the SIM card carrying the flow control identification, wherein the flow control configuration information comprises a flow control time period and/or a total flow control amount in a set time period.
In an exemplary embodiment, the account creation request includes a secondary card creation request carrying a traffic control identifier; according to the account establishment request, the blank number card is subjected to account opening processing to obtain an SIM card, and the flow control identification is written into the SIM card to obtain the SIM card carrying the flow control identification, and the method comprises the following steps: opening an account of the blank number card according to the auxiliary card establishing request to obtain an auxiliary SIM card; and writing the flow control identification into the auxiliary SIM card to obtain the SIM card carrying the flow control identification.
In an exemplary embodiment, receiving and saving configuration information of a SIM card for a carried traffic control identifier includes: and receiving and storing the flow control configuration information which is sent by the account of the main SIM card corresponding to the auxiliary SIM card and is set aiming at the auxiliary SIM card.
In an exemplary embodiment, the method further comprises: and sending the flow use condition of the auxiliary SIM card to an account corresponding to the main SIM card, wherein the flow use condition comprises flow use duration and accumulated data flow use amount in a preset time period.
In an exemplary embodiment, identifying a SIM card set in a terminal device includes: receiving an authentication request sent by terminal equipment when an application program is triggered to run; and identifying the SIM card set in the terminal equipment based on the authentication request.
According to an aspect of an embodiment of the present application, there is provided an application control apparatus including: the recording and identifying module is used for recording a corresponding trigger time point based on user operation for triggering the application program in the running terminal equipment, identifying an SIM card set in the terminal equipment, and consuming data flow when the application program runs; the judging module is used for judging whether the triggering time point is in the flow control time period corresponding to the SIM card or not if the SIM card is identified to carry the flow control identification; and the control module is used for controlling the application program not to respond to the user operation when the trigger time point is within the flow control period corresponding to the SIM card.
According to an aspect of the embodiments of the present application, there is provided an electronic device, including a processor and a memory, where the memory stores computer readable instructions, and the computer readable instructions, when executed by the processor, implement the control method of the application program as above.
According to an aspect of embodiments of the present application, there is provided a computer-readable storage medium having stored thereon computer-readable instructions which, when executed by a processor of a computer, cause the computer to execute the control method of an application program as previously provided.
According to an aspect of embodiments herein, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the control method of the application program provided in the above-described various alternative embodiments.
In the technical scheme provided by the embodiment of the application, the flow control identifier is set on the SIM card of the user to be controlled, when the user operation of triggering the application program in the running terminal device is received, whether the time point of triggering the application program in the running terminal device is within the flow control time period corresponding to the SIM card is judged, if yes, the application program is controlled not to respond to the user operation, that is, when the internet surfing time period of the user to be controlled meets the preset control condition, the application program is directly controlled not to run, the running process of the application program is combined with the flow control strategy, the internet surfing control of the user to be controlled is further realized, a green and healthy internet surfing environment is provided for the user to be controlled, and the excessive enthrallment of the user to be controlled on the internet is prevented.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application. It is obvious that the drawings in the following description are only some embodiments of the application, and that for a person skilled in the art, other drawings can be derived from them without inventive effort. In the drawings:
fig. 1 is a flowchart illustrating a control method of an application program according to an exemplary embodiment of the present application;
FIG. 2 is a flowchart of step S100 in an exemplary embodiment of the embodiment shown in FIG. 1;
FIG. 3 is a flow chart of an exemplary method for controlling an application program in accordance with the embodiment of FIG. 1;
FIG. 4 is a flowchart of an exemplary application control method based on the embodiment shown in FIG. 1;
FIG. 5 is a flowchart of step S20 in an exemplary embodiment of the embodiment shown in FIG. 4;
FIG. 6 is a block diagram of a control device for an application shown in an exemplary embodiment of the present application;
FIG. 7 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flowcharts shown in the figures are illustrative only and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It should also be noted that: reference to "a plurality" in this application means two or more. "and/or" describe the association relationship of the associated objects, meaning that there may be three relationships, e.g., A and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
The existing traffic control mode includes that the APP duration is controlled through a teenager mode of an application program, the content is watched, and the wireless router controls to disconnect a network according to a preset internet access strategy, and the existing traffic control mode has certain disadvantages. For example, the mode of controlling the internet access process through the adolescent mode of the application program has the following defects:
(1) The teenager mode becomes the standard configuration of each application program, each application program needs to be configured independently and can only be controlled independently, most of the application programs can be skipped over during initial installation, the teenager mode is similar to a dummy after being spitted by parents, the teenager mode is only a psychological comfort mode and has no great effect actually;
(2) The mode that each application program independently counts the internet surfing time cannot realize the control of the overall internet surfing time of the user to be controlled;
(3) Not all application programs are provided with a teenager mode, but the existing application programs provided with the teenager mode are mainly provided with game application programs, video application programs and the like, in fact, network media are various, and not only games and videos, but also web browsing, network chatting, network movies, televisions and the like are included, and the teenager mode must be set for the application programs related to the contents to effectively prevent enthrallment.
The wireless router controls the internet access control mode for disconnecting the network according to the preset internet access strategy, and has the following defects:
(1) When the user to be controlled does not accord with the internet surfing condition, the network is directly disconnected, obviously, the subsequent user needs to be reconnected with the network at least once, and the mode increases the complexity of the user in surfing the internet and reduces the user experience;
(2) The existing internet access strategy completely limits a user to be controlled (such as teenagers) to access the internet according to a fixed time interval to achieve the aim of preventing enthusiasm, and parents cannot flexibly and autonomously set the internet access strategy.
In order to solve at least the above problems in the prior art, embodiments of the present application respectively propose an application control method, an application control apparatus, an electronic device, and a computer-readable storage medium, and will be described in detail below with respect to these embodiments.
Referring to fig. 1, fig. 1 is a flowchart illustrating a control method of an application program according to an exemplary embodiment of the present application, where the control method of the application program provided in this embodiment includes steps S100 to S300, and reference is made to the following detailed description:
step S100: and recording a corresponding trigger time point based on the user operation of triggering the application program in the running terminal equipment, and identifying the SIM card set in the terminal equipment.
In this embodiment, the application consumes data traffic during running, for example, video-type applications such as trembling, fast-hand, love art video, tencent video, etc., web-type applications such as UC browser, baidu browser or Google browser, etc., game-type applications such as hero alliance, royal, etc., which are not limited herein.
In this embodiment, the user operation for triggering the running of the application program in the terminal device may be triggered by touching or pressing a display icon of the corresponding application program.
A SIM (Subscriber Identity Module) card is an IC card held by a Mobile Subscriber of a GSM (Global System for Mobile Communications) System, and is called a Subscriber Identity card. The GSM system identifies the GSM subscriber by means of a SIM card. The same SIM card can be used on different mobile terminals. The GSM terminal can be accessed to the network only after the SIM card is inserted. The SIM card is a key for the GSM terminal to connect to the GSM network, and once the SIM card is removed from the mobile terminal, the terminal cannot enjoy various services provided by the network operator except for emergency calls. In this embodiment, the SIM card is one of a standard card, a Micro SIM card or a Nano SIM card.
The process of identifying the SIM card arranged in the terminal equipment is to read whether a flow control identifier is stored in the SIM card, wherein the flow control identifier is used for marking flow control on the terminal equipment provided with the SIM card. Illustratively, a flow management and control identifier is written in an SIM card corresponding to a user to be managed and controlled in advance, so that when a user operation triggering an application program in a terminal device to be run is received, the flow management and control identifier carried by the SIM card is identified. In this embodiment, if the terminal device has a plurality of SIM cards, each SIM card is identified.
Referring to fig. 2, fig. 2 is a flowchart of step S100 in an exemplary embodiment shown in fig. 1, and as shown in fig. 2, step S100 may include steps S110 to S120, which are described in detail as follows:
step S110: and receiving an authentication request sent by the terminal equipment when the application program is triggered to run.
In this embodiment, the terminal device sends an authentication request to the server at the trigger time point, where the authentication request is used to request identification of the SIM card set in the terminal device.
Step S120: and identifying the SIM card set in the terminal equipment based on the authentication request.
In this embodiment, by sending the authentication request when the application is triggered to operate, so that the server identifies the SIM card, the server is prevented from being unable to accurately know that the application is triggered to operate, and further unable to identify the SIM card, and accuracy of flow control of the user to be controlled is improved.
Step S200: and if the SIM card is identified to carry the flow control identification, judging whether the trigger time point is in the flow control time period corresponding to the SIM card.
In this embodiment, the SIM card carrying the traffic control identifier indicates that data traffic control needs to be performed on the terminal device to which the SIM card belongs, the user holding the terminal device is a user to be controlled, the user to be controlled may refer to a user whose internet surfing time needs to be managed or controlled, for example, a user of a middle and primary school student whose internet surfing time needs to be controlled by a parent, and the traffic control period may refer to a time during which the user to be controlled needs to be restricted from surfing the internet, for example, at school time.
In this embodiment, the trigger time point is matched with a flow control time period corresponding to the SIM card carrying the flow control identifier, and if the trigger time point is within the flow control time period, it is determined to perform flow control on the terminal device, otherwise, a user operation for triggering an application program in the terminal device is triggered.
Exemplarily, in this embodiment, configuration information is set in advance for the SIM card carrying the traffic control identifier, where the configuration information includes a traffic control period, and is used to indicate that, in the traffic control period, the terminal device provided with the SIM card carrying the traffic control identifier is not allowed to use data traffic. The setting of the flow control period may be flexibly set according to a specific application scenario, for example, if the user to be controlled is a teenager, considering that the idle time of the teenager from monday to friday is mainly concentrated after school, and the teenager needs to complete the job arranged by the teacher within the set period after school, the period lasting from the school time point to the preset period may be set as the flow control period; considering that the number of idle time of teenagers on weekends is large, a time period with a large span can be set as a flow control period of each day, from ten am to six pm of each day, or different sub-flow control periods can be set for different dates. It should be noted that the above description of the traffic regulation period is only exemplary and does not have any limiting meaning. For example, the traffic control period may be set not only in a cycle of days, but also in time units of weeks, months, and the like.
Step S300: if the judgment result is yes, the control application program does not respond to the user operation.
In this embodiment, if the trigger time point is located within the control time period, it is determined that traffic control needs to be performed on the terminal device, because the application in this embodiment consumes data traffic when running, and at this time, if a user operation that triggers running of the application in the terminal device is triggered in response, the data traffic is inevitably consumed, and therefore, in this case, the embodiment prevents consumption of the data traffic by controlling the application not to respond to the user operation, and further controls the internet access process of the user to be controlled.
According to the embodiment, when the trigger time point is within the flow control time period corresponding to the SIM card, the corresponding application program is directly controlled not to respond to the operation, instead of directly cutting off the Internet, so that the subsequent complex operation of re-networking can be effectively avoided, and the complexity of Internet access control is reduced.
In a specific application scenario, a plurality of SIM cards are arranged in the terminal equipment, when a user triggers an application program in the terminal equipment, the corresponding trigger time point is recorded by the scheme, the SIM cards arranged in the terminal equipment are identified, if at least one SIM card carries a flow control identifier, whether the trigger time point is in a flow control time period corresponding to the SIM card is judged, and if the trigger time point is in the flow control time period corresponding to the SIM card, the application program is controlled not to respond to the user operation. Obviously, as long as one of the SIM cards of the terminal device carries the traffic control identifier, the present solution performs traffic control on the user corresponding to the terminal device according to the traffic control period carrying the traffic control identifier, and at this time, even if the terminal device uses the quantity and the traffic in the SIM card not carrying the traffic control identifier, the effect of data traffic control can still be played. Therefore, in the embodiment, the traffic control policy is combined with the operating conditions of the application program, so that the internet surfing process of the user to be controlled can be controlled more comprehensively.
In this embodiment, a management and control flow for running an application program by a user is added at a telecommunication network operator, and the running condition of the application program is combined with a data traffic management and control process, so that internet surfing management and control of a user to be managed and controlled are realized, a green and healthy internet surfing environment is provided for the user to be managed and controlled, and the user to be managed and controlled is prevented from being excessively enthusiastic to the internet.
Referring to fig. 3, fig. 3 is a flowchart of an exemplary control method of an application program based on the embodiment shown in fig. 1. As shown in fig. 2, this method further includes steps S400-S500 based on the embodiment shown in fig. 1, and the following details are introduced:
step S400: and if the trigger time point is not in the flow control period corresponding to the SIM card, acquiring the accumulated use data flow of the SIM card set in the terminal equipment in a preset time period.
In this embodiment, the internet access process of the user to be controlled is further controlled from the total amount of data traffic, before that, a total amount of traffic control set in a preset time period for the user to be controlled needs to be set, where the total amount of traffic control is used to represent the total amount of data traffic that can be used by the user to be controlled in the preset time period. In this embodiment, the setting of the total traffic control amount may be flexibly set according to an actual application scenario, and is not specifically limited herein. For example, in an epidemic situation, when a teenager needs to access a lesson, the total traffic usage amount in a preset time period can be set to be larger, so as to meet the data traffic demand required by the teenager to access the lesson. In the present embodiment, the setting of the preset time period is not limited, and the preset time period may be one day, one week, one month, or the like, for example.
In this embodiment, if the trigger time point is not within the traffic control period corresponding to the SIM card, the terminal device that sets the SIM card with the traffic control identifier obtains the cumulative data traffic of use within a preset time period, in this embodiment, the cumulative data traffic of use of the SIM card set in the terminal device within the preset time period may be obtained through an AAA server (Authentication, authorization, accounting, authentication, authorization, and Accounting server), the AAA server is a server program capable of processing a user access request, and provides Authentication Authorization and Accounting services, and the Accounting services include recording the data traffic use condition of the SIM card. It should be reminded that, in this embodiment, the accumulated usage data traffic in the preset time period and the preset traffic control total amount in the preset time period should be the same.
Step S500: and if the accumulated use data flow exceeds the total flow control amount corresponding to the SIM card in a preset time period, controlling the application program not to respond to the user operation.
In this embodiment, if the cumulative usage data traffic exceeds the traffic control total amount in the preset time period corresponding to the SIM card, which indicates that the data traffic usage of the user to be controlled exceeds the standard, the user still cannot use the data traffic to run the application program, so that the application program is controlled not to respond to the user operation.
In this embodiment, the data traffic usage of the user to be managed is doubly limited, and first, it is determined whether a trigger time point for triggering the running of the application program is within a management and control time period, if so, the application program is directly controlled not to respond to the user operation, if not, the cumulative usage data traffic of the SIM card set in the terminal device within the preset time period is further obtained, and if the cumulative usage data traffic exceeds a traffic management and control total amount corresponding to the SIM card within the preset time period, the application program is controlled not to respond to the user operation. If the traffic flow does not exceed the traffic flow control time, the application program is not controlled, under the condition, the application program directly responds to the user operation and operates the corresponding application program, the situation that the user uses the data traffic flow in a non-traffic flow control period is avoided, and the situation that the user is indulged in a network is avoided, and the control mode is more comprehensive and effective.
In a specific application scene, identifying an SIM card set in terminal equipment based on user operation for triggering an application program in the terminal equipment to run, wherein the application program consumes data traffic during running, and if the SIM card is identified to carry a traffic control identifier, acquiring the accumulated use data traffic of the SIM card set in the terminal equipment within a preset time period; and if the accumulated usage data flow exceeds the flow control total amount corresponding to the SIM card in the preset time period, controlling the application program not to respond to the user operation. The flow control mode directly controls the flow usage of the user to be controlled, and is simple and clear.
In another specific application scenario, based on user operation of triggering an application program in a terminal device to run, recording a corresponding trigger time point, identifying an SIM card set in the terminal device, wherein the application program consumes data traffic during running, and if the SIM card is identified to carry a traffic control identifier, acquiring accumulated used data traffic of the SIM card set in the terminal device within a preset time period; if the accumulated usage data flow exceeds the flow control total amount of the SIM card in the preset time period, controlling the application program not to respond to the user operation, and if the accumulated usage data flow does not exceed the flow control total amount of the SIM card in the preset time period, judging whether the trigger time point is in the flow control time period corresponding to the SIM card; if the judgment result is yes, the application program is controlled not to respond to the user operation, if the judgment result is no, the application program is not controlled, under the condition, the application program directly responds to the user operation and operates the corresponding application program, the situation that the user uses the data traffic in a non-traffic control period can be prevented, and the user is further addicted to the network, and the control method is more comprehensive and effective.
Referring to fig. 4, fig. 4 is a flowchart of an exemplary control method of an application program according to the embodiment shown in fig. 1. As shown in fig. 3, this method is based on the embodiment shown in fig. 1, and further includes steps S10 to S30 before step S100, which are described in detail as follows:
step S10: an account creation request is received.
In this embodiment, the account creation request is a request for transacting a SIM card, and may be initiated by a network operator portal on demand by the customer.
In this embodiment, the account creation request includes a traffic control identifier.
Step S20: and opening an account for the blank number card according to the account creation request to obtain an SIM card, and writing the flow control identification into the SIM card to obtain the SIM card carrying the flow control identification.
In this embodiment, the account creation request further includes configuration data required for account opening processing, and in the process of opening an account for a blank number card, the configuration data is written into the blank number card and activated, so that the SIM card can be obtained, and in this embodiment, the configuration data includes but is not limited to: an International Mobile Subscriber identity Number (IMSI) allocated to the SIM card, a Personal Identification Number (PIN) of the SIM card, an unlock Key (PUK) of the PIN, a short message center Number, a Mobile phone Number of the user, network authentication data, network configuration parameter data, and the like.
Illustratively, a Customer Relationship Management (CRM) server of a telecom operator may be used to open an account for a blank card, where Customer Relationship Management refers to a process in which an enterprise coordinates sales, marketing, and service interactions between the enterprise and a Customer by using a corresponding information technology and an internet technology to improve core competitiveness, so as to improve a Management manner of the enterprise and provide innovative and personalized Customer interactions and services to the Customer. The ultimate goal is to attract new customers, retain old customers, and turn existing customers into faithful customers, increasing the market.
In this embodiment, for different SIM cards, the traffic control identifiers may be the same or different in different application scenarios, and are not specifically limited herein. The SIM card is a kind of smart card, contains the singlechip, has integrated treater and memory in an organic whole, and this embodiment with flow management and control sign write in the memory of SIM card can.
In this embodiment, on one hand, it is considered that most users to be managed are minors, and the minors cannot handle the SIM card independently, and on the other hand, if the SIM card carrying the traffic control identifier is handled under the name of the user to be managed, the user to be managed can freely set traffic control configuration information of the SIM card to some extent, for example, a traffic control period or a traffic control total amount, which may not be comprehensive enough, so that in this embodiment, the user to be managed can more comprehensively control the internet access process of the user to be managed by handling the service of the primary card and the secondary card and writing the traffic control identifier into the secondary card by handling the service of the primary card and the secondary card, which is described in detail below.
Referring to fig. 5, fig. 5 is a flowchart of step S20 in the embodiment shown in fig. 4 in an exemplary embodiment, and as shown in fig. 5, step S20 may include steps S21 to S22, which are described in detail as follows:
step S21: and performing account opening processing on the SIM card according to the auxiliary card establishing request to obtain the auxiliary SIM card.
In this embodiment, the secondary card creation request includes secondary card configuration information, where the secondary card configuration information at least includes primary card information specified by the secondary card requested to be created, and the primary card information includes primary card number information, primary card network package information, and the like, so as to facilitate subsequent writing of the primary card information into the created secondary SIM card, establish association between the primary card and the secondary card, and implement account opening processing of the secondary SIM card. It should be noted that, in this embodiment, the secondary card or the secondary SIM card is affiliated to the account of the primary SIM card, one primary SIM card can handle multiple secondary cards, all the secondary cards use network packages under the account of the primary SIM card, for example, free call duration, data traffic packages, and the like, and for example, a user can handle a converged package, a primary and secondary card package, a group package, and the like.
Step S22: and writing the flow control identification into the auxiliary SIM card to obtain the SIM card carrying the flow control identification.
In this embodiment, the user corresponding to the secondary SIM card is the user to be managed, so that the traffic management and control identifier is written into the secondary SIM card, so as to facilitate the terminal device that sets the secondary SIM card or the application program in the terminal device to read, and further perform traffic management and control on the quantity of the user to be managed and controlled.
Illustratively, the user corresponding to the secondary SIM card is a teenager, and the user corresponding to the primary SIM card to which the secondary SIM card belongs is a guardian of the teenager.
In this embodiment, an auxiliary SIM card affiliated to a main card is created for a user to be controlled, so as to avoid the user to be controlled from changing the flow control configuration information of the SIM card by oneself, thereby reducing the control effort.
Step S30: and receiving and storing the flow control configuration information set by the SIM card carrying the flow control identification.
In this embodiment, traffic control configuration information needs to be set for the SIM card carrying the traffic control identifier, so as to control a data traffic usage process of the terminal device corresponding to the SIM card carrying the traffic control identifier, where the traffic control configuration information includes a traffic control time period and/or a total traffic control amount in a set time period. It should be noted that the traffic control configuration information may also be any other parameter for performing data traffic control on the user to be controlled, which is not specifically limited herein, for example, the non-traffic control period is divided into a plurality of sub-periods, and the data traffic usage amount of each sub-period is limited, so as to prevent the user to be controlled from performing some network activities with high traffic consumption, such as playing games, watching videos, and the like, in the non-traffic control period.
For example, a user may set, in a configuration interface of an operator portal device, traffic control configuration information for an SIM card carrying a traffic control identifier, and subsequent operator portal devices send the traffic control configuration information to the CRM server, so that the CRM server stores the traffic control configuration information, and synchronizes the traffic control configuration information to the charging server, so that the charging server counts traffic usage during a process in which the user uses data traffic, and controls usage of the data traffic.
For example, in order to prevent a user to be controlled from changing or canceling flow control configuration information of an SIM card under the name of the user to be controlled by himself or herself and further reduce flow control strength of the user to be controlled, an auxiliary SIM card affiliated to a main SIM card may be created for the user to be controlled, and flow control configuration information set for the auxiliary SIM card and sent by an account of the main SIM card corresponding to the auxiliary SIM card may be received and stored.
Illustratively, the traffic usage of the secondary SIM card is periodically sent to the account corresponding to the primary SIM card, and in this way, the account corresponding to the primary SIM card can timely know the usage of the data traffic of the user corresponding to the secondary SIM card, and then can autonomously determine whether to update the traffic management and control configuration information of the secondary SIM card, where the traffic usage includes, but is not limited to, a traffic usage duration and an accumulated data traffic usage within a preset time period.
For example, if the total times of refusing to respond to the operation of the application program in the terminal device within the preset time period exceeds a certain threshold, the account corresponding to the primary SIM card finds that the total amount of traffic control of the secondary SIM card in the traffic control configuration information within the preset time period is too small through knowing that the total amount of traffic control of the user to be controlled within the preset time period is too small, and the data traffic of the user to be controlled is controlled through the traffic control method provided in this embodiment, so that the user to be controlled cannot complete a learning task on learning software. In this case, the account corresponding to the primary SIM card may adaptively update the traffic control configuration information of the secondary SIM card, that is, the account corresponding to the primary SIM card may increase the total traffic control amount corresponding to the secondary SIM card in the preset time period.
Illustratively, the traffic usage includes the type of the application program in the terminal device that refuses to respond to the running application program and the total refusing times corresponding to the type of the application program, that is, the type of the application program in the terminal device that refuses to respond to the running application program and the total refusing times corresponding to the type of the application program are sent to the account corresponding to the main SIM card. For example, if the account corresponding to the master SIM card knows that the number of times of refusing a certain game is too large, the account corresponding to the master SIM card may correspondingly and strongly manually control or supervise the user to be controlled.
Referring to fig. 6, fig. 6 is a block diagram of a control device of an application program according to an exemplary embodiment of the present application, and as shown in fig. 6, the control device 40 of the application program includes a record identification module 41, a judgment module 42, and a first control module 43.
The recording and identifying module 41 is configured to record a corresponding trigger time point based on a user operation for triggering an application program in the terminal device to run, and identify an SIM card set in the terminal device, where the application program consumes data traffic during running; the judging module 42 is configured to judge whether the trigger time point is within a traffic control time period corresponding to the SIM card if it is identified that the SIM card carries the traffic control identifier; the first control module 43 is configured to control the application not to respond to the user operation when the trigger time point is within the traffic control period corresponding to the SIM card.
In another exemplary embodiment, the record identification module 41 includes a receiving unit and an identification unit.
The receiving unit is used for receiving an authentication request sent by the terminal equipment when the application program is triggered to run; the identification unit is used for identifying the SIM card arranged in the terminal equipment based on the authentication request.
In another exemplary embodiment, the control device 40 of the application provided in this embodiment further includes an obtaining module and a second control module, where the obtaining module is configured to obtain, if the trigger time point is not within the traffic control period corresponding to the SIM card, the cumulative usage data traffic of the SIM card set in the terminal device within a preset time period; the second control module is used for controlling the application program not to respond to the user operation if the accumulated using data flow exceeds the total flow control amount corresponding to the SIM card in the preset time period.
In another exemplary embodiment, the control device 40 of the application program provided in this embodiment further includes a first receiving module, an account opening module, and a second receiving module, where the first receiving module is configured to receive an account creation request, and the account creation request includes a traffic control identifier; the account opening module is used for opening an account for the SIM card according to the account creating request and writing the flow control identification into the SIM card to obtain the SIM card carrying the flow control identification; the second receiving module is used for receiving and storing traffic control configuration information set for the SIM card carrying the traffic control identifier, where the traffic control configuration information includes a traffic control time period and/or a traffic control total amount in a set time period.
In another exemplary embodiment, the account opening module comprises an account opening unit and a writing unit, wherein the account opening unit is used for performing account opening processing on the SIM card according to the secondary card creation request to obtain the secondary SIM card; the writing unit is used for writing the flow control identifier into the secondary SIM card to obtain the SIM card carrying the flow control identifier, wherein the account creation request comprises a secondary card creation request carrying the flow control identifier.
It should be noted that the apparatus provided in the foregoing embodiment and the method provided in the foregoing embodiment belong to the same concept, and specific ways of performing operations by the modules and units have been described in detail in the method embodiment, and are not described again here.
In another exemplary embodiment, the present application provides an electronic device comprising a processor and a memory, wherein the memory has stored thereon computer readable instructions which, when executed by the processor, implement the control method of the application program as before.
FIG. 7 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present application.
It should be noted that the computer system 1000 of the electronic device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 7, the computer system 1000 includes a Central Processing Unit (CPU) 1001 that can perform various appropriate actions and processes, such as performing the information recommendation method in the above-described embodiment, according to a program stored in a Read-Only Memory (ROM) 1002 or a program loaded from a storage portion 1008 into a Random Access Memory (RAM) 1003. In the RAM 1003, various programs and data necessary for system operation are also stored. The CPU 1001, ROM 1002, and RAM 1003 are connected to each other via a bus 1004. An Input/Output (I/O) interface 1005 is also connected to the bus 1004.
The following components are connected to the I/O interface 1005: an input section 1006 including a keyboard, a mouse, and the like; an output section 1007 including a Display panel such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage portion 1008 including a hard disk and the like; and a communication section 1009 including a Network interface card such as a LAN (Local Area Network) card, a modem, or the like. The communication section 1009 performs communication processing via a network such as the internet. The driver 1010 is also connected to the I/O interface 1005 as necessary. A removable medium 1011 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 1010 as necessary, so that a computer program read out therefrom is mounted into the storage section 1008 as necessary.
In particular, according to embodiments of the application, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising a computer program for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication part 1009 and/or installed from the removable medium 1011. When the computer program is executed by a Central Processing Unit (CPU) 1001, various functions defined in the system of the present application are executed.
It should be noted that the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM), a flash Memory, an optical fiber, a portable Compact Disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with a computer program embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. The computer program embodied on the computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
Another aspect of the present application also provides a computer-readable storage medium having computer-readable instructions stored thereon, which, when executed by a processor, implement the control method of an application program according to any one of the preceding embodiments.
Another aspect of the application also provides a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the control method of the application program provided in the above-described embodiments.
It should be noted that the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. The computer readable storage medium may be, for example, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM), a flash Memory, an optical fiber, a portable Compact Disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with a computer program embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. The computer program embodied on the computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
The above description is only a preferred exemplary embodiment of the present application, and is not intended to limit the embodiments of the present application, and those skilled in the art can easily make various changes and modifications according to the main concept and spirit of the present application, so that the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (9)

1. A method for controlling an application program, comprising:
recording a corresponding trigger time point based on user operation for triggering an application program in running terminal equipment, and identifying an SIM card set in the terminal equipment, wherein the application program consumes data flow during running;
if the SIM card is identified to carry a flow control identifier, judging whether the trigger time point is in a flow control time period corresponding to the SIM card;
if the judgment result is yes, controlling the application program not to respond to the user operation;
if the trigger time point is not within the flow control time period corresponding to the SIM card, acquiring the accumulated use data flow of the SIM card set in the terminal equipment within a preset time period;
and if the accumulated use data flow exceeds the total flow control amount corresponding to the SIM card in the preset time period, controlling the application program not to respond to the user operation.
2. The method according to claim 1, wherein before the triggering-based user operation of running an application program in a terminal device, recording a corresponding trigger time point, and identifying a SIM card set in the terminal device, the method further comprises:
receiving an account creating request, wherein the account creating request comprises a flow control identifier;
according to the account creation request, opening an account for a blank number card to obtain an SIM card, and writing the flow control identification into the SIM card to obtain the SIM card carrying the flow control identification;
receiving and storing flow control configuration information set for the SIM card carrying the flow control identification, wherein the flow control configuration information comprises a flow control time period and/or a total flow control amount in a set time period.
3. The method according to claim 2, wherein the account creation request includes a secondary card creation request carrying a traffic control identifier;
the account opening processing is carried out on the blank number card according to the account creating request to obtain an SIM card, the flow control identification is written into the SIM card, and the SIM card with the flow control identification is obtained, and the method comprises the following steps:
opening an account for the blank number card according to the auxiliary card establishing request to obtain an auxiliary SIM card;
and writing the flow control identification into the auxiliary SIM card to obtain the SIM card carrying the flow control identification.
4. The method according to claim 3, wherein the receiving and saving configuration information for the SIM card carrying the traffic control identifier comprises:
and receiving and storing the flow control configuration information which is sent by the account of the main SIM card corresponding to the auxiliary SIM card and is set aiming at the auxiliary SIM card.
5. The method of claim 4, further comprising:
and sending the flow use condition of the auxiliary SIM card to an account corresponding to the main SIM card, wherein the flow use condition comprises flow use duration and accumulated data flow use amount in a preset time period.
6. The method according to claim 1, wherein the identifying the SIM card set in the terminal device comprises:
receiving an authentication request sent by the terminal equipment when an application program is triggered to run;
and identifying the SIM card set in the terminal equipment based on the authentication request.
7. An apparatus for controlling an application program, comprising:
the recording and identifying module is used for recording a corresponding trigger time point based on user operation of triggering an application program in running terminal equipment, identifying an SIM card set in the terminal equipment, and consuming data traffic when the application program runs;
the judging module is used for judging whether the trigger time point is in the flow control time period corresponding to the SIM card or not if the SIM card is identified to carry the flow control identification;
the control module comprises a first control module, a second control module and an acquisition module, wherein the first control module is used for controlling an application program not to respond to the user operation when the trigger time point is within a flow control time period corresponding to the SIM card;
the obtaining module is configured to obtain, when the trigger time point is not within a traffic control period corresponding to the SIM card, an accumulated usage data traffic of the SIM card set in the terminal device within a preset time period;
and the second control module is used for controlling an application program not to respond to user operation if the accumulated use data flow exceeds the total flow control amount corresponding to the SIM card in the preset time period.
8. An electronic device, comprising:
a memory storing computer readable instructions;
a processor to read computer readable instructions stored by the memory to perform the method of any of claims 1-6.
9. A computer-readable storage medium having computer-readable instructions stored thereon which, when executed by a processor of a computer, cause the computer to perform the method of any one of claims 1-6.
CN202111558506.0A 2021-12-17 2021-12-17 Application program control method and device, electronic equipment and storage medium Active CN114268690B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111558506.0A CN114268690B (en) 2021-12-17 2021-12-17 Application program control method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111558506.0A CN114268690B (en) 2021-12-17 2021-12-17 Application program control method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114268690A CN114268690A (en) 2022-04-01
CN114268690B true CN114268690B (en) 2023-04-18

Family

ID=80828030

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111558506.0A Active CN114268690B (en) 2021-12-17 2021-12-17 Application program control method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114268690B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115174248B (en) * 2022-07-18 2023-08-04 天翼云科技有限公司 Control method and device for network access

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770746A (en) * 2017-09-30 2018-03-06 广东欧珀移动通信有限公司 Data processing method and device, computer equipment, computer-readable recording medium
US11134062B1 (en) * 2020-06-12 2021-09-28 Bank Of America Corporation Isolating and disabling unauthorized applications

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426043A (en) * 2016-05-23 2017-12-01 中兴通讯股份有限公司 Traffic monitoring processing method and processing device
CN108282410A (en) * 2017-07-03 2018-07-13 广州市动景计算机科技有限公司 Background traffic control method, device, storage medium and user terminal
CN107800651B (en) * 2017-10-31 2021-03-02 Oppo广东移动通信有限公司 Application program closing method and device, storage medium and electronic equipment
CN108966367B (en) * 2018-07-23 2020-12-29 Oppo广东移动通信有限公司 Method and device for managing and controlling internet surfing behavior, storage medium and intelligent terminal
CN109525575A (en) * 2018-11-08 2019-03-26 北京首信科技股份有限公司 The method and system of online control
CN111132132A (en) * 2019-12-26 2020-05-08 珠海格力电器股份有限公司 Traffic management method and device and terminal equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770746A (en) * 2017-09-30 2018-03-06 广东欧珀移动通信有限公司 Data processing method and device, computer equipment, computer-readable recording medium
US11134062B1 (en) * 2020-06-12 2021-09-28 Bank Of America Corporation Isolating and disabling unauthorized applications

Also Published As

Publication number Publication date
CN114268690A (en) 2022-04-01

Similar Documents

Publication Publication Date Title
CN102301378B (en) Thin client-server system, thin client terminal, data managing method and computer readable recording medium storing program for performing
CN109246741B (en) Wireless network connection method for terminal
CN100448324C (en) System and method for limiting mobile terminal functions
CN100486382C (en) Aging processing apparatus and method in communications system
CN107197346A (en) Television terminal and bluetooth equipment return even method and computer-readable recording medium
KR100579759B1 (en) Server processing of interactive screens for a wireless device
CN109118332A (en) A kind of method and relevant device of shared automobile personal credit management
CN110351111A (en) A kind of subscription processing method, network node and customer data base
CN101395873A (en) Instant messaging control
CN111010426A (en) Message pushing method and device
CN104935500A (en) Friend recommendation method and device based on network conversation
CN114268690B (en) Application program control method and device, electronic equipment and storage medium
CN106358065A (en) Multimedia information processing method and system
CN110868693A (en) Application program flow control method, terminal device and storage medium
CN106878987B (en) Communication method, system and cloud server
CN106815501A (en) The application management method and device of mobile terminal
CN105978858B (en) Using method, apparatus and the application server of registering
WO2017133135A1 (en) Method and system for sharing number by a plurality of mobile terminals, and storage medium
CN105824671A (en) Information processing method and electronic equipment
CN104796867A (en) Automatic login method and automatic login terminal
CN111767558A (en) Data access monitoring method, device and system
CN105721392A (en) Method, device and system for recommending applications
CN107197535A (en) A kind of cluster the whole network call control method and apparatus
KR101572060B1 (en) Apparatus and method for power saving using predictive polling in portable terminal
CN106060599A (en) Advertisement display method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant