CN104135561A - Method and device of reminding user of flow of terminal as well as terminal - Google Patents

Method and device of reminding user of flow of terminal as well as terminal Download PDF

Info

Publication number
CN104135561A
CN104135561A CN201310284580.7A CN201310284580A CN104135561A CN 104135561 A CN104135561 A CN 104135561A CN 201310284580 A CN201310284580 A CN 201310284580A CN 104135561 A CN104135561 A CN 104135561A
Authority
CN
China
Prior art keywords
terminal
software
flow
threshold value
predetermined threshold
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310284580.7A
Other languages
Chinese (zh)
Other versions
CN104135561B (en
Inventor
杨朗
贝小玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310284580.7A priority Critical patent/CN104135561B/en
Priority to PCT/CN2014/081780 priority patent/WO2015003601A1/en
Publication of CN104135561A publication Critical patent/CN104135561A/en
Application granted granted Critical
Publication of CN104135561B publication Critical patent/CN104135561B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/026Capturing of monitoring data using flow identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to the field of network technologies and provides a method and a device of reminding users of flow of a terminal as well as the terminal. The method comprises the following steps of: when a screen of the terminal is detected to be switched to the inactivated state, monitoring accumulated flow of each of software in the terminal, which is generated through networking in the inactivated state; judging whether the accumulated flow of any software exceeds a preset threshold; and when the accumulated flow of some software is judged to exceed the preset threshold, reminding users of flow anomaly of the terminal. According to the invention, through monitoring the condition of the flow of each of software in the terminal, which is generated through networking in the inactivated state of the screen of the terminal, once the flow data of some software is monitored to be excessive, the condition of the flow anomaly can be timely reported, so that malware is prevented from consuming the flow of the terminal under the unwitting condition of a user, the flow consumption of the terminal is effectively controlled, and the flow cost of the terminal is reduced.

Description

A kind of flow based reminding method, device and terminal of terminal
Technical field
The invention belongs to networking technology area, relate in particular to a kind of flow based reminding method, device and terminal of terminal.
Background technology
Along with the development of development of Mobile Internet technology, disparate networks application software continues to bring out, by software miscellaneous is installed in terminal, user can experience the interconnected life of colourful movement whenever and wherever possible, thereby enjoys for user's work, study, amusement and recreation have brought easily.
For the consideration of flow cost, existing mobile terminal can be monitored being arranged on all softwares in its system data traffic producing of networking, and (for example, every five minutes) show all flow situations that monitor in mobile terminal screen at regular intervals, reach to the object of user's prompting mobile terminal present flow rate Expenditure Levels.But, above-mentioned traffic monitoring is only carried out under the state of mobile terminal activating screen, and flow alerting pattern is only using the time as trigger point, and under the state that part Malware can be closed at mobile terminal screen locking or screen completely, stealthily consume a large amount of flows of mobile terminal, cause the traffic consumes of mobile terminal cannot be controlled, flow cost increases greatly.
Summary of the invention
The object of the embodiment of the present invention is to provide a kind of flow based reminding method of terminal, is intended to solve the problem that the flow alerting pattern of existing terminal easily causes the flow cost of terminal greatly to increase.
The embodiment of the present invention is achieved in that a kind of flow based reminding method of terminal, comprising:
In the time detecting that the screen of described terminal is switched to unactivated state, monitor respectively the integrated flow producing of networking of each software in described terminal under described unactivated state;
The described integrated flow that judges whether software has exceeded predetermined threshold value;
In the time judging the described integrated flow of software and exceeded described predetermined threshold value, the Traffic Anomaly of pointing out described terminal.
Another object of the embodiment of the present invention is to provide a kind of flow alarm set of terminal, comprising:
Monitoring unit, in the time detecting that the screen of described terminal is switched to unactivated state, monitors respectively the integrated flow producing of networking under described unactivated state of each software in described terminal;
Judging unit, has exceeded predetermined threshold value for the described integrated flow that judges whether software;
Tip element, in the time judging the described integrated flow of software and exceeded described predetermined threshold value, the Traffic Anomaly of pointing out described terminal.
Another object of the embodiment of the present invention is to provide a kind of terminal, comprises the flow alarm set of terminal as above.
In embodiments of the present invention, the flow situation of networking produced under terminal screen unactivated state by each software on monitor terminal, too much once the data on flows that monitors some software, can remind the situation of Traffic Anomaly in time, thereby prevent that Malware from consuming the flow of terminal in the unwitting situation of user, effectively control the traffic consumes of terminal, reduced the flow cost of terminal.
Brief description of the drawings
Fig. 1 is the realization flow figure of the flow based reminding method of the terminal that provides of the embodiment of the present invention;
Fig. 2 is the realization flow figure of the flow based reminding method of the terminal that provides of another embodiment of the present invention;
Fig. 3 is the specific implementation flow chart of the flow based reminding method S103 of the terminal that provides of the embodiment of the present invention;
Fig. 4 is the schematic diagram at the flow based reminding method prompting interface of the terminal that provides of the embodiment of the present invention;
Fig. 5 is the specific implementation flow chart of the flow based reminding method S103 of the terminal that provides of another embodiment of the present invention;
Fig. 6 is the structured flowchart of the flow alarm set of the terminal that provides of the embodiment of the present invention;
Fig. 7 is the block diagram of the part-structure of the mobile phone that the terminal that provides to the embodiment of the present invention is relevant.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
In embodiments of the present invention, the flow situation of networking produced under terminal screen unactivated state by each software on monitor terminal, too much once the data on flows that monitors some software, can remind the situation of Traffic Anomaly in time, thereby prevent that Malware from consuming the flow of terminal in the unwitting situation of user, effectively control the traffic consumes of terminal, reduced the flow cost of terminal.
Fig. 1 shows the realization flow of the flow based reminding method of the terminal that the embodiment of the present invention provides, and details are as follows:
In S101, in the time detecting that the screen of described terminal is switched to unactivated state, monitor respectively the integrated flow producing of networking of each software in described terminal under described unactivated state.
As one embodiment of the present of invention, the unactivated state of the screen of terminal comprises screen closed condition.The screen of closing a terminal by physical button or virtual key when user side, or it is overtime (for example to work as terminal operation, the time that terminal does not trigger any operation has exceeded a certain predetermined threshold value) and automatically close screen, the screen of terminal can be switched to screen closed condition.Particularly, can whether determine in "on" position whether it is switched to screen closed condition by the screen of sense terminals.
As another embodiment of the present invention, the unactivated state of the screen of terminal comprises lock state of screen.Taking mobile terminal as example, in some cases, when mobile terminal is closed after screen, or after user side triggers screen locking instruction by physical button or virtual key, the screen of mobile terminal can carry out lock state of screen, under this state, even if lighted the screen of mobile terminal, before not carrying out unlocking screen operation, the screen of mobile terminal is still in the lock state, for the misoperation that prevents that user side from producing mobile terminal.Under this lock state of screen, cannot carry out any operation except unlocking operation to mobile terminal.
And in the present embodiment, the screen that state of activation of the screen of terminal refers to terminal in light and non-screen locking under state.In the present embodiment, in the time detecting that the screen of terminal is switched to unactivated state by state of activation, the flow that networking produces in the time that the screen of terminal is under unactivated state of the each software in terminal is added up.
Wherein, the software in terminal includes but not limited to be arranged on application software and the systems soft ware in terminal, has also comprised the application software of downloading or be stored in the pre-installation in terminal simultaneously.As long as because some Malwares are downloaded or are stored in terminal, without carrying out, the generation flow of just can networking is installed, therefore, this part software is also monitored, can farthest stop the phenomenon of Malware consumption terminal flow.
Particularly, by setting up application programming interfaces (Application Program Interface with each software, API), can get in real time each software the network uplink traffic and the downlink traffic that produce, and the screen of self terminal is switched to unactivated state and starts, respectively to the each software flow that produces accumulative total of starting from scratch of networking, thereby monitor in real time the network integrated flow of generation of each software under the unactivated state of the screen of terminal.
It should be noted that, in the time that the screen of terminal is switched to state of activation by unactivated state, the integrated flow zero clearing that each software statistics is gone out, and in the time that the screen of terminal is switched to unactivated state again, starts the each software of the accumulative total flow producing of networking by zero again.
In S102, judge whether that the described integrated flow of software has exceeded predetermined threshold value.
In the present embodiment, predetermined threshold value can be for system intialization, also can be carried out by the user of terminal self-definedly according to the current software environment of terminal, meanwhile, can also after back-end data statistics, be issued to terminal by server.
In the situation that predetermined threshold value is issued to terminal by server after back-end data statistics, this server can be determined by collecting the software data of each terminal to report the size of predetermined threshold value, for example, by collecting the described integrated flow of software of each terminal to report, calculate an integrated flow average, and this integrated flow average is set to predetermined threshold value.Concrete predetermined threshold value determines that method is not used in restriction the present invention at this.
As one embodiment of the present of invention, when predetermined threshold value is that while being issued to terminal by server after back-end data statistics,, before S101, as shown in Figure 2, described method also comprises:
S104, regularly synchronous up-to-date described predetermined threshold value from server.
The predetermined threshold value of determining due to server is to adjust according to the mass data of each terminal to report in real time, therefore, the predetermined threshold value that server is determined is also changing aperiodically, need synchronous up-to-date predetermined threshold value from server termly, to ensure accuracy and the reasonability of predetermined threshold value.
In the present embodiment, can initiate request to server every Preset Time, whether inquiry server has upgraded predetermined threshold value, if, predetermined threshold value after the renewal that reception server issues, and original predetermined threshold value of storing in terminal is replaced with to the predetermined threshold value after this renewal.Meanwhile, also can after predetermined threshold value being upgraded, initiatively issue the predetermined threshold value after renewal to terminal by server at every turn, thus, as long as terminal, under networking state, can ensure that predetermined threshold value obtains real-time update.
In S103, in the time judging the described integrated flow of software and exceeded described predetermined threshold value, the Traffic Anomaly of pointing out described terminal.
In the time judging the integrated flow of software and exceeded predetermined threshold value, the risk that shows now to exist Malware and consume terminal flow, the prompting of sending terminal Traffic Anomaly.
As one embodiment of the present of invention, in the time judging the described integrated flow of software and exceeded described predetermined threshold value, the specific implementation flow process of S103 can be as shown in Figure 3:
In S301, show the notice of the Traffic Anomaly of described terminal at informing.
Be in screen closed condition if the screen of terminal is current, light screen, and in the informing (taking mobile terminal as example, informing is usually located at the top at mobile terminal screen interface) notice of display terminal Traffic Anomaly.In lighting but the state locking if the screen of terminal is current, also can be directly in the screen interface of locking eject notification hurdle, the notice of display terminal Traffic Anomaly.
In S302, in the time the click event that occurs in described informing being detected, show that described integrated flow has exceeded title and the described integrated flow thereof of the software of described predetermined threshold value.
Due in terminal, user can check detailed content of announcement further by clicking informing, therefore, and in the time the click event that occurs in informing being detected, can be as shown in Figure 4, show that integrated flow has exceeded title and the corresponding integrated flow thereof of the software of predetermined threshold value.It should be noted that, if but informing is to eject in lighting under the state locking at the screen of terminal, needs first to detect to after the unlock command of terminal screen, and the click event that occurs in informing just can come into force.
Thus, title and the integrated flow thereof of the software of predetermined threshold value have been exceeded by the integrated flow demonstrating, it is used up in the situation that user predicts that user can judge the wherein flow of which software consumes, and the flow of which software consumes is not permit through user.For example, user had opened the download function of browser before closing screen, just at download file, user can to judge browser used up this part flow under the closed condition of screen be that user has obtained user license; And for do not permit user or unknown situation under consume the software of the flow that is greater than predetermined threshold value, user can judge that this software is Malware.
Further, as shown in Figure 5, after S302, also comprise:
In S303, show that described integrated flow has exceeded the option of operation corresponding to software of described predetermined threshold value, described option of operation comprises forbids networking or unloading.
In S304, detect the selection instruction to described option of operation, networking or unloading operation are forbidden in the software execution that described integrated flow has been exceeded to described predetermined threshold value.
; by in showing that integrated flow has exceeded the title and integrated flow thereof of software of predetermined threshold value; show the option of operation that these softwares are corresponding; user can be by selecting these option of operation; the Malware that it is judged is forbidden networking operation or unloading operation; thereby stop the traffic consumes behavior of these Malwares, reach the object of control terminal flow.
In embodiments of the present invention, the flow situation of networking produced under terminal screen unactivated state by each software on monitor terminal, too much once the data on flows that monitors some software, can remind the situation of Traffic Anomaly in time, thereby prevent that Malware from consuming the flow of terminal in the unwitting situation of user, effectively control the traffic consumes of terminal, reduced the flow cost of terminal.
In embodiments of the present invention, by the setting of predetermined threshold value, can effectively distinguish Malware and normal software, under the unactivated state of terminal screen, really need to consume the software of certain flow for some, for example MSN, microbloggings etc. need to regularly obtain the software of message, because its flow that need to consume is little, by predetermined threshold value is set, can well this class software and Malware be made a distinction, thereby filtering traffic reminder message effectively, ensure on the one hand the validity of flow reminder message, on the one hand for mobile terminal, also avoided because prompting message frequency is too high, the situation of accelerating mobile terminal electric quantity consumption occurs.
Fig. 6 shows the structured flowchart of the flow alarm set of the terminal that the embodiment of the present invention provides, this device can be arranged in the terminals such as mobile phone, panel computer, computer, notebook computer, for moving the flow based reminding method of the terminal described in Fig. 1 to Fig. 5 embodiment of the present invention.For convenience of explanation, only show the part relevant to the present embodiment.
With reference to Fig. 6, in this device, comprising:
Monitoring unit 61, in the time detecting that the screen of described terminal is switched to unactivated state, monitors respectively the integrated flow producing of networking under described unactivated state of each software in described terminal.
Judging unit 62, judges whether that the described integrated flow of software has exceeded predetermined threshold value.
Tip element 63, in the time judging the described integrated flow of software and exceeded described predetermined threshold value, the Traffic Anomaly of pointing out described terminal.
Alternatively, described unactivated state comprises screen closed condition or lock state of screen.
Alternatively, described Tip element 63 comprises:
First shows subelement, shows the notice of the Traffic Anomaly of described terminal at informing.
Second shows subelement, in the time the click event that occurs in described informing being detected, shows that described integrated flow has exceeded title and the described integrated flow thereof of the software of described predetermined threshold value.
Alternatively, described Tip element 63 also comprises:
The 3rd shows subelement, shows that described integrated flow has exceeded the option of operation corresponding to software of described predetermined threshold value, and described option of operation comprises forbids networking or unloading.
Operating unit, detects the selection instruction to described option of operation, and networking or unloading operation are forbidden in the software execution that described integrated flow has been exceeded to described predetermined threshold value.
Alternatively, described device also comprises:
Lock unit, regularly synchronous up-to-date described predetermined threshold value from server.
Shown in Fig. 7 is the block diagram of the part-structure of the mobile phone that the terminal that provides to the embodiment of the present invention is relevant.With reference to figure 7, mobile phone comprises: radio frequency (Radio Frequency, RF) parts such as circuit 710, memory 720, input unit 730, display unit 740, transducer 750, voicefrequency circuit 760, Wireless Fidelity (wireless fidelity, WiFi) module 770, processor 780 and power supply 790.It will be understood by those skilled in the art that the handset structure shown in Fig. 7 does not form the restriction to mobile phone, can comprise the parts more more or less than diagram, or combine some parts, or different parts are arranged.
Below in conjunction with Fig. 7, each component parts of mobile phone is carried out to concrete introduction:
RF circuit 710 can be used for receiving and sending messages or communication process in, the reception of signal and transmission, especially, after the downlink information of base station is received, process to processor 780; In addition, the up data of design are sent to base station.Conventionally, RF circuit includes but not limited to antenna, at least one amplifier, transceiver, coupler, low noise amplifier (Low Noise Amplifier, LNA), duplexer etc.In addition, RF circuit 710 can also be by radio communication and network and other devices communicatings.Above-mentioned radio communication can be used arbitrary communication standard or agreement, include but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code division multiple access (Code Division Multiple Access, CDMA), Wideband Code Division Multiple Access (WCDMA) (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE)), Email, Short Message Service (Short Messaging Service, SMS) etc.
Memory 720 can be used for storing software program and module, and processor 780 is stored in software program and the module of memory 720 by operation, thereby carries out various function application and the data processing of mobile phone.Memory 720 can mainly comprise storage program district and storage data field, wherein, and the application program (such as sound-playing function, image player function etc.) that storage program district can storage operation system, at least one function is required etc.; The data (such as voice data, phone directory etc.) that create according to the use of mobile phone etc. can be stored in storage data field.In addition, memory 720 can comprise high-speed random access memory, can also comprise nonvolatile memory, for example at least one disk memory, flush memory device or other volatile solid-state parts.
Input unit 730 can be used for receiving numeral or the character information of input, and generation is inputted with the key signals that user arranges and function control is relevant of mobile phone 700.Particularly, input unit 730 can comprise contact panel 731 and other input equipments 732.Contact panel 731, also referred to as touch-screen, can collect user or near touch operation (using any applicable object or near the operations of annex on contact panel 731 or contact panel 731 such as finger, stylus such as user) thereon, and drive corresponding jockey according to predefined formula.Optionally, contact panel 731 can comprise touch detecting apparatus and two parts of touch controller.Wherein, touch detecting apparatus detects user's touch orientation, and detects the signal that touch operation brings, and sends signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives processor 780, and the order that energy receiving processor 780 is sent is also carried out.In addition, can adopt the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave to realize contact panel 731.Except contact panel 731, input unit 730 can also comprise other input equipments 732.Particularly, other input equipments 732 can include but not limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
Display unit 740 can be used for showing the information inputted by user or the various menus of the information that offers user and mobile phone.Display unit 740 can comprise display floater 741, optionally, can adopt the form such as liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) to configure display floater 741.Further, contact panel 731 can cover display floater 741, when contact panel 731 detect thereon or near touch operation after, send processor 780 to determine the type of touch event, corresponding vision output is provided according to the type of touch event with preprocessor 780 on display floater 741.Although in Fig. 7, contact panel 731 and display floater 741 be as two independently parts realize input and the input function of mobile phone, but in certain embodiments, can be by integrated to contact panel 731 and display floater 741 and realize the input and output function of mobile phone.
Mobile phone 700 also can comprise at least one transducer 750, such as optical sensor, motion sensor and other transducers.Particularly, optical sensor can comprise ambient light sensor and proximity transducer, and wherein, ambient light sensor can regulate according to the light and shade of ambient light the brightness of display floater 741, proximity transducer can, in the time that mobile phone moves in one's ear, cut out display floater 741 and/or backlight.As the one of motion sensor; accelerometer sensor can detect the size of the acceleration that (is generally three axles) in all directions; when static, can detect size and the direction of gravity, can be used for identifying application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, knock) of mobile phone attitude etc.; As for also other transducers such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor of mobile phone, do not repeat them here.
Voicefrequency circuit 760, loud speaker 761, microphone 762 can provide the audio interface between user and mobile phone.Voicefrequency circuit 760 can, by the signal of telecommunication after the voice data conversion receiving, be transferred to loud speaker 761, is converted to voice signal output by loud speaker 761; On the other hand, the voice signal of collection is converted to the signal of telecommunication by microphone 762, after being received by voicefrequency circuit 760, be converted to voice data, after again voice data output processor 780 being processed, through RF circuit 710 to send to such as another mobile phone, or export voice data to memory 720 so as further process.
WiFi belongs to short range wireless transmission technology, mobile phone by WiFi module 770 can help that user sends and receive e-mail, browsing page and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 7 shows WiFi module 770, be understandable that, it does not belong to must forming of mobile phone 700, completely can be as required in the essential scope that does not change invention and omit.
Processor 780 is control centres of mobile phone, utilize the various piece of various interface and the whole mobile phone of connection, by moving or carry out the software program and/or the module that are stored in memory 720, and call the data that are stored in memory 720, carry out various functions and the deal with data of mobile phone, thereby mobile phone is carried out to integral monitoring.Optionally, processor 780 can comprise one or more processing units; Preferably, processor 780 can integrated application processor and modem processor, and wherein, application processor is mainly processed operating system, user interface and application program etc., and modem processor is mainly processed radio communication.Be understandable that, above-mentioned modem processor also can not be integrated in processor 780.
Mobile phone 700 also comprises that the power supply 790(powering to all parts is such as battery), preferably, power supply can be connected with processor 780 logics by power-supply management system, thereby realizes the functions such as management charging, electric discharge and power managed by power-supply management system.
Although not shown, mobile phone 700 can also comprise camera, bluetooth module etc., does not repeat them here.
In embodiments of the present invention, the included processor 780 of this terminal also has following functions: carry out the flow based reminding method of terminal, comprising:
In the time detecting that the screen of described terminal is switched to unactivated state, monitor respectively the integrated flow producing of networking of each software in described terminal under described unactivated state;
The described integrated flow that judges whether software has exceeded predetermined threshold value;
In the time judging the described integrated flow of software and exceeded described predetermined threshold value, the Traffic Anomaly of pointing out described terminal.
Further, described unactivated state comprises screen closed condition or lock state of screen.
Further, the Traffic Anomaly of the described terminal of described prompting comprises:
Show the notice of the Traffic Anomaly of described terminal at informing;
In the time the click event that occurs in described informing being detected, show that described integrated flow has exceeded title and the described integrated flow thereof of the software of described predetermined threshold value.
Further, the Traffic Anomaly of the described terminal of described prompting also comprises:
Show that described integrated flow has exceeded the option of operation corresponding to software of described predetermined threshold value, described option of operation comprises forbids networking or unloading;
Detect the selection instruction to described option of operation, networking or unloading operation are forbidden in the software execution that described integrated flow has been exceeded to described predetermined threshold value.
Further, before the described screen that described terminal detected is switched to unactivated state, described method also comprises:
Regularly synchronous up-to-date described predetermined threshold value from server.
In embodiments of the present invention, the flow situation of networking produced under terminal screen unactivated state by each software on monitor terminal, too much once the data on flows that monitors some software, can remind the situation of Traffic Anomaly in time, thereby prevent that Malware from consuming the flow of terminal in the unwitting situation of user, effectively control the traffic consumes of terminal, reduced the flow cost of terminal.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments of doing within the spirit and principles in the present invention, be equal to and replace and improvement etc., within all should being included in protection scope of the present invention.

Claims (11)

1. a flow based reminding method for terminal, is characterized in that, comprising:
In the time detecting that the screen of described terminal is switched to unactivated state, monitor respectively the integrated flow producing of networking of each software in described terminal under the described unactivated state of the screen of described terminal;
The described integrated flow that judges whether software has exceeded predetermined threshold value;
In the time judging the described integrated flow of software and exceeded described predetermined threshold value, the Traffic Anomaly of pointing out described terminal.
2. the method for claim 1, is characterized in that, described unactivated state comprises screen closed condition or lock state of screen.
3. the method for claim 1, is characterized in that, the Traffic Anomaly of the described terminal of described prompting comprises:
Show the notice of the Traffic Anomaly of described terminal at informing;
In the time the click event that occurs in described informing being detected, show that described integrated flow has exceeded title and the described integrated flow thereof of the software of described predetermined threshold value.
4. method as claimed in claim 3, is characterized in that, the Traffic Anomaly of the described terminal of described prompting also comprises:
Show that described integrated flow has exceeded the option of operation corresponding to software of described predetermined threshold value, described option of operation comprises forbids networking or unloading;
Detect the selection instruction to described option of operation, networking or unloading operation are forbidden in the software execution that described integrated flow has been exceeded to described predetermined threshold value.
5. the method as described in claim 1~4 any one, is characterized in that, before the described screen that described terminal detected is switched to unactivated state, described method also comprises:
Regularly synchronous up-to-date described predetermined threshold value from server.
6. a flow alarm set for terminal, is characterized in that, comprising:
Monitoring unit, in the time detecting that the screen of described terminal is switched to unactivated state, monitors respectively the integrated flow producing of networking under described unactivated state of each software in described terminal;
Judging unit, has exceeded predetermined threshold value for the described integrated flow that judges whether software;
Tip element, in the time judging the described integrated flow of software and exceeded described predetermined threshold value, the Traffic Anomaly of pointing out described terminal.
7. device as claimed in claim 6, is characterized in that, described unactivated state comprises screen closed condition or lock state of screen.
8. device as claimed in claim 6, is characterized in that, described Tip element comprises:
First shows subelement, for show the notice of the Traffic Anomaly of described terminal at informing;
Second shows subelement, in the time the click event that occurs in described informing being detected, shows that described integrated flow has exceeded title and the described integrated flow thereof of the software of described predetermined threshold value.
9. device as claimed in claim 8, is characterized in that, described Tip element also comprises:
The 3rd shows subelement, and for showing that described integrated flow has exceeded the option of operation corresponding to software of described predetermined threshold value, described option of operation comprises forbids networking or unloading;
Operating unit, for detection of the selection instruction to described option of operation, networking or unloading operation are forbidden in the software execution that described integrated flow has been exceeded to described predetermined threshold value.
10. the device as described in claim 6~9 any one, is characterized in that, described device also comprises:
Lock unit, for regular synchronous up-to-date described predetermined threshold value from server.
11. 1 kinds of terminals, is characterized in that, comprise the flow alarm set of the terminal as described in claim 6~10 any one.
CN201310284580.7A 2013-07-08 2013-07-08 A kind of flow based reminding method of terminal, device and terminal Active CN104135561B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310284580.7A CN104135561B (en) 2013-07-08 2013-07-08 A kind of flow based reminding method of terminal, device and terminal
PCT/CN2014/081780 WO2015003601A1 (en) 2013-07-08 2014-07-08 Data traffic notification method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310284580.7A CN104135561B (en) 2013-07-08 2013-07-08 A kind of flow based reminding method of terminal, device and terminal

Publications (2)

Publication Number Publication Date
CN104135561A true CN104135561A (en) 2014-11-05
CN104135561B CN104135561B (en) 2016-03-16

Family

ID=51808081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310284580.7A Active CN104135561B (en) 2013-07-08 2013-07-08 A kind of flow based reminding method of terminal, device and terminal

Country Status (2)

Country Link
CN (1) CN104135561B (en)
WO (1) WO2015003601A1 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104572177A (en) * 2014-12-19 2015-04-29 龙凤娇 Mobile traffic management method and mobile traffic management device
CN105281965A (en) * 2014-06-12 2016-01-27 腾讯科技(深圳)有限公司 Traffic acquisition method and traffic acquisition device based on IOS
CN105302693A (en) * 2015-10-28 2016-02-03 上海斐讯数据通信技术有限公司 Time management method and system and electronic device
CN105573896A (en) * 2015-12-21 2016-05-11 魅族科技(中国)有限公司 Running reminding method and device for application program
CN105607979A (en) * 2015-12-18 2016-05-25 小米科技有限责任公司 Network interconnection control method and device
CN105873028A (en) * 2016-03-28 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Terminal control method, terminal control device, and terminal
CN105933545A (en) * 2016-06-30 2016-09-07 秦晓飞 Real-time traffic and call cost reminding apparatus and method
CN105992169A (en) * 2015-02-04 2016-10-05 中国移动通信集团云南有限公司 Data prompting method, apparatus and system
CN106060899A (en) * 2016-05-20 2016-10-26 廖建强 Flow control method and device
CN106095547A (en) * 2016-06-03 2016-11-09 北京小米移动软件有限公司 Application program networking control method and device
WO2016206179A1 (en) * 2015-06-25 2016-12-29 中兴通讯股份有限公司 Volte call data usage indication method and device
CN106331369A (en) * 2016-09-14 2017-01-11 广东欧珀移动通信有限公司 Information synchronization method and terminal
CN106412915A (en) * 2016-10-31 2017-02-15 宇龙计算机通信科技(深圳)有限公司 Pseudo-wireless access point identification method and system
CN107634940A (en) * 2017-08-30 2018-01-26 努比亚技术有限公司 Control method, terminal, server and the readable storage medium storing program for executing that a kind of flow uses
WO2018023376A1 (en) * 2016-08-02 2018-02-08 张阳 Usage statistical method for data usage monitoring technology and mobile phone
WO2018023377A1 (en) * 2016-08-02 2018-02-08 张阳 Method for indicating interest attribute of traffic monitoring technology and mobile phone
CN108075944A (en) * 2016-11-16 2018-05-25 腾讯科技(深圳)有限公司 A kind of method for monitoring network and device
CN108243271A (en) * 2016-12-23 2018-07-03 北京安云世纪科技有限公司 A kind of method, apparatus for carrying out flow control and mobile equipment
CN108307337A (en) * 2017-08-22 2018-07-20 深圳市爱培科技术股份有限公司 Flux monitoring method, system and the storage device of vehicle mounted guidance terminal
CN108616653A (en) * 2018-03-30 2018-10-02 广东欧珀移动通信有限公司 Information processing method, device, mobile terminal and computer readable storage medium
CN109286505A (en) * 2017-07-20 2019-01-29 中国移动通信集团陕西有限公司 A kind of method and apparatus that flow is reminded
CN109660430A (en) * 2018-12-27 2019-04-19 努比亚技术有限公司 A kind of flux monitoring method, terminal and computer readable storage medium
CN109726552A (en) * 2018-12-29 2019-05-07 联想(北京)有限公司 A kind of control method, device and electronic equipment
CN109743755A (en) * 2018-12-19 2019-05-10 Oppo广东移动通信有限公司 Link aggregation right management method and Related product
CN109936829A (en) * 2017-12-19 2019-06-25 中国电信股份有限公司 Improve method, system and the charge system of suspension precision
CN110636077A (en) * 2019-10-12 2019-12-31 广元市公安局 Network security protection system and method based on unified platform
CN112152971A (en) * 2019-06-28 2020-12-29 北京奇虎科技有限公司 Method and apparatus for controlling network usage behavior, electronic device, and medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2015391763A1 (en) * 2015-04-14 2017-11-09 Huawei Technologies Co., Ltd. Terminal control method and apparatus, and terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841605A (en) * 2010-03-23 2010-09-22 中兴通讯股份有限公司 Method and device for alarming flow when mobile phone downloads and flow alarming mobile phone
CN102006576A (en) * 2010-12-08 2011-04-06 东莞宇龙通信科技有限公司 Method and system for displaying surfing flow and mobile terminal
CN102612084A (en) * 2012-02-24 2012-07-25 中兴通讯股份有限公司 Method and device for controlling data traffic
CN102711098A (en) * 2012-04-28 2012-10-03 广东欧珀移动通信有限公司 Method for preventing background flow of application program from being lost
CN102981878A (en) * 2012-11-28 2013-03-20 广东欧珀移动通信有限公司 Method for automatically closing background programs and mobile terminal of automatically closing background programs

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183950A (en) * 2006-11-14 2008-05-21 乐金电子(中国)研究开发中心有限公司 Communication flux accounting display system, terminal and method
CN101854649A (en) * 2010-05-20 2010-10-06 中兴通讯股份有限公司 Mobile terminal and method and device for monitoring Internet surfing data traffic of mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841605A (en) * 2010-03-23 2010-09-22 中兴通讯股份有限公司 Method and device for alarming flow when mobile phone downloads and flow alarming mobile phone
CN102006576A (en) * 2010-12-08 2011-04-06 东莞宇龙通信科技有限公司 Method and system for displaying surfing flow and mobile terminal
CN102612084A (en) * 2012-02-24 2012-07-25 中兴通讯股份有限公司 Method and device for controlling data traffic
CN102711098A (en) * 2012-04-28 2012-10-03 广东欧珀移动通信有限公司 Method for preventing background flow of application program from being lost
CN102981878A (en) * 2012-11-28 2013-03-20 广东欧珀移动通信有限公司 Method for automatically closing background programs and mobile terminal of automatically closing background programs

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105281965A (en) * 2014-06-12 2016-01-27 腾讯科技(深圳)有限公司 Traffic acquisition method and traffic acquisition device based on IOS
CN105281965B (en) * 2014-06-12 2020-02-07 腾讯科技(深圳)有限公司 Traffic acquisition method and device based on IOS (input/output system)
CN104572177A (en) * 2014-12-19 2015-04-29 龙凤娇 Mobile traffic management method and mobile traffic management device
CN105992169B (en) * 2015-02-04 2019-09-27 中国移动通信集团云南有限公司 A kind of flow based reminding method, apparatus and system
CN105992169A (en) * 2015-02-04 2016-10-05 中国移动通信集团云南有限公司 Data prompting method, apparatus and system
CN106332121A (en) * 2015-06-25 2017-01-11 中兴通讯股份有限公司 VoLTE call traffic prompting method and device
WO2016206179A1 (en) * 2015-06-25 2016-12-29 中兴通讯股份有限公司 Volte call data usage indication method and device
CN105302693A (en) * 2015-10-28 2016-02-03 上海斐讯数据通信技术有限公司 Time management method and system and electronic device
CN105607979A (en) * 2015-12-18 2016-05-25 小米科技有限责任公司 Network interconnection control method and device
CN105607979B (en) * 2015-12-18 2018-05-08 小米科技有限责任公司 Networking control method and device
CN105573896A (en) * 2015-12-21 2016-05-11 魅族科技(中国)有限公司 Running reminding method and device for application program
CN105873028B (en) * 2016-03-28 2020-05-19 宇龙计算机通信科技(深圳)有限公司 Terminal control method, terminal control device and terminal
CN105873028A (en) * 2016-03-28 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Terminal control method, terminal control device, and terminal
CN106060899A (en) * 2016-05-20 2016-10-26 廖建强 Flow control method and device
CN106095547A (en) * 2016-06-03 2016-11-09 北京小米移动软件有限公司 Application program networking control method and device
CN105933545A (en) * 2016-06-30 2016-09-07 秦晓飞 Real-time traffic and call cost reminding apparatus and method
WO2018023377A1 (en) * 2016-08-02 2018-02-08 张阳 Method for indicating interest attribute of traffic monitoring technology and mobile phone
WO2018023376A1 (en) * 2016-08-02 2018-02-08 张阳 Usage statistical method for data usage monitoring technology and mobile phone
CN106331369A (en) * 2016-09-14 2017-01-11 广东欧珀移动通信有限公司 Information synchronization method and terminal
CN106412915A (en) * 2016-10-31 2017-02-15 宇龙计算机通信科技(深圳)有限公司 Pseudo-wireless access point identification method and system
CN108075944A (en) * 2016-11-16 2018-05-25 腾讯科技(深圳)有限公司 A kind of method for monitoring network and device
CN108075944B (en) * 2016-11-16 2021-01-15 腾讯科技(深圳)有限公司 Network monitoring method and device
CN108243271A (en) * 2016-12-23 2018-07-03 北京安云世纪科技有限公司 A kind of method, apparatus for carrying out flow control and mobile equipment
CN109286505A (en) * 2017-07-20 2019-01-29 中国移动通信集团陕西有限公司 A kind of method and apparatus that flow is reminded
CN108307337A (en) * 2017-08-22 2018-07-20 深圳市爱培科技术股份有限公司 Flux monitoring method, system and the storage device of vehicle mounted guidance terminal
CN107634940A (en) * 2017-08-30 2018-01-26 努比亚技术有限公司 Control method, terminal, server and the readable storage medium storing program for executing that a kind of flow uses
CN109936829A (en) * 2017-12-19 2019-06-25 中国电信股份有限公司 Improve method, system and the charge system of suspension precision
CN108616653B (en) * 2018-03-30 2020-01-17 Oppo广东移动通信有限公司 Information processing method, device, mobile terminal and computer readable storage medium
CN108616653A (en) * 2018-03-30 2018-10-02 广东欧珀移动通信有限公司 Information processing method, device, mobile terminal and computer readable storage medium
CN109743755A (en) * 2018-12-19 2019-05-10 Oppo广东移动通信有限公司 Link aggregation right management method and Related product
CN109660430A (en) * 2018-12-27 2019-04-19 努比亚技术有限公司 A kind of flux monitoring method, terminal and computer readable storage medium
CN109726552A (en) * 2018-12-29 2019-05-07 联想(北京)有限公司 A kind of control method, device and electronic equipment
CN109726552B (en) * 2018-12-29 2021-09-14 联想(北京)有限公司 Control method and device and electronic equipment
CN112152971A (en) * 2019-06-28 2020-12-29 北京奇虎科技有限公司 Method and apparatus for controlling network usage behavior, electronic device, and medium
CN110636077A (en) * 2019-10-12 2019-12-31 广元市公安局 Network security protection system and method based on unified platform

Also Published As

Publication number Publication date
CN104135561B (en) 2016-03-16
WO2015003601A1 (en) 2015-01-15

Similar Documents

Publication Publication Date Title
CN104135561B (en) A kind of flow based reminding method of terminal, device and terminal
CN104135500B (en) The method and system that prompting application upgrades
CN103500002B (en) The method of application program management, device and terminal unit
CN104383681B (en) Method for controlling game program, device and mobile terminal
CN104142862A (en) Overload protection method and device for server
CN102833419B (en) Method and terminal for controlling screen state
CN103442330A (en) Position notification method and device
CN105188037A (en) Message push method, mobile terminal, and message push server
CN103677899A (en) Method and device for installing application programs
CN105119806A (en) Message updating method and device
CN103686963A (en) Method, device, equipment and system for controlling wireless network to be switched on/off
CN103473092A (en) Method and device for processing downloaded applications and terminal equipment
CN104717341A (en) Message prompting method and terminal
CN104301504A (en) Message viewing method and device and mobile terminal
CN103368828B (en) A kind of message temporary storage and system
CN104657666A (en) Method and device for optimizing terminal operation environment
CN104301315A (en) Method and device for limiting information access
CN104093123A (en) Application program information pushing method, device and system and mobile terminal
CN103177217B (en) A kind of file scanning method, system and client and server
CN104133757A (en) Method for obtaining memory information and terminal
CN105307242A (en) Wi-Fi network application method and terminal
CN103634311A (en) Safety protection method and device, and terminal
CN106155788A (en) A kind of application program freezing method and terminal unit
CN103677633A (en) Screen unlocking method and device and terminal
CN103546632B (en) A kind of quarter-bell ringing method for mobile terminal, device and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant