CN104135561B - A kind of flow based reminding method of terminal, device and terminal - Google Patents

A kind of flow based reminding method of terminal, device and terminal Download PDF

Info

Publication number
CN104135561B
CN104135561B CN201310284580.7A CN201310284580A CN104135561B CN 104135561 B CN104135561 B CN 104135561B CN 201310284580 A CN201310284580 A CN 201310284580A CN 104135561 B CN104135561 B CN 104135561B
Authority
CN
China
Prior art keywords
described
terminal
software
threshold value
predetermined threshold
Prior art date
Application number
CN201310284580.7A
Other languages
Chinese (zh)
Other versions
CN104135561A (en
Inventor
杨朗
贝小玲
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Priority to CN201310284580.7A priority Critical patent/CN104135561B/en
Publication of CN104135561A publication Critical patent/CN104135561A/en
Application granted granted Critical
Publication of CN104135561B publication Critical patent/CN104135561B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/02Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
    • H04L43/026Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/16Arrangements for monitoring or testing packet switching networks using threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/12Fraud detection or prevention
    • H04W12/1208Anti-malware arrangements, e.g. protecting against SMS fraud or mobile malware

Abstract

The present invention is applicable to networking technology area, provide a kind of flow based reminding method of terminal, device and terminal, comprise: when detecting that the screen of described terminal is switched to unactivated state, monitor respectively each software in described terminal network under described unactivated state produce integrated flow; Judge whether that the described integrated flow of software has exceeded predetermined threshold value; When judging that the described integrated flow of software has exceeded described predetermined threshold value, point out the Traffic Anomaly of described terminal.In the present invention, to be networked under terminal screen unactivated state produced traffic conditions by each software on monitor terminal, too much once the data on flows monitoring some software, can remind the situation of Traffic Anomaly in time, thus prevent Malware from the unwitting situation of user, consuming the flow of terminal, effectively control the traffic consumes of terminal, reduce the flow cost of terminal.

Description

A kind of flow based reminding method of terminal, device and terminal

Technical field

The invention belongs to networking technology area, particularly relate to a kind of flow based reminding method of terminal, device and terminal.

Background technology

Along with the development of development of Mobile Internet technology, disparate networks application software continues to bring out, by installing software miscellaneous in terminal, user can experience the life of colourful mobile interchange whenever and wherever possible, thus brings and enjoy easily for the work of user, study, amusement and recreation.

For the consideration of flow cost, the existing mobile terminal data traffic produced of networking to all softwares be arranged in its system is monitored, and (such as every five minutes) shows all traffic conditions monitored in mobile terminal screen at regular intervals, reach the object to user's prompting mobile terminal present flow rate Expenditure Levels.But, above-mentioned traffic monitoring is only carried out under the state of mobile terminal activating screen, and flow alerting pattern is only using the time as trigger point, and under the state that part Malware can be closed in mobile terminal screen locking or screen completely, stealthily consume a large amount of flows of mobile terminal, cause the traffic consumes of mobile terminal to be controlled, flow cost increases greatly.

Summary of the invention

The object of the embodiment of the present invention is the flow based reminding method providing a kind of terminal, the problem that the flow alerting pattern being intended to solve existing terminal easily causes the flow cost of terminal greatly to increase.

The embodiment of the present invention is achieved in that a kind of flow based reminding method of terminal, comprising:

When detecting that the screen of described terminal is switched to unactivated state, monitor respectively each software in described terminal network under described unactivated state produce integrated flow;

Judge whether that the described integrated flow of software has exceeded predetermined threshold value;

When judging that the described integrated flow of software has exceeded described predetermined threshold value, point out the Traffic Anomaly of described terminal.

Another object of the embodiment of the present invention is the flow alarm set providing a kind of terminal, comprising:

Monitoring unit, for when detecting that the screen of described terminal is switched to unactivated state, monitor respectively each software in described terminal network under described unactivated state produce integrated flow;

Judging unit, for judging whether that the described integrated flow of software has exceeded predetermined threshold value;

Tip element, for when judging that the described integrated flow of software has exceeded described predetermined threshold value, points out the Traffic Anomaly of described terminal.

Another object of the embodiment of the present invention is to provide a kind of terminal, comprises the flow alarm set of terminal as above.

In embodiments of the present invention, to be networked under terminal screen unactivated state produced traffic conditions by each software on monitor terminal, too much once the data on flows monitoring some software, can remind the situation of Traffic Anomaly in time, thus prevent Malware from the unwitting situation of user, consuming the flow of terminal, effectively control the traffic consumes of terminal, reduce the flow cost of terminal.

Accompanying drawing explanation

Fig. 1 is the realization flow figure of the flow based reminding method of the terminal that the embodiment of the present invention provides;

Fig. 2 is the realization flow figure of the flow based reminding method of the terminal that another embodiment of the present invention provides;

Fig. 3 is the specific implementation flow chart of the flow based reminding method S103 of the terminal that the embodiment of the present invention provides;

Fig. 4 is the schematic diagram at the flow based reminding method prompting interface of the terminal that the embodiment of the present invention provides;

Fig. 5 is the specific implementation flow chart of the flow based reminding method S103 of the terminal that another embodiment of the present invention provides;

Fig. 6 is the structured flowchart of the flow alarm set of the terminal that the embodiment of the present invention provides;

Fig. 7 is the block diagram of the part-structure of the mobile phone relevant to the terminal that the embodiment of the present invention provides.

Embodiment

In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.

In embodiments of the present invention, to be networked under terminal screen unactivated state produced traffic conditions by each software on monitor terminal, too much once the data on flows monitoring some software, can remind the situation of Traffic Anomaly in time, thus prevent Malware from the unwitting situation of user, consuming the flow of terminal, effectively control the traffic consumes of terminal, reduce the flow cost of terminal.

Fig. 1 shows the realization flow of the flow based reminding method of the terminal that the embodiment of the present invention provides, and details are as follows:

In S101, when detecting that the screen of described terminal is switched to unactivated state, monitor respectively each software in described terminal network under described unactivated state produce integrated flow.

As one embodiment of the present of invention, the unactivated state of the screen of terminal comprises screen closed condition.When the screen that user side is closed a terminal by physical button or virtual key, or work as terminal operation time-out (such as, the time that terminal does not trigger any operation has exceeded a certain predetermined threshold value) and automatically close screen, the screen of terminal can be switched to screen closed condition.Particularly, whether can be in "on" position by the screen of sense terminals and determine whether it is switched to screen closed condition.

As another embodiment of the present invention, the unactivated state of the screen of terminal comprises lock state of screen.For mobile terminal, in some cases, after mobile terminal closes screen, or after user side triggers screen locking instruction by physical button or virtual key, the screen of mobile terminal can carry out lock state of screen, in this condition, even if lighted the screen of mobile terminal, before not performing unlocking screen operation, the screen of mobile terminal is still in the lock state, for the misoperation preventing user side from producing mobile terminal.Under this lock state of screen, cannot to any operation of mobile terminal execution except unlocking operation.

And in the present embodiment, namely the state of activation of the screen of terminal refers to that the screen of terminal is in and lights and state under non-screen locking.In the present embodiment, when detecting that the screen of terminal is switched to unactivated state by state of activation, the flow produced of networking when the screen of terminal is under unactivated state of each software in terminal is added up.

Wherein, the software in terminal includes but not limited to install application software in the terminal and systems soft ware, further comprises the application software downloaded or store pre-installation in the terminal simultaneously.As long as because some Malwares are downloaded or are stored in terminal, without the need to performing, generation flow of just can networking being installed, therefore, this part software also being monitored, farthest can stop the phenomenon that Malware consumes terminal flow.

Particularly, by setting up application programming interfaces (ApplicationProgramInterface with each software, API), each software can be got in real time to network the uplink traffic and downlink traffic that produce, and the screen of self terminal is switched to unactivated state starts, start from scratch accumulative to each software flow produced of networking respectively, thus monitor each software in real time and to network under the unactivated state of the screen of terminal the integrated flow produced.

It should be noted that, when the screen of terminal is switched to state of activation by unactivated state, the integrated flow gone out each software statistics resets, and when the screen of terminal is switched to unactivated state again, then by zero, accumulative each software is networked the flow produced again.

In S102, judge whether that the described integrated flow of software has exceeded predetermined threshold value.

In the present embodiment, predetermined threshold value can be system intialization, also can be undertaken self-defined by the software environment that the user of terminal is current according to terminal, meanwhile, can also be issued to terminal by server after back-end data is added up.

When predetermined threshold value is issued to terminal by server after back-end data is added up, this server can determine the size of predetermined threshold value by the software data collecting each terminal to report, such as, by collecting the described integrated flow of the software of each terminal to report, calculate an integrated flow average, and this integrated flow average is set to predetermined threshold value.Concrete predetermined threshold value defining method is not used in restriction the present invention at this.

As one embodiment of the present of invention, when predetermined threshold value is issued to terminal by server after back-end data is added up, before S101, as shown in Figure 2, described method also comprises:

S104, regularly synchronously up-to-date from server described predetermined threshold value.

The predetermined threshold value determined due to server to carry out adjusting according to the mass data of each terminal to report in real time, therefore, the predetermined threshold value that server is determined also is changing aperiodically, need predetermined threshold value synchronously up-to-date from server termly, to ensure accuracy and the reasonability of predetermined threshold value.

In the present embodiment, can initiate request every Preset Time to server, whether inquiry server have updated predetermined threshold value, if, predetermined threshold value then after the renewal that issues of reception server, and the original predetermined threshold value stored in terminal is replaced with the predetermined threshold value after this renewal.Meanwhile, also can by server each predetermined threshold value upgraded after initiatively issue renewal to terminal after predetermined threshold value, thus, as long as under terminal is in networking state, namely can ensure that predetermined threshold value obtains real-time update.

In S103, when judging that the described integrated flow of software has exceeded described predetermined threshold value, point out the Traffic Anomaly of described terminal.

When judging that the integrated flow of software has exceeded predetermined threshold value, showing now there is the risk that Malware consumes terminal flow, then sending the prompting of terminal Traffic Anomaly.

As one embodiment of the present of invention, when judging that the described integrated flow of software has exceeded described predetermined threshold value, the specific implementation flow process of S103 can as shown in Figure 3:

In S301, show the notice of the Traffic Anomaly of described terminal at informing.

If the screen of terminal is current is be in screen closed condition, then light screen, and in the informing (for mobile terminal, informing is usually located at the top at mobile terminal screen interface) notice of display terminal Traffic Anomaly.If the screen of terminal is current is be in light but the state locked, then also can directly locking screen interface in eject notification hurdle, the notice of display terminal Traffic Anomaly.

In S302, when the click event occurring in described informing being detected, showing described integrated flow and having exceeded the title of the software of described predetermined threshold value and described integrated flow thereof.

Due in the terminal, user can check detailed content of announcement, therefore, when the click event occurring in informing being detected further by clicking informing, can as shown in Figure 4, display integrated flow has exceeded the title of the software of predetermined threshold value and the integrated flow of correspondence thereof.It should be noted that, if informing ejects under but the screen of terminal is in the state lighting locking, then after needing the unlock command to terminal screen first to be detected, the click event occurring in informing just can come into force.

Thus, title and the integrated flow thereof of the software of predetermined threshold value has been exceeded by the integrated flow demonstrated, user can judge that the flow of wherein which software consumes is used up when user predicts, and the flow of which software consumes is permitted without user.Such as, user opened the download function of browser before closing screen, and just at download file, then user can judge that browser this part flow used up under the closed condition of screen is that user obtains user's license; And for consuming the software of the flow being greater than predetermined threshold value under or unknown situation unlicensed user, user can judge that this software is Malware.

Further, as shown in Figure 5, after S302, also comprise:

In S303, show described integrated flow and exceeded option of operation corresponding to the software of described predetermined threshold value, described option of operation comprises forbids networking or unloading.

In S304, detect the selection instruction to described option of operation, networking or unloading operation are forbidden in the software execution described integrated flow having been exceeded to described predetermined threshold value.

Namely, by while the display integrated flow title that exceeded the software of predetermined threshold value and integrated flow thereof, show the option of operation that these softwares are corresponding, user can by selecting these option of operation, networking operation or unloading operation are forbidden to its Malware judged, thus stop the traffic consumes behavior of these Malwares, reach the object of control terminal flow.

In embodiments of the present invention, to be networked under terminal screen unactivated state produced traffic conditions by each software on monitor terminal, too much once the data on flows monitoring some software, can remind the situation of Traffic Anomaly in time, thus prevent Malware from the unwitting situation of user, consuming the flow of terminal, effectively control the traffic consumes of terminal, reduce the flow cost of terminal.

In embodiments of the present invention, by the setting of predetermined threshold value, can effectively distinguish Malware and normal software, the software consuming certain flow is really needed under the unactivated state of terminal screen for some, such as MSN, microbloggings etc. need the software regularly obtaining message, because it needs the flow of consumption little, by arranging predetermined threshold value, well this kind of software and Malware can be made a distinction, thus filtering traffic reminder message effectively, ensure that the validity of flow reminder message on the one hand, on the one hand for mobile terminal, it also avoid because prompting message frequency is too high, the situation accelerating mobile terminal electric quantity consumption occurs.

Fig. 6 shows the structured flowchart of the flow alarm set of the terminal that the embodiment of the present invention provides, this device can be arranged in the terminals such as mobile phone, panel computer, computer, notebook computer, for running the flow based reminding method of the terminal described in Fig. 1 to Fig. 5 embodiment of the present invention.For convenience of explanation, illustrate only part related to the present embodiment.

With reference to Fig. 6, in the apparatus, comprising:

Monitoring unit 61, when detecting that the screen of described terminal is switched to unactivated state, monitor respectively each software in described terminal network under described unactivated state produce integrated flow.

Judging unit 62, judges whether that the described integrated flow of software has exceeded predetermined threshold value.

Tip element 63, when judging that the described integrated flow of software has exceeded described predetermined threshold value, points out the Traffic Anomaly of described terminal.

Alternatively, described unactivated state comprises screen closed condition or lock state of screen.

Alternatively, described Tip element 63 comprises:

First display subelement, shows the notice of the Traffic Anomaly of described terminal at informing.

Second display subelement, when the click event occurring in described informing being detected, showing described integrated flow and having exceeded the title of the software of described predetermined threshold value and described integrated flow thereof.

Alternatively, described Tip element 63 also comprises:

3rd display subelement, shows described integrated flow and has exceeded option of operation corresponding to the software of described predetermined threshold value, and described option of operation comprises forbids networking or unloading.

Operating unit, detects the selection instruction to described option of operation, and networking or unloading operation are forbidden in the software execution described integrated flow having been exceeded to described predetermined threshold value.

Alternatively, described device also comprises:

Lock unit, regularly synchronously up-to-date from server described predetermined threshold value.

Shown in Fig. 7 is the block diagram of the part-structure of the mobile phone relevant to the terminal that the embodiment of the present invention provides.With reference to figure 7, mobile phone comprises: radio frequency (RadioFrequency, RF) parts such as circuit 710, memory 720, input unit 730, display unit 740, transducer 750, voicefrequency circuit 760, Wireless Fidelity (wirelessfidelity, WiFi) module 770, processor 780 and power supply 790.It will be understood by those skilled in the art that the handset structure shown in Fig. 7 does not form the restriction to mobile phone, the parts more more or less than diagram can be comprised, or combine some parts, or different parts are arranged.

Concrete introduction is carried out below in conjunction with Fig. 7 each component parts to mobile phone:

RF circuit 710 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially, after being received by the downlink information of base station, process to processor 780; In addition, the up data of design are sent to base station.Usually, RF circuit includes but not limited to antenna, at least one amplifier, transceiver, coupler, low noise amplifier (LowNoiseAmplifier, LNA), duplexer etc.In addition, RF circuit 710 can also by radio communication and network and other devices communicatings.Above-mentioned radio communication can use arbitrary communication standard or agreement, include but not limited to global system for mobile communications (GlobalSystemofMobilecommunication, GSM), general packet radio service (GeneralPacketRadioService, GPRS), code division multiple access (CodeDivisionMultipleAccess, CDMA), Wideband Code Division Multiple Access (WCDMA) (WidebandCodeDivisionMultipleAccess, WCDMA), Long Term Evolution (LongTermEvolution, LTE)), Email, Short Message Service (ShortMessagingService, SMS) etc.

Memory 720 can be used for storing software program and module, and processor 780 is stored in software program and the module of memory 720 by running, thus performs various function application and the data processing of mobile phone.Memory 720 mainly can comprise storage program district and store data field, and wherein, storage program district can storage operation system, application program (such as sound-playing function, image player function etc.) etc. needed at least one function; Store data field and can store the data (such as voice data, phone directory etc.) etc. created according to the use of mobile phone.In addition, memory 720 can comprise high-speed random access memory, can also comprise nonvolatile memory, such as at least one disk memory, flush memory device or other volatile solid-state parts.

Input unit 730 can be used for the numeral or the character information that receive input, and generation arranges with the user of mobile phone 700 and function controls the input of relevant key signals.Particularly, input unit 730 can comprise contact panel 731 and other input equipments 732.Contact panel 731, also referred to as touch-screen, user can be collected or neighbouring touch operation (such as user uses any applicable object or the operations of annex on contact panel 731 or near contact panel 731 such as finger, stylus) thereon, and drive corresponding jockey according to the formula preset.Optionally, contact panel 731 can comprise touch detecting apparatus and touch controller two parts.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation brings, and sends signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives processor 780, and the order that energy receiving processor 780 is sent also is performed.In addition, the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave can be adopted to realize contact panel 731.Except contact panel 731, input unit 730 can also comprise other input equipments 732.Particularly, other input equipments 732 can include but not limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.

Display unit 740 can be used for the various menus showing information or the information being supplied to user and the mobile phone inputted by user.Display unit 740 can comprise display floater 741, optionally, the form such as liquid crystal display (LiquidCrystalDisplay, LCD), Organic Light Emitting Diode (OrganicLight-EmittingDiode, OLED) can be adopted to configure display floater 741.Further, contact panel 731 can cover display floater 741, when contact panel 731 detects thereon or after neighbouring touch operation, send processor 780 to determine the type of touch event, on display floater 741, provide corresponding vision to export with preprocessor 780 according to the type of touch event.Although in the figure 7, contact panel 731 and display floater 741 be as two independently parts to realize input and the input function of mobile phone, but in certain embodiments, can by integrated to contact panel 731 and display floater 741 and realize the input and output function of mobile phone.

Mobile phone 700 also can comprise at least one transducer 750, such as optical sensor, motion sensor and other transducers.Particularly, optical sensor can comprise ambient light sensor and proximity transducer, and wherein, ambient light sensor the light and shade of environmentally light can regulate the brightness of display floater 741, proximity transducer when mobile phone moves in one's ear, can cut out display floater 741 and/or backlight.As the one of motion sensor; accelerometer sensor can detect the size of all directions (are generally three axles) acceleration; size and the direction of gravity can be detected time static, can be used for identifying the application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating) of mobile phone attitude, Vibration identification correlation function (such as pedometer, knock) etc.; As for mobile phone also other transducers such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, do not repeat them here.

Voicefrequency circuit 760, loud speaker 761, microphone 762 can provide the audio interface between user and mobile phone.Voicefrequency circuit 760 can by receive voice data conversion after the signal of telecommunication, be transferred to loud speaker 761, by loud speaker 761 be converted to voice signal export; On the other hand, the voice signal of collection is converted to the signal of telecommunication by microphone 762, voice data is converted to after being received by voicefrequency circuit 760, after again voice data output processor 780 being processed, through RF circuit 710 to send to such as another mobile phone, or export voice data to memory 720 to process further.

WiFi belongs to short range wireless transmission technology, and by WiFi module 770, mobile phone can help that user sends and receive e-mail, browsing page and access streaming video etc., and its broadband internet wireless for user provides is accessed.Although Fig. 7 shows WiFi module 770, be understandable that, it does not belong to must forming of mobile phone 700, can omit in the scope of essence not changing invention as required completely.

Processor 780 is control centres of mobile phone, utilize the various piece of various interface and the whole mobile phone of connection, software program in memory 720 and/or module is stored in by running or performing, and call the data be stored in memory 720, perform various function and the deal with data of mobile phone, thus integral monitoring is carried out to mobile phone.Optionally, processor 780 can comprise one or more processing unit; Preferably, processor 780 accessible site application processor and modem processor, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor mainly processes radio communication.Be understandable that, above-mentioned modem processor also can not be integrated in processor 780.

Mobile phone 700 also comprises the power supply 790(such as battery of powering to all parts), preferably, power supply can be connected with processor 780 logic by power-supply management system, thus realizes the functions such as management charging, electric discharge and power managed by power-supply management system.

Although not shown, mobile phone 700 can also comprise camera, bluetooth module etc., does not repeat them here.

In embodiments of the present invention, the processor 780 included by this terminal also has following functions: the flow based reminding method performing terminal, comprising:

When detecting that the screen of described terminal is switched to unactivated state, monitor respectively each software in described terminal network under described unactivated state produce integrated flow;

Judge whether that the described integrated flow of software has exceeded predetermined threshold value;

When judging that the described integrated flow of software has exceeded described predetermined threshold value, point out the Traffic Anomaly of described terminal.

Further, described unactivated state comprises screen closed condition or lock state of screen.

Further, the Traffic Anomaly of the described terminal of described prompting comprises:

The notice of the Traffic Anomaly of described terminal is shown at informing;

When the click event occurring in described informing being detected, showing described integrated flow and having exceeded the title of the software of described predetermined threshold value and described integrated flow thereof.

Further, the Traffic Anomaly of the described terminal of described prompting also comprises:

Show described integrated flow and exceeded option of operation corresponding to the software of described predetermined threshold value, described option of operation comprises forbids networking or unloading;

Detect the selection instruction to described option of operation, networking or unloading operation are forbidden in the software execution described integrated flow having been exceeded to described predetermined threshold value.

Further, described detect that the screen of described terminal is switched to unactivated state before, described method also comprises:

Regularly synchronously up-to-date from server described predetermined threshold value.

In embodiments of the present invention, to be networked under terminal screen unactivated state produced traffic conditions by each software on monitor terminal, too much once the data on flows monitoring some software, can remind the situation of Traffic Anomaly in time, thus prevent Malware from the unwitting situation of user, consuming the flow of terminal, effectively control the traffic consumes of terminal, reduce the flow cost of terminal.

The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (9)

1. a flow based reminding method for terminal, is characterized in that, comprising:
When detecting that the screen of described terminal is switched to unactivated state, respectively to software each in described terminal network under the described unactivated state of the screen of described terminal produce flow start from scratch accumulative, described unactivated state comprises screen closed condition or lock state of screen;
Judge whether that the integrated flow of software has exceeded predetermined threshold value;
When judging that the described integrated flow of software has exceeded described predetermined threshold value, point out the Traffic Anomaly of described terminal.
2. the method for claim 1, is characterized in that, the Traffic Anomaly of the described terminal of described prompting comprises:
The notice of the Traffic Anomaly of described terminal is shown at informing;
When the click event occurring in described informing being detected, showing described integrated flow and having exceeded the title of the software of described predetermined threshold value and described integrated flow thereof.
3. method as claimed in claim 2, it is characterized in that, the Traffic Anomaly of the described terminal of described prompting also comprises:
Show described integrated flow and exceeded option of operation corresponding to the software of described predetermined threshold value, described option of operation comprises forbids networking or unloading;
Detect the selection instruction to described option of operation, networking or unloading operation are forbidden in the software execution described integrated flow having been exceeded to described predetermined threshold value.
4. the method as described in any one of claims 1 to 3, is characterized in that, described detect that the screen of described terminal is switched to unactivated state before, described method also comprises:
Regularly synchronously up-to-date from server described predetermined threshold value.
5. a flow alarm set for terminal, is characterized in that, comprising:
Monitoring unit, for when detecting that the screen of described terminal is switched to unactivated state, respectively to software each in described terminal network under the described unactivated state of the screen of described terminal produce flow start from scratch accumulative, described unactivated state comprises screen closed condition or lock state of screen;
Judging unit, for judging whether that the integrated flow of software has exceeded predetermined threshold value;
Tip element, for when judging that the described integrated flow of software has exceeded described predetermined threshold value, points out the Traffic Anomaly of described terminal.
6. device as claimed in claim 5, it is characterized in that, described Tip element comprises:
First display subelement, for showing the notice of the Traffic Anomaly of described terminal at informing;
Second display subelement, for when the click event occurring in described informing being detected, showing described integrated flow and having exceeded the title of the software of described predetermined threshold value and described integrated flow thereof.
7. device as claimed in claim 6, it is characterized in that, described Tip element also comprises:
3rd display subelement, has exceeded option of operation corresponding to the software of described predetermined threshold value for showing described integrated flow, and described option of operation comprises forbids networking or unloading;
Operating unit, for detecting the selection instruction to described option of operation, networking or unloading operation are forbidden in the software execution described integrated flow having been exceeded to described predetermined threshold value.
8. the device as described in any one of claim 5 ~ 7, is characterized in that, described device also comprises:
Lock unit, for regular described predetermined threshold value synchronously up-to-date from server.
9. a terminal, is characterized in that, comprises the flow alarm set of the terminal as described in any one of claim 5 ~ 8.
CN201310284580.7A 2013-07-08 2013-07-08 A kind of flow based reminding method of terminal, device and terminal CN104135561B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310284580.7A CN104135561B (en) 2013-07-08 2013-07-08 A kind of flow based reminding method of terminal, device and terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310284580.7A CN104135561B (en) 2013-07-08 2013-07-08 A kind of flow based reminding method of terminal, device and terminal
PCT/CN2014/081780 WO2015003601A1 (en) 2013-07-08 2014-07-08 Data traffic notification method, device and terminal

Publications (2)

Publication Number Publication Date
CN104135561A CN104135561A (en) 2014-11-05
CN104135561B true CN104135561B (en) 2016-03-16

Family

ID=51808081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310284580.7A CN104135561B (en) 2013-07-08 2013-07-08 A kind of flow based reminding method of terminal, device and terminal

Country Status (2)

Country Link
CN (1) CN104135561B (en)
WO (1) WO2015003601A1 (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105281965B (en) * 2014-06-12 2020-02-07 腾讯科技(深圳)有限公司 Traffic acquisition method and device based on IOS (input/output system)
CN104572177A (en) * 2014-12-19 2015-04-29 龙凤娇 Mobile traffic management method and mobile traffic management device
CN105992169B (en) * 2015-02-04 2019-09-27 中国移动通信集团云南有限公司 A kind of flow based reminding method, apparatus and system
RU2686673C1 (en) * 2015-04-14 2019-04-30 Хуавэй Текнолоджиз Ко., Лтд. Device and method of terminal control and terminal
CN106332121A (en) * 2015-06-25 2017-01-11 中兴通讯股份有限公司 VoLTE call traffic prompting method and device
CN105302693A (en) * 2015-10-28 2016-02-03 上海斐讯数据通信技术有限公司 Time management method and system and electronic device
CN105607979B (en) * 2015-12-18 2018-05-08 小米科技有限责任公司 Networking control method and device
CN105573896A (en) * 2015-12-21 2016-05-11 魅族科技(中国)有限公司 Running reminding method and device for application program
CN105873028B (en) * 2016-03-28 2020-05-19 宇龙计算机通信科技(深圳)有限公司 Terminal control method, terminal control device and terminal
CN106060899A (en) * 2016-05-20 2016-10-26 廖建强 Flow control method and device
CN106095547A (en) * 2016-06-03 2016-11-09 北京小米移动软件有限公司 Application program networking control method and device
CN105933545A (en) * 2016-06-30 2016-09-07 秦晓飞 Real-time traffic and call cost reminding apparatus and method
WO2018023377A1 (en) * 2016-08-02 2018-02-08 张阳 Method for indicating interest attribute of traffic monitoring technology and mobile phone
WO2018023376A1 (en) * 2016-08-02 2018-02-08 张阳 Usage statistical method for data usage monitoring technology and mobile phone
CN106331369A (en) * 2016-09-14 2017-01-11 广东欧珀移动通信有限公司 Information synchronization method and terminal
CN106412915A (en) * 2016-10-31 2017-02-15 宇龙计算机通信科技(深圳)有限公司 Pseudo-wireless access point identification method and system
CN108243271A (en) * 2016-12-23 2018-07-03 北京安云世纪科技有限公司 A kind of method, apparatus for carrying out flow control and mobile equipment
CN108307337A (en) * 2017-08-22 2018-07-20 深圳市爱培科技术股份有限公司 Flux monitoring method, system and the storage device of vehicle mounted guidance terminal
CN108616653B (en) * 2018-03-30 2020-01-17 Oppo广东移动通信有限公司 Information processing method, device, mobile terminal and computer readable storage medium
CN109726552A (en) * 2018-12-29 2019-05-07 联想(北京)有限公司 A kind of control method, device and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006576A (en) * 2010-12-08 2011-04-06 东莞宇龙通信科技有限公司 Method and system for displaying surfing flow and mobile terminal
CN102981878A (en) * 2012-11-28 2013-03-20 广东欧珀移动通信有限公司 Method for automatically closing background programs and mobile terminal of automatically closing background programs

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183950A (en) * 2006-11-14 2008-05-21 乐金电子(中国)研究开发中心有限公司 Communication flux accounting display system, terminal and method
CN101841605A (en) * 2010-03-23 2010-09-22 中兴通讯股份有限公司 Method and device for alarming flow when mobile phone downloads and flow alarming mobile phone
CN101854649A (en) * 2010-05-20 2010-10-06 中兴通讯股份有限公司 Mobile terminal and method and device for monitoring Internet surfing data traffic of mobile terminal
CN102612084A (en) * 2012-02-24 2012-07-25 中兴通讯股份有限公司 Method and device for controlling data traffic
CN102711098B (en) * 2012-04-28 2015-01-07 广东欧珀移动通信有限公司 Method for preventing background flow of application program from being lost

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006576A (en) * 2010-12-08 2011-04-06 东莞宇龙通信科技有限公司 Method and system for displaying surfing flow and mobile terminal
CN102981878A (en) * 2012-11-28 2013-03-20 广东欧珀移动通信有限公司 Method for automatically closing background programs and mobile terminal of automatically closing background programs

Also Published As

Publication number Publication date
CN104135561A (en) 2014-11-05
WO2015003601A1 (en) 2015-01-15

Similar Documents

Publication Publication Date Title
CN103327102B (en) A kind of method and apparatus recommending application program
AU2018200188B2 (en) Side menu displaying method and apparatus and terminal
EP2882234B1 (en) Method, apparatus, equipment and system for controlling turn-on and turn-off of wireless network
CN106851654B (en) Pseudo base station identification method, pseudo base station identification device and terminal
CN104243671B (en) Volume adjusting method, device and electronic equipment
CN105487889A (en) Application interface updating method and device
CN104967896A (en) Method for displaying bulletscreen comment information, and apparatus thereof
CN103458408A (en) Network connection method and network sharing method and device
CN103701988A (en) Message prompt method and device and electronic equipment
CN103616981A (en) Application process method, device and mobile terminal
CN103874018A (en) Access point information sharing method and device
CN103501333A (en) Method, device and terminal equipment for downloading files
CN103729765B (en) A kind of authentication control method, terminal, server, terminal device and system
CN102929503B (en) The method of select File and terminal
CN102832975A (en) Data transmission method, data transmission device and terminal with touch screen
CN103399633B (en) A kind of wireless remote control method and mobile terminal
CN104065982B (en) The method and apparatus of live streaming media
CN103473092B (en) A kind of download the processing method of application, device and terminal unit
CN105487649A (en) Prompt method and mobile terminal
CN103500002A (en) Method, device and terminal equipment for managing application program
CN103365419B (en) A kind of method and apparatus triggering alarm clock control command
CN104468464A (en) Authentication method, device and system
CN103473051A (en) Method and device for saving terminal power consumption
CN103473163B (en) application program detection method and device
CN103458124B (en) A kind of shutdown processing method of terminal, device and terminal equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant