CN105095049B - Method and apparatus for monitoring application operating - Google Patents
Method and apparatus for monitoring application operating Download PDFInfo
- Publication number
- CN105095049B CN105095049B CN201510505959.5A CN201510505959A CN105095049B CN 105095049 B CN105095049 B CN 105095049B CN 201510505959 A CN201510505959 A CN 201510505959A CN 105095049 B CN105095049 B CN 105095049B
- Authority
- CN
- China
- Prior art keywords
- application
- terminal
- monitored
- level
- configuration information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
Abstract
This application discloses a kind of method and apparatus for monitoring application operating.One embodiment of methods described includes:Read the terminal configuration information for the terminal for running monitored application;Based on the terminal configuration information, to the terminal distribution monitoring rules, wherein, the monitoring rules are generated based on terminal configuration information and the terminal operating information obtained from least one terminal;The current terminal operating information of the terminal is obtained, based on the monitoring rules, it is determined whether allow monitored application to perform scheduled operation.The embodiment can improve the validity of monitoring application operating.
Description
Technical field
The application is related to field of computer technology, and in particular to operational control technical field, more particularly to it is a kind of for supervising
The method and apparatus for controlling application operating.
Background technology
With the development of Internet technology, the species of terminal applies is also more and more.In some cases, some terminals should
With operationally, terminal may can also perform the certain operations using the other application run in itself or terminal, such as social
The prompting message operation of class application, rogue program scan operation of antivirus application etc.., can be to transporting when these operations are performed
Capable terminal applies impact, for example, prompting message operation can influence played in full screen PowerPoint (PowerPoint,
PPT content) is shown, etc..
In the prior art, often through manual setting or the presets list, when in part, terminal applies are run, forbid applying certainly
The execution of the certain operations for the other application run on body or terminal.However, prior art needs artificial participate in or for default
List performs machinery and judged, under-utilized there is terminal data, causes the validity of the monitoring to application operating is not high to ask
Topic.
The content of the invention
The purpose of the application is to propose a kind of improved method and apparatus for monitoring application operating, more than solving
The technical problem that background section is mentioned.
On the one hand, this application provides a kind of method for monitoring application operating, methods described to include:Read operation institute
The terminal configuration information of the terminal of the application of monitoring;Based on the terminal configuration information, to the terminal distribution monitoring rules, its
In, the monitoring rules are generated based on terminal configuration information and the terminal operating information obtained from least one terminal;
The current terminal operating information of the terminal is obtained, based on the monitoring rules, it is determined whether allow monitored application to perform
Scheduled operation.
In certain embodiments, the terminal operating information include CPU occupation rates, memory usage, bandwidth occupancy rate and
The application configuration information of the application monitored.
In certain embodiments, the monitoring rules include:If there are currently other with screen mode toggle operation in terminal
Using, forbid monitored application to perform the first operation, wherein, first operation includes prompting operation;If terminal is not deposited
In the other application currently run with screen mode toggle, operation of the terminal with the presence or absence of predetermined application is detected;If in the presence of forbidding
The application monitored performs the first operation;If it is not present, it is allowed to which the application monitored performs the first operation.
In certain embodiments, the predetermined application is prepared by the following:Multiple applications are obtained respectively at least one
Described configuration information is applied when being run in individual terminal;Grasped based on forbidding monitored application to perform first in application configuration information
The ranking results of the ratio of number of the number of work with allowing the monitored operation of application execution first, determine the multiple application
In at least one application be predetermined application.
In certain embodiments, it is described to be based on the terminal configuration information, include to the terminal distribution monitoring rules:Root
According to the terminal configuration information, based on default configuration level judgment models, the configuration level of terminal is determined, wherein, it is described to match somebody with somebody
Putting grade includes first level, second level;According to the configuration level, monitoring rules are distributed to the application.
In certain embodiments, when terminal configuration level is second level, the monitoring rules include:If terminal is transported
Row information meets:CPU occupation rates are less than default memory usage threshold less than default CPU occupation rate threshold values and memory usage
Value, then monitored application is allowed to perform the second operation, wherein, second operation includes EMS memory occupation amount upon execution and exceeded
The operation of EMS memory occupation amount threshold value;Otherwise, monitored application is forbidden to perform the second operation.
In certain embodiments, when terminal configuration level is second level, the monitoring rules include:If terminal
Bandwidth occupancy rate is higher than default bandwidth occupancy rate threshold value, then forbids monitored application to perform the 3rd operation, wherein, described the
Three operations, which are included in, performs the operation that Time Bandwidth occupancy exceedes pre-set bandwidths occupancy threshold value.
In certain embodiments, when terminal configuration level is second level, the monitoring rules include:If terminal
Bandwidth occupancy rate is less than default bandwidth occupancy rate threshold value, judges whether the 3rd operation is that EMS memory occupation amount exceedes when performing
The operation of EMS memory occupation amount threshold value;If so, then judge terminal whether and meanwhile meet that CPU occupation rates are less than default CPU occupation rates
Threshold value and memory usage are less than default memory usage threshold value, if satisfied, allow monitored application to perform the 3rd operation,
Otherwise, monitored application is forbidden to perform the 3rd operation.
In certain embodiments, when terminal configuration level is first level, the monitoring rules include:When terminal meets
Following condition is for the moment, it is allowed to which the application monitored performs the second operation or the 3rd operation:In the other application being currently running not
The application outside operating system application be present;Input information is not detected by predetermined amount of time;Into screen protection state.
In certain embodiments, the monitoring rules also include:In response to receiving user to having using configuration information
Effect sets operation, and the execution of the operation of monitored application is controlled according to the efficient setting operation of user.
Second aspect, this application provides a kind of device for being used to monitor application operating, described device includes:Configuration information
Read module, it is configured to read the terminal configuration information for the terminal for running monitored application;Monitoring rules distribute module, matches somebody with somebody
Put for being based on the terminal configuration information, to the terminal distribution monitoring rules, wherein, the monitoring rules are based on from least
Terminal configuration information and terminal operating information that one terminal obtains and generate;Operation performs determining module, is configured to
The current terminal operating information of the terminal is obtained, based on the monitoring rules, it is determined whether allow monitored application to perform
Scheduled operation.
In certain embodiments, the terminal operating information include CPU occupation rates, memory usage, bandwidth occupancy rate and
The application configuration information of the application monitored.
In certain embodiments, the monitoring rules include:If there are currently other with screen mode toggle operation in terminal
Using, forbid monitored application to perform the first operation, wherein, first operation includes prompting operation;If terminal is not deposited
In the other application currently run with screen mode toggle, operation of the terminal with the presence or absence of predetermined application is detected;If in the presence of forbidding
The application monitored performs the first operation;If it is not present, it is allowed to which the application monitored performs the first operation.
In certain embodiments, the predetermined application is obtained by predetermined application acquisition unit, and the predetermined application obtains
Unit includes:Subelement is obtained, is configured to obtain the application of multiple applications respectively when running at least one terminal
Configuration information;Determination subelement, it is configured to based on forbidding monitored application to perform the first operation in application configuration information
The ranking results of the ratio of number of the number with allowing the monitored operation of application execution first, are determined in the multiple application
At least one application is predetermined application.
In certain embodiments, the monitoring rules distribute module includes:Configuration level determining unit, is configured to basis
The terminal configuration information, based on default configuration level judgment models, the configuration level of terminal is determined, wherein, the configuration
Grade includes first level, second level;Monitoring rules allocation unit, it is configured to according to the configuration level, is answered to described
With distribution monitoring rules.
In certain embodiments, when terminal configuration level is second level, the monitoring rules include:If terminal is transported
Row information meets:CPU occupation rates are less than default memory usage threshold less than default CPU occupation rate threshold values and memory usage
Value, then monitored application is allowed to perform the second operation, wherein, second operation includes EMS memory occupation amount upon execution and exceeded
The operation of EMS memory occupation amount threshold value;Otherwise, monitored application is forbidden to perform the second operation.
In certain embodiments, when terminal configuration level is second level, the monitoring rules include:If terminal
Bandwidth occupancy rate is higher than default bandwidth occupancy rate threshold value, then forbids monitored application to perform the 3rd operation, wherein, described the
Three operations, which are included in, performs the operation that Time Bandwidth occupancy exceedes pre-set bandwidths occupancy threshold value.
In certain embodiments, when terminal configuration level is second level, the monitoring rules include:If terminal
Bandwidth occupancy rate is less than default bandwidth occupancy rate threshold value, judges whether the 3rd operation is that EMS memory occupation amount exceedes when performing
The operation of EMS memory occupation amount threshold value;If so, then judge terminal whether and meanwhile meet that CPU occupation rates are less than default CPU occupation rates
Threshold value and memory usage are less than default memory usage threshold value, if satisfied, allow monitored application to perform the 3rd operation,
Otherwise, monitored application is forbidden to perform the 3rd operation.
In certain embodiments, when terminal configuration level is first level, the monitoring rules include:When terminal meets
Following condition is for the moment, it is allowed to which the application monitored performs the second operation or the 3rd operation:
The application outside operating system application is not present in the other application being currently running;
Input information is not detected by predetermined amount of time;
Into screen protection state.
In certain embodiments, the monitoring rules also include:In response to receiving user to having using configuration information
Effect sets operation, and the execution of the operation of monitored application is controlled according to the efficient setting operation of user.
The method and apparatus for monitoring application operating that the application provides, it is run on by the application for reading monitored
On terminal terminal configuration information, be next based on terminal configuration information, being based on terminal configuration information and CPU to terminal distribution accounts for
There are rate, memory usage, bandwidth occupancy rate and the monitoring generated using the terminal operating such as configuration information information of the application
Rule, the terminal operating information of the terminal is then obtained in real time, based on the monitoring rules, to the operation of the application monitored
It is controlled, can be to answering on different terminals due to introducing the end message such as terminal control information and terminal operating information
Different control is carried out with operation, so as to improve the validity of monitoring application operating.
Brief description of the drawings
By reading the detailed description to non-limiting example made with reference to the following drawings, other spies of the application
Sign, objects and advantages will become more apparent upon:
Fig. 1 shows the exemplary system architecture that can apply the embodiment of the present application;
Fig. 2 is the flow chart for being used to monitor one embodiment of the method for application operating according to the application;
Fig. 3 is the application scenarios schematic diagram for being used to monitor the embodiment of the method for application operating according to the application;
Fig. 4 is the schematic diagram for being used to monitor another embodiment of the method for application operating according to the application;
Fig. 5 is the structural representation for being used to monitor one embodiment of the device of application operating according to the application;
Fig. 6 is adapted for the structural representation of the computer system of the electronic equipment for realizing the embodiment of the present application.
Embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to
Be easy to describe, illustrate only in accompanying drawing to about the related part of invention.
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase
Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 shows the exemplary system architecture 100 that can apply the embodiment of the present application.
As shown in figure 1, system architecture 100 can include terminal device 101,102, network 103, server 104.Network
103 between terminal device 101,102 and server 104 provide communication link medium.Network 103 can include various
Connection type, such as wired, wireless communication link or fiber optic cables etc..
Terminal device 101,102 is interacted by network 103 with server 104, to receive or send message etc..Terminal device
The 101st, application, the application of antivirus class, the application of social platform class, broadcast message class application for monitoring application operating can be installed on 102
Deng.Server 104 can obtain terminal device 101,102 by the application for monitoring application operating, antivirus class application etc.
Terminal configuration information and terminal operating information, and according to terminal configuration information and the generation of terminal operating information to the prisons of terminal applies
Regulatory control then, and distributes corresponding monitoring rules according to the different terminals configuration information of terminal device 101,102.Terminal device 101,
102 can the monitoring rules based on acquisition, and according to itself current terminal operating information, it is determined whether allow pre- using performing
Fixed operation.
Terminal device 101,102 can be various electronic equipments, including but not limited to PC, smart mobile phone, intelligence
Wrist-watch, tablet personal computer, personal digital assistant etc..
Server 104 can be to provide the server of various services.Server can be stored to the data received,
The processing such as analysis, and result is fed back into terminal device.
It should be noted that the step being used to monitor in the method for application operating that is provided of the embodiment of the present application can be by
Terminal device 101,102 performs, and can also be performed by server 104, can also be by terminal device 101,102 and server 104
Executable portion step respectively.Correspondingly, each module of the device for monitoring application operating can be arranged at terminal device 101,
It in 102, can also be arranged in server 104, can also be partially provided in terminal device 101,102, partly set
In server 104.
It should be appreciated that the number of the terminal device, network and server in Fig. 1 is only schematical.According to realizing need
Will, can have any number of terminal device, network and server.
Fig. 2 is refer to, it illustrates the flow 200 of one embodiment of the method for monitoring application operating.This implementation
Example is main to be applied to illustrate in the electronic equipment with certain operational capability in this way.This is used to monitor application operating
Method, comprise the following steps:
Step 201, the terminal configuration information for the terminal for running monitored application is read.
In the present embodiment, electronic equipment (such as terminal device 101,102 or server 104 shown in Fig. 1) can be from
Locally or remotely obtain the terminal configuration information for the terminal for running monitored application.Specifically, when above-mentioned electronic equipment
Exactly run the terminal device of monitored application (such as can be used for monitoring the application of application operating, antivirus class application etc.)
When, it directly can obtain terminal configuration information from local;And when above-mentioned electronic equipment is to provide support for the application monitored
Background server when, it can obtain the terminal of terminal by wired connection mode or radio connection from terminal device
Configuration information.Above-mentioned radio connection include but is not limited to 3G/4G connections, WiFi connections, bluetooth connection, WiMAX connections,
Zigbee connections, UWB (ultra wideband) connections and other currently known or exploitation in the future radio connections.
Wherein, terminal configuration information can reflect that the hardware configuration parameter of the various data-handling capacities of terminal, software are matched somebody with somebody
Put parameter and/or network configuration parameters.Hardware configuration parameter can for example, at least include:Central processing unit (Central
Processing Unit, CPU) parameter, memory parameters, can also include but is not limited at least one of following:Hard disk praameter, show
Card parameter, CD-ROM drive (CD drive) parameter, etc..CPU parameters can include frequency height and L2 cache size, three-level are delayed
It is how many etc. to deposit size, core amounts, for example, frequency is higher, L2 cache is bigger, three-level caching is bigger, core is more, CPU speed
Degree is faster;Memory parameters can include memory size, for example, internal memory is bigger, access speed is faster;Hard disk praameter can include hard
The rotating speed of disk, read or write speed, hard-disk capacity, hard disk type (such as solid state hard disc, mechanical hard disk, hybrid hard disk), for example, hard disk
Type is fastest for the hard disk processing of solid state hard disc, and the rotation speed of hard disk is higher, read or write speed is faster, hard-disk capacity is bigger, hard disk
Processing speed is faster;Parameters of video card can include Data Stream Processing speed, video memory size etc., for example, Data Stream Processing speed is got over
Hurry up, video memory it is bigger, the response speed of video card is faster;CD-ROM drive parameter can include message transmission rate, CPU usage etc., such as
Message transmission rate is bigger, CPU usage is smaller, and CD ROM read-write speed is faster.
Software configuration parameter can for example include but is not limited at least one of following:Operating system parameter, application parameter etc.
Deng.Operating system parameter can include hardware resource that operating system takes etc., for example, the hardware resource that operating system takes is got over
Few, data processing speed is faster;Application parameter can for example include the number of applications of terminal installation, for example, terminal installation is answered
Fewer with quantity, hard-disk capacity occupancy is fewer, and data processing speed is faster.
Network configuration parameters can for example include but is not limited to bandwidth parameter.Bandwidth parameter can be terminal and be accessed
The data bulk that can be transmitted at a fixed time between network, such as the data bits (bit) transmitted in 1 second.
Step 202, based on above-mentioned terminal configuration information, to terminal distribution monitoring rules.
In the present embodiment, electronic equipment can be collected above-mentioned terminal configuration information, at the data of computing terminal
Reason ability, and to terminal distribution monitoring rules corresponding with the data-handling capacity of the terminal.
In the present embodiment, electronic equipment can obtain terminal from the terminal of the monitored application of at least one operation in advance
Configuration information and terminal operating information, and believed according to the terminal configuration information and terminal operating of acquired at least one terminal
Breath, generates various monitoring rules.Here, occupation condition when terminal operating information can be used for representing terminal operating and should
Use configuration information.For example, terminal operating information can include but is not limited to CPU occupation rates, memory usage, bandwidth occupancy rate and
Application configuration information of the application monitored, etc..
It will be understood by those skilled in the art that application operating is different, to terminal resource, (such as hardware provides when operation performs
Source, software resource or Internet resources etc.) occupancy it is also different.For example, when the bandwidth in terminal configuration information is very low,
The application operating (such as online software upgrading operation is, it is necessary to occupied bandwidth) for accounting for bandwidth is performed, then can influence terminal other application
The network data transmission speed of (such as Online Video broadcast message class application);And the less terminal of and internal memory relatively low for cpu frequency, when
When other application is run, the application operating (such as fixed disk file scan operation) for accounting for CPU and internal memory is performed, then can influence other application
Data processing speed, etc..Therefore, to the terminal of different terminals configuration information, it can correspond to and different application operating be entered
The monitoring rules of row monitoring.
In some optional implementations of the present embodiment, if detecting that user is set (example to application operating
Such as it is arranged to forbid all application operatings), then application operating is controlled according to the setting of user.Monitoring rules now can
Think:In response to receiving efficient setting operation of the user to application configuration information, controlled according to the efficient setting operation of user
The execution of application operating.
Step 203, the current terminal operating information of above-mentioned terminal is obtained, based on above-mentioned monitoring rules, it is determined whether allow
The application monitored performs scheduled operation.
In the present embodiment, electronic equipment can further obtain run monitored application each terminal it is current
Terminal operating information, and based on the monitoring rules distributed, it is determined that the scheduled operation of application is in the case of current terminal operating
Whether can perform.Wherein, electronic equipment the current terminal of (such as 3 minutes) acquisition terminal can be transported at predetermined intervals
Row information, the scheduled operation of application can also be monitored, when application has the demand for performing scheduled operation, electronic equipment gathers once
The current operational information of terminal, the application are not limited this.
For example, above-mentioned scheduled operation can include the first operation, and first operation for example can be prompting operation.Example
Such as, when the application monitored is applied for antivirus class or system monitoring class is applied, the first operation can be to terminal system rubbish
The prompting operation of timing cleaning.For the terminal with display function, when there is the application of full frame operation in terminal, if using
Perform the first operation, such as first operation is operated by the promptings of the displays such as window, dialog box, floating frame, then this first
The part that operation can influence the application of full frame operation in terminal is shown.It is predetermined using (such as office class application when having in terminal
Microsoft office) operation when, if application performs above-mentioned first operation, the use of user may be bothered.At some
In realization, above-mentioned monitoring rules can include:If terminal has the other application currently run with screen mode toggle, forbid being supervised
The application of control performs the first operation;If the other application currently run with screen mode toggle is not present in terminal, above-mentioned terminal is detected
With the presence or absence of the operation of predetermined application;If in the presence of forbidding monitored application to perform the first operation;If it is not present, it is allowed to supervised
The application of control performs the first operation.Here, predetermined application can be user run the application be arranged to forbid to perform this
The application of one operation.Predetermined application for example can be that the user of present terminal is arranged to forbid performing when running on present terminal
The application of first operation, or by when being run on present terminal using configuration information in forbid monitored application to perform first
The ratio of number of the number of operation with allowing the monitored operation of application execution first exceedes the application of predetermined threshold value;Can also
It is that application configuration information to multiple terminals counts, passes through the application that following steps obtain:Multiple applications are obtained respectively to exist
The application configuration information of the application monitored when being run at least one terminal, answered forbid being monitored in application configuration information
Arranged with the ratio for performing number of the number of the first operation with allowing the monitored operation of application execution first is descending
Sequence, it is determined that forward at least one application of sorting is predetermined application.Alternatively, electronic equipment can record the process of predetermined application
Name, installation path keyword or digital signature.
Now, electronic equipment can be when receiving using the execution demand for performing the first operation, and detection terminal is first
It is no exist currently with screen mode toggle run other application, such as by contrast the pixel on screen color value whether with the back of the body
Scape solid colour judge whether currently with screen mode toggle run application, if it is present forbid using perform this first
Operation.If the other application currently run with screen mode toggle is not present in terminal, can continue whether to run on monitoring terminal
Have at least one in predetermined application.Electronic equipment can pass through the process name, installation path keyword or digital signature of application
Judge predetermined application whether has been run in terminal.When operation has predetermined application in terminal, electronic equipment can be forbidden being monitored
Application perform the first operation, otherwise, monitored application can be allowed to perform the first operation.
Fig. 3 shows an application scenarios of the present embodiment.In terminal as shown in Figure 3, with full screen mode when being performed using A
Formula is run, and full screen window is antivirus class application using B as shown in 301, uses application B the monitoring application operating of the present embodiment
Method, then when application B is intended to 302 display reminding information of pop-up window, electronic equipment detects the application of current full frame operation
A, so as to forbid performing pop-up operation using B.
The method for monitoring application operating of the present embodiment, by introducing terminal control information and terminal operating information etc.
End message, different control can be carried out to the application operating on different terminals, so as to improve having for monitoring application operating
Effect property.
It should be noted that although describing the operation of the application method with particular order in the accompanying drawings, still, this is not required that
Or imply and must perform these operations according to the particular order, or the operation having to carry out shown in whole could realize the phase
The result of prestige.On the contrary, the step of describing in flow chart can change execution sequence.Additionally or alternatively, it is convenient to omit some
Step, multiple steps are merged into a step and performed, and/or a step is decomposed into execution of multiple steps.For example, at this
During certain of application method once performs, it is convenient to omit the step 201 of the flow 200 shown in Fig. 2.
With further reference to Fig. 4, it illustrates another embodiment for being used to monitor the method for application operating of the application
Flow 400.This is used to monitor application operating method 400, comprises the following steps:
Step 401, the terminal configuration information for the terminal for running monitored application is read.
In the present embodiment, electronic equipment can be from the end for locally or remotely obtaining the terminal for running monitored application
Hold configuration information.Here, terminal configuration information can be hardware configuration parameter, the software for reflecting the various data-handling capacities of terminal
Configuration parameter and/or software configuration parameter.Hardware configuration parameter can for example, at least include:CPU parameters, memory parameters, may be used also
It is at least one of following to include but is not limited to:Hard disk praameter, parameters of video card, CD-ROM drive parameter, etc..Software configuration parameter for example may be used
It is at least one of following to include but is not limited to:Operating system parameter, application parameter etc..Network configuration parameters can for example include
But it is not limited to bandwidth parameter.
Step 402, according to above-mentioned terminal configuration information, based on default configuration level judgment models, matching somebody with somebody for terminal is determined
Put grade.
In the present embodiment, electronic equipment can then be based on default configuration level model to above-mentioned terminal configuration information
Items calculated, to determine the configuration level of terminal.Wherein, it is different according to parameter every in terminal configuration information, with
And different parameters are mutually combined, the configuration level of terminal can be divided into multiple ranks.
Here, configuration level model can be rule of thumb manually set, and can also be made up of great amount of terminals configuration information
Sample set is obtained by machine learning.The form of configuration level model for example can be to include multiple ginsengs under each configuration level
Manifold is closed, and each parameter sets include parameter value every in terminal configuration information or span.When configuration level model by
When sample set is obtained by machine learning, such as it can be run each terminal configuration information as virtual machine parameter simulation, according to
Terminal data processing ability (such as the speed of service and/or display resolution) the division terminal configuration level of simulation, for each
Terminal configuration information corresponding to terminal grade is collected, and obtains parameter value every in multiple terminal configuration informations or value
The parameter sets of scope composition.When the terminal configuration information gathered matches with some parameter sets, the parameter sets institute
Corresponding terminal configuration level is to be confirmed as the configuration level of gathered terminal configuration information.
In the present embodiment, terminal configuration information can be divided into two ranks by terminal configuration level model, and respectively
One rank and second level.Wherein, terminal configuration information is the terminal of first level, and its data-handling capacity can be less than terminal
Configuration level is the terminal of second level.For example, the terminal of first level can consider that be known as low matches somebody with somebody terminal, and
The other terminal of two level can consider the height being known as match somebody with somebody or in match somebody with somebody terminal.
Step 403, according to above-mentioned configuration level, to terminal distribution monitoring rules.
In the present embodiment, electronic equipment can be according to the configuration level determined in step 402, to terminal distribution and the end
The corresponding monitoring rules of data-handling capacity at end.Wherein, monitoring rules can be electronic equipment according in advance from least one
Terminal configuration information and terminal operating information that the terminal of the monitored application of operation obtains and the various monitoring rules generated, example
Terminal configuration information as corresponding to for each configuration level generates a monitoring rules, the monitoring rules and corresponding terminal
Operation information is associated., can be by the monitoring corresponding to corresponding configuration grade when electronic equipment determines the configuration level of terminal
Rule distributes to terminal.
In some optional implementations of the present embodiment, when terminal configuration level is second level, monitoring rules can
With including:It is low less than default CPU occupation rate threshold values and memory usage that if terminal operating information meets CPU occupation rates simultaneously
In default memory usage threshold value, then monitored application is allowed to perform the second operation;Otherwise, monitored application is forbidden to hold
Row second operates.Wherein, the second operation includes the operation that EMS memory occupation amount upon execution exceedes EMS memory occupation amount threshold value.For example,
When the application monitored is applied for antivirus, the second operation can be virus scanning operation.Here, CPU occupation rate threshold values, internal memory
Utilization rate threshold value and EMS memory occupation amount threshold value rule of thumb can determine artificially, can also be by being supervised to multiple terminals in operation
Terminal operating information during the application of control carries out statistics acquisition.Alternatively, CPU occupation rate threshold values for example can be 30%, electronics
Equipment can gather the CPU occupation rates of a terminal with every m seconds (such as 3 seconds), to the CPU occupation rate meters of every n times (such as 10 times) collection
Average value is calculated, when the average value is less than 30%, the CPU threshold values for being defined as terminal are less than CPU occupation rate threshold values.Similarly, electronics
Equipment can determine whether the memory usage of terminal is less than memory usage threshold value (such as 70%) with same method.Second behaviour
The EMS memory occupation amount of work exceedes EMS memory occupation amount threshold value, it is believed that is the application operating for accounting for hardware resource (CPU and internal memory).When
The current CPU occupation rates of terminal are higher than default memory usage threshold higher than default CPU occupation rate threshold values and memory usage
Value, it is believed that the current hardware resource occupancy of terminal is more, so as to forbid monitored application to perform second operation.
In some optional implementations of the present embodiment, when terminal configuration level is second level, monitoring rules can
With including:If the bandwidth occupancy rate of terminal is higher than default bandwidth occupancy rate threshold value, monitored application is forbidden to perform the
Three operations;Otherwise, the application is forbidden to perform the 3rd operation.Wherein, the 3rd operation is included in execution Time Bandwidth occupancy and exceeded
The operation of pre-set bandwidths occupancy threshold value.For example, when the application monitored is applied for antivirus, the 3rd operation can be that antivirus should
The operation that redaction is applied is downloaded during with renewal.Here, if the bandwidth occupancy rate of terminal is higher than default bandwidth occupancy rate threshold
It is worth (such as 40%), then it is assumed that the network state of terminal is busy, is not suitable for carrying out the more application operating of occupied bandwidth.Wherein,
The bandwidth occupancy rate threshold value of terminal rule of thumb can determine artificially, can also by multiple terminals operation monitored should
The terminal operating information of used time carries out statistics acquisition.
In some implementations, when the bandwidth occupancy rate of terminal is less than default bandwidth occupancy rate threshold value, it is believed that terminal
Network state is the free time.Now, it is allowed to which the application monitored performs bandwidth occupancy rate higher than default bandwidth occupancy rate threshold value
3rd operation.However, when what is monitored applies the certain operations in the 3rd operation, except taking network, can may also take
The hardware resource such as CPU and internal memory.At this moment, it is also necessary to determine whether the 3rd operation is occupancy CPU or internal memory is more and answer
With, and then determine whether that monitored application performs the 3rd operation.Determine whether that monitored application performs the 3rd
The process of operation can include:Judge that EMS memory occupation amount is more than the behaviour of EMS memory occupation amount threshold value when whether the 3rd operation is execution
Make;If so, then judge terminal whether and meanwhile meet CPU occupation rates less than default CPU occupation rate threshold values and memory usage it is low
In default memory usage threshold value, if satisfied, allowing monitored application to perform the 3rd operation, otherwise, forbid monitoring and answer
Operated with performing the 3rd.
In some optional implementations of the present embodiment, if terminal configuration level is first level, the data of terminal
Processing speed is relatively low, can only be taken in the hardware resource of terminal relatively low, or when network is completely idle, could allow to be monitored answers
With performing, above-mentioned second operates or the 3rd operates.Now, monitoring rules can include:When terminal meets one of following condition
When, it is allowed to the application monitored performs the second operation or the 3rd operation:
The application (being, for example, holding state) outside operating system application is not present in the other application being currently running;
Input information is not detected by predetermined amount of time (such as by microphone, keyboard, mouse, camera, touch-screen etc.
The acoustic information of input, character information, click information, image information etc.);
Into screen protection state.
In some optional implementations of the present embodiment, if detecting that user is set to application operating,
The rule set according to user is controlled to application operating.Monitoring rules now can be:In response to receiving user couple
Using the efficient setting operation of configuration information, the execution of application operating is controlled according to the efficient setting operation of user.
Step 404, the current terminal operating information of above-mentioned terminal is obtained, based on above-mentioned monitoring rules, it is determined whether allow
The application monitored performs scheduled operation.
In the present embodiment, electronic equipment can further obtain run monitored application each terminal it is current
Terminal operating information, and based on the monitoring rules distributed, it is determined that the scheduled operation of application is in the case of current terminal operating
Whether can perform.Wherein, electronic equipment the current terminal of (such as 3 minutes) acquisition terminal can be transported at predetermined intervals
Row information, the scheduled operation of application can also be monitored, when application has the demand for performing scheduled operation, electronic equipment gathers once
The current operational information of terminal, the application are not limited this.Here, scheduled operation can include above-mentioned first operation, on
Any one of second operation and the above-mentioned the 3rd operation for stating.
In the present embodiment, the step 401 in above-mentioned implementation process and step 404 respectively with the step in previous embodiment
201 and step 203 it is essentially identical, will not be repeated here.
Figure 4, it is seen that from Fig. 2 corresponding to unlike embodiment, be used to monitor application behaviour in the present embodiment
The flow 400 of the method for work has been had more according to terminal configuration information, based on default configuration level judgment models, determines terminal
The step 402 of configuration level, and step 403 is distributed accordingly compared with step 202 by original according to terminal configuration information
Monitoring rules, become according to configuration level, to the application distribution monitoring rules monitored.Step 402 and change by increase
Step 403 more, the scheme of the present embodiment description can be according to the different configuration levels of terminal, there is provided a variety of monitoring application operatings
Rule, intelligence tackle terminal configuration diversity.
With further reference to Fig. 5, as the realization to method shown in above-mentioned each figure, it is used to monitor this application provides one kind and answers
With one embodiment of the device of operation, the device embodiment is corresponding with the embodiment of the method shown in Fig. 2, and the device specifically may be used
With applied in electronic equipment.
As shown in figure 5, the device 500 for being used to monitor application operating described in the present embodiment includes:Configuration information reads mould
Block 501, monitoring rules distribute module 502 and operation perform determining module 503.Wherein, configuration information read module 501 can match somebody with somebody
Put the terminal configuration information for reading the terminal for running monitored application;Monitoring rules distribute module 502 can configure use
In based on above-mentioned terminal configuration information, to terminal distribution monitoring rules, wherein, monitoring rules can be based on from least one described
Terminal obtain terminal configuration information and terminal operating information and generate;Operation performs determining module 503 and may be configured to obtain
The terminal operating information that terminal is current is taken, and is based on above-mentioned monitoring rules, it is determined whether allows monitored application to perform predetermined
Operation.
For monitoring all modules described in the device 500 of application operating and each step in the method with reference to the description of figure 2
It is rapid corresponding.Thus, the operation and feature that the method for being used to monitor application operating above in association with being directed to described by Fig. 2 describes are same
Sample is applied to be used for the module for monitoring the device 500 of application operating and wherein including, and will not be repeated here.
It will be understood by those skilled in the art that the above-mentioned device 500 for being used to monitor application operating also includes some other public affairs
Know structure, such as processor, memory etc., in order to unnecessarily obscure embodiment of the disclosure, these known structures are in Fig. 5
Not shown in.
Below with reference to Fig. 6, it illustrates suitable for for realizing the computer system 600 of the electronic equipment of the embodiment of the present application
Structural representation.
As shown in fig. 6, computer system 600 includes CPU (CPU) 601, it can be read-only according to being stored in
Program in memory (ROM) 602 or be loaded into program in random access storage device (RAM) 603 from storage part 608 and
Perform various appropriate actions and processing.In RAM 603, also it is stored with system 600 and operates required various programs and data.
CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to always
Line 604.
I/O interfaces 605 are connected to lower component:Importation 606 including keyboard, mouse etc.;Penetrated including such as negative electrode
The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part 608 including hard disk etc.;
And the communications portion 609 of the NIC including LAN card, modem etc..Communications portion 609 via such as because
The network of spy's net performs communication process.Driver 610 is also according to needing to be connected to I/O interfaces 605.Detachable media 611, such as
Disk, CD, magneto-optic disk, semiconductor memory etc., it is arranged on as needed on driver 610, in order to read from it
Computer program be mounted into as needed storage part 608.
Especially, according to embodiments herein, computer is may be implemented as above with reference to the process of flow chart description
Software program.For example, embodiments herein includes a kind of computer program product, it includes being tangibly embodied in machine readable
Computer program on medium, the computer program include the program code for being used for the method shown in execution flow chart.At this
In the embodiment of sample, the computer program can be downloaded and installed by communications portion 609 from network, and/or from removable
Medium 611 is unloaded to be mounted.
Involved unit can be realized by way of software in the embodiment of the present application, can also pass through the side of hardware
Formula is realized.Described module can also be set within a processor, for example, can be described as:A kind of processor includes configuration
Information reading module, monitoring rules distribute module and operation perform determining module.Wherein, the title of these modules is in certain situation
Under do not form restriction to the module in itself, for example, configuration information read module is also described as " being configured to read
The module of the terminal configuration information of the terminal of the monitored application of operation ".
As on the other hand, present invention also provides a kind of computer-readable recording medium, the computer-readable storage medium
Matter can be the computer-readable recording medium included in device described in above-described embodiment;Can also be individualism, not
The computer-readable recording medium being fitted into terminal.The computer-readable recording medium storage have one or more than one
Program, described program be used for performing by one or more than one processor be described in the application be used for monitor application operating
Method.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.People in the art
Member should be appreciated that invention scope involved in the application, however it is not limited to the technology that the particular combination of above-mentioned technical characteristic forms
Scheme, while should also cover in the case where not departing from the inventive concept, carried out by above-mentioned technical characteristic or its equivalent feature
The other technical schemes for being combined and being formed.Such as features described above has similar work(with (but not limited to) disclosed herein
The technical scheme that the technical characteristic of energy is replaced mutually and formed.
Claims (20)
- A kind of 1. method for monitoring application operating, it is characterised in that methods described includes:Read the terminal configuration information for the terminal for running monitored application;Based on the terminal configuration information, to the terminal distribution monitoring rules, wherein, the monitoring rules are based on from least one Terminal configuration information and terminal operating information that the individual terminal obtains and generate;The current terminal operating information of the terminal is obtained, based on the monitoring rules, it is determined whether allow monitored application Perform scheduled operation.
- 2. according to the method for claim 1, it is characterised in that the terminal operating information includes CPU occupation rates, internal memory makes With the application configuration information of rate, bandwidth occupancy rate and the application monitored.
- 3. according to the method for claim 1, it is characterised in that the monitoring rules include:If terminal has the other application currently run with screen mode toggle, monitored application is forbidden to perform the first operation, its In, first operation includes prompting operation;If the other application currently run with screen mode toggle is not present in terminal, the terminal is detected with the presence or absence of predetermined application Operation;If in the presence of forbidding monitored application to perform the first operation;If it is not present, it is allowed to which the application monitored performs the first operation.
- 4. according to the method for claim 3, it is characterised in that the predetermined application is prepared by the following:Obtain multiple applications and described apply configuration information when being run at least one terminal respectively;The number of the first operation is performed with allowing monitored application to hold based on monitored application is forbidden in application configuration information The ranking results of the ratio for the number that row first operates, it is predetermined application to determine at least one application in the multiple application.
- 5. according to the method for claim 2, it is characterised in that it is described to be based on the terminal configuration information, to the terminal Distribution monitoring rules include:According to the terminal configuration information, based on default configuration level judgment models, the configuration level of terminal is determined, wherein, The configuration level includes first level, second level;According to the configuration level, monitoring rules are distributed to the application.
- 6. according to the method for claim 5, it is characterised in that when terminal configuration level is second level, the monitoring Rule includes:If terminal operating information meets:CPU occupation rates are less than default CPU occupation rate threshold values and memory usage less than default Memory usage threshold value, then allow monitored application to perform the second operation, wherein, second operation is included upon execution EMS memory occupation amount exceedes the operation of EMS memory occupation amount threshold value;Otherwise, monitored application is forbidden to perform the second operation.
- 7. according to the method for claim 5, it is characterised in that when terminal configuration level is second level, the monitoring Rule includes:If the bandwidth occupancy rate of terminal is higher than default bandwidth occupancy rate threshold value, monitored application is forbidden to perform the 3rd behaviour Make, wherein, the 3rd operation, which is included in, performs the operation that Time Bandwidth occupancy exceedes pre-set bandwidths occupancy threshold value.
- 8. according to the method for claim 7, it is characterised in that when terminal configuration level is second level, the monitoring Rule includes:If the bandwidth occupancy rate of terminal is less than default bandwidth occupancy rate threshold value, judge whether the 3rd operation is when performing EMS memory occupation amount exceedes the operation of EMS memory occupation amount threshold value;If so, then judge terminal whether and meanwhile meet CPU occupation rates less than default CPU occupation rate threshold values and memory usage it is low In default memory usage threshold value, if satisfied, allowing monitored application to perform the 3rd operation, otherwise, forbid what is monitored Operated using performing the 3rd.
- 9. according to the method for claim 5, it is characterised in that when terminal configuration level is first level, the monitoring Rule includes:When terminal meets following condition for the moment, it is allowed to which the application monitored performs the second operation or the 3rd operation:The application outside operating system application is not present in the other application being currently running;Input information is not detected by predetermined amount of time;Into screen protection state.
- 10. according to the method any one of claim 1-9, it is characterised in that the monitoring rules also include:In response to receiving efficient setting operation of the user to application configuration information, institute is controlled according to the efficient setting operation of user The execution of the operation of the application of monitoring.
- 11. a kind of device for being used to monitor application operating, it is characterised in that described device includes:Configuration information read module, it is configured to read the terminal configuration information for the terminal for running monitored application;Monitoring rules distribute module, it is configured to be based on the terminal configuration information, to the terminal distribution monitoring rules, its In, the monitoring rules are generated based on terminal configuration information and the terminal operating information obtained from least one terminal;Operation performs determining module, is configured to obtain the current terminal operating information of the terminal, based on the monitoring rules, Determine whether that monitored application performs scheduled operation.
- 12. device according to claim 11, it is characterised in that the terminal operating information includes CPU occupation rates, internal memory The application configuration information of utilization rate, bandwidth occupancy rate and the application monitored.
- 13. device according to claim 11, it is characterised in that the monitoring rules include:If terminal has the other application currently run with screen mode toggle, monitored application is forbidden to perform the first operation, its In, first operation includes prompting operation;If the other application currently run with screen mode toggle is not present in terminal, the terminal is detected with the presence or absence of predetermined application Operation;If in the presence of forbidding monitored application to perform the first operation;If it is not present, it is allowed to which the application monitored performs the first operation.
- 14. device according to claim 13, it is characterised in that the predetermined application is obtained by predetermined application acquisition unit , the predetermined application acquisition unit includes:Subelement is obtained, is configured to obtain the application of multiple applications respectively when running at least one terminal and set to believe Breath;Determination subelement, be configured to based on forbid in application configuration information monitored application perform the number of the first operation with Allow monitored application to perform the ranking results of the ratio of the number of the first operation, determine at least one in the multiple application Individual application is predetermined application.
- 15. device according to claim 11, it is characterised in that the monitoring rules distribute module includes:Configuration level determining unit, it is configured to according to the terminal configuration information, based on default configuration level judgment models, The configuration level of terminal is determined, wherein, the configuration level includes first level, second level;Monitoring rules allocation unit, it is configured to according to the configuration level, monitoring rules is distributed to the application.
- 16. device according to claim 15, it is characterised in that when terminal configuration level is second level, the prison Regulatory control then includes:If terminal operating information meets:CPU occupation rates are less than default CPU occupation rate threshold values and memory usage less than default Memory usage threshold value, then allow monitored application to perform the second operation, wherein, second operation is included upon execution EMS memory occupation amount exceedes the operation of EMS memory occupation amount threshold value;Otherwise, monitored application is forbidden to perform the second operation.
- 17. device according to claim 15, it is characterised in that when terminal configuration level is second level, the prison Regulatory control then includes:If the bandwidth occupancy rate of terminal is higher than default bandwidth occupancy rate threshold value, monitored application is forbidden to perform the 3rd behaviour Make, wherein, the 3rd operation, which is included in, performs the operation that Time Bandwidth occupancy exceedes pre-set bandwidths occupancy threshold value.
- 18. device according to claim 17, it is characterised in that when terminal configuration level is second level, the prison Regulatory control then includes:If the bandwidth occupancy rate of terminal is less than default bandwidth occupancy rate threshold value, judge whether the 3rd operation is when performing EMS memory occupation amount exceedes the operation of EMS memory occupation amount threshold value;If so, then judge terminal whether and meanwhile meet CPU occupation rates less than default CPU occupation rate threshold values and memory usage it is low In default memory usage threshold value, if satisfied, allowing monitored application to perform the 3rd operation, otherwise, forbid what is monitored Operated using performing the 3rd.
- 19. device according to claim 15, it is characterised in that when terminal configuration level is first level, the prison Regulatory control then includes:When terminal meets following condition for the moment, it is allowed to which the application monitored performs the second operation or the 3rd operation:The application outside operating system application is not present in the other application being currently running;Input information is not detected by predetermined amount of time;Into screen protection state.
- 20. according to the device any one of claim 11-19, it is characterised in that the monitoring rules also include:In response to receiving efficient setting operation of the user to application configuration information, institute is controlled according to the efficient setting operation of user The execution of the operation of the application of monitoring.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510505959.5A CN105095049B (en) | 2015-08-17 | 2015-08-17 | Method and apparatus for monitoring application operating |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510505959.5A CN105095049B (en) | 2015-08-17 | 2015-08-17 | Method and apparatus for monitoring application operating |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105095049A CN105095049A (en) | 2015-11-25 |
CN105095049B true CN105095049B (en) | 2018-02-13 |
Family
ID=54575545
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510505959.5A Active CN105095049B (en) | 2015-08-17 | 2015-08-17 | Method and apparatus for monitoring application operating |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105095049B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105653323B (en) * | 2015-12-28 | 2019-07-02 | 小米科技有限责任公司 | Application management method and device |
CN105930249B (en) * | 2016-04-20 | 2019-11-12 | 百度在线网络技术(北京)有限公司 | Using monitoring method and device |
CN107291601B (en) * | 2017-06-12 | 2021-01-22 | 北京奇艺世纪科技有限公司 | Safe operation and maintenance method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102194074A (en) * | 2011-04-26 | 2011-09-21 | 北京思创银联科技股份有限公司 | Computer protection method based on process right |
CN103020515A (en) * | 2012-12-26 | 2013-04-03 | 中国人民解放军国防科学技术大学 | Application program execution permission control method for operating system |
CN103220662A (en) * | 2012-01-20 | 2013-07-24 | 腾讯科技(深圳)有限公司 | Application program processing method and mobile terminal |
CN104360794A (en) * | 2014-11-21 | 2015-02-18 | 北京奇虎科技有限公司 | Method and device for controlling window pop-up through full screen-identifying mode |
CN104375851A (en) * | 2013-08-15 | 2015-02-25 | 腾讯科技(深圳)有限公司 | Intelligent terminal and energy saving method thereof |
-
2015
- 2015-08-17 CN CN201510505959.5A patent/CN105095049B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102194074A (en) * | 2011-04-26 | 2011-09-21 | 北京思创银联科技股份有限公司 | Computer protection method based on process right |
CN103220662A (en) * | 2012-01-20 | 2013-07-24 | 腾讯科技(深圳)有限公司 | Application program processing method and mobile terminal |
CN103020515A (en) * | 2012-12-26 | 2013-04-03 | 中国人民解放军国防科学技术大学 | Application program execution permission control method for operating system |
CN104375851A (en) * | 2013-08-15 | 2015-02-25 | 腾讯科技(深圳)有限公司 | Intelligent terminal and energy saving method thereof |
CN104360794A (en) * | 2014-11-21 | 2015-02-18 | 北京奇虎科技有限公司 | Method and device for controlling window pop-up through full screen-identifying mode |
Also Published As
Publication number | Publication date |
---|---|
CN105095049A (en) | 2015-11-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112291793B (en) | Resource allocation method and device of network access equipment | |
CN103379002B (en) | The adaptive monitoring of telecommunication network | |
CN110505675B (en) | Network connection method and device, storage medium and communication terminal | |
CN106131300A (en) | Terminal equipment control method and device | |
WO2019062405A1 (en) | Application program processing method and apparatus, storage medium, and electronic device | |
CN105095049B (en) | Method and apparatus for monitoring application operating | |
CN103841129B (en) | Cloud computing resource information acquisition server, cloud computing resource information acquisition client and information processing method | |
CN110956202A (en) | Image training method, system, medium and intelligent device based on distributed learning | |
CN107612912A (en) | A kind of method and apparatus that play parameter is set | |
CN112751729A (en) | Log monitoring method, device, medium and electronic equipment | |
US20210026954A1 (en) | Threat mitigation system and method | |
WO2023116138A1 (en) | Modeling method for multi-task model, promotional content processing method, and related apparatuses | |
CN113051465A (en) | Push method and device for optimization strategy, server and storage medium | |
CN113422751B (en) | Streaming media processing method and device based on online reinforcement learning and electronic equipment | |
CN105512910A (en) | Target user screening method and apparatus | |
CN109788306A (en) | Information processing method, device, server and storage medium | |
CN102420930A (en) | Image processing apparatus, image processing system, and image processing method | |
CN107819745A (en) | The defence method and device of abnormal flow | |
CN110196805B (en) | Data processing method, data processing apparatus, storage medium, and electronic apparatus | |
CN108595712B (en) | Object characteristic parameter processing method and device and electronic equipment | |
US20210288979A1 (en) | Scaling a processing resource of a security information and event management system | |
CN115842789B (en) | Data packet scheduling method, device and readable storage medium | |
CN110516151B (en) | Effective behavior detection and personalized recommendation method | |
CN112994934B (en) | Data interaction method, device and system | |
CN114219369B (en) | Prediction model training method and device, and user category prediction method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190830 Address after: 100085 Beijing, Haidian District, No. ten on the ground floor, No. 10 Baidu building, layer 2 Patentee after: BEIJING BAIDU NETCOM SCIENCE AND TECHNOLOGY Co.,Ltd. Address before: 100091 Beijing, Haidian District, northeast Wang West Road, No. 4, Zhongguancun Software Park, building C, block, 1-03 Patentee before: Pacify a Heng Tong (Beijing) Science and Technology Ltd. |