CN105095049B - Method and apparatus for monitoring application operating - Google Patents

Method and apparatus for monitoring application operating Download PDF

Info

Publication number
CN105095049B
CN105095049B CN201510505959.5A CN201510505959A CN105095049B CN 105095049 B CN105095049 B CN 105095049B CN 201510505959 A CN201510505959 A CN 201510505959A CN 105095049 B CN105095049 B CN 105095049B
Authority
CN
China
Prior art keywords
application
terminal
monitored
level
configuration information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510505959.5A
Other languages
Chinese (zh)
Other versions
CN105095049A (en
Inventor
林委坤
张华键
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Anyi Hengtong Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anyi Hengtong Beijing Technology Co Ltd filed Critical Anyi Hengtong Beijing Technology Co Ltd
Priority to CN201510505959.5A priority Critical patent/CN105095049B/en
Publication of CN105095049A publication Critical patent/CN105095049A/en
Application granted granted Critical
Publication of CN105095049B publication Critical patent/CN105095049B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

This application discloses a kind of method and apparatus for monitoring application operating.One embodiment of methods described includes:Read the terminal configuration information for the terminal for running monitored application;Based on the terminal configuration information, to the terminal distribution monitoring rules, wherein, the monitoring rules are generated based on terminal configuration information and the terminal operating information obtained from least one terminal;The current terminal operating information of the terminal is obtained, based on the monitoring rules, it is determined whether allow monitored application to perform scheduled operation.The embodiment can improve the validity of monitoring application operating.

Description

Method and apparatus for monitoring application operating
Technical field
The application is related to field of computer technology, and in particular to operational control technical field, more particularly to it is a kind of for supervising The method and apparatus for controlling application operating.
Background technology
With the development of Internet technology, the species of terminal applies is also more and more.In some cases, some terminals should With operationally, terminal may can also perform the certain operations using the other application run in itself or terminal, such as social The prompting message operation of class application, rogue program scan operation of antivirus application etc.., can be to transporting when these operations are performed Capable terminal applies impact, for example, prompting message operation can influence played in full screen PowerPoint (PowerPoint, PPT content) is shown, etc..
In the prior art, often through manual setting or the presets list, when in part, terminal applies are run, forbid applying certainly The execution of the certain operations for the other application run on body or terminal.However, prior art needs artificial participate in or for default List performs machinery and judged, under-utilized there is terminal data, causes the validity of the monitoring to application operating is not high to ask Topic.
The content of the invention
The purpose of the application is to propose a kind of improved method and apparatus for monitoring application operating, more than solving The technical problem that background section is mentioned.
On the one hand, this application provides a kind of method for monitoring application operating, methods described to include:Read operation institute The terminal configuration information of the terminal of the application of monitoring;Based on the terminal configuration information, to the terminal distribution monitoring rules, its In, the monitoring rules are generated based on terminal configuration information and the terminal operating information obtained from least one terminal; The current terminal operating information of the terminal is obtained, based on the monitoring rules, it is determined whether allow monitored application to perform Scheduled operation.
In certain embodiments, the terminal operating information include CPU occupation rates, memory usage, bandwidth occupancy rate and The application configuration information of the application monitored.
In certain embodiments, the monitoring rules include:If there are currently other with screen mode toggle operation in terminal Using, forbid monitored application to perform the first operation, wherein, first operation includes prompting operation;If terminal is not deposited In the other application currently run with screen mode toggle, operation of the terminal with the presence or absence of predetermined application is detected;If in the presence of forbidding The application monitored performs the first operation;If it is not present, it is allowed to which the application monitored performs the first operation.
In certain embodiments, the predetermined application is prepared by the following:Multiple applications are obtained respectively at least one Described configuration information is applied when being run in individual terminal;Grasped based on forbidding monitored application to perform first in application configuration information The ranking results of the ratio of number of the number of work with allowing the monitored operation of application execution first, determine the multiple application In at least one application be predetermined application.
In certain embodiments, it is described to be based on the terminal configuration information, include to the terminal distribution monitoring rules:Root According to the terminal configuration information, based on default configuration level judgment models, the configuration level of terminal is determined, wherein, it is described to match somebody with somebody Putting grade includes first level, second level;According to the configuration level, monitoring rules are distributed to the application.
In certain embodiments, when terminal configuration level is second level, the monitoring rules include:If terminal is transported Row information meets:CPU occupation rates are less than default memory usage threshold less than default CPU occupation rate threshold values and memory usage Value, then monitored application is allowed to perform the second operation, wherein, second operation includes EMS memory occupation amount upon execution and exceeded The operation of EMS memory occupation amount threshold value;Otherwise, monitored application is forbidden to perform the second operation.
In certain embodiments, when terminal configuration level is second level, the monitoring rules include:If terminal Bandwidth occupancy rate is higher than default bandwidth occupancy rate threshold value, then forbids monitored application to perform the 3rd operation, wherein, described the Three operations, which are included in, performs the operation that Time Bandwidth occupancy exceedes pre-set bandwidths occupancy threshold value.
In certain embodiments, when terminal configuration level is second level, the monitoring rules include:If terminal Bandwidth occupancy rate is less than default bandwidth occupancy rate threshold value, judges whether the 3rd operation is that EMS memory occupation amount exceedes when performing The operation of EMS memory occupation amount threshold value;If so, then judge terminal whether and meanwhile meet that CPU occupation rates are less than default CPU occupation rates Threshold value and memory usage are less than default memory usage threshold value, if satisfied, allow monitored application to perform the 3rd operation, Otherwise, monitored application is forbidden to perform the 3rd operation.
In certain embodiments, when terminal configuration level is first level, the monitoring rules include:When terminal meets Following condition is for the moment, it is allowed to which the application monitored performs the second operation or the 3rd operation:In the other application being currently running not The application outside operating system application be present;Input information is not detected by predetermined amount of time;Into screen protection state.
In certain embodiments, the monitoring rules also include:In response to receiving user to having using configuration information Effect sets operation, and the execution of the operation of monitored application is controlled according to the efficient setting operation of user.
Second aspect, this application provides a kind of device for being used to monitor application operating, described device includes:Configuration information Read module, it is configured to read the terminal configuration information for the terminal for running monitored application;Monitoring rules distribute module, matches somebody with somebody Put for being based on the terminal configuration information, to the terminal distribution monitoring rules, wherein, the monitoring rules are based on from least Terminal configuration information and terminal operating information that one terminal obtains and generate;Operation performs determining module, is configured to The current terminal operating information of the terminal is obtained, based on the monitoring rules, it is determined whether allow monitored application to perform Scheduled operation.
In certain embodiments, the terminal operating information include CPU occupation rates, memory usage, bandwidth occupancy rate and The application configuration information of the application monitored.
In certain embodiments, the monitoring rules include:If there are currently other with screen mode toggle operation in terminal Using, forbid monitored application to perform the first operation, wherein, first operation includes prompting operation;If terminal is not deposited In the other application currently run with screen mode toggle, operation of the terminal with the presence or absence of predetermined application is detected;If in the presence of forbidding The application monitored performs the first operation;If it is not present, it is allowed to which the application monitored performs the first operation.
In certain embodiments, the predetermined application is obtained by predetermined application acquisition unit, and the predetermined application obtains Unit includes:Subelement is obtained, is configured to obtain the application of multiple applications respectively when running at least one terminal Configuration information;Determination subelement, it is configured to based on forbidding monitored application to perform the first operation in application configuration information The ranking results of the ratio of number of the number with allowing the monitored operation of application execution first, are determined in the multiple application At least one application is predetermined application.
In certain embodiments, the monitoring rules distribute module includes:Configuration level determining unit, is configured to basis The terminal configuration information, based on default configuration level judgment models, the configuration level of terminal is determined, wherein, the configuration Grade includes first level, second level;Monitoring rules allocation unit, it is configured to according to the configuration level, is answered to described With distribution monitoring rules.
In certain embodiments, when terminal configuration level is second level, the monitoring rules include:If terminal is transported Row information meets:CPU occupation rates are less than default memory usage threshold less than default CPU occupation rate threshold values and memory usage Value, then monitored application is allowed to perform the second operation, wherein, second operation includes EMS memory occupation amount upon execution and exceeded The operation of EMS memory occupation amount threshold value;Otherwise, monitored application is forbidden to perform the second operation.
In certain embodiments, when terminal configuration level is second level, the monitoring rules include:If terminal Bandwidth occupancy rate is higher than default bandwidth occupancy rate threshold value, then forbids monitored application to perform the 3rd operation, wherein, described the Three operations, which are included in, performs the operation that Time Bandwidth occupancy exceedes pre-set bandwidths occupancy threshold value.
In certain embodiments, when terminal configuration level is second level, the monitoring rules include:If terminal Bandwidth occupancy rate is less than default bandwidth occupancy rate threshold value, judges whether the 3rd operation is that EMS memory occupation amount exceedes when performing The operation of EMS memory occupation amount threshold value;If so, then judge terminal whether and meanwhile meet that CPU occupation rates are less than default CPU occupation rates Threshold value and memory usage are less than default memory usage threshold value, if satisfied, allow monitored application to perform the 3rd operation, Otherwise, monitored application is forbidden to perform the 3rd operation.
In certain embodiments, when terminal configuration level is first level, the monitoring rules include:When terminal meets Following condition is for the moment, it is allowed to which the application monitored performs the second operation or the 3rd operation:
The application outside operating system application is not present in the other application being currently running;
Input information is not detected by predetermined amount of time;
Into screen protection state.
In certain embodiments, the monitoring rules also include:In response to receiving user to having using configuration information Effect sets operation, and the execution of the operation of monitored application is controlled according to the efficient setting operation of user.
The method and apparatus for monitoring application operating that the application provides, it is run on by the application for reading monitored On terminal terminal configuration information, be next based on terminal configuration information, being based on terminal configuration information and CPU to terminal distribution accounts for There are rate, memory usage, bandwidth occupancy rate and the monitoring generated using the terminal operating such as configuration information information of the application Rule, the terminal operating information of the terminal is then obtained in real time, based on the monitoring rules, to the operation of the application monitored It is controlled, can be to answering on different terminals due to introducing the end message such as terminal control information and terminal operating information Different control is carried out with operation, so as to improve the validity of monitoring application operating.
Brief description of the drawings
By reading the detailed description to non-limiting example made with reference to the following drawings, other spies of the application Sign, objects and advantages will become more apparent upon:
Fig. 1 shows the exemplary system architecture that can apply the embodiment of the present application;
Fig. 2 is the flow chart for being used to monitor one embodiment of the method for application operating according to the application;
Fig. 3 is the application scenarios schematic diagram for being used to monitor the embodiment of the method for application operating according to the application;
Fig. 4 is the schematic diagram for being used to monitor another embodiment of the method for application operating according to the application;
Fig. 5 is the structural representation for being used to monitor one embodiment of the device of application operating according to the application;
Fig. 6 is adapted for the structural representation of the computer system of the electronic equipment for realizing the embodiment of the present application.
Embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Be easy to describe, illustrate only in accompanying drawing to about the related part of invention.
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 shows the exemplary system architecture 100 that can apply the embodiment of the present application.
As shown in figure 1, system architecture 100 can include terminal device 101,102, network 103, server 104.Network 103 between terminal device 101,102 and server 104 provide communication link medium.Network 103 can include various Connection type, such as wired, wireless communication link or fiber optic cables etc..
Terminal device 101,102 is interacted by network 103 with server 104, to receive or send message etc..Terminal device The 101st, application, the application of antivirus class, the application of social platform class, broadcast message class application for monitoring application operating can be installed on 102 Deng.Server 104 can obtain terminal device 101,102 by the application for monitoring application operating, antivirus class application etc. Terminal configuration information and terminal operating information, and according to terminal configuration information and the generation of terminal operating information to the prisons of terminal applies Regulatory control then, and distributes corresponding monitoring rules according to the different terminals configuration information of terminal device 101,102.Terminal device 101, 102 can the monitoring rules based on acquisition, and according to itself current terminal operating information, it is determined whether allow pre- using performing Fixed operation.
Terminal device 101,102 can be various electronic equipments, including but not limited to PC, smart mobile phone, intelligence Wrist-watch, tablet personal computer, personal digital assistant etc..
Server 104 can be to provide the server of various services.Server can be stored to the data received, The processing such as analysis, and result is fed back into terminal device.
It should be noted that the step being used to monitor in the method for application operating that is provided of the embodiment of the present application can be by Terminal device 101,102 performs, and can also be performed by server 104, can also be by terminal device 101,102 and server 104 Executable portion step respectively.Correspondingly, each module of the device for monitoring application operating can be arranged at terminal device 101, It in 102, can also be arranged in server 104, can also be partially provided in terminal device 101,102, partly set In server 104.
It should be appreciated that the number of the terminal device, network and server in Fig. 1 is only schematical.According to realizing need Will, can have any number of terminal device, network and server.
Fig. 2 is refer to, it illustrates the flow 200 of one embodiment of the method for monitoring application operating.This implementation Example is main to be applied to illustrate in the electronic equipment with certain operational capability in this way.This is used to monitor application operating Method, comprise the following steps:
Step 201, the terminal configuration information for the terminal for running monitored application is read.
In the present embodiment, electronic equipment (such as terminal device 101,102 or server 104 shown in Fig. 1) can be from Locally or remotely obtain the terminal configuration information for the terminal for running monitored application.Specifically, when above-mentioned electronic equipment Exactly run the terminal device of monitored application (such as can be used for monitoring the application of application operating, antivirus class application etc.) When, it directly can obtain terminal configuration information from local;And when above-mentioned electronic equipment is to provide support for the application monitored Background server when, it can obtain the terminal of terminal by wired connection mode or radio connection from terminal device Configuration information.Above-mentioned radio connection include but is not limited to 3G/4G connections, WiFi connections, bluetooth connection, WiMAX connections, Zigbee connections, UWB (ultra wideband) connections and other currently known or exploitation in the future radio connections.
Wherein, terminal configuration information can reflect that the hardware configuration parameter of the various data-handling capacities of terminal, software are matched somebody with somebody Put parameter and/or network configuration parameters.Hardware configuration parameter can for example, at least include:Central processing unit (Central Processing Unit, CPU) parameter, memory parameters, can also include but is not limited at least one of following:Hard disk praameter, show Card parameter, CD-ROM drive (CD drive) parameter, etc..CPU parameters can include frequency height and L2 cache size, three-level are delayed It is how many etc. to deposit size, core amounts, for example, frequency is higher, L2 cache is bigger, three-level caching is bigger, core is more, CPU speed Degree is faster;Memory parameters can include memory size, for example, internal memory is bigger, access speed is faster;Hard disk praameter can include hard The rotating speed of disk, read or write speed, hard-disk capacity, hard disk type (such as solid state hard disc, mechanical hard disk, hybrid hard disk), for example, hard disk Type is fastest for the hard disk processing of solid state hard disc, and the rotation speed of hard disk is higher, read or write speed is faster, hard-disk capacity is bigger, hard disk Processing speed is faster;Parameters of video card can include Data Stream Processing speed, video memory size etc., for example, Data Stream Processing speed is got over Hurry up, video memory it is bigger, the response speed of video card is faster;CD-ROM drive parameter can include message transmission rate, CPU usage etc., such as Message transmission rate is bigger, CPU usage is smaller, and CD ROM read-write speed is faster.
Software configuration parameter can for example include but is not limited at least one of following:Operating system parameter, application parameter etc. Deng.Operating system parameter can include hardware resource that operating system takes etc., for example, the hardware resource that operating system takes is got over Few, data processing speed is faster;Application parameter can for example include the number of applications of terminal installation, for example, terminal installation is answered Fewer with quantity, hard-disk capacity occupancy is fewer, and data processing speed is faster.
Network configuration parameters can for example include but is not limited to bandwidth parameter.Bandwidth parameter can be terminal and be accessed The data bulk that can be transmitted at a fixed time between network, such as the data bits (bit) transmitted in 1 second.
Step 202, based on above-mentioned terminal configuration information, to terminal distribution monitoring rules.
In the present embodiment, electronic equipment can be collected above-mentioned terminal configuration information, at the data of computing terminal Reason ability, and to terminal distribution monitoring rules corresponding with the data-handling capacity of the terminal.
In the present embodiment, electronic equipment can obtain terminal from the terminal of the monitored application of at least one operation in advance Configuration information and terminal operating information, and believed according to the terminal configuration information and terminal operating of acquired at least one terminal Breath, generates various monitoring rules.Here, occupation condition when terminal operating information can be used for representing terminal operating and should Use configuration information.For example, terminal operating information can include but is not limited to CPU occupation rates, memory usage, bandwidth occupancy rate and Application configuration information of the application monitored, etc..
It will be understood by those skilled in the art that application operating is different, to terminal resource, (such as hardware provides when operation performs Source, software resource or Internet resources etc.) occupancy it is also different.For example, when the bandwidth in terminal configuration information is very low, The application operating (such as online software upgrading operation is, it is necessary to occupied bandwidth) for accounting for bandwidth is performed, then can influence terminal other application The network data transmission speed of (such as Online Video broadcast message class application);And the less terminal of and internal memory relatively low for cpu frequency, when When other application is run, the application operating (such as fixed disk file scan operation) for accounting for CPU and internal memory is performed, then can influence other application Data processing speed, etc..Therefore, to the terminal of different terminals configuration information, it can correspond to and different application operating be entered The monitoring rules of row monitoring.
In some optional implementations of the present embodiment, if detecting that user is set (example to application operating Such as it is arranged to forbid all application operatings), then application operating is controlled according to the setting of user.Monitoring rules now can Think:In response to receiving efficient setting operation of the user to application configuration information, controlled according to the efficient setting operation of user The execution of application operating.
Step 203, the current terminal operating information of above-mentioned terminal is obtained, based on above-mentioned monitoring rules, it is determined whether allow The application monitored performs scheduled operation.
In the present embodiment, electronic equipment can further obtain run monitored application each terminal it is current Terminal operating information, and based on the monitoring rules distributed, it is determined that the scheduled operation of application is in the case of current terminal operating Whether can perform.Wherein, electronic equipment the current terminal of (such as 3 minutes) acquisition terminal can be transported at predetermined intervals Row information, the scheduled operation of application can also be monitored, when application has the demand for performing scheduled operation, electronic equipment gathers once The current operational information of terminal, the application are not limited this.
For example, above-mentioned scheduled operation can include the first operation, and first operation for example can be prompting operation.Example Such as, when the application monitored is applied for antivirus class or system monitoring class is applied, the first operation can be to terminal system rubbish The prompting operation of timing cleaning.For the terminal with display function, when there is the application of full frame operation in terminal, if using Perform the first operation, such as first operation is operated by the promptings of the displays such as window, dialog box, floating frame, then this first The part that operation can influence the application of full frame operation in terminal is shown.It is predetermined using (such as office class application when having in terminal Microsoft office) operation when, if application performs above-mentioned first operation, the use of user may be bothered.At some In realization, above-mentioned monitoring rules can include:If terminal has the other application currently run with screen mode toggle, forbid being supervised The application of control performs the first operation;If the other application currently run with screen mode toggle is not present in terminal, above-mentioned terminal is detected With the presence or absence of the operation of predetermined application;If in the presence of forbidding monitored application to perform the first operation;If it is not present, it is allowed to supervised The application of control performs the first operation.Here, predetermined application can be user run the application be arranged to forbid to perform this The application of one operation.Predetermined application for example can be that the user of present terminal is arranged to forbid performing when running on present terminal The application of first operation, or by when being run on present terminal using configuration information in forbid monitored application to perform first The ratio of number of the number of operation with allowing the monitored operation of application execution first exceedes the application of predetermined threshold value;Can also It is that application configuration information to multiple terminals counts, passes through the application that following steps obtain:Multiple applications are obtained respectively to exist The application configuration information of the application monitored when being run at least one terminal, answered forbid being monitored in application configuration information Arranged with the ratio for performing number of the number of the first operation with allowing the monitored operation of application execution first is descending Sequence, it is determined that forward at least one application of sorting is predetermined application.Alternatively, electronic equipment can record the process of predetermined application Name, installation path keyword or digital signature.
Now, electronic equipment can be when receiving using the execution demand for performing the first operation, and detection terminal is first It is no exist currently with screen mode toggle run other application, such as by contrast the pixel on screen color value whether with the back of the body Scape solid colour judge whether currently with screen mode toggle run application, if it is present forbid using perform this first Operation.If the other application currently run with screen mode toggle is not present in terminal, can continue whether to run on monitoring terminal Have at least one in predetermined application.Electronic equipment can pass through the process name, installation path keyword or digital signature of application Judge predetermined application whether has been run in terminal.When operation has predetermined application in terminal, electronic equipment can be forbidden being monitored Application perform the first operation, otherwise, monitored application can be allowed to perform the first operation.
Fig. 3 shows an application scenarios of the present embodiment.In terminal as shown in Figure 3, with full screen mode when being performed using A Formula is run, and full screen window is antivirus class application using B as shown in 301, uses application B the monitoring application operating of the present embodiment Method, then when application B is intended to 302 display reminding information of pop-up window, electronic equipment detects the application of current full frame operation A, so as to forbid performing pop-up operation using B.
The method for monitoring application operating of the present embodiment, by introducing terminal control information and terminal operating information etc. End message, different control can be carried out to the application operating on different terminals, so as to improve having for monitoring application operating Effect property.
It should be noted that although describing the operation of the application method with particular order in the accompanying drawings, still, this is not required that Or imply and must perform these operations according to the particular order, or the operation having to carry out shown in whole could realize the phase The result of prestige.On the contrary, the step of describing in flow chart can change execution sequence.Additionally or alternatively, it is convenient to omit some Step, multiple steps are merged into a step and performed, and/or a step is decomposed into execution of multiple steps.For example, at this During certain of application method once performs, it is convenient to omit the step 201 of the flow 200 shown in Fig. 2.
With further reference to Fig. 4, it illustrates another embodiment for being used to monitor the method for application operating of the application Flow 400.This is used to monitor application operating method 400, comprises the following steps:
Step 401, the terminal configuration information for the terminal for running monitored application is read.
In the present embodiment, electronic equipment can be from the end for locally or remotely obtaining the terminal for running monitored application Hold configuration information.Here, terminal configuration information can be hardware configuration parameter, the software for reflecting the various data-handling capacities of terminal Configuration parameter and/or software configuration parameter.Hardware configuration parameter can for example, at least include:CPU parameters, memory parameters, may be used also It is at least one of following to include but is not limited to:Hard disk praameter, parameters of video card, CD-ROM drive parameter, etc..Software configuration parameter for example may be used It is at least one of following to include but is not limited to:Operating system parameter, application parameter etc..Network configuration parameters can for example include But it is not limited to bandwidth parameter.
Step 402, according to above-mentioned terminal configuration information, based on default configuration level judgment models, matching somebody with somebody for terminal is determined Put grade.
In the present embodiment, electronic equipment can then be based on default configuration level model to above-mentioned terminal configuration information Items calculated, to determine the configuration level of terminal.Wherein, it is different according to parameter every in terminal configuration information, with And different parameters are mutually combined, the configuration level of terminal can be divided into multiple ranks.
Here, configuration level model can be rule of thumb manually set, and can also be made up of great amount of terminals configuration information Sample set is obtained by machine learning.The form of configuration level model for example can be to include multiple ginsengs under each configuration level Manifold is closed, and each parameter sets include parameter value every in terminal configuration information or span.When configuration level model by When sample set is obtained by machine learning, such as it can be run each terminal configuration information as virtual machine parameter simulation, according to Terminal data processing ability (such as the speed of service and/or display resolution) the division terminal configuration level of simulation, for each Terminal configuration information corresponding to terminal grade is collected, and obtains parameter value every in multiple terminal configuration informations or value The parameter sets of scope composition.When the terminal configuration information gathered matches with some parameter sets, the parameter sets institute Corresponding terminal configuration level is to be confirmed as the configuration level of gathered terminal configuration information.
In the present embodiment, terminal configuration information can be divided into two ranks by terminal configuration level model, and respectively One rank and second level.Wherein, terminal configuration information is the terminal of first level, and its data-handling capacity can be less than terminal Configuration level is the terminal of second level.For example, the terminal of first level can consider that be known as low matches somebody with somebody terminal, and The other terminal of two level can consider the height being known as match somebody with somebody or in match somebody with somebody terminal.
Step 403, according to above-mentioned configuration level, to terminal distribution monitoring rules.
In the present embodiment, electronic equipment can be according to the configuration level determined in step 402, to terminal distribution and the end The corresponding monitoring rules of data-handling capacity at end.Wherein, monitoring rules can be electronic equipment according in advance from least one Terminal configuration information and terminal operating information that the terminal of the monitored application of operation obtains and the various monitoring rules generated, example Terminal configuration information as corresponding to for each configuration level generates a monitoring rules, the monitoring rules and corresponding terminal Operation information is associated., can be by the monitoring corresponding to corresponding configuration grade when electronic equipment determines the configuration level of terminal Rule distributes to terminal.
In some optional implementations of the present embodiment, when terminal configuration level is second level, monitoring rules can With including:It is low less than default CPU occupation rate threshold values and memory usage that if terminal operating information meets CPU occupation rates simultaneously In default memory usage threshold value, then monitored application is allowed to perform the second operation;Otherwise, monitored application is forbidden to hold Row second operates.Wherein, the second operation includes the operation that EMS memory occupation amount upon execution exceedes EMS memory occupation amount threshold value.For example, When the application monitored is applied for antivirus, the second operation can be virus scanning operation.Here, CPU occupation rate threshold values, internal memory Utilization rate threshold value and EMS memory occupation amount threshold value rule of thumb can determine artificially, can also be by being supervised to multiple terminals in operation Terminal operating information during the application of control carries out statistics acquisition.Alternatively, CPU occupation rate threshold values for example can be 30%, electronics Equipment can gather the CPU occupation rates of a terminal with every m seconds (such as 3 seconds), to the CPU occupation rate meters of every n times (such as 10 times) collection Average value is calculated, when the average value is less than 30%, the CPU threshold values for being defined as terminal are less than CPU occupation rate threshold values.Similarly, electronics Equipment can determine whether the memory usage of terminal is less than memory usage threshold value (such as 70%) with same method.Second behaviour The EMS memory occupation amount of work exceedes EMS memory occupation amount threshold value, it is believed that is the application operating for accounting for hardware resource (CPU and internal memory).When The current CPU occupation rates of terminal are higher than default memory usage threshold higher than default CPU occupation rate threshold values and memory usage Value, it is believed that the current hardware resource occupancy of terminal is more, so as to forbid monitored application to perform second operation.
In some optional implementations of the present embodiment, when terminal configuration level is second level, monitoring rules can With including:If the bandwidth occupancy rate of terminal is higher than default bandwidth occupancy rate threshold value, monitored application is forbidden to perform the Three operations;Otherwise, the application is forbidden to perform the 3rd operation.Wherein, the 3rd operation is included in execution Time Bandwidth occupancy and exceeded The operation of pre-set bandwidths occupancy threshold value.For example, when the application monitored is applied for antivirus, the 3rd operation can be that antivirus should The operation that redaction is applied is downloaded during with renewal.Here, if the bandwidth occupancy rate of terminal is higher than default bandwidth occupancy rate threshold It is worth (such as 40%), then it is assumed that the network state of terminal is busy, is not suitable for carrying out the more application operating of occupied bandwidth.Wherein, The bandwidth occupancy rate threshold value of terminal rule of thumb can determine artificially, can also by multiple terminals operation monitored should The terminal operating information of used time carries out statistics acquisition.
In some implementations, when the bandwidth occupancy rate of terminal is less than default bandwidth occupancy rate threshold value, it is believed that terminal Network state is the free time.Now, it is allowed to which the application monitored performs bandwidth occupancy rate higher than default bandwidth occupancy rate threshold value 3rd operation.However, when what is monitored applies the certain operations in the 3rd operation, except taking network, can may also take The hardware resource such as CPU and internal memory.At this moment, it is also necessary to determine whether the 3rd operation is occupancy CPU or internal memory is more and answer With, and then determine whether that monitored application performs the 3rd operation.Determine whether that monitored application performs the 3rd The process of operation can include:Judge that EMS memory occupation amount is more than the behaviour of EMS memory occupation amount threshold value when whether the 3rd operation is execution Make;If so, then judge terminal whether and meanwhile meet CPU occupation rates less than default CPU occupation rate threshold values and memory usage it is low In default memory usage threshold value, if satisfied, allowing monitored application to perform the 3rd operation, otherwise, forbid monitoring and answer Operated with performing the 3rd.
In some optional implementations of the present embodiment, if terminal configuration level is first level, the data of terminal Processing speed is relatively low, can only be taken in the hardware resource of terminal relatively low, or when network is completely idle, could allow to be monitored answers With performing, above-mentioned second operates or the 3rd operates.Now, monitoring rules can include:When terminal meets one of following condition When, it is allowed to the application monitored performs the second operation or the 3rd operation:
The application (being, for example, holding state) outside operating system application is not present in the other application being currently running;
Input information is not detected by predetermined amount of time (such as by microphone, keyboard, mouse, camera, touch-screen etc. The acoustic information of input, character information, click information, image information etc.);
Into screen protection state.
In some optional implementations of the present embodiment, if detecting that user is set to application operating, The rule set according to user is controlled to application operating.Monitoring rules now can be:In response to receiving user couple Using the efficient setting operation of configuration information, the execution of application operating is controlled according to the efficient setting operation of user.
Step 404, the current terminal operating information of above-mentioned terminal is obtained, based on above-mentioned monitoring rules, it is determined whether allow The application monitored performs scheduled operation.
In the present embodiment, electronic equipment can further obtain run monitored application each terminal it is current Terminal operating information, and based on the monitoring rules distributed, it is determined that the scheduled operation of application is in the case of current terminal operating Whether can perform.Wherein, electronic equipment the current terminal of (such as 3 minutes) acquisition terminal can be transported at predetermined intervals Row information, the scheduled operation of application can also be monitored, when application has the demand for performing scheduled operation, electronic equipment gathers once The current operational information of terminal, the application are not limited this.Here, scheduled operation can include above-mentioned first operation, on Any one of second operation and the above-mentioned the 3rd operation for stating.
In the present embodiment, the step 401 in above-mentioned implementation process and step 404 respectively with the step in previous embodiment 201 and step 203 it is essentially identical, will not be repeated here.
Figure 4, it is seen that from Fig. 2 corresponding to unlike embodiment, be used to monitor application behaviour in the present embodiment The flow 400 of the method for work has been had more according to terminal configuration information, based on default configuration level judgment models, determines terminal The step 402 of configuration level, and step 403 is distributed accordingly compared with step 202 by original according to terminal configuration information Monitoring rules, become according to configuration level, to the application distribution monitoring rules monitored.Step 402 and change by increase Step 403 more, the scheme of the present embodiment description can be according to the different configuration levels of terminal, there is provided a variety of monitoring application operatings Rule, intelligence tackle terminal configuration diversity.
With further reference to Fig. 5, as the realization to method shown in above-mentioned each figure, it is used to monitor this application provides one kind and answers With one embodiment of the device of operation, the device embodiment is corresponding with the embodiment of the method shown in Fig. 2, and the device specifically may be used With applied in electronic equipment.
As shown in figure 5, the device 500 for being used to monitor application operating described in the present embodiment includes:Configuration information reads mould Block 501, monitoring rules distribute module 502 and operation perform determining module 503.Wherein, configuration information read module 501 can match somebody with somebody Put the terminal configuration information for reading the terminal for running monitored application;Monitoring rules distribute module 502 can configure use In based on above-mentioned terminal configuration information, to terminal distribution monitoring rules, wherein, monitoring rules can be based on from least one described Terminal obtain terminal configuration information and terminal operating information and generate;Operation performs determining module 503 and may be configured to obtain The terminal operating information that terminal is current is taken, and is based on above-mentioned monitoring rules, it is determined whether allows monitored application to perform predetermined Operation.
For monitoring all modules described in the device 500 of application operating and each step in the method with reference to the description of figure 2 It is rapid corresponding.Thus, the operation and feature that the method for being used to monitor application operating above in association with being directed to described by Fig. 2 describes are same Sample is applied to be used for the module for monitoring the device 500 of application operating and wherein including, and will not be repeated here.
It will be understood by those skilled in the art that the above-mentioned device 500 for being used to monitor application operating also includes some other public affairs Know structure, such as processor, memory etc., in order to unnecessarily obscure embodiment of the disclosure, these known structures are in Fig. 5 Not shown in.
Below with reference to Fig. 6, it illustrates suitable for for realizing the computer system 600 of the electronic equipment of the embodiment of the present application Structural representation.
As shown in fig. 6, computer system 600 includes CPU (CPU) 601, it can be read-only according to being stored in Program in memory (ROM) 602 or be loaded into program in random access storage device (RAM) 603 from storage part 608 and Perform various appropriate actions and processing.In RAM 603, also it is stored with system 600 and operates required various programs and data. CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to always Line 604.
I/O interfaces 605 are connected to lower component:Importation 606 including keyboard, mouse etc.;Penetrated including such as negative electrode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part 608 including hard disk etc.; And the communications portion 609 of the NIC including LAN card, modem etc..Communications portion 609 via such as because The network of spy's net performs communication process.Driver 610 is also according to needing to be connected to I/O interfaces 605.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc., it is arranged on as needed on driver 610, in order to read from it Computer program be mounted into as needed storage part 608.
Especially, according to embodiments herein, computer is may be implemented as above with reference to the process of flow chart description Software program.For example, embodiments herein includes a kind of computer program product, it includes being tangibly embodied in machine readable Computer program on medium, the computer program include the program code for being used for the method shown in execution flow chart.At this In the embodiment of sample, the computer program can be downloaded and installed by communications portion 609 from network, and/or from removable Medium 611 is unloaded to be mounted.
Involved unit can be realized by way of software in the embodiment of the present application, can also pass through the side of hardware Formula is realized.Described module can also be set within a processor, for example, can be described as:A kind of processor includes configuration Information reading module, monitoring rules distribute module and operation perform determining module.Wherein, the title of these modules is in certain situation Under do not form restriction to the module in itself, for example, configuration information read module is also described as " being configured to read The module of the terminal configuration information of the terminal of the monitored application of operation ".
As on the other hand, present invention also provides a kind of computer-readable recording medium, the computer-readable storage medium Matter can be the computer-readable recording medium included in device described in above-described embodiment;Can also be individualism, not The computer-readable recording medium being fitted into terminal.The computer-readable recording medium storage have one or more than one Program, described program be used for performing by one or more than one processor be described in the application be used for monitor application operating Method.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.People in the art Member should be appreciated that invention scope involved in the application, however it is not limited to the technology that the particular combination of above-mentioned technical characteristic forms Scheme, while should also cover in the case where not departing from the inventive concept, carried out by above-mentioned technical characteristic or its equivalent feature The other technical schemes for being combined and being formed.Such as features described above has similar work(with (but not limited to) disclosed herein The technical scheme that the technical characteristic of energy is replaced mutually and formed.

Claims (20)

  1. A kind of 1. method for monitoring application operating, it is characterised in that methods described includes:
    Read the terminal configuration information for the terminal for running monitored application;
    Based on the terminal configuration information, to the terminal distribution monitoring rules, wherein, the monitoring rules are based on from least one Terminal configuration information and terminal operating information that the individual terminal obtains and generate;
    The current terminal operating information of the terminal is obtained, based on the monitoring rules, it is determined whether allow monitored application Perform scheduled operation.
  2. 2. according to the method for claim 1, it is characterised in that the terminal operating information includes CPU occupation rates, internal memory makes With the application configuration information of rate, bandwidth occupancy rate and the application monitored.
  3. 3. according to the method for claim 1, it is characterised in that the monitoring rules include:
    If terminal has the other application currently run with screen mode toggle, monitored application is forbidden to perform the first operation, its In, first operation includes prompting operation;
    If the other application currently run with screen mode toggle is not present in terminal, the terminal is detected with the presence or absence of predetermined application Operation;
    If in the presence of forbidding monitored application to perform the first operation;
    If it is not present, it is allowed to which the application monitored performs the first operation.
  4. 4. according to the method for claim 3, it is characterised in that the predetermined application is prepared by the following:
    Obtain multiple applications and described apply configuration information when being run at least one terminal respectively;
    The number of the first operation is performed with allowing monitored application to hold based on monitored application is forbidden in application configuration information The ranking results of the ratio for the number that row first operates, it is predetermined application to determine at least one application in the multiple application.
  5. 5. according to the method for claim 2, it is characterised in that it is described to be based on the terminal configuration information, to the terminal Distribution monitoring rules include:
    According to the terminal configuration information, based on default configuration level judgment models, the configuration level of terminal is determined, wherein, The configuration level includes first level, second level;
    According to the configuration level, monitoring rules are distributed to the application.
  6. 6. according to the method for claim 5, it is characterised in that when terminal configuration level is second level, the monitoring Rule includes:
    If terminal operating information meets:CPU occupation rates are less than default CPU occupation rate threshold values and memory usage less than default Memory usage threshold value, then allow monitored application to perform the second operation, wherein, second operation is included upon execution EMS memory occupation amount exceedes the operation of EMS memory occupation amount threshold value;
    Otherwise, monitored application is forbidden to perform the second operation.
  7. 7. according to the method for claim 5, it is characterised in that when terminal configuration level is second level, the monitoring Rule includes:
    If the bandwidth occupancy rate of terminal is higher than default bandwidth occupancy rate threshold value, monitored application is forbidden to perform the 3rd behaviour Make, wherein, the 3rd operation, which is included in, performs the operation that Time Bandwidth occupancy exceedes pre-set bandwidths occupancy threshold value.
  8. 8. according to the method for claim 7, it is characterised in that when terminal configuration level is second level, the monitoring Rule includes:
    If the bandwidth occupancy rate of terminal is less than default bandwidth occupancy rate threshold value, judge whether the 3rd operation is when performing EMS memory occupation amount exceedes the operation of EMS memory occupation amount threshold value;
    If so, then judge terminal whether and meanwhile meet CPU occupation rates less than default CPU occupation rate threshold values and memory usage it is low In default memory usage threshold value, if satisfied, allowing monitored application to perform the 3rd operation, otherwise, forbid what is monitored Operated using performing the 3rd.
  9. 9. according to the method for claim 5, it is characterised in that when terminal configuration level is first level, the monitoring Rule includes:
    When terminal meets following condition for the moment, it is allowed to which the application monitored performs the second operation or the 3rd operation:
    The application outside operating system application is not present in the other application being currently running;
    Input information is not detected by predetermined amount of time;
    Into screen protection state.
  10. 10. according to the method any one of claim 1-9, it is characterised in that the monitoring rules also include:
    In response to receiving efficient setting operation of the user to application configuration information, institute is controlled according to the efficient setting operation of user The execution of the operation of the application of monitoring.
  11. 11. a kind of device for being used to monitor application operating, it is characterised in that described device includes:
    Configuration information read module, it is configured to read the terminal configuration information for the terminal for running monitored application;
    Monitoring rules distribute module, it is configured to be based on the terminal configuration information, to the terminal distribution monitoring rules, its In, the monitoring rules are generated based on terminal configuration information and the terminal operating information obtained from least one terminal;
    Operation performs determining module, is configured to obtain the current terminal operating information of the terminal, based on the monitoring rules, Determine whether that monitored application performs scheduled operation.
  12. 12. device according to claim 11, it is characterised in that the terminal operating information includes CPU occupation rates, internal memory The application configuration information of utilization rate, bandwidth occupancy rate and the application monitored.
  13. 13. device according to claim 11, it is characterised in that the monitoring rules include:
    If terminal has the other application currently run with screen mode toggle, monitored application is forbidden to perform the first operation, its In, first operation includes prompting operation;
    If the other application currently run with screen mode toggle is not present in terminal, the terminal is detected with the presence or absence of predetermined application Operation;
    If in the presence of forbidding monitored application to perform the first operation;
    If it is not present, it is allowed to which the application monitored performs the first operation.
  14. 14. device according to claim 13, it is characterised in that the predetermined application is obtained by predetermined application acquisition unit , the predetermined application acquisition unit includes:
    Subelement is obtained, is configured to obtain the application of multiple applications respectively when running at least one terminal and set to believe Breath;
    Determination subelement, be configured to based on forbid in application configuration information monitored application perform the number of the first operation with Allow monitored application to perform the ranking results of the ratio of the number of the first operation, determine at least one in the multiple application Individual application is predetermined application.
  15. 15. device according to claim 11, it is characterised in that the monitoring rules distribute module includes:
    Configuration level determining unit, it is configured to according to the terminal configuration information, based on default configuration level judgment models, The configuration level of terminal is determined, wherein, the configuration level includes first level, second level;
    Monitoring rules allocation unit, it is configured to according to the configuration level, monitoring rules is distributed to the application.
  16. 16. device according to claim 15, it is characterised in that when terminal configuration level is second level, the prison Regulatory control then includes:
    If terminal operating information meets:CPU occupation rates are less than default CPU occupation rate threshold values and memory usage less than default Memory usage threshold value, then allow monitored application to perform the second operation, wherein, second operation is included upon execution EMS memory occupation amount exceedes the operation of EMS memory occupation amount threshold value;
    Otherwise, monitored application is forbidden to perform the second operation.
  17. 17. device according to claim 15, it is characterised in that when terminal configuration level is second level, the prison Regulatory control then includes:
    If the bandwidth occupancy rate of terminal is higher than default bandwidth occupancy rate threshold value, monitored application is forbidden to perform the 3rd behaviour Make, wherein, the 3rd operation, which is included in, performs the operation that Time Bandwidth occupancy exceedes pre-set bandwidths occupancy threshold value.
  18. 18. device according to claim 17, it is characterised in that when terminal configuration level is second level, the prison Regulatory control then includes:
    If the bandwidth occupancy rate of terminal is less than default bandwidth occupancy rate threshold value, judge whether the 3rd operation is when performing EMS memory occupation amount exceedes the operation of EMS memory occupation amount threshold value;
    If so, then judge terminal whether and meanwhile meet CPU occupation rates less than default CPU occupation rate threshold values and memory usage it is low In default memory usage threshold value, if satisfied, allowing monitored application to perform the 3rd operation, otherwise, forbid what is monitored Operated using performing the 3rd.
  19. 19. device according to claim 15, it is characterised in that when terminal configuration level is first level, the prison Regulatory control then includes:
    When terminal meets following condition for the moment, it is allowed to which the application monitored performs the second operation or the 3rd operation:
    The application outside operating system application is not present in the other application being currently running;
    Input information is not detected by predetermined amount of time;
    Into screen protection state.
  20. 20. according to the device any one of claim 11-19, it is characterised in that the monitoring rules also include:
    In response to receiving efficient setting operation of the user to application configuration information, institute is controlled according to the efficient setting operation of user The execution of the operation of the application of monitoring.
CN201510505959.5A 2015-08-17 2015-08-17 Method and apparatus for monitoring application operating Active CN105095049B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510505959.5A CN105095049B (en) 2015-08-17 2015-08-17 Method and apparatus for monitoring application operating

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510505959.5A CN105095049B (en) 2015-08-17 2015-08-17 Method and apparatus for monitoring application operating

Publications (2)

Publication Number Publication Date
CN105095049A CN105095049A (en) 2015-11-25
CN105095049B true CN105095049B (en) 2018-02-13

Family

ID=54575545

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510505959.5A Active CN105095049B (en) 2015-08-17 2015-08-17 Method and apparatus for monitoring application operating

Country Status (1)

Country Link
CN (1) CN105095049B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653323B (en) * 2015-12-28 2019-07-02 小米科技有限责任公司 Application management method and device
CN105930249B (en) * 2016-04-20 2019-11-12 百度在线网络技术(北京)有限公司 Using monitoring method and device
CN107291601B (en) * 2017-06-12 2021-01-22 北京奇艺世纪科技有限公司 Safe operation and maintenance method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194074A (en) * 2011-04-26 2011-09-21 北京思创银联科技股份有限公司 Computer protection method based on process right
CN103020515A (en) * 2012-12-26 2013-04-03 中国人民解放军国防科学技术大学 Application program execution permission control method for operating system
CN103220662A (en) * 2012-01-20 2013-07-24 腾讯科技(深圳)有限公司 Application program processing method and mobile terminal
CN104360794A (en) * 2014-11-21 2015-02-18 北京奇虎科技有限公司 Method and device for controlling window pop-up through full screen-identifying mode
CN104375851A (en) * 2013-08-15 2015-02-25 腾讯科技(深圳)有限公司 Intelligent terminal and energy saving method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194074A (en) * 2011-04-26 2011-09-21 北京思创银联科技股份有限公司 Computer protection method based on process right
CN103220662A (en) * 2012-01-20 2013-07-24 腾讯科技(深圳)有限公司 Application program processing method and mobile terminal
CN103020515A (en) * 2012-12-26 2013-04-03 中国人民解放军国防科学技术大学 Application program execution permission control method for operating system
CN104375851A (en) * 2013-08-15 2015-02-25 腾讯科技(深圳)有限公司 Intelligent terminal and energy saving method thereof
CN104360794A (en) * 2014-11-21 2015-02-18 北京奇虎科技有限公司 Method and device for controlling window pop-up through full screen-identifying mode

Also Published As

Publication number Publication date
CN105095049A (en) 2015-11-25

Similar Documents

Publication Publication Date Title
CN112291793B (en) Resource allocation method and device of network access equipment
CN103379002B (en) The adaptive monitoring of telecommunication network
CN110505675B (en) Network connection method and device, storage medium and communication terminal
CN106131300A (en) Terminal equipment control method and device
WO2019062405A1 (en) Application program processing method and apparatus, storage medium, and electronic device
CN105095049B (en) Method and apparatus for monitoring application operating
CN103841129B (en) Cloud computing resource information acquisition server, cloud computing resource information acquisition client and information processing method
CN110956202A (en) Image training method, system, medium and intelligent device based on distributed learning
CN107612912A (en) A kind of method and apparatus that play parameter is set
CN112751729A (en) Log monitoring method, device, medium and electronic equipment
US20210026954A1 (en) Threat mitigation system and method
WO2023116138A1 (en) Modeling method for multi-task model, promotional content processing method, and related apparatuses
CN113051465A (en) Push method and device for optimization strategy, server and storage medium
CN113422751B (en) Streaming media processing method and device based on online reinforcement learning and electronic equipment
CN105512910A (en) Target user screening method and apparatus
CN109788306A (en) Information processing method, device, server and storage medium
CN102420930A (en) Image processing apparatus, image processing system, and image processing method
CN107819745A (en) The defence method and device of abnormal flow
CN110196805B (en) Data processing method, data processing apparatus, storage medium, and electronic apparatus
CN108595712B (en) Object characteristic parameter processing method and device and electronic equipment
US20210288979A1 (en) Scaling a processing resource of a security information and event management system
CN115842789B (en) Data packet scheduling method, device and readable storage medium
CN110516151B (en) Effective behavior detection and personalized recommendation method
CN112994934B (en) Data interaction method, device and system
CN114219369B (en) Prediction model training method and device, and user category prediction method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190830

Address after: 100085 Beijing, Haidian District, No. ten on the ground floor, No. 10 Baidu building, layer 2

Patentee after: BEIJING BAIDU NETCOM SCIENCE AND TECHNOLOGY Co.,Ltd.

Address before: 100091 Beijing, Haidian District, northeast Wang West Road, No. 4, Zhongguancun Software Park, building C, block, 1-03

Patentee before: Pacify a Heng Tong (Beijing) Science and Technology Ltd.