CN106407796A - Method and device for controlling flow, and terminal - Google Patents

Method and device for controlling flow, and terminal Download PDF

Info

Publication number
CN106407796A
CN106407796A CN201610728648.XA CN201610728648A CN106407796A CN 106407796 A CN106407796 A CN 106407796A CN 201610728648 A CN201610728648 A CN 201610728648A CN 106407796 A CN106407796 A CN 106407796A
Authority
CN
China
Prior art keywords
application program
triggering
triggered
false triggering
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610728648.XA
Other languages
Chinese (zh)
Other versions
CN106407796B (en
Inventor
王广健
朱瑞贤
李明浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610728648.XA priority Critical patent/CN106407796B/en
Publication of CN106407796A publication Critical patent/CN106407796A/en
Application granted granted Critical
Publication of CN106407796B publication Critical patent/CN106407796B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Abstract

The application provides a method and device for controlling flow, and a terminal. One specific mode of execution of the method is as follows: judging whether the triggering is the false triggering when the currently connected network is a mobile network and an application program is triggered; and restricting the networking behavior of the application program when the triggering is the false trigger. Through the adoption of the method disclosed by the invention, the consumption of the mobile network flow is reduced, and the network flow resource is saved.

Description

Control method, device and the terminal of flow
Technical field
It relates to field of terminal technology, particularly to a kind of method controlling flow, device and terminal.
Background technology
When user is by the desktop clicking trigger of terminal application program to be opened, it sometimes appear that maloperation, open by mistake Open other application programs, desktop after the user discover that, can have been immediately returned to, and clicking trigger application program to be opened again.But It is that being opened by mistake the application program opening may in running background, and be possible to access network.If the network that terminal connects is to move The network of dynamic operator, then can consume mobile network's flow, thus wasting the resource of network traffics.
Content of the invention
In order to solve above-mentioned technical problem, the disclosure provides a kind of method controlling flow, device and terminal.
According to the embodiment of the present disclosure in a first aspect, provide a kind of control flow method, including:
When the current network connecting is mobile network and application program is triggered, judge whether described triggering is false touch Send out;
When described triggering as false triggering, limit the networking behavior of described application program.
Optionally, described application program is triggered including following any one:Application program launching or application program by from Backstage switches to foreground.
Optionally, described judge whether described triggering is false triggering, including:
After judging that described application program is triggered, before predetermined instant, if the operation that instruction returns desktop is detected Instruction;If the operational order that instruction returns desktop is detected, described triggering is false triggering.
Optionally, described predetermined instant includes following any one:
The moment that scheduled duration reaches;
The moment of described application program loaded.
Optionally, described judge whether described triggering is false triggering, including:
Using described application program as the first application program, when described first application program is triggered, judge when default Whether the second application program meeting condition of similarity with described first application program in section is triggered;
When the second application program described in preset period of time is triggered, determine described first application program by false triggering.
Optionally, described the second application program meeting condition of similarity with described first application program include following one or Multinomial:
The corresponding picture mark position application program approximate with the picture mark position of described first application program;
The similarity of the icon of corresponding icon and described first application program is more than or equal to the application of predetermined threshold Program.
Optionally, the described networking behavior limiting described application program, including:
Forbid the network connection of described application program;Or
Close the process in running background for the described application program.
Optionally, methods described also includes:
Before the described triggering of determination not false triggering, forbid that described application program is set up with network and be connected.
According to the second aspect of the embodiment of the present disclosure, provide a kind of device controlling flow, including:
Judge module, is configured to, when the current network connecting is mobile network and application program is triggered, judge institute State whether triggering is false triggering;
Limit module, be configured to limit the networking behavior of described application program in described triggering as false triggering.
Optionally, described application program is triggered including following any one:Application program launching or application program by from Backstage switches to foreground.
Optionally, described judge module includes:
First judging submodule, after being configured to judge that described application program is triggered, before predetermined instant, if inspection Measure the operational order that instruction returns desktop;If the operational order that instruction returns desktop is detected, described triggering is false triggering.
Optionally, described predetermined instant includes following any one:
The moment that scheduled duration reaches;
The moment of described application program loaded.
Optionally, described judge module includes:
Second judging submodule, is configured to described application program as the first application program, when the described first application Program is triggered, judge to meet with described first application program in preset period of time the second application program of condition of similarity whether by Triggering;
Determination sub-module, when being configured as that described second application program is triggered in preset period of time, determines described One application program is by false triggering.
Optionally, described the second application program meeting condition of similarity with described first application program include following one or Multinomial:
The corresponding picture mark position application program approximate with the picture mark position of described first application program;
The similarity of the icon of corresponding icon and described first application program is more than or equal to the application of predetermined threshold Program.
Optionally, described restriction module includes:
Forbid submodule, be configured to forbid the network connection of described application program;Or
Close closed submodule, be configured to close the process in running background for the described application program.
Optionally, described device also includes:
Disabled module, is configured to, before the described triggering of determination not false triggering, forbid described application program and network Set up and connect.
According to the third aspect of the embodiment of the present disclosure, provide a kind of terminal, including:
Processor;
For storing the memory of processor executable;
Wherein, described processor is configured to:
When the current network connecting is mobile network and application program is triggered, judge whether described triggering is false touch Send out;
When described triggering as false triggering, limit the networking behavior of described application program.
The technical scheme that embodiment of the disclosure provides can include following beneficial effect:
The method of the control flow that embodiment of the disclosure provides, is mobile network and application in the network that ought currently connect When program is triggered, judge whether this triggering is false triggering, when this triggering is false triggering, limit the networking row of this application program For.Thus decreasing the consumption of mobile network's flow, save the resource of network traffics.
The method of the control flow that above-described embodiment of the disclosure provides, by being mobile network in the current network connecting And application program is when being triggered, after judging that this application program is triggered, before predetermined instant, if instruction is detected and return table The operational order in face, when the operational order that instruction returns desktop is detected, limits the networking behavior of application program.Thus reducing The consumption of mobile network's flow, saves the resource of network traffics.
The method of the control flow that above-described embodiment of the disclosure provides, by being mobile network in the current network connecting And application program is when being triggered, using this application program as the first application program, determine in preset period of time with the first application journey Whether the second application program that sequence meets condition of similarity is triggered.When in preset period of time, the second application program is triggered, determine First application program is by false triggering, and limits the networking behavior of this first application program.Thus decreasing mobile network's flow Consume, save the resource of network traffics.
It should be appreciated that above general description and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Brief description
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the enforcement meeting the disclosure Example, and be used for explaining the principle of the disclosure together with specification.
Fig. 1 is the flow chart of a kind of method of control flow according to an exemplary embodiment for the disclosure;
Fig. 2 is the flow chart of another kind of method controlling flow according to an exemplary embodiment for the disclosure;
Fig. 3 is the flow chart of another kind of method controlling flow according to an exemplary embodiment for the disclosure;
Fig. 4 is a kind of block diagram of the device of control flow according to an exemplary embodiment for the disclosure;
Fig. 5 is the block diagram of another kind of device controlling flow according to an exemplary embodiment for the disclosure;
Fig. 6 is the block diagram of another kind of device controlling flow according to an exemplary embodiment for the disclosure;
Fig. 7 is the block diagram of another kind of device controlling flow according to an exemplary embodiment for the disclosure;
Fig. 8 is an a kind of structural representation of the device of control flow according to an exemplary embodiment for the disclosure.
Specific embodiment
Here will in detail exemplary embodiment be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with such as appended The example of the consistent apparatus and method of some aspects being described in detail in claims, the disclosure.
The term using in the disclosure is the purpose only merely for description specific embodiment, and is not intended to be limiting the disclosure. " a kind of ", " described " and " being somebody's turn to do " of singulative used in disclosure and the accompanying claims book is also intended to including most Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wraps Containing one or more associated any or all possible combination listing project.
It will be appreciated that though various information may be described using term first, second, third, etc. in the disclosure, but this A little information should not necessarily be limited by these terms.These terms are only used for same type of information is distinguished from each other out.For example, without departing from In the case of disclosure scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining ".
As shown in figure 1, Fig. 1 is the flow chart of a kind of method of control flow according to an exemplary embodiment, should Method can apply in terminal.In the present embodiment, in order to make it easy to understand, combination can connect network and can install application The terminal device of program is illustrating.It will be understood by those skilled in the art that this terminal device can be including but not limited to all As the mobile terminal device of smart mobile phone, intelligent wearable equipment, panel computer, personal digital assistant etc..The method includes Following steps:
In a step 101, when the current network connecting is mobile network and application program is triggered, judge that this triggering is No is false triggering.
In general, the network that terminal connects can be the mobile network of WLAN or mobile operator. As the mobile network that the network that terminal connects is mobile operator, the consumption of network traffics can produce campus network.In this reality Apply in example, the network service that mobile network provides for any radio communication operator, for example, mobile network can for 2G network, 3G network, 4G network and the 5G network just in evolution process etc..The disclosure is to the concrete form aspect of mobile network not Limit.
In the present embodiment, when the current network connecting is mobile network, if there being application program to be triggered, judging should Whether triggering is false triggering.Wherein, application program is triggered and can include following any one:User is by carrying out predetermined behaviour Make (clicking on icon of application program etc. in the desktop of terminal) triggering application program launching, or triggering application program is by from backstage Switch to foreground.
On the one hand, if user has carried out maloperation, false triggering does not need the application program opened, typically can be shorter Carry out returning the operation (e.g., click on HOME key, or click on return key etc.) of desktop in time, open by mistake, to exit, the application journey opening Sequence.Therefore, in one implementation, can obtain user after triggering application program to carry out return desktop operation it According to the length of this time interval, the time interval of front this period, judges whether the operation that user is carried out is maloperation.If This time interval is less than or equal to a predetermined threshold value, then the operation that explanation user is carried out is maloperation.
On the other hand, if user has carried out maloperation, false triggering does not need the application program opened, typically can be at this Before opening by mistake the application program loaded opening, carry out returning the operation of desktop.Therefore, in another kind of implementation, also may be used When user carries out the operation returning desktop, to judge the application program that is triggered whether loaded.If this is triggered The non-loaded of application program, then the operation that explanation user is carried out is maloperation.
Another aspect, when user triggers and opens application program, if the speed of operation, is easy to be grasped by mistake Make, false triggering and application program to be opened meet the application program of condition of similarity.Meet condition of similarity with application program to be opened Application program can be the corresponding picture mark position application program approximate with the picture mark position of application program to be opened, or Can be that similar to the icon of described application program to be opened (e.g., dominant hue is similar, or image similarity for corresponding icon Deng) application program.Therefore, in another implementation, can also judge in preset period of time after application program is triggered The other application program meeting condition of similarity with this application program whether is had to be triggered.If it has, the behaviour that then explanation user is carried out Work is maloperation.
In a step 102, when above-mentioned triggering is false triggering, limit the networking behavior of above-mentioned application program.
In the present embodiment, after determining that user has carried out false triggering, limit and gone by the networking of the application program of false triggering For.Specifically, can be by forbidding the network connection of this application program, thus limiting by the networking of the application program of false triggering Behavior.Or the process in running background for this application program can also be closed, thus limit by the connection of the application program of false triggering Net behavior.It is appreciated that the networking behavior of above-mentioned application program can also be limited by another way, the disclosure is in restriction The concrete mode aspect stating the networking behavior of application program does not limit.
The method of the control flow that above-described embodiment of the disclosure provides, the network that ought currently connect be mobile network and When application program is triggered, judge whether this triggering is false triggering, when this triggering is false triggering, limit the connection of this application program Net behavior.Thus decreasing the consumption of mobile network's flow, save the resource of network traffics.
As shown in Fig. 2 the flow chart of another kind of method controlling flow according to an exemplary embodiment for the Fig. 2, should Embodiment describes whether judge to trigger be the process of false triggering in detail, and the method can apply in terminal, includes following step Suddenly:
In step 201, when the current network connecting is mobile network and application program is triggered, judge this application journey After sequence is triggered, before predetermined instant, if the operational order that instruction returns desktop is detected.
In the present embodiment, when the current network connecting is mobile network and application program is triggered, can be by sentencing Break after this application program is triggered, before predetermined instant, if the operational order that instruction returns desktop is detected, to judge on State whether triggering is false triggering.If before predetermined instant, the operational order that instruction returns desktop is detected, then illustrate above-mentioned Triggering is false triggering.
Wherein, predetermined instant can include following any one:The moment that scheduled duration reaches, or this application program adds Carry the moment finishing.Wherein, scheduled duration can be arbitrarily rational time span, for example, 1 second, or 2 seconds etc., the disclosure The concrete time span aspect of scheduled duration is not limited.
In step 202., if the operational order that instruction returns desktop is detected, limit the networking behavior of application program.
In the present embodiment, if above-mentioned triggering is false triggering, limit the networking behavior of this application program.
It should be noted that for identical step in Fig. 1 embodiment, no longer gone to live in the household of one's in-laws on getting married in above-mentioned Fig. 2 embodiment State, related content can be found in Fig. 1 embodiment.
The method of the control flow that above-described embodiment of the disclosure provides, by being mobile network in the current network connecting And application program is when being triggered, after judging that this application program is triggered, before predetermined instant, if instruction is detected and return table The operational order in face, when the operational order that instruction returns desktop is detected, limits the networking behavior of application program.Thus reducing The consumption of mobile network's flow, saves the resource of network traffics.
As shown in figure 3, Fig. 3 is the flow chart of another kind of method controlling flow according to an exemplary embodiment, This embodiment describes whether judge to trigger be the process of false triggering in detail, and the method can apply in terminal, includes below Step:
In step 301, when the current network connecting is mobile network and application program is triggered, by this application program As the first application program, determine to meet the second application program of condition of similarity in preset period of time with the first application program whether It is triggered.
In the present embodiment, when the current network connecting is mobile network and application program is triggered, by this application journey Sequence is as the first application program.In preset period of time, detection and the first application program meet the second application program of condition of similarity Whether it is triggered.Therefore, first have to determine the second application program meeting condition of similarity with the first application program.Second application journey Sequence can include following one or more:The corresponding picture mark position application journey approximate with the picture mark position of the first application program Sequence, or, the similarity of the icon of corresponding icon and the first application program is more than or equal to the application program of predetermined threshold.
In general, if icon is more on the desktop of terminal, can by multiple desktop page Pagination Display these Icon.In the present embodiment, the approximate icon in position can include two kinds of situations, and a kind of situation is, in same desktop page In, the icon of neighbouring (as adjacent etc.) can be the approximate icon in position.For example, positioned at the first row first of the first desktop page The icon of row is approximate with the picture mark position of the first row secondary series positioned at the first desktop page.Another kind of situation is, different In desktop page, position is identical or icon of neighbouring (as adjacent etc.) can be the approximate icon in position.For example, positioned at first The icon of the first row first row of desktop page is approximate with the picture mark position of the first row first row positioned at the second desktop page.Or The icon of person, the icon positioned at the first row first row of the first desktop page and the first row secondary series positioned at the second desktop page Position is approximate.
Specifically, the corresponding picture mark position application program approximate with the picture mark position of the first application program can be passed through Following manner determines:First, for each application program in addition to the first application program in terminal, obtain this application program The distance between position at icon center of the position at icon center and the first application program.Judge this distance whether less than or Equal to predetermined threshold, if this distance less than or equal to predetermined threshold it is determined that the picture mark position of this application program and first The picture mark position of application program is approximate.
The similarity of the icon of corresponding icon and the first application program is more than or equal to the application program of predetermined threshold Can be determined as follows:First, for each application program in addition to the first application program in terminal, calculating should Similarity with the icon of program and the icon of the first application program.Can be from this application program of angle calculation of Icon Color The similarity of the icon of icon and the first application program it is also possible to from the icon of this application program of angle calculation of icon graphic with The similarity of the icon of the first application program.It is appreciated that as known in the art and be likely to occur in the future any other The method calculating the similarity between the icon of application program can be applied to the disclosure, and the disclosure is to specific calculation Aspect does not limit.
In the present embodiment, preset period of time can be the arbitrarily rational period, for example, 1 second, or 2 seconds etc., the disclosure pair The concrete time span aspect of preset period of time does not limit.
In step 302, when the second application program is triggered in preset period of time, determine the first application program by false touch Send out.
In step 303, when determining the first application program by false triggering, limit the networking row of this first application program For.
It should be noted that for identical step in Fig. 1 embodiment, no longer gone to live in the household of one's in-laws on getting married in above-mentioned Fig. 3 embodiment State, related content can be found in Fig. 1 embodiment.
The method of the control flow that above-described embodiment of the disclosure provides, by being mobile network in the current network connecting And application program is when being triggered, using this application program as the first application program, determine in preset period of time with the first application journey Whether the second application program that sequence meets condition of similarity is triggered.When in preset period of time, the second application program is triggered, determine First application program is by false triggering, and limits the networking behavior of this first application program.Thus decreasing mobile network's flow Consume, save the resource of network traffics.
In some optional embodiments, said method can also include:In the knot obtaining above-mentioned triggering not false triggering Before fruit, forbid that this application program is set up with network and be connected.
In the present embodiment it is contemplated that in the terminal of presently relevant technology, application program will be visited from the moment being unlocked Ask network, consumed flow data.Therefore, before obtaining to the triggering of the application program not result of false triggering, forbid answering Set up with network with program and be connected.When determining to the triggering not false triggering of application program, just allow this application program with Network is set up and is connected.The consumption of mobile network's flow so can be reduced further, contribute to the resource of saving network flow.
Although it should be noted that describe the operation of method of disclosure in the accompanying drawings with particular order, this does not require that Or hint must execute these operations according to this particular order, or having to carry out all shown operation just enables the phase The result hoped.On the contrary, the step described in flow chart can change execution sequence.Additionally or alternatively, it is convenient to omit some Step, multiple steps is merged into a step execution, and/or a step is decomposed into execution of multiple steps.
Corresponding with the embodiment of the method for aforementioned control flow, the disclosure additionally provides the device controlling flow and its is answered The embodiment of terminal.
As shown in figure 4, Fig. 4 is a kind of device block diagram of control flow according to an exemplary embodiment for the disclosure, This device includes:Judge module 401 and restriction module 402.
Wherein, judge module 401, being configured in the current network connecting is mobile network and application program is triggered When, judge whether this triggering is false triggering.
Limit module 402, be configured to, when this triggering is false triggering, limit the networking behavior of above-mentioned application program.
In some optional embodiments, above-mentioned application program is triggered including following any one:Application program launching Or application program is switched to foreground from backstage.
As shown in figure 5, Fig. 5 is another kind of device frame controlling flow according to an exemplary embodiment for the disclosure Figure, on the basis of aforementioned embodiment illustrated in fig. 4, judge module 401 can include this embodiment:First judging submodule 501.
Wherein, the first judging submodule 501, after being configured to judge that above-mentioned application program is triggered, predetermined instant it Before, if the operational order that instruction returns desktop is detected, if the operational order that instruction returns desktop is detected, this triggering is False triggering.
In some optional embodiments, above-mentioned predetermined instant includes following any one:Scheduled duration reach when Carve, or the moment of above-mentioned application program loaded.
As shown in fig. 6, Fig. 6 is another kind of device frame controlling flow according to an exemplary embodiment for the disclosure Figure, on the basis of aforementioned embodiment illustrated in fig. 4, judge module 401 can include this embodiment:Second judging submodule 601 With determination sub-module 602.
Wherein, the second judging submodule 601, is configured to above-mentioned application program as the first application program, when first Application program is triggered, judge to meet with the first application program in preset period of time the second application program of condition of similarity whether by Triggering.
Determination sub-module 602, when being configured as that the second application program is triggered in preset period of time, determines the first application Program is by false triggering.
In some optional embodiments, the second application program of meeting condition of similarity with the first application program includes following One or more:The corresponding picture mark position application program approximate with the picture mark position of the first application program;Corresponding icon with The similarity of the icon of the first application program is more than or equal to the application program of predetermined threshold.
In some optional embodiments, limiting module 402 can include:Forbid submodule or close closed submodule.
Wherein, forbid submodule, be configured to forbid the network connection of above-mentioned application program.
Close closed submodule, be configured to close the process in running background for the above-mentioned application program.
As shown in fig. 7, Fig. 7 is another kind of device frame controlling flow according to an exemplary embodiment for the disclosure Figure, on the basis of aforementioned embodiment illustrated in fig. 4, this device can further include this embodiment:Disabled module 403.
Wherein, disabled module 403, are configured to determining triggering not before false triggering, forbid above-mentioned application program with Network is set up and is connected.
It should be appreciated that said apparatus can pre-set in the terminal it is also possible to be loaded into end by modes such as downloads In end.Corresponding module in said apparatus can be cooperated with the module in terminal to realize controlling the scheme of flow.
For device embodiment, because it corresponds essentially to embodiment of the method, thus real referring to method in place of correlation The part applying example illustrates.Device embodiment described above is only schematically, wherein said as separating component The unit illustrating can be or may not be physically separate, as the part that unit shows can be or can also It is not physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to actual Need to select the purpose to realize disclosure scheme for some or all of module therein.Those of ordinary skill in the art are not paying In the case of going out creative work, you can to understand and to implement.
Accordingly, the disclosure also provides a kind of terminal, and this terminal includes processor;Refer to for storing processor and can perform The memory of order;Wherein, this processor is configured to:
When the current network connecting is mobile network and application program is triggered, judge whether described triggering is false touch Send out;
When described triggering as false triggering, limit the networking behavior of described application program.
Fig. 8 is an a kind of structural representation of the device 9900 of control flow according to an exemplary embodiment.Example As device 9900 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, and flat board sets Standby, Medical Devices, body-building equipment, personal digital assistant etc..
With reference to Fig. 8, device 9900 can include following one or more assemblies:Process assembly 9902, memory 9904, electricity Source component 9906, multimedia groupware 9908, audio-frequency assembly 9910, the interface 9912 of input/output (I/O), sensor cluster 9914, and communication component 9916.
The integrated operation of the usual control device 9900 of process assembly 9902, such as with display, call, data communication, Camera operation and record operate associated operation.Treatment element 9902 can include one or more processors 9920 to execute Instruction, to complete all or part of step of above-mentioned method.Additionally, process assembly 9902 can include one or more moulds Block, is easy to the interaction between process assembly 9902 and other assemblies.For example, process assembly 9902 can include multi-media module, To facilitate the interaction between multimedia groupware 9908 and process assembly 9902.
Memory 9904 is configured to store various types of data to support the operation in device 9900.These data Example include on device 9900 operation any application program or method instruction, contact data, telephone book data, Message, picture, video etc..Memory 9904 can by any kind of volatibility or non-volatile memory device or they Combination is realized, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Power supply module 9906 provides electric power for the various assemblies of device 9900.Power supply module 9906 can include power management System, one or more power supplys, and other generate, manage and distribute, with for device 9900, the assembly that electric power is associated.
Multimedia groupware 9908 includes the screen of one output interface of offer between described device 9900 and user.? In some embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch and passes Sensor is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sensing touch or slip be dynamic The border made, but also the detection duration related to described touch or slide and pressure.In certain embodiments, many Media component 9908 includes a front-facing camera and/or post-positioned pick-up head.When device 9900 is in operator scheme, such as shoot mould When formula or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each preposition shooting Head and post-positioned pick-up head can be the optical lens system of a fixation or have focusing and optical zoom capabilities.
Audio-frequency assembly 9910 is configured to output and/or input audio signal.For example, audio-frequency assembly 9910 includes a wheat Gram wind (MIC), when device 9900 is in operator scheme, such as call model, logging mode and speech recognition mode when, microphone quilt It is configured to receive external audio signal.The audio signal being received can be further stored in memory 9904 or via communication Assembly 9916 sends.In certain embodiments, audio-frequency assembly 9910 also includes a loudspeaker, for exports audio signal.
I/O interface 9912 is for providing interface, above-mentioned peripheral interface module between process assembly 9902 and peripheral interface module Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and Locking press button.
Sensor cluster 9914 includes one or more sensors, for providing the state of various aspects to comment for device 9900 Estimate.For example, sensor cluster 9914 can detect/the closed mode of opening of device 9900, the relative positioning of assembly, such as institute State the display that assembly is device 9900 and keypad, sensor cluster 9914 can be with detection means 9900 or device 9,900 1 The position of individual assembly changes, and user is presence or absence of with what device 9900 contacted, device 9900 orientation or acceleration/deceleration and dress Put 9900 temperature change.Sensor cluster 9914 can include proximity transducer, is configured to do not having any physics The presence of object nearby is detected during contact.Sensor cluster 9914 can also include optical sensor, and such as CMOS or ccd image sense Device, for using in imaging applications.In certain embodiments, this sensor cluster 9914 can also include acceleration sensing Device, gyro sensor, Magnetic Sensor, pressure sensor, microwave remote sensor or temperature sensor.
Communication component 9916 is configured to facilitate the communication of wired or wireless way between device 9900 and other equipment.Dress Put 9900 and can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.Exemplary at one In embodiment, communication component 9916 receives related from the broadcast singal of external broadcasting management system or broadcast via broadcast channel Information.In one exemplary embodiment, described communication component 9916 also includes near-field communication (NFC) module, to promote short distance Communication.For example, RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realizing.
In the exemplary embodiment, device 9900 can be by one or more application specific integrated circuits (ASIC), numeral Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided As included the memory 9904 instructing, above-mentioned instruction can be executed by the processor 9920 of device 9900 to complete said method.Example If, described non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
Those skilled in the art, after considering specification and putting into practice invention disclosed herein, will readily occur to its of the disclosure Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or Person's adaptations are followed the general principle of the disclosure and are included the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments be considered only as exemplary, the true scope of the disclosure and spirit by following Claim is pointed out.
It should be appreciated that the disclosure is not limited to be described above and precision architecture illustrated in the accompanying drawings, and And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure only to be limited by appended claim.

Claims (17)

1. a kind of method controlling flow is it is characterised in that methods described includes:
When the current network connecting is mobile network and application program is triggered, judge whether described triggering is false triggering;
When described triggering as false triggering, limit the networking behavior of described application program.
2. method according to claim 1 is it is characterised in that described application program is triggered including following any one: Application program launching or application program are switched to foreground from backstage.
3. method according to claim 1 is it is characterised in that described judge whether described triggering is false triggering, including:
After judging that described application program is triggered, before predetermined instant, if the operational order that instruction returns desktop is detected; If the operational order that instruction returns desktop is detected, described triggering is false triggering.
4. method according to claim 3 is it is characterised in that described predetermined instant includes following any one:
The moment that scheduled duration reaches;
The moment of described application program loaded.
5. method according to claim 1 is it is characterised in that described judge whether described triggering is false triggering, including:
Using described application program as the first application program, when described first application program is triggered, judge in preset period of time Whether the second application program meeting condition of similarity with described first application program is triggered;
When the second application program described in preset period of time is triggered, determine described first application program by false triggering.
6. method according to claim 5 is it is characterised in that described meet condition of similarity with described first application program Second application program includes following one or more:
The corresponding picture mark position application program approximate with the picture mark position of described first application program;
The similarity of the icon of corresponding icon and described first application program is more than or equal to the application program of predetermined threshold.
7. method according to claim 1 is it is characterised in that the networking behavior of the described application program of described restriction, including:
Forbid the network connection of described application program;Or
Close the process in running background for the described application program.
8. method according to claim 1 is it is characterised in that methods described also includes:
Before the described triggering of determination not false triggering, forbid that described application program is set up with network and be connected.
9. a kind of device controlling flow is it is characterised in that described device includes:
Judge module, is configured to, when the current network connecting is mobile network and application program is triggered, judge described touching Whether send out is false triggering;
Limit module, be configured to limit the networking behavior of described application program in described triggering as false triggering.
10. device according to claim 9 is it is characterised in that described application program is triggered including following any one: Application program launching or application program are switched to foreground from backstage.
11. devices according to claim 9 are it is characterised in that described judge module includes:
First judging submodule, after being configured to judge that described application program is triggered, before predetermined instant, if detect Indicate the operational order returning desktop;If the operational order that instruction returns desktop is detected, described triggering is false triggering.
12. devices according to claim 11 are it is characterised in that described predetermined instant includes following any one:
The moment that scheduled duration reaches;
The moment of described application program loaded.
13. devices according to claim 9 are it is characterised in that described judge module includes:
Second judging submodule, is configured to described application program as the first application program, when described first application program It is triggered, judge whether the second application program being met condition of similarity in preset period of time with described first application program is touched Send out;
Determination sub-module, when being configured as that described second application program is triggered in preset period of time, determines that described first should With program by false triggering.
14. devices according to claim 13 are it is characterised in that described meet condition of similarity with described first application program The second application program include following one or more:
The corresponding picture mark position application program approximate with the picture mark position of described first application program;
The similarity of the icon of corresponding icon and described first application program is more than or equal to the application program of predetermined threshold.
15. devices according to claim 9 are it is characterised in that described restriction module includes:
Forbid submodule, be configured to forbid the network connection of described application program;Or
Close closed submodule, be configured to close the process in running background for the described application program.
16. devices according to claim 9 are it is characterised in that described device also includes:
Disabled module, is configured to, before the described triggering of determination not false triggering, forbid that described application program is set up with network Connect.
A kind of 17. terminals are it is characterised in that include:
Processor;
For storing the memory of processor executable;
Wherein, described processor is configured to:
When the current network connecting is mobile network and application program is triggered, judge whether described triggering is false triggering;
When described triggering as false triggering, limit the networking behavior of described application program.
CN201610728648.XA 2016-08-25 2016-08-25 Control the method, apparatus and terminal of flow Active CN106407796B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610728648.XA CN106407796B (en) 2016-08-25 2016-08-25 Control the method, apparatus and terminal of flow

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610728648.XA CN106407796B (en) 2016-08-25 2016-08-25 Control the method, apparatus and terminal of flow

Publications (2)

Publication Number Publication Date
CN106407796A true CN106407796A (en) 2017-02-15
CN106407796B CN106407796B (en) 2019-02-12

Family

ID=58004533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610728648.XA Active CN106407796B (en) 2016-08-25 2016-08-25 Control the method, apparatus and terminal of flow

Country Status (1)

Country Link
CN (1) CN106407796B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108762493A (en) * 2018-05-15 2018-11-06 维沃移动通信有限公司 A kind of method and mobile terminal of control application program

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581671A (en) * 2015-01-21 2015-04-29 深圳市中兴移动通信有限公司 Prompting method and device for data traffic
CN104660808A (en) * 2015-02-04 2015-05-27 小米科技有限责任公司 Communication control method and related communication equipment
CN104850443A (en) * 2015-05-29 2015-08-19 努比亚技术有限公司 Method for shutting down false start-up application program and mobile terminal
CN105260680A (en) * 2014-07-14 2016-01-20 中兴通讯股份有限公司 Touch screen-based operation processing method and device
CN105554255A (en) * 2015-12-09 2016-05-04 小米科技有限责任公司 Operation control method and device for terminal equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105260680A (en) * 2014-07-14 2016-01-20 中兴通讯股份有限公司 Touch screen-based operation processing method and device
CN104581671A (en) * 2015-01-21 2015-04-29 深圳市中兴移动通信有限公司 Prompting method and device for data traffic
CN104660808A (en) * 2015-02-04 2015-05-27 小米科技有限责任公司 Communication control method and related communication equipment
CN104850443A (en) * 2015-05-29 2015-08-19 努比亚技术有限公司 Method for shutting down false start-up application program and mobile terminal
CN105554255A (en) * 2015-12-09 2016-05-04 小米科技有限责任公司 Operation control method and device for terminal equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108762493A (en) * 2018-05-15 2018-11-06 维沃移动通信有限公司 A kind of method and mobile terminal of control application program

Also Published As

Publication number Publication date
CN106407796B (en) 2019-02-12

Similar Documents

Publication Publication Date Title
CN104239094B (en) Control method, device and the terminal device of background application
CN106951884A (en) Gather method, device and the electronic equipment of fingerprint
CN105677460A (en) Application processing method and apparatus
CN105807873A (en) Temperature control method and device
CN105607834A (en) Screen control method and apparatus as well as terminal
CN104503740A (en) Memory management method and device
CN105160239A (en) Application program access restriction method and apparatus
CN105487680B (en) Method, apparatus and terminal for terminal screenshotss
CN105955441B (en) Application management method and device
CN105433904A (en) Sleep state detection method, device and system
CN105975301A (en) Memory cleaning method and device, and electronic equipment
CN107608561A (en) Touch-screen control method and device
CN105528055A (en) Running object processing method and device
CN106648730A (en) Processing method and device of abnormal application
CN105807894A (en) Processing method and device of lock holding of application
CN105390120A (en) Bright screen control method and device
CN105187671A (en) Recording method and device
CN106455002A (en) Wireless search method and device, and terminal
CN104780574A (en) Method and device for network switchover
CN106657647A (en) Incoming call processing method and device and mobile terminal
CN106021130A (en) Memory processing method and device
CN106231072A (en) The control method of prompting message, device and terminal unit
CN105204712A (en) Method and device for displaying icons of folder
CN104714735A (en) Page scrolling display method and device
CN104965746B (en) The method and device of quick start

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant