CN106407796A - Method and device for controlling flow, and terminal - Google Patents
Method and device for controlling flow, and terminal Download PDFInfo
- Publication number
- CN106407796A CN106407796A CN201610728648.XA CN201610728648A CN106407796A CN 106407796 A CN106407796 A CN 106407796A CN 201610728648 A CN201610728648 A CN 201610728648A CN 106407796 A CN106407796 A CN 106407796A
- Authority
- CN
- China
- Prior art keywords
- application program
- triggering
- triggered
- false triggering
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Abstract
The application provides a method and device for controlling flow, and a terminal. One specific mode of execution of the method is as follows: judging whether the triggering is the false triggering when the currently connected network is a mobile network and an application program is triggered; and restricting the networking behavior of the application program when the triggering is the false trigger. Through the adoption of the method disclosed by the invention, the consumption of the mobile network flow is reduced, and the network flow resource is saved.
Description
Technical field
It relates to field of terminal technology, particularly to a kind of method controlling flow, device and terminal.
Background technology
When user is by the desktop clicking trigger of terminal application program to be opened, it sometimes appear that maloperation, open by mistake
Open other application programs, desktop after the user discover that, can have been immediately returned to, and clicking trigger application program to be opened again.But
It is that being opened by mistake the application program opening may in running background, and be possible to access network.If the network that terminal connects is to move
The network of dynamic operator, then can consume mobile network's flow, thus wasting the resource of network traffics.
Content of the invention
In order to solve above-mentioned technical problem, the disclosure provides a kind of method controlling flow, device and terminal.
According to the embodiment of the present disclosure in a first aspect, provide a kind of control flow method, including:
When the current network connecting is mobile network and application program is triggered, judge whether described triggering is false touch
Send out;
When described triggering as false triggering, limit the networking behavior of described application program.
Optionally, described application program is triggered including following any one:Application program launching or application program by from
Backstage switches to foreground.
Optionally, described judge whether described triggering is false triggering, including:
After judging that described application program is triggered, before predetermined instant, if the operation that instruction returns desktop is detected
Instruction;If the operational order that instruction returns desktop is detected, described triggering is false triggering.
Optionally, described predetermined instant includes following any one:
The moment that scheduled duration reaches;
The moment of described application program loaded.
Optionally, described judge whether described triggering is false triggering, including:
Using described application program as the first application program, when described first application program is triggered, judge when default
Whether the second application program meeting condition of similarity with described first application program in section is triggered;
When the second application program described in preset period of time is triggered, determine described first application program by false triggering.
Optionally, described the second application program meeting condition of similarity with described first application program include following one or
Multinomial:
The corresponding picture mark position application program approximate with the picture mark position of described first application program;
The similarity of the icon of corresponding icon and described first application program is more than or equal to the application of predetermined threshold
Program.
Optionally, the described networking behavior limiting described application program, including:
Forbid the network connection of described application program;Or
Close the process in running background for the described application program.
Optionally, methods described also includes:
Before the described triggering of determination not false triggering, forbid that described application program is set up with network and be connected.
According to the second aspect of the embodiment of the present disclosure, provide a kind of device controlling flow, including:
Judge module, is configured to, when the current network connecting is mobile network and application program is triggered, judge institute
State whether triggering is false triggering;
Limit module, be configured to limit the networking behavior of described application program in described triggering as false triggering.
Optionally, described application program is triggered including following any one:Application program launching or application program by from
Backstage switches to foreground.
Optionally, described judge module includes:
First judging submodule, after being configured to judge that described application program is triggered, before predetermined instant, if inspection
Measure the operational order that instruction returns desktop;If the operational order that instruction returns desktop is detected, described triggering is false triggering.
Optionally, described predetermined instant includes following any one:
The moment that scheduled duration reaches;
The moment of described application program loaded.
Optionally, described judge module includes:
Second judging submodule, is configured to described application program as the first application program, when the described first application
Program is triggered, judge to meet with described first application program in preset period of time the second application program of condition of similarity whether by
Triggering;
Determination sub-module, when being configured as that described second application program is triggered in preset period of time, determines described
One application program is by false triggering.
Optionally, described the second application program meeting condition of similarity with described first application program include following one or
Multinomial:
The corresponding picture mark position application program approximate with the picture mark position of described first application program;
The similarity of the icon of corresponding icon and described first application program is more than or equal to the application of predetermined threshold
Program.
Optionally, described restriction module includes:
Forbid submodule, be configured to forbid the network connection of described application program;Or
Close closed submodule, be configured to close the process in running background for the described application program.
Optionally, described device also includes:
Disabled module, is configured to, before the described triggering of determination not false triggering, forbid described application program and network
Set up and connect.
According to the third aspect of the embodiment of the present disclosure, provide a kind of terminal, including:
Processor;
For storing the memory of processor executable;
Wherein, described processor is configured to:
When the current network connecting is mobile network and application program is triggered, judge whether described triggering is false touch
Send out;
When described triggering as false triggering, limit the networking behavior of described application program.
The technical scheme that embodiment of the disclosure provides can include following beneficial effect:
The method of the control flow that embodiment of the disclosure provides, is mobile network and application in the network that ought currently connect
When program is triggered, judge whether this triggering is false triggering, when this triggering is false triggering, limit the networking row of this application program
For.Thus decreasing the consumption of mobile network's flow, save the resource of network traffics.
The method of the control flow that above-described embodiment of the disclosure provides, by being mobile network in the current network connecting
And application program is when being triggered, after judging that this application program is triggered, before predetermined instant, if instruction is detected and return table
The operational order in face, when the operational order that instruction returns desktop is detected, limits the networking behavior of application program.Thus reducing
The consumption of mobile network's flow, saves the resource of network traffics.
The method of the control flow that above-described embodiment of the disclosure provides, by being mobile network in the current network connecting
And application program is when being triggered, using this application program as the first application program, determine in preset period of time with the first application journey
Whether the second application program that sequence meets condition of similarity is triggered.When in preset period of time, the second application program is triggered, determine
First application program is by false triggering, and limits the networking behavior of this first application program.Thus decreasing mobile network's flow
Consume, save the resource of network traffics.
It should be appreciated that above general description and detailed description hereinafter are only exemplary and explanatory, not
The disclosure can be limited.
Brief description
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the enforcement meeting the disclosure
Example, and be used for explaining the principle of the disclosure together with specification.
Fig. 1 is the flow chart of a kind of method of control flow according to an exemplary embodiment for the disclosure;
Fig. 2 is the flow chart of another kind of method controlling flow according to an exemplary embodiment for the disclosure;
Fig. 3 is the flow chart of another kind of method controlling flow according to an exemplary embodiment for the disclosure;
Fig. 4 is a kind of block diagram of the device of control flow according to an exemplary embodiment for the disclosure;
Fig. 5 is the block diagram of another kind of device controlling flow according to an exemplary embodiment for the disclosure;
Fig. 6 is the block diagram of another kind of device controlling flow according to an exemplary embodiment for the disclosure;
Fig. 7 is the block diagram of another kind of device controlling flow according to an exemplary embodiment for the disclosure;
Fig. 8 is an a kind of structural representation of the device of control flow according to an exemplary embodiment for the disclosure.
Specific embodiment
Here will in detail exemplary embodiment be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with such as appended
The example of the consistent apparatus and method of some aspects being described in detail in claims, the disclosure.
The term using in the disclosure is the purpose only merely for description specific embodiment, and is not intended to be limiting the disclosure.
" a kind of ", " described " and " being somebody's turn to do " of singulative used in disclosure and the accompanying claims book is also intended to including most
Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wraps
Containing one or more associated any or all possible combination listing project.
It will be appreciated that though various information may be described using term first, second, third, etc. in the disclosure, but this
A little information should not necessarily be limited by these terms.These terms are only used for same type of information is distinguished from each other out.For example, without departing from
In the case of disclosure scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as
One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determining ".
As shown in figure 1, Fig. 1 is the flow chart of a kind of method of control flow according to an exemplary embodiment, should
Method can apply in terminal.In the present embodiment, in order to make it easy to understand, combination can connect network and can install application
The terminal device of program is illustrating.It will be understood by those skilled in the art that this terminal device can be including but not limited to all
As the mobile terminal device of smart mobile phone, intelligent wearable equipment, panel computer, personal digital assistant etc..The method includes
Following steps:
In a step 101, when the current network connecting is mobile network and application program is triggered, judge that this triggering is
No is false triggering.
In general, the network that terminal connects can be the mobile network of WLAN or mobile operator.
As the mobile network that the network that terminal connects is mobile operator, the consumption of network traffics can produce campus network.In this reality
Apply in example, the network service that mobile network provides for any radio communication operator, for example, mobile network can for 2G network,
3G network, 4G network and the 5G network just in evolution process etc..The disclosure is to the concrete form aspect of mobile network not
Limit.
In the present embodiment, when the current network connecting is mobile network, if there being application program to be triggered, judging should
Whether triggering is false triggering.Wherein, application program is triggered and can include following any one:User is by carrying out predetermined behaviour
Make (clicking on icon of application program etc. in the desktop of terminal) triggering application program launching, or triggering application program is by from backstage
Switch to foreground.
On the one hand, if user has carried out maloperation, false triggering does not need the application program opened, typically can be shorter
Carry out returning the operation (e.g., click on HOME key, or click on return key etc.) of desktop in time, open by mistake, to exit, the application journey opening
Sequence.Therefore, in one implementation, can obtain user after triggering application program to carry out return desktop operation it
According to the length of this time interval, the time interval of front this period, judges whether the operation that user is carried out is maloperation.If
This time interval is less than or equal to a predetermined threshold value, then the operation that explanation user is carried out is maloperation.
On the other hand, if user has carried out maloperation, false triggering does not need the application program opened, typically can be at this
Before opening by mistake the application program loaded opening, carry out returning the operation of desktop.Therefore, in another kind of implementation, also may be used
When user carries out the operation returning desktop, to judge the application program that is triggered whether loaded.If this is triggered
The non-loaded of application program, then the operation that explanation user is carried out is maloperation.
Another aspect, when user triggers and opens application program, if the speed of operation, is easy to be grasped by mistake
Make, false triggering and application program to be opened meet the application program of condition of similarity.Meet condition of similarity with application program to be opened
Application program can be the corresponding picture mark position application program approximate with the picture mark position of application program to be opened, or
Can be that similar to the icon of described application program to be opened (e.g., dominant hue is similar, or image similarity for corresponding icon
Deng) application program.Therefore, in another implementation, can also judge in preset period of time after application program is triggered
The other application program meeting condition of similarity with this application program whether is had to be triggered.If it has, the behaviour that then explanation user is carried out
Work is maloperation.
In a step 102, when above-mentioned triggering is false triggering, limit the networking behavior of above-mentioned application program.
In the present embodiment, after determining that user has carried out false triggering, limit and gone by the networking of the application program of false triggering
For.Specifically, can be by forbidding the network connection of this application program, thus limiting by the networking of the application program of false triggering
Behavior.Or the process in running background for this application program can also be closed, thus limit by the connection of the application program of false triggering
Net behavior.It is appreciated that the networking behavior of above-mentioned application program can also be limited by another way, the disclosure is in restriction
The concrete mode aspect stating the networking behavior of application program does not limit.
The method of the control flow that above-described embodiment of the disclosure provides, the network that ought currently connect be mobile network and
When application program is triggered, judge whether this triggering is false triggering, when this triggering is false triggering, limit the connection of this application program
Net behavior.Thus decreasing the consumption of mobile network's flow, save the resource of network traffics.
As shown in Fig. 2 the flow chart of another kind of method controlling flow according to an exemplary embodiment for the Fig. 2, should
Embodiment describes whether judge to trigger be the process of false triggering in detail, and the method can apply in terminal, includes following step
Suddenly:
In step 201, when the current network connecting is mobile network and application program is triggered, judge this application journey
After sequence is triggered, before predetermined instant, if the operational order that instruction returns desktop is detected.
In the present embodiment, when the current network connecting is mobile network and application program is triggered, can be by sentencing
Break after this application program is triggered, before predetermined instant, if the operational order that instruction returns desktop is detected, to judge on
State whether triggering is false triggering.If before predetermined instant, the operational order that instruction returns desktop is detected, then illustrate above-mentioned
Triggering is false triggering.
Wherein, predetermined instant can include following any one:The moment that scheduled duration reaches, or this application program adds
Carry the moment finishing.Wherein, scheduled duration can be arbitrarily rational time span, for example, 1 second, or 2 seconds etc., the disclosure
The concrete time span aspect of scheduled duration is not limited.
In step 202., if the operational order that instruction returns desktop is detected, limit the networking behavior of application program.
In the present embodiment, if above-mentioned triggering is false triggering, limit the networking behavior of this application program.
It should be noted that for identical step in Fig. 1 embodiment, no longer gone to live in the household of one's in-laws on getting married in above-mentioned Fig. 2 embodiment
State, related content can be found in Fig. 1 embodiment.
The method of the control flow that above-described embodiment of the disclosure provides, by being mobile network in the current network connecting
And application program is when being triggered, after judging that this application program is triggered, before predetermined instant, if instruction is detected and return table
The operational order in face, when the operational order that instruction returns desktop is detected, limits the networking behavior of application program.Thus reducing
The consumption of mobile network's flow, saves the resource of network traffics.
As shown in figure 3, Fig. 3 is the flow chart of another kind of method controlling flow according to an exemplary embodiment,
This embodiment describes whether judge to trigger be the process of false triggering in detail, and the method can apply in terminal, includes below
Step:
In step 301, when the current network connecting is mobile network and application program is triggered, by this application program
As the first application program, determine to meet the second application program of condition of similarity in preset period of time with the first application program whether
It is triggered.
In the present embodiment, when the current network connecting is mobile network and application program is triggered, by this application journey
Sequence is as the first application program.In preset period of time, detection and the first application program meet the second application program of condition of similarity
Whether it is triggered.Therefore, first have to determine the second application program meeting condition of similarity with the first application program.Second application journey
Sequence can include following one or more:The corresponding picture mark position application journey approximate with the picture mark position of the first application program
Sequence, or, the similarity of the icon of corresponding icon and the first application program is more than or equal to the application program of predetermined threshold.
In general, if icon is more on the desktop of terminal, can by multiple desktop page Pagination Display these
Icon.In the present embodiment, the approximate icon in position can include two kinds of situations, and a kind of situation is, in same desktop page
In, the icon of neighbouring (as adjacent etc.) can be the approximate icon in position.For example, positioned at the first row first of the first desktop page
The icon of row is approximate with the picture mark position of the first row secondary series positioned at the first desktop page.Another kind of situation is, different
In desktop page, position is identical or icon of neighbouring (as adjacent etc.) can be the approximate icon in position.For example, positioned at first
The icon of the first row first row of desktop page is approximate with the picture mark position of the first row first row positioned at the second desktop page.Or
The icon of person, the icon positioned at the first row first row of the first desktop page and the first row secondary series positioned at the second desktop page
Position is approximate.
Specifically, the corresponding picture mark position application program approximate with the picture mark position of the first application program can be passed through
Following manner determines:First, for each application program in addition to the first application program in terminal, obtain this application program
The distance between position at icon center of the position at icon center and the first application program.Judge this distance whether less than or
Equal to predetermined threshold, if this distance less than or equal to predetermined threshold it is determined that the picture mark position of this application program and first
The picture mark position of application program is approximate.
The similarity of the icon of corresponding icon and the first application program is more than or equal to the application program of predetermined threshold
Can be determined as follows:First, for each application program in addition to the first application program in terminal, calculating should
Similarity with the icon of program and the icon of the first application program.Can be from this application program of angle calculation of Icon Color
The similarity of the icon of icon and the first application program it is also possible to from the icon of this application program of angle calculation of icon graphic with
The similarity of the icon of the first application program.It is appreciated that as known in the art and be likely to occur in the future any other
The method calculating the similarity between the icon of application program can be applied to the disclosure, and the disclosure is to specific calculation
Aspect does not limit.
In the present embodiment, preset period of time can be the arbitrarily rational period, for example, 1 second, or 2 seconds etc., the disclosure pair
The concrete time span aspect of preset period of time does not limit.
In step 302, when the second application program is triggered in preset period of time, determine the first application program by false touch
Send out.
In step 303, when determining the first application program by false triggering, limit the networking row of this first application program
For.
It should be noted that for identical step in Fig. 1 embodiment, no longer gone to live in the household of one's in-laws on getting married in above-mentioned Fig. 3 embodiment
State, related content can be found in Fig. 1 embodiment.
The method of the control flow that above-described embodiment of the disclosure provides, by being mobile network in the current network connecting
And application program is when being triggered, using this application program as the first application program, determine in preset period of time with the first application journey
Whether the second application program that sequence meets condition of similarity is triggered.When in preset period of time, the second application program is triggered, determine
First application program is by false triggering, and limits the networking behavior of this first application program.Thus decreasing mobile network's flow
Consume, save the resource of network traffics.
In some optional embodiments, said method can also include:In the knot obtaining above-mentioned triggering not false triggering
Before fruit, forbid that this application program is set up with network and be connected.
In the present embodiment it is contemplated that in the terminal of presently relevant technology, application program will be visited from the moment being unlocked
Ask network, consumed flow data.Therefore, before obtaining to the triggering of the application program not result of false triggering, forbid answering
Set up with network with program and be connected.When determining to the triggering not false triggering of application program, just allow this application program with
Network is set up and is connected.The consumption of mobile network's flow so can be reduced further, contribute to the resource of saving network flow.
Although it should be noted that describe the operation of method of disclosure in the accompanying drawings with particular order, this does not require that
Or hint must execute these operations according to this particular order, or having to carry out all shown operation just enables the phase
The result hoped.On the contrary, the step described in flow chart can change execution sequence.Additionally or alternatively, it is convenient to omit some
Step, multiple steps is merged into a step execution, and/or a step is decomposed into execution of multiple steps.
Corresponding with the embodiment of the method for aforementioned control flow, the disclosure additionally provides the device controlling flow and its is answered
The embodiment of terminal.
As shown in figure 4, Fig. 4 is a kind of device block diagram of control flow according to an exemplary embodiment for the disclosure,
This device includes:Judge module 401 and restriction module 402.
Wherein, judge module 401, being configured in the current network connecting is mobile network and application program is triggered
When, judge whether this triggering is false triggering.
Limit module 402, be configured to, when this triggering is false triggering, limit the networking behavior of above-mentioned application program.
In some optional embodiments, above-mentioned application program is triggered including following any one:Application program launching
Or application program is switched to foreground from backstage.
As shown in figure 5, Fig. 5 is another kind of device frame controlling flow according to an exemplary embodiment for the disclosure
Figure, on the basis of aforementioned embodiment illustrated in fig. 4, judge module 401 can include this embodiment:First judging submodule 501.
Wherein, the first judging submodule 501, after being configured to judge that above-mentioned application program is triggered, predetermined instant it
Before, if the operational order that instruction returns desktop is detected, if the operational order that instruction returns desktop is detected, this triggering is
False triggering.
In some optional embodiments, above-mentioned predetermined instant includes following any one:Scheduled duration reach when
Carve, or the moment of above-mentioned application program loaded.
As shown in fig. 6, Fig. 6 is another kind of device frame controlling flow according to an exemplary embodiment for the disclosure
Figure, on the basis of aforementioned embodiment illustrated in fig. 4, judge module 401 can include this embodiment:Second judging submodule 601
With determination sub-module 602.
Wherein, the second judging submodule 601, is configured to above-mentioned application program as the first application program, when first
Application program is triggered, judge to meet with the first application program in preset period of time the second application program of condition of similarity whether by
Triggering.
Determination sub-module 602, when being configured as that the second application program is triggered in preset period of time, determines the first application
Program is by false triggering.
In some optional embodiments, the second application program of meeting condition of similarity with the first application program includes following
One or more:The corresponding picture mark position application program approximate with the picture mark position of the first application program;Corresponding icon with
The similarity of the icon of the first application program is more than or equal to the application program of predetermined threshold.
In some optional embodiments, limiting module 402 can include:Forbid submodule or close closed submodule.
Wherein, forbid submodule, be configured to forbid the network connection of above-mentioned application program.
Close closed submodule, be configured to close the process in running background for the above-mentioned application program.
As shown in fig. 7, Fig. 7 is another kind of device frame controlling flow according to an exemplary embodiment for the disclosure
Figure, on the basis of aforementioned embodiment illustrated in fig. 4, this device can further include this embodiment:Disabled module 403.
Wherein, disabled module 403, are configured to determining triggering not before false triggering, forbid above-mentioned application program with
Network is set up and is connected.
It should be appreciated that said apparatus can pre-set in the terminal it is also possible to be loaded into end by modes such as downloads
In end.Corresponding module in said apparatus can be cooperated with the module in terminal to realize controlling the scheme of flow.
For device embodiment, because it corresponds essentially to embodiment of the method, thus real referring to method in place of correlation
The part applying example illustrates.Device embodiment described above is only schematically, wherein said as separating component
The unit illustrating can be or may not be physically separate, as the part that unit shows can be or can also
It is not physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to actual
Need to select the purpose to realize disclosure scheme for some or all of module therein.Those of ordinary skill in the art are not paying
In the case of going out creative work, you can to understand and to implement.
Accordingly, the disclosure also provides a kind of terminal, and this terminal includes processor;Refer to for storing processor and can perform
The memory of order;Wherein, this processor is configured to:
When the current network connecting is mobile network and application program is triggered, judge whether described triggering is false touch
Send out;
When described triggering as false triggering, limit the networking behavior of described application program.
Fig. 8 is an a kind of structural representation of the device 9900 of control flow according to an exemplary embodiment.Example
As device 9900 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, and flat board sets
Standby, Medical Devices, body-building equipment, personal digital assistant etc..
With reference to Fig. 8, device 9900 can include following one or more assemblies:Process assembly 9902, memory 9904, electricity
Source component 9906, multimedia groupware 9908, audio-frequency assembly 9910, the interface 9912 of input/output (I/O), sensor cluster
9914, and communication component 9916.
The integrated operation of the usual control device 9900 of process assembly 9902, such as with display, call, data communication,
Camera operation and record operate associated operation.Treatment element 9902 can include one or more processors 9920 to execute
Instruction, to complete all or part of step of above-mentioned method.Additionally, process assembly 9902 can include one or more moulds
Block, is easy to the interaction between process assembly 9902 and other assemblies.For example, process assembly 9902 can include multi-media module,
To facilitate the interaction between multimedia groupware 9908 and process assembly 9902.
Memory 9904 is configured to store various types of data to support the operation in device 9900.These data
Example include on device 9900 operation any application program or method instruction, contact data, telephone book data,
Message, picture, video etc..Memory 9904 can by any kind of volatibility or non-volatile memory device or they
Combination is realized, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable can
Program read-only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash memory
Reservoir, disk or CD.
Power supply module 9906 provides electric power for the various assemblies of device 9900.Power supply module 9906 can include power management
System, one or more power supplys, and other generate, manage and distribute, with for device 9900, the assembly that electric power is associated.
Multimedia groupware 9908 includes the screen of one output interface of offer between described device 9900 and user.?
In some embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel,
Screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch and passes
Sensor is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sensing touch or slip be dynamic
The border made, but also the detection duration related to described touch or slide and pressure.In certain embodiments, many
Media component 9908 includes a front-facing camera and/or post-positioned pick-up head.When device 9900 is in operator scheme, such as shoot mould
When formula or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each preposition shooting
Head and post-positioned pick-up head can be the optical lens system of a fixation or have focusing and optical zoom capabilities.
Audio-frequency assembly 9910 is configured to output and/or input audio signal.For example, audio-frequency assembly 9910 includes a wheat
Gram wind (MIC), when device 9900 is in operator scheme, such as call model, logging mode and speech recognition mode when, microphone quilt
It is configured to receive external audio signal.The audio signal being received can be further stored in memory 9904 or via communication
Assembly 9916 sends.In certain embodiments, audio-frequency assembly 9910 also includes a loudspeaker, for exports audio signal.
I/O interface 9912 is for providing interface, above-mentioned peripheral interface module between process assembly 9902 and peripheral interface module
Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and
Locking press button.
Sensor cluster 9914 includes one or more sensors, for providing the state of various aspects to comment for device 9900
Estimate.For example, sensor cluster 9914 can detect/the closed mode of opening of device 9900, the relative positioning of assembly, such as institute
State the display that assembly is device 9900 and keypad, sensor cluster 9914 can be with detection means 9900 or device 9,900 1
The position of individual assembly changes, and user is presence or absence of with what device 9900 contacted, device 9900 orientation or acceleration/deceleration and dress
Put 9900 temperature change.Sensor cluster 9914 can include proximity transducer, is configured to do not having any physics
The presence of object nearby is detected during contact.Sensor cluster 9914 can also include optical sensor, and such as CMOS or ccd image sense
Device, for using in imaging applications.In certain embodiments, this sensor cluster 9914 can also include acceleration sensing
Device, gyro sensor, Magnetic Sensor, pressure sensor, microwave remote sensor or temperature sensor.
Communication component 9916 is configured to facilitate the communication of wired or wireless way between device 9900 and other equipment.Dress
Put 9900 and can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.Exemplary at one
In embodiment, communication component 9916 receives related from the broadcast singal of external broadcasting management system or broadcast via broadcast channel
Information.In one exemplary embodiment, described communication component 9916 also includes near-field communication (NFC) module, to promote short distance
Communication.For example, RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband can be based in NFC module
(UWB) technology, bluetooth (BT) technology and other technologies are realizing.
In the exemplary embodiment, device 9900 can be by one or more application specific integrated circuits (ASIC), numeral
Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
As included the memory 9904 instructing, above-mentioned instruction can be executed by the processor 9920 of device 9900 to complete said method.Example
If, described non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft
Disk and optical data storage devices etc..
Those skilled in the art, after considering specification and putting into practice invention disclosed herein, will readily occur to its of the disclosure
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or
Person's adaptations are followed the general principle of the disclosure and are included the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments be considered only as exemplary, the true scope of the disclosure and spirit by following
Claim is pointed out.
It should be appreciated that the disclosure is not limited to be described above and precision architecture illustrated in the accompanying drawings, and
And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure only to be limited by appended claim.
Claims (17)
1. a kind of method controlling flow is it is characterised in that methods described includes:
When the current network connecting is mobile network and application program is triggered, judge whether described triggering is false triggering;
When described triggering as false triggering, limit the networking behavior of described application program.
2. method according to claim 1 is it is characterised in that described application program is triggered including following any one:
Application program launching or application program are switched to foreground from backstage.
3. method according to claim 1 is it is characterised in that described judge whether described triggering is false triggering, including:
After judging that described application program is triggered, before predetermined instant, if the operational order that instruction returns desktop is detected;
If the operational order that instruction returns desktop is detected, described triggering is false triggering.
4. method according to claim 3 is it is characterised in that described predetermined instant includes following any one:
The moment that scheduled duration reaches;
The moment of described application program loaded.
5. method according to claim 1 is it is characterised in that described judge whether described triggering is false triggering, including:
Using described application program as the first application program, when described first application program is triggered, judge in preset period of time
Whether the second application program meeting condition of similarity with described first application program is triggered;
When the second application program described in preset period of time is triggered, determine described first application program by false triggering.
6. method according to claim 5 is it is characterised in that described meet condition of similarity with described first application program
Second application program includes following one or more:
The corresponding picture mark position application program approximate with the picture mark position of described first application program;
The similarity of the icon of corresponding icon and described first application program is more than or equal to the application program of predetermined threshold.
7. method according to claim 1 is it is characterised in that the networking behavior of the described application program of described restriction, including:
Forbid the network connection of described application program;Or
Close the process in running background for the described application program.
8. method according to claim 1 is it is characterised in that methods described also includes:
Before the described triggering of determination not false triggering, forbid that described application program is set up with network and be connected.
9. a kind of device controlling flow is it is characterised in that described device includes:
Judge module, is configured to, when the current network connecting is mobile network and application program is triggered, judge described touching
Whether send out is false triggering;
Limit module, be configured to limit the networking behavior of described application program in described triggering as false triggering.
10. device according to claim 9 is it is characterised in that described application program is triggered including following any one:
Application program launching or application program are switched to foreground from backstage.
11. devices according to claim 9 are it is characterised in that described judge module includes:
First judging submodule, after being configured to judge that described application program is triggered, before predetermined instant, if detect
Indicate the operational order returning desktop;If the operational order that instruction returns desktop is detected, described triggering is false triggering.
12. devices according to claim 11 are it is characterised in that described predetermined instant includes following any one:
The moment that scheduled duration reaches;
The moment of described application program loaded.
13. devices according to claim 9 are it is characterised in that described judge module includes:
Second judging submodule, is configured to described application program as the first application program, when described first application program
It is triggered, judge whether the second application program being met condition of similarity in preset period of time with described first application program is touched
Send out;
Determination sub-module, when being configured as that described second application program is triggered in preset period of time, determines that described first should
With program by false triggering.
14. devices according to claim 13 are it is characterised in that described meet condition of similarity with described first application program
The second application program include following one or more:
The corresponding picture mark position application program approximate with the picture mark position of described first application program;
The similarity of the icon of corresponding icon and described first application program is more than or equal to the application program of predetermined threshold.
15. devices according to claim 9 are it is characterised in that described restriction module includes:
Forbid submodule, be configured to forbid the network connection of described application program;Or
Close closed submodule, be configured to close the process in running background for the described application program.
16. devices according to claim 9 are it is characterised in that described device also includes:
Disabled module, is configured to, before the described triggering of determination not false triggering, forbid that described application program is set up with network
Connect.
A kind of 17. terminals are it is characterised in that include:
Processor;
For storing the memory of processor executable;
Wherein, described processor is configured to:
When the current network connecting is mobile network and application program is triggered, judge whether described triggering is false triggering;
When described triggering as false triggering, limit the networking behavior of described application program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610728648.XA CN106407796B (en) | 2016-08-25 | 2016-08-25 | Control the method, apparatus and terminal of flow |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610728648.XA CN106407796B (en) | 2016-08-25 | 2016-08-25 | Control the method, apparatus and terminal of flow |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106407796A true CN106407796A (en) | 2017-02-15 |
CN106407796B CN106407796B (en) | 2019-02-12 |
Family
ID=58004533
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610728648.XA Active CN106407796B (en) | 2016-08-25 | 2016-08-25 | Control the method, apparatus and terminal of flow |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106407796B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108762493A (en) * | 2018-05-15 | 2018-11-06 | 维沃移动通信有限公司 | A kind of method and mobile terminal of control application program |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104581671A (en) * | 2015-01-21 | 2015-04-29 | 深圳市中兴移动通信有限公司 | Prompting method and device for data traffic |
CN104660808A (en) * | 2015-02-04 | 2015-05-27 | 小米科技有限责任公司 | Communication control method and related communication equipment |
CN104850443A (en) * | 2015-05-29 | 2015-08-19 | 努比亚技术有限公司 | Method for shutting down false start-up application program and mobile terminal |
CN105260680A (en) * | 2014-07-14 | 2016-01-20 | 中兴通讯股份有限公司 | Touch screen-based operation processing method and device |
CN105554255A (en) * | 2015-12-09 | 2016-05-04 | 小米科技有限责任公司 | Operation control method and device for terminal equipment |
-
2016
- 2016-08-25 CN CN201610728648.XA patent/CN106407796B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105260680A (en) * | 2014-07-14 | 2016-01-20 | 中兴通讯股份有限公司 | Touch screen-based operation processing method and device |
CN104581671A (en) * | 2015-01-21 | 2015-04-29 | 深圳市中兴移动通信有限公司 | Prompting method and device for data traffic |
CN104660808A (en) * | 2015-02-04 | 2015-05-27 | 小米科技有限责任公司 | Communication control method and related communication equipment |
CN104850443A (en) * | 2015-05-29 | 2015-08-19 | 努比亚技术有限公司 | Method for shutting down false start-up application program and mobile terminal |
CN105554255A (en) * | 2015-12-09 | 2016-05-04 | 小米科技有限责任公司 | Operation control method and device for terminal equipment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108762493A (en) * | 2018-05-15 | 2018-11-06 | 维沃移动通信有限公司 | A kind of method and mobile terminal of control application program |
Also Published As
Publication number | Publication date |
---|---|
CN106407796B (en) | 2019-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104239094B (en) | Control method, device and the terminal device of background application | |
CN106951884A (en) | Gather method, device and the electronic equipment of fingerprint | |
CN105677460A (en) | Application processing method and apparatus | |
CN105807873A (en) | Temperature control method and device | |
CN105607834A (en) | Screen control method and apparatus as well as terminal | |
CN104503740A (en) | Memory management method and device | |
CN105160239A (en) | Application program access restriction method and apparatus | |
CN105487680B (en) | Method, apparatus and terminal for terminal screenshotss | |
CN105955441B (en) | Application management method and device | |
CN105433904A (en) | Sleep state detection method, device and system | |
CN105975301A (en) | Memory cleaning method and device, and electronic equipment | |
CN107608561A (en) | Touch-screen control method and device | |
CN105528055A (en) | Running object processing method and device | |
CN106648730A (en) | Processing method and device of abnormal application | |
CN105807894A (en) | Processing method and device of lock holding of application | |
CN105390120A (en) | Bright screen control method and device | |
CN105187671A (en) | Recording method and device | |
CN106455002A (en) | Wireless search method and device, and terminal | |
CN104780574A (en) | Method and device for network switchover | |
CN106657647A (en) | Incoming call processing method and device and mobile terminal | |
CN106021130A (en) | Memory processing method and device | |
CN106231072A (en) | The control method of prompting message, device and terminal unit | |
CN105204712A (en) | Method and device for displaying icons of folder | |
CN104714735A (en) | Page scrolling display method and device | |
CN104965746B (en) | The method and device of quick start |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |