CN106407796B - Control the method, apparatus and terminal of flow - Google Patents

Control the method, apparatus and terminal of flow Download PDF

Info

Publication number
CN106407796B
CN106407796B CN201610728648.XA CN201610728648A CN106407796B CN 106407796 B CN106407796 B CN 106407796B CN 201610728648 A CN201610728648 A CN 201610728648A CN 106407796 B CN106407796 B CN 106407796B
Authority
CN
China
Prior art keywords
application program
triggering
triggered
false triggering
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610728648.XA
Other languages
Chinese (zh)
Other versions
CN106407796A (en
Inventor
王广健
朱瑞贤
李明浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610728648.XA priority Critical patent/CN106407796B/en
Publication of CN106407796A publication Critical patent/CN106407796A/en
Application granted granted Critical
Publication of CN106407796B publication Critical patent/CN106407796B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Abstract

The disclosure provides a kind of method, apparatus and terminal for controlling flow, and a specific embodiment of the method includes: to judge whether the triggering is false triggering when the network currently connected is mobile network and application program is triggered;When the triggering is false triggering, the networking behavior of the application program is limited.This embodiment, reduces the consumption of mobile network's flow, save the resource of network flow.

Description

Control the method, apparatus and terminal of flow
Technical field
This disclosure relates to field of terminal technology, in particular to a kind of method, apparatus and terminal for controlling flow.
Background technique
In the desktop clicking trigger that user passes through terminal application program to be opened, it sometimes appear that maloperation, opens by mistake Other application programs have been opened, desktop can have been immediately returned to after user's discovery, and clicking trigger application program to be opened again.But It is, may be in running background by the application program opened is opened by mistake, and it is possible to access network.If the network of terminal connection is to move The network of dynamic operator, then can consume mobile network's flow, to waste the resource of network flow.
Summary of the invention
In order to solve the above-mentioned technical problem, the disclosure provides a kind of method, apparatus and terminal for controlling flow.
According to the first aspect of the embodiments of the present disclosure, a kind of method controlling flow is provided, comprising:
When the network currently connected is mobile network and application program is triggered, judge whether the triggering is accidentally to touch Hair;
When the triggering is false triggering, the networking behavior of the application program is limited.
Optionally, the application program is triggered including following any one: application program launching or application program by from Backstage switches to foreground.
It is optionally, described to judge whether the triggering is false triggering, comprising:
After judging that the application program is triggered, at the scheduled time before, if detect instruction return desktop operation Instruction;If detecting, instruction returns to the operational order of desktop, and the triggering is false triggering.
Optionally, the predetermined instant includes following any one:
At the time of scheduled duration reaches;
At the time of the application program loaded.
It is optionally, described to judge whether the triggering is false triggering, comprising:
Using the application program as the first application program, when first application program is triggered, judge when default Whether the second application program for meeting condition of similarity with first application program in section is triggered;
When the second application program described in preset period of time is triggered, determine first application program by false triggering.
Optionally, second application program that condition of similarity is met with first application program include following one or It is multinomial:
The approximate application program of picture mark position of corresponding picture mark position and first application program;
The similarity of corresponding icon and the icon of first application program is more than or equal to the application of predetermined threshold Program.
Optionally, the networking behavior of the limitation application program, comprising:
Forbid the network connection of the application program;Or
The application program is closed in the process of running background.
Optionally, the method also includes:
Before determining that the triggering is not false triggering, forbids the application program and network establishes connection.
According to the second aspect of an embodiment of the present disclosure, a kind of device controlling flow is provided, comprising:
Judgment module is configured as judging institute when the network currently connected is mobile network and application program is triggered State whether triggering is false triggering;
Module is limited, is configured as limiting the networking behavior of the application program when the triggering is false triggering.
Optionally, the application program is triggered including following any one: application program launching or application program by from Backstage switches to foreground.
Optionally, the judgment module includes:
First judging submodule is configured as after judging that the application program is triggered, at the scheduled time before, if inspection Measure the operational order that instruction returns to desktop;If detecting, instruction returns to the operational order of desktop, and the triggering is false triggering.
Optionally, the predetermined instant includes following any one:
At the time of scheduled duration reaches;
At the time of the application program loaded.
Optionally, the judgment module includes:
Second judgment submodule is configured as using the application program as the first application program, when first application Program is triggered, judge to meet in preset period of time with first application program condition of similarity the second application program whether by Triggering;
It determines submodule, is configured as when the second application program described in preset period of time is triggered, determine described One application program is by false triggering.
Optionally, second application program that condition of similarity is met with first application program include following one or It is multinomial:
The approximate application program of picture mark position of corresponding picture mark position and first application program;
The similarity of corresponding icon and the icon of first application program is more than or equal to the application of predetermined threshold Program.
Optionally, the limitation module includes:
Forbid submodule, is configured as forbidding the network connection of the application program;Or
Submodule is closed, is configured as closing the application program in the process of running background.
Optionally, described device further include:
Disabled module, be configured as determine it is described triggering be not false triggering before, forbid the application program and network Establish connection.
According to the third aspect of an embodiment of the present disclosure, a kind of terminal is provided, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
When the network currently connected is mobile network and application program is triggered, judge whether the triggering is accidentally to touch Hair;
When the triggering is false triggering, the networking behavior of the application program is limited.
The technical scheme provided by this disclosed embodiment can include the following benefits:
The method for the control flow that embodiment of the disclosure provides is mobile network and application in the network that ought currently connect When program is triggered, judge whether the triggering is false triggering, when the triggering is false triggering, limits the networking row of the application program For.To reduce the consumption of mobile network's flow, the resource of network flow is saved.
The method of the control flow provided by the above embodiment of the disclosure, by being mobile network in the network currently connected And application program is when being triggered, after judging that the application program is triggered, at the scheduled time before, if detect that instruction returns to table The operational order in face limits the networking behavior of application program when detecting that instruction returns to the operational order of desktop.To reduce The consumption of mobile network's flow, saves the resource of network flow.
The method of the control flow provided by the above embodiment of the disclosure, by being mobile network in the network currently connected And application program using the application program as the first application program, is determined and applies journey with first in preset period of time when being triggered Whether the second application program that sequence meets condition of similarity is triggered.When the second application program is triggered in preset period of time, determine First application program limits the networking behavior of first application program by false triggering.To reduce mobile network's flow Consumption, saves the resource of network flow.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of disclosure flow chart for the method for controlling flow shown according to an exemplary embodiment;
Fig. 2 is the flow chart of the method for the disclosure another control flow shown according to an exemplary embodiment;
Fig. 3 is the flow chart of the method for the disclosure another control flow shown according to an exemplary embodiment;
Fig. 4 is a kind of disclosure block diagram for the device for controlling flow shown according to an exemplary embodiment;
Fig. 5 is the block diagram of the device of the disclosure another control flow shown according to an exemplary embodiment;
Fig. 6 is the block diagram of the device of the disclosure another control flow shown according to an exemplary embodiment;
Fig. 7 is the block diagram of the device of the disclosure another control flow shown according to an exemplary embodiment;
Fig. 8 is an a kind of disclosure structural schematic diagram of the device for controlling flow shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
It is only to be not intended to be limiting the disclosure merely for for the purpose of describing particular embodiments in the term that the disclosure uses. The "an" of the singular used in disclosure and the accompanying claims book, " described " and "the" are also intended to including majority Form, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and wraps It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the disclosure A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from In the case where disclosure range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination ".
As shown in Figure 1, Fig. 1 is a kind of flow chart of method for controlling flow shown according to an exemplary embodiment, it should Method can be applied in terminal.In the present embodiment, in order to make it easy to understand, in conjunction with that can connect network and application can be installed The terminal device of program illustrates.It will be understood by those skilled in the art that the terminal device can include but is not limited to it is all The mobile terminal device of such as smart phone, intelligent wearable equipment, tablet computer, personal digital assistant.This method includes Following steps:
In a step 101, when the network currently connected is mobile network and application program is triggered, judge that the triggering is No is false triggering.
In general, the network of terminal connection can be WLAN, be also possible to the mobile network of mobile operator. When the network of terminal connection is the mobile network of mobile operator, the consumption of network flow can generate campus network.In this reality Apply in example, mobile network is the network service that provides of any radio communication operator, for example, mobile network can for 2G network, 3G network, 4G network and 5G network just in evolution process etc..The disclosure in terms of the concrete form of mobile network not It limits.
In the present embodiment, when the network currently connected is mobile network, if there is application program to be triggered, judgement should Whether triggering is false triggering.Wherein, it may include following any one that application program, which is triggered: user is by carrying out scheduled behaviour (icon etc. of application program is clicked make in the desktop of terminal) triggering application program launching, or triggering application program is by from from the background Switch to foreground.
On the one hand, if user has carried out maloperation, false triggering does not need the application program opened, generally can be shorter Carry out returning the operation (e.g., clicking HOME key, or click return key etc.) of desktop in time, to exit the application journey for opening by mistake and opening Sequence.Therefore, in one implementation, available user after triggering application program to carry out return desktop operation it Whether the time interval of preceding this period is maloperation according to the operation that the length of the time interval judges that user carries out.If The time interval is less than or equal to a scheduled threshold value, then the operation for illustrating that user carries out is maloperation.
On the other hand, if user has carried out maloperation, false triggering does not need the application program opened, generally can be at this Before opening by mistake the application program loaded opened, the operation for returning to desktop is carried out.Therefore, in another implementation, may be used also With user carry out return desktop operation when, judge the application program being triggered whether loaded.What if this was triggered The non-loaded of application program, then the operation for illustrating that user carries out is maloperation.
Another aspect, if the fast speed of operation, is easy to carry out accidentally behaviour when user, which triggers, opens application program Make, false triggering meets the application program of condition of similarity with application program to be opened.Meet condition of similarity with application program to be opened Application program can be the approximate application program of picture mark position of corresponding picture mark position Yu application program to be opened, Huo Zheye Can be corresponding icon, similar to the icon of the application program to be opened (e.g., dominant hue is similar or image is similar Deng) application program.Therefore, in another implementation, can also judge in preset period of time after application program is triggered Whether there is the other application program for meeting condition of similarity with the application program to be triggered.If so, then illustrating the behaviour that user carries out Work is maloperation.
In a step 102, when above-mentioned triggering is false triggering, the networking behavior of above-mentioned application program is limited.
In the present embodiment, it after determining that user has carried out false triggering, limits by the networking row of the application program of false triggering For.It specifically, can be by forbidding the network connection of the application program, to limit by the networking of the application program of false triggering Behavior.Or the application program can also be closed in the process of running background, so that limitation is by the connection of the application program of false triggering Net behavior.It is appreciated that the networking behavior of above-mentioned application program can also be limited by another way, the disclosure is in limitation It is not limited in terms of the concrete mode for stating the networking behavior of application program.
The method of the control flow provided by the above embodiment of the disclosure, the network that ought currently connect be mobile network and When application program is triggered, judge whether the triggering is false triggering, when the triggering is false triggering, limits the connection of the application program Net behavior.To reduce the consumption of mobile network's flow, the resource of network flow is saved.
As shown in Fig. 2, the flow chart of the method for Fig. 2 another control flow shown according to an exemplary embodiment, it should Embodiment be described in detail judge triggering whether be false triggering process, this method can be applied in terminal, including following step It is rapid:
In step 201, when the network currently connected is mobile network and application program is triggered, judge this using journey After sequence is triggered, at the scheduled time before, if detect instruction return desktop operational order.
It in the present embodiment, can be by sentencing when the network currently connected is mobile network and application program is triggered After the application program of breaking is triggered, at the scheduled time before, if detect instruction return desktop operational order, on judging State whether triggering is false triggering.If before at the scheduled time, detecting that instruction returns to the operational order of desktop, then illustrating above-mentioned Triggering is false triggering.
Wherein, predetermined instant may include following any one: at the time of scheduled duration reaches or the application program adds At the time of load finishes.Wherein, scheduled duration can be any reasonable time span, for example, 1 second or 2 seconds etc., the disclosure The specific time span aspect of scheduled duration is not limited.
In step 202, if detecting, instruction returns to the operational order of desktop, limits the networking behavior of application program.
In the present embodiment, if above-mentioned triggering is false triggering, the networking behavior of the application program is limited.
It should be noted that no longer going to live in the household of one's in-laws on getting married in above-mentioned Fig. 2 embodiment for the step identical with Fig. 1 embodiment It states, related content can be found in Fig. 1 embodiment.
The method of the control flow provided by the above embodiment of the disclosure, by being mobile network in the network currently connected And application program is when being triggered, after judging that the application program is triggered, at the scheduled time before, if detect that instruction returns to table The operational order in face limits the networking behavior of application program when detecting that instruction returns to the operational order of desktop.To reduce The consumption of mobile network's flow, saves the resource of network flow.
As shown in figure 3, Fig. 3 is the flow chart of the method for another control flow shown according to an exemplary embodiment, The embodiment be described in detail judge triggering whether be false triggering process, this method can be applied in terminal, including following Step:
In step 301, when the network currently connected is mobile network and application program is triggered, by the application program As the first application program, whether determining the second application program for meeting condition of similarity with the first application program in preset period of time It is triggered.
In the present embodiment, when the network currently connected is mobile network and application program is triggered, this is applied into journey Sequence is as the first application program.In preset period of time, detection meets the second application program of condition of similarity with the first application program Whether it is triggered.Therefore, determining the second application program for meeting condition of similarity with the first application program is first had to.Second applies journey Sequence may include following one or more: corresponding picture mark position and the picture mark position of the first application program approximately apply journey Sequence, alternatively, the similarity of corresponding icon and the icon of the first application program is more than or equal to the application program of predetermined threshold.
In general, if icon is more on the desktop of terminal, can by multiple desktop page Pagination Displays these Icon.In the present embodiment, the approximate icon in position may include two kinds of situations, and a kind of situation is, in the same desktop page In, the icon of neighbouring (such as adjacent) can be the approximate icon in position.For example, being located at the first row first of the first desktop page The icon of column is approximate with the picture mark position of the first row secondary series of the first desktop page is located at.Another situation is that different In desktop page, the icon of position identical or neighbouring (such as adjacent) can be the approximate icon in position.For example, being located at first The icon of the first row first row of desktop page is approximate with the picture mark position of the first row first row of the second desktop page is located at.Or Person, positioned at the icon of the icon and the first row secondary series for being located at the second desktop page of the first row first row of the first desktop page Position is approximate.
Specifically, corresponding picture mark position and the approximate application program of picture mark position of the first application program can pass through As under type determines: firstly, being directed in terminal each application program in addition to the first application program, obtaining the application program The distance between the position of the position at icon center and the icon center of the first application program.Judge the distance whether be less than or Equal to predetermined threshold, if the distance is less than or equal to predetermined threshold, it is determined that the picture mark position of the application program and first The picture mark position of application program is approximate.
The similarity of corresponding icon and the icon of the first application program is more than or equal to the application program of predetermined threshold It can be determined as follows: firstly, being directed in terminal each application program in addition to the first application program, calculate this and answer With the similarity of the icon of the icon and the first application program of program.It can be from the angle calculation of the Icon Color application program The similarity of icon and the icon of the first application program, can also from the icon of the angle calculation of the icon graphic application program with The similarity of the icon of first application program.It is appreciated that any other being likely to occur as known in the art and future The method for calculating the similarity between the icon of application program can be applied to the disclosure, and the disclosure is to specific calculation Aspect does not limit.
In the present embodiment, preset period of time can be any reasonable period, for example, 1 second or 2 seconds etc., the disclosure pair It is not limited in terms of the specific time span of preset period of time.
In step 302, when the second application program is triggered in preset period of time, determine that the first application program is accidentally touched Hair.
In step 303, when determining the first application program by false triggering, the networking row of first application program is limited For.
It should be noted that no longer going to live in the household of one's in-laws on getting married in above-mentioned Fig. 3 embodiment for the step identical with Fig. 1 embodiment It states, related content can be found in Fig. 1 embodiment.
The method of the control flow provided by the above embodiment of the disclosure, by being mobile network in the network currently connected And application program using the application program as the first application program, is determined and applies journey with first in preset period of time when being triggered Whether the second application program that sequence meets condition of similarity is triggered.When the second application program is triggered in preset period of time, determine First application program limits the networking behavior of first application program by false triggering.To reduce mobile network's flow Consumption, saves the resource of network flow.
In some optional embodiments, the above method can also include: to obtain the knot that above-mentioned triggering is not false triggering Before fruit, the application program and network is forbidden to establish connection.
In the present embodiment, it is contemplated that in the terminal of presently relevant technology, application program will be visited from the time of being turned on Ask network, consumed flow data.Therefore, before obtaining the result that the triggering to application program is not false triggering, this is forbidden to answer Connection is established with program and network.Until determine be not false triggering to the triggering of application program when, just allow the application program with Network establishes connection.It can be further reduced the consumption of mobile network's flow in this way, facilitate the resource of saving network flow.
It should be noted that although describing the operation of method of disclosure in the accompanying drawings with particular order, this is not required that Or hint must execute these operations in this particular order, or have to carry out operation shown in whole and be just able to achieve the phase The result of prestige.On the contrary, the step of describing in flow chart can change and execute sequence.Additionally or alternatively, it is convenient to omit certain Multiple steps are merged into a step and executed, and/or a step is decomposed into execution of multiple steps by step.
Corresponding with the aforementioned control embodiment of the method for flow, the disclosure additionally provides the device of control flow and its is answered The embodiment of terminal.
As shown in figure 4, Fig. 4 is a kind of disclosure device block diagram for controlling flow shown according to an exemplary embodiment, The device includes: judgment module 401 and limitation module 402.
Wherein, judgment module 401, being configured as is mobile network in the network currently connected and application program is triggered When, judge whether the triggering is false triggering.
Module 402 is limited, is configured as limiting the networking behavior of above-mentioned application program when the triggering is false triggering.
In some optional embodiments, above-mentioned application program is triggered including following any one: application program launching Or application program by from switching to foreground from the background.
As shown in figure 5, Fig. 5 is the device frame of the disclosure another control flow shown according to an exemplary embodiment Figure, for the embodiment on the basis of aforementioned embodiment illustrated in fig. 4, judgment module 401 may include: the first judging submodule 501.
Wherein, the first judging submodule 501 is configured as after judging that above-mentioned application program is triggered, at the scheduled time it Before, if detect that instruction returns to the operational order of desktop, instruction returns to the operational order of desktop if detecting, which is False triggering.
In some optional embodiments, above-mentioned predetermined instant includes following any one: scheduled duration reach when At the time of quarter or above-mentioned application program loaded.
As shown in fig. 6, Fig. 6 is the device frame of the disclosure another control flow shown according to an exemplary embodiment Figure, for the embodiment on the basis of aforementioned embodiment illustrated in fig. 4, judgment module 401 may include: second judgment submodule 601 With determining submodule 602.
Wherein, second judgment submodule 601 are configured as using above-mentioned application program as the first application program, when first Application program is triggered, judge to meet in preset period of time with the first application program condition of similarity the second application program whether by Triggering.
It determines submodule 602, is configured as determining the first application when the second application program is triggered in preset period of time Program is by false triggering.
In some optional embodiments, it includes following that the second application program of condition of similarity is met with the first application program It is one or more: corresponding picture mark position and the approximate application program of the picture mark position of the first application program;Corresponding icon with The similarity of the icon of first application program is more than or equal to the application program of predetermined threshold.
In some optional embodiments, limitation module 402 may include: to forbid submodule or closing submodule.
Wherein, forbid submodule, be configured as forbidding the network connection of above-mentioned application program.
Submodule is closed, is configured as closing above-mentioned application program in the process of running background.
As shown in fig. 7, Fig. 7 is the device frame of the disclosure another control flow shown according to an exemplary embodiment Figure, on the basis of aforementioned embodiment illustrated in fig. 4, which can further include the embodiment: disabled module 403.
Wherein, disabled module 403, be configured as determine triggering be not false triggering before, forbid above-mentioned application program with Network establishes connection.
It should be appreciated that above-mentioned apparatus can be preset in the terminal, end can also be loaded by modes such as downloadings In end.Corresponding module in above-mentioned apparatus can be cooperated with the module in terminal to realize the scheme of control flow.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual The purpose for needing to select some or all of the modules therein to realize disclosure scheme.Those of ordinary skill in the art are not paying Out in the case where creative work, it can understand and implement.
Correspondingly, the disclosure also provides a kind of terminal, which includes processor;For the executable finger of storage processor The memory of order;Wherein, which is configured as:
When the network currently connected is mobile network and application program is triggered, judge whether the triggering is accidentally to touch Hair;
When the triggering is false triggering, the networking behavior of the application program is limited.
Fig. 8 is an a kind of structural schematic diagram of device 9900 for controlling flow shown according to an exemplary embodiment.Example Such as, device 9900 can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, and plate is set It is standby, Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig. 8, device 9900 may include following one or more components: processing component 9902, memory 9904, electricity Source component 9906, multimedia component 9908, audio component 9910, the interface 9912 of input/output (I/O), sensor module 9914 and communication component 9916.
The integrated operation of the usual control device 9900 of processing component 9902, such as with display, telephone call, data communication, Camera operation and record operate associated operation.Processing element 9902 may include one or more processors 9920 to execute Instruction, to perform all or part of the steps of the methods described above.In addition, processing component 9902 may include one or more moulds Block, convenient for the interaction between processing component 9902 and other assemblies.For example, processing component 9902 may include multi-media module, To facilitate the interaction between multimedia component 9908 and processing component 9902.
Memory 9904 is configured as storing various types of data to support the operation in device 9900.These data Example includes the instruction of any application or method for operating on device 9900, contact data, telephone book data, Message, picture, video etc..Memory 9904 can by any kind of volatibility or non-volatile memory device or they Combination is realized, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Power supply module 9906 provides electric power for the various assemblies of device 9900.Power supply module 9906 may include power management System, one or more power supplys and other with for device 9900 generate, manage, and distribute the associated component of electric power.
Multimedia component 9908 includes the screen of one output interface of offer between described device 9900 and user.? In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes that one or more touch passes Sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding is dynamic The boundary of work, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more Media component 9908 includes a front camera and/or rear camera.When device 9900 is in operation mode, as shot mould When formula or video mode, front camera and/or rear camera can receive external multi-medium data.Each preposition camera shooting Head and rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 9910 is configured as output and/or input audio signal.For example, audio component 9910 includes a wheat Gram wind (MIC), when device 9900 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone quilt It is configured to receive external audio signal.The received audio signal can be further stored in memory 9904 or via communication Component 9916 is sent.In some embodiments, audio component 9910 further includes a loudspeaker, is used for output audio signal.
I/O interface 9912 provides interface, above-mentioned peripheral interface module between processing component 9902 and peripheral interface module It can be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and Locking press button.
Sensor module 9914 includes one or more sensors, and the state for providing various aspects for device 9900 is commented Estimate.For example, sensor module 9914 can detecte the state that opens/closes of device 9900, the relative positioning of component, such as institute The display and keypad that component is device 9900 are stated, sensor module 9914 can be with detection device 9900 or device 9,900 1 The position change of a component, the existence or non-existence that user contacts with device 9900,9900 orientation of device or acceleration/deceleration and dress Set 9900 temperature change.Sensor module 9914 may include proximity sensor, be configured in not any physics It is detected the presence of nearby objects when contact.Sensor module 9914 can also include optical sensor, as CMOS or ccd image are sensed Device, for being used in imaging applications.In some embodiments, which can also include acceleration sensing Device, gyro sensor, Magnetic Sensor, pressure sensor, microwave remote sensor or temperature sensor.
Communication component 9916 is configured to facilitate the communication of wired or wireless way between device 9900 and other equipment.Dress The wireless network based on communication standard, such as WiFi can be accessed by setting 9900,2G or 3G or their combination.It is exemplary at one In embodiment, communication component 9916 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, the communication component 9916 further includes near-field communication (NFC) module, to promote short distance Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 9900 can be by one or more application specific integrated circuit (ASIC), number Signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 9904 of instruction, above-metioned instruction can be executed by the processor 9920 of device 9900 to complete the above method.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (15)

1. a kind of method for controlling flow, which is characterized in that the described method includes:
When the network currently connected is mobile network and application program is triggered, judge whether the triggering is false triggering;
When the triggering is false triggering, the networking behavior of the application program is limited;
It is wherein, described to judge whether the triggering is false triggering, comprising:
Using the application program as the first application program, when first application program is triggered, judge in preset period of time Whether the second application program for meeting condition of similarity with first application program is triggered;
When the second application program described in preset period of time is triggered, determine first application program by false triggering.
2. the method according to claim 1, wherein the application program is triggered including following any one: Application program launching or application program by from switching to foreground from the background.
3. the method according to claim 1, wherein described judge whether the triggering is false triggering, comprising:
After judging that the application program is triggered, at the scheduled time before, if detect instruction return desktop operational order; If detecting, instruction returns to the operational order of desktop, and the triggering is false triggering.
4. according to the method described in claim 3, it is characterized in that, the predetermined instant includes following any one:
At the time of scheduled duration reaches;
At the time of the application program loaded.
5. the method according to claim 1, wherein described meet condition of similarity with first application program Second application program includes following one or more:
The approximate application program of picture mark position of corresponding picture mark position and first application program;
The similarity of corresponding icon and the icon of first application program is more than or equal to the application program of predetermined threshold.
6. the method according to claim 1, wherein the networking behavior of the limitation application program, comprising:
Forbid the network connection of the application program;Or
The application program is closed in the process of running background.
7. the method according to claim 1, wherein the method also includes:
Before determining that the triggering is not false triggering, forbids the application program and network establishes connection.
8. a kind of device for controlling flow, which is characterized in that described device includes:
Judgment module is configured as judging the touching when the network currently connected is mobile network and application program is triggered Whether hair is false triggering;
Module is limited, is configured as limiting the networking behavior of the application program when the triggering is false triggering;
Wherein, the judgment module includes:
Second judgment submodule is configured as using the application program as the first application program, when first application program It is triggered, judges whether the second application program for meeting condition of similarity with first application program in preset period of time is touched Hair;
It determines submodule, is configured as determining that described first answers when the second application program described in preset period of time is triggered With program by false triggering.
9. device according to claim 8, which is characterized in that the application program is triggered including following any one: Application program launching or application program by from switching to foreground from the background.
10. device according to claim 8, which is characterized in that the judgment module includes:
First judging submodule is configured as after judging that the application program is triggered, at the scheduled time before, if detect Indicate the operational order of return desktop;If detecting, instruction returns to the operational order of desktop, and the triggering is false triggering.
11. device according to claim 10, which is characterized in that the predetermined instant includes following any one:
At the time of scheduled duration reaches;
At the time of the application program loaded.
12. device according to claim 8, which is characterized in that described to meet condition of similarity with first application program The second application program include following one or more:
The approximate application program of picture mark position of corresponding picture mark position and first application program;
The similarity of corresponding icon and the icon of first application program is more than or equal to the application program of predetermined threshold.
13. device according to claim 8, which is characterized in that the limitation module includes:
Forbid submodule, is configured as forbidding the network connection of the application program;Or
Submodule is closed, is configured as closing the application program in the process of running background.
14. device according to claim 8, which is characterized in that described device further include:
Disabled module is configured as before determining that the triggering is not false triggering, the application program and network is forbidden to establish Connection.
15. a kind of terminal characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
When the network currently connected is mobile network and application program is triggered, judge whether the triggering is false triggering;
When the triggering is false triggering, the networking behavior of the application program is limited;
It is wherein, described to judge whether the triggering is false triggering, comprising:
Using the application program as the first application program, when first application program is triggered, judge in preset period of time Whether the second application program for meeting condition of similarity with first application program is triggered;
When the second application program described in preset period of time is triggered, determine first application program by false triggering.
CN201610728648.XA 2016-08-25 2016-08-25 Control the method, apparatus and terminal of flow Active CN106407796B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610728648.XA CN106407796B (en) 2016-08-25 2016-08-25 Control the method, apparatus and terminal of flow

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610728648.XA CN106407796B (en) 2016-08-25 2016-08-25 Control the method, apparatus and terminal of flow

Publications (2)

Publication Number Publication Date
CN106407796A CN106407796A (en) 2017-02-15
CN106407796B true CN106407796B (en) 2019-02-12

Family

ID=58004533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610728648.XA Active CN106407796B (en) 2016-08-25 2016-08-25 Control the method, apparatus and terminal of flow

Country Status (1)

Country Link
CN (1) CN106407796B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108762493B (en) * 2018-05-15 2022-01-25 维沃移动通信有限公司 Method for controlling application program and mobile terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581671A (en) * 2015-01-21 2015-04-29 深圳市中兴移动通信有限公司 Prompting method and device for data traffic
CN104660808A (en) * 2015-02-04 2015-05-27 小米科技有限责任公司 Communication control method and related communication equipment
CN104850443A (en) * 2015-05-29 2015-08-19 努比亚技术有限公司 Method for shutting down false start-up application program and mobile terminal
CN105260680A (en) * 2014-07-14 2016-01-20 中兴通讯股份有限公司 Touch screen-based operation processing method and device
CN105554255A (en) * 2015-12-09 2016-05-04 小米科技有限责任公司 Operation control method and device for terminal equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105260680A (en) * 2014-07-14 2016-01-20 中兴通讯股份有限公司 Touch screen-based operation processing method and device
CN104581671A (en) * 2015-01-21 2015-04-29 深圳市中兴移动通信有限公司 Prompting method and device for data traffic
CN104660808A (en) * 2015-02-04 2015-05-27 小米科技有限责任公司 Communication control method and related communication equipment
CN104850443A (en) * 2015-05-29 2015-08-19 努比亚技术有限公司 Method for shutting down false start-up application program and mobile terminal
CN105554255A (en) * 2015-12-09 2016-05-04 小米科技有限责任公司 Operation control method and device for terminal equipment

Also Published As

Publication number Publication date
CN106407796A (en) 2017-02-15

Similar Documents

Publication Publication Date Title
KR101722522B1 (en) Method and apparatus for switching display mode
EP3382506A1 (en) Method and apparatus for screen capture processing
CN105487680B (en) Method, apparatus and terminal for terminal screenshotss
CN105338177B (en) message delay broadcasting method and device
CN105677460A (en) Application processing method and apparatus
CN106028143A (en) Video live broadcasting method and device
CN105807873A (en) Temperature control method and device
CN105160239A (en) Application program access restriction method and apparatus
CN105955441B (en) Application management method and device
CN104219383A (en) Terminal power information prompting method and device
US20170300211A1 (en) Method and apparatus for displaying status information of application
CN105975301A (en) Memory cleaning method and device, and electronic equipment
CN104238912A (en) Application control method and application control device
CN104182313A (en) Photographing delay method and device
CN105607834A (en) Screen control method and apparatus as well as terminal
CN106792987A (en) Network selecting method and device
CN105487805A (en) Object operating method and device
CN105786507A (en) Display interface switching method and device
CN104049864A (en) Object control method and device
CN105807894A (en) Processing method and device of lock holding of application
CN105739840A (en) Terminal and starting method of application programs in terminal
CN105867592B (en) A kind of method and apparatus managing electric quantity consumption
CN105975305B (en) OS Events processing method, device and terminal
CN106455002A (en) Wireless search method and device, and terminal
CN105204712A (en) Method and device for displaying icons of folder

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant