CN107094094B - Application networking method and device and terminal - Google Patents

Application networking method and device and terminal Download PDF

Info

Publication number
CN107094094B
CN107094094B CN201710241487.6A CN201710241487A CN107094094B CN 107094094 B CN107094094 B CN 107094094B CN 201710241487 A CN201710241487 A CN 201710241487A CN 107094094 B CN107094094 B CN 107094094B
Authority
CN
China
Prior art keywords
application program
application
network
networking
blacklist
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710241487.6A
Other languages
Chinese (zh)
Other versions
CN107094094A (en
Inventor
邱子峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710241487.6A priority Critical patent/CN107094094B/en
Publication of CN107094094A publication Critical patent/CN107094094A/en
Application granted granted Critical
Publication of CN107094094B publication Critical patent/CN107094094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The disclosure relates to a networking method, a networking device and a networking terminal for application programs, wherein the method comprises the following steps: receiving an access request for accessing an application program, which is sent by a user, wherein the access request comprises an application program identifier; and if the application program is determined to be the inactive application program according to the application program identifier, when the application program identifier is determined to be in a blacklist in a network firewall, the blacklist comprises at least one application program identifier marked as the inactive application program, and an application program networking request is initiated after waiting for a preset time so that the application program is connected with a network. The terminal can not immediately return the result that the application program can not be connected with the network when the application program is determined to be marked as the inactive state, so that the terminal can automatically perform networking on the application program marked as the inactive state, the networking success rate of the application program in the inactive state is improved, and the user experience is improved.

Description

Application networking method and device and terminal
Technical Field
The present disclosure relates to the field of terminal technologies, and in particular, to a networking method and apparatus for an application, and a terminal.
Background
With the development of terminal technologies, such as smart phones, tablet computers, desktop computers, and the like, terminal applications are widely applied to the life and work of people. Various application programs are also installed in the terminal so as to facilitate the work and life of people. After the application program is not used by the user for a period of time, the system of the terminal marks the application program as an inactive state and limits the application program to access the network, thereby saving the system resources of the terminal and achieving the purpose of saving the electric quantity of the terminal.
In the related art, after the terminal marks the application program in an inactive state, when a user needs to use the application program, the terminal queries whether the application program is restricted from using the network in a blacklist of a network firewall, and if the application program is determined to be restricted from using the network, the terminal directly returns a result that the application program cannot be connected with the network; the user is then required to operate the application again to perform networking of the application.
However, in the related art, after the terminal marks the application program in the inactive state, the application program is not really unable to connect to the network, however, when the user needs to use the application program, if the application program is determined to be in the inactive state, a result that the application program is unable to connect to the network is returned, and further the application program cannot be networked, which affects the user experience.
Disclosure of Invention
In order to overcome the problem that in the related art, when a user needs to use the application program, if the application program is determined to be in an inactive state, a result that the application program cannot be connected with a network is returned, so that the application program cannot be networked, and user experience is affected, the disclosure provides a networking method, a networking device and a networking terminal for the application program.
According to a first aspect of embodiments of the present disclosure, there is provided a networking method of an application program, including:
receiving an access request for accessing an application program, wherein the access request comprises an application program identifier;
judging whether the application program is an inactive application program or not according to the application program identifier;
if the application program is determined to be an inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as an inactive application program;
and if the application program identification is determined to be in a blacklist list in the network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with the network.
Further, the method further comprises:
and removing the application program identification from the blacklist within the preset time, and removing the mark of the inactive state of the application program.
Further, after the initiating an application networking request after waiting for the preset time to connect the application to the network, the method further comprises:
and if the application program is unsuccessfully connected with the network, re-initiating the application program network connection request for preset times.
Further, after the initiating an application networking request after waiting for the preset time to connect the application to the network, the method further comprises:
and if the application program is not successful in connecting the network, pushing other application programs of the same type as the application program to the user so that the user can determine whether to open the other application programs.
Further, if the access request includes at least two application program identifiers;
accordingly, the initiating an application networking request after waiting for a preset time to enable the application to connect to a network includes:
after waiting for the preset time, sequentially initiating application program networking requests for the application programs according to the priority order of the application programs corresponding to the application program identifications so that the application programs are sequentially connected with the network.
Further, the priority order includes any one of the following:
the descending order of the use times of each application program, the priority level of each application program set by a user, and the order of the type of each application program.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: receiving an access request for accessing an application program sent by a user, wherein the access request comprises an application program identifier; judging whether the application program is in an inactive state or not according to the application program identifier; if the application program is determined to be the inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as the inactive application program; and if the application program identification is determined to be in the blacklist list in the network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with the network. The terminal can determine whether the identifier of the application program exists in a blacklist list in the network firewall to determine whether the application program is prohibited by the network firewall to access the network when the application program is determined to be the inactive application program, and automatically wait for a preset time before initiating an application program networking request when the application program is determined to be prohibited by the network firewall to access the network; the terminal can not immediately return the result that the application program can not be connected with the network when the application program is determined to be marked as the inactive state, so that the terminal can automatically perform networking on the application program marked as the inactive state, the networking success rate of the application program in the inactive state is improved, and the user experience is improved.
According to a second aspect of embodiments of the present disclosure, there is provided a networking device of an application, including:
the device comprises a receiving module, a processing module and a processing module, wherein the receiving module is configured to receive an access request for accessing an application program, which is sent by a user, wherein the access request comprises an application program identifier;
the judging module is configured to judge whether the application program is an inactive application program or not according to the application program identification;
a query module configured to query whether the application identifier exists in a blacklist in a network firewall if it is determined that the application is an inactive application, wherein the blacklist includes at least one application identifier marked as an inactive application;
and the connection module is configured to initiate an application networking request after waiting for a preset time so that the application is connected with the network if the application identification is determined to be in a blacklist in a network firewall.
Further, the connection module includes:
a removing submodule configured to remove the application identifier from a blacklist within the preset time and remove the mark of the inactive state of the application if it is determined that the application identifier exists in the blacklist in the network firewall;
a connection sub-module configured to initiate an application networking request after waiting a preset time to enable the application to connect to a network.
Further, the apparatus further comprises:
and the initiating module is configured to initiate the application networking request after the connecting module waits for the preset time so that the application is connected with the network, and if the application is not successfully connected with the network, the initiating module re-initiates the application networking request for a preset number of times.
Further, the apparatus further comprises:
and the pushing module is configured to, after the connection module initiates an application networking request after waiting for the preset time so that the application is connected to the network, if the application is unsuccessfully connected to the network, push other applications of the same type as the application to the user so that the user determines whether to open the other applications.
Further, if the access request includes at least two application program identifiers;
correspondingly, the connection module is specifically configured to:
if the application program identification is determined to be in a blacklist list in the network firewall, after waiting for a preset time, sequentially initiating application program networking requests for the application programs according to the priority order of the application programs corresponding to the application program identifications so that the application programs are sequentially connected with the network.
Further, the priority order includes any one of the following:
the descending order of the use times of each application program, the priority level of each application program set by a user, and the order of the type of each application program.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: receiving an access request for accessing an application program sent by a user, wherein the access request comprises an application program identifier; judging whether the application program is in an inactive state or not according to the application program identifier; if the application program is determined to be the inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as the inactive application program; and if the application program identification is determined to be in the blacklist list in the network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with the network. The terminal can determine whether the identifier of the application program exists in a blacklist list in the network firewall to determine whether the application program is prohibited by the network firewall to access the network when the application program is determined to be the inactive application program, and automatically wait for a preset time before initiating an application program networking request when the application program is determined to be prohibited by the network firewall to access the network; the terminal can not immediately return the result that the application program can not be connected with the network when the application program is determined to be marked as the inactive state, so that the terminal can automatically perform networking on the application program marked as the inactive state, the networking success rate of the application program in the inactive state is improved, and the user experience is improved.
According to a third aspect of the embodiments of the present disclosure, there is provided a terminal, including:
a processor, and a memory for storing processor-executable instructions;
wherein the processor is configured to: receiving an access request for accessing an application program, wherein the access request comprises an application program identifier; judging whether the application program is an inactive application program or not according to the application program identifier; if the application program is determined to be an inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as an inactive application program; and if the application program identification is determined to be in a blacklist list in the network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with the network.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: receiving an access request for accessing an application program sent by a user, wherein the access request comprises an application program identifier; judging whether the application program is in an inactive state or not according to the application program identifier; if the application program is determined to be the inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as the inactive application program; and if the application program identification is determined to be in the blacklist list in the network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with the network. The terminal can determine whether the identifier of the application program exists in a blacklist list in the network firewall to determine whether the application program is prohibited by the network firewall to access the network when the application program is determined to be the inactive application program, and automatically wait for a preset time before initiating an application program networking request when the application program is determined to be prohibited by the network firewall to access the network; the terminal can not immediately return the result that the application program can not be connected with the network when the application program is determined to be marked as the inactive state, so that the terminal can automatically perform networking on the application program marked as the inactive state, the networking success rate of the application program in the inactive state is improved, and the user experience is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a flow chart illustrating a first embodiment of a networking method of an application according to an exemplary embodiment;
FIG. 2 is a flowchart illustrating a second embodiment of a networking method for an application, according to an illustrative embodiment;
FIG. 3 is a block diagram illustrating a third embodiment of a networking device for an application, according to an illustrative embodiment;
FIG. 4 is a block diagram illustrating a fourth embodiment of a networking device for an application, according to an illustrative embodiment;
FIG. 5 is a block diagram illustrating entities of a terminal in accordance with an exemplary embodiment;
fig. 6 is a block diagram illustrating a terminal device 800 according to an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
Fig. 1 is a flowchart illustrating a first embodiment of a networking method for an application, as shown in fig. 1, the networking method for an application is used in a terminal, which includes a mobile terminal, a personal terminal and the like, such as a touch screen mobile phone, a tablet computer, a personal computer and the like, and the method includes the following steps.
In step S11, an access request for accessing an application program sent by a user is received, where the access request includes an application program identifier.
In this step, when the user needs to use the application program in the terminal, the user may touch the application program displayed on the terminal screen, or the user sends a voice message for opening the application program to the terminal, and the terminal may obtain an access request for accessing the application program, which is sent by the user, where the access request includes an application program identifier (Identification, abbreviated as ID).
In step S12, it is determined whether the application program is an inactive application program according to the application program identifier.
In this step, since the system of the terminal marks the application as inactive after the application is not used by the user for a period of time, and restricts the application from accessing the network, the application cannot access the network, and the application is restricted from using system resources in the terminal by using a method such as Job scheduling service (Job Scheduler). Therefore, the terminal needs to determine whether the application is an inactive application in the foreground based on the application ID in the access request.
For example, the foreground of the terminal has stored therein application ID's of a plurality of applications in an inactive state, so that the terminal can determine in the foreground whether the current application is an application in an inactive state.
In step S13, if it is determined that the application is an inactive application, querying whether the application identifier exists in a blacklist in a network firewall, wherein the blacklist includes at least one application identifier marked as an inactive application.
In this step, since there is a blacklist in the network firewall of the terminal, the blacklist includes at least one application identifier marked as an inactive application; if the terminal determines that the application is an inactive application, the terminal may go to the firewall to query whether the application identifier exists in a blacklist in the network firewall.
In particular, in a terminal, especially a mobile terminal, an Android (Android) system is mostly adopted, and after an application is not used by a user for a period of time, the application is marked in an Android source code in the terminal as an appactive state, namely an inactive state; meanwhile, the terminal can use the netd service at the bottom layer of the terminal to control the network of the application program, and the netd adds the application program identification ID of the application program into a blacklist list of the chain of the fw _ standby of the network firewall through the iptables service, so that the purpose of controlling the application program to access the network is achieved; it is noted that the blacklist includes a plurality of application identifications marked as inactive applications. Therefore, when the terminal determines that the application is an inactive application, it may determine that the application is denied access to the network, and the terminal may first query, through an iptables service, whether an application ID of the application exists in a chain blacklist of fw _ standby of a network firewall.
In step S14, if it is determined that the application identifier exists in the blacklist in the network firewall, an application networking request is initiated after waiting for a preset time to connect the application to the network.
In the implementation process of step S14, the terminal performs the following processes:
and removing the application program identification from the blacklist within the preset time, and removing the mark of the inactive state of the application program.
In this step, if the terminal determines that the application identifier exists in the blacklist list in the network firewall, the terminal may wait for a preset time, and then the terminal initiates an application networking request after waiting for the preset time, so that the current application connects to the network. In the preset time, the terminal removes the mark of the inactive state of the application program in the foreground, and removes the application program identifier of the application program in a blacklist list in the network firewall.
Specifically, if the terminal determines that the application program identifier exists in a blacklist list in a network firewall, at this time, an access request of the application program can be put into a cache list, and then the terminal waits for a preset time of 500 ms; within 500ms of the preset time, the terminal removes the mark of the inactive state of the application program in the foreground, and removes the application program identification ID of the application program from a chain blacklist list of fw _ standby of a network firewall through iptables service; and the preset time of 500ms is obtained by collecting and analyzing the summarized big data on a large number of user mobile phones, and the preset time of 500ms is used for waiting for a system framework layer of the terminal to detect that the application program reaches the foreground, removing the appactive state mark of the application program, and releasing the network control of the network firewall on the application program. Thus, after the preset time of 500ms, the terminal initiates an application networking request and returns an access result, so that the application is connected with the network.
The embodiment receives an access request for accessing an application program sent by a user, wherein the access request comprises an application program identifier; judging whether the application program is in an inactive state or not according to the application program identifier; if the application program is determined to be the inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as the inactive application program; and if the application program identification is determined to be in the blacklist list in the network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with the network. The terminal can determine whether the identifier of the application program exists in a blacklist list in the network firewall to determine whether the application program is prohibited by the network firewall to access the network when the application program is determined to be the inactive application program, and automatically wait for a preset time before initiating an application program networking request when the application program is determined to be prohibited by the network firewall to access the network; the terminal can not immediately return the result that the application program can not be connected with the network when the application program is determined to be marked as the inactive state, so that the terminal can automatically perform networking on the application program marked as the inactive state, the networking success rate of the application program in the inactive state is improved, and the user experience is improved.
On the basis of the embodiment shown in fig. 1, fig. 2 is a flowchart of a second embodiment of a networking method for an application according to an exemplary embodiment, as shown in fig. 2, if the access request includes at least two application identifiers;
correspondingly, step S14 specifically includes:
if the application program identification is determined to be in a blacklist list in the network firewall, after waiting for a preset time, sequentially initiating application program networking requests for the application programs according to the priority order of the application programs corresponding to the application program identifications so that the application programs are sequentially connected with the network.
Wherein the priority order comprises any one of the following:
the descending order of the use times of each application program, the priority level of each application program set by a user, and the order of the type of each application program.
In this step, when the access request includes application program identifiers of a plurality of application programs, if the terminal determines that each application program identifier exists in a blacklist list in a network firewall, the terminal stores each application program identifier in a cache list, and sets a priority order for each application program; the priority order may be a descending order of the number of times each application is used, a priority order of each application set by the user, or a type order of each application.
And then after waiting for the preset time, the terminal initiates application networking requests for the applications in sequence according to the priority order of the applications, so that the applications are connected with the network in sequence according to the priority order.
Further included after step S14 is:
in step S21, if the application is not successful in connecting to the network, the application networking request is reinitiated a preset number of times.
In this step, after step S14, if the terminal determines that the application is unsuccessful in connecting to the network, the terminal may initiate an application networking request for the application again. The terminal may initiate multiple networking requests.
Alternatively, after step S14, the method further includes:
in step S22, if the application is not successful in connecting to the network, pushing other applications of the same type as the application to the user so that the user can determine whether to open the other applications.
In this step, after step S14, if the terminal determines that the application is not successful in connecting to the network, the terminal may determine the type of the application, and then the terminal may push to the user other applications of the same type as the application that the terminal has installed, and then the user himself selects whether to open other applications of the same type as the application.
For example, after step S14, if the terminal determines that the application is not successful in connecting to the network, the terminal may determine that the type of the application is "video type", and then the terminal may push other applications of "video type" that the terminal has installed to the user, and then the user selects whether to open the other applications of "video type".
The embodiment receives an access request for accessing an application program sent by a user, wherein the access request comprises an application program identifier; judging whether the application program is in an inactive state or not according to the application program identifier; if the application program is determined to be the inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as the inactive application program; and if the application program identification is determined to be in the blacklist list in the network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with the network. The terminal can determine whether the identifier of the application program exists in a blacklist list in the network firewall to determine whether the application program is prohibited by the network firewall to access the network when the application program is determined to be the inactive application program, and automatically wait for a preset time before initiating an application program networking request when the application program is determined to be prohibited by the network firewall to access the network; the terminal can not immediately return the result that the application program can not be connected with the network when the application program is determined to be marked as the inactive state, so that the terminal can automatically perform networking on the application program marked as the inactive state, the networking success rate of the application program in the inactive state is improved, and the user experience is improved. If the application program is unsuccessfully connected with the network, the application program networking request with preset times is reinitiated; or if the application program is unsuccessfully connected to the network, pushing other application programs of the same type as the application program to the user so that the user can determine whether to open the other application programs; therefore, the current application program can be successfully networked, or other application programs are recommended to the user, and the user experience is improved.
Fig. 3 is a block diagram illustrating an application networking device embodiment three in accordance with an exemplary embodiment. Referring to fig. 3, the apparatus includes:
the receiving module 31 is configured to receive an access request sent by a user to access an application program, where the access request includes an application program identifier;
a determining module 32 configured to determine whether the application program is an inactive application program according to the application program identifier;
a query module 33 configured to query whether the application identifier exists in a blacklist of applications marked as inactive if it is determined that the application is an inactive application, wherein the blacklist includes at least one application identifier marked as an inactive application;
a connection module 34 configured to initiate an application networking request after waiting a preset time to connect the application to the network if it is determined that the application identifier exists in a blacklist in a network firewall.
With regard to the apparatus in the above embodiment, the specific manner in which each module performs the operation has been described in detail in the first embodiment related to the method, and will not be elaborated here.
The embodiment receives an access request for accessing an application program sent by a user, wherein the access request comprises an application program identifier; judging whether the application program is in an inactive state or not according to the application program identifier; if the application program is determined to be the inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as the inactive application program; and if the application program identification is determined to be in the blacklist list in the network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with the network. The terminal can determine whether the identifier of the application program exists in a blacklist list in the network firewall to determine whether the application program is prohibited by the network firewall to access the network when the application program is determined to be the inactive application program, and automatically wait for a preset time before initiating an application program networking request when the application program is determined to be prohibited by the network firewall to access the network; the terminal can not immediately return the result that the application program can not be connected with the network when the application program is determined to be marked as the inactive state, so that the terminal can automatically perform networking on the application program marked as the inactive state, the networking success rate of the application program in the inactive state is improved, and the user experience is improved.
On the basis of the embodiment shown in fig. 3, fig. 4 is a block diagram of a fourth embodiment of a networking device of an application according to an exemplary embodiment. Referring to fig. 4, the connection module 34 includes:
a removing submodule 341, configured to, if it is determined that the application identifier exists in a blacklist in a network firewall, remove the application identifier from the blacklist within the preset time, and remove the flag of the inactive state of the application;
a connection sub-module 342 configured to initiate an application networking request after waiting a preset time to enable the application to connect to a network.
The device, still include:
an initiating module 41 configured to, after the connecting module 34 initiates the application networking request after waiting for the preset time, so that the application connects to the network, if the application does not connect to the network successfully, reinitiate the application networking request a preset number of times.
Alternatively, the apparatus further comprises:
a pushing module 42 configured to, after the connecting module 34 initiates an application networking request after waiting for the preset time, so that the application connects to the network, if the application does not connect to the network successfully, push another application of the same type as the application to the user, so that the user determines whether to open the another application.
If the access request comprises at least two application program identifications;
accordingly, the connection module 34 is specifically configured to:
if the application program identification is determined to be in a blacklist list in the network firewall, after waiting for a preset time, sequentially initiating application program networking requests for the application programs according to the priority order of the application programs corresponding to the application program identifications so that the application programs are sequentially connected with the network.
Wherein the priority order comprises any one of the following:
the descending order of the use times of each application program, the priority level of each application program set by a user, and the order of the type of each application program.
With regard to the apparatus in the above embodiment, the specific manner in which each module performs the operation has been described in detail in the second embodiment related to the method, and will not be elaborated here.
The embodiment receives an access request for accessing an application program sent by a user, wherein the access request comprises an application program identifier; judging whether the application program is in an inactive state or not according to the application program identifier; if the application program is determined to be the inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as the inactive application program; and if the application program identification is determined to be in the blacklist list in the network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with the network. The terminal can determine whether the identifier of the application program exists in a blacklist list in the network firewall to determine whether the application program is prohibited by the network firewall to access the network when the application program is determined to be the inactive application program, and automatically wait for a preset time before initiating an application program networking request when the application program is determined to be prohibited by the network firewall to access the network; the terminal can not immediately return the result that the application program can not be connected with the network when the application program is determined to be marked as the inactive state, so that the terminal can automatically perform networking on the application program marked as the inactive state, the networking success rate of the application program in the inactive state is improved, and the user experience is improved. If the application program is unsuccessfully connected with the network, the application program networking request with preset times is reinitiated; or if the application program is unsuccessfully connected to the network, pushing other application programs of the same type as the application program to the user so that the user can determine whether to open the other application programs; therefore, the current application program can be successfully networked, or other application programs are recommended to the user, and the user experience is improved.
Fig. 5 is a block diagram illustrating entities of a terminal according to an example embodiment. Referring to fig. 5, the terminal may be embodied as: a processor 51, and a memory 52 configured to store processor-executable instructions;
wherein the processor 51 is configured to: receiving an access request for accessing an application program, wherein the access request comprises an application program identifier; judging whether the application program is an inactive application program or not according to the application program identifier; if the application program is determined to be an inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as an inactive application program; and if the application program identification is determined to be in a blacklist list in the network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with the network.
In the above embodiments, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. The general-purpose processor may be a microprocessor, or the processor may be any conventional processor, and the aforementioned memory may be a read-only memory (ROM), a Random Access Memory (RAM), a flash memory, a hard disk, or a solid state disk. SIM cards, also known as subscriber identity cards, smart cards, must be installed in a digital mobile phone for use. That is, the information of the digital mobile phone client, the encrypted key and the contents of the user's phone book are stored on the computer chip. The steps of a method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in the processor.
With regard to the terminal in the above-described embodiment, the specific manner in which each module performs operations has been described in detail in the embodiment related to the method and apparatus, and will not be elaborated herein.
The embodiment receives an access request for accessing an application program sent by a user, wherein the access request comprises an application program identifier; judging whether the application program is in an inactive state or not according to the application program identifier; if the application program is determined to be the inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as the inactive application program; and if the application program identification is determined to be in the blacklist list in the network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with the network. The terminal can determine whether the identifier of the application program exists in a blacklist list in the network firewall to determine whether the application program is prohibited by the network firewall to access the network when the application program is determined to be the inactive application program, and automatically wait for a preset time before initiating an application program networking request when the application program is determined to be prohibited by the network firewall to access the network; the terminal can not immediately return the result that the application program can not be connected with the network when the application program is determined to be marked as the inactive state, so that the terminal can automatically perform networking on the application program marked as the inactive state, the networking success rate of the application program in the inactive state is improved, and the user experience is improved.
Fig. 6 is a block diagram illustrating a terminal device 800 according to an example embodiment. For example, the terminal device 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
Referring to fig. 6, terminal device 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the terminal device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the terminal device 800. Examples of such data include instructions for any application or method operating on terminal device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 806 provide power to the various components of terminal device 800. Power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for terminal device 800.
The multimedia component 808 comprises a screen providing an output interface between the terminal device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. When the terminal device 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive an external audio signal when the terminal device 800 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
Sensor component 814 includes one or more sensors for providing various aspects of state assessment for terminal device 800. For example, sensor assembly 814 may detect an open/closed status of terminal device 800, the relative positioning of components, such as a display and keypad of terminal device 800, sensor assembly 814 may also detect a change in the position of terminal device 800 or a component of terminal device 800, the presence or absence of user contact with terminal device 800, orientation or acceleration/deceleration of terminal device 800, and a change in the temperature of terminal device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
Communication component 816 is configured to facilitate communications between terminal device 800 and other devices in a wired or wireless manner. The terminal device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the terminal device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the terminal device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer-readable storage medium having instructions therein, which when executed by a processor of a mobile terminal, enable the mobile terminal to perform a networking method of an application, the method comprising:
receiving an access request for accessing an application program, wherein the access request comprises an application program identifier;
judging whether the application program is an inactive application program or not according to the application program identifier;
if the application program is determined to be an inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as an inactive application program;
and if the application program identification is determined to be in a blacklist list in the network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with the network.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. A networking method for an application, comprising:
receiving an access request for accessing an application program, wherein the access request comprises an application program identifier;
judging whether the application program is an inactive application program or not according to the application program identifier;
if the application program is determined to be an inactive application program, inquiring whether the application program identification exists in a blacklist in a network firewall, wherein the blacklist comprises at least one application program identification marked as an inactive application program;
if the application program identification is determined to be in a blacklist list in a network firewall, initiating an application program networking request after waiting for a preset time so that the application program is connected with a network;
after the initiating an application networking request after waiting for the preset time to connect the application to the network, the method further comprises:
and if the application program is not successful in connecting the network, pushing other application programs of the same type as the application program to the user so that the user can determine whether to open the other application programs.
2. The method of claim 1, further comprising:
and removing the application program identification from the blacklist within the preset time, and removing the mark of the inactive state of the application program.
3. The method of claim 1, wherein after said initiating an application networking request after waiting a preset time to connect the application to a network, further comprising:
and if the application program is unsuccessfully connected with the network, re-initiating the application program network connection request for preset times.
4. A method according to any of claims 1-3, characterized in that if said access request comprises at least two application identities;
accordingly, the initiating an application networking request after waiting for a preset time to enable the application to connect to a network includes:
after waiting for the preset time, sequentially initiating application program networking requests for the application programs according to the priority order of the application programs corresponding to the application program identifications so that the application programs are sequentially connected with the network.
5. The method of claim 4, wherein the priority order comprises any one of:
the descending order of the use times of each application program, the priority level of each application program set by a user, and the order of the type of each application program.
6. A networking device for an application, comprising:
the device comprises a receiving module, a processing module and a processing module, wherein the receiving module is configured to receive an access request for accessing an application program, which is sent by a user, wherein the access request comprises an application program identifier;
the judging module is configured to judge whether the application program is an inactive application program or not according to the application program identification;
a query module configured to query whether the application identifier exists in a blacklist in a network firewall if it is determined that the application is an inactive application, wherein the blacklist includes at least one application identifier marked as an inactive application;
a connection module configured to initiate an application networking request after waiting a preset time to enable the application to connect to a network if it is determined that the application identifier exists in a blacklist in a network firewall;
further comprising:
and the pushing module is configured to, after the connection module initiates an application networking request after waiting for the preset time so that the application is connected to the network, if the application is unsuccessfully connected to the network, push other applications of the same type as the application to the user so that the user determines whether to open the other applications.
7. The apparatus of claim 6, wherein the connection module comprises:
a removing submodule configured to remove the application identifier from a blacklist within the preset time and remove the mark of the inactive state of the application if it is determined that the application identifier exists in the blacklist in the network firewall;
a connection sub-module configured to initiate an application networking request after waiting a preset time to enable the application to connect to a network.
8. The apparatus of claim 6, further comprising:
and the initiating module is configured to initiate the application networking request after the connecting module waits for the preset time so that the application is connected with the network, and if the application is not successfully connected with the network, the initiating module re-initiates the application networking request for a preset number of times.
9. The apparatus according to any of claims 6-8, wherein if the access request comprises at least two application identifiers;
correspondingly, the connection module is specifically configured to:
if the application program identification is determined to be in a blacklist list in the network firewall, after waiting for a preset time, sequentially initiating application program networking requests for the application programs according to the priority order of the application programs corresponding to the application program identifications so that the application programs are sequentially connected with the network.
10. The apparatus of claim 9, wherein the priority order comprises any one of:
the descending order of the use times of each application program, the priority level of each application program set by a user, and the order of the type of each application program.
CN201710241487.6A 2017-04-13 2017-04-13 Application networking method and device and terminal Active CN107094094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710241487.6A CN107094094B (en) 2017-04-13 2017-04-13 Application networking method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710241487.6A CN107094094B (en) 2017-04-13 2017-04-13 Application networking method and device and terminal

Publications (2)

Publication Number Publication Date
CN107094094A CN107094094A (en) 2017-08-25
CN107094094B true CN107094094B (en) 2020-06-19

Family

ID=59638079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710241487.6A Active CN107094094B (en) 2017-04-13 2017-04-13 Application networking method and device and terminal

Country Status (1)

Country Link
CN (1) CN107094094B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11849321B2 (en) 2021-03-24 2023-12-19 Verizon Patent And Licensing Inc. Systems and methods for temporarily barring UE network slice usage

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108391307B (en) * 2018-02-09 2021-11-23 北京小米移动软件有限公司 Power consumption control method and device based on android system and storage medium
CN108259514B (en) * 2018-03-26 2020-11-24 平安科技(深圳)有限公司 Vulnerability detection method and device, computer equipment and storage medium
CN108934056B (en) * 2018-06-20 2021-01-15 联想(北京)有限公司 Control method and system of electronic equipment
CN111162943B (en) * 2019-12-27 2021-02-09 珠海格力电器股份有限公司 Method and device for configuring application networking priority and electronic equipment
CN112883073B (en) * 2021-03-22 2024-04-05 北京同邦卓益科技有限公司 Data screening method, device, equipment, readable storage medium and product

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009008003A2 (en) * 2007-07-10 2009-01-15 Bhavin Turakhia Method and system for restricting access of one or more users to a service
WO2010002317A1 (en) * 2008-07-02 2010-01-07 Telefonaktiebolaget L M Ericsson (Publ) Automatic configuration of inter-domain access technology neighbor relations
CN101431473B (en) * 2008-12-31 2011-05-04 深圳市迅雷网络技术有限公司 Method and apparatus for implementing network speed limit
CN102469093B (en) * 2010-11-19 2015-02-18 中国电信股份有限公司 System and method for controlling networking authorization on networking application
US8744439B2 (en) * 2011-10-07 2014-06-03 Apple Inc. Methods and apparatus for intelligent initiation of connections within a network
CN103857008A (en) * 2012-12-03 2014-06-11 电信科学技术研究院 Access control method and device
CN106059954B (en) * 2016-05-27 2019-08-02 青岛海信电器股份有限公司 A kind of method and device that network bandwidth is adjusted

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11849321B2 (en) 2021-03-24 2023-12-19 Verizon Patent And Licensing Inc. Systems and methods for temporarily barring UE network slice usage

Also Published As

Publication number Publication date
CN107094094A (en) 2017-08-25

Similar Documents

Publication Publication Date Title
CN107094094B (en) Application networking method and device and terminal
EP3226432B1 (en) Method and devices for sharing media data between terminals
CN107205084B (en) Network speed processing method and device of application program and terminal
CN109314913B (en) Access control limiting method and device
CN106454998B (en) Wireless local area network access method, device and terminal
WO2020097845A1 (en) Method and device for using network slice
CN108702763B (en) Method and device for sending lead code and scheduling request
US20220256497A1 (en) Methods and apparatuses for receiving paging signaling, and methods and apparatuses for transmitting paging signaling
CN106537344A (en) A method and apparatus for managing application calls
CN108206998A (en) Obtain the method and device of end message
US20230180101A1 (en) Communication control method and communication control apparatus
CN104618987B (en) Access the method and device of network
US11218990B2 (en) Method and apparatus for receiving and sending system information, user equipment and base station
CN106792570B (en) Positioning method and device
CN108028810B (en) Method and device for establishing service connection
CN110637502B (en) Data processing method and device, electronic equipment and computer readable storage medium
CN106506808B (en) Method and device for prompting communication message
CN104780256A (en) Address book management method and device and intelligent terminal
CN105991626A (en) Network access method and network access device
CN109885360B (en) Data processing method, device and storage medium
WO2017166461A1 (en) Method and apparatus for managing application program call
CN107070816B (en) Application identification method and device and mobile terminal
US20170316039A1 (en) Information acquisition method, device and system
CN114430370B (en) Method, device, equipment and storage medium for determining network slice
CN109194639B (en) Message receiving and processing method, device, terminal and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant