CN107634940B - Flow use control method, terminal, server and readable storage medium - Google Patents

Flow use control method, terminal, server and readable storage medium Download PDF

Info

Publication number
CN107634940B
CN107634940B CN201710766509.0A CN201710766509A CN107634940B CN 107634940 B CN107634940 B CN 107634940B CN 201710766509 A CN201710766509 A CN 201710766509A CN 107634940 B CN107634940 B CN 107634940B
Authority
CN
China
Prior art keywords
application
blacklist
terminal
state
flow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710766509.0A
Other languages
Chinese (zh)
Other versions
CN107634940A (en
Inventor
王辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710766509.0A priority Critical patent/CN107634940B/en
Publication of CN107634940A publication Critical patent/CN107634940A/en
Application granted granted Critical
Publication of CN107634940B publication Critical patent/CN107634940B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the invention discloses a flow use control method, a terminal, a server and a readable storage medium, wherein the method comprises the following steps: receiving a blacklist notification message sent by a terminal; analyzing the blacklist notification message to obtain an application identifier; counting the times of adding the application to a blacklist according to the application identifier; and if the times are greater than a preset threshold value, sending a blacklist prompt message to a terminal installed with the application, wherein the blacklist prompt message carries the identifier of the application.

Description

Flow use control method, terminal, server and readable storage medium
Technical Field
The present invention relates to the field of communications, and in particular, to a method, a terminal, a server, and a readable storage medium for controlling traffic usage.
Background
With the development of mobile communication technology, especially the popularization and application of mobile networks and intelligent terminals, the field of mobile internet is developed rapidly. At present, the function of the intelligent terminal is not simply used for meeting the mutual contact of people, and is an important mobile personal entertainment terminal in daily life.
When the user uses the intelligent terminal, various applications, such as entertainment, work, life and other related software applications, can be installed according to the user's needs. However, since some application programs have defects in design or are not considered to be thorough in flow control, even some lawbreakers develop malicious application programs, and under the condition that a user does not know the application programs, the flow is used in the background of the application programs in an stealing manner, which not only quickly consumes the electric quantity of the mobile equipment of the user, but also may add a large amount of extra flow cost to the user to cause flow abnormity, and how to effectively control the use of the flow becomes one of the concerns of the user.
At present, when a user controls the use of flow, some applications are added into a blacklist, and the use of the flow is controlled according to the blacklist, but the applications added into the blacklist are either added into the blacklist in advance by the user or added into the blacklist by setting a flow threshold value to exceed a threshold value. In some cases, the flow consumed by the application is large, and the flow consumption is not abnormal, so that the user cannot distinguish the application of the flow stolen, and the application is not intelligent enough.
Disclosure of Invention
In view of this, embodiments of the present invention are expected to provide a flow use control method, a terminal, a server, and a readable storage medium, so as to solve the problem that an application that consumes a flow maliciously cannot be determined intelligently in the prior art, determine whether the application is an application that consumes a flow maliciously according to the type of the application and the flow consumed by multiple users using the application, and effectively prevent the flow loss of an application background, thereby saving the electric quantity of the terminal and saving the flow cost of the users.
The technical scheme of the embodiment of the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a method for controlling traffic usage, where the method includes:
receiving a blacklist notification message sent by a terminal;
analyzing the blacklist notification message to obtain an application identifier;
counting the times of adding the application to a blacklist according to the application identifier;
and if the times are greater than a preset threshold value, sending a blacklist prompt message to a terminal installed with the application, wherein the blacklist prompt message carries the identifier of the application.
In a second aspect, an embodiment of the present invention provides a method for controlling traffic usage, where the method includes:
acquiring the identifier of the application which runs in the background and is not added to the blacklist and the whitelist;
counting the flow value consumed by the application in the current state of the terminal;
if the flow value is larger than a first threshold value corresponding to the current state, prohibiting the application from accessing the network, wherein the first threshold value is acquired from a server;
and if an operation of adding the application to the blacklist is received, adding the identification of the application to the blacklist.
In a third aspect, an embodiment of the present invention provides a server, where the server at least includes: a processor, a memory, and a communication bus, wherein:
the communication bus is used for realizing connection communication between the processor and the memory;
the memory is used for storing a control program used by the flow;
the processor is used for executing the flow use control program stored in the memory so as to realize the following steps:
receiving a blacklist notification message sent by a terminal;
analyzing the blacklist notification message to obtain an application identifier;
counting the times of adding the application to a blacklist according to the application identifier;
and if the times are greater than a preset threshold value, sending a blacklist prompt message to a terminal installed with the application, wherein the blacklist prompt message carries the identifier of the application.
In a fourth aspect, an embodiment of the present invention provides a terminal, where the terminal at least includes: a processor, a memory, and a communication bus, wherein:
the communication bus is used for realizing connection communication between the processor and the memory;
the memory is used for storing a control program used by the flow;
the processor is used for executing the flow use control program stored in the memory so as to realize the following steps:
acquiring the identifier of the application which runs in the background and is not added to the blacklist and the whitelist;
counting the flow value consumed by the application in the current state of the terminal;
if the flow value is larger than a first threshold value corresponding to the current state, prohibiting the application from accessing the network, wherein the first threshold value is acquired from a server;
and if an operation of adding the application to the blacklist is received, adding the identification of the application to the blacklist.
In a fifth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a flow rate use control program is stored, and the flow rate use control program, when executed by a processor, implements the steps of the flow rate use control method described above.
The embodiment of the invention provides a flow use control method, a terminal, a server and a readable storage medium, wherein the method comprises the steps of firstly acquiring an identifier of an application which runs in a background and is not added to a blacklist and is not added to a whitelist; then, counting the flow value consumed by the application in the current state of the terminal; if the flow value is larger than a first threshold value corresponding to the current state, prohibiting the application from accessing the network, wherein the first threshold value is acquired from a server; and if an operation of adding the application to the blacklist is received, adding the identification of the application to the blacklist. The first threshold used in the judgment is determined by the server according to the type of the application and the flow consumed by the application used by multiple users, so that the application which maliciously consumes the flow is determined more intelligently, the problem of flow loss of an application background is effectively prevented, the electric quantity of the terminal is saved, and the flow cost of the users can be saved.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of a mobile terminal implementing various embodiments of the present invention;
fig. 2 is a diagram of a communication network system architecture according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of an implementation of a flow use control method according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of an interface for a terminal to output prompt information according to an embodiment of the present invention;
fig. 5 is another flow rate usage control method provided in the embodiment of the present invention;
FIG. 6 is a schematic interface diagram of a blacklist of a terminal according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of an interface where a terminal receives a blacklist prompt message according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and a fixed terminal such as a Digital TV, a desktop computer, and the like.
The following description will be given by way of example of a mobile terminal, and it will be understood by those skilled in the art that the construction according to the embodiment of the present invention can be applied to a fixed type terminal, in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present invention, the mobile terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000 (Code Division Multiple Access 2000 ), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the gesture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometer and tapping), and other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which are also configurable to the mobile phone, and are not described herein again.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited to these specific examples.
Further, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Specifically, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above mobile terminal hardware structure and communication network system, the present invention provides various embodiments of the method.
An embodiment of the present invention provides a method for controlling traffic usage, and fig. 3 is a schematic flow chart illustrating an implementation of the method for controlling traffic usage provided in the embodiment of the present invention, and as shown in fig. 3, the method includes the following steps:
step S301, acquiring the identification of the applications which run in the background and are not added to the blacklist and the whitelist.
Here, the step S301 may be performed by a terminal, and further, may be a mobile terminal, for example, a mobile terminal with wireless communication capability such as a mobile phone (mobile phone), an iPad, a notebook, a wearable smart watch, and the like, and may also be a terminal device with computing function such as a desktop computer, which is not convenient for moving.
In this embodiment and other embodiments, the application added to the white list may be considered as an application trusted by the user and considered as a secure application, and the application added to the white list is not controlled by the control method used by the traffic in this embodiment, and may use the traffic without limitation. Applications added to the blacklist may be considered as applications that maliciously consume traffic and may be prohibited from using the traffic, i.e. from interacting with network data.
In the actual implementation process, an identification bit may be set for each application, and if an application is added to the blacklist, the value of the identification bit is set to a first preset value, for example, the first preset value may be 1; if an application is added to the white list, setting the value of the identification bit to a second preset value, for example, the second preset value may be 0; if an application is not added to the black list or the white list, the value of the flag is set to a third preset value, for example, the third preset value may be NULL (NULL). Therefore, the identification of the application which runs in the background and is not added to the blacklist and not added to the whitelist can be obtained by obtaining the identification of the application of which the identification bit running in the background is the third preset value in the implementation process.
Step S302, counting the flow value consumed by the application in the current state of the terminal.
Here, the step S302 may be terminal-implemented. The current state of the terminal can be a bright screen state or a screen-off state. After receiving the broadcast of the screen off, the terminal is considered to enter a screen off state; the terminal is considered to enter a bright screen state after receiving a broadcast of a lighted screen.
When the flow value consumed by the application in the current state of the terminal is counted, the terminal can count and count the data packets according to some item or items of the source IP, the source port number, the protocol type, the input/output interface, the destination IP and the destination port number of the data packets in the current state. For example, a fixed destination port is usually used by an application that needs traffic statistics, and then a packet that is considered to be a destination port as the port belongs to an application that needs traffic statistics, and further count and count the packet that uses the destination port, where the count is the traffic statistics of the application.
In other embodiments, for terminals using the android system version 2.2 or more, network traffic statistics can be performed by using one network traffic statistics class (android. The total flow can be counted and the flow of a single process can be counted by using the android.
The above-listed implementation manners for counting the flow value consumed by the application in the current state of the terminal are only exemplary, and those skilled in the art use the technical idea of the present invention to make other implementation manners for counting the flow value consumed by the application in the current state of the terminal according to their specific requirements fall within the protection scope of the present invention, which is not exhaustive herein.
Step S303, if the flow value is greater than the first threshold corresponding to the current state, prohibiting the application from accessing the network.
Here, the first threshold value is acquired from a server.
In other embodiments, before the step S303, the method further includes: judging whether the flow value is larger than a first threshold corresponding to the current state of the terminal; if the flow value is greater than the first threshold corresponding to the current state, step S303 is performed; and if the flow value is not larger than the first threshold corresponding to the current state, ending the flow.
In this embodiment, once the traffic value is greater than the first threshold corresponding to the current state, the application is immediately prohibited from accessing the network, so as to avoid a loss in traffic tariff to the user. In other embodiments, after the step S303, the method further includes: and generating and outputting prompt information. Fig. 4 is a schematic interface diagram of a terminal outputting a prompt message according to an embodiment of the present invention, and as shown in fig. 4, the prompt message 401 is used to prompt a user that the application has a risk of malicious consumption of traffic and ask the user to determine whether to add the application to a blacklist.
Step S304, if the operation of adding the application to the blacklist is received, adding the identifier of the application to the blacklist.
In other embodiments, before the step S304, the method further includes: judging whether an operation of adding the application to a blacklist is received; if an operation of adding the application to a blacklist is received, entering step S304; and if the operation of adding the user to the blacklist is not received, allowing the application to continue accessing the network.
In an actual implementation process, the determination of whether the operation of adding the application to the blacklist is received may be performed by determining whether a pressing or touch operation made by the user on a "yes" button in 401 is received, and if the pressing or touch operation made by the user on the "yes" button in 401 is received, the operation of adding the application to the blacklist is considered to be received. If a press or touch operation made by the user on the "no" button in 401 is received, it is considered that an operation of adding the user to the blacklist is not received.
In the actual implementation process, the value of the flag bit of the white list used for representing the black list by the application may be set as a first preset value.
In the control method for traffic usage provided in this embodiment, first, an identifier of an application that runs in a background and is not added to a blacklist and is not added to a whitelist is obtained; then, counting the flow value consumed by the application in the current state of the terminal; if the flow value is larger than a first threshold value corresponding to the current state, prohibiting the application from accessing the network, wherein the first threshold value is acquired from a server; and if an operation of adding the application to the blacklist is received, adding the identification of the application to the blacklist. The first threshold used in the judgment is determined by the server according to the type of the application and the flow consumed by the application used by multiple users, so that the application of the malicious consumption flow is determined more intelligently, the problem of flow loss of an application background is effectively prevented, the electric quantity of the terminal is saved, and the flow cost of the users can be saved.
Based on the foregoing embodiment, an embodiment of the present invention further provides a method for controlling traffic usage, where the method is applied to a control system formed by a terminal and a server, and fig. 5 is a flowchart of another method for controlling traffic usage, where as shown in fig. 5, the method includes the following steps:
step S501, the terminal acquires the identifier of the application which runs in the background and is not added to the blacklist and the whitelist.
Step S502, the terminal counts the flow value consumed by the application in the current state.
Here, the terminal may count the traffic value consumed by the application according to a certain statistical period, for example, with 24 hours as one statistical period, starting from 0 point of each day to 0 point of the next day, or starting from 8 points of each day to 8 points of the next day. Or a statistical period of 12 hours, a statistical period of 6 hours, etc. The statistical period may be preset by a manufacturer when the terminal leaves a factory, or may be set by a user according to the needs of the user, and the server may send the selectable statistical period and the start time to the terminal for the user to select when the user sets the statistical period according to the needs of the user.
In the present embodiment, assuming that the statistical period is 24 hours, the statistics are started from 0 o' clock of each day, and the application is a game application.
Step S503, the terminal sends a threshold request message to the server.
Here, the threshold request message carries the identifier of the application, and the threshold request message may also carry a statistical period, so that the server can determine the threshold more accurately.
The identification of the application may include, but is not limited to, the name, version number of the application.
In this embodiment, before the step S503, the method further includes: and the terminal judges whether a corresponding relation table of the terminal state and the flow threshold of the application is stored or not. If the terminal state of the application and the flow threshold corresponding relation table are stored in the terminal, the step S506 is executed; if the terminal does not store the correspondence table between the terminal status and the traffic threshold of the application, the process proceeds to step S503.
Step S504, the server obtains the corresponding relation table between the terminal state of the application and the flow threshold according to the application identification carried in the received threshold request message.
Here, the server receives the threshold request, and analyzes the threshold request to obtain an application identifier and a statistical period. Then, according to the application identifier, a corresponding relation table of the terminal state and the flow threshold of the application is obtained in a statistical period. It is assumed that the obtained correspondence table between the terminal state of the game application and the traffic threshold is as shown in table 1.
Table 1, game application terminal state and flow threshold value correspondence table
Figure 954885DEST_PATH_IMAGE001
Step S505, the server sends the correspondence table to the terminal.
Step S506, the terminal determines a first threshold corresponding to the current state according to the current state.
Here, the terminal receives the correspondence table between the terminal state of the application and the traffic threshold sent by the server, and determines the first threshold corresponding to the current state according to the current state of the terminal.
Step S507, the terminal determines whether the flow value is greater than the first threshold.
Here, if the flow value is greater than the first threshold value, proceed to step S508; if the flow value is not greater than the first threshold, go to step S502.
Step S508, the terminal prohibits the application from accessing the network.
Here, assuming that the traffic value consumed by the game application in the screen-off state counted by the terminal at 10 am reaches 12M, the terminal prohibits the game application from accessing the network and outputs a prompt message for prompting the user that the game application has a risk of maliciously consuming traffic.
In step S509, the terminal determines whether an operation of adding the application to a blacklist is received.
Here, if the terminal receives an operation of adding the application to a blacklist, it proceeds to step S510; if the terminal does not receive the operation of adding the application to the blacklist, the process goes to step S512.
Step S510, the terminal adds the identifier of the application to a blacklist.
Here, if an operation of adding the application to the blacklist by the user is received, the game application is added to the blacklist, fig. 6 is an interface schematic diagram of the blacklist of the terminal according to the embodiment of the present invention, as shown in fig. 6, in the interface of the blacklist of the terminal, an interface 601 for the user to add the application to the blacklist by himself is provided, and an interface 602 for the application to remove the blacklist is also provided.
Step S511, the terminal sends a blacklist notification message to the server.
Here, the blacklist notification message carries an identifier of the application.
Step S512, the terminal allows the application to continue accessing the network.
In other embodiments, before the step S504, the method further includes:
and 61, acquiring flow values consumed by the terminal which installs the application in a preset time period in different states.
Here, the states include a bright screen state and a dead screen state.
It should be noted that the preset time period may be 24 hours, 4 hours, 6 hours, and the like, where the preset time period is a statistical period that can be selected by a user.
And step 62, respectively carrying out statistical analysis on the flow values consumed by the terminals installed with the applications under the same state according to a preset algorithm to obtain statistical values corresponding to the state.
Here, since the number of terminals for installing the application is tens of thousands, after acquiring the flow values consumed by different terminals in a preset time period, statistical processing needs to be performed on the flow values, and statistical analysis is performed according to a preset algorithm to obtain a statistical value corresponding to the state.
And 63, determining a flow threshold corresponding to the state according to the type of the application and the statistic value corresponding to the state.
In an actual implementation process, the step 63 further includes:
step 631, determining a second threshold corresponding to the type of the application when the terminal is in the state according to the type of the application;
step 632, if the second threshold is greater than the statistical value, determining the second threshold as the flow threshold corresponding to the state;
step 633, if the second threshold is less than or equal to the statistical value, determining the statistical value as a flow threshold corresponding to the state.
In the embodiments of steps 631 to 633, different types of applications correspond to a second threshold in the on-screen state and the off-screen state, for example, for instant messaging applications, the user mainly conducts voice or text chat or sends small videos, the consumed traffic is not much, and the applications can be classified as general traffic consumption applications; for video playing applications or online game applications, the consumed traffic is large and can be divided into applications consuming a large amount of traffic, while for weather forecast applications, the consumed traffic is small and can be divided into applications consuming a small amount of traffic. The second threshold in the bright state may be 200 Megabytes (MB) for applications consuming a large amount of traffic, 80MB for applications consuming a general amount of traffic, and 10MB for applications consuming a small amount of traffic.
And step 64, generating a corresponding relation table of the terminal state and the flow threshold value based on the state and the flow threshold value corresponding to the state.
In other embodiments, after the step S511, the method further includes:
step 71, the server receives a blacklist notification message sent by a terminal;
step 72, the server analyzes the blacklist notification message to obtain an application identifier;
step 73, the server counts the times of adding the application to a blacklist according to the application identifier;
here, the server adds 1 to the number of times, which is an initial value of 0, every time it receives a blacklist notification message that adds the application to a blacklist.
And 74, if the times are greater than a preset threshold value, sending a blacklist prompt message to the terminal installed with the application, wherein the blacklist prompt message carries the identifier of the application.
Step 75, the terminal receives a blacklist prompt message sent by the server;
step 76, the terminal analyzes the blacklist prompt message to obtain an application identifier carried in the blacklist prompt message;
fig. 7 is a schematic diagram of an interface where a terminal receives a blacklist prompt message according to an embodiment of the present invention, and as shown in fig. 7, the terminal outputs the prompt message 701 after receiving the blacklist prompt message sent by the server, and provides an interface for a user to determine whether to add the application to a blacklist.
Step 77, the terminal forbids the application to access the network based on the identifier of the application;
and step 78, if the terminal receives the operation of adding the application to the blacklist, adding the identifier of the application to the blacklist.
In the embodiment of steps 71 to 78, if an application is added to the blacklist by multiple users and is marked as an application with malicious consumption traffic, the server sends a prompt message to all terminals that install the application to remind the user that the application has a risk of malicious consumption traffic, so that it is possible to prevent the traffic of the user from being consumed in large quantities in advance, which results in waste of charges.
In the method for controlling traffic usage provided in the embodiment of the present invention, first, a terminal obtains an identifier of an application that runs in a background and is not added to a blacklist and is not added to a whitelist, and counts a traffic value consumed by the application in a current state. Then the terminal sends a threshold request message to a server, the server acquires a corresponding relation table of the terminal state and the flow threshold of the application according to the application identification carried in the received threshold request message, and sends the corresponding relation table to the terminal; the terminal determines a first threshold corresponding to the current state according to the current state, and if the terminal judges that the flow value is greater than the first threshold, the application is prohibited from accessing the network; if the terminal receives the operation of adding the application to the blacklist, the terminal adds the identifier of the application to the blacklist and sends a blacklist notification message to the server; if the terminal does not receive the operation of adding the application to the blacklist, the application is allowed to continue accessing the network, the application of the malicious consumption flow can be determined more intelligently, and further the problem of background flow loss of the application is effectively prevented, so that the electric quantity of the terminal is saved, and the flow cost of a user can be saved.
An embodiment of the present invention provides a server, fig. 8 is a schematic diagram of a composition structure of the server provided in the embodiment of the present invention, and as shown in fig. 8, the server 800 at least includes: a memory 801, a communication bus 802, and a processor 803, wherein:
the memory 801 is used for storing a flow use control program;
the communication bus 802 is used for realizing connection communication between the processor and the memory;
the processor 803 is configured to execute a flow rate control program stored in the memory to implement the following steps:
receiving a blacklist notification message sent by a terminal;
analyzing the blacklist notification message to obtain an application identifier;
counting the times of adding the application to a blacklist according to the application identifier;
and if the times are greater than a preset threshold value, sending a blacklist prompt message to a terminal installed with the application, wherein the blacklist prompt message carries the identifier of the application.
In other embodiments, before the step of receiving the blacklist notification message sent by the terminal, the processor 803 is further configured to execute a control program for traffic usage stored in the memory 801, so as to implement the following steps:
receiving a threshold request message sent by the terminal, wherein the threshold request message carries an application identifier;
acquiring a corresponding relation table of the terminal state and the flow threshold of the application according to the application identifier;
and sending the corresponding relation table to the terminal.
In other embodiments, before the step of receiving the threshold request message sent by the terminal, the processor 803 is further configured to execute a control program for traffic usage stored in the memory 801, so as to implement the following steps:
acquiring flow values consumed by a terminal for installing the application in a preset time period under different states, wherein the states comprise a screen-on state and a screen-off state;
respectively carrying out statistical analysis on flow values consumed by the terminals installed with the application under the same state according to a preset algorithm to obtain statistical values corresponding to the state;
determining a flow threshold corresponding to the state according to the type of the application and the statistic value corresponding to the state;
and generating a corresponding relation table of the terminal state and the flow threshold value based on the state and the flow threshold value corresponding to the state.
In other embodiments, the determining, according to the type of the application and the statistical value corresponding to the state, the traffic threshold corresponding to the state includes:
determining a second threshold corresponding to the type of the application when the terminal is in the state according to the type of the application;
if the second threshold value is larger than the statistic value, determining the second threshold value as a flow threshold value corresponding to the state;
and if the second threshold value is smaller than or equal to the statistic value, determining the statistic value as a flow threshold value corresponding to the state.
An embodiment of the present invention further provides a computer-readable storage medium, where a flow rate use control program is stored on the computer-readable storage medium, and the flow rate use control program is executed by a processor to perform the steps of the flow rate use control method according to the other embodiment of the present invention.
It should be noted that the description of the terminal embodiment is similar to the description of the method embodiment, and has similar beneficial effects to the method embodiment, and therefore, the description is not repeated. For technical details not disclosed in the terminal embodiments of the present invention, reference is made to the description of the method embodiments of the present invention for understanding.
An embodiment of the present invention provides a terminal, where the terminal at least includes: a processor, a memory, and a communication bus, wherein:
the communication bus is used for realizing connection communication between the processor and the memory;
the memory is used for storing a control program used by the flow;
the processor is used for executing the flow use control program stored in the memory so as to realize the following steps:
acquiring the identifier of the application which runs in the background and is not added to the blacklist and the whitelist;
counting the flow value consumed by the application in the current state of the terminal;
if the flow value is larger than a first threshold value corresponding to the current state, prohibiting the application from accessing the network, wherein the first threshold value is acquired from a server;
and if an operation of adding the application to the blacklist is received, adding the identification of the application to the blacklist.
In other embodiments, after the step of adding the identification of the application to the blacklist if an operation to add the application to the blacklist is received, the processor is further configured to execute a control program for traffic usage stored in a memory to implement the steps of:
and sending a blacklist notification message to a server, wherein the blacklist notification message carries the identifier of the application.
In another embodiment, after the step of counting the flow value consumed by the application in the current state of the terminal, the processor is configured to execute a flow usage control program stored in the memory to implement the following steps:
sending a threshold request message to a server, wherein the threshold request message carries the identifier of the application;
receiving a corresponding relation table of the terminal state and the flow threshold value of the application sent by the server;
and determining a first threshold corresponding to the current state according to the current state.
In other embodiments, the processor is configured to execute a flow usage control program stored in the memory to implement the steps of:
receiving a blacklist prompt message sent by the server;
analyzing the blacklist prompt message to obtain an application identifier carried in the blacklist prompt message;
based on the identification of the application, prohibiting the application from accessing the network;
and if an operation of adding the application to the blacklist is received, adding the identification of the application to the blacklist.
An embodiment of the present invention further provides a computer-readable storage medium, where a flow rate use control program is stored on the computer-readable storage medium, and the flow rate use control program is executed by a processor to perform the steps of the flow rate use control method according to the other embodiment of the present invention.
It should be noted that the description of the terminal embodiment is similar to the description of the method embodiment, and has similar beneficial effects to the method embodiment, and therefore, the description is not repeated. For technical details not disclosed in the terminal embodiments of the present invention, reference is made to the description of the method embodiments of the present invention for understanding.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method described in the embodiments of the present invention.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (8)

1. A method for controlling traffic usage, the method comprising:
receiving a threshold request message sent by a terminal, wherein the threshold request message carries an identifier of an application which runs in a background and is not added to a blacklist and is not added to a white list; acquiring a corresponding relation table of the terminal state of the application and a flow threshold according to the application identifier, wherein the state comprises a screen-on state and a screen-off state; sending the corresponding relation table to the terminal; wherein the traffic threshold is determined by the server according to the type of the application and the traffic consumed by the multi-user using the application;
receiving a blacklist notification message sent by a terminal, wherein the blacklist notification message is determined when a traffic value consumed by an application which runs on a background and is not added into a blacklist and is not added into a white list is larger than a first traffic threshold corresponding to a current state;
analyzing the blacklist notification message to obtain an application identifier;
counting the times of adding the application to a blacklist according to the application identifier, wherein each time a blacklist notification message for adding the application to the blacklist is received, the times of adding the application to the blacklist is increased by 1;
and if the times are larger than a preset threshold value, sending a blacklist prompt message to a terminal for installing the application, wherein the blacklist prompt message carries the identifier of the application, and the blacklist prompt message is used for prompting a user whether to add the application to a blacklist.
2. The method as claimed in claim 1, wherein prior to said step of receiving a threshold request message sent by said terminal, said method further comprises:
acquiring flow values consumed by a terminal for installing the application in a preset time period under different states, wherein the states comprise a screen-on state and a screen-off state;
respectively carrying out statistical analysis on flow values consumed by the terminals installed with the application under the same state according to a preset algorithm to obtain statistical values corresponding to the state;
determining a flow threshold corresponding to the state according to the type of the application and the statistic value corresponding to the state;
and generating a corresponding relation table of the terminal state and the flow threshold value based on the state and the flow threshold value corresponding to the state.
3. A method for controlling traffic usage, the method comprising:
acquiring the identifier of the application which runs in the background and is not added to the blacklist and the whitelist;
counting the flow value consumed by the application in the current state of the terminal;
sending a threshold request message to a server, wherein the threshold request message carries an identifier of the application which runs in the background and is not added to the blacklist and the whitelist; receiving a corresponding relation table of the terminal state of the application and a flow threshold value, which is sent by the server, wherein the state comprises a screen-on state and a screen-off state; determining a first threshold corresponding to the current state according to the current state, wherein the traffic threshold is determined by the server according to the type of the application and the traffic consumed by the multi-user using the application;
if the flow value is larger than a first threshold value corresponding to the current state, prohibiting the application from accessing the network, wherein the first threshold value is acquired from a server;
and if an operation of adding the application to the blacklist is received, adding the identification of the application to the blacklist.
4. The method of claim 3, wherein after the step of adding the identification of the application to a blacklist if an operation to add the application to a blacklist is received, the method further comprises:
and sending a blacklist notification message to a server, wherein the blacklist notification message carries the identifier of the application.
5. The method of any one of claims 3-4, further comprising:
receiving a blacklist prompt message sent by the server, wherein the blacklist prompt message is used for prompting a user whether to add the application to a blacklist;
analyzing the blacklist prompt message to obtain an application identifier carried in the blacklist prompt message;
based on the identification of the application, prohibiting the application from accessing the network;
and if an operation of adding the application to the blacklist is received, adding the identification of the application to the blacklist.
6. A server, characterized in that the server comprises at least: a processor, a memory, and a communication bus, wherein:
the communication bus is used for realizing connection communication between the processor and the memory;
the memory is used for storing a control program used by the flow;
the processor is used for executing the flow use control program stored in the memory so as to realize the following steps:
receiving a threshold request message sent by a terminal, wherein the threshold request message carries an identifier of an application which runs in a background and is not added to a blacklist and is not added to a white list; acquiring a corresponding relation table of the terminal state of the application and a flow threshold according to the application identifier, wherein the state comprises a screen-on state and a screen-off state; sending the corresponding relation table to the terminal; wherein the traffic threshold is determined by the server according to the type of the application and the traffic consumed by the multi-user using the application;
receiving a blacklist notification message sent by a terminal, wherein the blacklist notification message is determined based on applications which run in a background and are not added into a blacklist and are not added into a white list;
analyzing the blacklist notification message to obtain an application identifier;
counting the times of adding the application to a blacklist according to the application identifier, wherein each time a blacklist notification message for adding the application to the blacklist is received, the times of adding the application to the blacklist is increased by 1;
and if the times are larger than a preset threshold value, sending a blacklist prompt message to a terminal for installing the application, wherein the blacklist prompt message carries the identifier of the application, and the blacklist prompt message is used for prompting a user whether to add the application to a blacklist.
7. A terminal, characterized in that the terminal comprises at least: a processor, a memory, and a communication bus, wherein:
the communication bus is used for realizing connection communication between the processor and the memory;
the memory is used for storing a control program used by the flow;
the processor is used for executing the flow use control program stored in the memory so as to realize the following steps:
acquiring the identifier of the application which runs in the background and is not added to the blacklist and the whitelist;
counting the flow value consumed by the application in the current state of the terminal;
sending a threshold request message to a server, wherein the threshold request message carries an identifier of the application which runs in the background and is not added to the blacklist and the whitelist; receiving a corresponding relation table of the terminal state of the application and a flow threshold value, which is sent by the server, wherein the state comprises a screen-on state and a screen-off state; determining a first threshold corresponding to the current state according to the current state, wherein the traffic threshold is determined by the server according to the type of the application and the traffic consumed by the multi-user using the application;
if the flow value is larger than a first threshold value corresponding to the current state, prohibiting the application from accessing the network, wherein the first threshold value is acquired from a server;
and if an operation of adding the application to the blacklist is received, adding the identification of the application to the blacklist.
8. A computer-readable storage medium having stored thereon a control program for traffic usage, which when executed by a processor implements the steps of the control method for traffic usage according to any one of claims 1-2 or claims 3-5.
CN201710766509.0A 2017-08-30 2017-08-30 Flow use control method, terminal, server and readable storage medium Active CN107634940B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710766509.0A CN107634940B (en) 2017-08-30 2017-08-30 Flow use control method, terminal, server and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710766509.0A CN107634940B (en) 2017-08-30 2017-08-30 Flow use control method, terminal, server and readable storage medium

Publications (2)

Publication Number Publication Date
CN107634940A CN107634940A (en) 2018-01-26
CN107634940B true CN107634940B (en) 2021-06-15

Family

ID=61100006

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710766509.0A Active CN107634940B (en) 2017-08-30 2017-08-30 Flow use control method, terminal, server and readable storage medium

Country Status (1)

Country Link
CN (1) CN107634940B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108540950B (en) * 2018-02-27 2021-01-12 北京安云世纪科技有限公司 Flow management method and device of double-card terminal and mobile terminal
CN109144222A (en) * 2018-08-23 2019-01-04 北京小米移动软件有限公司 Flow information acquisition methods and device
CN109085913B (en) * 2018-08-27 2019-09-17 珠海格力电器股份有限公司 APP message pushes management method, intelligent terminal and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102088679A (en) * 2009-12-08 2011-06-08 北京网秦天下科技有限公司 Working method and system of intelligent short message firewall of self-learning mobile terminal
CN103346972A (en) * 2013-06-26 2013-10-09 北京傲天动联技术股份有限公司 Flow control device and method based on user terminal
CN104135561B (en) * 2013-07-08 2016-03-16 腾讯科技(深圳)有限公司 A kind of flow based reminding method of terminal, device and terminal
US9692759B1 (en) * 2014-04-14 2017-06-27 Trend Micro Incorporated Control of cloud application access for enterprise customers
CN104093197A (en) * 2014-07-17 2014-10-08 中国联合网络通信集团有限公司 Equipment energy saving method and system applied to mobile internet
CN104484259A (en) * 2014-11-25 2015-04-01 北京奇虎科技有限公司 Application program traffic monitoring method and device, and mobile terminal
CN105704066B (en) * 2016-01-12 2019-06-25 北京奇虎科技有限公司 Networking control method and device, system, security gateway, mobile terminal
CN106506401A (en) * 2016-10-31 2017-03-15 维沃移动通信有限公司 A kind of flow managing method and mobile terminal

Also Published As

Publication number Publication date
CN107634940A (en) 2018-01-26

Similar Documents

Publication Publication Date Title
CN108391025B (en) Network access management method, mobile terminal and computer readable storage medium
CN109587747B (en) SIM card switching control method, terminal and computer storage medium
CN107340833B (en) Terminal temperature control method, terminal and computer readable storage medium
CN107635070B (en) Message reminding method, terminal and storage medium
CN109144441B (en) Screen adjusting method, terminal and computer readable storage medium
CN109144705B (en) Application management method, mobile terminal and computer readable storage medium
CN108833690B (en) Authority control method, terminal and computer readable storage medium
CN109195213B (en) Mobile terminal screen control method, mobile terminal and computer readable storage medium
CN107832032B (en) Screen locking display method and mobile terminal
CN109256151B (en) Call voice regulation and control method and device, mobile terminal and readable storage medium
CN108536490B (en) Application program starting method, mobile terminal and computer storage medium
CN110187808B (en) Dynamic wallpaper setting method and device and computer-readable storage medium
CN110187925B (en) Desktop pre-starting control method, device and computer readable storage medium
CN108958936B (en) Application program switching method, mobile terminal and computer readable storage medium
CN107634940B (en) Flow use control method, terminal, server and readable storage medium
CN111427709B (en) Application program splitting control method, device and computer readable storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN112612598A (en) Anti-addiction method, mobile terminal and computer-readable storage medium
CN107682541B (en) Audio control method for screen projection, mobile terminal and storage medium
CN109309953B (en) Power consumption detection method, device, terminal and readable storage medium
CN109977040B (en) File read-write permission control method, device, terminal and storage medium
CN109117069B (en) Interface operation method, terminal and computer readable storage medium
CN108579081B (en) Event processing method, device and computer storage medium based on game
CN108063863B (en) Information browsing method, terminal, server and computer readable storage medium
CN107688497B (en) Memory regulation and control method, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant