CN107741894A - The monitoring method and device of a kind of application process - Google Patents

The monitoring method and device of a kind of application process Download PDF

Info

Publication number
CN107741894A
CN107741894A CN201611063616.9A CN201611063616A CN107741894A CN 107741894 A CN107741894 A CN 107741894A CN 201611063616 A CN201611063616 A CN 201611063616A CN 107741894 A CN107741894 A CN 107741894A
Authority
CN
China
Prior art keywords
system file
host process
finger daemon
read
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611063616.9A
Other languages
Chinese (zh)
Other versions
CN107741894B (en
Inventor
周超强
曹飞
范增辉
吴佳炘
夏传杰
耿乙超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201611063616.9A priority Critical patent/CN107741894B/en
Publication of CN107741894A publication Critical patent/CN107741894A/en
Application granted granted Critical
Publication of CN107741894B publication Critical patent/CN107741894B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The embodiment of the invention discloses a kind of monitoring method of application process and device;The present embodiment is using the host process and finger daemon for calling application to be monitored, the first system file and second system file are created by the host process, and it is configured by reading authority of the host process to the first system file, so that the first system file is after host process termination, it can just be read by finger daemon, and it is configured by reading authority of the finger daemon to second system file, so that second system file is after finger daemon termination, it can just be read by host process, then, second system file is read using host process, and the first system file is read using finger daemon, when host process reads second system file, arouse the finger daemon, when finger daemon reads the first system file, arouse the host process;The program in terms of existing technologies, can greatly save power consumption, and improve its applicability.

Description

The monitoring method and device of a kind of application process
Technical field
The present invention relates to communication technical field, and in particular to the monitoring method and device of a kind of application process.
Background technology
With the popularization of the development of computer technology, and terminal, the species of terminal applies is a variety of also increasingly to be various The process (abbreviation application process) of terminal applies is run in same terminal, and some situations, such as some application occur unavoidably Process is by force closed by another application, or some application process surprisingly stops, etc., for this reason, it is necessary to which application processes are entered Row monitoring in real time, to ensure that important application process being capable of normal operation.
In the prior art, can typically be come periodically to be monitored by way of the subprocess poll parent process of Linux layers The host process of application sends message, so as to reach the purpose being monitored to the host process.For example, specifically can be to be monitored by this Using Native methods (a java class method) are performed, entered by producing a Linux in fork () function of Linux layers Journey, then periodically sent using the process to host process and be intended to (Intent) request, if host process terminates (i.e. dead), Because the request is aroused by system and (is drawn host process living);If host process does not terminate, host process ignores the request.In addition, In order to ensure the time-to-live of host process, generally require using faster frequency to send intention request.
In the research and practice process to prior art, it was found by the inventors of the present invention that in existing scheme, due to needing Request is intended to send using faster transmission frequency, therefore, electric quantity consumption is larger, if moreover, Linux processes are also unexpected If termination, then it can not realize, so, the program may be only available for specific system, and adaptability is poor.
The content of the invention
The embodiment of the present invention provides a kind of monitoring method and device of application process;The consumption of electricity can be saved, and Suitable for more number systems, improve its applicability.
The embodiment of the present invention provides a kind of monitoring method of application process, it is characterised in that including:
Call the host process and finger daemon of application to be monitored;
The first system file and second system file are created by the host process;
The reading authority of the first system file is configured by the host process so that the first system file After host process termination, it can just be read by finger daemon, and by reading of the finger daemon to the second system file Weighting limit is configured so that the second system file can just be read after finger daemon termination by host process;
Second system file is read by the host process, and the first system file is read using the finger daemon;
When host process reads second system file, arouse the finger daemon;
When finger daemon reads the first system file, arouse the host process.
Accordingly, the embodiment of the present invention also provides a kind of supervising device of application process, including:
Call unit, for calling the host process and finger daemon of application to be monitored;
Creating unit, for creating the first system file and second system file by the host process;
Setting unit, for being configured by the host process to the reading authority of the first system file so that institute The first system file is stated after host process termination, can just be read by finger daemon, and by the finger daemon to described the The reading authority of two system file is configured so that the second system file can just be led after finger daemon termination Process is read;
Reading unit, for reading second system file by the host process, and read using the finger daemon The first system file;
Arouse unit, for when host process reads second system file, arousing the finger daemon;Work as finger daemon When reading the first system file, arouse the host process.
The embodiment of the present invention can call the host process and finger daemon of application to be monitored, and first is created by the host process System file and second system file, and be configured by reading authority of the host process to the first system file so that the first system File unite after host process termination, can just be read by finger daemon, and by reading of the finger daemon to second system file Authority is configured so that second system file can just be read, then, using master after finger daemon termination by host process Process reads second system file, and reads the first system file using finger daemon, when host process reads second system During file, arouse the finger daemon, when finger daemon reads the first system file, arouse the host process;It can be seen that should Scheme can pass through this medium of file so that two processes carry out deadlock request each other, so as to realize that process terminates real-time Monitor and arouse, for relative to high-frequency sending intention request due to the deadlock request between this process, it is not necessary to disappear Extra flow is consumed, moreover, reaction speed is faster, and does not require particularly system, therefore, the program is relative to existing skill For art, power consumption can be greatlyd save, and improves its applicability.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those skilled in the art, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached Figure.
Fig. 1 a are the schematic diagram of a scenario of the monitoring method of application process provided in an embodiment of the present invention;
Fig. 1 b are the flow charts of the monitoring method of application process provided in an embodiment of the present invention;
Fig. 2 a are another flow charts of the monitoring method of application process provided in an embodiment of the present invention;
Fig. 2 b be application process provided in an embodiment of the present invention monitoring method in the synchronous flow chart of host process;
Fig. 2 c be application process provided in an embodiment of the present invention monitoring method in the synchronous flow chart of finger daemon;
Fig. 3 a are the structural representations of the supervising device of application process provided in an embodiment of the present invention;
Fig. 3 b are another structural representations of the supervising device of application process provided in an embodiment of the present invention;
Fig. 4 is the structural representation of terminal provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, the every other implementation that those skilled in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
The embodiment of the present invention provides a kind of monitoring method and device of application process.
Wherein, the supervising device of the application process can be integrated in terminal, such as mobile phone, tablet personal computer, notebook computer Or in the equipment such as personal computer (PC, Personal Computer).
For example, so that the supervising device of the application process is integrated in the terminal as an example, referring to Fig. 1 a, terminal, which can be called, to be waited to supervise The host process and finger daemon of application are controlled, and these processes are initialized, such as, first can be created by the host process System file and second system file etc., then, this two process is synchronized by file lock mode, to realize to the two The deadlock monitoring of process, and when it is determined that process terminates (i.e. process is dead), the process of termination is carried out arousing operation, for example, Specifically the reading authority of the first system file and second system file can be configured respectively so that the first system text Part can just be read after host process termination by finger daemon, and cause the second system file to stop it in finger daemon Afterwards, it can just be read by host process, then, second system file be read using the host process, and read using the finger daemon The first system file, when host process reads second system file, then show that finger daemon has terminated, then arouse this and keep Shield process, similarly, when finger daemon reads the first system file, then show that host process has terminated, so, execution is aroused Operation of host process, etc..
It is described in detail individually below.It should be noted that the sequence number of following examples is not as preferably suitable to embodiment The restriction of sequence.
Embodiment one,
The angle of the supervising device of application process will be described for the embodiment of the present invention, the supervising device of the application process It can specifically integrate in the terminal, the terminal can include the equipment such as mobile phone, tablet personal computer, notebook computer or PC.
A kind of monitoring method of application process, including:Call the host process and finger daemon of application to be monitored;Pass through the master Process creation the first system file and second system file;Reading power to the first system file and second system file respectively Limit is configured so that the first system file can just be read after host process termination by finger daemon, and cause this Two system file can just be read after finger daemon termination by host process;Second system file is read by the host process, with And the first system file is read by the finger daemon;When host process reads second system file, arouse the finger daemon; When finger daemon reads the first system file, arouse the host process.
As shown in Figure 1 b, the flow of the monitoring method of the application process specifically can be as follows:
101st, the host process and finger daemon (Daemon) of application to be monitored are called.
Wherein, the host process of application to be monitored refers to the parent process in application to be monitored, and finger daemon is a kind of fortune Row backstage special processing, it can independently of control terminal, and periodically perform certain task or wait it is pending certain The event occurred a bit, in embodiments of the present invention, finger daemon can mutual process monitorings with host process.
102nd, the first system file and second system file are created by the host process.
Wherein, the content and form of the first system file and second system file can according to the demand of practical application and It is fixed.
In addition, in order to avoid host process and finger daemon are in the different stages, the state that can not be completed between two processes is same Step, it can first clear up and last arouse the finger daemon remained during process, i.e. create the first system file passing through the host process Before second system file, the monitoring method of application process can also include:
Clear up finger daemon.
For example the finger daemon of the calling can be specifically terminated, and finger daemon, etc. is aroused by host process again.
103rd, the reading authority of the first system file and second system file is configured respectively so that first system File unite after host process termination, can just be read by finger daemon, and causes the second system file in finger daemon After only, it can just be read by host process.
For example, it can be configured by reading authority of the host process to the first system file so that the first system file exists It after host process stops, can just be read by finger daemon, and be carried out by reading authority of the finger daemon to second system file Setting so that the second system file can just be read after finger daemon termination by host process, such as, specifically can be as follows:
Exclusive lock is established to the first system file by host process;And by finger daemon to second system text Part establishes exclusive lock.
Because host process has added exclusive lock to the first system file, so, if finger daemon is attempted to obtain the first system text When the read right of part, it can not be read because current file is locked, the process of lock file can only be waited (i.e. main Process) abandon exclusive lock to file.Similarly, because finger daemon has added exclusive lock to second system file, so, if master enters When journey attempts to obtain the read right of second system file, as current file is locked and can not read, can only The process of lock file is waited, i.e. finger daemon is abandoned just may be used to the exclusive lock of file.That is, do not untied actively in program Before exclusive lock, only when side's process terminates, system will discharge its all locking resource automatically.Therefore as a side After process gets the read right of file destination, that is, think that the opposing party's process has terminated, subsequently will be described in more detail, refer to step Rapid 104 to 106, it is as follows:
104th, second system file is read by the host process, and the first system file is read by the finger daemon.
Wherein, the mode of reading can be configured according to the demand of practical application.For example " obstruction is read " can be used Mode be read out, i.e., step " reads second system file by the host process, and reads the by the finger daemon One system file " specifically can be as follows:
Blocked by the host process and read second system file, and blocked by the finger daemon and read the first system text Part.
Wherein, obstruction reading is referred to when current process needs to read file destination, if the file destination is by it He reads task occupancy, then will read task suspension in the current process accordingly, until after other reading task uses, The reading task is just waken up, to be read out to the file destination.
In addition, it should be noted that, " reading " here refers to attempting to obtain read right, i.e. host process is attempted to obtain second The read right of system file, and finger daemon are attempted to obtain the read right of the first system file.
Optionally, in order to avoid two processes are during synchronization, judge other side's state of a process by accident, do not set up in other side Judge other side's process when finishing by accident to terminate, and enter arouse and (draw and live) stage in advance, host process can be passed through during synchronization The 3rd system file is created, and the 4th system file is created by finger daemon, and in the first system for reading other side's process Before file or second system file, attempt to delete the 3rd system file of other side's process or the 4th system file (row Except the possibility of erroneous judgement other side's process status), when deleting successfully, just it is read out.That is, " read in step by the host process Second system file is taken, and the first system file is read by the finger daemon " before, the monitoring method of the application process is also It can include:
(1) the 3rd system file is created by host process, and the 4th system file is created by finger daemon.
(2) the 4th system file is deleted by the host process, if deleting successfully, execution uses the host process The step of reading second system file;If deleting failure, after preset time, return and perform by the host process to the 4th The step of system file is deleted.
(3) the 3rd system file is deleted by the finger daemon, if deleting successfully, execution is guarded by this Process reads the step of the first system file;If deleting failure, after preset time, return to execution and pass through the finger daemon pair The step of 3rd system file is deleted.
Wherein, the preset time can be depending on the demand of practical application, preset time and step in step (2) (3) preset time can be identical or different.In addition, it should be noted that, the execution of step (2) and (3) Can be in no particular order.
105th, when host process reads second system file, the finger daemon is aroused.
Wherein, the mode of arousing can have a variety of, such as, can use quarter-bell (AlarManager), service (Service), Broadcast the mode such as (Broadcast) or movable (Activity).
Optionally, arouse efficiency to improve, except can use it is above-mentioned any one arouse mode in addition to, can also adopt The mode aroused with mixing, i.e., be combined to above-mentioned a variety of modes of arousing, specifically can be as follows:
The finger daemon is aroused using default a variety of arousal patterns successively.
Wherein, arousal pattern, arouse number and the execution sequence of this variety of arousal pattern can be according to practical application Demand is configured.Such as a variety of arousal patterns can include AlarManager, Service, Broadcast and Any combination of mode such as Activity, etc..
It should be noted that all kinds of modes of arousing need to be beforehand with initialization, necessary object resource is generated, to ensure to send out Existing process terminate after can quick response, will not be repeated here.
Optionally, in order to ensure the validity aroused, after arousing to the finger daemon, one can also waited After the section time, the survival condition of the finger daemon to being invoked detects, to ensure that it can successfully arouse, i.e., in step After " arousing to the finger daemon ", the monitoring method of the application process can also include:
In the range of setting time, regularly the survival condition of the finger daemon to being invoked detects, if testing result Indicate that the finger daemon being invoked is not survived, then return and perform the step of arousing to the finger daemon, for example return and hold The step of row is aroused using default a variety of arousal patterns to the finger daemon successively.
Otherwise, if testing result indicates that the finger daemon being invoked has been survived, flow can terminate.
106th, when finger daemon reads the first system file, the host process is aroused.
Wherein, the mode of arousing can have a variety of, such as, can use AlarManager, Service, Broadcast or The modes such as Activity.
With step 105 similarly, arouse efficiency to improve, except can use AlarManager, Service, Broadcast or Activity etc. any one arouses outside mode, can also be that is, more to this by the way of mixing is aroused The kind mode of arousing is combined, specifically can be as follows
The host process is aroused using default a variety of arousal patterns successively.
Wherein, arousal pattern, arouse number and the execution sequence of this variety of arousal pattern can be according to practical application Demand is configured.
It should be noted that all kinds of modes of arousing need to be beforehand with initialization, necessary object resource is generated, to ensure to send out Existing process terminate after can quick response, will not be repeated here.
It should be noted that step 105 and 106 execution can be in no particular order.
Optionally, in order to ensure the validity aroused, after arousing to the host process, one section can also waited After time, the survival condition of the host process to being invoked detects, to ensure that it can successfully arouse, i.e., in step " to this Host process is aroused " after, the monitoring method of the application process can also include:
The survival condition of host process of the timing to being invoked detects, if testing result indicates the host process being invoked Do not survive, then return and perform the step of arousing to the host process, for example return to perform and a variety of arouse mould using default successively The step of formula is aroused to the host process.
Conversely, if testing result indicates that the host process being invoked has been survived, flow can terminate.
It should be noted that in order to avoid arousing process without limit, cause resource consumption excessive, operation can be aroused to this Regular hour scope is set, i.e. step " regularly the survival condition of the host process to being invoked detects " is specifically as follows:
In the range of setting time, regularly the survival condition of the host process to being invoked detects.
Wherein, the time range of the setting can be configured according to the demand of practical application, will not be repeated here.
From the foregoing, it will be observed that the present embodiment can call the host process and finger daemon of application to be monitored, created by the host process The first system file and second system file are built, and respectively to the reading authority of the first system file and second system file It is configured so that the first system file can just be read after host process termination by finger daemon, and cause second system File can just be read after finger daemon termination by host process, then, second system file be read using host process, and The first system file is read using finger daemon, when host process reads second system file, arouses the finger daemon, when When finger daemon reads the first system file, arouse the host process;It can be seen that the program can by this medium of file, So that two processes carry out deadlock request each other, so as to realize real-time monitoring and arouse that process terminates, due to this process it Between deadlock request relative to high-frequency send intention request for, it is not necessary to extra flow is consumed, moreover, reaction speed Faster, and to system do not require particularly, therefore, the program in terms of existing technologies, can greatly save power consumption, And improve its applicability.
Embodiment two,
, below will be with linux system according to the method described by embodiment one, and the supervising device of the application process is specific It is further illustrated exemplified by integrating in the terminal.
In addition, will be specially Linux files a with the first system file in embodiments of the present invention for convenience1, Second system file is specially Linux files b1, the 3rd system file is specially Linux files a2, the 4th system file is specific For Linux files b2Exemplified by illustrate.
As shown in Figure 2 a, a kind of monitoring method of application process, idiographic flow can be as follows:
201st, terminal calls the host process and finger daemon of application to be monitored.
202nd, terminal initializes to host process and finger daemon respectively, such as, it can be created by the host process Linux files a1With Linux files b1, etc., then perform step 203.
Wherein, Linux files a1With Linux files b1Content and form can be depending on the demand of practical application.
Optionally, in order to avoid host process and finger daemon are in the different stages, the state between two processes can not be completed It is synchronous, before the first system file and second system file is created, it can first clear up and last arouse keeping of being remained during process Shield process, the finger daemon of the calling can be specifically terminated, and finger daemon, etc. is aroused by host process again.
In addition, create Linux files a in host process1With Linux files b1Before, host process can also carry out Native (a kind of locally applied) code.
203rd, terminal is synchronized, with right by way of establishment file lock to the host process after initialization and finger daemon The host process and finger daemon carry out deadlock monitoring.
From host process and the angle of finger daemon, its synchronous flow will be illustrated respectively, for example, specifically respectively below Can be as follows:
(1) host process.
Referring to Fig. 2 b, the synchronous flow of host process can be as follows:
A2031, host process are to Linux files a1Establish exclusive lock.
So, when finger daemon is attempted to obtain Linux files a1Read right when, can be because Linux files a1By Lock and can not obtain, host process can only be waited to abandon to Linux files a1Exclusive lock, that is, wait host process terminate (i.e. extremely Die) when, it can just get.
A2032, host process create Linux files a2
Create Linux files a2, primarily to finger daemon is avoided during with the host process synchronization, erroneous judgement master State of a process the occurrence of, such as, when host process does not set up and finished, erroneous judgement host process terminate, and in advance enter call out Play and (draw and live) stage, etc..By to Linux files a2Deletion action is performed, finger daemon can clearly know this The current state of host process, refers to step B2033.
A2033, host process are to Linux files b2Deleted, if deleting successfully, perform step A2035, if deleting Failure, then perform step A2034.
A2034, after preset time, return perform step A2033, that is, wait preset time after, return perform step A2033。
Wherein, the preset time can be depending on the demand of practical application.
A2035, host process read Linux files b1, i.e. host process trial acquisition Linux files b1Read right.
A2036, read Linux files b when host process1When, determine that finger daemon has terminated.
Because when host process reads Linux files b1When, then show that host process has got Linux files b1 Read right, and from step B2031, finger daemon is to Linux files b1Added exclusive lock, so, guard into During the survival of journey, other processes are can not to obtain Linux files b1 read right, only when finger daemon terminates (i.e. extremely Die) when, it is only possible to get Linux files b1 read right, so, if now, host process can read Linux files B1, then it can determine that finger daemon has terminated.
Otherwise, when host process is read less than Linux files b1When, then it can continue executing with step A2035.
(2) finger daemon.
Referring to Fig. 2 c, the synchronous flow of finger daemon can be as follows:
B2031, finger daemon are to Linux files b1Establish exclusive lock.
So, when host process is attempted to obtain Linux files b1Read right when, can be because Linux files b1Locked Determine and can not obtain, finger daemon can only be waited to abandon to Linux files b1Exclusive lock, that is, wait finger daemon terminate (i.e. It is dead) when, it can just get.
B2032, finger daemon create Linux files b2
Create Linux files b2, primarily to avoiding host process, erroneous judgement is kept during with the finger daemon synchronization Protect state of a process the occurrence of, such as, when finger daemon does not set up and finished, erroneous judgement finger daemon terminate, and in advance Into arousing (draw live) stage, etc..By to Linux files b2Deletion action is performed, finger daemon can be clearly Know the current state of the finger daemon, refer to step A2033.
B2033, finger daemon are to Linux files a2Deleted, if deleting successfully, step B2035 is performed, if deleting Except failure, then step B2034 is performed.
B2034, after preset time, return perform step B2033, that is, wait preset time after, return perform step B2033。
Wherein, the preset time can be depending on the demand of practical application.
B2035, finger daemon read Linux files a1, i.e. finger daemon trial acquisition Linux files a1Read right.
B2036, read Linux files a when finger daemon1When, determine that host process has terminated.
Because when finger daemon reads Linux files a1When, then show that finger daemon has got Linux File a1Read right, and from step A2031, host process is to Linux files a1Add exclusive lock, so, enter in master During the survival of journey, other processes are can not to obtain Linux files a1Read right, only when host process terminates (i.e. death) When, it is only possible to get Linux files a1Read right, so, if now, finger daemon can read Linux files a1, then can determine that host process has terminated.
Otherwise, when finger daemon is read less than Linux files a1When, then it can continue executing with step B2035.
204th, when terminal monitoring to host process or finger daemon terminate, successively using default a variety of arousal patterns to the end Process only is aroused.For example, specifically can be as follows:
When it is determined that finger daemon terminates, terminal can be carried out using default a variety of arousal patterns to the finger daemon successively Arouse.
When it is determined that host process terminates constantly, terminal can be called out the host process using default a variety of arousal patterns successively Rise.
Wherein, arousal pattern can including AlarManager, Service, Broadcast and Activity etc. mode Any combination.Arousal pattern, arouse number and the execution sequence of this variety of arousal pattern can be according to the need of practical application Ask and be configured, such as, exemplified by using AlarManager, Service, Broadcast and Activity successively, then have Body can be as follows:
Process of the terminal using AlarManager to termination, such as host process or finger daemon are aroused, if arousing into Work(, then step 205 is performed, if arousing unsuccessfully, the process of termination is aroused using Service, if arousing success, held Row step 205, if arousing unsuccessfully, the process of termination is aroused using Broadcast, if arousing success, performs step Rapid 205, if arousing unsuccessfully, the process of termination is aroused using Activity, if arousing success, performs step 205, If arousing unsuccessfully, return and perform the step of arousing using AlarManager to the process of termination.
It should be noted that all kinds of modes of arousing need to be beforehand with initialization, necessary object resource is generated, to ensure to send out Existing process terminate after can quick response, will not be repeated here.
Optionally, in order to ensure the validity aroused, after arousing to the host process, one section can also waited After time, the survival condition of the host process to being invoked detects, to ensure that it can successfully arouse, i.e. the application process Monitoring method can also include step 205, as follows:
205th, in the range of setting time, the survival condition of process of the terminal timing to being invoked detects, if detection As a result indicate that the process being invoked is not survived, then return and perform step 204, otherwise, if testing result indicates what this was invoked Process has been survived, then flow can terminate.
For example, can be arranged in the range of the regular hour, examined per the survival condition of process of the Y milliseconds to being invoked Survey once, etc., wherein, Y is positive number, and time range and Y specific value can be depending on the demands of practical application.
From the foregoing, it will be observed that the present embodiment can call the host process and finger daemon of application to be monitored, created by the host process Build Linux files a1With Linux files b1, and respectively to the Linux files a1With Linux files b1Reading authority carry out Set so that Linux files a1It after host process termination, can just be read by finger daemon, and cause Linux files b1 It after finger daemon stops, can just be read by host process, then, Linux files b be read using host process1, and use and guard Process reads Linux files a1, when host process reads Linux files b1When, arouse the finger daemon, when finger daemon is read Get Linux files a1When, arouse the host process;It can be seen that the program can pass through this medium of file so that two processes Deadlock request is carried out each other, so as to realize the real-time monitoring of process termination and arouse, due to the deadlock request between this process For relative to high-frequency sending intention request, it is not necessary to extra flow is consumed, moreover, reaction speed is faster, and to being System does not require that therefore, the program in terms of existing technologies, can greatly save power consumption, and improve it particularly Applicability.
Further, since the program when arousing termination process, employs the mode that mixing is aroused, and hence it is also possible to significantly Raising arouses efficiency and improves the effect aroused.
Embodiment three,
In order to preferably implement above method, the embodiment of the present invention also provides a kind of supervising device of application process, such as schemes Shown in 3a, the supervising device of the application process can include call unit 301, creating unit 302, setting unit 303, reading list Member 304 and arouses unit 305, as follows:
(1) call unit 301;
Call unit 301, for calling the host process and finger daemon of application to be monitored.
(2) creating unit 302;
Creating unit 302, for creating the first system file and second system file by the host process.
Wherein, the content and form of the first system file and second system file can according to the demand of practical application and It is fixed.
In addition, in order to avoid host process and finger daemon are in the different stages, the state that can not be completed between two processes is same Step, can first clear up it is last arouse the finger daemon remained during process, i.e.,:
Creating unit 302, it can be also used for clearing up finger daemon, such as, the finger daemon of the calling can be specifically terminated, And finger daemon, etc. is aroused by host process again.
(3) setting unit 303;
Setting unit 303, for being configured respectively to the reading authority of the first system file and second system file, So that the first system file can just be read after host process termination by finger daemon, and cause the second system file After finger daemon termination, it can just be read by host process.
For example, setting unit 303, specifically can be used for being set by reading authority of the host process to the first system file To put so that the first system file can just be read after host process termination by finger daemon, and by finger daemon to the second system The reading authority of system file is configured so that and second system file can just be read after finger daemon termination by host process, Such as specifically can be as follows:
Exclusive lock is established to the first system file by host process, and by finger daemon to the second system file Establish exclusive lock.
(4) reading unit 304;
Reading unit 304, for reading second system file by the host process, and the is read by the finger daemon One system file.
Wherein, the mode of reading can be configured according to the demand of practical application.For example " obstruction is read " can be used Mode be read out, i.e.,:
Reading unit 304, it specifically can be used for blocking by the host process and read second system file, and kept by this Protect process blocking and read the first system file.
(5) unit 305 is aroused;
Arouse unit 305, for when host process reads second system file, arousing the finger daemon;When guard into When journey reads the first system file, arouse the host process.
Wherein, the mode of arousing can have a variety of, such as, can use AlarManager, Service, Broadcast or The modes such as Activity.
Optionally, arouse efficiency to improve, except can use it is above-mentioned any one arouse mode in addition to, can also adopt The mode aroused with mixing, i.e., be combined to above-mentioned a variety of modes of arousing, specifically can be as follows:
This arouses unit 305, specifically can be used for successively calling out the finger daemon using default a variety of arousal patterns Rise.
And this arouses unit 305, specifically can be used for successively carrying out the host process using default a variety of arousal patterns Arouse.
Wherein, arousal pattern, arouse number and the execution sequence of this variety of arousal pattern can be according to practical application Demand is configured.
It should be noted that all kinds of modes of arousing need to be beforehand with initialization, necessary object resource is generated, to ensure to send out Existing process terminate after can quick response, will not be repeated here.
Optionally, in order to ensure the validity aroused, after arousing to the finger daemon, one can also waited After the section time, the survival condition of the finger daemon to being invoked detects, to ensure that it can successfully arouse, i.e., such as Fig. 3 b institutes Show, the supervising device of the application process can also include the first detection unit 306 and the second detection unit 307, as follows:
First detection unit 306, can be used in the range of setting time, regularly depositing to the finger daemon that is invoked Situation living is detected;If testing result indicates that the finger daemon being invoked is not survived, triggering is aroused unit and performed successively The operation aroused using a variety of arousal patterns are preset to the finger daemon.
Second detection unit 307, can be used in the range of setting time, regularly to the survival for the host process being invoked Situation is detected;If testing result indicates that the host process being invoked is not survived, triggering is aroused unit execution and used successively Preset the operation that a variety of arousal patterns are aroused to the host process.
Optionally, in order to avoid two processes are during synchronization, judge other side's state of a process by accident, do not set up in other side Judge other side's process when finishing by accident to terminate, and enter arouse and (draw and live) stage in advance, host process can be passed through during synchronization The 3rd system file is created, and the 4th system file is created by finger daemon, and in the first system for reading other side's process Before file or second system file, attempt to delete the 3rd system file of other side's process or the 4th system file (row Except the possibility of erroneous judgement other side's process status), when deleting successfully, just it is read out.I.e. as shown in Figure 3 b, the application process Supervising device can also include deleting unit, as follows:
It the creating unit 302, can be also used for creating the 3rd system file by host process, and created by finger daemon Build the 4th system file.
The deletion unit 308, can be used for deleting the 4th system file by the host process, if delete into Work(, then trigger reading unit 304 and perform the operation that second system file is read by the host process;If failure is deleted, pre- If after the time, return to the operation for performing and being deleted by the host process the 4th system file;And by this guard into Journey is deleted the 3rd system file, if deleting successfully, triggering reading unit 304 performs to be read by the finger daemon The operation of the first system file;If deleting failure, after preset time, return and perform by the finger daemon to the 3rd system The operation that system file is deleted.
Wherein, the preset time can will not be repeated here depending on the demand of practical application.
When it is implemented, above unit can be realized respectively as independent entity, any group can also be carried out To close, realized as same or several entities, the specific implementation of above unit can be found in embodiment of the method above, This is repeated no more.
The supervising device of the application process can specifically integrate in the terminal, the terminal can include mobile phone, tablet personal computer, The equipment such as notebook computer or PC.
From the foregoing, it will be observed that the supervising device of the application process of the present embodiment can call to be monitored answer by call unit 301 Host process and finger daemon, and the first system file and second system are created by the host process by creating unit 302 File, and the reading authority of the first system file and second system file is configured respectively by reading unit 303, make The first system file is obtained after host process termination, can just be read by finger daemon, and second system file is being guarded It after process stops, can just be read by host process, then, second system file be read using host process by reading unit 304, with And the first system file is read using finger daemon, when host process reads second system file, aroused by arousing unit 305 The finger daemon, when finger daemon reads the first system file, arouse the host process by arousing unit 305;It can be seen that The program can pass through this medium of file so that two processes carry out deadlock request each other, so as to realize the reality of process termination When monitor and arouse, due between this process deadlock request relative to high-frequency send intention request for, it is not necessary to Extra flow is consumed, moreover, reaction speed is faster, and does not require particularly system, therefore, the program is relative to existing For technology, power consumption can be greatlyd save, and improves its applicability.
Example IV,
Accordingly, the embodiment of the present invention also provides a kind of terminal, as shown in figure 4, the terminal can include radio frequency (RF, Radio Frequency) circuit 401, include the memories 402, defeated of one or more computer-readable recording mediums Enter unit 403, display unit 404, sensor 405, voicefrequency circuit 406, Wireless Fidelity (WiFi, Wireless Fidelity) Module 407, include the part such as one or the processor 408 of more than one processing core and power supply 409.This area skill Art personnel are appreciated that the restriction of the terminal structure shown in Fig. 4 not structure paired terminal, can include more more or more than illustrating Few part, either combine some parts or different parts arrangement.Wherein:
RF circuits 401 can be used for receive and send messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information receives, transfer to one or more than one processor 408 is handled;In addition, it is sent to up data are related to Base station.Generally, RF circuits 401 include but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, use Family identity module (SIM, Subscriber Identity Module) card, transceiver, coupler, low-noise amplifier (LNA, Low Noise Amplifier), duplexer etc..In addition, RF circuits 401 can also pass through radio communication and network and its His equipment communication.The radio communication can use any communication standard or agreement, including but not limited to global system for mobile telecommunications system Unite (GSM, Global System of Mobile communication), general packet radio service (GPRS, General Packet Radio Service), CDMA (CDMA, Code Division Multiple Access), wideband code division it is more Location (WCDMA, Wideband Code Division Multiple Access), Long Term Evolution (LTE, Long Term Evolution), Email, Short Message Service (SMS, Short Messaging Service) etc..
Memory 402 can be used for storage software program and module, and processor 408 is stored in memory 402 by operation Software program and module, so as to perform various function application and data processing.Memory 402 can mainly include storage journey Sequence area and storage data field, wherein, storing program area can storage program area, the application program (ratio needed at least one function Such as sound-playing function, image player function) etc.;Storage data field can store uses created data according to terminal (such as voice data, phone directory etc.) etc..In addition, memory 402 can include high-speed random access memory, can also include Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.Phase Ying Di, memory 402 can also include Memory Controller, to provide processor 408 and input block 403 to memory 402 Access.
Input block 403 can be used for the numeral or character information for receiving input, and generation is set with user and function Control relevant keyboard, mouse, action bars, optics or the input of trace ball signal.Specifically, in a specific embodiment In, input block 403 may include touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or tactile Control plate, collect user on or near it touch operation (such as user using any suitable object such as finger, stylus or Operation of the annex on touch sensitive surface or near touch sensitive surface), and corresponding connection dress is driven according to formula set in advance Put.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects the signal that touch operation is brought, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 408, and can reception processing Order that device 408 is sent simultaneously is performed.It is furthermore, it is possible to a variety of using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Type realizes touch sensitive surface.Except touch sensitive surface, input block 403 can also include other input equipments.Specifically, other are defeated Physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse can be included but is not limited to by entering equipment One or more in mark, action bars etc..
Display unit 404 can be used for display by user input information or be supplied to user information and terminal it is various Graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.Display Unit 404 may include display panel, optionally, can use liquid crystal display (LCD, Liquid Crystal Display), The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configure display panel.Further , touch sensitive surface can cover display panel, after touch sensitive surface detects the touch operation on or near it, send processing to Device 408 is followed by subsequent processing device 408 and provided on a display panel accordingly according to the type of touch event to determine the type of touch event Visual output.Although in Fig. 4, touch sensitive surface realizes input and input with display panel is the part independent as two Function, but in some embodiments it is possible to touch sensitive surface and display panel are integrated and realize input and output function.
Terminal may also include at least one sensor 405, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel, proximity transducer can close display panel and/or the back of the body when terminal is moved in one's ear Light.As one kind of motion sensor, gravity accelerometer can detect in all directions (generally three axles) acceleration Size, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal Gyroscope, barometer, hygrometer, thermometer, the other sensors such as infrared ray sensor, will not be repeated here.
Voicefrequency circuit 406, loudspeaker, microphone can provide the COBBAIF between user and terminal.Voicefrequency circuit 406 can Electric signal after the voice data received is changed, is transferred to loudspeaker, and voice signal output is converted to by loudspeaker;It is another The voice signal of collection is converted to electric signal by aspect, microphone, and voice data is converted to after being received by voicefrequency circuit 406, then After voice data output processor 408 is handled, through RF circuits 401 to be sent to such as another terminal, or by voice data Export to memory 402 further to handle.Voicefrequency circuit 406 is also possible that earphone jack, with provide peripheral hardware earphone with The communication of terminal.
WiFi belongs to short range wireless transmission technology, and terminal can help user's transceiver electronicses postal by WiFi module 407 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 4 is shown WiFi module 407, but it is understood that, it is simultaneously not belonging to must be configured into for terminal, can not change as needed completely Become in the essential scope of invention and omit.
Processor 408 is the control centre of terminal, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform the software program and/or module being stored in memory 402, and call and be stored in memory 402 Data, the various functions and processing data of terminal are performed, so as to carry out integral monitoring to mobile phone.Optionally, processor 408 can wrap Include one or more processing cores;Preferably, processor 408 can integrate application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly handled with processor, modem processor mainly handles radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 408.
Terminal also includes the power supply 409 (such as battery) to all parts power supply, it is preferred that power supply can pass through power supply pipe Reason system and processor 408 are logically contiguous, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.Power supply 409 can also include one or more direct current or AC power, recharging system, power failure inspection The random component such as slowdown monitoring circuit, power supply changeover device or inverter, power supply status indicator.
Although being not shown, terminal can also include camera, bluetooth module etc., will not be repeated here.Specifically in this implementation In example, the processor 408 in terminal can be according to following instruction, by corresponding to the process of one or more application program Executable file is loaded into memory 402, and runs the application program being stored in memory 402 by processor 408, from And realize various functions:
Call the host process and finger daemon of application to be monitored;The first system file and the second system are created by the host process System file;It is configured by reading authority of the host process to the first system file so that the first system file stops in host process Afterwards, it can just be read by finger daemon, and be configured by reading authority of the finger daemon to second system file so that should Second system file can just be read after finger daemon termination by host process;Second system file is read by the host process, And the first system file is read by the finger daemon;When host process reads second system file, arouse this guard into Journey;When finger daemon reads the first system file, arouse the host process.
For example, specifically exclusive lock can be established to the first system file by host process;And pass through finger daemon pair The second system file establishes exclusive lock, to be configured to the reading authority of the first system file and second system file, So that the first system file can just be read after host process termination by finger daemon, and cause the second system file After finger daemon termination, it can just be read by host process.
Optionally, in order to avoid two processes are during synchronization, other side's state of a process is judged by accident, can also be in synchronization During, the 3rd system file is created by host process, and the 4th system file is created by finger daemon, and in reading pair Before Fang Jincheng the first system file or second system file, attempt to the 3rd system file of other side's process or the 4th system File is deleted (possibility for excluding erroneous judgement other side's process status), when deleting successfully, is just read out.I.e. this is stored in Application program in memory 402, following functions can also be realized:
3rd system file is created by host process, and the 4th system file is created by finger daemon, passes through the master Process is deleted the 4th system file, if deleting successfully, is performed and is read second system file by the host process Operation;If deleting failure, after preset time, return and perform the 4th system file is deleted by the host process Operation;The 3rd system file is deleted by the finger daemon, if deleting successfully, execution is read by the finger daemon Take the operation of the first system file;If deleting failure, after preset time, return and perform by the finger daemon to the 3rd The operation that system file is deleted.
Optionally, efficiency is aroused in order to improve, except single mode of arousing can be used to call out the process of termination Outside rising, the process of termination can also be aroused, i.e., this is stored in the application in memory 402 by the way of mixing Program, following functions can also be realized:
The finger daemon is aroused using default a variety of arousal patterns successively, and, use preset a variety of call out successively The pattern of rising is aroused to the host process.
Wherein, arousal pattern can including AlarManager, Service, Broadcast and Activity etc. mode Any combination.Arousal pattern, arouse number and the execution sequence of this variety of arousal pattern can be according to the need of practical application Ask and be configured, will not be repeated here.
It should be noted that all kinds of modes of arousing need to be beforehand with initialization, necessary object resource is generated, to ensure to send out Existing process terminate after can quick response, will not be repeated here.
Optionally, in order to ensure the validity aroused, after arousing to the host process, one section can also waited After time, the survival condition of the host process to being invoked detects, and to ensure that it can successfully arouse, i.e., this is stored in storage Application program in device 402, following functions can also be realized:
Timing detects to the survival condition for being invoked process (such as host process or finger daemon), if testing result refers to Show that the process being invoked is not survived, then return to the operation for performing and being aroused to the process, for example return to perform and use successively Preset the operation that a variety of arousal patterns are aroused to the process.
The specific implementation of each operation can be found in embodiment above above, will not be repeated here.
From the foregoing, it will be observed that the terminal of the present embodiment can call the host process and finger daemon of application to be monitored, pass through the master Process creation the first system file and second system file, and set by reading authority of the host process to the first system file To put so that the first system file can just be read after host process termination by finger daemon, and by finger daemon to the second system The reading authority of system file is configured so that and second system file can just be read after finger daemon termination by host process, Then, second system file is read using host process, and the first system file is read using finger daemon, when host process is read During to second system file, arouse the finger daemon, when finger daemon reads the first system file, arouse the master and enter Journey;It can be seen that the program can pass through this medium of file so that two processes carry out deadlock request each other, so as to realize process Terminate real-time monitoring and arouse, due between this process deadlock request relative to high-frequency send intention request and Speech, it is not necessary to extra flow is consumed, moreover, reaction speed is faster, and does not require particularly system, and therefore, the program In terms of existing technologies, power consumption can be greatlyd save, and improves its applicability.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage Medium can include:Read-only storage (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
The monitoring method and device of a kind of application process provided above the embodiment of the present invention, have carried out detailed Jie Continue, specific case used herein is set forth to the principle and embodiment of the present invention, and the explanation of above example is only It is the method and its core concept for being used to help understand the present invention;Meanwhile for those skilled in the art, according to the present invention's Thought, there will be changes in specific embodiments and applications, in summary, this specification content should not be construed as Limitation of the present invention.

Claims (14)

  1. A kind of 1. monitoring method of application process, it is characterised in that including:
    Call the host process and finger daemon of application to be monitored;
    The first system file and second system file are created by the host process;
    The reading authority of the first system file is configured by the host process so that the first system file is in master It after process stops, can just be read by finger daemon, and be weighed by reading of the finger daemon to the second system file Limit is configured so that the second system file can just be read after finger daemon termination by host process;
    Second system file is read by the host process, and the first system file is read by the finger daemon;
    When host process reads second system file, arouse the finger daemon;
    When finger daemon reads the first system file, arouse the host process.
  2. 2. according to the method for claim 1, it is characterised in that
    It is described that the reading authority of the first system file is configured by the host process so that the first system file After host process termination, it can just be read by finger daemon, including:The first system file is established by host process exclusive Lock;And
    It is described that the reading authority of the second system file is configured by the finger daemon so that the second system text Part can just be read after finger daemon termination by host process, including:The second system file is established by finger daemon Exclusive lock.
  3. 3. according to the method for claim 1, it is characterised in that it is described that second system file is read by the host process, And by the finger daemon read the first system file before, in addition to:
    3rd system file is created by host process, and the 4th system file is created by finger daemon;
    The 4th system file is deleted by the host process, if deleting successfully, execution passes through the host process The step of reading second system file;If deleting failure, after preset time, return and perform by the host process to described The step of 4th system file is deleted;
    The 3rd system file is deleted by the finger daemon, if deleting successfully, performs and is guarded by described Process reads the step of the first system file;If deleting failure, after preset time, return to execution and pass through the finger daemon The step of deleting the 3rd system file.
  4. 4. according to the method described in any one of claims 1 to 3, it is characterised in that it is described to arouse the finger daemon, including:
    The finger daemon is aroused using default a variety of arousal patterns successively.
  5. 5. according to the method for claim 4, it is characterised in that described to be kept successively using default a variety of arousal patterns described After shield process is aroused, in addition to:
    In the range of setting time, regularly the survival condition of the finger daemon to being invoked detects;
    If the finger daemon that is invoked described in testing result instruction is not survived, return to perform and a variety of arouse mould using default successively The step of formula is aroused to the finger daemon.
  6. 6. according to the method described in any one of claims 1 to 3, it is characterised in that it is described to arouse the host process, including:
    The host process is aroused using default a variety of arousal patterns successively.
  7. 7. according to the method for claim 6, it is characterised in that described successively using default a variety of arousal patterns to the master After process is aroused, in addition to:
    In the range of setting time, regularly the survival condition of the host process to being invoked detects;
    If the host process being invoked described in testing result instruction is not survived, return and perform successively using default a variety of arousal patterns The step of arousing to the host process.
  8. A kind of 8. supervising device of application process, it is characterised in that including:
    Call unit, for calling the host process and finger daemon of application to be monitored;
    Creating unit, for creating the first system file and second system file by the host process;
    Setting unit, for being configured by the host process to the reading authority of the first system file so that described One system file can just be read after host process termination by finger daemon, and by the finger daemon to second system The reading authority of system file is configured so that the second system file, just can be by host process after finger daemon termination Read;
    Reading unit, for reading second system file by the host process, and first is read by the finger daemon System file;
    Arouse unit, for when host process reads second system file, arousing the finger daemon;When finger daemon is read During to the first system file, arouse the host process.
  9. 9. device according to claim 8, it is characterised in that
    Setting unit, specifically for establishing exclusive lock to the first system file by host process, and pass through finger daemon Exclusive lock is established to the second system file.
  10. 10. device according to claim 8, it is characterised in that also include deleting unit;
    The creating unit, it is additionally operable to create the 3rd system file by host process, and the 4th system is created by finger daemon System file;
    The deletion unit, for being deleted by the host process the 4th system file, if deleting successfully, touch Send out reading unit and perform the operation that second system file is read by the host process;If deleting failure, after preset time, Return to the operation for performing and being deleted by the host process the 4th system file;And pass through the finger daemon 3rd system file is deleted, if deleting successfully, triggering reading unit performs to be read by the finger daemon The operation of the first system file;If deleting failure, after preset time, return and perform by the finger daemon to described the The operation that three system files are deleted.
  11. 11. according to the device described in any one of claim 8 to 10, it is characterised in that
    It is described to arouse unit, specifically for being aroused successively using default a variety of arousal patterns to the finger daemon.
  12. 12. device according to claim 11, it is characterised in that also including the first detection unit;
    First detection unit, in the range of setting time, regularly the survival condition of the finger daemon to being invoked to be entered Row detection;If the finger daemon being invoked described in testing result instruction is not survived, triggering is aroused unit and performed successively using pre- If the operation that a variety of arousal patterns are aroused to the finger daemon.
  13. 13. according to the device described in any one of claim 8 to 10, it is characterised in that
    It is described to arouse unit, specifically for being aroused successively using default a variety of arousal patterns to the host process.
  14. 14. device according to claim 13, it is characterised in that also including the second detection unit;
    Second detection unit, in the range of setting time, regularly the survival condition of the host process to being invoked to be carried out Detection;If the host process being invoked described in testing result instruction is not survived, triggering is aroused unit and performed successively using default more The operation that kind arousal pattern is aroused to the host process.
CN201611063616.9A 2016-11-25 2016-11-25 application process monitoring method and device Active CN107741894B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611063616.9A CN107741894B (en) 2016-11-25 2016-11-25 application process monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611063616.9A CN107741894B (en) 2016-11-25 2016-11-25 application process monitoring method and device

Publications (2)

Publication Number Publication Date
CN107741894A true CN107741894A (en) 2018-02-27
CN107741894B CN107741894B (en) 2020-01-31

Family

ID=61235087

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611063616.9A Active CN107741894B (en) 2016-11-25 2016-11-25 application process monitoring method and device

Country Status (1)

Country Link
CN (1) CN107741894B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109637118A (en) * 2018-12-28 2019-04-16 武汉征原电气有限公司 A kind of intelligent vehicle operation management system
CN111416821A (en) * 2020-03-20 2020-07-14 杭州物源科技有限公司 Internet of things equipment information acquisition method, system and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102103676A (en) * 2011-02-28 2011-06-22 南京邮电大学 Method for protecting Java program progress based on inheritance relationship among progresses
CN102200941A (en) * 2010-03-25 2011-09-28 杭州华三通信技术有限公司 Method and unit for monitoring process state
CN103678084A (en) * 2012-09-21 2014-03-26 成都勤智数码科技股份有限公司 Flexible application process guarding method
US20160132340A1 (en) * 2014-11-12 2016-05-12 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd Dual-processor electronic device and method for quick boot up
CN105630659A (en) * 2015-12-23 2016-06-01 北京奇虎科技有限公司 Application crash log acquisition method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102200941A (en) * 2010-03-25 2011-09-28 杭州华三通信技术有限公司 Method and unit for monitoring process state
CN102103676A (en) * 2011-02-28 2011-06-22 南京邮电大学 Method for protecting Java program progress based on inheritance relationship among progresses
CN103678084A (en) * 2012-09-21 2014-03-26 成都勤智数码科技股份有限公司 Flexible application process guarding method
US20160132340A1 (en) * 2014-11-12 2016-05-12 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd Dual-processor electronic device and method for quick boot up
CN105630659A (en) * 2015-12-23 2016-06-01 北京奇虎科技有限公司 Application crash log acquisition method and apparatus

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109637118A (en) * 2018-12-28 2019-04-16 武汉征原电气有限公司 A kind of intelligent vehicle operation management system
CN111416821A (en) * 2020-03-20 2020-07-14 杭州物源科技有限公司 Internet of things equipment information acquisition method, system and device

Also Published As

Publication number Publication date
CN107741894B (en) 2020-01-31

Similar Documents

Publication Publication Date Title
CN104519485B (en) Communication means, device and system between a kind of terminal
CN103389863B (en) A kind of display control method and device
CN103942113B (en) The detection method of system reboot reason, device and terminal unit
CN104571838B (en) A kind of quick method and apparatus for starting application program
CN106657251A (en) Data synchronizing method and apparatus
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN103365419B (en) A kind of method and apparatus triggering alarm clock control command
CN104123276B (en) The hold-up interception method of pop-up, device and system in a kind of browser
CN106570358A (en) Method and device for setting application permissions
CN103312597B (en) A kind of speech message generation method and device
CN104657666A (en) Method and device for optimizing terminal operation environment
CN106506820A (en) A kind of backup method of mobile terminal data and device
CN103246847B (en) A kind of method and apparatus of macrovirus killing
CN106980439A (en) The method and device of hiden application icon
CN106454976A (en) Switching method and device for wireless network and terminal
CN108270757A (en) A kind of user account switching method, device, client and system
CN103793267B (en) The access method and device of queue
CN107104930A (en) It is a kind of that the methods, devices and systems for checking authority are set
CN106681884B (en) A kind of monitoring method and device of system calling
CN106817489A (en) The reminding method and mobile terminal of message
CN107741894A (en) The monitoring method and device of a kind of application process
CN106407779A (en) Information acquisition method and apparatus, and terminal
CN106708641A (en) Process protection method and device
CN103310155B (en) A kind of method and apparatus searching viral parent
CN104468102A (en) Method and device for operation management of network account

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240102

Address after: 518057 Tencent Building, No. 1 High-tech Zone, Nanshan District, Shenzhen City, Guangdong Province, 35 floors

Patentee after: TENCENT TECHNOLOGY (SHENZHEN) Co.,Ltd.

Patentee after: TENCENT CLOUD COMPUTING (BEIJING) Co.,Ltd.

Address before: 518000 Tencent Building, No. 1 High-tech Zone, Nanshan District, Shenzhen City, Guangdong Province, 35 Floors

Patentee before: TENCENT TECHNOLOGY (SHENZHEN) Co.,Ltd.

TR01 Transfer of patent right