CN107783633B - Method for managing application program, terminal and computer readable storage medium - Google Patents

Method for managing application program, terminal and computer readable storage medium Download PDF

Info

Publication number
CN107783633B
CN107783633B CN201710817714.5A CN201710817714A CN107783633B CN 107783633 B CN107783633 B CN 107783633B CN 201710817714 A CN201710817714 A CN 201710817714A CN 107783633 B CN107783633 B CN 107783633B
Authority
CN
China
Prior art keywords
application
preset
terminal
white list
duration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710817714.5A
Other languages
Chinese (zh)
Other versions
CN107783633A (en
Inventor
辛将
彭建华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Microphone Holdings Co Ltd
Original Assignee
Dongguan Goldex Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Goldex Communication Technology Co ltd filed Critical Dongguan Goldex Communication Technology Co ltd
Priority to CN201710817714.5A priority Critical patent/CN107783633B/en
Publication of CN107783633A publication Critical patent/CN107783633A/en
Application granted granted Critical
Publication of CN107783633B publication Critical patent/CN107783633B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of a power-saving mode
    • G06F1/3234Power saving characterised by the action undertaken
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44594Unloading
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • G06F9/5022Mechanisms to release resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The embodiment of the invention discloses a method for managing application programs, a terminal and a computer readable storage medium, wherein the method comprises the following steps: if the first application white list is monitored to be updated, updating a second application white list according to the updating content of the first application white list; the first application white list is an application white list corresponding to the screen-off cleaning application service, and the second application white list is an application white list corresponding to the equipment idle management service; if the current screen-off state is entered and the current screen-off state is the uncharged state, acquiring the application which is currently running; determining a target application according to the second application white list and the currently running application; the target application is a running application which is not recorded in the second application white list; and limiting the network access authority of the target application according to a preset application management strategy corresponding to the equipment idle management service. The embodiment of the invention can reduce the power consumption of the terminal, save the electric quantity of the terminal and simplify the operation of a user.

Description

Method for managing application program, terminal and computer readable storage medium
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to a method, a terminal, and a computer-readable storage medium for managing an application.
Background
With the increasing functionality of terminals (e.g., mobile phones), users can install various types of applications on the terminals. A user usually starts a plurality of applications when using the terminal, and after the terminal is turned off, the applications still run in the background, which causes power consumption increase of the terminal and waste of system resources. In order to optimize system resources when a terminal is in a standby state, the prior art provides a mechanism for clearing an application program by a screen-off mode, which reduces power consumption of the terminal and saves system resources of the terminal by clearing an unprotected application program when the terminal is in a screen-off mode. Meanwhile, the prior art also provides a power saving mechanism that reduces power consumption of a terminal by limiting a network access right of an unprotected application when the terminal is turned off.
Because the mechanism of clearing the application program by turning off the screen and the power saving mechanism both need the user to preset the protected application program, the operation is more complicated, and great inconvenience is brought to the user.
Disclosure of Invention
Embodiments of the present invention provide a method for managing an application, a terminal, and a computer-readable storage medium, which can reduce power consumption of the terminal, save power consumption of the terminal, and simplify operations of a user.
In a first aspect, an embodiment of the present invention provides a method for managing an application, where the method includes:
if the first application white list is monitored to be updated, updating a second application white list according to the updating content of the first application white list; the first application white list is an application white list corresponding to a screen-off cleaning application service, and the second application white list is an application white list corresponding to an equipment idle management service;
if the current screen-off state is entered and the current screen-off state is the uncharged state, acquiring the application which is currently running;
determining a target application according to the second application white list and the currently running application; wherein the target application is the running application which is not recorded in the second application white list;
and limiting the network access authority of the target application according to a preset application management strategy corresponding to the equipment idle management service.
In a second aspect, an embodiment of the present invention provides a terminal, where the terminal includes a unit configured to perform the method of the first aspect.
In a third aspect, an embodiment of the present invention provides another terminal, which includes a processor, an input device, an output device, and a memory, where the processor, the input device, the output device, and the memory are connected to each other, where the memory is used to store a computer program that supports the terminal to execute the foregoing method, and the computer program includes program instructions, and the processor is configured to call the program instructions to execute the foregoing method according to the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, in which a computer program is stored, the computer program comprising program instructions, which, when executed by a processor, cause the processor to perform the method of the first aspect.
According to the embodiment of the invention, the second application white list corresponding to the equipment idle management service can be updated according to the first application white list corresponding to the screen-off cleaning application service, namely, the terminal only needs to provide a setting interface of the first application white list for a user to update the first application white list and the second application white list simultaneously, so that not only can system resources be saved, but also the user does not need to set the contents of a plurality of application white lists, and the user operation is simplified; and the terminal can limit the network access authority of the running application which is not recorded in the second application white list in the screen-off state, so that the power consumption of the terminal is reduced, the electric quantity of the terminal is saved, and the endurance time of the terminal is prolonged.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram of a method for managing applications provided by an embodiment of the present invention;
FIG. 2 is a schematic flow chart diagram of a method for managing applications according to another embodiment of the present invention;
fig. 3 is a schematic block diagram of a terminal according to an embodiment of the present invention;
fig. 4 is a schematic block diagram of a terminal according to another embodiment of the present invention;
fig. 5 is a schematic block diagram of a terminal according to still another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In particular implementations, the terminals described in embodiments of the invention include, but are not limited to, other portable devices such as mobile phones, laptop computers, or tablet computers having touch sensitive surfaces (e.g., touch screen displays and/or touch pads). It should also be understood that in some embodiments, the device is not a portable communication device, but is a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or touchpad).
In the discussion that follows, a terminal that includes a display and a touch-sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The terminal supports various applications, such as one or more of the following: a drawing application, a presentation application, a word processing application, a website creation application, a disc burning application, a spreadsheet application, a gaming application, a telephone application, a video conferencing application, an email application, an instant messaging application, an exercise support application, a photo management application, a digital camera application, a web browsing application, a digital music player application, and/or a digital video player application.
Various applications that may be executed on the terminal may use at least one common physical user interface device, such as a touch-sensitive surface. One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal can be adjusted and/or changed between applications and/or within respective applications. In this way, a common physical architecture (e.g., touch-sensitive surface) of the terminal can support various applications with user interfaces that are intuitive and transparent to the user.
Referring to fig. 1, fig. 1 is a schematic flow chart of a method for managing an application according to an embodiment of the present invention. The main execution body of the method for managing the application program in the embodiment is the terminal. The terminal may be a mobile terminal such as a mobile phone and a tablet computer, but is not limited thereto, and may also be another terminal. The method of managing applications as shown in fig. 1 may include the steps of:
s11: and if the first application white list is monitored to be updated, updating a second application white list according to the updating content of the first application white list.
The first application white list is an application white list corresponding to a screen-off cleaning application service of the terminal system, and the second application white list is an application white list corresponding to an equipment idle management service of the terminal system.
The screen-off cleaning application service is used for cleaning Applications (APPs) which are not recorded in the first application white list and are currently running when the terminal enters a screen-off state. The currently running application is an application which still runs in the background when the terminal enters a screen-off state. The cleaning of the currently running application includes, but is not limited to, closing the currently running application, and cleaning a memory and a cache space corresponding to the currently running application. Since the specific implementation manner of the screen blanking cleaning application service is the prior art, it is not described herein again. The terminal can achieve the purposes of reducing the power consumption of the terminal and saving the system resources of the terminal through the screen-off cleaning application service.
The device idle management service is used for limiting the network access authority of the application which is not recorded in the second application white list and is currently running when the terminal enters a screen-off state and is not charged. The terminal can achieve the purposes of reducing the power consumption of the terminal and saving the electric quantity of the terminal through the equipment idle management service.
In the embodiment of the present invention, before the terminal leaves the factory, the terminal manufacturer may set the second application white list in advance, and store the second application white list in the terminal. Specifically, the terminal manufacturer may add the built-in application that needs to be protected in the terminal to the second application white list according to actual requirements. The built-in applications in the terminal are applications developed by a terminal manufacturer and installed on the terminal when the terminal is shipped from the factory. After the terminal leaves the factory, the terminal provides the user with only the setting interface of the first application white list, and does not provide the user with the setting interface of the second application white list. That is, the user can only set the content of the first application white list, but cannot set the content of the second application white list, so that the operation of the user can be simplified.
The user can open or close the screen-off cleaning application function for some applications at the setting interface corresponding to the screen-off cleaning application service. If the user starts a screen-off cleaning application function for a certain application, the terminal enters a screen-off state, and if the application is in a running state, the terminal cleans the application; if the user closes the screen-off cleaning application function for a certain application, the terminal enters a screen-off state, and if the application is in a running state, the terminal keeps the running state of the application and does not clean the application.
If the terminal detects that the user closes the screen-off cleaning application function to a certain application at a setting interface corresponding to the screen-off cleaning application service, the terminal adds the installation package name of the application to a first application white list. And if the terminal detects that the screen-off cleaning application function is opened to a certain application on a setting interface corresponding to the screen-off cleaning application service by the user, the terminal removes the installation package name of the application from the first application white list.
And when the terminal normally works, monitoring the first application white list, and if the content of the first application white list is monitored to be updated, updating the second application white list according to the updated content of the first application white list. For example, if the terminal monitors that an installation package name (package name) of one or at least two applications is newly added to the first application white list, the terminal may add the newly added package name of the one or at least two applications to the second application white list. If the terminal monitors that the packet names of one or at least two applications in the first application white list are removed, the packet names of the one or at least two applications can be removed from the second application white list.
The terminal may monitor the first application white list in real time, or may monitor the first application white list once every preset time, which is not limited herein. The preset time can be set according to actual requirements, and is not limited here.
S12: and if the current screen-off state is entered and the current screen-off state is the uncharged state, acquiring the application which is currently running.
When the terminal normally works, if the terminal is detected to be in a screen-off state and is in a non-charging state (namely the terminal is not in a charging state), the application which is running currently is obtained. The currently running application is an application which still runs in the background when the terminal enters a screen-off state. The number of applications currently running may be one, or may be at least two, and is not limited herein.
The terminal detects that the current screen-off state is entered, and the terminal detects that the user triggers a preset screen-locking button. The preset screen locking button may be a virtual button or an entity button, and is not limited herein. Namely, if the terminal detects that the user triggers a preset screen locking button, the terminal enters a screen extinguishing state. And the terminal enters a screen-off state to mark the terminal to be locked and turn off the screen.
When the terminal enters a screen-off state, detecting whether the current charging current of the terminal is zero, and if the terminal is in a non-charging state, acquiring the name of an installation package corresponding to the currently running application. Meanwhile, the terminal also acquires a second application white list.
S13: and determining a target application according to the second application white list and the currently running application.
And after the terminal acquires the installation package name corresponding to the currently running application and the second white list, determining the target application according to the second application white list and the installation package name of the currently running application.
Wherein the target application is a running application not recorded in the second application white list.
The terminal may compare the installation package name of the currently running application with the installation package names of the applications recorded in the second application white list one by one, and if the installation package name of a certain currently running application is not recorded in the second application white list, the terminal identifies the application as a target application. The number of the target applications may be one, or may be at least two, and is not limited herein.
S14: and limiting the network access authority of the target application according to a preset application management strategy corresponding to the equipment idle management service.
After the terminal determines the target application, the access right of the target application can be limited according to a preset application management strategy corresponding to the equipment idle management service.
The preset application management strategy corresponding to the device idle management service may be that when the terminal enters the screen-off state and the time for maintaining the screen-off state reaches a first preset time threshold, the network access permission of the target application is limited according to a preset control period. Specifically, the terminal may disconnect the network connection of the target application within a first preset time period corresponding to a preset control cycle; and restoring the network connection of the target application in a second preset time period corresponding to the preset control period.
Each preset control cycle comprises a first preset time interval and a second preset time interval, the second preset time interval corresponding to each preset control cycle is after the first preset time interval corresponding to the preset control cycle, namely, the first preset time interval corresponding to the preset control cycle is entered when one preset control cycle starts, the second preset time interval corresponding to the preset control cycle is entered after the first preset time interval corresponding to the preset control cycle ends, and the first preset time interval corresponding to the next preset control cycle is entered after the second preset time interval corresponding to the preset control cycle ends.
It should be noted that, for each preset control cycle, the duration of the corresponding first preset time period is longer than the duration of the corresponding second preset time period. It can be understood that the durations of the first preset time periods corresponding to each preset control cycle may be equal or unequal, and are not limited herein. That is, the duration of each preset control period may be equal or unequal.
The terminal may disconnect the network connection of the target application, and the terminal may disconnect the network connection between the target application and the server corresponding to the target application. The terminal may restore the network connection of the target application, such that the terminal reestablishes the network connection between the target application and the server corresponding to the target application.
According to the scheme, the terminal can update the second application white list corresponding to the equipment idle management service according to the first application white list corresponding to the screen-off cleaning application service, namely the terminal can update the first application white list and the second application white list at the same time only by providing a setting interface of the first application white list for a user, so that not only can system resources be saved, but also the user does not need to set the contents of a plurality of application white lists, and the user operation is simplified; and the terminal can limit the network access authority of the running application which is not recorded in the second application white list in the screen-off state, so that the power consumption of the terminal is reduced, the electric quantity of the terminal is saved, and the endurance time of the terminal is prolonged.
Referring to fig. 2, fig. 2 is a schematic flow chart of a method for managing an application according to another embodiment of the present invention. The main execution body of the method for managing the application program in the embodiment is the terminal. The terminal may be a mobile terminal such as a mobile phone and a tablet computer, but is not limited thereto, and may also be another terminal. The method of managing applications as shown in fig. 2 may include the steps of:
s21: and if the first application white list is monitored to be updated, updating a second application white list according to the updating content of the first application white list.
The implementation manner of S21 in this embodiment is completely the same as that of S11 in the embodiment corresponding to fig. 1, and reference may be specifically made to the related description of S11 in the embodiment corresponding to fig. 1, which is not repeated herein.
S22: and if the current screen-off state is entered and the current screen-off state is the uncharged state, acquiring the application which is currently running, and executing a first timing operation.
When the terminal normally works, if the terminal is detected to be in a screen-off state and is in a non-charging state (namely the terminal is not in a charging state), the application which is running currently is obtained. The currently running application is an application which still runs in the background when the terminal enters a screen-off state. The number of applications currently running may be one, or may be at least two, and is not limited herein.
The terminal detects that the current screen-off state is entered, and the terminal detects that the user triggers a preset screen-locking button. The preset screen locking button may be a virtual button or an entity button, and is not limited herein. Namely, if the terminal detects that the user triggers a preset screen locking button, the terminal enters a screen extinguishing state. And the terminal enters a screen-off state to mark the terminal to be locked and turn off the screen.
When the terminal enters a screen-off state, detecting whether the current charging current of the terminal is zero, and if the terminal is in a non-charging state, acquiring the name of an installation package corresponding to the currently running application. Meanwhile, the terminal also acquires a second application white list.
The terminal also executes a first timing operation while acquiring the application currently running.
The first timing operation corresponds to a first timing duration. The first timing duration is used for the terminal to detect whether the current time meets the time for carrying out network limitation on some applications which are still running after the screen is turned off.
Specifically, the terminal may detect whether the current time meets the time for performing network restriction on some applications that are still running after the screen is turned off by comparing the first timing duration with a first preset duration threshold. If the terminal detects that the first timing duration reaches a first preset duration threshold, the terminal identifies that the time for network limitation on some applications which are still running after screen off is currently met.
The first preset duration threshold may be set according to actual requirements, and is not limited herein.
S23: and determining a target application according to the second application white list and the currently running application.
The implementation manner of S23 in this embodiment is completely the same as that of S13 in the embodiment corresponding to fig. 1, and reference may be specifically made to the related description of S13 in the embodiment corresponding to fig. 1, which is not repeated herein.
S24: and if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, limiting the network access authority of the target application according to a preset control period corresponding to the preset application management strategy.
If the terminal detects that the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, the terminal recognizes that the time for network limitation on some applications which are still running after screen off is currently met, and at the moment, the terminal limits the network access permission of the target application according to a preset control period corresponding to a preset application management strategy. Each preset control cycle comprises a first preset time interval and a second preset time interval, the second preset time interval corresponding to each preset control cycle is after the first preset time interval corresponding to the preset control cycle, namely, the first preset time interval corresponding to the preset control cycle is entered when one preset control cycle starts, the second preset time interval corresponding to the preset control cycle is entered after the first preset time interval corresponding to the preset control cycle ends, and the first preset time interval corresponding to the next preset control cycle is entered after the second preset time interval corresponding to the preset control cycle ends.
It should be noted that, for each preset control cycle, the duration of the corresponding first preset time period is longer than the duration of the corresponding second preset time period. It can be understood that the durations of the first preset time periods corresponding to each preset control cycle may be equal or unequal, and are not limited herein. That is, the duration of each preset control period may be equal or unequal.
In this embodiment, S24 may specifically include: if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, disconnecting the network connection of the target application within a first preset time period corresponding to the preset control period, and recovering the network connection of the target application within a second preset time period corresponding to the preset control period.
The terminal can disconnect the network connection of the target application within a first preset time period corresponding to a preset control period; and restoring the network connection of the target application in a second preset time period corresponding to the preset control period. The terminal may disconnect the network connection of the target application, and the terminal may disconnect the network connection between the target application and the server corresponding to the target application. The terminal may restore the network connection of the target application, such that the terminal reestablishes the network connection between the target application and the server corresponding to the target application.
It is understood that for applications recorded in the second application white list, the terminal may always maintain the network connection state of the applications in the screen-off state.
It can be understood that, when the terminal limits the network access authority of the target application according to the preset control period, once it is detected that the terminal enters the unlocking state or the terminal enters the charging state, network connection between all running applications and the corresponding servers when the screen is turned off is established.
Further, S24 may include S241 to S243.
S241: and if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, acquiring the current residual electric quantity value.
And if the terminal detects that the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, acquiring the current residual electric quantity value of the terminal.
It can be understood that the terminal may obtain the current remaining power value of the terminal through the power management service, and may also obtain the current remaining power value of the terminal through other manners, which is not limited herein.
S242: and if the residual electric quantity value is larger than a preset electric quantity threshold value, shortening the duration of a first preset time period corresponding to the preset control period.
The terminal obtains a current residual electric quantity value, compares the current residual electric quantity value with a preset electric quantity threshold value, and if the current residual electric quantity value is larger than the preset electric quantity threshold value, the current electric quantity of the terminal is sufficient.
The preset electric quantity threshold value can be set according to actual requirements, and is not limited here. For example, the preset charge threshold may be 60% of the total charge.
It can be understood that, while shortening the duration of the first preset time period corresponding to the current preset control cycle, the terminal may also extend the duration of the second preset time period corresponding to the current preset control cycle, or the terminal may not adjust the duration of the second preset time period corresponding to the current preset control cycle, which is not limited herein.
S243: and limiting the network access authority of the target application according to the preset control cycle after the first preset time period is adjusted.
And after the terminal adjusts the first preset time period corresponding to the current preset control cycle, limiting the network access authority of the target application according to the adjusted preset control cycle. Specifically, the terminal may disconnect the network connection of the target application within a first preset time period corresponding to the adjusted preset control period; and restoring the network connection of the target application in a second preset time period corresponding to the adjusted preset control period.
It can be understood that, when the terminal enters the next preset control cycle from the current preset control cycle, the remaining power of the terminal may be detected again, and if the remaining power of the terminal is still greater than the preset power threshold, the terminal may shorten the duration of the first preset time period corresponding to the next preset control cycle.
Further, S24 may include S244 to S245.
S244: and if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold and the currently connected network is a wireless network, prolonging the duration of a second preset time period corresponding to the preset control period.
And if the terminal detects that the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, detecting the current network connection state. Because the electric quantity consumed by connecting the wireless network is less than the electric quantity consumed by connecting the data network when the terminal is in the same state, if the terminal detects that the currently connected network is the wireless network, the time length of a second preset time period corresponding to the current preset control period is prolonged, namely the time length of the target application and the server corresponding to the target application for keeping network connection is prolonged.
It can be understood that, while the terminal extends the duration of the second preset time period corresponding to the current preset control cycle, the terminal may also shorten the duration of the first preset time period corresponding to the current preset control cycle, or the terminal may not adjust the duration of the first preset time period corresponding to the current preset control cycle, which is not limited herein.
It can be understood that, if the terminal detects that the currently connected network is a data network, the duration of the second preset time period corresponding to the current preset control cycle may not be adjusted.
S245: and limiting the network access authority of the target application according to the preset control cycle after the second preset time period is adjusted.
And after the terminal adjusts a second preset time period corresponding to the current preset control cycle, limiting the network access authority of the target application according to the adjusted preset control cycle. Specifically, the terminal may disconnect the network connection of the target application within a first preset time period corresponding to the adjusted preset control period; and restoring the network connection of the target application in a second preset time period corresponding to the adjusted preset control period.
It can be understood that, when the terminal enters the next preset control cycle from the current preset control cycle, the network connection state of the terminal may be detected again, and if the network to which the terminal is connected is still a wireless network at this time, the terminal may extend the duration of the second preset time period corresponding to the next preset control cycle.
Further, S24 may include S246 to S248.
S246: and if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold and the currently connected network is a data network, acquiring a data flow value used in the current month.
And if the terminal detects that the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, detecting the current network connection state. And if the terminal detects that the currently connected network is a data network, acquiring a data flow value used in the current month corresponding to the current user account.
The current user account may be a phone number corresponding to a Subscriber Identity Module (SIM) card currently inserted into the terminal.
It can be understood that, the terminal may obtain, through the data traffic monitoring service, data traffic used in the current month corresponding to the current user account.
S247: and if the data flow value used in the current month is greater than a preset flow threshold value, shortening the duration of a second preset time period corresponding to the preset control period.
The method comprises the steps that after a terminal acquires data traffic used in the current month corresponding to a current user account, the data traffic used in the current month corresponding to the current user account is compared with a preset traffic threshold, if the data traffic used in the current month corresponding to the current user account is larger than the preset traffic threshold, the remaining traffic corresponding to the current user account is insufficient, and at the moment, the terminal can shorten the duration of a second preset time period corresponding to a current preset control period, namely the duration of the target application and a server corresponding to the terminal maintaining network connection.
The preset flow threshold value can be determined according to a total monthly flow value corresponding to a previous user account. For example, the preset flow threshold may be 80% of the total monthly flow value.
It can be understood that, while shortening the duration of the second preset time period corresponding to the current preset control cycle, the terminal may also extend the duration of the first preset time period corresponding to the current preset control cycle, or the terminal may not adjust the duration of the first preset time period corresponding to the current preset control cycle, which is not limited herein.
S248: and limiting the network access authority of the target application according to the preset control cycle after the second preset time period is adjusted.
And after the terminal adjusts a second preset time period corresponding to the current preset control cycle, limiting the network access authority of the target application according to the adjusted preset control cycle. Specifically, the terminal may disconnect the network connection of the target application within a first preset time period corresponding to the adjusted preset control period; and restoring the network connection of the target application in a second preset time period corresponding to the adjusted preset control period.
It can be understood that, when the first timing duration corresponding to the first timing operation reaches the first preset duration threshold, if the terminal detects that the data traffic used in the current month corresponding to the current user account is less than or equal to the preset traffic threshold, the terminal may not adjust the current preset control period, and may limit the network access permission of the target application according to the current preset control period. Meanwhile, when the terminal enters the next preset control period from the current preset control period, the network connection state of the terminal can be detected again, and if the network connected with the terminal is still a data network at the moment, the terminal can acquire the data traffic used in the month corresponding to the previous user account at the moment. If the data traffic used in the current month corresponding to the previous user account is greater than the preset traffic threshold, the terminal can shorten the duration of a second preset time period corresponding to the next preset control cycle; if the data traffic used in the current month corresponding to the previous user account is still less than or equal to the preset traffic threshold, the terminal may not adjust the next preset control period.
It can be understood that, when the first timing duration corresponding to the first timing operation reaches the first preset duration threshold, if the terminal detects that the data traffic used in the current month corresponding to the current user account is greater than the preset traffic threshold, the duration of the second preset time period corresponding to all the preset control periods can be simultaneously shortened, and the network connection state of the terminal is not detected any more when each preset control period is entered later.
S241 to S243, S244 to S245, and S246 to S248 are technical means in parallel. If the terminal executes S241 to S243, S244 to S245 and S246 to S248 are not executed; if the terminal executes S244 to S245, S241 to S243 and S246 to S248 are not executed; when the terminal executes S246 to S248, S241 to S243 and S244 to S245 are not executed.
According to the scheme, the terminal can update the second application white list corresponding to the equipment idle management service according to the first application white list corresponding to the screen-off cleaning application service, namely the terminal can update the first application white list and the second application white list at the same time only by providing a setting interface of the first application white list for a user, so that not only can system resources be saved, but also the user does not need to set the contents of a plurality of application white lists, and the user operation is simplified; and the terminal can limit the network access authority of the running application which is not recorded in the second application white list in the screen-off state, so that the power consumption of the terminal is reduced, the electric quantity of the terminal is saved, and the endurance time of the terminal is prolonged.
The terminal adjusts the preset control period corresponding to the preset application management strategy according to the residual electric quantity value or the network connection state, so that the power consumption of the terminal can be reduced, and the data flow can be saved.
Referring to fig. 3, fig. 3 is a schematic block diagram of a terminal according to an embodiment of the present invention. The terminal 300 may be a mobile terminal such as a smart phone or a tablet computer. The terminal 300 of the present embodiment includes units for executing steps in the embodiment corresponding to fig. 1, and please refer to fig. 1 and the related description in the embodiment corresponding to fig. 1 for details, which are not repeated herein. The terminal 300 of the present embodiment includes an updating unit 301, a first obtaining unit 302, a first determining unit 303, and a network control unit 304.
The updating unit 301 is configured to update a second application white list according to update content of a first application white list if it is monitored that the first application white list is updated; the first application white list is an application white list corresponding to the screen-off cleaning application service, and the second application white list is an application white list corresponding to the equipment idle management service.
The first obtaining unit 302 is configured to obtain an application currently running if the screen-off state is currently entered and the current state is an uncharged state.
The first determining unit 303 is configured to determine a target application according to the second application white list and the currently running application; wherein the target application is the running application not recorded in the second application white list. The first determining unit 303 sends the target application to the network control unit 304.
The network control unit 304 is configured to limit the network access right of the target application according to a preset application management policy corresponding to the device idle management service.
According to the scheme, the terminal can update the second application white list corresponding to the equipment idle management service according to the first application white list corresponding to the screen-off cleaning application service, namely the terminal can update the first application white list and the second application white list at the same time only by providing a setting interface of the first application white list for a user, so that not only can system resources be saved, but also the user does not need to set the contents of a plurality of application white lists, and the user operation is simplified; and the terminal can limit the network access authority of the running application which is not recorded in the second application white list in the screen-off state, so that the power consumption of the terminal is reduced, the electric quantity of the terminal is saved, and the endurance time of the terminal is prolonged.
Referring to fig. 4, fig. 4 is a schematic block diagram of a terminal according to another embodiment of the present invention. The terminal 400 may be a mobile terminal such as a smart phone, a tablet computer, or the like. The terminal 400 of the present embodiment includes units for executing steps in the embodiment corresponding to fig. 2, please refer to fig. 2 and the related description in the embodiment corresponding to fig. 2, which are not repeated herein. The terminal 400 of the present embodiment includes an updating unit 401, a first obtaining unit 402, a first determining unit 403, and a network control unit 404.
The updating unit 401 is configured to update a second application white list according to update content of a first application white list if it is monitored that the first application white list is updated; the first application white list is an application white list corresponding to the screen-off cleaning application service, and the second application white list is an application white list corresponding to the equipment idle management service.
The first obtaining unit 402 is configured to obtain an application currently running if the screen-off state is currently entered and the current state is an uncharged state.
Further, the first obtaining unit 402 is specifically configured to, if the current screen-off state is entered and the current screen-off state is the uncharged state, obtain the application currently running, and execute a first timing operation.
The first determining unit 403 is configured to determine a target application according to the second application white list and the currently running application; wherein the target application is the running application not recorded in the second application white list.
The network control unit 404 is configured to, if a first timing duration corresponding to the first timing operation reaches a first preset duration threshold, limit the network access permission of the target application according to a preset control period corresponding to the preset application management policy.
Further, the network control unit 404 is specifically configured to, if a first timing duration corresponding to the first timing operation reaches a first preset duration threshold, limit the network access permission of the target application according to a preset control period corresponding to the preset application management policy.
Further, the network control unit 404 is specifically configured to disconnect the network connection of the target application in a first preset time period corresponding to the preset control period and restore the network connection of the target application in a second preset time period corresponding to the preset control period if a first timing duration corresponding to the first timing operation reaches a first preset duration threshold; the second preset time interval is after the first preset time interval, and the duration corresponding to the first preset time interval is longer than the duration corresponding to the second preset time interval.
Further, the network control unit 404 may include a second obtaining unit 4041, a time adjusting unit 4042, and a first control unit 4043.
The second obtaining unit 4041 is configured to obtain a current remaining electric quantity value if a first timing duration corresponding to the first timing operation reaches a first preset duration threshold.
The time adjustment unit 4042 is configured to shorten a duration of a first preset time period corresponding to the preset control period if the remaining electric quantity value is greater than a preset electric quantity threshold.
The first control unit 4043 is configured to limit the network access right of the target application according to the preset control cycle after the first preset time period is adjusted.
Further, the time adjustment unit 4042 is further configured to, if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold and the currently connected network is a wireless network, extend the duration of a second preset time period corresponding to the preset control period.
The first control unit 4043 is further configured to limit the network access right of the target application according to the preset control cycle after the second preset time period is adjusted.
Further, the network control unit 404 may further include a third obtaining unit 4044.
The third obtaining unit 4044 is configured to obtain a data traffic value used in the current month if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold and the currently connected network is a data network.
The time adjustment unit 4042 is further configured to shorten a duration of a second preset time period corresponding to the preset control cycle if the data traffic value used in the current month is greater than a preset traffic threshold.
The first control unit 4043 is further configured to limit the network access right of the target application according to the preset control cycle after the second preset time period is adjusted.
According to the scheme, the terminal can update the second application white list corresponding to the equipment idle management service according to the first application white list corresponding to the screen-off cleaning application service, namely the terminal can update the first application white list and the second application white list at the same time only by providing a setting interface of the first application white list for a user, so that not only can system resources be saved, but also the user does not need to set the contents of a plurality of application white lists, and the user operation is simplified; and the terminal can limit the network access authority of the running application which is not recorded in the second application white list in the screen-off state, so that the power consumption of the terminal is reduced, the electric quantity of the terminal is saved, and the endurance time of the terminal is prolonged.
The terminal adjusts the preset control period corresponding to the preset application management strategy according to the residual electric quantity value or the network connection state, so that the power consumption of the terminal can be reduced, and the data flow can be saved.
Referring to fig. 5, fig. 5 is a schematic block diagram of a terminal according to still another embodiment of the present invention. The terminal 500 in the present embodiment shown in fig. 5 may include: one or more processors 501, one or more input devices 502, one or more output devices 503, and one or more memories 504. The processor 501, the input device 502, the output device 503 and the memory 504 are all communicated with each other through a communication bus 505. The memory 504 is used to store a computer program comprising program instructions. The processor 501 is configured to execute program instructions stored in the memory 504. Wherein the processor 501 is configured to call the program instruction to perform the following operations:
if the first application white list is monitored to be updated, updating a second application white list according to the updating content of the first application white list; the first application white list is an application white list corresponding to a screen-off cleaning application service, and the second application white list is an application white list corresponding to an equipment idle management service;
if the current screen-off state is entered and the current screen-off state is the uncharged state, acquiring the application which is currently running;
determining a target application according to the second application white list and the currently running application; wherein the target application is the running application which is not recorded in the second application white list;
and limiting the network access authority of the target application according to a preset application management strategy corresponding to the equipment idle management service.
Further, the processor 501 is specifically configured to call the program instruction to perform the following operations:
and if the current screen-off state is entered and the current screen-off state is the uncharged state, acquiring the application which is currently running, and executing a first timing operation.
Further, the processor 501 is specifically configured to call the program instruction to perform the following operations:
and if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, limiting the network access authority of the target application according to a preset control period corresponding to the preset application management strategy.
Further, the processor 501 is specifically configured to call the program instruction to perform the following operations:
if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, disconnecting the network connection of the target application within a first preset time period corresponding to the preset control period, and recovering the network connection of the target application within a second preset time period corresponding to the preset control period; the second preset time interval is after the first preset time interval, and the duration corresponding to the first preset time interval is longer than the duration corresponding to the second preset time interval.
Further, the processor 501 is specifically configured to call the program instruction to perform the following operations:
if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, acquiring a current residual electric quantity value;
if the residual electric quantity value is larger than a preset electric quantity threshold value, shortening the duration of a first preset time period corresponding to the preset control period;
and limiting the network access authority of the target application according to the preset control cycle after the first preset time period is adjusted.
Further, the processor 501 is specifically configured to call the program instruction to perform the following operations:
if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold and the currently connected network is a wireless network, the duration of a second preset time period corresponding to the preset control period is prolonged;
and limiting the network access authority of the target application according to the preset control cycle after the second preset time period is adjusted.
Further, the processor 501 is specifically configured to call the program instruction to perform the following operations:
if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold and the currently connected network is a data network, acquiring a data flow value used in the current month;
if the data flow value used in the current month is larger than a preset flow threshold value, shortening the duration of a second preset time period corresponding to the preset control period;
and limiting the network access authority of the target application according to the preset control cycle after the second preset time period is adjusted.
According to the scheme, the terminal can update the second application white list corresponding to the equipment idle management service according to the first application white list corresponding to the screen-off cleaning application service, namely the terminal can update the first application white list and the second application white list at the same time only by providing a setting interface of the first application white list for a user, so that not only can system resources be saved, but also the user does not need to set the contents of a plurality of application white lists, and the user operation is simplified; and the terminal can limit the network access authority of the running application which is not recorded in the second application white list in the screen-off state, so that the power consumption of the terminal is reduced, the electric quantity of the terminal is saved, and the endurance time of the terminal is prolonged.
The terminal adjusts the preset control period corresponding to the preset application management strategy according to the residual electric quantity value or the network connection state, so that the power consumption of the terminal can be reduced, and the data flow can be saved.
It should be understood that, in the embodiment of the present invention, the Processor 501 may be a Central Processing Unit (CPU), and the Processor may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input device 502 may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of the fingerprint), a microphone, etc., and the output device 503 may include a display (LCD, etc.), a speaker, etc.
The memory 504 may include a read-only memory and a random access memory, and provides instructions and data to the processor 501. A portion of the memory 504 may also include non-volatile random access memory. For example, the memory 504 may also store device type information.
In a specific implementation, the processor 501, the input device 502, and the output device 503 described in this embodiment of the present invention may execute the implementation manners described in the first embodiment and the second embodiment of the method for managing an application program provided in this embodiment of the present invention, and may also execute the implementation manners of the terminal described in this embodiment of the present invention, which is not described herein again.
In another embodiment of the present invention, a computer-readable storage medium is provided, the computer-readable storage medium storing a computer program comprising program instructions that when executed by a processor implement:
if the first application white list is monitored to be updated, updating a second application white list according to the updating content of the first application white list; the first application white list is an application white list corresponding to a screen-off cleaning application service, and the second application white list is an application white list corresponding to an equipment idle management service;
if the current screen-off state is entered and the current screen-off state is the uncharged state, acquiring the application which is currently running;
determining a target application according to the second application white list and the currently running application; wherein the target application is the running application which is not recorded in the second application white list;
and limiting the network access authority of the target application according to a preset application management strategy corresponding to the equipment idle management service.
Further, the computer program when executed by the processor implements:
and if the current screen-off state is entered and the current screen-off state is the uncharged state, acquiring the application which is currently running, and executing a first timing operation.
Further, the computer program when executed by the processor implements:
and if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, limiting the network access authority of the target application according to a preset control period corresponding to the preset application management strategy.
Further, the computer program when executed by the processor implements:
if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, disconnecting the network connection of the target application within a first preset time period corresponding to the preset control period, and recovering the network connection of the target application within a second preset time period corresponding to the preset control period; the second preset time interval is after the first preset time interval, and the duration corresponding to the first preset time interval is longer than the duration corresponding to the second preset time interval.
Further, the computer program when executed by the processor implements:
if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, acquiring a current residual electric quantity value;
if the residual electric quantity value is larger than a preset electric quantity threshold value, shortening the duration of a first preset time period corresponding to the preset control period;
and limiting the network access authority of the target application according to the preset control cycle after the first preset time period is adjusted.
Further, the computer program when executed by the processor implements:
if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold and the currently connected network is a wireless network, the duration of a second preset time period corresponding to the preset control period is prolonged;
and limiting the network access authority of the target application according to the preset control cycle after the second preset time period is adjusted.
Further, the computer program when executed by the processor implements:
if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold and the currently connected network is a data network, acquiring a data flow value used in the current month;
if the data flow value used in the current month is larger than a preset flow threshold value, shortening the duration of a second preset time period corresponding to the preset control period;
and limiting the network access authority of the target application according to the preset control cycle after the second preset time period is adjusted.
The computer readable storage medium may be an internal storage unit of the terminal according to any of the foregoing embodiments, for example, a hard disk or a memory of the terminal. The computer readable storage medium may also be an external storage device of the terminal, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the terminal. Further, the computer-readable storage medium may also include both an internal storage unit and an external storage device of the terminal. The computer-readable storage medium is used for storing the computer program and other programs and data required by the terminal. The computer readable storage medium may also be used to temporarily store data that has been output or is to be output.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the terminal and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed terminal and method can be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (7)

1. A method for managing applications, comprising:
if the first application white list is monitored to be updated, updating a second application white list according to the updating content of the first application white list; the first application white list is an application white list corresponding to the screen-off cleaning application service, and the content of the first application white list can be set by a user; the second application white list is an application white list corresponding to the equipment idle management service, and the content of the second application white list is not set by a user;
if the current screen-off state is entered and the current screen-off state is the uncharged state, acquiring the application which is currently running, and executing a first timing operation;
determining a target application according to the second application white list and the currently running application; wherein the target application is the running application which is not recorded in the second application white list;
and if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, limiting the network access authority of the target application according to a preset control period corresponding to a preset application management strategy.
2. The method according to claim 1, wherein if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, limiting the network access permission of the target application according to a preset control period corresponding to the preset application management policy includes:
if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, disconnecting the network connection of the target application within a first preset time period corresponding to the preset control period, and recovering the network connection of the target application within a second preset time period corresponding to the preset control period; the second preset time interval is after the first preset time interval, and the duration corresponding to the first preset time interval is longer than the duration corresponding to the second preset time interval.
3. The method according to claim 1, wherein if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, limiting the network access permission of the target application according to a preset control period corresponding to the preset application management policy includes:
if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, acquiring a current residual electric quantity value;
if the residual electric quantity value is larger than a preset electric quantity threshold value, shortening the duration of a first preset time period corresponding to the preset control period;
and limiting the network access authority of the target application according to the preset control cycle after the first preset time period is adjusted.
4. The method according to claim 1, wherein if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, limiting the network access permission of the target application according to a preset control period corresponding to the preset application management policy includes:
if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold and the currently connected network is a wireless network, the duration of a second preset time period corresponding to the preset control period is prolonged;
and limiting the network access authority of the target application according to the preset control cycle after the second preset time period is adjusted.
5. The method according to claim 1, wherein if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold, limiting the network access permission of the target application according to a preset control period corresponding to the preset application management policy includes:
if the first timing duration corresponding to the first timing operation reaches a first preset duration threshold and the currently connected network is a data network, acquiring a data flow value used in the current month;
if the data flow value used in the current month is larger than a preset flow threshold value, shortening the duration of a second preset time period corresponding to the preset control period;
and limiting the network access authority of the target application according to the preset control cycle after the second preset time period is adjusted.
6. A terminal, comprising a processor, an input device, an output device, and a memory, the processor, the input device, the output device, and the memory being interconnected, wherein the memory is configured to store a computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method of any of claims 1-5.
7. A computer-readable storage medium, characterized in that the computer storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to perform the method according to any of claims 1-5.
CN201710817714.5A 2017-09-12 2017-09-12 Method for managing application program, terminal and computer readable storage medium Active CN107783633B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710817714.5A CN107783633B (en) 2017-09-12 2017-09-12 Method for managing application program, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710817714.5A CN107783633B (en) 2017-09-12 2017-09-12 Method for managing application program, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107783633A CN107783633A (en) 2018-03-09
CN107783633B true CN107783633B (en) 2020-12-15

Family

ID=61438192

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710817714.5A Active CN107783633B (en) 2017-09-12 2017-09-12 Method for managing application program, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107783633B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616653B (en) * 2018-03-30 2020-01-17 Oppo广东移动通信有限公司 Information processing method, device, mobile terminal and computer readable storage medium
CN113010000B (en) * 2021-02-22 2024-03-26 北京小米移动软件有限公司 Power consumption optimization method and device, electronic equipment and storage medium
CN114143822B (en) * 2021-11-05 2023-08-15 阳光电源股份有限公司 Flow management method, operation management platform, charging pile and storage medium
CN115567634B (en) * 2022-09-05 2024-03-29 青岛海信移动通信技术有限公司 Network management method, device, equipment and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106020421A (en) * 2016-05-19 2016-10-12 深圳市金立通信设备有限公司 Application management method and terminal

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6895520B1 (en) * 2001-03-02 2005-05-17 Advanced Micro Devices, Inc. Performance and power optimization via block oriented performance measurement and control
WO2013101215A1 (en) * 2011-12-30 2013-07-04 Intel Corporation Cloud based real time app privacy dashboard
JP6164294B2 (en) * 2013-08-20 2017-07-19 富士通株式会社 Information processing apparatus, communication apparatus, information processing method, and information processing program
US20150067363A1 (en) * 2013-09-04 2015-03-05 Sebastien Jouin Clock generator circuit with automatic sleep mode
CN105335648A (en) * 2015-09-29 2016-02-17 深圳天珑无线科技有限公司 Mobile terminal and background application management method thereof
CN105824392A (en) * 2015-11-26 2016-08-03 维沃移动通信有限公司 Application program management method and terminal
CN105975323A (en) * 2016-06-27 2016-09-28 北京金山安全软件有限公司 Application management method and device and terminal
CN106528236A (en) * 2016-11-11 2017-03-22 努比亚技术有限公司 Memory acceleration white list configuration method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106020421A (en) * 2016-05-19 2016-10-12 深圳市金立通信设备有限公司 Application management method and terminal

Also Published As

Publication number Publication date
CN107783633A (en) 2018-03-09

Similar Documents

Publication Publication Date Title
CN107783633B (en) Method for managing application program, terminal and computer readable storage medium
CN106415296B (en) Adaptive battery life extension
US7647474B2 (en) Saving system context in the event of power loss
WO2017142309A1 (en) Electronic device and method for controlling application and component
CN106951057B (en) Application control method and mobile terminal
CN106569585A (en) Method and terminal of managing application program process
CN106060389A (en) Sneak shot prevention method and terminal
CN107729781B (en) Method for preventing loss of mobile terminal, mobile terminal and computer readable storage medium
WO2019024641A1 (en) Data synchronization method and apparatus, storage medium and electronic device
WO2019024646A1 (en) Application management and control method, apparatus, and electronic device
CN107861602B (en) Terminal CPU performance control method, terminal and computer readable storage medium
US20150113301A1 (en) Charging method and mobile electronic device
US9692876B2 (en) Suppress and resume notifications based on motion
CN108038050B (en) Performance adjusting method and device, storage medium and electronic equipment
CN103297600A (en) Mobile terminal and method for automatically rebooting system of mobile terminal
CN107291213B (en) Mode selection method, device, terminal and computer readable storage medium
US10621015B2 (en) Notification for unsaved data
EP2863331A1 (en) Portable terminal, program, and control method
US11243597B2 (en) Microprocessor power logging at a sub-process level
US8032928B2 (en) Methods, devices, and computer program products for controlling wireless connection access
CN107547742B (en) Wake-up lock release method and device for mobile terminal
CN107040659B (en) Intelligent shutdown interface display method and terminal
CN111143830A (en) Method and device for limiting application use, terminal equipment and storage medium
CN108132803B (en) Timing keep-alive and awakening method, system, terminal and medium based on mobile terminal
CN110874730B (en) Information processing method, information processing device and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210423

Address after: No. 1702-1703, 17 / F (15 / F, natural floor), Desai technology building, 9789 Shennan Avenue, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Patentee after: Shenzhen Microphone Holdings Co.,Ltd.

Address before: 518040, 21 floor, Times Technology Building, 7028 Shennan Road, Futian District, Guangdong, Shenzhen

Patentee before: DONGGUAN GOLDEX COMMUNICATION TECHNOLOGY Co.,Ltd.