CN107807832A - Background application method for cleaning, device, storage medium and electronic equipment - Google Patents

Background application method for cleaning, device, storage medium and electronic equipment Download PDF

Info

Publication number
CN107807832A
CN107807832A CN201711124515.2A CN201711124515A CN107807832A CN 107807832 A CN107807832 A CN 107807832A CN 201711124515 A CN201711124515 A CN 201711124515A CN 107807832 A CN107807832 A CN 107807832A
Authority
CN
China
Prior art keywords
electronic equipment
application
cleaning
security
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711124515.2A
Other languages
Chinese (zh)
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201711124515.2A priority Critical patent/CN107807832A/en
Publication of CN107807832A publication Critical patent/CN107807832A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44594Unloading
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of a power-saving mode
    • G06F1/3234Power saving characterised by the action undertaken
    • G06F1/329Power saving characterised by the action undertaken by task scheduling

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present application discloses a kind of background application method for cleaning, device, storage medium and electronic equipment, wherein, background application method for cleaning includes:Each application to be installed on electronic equipment sets level of security;Whether the usage scenario for detecting the electronic equipment is safe;When the usage scenario of the electronic equipment is dangerous, the level of security for clearing up the electronic equipment running background is high application.The embodiment of the present application can improve the operation fluency of electronic equipment, save resource, ensure the safety of application.

Description

Background application method for cleaning, device, storage medium and electronic equipment
Technical field
The application is related to communication technical field, and in particular to a kind of background application method for cleaning, device, storage medium and electricity Sub- equipment.
Background technology
At present, on the electronic equipment such as smart mobile phone, it will usually multiple different applications are installed, needed with solving the different of user Ask.The system of electronic equipment supports multiple applications to run simultaneously at present, i.e., one is applied in front stage operation, and other application can be Running background.Once the application of electronic equipment running background is excessive, it may result in electronic equipment and some problems occur, such as:Card , response speed it is slack-off etc..Therefore, it is necessary to which some applications of strategy to running background are cleared up.Existing method for cleaning is more Consider for resources conservation, such as:Application is cleared up according to the power consumption of application, the memory size pair taken according to application Using being cleared up.In practice, consider merely for resources conservation, carry out using cleaning, be far from being enough.
The content of the invention
The embodiment of the present application provides a kind of background application method for cleaning, device, storage medium and electronic equipment, Neng Gouti The operation fluency of high electronic equipment, save resource, moreover it is possible to ensure the safety of application.
In a first aspect, the background application method for cleaning that the embodiment of the present application provides, including:
Each application to be installed on electronic equipment sets level of security;
Whether the usage scenario for detecting the electronic equipment is safe;
When the usage scenario of the electronic equipment is dangerous, the level of security for clearing up the electronic equipment running background is High application.
Second aspect, the background application cleaning plant that the embodiment of the present application provides, including:
Setting unit, for each application setting level of security to be installed on electronic equipment;
Whether detection unit, the usage scenario for detecting the electronic equipment are safe;
Unit is cleared up, is transported for when the usage scenario of the electronic equipment is dangerous, clearing up the electronic equipment backstage Capable level of security is high application.
The third aspect, the storage medium that the embodiment of the present application provides, is stored thereon with computer program, when the computer When program is run on computers so that the background application that the computer is performed as described in the embodiment of the present application first aspect is clear Reason method.
Fourth aspect, the electronic equipment that the embodiment of the present application provides, including processor and memory, the memory have meter Calculation machine program, it is characterised in that the processor is by calling the computer program, for performing such as the embodiment of the present application the Background application method for cleaning described in one side.
In the embodiment of the present application, it can be that each application installed on electronic equipment sets level of security, detect the electronics Whether the usage scenario of equipment is safe, when the usage scenario of the electronic equipment is dangerous, clears up the electronic equipment backstage The level of security of operation is high application, while realizing that background application is cleared up automatically, ensure that the safety of application, improves The operation fluency of electronic equipment, saves resource.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those skilled in the art, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached Figure.
Fig. 1 is the application scenarios schematic diagram for the background application method for cleaning that the embodiment of the present application provides.
Fig. 2 is the schematic flow sheet for the background application method for cleaning that the embodiment of the present application provides.
Fig. 3 is another schematic flow sheet for the background application method for cleaning that the embodiment of the present application provides.
Fig. 4 is the another schematic flow sheet for the background application method for cleaning that the embodiment of the present application provides.
Fig. 5 is the structural representation for the background application cleaning plant that the embodiment of the present application provides.
Fig. 6 is another structural representation for the background application cleaning plant that the embodiment of the present application provides.
Fig. 7 is the structural representation for the electronic equipment that the embodiment of the present application provides.
Fig. 8 is another structural representation for the electronic equipment that the embodiment of the present application provides.
Embodiment
Schema is refer to, wherein identical element numbers represent identical component, and the principle of the application is to implement one Illustrated in appropriate computing environment.The following description is based on illustrated the application specific embodiment, and it should not be by It is considered as limitation the application other specific embodiments not detailed herein.
In the following description, the specific embodiment of the application is by with reference to as the step performed by one or multi-section computer And symbol illustrates, unless otherwise stating clearly.Therefore, these steps and operation will have to mention for several times is performed by computer, this paper institutes The computer of finger, which performs, to be included by representing with the computer processing unit of the electronic signal of the data in a structuring pattern Operation.The data or the opening position being maintained in the memory system of the computer are changed in this operation, and its is reconfigurable Or change the running of the computer in a manner of known to the tester of this area in addition.The data structure that the data are maintained For the provider location of the internal memory, it has the particular characteristics as defined in the data format.But the application principle is with above-mentioned text Word illustrates that it is not represented as a kind of limitation, this area tester will appreciate that plurality of step as described below and behaviour Also may be implemented among hardware.
Term as used herein " module " can regard the software object to be performed in the arithmetic system as.It is as described herein Different components, module, engine and service can be regarded as the objective for implementation in the arithmetic system.And device as described herein and side Method can be implemented in a manner of software, can also be implemented certainly on hardware, within the application protection domain.
Term " first ", " second " and " the 3rd " in the application etc. is to be used to distinguish different objects, rather than for retouching State particular order.In addition, term " comprising " and " having " and their any deformations, it is intended that cover non-exclusive include. Such as contain the step of process, method, system, product or the equipment of series of steps or module is not limited to list or Module, but some embodiments also include the step of not listing or module, or some embodiments also include for these processes, Method, product or equipment intrinsic other steps or module.
Referenced herein " embodiment " is it is meant that the special characteristic, structure or the characteristic that describe can wrap in conjunction with the embodiments It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
The embodiment of the present application provides a kind of background application method for cleaning, and the executive agent of the background application method for cleaning can be with It is the background application cleaning plant that the embodiment of the present application provides, or is integrated with the electronic equipment of the background application cleaning plant, Wherein the background application cleaning plant can be realized by the way of hardware or software.Wherein, electronic equipment can be intelligence The equipment such as mobile phone, tablet personal computer, palm PC, notebook computer or desktop computer.
Referring to Fig. 1, Fig. 1 is the application scenarios schematic diagram for the background application method for cleaning that the embodiment of the present application provides, with Exemplified by background application cleaning plant is electronic equipment, electronic equipment can be that each application installed thereon sets level of security, User use electronic equipment during, can detect the electronic equipment usage scenario whether safety, when the electronics When the usage scenario of equipment is dangerous, the level of security for clearing up the electronic equipment running background is high application.
Specifically, as shown in figure 1, for example, when the usage scenario for detecting electronic equipment is dangerous, detect in electronics The application of the running background of equipment is included using a, using b and using c;Then obtain respectively using a, using b and using c Level of security, such as using a, using c level of security be " low ", and it be " height " to apply b level of security, it is determined that is applied A, c is can not clear up, and using b for that can clear up, then keep constant in the state of running background using a, c, and by running background Closed using b.
For the embodiment of the present application by from the angle of background application cleaning plant, it is clear that description the embodiment of the present application provides background application Reason method, the background application cleaning plant can specifically integrate in the electronic device.The background application method for cleaning includes:For electricity The each application installed in sub- equipment sets level of security;Whether the usage scenario for detecting the electronic equipment is safe;When described When the usage scenario of electronic equipment is dangerous, the level of security for clearing up the electronic equipment running background is high application.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet for the background application method for cleaning that the embodiment of the present application provides.The application The idiographic flow for the background application method for cleaning that embodiment provides can be as follows:
Step S201, each application to be installed on electronic equipment sets level of security.
Application mentioned by the present embodiment, can be any one application installed on electronic equipment, such as:Office should With, communications applications, game application, shopping application etc..
Specifically, the level of security each applied can be during the use of electronic equipment, by the legal of electronic equipment User (such as:Owner) voluntarily set according to demand, it can also be set when electronic equipment dispatches from the factory by manufacturer is unified.
Set level of security can include " height " and " low ".Level of security includes but is not limited to for the application of " height ": The application of account, code entry is needed to use, is either related to the application of user privacy information or is related to user's property safety Using.
It is that the level of security set by each application installed on electronic equipment can be as follows in a specific embodiment Shown in table 1:
Using Level of security
Wechat It is high
Music It is low
Photograph album It is high
Alipay It is high
Domestic News It is low
QQ It is high
Weather It is low
Table 1
In the specific implementation, can be respectively that each application sets level of security, only can also answer what is laid special stress on protecting With " height " level of security is set, residue is not provided with the application of level of security, is defaulted as the level of security with " low ".
Whether the usage scenario for step S202, detecting the electronic equipment is safe.
Specifically, the usage scenario of electronic equipment can be including the use of the user of electronic equipment.Set i.e., it is possible to detect electronics Standby active user whether be pre-set user (such as:Owner, or the user for having access right of owner's setting), if default User, it is determined that usage scenario safety, otherwise, it determines usage scenario is dangerous.
Specifically, the usage scenario of electronic equipment can also include network residing for electronic equipment.Set i.e., it is possible to detect electronics Standby current connected network whether be default network (such as:Carrier data network, the wireless network of family, relatives and friends Wireless network etc.), if default network, it is determined that usage scenario safety, otherwise, it determines usage scenario is dangerous.
Step S203, when the usage scenario of the electronic equipment is dangerous, the electronic equipment running background is cleared up Level of security is high application.
Specifically, can be by the electronic equipment running background when the usage scenario of the electronic equipment is dangerous Level of security exits for the application of " height " from Entered state, and remove related logon information (such as:Recorded log in title, Account, password etc.), if application need not log in, it can directly close application.
In addition, if detecting the usage scenario safety of electronic equipment, then can detect whether to meet default cleaning condition, If meeting default cleaning condition, all applications of electronic equipment running background can be cleared up according to preset strategy.This is default clear Manage bar part is for example:The application cleaning instruction that user sends, or (dump energy can be remaining to the dump energy of electronic equipment The percent value of electricity or the capacitance of dump energy) it is less than default power threshold, or the application of running background Quantity is more than predetermined number threshold value, or the free memory of electronic equipment is less than default memory threshold.Preset strategy is for example:Preferentially Cleaning enters the longer application of backoff period, and either preferential cleaning enters the relatively low application of foreground frequency or preferential cleaning accounts for With the application that internal memory is larger, it is not specifically limited herein.
In addition, after the level of security for clearing up the electronic equipment running background is high application, for electronic equipment The level of security of running background is low application, can also detect whether to meet default cleaning condition, if meeting default cleaning bar Part, then the level of security that electronic equipment running background can be cleared up according to preset strategy is low application.
In the present embodiment, it can be that each application installed on electronic equipment sets level of security, detect the electronic equipment Usage scenario whether safety, when the usage scenario of the electronic equipment is dangerous, clear up the electronic equipment running background Level of security be high application, while realizing that background application is cleared up automatically, ensure that the safety of application, improve electronics The operation fluency of equipment, saves resource.
On the basis of the method that following two embodiment will describe in above-described embodiment, the method for cleaning of the application is done into one Step is introduced.
Referring to Fig. 3, the method for the present embodiment includes:
Step S301, each application to be installed on electronic equipment sets level of security.
Specifically, the level of security each applied can be during the use of electronic equipment, by the legal of electronic equipment User (such as:Owner) voluntarily set according to demand, it can also be set when electronic equipment dispatches from the factory by manufacturer is unified.
Set level of security can include " height " and " low ".Level of security includes but is not limited to for the application of " height ": Need to use account, code entry application (such as:QQ, mailbox great master), or it is related to the application (example of user privacy information Such as:Photograph album, short message), or be related to user's property safety application (such as:Alipay, wechat).
Whether the active user for step S302, detecting the electronic equipment is pre-set user, if pre-set user, is then performed Step S307, end processing, otherwise, perform step S303.
Pre-set user, such as:The user for having access right to the electronic equipment that owner or owner specify, such as, machine Main household.
In the specific implementation, identification information and the storage of pre-set user can be gathered in advance, to be set when there is user using electronics When standby, the identification information of the active user of electronic equipment is obtained, judges the identification information of active user and the mark of pre-set user Whether information matches.If matching, then it is assumed that active user is pre-set user, otherwise it is assumed that active user is not pre-set user.Should Identification information, such as:Photo, fingerprint, signature etc..
Step S303, the level of security for clearing up the electronic equipment running background is high application.
Specifically, can by the level of security of the electronic equipment running background for " height " application (such as wechat, payment Treasured etc.) exited from Entered state, and remove related logon information (such as:What is recorded logs in title, account, password etc.), if Using (such as photograph album, short message) need not be logged in, then application can be directly closed.
Non-pre-set user can be so avoided either intentionally or unintentionally to have accessed the electronics when using the electronic equipment The level of security of equipment running background is the application of " height ", and the privacy leakage of pre-set user, property loss etc. are asked so as to caused by Topic.
Step S304, the level of security that the desktop of the hiding electronic equipment is shown is the icon of high application.
After hiding, the icon for the other application that the desktop of electronic equipment is shown can be rearranged, in order to avoid clue is spilt, With the further security for improving application.
Hereafter, when the active user for detecting electronic equipment is pre-set user, hiding application can be shown automatically Icon, to facilitate pre-set user to use.
Step S305, judge whether to meet default cleaning condition, if satisfied, then performing step S306, otherwise, perform step S307。
The default cleaning condition is for example:The application cleaning instruction that user sends, or (this is surplus for the dump energy of electronic equipment Remaining electricity can be the percent value of dump energy or the capacitance of dump energy) it is less than default power threshold, or The quantity of the application of running background is more than predetermined number threshold value, or the free memory of electronic equipment is less than default memory threshold.
Step S306, it is low application according to the level of security of the preset strategy cleaning electronic equipment running background.
Preset strategy is for example:Preferential cleaning enters the longer application of backoff period, or preferential cleaning enters foreground frequency Relatively low application, or the application that preferential cleaning committed memory is larger, are not specifically limited herein.
In the present embodiment, it can be that each application installed on electronic equipment sets level of security, detect the electronic equipment Active user whether be pre-set user, when the active user of the electronic equipment is not pre-set user, clear up the electronics The level of security of equipment running background is high application, while realizing that background application is cleared up automatically, ensure that the peace of application Entirely, the operation fluency of electronic equipment is improved, saves resource.
Referring to Fig. 4, the method for the present embodiment includes:
Step S401, each application to be installed on electronic equipment sets level of security.
Specifically, the level of security each applied can be during the use of electronic equipment, by the legal of electronic equipment User (such as:Owner) voluntarily set according to demand, it can also be set when electronic equipment dispatches from the factory by manufacturer is unified.
Set level of security can include " height " and " low ".Level of security includes but is not limited to for the application of " height ": Need to use account, code entry application (such as:QQ, mailbox great master), or it is related to the application (example of user privacy information Such as:Photograph album, short message), or be related to user's property safety application (such as:Alipay, wechat).
Whether the network for step S402, detecting electronic equipment connection is default network, if default wireless network, then Step S407 is performed, end processing, otherwise, performs step S403.
Default network, such as:Carrier data network, the wireless network of family, the wireless network of relatives and friends, third party Secure network of platform authentication etc..
In the specific implementation, mark and the storage of default network can be obtained in advance, can during electronic equipment use To obtain the mark for the network that electronic equipment currently connects, the mark identified whether with default network of network currently connected is judged Know matching.If matching, it is determined that the network currently connected is default network, otherwise, it determines the network currently connected is not default Network.The mark of network, such as:Title, the Internet protocol address (Internet Protocol Address, IP) of network Address etc..
Step S403, generation cleaning list, and the cleaning list of generation is showed into user.
Specifically, list, institute can be cleared up for the application generation of " height " according to the level of security of electronic equipment running background Mark of the level of security to be cleared up for the application of " height " can be included in the cleaning list of generation.The cleaning list of generation can To show user in a manner of backstage notification message, pop-up etc., to prompt the application that user will be cleared up in list.If with Family is not prevented, then the application in cleaning cleaning list, if user prevents, wouldn't be cleared up, to avoid user data loss.
Step S404, the peace of the electronic equipment running background is cleared up the operation of the cleaning list according to the user Full rank is high application.
Level of security by clearing up running background is the application of " height ", and these can be avoided to apply in unsafe network Caused by being operated under environment the problems such as information leakage, property loss.
Step S405, judge whether to meet default cleaning condition, if satisfied, then performing step S406, otherwise, perform step S407。
The default cleaning condition is for example:The application cleaning instruction that user sends, or (this is surplus for the dump energy of electronic equipment Remaining electricity can be the percent value of dump energy or the capacitance of dump energy) it is less than default power threshold, or The quantity of the application of running background is more than predetermined number threshold value, or the free memory of electronic equipment is less than default memory threshold.
Step S406, it is low application according to the level of security of the preset strategy cleaning electronic equipment running background.
Preset strategy is for example:Preferential cleaning enters the longer application of backoff period, or preferential cleaning enters foreground frequency Relatively low application, or the application that preferential cleaning committed memory is larger, are not specifically limited herein.
In the present embodiment, it can be that each application installed on electronic equipment sets level of security, detect the electronic equipment Whether the network of connection is default network, when the network of electronic equipment connection is not default network, clears up the electronics The level of security of equipment running background is high application, while realizing that background application is cleared up automatically, ensure that the peace of application Entirely, the operation fluency of electronic equipment is improved, saves resource.
Referring to Fig. 5, Fig. 5 is the structural representation for the background application cleaning plant that the embodiment of the present application provides.Wherein should Background application cleaning plant is applied to electronic equipment, the background application cleaning plant include setting unit 501, detection unit 502, And cleaning unit 503, it is as follows:
Setting unit 501, for each application setting level of security to be installed on electronic equipment;
Whether detection unit 502, the usage scenario for detecting the electronic equipment are safe;
Unit 503 is cleared up, for when the usage scenario of the electronic equipment is dangerous, clearing up the electronic equipment backstage The level of security of operation is high application.
In certain embodiments, as shown in fig. 6, the detection unit 505 is true including the first detection unit 5021 and first Order member 5022 is as follows:
First detection unit 5021, whether the active user for detecting the electronic equipment is pre-set user;
First determining unit 5022, for when the active user of the electronic equipment is not the pre-set user, it is determined that The usage scenario of the electronic equipment is dangerous.
In certain embodiments, as shown in fig. 6, described device also includes hidden unit 504, hidden unit 504 is used for, hidden Hide the icon that the level of security that the desktop of the electronic equipment is shown is high application.
In certain embodiments, as shown in fig. 6, the detection unit, which includes the second detection unit 5023 and second, determines list Member 5024 is as follows:
Second detection unit 5023, whether the wireless network for detecting the electronic equipment connection is default wireless network Network;
Second determining unit 5024, the wireless network for being connected in the electronic equipment are not the default wireless networks When, determine that the usage scenario of the electronic equipment is dangerous.
In certain embodiments, as shown in fig. 6, described device also includes generation unit 505, generation unit 505 is used for, raw Into cleaning list, and the cleaning list of generation is showed into user;
The cleaning unit 503 is specifically used for, and the electronics is cleared up to the operation of the cleaning list according to the user The level of security of equipment running background is high application.
In certain embodiments, the cleaning unit 503 is specifically used for, by the safe level of the electronic equipment running background Not Wei high application exited from Entered state, and remove related logon information.
In certain embodiments, as shown in fig. 6, described device also includes judging unit 506, judging unit 506 is used for, sentenced Disconnected whether to meet default cleaning condition, the cleaning unit 503 is additionally operable to, when meeting the default cleaning condition, according to pre- If the level of security that strategy clears up the electronic equipment running background is low application.
From the foregoing, it will be observed that the present embodiment uses in the electronic device, it is each to be installed on electronic equipment by setting unit 501 Using level of security is set, whether the usage scenario that detection unit 502 detects the electronic equipment is safe, when the electronic equipment Usage scenario it is dangerous when, the level of security that the electronic equipment running background is cleared up by cleaning unit 503 is high application, While realizing that background application is cleared up automatically, the safety of application is ensure that, improves the operation fluency of electronic equipment, is saved Resource.
It when it is implemented, above modules can be realized as independent entity, can also be combined, be made Realized for same or several entities, the specific implementation of above modules can be found in embodiment of the method above, herein not Repeat again.
The embodiment of the present application also provides a kind of electronic equipment.Referring to Fig. 7, electronic equipment 600 include processor 601 and Memory 602.Wherein, processor 601 is electrically connected with memory 602.
The processor 600 is the control centre of electronic equipment 600, is set using various interfaces and the whole electronics of connection Standby various pieces, by the computer program of operation or load store in memory 602, and call and be stored in memory Data in 602, the various functions and processing data of electronic equipment 600 are performed, so as to carry out overall prison to electronic equipment 600 Control.
The memory 602 can be used for storage software program and module, and processor 601 is stored in memory by operation 602 computer program and module, so as to perform various function application and data processing.Memory 602 can mainly include Storing program area and storage data field, wherein, storing program area can storage program area, the computer needed at least one function Program (such as sound-playing function, image player function etc.) etc.;Storage data field can store uses institute according to electronic equipment Data of establishment etc..In addition, memory 602 can include high-speed random access memory, non-volatile memories can also be included Device, for example, at least a disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 602 can also include Memory Controller, to provide access of the processor 601 to memory 602.
In the embodiment of the present application, the processor 601 in electronic equipment 600 can be according to the steps, by one or one Instruction is loaded into memory 602 corresponding to the process of computer program more than individual, and is stored in by the operation of processor 601 Computer program in reservoir 602, it is as follows so as to realize various functions:
Each application to be installed on electronic equipment sets level of security;
Whether the usage scenario for detecting the electronic equipment is safe;
When the usage scenario of the electronic equipment is dangerous, the level of security for clearing up the electronic equipment running background is High application.
In some embodiments, when whether the usage scenario for detecting the electronic equipment is safe, processor 601 is specific For performing following steps:
Whether the active user for detecting the electronic equipment is pre-set user;
If the active user of the electronic equipment is not the pre-set user, it is determined that the usage scenario of the electronic equipment It is dangerous.
In some embodiments, after the level of security for clearing up the electronic equipment running background is high application, Processor 601 is additionally operable to perform following steps:
The level of security that the desktop of the hiding electronic equipment is shown is the icon of high application.
In some embodiments, when whether the usage scenario for detecting the electronic equipment is safe, processor 601 is specific For performing following steps:
Whether the wireless network for detecting the electronic equipment connection is default wireless network;
If the wireless network of the electronic equipment connection is not the default wireless network, it is determined that the electronic equipment Usage scenario is dangerous.
In some embodiments, before the level of security for clearing up the electronic equipment running background is high application, Processor 601 is additionally operable to perform following steps:
Generation cleaning list, and the cleaning list of generation is showed into user;
It is to the level of security of the operation cleaning electronic equipment running background of the cleaning list according to the user High application.
In some embodiments, when the level of security of the cleaning electronic equipment running background is high application, place Device 601 is managed to be specifically used for performing following steps:
It is that high application is exited from Entered state by the level of security of the electronic equipment running background, and removes correlation and step on Land information.
In some embodiments, after the level of security for clearing up the electronic equipment running background is high application, Processor 601 is additionally operable to perform following steps:
Judge whether to meet default cleaning condition;
If satisfied, it is then low application according to the level of security of the preset strategy cleaning electronic equipment running background.
From the foregoing, the electronic equipment of the embodiment of the present application, passes through each application setting to be installed on electronic equipment Level of security, detect the electronic equipment usage scenario whether safety, when the usage scenario of the electronic equipment is dangerous, The level of security for clearing up the electronic equipment running background is high application, while realizing that background application is cleared up automatically, is protected The safety of application has been demonstrate,proved, the operation fluency of electronic equipment has been improved, saves resource.
Also referring to Fig. 8, in some embodiments, electronic equipment 600 can also include:Display 603, radio frequency electrical Road 604, voicefrequency circuit 605 and power supply 606.Wherein, wherein, display 603, radio circuit 604, voicefrequency circuit 605 and Power supply 606 is electrically connected with processor 601 respectively.
The display 603 is displayed for the information inputted by user or is supplied to the information of user and various figures Shape user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.Display 603 can include display panel, in some embodiments, can use liquid crystal display (Liquid Crystal Display, LCD) or the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) match somebody with somebody Put display panel.
The radio circuit 604 can be used for transceiving radio frequency signal, to pass through radio communication and the network equipment or other electricity Sub- equipment establishes wireless telecommunications, the receiving and transmitting signal between the network equipment or other electronic equipments.
The voicefrequency circuit 605 can be used for providing the audio between user and electronic equipment by loudspeaker, microphone Interface.
The power supply 606 is used to all parts power supply of electronic equipment 600.In certain embodiments, power supply 606 Can be logically contiguous by power-supply management system and processor 601, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Although not shown in Fig. 8, electronic equipment 600 can also include camera, bluetooth module etc., will not be repeated here.
The embodiment of the present application also provides a kind of storage medium, and the storage medium is stored with computer program, when the meter When calculation machine program is run on computers so that the computer performs the background application cleaning side in any of the above-described embodiment Method, such as:Each application to be installed on electronic equipment sets level of security;Detect the electronic equipment usage scenario whether Safety;When the usage scenario of the electronic equipment is dangerous, the level of security for clearing up the electronic equipment running background is height Application.
In the embodiment of the present application, storage medium can be magnetic disc, CD, read-only storage (Read Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
It should be noted that for the background application method for cleaning of the embodiment of the present application, the common decision-maker in this area It is appreciated that realizing all or part of flow of the background application method for cleaning of the embodiment of the present application, being can be by computer journey Sequence controls the hardware of correlation to complete, and the computer program can be stored in a computer read/write memory medium, such as deposited Storage can wrap in the process of implementation in the memory of electronic equipment, and by least one computing device in the electronic equipment Include the flow of the embodiment such as background application method for cleaning.Wherein, described storage medium can be magnetic disc, CD, read-only storage Device, random access memory etc..
For the background application cleaning plant of the embodiment of the present application, its each functional module can be integrated in a processing core In piece or modules are individually physically present, can also two or more modules be integrated in a module.On Stating integrated module can both be realized in the form of hardware, can also be realized in the form of software function module.The collection If into module realized in the form of software function module and as independent production marketing or in use, can also be stored in In one computer read/write memory medium, the storage medium is for example read-only storage, disk or CD etc..
A kind of background application method for cleaning, device, storage medium and the electronics provided above the embodiment of the present application is set Standby to be described in detail, specific case used herein is set forth to the principle and embodiment of the application, the above The explanation of embodiment is only intended to help and understands the present processes and its core concept;Meanwhile for those skilled in the art Member, according to the thought of the application, there will be changes in specific embodiments and applications, in summary, this explanation Book content should not be construed as the limitation to the application.

Claims (16)

  1. A kind of 1. background application method for cleaning, it is characterised in that including:
    Each application to be installed on electronic equipment sets level of security;
    Whether the usage scenario for detecting the electronic equipment is safe;
    When the usage scenario of the electronic equipment is dangerous, the level of security for clearing up the electronic equipment running background is high Using.
  2. 2. background application method for cleaning according to claim 1, it is characterised in that detects the electronic equipment uses field Whether scape is safe, including:
    Whether the active user for detecting the electronic equipment is pre-set user;
    If the active user of the electronic equipment is not the pre-set user, it is determined that the usage scenario of the electronic equipment is uneasy Entirely.
  3. 3. background application method for cleaning according to claim 2, it is characterised in that transported clearing up the electronic equipment backstage Capable level of security be high application after, in addition to:
    The level of security that the desktop of the hiding electronic equipment is shown is the icon of high application.
  4. 4. background application method for cleaning according to claim 1, it is characterised in that detects the electronic equipment uses field Whether scape is safe, including:
    Whether the network for detecting the electronic equipment connection is default network;
    If the network of the electronic equipment connection is not the default network, it is determined that the usage scenario of the electronic equipment is uneasy Entirely.
  5. 5. background application method for cleaning according to claim 4, it is characterised in that transported clearing up the electronic equipment backstage Before capable level of security is high application, in addition to:
    Generation cleaning list, and the cleaning list of generation is showed into user;
    It is high according to the level of security that the user clears up the electronic equipment running background to the operation of the cleaning list Using.
  6. 6. the background application method for cleaning according to claim 1 to 5 any one, it is characterised in that clear up the electronics The level of security of equipment running background is high application, including:
    It is that high application is exited from Entered state by the level of security of the electronic equipment running background, and removes correlation and log in letter Breath.
  7. 7. the background application method for cleaning according to claim 1 to 5 any one, it is characterised in that clearing up the electricity The level of security of sub- equipment running background is after high application, methods described also includes:
    Judge whether to meet default cleaning condition;
    If satisfied, it is then low application according to the level of security of the preset strategy cleaning electronic equipment running background.
  8. A kind of 8. background application cleaning plant, it is characterised in that including:
    Setting unit, for each application setting level of security to be installed on electronic equipment;
    Whether detection unit, the usage scenario for detecting the electronic equipment are safe;
    Unit is cleared up, for when the usage scenario of the electronic equipment is dangerous, clearing up the electronic equipment running background Level of security is high application.
  9. 9. background application cleaning plant according to claim 8, it is characterised in that the detection unit includes:
    First detection unit, whether the active user for detecting the electronic equipment is pre-set user;
    First determining unit, for when the active user of the electronic equipment is not the pre-set user, determining the electronics The usage scenario of equipment is dangerous.
  10. 10. background application cleaning plant according to claim 9, it is characterised in that described device also includes:
    Hidden unit, the level of security that the desktop for hiding the electronic equipment is shown are the icon of high application.
  11. 11. background application cleaning plant according to claim 8, it is characterised in that the detection unit includes:
    Second detection unit, whether the network for detecting the electronic equipment connection is default network;
    Second determining unit, when the network for being connected in the electronic equipment is not the default network, determine the electronics The usage scenario of equipment is dangerous.
  12. 12. background application cleaning plant according to claim 11, it is characterised in that described device also includes:
    Generation unit, list is cleared up for generating, and the cleaning list of generation is showed into user;
    The cleaning unit is specifically used for, and the electronic equipment backstage is cleared up to the operation of the cleaning list according to the user The level of security of operation is high application.
  13. 13. the background application cleaning plant according to claim 8 to 12 any one, it is characterised in that the cleaning is single Member is specifically used for:
    It is that high application is exited from Entered state by the level of security of the electronic equipment running background, and removes correlation and log in letter Breath.
  14. 14. the background application cleaning plant according to claim 8 to 12 any one, it is characterised in that described device is also Including:
    Judging unit, for judging whether to meet default cleaning condition;
    The cleaning unit is additionally operable to, and when meeting the default cleaning condition, the electronic equipment is cleared up according to preset strategy The level of security of running background is low application.
  15. 15. a kind of storage medium, is stored thereon with computer program, it is characterised in that when the computer program is in computer During upper operation so that the computer performs the background application method for cleaning as described in any one of claim 1 to 7.
  16. 16. a kind of electronic equipment, including processor and memory, the memory have computer program, it is characterised in that described Processor is by calling the computer program, for performing the background application cleaning side as described in any one of claim 1 to 7 Method.
CN201711124515.2A 2017-11-14 2017-11-14 Background application method for cleaning, device, storage medium and electronic equipment Pending CN107807832A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711124515.2A CN107807832A (en) 2017-11-14 2017-11-14 Background application method for cleaning, device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711124515.2A CN107807832A (en) 2017-11-14 2017-11-14 Background application method for cleaning, device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN107807832A true CN107807832A (en) 2018-03-16

Family

ID=61580155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711124515.2A Pending CN107807832A (en) 2017-11-14 2017-11-14 Background application method for cleaning, device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN107807832A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189284A (en) * 2018-08-02 2019-01-11 珠海格力电器股份有限公司 A kind of method and apparatus applied in deletion backstage

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2446168A (en) * 2007-01-30 2008-08-06 Third Sense Ltd Reducing the power consumed from a battery
CN103902266A (en) * 2012-12-26 2014-07-02 中兴通讯股份有限公司 Method and device for cleaning application running in background
CN104142844A (en) * 2014-08-18 2014-11-12 广东欧珀移动通信有限公司 Method and device for clearing processes of mobile terminal
CN105260319A (en) * 2015-09-11 2016-01-20 上海卓易科技股份有限公司 Cleaning method and cleaning system for mobile terminal
CN105512547A (en) * 2016-02-25 2016-04-20 上海斐讯数据通信技术有限公司 Intelligent terminal privacy protection method and intelligent terminal privacy protection system
CN106293912A (en) * 2016-07-29 2017-01-04 宇龙计算机通信科技(深圳)有限公司 A kind of method freezing application program and terminal
CN106325993A (en) * 2016-08-22 2017-01-11 宇龙计算机通信科技(深圳)有限公司 Freezing method of application program and terminal
CN106557679A (en) * 2016-11-25 2017-04-05 北京小米移动软件有限公司 Terminal control method and device
CN106657578A (en) * 2016-09-29 2017-05-10 乐视控股(北京)有限公司 Terminal setting adjustment method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2446168A (en) * 2007-01-30 2008-08-06 Third Sense Ltd Reducing the power consumed from a battery
CN103902266A (en) * 2012-12-26 2014-07-02 中兴通讯股份有限公司 Method and device for cleaning application running in background
CN104142844A (en) * 2014-08-18 2014-11-12 广东欧珀移动通信有限公司 Method and device for clearing processes of mobile terminal
CN105260319A (en) * 2015-09-11 2016-01-20 上海卓易科技股份有限公司 Cleaning method and cleaning system for mobile terminal
CN105512547A (en) * 2016-02-25 2016-04-20 上海斐讯数据通信技术有限公司 Intelligent terminal privacy protection method and intelligent terminal privacy protection system
CN106293912A (en) * 2016-07-29 2017-01-04 宇龙计算机通信科技(深圳)有限公司 A kind of method freezing application program and terminal
CN106325993A (en) * 2016-08-22 2017-01-11 宇龙计算机通信科技(深圳)有限公司 Freezing method of application program and terminal
CN106657578A (en) * 2016-09-29 2017-05-10 乐视控股(北京)有限公司 Terminal setting adjustment method and device
CN106557679A (en) * 2016-11-25 2017-04-05 北京小米移动软件有限公司 Terminal control method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈一斌: "手机越来越需要 "访客模式", 《HTTPS://WWW.IFANR.COM/66938》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189284A (en) * 2018-08-02 2019-01-11 珠海格力电器股份有限公司 A kind of method and apparatus applied in deletion backstage

Similar Documents

Publication Publication Date Title
CN108228305A (en) Display methods, device, storage medium and the electronic equipment of five application page
CN104426885B (en) Abnormal account providing method and device
CN106534277A (en) Data sharing method and device
CN101770669A (en) Bank automatic warning system and method thereof
CN106411920A (en) Data sharing method and device
CN108462760A (en) Electronic device, cluster access domain name automatic generation method and storage medium
CN105224421B (en) Data backup method and device and electronic equipment
CN107483319A (en) Message method, device, storage medium, server and electronic equipment
CN106096450A (en) A kind of application program freezing method and mobile terminal
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN106547615A (en) A kind of management method and management module of background application
CN108549568A (en) Using entrance processing method, apparatus, storage medium and electronic equipment
CN102413221A (en) Method for protecting privacy information and mobile terminal
CN103220641A (en) Information processing method and electronic terminal
CN107613097A (en) Display methods, device, storage medium and the electronic equipment of shortcut icon
CN102646055A (en) Method for data interaction between systems
CN106534093A (en) Terminal data processing method, device and system
CN106506484A (en) A kind of method of data backup, apparatus and system
CN106528335A (en) Data backup method and device and terminal
CN105024913A (en) Method, apparatus and system of instant messaging conversation
CN106022100A (en) Method and device for intercepting installation of malicious program and electronic equipment
CN105991829A (en) Content recommendation method and terminal
CN106325993A (en) Freezing method of application program and terminal
CN106682504B (en) A kind of method, apparatus for preventing file from maliciously being edited and electronic equipment
CN107807832A (en) Background application method for cleaning, device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180316