CN107835317B - Scheduling job control method, device, terminal equipment and storage medium - Google Patents
Scheduling job control method, device, terminal equipment and storage medium Download PDFInfo
- Publication number
- CN107835317B CN107835317B CN201711165691.0A CN201711165691A CN107835317B CN 107835317 B CN107835317 B CN 107835317B CN 201711165691 A CN201711165691 A CN 201711165691A CN 107835317 B CN107835317 B CN 107835317B
- Authority
- CN
- China
- Prior art keywords
- application
- application program
- scheduling
- event
- scheduling event
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3234—Power saving characterised by the action undertaken
- G06F1/329—Power saving characterised by the action undertaken by task scheduling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0261—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
- H04W52/0264—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by selectively disabling software applications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Stored Programmes (AREA)
Abstract
The embodiment of the application discloses a scheduling job control method, a device, terminal equipment and a storage medium, wherein the method comprises the steps of monitoring system scheduling service jobs; when detecting that the system scheduling service operation triggers an application program scheduling event, judging whether an application program corresponding to the application program scheduling event is safe application; and if the application program is a non-secure application, forbidding responding to the application program scheduling event. The scheme effectively avoids self-starting and associated starting of illegal application programs caused by executing scheduling operation, improves the operating efficiency of the system and reduces the power consumption of the terminal equipment.
Description
Technical Field
The present application relates to computer technologies, and in particular, to a method and an apparatus for controlling scheduling jobs, a terminal device, and a storage medium.
Background
With the increase of the popularity of the terminal devices, more and more users use the terminal devices to execute various functions to meet their own needs, such as reading text, watching video, listening to music, playing games, etc., and with the continuous powerful functions of the terminal devices, various system applications and third-party application programs installed therein are also increasing.
In the prior art, the application program installed on the terminal device is in a background self-starting state or is initiated to be associated with the starting state by other applications, and a reasonable and effective management and control mechanism is lacked, so that the system operation efficiency is reduced, and the electric quantity consumption of the terminal is increased.
Disclosure of Invention
The invention provides a scheduling job control method, a scheduling job control device, terminal equipment and a storage medium, which effectively avoid self-starting and associated starting of illegal application programs caused by executing scheduling jobs, improve the operating efficiency of a system and reduce the power consumption of the terminal equipment.
In a first aspect, an embodiment of the present application provides a method for controlling a scheduling job, including:
monitoring system scheduling service operation;
when detecting that the system scheduling service operation triggers an application program scheduling event, judging whether an application program corresponding to the application program scheduling event is safe application;
and if the application program is a non-secure application, forbidding responding to the application program scheduling event.
In a second aspect, an embodiment of the present application further provides a scheduling job control apparatus, including:
the scheduling monitoring module is used for monitoring system scheduling service jobs;
the scheduling processing module is used for judging whether an application program corresponding to the application program scheduling event is safe application or not when detecting that the system scheduling service operation triggers the application program scheduling event;
and the scheduling response module is used for forbidding to respond to the application program scheduling event if the application program is the non-secure application.
In a third aspect, an embodiment of the present application further provides a terminal device, including: the scheduling job control method comprises a processor, a memory and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the scheduling job control method according to the embodiment of the application.
In a fourth aspect, an embodiment of the present application further provides a storage medium containing terminal device executable instructions, where the terminal device executable instructions are used to execute the method for controlling a scheduling job according to the embodiment of the present application when executed by a terminal device processor.
In the scheme, the system scheduling service operation is monitored, when the system scheduling service operation triggers an application program scheduling event, whether an application program corresponding to the application program scheduling event is safe application or not is judged, if the application program is non-safe application, response to the application program scheduling event is forbidden, self-starting and associated starting caused by an illegal application program in a scheduling operation executing mode are effectively avoided, the operating efficiency of the system is improved, and the power consumption of terminal equipment is reduced.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1 is a flowchart of a scheduling job control method according to an embodiment of the present application;
FIG. 2 is a flowchart of another method for controlling scheduling jobs according to an embodiment of the present invention;
FIG. 3 is a flowchart of another method for controlling scheduling jobs according to an embodiment of the present application;
FIG. 4 is a flowchart of another method for controlling scheduling jobs according to an embodiment of the present application;
fig. 5 is a block diagram illustrating a configuration of a scheduled job control apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are for purposes of illustration and not limitation. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Fig. 1 is a flowchart of a method for controlling a scheduling job according to an embodiment of the present application, where this embodiment is applicable to a case where a terminal device system schedules a service job for controlling, and the method can be executed by a terminal device according to an embodiment of the present application, and a scheduling job control device of the terminal device can be implemented in a software and/or hardware manner, as shown in fig. 1, a specific scheme provided in this embodiment is as follows:
and step S101, monitoring the system scheduling service operation.
At present, an intelligent system is an intelligent terminal operating system platform with the largest user group, an intelligent terminal device is the most important electronic device which is used by many users most frequently, the users often install various third-party applications, the third-party applications often start automatically in the background and consume the traffic of the users and the electric quantity of the terminal device, the illegal applications can be realized by registering a scheduling job management service of an android system, the applications of the scheduling job service of the android system, which are registered by the third-party applications, can be started in the background, and the system can also actively start the services of the applications, so that the illegal applications can be utilized by some rogue applications without the knowledge of the users, and the operation experience and the safety of the users are not facilitated.
The system scheduling service job means that a three-party application realizes a service JobService, and an object is registered in the system JobSchedulService scheduling job service management. The system has the main functions of scheduling service jobs, including: the three-party application can realize the function of executing the job scheduling work at a certain time point by registering the JobInfo of the scheduling job; the three-party application needs to realize a JobService scheduling job service to receive callback start of a system JobSchedulService scheduling job service management class, the JobService service can be registered in the JobSchedulService scheduling job service management class of the system, the system scheduling job service management service can regularly call back the JobService service, if the process of the three-party application is not started at the moment, the three-party application can be started by the system JobSchedulService scheduling job service management service, and the three-party application keeps the process resident and performs background self-start by the principle. In this step, taking the android system as an example, a listener is first set up to monitor the scheduling of the system scheduling service job.
Step S102, when detecting that the system scheduling service operation triggers the application program scheduling event, judging whether the application program corresponding to the application program scheduling event is safe application.
For example, the system scheduling service job may be triggered by some action specified by the system, such as when the terminal device is powered on, or when the terminal device is connected to a Wi-Fi network. Taking an android operating system as an example, the application scheduling event may be a callback event of a scheduling job service (Jobservice), and before the callback event occurs, whether an application corresponding to the application scheduling event is started is determined.
In an embodiment, when it is detected that a system scheduling service job triggers an application scheduling event, it is determined whether an application corresponding to the application scheduling event is a secure application, specifically, the recorded number of popup windows initiated by the application, the number of background downloads, and the number of application installations may be obtained, and it is determined whether the application is a secure application according to at least one of the number of popup windows, the number of background downloads, and the number of application installations. For example, if the number of popups is greater than 4 times/day (or the number of background downloads exceeds 3 times/week, or the number of application installations exceeds 3 times/week), the application may be determined to be an insecure application.
And step S103, if the application program is non-secure application, prohibiting responding to the application program scheduling event.
In one embodiment, if the application is a non-secure application, then a response to the application scheduling event is prohibited. Optionally, in order to prevent the service job from being disabled by mistake, the method includes: and if the application program is non-secure application, judging whether the identifier of the application program is recorded in a stored white list, and if not, forbidding responding to the application program scheduling event. Optionally, in order to further improve the accuracy of disabling the system scheduling service job, the method includes: the prohibiting response to the application scheduling event if the application is a non-secure application comprises: and if the application program is non-secure application, judging whether the identifier of the application program is recorded in a stored push list, if so, forbidding responding to the scheduling event of the application program, wherein the push list is obtained by a server operating a machine learning model algorithm according to the usage record uploaded by one or more terminal devices. Optionally, under special conditions, in order to improve the user experience, the method includes: the prohibiting response to the application scheduling event if the application is a non-secure application comprises: if the application program is non-safe application, current operation parameters of the terminal equipment are obtained; and if the operation parameters meet preset control conditions, prohibiting responding to the application program scheduling event. For example, when the CPU occupancy memory occupancy of the current terminal device is greater than 80%, the disabling mechanism may be activated.
According to the above, the system scheduling service operation is monitored, when the system scheduling service operation triggers the application program scheduling event, whether the application program corresponding to the application program scheduling event is safe application or not is judged, and if the application program is non-safe application, the response to the application program scheduling event is forbidden, so that the self-starting and the associated starting of the application program caused by the execution of the scheduling operation are effectively avoided, the operation efficiency of the system is improved, and the power consumption of the terminal equipment is reduced.
Fig. 2 is a flowchart of another method for controlling scheduling jobs according to an embodiment of the present application, where optionally, if the application program is an insecure application, prohibiting responding to the application program scheduling event includes: and if the application program is non-secure application, judging whether the identifier of the application program is recorded in a stored white list, and if not, forbidding responding to the application program scheduling event. As shown in fig. 2, the technical solution is as follows:
step S201, monitoring the system scheduling service operation.
Step S202, when detecting that the system scheduling service operation triggers the application program scheduling event, judging whether the application program corresponding to the application program scheduling event is safe application, if not, executing step S203.
Step S203, determining whether the identifier of the application program is recorded in a stored white list, if not, executing step S204, and if so, executing step S205.
In one embodiment, the white list is determined from usage records of the terminal device itself or from received usage records of other terminal devices. Specifically, the usage record represents usage habits or usage contents of a user, for example, an application program manually installed and manually opened by the user is recorded, and when the number of times of manual opening reaches 3 times/day, the identifier of the application is correspondingly added to a white list, where the identifier of the application may be a package name of the application program; or white list addition for applications that detect a user manually opening at some fixed time range (e.g., 8 pm to 10 pm).
And step S204, forbidding to respond to the application program scheduling event.
And step S205, allowing the application program to respond to the scheduling event.
Therefore, when the application program is determined to meet the non-safety application condition, whether the application program scheduling event is responded is finally determined by further combining the white list, the control mechanism of system scheduling operation is improved, and the phenomenon of error prohibition is avoided.
Fig. 3 is a flowchart of another method for controlling scheduling jobs according to an embodiment of the present application, where optionally, if the application program is an insecure application, prohibiting responding to the application program scheduling event includes: and if the application program is non-secure application, judging whether the identifier of the application program is recorded in a stored push list, if so, forbidding responding to the scheduling event of the application program, wherein the push list is obtained by a server operating a machine learning model algorithm according to the usage record uploaded by one or more terminal devices. As shown in fig. 3, the technical solution is as follows:
and S301, monitoring the system scheduling service job.
Step S302, when detecting that the system scheduling service operation triggers the application program scheduling event, judging whether the application program corresponding to the application program scheduling event is safe application, if not, executing step S303.
Step S303, determining whether the identifier of the application program is recorded in the stored push list, if so, executing step S304, and if not, executing step S305.
In one embodiment, the push list records an identification of an application that is prohibited from responding to an application scheduling event, and in one embodiment, the determining of the push list comprises: monitoring an application program which responds to the awakening of the application program scheduling event; and recording the number of times of the scheduling service operation of the application program callback system awakened in response to the application program scheduling event, and if the number of times is greater than the preset number of times (10 times) within a preset time (such as 60 minutes), adding the identifier of the application program into a push list. That is, the application is monitored after it wakes up in response to the application scheduling event, illustratively, the application that frequently calls back the system scheduling service job is added to the push list.
In another embodiment, the push list is obtained by the server running a machine learning model algorithm according to the usage records uploaded by one or more terminal devices. The machine learning model can be obtained by training and learning a large number of samples through a server, and can be obtained by supervised learning, unsupervised learning, semi-supervised learning or reinforcement learning, and an algorithm used in the learning process comprises the following steps: regression algorithms, example-based algorithms, regularization algorithms, decision tree algorithms, bayesian algorithms, kernel-based algorithms, clustering algorithms, association rule algorithms, artificial neural network algorithms, deep learning algorithms, and dimensionality reduction algorithms, among others.
And S304, forbidding responding to the application program scheduling event.
Step S305, allowing the application program to respond to the scheduling event.
Therefore, when it is determined that the application initially meets the disabling condition, in order to further determine whether the application should be prohibited from responding to the application scheduling event and prevent error disabling, a push list pushed by a server may be further combined, the push list is generated according to usage records uploaded by different terminal devices, when the current terminal device does not have a large number of usage records for determination, the current terminal device may refer to the usage records, and meanwhile, since the data analysis source is big data analysis, the accuracy of the finally obtained application which is prohibited from responding to the application scheduling event is improved.
Fig. 4 is a flowchart of another method for controlling scheduling jobs according to an embodiment of the present application, where optionally, if the application program is an insecure application, prohibiting responding to the application program scheduling event includes: if the application program is non-safe application, current operation parameters of the terminal equipment are obtained; and if the operation parameters meet preset control conditions, prohibiting responding to the application program scheduling event. As shown in fig. 4, the technical solution is as follows:
and step S401, monitoring the system scheduling service job.
Step S402, when detecting that the system scheduling service operation triggers the application program scheduling event, judging whether the application program corresponding to the application program scheduling event is safe application, if not, executing step S403.
Step S403, obtaining current operation parameters of the terminal device, and determining whether the operation parameters satisfy preset control conditions, if yes, performing step S404, and if no, performing step S405.
Illustratively, the operation parameter of the terminal device includes a current remaining power of the terminal device, and the preset control condition may be: whether the remaining capacity is less than 30%. And correspondingly forbidding to respond to the application program scheduling event when the acquired current residual capacity of the terminal equipment is less than 30%, and allowing to respond to the application program scheduling event when the residual capacity of the terminal equipment is more than or equal to 30%.
And S404, forbidding responding to the application program scheduling event.
And step S405, allowing the application program to respond to the scheduling event.
Therefore, by combining the operating parameters of the terminal device, the prohibition on the application program scheduling event can be released correspondingly under the condition that the operating condition of the terminal device is good.
Fig. 5 is a block diagram of a scheduled job control apparatus according to an embodiment of the present application, which is configured to execute the scheduled job control method according to the foregoing embodiment, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 5, the apparatus specifically includes: a scheduling listening module 101, a scheduling processing module 102 and a scheduling response module 103, wherein,
and the scheduling monitoring module 101 is configured to monitor a system scheduling service job.
The system scheduling service job means that a three-party application realizes a service JobService, and an object is registered in the system JobSchedulService scheduling job service management. The system has the main functions of scheduling service jobs, including: the three-party application can realize the function of executing the job scheduling work at a certain time point by registering the JobInfo of the scheduling job; the three-party application needs to realize a JobService scheduling job service to receive callback start of a system JobSchedulService scheduling job service management class, the JobService service can be registered in the JobSchedulService scheduling job service management class of the system, the system scheduling job service management service can regularly call back the JobService service, if the process of the three-party application is not started at the moment, the three-party application can be started by the system JobSchedulService scheduling job service management service, and the three-party application keeps the process resident and performs background self-start by the principle. In this step, taking the android system as an example, a listener is first set up to monitor the scheduling of the system scheduling service job.
The scheduling processing module 102 is configured to determine whether an application program corresponding to the application program scheduling event is a security application when it is detected that the system scheduling service job triggers the application program scheduling event.
For example, the system scheduling service job may be triggered by some action specified by the system, such as when the terminal device is powered on, or when the terminal device is connected to a Wi-Fi network. Taking an android operating system as an example, the application scheduling event may be a callback event of a scheduling job service (Jobservice), and before the callback event occurs, whether an application corresponding to the application scheduling event is started is determined.
In an embodiment, when it is detected that a system scheduling service job triggers an application scheduling event, it is determined whether an application corresponding to the application scheduling event is a secure application, specifically, the recorded number of popup windows initiated by the application, the number of background downloads, and the number of application installations may be obtained, and it is determined whether the application is a secure application according to at least one of the number of popup windows, the number of background downloads, and the number of application installations. For example, if the number of popups is greater than 4 times/day (or the number of background downloads exceeds 3 times/week, or the number of application installations exceeds 3 times/week), the application may be determined to be an insecure application.
A scheduling response module 103, configured to prohibit a response to the application scheduling event if the application is an insecure application.
In one embodiment, if the application is a non-secure application, then a response to the application scheduling event is prohibited. Optionally, in order to prevent the service job from being disabled by mistake, the method includes: and if the application program is non-secure application, judging whether the identifier of the application program is recorded in a stored white list, and if not, forbidding responding to the application program scheduling event. Optionally, in order to further improve the accuracy of disabling the system scheduling service job, the method includes: the prohibiting response to the application scheduling event if the application is a non-secure application comprises: and if the application program is non-secure application, judging whether the identifier of the application program is recorded in a stored push list, if so, forbidding responding to the scheduling event of the application program, wherein the push list is obtained by a server operating a machine learning model algorithm according to the usage record uploaded by one or more terminal devices. Optionally, under special conditions, in order to improve the user experience, the method includes: the prohibiting response to the application scheduling event if the application is a non-secure application comprises: if the application program is non-safe application, current operation parameters of the terminal equipment are obtained; and if the operation parameters meet preset control conditions, prohibiting responding to the application program scheduling event. For example, when the CPU occupancy memory occupancy of the current terminal device is greater than 80%, the disabling mechanism may be activated.
According to the above, the system scheduling service operation is monitored, when the system scheduling service operation triggers the application program scheduling event, whether the application program corresponding to the application program scheduling event is safe application or not is judged, and if the application program is non-safe application, the response to the application program scheduling event is forbidden, so that the self-starting and the associated starting of the application program caused by the execution of the scheduling operation are effectively avoided, the operation efficiency of the system is improved, and the power consumption of the terminal equipment is reduced.
In a possible embodiment, the scheduling processing module 102 is specifically configured to:
acquiring the recorded popup window times, background downloading times and application installation times initiated by the application program;
and determining whether the application program is a safe application or not according to at least one of the popup frequency, the background downloading frequency and the application installation frequency.
In a possible embodiment, the scheduling response module 103 is specifically configured to:
and if the application program is non-secure application, judging whether the identifier of the application program is recorded in a stored white list, and if not, forbidding responding to the application program scheduling event.
In one possible embodiment, the statistics module 104 is further included for:
and before monitoring the system scheduling service operation, counting the use records of the terminal equipment, and determining and storing a white list according to the counting result.
In a possible embodiment, the scheduling response module 103 is specifically configured to:
and if the application program is non-secure application, judging whether the identifier of the application program is recorded in a stored push list, if so, forbidding responding to the scheduling event of the application program, wherein the push list is obtained by a server operating a machine learning model algorithm according to the usage record uploaded by one or more terminal devices.
In a possible embodiment, the scheduling response module 103 is specifically configured to:
if the application program is non-safe application, current operation parameters of the terminal equipment are obtained;
and if the operation parameters meet preset control conditions, prohibiting responding to the application program scheduling event.
In this embodiment, a terminal device is provided on the basis of the foregoing embodiments, and fig. 6 is a schematic structural diagram of a terminal device provided in an embodiment of the present application, and as shown in fig. 6, the terminal device 200 includes: memory 201, processor (CPU) 202, peripheral interfaces 203, RF (Radio Frequency) circuitry 205, audio circuitry 206, speaker 211, power management chip 208, input/output (I/O) subsystem 209, touch screen 212, other input/control devices 210, and external port 204, which communicate via one or more communication buses or signal lines 207.
It should be understood that the illustrated terminal device 200 is only one example of a terminal device, and that the terminal device 200 may have more or fewer components than shown in the figures, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The following describes in detail a terminal device for rights management of multi-open applications provided in this embodiment, where the terminal device is a smart phone as an example.
A memory 201, the memory 201 being accessible by the CPU202, the peripheral interface 203, and the like, the memory 201 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other volatile solid state storage devices.
A peripheral interface 203, said peripheral interface 203 may connect input and output peripherals of the device to the CPU202 and the memory 201.
An I/O subsystem 209, the I/O subsystem 209 may connect input and output peripherals on the device, such as a touch screen 212 and other input/control devices 210, to the peripheral interface 203. The I/O subsystem 209 may include a display controller 2091 and one or more input controllers 2092 for controlling the other input/control devices 210. Where one or more input controllers 2092 receive electrical signals from or transmit electrical signals to other input/control devices 210, the other input/control devices 210 may include physical buttons (push buttons, rocker buttons, etc.), dials, slide switches, joysticks, click wheels. It is noted that the input controller 2092 may be coupled to any one of: a keyboard, an infrared port, a USB interface, and a pointing device such as a mouse.
A touch screen 212, the touch screen 212 being an input interface and an output interface between the user terminal and the user, displaying visual output to the user, which may include graphics, text, icons, video, and the like.
The display controller 2091 within the I/O subsystem 209 receives electrical signals from the touch screen 212 or transmits electrical signals to the touch screen 212. The touch screen 212 detects a contact on the touch screen, and the display controller 2091 converts the detected contact into an interaction with a user interface object displayed on the touch screen 212, i.e., implements a human-machine interaction, and the user interface object displayed on the touch screen 212 may be an icon for running a game, an icon networked to a corresponding network, or the like. It is worth mentioning that the device may also comprise a light mouse, which is a touch sensitive surface that does not show visual output, or an extension of the touch sensitive surface formed by the touch screen.
The RF circuit 205 is mainly used to establish communication between the mobile phone and the wireless network (i.e., network side), and implement data reception and transmission between the mobile phone and the wireless network. Such as sending and receiving short messages, e-mails, etc. In particular, the RF circuitry 205 receives and transmits RF signals, also referred to as electromagnetic signals, through which the RF circuitry 205 converts electrical signals to or from electromagnetic signals and communicates with communication networks and other devices. RF circuitry 205 may include known circuitry for performing these functions including, but not limited to, an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC (CODEC) chipset, a Subscriber Identity Module (SIM), and so forth.
The audio circuit 206 is mainly used to receive audio data from the peripheral interface 203, convert the audio data into an electric signal, and transmit the electric signal to the speaker 211.
And a speaker 211 for reproducing the voice signal received by the handset from the wireless network through the RF circuit 205 into sound and playing the sound to the user.
And the power management chip 208 is used for supplying power and managing power to the hardware connected with the CPU202, the I/O subsystem and the peripheral interface.
The device for controlling the scheduling job of the terminal device and the terminal device provided in the above embodiments may execute the method for controlling the scheduling job of the terminal device provided in any embodiment of the present invention, and have corresponding functional modules and beneficial effects for executing the method. For details of the scheduling job control method of the terminal device, reference may be made to the following description.
An embodiment of the present application further provides a storage medium containing terminal device executable instructions, where the terminal device executable instructions are executed by a terminal device processor to perform a method for controlling a scheduling job, and the method includes:
monitoring system scheduling service operation;
when detecting that the system scheduling service operation triggers an application program scheduling event, judging whether an application program corresponding to the application program scheduling event is safe application;
and if the application program is a non-secure application, forbidding responding to the application program scheduling event.
In a possible embodiment, the determining whether the application corresponding to the application scheduling event is a secure application includes:
acquiring the recorded popup window times, background downloading times and application installation times initiated by the application program;
and determining whether the application program is a safe application or not according to at least one of the popup frequency, the background downloading frequency and the application installation frequency.
In one possible embodiment, said prohibiting the response to the application scheduling event if the application is a non-secure application comprises:
and if the application program is non-secure application, judging whether the identifier of the application program is recorded in a stored white list, and if not, forbidding responding to the application program scheduling event.
In one possible embodiment, before the listening to the system scheduling service job, the method further includes:
and counting the use records of the terminal equipment, and determining and storing the white list according to the counting result.
In one possible embodiment, said prohibiting the response to the application scheduling event if the application is a non-secure application comprises:
and if the application program is non-secure application, judging whether the identifier of the application program is recorded in a stored push list, if so, forbidding responding to the scheduling event of the application program, wherein the push list is obtained by a server operating a machine learning model algorithm according to the usage record uploaded by one or more terminal devices.
In one possible embodiment, said prohibiting the response to the application scheduling event if the application is a non-secure application comprises:
if the application program is non-safe application, current operation parameters of the terminal equipment are obtained;
and if the operation parameters meet preset control conditions, prohibiting responding to the application program scheduling event.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations, such as in different computer systems that are connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided in the embodiments of the present application contains computer-executable instructions, and the computer-executable instructions are not limited to the operations of the scheduling job control method described above, and may also perform related operations in the scheduling job control method provided in any embodiment of the present invention.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.
Claims (5)
1. A scheduling job control method is characterized by comprising:
monitoring system scheduling service operation;
when detecting that the system scheduling service operation triggers an application program scheduling event, judging whether an application program corresponding to the application program scheduling event is safe application;
if the application program is a non-secure application, prohibiting responding to the application program scheduling event;
the determining whether the application program corresponding to the application program scheduling event is a secure application includes:
acquiring the recorded popup window times, background downloading times and application installation times initiated by the application program;
determining whether the application program is a safe application according to at least one of the popup frequency, the background downloading frequency and the application installation frequency;
if the application program is a non-secure application, forbidding to respond to the application program scheduling event, including:
and if the application program is non-secure application, judging whether the identification of the application program is recorded in a stored push list, if so, forbidding responding to the application program scheduling event, wherein the push list is obtained by a server operating a machine learning model algorithm according to a use record uploaded by one or more terminal devices, the machine learning model is obtained by the server through training and learning of a large number of samples, and the push list is pushed to the terminal devices by the server.
2. The method of claim 1, wherein inhibiting the response to the application scheduling event if the application is a non-secure application comprises:
if the application program is non-safe application, current operation parameters of the terminal equipment are obtained;
and if the operation parameters meet preset control conditions, prohibiting responding to the application program scheduling event.
3. A scheduling job control device is characterized by comprising:
the scheduling monitoring module is used for monitoring system scheduling service jobs;
the scheduling processing module is used for judging whether an application program corresponding to the application program scheduling event is safe application or not when detecting that the system scheduling service operation triggers the application program scheduling event;
the scheduling response module is used for forbidding to respond to the application program scheduling event if the application program is a non-secure application;
the scheduling processing module is specifically configured to:
acquiring the recorded popup window times, background downloading times and application installation times initiated by the application program;
determining whether the application program is a safe application according to at least one of the popup frequency, the background downloading frequency and the application installation frequency;
the scheduling response module is specifically configured to:
and if the application program is non-secure application, judging whether the identification of the application program is recorded in a stored push list, if so, forbidding responding to the application program scheduling event, wherein the push list is obtained by a server operating a machine learning model algorithm according to a use record uploaded by one or more terminal devices, the machine learning model is obtained by the server through training and learning of a large number of samples, and the push list is pushed to the terminal devices by the server.
4. A terminal device, comprising: processor, memory and computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of scheduled job control according to any of claims 1-2 when executing the computer program.
5. A storage medium containing terminal device-executable instructions, which when executed by a terminal device processor, are for performing the method of scheduling job control of any of claims 1-2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711165691.0A CN107835317B (en) | 2017-11-21 | 2017-11-21 | Scheduling job control method, device, terminal equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711165691.0A CN107835317B (en) | 2017-11-21 | 2017-11-21 | Scheduling job control method, device, terminal equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107835317A CN107835317A (en) | 2018-03-23 |
CN107835317B true CN107835317B (en) | 2021-05-04 |
Family
ID=61652128
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711165691.0A Active CN107835317B (en) | 2017-11-21 | 2017-11-21 | Scheduling job control method, device, terminal equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107835317B (en) |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103607381B (en) * | 2010-08-18 | 2017-02-15 | 北京奇虎科技有限公司 | White list generation method, malicious program detection method, client and server |
CN104376264B (en) * | 2014-07-11 | 2017-04-12 | 腾讯科技(深圳)有限公司 | Software vulnerability handling method, device and system |
CN105590057B (en) * | 2014-10-22 | 2020-05-19 | 腾讯科技(深圳)有限公司 | Webpage security index evaluation method and device |
CN106227585B (en) * | 2016-05-31 | 2020-02-14 | 北京金山安全软件有限公司 | Application program starting method, device and equipment |
CN105955792B (en) * | 2016-06-29 | 2019-07-05 | 北京金山安全软件有限公司 | Start control method, device and equipment |
CN106874089B (en) * | 2017-01-25 | 2019-11-05 | 北京安云世纪科技有限公司 | A kind of processing method, device and the mobile terminal of application program self-starting |
CN107247507A (en) * | 2017-04-26 | 2017-10-13 | 努比亚技术有限公司 | Prevent from applying booting-self controller method and terminal, computer-readable recording medium |
-
2017
- 2017-11-21 CN CN201711165691.0A patent/CN107835317B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN107835317A (en) | 2018-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107943269B (en) | Scheduling job control method, device, terminal equipment and storage medium | |
CN107748685B (en) | Application program starting control method and device, terminal equipment and storage medium | |
CN109213539B (en) | Memory recovery method and device | |
CN107797841B (en) | Window control method and device, terminal equipment and storage medium | |
CN107943650B (en) | Application program control method and device, storage medium and terminal | |
CN107844342B (en) | Control method and device for keeping application program alive, storage medium and mobile terminal | |
CN107734616B (en) | Application program closing method and device, storage medium and electronic equipment | |
CN107783803B (en) | System optimization method and device of intelligent terminal, storage medium and intelligent terminal | |
CN108804153B (en) | Application program preloading method and device, storage medium and terminal | |
EP3486770B1 (en) | Processing method, device and storage medium for implementing automatic startup | |
CN107944259A (en) | Using the management-control method of startup, device and storage medium and mobile terminal | |
CN108038231B (en) | Log processing method and device, terminal equipment and storage medium | |
CN107844341B (en) | Process starting control method and device, storage medium and mobile terminal | |
EP3486823B1 (en) | System notification service control method, apparatus, terminal device, and storage medium | |
CN107831886B (en) | Control method and device for associated starting application, storage medium and intelligent terminal | |
CN109408465B (en) | File attribution information recording method, device, storage medium and terminal | |
CN107943270B (en) | Application service control method and device, storage medium and mobile terminal | |
CN106937258B (en) | A kind of control method of broadcast, device and mobile terminal | |
CN107423064A (en) | Message treatment method, device, terminal device and storage medium | |
CN107885588B (en) | Application service control method and device, storage medium and mobile terminal | |
CN107957905A (en) | Method, apparatus, storage medium and the intelligent terminal of self-starting are applied in limitation | |
CN107070670A (en) | Broadcast transmission person is controlled to send method, device and the terminal device of broadcast message | |
US20220300328A1 (en) | Application optimization method and device, storage medium, and electronic equipment | |
CN107943268B (en) | Scheduling job control method, device, terminal equipment and storage medium | |
CN106951333A (en) | A kind of broadcast controlling method, device and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |