CN109388947B - Background management method, device and computer readable storage medium - Google Patents

Background management method, device and computer readable storage medium Download PDF

Info

Publication number
CN109388947B
CN109388947B CN201811280714.7A CN201811280714A CN109388947B CN 109388947 B CN109388947 B CN 109388947B CN 201811280714 A CN201811280714 A CN 201811280714A CN 109388947 B CN109388947 B CN 109388947B
Authority
CN
China
Prior art keywords
time
determining
application program
control
parameters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811280714.7A
Other languages
Chinese (zh)
Other versions
CN109388947A (en
Inventor
彭生全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Jiefen Chain Digital Technology Co ltd
Original Assignee
Zhejiang Jiefen Chain Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Jiefen Chain Digital Technology Co ltd filed Critical Zhejiang Jiefen Chain Digital Technology Co ltd
Priority to CN201811280714.7A priority Critical patent/CN109388947B/en
Publication of CN109388947A publication Critical patent/CN109388947A/en
Application granted granted Critical
Publication of CN109388947B publication Critical patent/CN109388947B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a background management method, equipment and a computer readable storage medium, wherein the method comprises the following steps: acquiring and counting the operation parameters of the application program in a first time period; then, determining the control level of the application program according to the operation parameters; then, determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold; and finally, in a second time period, determining the control level and the control parameters of the application program, and if the running time of the application program exceeds the background time threshold, executing background checking and killing operation on the application program. The humanized background management scheme is realized, so that the terminal equipment has more available processing resources in the use peak time period, the utilization rate of the processing resources of the terminal equipment is improved, the resource consumption is saved, and the user experience is improved.

Description

Background management method, device and computer readable storage medium
Technical Field
The present invention relates to the field of mobile communications, and in particular, to a background management method, device, and computer readable storage medium.
Background
In the prior art, with the rapid development of intelligent terminal equipment, the operation processing requirement of users on the intelligent terminal equipment is higher and higher, and particularly, the application programs of the intelligent terminal equipment are also more and more. However, because the processing capability and the endurance capability of the intelligent terminal device are limited, in order to balance the use requirement of a user, the consumption of processing resources and the endurance of a battery, the processing system of the intelligent terminal device can search and kill the application program in the background at intervals, and the general search and kill strategy in the present stage is that the application program is searched and killed earlier when the starting time of the application program is longer than the current time.
It follows that the prior art has problems: the general searching and killing strategy has single searching and killing mode and cannot be adaptively adjusted according to the service condition of intelligent terminal equipment; when an application program which is in the background before being opened and is already checked out needs to be opened again, the starting time is obviously increased, and the user experience is poor.
Disclosure of Invention
In order to solve the technical defects in the prior art, the invention provides a background management method, which comprises the following steps:
acquiring and counting the operation parameters of the application program in a first time period, wherein the operation parameters comprise operation time and starting times;
Determining a control level of the application program according to the operation parameters, wherein the control level is lower if the operation time is longer and/or the starting frequency is higher, otherwise, the control level is higher if the operation time is shorter and/or the starting frequency is lower;
determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold;
and in a second time period, determining the control level and the control parameters of the application program, and if the running time of the application program exceeds the background time threshold, executing background checking and killing operation on the application program.
Optionally, the acquiring and counting the operation parameters of the application program in the first period of time, where the operation parameters include operation time and start times, and include:
acquiring and counting the operation parameters of a plurality of application programs in a first period;
and determining the first time period in the first period according to the data distribution characteristic of the operation parameter, wherein the first period comprises a time of day and a time of week.
Optionally, the acquiring and counting the operation parameters of the application program in the first period of time, where the operation parameters include operation time and start times, and further includes:
Determining an application program to be managed in the plurality of application programs according to the data distribution characteristics;
and acquiring and counting the operation parameters of the application program to be managed in the first time period, wherein the operation parameters comprise operation time and starting times.
Optionally, the determining the control level of the application program according to the operation parameter includes:
determining an initial level of the application;
and adjusting the initial level according to the running time of the application program and the starting times to obtain the control level.
Optionally, the determining the control level of the application program according to the operation parameter further includes:
determining an associated program of the application program;
and determining the control level of the associated program according to the control level of the application program.
Optionally, determining a control parameter corresponding to the control level in the first period of time, where the control parameter includes a background time threshold, and includes:
acquiring and counting operation parameters of a plurality of application programs in the first period, wherein the operation parameters further comprise starting time;
and determining a control parameter corresponding to the control level in the first period according to the data distribution characteristic of the starting time, wherein the control parameter comprises a background time threshold.
Optionally, determining a control parameter corresponding to the control level in the first period of time, where the control parameter includes a background time threshold, and further includes:
determining a control level of an associated program of the application program;
and determining the control parameters of the associated program according to the control parameters of the application program, wherein the control parameters further comprise the association relation.
Optionally, the determining the control level and the control parameter of the application program in the second period of time, and if the running time of the application program exceeds the background time threshold, executing a background searching and killing operation on the application program includes:
acquiring and counting the operation parameters of a plurality of application programs in a second period;
determining a second time period with the same data distribution characteristic in the first time period in the second period according to the data distribution characteristic of the operation parameter, wherein the second period comprises a time of day and a time of week;
and in the second time period, determining the control level and the control parameters of the application program and the related program, and executing background checking and killing operation on the application program and the related program if the running time of the application program and the related program exceeds the background time threshold.
The invention also proposes a background management device comprising a memory, a processor and a computer program stored on said memory and executable on said processor, said computer program realizing when executed by said processor:
acquiring and counting the operation parameters of the application program in a first time period, wherein the operation parameters comprise operation time and starting times;
determining a control level of the application program according to the operation parameters, wherein the control level is lower if the operation time is longer and/or the starting frequency is higher, otherwise, the control level is higher if the operation time is shorter and/or the starting frequency is lower;
determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold;
and in a second time period, determining the control level and the control parameters of the application program, and if the running time of the application program exceeds the background time threshold, executing background checking and killing operation on the application program.
The present invention also proposes a computer-readable storage medium having stored thereon a background management program which, when executed by a processor, implements the steps of the background management method as described in any of the above.
The background management method, the device and the computer readable storage medium are implemented by acquiring and counting the operation parameters of the application program in a first time period, wherein the operation parameters comprise operation time and starting times; then determining a control level of the application program according to the operation parameters, wherein the control level is lower if the operation time is longer and/or the starting times are higher, otherwise, the control level is higher if the operation time is shorter and/or the starting times are lower; then, determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold; and finally, in a second time period, determining the control level and the control parameters of the application program, and if the running time of the application program exceeds the background time threshold, executing background checking and killing operation on the application program. The humanized background management scheme is realized, so that the terminal equipment has more available processing resources in the use peak time period, the utilization rate of the processing resources of the terminal equipment is improved, the resource consumption is saved, and the user experience is improved.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
fig. 1 is a schematic diagram of a hardware structure of a mobile terminal according to the present invention;
fig. 2 is a schematic diagram of a communication network system according to an embodiment of the present invention;
FIG. 3 is a flowchart of a first embodiment of a background management method of the present invention;
FIG. 4 is a flowchart of a second embodiment of the background management method of the present invention;
FIG. 5 is a flowchart of a third embodiment of a background management method of the present invention;
FIG. 6 is a flowchart of a fourth embodiment of a background management method of the present invention;
FIG. 7 is a flowchart of a fifth embodiment of a background management method of the present invention;
FIG. 8 is a flowchart of a sixth embodiment of a background management method of the present invention;
FIG. 9 is a flowchart of a seventh embodiment of a background management method of the present invention;
fig. 10 is a flowchart of an eighth embodiment of the background management method of the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In the following description, suffixes such as "module", "component", or "unit" for representing elements are used only for facilitating the description of the present invention, and have no specific meaning per se. Thus, "module," "component," or "unit" may be used in combination.
The terminal may be implemented in various forms. For example, the terminals described in the present invention may include mobile terminals such as cell phones, tablet computers, notebook computers, palm computers, personal digital assistants (Personal Digital Assistant, PDA), portable media players (Portable Media Player, PMP), navigation devices, wearable devices, smart bracelets, pedometers, and fixed terminals such as digital TVs, desktop computers, and the like.
The following description will be given taking a mobile terminal as an example, and those skilled in the art will understand that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for a moving purpose.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal implementing various embodiments of the present invention, the mobile terminal 100 may include: an RF (Radio Frequency) unit 101, a WiFi module 102, an audio output unit 103, an a/V (audio/video) input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110, and a power supply 111. Those skilled in the art will appreciate that the mobile terminal structure shown in fig. 1 is not limiting of the mobile terminal and that the mobile terminal may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
The following describes the components of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be used for receiving and transmitting signals during the information receiving or communication process, specifically, after receiving downlink information of the base station, processing the downlink information by the processor 110; and, the uplink data is transmitted to the base station. Typically, the radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication, global System for Mobile communications), GPRS (General Packet Radio Service ), CDMA2000 (Code Division Multiple Access, CDMA 2000), WCDMA (Wideband Code Division Multiple Access ), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, time Division synchronous code Division multiple Access), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency Division Duplex Long term evolution), and TDD-LTE (Time Division Duplexing-Long Term Evolution, time Division Duplex Long term evolution), etc.
WiFi belongs to a short-distance wireless transmission technology, and a mobile terminal can help a user to send and receive e-mails, browse web pages, access streaming media and the like through the WiFi module 102, so that wireless broadband Internet access is provided for the user. Although fig. 1 shows a WiFi module 102, it is understood that it does not belong to the necessary constitution of a mobile terminal, and can be omitted entirely as required within a range that does not change the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a talk mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output (e.g., a call signal reception sound, a message reception sound, etc.) related to a specific function performed by the mobile terminal 100. The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive an audio or video signal. The a/V input unit 104 may include a graphics processor (Graphics Processing Unit, GPU) 1041 and a microphone 1042, the graphics processor 1041 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphics processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 can receive sound (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, and the like, and can process such sound into audio data. The processed audio (voice) data may be converted into a format output that can be transmitted to the mobile communication base station via the radio frequency unit 101 in the case of a telephone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting the audio signal.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and the proximity sensor can turn off the display panel 1061 and/or the backlight when the mobile terminal 100 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the acceleration in all directions (generally three axes), and can detect the gravity and direction when stationary, and can be used for applications of recognizing the gesture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometer and knocking), and the like; as for other sensors such as fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc. that may also be configured in the mobile phone, the detailed description thereof will be omitted.
The display unit 106 is used to display information input by a user or information provided to the user. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the mobile terminal. In particular, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect touch operations thereon or thereabout by a user (e.g., operations of the user on the touch panel 1071 or thereabout by using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch azimuth of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts it into touch point coordinates, and sends the touch point coordinates to the processor 110, and can receive and execute commands sent from the processor 110. Further, the touch panel 1071 may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. The user input unit 107 may include other input devices 1072 in addition to the touch panel 1071. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, mouse, joystick, etc., as specifically not limited herein.
Further, the touch panel 1071 may overlay the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or thereabout, the touch panel 1071 is transferred to the processor 110 to determine the type of touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of touch event. Although in fig. 1, the touch panel 1071 and the display panel 1061 are two independent components for implementing the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 may be integrated with the display panel 1061 to implement the input and output functions of the mobile terminal, which is not limited herein.
The interface unit 108 serves as an interface through which at least one external device can be connected with the mobile terminal 100. For example, the external devices may include a wired or wireless headset port, an external power (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and an external device.
Memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area that may store an operating system, application programs required for at least one function (such as a sound playing function, an image playing function, etc.), and a storage data area; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. In addition, memory 109 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power source 111 (e.g., a battery) for supplying power to the respective components, and preferably, the power source 111 may be logically connected to the processor 110 through a power management system, so as to perform functions of managing charging, discharging, and power consumption management through the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based will be described below.
Referring to fig. 2, fig. 2 is a schematic diagram of a communication network system according to an embodiment of the present invention, where the communication network system is an LTE system of a general mobile communication technology, and the LTE system includes a UE (User Equipment) 201, an e-UTRAN (Evolved UMTS Terrestrial Radio Access Network ) 202, an epc (Evolved Packet Core, evolved packet core) 203, and an IP service 204 of an operator that are sequentially connected in communication.
Specifically, the UE201 may be the terminal 100 described above, and will not be described herein.
The E-UTRAN202 includes eNodeB2021 and other eNodeB2022, etc. The eNodeB2021 may be connected with other eNodeB2022 by a backhaul (e.g., an X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide access from the UE201 to the EPC 203.
EPC203 may include MME (Mobility Management Entity ) 2031, hss (Home Subscriber Server, home subscriber server) 2032, other MMEs 2033, SGW (Serving Gate Way) 2034, pgw (PDN Gate Way) 2035 and PCRF (Policy and Charging Rules Function, policy and tariff function entity) 2036, and so on. The MME2031 is a control node that handles signaling between the UE201 and EPC203, providing bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location registers (not shown) and to hold user specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034 and PGW2035 may provide IP address allocation and other functions for UE201, PCRF2036 is a policy and charging control policy decision point for traffic data flows and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem ), or other IP services, etc.
Although the LTE system is described above as an example, it should be understood by those skilled in the art that the present invention is not limited to LTE systems, but may be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above mobile terminal hardware structure and the communication network system, various embodiments of the method of the present invention are provided.
Example 1
Fig. 3 is a flowchart of a first embodiment of the background management method of the present invention. A background management method, the method comprising:
s1, acquiring and counting operation parameters of an application program in a first time period, wherein the operation parameters comprise operation time and starting times;
s2, determining a control level of the application program according to the operation parameters, wherein the control level is lower if the operation time is longer and/or the starting times are higher, otherwise, the control level is higher if the operation time is shorter and/or the starting times are lower;
s3, determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold;
And S4, determining the control level and the control parameters of the application program in a second time period, and executing background checking and killing operation on the application program if the running time of the application program exceeds the background time threshold.
Firstly, acquiring and counting operation parameters of an application program in a first time period, wherein the operation parameters comprise operation time and starting times; then determining a control level of the application program according to the operation parameters, wherein the control level is lower if the operation time is longer and/or the starting times are higher, otherwise, the control level is higher if the operation time is shorter and/or the starting times are lower; then, determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold; and finally, in a second time period, determining the control level and the control parameters of the application program, and if the running time of the application program exceeds the background time threshold, executing background checking and killing operation on the application program.
Specifically, in this embodiment, taking a mobile phone as an example, an application P1, an application P2, an application P3, and an application P4 are installed in the mobile phone, and then, within twenty-four hours a day, the operation parameters of the application P1, the application P2, the application P3, and the application P4 are counted, where the operation parameters include an operation time and a start-up number, and the operation times of the application P1, the application P2, the application P3, and the application P4 are respectively T1 time, T2 time, T3 time, and T4 time (where the T1 time, the T2 time, the T3 time, and the T4 time are sequentially increased), and the start-up numbers of the application P1, the application P2, the application P3, and the application P4 are respectively 2 times, 5 times, 10 times, and 30 times.
Optionally, determining a control level of the application program according to the operation parameter, wherein if the operation time is longer and/or the starting frequency is higher, the control level is lower, otherwise, if the operation time is shorter and/or the starting frequency is lower, the control level is higher; similarly, as described above, the control levels of the application P1, the application P2, the application P3, and the application P4 are determined to be four levels, and thus the control levels of the application P1, the application P2, the application P3, and the application P4 are sequentially reduced.
Optionally, determining a control parameter corresponding to the control level in the first period, where the control parameter includes a background time threshold, and setting the background time threshold to 20 minutes as described above, for example;
optionally, in a second period of time, determining the control level and the control parameter of the application program, if the running time of the application program exceeds the background time threshold, performing a background checking and killing operation on the application program, as described in the example above, the second period of time may be twenty-four hours of another day, if the background time of the application program P1 and the application program P2 exceeds the time threshold, and if the control level of the application program P1 and the application program P2 is higher, performing a checking and killing operation on the processes of the application program P1 and the application program P2.
The method has the advantages that the operation parameters of the application program are obtained and counted in the first time period, wherein the operation parameters comprise operation time and starting times; then determining a control level of the application program according to the operation parameters, wherein the control level is lower if the operation time is longer and/or the starting times are higher, otherwise, the control level is higher if the operation time is shorter and/or the starting times are lower; then, determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold; and finally, in a second time period, determining the control level and the control parameters of the application program, and if the running time of the application program exceeds the background time threshold, executing background checking and killing operation on the application program. The humanized background management scheme is realized, so that the terminal equipment has more available processing resources in the use peak time period, the utilization rate of the processing resources of the terminal equipment is improved, the resource consumption is saved, and the user experience is improved.
Example two
Fig. 4 is a flowchart of a second embodiment of the background management method according to the present invention, and based on the foregoing embodiment, optionally, the acquiring and counting, during a first period of time, an operation parameter of an application program, where the operation parameter includes an operation time and a number of starts, and includes:
s11, acquiring and counting operation parameters of a plurality of application programs in a first period;
s12, determining the first time period in the first period according to the data distribution characteristics of the operation parameters, wherein the first period comprises a time of day and a time of week.
Firstly, in a first period, acquiring and counting operation parameters of a plurality of application programs; the first period of time is then determined within the first period of time, wherein the first period of time includes a time of day and a time of week, based on the data distribution characteristics of the operating parameters.
Specifically, in this embodiment, one or more first time periods are determined in the first period according to the data distribution characteristics of the operating parameters, where the first period includes a time of day and a time of week.
Alternatively, the above data distribution feature may be determined according to the user's use requirement, for example, according to the use state of the terminal device, to determine the high-demand period, the medium-demand period, the low-demand period, and so on of the user.
The method has the advantages that the operation parameters of a plurality of application programs are obtained and counted in a first period; the first period of time is then determined within the first period of time, wherein the first period of time includes a time of day and a time of week, based on the data distribution characteristics of the operating parameters. The method and the device realize a more humanized background management scheme, so that the terminal device has more available processing resources in a use peak time period, the utilization rate of the processing resources of the terminal device is improved, the resource consumption is saved, and the user experience is improved.
Example III
Fig. 5 is a flowchart of a third embodiment of the background management method according to the present invention, and based on the foregoing embodiment, optionally, the acquiring and counting, during a first period of time, an operation parameter of an application program, where the operation parameter includes an operation time and a number of starts, and further includes:
s13, determining an application program to be managed in the plurality of application programs according to the data distribution characteristics;
s14, acquiring and counting the operation parameters of the application program to be managed in the first time period, wherein the operation parameters comprise operation time and starting times.
Firstly, determining an application program to be managed in the plurality of application programs according to the data distribution characteristics; and then, acquiring and counting the operation parameters of the application program to be managed in the first time period, wherein the operation parameters comprise operation time and starting times.
Specifically, in this embodiment, the application to be managed is determined from the plurality of application programs according to the data distribution characteristics, for example, the terminal device has more than ten application programs therein, but according to the data distribution characteristics, five of the application programs are selected as the application programs to be managed in this embodiment, and it is understood that other application programs will not have an excessive influence on the processing resources in the peak time period described above;
optionally, acquiring and counting the operation parameters of the application program to be managed in the first time period, wherein the operation parameters comprise operation time and starting times;
optionally, acquiring and counting the operation parameters of the application program to be managed in the first time period, wherein the operation parameters comprise the starting times larger than the preset operation time.
The method has the advantages that the application program to be managed is determined from the plurality of application programs through the data distribution characteristics; and then, acquiring and counting the operation parameters of the application program to be managed in the first time period, wherein the operation parameters comprise operation time and starting times. The method and the device realize a more humanized background management scheme, so that the terminal device has more available processing resources in a use peak time period, the utilization rate of the processing resources of the terminal device is improved, the resource consumption is saved, and the user experience is improved.
Example IV
FIG. 6 is a flowchart of a fourth embodiment of the background management method according to the present invention, based on the above embodiment, optionally, the determining the control level of the application according to the operation parameter includes:
s21, determining an initial level of the application program;
and S22, adjusting the initial grade according to the running time of the application program and the starting times to obtain the control grade.
First, determining an initial level of the application program; and then, adjusting the initial level according to the running time of the application program and the starting times to obtain the control level.
Specifically, in this embodiment, the initial level of the application program is determined, and it may be understood that, in the factory state of the terminal device, the initial level of the application program is determined for the built-in application program;
optionally, in a state that the terminal device installs a new application program, determining an initial level of the application program for the newly installed application program;
optionally, the initial level is adjusted according to the running time of the application program and the starting times to obtain the control level;
optionally, the initial level is adjusted according to the number of starts greater than the preset running time in the above embodiment, so as to obtain the control level.
The embodiment has the advantage that the initial level of the application program is determined; and then, adjusting the initial level according to the running time of the application program and the starting times to obtain the control level. The method and the device realize a more humanized background management scheme, so that the terminal device has more available processing resources in a use peak time period, the utilization rate of the processing resources of the terminal device is improved, the resource consumption is saved, and the user experience is improved.
Example five
FIG. 7 is a flowchart of a fifth embodiment of the background management method according to the present invention, based on the above embodiment, optionally, the determining the control level of the application according to the operation parameter further includes:
s23, determining an associated program of the application program;
s24, determining the control level of the associated program according to the control level of the application program.
Firstly, determining an associated program of the application program; and then, determining the control level of the associated program according to the control level of the application program.
Specifically, in this embodiment, an association program of the application program is determined, where the association program refers to an application program that may be started in association with the starting time of the application program or in a running process.
Optionally, in this embodiment, since the association program may also occupy processing resources of the terminal device, the control level of the association program is determined according to the control level of the application program.
The embodiment has the beneficial effects that the associated program of the application program is determined; and then, determining the control level of the associated program according to the control level of the application program. The method and the device realize a more humanized background management scheme, so that the terminal device has more available processing resources in a use peak time period, the utilization rate of the processing resources of the terminal device is improved, the resource consumption is saved, and the user experience is improved.
Example six
Fig. 8 is a flowchart of a sixth embodiment of a background management method according to the present invention, and based on the foregoing embodiment, optionally, the determining, during the first period of time, a management parameter corresponding to the management level, where the management parameter includes a background time threshold, includes:
s31, acquiring and counting operation parameters of a plurality of application programs in the first period, wherein the operation parameters further comprise starting time;
s32, determining a control parameter corresponding to the control level in the first period according to the data distribution characteristics of the starting time, wherein the control parameter comprises a background time threshold.
Firstly, acquiring and counting operation parameters of a plurality of application programs in the first period, wherein the operation parameters further comprise starting time; and then, determining a control parameter corresponding to the control level in the first period according to the data distribution characteristic of the starting time, wherein the control parameter comprises a background time threshold.
Specifically, in this embodiment, in the first period, operation parameters of a plurality of application programs are obtained and counted, where the operation parameters further include a start time, and corresponding control factors are determined according to an interval in which the start time is located;
optionally, according to the data distribution characteristics of the starting time, a control parameter corresponding to the control level is determined in the first period, where the control parameter includes a background time threshold, and according to the control factor, the corresponding distribution characteristics are determined, so that according to an actual usage field Jing Xuqiu of a user, the control parameter corresponding to the control level is determined in the first period.
The method has the advantages that the operation parameters of the plurality of application programs are obtained and counted in the first period, wherein the operation parameters further comprise starting time; and then, determining a control parameter corresponding to the control level in the first period according to the data distribution characteristic of the starting time, wherein the control parameter comprises a background time threshold. The method and the device realize a more humanized background management scheme, so that the terminal device has more available processing resources in a use peak time period, the utilization rate of the processing resources of the terminal device is improved, the resource consumption is saved, and the user experience is improved.
Example seven
Fig. 9 is a flowchart of a seventh embodiment of a background management method according to the present invention, and based on the foregoing embodiment, optionally, the determining, in the first period of time, a management parameter corresponding to the management level, where the management parameter includes a background time threshold, further includes:
s33, determining the control level of the associated program of the application program;
s34, determining the control parameters of the association program according to the control parameters of the application program, wherein the control parameters further comprise association relations.
Firstly, determining a control level of an associated program of the application program; and then, determining the control parameters of the association program according to the control parameters of the application program, wherein the control parameters further comprise association relations.
Specifically, in this embodiment, a control level of an associated program of the application program is determined;
optionally, determining the control level of the associated program according to the control level of the application program;
optionally, determining the control level of the associated program according to a higher level of the control level of the application program;
optionally, determining the control level of the associated program according to a lower level of the control level of the application program;
Optionally, the control parameters of the one or more association programs are determined according to the control parameters of the application program, where the control parameters further include one or more association relationships.
The method has the advantages that the control level of the associated program of the application program is determined; and then, determining the control parameters of the association program according to the control parameters of the application program, wherein the control parameters further comprise association relations. The method and the device realize a more humanized background management scheme, so that the terminal device has more available processing resources in a use peak time period, the utilization rate of the processing resources of the terminal device is improved, the resource consumption is saved, and the user experience is improved.
Example eight
Fig. 10 is a flowchart of an eighth embodiment of a background management method according to the present invention, and based on the above embodiment, optionally, the determining, during a second period of time, a control level of the application program and the control parameter, and if the running time of the application program exceeds the background time threshold, executing a background checking operation on the application program includes:
s41, acquiring and counting the operation parameters of a plurality of application programs in a second period;
S42, determining a second time period with the same data distribution characteristics in the first time period in the second period according to the data distribution characteristics of the operation parameters, wherein the second period comprises a time of day and a time of week;
and S43, determining the control level and the control parameters of the application program and the related program in the second time period, and executing background searching and killing operation on the application program and the related program if the running time of the application program and the related program exceeds the background time threshold.
Firstly, in a second period, acquiring and counting the operation parameters of a plurality of application programs; then, according to the data distribution characteristics of the operation parameters, determining a second time period with the same data distribution characteristics in the first time period in the second period, wherein the second period comprises a time of day and a time of week; and finally, determining the control level and the control parameters of the application program and the related program in the second time period, and executing background searching and killing operation on the application program and the related program if the running time of the application program and the related program exceeds the background time threshold.
Specifically, in this embodiment, the operation parameters of the plurality of application programs are acquired and counted in the second period, where the second period may be a period that follows the first period in the above embodiment, or the second period may be any period that follows the first period in the above embodiment.
Optionally, determining a control level and the control parameters of the application program and one or more associated programs thereof in the second time period;
optionally, determining a control level and the control parameter of the application program and the newly installed associated program in the second time period;
optionally, determining a control level and the control parameter of the updated application program and the related program in the second time period;
optionally, determining a control level and the control parameter of at least two application programs and a common associated program thereof in the second time period;
the method has the advantages that the operation parameters of a plurality of application programs are obtained and counted in the second period; then, according to the data distribution characteristics of the operation parameters, determining a second time period with the same data distribution characteristics in the first time period in the second period, wherein the second period comprises a time of day and a time of week; and finally, determining the control level and the control parameters of the application program and the related program in the second time period, and executing background searching and killing operation on the application program and the related program if the running time of the application program and the related program exceeds the background time threshold. The method and the device realize a more humanized background management scheme, so that the terminal device has more available processing resources in a use peak time period, the utilization rate of the processing resources of the terminal device is improved, the resource consumption is saved, and the user experience is improved.
Example nine
Based on the above embodiments, the present invention also proposes a background management device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program being implemented when executed by the processor:
acquiring and counting the operation parameters of the application program in a first time period, wherein the operation parameters comprise operation time and starting times;
determining a control level of the application program according to the operation parameters, wherein the control level is lower if the operation time is longer and/or the starting frequency is higher, otherwise, the control level is higher if the operation time is shorter and/or the starting frequency is lower;
determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold;
and in a second time period, determining the control level and the control parameters of the application program, and if the running time of the application program exceeds the background time threshold, executing background checking and killing operation on the application program.
Firstly, acquiring and counting operation parameters of an application program in a first time period, wherein the operation parameters comprise operation time and starting times; then determining a control level of the application program according to the operation parameters, wherein the control level is lower if the operation time is longer and/or the starting times are higher, otherwise, the control level is higher if the operation time is shorter and/or the starting times are lower; then, determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold; and finally, in a second time period, determining the control level and the control parameters of the application program, and if the running time of the application program exceeds the background time threshold, executing background checking and killing operation on the application program.
Specifically, in this embodiment, taking a mobile phone as an example, an application P1, an application P2, an application P3, and an application P4 are installed in the mobile phone, and then, within twenty-four hours a day, the operation parameters of the application P1, the application P2, the application P3, and the application P4 are counted, where the operation parameters include an operation time and a start-up number, and the operation times of the application P1, the application P2, the application P3, and the application P4 are respectively T1 time, T2 time, T3 time, and T4 time (where the T1 time, the T2 time, the T3 time, and the T4 time are sequentially increased), and the start-up numbers of the application P1, the application P2, the application P3, and the application P4 are respectively 2 times, 5 times, 10 times, and 30 times.
Optionally, determining a control level of the application program according to the operation parameter, wherein if the operation time is longer and/or the starting frequency is higher, the control level is lower, otherwise, if the operation time is shorter and/or the starting frequency is lower, the control level is higher; similarly, as described above, the control levels of the application P1, the application P2, the application P3, and the application P4 are determined to be four levels, and thus the control levels of the application P1, the application P2, the application P3, and the application P4 are sequentially reduced.
Optionally, determining a control parameter corresponding to the control level in the first period, where the control parameter includes a background time threshold, and setting the background time threshold to 20 minutes as described above, for example;
optionally, in a second period of time, determining the control level and the control parameter of the application program, if the running time of the application program exceeds the background time threshold, performing a background checking and killing operation on the application program, as described in the example above, the second period of time may be twenty-four hours of another day, if the background time of the application program P1 and the application program P2 exceeds the time threshold, and if the control level of the application program P1 and the application program P2 is higher, performing a checking and killing operation on the processes of the application program P1 and the application program P2.
The method has the advantages that the operation parameters of the application program are obtained and counted in the first time period, wherein the operation parameters comprise operation time and starting times; then determining a control level of the application program according to the operation parameters, wherein the control level is lower if the operation time is longer and/or the starting times are higher, otherwise, the control level is higher if the operation time is shorter and/or the starting times are lower; then, determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold; and finally, in a second time period, determining the control level and the control parameters of the application program, and if the running time of the application program exceeds the background time threshold, executing background checking and killing operation on the application program. The humanized background management scheme is realized, so that the terminal equipment has more available processing resources in the use peak time period, the utilization rate of the processing resources of the terminal equipment is improved, the resource consumption is saved, and the user experience is improved.
Examples ten
Based on the above embodiments, the present invention also proposes a computer readable storage medium having a background management program stored thereon, which when executed by a processor implements the steps of the background management method as described in any one of the above.
The background management method, the device and the computer readable storage medium are implemented by acquiring and counting the operation parameters of the application program in a first time period, wherein the operation parameters comprise operation time and starting times; then determining a control level of the application program according to the operation parameters, wherein the control level is lower if the operation time is longer and/or the starting times are higher, otherwise, the control level is higher if the operation time is shorter and/or the starting times are lower; then, determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold; and finally, in a second time period, determining the control level and the control parameters of the application program, and if the running time of the application program exceeds the background time threshold, executing background checking and killing operation on the application program. The humanized background management scheme is realized, so that the terminal equipment has more available processing resources in the use peak time period, the utilization rate of the processing resources of the terminal equipment is improved, the resource consumption is saved, and the user experience is improved.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are to be protected by the present invention.

Claims (7)

1. A background management method, the method comprising:
acquiring and counting the operation parameters of the application program in a first time period, wherein the operation parameters comprise operation time and starting times;
determining a control level of the application program according to the operation parameters, wherein the control level is lower if the operation time is longer and/or the starting frequency is higher, otherwise, the control level is higher if the operation time is shorter and/or the starting frequency is lower;
determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold;
determining the control level and the control parameters of the application program in a second time period, and if the running time of the application program exceeds the background time threshold, executing background searching and killing operation on the application program;
And in the second time period, determining the control level and the control parameters of the application program, and if the running time of the application program exceeds the background time threshold, executing a background checking operation on the application program, wherein the background checking operation comprises the following steps:
acquiring and counting the operation parameters of a plurality of application programs in a preset second period;
determining a second time period having the same data distribution characteristics as the first time period in the second period according to the data distribution characteristics of the operation parameters;
determining the control level and the control parameters of at least two application programs and at least two associated programs common to the application programs in the second time period, and if the running time of the at least two application programs and the associated programs common to the application programs exceeds the background time threshold, executing background checking and killing operation on the application programs and the associated programs;
determining a control parameter corresponding to the control level in the first time period, where the control parameter includes a background time threshold, and includes:
acquiring and counting operation parameters of a plurality of application programs in a first period, wherein the operation parameters further comprise starting time;
Determining a control parameter corresponding to the control level in the first period according to the data distribution characteristics of the starting time, wherein the control parameter comprises a background time threshold;
determining a control level of an associated program of the application program;
determining control parameters of the associated program according to the control parameters of the application program, wherein the control parameters further comprise an association relation;
wherein,,
determining corresponding control factors according to the interval of the starting time;
determining the distribution characteristics corresponding to the interval according to the control factors;
determining the control level and the control parameters of the application program and one or more associated programs thereof in the second time period;
determining the control level and the control parameters of the application program and the newly installed associated program in the second time period;
and in the second time period, determining the updated control level and the control parameters of the application program and the related program thereof.
2. The background management method according to claim 1, wherein the acquiring and counting the operation parameters of the application program in the first period of time, wherein the operation parameters include operation time and start-up times, includes:
Acquiring and counting the operation parameters of a plurality of application programs in a first period;
and determining the first time period in the first period according to the data distribution characteristic of the operation parameter, wherein the first period comprises a time of day and a time of week.
3. The background management method according to claim 2, wherein the acquiring and counting the operation parameters of the application program in the first period of time, wherein the operation parameters include operation time and start-up times, further includes:
determining an application program to be managed in the plurality of application programs according to the data distribution characteristics;
and acquiring and counting the operation parameters of the application program to be managed in the first time period, wherein the operation parameters comprise operation time and starting times.
4. A background management method according to claim 3, wherein said determining a level of control of the application according to the operating parameters comprises:
determining an initial level of the application;
and adjusting the initial level according to the running time of the application program and the starting times to obtain the control level.
5. The background management method according to claim 4, wherein the determining the control level of the application program according to the operation parameter further comprises:
Determining an associated program of the application program;
and determining the control level of the associated program according to the control level of the application program.
6. A background management device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program when executed by the processor implementing:
acquiring and counting the operation parameters of the application program in a first time period, wherein the operation parameters comprise operation time and starting times;
determining a control level of the application program according to the operation parameters, wherein the control level is lower if the operation time is longer and/or the starting frequency is higher, otherwise, the control level is higher if the operation time is shorter and/or the starting frequency is lower;
determining a control parameter corresponding to the control level in the first time period, wherein the control parameter comprises a background time threshold;
determining the control level and the control parameters of the application program in a second time period, and if the running time of the application program exceeds the background time threshold, executing background searching and killing operation on the application program;
And in the second time period, determining the control level and the control parameters of the application program, and if the running time of the application program exceeds the background time threshold, executing a background checking operation on the application program, wherein the background checking operation comprises the following steps:
acquiring and counting the operation parameters of a plurality of application programs in a preset second period;
determining a second time period having the same data distribution characteristics as the first time period in the second period according to the data distribution characteristics of the operation parameters;
determining the control level and the control parameters of at least two application programs and at least two associated programs common to the application programs in the second time period, and if the running time of the at least two application programs and the associated programs common to the application programs exceeds the background time threshold, executing background checking and killing operation on the application programs and the associated programs;
determining a control parameter corresponding to the control level in the first time period, where the control parameter includes a background time threshold, and includes:
acquiring and counting operation parameters of a plurality of application programs in a first period, wherein the operation parameters further comprise starting time;
Determining a control parameter corresponding to the control level in the first period according to the data distribution characteristics of the starting time, wherein the control parameter comprises a background time threshold;
determining a control level of an associated program of the application program;
determining control parameters of the associated program according to the control parameters of the application program, wherein the control parameters further comprise an association relation;
wherein,,
determining corresponding control factors according to the interval of the starting time;
determining the distribution characteristics corresponding to the interval according to the control factors;
determining the control level and the control parameters of the application program and one or more associated programs thereof in the second time period;
determining the control level and the control parameters of the application program and the newly installed associated program in the second time period;
and in the second time period, determining the updated control level and the control parameters of the application program and the related program thereof.
7. A computer readable storage medium, wherein a background management program is stored on the computer readable storage medium, the background management program implementing the steps of the background management method according to any one of claims 1 to 5 when executed by a processor.
CN201811280714.7A 2018-10-30 2018-10-30 Background management method, device and computer readable storage medium Active CN109388947B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811280714.7A CN109388947B (en) 2018-10-30 2018-10-30 Background management method, device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811280714.7A CN109388947B (en) 2018-10-30 2018-10-30 Background management method, device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109388947A CN109388947A (en) 2019-02-26
CN109388947B true CN109388947B (en) 2023-06-20

Family

ID=65428134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811280714.7A Active CN109388947B (en) 2018-10-30 2018-10-30 Background management method, device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109388947B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114449094B (en) * 2020-10-30 2023-04-11 华为技术有限公司 Control method, electronic device, chip and storage medium
CN115373957A (en) * 2021-05-21 2022-11-22 荣耀终端有限公司 Application killing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106201686A (en) * 2016-06-30 2016-12-07 北京小米移动软件有限公司 Management method, device and the terminal of application
CN107797871A (en) * 2017-11-30 2018-03-13 努比亚技术有限公司 EMS memory occupation method for releasing resource, mobile terminal and computer-readable recording medium
CN107831886A (en) * 2017-11-21 2018-03-23 广东欧珀移动通信有限公司 Association starts management-control method, device, storage medium and the intelligent terminal of application
CN107943590A (en) * 2017-11-30 2018-04-20 努比亚技术有限公司 Start Memory Optimize Method, mobile terminal and the storage medium of application based on association

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107515665A (en) * 2017-07-06 2017-12-26 努比亚技术有限公司 Background process management method, mobile terminal and computer-readable recording medium
CN107562539B (en) * 2017-08-25 2020-08-18 Oppo广东移动通信有限公司 Application program processing method and device, computer equipment and storage medium
CN108037818A (en) * 2017-10-31 2018-05-15 努比亚技术有限公司 A kind of background application management method, terminal and computer-readable recording medium
CN107807857B (en) * 2017-11-29 2021-05-21 努比亚技术有限公司 Method and device for cleaning running memory and computer storage medium
CN107957906A (en) * 2017-12-20 2018-04-24 珠海全志科技股份有限公司 Application management method, computer installation, the computer-readable recording medium of terminal device
CN108519916A (en) * 2018-04-16 2018-09-11 努比亚技术有限公司 Processing method, mobile terminal and the readable storage medium storing program for executing of terminal clean up process

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106201686A (en) * 2016-06-30 2016-12-07 北京小米移动软件有限公司 Management method, device and the terminal of application
CN107831886A (en) * 2017-11-21 2018-03-23 广东欧珀移动通信有限公司 Association starts management-control method, device, storage medium and the intelligent terminal of application
CN107797871A (en) * 2017-11-30 2018-03-13 努比亚技术有限公司 EMS memory occupation method for releasing resource, mobile terminal and computer-readable recording medium
CN107943590A (en) * 2017-11-30 2018-04-20 努比亚技术有限公司 Start Memory Optimize Method, mobile terminal and the storage medium of application based on association

Also Published As

Publication number Publication date
CN109388947A (en) 2019-02-26

Similar Documents

Publication Publication Date Title
CN108391025B (en) Network access management method, mobile terminal and computer readable storage medium
CN110175062B (en) Screen refreshing frame rate method of mobile terminal, mobile terminal and storage medium
CN112004173B (en) Bluetooth headset switching method, mobile terminal and computer readable storage medium
CN110087287B (en) Control method and device for terminal network searching, mobile terminal and storage medium
CN108512625B (en) Anti-interference method for camera, mobile terminal and storage medium
CN109144705B (en) Application management method, mobile terminal and computer readable storage medium
CN109195213B (en) Mobile terminal screen control method, mobile terminal and computer readable storage medium
CN109890022B (en) Data transmission control method, mobile terminal and computer readable storage medium
CN108958936B (en) Application program switching method, mobile terminal and computer readable storage medium
CN107862217B (en) Position information acquisition method, mobile terminal and computer storage medium
CN110096375B (en) Method and device for sharing data by application programs and computer readable storage medium
CN109545120B (en) Screen light sensor adjusting method, mobile terminal and computer readable storage medium
CN110052024B (en) Game vibration adjusting method, adjusting device, mobile terminal and storage medium
CN109445945B (en) Memory allocation method of application program, mobile terminal, server and storage medium
CN112667339B (en) Screen refresh rate setting method, terminal and computer readable medium
CN109388947B (en) Background management method, device and computer readable storage medium
CN111970738B (en) Network switching control method, device and computer readable storage medium
CN109684020B (en) Theme switching method, device and computer readable storage medium
CN109032648B (en) Application program updating method, mobile terminal and storage medium
CN110046151B (en) Data cleaning method, server and computer readable storage medium
CN109948368B (en) Privacy authority control method, device and computer readable storage medium
CN109462829B (en) Call transfer method, device and computer readable storage medium
CN109711850B (en) Secure payment method, device and computer readable storage medium
CN109375982B (en) Mobile terminal desktop icon layout method and device, terminal and readable storage medium
CN109151201B (en) Anti-addiction method, mobile terminal and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230328

Address after: Room 2501, Building 2, Shanshui Times Building, 26 Yulong Road, Yingfeng Street, Xiaoshan District, Hangzhou City, Zhejiang Province, 310000

Applicant after: Zhejiang Jiefen Chain Digital Technology Co.,Ltd.

Address before: 518000 6-8 / F, 10-11 / F, 6 / F, 6-10 / F, C zone, Han's innovation building, No. 9018, Beihuan Avenue, high tech Zone, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: NUBIA TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant