CN111031038A - Network processing method and device, storage medium and terminal equipment - Google Patents

Network processing method and device, storage medium and terminal equipment Download PDF

Info

Publication number
CN111031038A
CN111031038A CN201911275846.5A CN201911275846A CN111031038A CN 111031038 A CN111031038 A CN 111031038A CN 201911275846 A CN201911275846 A CN 201911275846A CN 111031038 A CN111031038 A CN 111031038A
Authority
CN
China
Prior art keywords
network
firewall
module
network processing
current time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911275846.5A
Other languages
Chinese (zh)
Inventor
杨波
王杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201911275846.5A priority Critical patent/CN111031038A/en
Publication of CN111031038A publication Critical patent/CN111031038A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Abstract

The embodiment of the application provides a network processing method and device, a storage medium and terminal equipment. According to the application program data packet processing method and device, the firewall intercepts the corresponding application program data packet according to the identifier within the preset time range to disable the network of the application program in the preset list, so that unnecessary notification interference within the preset time range is avoided, and the emergency information can be prevented from being missed.

Description

Network processing method and device, storage medium and terminal equipment
Technical Field
The present application relates to the field of mobile communications technologies, and in particular, to a network processing method and apparatus, a storage medium, and a terminal device.
Background
With the rapid development of communication technology, the use of mobile terminals is becoming more and more common. Various third-party application programs on the mobile terminal are produced at the same time, and great convenience is brought to life, for example, payment application programs enable users to pay anytime and anywhere when not carrying a wallet, shopping application programs enable users to enjoy shopping without going out, and news application programs enable users to know things in time and not miss important information.
However, these applications also cause a user to be bothered because most of the applications need to be networked, and some applications often pop up some irrelevant notifications without limitation, so that the user at rest can be affected by the notifications to reduce the user experience. Whereas if the user completely shuts down the network during the rest period, it is easy to miss some urgent or important notifications.
Therefore, there is a need to solve the problem that the user is not affected by the non-critical or non-critical notification within a predetermined time range, and to ensure that the critical or critical notification can be obtained in time.
Disclosure of Invention
The embodiment of the application provides a network processing method and device, a storage medium and a terminal device.
According to a first aspect of the present application, an embodiment of the present application provides a network processing method, including: acquiring current time; judging whether the current time is in a preset time range or not; and when the current time is judged to be in the preset time range, starting a first mode of the firewall, wherein the first mode is a network for forbidding the application programs in the preset list.
Further, the method further comprises: and when the current time is judged not to be in the preset time range, starting a second mode of the firewall.
Further, the second mode is to restore the network of the applications in the preset list.
Further, in the step of starting the first mode of the firewall, the firewall acquires the unique identifier of the application program in the preset list; and the firewall intercepts the corresponding application program data packet according to the identifier so as to disable the network of the application programs in the preset list.
According to a second aspect of the present application, an embodiment of the present application provides a network processing apparatus, including: the acquisition module is used for acquiring the current time; the judging module is used for judging whether the current time is in a preset time range or not; and the first starting module is used for starting a first mode of the firewall when the current time is judged to be in the preset time range, wherein the first mode is a network for forbidding the application programs in the preset list.
Further, the network control module comprises: and the second starting module is used for starting a second mode of the firewall when judging that the current time is not in the preset time range.
Further, the second starting module comprises a recovery submodule, and the recovery submodule is used for recovering the network of the application program in the preset list.
Further, the first starting module comprises an obtaining submodule and an intercepting submodule, the obtaining submodule is used for the firewall to obtain the unique identifier of the application program in the preset list, and the intercepting submodule is used for the firewall to intercept the corresponding application program data packet according to the identifier so as to forbid the network of the application program in the preset list.
According to a third aspect of the present application, an embodiment of the present application provides a storage medium having a plurality of instructions stored therein, the instructions being adapted to be loaded by a processor to perform the network processing method described above.
According to a fourth aspect of the present application, an embodiment of the present application provides a terminal device, which includes a processor and a memory, where the processor is electrically connected to the memory, the memory is used for storing instructions and data, and the processor is used for executing steps in the network processing method.
The embodiment of the application provides a network processing method and device, a storage medium and a terminal device.
Drawings
The technical solution and other advantages of the present application will become apparent from the detailed description of the embodiments of the present application with reference to the accompanying drawings.
Fig. 1 is a schematic step flow diagram of a network processing method according to an embodiment of the present application.
Fig. 2 is a schematic structural diagram of a network processing device according to an embodiment of the present application.
Fig. 3 is a schematic structural diagram of the first processing module shown in fig. 2.
Fig. 4 is a schematic structural diagram of the second processing module shown in fig. 2.
Fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," "third," and the like in the description and in the claims of the present application and in the above-described drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the objects so described are interchangeable under appropriate circumstances. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions.
In particular embodiments, the drawings discussed below and the various embodiments used to describe the principles of the present disclosure are by way of illustration only and should not be construed to limit the scope of the present disclosure. Those skilled in the art will understand that the principles of the present application may be implemented in any suitably arranged system. Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. Further, a terminal device according to an exemplary embodiment will be described in detail with reference to the accompanying drawings. Like reference symbols in the various drawings indicate like elements.
The terminology used in the detailed description is for the purpose of describing particular embodiments only and is not intended to be limiting of the concepts of the present application. Unless the context clearly dictates otherwise, expressions used in the singular form encompass expressions in the plural form. In the present specification, it will be understood that terms such as "including," "having," and "containing" are intended to specify the presence of the features, integers, steps, acts, or combinations thereof disclosed in the specification, and are not intended to preclude the presence or addition of one or more other features, integers, steps, acts, or combinations thereof. Like reference symbols in the various drawings indicate like elements.
In the description of the present application, it is to be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; may be mechanically connected, may be electrically connected or may be in communication with each other; either directly or indirectly through intervening media, either internally or in any other relationship. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art as appropriate.
The following disclosure provides many different embodiments or examples for implementing different features of the application. In order to simplify the disclosure of the present application, specific example components and arrangements are described below. Of course, they are merely examples and are not intended to limit the present application. Moreover, the present application may repeat reference numerals and/or letters in the various examples, such repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed. In addition, examples of various specific processes and materials are provided herein, but one of ordinary skill in the art may recognize applications of other processes and/or use of other materials.
Specifically, referring to fig. 1, an embodiment of the present application provides a network processing method, where the network processing method is used for a terminal device and includes the following steps.
In step S11, the current time is acquired.
In the embodiment of the application, the current time is the time displayed on the terminal device.
And step S12, determining whether the current time is within a preset time range. If yes, go to step S13. If not, step S14 is executed.
In the embodiment of the present application, the preset time range (e.g. the working time period or the rest time period) is set by the user, and the time range is set according to the situation of the user to avoid being disturbed, for example, the time ranges from 9 am to 12 am, from 1 pm to 5 pm, and from 10 pm to 7 pm next day, so as to avoid being disturbed by the notification or popup of some applications during the working time and the rest time.
Step S13, when it is determined that the current time is within the preset time range, starting a first mode of the firewall, where the first mode is a network that disables the application programs in the preset list.
In this embodiment of the present application, the firewall obtains a unique identifier of an application in the preset list. And the firewall intercepts the corresponding application program data packet according to the identifier so as to disable the network of the application programs in the preset list.
The firewall may adopt a firewall policy configured by an IP packet filtering system (IPTABLES). Specifically, IPTABLES is integrated into the Linux kernel, connected to the internet or LAN, server or proxy server connecting LAN and internet in Linux-based systems, and facilitates Linux-based systems to control IP packet filtering and firewall configuration.
Each application corresponds to a Unique Identifier (UID). The first mode is that the UID of a specific application program prohibits transmission or reception of a packet to disable the network of the application program. In this embodiment, a user adds an application program that needs to disable a network within a preset time range in a preset list, when it is determined that the current time is within the preset time range, a firewall obtains a UID of the application program in the preset list, searches an IP address and a port number of a server used by a corresponding application according to the UID, and intercepts a corresponding data packet through an IPTABLES firewall policy to disable the network of the application program in the preset list, so that the application program does not pop up a notification to disturb the user.
And step S14, when the current time is judged not to be in the preset time range, starting a second mode of the firewall.
In this embodiment of the present application, the second mode is a network for restoring the application programs in the preset list. And when the current time is judged not to be in the preset time range, no data packet corresponding to any UID is intercepted any more through an IPTABLES firewall strategy so as to recover the network of the application program in the preset list.
Referring to fig. 2, an embodiment of the present application provides a network processing apparatus, which includes an obtaining module 11, a determining module 12, a first opening module 13, and a second opening module 14.
The obtaining module 11 is configured to obtain a current time.
In the embodiment of the application, the current time is the time displayed on the terminal device.
The judging module 12 is connected with the obtaining module 11. The judging module 12 is configured to judge whether the current time is within a preset time range. If yes, the first opening module 13 is started. If not, the second enabling module 14 is enabled.
In the embodiment of the present application, the preset time range (e.g. the working time period or the rest time period) is set by the user, and the time range is set according to the situation of the user to avoid being disturbed, for example, the time ranges from 9 am to 12 am, from 1 pm to 5 pm, and from 10 pm to 7 pm next day, so as to avoid being disturbed by the notification or popup of some applications during the working time and the rest time.
The first opening module 13 is connected with the judging module 12. The first starting module 13 is configured to start a first mode of the firewall when it is determined that the current time is within the preset time range, where the first mode is a network in which the application programs in the preset list are disabled.
Referring to fig. 3, the first opening module 13 includes an acquisition sub-module 131 and an interception sub-module 132. The obtaining submodule 131 and the intercepting submodule 132 are connected to each other, the obtaining submodule 131 is used for the firewall to obtain the unique identifier of the application program in the preset list, and the intercepting submodule 132 is used for the firewall to intercept the corresponding application program data packet according to the identifier so as to disable the network of the application program in the preset list.
In the embodiment of the present application, the firewall may adopt a firewall policy configured by an IP packet filtering system (IPTABLES). Specifically, IPTABLES is integrated into the Linux kernel, connected to the internet or LAN, server or proxy server connecting LAN and internet in Linux-based systems, and facilitates Linux-based systems to control IP packet filtering and firewall configuration.
Each application corresponds to a Unique Identifier (UID). The first mode is that the UID of a specific application program prohibits transmission or reception of a packet to disable the network of the application program. In this embodiment, a user adds an application program that needs to disable a network within a preset time range in a preset list, when it is determined that the current time is within the preset time range, a firewall obtains a UID of the application program in the preset list, searches an IP address and a port number of a server used by a corresponding application according to the UID, and intercepts a corresponding data packet through an IPTABLES firewall policy to disable the network of the application program in the preset list, so that the application program does not pop up a notification to disturb the user.
The second enabling module 14 is connected to the determining module 12. The second starting module 14 is configured to start the second mode of the firewall when it is determined that the current time is not within the preset time range.
Referring to fig. 4, the second starting module 14 includes a restoring submodule 141, and the restoring submodule 141 is configured to restore the network of the applications in the preset list.
In this embodiment of the present application, the second mode is a network for restoring the application programs in the preset list. And when the current time is judged not to be in the preset time range, no data packet corresponding to any UID is intercepted any more through an IPTABLES firewall strategy so as to recover the network of the application program in the preset list.
Referring to fig. 5, an embodiment of the present invention further provides a terminal device 200, where the terminal device 200 may be a mobile phone, a tablet, a computer, or other devices. As shown in fig. 5, the terminal device 200 includes a processor 201 and a memory 202. The processor 201 is electrically connected to the memory 202.
The processor 201 is a control center of the terminal device 200, connects various parts of the entire terminal device by using various interfaces and lines, and performs various functions of the terminal device and processes data by running or loading an application program stored in the memory 202 and calling data stored in the memory 202, thereby performing overall monitoring of the terminal device.
In this embodiment, the terminal device 200 is provided with a plurality of memory partitions, the plurality of memory partitions includes a system partition and a target partition, the processor 201 in the terminal device 200 loads instructions corresponding to processes of one or more application programs into the memory 202 according to the following steps, and the processor 201 runs the application programs stored in the memory 202, so as to implement various functions:
acquiring current time;
judging whether the current time is in a preset time range or not;
when the current time is judged to be in the preset time range, starting a first mode of a firewall, wherein the first mode is a network for forbidding the application programs in a preset list; and
and when the current time is judged not to be in the preset time range, starting a second mode of the firewall.
Referring to fig. 6, fig. 6 is a specific block diagram of a terminal device 300 according to an embodiment of the present invention, where the terminal device 300 may be used to implement the network processing method provided in the foregoing embodiment. The terminal device 300 may be a mobile phone or a tablet.
The RF circuit 310 is used for receiving and transmitting electromagnetic waves, and performing interconversion between the electromagnetic waves and electrical signals, thereby communicating with a communication network or other devices. RF circuitry 310 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, and so forth. RF circuit 310 may communicate with various networks such as the internet, an intranet, a wireless network, or with other devices over a wireless network. The wireless network may comprise a cellular telephone network, a wireless local area network, or a metropolitan area network. The Wireless network may use various Communication standards, protocols and technologies, including but not limited to Global System for Mobile Communication (GSM), Enhanced Mobile Communication (EDGE), Wideband Code Division Multiple Access (WCDMA), Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Wireless Fidelity (Wi-Fi) (e.g., IEEE802.11a, IEEE802.11 b, IEEE802.11g and/or IEEE802.11 n), Voice over Internet Protocol (VoIP), world wide Microwave Access (Microwave for Wireless), Max-1, and other short message protocols, as well as any other suitable communication protocols, and may even include those that have not yet been developed.
The memory 320 may be used to store software programs and modules, such as program instructions/modules corresponding to the network processing method in the above-described embodiments, and the processor 380 executes various functional applications and data processing by running the software programs and modules stored in the memory 320, so as to implement the functions of the network processing method. The memory 320 may include high speed random access memory and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, memory 320 may further include memory located remotely from processor 380, which may be connected to terminal device 300 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input unit 330 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, the input unit 330 may include a touch-sensitive surface 331 as well as other input devices 332. The touch-sensitive surface 331, also referred to as a touch screen or touch pad, may collect touch operations by a user on or near the touch-sensitive surface 331 (e.g., operations by a user on or near the touch-sensitive surface 331 using a finger, a stylus, or any other suitable object or attachment), and drive the corresponding connection device according to a predetermined program. Alternatively, the touch sensitive surface 331 may comprise two parts, a touch detection means and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 380, and can receive and execute commands sent by the processor 380. In addition, the touch-sensitive surface 331 may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. The input unit 330 may comprise other input devices 332 in addition to the touch sensitive surface 331. In particular, other input devices 332 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 340 may be used to display information input by or provided to the user and various graphic user interfaces of the terminal apparatus 300, which may be configured by graphics, text, icons, video, and any combination thereof. The Display unit 340 may include a Display panel 341, and optionally, the Display panel 341 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like. Further, touch-sensitive surface 331 may overlay display panel 341, and when touch-sensitive surface 331 detects a touch operation thereon or thereabout, communicate to processor 380 to determine the type of touch event, and processor 380 then provides a corresponding visual output on display panel 341 in accordance with the type of touch event. Although in FIG. 6, touch-sensitive surface 331 and display panel 341 are implemented as two separate components for input and output functions, in some embodiments, touch-sensitive surface 331 and display panel 341 may be integrated for input and output functions.
The terminal device 300 may also include at least one sensor 350, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel 341 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 341 and/or the backlight when the terminal device 300 is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured in the terminal device 300, detailed descriptions thereof are omitted.
Audio circuitry 360, speaker 361, microphone 362 may provide an audio interface between a user and terminal device 300. The audio circuit 360 may transmit the electrical signal converted from the received audio data to the speaker 361, and the audio signal is converted by the speaker 361 and output; on the other hand, the microphone 362 converts the collected sound signal into an electrical signal, which is received by the audio circuit 360 and converted into audio data, which is then processed by the audio data output processor 380 and then transmitted to, for example, another terminal via the RF circuit 310, or the audio data is output to the memory 320 for further processing. The audio circuit 360 may also include an earbud jack to provide communication of peripheral headphones with the terminal device 300.
The terminal device 300 may assist the user in e-mail, web browsing, streaming media access, etc. through the transmission module 370 (e.g., a Wi-Fi module), which provides the user with wireless broadband internet access. Although fig. 6 shows the transmission module 370, it is understood that it does not belong to the essential constitution of the terminal device 300, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 380 is a control center of the terminal device 300, connects various parts of the entire mobile phone using various interfaces and lines, and performs various functions of the terminal device 300 and processes data by running or executing software programs and/or modules stored in the memory 320 and calling data stored in the memory 320, thereby performing overall monitoring of the mobile phone. Optionally, processor 380 may include one or more processing cores; in some embodiments, processor 380 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 380.
Terminal device 300 also includes a power supply 390 (e.g., a battery) for powering the various components, which may be logically coupled to processor 380 via a power management system in some embodiments to manage charging, discharging, and power consumption management functions via the power management system. The power supply 390 may also include any component including one or more of a dc or ac power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
Although not shown, the terminal device 300 may further include a camera (e.g., a front camera, a rear camera), a bluetooth module, and the like, which are not described in detail herein. Specifically, in this embodiment, the display unit of the terminal device is a touch screen display, the terminal device further includes a memory, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the one or more processors, and the one or more programs include instructions for:
acquiring current time;
judging whether the current time is in a preset time range or not;
when the current time is judged to be in the preset time range, starting a first mode of a firewall, wherein the first mode is a network for forbidding the application programs in a preset list; and
and when the current time is judged not to be in the preset time range, starting a second mode of the firewall.
In specific implementation, the above modules may be implemented as independent entities, or may be combined arbitrarily to be implemented as the same or several entities, and specific implementation of the above modules may refer to the foregoing method embodiments, which are not described herein again.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by instructions controlling associated hardware, and the instructions may be stored in a computer-readable storage medium and loaded and executed by a processor. To this end, the present invention provides a storage medium, in which a plurality of instructions are stored, and the instructions can be loaded by a processor to execute the steps in any network processing method provided by the present invention.
Wherein the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
Since the instructions stored in the storage medium can execute the steps in any network processing method provided in the embodiments of the present invention, the beneficial effects that can be achieved by any network processing method provided in the embodiments of the present invention can be achieved, which are detailed in the foregoing embodiments and will not be described herein again. The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
Embodiments of the present application provide a network processing method and apparatus, a storage medium, and a terminal device, where a firewall intercepts a corresponding application packet according to an identifier within a preset time range to disable a network of an application in a preset list, so as to avoid being disturbed by an unnecessary notification within the preset time range, and to prevent missing of emergency information.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The network processing method and apparatus, the storage medium, and the terminal device provided in the embodiments of the present application are introduced in detail above, and a specific example is applied in the present application to explain the principle and the implementation of the present application, and the description of the above embodiments is only used to help understand the technical solution and the core idea of the present application; those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications or substitutions do not depart from the spirit and scope of the present disclosure as defined by the appended claims.

Claims (10)

1. A network processing method, comprising:
acquiring current time;
judging whether the current time is in a preset time range or not; and
and when the current time is judged to be in the preset time range, starting a first mode of the firewall, wherein the first mode is a network for forbidding the application programs in the preset list.
2. The network processing method of claim 1, wherein the method further comprises:
and when the current time is judged not to be in the preset time range, starting a second mode of the firewall.
3. The network processing method of claim 2, wherein the second mode is a network restoring applications in the predetermined list.
4. The network processing method of claim 1, wherein in the step of turning on a first mode of a firewall, the firewall obtains a unique identifier of an application within the predetermined list; and the firewall intercepts the corresponding application program data packet according to the identifier so as to disable the network of the application programs in the preset list.
5. A network processing apparatus, comprising:
the acquisition module is used for acquiring the current time;
the judging module is used for judging whether the current time is in a preset time range or not; and
and the first starting module is used for starting a first mode of the firewall when the current time is judged to be in the preset time range, wherein the first mode is a network for forbidding the application programs in the preset list.
6. The network processing apparatus of claim 5, wherein the network control module comprises:
and the second starting module is used for starting a second mode of the firewall when judging that the current time is not in the preset time range.
7. The network processing apparatus of claim 6, wherein the second activation module includes a restore submodule for restoring the network of applications in the predetermined list.
8. The network processing apparatus of claim 5, wherein the first enabling module comprises an obtaining sub-module and an intercepting sub-module, the obtaining sub-module is configured to enable the firewall to obtain a unique identifier of the application in the preset list, and the intercepting sub-module is configured to enable the firewall to intercept the corresponding application packet according to the identifier, so as to disable the network of the application in the preset list.
9. A storage medium having stored therein a plurality of instructions adapted to be loaded by a processor to perform the network processing method of any of claims 1 to 4.
10. A terminal device comprising a processor and a memory, the processor being electrically connected to the memory, the memory being configured to store instructions and data, the processor being configured to perform the steps of the network processing method of any one of claims 1 to 4.
CN201911275846.5A 2019-12-12 2019-12-12 Network processing method and device, storage medium and terminal equipment Pending CN111031038A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911275846.5A CN111031038A (en) 2019-12-12 2019-12-12 Network processing method and device, storage medium and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911275846.5A CN111031038A (en) 2019-12-12 2019-12-12 Network processing method and device, storage medium and terminal equipment

Publications (1)

Publication Number Publication Date
CN111031038A true CN111031038A (en) 2020-04-17

Family

ID=70206402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911275846.5A Pending CN111031038A (en) 2019-12-12 2019-12-12 Network processing method and device, storage medium and terminal equipment

Country Status (1)

Country Link
CN (1) CN111031038A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499948A (en) * 2021-12-23 2022-05-13 麒麟软件有限公司 Linux firewall dynamic policy processing method and device and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102355667A (en) * 2011-06-30 2012-02-15 北京邮电大学 Method and system for controlling network connection of application programs in mobile intelligent terminal system
CN104092691A (en) * 2014-07-15 2014-10-08 北京奇虎科技有限公司 Implementation method for implementing root-authority-free networking firewall and client-side
CN104918235A (en) * 2015-06-25 2015-09-16 北京奇虎科技有限公司 Method for controlling mobile terminal network connection and device thereof
CN104955133A (en) * 2014-03-26 2015-09-30 宏达国际电子股份有限公司 Mobile device and method for managing network connection and storage medium
CN106295312A (en) * 2016-08-19 2017-01-04 硕诺科技(深圳)有限公司 A kind of mobile terminal limits the method that application program accesses network
CN106469060A (en) * 2016-08-31 2017-03-01 维沃移动通信有限公司 A kind of processing method of application messages and mobile terminal
CN108363591A (en) * 2018-01-25 2018-08-03 维沃移动通信有限公司 A kind of method and device of PUSH message control
CN109325358A (en) * 2018-08-22 2019-02-12 深圳点猫科技有限公司 Method, electronic equipment based on linux system definition application permission
CN110225204A (en) * 2019-06-25 2019-09-10 北京金山安全软件有限公司 Information pushing method and device and electronic equipment

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102355667A (en) * 2011-06-30 2012-02-15 北京邮电大学 Method and system for controlling network connection of application programs in mobile intelligent terminal system
CN104955133A (en) * 2014-03-26 2015-09-30 宏达国际电子股份有限公司 Mobile device and method for managing network connection and storage medium
CN104092691A (en) * 2014-07-15 2014-10-08 北京奇虎科技有限公司 Implementation method for implementing root-authority-free networking firewall and client-side
CN104918235A (en) * 2015-06-25 2015-09-16 北京奇虎科技有限公司 Method for controlling mobile terminal network connection and device thereof
CN106295312A (en) * 2016-08-19 2017-01-04 硕诺科技(深圳)有限公司 A kind of mobile terminal limits the method that application program accesses network
CN106469060A (en) * 2016-08-31 2017-03-01 维沃移动通信有限公司 A kind of processing method of application messages and mobile terminal
CN108363591A (en) * 2018-01-25 2018-08-03 维沃移动通信有限公司 A kind of method and device of PUSH message control
CN109325358A (en) * 2018-08-22 2019-02-12 深圳点猫科技有限公司 Method, electronic equipment based on linux system definition application permission
CN110225204A (en) * 2019-06-25 2019-09-10 北京金山安全软件有限公司 Information pushing method and device and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499948A (en) * 2021-12-23 2022-05-13 麒麟软件有限公司 Linux firewall dynamic policy processing method and device and storage medium

Similar Documents

Publication Publication Date Title
US10269163B2 (en) Method and apparatus for switching real-time image in instant messaging
CN109819489B (en) Terminal calling method and terminal
US11689655B2 (en) Method for adjusting parameter of audio service and terminal
CN111431882B (en) Data processing method, device and storage medium
CN111654902A (en) Method and device for reducing interference to mobile terminal GPS signal and mobile terminal
CN109688611B (en) Frequency band parameter configuration method, device, terminal and storage medium
CN111008090A (en) Battery electric quantity control method and device, storage medium and terminal equipment
CN110933770B (en) Connection request sending method and device, storage medium and electronic equipment
CN112839326A (en) Network switching method, device, storage medium and gateway equipment
CN111596793A (en) Anti-misoperation method and system, storage medium and terminal equipment
CN111031038A (en) Network processing method and device, storage medium and terminal equipment
CN110891262A (en) Bluetooth pairing method, system and terminal equipment
CN106686210B (en) Incoming call processing method, device and system
CN105635379B (en) Noise suppression method and device
CN112867171B (en) WIFI connection method and device, storage medium and mobile terminal
CN112867078B (en) Base station control method and device and mobile terminal
CN111615101B (en) IMS registration method, device, storage medium and electronic terminal
CN111132275A (en) Method and device for establishing data connection, storage medium and electronic equipment
CN113613310A (en) WIFI connection method and device, storage medium and mobile terminal
CN111600868A (en) Direct connection communication method, core network equipment, mobile terminal and storage medium
CN110913022A (en) Method, device and system for downloading network file of mobile terminal and storage medium
CN111104186A (en) Bluetooth configuration file loading method and device, storage medium and terminal equipment
CN114222340B (en) Network switching method and device and mobile terminal
CN109661023B (en) Mobile terminal control method and device, mobile terminal and storage medium
CN112235874B (en) Method, system, storage medium and mobile terminal for reducing front-end wireless transmission time

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200417

RJ01 Rejection of invention patent application after publication