CN111949471A - Monitoring control method for terminal process - Google Patents

Monitoring control method for terminal process Download PDF

Info

Publication number
CN111949471A
CN111949471A CN201910404704.8A CN201910404704A CN111949471A CN 111949471 A CN111949471 A CN 111949471A CN 201910404704 A CN201910404704 A CN 201910404704A CN 111949471 A CN111949471 A CN 111949471A
Authority
CN
China
Prior art keywords
processes
names
packet
terminal
package
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910404704.8A
Other languages
Chinese (zh)
Inventor
沈卫东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201910404704.8A priority Critical patent/CN111949471A/en
Publication of CN111949471A publication Critical patent/CN111949471A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44594Unloading

Abstract

The invention provides a monitoring control method for a terminal process, which comprises the following steps: s1: adding the newly created package names of the processes to the set to form a set containing the package names of the processes according to the sequence of adding the package names; s2: counting the number of processes corresponding to the packet names in the set according to the packet names of the processes in the set; s3: when the number of processes corresponding to the packet names in the set exceeds a preset value, reserving n processes corresponding to the packet names added into the set, and destroying the processes corresponding to the rest packet names in the set; s4: the package name of each process destroyed is removed from the collection. According to the method and the device, the process searching and killing interval is set, and redundant processes are destroyed in batches instead of closing the processes individually or traversing all running processes, so that the system resource overhead is reduced, the searching and killing speed is higher, and the searching and killing execution efficiency is higher. The method can be used for specifying the object to be searched and killed according to set statistics and traversal sets, and accurately controlling the process to be searched and killed.

Description

Monitoring control method for terminal process
Technical Field
The invention relates to a process monitoring technology of a mobile terminal, in particular to a monitoring control method for a terminal process.
Background
With the great popularization of the intelligent terminal, a user not only pays attention to the appearance and the visual effect of the intelligent terminal, but also pays more and more attention to the performance problem and the power consumption problem of the intelligent terminal, such as the power consumption speed of the terminal, smoothness of running, the memory use condition, the application program starting speed and other performance indexes. The available calculation and storage resources inside the intelligent terminal are usually limited, and when the intelligent terminal interacts with a user, if the terminal opens too many applications, the problems of power consumption, performance and the like of the terminal are influenced.
Moreover, many three-party applications have self-starting and wake-up situations by associated applications. For example, the user does not open the hundred-degree library, but only opens the hundred-degree video, the hundred-degree search, and the like, the user wakes up the hundred-degree library, and even after the user closes the applications, the applications can be woken up by other applications or actions such as turning on a screen and turning on a screen of a mobile phone. Some applications may default to a timed wake-up service or, when one application exits, send a message to start another application or service. There are also many services that do not provide an interface visible or operable by the user, but rather run in the background.
Therefore, in the process of interaction between the user and the intelligent terminal, if the application cannot be actively closed, a large number of processes may be running simultaneously, and some processes hang in the background and occupy system resources, thereby affecting the application interacting with the user and causing problems of high power consumption of the terminal and the like.
Some terminals set critical values and maximum values for processes running in the background, for example, the terminals are allowed to run 5 processes or services at most, when the 6 th process is opened, the first process to be opened is closed, and when the first process to be opened is opened, a redundant process is closed every time the first process to be opened is opened, which is an existing mechanism for controlling the processes running in the background of the terminals at the same time. The other monitoring method is to allocate a monitoring thread to each running process, set different priorities and report the working processes of the running processes.
Therefore, a method for helping a user to actively control the number of processes that a terminal can run simultaneously, which is convenient and efficient, is needed to improve the terminal use experience of the user.
Disclosure of Invention
In order to solve the above problem, the present invention provides a monitoring control method for a terminal process, where the method includes:
s1: adding the newly created package names of the processes to the set to form a set containing the package names of the processes according to the sequence of adding the package names;
s2: counting the number of processes corresponding to the packet names in the set according to the packet names of the processes in the set;
s3: when the number of processes corresponding to the packet names in the set exceeds a preset value, reserving n processes corresponding to the packet names added into the set, and destroying the processes corresponding to the rest packet names in the set;
s4: the package name of each process destroyed is removed from the collection.
Further, step S1 specifically includes:
s11: judging whether a package name of a newly created process exists in the set;
s12: and if the process name does not exist, adding the newly created process package name to a set so as to form a set containing the process package names according to the sequence of adding the package names.
Further, the data type of the packet name is String, and the set is a set of packet names of processes of which the type is String.
Further, step S3 specifically includes:
s31: when the number of processes corresponding to the packet names in the set exceeds a preset value, traversing the processes corresponding to all the packet names in the set according to the packet names of the processes in the set;
s32: except for n processes corresponding to the packet names added into the set, acquiring processes corresponding to other packet names in the set;
s33: and destroying the processes corresponding to the rest of the packet names one by one.
Further, step S4 specifically includes:
s41, obtaining the information that the process corresponding to the rest packet names in the set is destroyed;
s42: judging whether the packet names of all destroyed processes exist in the set;
s43: and if so, removing the packet name of each destroyed process from the set.
Further, the preset value in step S3 is determined according to at least one of the following: the CPU, memory and terminal system performance of the terminal.
Further, the determination of n is based on at least one of the following: the CPU, memory and terminal system performance of the terminal.
Further, the preset value in step S3 is 8.
Further, n is 4.
The present invention also provides a computer-readable storage medium storing a computer-readable program for implementing the above-described method.
Compared with the prior art, the invention has the following advantages or beneficial effects:
1. according to the method and the device, the process searching and killing interval is set, and redundant processes are destroyed in batches instead of closing the processes individually or traversing all running processes, so that the system resource overhead is reduced, the searching and killing speed is higher, and the searching and killing execution efficiency is higher.
2. The invention can be used for traversing the set according to the set statistics and appointing the object to be killed, namely accurately controlling the process to be killed.
3. When the destroyed process is removed from the set, the feedback result of the destruction of the system process is taken as a judgment condition, and the destroyed object package name is removed from the set after the process or the application resource is destroyed.
4. The phenomena of large power consumption, overlarge memory occupation, unsmooth mobile phone card and the like in the interaction process of the mobile terminal and the user are reduced, the smoothness of application operation is improved, and the user experience is improved.
Drawings
The scope of the invention will be better understood from the following detailed description of exemplary embodiments when read in conjunction with the accompanying drawings, in which:
fig. 1 is a flowchart of a monitoring control method for a terminal process according to the present invention;
FIG. 2 is a flow diagram of adding a package name of a process to a collection according to an embodiment of the invention;
FIG. 3 is a flowchart of step S3 according to an embodiment of the present invention;
FIG. 4 is a flow chart of removing a package name according to an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, embodiments of the present invention are described in detail below with reference to the accompanying drawings and examples, so that how to apply technical means to solve technical problems and achieve a technical effect can be fully understood and implemented.
Example one
First, an application scenario of a monitoring control method for a terminal process provided by the present invention is set in a mobile terminal, fig. 1 is a flowchart of the monitoring control method for the terminal process of the present invention, and each step is described in detail below with reference to fig. 1. As shown in fig. 1, the method mainly comprises the following steps:
s1: and adding the package names of the newly created processes to the set so as to form a set containing the package names of the processes according to the sequence of adding the package names.
In step S1, the collection may be a String type data collection for storing the package name of the management process. Each packet name in the set has its own number, for example, the number of the first packet name added into the set is 0, the number of the second packet name is 1, and so on, to clarify the sequence of the process addition. Fig. 2 is a flowchart of adding a package name of a process to a set according to an embodiment of the present invention, and as shown in fig. 2, step S1 specifically includes:
s11: judging whether a package name of a newly created process exists in the set;
s12: and if the process name does not exist, adding the newly created process package name to a set so as to form a set containing the process package names according to the sequence of adding the package names.
If a new process is created, the object of the process listener acquires a message of the process creation, the message includes the package name of the process, and stores the package name into the set in step S1, after the application obtains the package name of the String type, it first determines whether the package name exists in the set, and if not, the package name of the String type is added to the set.
S2: and counting the number of the processes corresponding to the packet names in the set according to the packet names of the processes in the set.
S3: and when the number of the processes corresponding to the packet names in the set exceeds a preset value, reserving n processes corresponding to the packet names added into the set, and destroying the processes corresponding to the rest packet names in the set. And destroying the background running process in the terminal in batch.
Specifically, the preset value and n can be determined according to the performances of other terminals such as a CPU, a memory, a terminal system, and the like of the terminal and according to actual conditions, so as to ensure that the running condition is good when the terminal runs the processes of which the number is less than or equal to the number of the preset value, and the occurrence of situations that influence user experience such as blocking does not occur. In the present embodiment, the preset value is 8, and n is 4. Fig. 3 is a flowchart of step S3 according to an embodiment of the present invention, and as shown in fig. 3, step S3 specifically includes:
s31: when the number of processes corresponding to the packet names in the set exceeds a preset value, traversing the processes corresponding to all the packet names in the set according to the packet names of the processes in the set;
s32: except for n processes corresponding to the packet names added into the set, acquiring processes corresponding to other packet names in the set;
s33: and destroying the processes corresponding to the rest of the packet names one by one.
In this embodiment, when the number of processes run by the terminal is greater than 8, the process corresponding to the packet name in the set is traversed, and the packet names after the 4 th packet name in the set, that is, the rest of the packet names in the set except for the 4 newly added packet names in the set, are taken out one by one. The invention can be used for traversing the set according to the set statistics and appointing the object to be killed, namely accurately controlling the process to be killed.
S4: the package name of each process destroyed is removed from the collection. Fig. 4 is a flowchart of removing a package name according to an embodiment of the present invention, and as shown in fig. 4, S4 specifically includes:
s41, obtaining the information that the process corresponding to the rest packet names in the set is destroyed;
s42: judging whether the packet names of all destroyed processes exist in the set;
s43: and if so, removing the packet name of each destroyed process from the set.
In this embodiment, the onoldappprocessded method at the application end obtains the information that the process has been destroyed from the object of the process listener, then determines whether the package name of each destroyed process exists in the set, and if the package name of the destroyed process also exists in the set, removes the package name from the set, which indicates that the process has been completely destroyed. When the packet name of the destroyed process is removed from the set, the feedback result of the process destruction of the object of the listener is taken as a judgment condition, and the packet name of the process is removed from the set after the process is destroyed.
By the method, when the terminal is in bright screen interaction with a user, the processes running in the terminal are controlled within the interval from 4 to 8, the searching and killing method is triggered every time when the number of the processes exceeds 8, and the processes except the previous 4 running processes of the terminal are destroyed. The invention controls through the interval value, such as [ 4,8 ], thus not only not influencing the interactive application of the user, but also reducing the power consumption of the terminal, reducing the resource occupation and operating smoothly. Meanwhile, when the package names are added into the set, the package names are added according to the sequence of the numbers, the corresponding package names are obtained through the numbers, then, a process destroying method is called, and searching and killing are carried out through the package names. According to the method and the device, the process searching and killing interval is set, and redundant processes are destroyed in batches instead of closing the processes individually or traversing all running processes, so that the system resource overhead is reduced, the searching and killing speed is higher, and the searching and killing execution efficiency is higher.
By the method, the number of applications running in the terminal can be strictly controlled within a set interval range, in the embodiment, the interval range is [ 4,8 ], that is, the maximum number of processes capable of running simultaneously is 8, and when the 9 th process is found, a killing condition is triggered, so that some processes are closed. The preset value is set mainly according to the comprehensive setting of a terminal CPU, a memory and a mobile phone system, the faster the CPU processes, the strong performance of the terminal is shown, a plurality of applications can be considered simultaneously, the memory is a terminal resource, each application needs the memory when running, and the larger the memory is, the more applications can be accommodated and run simultaneously; the smoother the terminal system, the faster the logic and speed of processing. The application preset values which can run simultaneously can be flexibly changed according to the actual situation of the terminal equipment and the test verification data, so that the power consumption, the memory and the CPU utilization rate of the terminal are optimized.
Before implementing the present invention, a series of basic constructions have been performed in a system of a mobile terminal, in this embodiment, the mobile terminal uses an Android (Android) system, and the specific construction process is as follows:
1) in a framework layer of an Android system, a process creation identifier can be added to an information file describing a running process, wherein the information file can be a processdocument. The process creation identification may indicate the current state of the process, e.g., true (true) may indicate that the process has been created and false (false) may indicate that the process has been destroyed. When the process is created for the first time, the process creation identifier is set to true, and when the process is destroyed, the process creation identifier is set to false.
2) A process monitor is set in a basic core code block of a frame layer of an Android system, and in this embodiment, the process monitor may be iappprocesslist. The system method interface is provided with a process creating (onNewAppProcessCreated) and destroying (onoldappprocessded). The process monitor can acquire the information created by the process through the system method interface created by the process, and can also acquire the information destroyed by the process through the system method interface destroyed by the process.
3) Communication data exchange rules of process monitor registration and unregistration are added in a client and server method file of management system Binder communication of a framework layer of an Android system, and in the embodiment, the method file can be ActivityManagerNative. The exchange rules may enable mutual communication between processes.
4) The registration and unregistration actions of the process monitor are numbered and registered in an Application Programming Interface (API) file of a frame layer of the Android system, and in this embodiment, the API file of the system may be iactivtymanager.
5) In this embodiment, the activity management service file may be activitymanager service. In which it can be determined whether a process has been created. If the process is created for the first time, calling a process creation notification method (onNewAppProcessCreated) in the process listener, providing application package name information corresponding to the created process, and setting a process creation identifier to true by calling the process creation notification method to indicate that the process is created; if the process is destroyed, a process destruction notification method (onOldAppProcessDied) of the process listener is called in the monitoring code destroyed by the process, an application package name corresponding to the process destruction is provided, and the process creation identifier is set to false by calling the process destruction notification method. When the process is created, if the process is created for the first time, the process mark creation identifier is set to true; if the process is destroyed, the process creation identification is set to false.
6) And creating an object of a process monitor at the application end according to the Binder communication rule, rewriting the two methods to enable the object of the process monitor to be available, and registering the object of the process monitor to be effective, so that the creation and the destruction of the process can be monitored by the object of the monitor at the application end. The object of the process listener can also be used to obtain the package name of the process. If the process is created for the first time, at this time, the process creation identifier is set to true, and the object process of the process listener is notified that the object process has been created; before the process is not destroyed, the process creation identifier is always kept true, the process is invalid after being created again, and at the moment, the object of the process monitor does not need to be notified again; if the process is destroyed, at this point the process creation flag is set to false and the process listener is notified that the object process is destroyed.
Furthermore, the present invention also provides a computer-readable storage medium in which a system program for monitoring control of a terminal process is stored, which when executed by a processor implements the above-described monitoring control method for a terminal process of the present invention. In the specific application: the storage medium can be arranged at a server side or a client side, and the process of the terminal can be monitored and controlled through a network, so that the excessive process running at the terminal can be effectively closed in time.
The terminal mentioned in the invention can be a mobile terminal, including a smart phone, a tablet computer, a palm computer and various common portable mobile intelligent terminals. In addition, the processes mentioned in the present invention may include application processes and other services of the terminal.
The above embodiments are only specific embodiments of the present invention. It is obvious that the invention is not limited to the above embodiments, but that many variations are possible. All modifications attainable by one versed in the art from the present disclosure within the scope and spirit of the present invention are to be considered as within the scope and spirit of the present invention.

Claims (10)

1. A monitoring control method for a terminal process is characterized by comprising the following steps:
s1: adding the newly created package names of the processes to the set to form a set containing the package names of the processes according to the sequence of adding the package names;
s2: counting the number of processes corresponding to the packet names in the set according to the packet names of the processes in the set;
s3: when the number of processes corresponding to the packet names in the set exceeds a preset value, reserving n processes corresponding to the packet names added into the set, and destroying the processes corresponding to the rest packet names in the set;
s4: the package name of each process destroyed is removed from the collection.
2. The monitoring control method for the terminal process according to claim 1, wherein the step S1 specifically includes:
s11: judging whether a package name of a newly created process exists in the set;
s12: and if the process name does not exist, adding the newly created process package name to a set so as to form a set containing the process package names according to the sequence of adding the package names.
3. The snoop control method for terminal processes according to claim 1 or 2, wherein the data type of the packet name is String, and the set is a set of packet names of processes of type String.
4. The monitoring control method for the terminal process according to claim 1, wherein the step S3 specifically includes:
s31: when the number of processes corresponding to the packet names in the set exceeds a preset value, traversing the processes corresponding to all the packet names in the set according to the packet names of the processes in the set;
s32: except for n processes corresponding to the packet names added into the set, acquiring processes corresponding to other packet names in the set;
s33: and destroying the processes corresponding to the rest of the packet names one by one.
5. The monitoring control method for the terminal process according to claim 1, wherein the step S4 specifically includes:
s41, obtaining the information that the process corresponding to the rest packet names in the set is destroyed;
s42: judging whether the packet names of all destroyed processes exist in the set;
s43: and if so, removing the packet name of each destroyed process from the set.
6. The interception control method for a terminal process according to claim 1, wherein the predetermined value in step S3 is determined according to at least one of the following: the CPU, memory and terminal system performance of the terminal.
7. The snoop control method for a terminal process as claimed in claim 6, wherein said n is determined according to at least one of the following: the CPU, memory and terminal system performance of the terminal.
8. The snoop control method for terminal processes according to claim 1, wherein said preset value in step S3 is 8.
9. The snoop control method for a terminal process as claimed in claim 8, wherein n is 4.
10. A computer-readable storage medium storing a computer-readable program for implementing the method of claims 1 to 9.
CN201910404704.8A 2019-05-16 2019-05-16 Monitoring control method for terminal process Pending CN111949471A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910404704.8A CN111949471A (en) 2019-05-16 2019-05-16 Monitoring control method for terminal process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910404704.8A CN111949471A (en) 2019-05-16 2019-05-16 Monitoring control method for terminal process

Publications (1)

Publication Number Publication Date
CN111949471A true CN111949471A (en) 2020-11-17

Family

ID=73336632

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910404704.8A Pending CN111949471A (en) 2019-05-16 2019-05-16 Monitoring control method for terminal process

Country Status (1)

Country Link
CN (1) CN111949471A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116048646A (en) * 2022-07-01 2023-05-02 荣耀终端有限公司 Process processing method and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1670705A (en) * 2004-03-16 2005-09-21 联想(北京)有限公司 A method for implementing centralized concurrent management to cluster
US20140229770A1 (en) * 2013-02-08 2014-08-14 Red Hat, Inc. Method and system for stack trace clustering
CN104050035A (en) * 2014-05-14 2014-09-17 小米科技有限责任公司 Processing method and device for application program
CN105528052A (en) * 2015-12-09 2016-04-27 上海斐讯数据通信技术有限公司 Electronic equipment power consumption reduction method and device and electronic equipment with display screen
CN106201698A (en) * 2016-07-15 2016-12-07 北京金山安全软件有限公司 Method and device for managing application program and electronic equipment
WO2016206171A1 (en) * 2015-06-26 2016-12-29 宇龙计算机通信科技(深圳)有限公司 Secure networking method based on network isolation, and terminal
CN106775975A (en) * 2016-12-08 2017-05-31 青岛海信移动通信技术股份有限公司 Process scheduling method and device
CN107479953A (en) * 2017-07-31 2017-12-15 广东欧珀移动通信有限公司 process management method, device, storage medium and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1670705A (en) * 2004-03-16 2005-09-21 联想(北京)有限公司 A method for implementing centralized concurrent management to cluster
US20140229770A1 (en) * 2013-02-08 2014-08-14 Red Hat, Inc. Method and system for stack trace clustering
CN104050035A (en) * 2014-05-14 2014-09-17 小米科技有限责任公司 Processing method and device for application program
WO2016206171A1 (en) * 2015-06-26 2016-12-29 宇龙计算机通信科技(深圳)有限公司 Secure networking method based on network isolation, and terminal
CN105528052A (en) * 2015-12-09 2016-04-27 上海斐讯数据通信技术有限公司 Electronic equipment power consumption reduction method and device and electronic equipment with display screen
CN106201698A (en) * 2016-07-15 2016-12-07 北京金山安全软件有限公司 Method and device for managing application program and electronic equipment
CN106775975A (en) * 2016-12-08 2017-05-31 青岛海信移动通信技术股份有限公司 Process scheduling method and device
CN107479953A (en) * 2017-07-31 2017-12-15 广东欧珀移动通信有限公司 process management method, device, storage medium and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李维勇: "《Android应用开发项目化教程》", 31 December 2017 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116048646A (en) * 2022-07-01 2023-05-02 荣耀终端有限公司 Process processing method and electronic equipment

Similar Documents

Publication Publication Date Title
CN107018175B (en) Scheduling method and device of mobile cloud computing platform
CN109152095B (en) Wireless network connection method for terminal
CN109064345A (en) Message treatment method, system and computer readable storage medium
CN105100032B (en) A kind of method and device for preventing resource from stealing
CN111813516B (en) Resource control method and device, computer equipment and storage medium
KR102094066B1 (en) Method and device for processing data for mobile games
CN110232010A (en) A kind of alarm method, alarm server and monitoring server
CN111800462A (en) Micro-service instance processing method and device, computer equipment and storage medium
WO2020094036A1 (en) Wireless network connection method for terminal
CN111813573B (en) Communication method of management platform and robot software and related equipment thereof
CN108984687B (en) Automatic group adding control method and device based on user behaviors and storage medium
CN112468409A (en) Access control method, device, computer equipment and storage medium
CN110290190A (en) A kind of method, monitored device and monitoring server acquiring data
CN107797859A (en) A kind of dispatching method of timed task and a kind of dispatch server
CN106571933A (en) Service processing method and device
CN114490089A (en) Cloud computing resource automatic adjusting method and device, computer equipment and storage medium
CN111949471A (en) Monitoring control method for terminal process
CN109388501A (en) Communication matching process, device, equipment and medium based on recognition of face request
CN112650614A (en) Call chain monitoring method and device, electronic equipment and storage medium
CN112286930A (en) Method, device, storage medium and electronic equipment for resource sharing of redis business side
CN113867927A (en) Resource allocation method, device, electronic equipment and storage medium
CN109086115B (en) Android animation execution method, device, terminal and readable medium
CN111949385A (en) Monitoring control method for terminal process
CN113672292A (en) Equipment awakening method and device, electronic equipment and computer storage medium
CN113407301A (en) Virtual machine monitoring method, system, storage medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination