CN113315687A - Proxy network management method, device, storage medium and terminal - Google Patents

Proxy network management method, device, storage medium and terminal Download PDF

Info

Publication number
CN113315687A
CN113315687A CN202110575316.3A CN202110575316A CN113315687A CN 113315687 A CN113315687 A CN 113315687A CN 202110575316 A CN202110575316 A CN 202110575316A CN 113315687 A CN113315687 A CN 113315687A
Authority
CN
China
Prior art keywords
application
network
attribute
proxy
virtual private
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110575316.3A
Other languages
Chinese (zh)
Other versions
CN113315687B (en
Inventor
候祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202110575316.3A priority Critical patent/CN113315687B/en
Publication of CN113315687A publication Critical patent/CN113315687A/en
Application granted granted Critical
Publication of CN113315687B publication Critical patent/CN113315687B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Abstract

The embodiment of the application discloses a proxy network management method, a proxy network management device, a proxy network management storage medium and a proxy network management terminal. The method comprises the following steps: when a virtual private network is connected and an application is run, network attribute information of the application is obtained, if the network attribute information indicates that a proxy network attribute corresponding to the application is a first attribute, an operator network is selected to run the application, and the first attribute is that the application cannot be run by using the virtual private network. By the method, when the user uses the VPN to operate the domestic application, the user does not need to frequently and manually connect or disconnect the VPN, the terminal can judge whether the current application uses the VPN to operate or not when the current application operates, and convenience of using the domestic application under the condition of connecting the VPN can be improved.

Description

Proxy network management method, device, storage medium and terminal
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method, an apparatus, a storage medium, and a terminal for proxy network management.
Background
With the development of the internet, Virtual Private Networks (VPNs) are also applied more and more widely in enterprise networks or daily life. The virtual private network is mainly used for establishing a private network on a public network to carry out encryption communication. In the prior art, a domestic user selects to download a VPN application and run the VPN application in order to access a foreign website or use a foreign application, and a mobile phone network is also an operator network where the VPN network is not proper. However, if the user uses the domestic application when connecting to the VPN network, since the domestic application servers are domestic, the domestic application servers cannot be accessed when connecting to the VPN network, and the domestic application cannot be used unless the VPN network is disconnected manually.
Disclosure of Invention
The embodiment of the application provides a proxy network management method, a proxy network management device, a computer storage medium and a terminal, and aims to solve the technical problem of how to improve the convenience of using domestic applications when a VPN network is connected. The technical scheme is as follows:
in a first aspect, an embodiment of the present application provides a proxy network management method, where the method includes:
when a virtual private network is connected and an application is run, network attribute information of the application is acquired;
and if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, selecting an operator network to operate the application, wherein the first attribute is that the application cannot be operated by using the virtual private network.
In a second aspect, an embodiment of the present application provides a proxy network management apparatus, where the apparatus includes:
the system comprises an attribute acquisition module, a network attribute acquisition module and a network attribute acquisition module, wherein the attribute acquisition module is used for acquiring network attribute information of an application when the virtual private network is connected and the application is operated;
a network running module, configured to select an operator network to run the application if the network attribute information indicates that a proxy network attribute corresponding to the application is a first attribute, where the first attribute is that the application may not be run using the virtual private network.
In a third aspect, embodiments of the present application provide a computer storage medium having a plurality of instructions adapted to be loaded by a processor and to perform the above-mentioned method steps.
In a fourth aspect, an embodiment of the present application provides a terminal, which may include: a memory and a processor; wherein the memory stores a computer program adapted to be loaded by the memory and to perform the above-mentioned method steps.
The beneficial effects brought by the technical scheme provided by the embodiment of the application at least comprise:
in the embodiment of the application, when a terminal is connected to a virtual private network and runs an application, network attribute information of the application is acquired, if the network attribute information indicates that a proxy network attribute corresponding to the application is a first attribute, an operator network is selected to run the application, and the first attribute is that the application cannot be run by using the virtual private network. By the method, when the user uses the VPN to operate the domestic application, the user does not need to frequently and manually connect or disconnect the VPN, the terminal can judge whether the current application uses the VPN to operate or not when the current application operates, and convenience of using the domestic application under the condition of connecting the VPN can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a proxy network management method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a proxy network management method according to an embodiment of the present application;
fig. 3 is a schematic interface diagram in a proxy network management method according to an embodiment of the present application;
fig. 4 is a schematic interface diagram in another proxy network management method according to an embodiment of the present application;
fig. 5 is a schematic interface diagram in another proxy network management method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a proxy network management device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a terminal according to an embodiment of the present application;
FIG. 8 is a schematic structural diagram of an operating system and a user space provided in an embodiment of the present application;
FIG. 9 is an architectural diagram of the android operating system of FIG. 7;
FIG. 10 is an architecture diagram of the IOS operating system of FIG. 7.
Detailed Description
In order to make the objects, features and advantages of the embodiments of the present application more obvious and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of the present application, it is to be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In the description of the present application, it is noted that, unless explicitly stated or limited otherwise, "including" and "having" and any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art. Further, in the description of the present application, "a plurality" means two or more unless otherwise specified. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
The present application will be described in detail with reference to specific examples.
In the following method embodiments, for convenience of description, only the main execution body of each step is described as a terminal.
Fig. 1 is a schematic flow chart of a proxy network management method according to an embodiment of the present application. As shown in fig. 1, the method of the embodiment of the present application may include the steps of:
s101, when the virtual private network is connected and the application is operated, network attribute information of the application is obtained.
Wherein a virtual private network refers to a private network established over a public network. The virtual private network, VPN for short, is a virtual private communication network established in a public network by means of an Internet Service provider isp (Internet Service provider) and a network Service provider nsp (network Service provider). The principle is that a tunnel technology is utilized to encapsulate VPN messages in a tunnel, a VPN backbone network is utilized to establish a special data transmission channel, and transparent transmission of the messages is realized. Tunneling uses one protocol to encapsulate another protocol packet, and the encapsulation protocol itself may be encapsulated or carried by another encapsulation protocol.
The network attribute information mainly comprises two kinds of network attribute information of one application, wherein one kind of network attribute information is that the application cannot be operated by using an operator network, but the application can be operated by using VPN; another is that the application may not be run using a VPN but may be run using an operator network. It is understood that the applications in the software store may include applications in the chinese area and may also include applications in non-chinese areas. In the related art, when a user connects to a VPN, a default global mode is set, that is, all network data of the terminal is transmitted through the VPN. In general, the scenario for a user to connect to a VPN is: therefore, based on this scenario, if a global-mode VPN is used, the IP address of the terminal cannot access a domestic server, that is, cannot use domestic applications, and thus applications in non-chinese areas may correspond to the first network attribute information. Since most of the servers of the application in the chinese area are in China, these servers cannot be accessed when connecting the VPN, and these applications cannot be used, the application in the chinese area corresponds to the second network attribute information.
Specifically, after the user connects the VPN to the terminal, the user opens an application and uses the application, and the terminal can obtain the network attribute information of the application from the local, since the network attribute information of each application is stored locally. It can be understood that the terminal may determine the network attribute information of each application in advance, and then store the network attribute of each application locally, so that when the application is run while the VPN is connected, the network attribute information of the application may be directly obtained.
S102, if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, selecting an operator network to operate the application, wherein the first attribute is that the application cannot be operated by using the virtual private network.
The proxy network attribute mainly comprises a first attribute and a second attribute. The first attribute is that an application can be run using an operator network, but cannot be run using a VPN, and the first attribute is for an application in a chinese region. The second attribute is that the application may not be run using the operator network but may be run using VPN, and the second attribute is for applications in non-chinese areas.
Specifically, since the terminal locally stores the network attribute information of each application, if the terminal obtains the network attribute information of the current application, it can be determined that the current application belongs to the first attribute, that is, the current application is an application in a chinese area, the application can be run by using an operator network, and the current application cannot be run by using a VPN. It can be understood that, if the terminal can determine that the current application belongs to the second attribute, that is, the current application is an application in a non-chinese area, the application may be run using the VPN, and the current application may not be run using the operator network.
In the embodiment of the application, when a terminal is connected to a virtual private network and runs an application, network attribute information of the application is acquired, if the network attribute information indicates that a proxy network attribute corresponding to the application is a first attribute, an operator network is selected to run the application, and the first attribute is that the application cannot be run by using the virtual private network. By the method, when the user uses the VPN to operate the domestic application, the user does not need to frequently and manually connect or disconnect the VPN, the terminal can judge whether the current application uses the VPN to operate or not when the current application operates, and convenience of using the domestic application under the condition of connecting the VPN can be improved.
Please refer to fig. 2, which is a flowchart illustrating a proxy network management method according to an embodiment of the present disclosure. As shown in fig. 2, the method of the embodiment of the present application may include the steps of:
s201, when the virtual private network is connected and the application is operated, sending an inquiry request containing an application package name of the application to a regional server corresponding to an operator network, wherein the inquiry request is used for indicating whether the regional server inquires a database to determine whether the application package name exists.
The area server refers to a server in a china area and a server in a non-china area.
Specifically, after the terminal is powered on, when the terminal accesses the operator network, the country region to which the current operator network belongs may be determined. For example, the terminal is currently located in china, and it can be determined that the country to which the operator network belongs is china at this time. The terminal is currently located in the united states, and it can be determined that the country to which the operator network belongs at this time is the united states. Further, after determining the country region to which the current operator network belongs, the terminal may switch the application resource in the software store built in the terminal to the application resource in the country region to which the operator network belongs. Therefore, the user can conveniently and directly download the application in the country region without switching the account numbers of the software stores in different country regions. It is understood that the application package names of the respective applications in the application resources of the different country regions may also be stored in the database of the corresponding region server. Further, the terminal may transmit all network data through the VPN according to an operation instruction of the user to connect to the VPN, and when the terminal recognizes that the user uses an application for the first time when the user connects to the VPN, the terminal may send an inquiry request to a regional server corresponding to the operator network, where the inquiry request includes an application package name of the application. The query request mainly indicates the area server to search whether the application package name exists in the database.
For example: when the current user is in a Chinese area, the terminal recognizes that the operator network belongs to the Chinese area, and the terminal can switch the application resources of the built-in software store to the application resources of the Chinese area, namely, the applications in the software store are all the applications in the Chinese area. Further, if the user connects to the VPN, all network data of the terminal is transmitted through the VPN, if the user connects to the VPN so that the IP address of the terminal is changed to the american IP address, the terminal mainly accesses the american website and uses the american application by using the VPN, but the user uses an application installed in a china area for the first time when connecting to the VPN, such as "article APP", the terminal may query a request to a server in the china area to indicate whether an application package name corresponding to the "article APP" is stored in a server query database in the china area.
It can be understood that the operation instruction for connecting the VPN by the user may be an operation instruction for connecting the VPN by the user in the VPN application, or an operation instruction for connecting the VPN by the user in a system setting interface of the terminal. Referring to the interface schematic diagram shown in fig. 3, which may be an interface schematic diagram of a VPN application, a user clicks on the circular area shown in 310, that is, the VPN can be connected, and the user can select a line to be used according to a requirement. Referring to the system setting interface schematic diagram shown in fig. 4, a user may click on a switch control corresponding to "VPN 1" or "VPN 2" to connect to a VPN in the setting interface. Optionally, the user may also configure the VPN connection himself.
S202, receiving a query result corresponding to the query request, and generating a proxy network configuration table based on the query result.
It is understood that the query result includes two types of query results, one is to query the application package name of the application in the database, and the result indicates that the application belongs to the application of the current country region; the other is that the package name of the application is not queried in the database, and the result indicates that the current application does not belong to the application in the current country region. If the first query result is obtained, the proxy network attribute of the application is set as a first attribute, that is, the application can be run by using the operator network but cannot be run by using the VPN, and the first attribute and the application package name of the application are stored in a proxy network configuration table, which can be locally stored. If the second query result is obtained, the proxy network attribute of the application is set as the second attribute, and the second attribute means that the application cannot be run using the operator network but can be run using the VPN, and the second attribute and the packet name of the application are stored in the proxy network configuration table, and similarly, the proxy network configuration table may be locally stored.
It is understood that the proxy network configuration table stores proxy network attributes of all applications of the current country region. However, for an application that has never run when connecting to a VPN, the proxy network attribute in the proxy network configuration table is empty, and it is not explicitly specified whether the application can run using the VPN or the operator network, and only when connecting to a VPN and running the reference, the terminal can determine the proxy network attribute of the application, that is, the execution of step S201 and step S202 can determine the proxy network attribute of the application. For applications that have run while connecting to a VPN, their proxy network attribute information in the proxy network configuration table is present. Because the terminal can determine the proxy network attribute of the application when the application is operated for the first time by connecting the VPN, the proxy network attribute is either the first attribute or the second attribute, and the terminal stores the proxy network attribute in the proxy network configuration table, when the application is operated by subsequently connecting the VPN again, the terminal can directly acquire the network attribute information of the application from the proxy network configuration table and directly select the corresponding network to operate the application. For example, see table 2.1, which is a table of proxy network configurations for applications in a portion of the chinese region. As can be seen from table 2.1, the application corresponding to cn.xuexi.android is "strong learning country", and the proxy network attribute thereof is the first attribute; com, taobao, wherein the corresponding application is 'Taobao', and the proxy network attribute of the application is a first attribute; the application corresponding to com.eg.android.AlipayGphone is 'Paibao', and the proxy network attribute of the Paibao is a first attribute; com, cainiao, wireless corresponding application is 'parcel of vegetable and bird', and the proxy attribute is null; com, alibaba, and average, is "nailed," with the proxy attribute null.
Table 2.1 proxy network configuration table
Name of application package Proxy network attributes
cn.xuexi.android First attribute
com.taobao.taobao First attribute
com.eg.android.AlipayGphone First attribute
com.cainiao.wireless Air conditioner
com.alibaba.andriod.rimet Air conditioner
Specifically, the terminal may receive a query result of the server for the query request, determine a proxy network attribute of the application indicated by the query result, generate a proxy network configuration table, and store the application packet name and the proxy network attribute of the application in the proxy network configuration table. Because other applications are not operated when connecting the VPN, the terminal does not know the proxy network attribute of other applications, and the proxy attributes of other applications can be temporarily stored in an unknown state and also stored in a proxy network configuration table.
S203, obtaining the network attribute information of the application from the proxy network configuration table.
Specifically, the terminal connects to the VPN and runs an application, sends an inquiry request including the application to the area server, receives an inquiry result corresponding to the inquiry request, generates a proxy network configuration table according to the inquiry result, and then can acquire network attribute information of the application from the proxy network configuration table.
S204, if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, selecting an operator network to operate the application, wherein the first attribute is that the application cannot be operated by using the virtual private network.
Specifically, if the terminal queries that the proxy network attribute corresponding to the application is the first attribute, it indicates that the application needs to be run by using the operator network, and the application cannot be run by using the VPN. For example, when the user is currently in china, the IP address of the terminal is changed to the IP address of the united states after the user connects to the VPN, the user uses the application "destination", and the terminal determines that the application corresponds to the first attribute, that is, the application can only be operated using the operator network, and the application cannot be operated using the VPN.
S205, if the network attribute information indicates that the proxy network attribute corresponding to the application is a second attribute, selecting the virtual private network to run the application, where the second attribute is that the application can be run using the virtual private network.
Specifically, if the terminal queries that the proxy network attribute corresponding to the application is the second attribute, it indicates that the application needs to use a VPN for operation, and the application cannot be operated using an operator network. For example, when the user is currently in china, the IP address of the terminal becomes the IP address of the united states after the user connects to the VPN, the user uses the application "Gmail", and the terminal determines that the application corresponds to the second attribute, that is, the application can only be operated using the VPN, and the application cannot be operated using the operator network.
S206, if the country region is determined to be changed by scanning the operator network, clearing the proxy network configuration table.
Specifically, if the terminal determines that the country region changes by scanning the operator network, that is, the terminal is in a new country region, the terminal performs an emptying process on the proxy network configuration table generated before, where the emptying process may be understood as deleting the proxy network configuration table or setting all the applied proxy network attributes in the proxy network configuration table as null attributes. In addition, it can be understood that, if the user performs an opening operation on the function control of "restore factory settings" on the system setting interface of the terminal, the terminal may also perform an emptying process on the previously generated proxy network configuration table.
It should be noted that, in the present embodiment, the execution of steps S201 to S206 is based on that the user executes the open instruction for the control of the "proxy network management function" on the setting interface. The setting interface may be a setting interface of the terminal in the setting application, which may be as shown in fig. 5, where the setting interface includes an on button and an off button corresponding to a "proxy network management function". The setting interface can also be an interface of the terminal in a system control center, and generally, the interface of the system control center comprises shortcut keys such as WiFi, data traffic, volume, Bluetooth, a mute mode and the like, so that a shortcut key for acting a network management function can be added. The terminal performs the steps after connecting the virtual private network and running the application when the user sets the control state of the proxy network management function from the off state to the on state. Otherwise, the terminal adopts the default proxy network technology in the prior art. The default proxy network technology means that after the terminal is connected with the VPN, all network data of the terminal are transmitted through the VPN, so that some domestic applications cannot be used, and users can only select to manually disconnect the VPN network if the users want to use the domestic applications.
When the scheme of the embodiment of the application is executed, for the application which is operated for the first time after the VPN is connected, the terminal can determine the proxy network attribute of the application by sending a query request to the server, and then selects the VPN or the operator network to operate the application. Especially for the application which can not run by using the VPN, the user is prevented from manually disconnecting the VPN and then using the application, so that the convenience of using the application under the VPN connection can be improved. In addition, when the terminal detects that the country region corresponding to the operator network changes, the proxy network configuration table is cleared, and the proxy network configuration table can be updated in time according to the country region.
Fig. 6 is a schematic structural diagram of a proxy network management device according to an embodiment of the present application. The proxy network management apparatus 600 may be implemented as all or a part of a terminal by software, hardware, or a combination of both. The apparatus 600 comprises:
an attribute obtaining module 610, configured to obtain network attribute information of an application when a virtual private network is connected and the application is running;
a network running module 620, configured to select an operator network to run the application if the network attribute information indicates that a proxy network attribute corresponding to the application is a first attribute, where the first attribute is that the application may not be run using the virtual private network.
Optionally, the apparatus 600 further includes:
a second network operation module, configured to select the virtual private network to operate the application if the network attribute information indicates that a proxy network attribute corresponding to the application is a second attribute, where the second attribute is that the application can be operated using the virtual private network.
Optionally, the attribute obtaining module 610 includes:
a first sending unit, configured to send an inquiry request including an application package name of the application to a regional server corresponding to an operator network, where the inquiry request is used to indicate whether the regional server inquires a database about whether the application package name exists;
the second receiving unit is used for receiving a query result corresponding to the query request and generating a proxy network configuration table based on the query result;
and the third acquisition unit is used for acquiring the network attribute information of the application from the proxy network configuration table.
Optionally, the attribute obtaining module 610 further includes:
a first generating unit, configured to set, if the query result indicates that the application package name exists in the database, a proxy network attribute corresponding to the application as a first attribute, and store the first attribute in a proxy network configuration table;
and the second generating unit is used for setting the proxy network attribute corresponding to the application as a second attribute if the query result indicates that the application package name does not exist in the database, and storing the second attribute in the proxy network configuration table.
Optionally, the apparatus 600 further includes:
and the clearing unit is used for clearing the proxy network configuration table if the country region is determined to be changed by scanning the operator network.
Optionally, the attribute obtaining module 610 further includes:
a first execution unit for connecting to a virtual private network by executing a proxy application; or
And the second running unit is used for connecting the virtual private network by receiving a first opening instruction aiming at the proxy network function control.
Optionally, the attribute obtaining module 610 further includes:
and the third running unit is used for displaying a setting interface containing the proxy network management function control, receiving a second starting instruction aiming at the proxy network management function control on the setting interface, and executing the steps of connecting the virtual private network and running the application based on the second starting instruction.
In the embodiment of the application, when a terminal is connected to a virtual private network and runs an application, network attribute information of the application is acquired, if the network attribute information indicates that a proxy network attribute corresponding to the application is a first attribute, an operator network is selected to run the application, and the first attribute is that the application cannot be run by using the virtual private network. By the method, when the user uses the VPN to operate the domestic application, the user does not need to frequently and manually connect or disconnect the VPN terminal, whether the current application uses the VPN to operate or not can be judged when the current application is operated, and the convenience of using the domestic application under the condition of connecting the VPN can be improved.
Referring to fig. 7, a block diagram of a terminal according to an exemplary embodiment of the present application is shown. A terminal in the present application may include one or more of the following components: a processor 110, a memory 120, an input device 130, an output device 140, and a bus 150. The processor 110, memory 120, input device 130, and output device 140 may be connected by a bus 150.
Processor 110 may include one or more processing cores. The processor 110 connects various parts within the overall electronic device using various interfaces and lines, and performs various functions of the electronic device 100 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 120 and calling data stored in the memory 120. Alternatively, the processor 110 may be implemented in hardware using at least one of Digital Signal Processing (DSP), field-programmable gate Array (FPGA), and Programmable Logic Array (PLA). The processor 110 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 110, but may be implemented by a communication chip.
The Memory 120 may include a Random Access Memory (RAM) or a read-only Memory (ROM). Optionally, the memory 120 includes a non-transitory computer-readable medium. The memory 120 may be used to store instructions, programs, code sets, or instruction sets. The memory 120 may include a program storage area and a data storage area, wherein the program storage area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like, and the operating system may be an Android (Android) system, including a system based on Android system depth development, an IOS system developed by apple, including a system based on IOS system depth development, or other systems. The data storage area can also store data created by the electronic equipment in use, such as a phone book, audio and video data, chatting record data and the like.
Referring to fig. 8, the memory 120 may be divided into an operating system space, where an operating system is run, and a user space, where native and third-party applications are run. In order to ensure that different third-party application programs can achieve a better operation effect, the operating system allocates corresponding system resources for the different third-party application programs. However, the requirements of different application scenarios in the same third-party application program on system resources are different, for example, in a local resource loading scenario, the third-party application program has a higher requirement on the disk reading speed; in the animation rendering scene, the third-party application program has a high requirement on the performance of the GPU. The operating system and the third-party application program are independent from each other, and the operating system cannot sense the current application scene of the third-party application program in time, so that the operating system cannot perform targeted system resource adaptation according to the specific application scene of the third-party application program.
In order to enable the operating system to distinguish a specific application scenario of the third-party application program, data communication between the third-party application program and the operating system needs to be opened, so that the operating system can acquire current scenario information of the third-party application program at any time, and further perform targeted system resource adaptation based on the current scenario.
Taking an operating system as an Android system as an example, programs and data stored in the memory 120 are as shown in fig. 9, and a Linux kernel layer 320, a system runtime library layer 340, an application framework layer 360, and an application layer 380 may be stored in the memory 120, where the Linux kernel layer 320, the system runtime library layer 340, and the application framework layer 360 belong to an operating system space, and the application layer 380 belongs to a user space. The Linux kernel layer 320 provides underlying drivers for various hardware of the electronic device, such as a display driver, an audio driver, a camera driver, a bluetooth driver, a Wi-Fi driver, power management, and the like. The system runtime library layer 340 provides a main feature support for the Android system through some C/C + + libraries. For example, the SQLite library provides support for a database, the OpenGL/ES library provides support for 3D drawing, the Webkit library provides support for a browser kernel, and the like. Also provided in the system runtime library layer 340 is an Android runtime library (Android runtime), which mainly provides some core libraries that can allow developers to write Android applications using the Java language. The application framework layer 360 provides various APIs that may be used in building an application, and developers may build their own applications by using these APIs, such as activity management, window management, view management, notification management, content provider, package management, session management, resource management, and location management. At least one application program runs in the application layer 380, and the application programs may be native application programs carried by the operating system, such as a contact program, a short message program, a clock program, a camera application, and the like; or a third-party application developed by a third-party developer, such as a game application, an instant messaging program, a photo beautification program, a file processing program, and the like.
Taking an operating system as an IOS system as an example, programs and data stored in the memory 120 are shown in fig. 10, and the IOS system includes: a Core operating system Layer 420(Core OS Layer), a Core Services Layer 440(Core Services Layer), a Media Layer 460(Media Layer), and a touchable Layer 480(Cocoa Touch Layer). The kernel operating system layer 420 includes an operating system kernel, drivers, and underlying program frameworks that provide functionality closer to hardware for use by program frameworks located in the core services layer 440. The core services layer 440 provides system services and/or program frameworks, such as a Foundation framework, an account framework, an advertisement framework, a data storage framework, a network connection framework, a geographic location framework, a motion framework, and so forth, as required by the application. The media layer 460 provides audiovisual related interfaces for applications, such as graphics image related interfaces, audio technology related interfaces, video technology related interfaces, audio video transmission technology wireless playback (AirPlay) interfaces, and the like. Touchable layer 480 provides various common interface-related frameworks for application development, and touchable layer 480 is responsible for user touch interaction operations on the electronic device. Such as a local notification service, a remote push service, an advertising framework, a game tool framework, a messaging User Interface (UI) framework, a User Interface UIKit framework, a map framework, and so forth.
In the framework illustrated in FIG. 8, the framework associated with most applications includes, but is not limited to: a base framework in the core services layer 440 and a UIKit framework in the touchable layer 480. The base framework provides many basic object classes and data types, provides the most basic system services for all applications, and is UI independent. While the class provided by the UIKit framework is a basic library of UI classes for creating touch-based user interfaces, iOS applications can provide UIs based on the UIKit framework, so it provides an infrastructure for applications for building user interfaces, drawing, processing and user interaction events, responding to gestures, and the like.
The Android system can be referred to as a mode and a principle for realizing data communication between the third-party application program and the operating system in the IOS system, and details are not repeated herein.
The input device 130 is used for receiving input instructions or data, and the input device 130 includes, but is not limited to, a keyboard, a mouse, a camera, a microphone, or a touch device. The output device 140 is used for outputting instructions or data, and the output device 140 includes, but is not limited to, a display device, a speaker, and the like. In one example, the input device 130 and the output device 140 may be combined, and the input device 130 and the output device 140 are touch display screens for receiving touch operations of a user on or near the touch display screens by using any suitable object such as a finger, a touch pen, and the like, and displaying user interfaces of various applications. Touch displays are typically provided on the front panel of an electronic device. The touch display screen may be designed as a full-face screen, a curved screen, or a profiled screen. The touch display screen can also be designed to be a combination of a full-face screen and a curved-face screen, and a combination of a special-shaped screen and a curved-face screen, which is not limited in the embodiment of the present application.
In addition, those skilled in the art will appreciate that the configurations of the terminals illustrated in the above-described figures do not constitute limitations on the terminals, as the terminals may include more or less components than those illustrated, or some components may be combined, or a different arrangement of components may be used. For example, the terminal further includes a radio frequency circuit, an input unit, a sensor, an audio circuit, a wireless fidelity (WiFi) module, a power supply, a bluetooth module, and other components, which are not described herein again.
In the embodiment of the present application, the main body of execution of each step may be the terminal described above. Optionally, the execution subject of each step is an operating system of the terminal. The operating system may be an android system, an IOS system, or another operating system, which is not limited in this embodiment of the present application.
The terminal of the embodiment of the application can also be provided with a display device, and the display device can be various devices capable of realizing a display function, for example: a cathode ray tube display (CR), a light-emitting diode display (LED), an electronic ink panel, a Liquid Crystal Display (LCD), a Plasma Display Panel (PDP), and the like. The user can view information such as displayed text, images, video, etc. using the display device on the terminal 101. The terminal may be a smart phone, a tablet computer, a gaming device, an AR (Augmented Reality) device, an automobile, a data storage device, an audio playing device, a video playing device, a notebook, a desktop computing device, a wearable device such as an electronic watch, an electronic glasses, an electronic helmet, an electronic bracelet, an electronic necklace, an electronic garment, or the like.
The processor 110 in the terminal shown in fig. 7 may be configured to invoke the proxy network manager stored in the memory 120 and specifically perform the following operations:
when a virtual private network is connected and an application is run, network attribute information of the application is acquired;
and if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, selecting an operator network to operate the application, wherein the first attribute is that the application cannot be operated by using the virtual private network.
In one embodiment, the processor 110 also performs the following operations:
and if the network attribute information indicates that the proxy network attribute corresponding to the application is a second attribute, selecting the virtual private network to run the application, wherein the second attribute is that the application can be run by using the virtual private network.
In one embodiment, the processor 110 further performs the following operations before performing the acquiring of the network attribute information of the application:
sending an inquiry request containing the application package name of the application to a regional server corresponding to an operator network, wherein the inquiry request is used for indicating whether the regional server inquires a database to determine whether the application package name exists;
receiving a query result corresponding to the query request, and generating a proxy network configuration table based on the query result;
the processor 110 executes the acquiring of the network attribute information of the application, and specifically executes the following operations:
and acquiring the network attribute information of the application from the proxy network configuration table.
In one embodiment, the processor 110 specifically performs the following operations when executing the step of generating the proxy network configuration table based on the query result:
if the query result indicates that the application package name exists in the database, setting the proxy network attribute corresponding to the application as a first attribute, and storing the first attribute in a proxy network configuration table;
and if the query result indicates that the application package name does not exist in the database, setting the proxy network attribute corresponding to the application as a second attribute, and storing the second attribute in the proxy network configuration table.
In one embodiment, the processor 110 also performs the following operations:
and if the country region is determined to be changed by scanning the operator network, clearing the proxy network configuration table.
In one embodiment, the processor 110 specifically performs the following operations when executing the step of connecting to the virtual private network and running the application:
connecting the virtual private network by running a proxy application; or
The virtual private network is connected by receiving a first open instruction for the proxy network feature control.
In one embodiment, the processor 110 specifically performs the following operations when executing the step of connecting to the virtual private network and running the application:
displaying a setting interface containing a proxy network management function control, receiving a second opening instruction aiming at the proxy network management function control on the setting interface, and executing the steps of connecting the virtual private network and running the application based on the second opening instruction.
It is clear to a person skilled in the art that the solution of the present application can be implemented by means of software and/or hardware. The "unit" and "module" in this specification refer to software and/or hardware that can perform a specific function independently or in cooperation with other components, where the hardware may be, for example, a Field-ProgrammaBLE Gate Array (FPGA), an Integrated Circuit (IC), or the like.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some service interfaces, devices or units, and may be an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory comprises: various media capable of storing program codes, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program, which is stored in a computer-readable memory, and the memory may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above description is only an exemplary embodiment of the present disclosure, and the scope of the present disclosure should not be limited thereby. That is, all equivalent changes and modifications made in accordance with the teachings of the present disclosure are intended to be included within the scope of the present disclosure. Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. A method for proxy network management, the method comprising:
when a virtual private network is connected and an application is run, network attribute information of the application is acquired;
and if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, selecting an operator network to operate the application, wherein the first attribute is that the application cannot be operated by using the virtual private network.
2. The method of claim 1, further comprising:
and if the network attribute information indicates that the proxy network attribute corresponding to the application is a second attribute, selecting the virtual private network to run the application, wherein the second attribute is that the application can be run by using the virtual private network.
3. The method according to claim 1 or 2, wherein before the obtaining the network attribute information of the application, the method further comprises:
sending an inquiry request containing the application package name of the application to a regional server corresponding to an operator network, wherein the inquiry request is used for indicating whether the regional server inquires a database to determine whether the application package name exists;
receiving a query result corresponding to the query request, and generating a proxy network configuration table based on the query result;
the acquiring the network attribute information of the application includes:
and acquiring the network attribute information of the application from the proxy network configuration table.
4. The method of claim 3, wherein generating a proxy network configuration table based on the query result comprises:
if the query result indicates that the application package name exists in the database, setting the proxy network attribute corresponding to the application as a first attribute, and storing the first attribute in a proxy network configuration table;
and if the query result indicates that the application package name does not exist in the database, setting the proxy network attribute corresponding to the application as a second attribute, and storing the second attribute in the proxy network configuration table.
5. The method according to claim 3 or 4, characterized in that the method further comprises:
and if the country region is determined to be changed by scanning the operator network, clearing the proxy network configuration table.
6. The method according to claim 1 or 2, wherein the connecting a virtual private network and running an application comprises:
connecting the virtual private network by running a proxy application; or
The virtual private network is connected by receiving a first open instruction for the proxy network feature control.
7. The method according to claim 1 or 2, wherein the connecting a virtual private network and running an application comprises:
displaying a setting interface containing a proxy network management function control, receiving a second opening instruction aiming at the proxy network management function control on the setting interface, and executing the steps of connecting the virtual private network and running the application based on the second opening instruction.
8. A proxy network management apparatus, the apparatus comprising:
the system comprises an attribute acquisition module, a network attribute acquisition module and a network attribute acquisition module, wherein the attribute acquisition module is used for acquiring network attribute information of an application when the virtual private network is connected and the application is operated;
a network running module, configured to select an operator network to run the application if the network attribute information indicates that a proxy network attribute corresponding to the application is a first attribute, where the first attribute is that the application may not be run using the virtual private network.
9. A computer storage medium, characterized in that it stores a plurality of instructions adapted to be loaded by a processor and to carry out the method steps according to any one of claims 1 to 7.
10. A terminal, comprising: a processor and a memory; wherein the memory stores a computer program adapted to be loaded by the processor and to perform the method steps of any of claims 1 to 7.
CN202110575316.3A 2021-05-25 2021-05-25 Proxy network management method, device, storage medium and terminal Active CN113315687B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110575316.3A CN113315687B (en) 2021-05-25 2021-05-25 Proxy network management method, device, storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110575316.3A CN113315687B (en) 2021-05-25 2021-05-25 Proxy network management method, device, storage medium and terminal

Publications (2)

Publication Number Publication Date
CN113315687A true CN113315687A (en) 2021-08-27
CN113315687B CN113315687B (en) 2023-09-08

Family

ID=77374910

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110575316.3A Active CN113315687B (en) 2021-05-25 2021-05-25 Proxy network management method, device, storage medium and terminal

Country Status (1)

Country Link
CN (1) CN113315687B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020133534A1 (en) * 2001-01-08 2002-09-19 Jan Forslow Extranet workgroup formation across multiple mobile virtual private networks
US20030055933A1 (en) * 2001-09-20 2003-03-20 Takeshi Ishizaki Integrated service management system for remote customer support
US8638794B1 (en) * 2010-04-15 2014-01-28 Cellco Partnership Method and system for routing traffic across multiple interfaces via VPN traffic selectors and local policies
CN106878135A (en) * 2016-12-21 2017-06-20 新华三技术有限公司 A kind of connection method and device
CN108063714A (en) * 2016-11-09 2018-05-22 北京国双科技有限公司 A kind of processing method and processing device of network request
CN108063712A (en) * 2016-11-09 2018-05-22 北京国双科技有限公司 The sending method and device of a kind of network request
CN111711556A (en) * 2020-06-17 2020-09-25 北京字节跳动网络技术有限公司 Routing method, device, system, equipment and storage medium of virtual private network

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020133534A1 (en) * 2001-01-08 2002-09-19 Jan Forslow Extranet workgroup formation across multiple mobile virtual private networks
US20030055933A1 (en) * 2001-09-20 2003-03-20 Takeshi Ishizaki Integrated service management system for remote customer support
US8638794B1 (en) * 2010-04-15 2014-01-28 Cellco Partnership Method and system for routing traffic across multiple interfaces via VPN traffic selectors and local policies
CN108063714A (en) * 2016-11-09 2018-05-22 北京国双科技有限公司 A kind of processing method and processing device of network request
CN108063712A (en) * 2016-11-09 2018-05-22 北京国双科技有限公司 The sending method and device of a kind of network request
CN106878135A (en) * 2016-12-21 2017-06-20 新华三技术有限公司 A kind of connection method and device
CN111711556A (en) * 2020-06-17 2020-09-25 北京字节跳动网络技术有限公司 Routing method, device, system, equipment and storage medium of virtual private network

Also Published As

Publication number Publication date
CN113315687B (en) 2023-09-08

Similar Documents

Publication Publication Date Title
CN108491275B (en) Program optimization method, device, terminal and storage medium
CN107889070B (en) Picture processing method, device, terminal and computer readable storage medium
CN107728885B (en) Multitask control method and device, mobile terminal and storage medium
AU2017219385A1 (en) Electronic device and method of application data display therefor
WO2020156199A1 (en) Application login method and device, terminal and storage medium
WO2019047189A1 (en) Message display method and device and terminal
WO2021190184A1 (en) Remote assistance method and apparatus, and storage medium and terminal
CN111433743A (en) APP remote control method and related equipment
US11314391B2 (en) Navigation bar controlling method and terminal
CN112653670A (en) Service logic vulnerability detection method, device, storage medium and terminal
CN113268212A (en) Screen projection method and device, storage medium and electronic equipment
WO2023040584A1 (en) Device data processing method and apparatus, and electronic device and storage medium
CN110572815A (en) Network access method, device, storage medium and terminal
CN111986454A (en) Wireless earphone searching method, device, storage medium and terminal
CN111913614B (en) Multi-picture display control method and device, storage medium and display
CN113438614A (en) Flow package obtaining method and device, terminal and storage medium
CN113286349B (en) Personal hot spot connection method, device, terminal and storage medium
CN113315687B (en) Proxy network management method, device, storage medium and terminal
CN113950043B (en) Communication method, device, storage medium and terminal
CN113312572A (en) Resource processing method and device, storage medium and electronic equipment
CN113419650A (en) Data moving method and device, storage medium and electronic equipment
CN111859999A (en) Message translation method, device, storage medium and electronic equipment
CN112612633A (en) Inter-process communication method, device, storage medium and terminal
CN110913384A (en) Dial card switching method and device, storage medium and terminal
WO2023273936A1 (en) Wallpaper setting method and apparatus, and storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant