CN113315687B - Proxy network management method, device, storage medium and terminal - Google Patents
Proxy network management method, device, storage medium and terminal Download PDFInfo
- Publication number
- CN113315687B CN113315687B CN202110575316.3A CN202110575316A CN113315687B CN 113315687 B CN113315687 B CN 113315687B CN 202110575316 A CN202110575316 A CN 202110575316A CN 113315687 B CN113315687 B CN 113315687B
- Authority
- CN
- China
- Prior art keywords
- application
- network
- attribute
- proxy
- proxy network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer And Data Communications (AREA)
Abstract
The embodiment of the application discloses a proxy network management method, a proxy network management device, a storage medium and a terminal. The method comprises the following steps: when connecting a virtual private network and running an application, acquiring network attribute information of the application, and if the network attribute information indicates that a proxy network attribute corresponding to the application is a first attribute, selecting an operator network to run the application, wherein the first attribute is that the application cannot be run by using the virtual private network. By the method, when the user runs the application in the country by using the VPN, the user does not need to frequently and manually connect or disconnect the VPN, the terminal can judge whether the current application runs by using the VPN when running the current application, and the convenience of using the domestic application under the condition of connecting the VPN can be improved.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a proxy network management method, a proxy network management device, a storage medium, and a terminal.
Background
With the development of the internet, the application of the virtual private network (Virtual Private Network, abbreviated as VPN) in enterprise networks or daily life is also becoming wider and wider. The virtual private network mainly establishes a private network on a public network to carry out encryption communication. In the prior art, in order to access a foreign website or use a foreign application, a domestic user may choose to download a VPN application and run the VPN application, and the mobile phone network is also a VPN network and is not a local carrier network. However, if the user uses the domestic application again when connecting the VPN network, the domestic application server cannot be accessed when connecting the VPN network because the domestic application server is all domestic, and the domestic application cannot be used without manually disconnecting the VPN network.
Disclosure of Invention
The embodiment of the application provides a proxy network management method, a proxy network management device, a computer storage medium and a terminal, aiming at solving the technical problem of how to improve the convenience of domestic application when a VPN network is connected. The technical scheme is as follows:
in a first aspect, an embodiment of the present application provides a proxy network management method, where the method includes:
when connecting a virtual private network and running an application, acquiring network attribute information of the application;
and if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, selecting an operator network to run the application, wherein the first attribute is that the application cannot be run by using the virtual private network.
In a second aspect, an embodiment of the present application provides a proxy network management apparatus, including:
the attribute acquisition module is used for acquiring network attribute information of an application when the application is connected with a virtual private network and the application is operated;
and the network operation module is used for selecting an operator network to operate the application if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, wherein the first attribute is that the application cannot be operated by using the virtual private network.
In a third aspect, embodiments of the present application provide a computer storage medium having a plurality of instructions adapted to be loaded by a processor and to perform the above-described method steps.
In a fourth aspect, an embodiment of the present application provides a terminal, which may include: a memory and a processor; wherein the memory stores a computer program adapted to be loaded by the memory and to perform the above-mentioned method steps.
The technical scheme provided by the embodiment of the application has the beneficial effects that at least:
when the scheme of the embodiment of the application is executed, when a terminal is connected with a virtual private network and runs an application, network attribute information of the application is obtained, if the network attribute information indicates that a proxy network attribute corresponding to the application is a first attribute, an operator network is selected to run the application, and the first attribute is that the application cannot be run by using the virtual private network. By the method, when the user runs the application in the country by using the VPN, the user does not need to frequently and manually connect or disconnect the VPN, the terminal can judge whether the current application runs by using the VPN when running the current application, and the convenience of using the domestic application under the condition of connecting the VPN can be improved.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are necessary for the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application and that other drawings may be obtained from them without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a proxy network management method according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a proxy network management method according to an embodiment of the present application;
fig. 3 is an interface schematic diagram in a proxy network management method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an interface in another proxy network management method according to an embodiment of the present application;
FIG. 5 is a schematic diagram of an interface in a proxy network management method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a proxy network management device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a terminal according to an embodiment of the present application;
FIG. 8 is a schematic diagram of an operating system and user space provided by an embodiment of the present application;
FIG. 9 is an architecture diagram of the android operating system of FIG. 7;
FIG. 10 is an architecture diagram of the IOS operating system of FIG. 7.
Detailed Description
In order to make the objects, features and advantages of the embodiments of the present application more obvious and understandable, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In the description of the present application, it should be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In the description of the present application, it should be noted that, unless expressly specified and limited otherwise, "comprise" and "have" and any variations thereof are intended to cover non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus. The specific meaning of the above terms in the present application will be understood in specific cases by those of ordinary skill in the art. Furthermore, in the description of the present application, unless otherwise indicated, "a plurality" means two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship.
The present application will be described in detail with reference to specific examples.
In the following method embodiments, for convenience of explanation, only the execution subject of each step is described as a terminal.
Fig. 1 is a schematic flow chart of a proxy network management method according to an embodiment of the present application. As shown in fig. 1, the method according to the embodiment of the present application may include the following steps:
s101, when a virtual private network is connected and an application is operated, network attribute information of the application is acquired.
Wherein the virtual private network refers to a private network established over a public network. The virtual private network is simply referred to as VPN, and refers to a virtual private communication network established in a public network by means of the Internet service provider ISP (Internet ServiceProvider) and the network service provider NSP (NetworkService Provider). VPN belongs to remote access technology, has wide application in enterprise network, and realizes remote access by VPN gateway through encryption of data packet and conversion of data packet destination address. Tunneling encapsulates another protocol message using one protocol, and the encapsulated protocol itself may be encapsulated or carried by other encapsulated protocols.
Wherein the network attribute information mainly includes two kinds of network attribute information of an application, one is that the application cannot be run using an operator network, but the application can be run using a VPN; another is that the application may not be run using VPN, but may be run using an operator network. It will be appreciated that applications in a software store may include applications in chinese areas, as well as applications in non-chinese areas. Since in the related art, when a user connects to a VPN, the global mode is default, that is, all network data of the terminal is transmitted through the VPN. Typically, the scenarios for a user to connect to a VPN are: the IP address of the terminal is a non-chinese IP address, and the non-chinese IP address is used to access a foreign website or use a foreign application, so, based on this scenario, if a VPN in the global mode is used, the IP address of the terminal cannot access a domestic server, that is, cannot use a domestic application, and then the application in the non-chinese area can correspond to the first network attribute information. Since most servers of applications in the china area are domestic, the servers cannot be accessed when the VPN is connected, and the applications cannot be used, the applications in the china area correspond to the second network attribute information.
Specifically, when a user opens an application and uses it after the user connects the VPN to the terminal,
the terminal can obtain the network attribute information of the application from the local, since the network attribute information of each application is stored locally. It may be appreciated that the terminal may determine network attribute information of each application in advance, and then store the network attribute of each application locally, so that when the application is run with the VPN connected, the network attribute information of the application may be directly acquired.
And S102, if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, selecting an operator network to run the application, wherein the first attribute is that the application cannot be run by using the virtual private network.
Wherein the proxy network attribute mainly comprises a first attribute and a second attribute. The first attribute is that an application can be run using an operator network, but cannot be run using VPN, and the first attribute is for an application in china area. The second attribute is that an application cannot be run using the carrier network, but can be run using VPN, the second attribute is for applications that are not china areas.
Specifically, since the terminal locally stores the network attribute information of each application, if the terminal obtains the network attribute information of the current application, it can determine that the current application belongs to the first attribute, that is, the current application is an application in the china area, the application can be run by adopting the operator network, and the current use cannot be run by using the VPN. It will be appreciated that if the terminal can determine that the current application belongs to the second attribute, that is, the current application is an application in a non-chinese area, the application can be run using VPN, and the current application cannot be run using the operator network.
When the scheme of the embodiment of the application is executed, when a terminal is connected with a virtual private network and runs an application, network attribute information of the application is obtained, if the network attribute information indicates that a proxy network attribute corresponding to the application is a first attribute, an operator network is selected to run the application, and the first attribute is that the application cannot be run by using the virtual private network. By the method, when the user runs the application in the country by using the VPN, the user does not need to frequently and manually connect or disconnect the VPN, the terminal can judge whether the current application runs by using the VPN when running the current application, and the convenience of using the domestic application under the condition of connecting the VPN can be improved.
Fig. 2 is a schematic flow chart of a proxy network management method according to an embodiment of the present application. As shown in fig. 2, the method according to the embodiment of the present application may include the following steps:
s201, when the virtual private network is connected and an application is operated, a query request containing the application package name of the application is sent to an area server corresponding to an operator network, wherein the query request is used for indicating whether the application package name exists in a query database of the area server.
The regional server refers to a server in China and a server in non-China.
Specifically, after the terminal is started, when the terminal accesses the operator network, the country region to which the current operator network belongs can be determined. For example, the terminal is currently located in china, and it can be determined that the country to which the operator network belongs is china. The terminal is currently located in the united states and can determine that the country to which the operator network belongs is the united states. Further, after determining the country region to which the current operator network belongs, the terminal may switch the application resource in the software store built in the terminal to the application resource of the country region to which the operator network belongs. Therefore, the user can conveniently and directly download the application in the country region without switching the software store account numbers in different country regions. It will be appreciated that the application package names of the respective applications in the application resources of the different country regions may also be stored in the database of the corresponding region server. Further, the terminal may transmit all network data through the VPN according to an operation instruction of the user to connect to the VPN, and when the terminal identifies that the user uses an application for the first time under the condition of connecting to the VPN, the terminal may send a query request to an area server corresponding to the operator network, where the query request includes an application packet name of the application. The query request mainly instructs the zone server to look up whether the application package name is present in the database.
For example: the terminal identifies that the operator network belongs to the China area currently, and the terminal can switch the application resources of the built-in software store into the application resources of the China area, namely, the applications in the software store are all applications of the China area. Further, if the user connects to the VPN, all network data of the terminal are transmitted through the VPN at this time, if the user connects to the VPN to change the IP address of the terminal to the us IP address, mainly for accessing the us website and using the us application by using the VPN, but the user uses an installed application in the china area, such as "get APP", for the first time under the condition of connecting to the VPN, the terminal may query the server in the china area for a request, and instruct the server in the china area to query whether the application packet name corresponding to the "get APP" is stored in the database.
It can be understood that the operation instruction of the user for connecting to the VPN may be an operation instruction of the user for connecting to the VPN in the VPN application, or an operation instruction of the user for connecting to the VPN in a system configuration interface of the terminal. Referring to the interface schematic diagram shown in fig. 3, the interface schematic diagram may be an interface schematic diagram of a VPN application, and a user may click on a circular area shown by 310 to connect to the VPN, and may select a line to be used according to a requirement. Referring to the system setting interface schematic diagram shown in fig. 4, the user may click on the switch control corresponding to "VPN1" or "VPN2" to connect to VPN. Alternatively, the user may also configure the VPN connection himself.
S202, receiving a query result corresponding to the query request, and generating a proxy network configuration table based on the query result.
It can be appreciated that the query results include two query results, one is that the application package name of the application is queried in the database, and the result indicates that the application belongs to the application in the current country region; the other is that the package name of the application is not queried in the database, and the result indicates that the current application does not belong to the application in the current country region. If the first query result is the first query result, the proxy network attribute of the application is set to be the first attribute, that is, the application can be run by using the operator network, but the application cannot be run by using the VPN, and the first attribute and the application packet name of the application are stored in a proxy network configuration table, where the proxy network configuration table can be stored locally. If the second query result is the second query result, the proxy network attribute of the application is set to be the second attribute, that is, the application cannot be run by using the operator network, but the application can be run by using the VPN, and the second attribute and the packet name of the application are stored in the proxy network configuration table, and similarly, the proxy network configuration table can be stored locally.
It will be appreciated that proxy network attributes for all applications in the current country region are stored in the proxy network configuration table. However, for an application that has never been run when connecting to a VPN, the proxy network attribute in the proxy network configuration table is empty, and it is not explicitly specified whether the application can be run using the VPN or the carrier network, only when connecting to the VPN and running the reference, the terminal can determine the proxy network attribute of the application, that is, the proxy network attribute of the application can be determined by performing step S201 and step S202. For applications that have been run when connecting to a VPN, proxy network attribute information in the proxy network configuration table exists. Because the terminal can determine the proxy network attribute, either the first attribute or the second attribute, when the connection VPN runs the application for the first time, the terminal stores the proxy network attribute in the proxy network configuration table, so that when the subsequent reconnection VPN runs the application, the terminal can directly acquire the network attribute information of the application from the proxy network configuration table, and directly select the corresponding network to run the application. For example, see table 2.1, which is a proxy network configuration table for applications in a part of the chinese area. As can be seen from table 2.1, the application corresponding to cn.xuexi.android is "learning country", and the proxy network attribute is the first attribute; the application corresponding to com.taobao.taobao is "panning", and the proxy network attribute is the first attribute; the application corresponding to com.eg.android.alicayGphone is "Payment treasury", and the proxy network attribute is a first attribute; the application corresponding to com.cainiao.wireless is 'bird wrapping', and the agent attribute is null; the application corresponding to com.
Table 2.1 proxy network configuration table
Application package name | Proxy network attributes |
cn.xuexi.android | First attribute |
com.taobao.taobao | First attribute |
com.eg.android.AlipayGphone | First attribute |
com.cainiao.wireless | Empty space |
com.alibaba.andriod.rimet | Empty space |
Specifically, the terminal may receive a query result of the server for the query request, determine a proxy network attribute of the application indicated by the query result, generate a proxy network configuration table, and then store an application packet name and the proxy network attribute of the application in the proxy network configuration table. Since other applications are not running when connecting to the VPN, the terminal does not know the proxy network attribute of the other applications at this time, and the proxy attribute of the other applications may be temporarily stored as an unknown state in the proxy network configuration table.
S203, acquiring the network attribute information of the application from the proxy network configuration table.
Specifically, the terminal is connected with the VPN and runs the application, sends a query request of the application containing the application to the area server, receives a query result corresponding to the query request, and can acquire network attribute information of the application from the proxy network configuration table after generating the proxy network configuration table according to the query result.
And S204, if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, selecting an operator network to run the application, wherein the first attribute is that the application cannot be run by using the virtual private network.
Specifically, if the terminal inquires that the proxy network attribute corresponding to the application is the first attribute, the application needs to be operated by using the operator network, and the application cannot be operated by using the VPN. For example, in china, when the user connects to the VPN, the IP address of the terminal becomes the IP address of the united states, the user uses the application "get", and the terminal determines that the application corresponds to the first attribute, that is, only the carrier network can be used to run the application, and the VPN cannot be used to run the application.
And S205, if the network attribute information indicates that the proxy network attribute corresponding to the application is a second attribute, selecting the virtual private network to run the application, wherein the second attribute is that the application can be run by using the virtual private network.
Specifically, if the terminal queries that the attribute of the proxy network corresponding to the application is the second attribute, the application needs to be operated by using the VPN, and the application cannot be operated by using the operator network. For example, in china, when the user connects to the VPN, the IP address of the terminal becomes the IP address of the united states, the user goes to use the application "Gmail", and the terminal determines that the application corresponds to the second attribute, that is, only the VPN can be used for operation, and the application cannot be operated using the operator network.
And S206, if the country region is determined to change through scanning the operator network, clearing the proxy network configuration table.
Specifically, if the terminal determines that the country region changes by scanning the operator network, that is, when the terminal is in a new country region, the terminal performs a clearing process on the proxy network configuration table generated previously, where the clearing process may be understood as deleting the proxy network configuration table, or setting the proxy network attributes of all applications in the proxy network configuration table as null attributes. In addition, it can be understood that if the user performs an opening operation on the "restore factory setting" function control on the system setting interface of the terminal, the terminal may also perform a clearing process on the proxy network configuration table generated previously.
It should be noted that, the execution basis of steps S201 to S206 in this embodiment is that the user executes the open instruction for the control of "proxy network management function" on the setting interface. The setting interface may be a setting interface of the terminal in the setting application, and may refer to an interface schematic diagram shown in fig. 5, where the setting interface has an on button and an off button corresponding to the "proxy network management function". The setting interface may also be an interface of the terminal in a system control center, and in general, the interface of the system control center includes shortcut keys such as WiFi, data flow, volume, bluetooth, mute mode, and the like, so that a shortcut key of "proxy network management function" may also be added. After the user sets the control state of the "proxy network management function" from the off state to the on state, the terminal performs the steps of connecting to the virtual private network and running the application and thereafter. Otherwise, the terminal adopts the default proxy network technology in the prior art. The default proxy network technology refers to that after the terminal is connected with the VPN, all network data of the terminal are transmitted through the VPN, so that some domestic applications cannot be used, and if a user wants to use the domestic applications, the user can only select to manually disconnect the VPN network.
When the scheme of the embodiment of the application is executed, for an application which runs for the first time after connecting the VPN, the terminal can determine the proxy network attribute of the application by sending a query request to the server, and then select the VPN or the operator network to run the application. Particularly, for applications which cannot be operated by using the VPN, the user is prevented from using the application after manually disconnecting the VPN connection, so that the convenience of using the application under the VPN connection can be improved. In addition, when the terminal detects that the country region corresponding to the operator network changes, the proxy network configuration table is emptied, and the proxy network configuration table can be updated in time according to the country region.
Fig. 6 is a schematic structural diagram of a proxy network management device according to an embodiment of the present application. The proxy network management device 600 may be implemented as all or part of a terminal by software, hardware, or a combination of both. The apparatus 600 includes:
an attribute obtaining module 610, configured to obtain network attribute information of an application when connecting to a virtual private network and running the application;
and the network operation module 620 is configured to select an operator network to operate the application if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, where the first attribute is that the application cannot be operated by using the virtual private network.
Optionally, the apparatus 600 further includes:
and the second network operation module is used for selecting the virtual private network to operate the application if the network attribute information indicates that the proxy network attribute corresponding to the application is a second attribute, wherein the second attribute is that the application can be operated by using the virtual private network.
Optionally, the attribute obtaining module 610 includes:
the first sending unit is used for sending a query request containing the application package name of the application to a regional server corresponding to the operator network, wherein the query request is used for indicating whether the application package name exists in a query database of the regional server;
the second receiving unit is used for receiving a query result corresponding to the query request and generating a proxy network configuration table based on the query result;
and a third obtaining unit, configured to obtain the network attribute information of the application from the proxy network configuration table.
Optionally, the attribute obtaining module 610 further includes:
the first generation unit is used for setting the proxy network attribute corresponding to the application as a first attribute if the query result indicates that the application package name exists in the database, and storing the first attribute in a proxy network configuration table;
And the second generating unit is used for setting the proxy network attribute corresponding to the application as a second attribute if the query result indicates that the application package name does not exist in the database, and storing the second attribute in the proxy network configuration table.
Optionally, the apparatus 600 further includes:
and the clearing unit is used for clearing the proxy network configuration table if the country region is determined to change by scanning the operator network.
Optionally, the attribute obtaining module 610 further includes:
a first operation unit for connecting the virtual private network by operating the proxy application; or (b)
And the second running unit is used for connecting the virtual private network by receiving a first opening instruction aiming at the proxy network function control.
Optionally, the attribute obtaining module 610 further includes:
and the third operation unit is used for displaying a setting interface containing the proxy network management function control, receiving a second opening instruction aiming at the proxy network management function control on the setting interface, and executing the steps of connecting the virtual private network and operating the application based on the second opening instruction.
When the scheme of the embodiment of the application is executed, when a terminal is connected with a virtual private network and runs an application, network attribute information of the application is obtained, if the network attribute information indicates that a proxy network attribute corresponding to the application is a first attribute, an operator network is selected to run the application, and the first attribute is that the application cannot be run by using the virtual private network. By the method, when the user runs the application in the country by using the VPN, the user does not need to frequently and manually connect or disconnect the VPN terminal, so that the user can judge whether the current application uses the VPN to run or not when running the current application, and the convenience of using the domestic application under the condition of connecting the VPN can be improved.
Referring to fig. 7, a block diagram illustrating a structure of a terminal according to an exemplary embodiment of the present application is shown. The terminal of the present application may include one or more of the following components: processor 110, memory 120, input device 130, output device 140, and bus 150. The processor 110, the memory 120, the input device 130, and the output device 140 may be connected by a bus 150.
Processor 110 may include one or more processing cores. The processor 110 utilizes various interfaces and lines to connect various portions of the overall electronic device, perform various functions of the electronic device, and process data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 120, and invoking data stored in the memory 120. Alternatively, the processor 110 may be implemented in at least one hardware form of digital signal processing (digitalsignal processing, DSP), field-programmable gate array (field-programmable gate array, FPGA), programmable logic array (programmablelogic Array, PLA). The processor 110 may integrate one or a combination of several of a central processing unit (central processingunit, CPU), an image processor (graphicsprocessing unit, GPU), and a modem, etc. The CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for being responsible for rendering and drawing of display content; the modem is used to handle wireless communications. It will be appreciated that the modem may not be integrated into the processor 110 and may be implemented solely by a single communication chip.
The memory 120 may include a random access memory (randomAccess Memory, RAM) or a read-only memory (ROM). Optionally, the memory 120 includes a non-transitory computer readable medium (non-transitory computer-readable storagemedium). Memory 120 may be used to store instructions, programs, code, sets of codes, or sets of instructions. The memory 120 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, which may be an Android (Android) system, including an Android system-based deep development system, an IOS system developed by apple corporation, including an IOS system-based deep development system, or other systems, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The storage data area may also store data created by the electronic device in use, such as phonebooks, audiovisual data, chat log data, and the like.
Referring to FIG. 8, the memory 120 may be divided into an operating system space in which the operating system is running and a user space in which native and third party applications are running. In order to ensure that different third party application programs can achieve better operation effects, the operating system allocates corresponding system resources for the different third party application programs. However, the requirements of different application scenarios in the same third party application program on system resources are different, for example, under the local resource loading scenario, the third party application program has higher requirement on the disk reading speed; in the animation rendering scene, the third party application program has higher requirements on the GPU performance. The operating system and the third party application program are mutually independent, and the operating system often cannot timely sense the current application scene of the third party application program, so that the operating system cannot perform targeted system resource adaptation according to the specific application scene of the third party application program.
In order to enable the operating system to distinguish specific application scenes of the third-party application program, data communication between the third-party application program and the operating system needs to be communicated, so that the operating system can acquire current scene information of the third-party application program at any time, and targeted system resource adaptation is performed based on the current scene.
Taking an operating system as an Android system as an example, as shown in fig. 9, a program and data stored in the memory 120 may be stored in the memory 120 with a Linux kernel layer 320, a system runtime library layer 340, an application framework layer 360 and an application layer 380, where the Linux kernel layer 320, the system runtime library layer 340 and the application framework layer 360 belong to an operating system space, and the application layer 380 belongs to a user space. The Linux kernel layer 320 provides the underlying drivers for various hardware of the electronic device, such as display drivers, audio drivers, camera drivers, bluetooth drivers, wi-Fi drivers, power management, and the like. The system runtime library layer 340 provides the main feature support for the Android system through some C/c++ libraries. For example, the SQLite library provides support for databases, the OpenGL/ES library provides support for 3D graphics, the Webkit library provides support for browser kernels, and the like. Also provided in the system runtime library layer 340 is a An Zhuoyun runtime library (Android running time), which primarily provides some core libraries that can allow developers to write Android applications using the Java language. The application framework layer 360 provides various APIs that may be used in building applications, which developers can also build their own applications by using, for example, campaign management, window management, view management, notification management, content provider, package management, call management, resource management, location management. At least one application program is running in the application layer 380, and these application programs may be native application programs of the operating system, such as a contact program, a short message program, a clock program, a camera application, etc.; and may also be a third party application developed by a third party developer, such as a game-like application, instant messaging program, photo beautification program, file processing program, etc.
Taking an operating system as an IOS system as an example, the programs and data stored in the memory 120 are shown in fig. 10, the IOS system includes: core operating system Layer 420 (CoreOS Layer), core service Layer 440 (CoreServices Layer), media Layer 460 (Medialayer), and touchable Layer 480 (cocoaouch Layer). The core operating system layer 420 includes an operating system kernel, drivers, and underlying program frameworks that provide more hardware-like functionality for use by the program frameworks at the core services layer 440. The core services layer 440 provides system services and/or program frameworks required by the application, such as a Foundation (Foundation) framework, an account framework, an advertisement framework, a data storage framework, a network connection framework, a geographic location framework, a sports framework, and the like. The media layer 460 provides an interface for applications related to audiovisual aspects, such as a graphics-image related interface, an audio technology related interface, a video technology related interface, an audio video transmission technology wireless play (AirPlay) interface, and so forth. The touchable layer 480 provides various commonly used interface-related frameworks for application development, with the touchable layer 480 being responsible for user touch interactions on the electronic device. Such as a local notification service, a remote push service, an advertisement framework, a game tool framework, a message User Interface (UI) framework, a User Interface UIKit framework, a map framework, and so forth.
Among the frameworks illustrated in fig. 8, frameworks related to most applications include, but are not limited to: the infrastructure in core services layer 440 and the UIKit framework in touchable layer 480. The infrastructure provides many basic object classes and data types, providing the most basic system services for all applications, independent of the UI. While the class provided by the UIKit framework is a basic UI class library for creating touch-based user interfaces, iOS applications can provide UIs based on the UIKit framework, so it provides the infrastructure for applications to build user interfaces, draw, process and user interaction events, respond to gestures, and so on.
The manner and principle of implementing data communication between the third party application program and the operating system in the IOS system can refer to the Android system, and the application is not described herein.
The input device 130 is configured to receive input instructions or data, and the input device 130 includes, but is not limited to, a keyboard, a mouse, a camera, a microphone, or a touch device. The output device 140 is used to output instructions or data, and the output device 140 includes, but is not limited to, a display device, a speaker, and the like. In one example, the input device 130 and the output device 140 may be combined, and the input device 130 and the output device 140 are a touch display screen for receiving a touch operation thereon or thereabout by a user using a finger, a touch pen, or any other suitable object, and displaying a user interface of each application program. Touch display screens are typically provided on the front panel of an electronic device. The touch display screen may be designed as a full screen, a curved screen, or a contoured screen. The touch display screen may also be designed as a combination of a full screen and a curved screen, and the combination of a special-shaped screen and a curved screen, which is not limited in the embodiment of the present application.
In addition, those skilled in the art will appreciate that the configuration of the terminal illustrated in the above-described figures does not constitute a limitation of the terminal, and the terminal may include more or less components than illustrated, or may combine certain components, or may have a different arrangement of components. For example, the terminal further includes components such as a radio frequency circuit, an input unit, a sensor, an audio circuit, a wireless fidelity (wireless fidelity, wiFi) module, a power supply, and a bluetooth module, which are not described herein.
In the embodiment of the present application, the execution subject of each step may be the terminal described above. Optionally, the execution subject of each step is an operating system of the terminal. The operating system may be an android system, an IOS system, or other operating systems, which is not limited by the embodiments of the present application.
The terminal of the embodiment of the application can be further provided with a display device, and the display device can be various devices capable of realizing display functions, such as: cathode ray tube displays (cathode ray tubedisplay, CR), light-emitting diode displays (light-emittingdiode display, LED), electronic ink screens, liquid crystal displays (liquid crystal display, LCD), plasma display panels (plasma display panel, PDP), and the like. A user may view displayed text, images, video, etc. information using a display device on the terminal 101. The terminal may be a smart phone, a tablet computer, a gaming device, an AR (Augmented Reality ) device, an automobile, a data storage device, an audio playing device, a video playing device, a notebook, a desktop computing device, a wearable device such as an electronic watch, electronic glasses, an electronic helmet, an electronic bracelet, an electronic necklace, an electronic article of clothing, etc.
In the terminal shown in fig. 7, the processor 110 may be configured to call a proxy network manager stored in the memory 120, and specifically perform the following operations:
when connecting a virtual private network and running an application, acquiring network attribute information of the application;
and if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, selecting an operator network to run the application, wherein the first attribute is that the application cannot be run by using the virtual private network.
In one embodiment, the processor 110 also performs the following operations:
and if the network attribute information indicates that the proxy network attribute corresponding to the application is a second attribute, selecting the virtual private network to run the application, wherein the second attribute is that the application can be run by using the virtual private network.
In one embodiment, the processor 110, prior to executing the acquiring the network attribute information of the application, further performs the following operations:
sending a query request containing an application package name of the application to a region server corresponding to an operator network, wherein the query request is used for indicating the region server to query whether the application package name exists in a database;
Receiving a query result corresponding to the query request, and generating a proxy network configuration table based on the query result;
the processor 110 performs the following operations in executing the acquiring the network attribute information of the application:
and acquiring the network attribute information of the application from the proxy network configuration table.
In one embodiment, the processor 110, when executing the step of generating the proxy network configuration table based on the query result, specifically performs the following operations:
if the query result indicates that the application package name exists in the database, setting the proxy network attribute corresponding to the application as a first attribute, and storing the first attribute in a proxy network configuration table;
and if the query result indicates that the application package name does not exist in the database, setting the proxy network attribute corresponding to the application as a second attribute, and storing the second attribute in the proxy network configuration table.
In one embodiment, the processor 110 also performs the following operations:
and if the country region is determined to change through scanning the operator network, clearing the proxy network configuration table.
In one embodiment, the processor 110, when executing the steps of connecting to a virtual private network and running an application, specifically performs the following operations:
Connecting a virtual private network by running a proxy application; or (b)
The virtual private network is connected by receiving a first open instruction for a proxy network functionality control.
In one embodiment, the processor 110, when executing the steps of connecting to a virtual private network and running an application, specifically performs the following operations:
displaying a setting interface containing a proxy network management function control, receiving a second opening instruction aiming at the proxy network management function control on the setting interface, and executing the steps of connecting a virtual private network and running an application based on the second opening instruction.
It will be clear to a person skilled in the art that the solution according to the application can be implemented by means of software and/or hardware. "Unit" and "module" in this specification refer to software and/or hardware capable of performing a specific function, either alone or in combination with other components, such as Field-ProgrammaBLE gate arrays (FPGAs), integrated circuits (IntegratedCircuit, IC), and the like.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present application is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required for the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, such as the division of the units, merely a logical function division, and there may be additional manners of dividing the actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some service interface, device or unit indirect coupling or communication connection, electrical or otherwise.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable memory. Based on this understanding, the technical solution of the present application may be embodied essentially or partly in the form of a software product, or all or part of the technical solution, which is stored in a memory, and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned memory includes: a U-disk, a Read-only memory (ROM), a random access memory (RandomAccess Memory, RAM), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Those of ordinary skill in the art will appreciate that all or a portion of the steps in the various methods of the above embodiments may be performed by hardware associated with a program that is stored in a computer readable memory, which may include: flash disk, read-Only Memory (ROM), random-access Memory (RandomAccess Memory, RAM), magnetic or optical disk, and the like.
The foregoing is merely exemplary embodiments of the present disclosure and is not intended to limit the scope of the present disclosure. That is, equivalent changes and modifications are contemplated by the teachings of this disclosure, which fall within the scope of the present disclosure. Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a scope and spirit of the disclosure being indicated by the claims.
Claims (8)
1. A proxy network management method, the method comprising:
Sending a query request containing an application package name of an application to a regional server corresponding to an operator network, wherein the query request is used for indicating the regional server to query whether the application package name exists in a database;
receiving a query result corresponding to the query request, and generating a proxy network configuration table based on the query result;
when connecting a virtual private network and running an application, acquiring network attribute information of the application from a proxy network configuration table;
if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, selecting an operator network to run the application, wherein the first attribute is that the application cannot be run by using the virtual private network;
and if the country region is determined to change through scanning the operator network, clearing the proxy network configuration table.
2. The method according to claim 1, wherein the method further comprises:
and if the network attribute information indicates that the proxy network attribute corresponding to the application is a second attribute, selecting the virtual private network to run the application, wherein the second attribute is that the application can be run by using the virtual private network.
3. The method of claim 1, wherein generating a proxy network configuration table based on the query results comprises:
if the query result indicates that the application package name exists in the database, setting the proxy network attribute corresponding to the application as a first attribute, and storing the first attribute in a proxy network configuration table;
and if the query result indicates that the application package name does not exist in the database, setting the proxy network attribute corresponding to the application as a second attribute, and storing the second attribute in the proxy network configuration table.
4. The method according to claim 1 or 2, wherein said connecting a virtual private network and running an application comprises:
connecting a virtual private network by running a proxy application; or (b)
The virtual private network is connected by receiving a first open instruction for a proxy network functionality control.
5. The method according to claim 1 or 2, wherein said connecting a virtual private network and running an application comprises:
displaying a setting interface containing a proxy network management function control, receiving a second opening instruction aiming at the proxy network management function control on the setting interface, and executing the steps of connecting a virtual private network and running an application based on the second opening instruction.
6. A proxy network management apparatus, the apparatus comprising:
the attribute acquisition module is used for sending a query request containing an application package name of an application to an area server corresponding to an operator network, wherein the query request is used for indicating the area server to query whether the application package name exists in a database; the proxy network configuration table is used for receiving a query result corresponding to the query request and generating a proxy network configuration table based on the query result; for acquiring network attribute information of an application from a proxy network configuration table when connecting a virtual private network and running the application;
the network operation module is used for selecting an operator network to operate the application if the network attribute information indicates that the proxy network attribute corresponding to the application is a first attribute, wherein the first attribute is that the application cannot be operated by using the virtual private network;
and the clearing unit is used for clearing the proxy network configuration table if the country region is determined to change by scanning the operator network.
7. A computer storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform the method steps of any one of claims 1 to 5.
8. A terminal, comprising: a processor and a memory; wherein the memory stores a computer program adapted to be loaded by the processor and to perform the method steps of any of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110575316.3A CN113315687B (en) | 2021-05-25 | 2021-05-25 | Proxy network management method, device, storage medium and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110575316.3A CN113315687B (en) | 2021-05-25 | 2021-05-25 | Proxy network management method, device, storage medium and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113315687A CN113315687A (en) | 2021-08-27 |
CN113315687B true CN113315687B (en) | 2023-09-08 |
Family
ID=77374910
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110575316.3A Active CN113315687B (en) | 2021-05-25 | 2021-05-25 | Proxy network management method, device, storage medium and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113315687B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8638794B1 (en) * | 2010-04-15 | 2014-01-28 | Cellco Partnership | Method and system for routing traffic across multiple interfaces via VPN traffic selectors and local policies |
CN106878135A (en) * | 2016-12-21 | 2017-06-20 | 新华三技术有限公司 | A kind of connection method and device |
CN108063714A (en) * | 2016-11-09 | 2018-05-22 | 北京国双科技有限公司 | A kind of processing method and processing device of network request |
CN108063712A (en) * | 2016-11-09 | 2018-05-22 | 北京国双科技有限公司 | The sending method and device of a kind of network request |
CN111711556A (en) * | 2020-06-17 | 2020-09-25 | 北京字节跳动网络技术有限公司 | Routing method, device, system, equipment and storage medium of virtual private network |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7155518B2 (en) * | 2001-01-08 | 2006-12-26 | Interactive People Unplugged Ab | Extranet workgroup formation across multiple mobile virtual private networks |
US7085827B2 (en) * | 2001-09-20 | 2006-08-01 | Hitachi, Ltd. | Integrated service management system for remote customer support |
-
2021
- 2021-05-25 CN CN202110575316.3A patent/CN113315687B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8638794B1 (en) * | 2010-04-15 | 2014-01-28 | Cellco Partnership | Method and system for routing traffic across multiple interfaces via VPN traffic selectors and local policies |
CN108063714A (en) * | 2016-11-09 | 2018-05-22 | 北京国双科技有限公司 | A kind of processing method and processing device of network request |
CN108063712A (en) * | 2016-11-09 | 2018-05-22 | 北京国双科技有限公司 | The sending method and device of a kind of network request |
CN106878135A (en) * | 2016-12-21 | 2017-06-20 | 新华三技术有限公司 | A kind of connection method and device |
CN111711556A (en) * | 2020-06-17 | 2020-09-25 | 北京字节跳动网络技术有限公司 | Routing method, device, system, equipment and storage medium of virtual private network |
Also Published As
Publication number | Publication date |
---|---|
CN113315687A (en) | 2021-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10877826B2 (en) | Message processing method and apparatus, storage medium, and computer device | |
US11778430B2 (en) | Layers in messaging applications | |
CN114629865B (en) | Instant messaging system for interacting with dynamically expanding applications | |
CN107889070B (en) | Picture processing method, device, terminal and computer readable storage medium | |
US20170235435A1 (en) | Electronic device and method of application data display therefor | |
WO2019047189A1 (en) | Message display method and device and terminal | |
JP2018531454A (en) | Content integration in non-browser applications | |
JP2018531454A6 (en) | Content integration in non-browser applications | |
US10637804B2 (en) | User terminal apparatus, communication system, and method of controlling user terminal apparatus which support a messenger service with additional functionality | |
WO2021190184A1 (en) | Remote assistance method and apparatus, and storage medium and terminal | |
US20120005267A1 (en) | Platform independent information handling system, communication method, and computer program product thereof | |
CN112653670B (en) | Business logic vulnerability detection method and device, storage medium and terminal | |
CN111124668B (en) | Memory release method, memory release device, storage medium and terminal | |
CN113268212A (en) | Screen projection method and device, storage medium and electronic equipment | |
US20210216177A1 (en) | Navigation bar controlling method and terminal | |
WO2023040584A1 (en) | Device data processing method and apparatus, and electronic device and storage medium | |
CN112260853A (en) | Disaster recovery switching method and device, storage medium and electronic equipment | |
CN111913614B (en) | Multi-picture display control method and device, storage medium and display | |
CN110572815A (en) | Network access method, device, storage medium and terminal | |
CN114222003A (en) | Service calling method, system, device, equipment and storage medium | |
CN113312572A (en) | Resource processing method and device, storage medium and electronic equipment | |
CN115905742A (en) | Data display method, device, equipment and storage medium | |
CN113315687B (en) | Proxy network management method, device, storage medium and terminal | |
CN113286349B (en) | Personal hot spot connection method, device, terminal and storage medium | |
CN113098859B (en) | Webpage page rollback method, device, terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |