KR101580772B1 - Method for monitoring application apparatus therefor - Google Patents

Method for monitoring application apparatus therefor Download PDF

Info

Publication number
KR101580772B1
KR101580772B1 KR1020140077373A KR20140077373A KR101580772B1 KR 101580772 B1 KR101580772 B1 KR 101580772B1 KR 1020140077373 A KR1020140077373 A KR 1020140077373A KR 20140077373 A KR20140077373 A KR 20140077373A KR 101580772 B1 KR101580772 B1 KR 101580772B1
Authority
KR
South Korea
Prior art keywords
application
communication terminal
usage information
blocking
information
Prior art date
Application number
KR1020140077373A
Other languages
Korean (ko)
Inventor
신태영
Original Assignee
주식회사 케이티
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 케이티 filed Critical 주식회사 케이티
Priority to KR1020140077373A priority Critical patent/KR101580772B1/en
Application granted granted Critical
Publication of KR101580772B1 publication Critical patent/KR101580772B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The present invention relates to an application monitoring method and an apparatus therefor, which intercepts transmission of abnormal usage information, caused by errors of an application, to a server. The method for monitoring the state of an application mounted on a terminal comprises the steps of: receiving an interception notice message notifying usage information transmission interception from one or more communications terminal on which the application is mounted; determining whether the interception notice message of the application is received from the communications terminal, the number of which is over a threshold; and as a result of the determination, if the interception notice message of the application is received from the communications terminals, the number of which is over the threshold, the application is determined to be abnormally operated, transmitting a transmission interception command message for the usage information of the application to other communications terminals on which the applications are mounted.

Description

≪ Desc / Clms Page number 1 > Method for monitoring application apparatus therefor &

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method for monitoring an application installed in a communication terminal, and more particularly, to an application monitoring method and apparatus for blocking abnormal usage information generated by an error of an application from being transmitted to a server.

BACKGROUND ART Today, communication terminals such as computers and smart phones are widely deployed, and an Internet infrastructure is widely constructed. Users install various applications in communication terminals and receive various services through respective applications.

As various applications are developed and installed in the communication terminal, the communication service providers check the usage statistics of each application installed in the communication terminal and use the statistical information to improve the service quality. The following patent document discloses a mobile application statistical analysis system.

In order to confirm the usage statistics of the application, when the application is installed, changed, or executed, usage information of the application is transmitted to the server at the communication terminal, and the server analyzes usage information of the application received at each communication terminal, Calculate application usage statistics.

However, when an error occurs in an application installed in a communication terminal, abnormally generated usage information is continuously transmitted to the server due to an application error, which increases the load on the network and the server. In addition, the server has a problem of calculating incorrect application usage statistics due to abnormal usage information.

Korean Patent No. 10-1396547

It is an object of the present invention to provide an application monitoring method and apparatus for preventing unusual usage information from being transmitted from a communication terminal to a server due to an error of an application.

It is another object of the present invention to provide an application monitoring method and an apparatus therefor, which remove usage information generated in an abnormal application from a statistical analysis target and accurately calculate statistics on the usage status of the application.

Other objects and advantages of the present invention will become apparent from the following description, and it will be understood by those skilled in the art that the present invention is not limited thereto. It will also be readily apparent that the objects and advantages of the invention may be realized and attained by means of the instrumentalities and combinations particularly pointed out in the appended claims.

According to a first aspect of the present invention, there is provided a method for monitoring the status of an application installed in a terminal in an application monitoring server, the method comprising: receiving, from one or more communication terminals on which an application is installed, Receiving a notification message; Determining whether a blocking notification message of the application is received from a plurality of communication terminals exceeding a threshold number; And if the blocking notification message of the application is received from the plurality of communication terminals exceeding the threshold number as a result of the determination, it is determined that the application operates abnormally and the usage information of the application is transmitted to another communication terminal And transmitting a transmission blocking indication message to the base station.

According to a second aspect of the present invention, there is provided an application monitoring apparatus including: a storage unit for storing a verification list of an application and a blocking list of an application; A data collection unit for collecting one or more application data from each communication terminal; The application information and the terminal identification information included in the blocking notification message are collected and stored in the verification list, and the verification list is analyzed, An application verifying unit that verifies whether or not a message has been received and, if so, registers the specific application in the block list; And a blocking instruction unit for transmitting a transmission blocking instruction to the communication terminal on which the application registered in the blocking list is installed, for instructing blocking of transmission of usage information of the application.

According to a third aspect of the present invention, there is provided a communication device including at least one application, the application including: a usage information generating module for generating usage information of the application; A usage information transmission module for transmitting the generated usage information to a designated server; A usage information count module for counting the number of usage information transmitted to the server; And an application control module for temporarily stopping the function of the usage information generation module for a specified time when it is determined whether or not the number of the counted usage information exceeds a preset threshold value and exceeds the number .

The present invention prevents transmission of usage information from a communication terminal to an application monitoring server when an error occurs in an application, thereby preventing abnormal usage information from being excessively transmitted to the application monitoring server, It has the advantage of saving resources and server resources.

In addition, the present invention has an advantage in that it can identify an abnormally operating communication terminal based on a blocking notification message received from each communication terminal.

In addition, the present invention excludes from the statistical analysis information on application usage information transmitted from the communication terminal, which has been found to have caused the erroneous operation and abnormal operation, and statistics on the usage of the application more accurately There is an advantage that can be generated.

BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate exemplary embodiments of the invention and, together with the description, serve to explain the principles of the invention. And shall not be construed as limited to such matters.
1 is a diagram illustrating a configuration of an application monitoring system according to an embodiment of the present invention.
2 is a diagram showing the configuration of an application installed in a communication terminal according to an embodiment of the present invention.
3 is a flowchart illustrating a method of controlling the operation of an application according to the number of generation of usage information of an application, according to an embodiment of the present invention.
4 is a diagram illustrating a configuration of an application monitoring server according to an embodiment of the present invention.
5 is a flowchart illustrating a method for verifying an abnormal application and a communication terminal based on a blocking notification message received from a communication terminal in an application monitoring server according to an embodiment of the present invention.
6 is a flowchart illustrating a method of controlling an operation of an application installed in a communication terminal based on a block list in an application monitoring server according to an embodiment of the present invention.
7 is a flowchart illustrating a method of controlling an operation of an application installed in a communication terminal based on a block list in an application monitoring server according to another embodiment of the present invention.
8 is a flowchart illustrating a method of calculating statistics on application usage status in an application monitoring server according to an exemplary embodiment of the present invention.

The foregoing and other objects, features and advantages of the present invention will become more apparent from the following detailed description of the present invention when taken in conjunction with the accompanying drawings, in which: There will be. In the following description, well-known functions or constructions are not described in detail since they would obscure the invention in unnecessary detail. Hereinafter, a preferred embodiment of the present invention will be described in detail with reference to the accompanying drawings.

1 is a diagram illustrating a configuration of an application monitoring system according to an embodiment of the present invention.

As shown in FIG. 1, an application monitoring system according to an embodiment of the present invention includes a plurality of communication terminals 100-N and an application monitoring server 200. The communication terminal 100-N and the application monitoring server 200 communicate with each other through the network 300. The network 300 includes a mobile communication network, a broadband wired communication network, and the like, and corresponds to a well-known conventional technology in the present invention.

When the specific application is installed, changed or executed, the communication terminal 100-N is a communication device in which one or more applications are installed. The communication terminal 100-N is a communication device that transmits the terminal identification information, application identification information , Execution menu identification information, use time, and the like to the application monitoring server 200. [ Further, when the usage information generated in the specific application during the reference time (for example, one minute) exceeds the threshold value (for example, 30), the communication terminal 100-N temporarily transmits usage information and usage information generation . Further, when the number of use information transmission interruptions of a specific application exceeds a predetermined threshold number (for example, three times), the communication terminal 100-N transmits identification information of the specific application, version information, ) To the application monitoring server (200). The communication terminal 100-N can be installed as an application and can communicate with the application monitoring server 200 via the network 300 as a desktop computer, a tablet computer, a PDA (Personal Digital Assistants), a mobile communication terminal, Possible devices are not limited and can be adopted.

The application monitoring server 200 calculates statistics on the usage status of each application and performs a function of checking whether or not each application has an error. Specifically, the application monitoring server 200 analyzes a plurality of pieces of usage information received from each communication terminal 100-N, and generates statistics on the usage status of each application. In particular, when the application monitoring server 200 receives the blocking notification message from the communication terminal 100-N, the application monitoring server 200 maps the identification information of the application included in the blocking notification message, the version information, and the terminal identification information and registers them in the verification list . In addition, the application monitoring server 200 can receive, from the communication terminal 100-N exceeding a threshold number (for example, 10) for a certain period of time (for example, 30 days) It is determined that the specific application is an abnormal application and the identification information and version information of the application are registered in the block list.

On the other hand, the application monitoring server 200 confirms the identification information of the application registered in the block list, transmits a transmission cutoff instruction message to the communication terminal 100-N provided with the application matching the identification information and the version information, And controls the communication terminal 100-N to stop transmitting the usage information of the application. In one embodiment, when the application monitoring server 200 receives from the communication terminal 100-N usage information including identification information and version information of an application registered in the block list, the application terminal 100- N to transmit a transmission blocking indication message. In another embodiment, the application monitoring server 200 identifies one or more communication terminals 100-N in which an abnormal application is installed based on the terminal-specific application installation information being stored, and identifies each communication terminal 100- A transmission blocking indication message may be transmitted. Preferably, the application monitoring server 200 transmits the transmission blocking indication message in the form of a push message so that the transmission blocking command included in the transmission blocking indication message is executed through a designated application (i.e., an abnormally determined application) .

In addition, the application monitoring server 200 checks the number of applications being blocked to transmit to the communication terminal 100-N for each communication terminal 100-N based on the data recorded in the verification list, If there is a communication terminal 100-N whose number is not less than a predetermined number (for example, two), it is determined that a failure has occurred in the communication terminal 100-N itself. In addition, the application monitoring server 200 registers the identification information of the communication terminal 100-N, which has determined that the failure has occurred, in the abnormal terminal list. In this case, the application monitoring server 200 may transmit to the communication terminal 100-N a message advising to perform software or hardware diagnosis of the communication terminal 100-N.

Preferably, the application monitoring server 200 excludes the application registered in the block list from the statistical object when generating the statistics on the usage status of the application, based on the usage information, and also identifies the communication terminal identified in the abnormal terminal list And excludes the usage information including the identification information of the communication terminal from the statistical object.

2 is a diagram showing the configuration of an application installed in a communication terminal according to an embodiment of the present invention.

2, the communication terminal 100-N according to an embodiment of the present invention includes one or more applications 110, each application 110 includes a usage information generation module 111, usage information A transfer module 112, a usage information count module 113, and an application control module 114. [ The respective modules 111, 112, 113 and 114 included in the application 110 are installed in the application 110 when the application 110 is installed in the communication terminal 100-N.

The usage information generation module 111 generates the usage information including the terminal identification information, the application identification information, the application version information, the terminal model information, the execution menu identification information, the usage time, and the like in the case where the application 110 is installed, Generates application usage information. In particular, when a specific menu is selected from a plurality of menus implemented in the application 110, the usage information generation module 111 generates usage information including the menu identification information. That is, the usage information generating module 111 generates usage information of the application each time a menu is selected by the user. Further, the usage information generation module 111 stops generation of usage information temporarily or continuously under the control of the application control module 114. [

The usage information transmission module 112 transmits the usage information generated by the usage information generation module 111 to the application monitoring server 200 via the network 300. [ In addition, when the use information transmission module 112 is instructed to interrupt the transmission from the application control module 114, the usage information transmission module 112 temporarily or permanently stops the transmission of the usage information.

The usage information count module 113 counts usage information transmitted from the usage information transmission module 112. That is, the usage information count module 113 counts the usage information transmitted from the usage information transmission module 112 at intervals of a reference time (e.g., 1 minute), and transmits the counted usage information count to the application control module 114 .

The application control module 114 determines whether or not the application is normally operating based on the number of usage information transmitted from the usage information count module 113 and controls the operation of the application according to the determination result. Specifically, the application control module 114 checks whether the number of usage information transmitted from the usage information count module 113 exceeds a threshold value (for example, 30). If the usage information is below a threshold value, . On the other hand, when the number of usage information exceeds the threshold value, the application control module 114 determines that the application operates abnormally and excessive usage information is generated in the usage information generation module 111, (For example, 1 minute), and also controls the use information transmission module 112 to temporarily suspend transmission of the usage information for a specified period of time. At this time, the application control module 114 increases the number of times of stopping the transmission of the usage information of the application by '1'.

On the other hand, when the number of usage information transmission interruption times of the application exceeds a predetermined threshold number (for example, three times), the application control module 114 controls the usage information generation module 111 and the usage information transmission module 112 Generates a blocking notification message including the identification information of the application and the version information and the identification information of the communication terminal 100-N and notifies the blocking of the use information transmission, And transmits the generated blocking notification message to the application monitoring server 200.

When the application control module 114 receives the transmission interruption instruction message from the application monitoring server 200, the application control module 114 transmits the transmission interruption instruction message to the usage information generation module 111, (112) to continuously stop generation and transmission of usage information. After the application 110 corresponding to the application identification information acquires the transmission interruption instruction message, the transmission interruption indication message includes application identification information, . Meanwhile, when the application corresponding to the application identification information 110 included in the transmission blocking indication message is removed from the communication terminal 100-N, the communication terminal 100-N discards the transmission blocking indication message.

On the other hand, the application control module 114 resets (i. E., Sets to '0') the number of times the application 110 stops using the application when the application 110 is updated or reinstalled, And resumes transmission.

3 is a flowchart illustrating a method of controlling the operation of an application according to the number of generation of usage information of an application, according to an embodiment of the present invention.

3, when the application 110 is installed, changed or executed, the usage information generating module 111 generates usage information using the terminal identification information, the application identification information, the application version information, the terminal model information, the execution menu identification information, The usage information of the application including the time and the like is generated (S301). At this time, the usage information generating module 111 generates usage information including the menu identification information whenever a specific menu is selected from a plurality of menus implemented in the application 110. [ Then, the usage information transmission module 112 transmits the usage information generated by the usage information generation module 111 to the application monitoring server 200 via the network 300 (S303).

The usage information count module 113 counts the usage information transmitted from the usage information transmission module 112 at intervals of a reference time (for example, 1 minute), and transmits the counted number of usage information to the application control module 114 (S305).

Then, the application control module 114 checks whether the number of usage information received from the usage information count module 113 exceeds a threshold (for example, 30) (S307). Then, the application control module 114 determines that the application is operating normally if the number of the usage information is less than the threshold value, and causes the application control module 114 to proceed again after step S301.

On the other hand, when the number of pieces of usage information exceeds the threshold value, the application control module 114 determines that the application operates abnormally and excessive usage information is generated in the usage information generation module 111, The function of the usage information transmission module 112 is suspended so that the function of the usage information transmission module 112 is temporarily stopped for a specified time (for example, 1 minute) And temporarily stops (S309).

Next, the application control module 114 increments the number of times of stopping the transmission of the usage information of the application to '1' (S311) as the generation and transmission of the usage information are temporarily stopped. Then, the application control module 114 determines whether or not the number of times of stopping the increased use information transmission interruption exceeds a preset threshold number (for example, three times) (S313) and, if exceeded, temporarily stops the function The usage information generation module 111 and the usage information transmission module 112 are continuously stopped so that the usage information is not continuously generated and the usage information is continuously blocked from being transmitted to the application monitoring server 200 (S315).

Then, the application control module 114 generates a blocking notification message including the identification information of the application, the version information, and the identification information of the communication terminal 100-N, And transmits a notification message to the application monitoring server 200 (S317).

On the other hand, in step S313, if the number of times the use information transmission interruption increased in step S311 does not exceed a preset threshold number (for example, three times), the application control module 114 determines that the specified time The usage information generation module 111 and the usage information transmission module 112 are restarted again and the process proceeds from step S301.

4 is a diagram illustrating a configuration of an application monitoring server according to an embodiment of the present invention.

4, the application monitoring server 200 according to an embodiment of the present invention includes a data collecting unit 210, a storing unit 220, an application verifying unit 230, a blocking instruction unit 240, A verification unit 250, and a statistical processing unit 260.

The data collection unit 210 collects usage information from each communication terminal 100-N through the network 300 and stores the usage information in the storage unit 220. [ The data collecting unit 210 receives the blocking notification message from the communication terminal 100-N and transmits the blocking notification message to the application verification unit 230. [

The storage unit 220 stores a plurality of pieces of usage information and stores one or more pieces of application installation information (i.e., application identification information and version information) installed in each communication terminal 100-N by communication terminals. Also, the storage unit 220 stores the terminal identification information, the verification list in which the version information of the application and the identification information are mapped, and the blocking list in which the identification information of the application and the version information are registered. In addition, the storage unit 220 stores an abnormal terminal list in which identification information of a communication terminal operating abnormally is registered.

The application verifying unit 230 performs a function of verifying whether or not each application is normal. Specifically, when the data collecting unit 210 collects the blocking notification message, the application verifying unit 230 maps the identification information of the application included in the blocking notification message, the version information, and the terminal identification information, In the verification list.

The application verifying unit 230 verifies the number of communication terminals 100 (for example, 10) over a predetermined time (e.g., 30 days) based on the data registered in the verification list of the storage unit 220 N), it is determined that the particular application is an abnormal application, and the identification information and the version information of the application are stored in the block list of the storage unit 220 Register.

The blocking instruction unit 240 checks identification information and version information of the application registered in the blocking list of the storage unit 220 and transmits the identification information and the version information to the communication terminal 100- And transmits a transmission cutoff instruction message including a control command. In one embodiment, when the use information including the identification information of the application registered in the block list and the version information is collected by the data collecting unit 210, the block instructing unit 240 transmits the usage information to the communication terminal 100 -N) < / RTI > In other embodiments, the block indicator 240 may include one or more communication terminals 100 - 100 installed with an abnormal application (that is, an application registered in the block list) based on the per-terminal application installation information and the block list stored in the storage unit 220. [ N, and transmits a transmission cutoff instruction message to each communication terminal 100-N thus identified. At this time, the blocking instruction unit 240 transmits the transmission blocking instruction message in the form of a push message so that the blocking control command included in the transmission blocking instruction message can be executed through the corresponding application.

The terminal verification unit 250 performs a function of verifying the abnormally operating communication terminal 100-N based on the verification list of the storage unit 220. Specifically, the terminal verification unit 250 checks the number of applications that are blocked for transmission to the communication terminal 100-N for each communication terminal 100-N based on the data recorded in the verification list of the storage unit 220 , It is checked whether or not there exists a communication terminal 100-N whose number of applications is more than a preset number (for example, two) during transmission blocking. That is, the terminal verification unit 250 checks the number of the blocking notification messages for each terminal, and checks whether the communication terminal 100-N that has transmitted the blocking notification message at a predetermined number or more exists. If there is a communication terminal 100-N having a predetermined number or more of applications being blocked for transmission (that is, if there is a communication terminal that has transmitted a blocking notification message in a predetermined number or more) , It is determined that a failure has occurred in the communication terminal 100-N itself, and the identification information of the communication terminal 100-N is registered in the abnormal terminal list. Preferably, the terminal verification unit 250 can transmit a message to the communication terminal 100-N registered in the abnormal terminal list to advise that the operating terminal 100-N perform an operating system or hardware diagnosis have.

The statistical processing unit 260 calculates statistics on the usage status of the application based on a plurality of pieces of usage information stored in the storage unit 220. [ Specifically, the statistical processing unit 260 selects usage information having a usage time included in a specific period from a plurality of stored usage information, analyzes the selected usage information, calculates application statistics, Statistics for frequently used applications by day of week or time of day, and frequently used application statistics for different carriers. At this time, the statistical processing unit 260 firstly removes the usage information having the identification information and the version information of the application registered in the block list from among the plurality of pieces of usage information selected, and further adds the terminal identification information registered in the abnormal terminal list After removing the usage information of the application, it analyzes the usage information thus removed, and calculates statistics on the usage status of the application.

5 is a flowchart illustrating a method for verifying an abnormal application and a communication terminal based on a blocking notification message received from a communication terminal in an application monitoring server according to an embodiment of the present invention.

Referring to FIG. 5, the data collection unit 210 continuously monitors whether or not data is received from the communication terminal 100-N (S501). When the usage information is received from the communication terminal 100-N, the data collection unit 210 stores the usage information in the storage unit 220. When the usage notification is received from the communication terminal 100-N, And transmits a blocking notification message to the application verification unit 230 (S503).

When receiving the blocking notification message from the data collecting unit 210, the application verifying unit 230 maps the identification information of the application included in the blocking notification message, the version information, and the terminal identification information, (S505).

Next, as the verification list is updated, the application verification unit 230 checks the identification information and version information of the application included in the newly registered data and sets the number of the terminal identification information mapped with the identification information and the version information (S507). In other words, the application verifying unit 230 refers to the verification list of the number of the communication terminals 100-N that have sent the blocking notification message due to an operation error of the application corresponding to the identification information of the application and the version information Check. At this time, if there is duplicate terminal identification information, the application verifier 230 removes the duplicate terminal identification information and counts the duplicated terminal identification information.

Then, the application verification unit 230 checks whether the counted number of the terminal identification information exceeds the threshold number (10, for example) (S509), and if not, proceeds to step S513. On the other hand, if the number of counted terminal identification information exceeds the threshold number, the application verifying unit 230 judges whether the number of the terminal identification information is larger than the threshold number, from the plurality of communication terminals 100- The identification information and the version information of the application are registered in the blocking list in the storage unit 220 in step S511 and the data having the application identification information and the version information is registered in the verification list of the storage unit 220 .

Next, the terminal verification unit 250 checks the terminal identification information included in the newly registered data in the verification list of the storage unit 220, and counts the application identification information mapped with the terminal identification information in the verification list (S513). Then, the terminal verification unit 250 checks whether the number of counted application identification information is equal to or greater than a specified number (for example, two), and if it is less than the specified number, the terminal verification unit 250 proceeds to step S501 and thereafter again. On the other hand, if the number of the counted application identification information is greater than or equal to the designated number, the terminal verification unit 250 registers the terminal identification information in the abnormal terminal list of the storage unit 220 (S515, S517). That is, based on the data registered in the verification list, the terminal verification unit 250 checks whether or not the number of applications being blocked by the communication terminal 100-N that transmitted the blocking notification message is abnormal, The communication terminal 100-N that has transmitted the blocking notification message determines that a failure has occurred, and registers the terminal identification information in the abnormal terminal list of the storage unit 220. At this time, the terminal verification unit 250 may transmit a message to the communication terminal 100-N registered in the abnormal terminal list to advise that the operating terminal 100-N perform an operating system or hardware diagnosis .

On the other hand, the application verifying unit 230 periodically checks whether or not data having a predetermined period (for example, one month) elapses from the data recorded in the verification list of the storage unit 220, Remove from the verification list.

6 is a flowchart illustrating a method of controlling an operation of an application installed in a communication terminal based on a block list in an application monitoring server according to an embodiment of the present invention.

Referring to FIG. 6, the blocking instruction unit 240 monitors usage information collected by the data collection unit 210 (S601). When usage information is collected, the blocking instruction unit 240 checks the identification information and version information of the application included in the usage information (S603).

In operation S605, the blocking instruction unit 240 determines whether data matching the identified application and version information is registered in the blocking list of the storage unit 220. If the identification information and version information of the application identified in step S603 are not recorded in the blocking list of the storage unit 220, the blocking instruction unit 240 proceeds to step S601 and subsequent steps.

On the other hand, when the identification information and version information of the application identified in step S603 are registered in the blocking list of the storage unit 220, the blocking instruction unit 240 abnormally informs the communication terminal 100-N that transmitted the use information The communication terminal 100-N determines that the identified application is installed, and transmits a transmission blocking instruction message to the communication terminal 100-N (S607) The usage information of the application is generated and blocked from being transmitted to the application monitoring server 200.

7 is a flowchart illustrating a method of controlling an operation of an application installed in a communication terminal based on a block list in an application monitoring server according to another embodiment of the present invention.

7, when the new data is registered in the blocking list of the storage unit 220 at regular intervals, the blocking instruction unit 240 checks the identification information and version information of the application registered in the blocking list (S701) .

The blocking instruction unit 240 checks one or more communication terminals 100-N installed with the application corresponding to the identified application and version information from the application installation information of the storage unit 220 (S703). Next, the blocking instruction unit 240 transmits a transmission blocking instruction message including the blocking control command to each of the communication terminals 100-N identified above, and the usage information generated through the application registered in the blocking list is transmitted to the application monitoring server 200) (S705). At this time, the blocking instruction unit 240 transmits the transmission blocking instruction message as a push message so that the blocking control command can be received and executed through the application that is abnormally identified. Accordingly, when the corresponding application is continuously installed, the communication terminal 100-N having received the specialized transmission blocking message blocks generation and transmission of the usage information of the application based on the blocking control command, The transmission interruption instruction message is ignored.

8 is a flowchart illustrating a method of calculating statistics on application usage status in an application monitoring server according to an exemplary embodiment of the present invention.

8, the statistical processing unit 260 selects a plurality of pieces of usage information corresponding to an analysis target period (for example, one month or one week) from a plurality of usage information stored in the storage unit 220 as statistical target data (S801).

In step S803, the statistical processing unit 260 primarily excludes use information having application identification information and version information registered in the block list from the selected plurality of usage information, from the statistical object data. In step S805, the statistical processing unit 260 secondarily excludes usage information having identification information of the communication terminal registered in the abnormal terminal list of the storage unit 220 from the selected plurality of usage information from the statistical data. That is, the statistical processing unit 260 excludes use information transmitted from the communication terminal 100-N registered in the abnormal terminal list from the statistical object data.

Next, the statistical processing unit 260 analyzes the primary and secondary filtered usage information, and analyzes application statistics frequently used for each terminal model, statistics on frequently used applications for each day of the week or time period, Statistics, and the like (S807).

As described above, according to the present invention, when the communication device 100-N generates an error in the application, transmission of the usage information to the application monitoring server 200 is blocked, and the abnormal usage information is excessively transmitted to the application monitoring server 200 Thereby saving the resources of the network 300 and the application monitoring server 200 from having to handle abnormal usage information. In addition, the application monitoring server 200 according to the present invention can confirm the abnormally operating communication terminal 100-N based on the blocking notification message received from each communication terminal 100-N. In addition, the application monitoring server 200 excludes from the statistical analysis the usage information of the application that has been found to have failed and the application usage information transmitted from the communication device 100-N, which has been found to have performed an abnormal operation, You can accurately generate usage statistics for your application.

While the specification contains many features, such features should not be construed as limiting the scope of the invention or the scope of the claims. In addition, the features described in the individual embodiments herein may be combined and implemented in a single embodiment. Conversely, various features described in the singular < Desc / Clms Page number 5 > embodiments herein may be implemented in various embodiments individually or in combination as appropriate.

Although the operations have been described in a particular order in the figures, it should be understood that such operations are performed in a particular order as shown, or that all described operations are performed to obtain a sequence of sequential orders, or a desired result . In certain circumstances, multitasking and parallel processing may be advantageous. It should also be understood that the division of various system components in the above embodiments does not require such distinction in all embodiments. The above-described program components and systems can generally be implemented as a single software product or as a package in multiple software products.

The method of the present invention as described above can be implemented by a program and stored in a computer-readable recording medium (CD-ROM, RAM, ROM, floppy disk, hard disk, magneto optical disk, etc.). Such a process can be easily carried out by those skilled in the art and will not be described in detail.

It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit or scope of the invention. The present invention is not limited to the drawings.

100-N: communication terminal 110: application
111: usage information generation module 112: usage information transmission module
113: Usage information count module 114: Application control module
200: Application monitoring server 210: Data collection unit
220; Storage unit 230: application verification unit
240: blocking processing unit 250: terminal verification unit
260: statistical processing unit 300: network

Claims (18)

A method for monitoring the status of an application installed on a terminal at an application monitoring server,
The method comprising: receiving a blocking notification message informing blocking of use of the application from at least one communication terminal on which the application is installed;
Determining whether a blocking notification message of the application is received from a plurality of communication terminals exceeding a threshold number; And
If it is determined that the application has been disconnected from the plurality of communication terminals in excess of the threshold number, it is determined that the application is operating abnormally and the application information of the application is transmitted to another communication terminal And transmitting a transmission blocking indication message to the base station,
Checking the number of blocking notification messages received from each communication terminal for each communication terminal; And
Further comprising the step of determining that a failure has occurred in the specific communication terminal when a blocking notification message is received from a specific communication terminal in a predetermined number or more.
delete The method according to claim 1,
After the determining step,
And transmitting, by the application monitoring server, a message to the specific communication terminal to induce a terminal check progress.
The method according to claim 1,
Further comprising analyzing usage information of each application received from each communication terminal and generating statistics on usage by application.
5. The method of claim 4,
Wherein the generating the statistics comprises:
Firstly excluding use information about an abnormally operating application from a statistical object; And
And secondarily excluding usage information of an application transmitted from the communication terminal determined to have a failure as a statistic object.
The method according to any one of claims 1, 3, 4, and 5,
Wherein the step of transmitting the transmission interruption indication message comprises:
And when the usage information for an application that operates abnormally is received from the other communication terminal, the transmission blocking instruction message is transmitted to the other communication terminal.
The method according to any one of claims 1, 3, 4, and 5,
Wherein the step of transmitting the transmission interruption indication message comprises:
Identifies the other communication terminal in which an abnormally operating application is installed based on previously stored application installation information, and transmits the transmission blocking instruction message to the identified other communication terminal.
A storage unit for storing a verification list of the application and a blocking list of the application;
A data collection unit for collecting one or more application data from each communication terminal;
The application information and the terminal identification information included in the blocking notification message are collected and stored in the verification list, and the verification list is analyzed, An application verifying unit that verifies whether or not a message has been received and, if so, registers the specific application in the block list; And
And a blocking instruction unit for transmitting a message instructing blocking of transmission of usage information of the application to a communication terminal on which the application registered in the block list is mounted.
9. The method of claim 8,
The verification list of the storage unit is analyzed and the number of blocking notification messages received from each communication terminal is checked for each communication terminal. When a blocking notification message is received from a specific communication terminal in a predetermined number or more, And a terminal verification unit for registering the terminal in the terminal list.
10. The method of claim 9,
The terminal verification unit,
And transmits a message for inducing the terminal check progress to the specific communication terminal registered in the abnormal terminal list.
10. The method of claim 9,
The storage unit stores one or more application usage information received from each communication terminal,
Further comprising: a statistics processor for analyzing usage information of the at least one application and generating statistics for usage by application.
12. The method of claim 11,
The statistical processing unit,
The use information for the application registered in the block list is excluded first from the statistical object, the utilization information received from the communication terminal registered in the abnormal terminal list is excluded secondarily from the statistical object, And analyzing the filtered usage information to generate statistics on usage by application.
13. The method according to any one of claims 8 to 12,
The blocking instruction unit,
And when the use information of the application registered in the block list is received from the communication terminal, transmits the transmission blocking instruction message to the communication terminal.
13. The method according to any one of claims 8 to 12,
The storage unit stores application installation information for each communication terminal,
The blocking instruction unit,
Confirms the communication terminal on which the application registered in the block list is installed from the installation information, and transmits the transmission blocking instruction message to the one or more communication terminals thus confirmed.
13. The method according to any one of claims 8 to 12,
The application verification unit,
Checking whether or not there is data that has elapsed in a predetermined period from the data registered in the verification list, and deleting the data that has elapsed from the verification list if it exists.
A communication device comprising one or more applications,
The application comprises:
A usage information generating module for generating usage information of the application;
A usage information transmission module for transmitting the generated usage information to a designated server;
A usage information count module for counting the number of usage information transmitted to the server; And
And an application control module for temporarily stopping the function of the usage information generation module for a specified time if the number of the counted usage information exceeds a preset threshold value,
The application control module comprising:
When the function of the usage information generating module is temporarily stopped, the number of transmission interruption times is increased, and if it is determined that the increased number of transmission interruption times exceeds the threshold number, Is continuously stopped.
delete 17. The method of claim 16,
The application control module comprising:
Generates a blocking notification message informing that the usage information transmission of the application is aborted, and transmits the blocking notification message to the server when the function of the usage information generation module is continuously stopped.
KR1020140077373A 2014-06-24 2014-06-24 Method for monitoring application apparatus therefor KR101580772B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020140077373A KR101580772B1 (en) 2014-06-24 2014-06-24 Method for monitoring application apparatus therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020140077373A KR101580772B1 (en) 2014-06-24 2014-06-24 Method for monitoring application apparatus therefor

Publications (1)

Publication Number Publication Date
KR101580772B1 true KR101580772B1 (en) 2015-12-28

Family

ID=55085147

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020140077373A KR101580772B1 (en) 2014-06-24 2014-06-24 Method for monitoring application apparatus therefor

Country Status (1)

Country Link
KR (1) KR101580772B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127311A (en) * 2021-05-13 2021-07-16 中国建设银行股份有限公司 Anomaly detection method and device
KR102618998B1 (en) * 2022-12-21 2024-01-02 쿠팡 주식회사 User terminal for providing information notifying occurrence of errors of applications and method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050040050A (en) * 2003-10-27 2005-05-03 엘지전자 주식회사 Apparatus and method of suppressing messages in the access gateway system
KR20110051565A (en) * 2009-11-10 2011-05-18 엘지전자 주식회사 Application storage server and method for operating thereof
KR20130046788A (en) * 2011-10-28 2013-05-08 주식회사 케이티 Terminal unit and observation server
KR101396547B1 (en) 2013-11-28 2014-05-20 주식회사 제이윈파트너스 Mobile application statistical analysis system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050040050A (en) * 2003-10-27 2005-05-03 엘지전자 주식회사 Apparatus and method of suppressing messages in the access gateway system
KR20110051565A (en) * 2009-11-10 2011-05-18 엘지전자 주식회사 Application storage server and method for operating thereof
KR20130046788A (en) * 2011-10-28 2013-05-08 주식회사 케이티 Terminal unit and observation server
KR101396547B1 (en) 2013-11-28 2014-05-20 주식회사 제이윈파트너스 Mobile application statistical analysis system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127311A (en) * 2021-05-13 2021-07-16 中国建设银行股份有限公司 Anomaly detection method and device
KR102618998B1 (en) * 2022-12-21 2024-01-02 쿠팡 주식회사 User terminal for providing information notifying occurrence of errors of applications and method thereof

Similar Documents

Publication Publication Date Title
CN110377570B (en) Node switching method and device, computer equipment and storage medium
JP5430744B2 (en) System and method for real-time performance and load statistics of a communication system
CN104126285A (en) Method and apparatus for rapid disaster recovery preparation in a cloud network
CN108572898B (en) Method, device, equipment and storage medium for controlling interface
US20150264644A1 (en) Optimization of mobile phone service during power failure
JP6454412B2 (en) Control message transmission method, apparatus, and computer storage medium
CN108632106B (en) System for monitoring service equipment
CN111970339B (en) Request control method and device and electronic equipment
JP4456021B2 (en) User guidance system, mobile communication terminal, and user guidance method
KR101580772B1 (en) Method for monitoring application apparatus therefor
EP2954733A1 (en) Transmission power regulation
US10176069B2 (en) Quorum based aggregator detection and repair
CN110753002B (en) Traffic scheduling method and device
WO2016161606A1 (en) Message transmitting/receiving method, coverage enhancement level determination/acquisition method and related device
CN110098884A (en) Determine exception clock
JP2017529797A (en) Early warning information data processing method and apparatus
EP2717555B1 (en) Communication device and information collection method
WO2012051778A1 (en) System and method for realizing service switching of network element in multimedia message service
CN108156086B (en) Policy rule issuing method and device
US10747632B2 (en) Data redundancy and allocation system
US20160254979A1 (en) Communication system, common service control apparatus, data transmission method, and non-transitory computer readable medium
KR20130109410A (en) Method and apparatus for controlling push notification message transmit cycle in push notification services by communication system
JP2011193064A (en) System, method, and program for polling transmission
JP2014072817A (en) Wireless communication method, tracking area management device, and mobility management device
US6434713B1 (en) Processor management method of mobile communication home location register (HLR) system

Legal Events

Date Code Title Description
GRNT Written decision to grant