WO2015003601A1 - 流量提醒方法、装置及终端 - Google Patents

流量提醒方法、装置及终端 Download PDF

Info

Publication number
WO2015003601A1
WO2015003601A1 PCT/CN2014/081780 CN2014081780W WO2015003601A1 WO 2015003601 A1 WO2015003601 A1 WO 2015003601A1 CN 2014081780 W CN2014081780 W CN 2014081780W WO 2015003601 A1 WO2015003601 A1 WO 2015003601A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
traffic
software
screen
preset threshold
Prior art date
Application number
PCT/CN2014/081780
Other languages
English (en)
French (fr)
Inventor
杨朗
贝小玲
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2015003601A1 publication Critical patent/WO2015003601A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/026Capturing of monitoring data using flow identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware

Definitions

  • the present invention belongs to the field of network technologies, and in particular, to a method, device and terminal for traffic reminding. Background of the invention
  • Some mobile terminals monitor the data traffic generated by all software networks installed in their systems, and monitor the traffic of all software on the screen of the mobile terminal at regular intervals (for example, every five minutes). The display is performed to prompt the user for the current traffic consumption of the mobile terminal.
  • the above traffic monitoring can only be performed when the screen of the mobile terminal is in an active state, and the traffic alert only uses time as a trigger point, and some malware can be squandered when the screen of the mobile terminal is in a lock screen state or a closed state.
  • the existing traffic monitoring and reminding methods cannot monitor the data traffic consumption of the malware, and cannot promptly remind the user, so that the traffic consumption of the mobile terminal cannot be controlled, and the traffic cost is greatly increased. Summary of the invention
  • the embodiment of the invention provides a traffic alerting method, which aims to solve the problem that the existing traffic alerting method is likely to cause a large increase in the traffic cost of the terminal.
  • a method for alerting traffic including: When detecting that the screen of the terminal is switched to the inactive state, monitoring the accumulated traffic generated by each software in the terminal in the inactive state of the screen of the terminal; determining whether the accumulated traffic of the software exceeds Preset threshold;
  • the traffic of the terminal is prompted to be abnormal.
  • the embodiment of the invention further provides a traffic alerting device, including:
  • a monitoring unit configured to monitor, when detecting that the screen of the terminal is switched to the inactive state, the accumulated traffic generated by each software in the terminal in the inactive state of the screen of the terminal;
  • the determining unit is configured to determine whether the accumulated traffic of the software exceeds a preset threshold; and the prompting unit is configured to prompt the abnormality of the traffic of the terminal when it is determined that the accumulated traffic of the software exceeds the preset threshold.
  • An embodiment of the present invention further provides a terminal, including the traffic alerting device as described above.
  • the embodiment of the invention further provides a computer storage medium, comprising computer program code, for performing the steps of the above method.
  • the traffic generated by each software on the terminal when the screen of the terminal is in an inactive state can be monitored. Once the data traffic of some software is monitored to be excessively consumed, the traffic anomaly can be promptly alerted. With the embodiment of the present invention, the malware can be prevented from consuming the traffic of the terminal without the user's knowledge, thereby effectively controlling the traffic consumption of the terminal and reducing the traffic cost of the terminal.
  • FIG. 1 is a flowchart of implementing a traffic alerting method according to an embodiment of the present invention
  • FIG. 2 is a flowchart of an implementation of a traffic alerting method according to another embodiment of the present invention
  • FIG. 3 is a specific implementation flow of step S103 of a traffic alerting method according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a prompt interface for implementing a traffic alerting method according to an embodiment of the present invention
  • FIG. 5 is a specific implementation flowchart of step S103 of the traffic alerting method according to another embodiment of the present invention.
  • FIG. 6 is a structural block diagram of a traffic alerting apparatus according to an embodiment of the present invention.
  • FIG. 7 is a block diagram showing a part of a structure of a mobile phone that implements a traffic alerting method according to an embodiment of the present invention. Mode for carrying out the invention
  • the traffic reminding device monitors the traffic generated by each software on the terminal when the screen of the terminal is in an inactive state. Once it is monitored that some software consumes too much traffic, the traffic alerting device can promptly alert the traffic anomaly. With the embodiment of the present invention, the malware can be prevented from consuming the traffic of the terminal without the user's knowledge, thereby effectively controlling the traffic consumption of the terminal and reducing the traffic cost of the terminal.
  • the traffic alerting device may be a module or a chip mounted on the terminal.
  • FIG. 1 is a flowchart of an implementation of a traffic alerting method provided by an embodiment of the present invention. As shown in FIG. 1, the method includes the following steps.
  • the traffic reminding device monitors the accumulated traffic generated by each software in the terminal when the screen of the terminal is in the inactive state.
  • the inactive state includes a screen off state.
  • the terminal operation timeout may be that the user does not trigger any operation of the terminal for more than a certain preset threshold.
  • the inactive state includes a screen lock state.
  • the screen of the mobile terminal enters a screen lock state.
  • the screen lock state even if the screen of the mobile terminal is lit, the screen of the mobile terminal is still in the screen lock state before the screen unlocking operation is performed, thereby preventing the user from malfunctioning the mobile terminal. Under this screen lock state, it is impossible to perform any operation other than the unlock operation on the mobile terminal.
  • the screen of the terminal is in an active state, that is, the state in which the screen of the terminal is lit and the screen is not locked.
  • the traffic alerting device when it is detected that the screen of the terminal is switched from the activated state to the inactive state, the traffic alerting device accumulates the traffic generated by each software in the terminal in the network in which the terminal's screen is in an inactive state.
  • the software in the terminal includes, but is not limited to, application software and system software already installed in the terminal, and also includes uninstalled application software downloaded or stored in the terminal. Since some malware is downloaded or stored in the terminal, it is possible to generate traffic on the network without performing an installation. Therefore, it is necessary to monitor the uninstalled software to minimize the consumption of terminal traffic by the malware.
  • the traffic alerting device can obtain the uplink traffic and the downlink traffic generated by each software networking in real time. Moreover, since the screen of the terminal is switched to the inactive state, the traffic reminder device accumulates the traffic generated by each software networking from zero, thereby real-time Monitors the cumulative traffic generated by each software when the terminal's screen is inactive. In this embodiment, when the screen of the terminal is switched from the inactive state to the activated state, the traffic reminding device clears the accumulated traffic of each software. When the screen of the terminal is switched to the inactive state again, the traffic reminder device re-accumulates the traffic generated by each software networking from zero.
  • API Application Program Interface
  • the traffic alerting device determines whether the accumulated traffic of the software exceeds a preset threshold.
  • the preset threshold may be set by the system, or may be customized by the user of the terminal according to the current software environment of the terminal, or may be determined by the server according to the statistics of the background data and then delivered to the terminal.
  • the server may collect the software data reported by the terminal, and determine the preset threshold according to the collected software data. For example, the server collects the accumulated traffic of each software reported by the terminal, calculates the average value of the accumulated traffic of the plurality of softwares, and sets the cumulative traffic average value as an embodiment of the present invention, when the preset threshold is determined by the server.
  • the method further includes the following steps, as shown in FIG. 2 .
  • the traffic alerting device periodically synchronizes the latest preset threshold value from the server.
  • the data is adjusted. Therefore, the preset threshold determined by the server is also changed in real time.
  • the latest preset threshold needs to be synchronized from the server periodically to ensure the accuracy and rationality of the preset threshold.
  • the traffic alerting device may initiate a request to the server every preset time to query whether the server updates the preset threshold. If the server updates the preset threshold, the traffic alerting device receives the preset threshold value after the server is updated, and stores the original preset width in the terminal. The value is replaced with the default threshold after the update.
  • the server may also actively send the updated preset threshold to the terminal after each update to the preset threshold. Thus, as long as the terminal is in a networked state, the preset threshold can be guaranteed to be updated in real time.
  • the traffic reminding device prompts that the traffic of the terminal is abnormal.
  • the traffic alerting device When it is determined that the accumulated traffic of the software exceeds the preset threshold, it indicates that the malicious software is consuming the terminal traffic at this time, and the traffic alerting device sends a prompt indicating that the terminal traffic is abnormal.
  • the specific implementation process of S103 may include the following steps, as shown in FIG. 3.
  • the screen of the terminal is currently in the screen off state, the screen is lit, and a notification that the terminal traffic is abnormal is displayed in the notification bar.
  • the notification bar is usually located at the top of the screen interface of the mobile terminal. If the screen of the terminal is currently lit but locked, the notification bar can be popped up directly in the locked screen interface to display the notification that the terminal traffic is abnormal.
  • the user can further view the detailed content of the notification by clicking the notification bar, when the click event occurring in the notification bar is detected, the name of the software whose accumulated traffic exceeds the preset threshold and its correspondence can be displayed.
  • the cumulative traffic is shown in the prompt interface of Figure 4. If the notification bar is popped up when the screen of the terminal is lit but locked, the click event occurring in the notification bar may take effect after the unlock command for the terminal screen is detected.
  • the user can determine which software consumes the traffic that is consumed by the user in advance, and which software consumes the traffic. Not approved by the user. For example, if the user is at Before the screen is closed, the browser download function download file is opened, and the user can determine that the portion of the traffic consumed by the browser in the closed state of the screen is obtained by the user. For software that consumes traffic greater than a preset threshold without the user's permission or unknown, the user can determine that the software is malware.
  • FIG. 5 is a specific implementation flowchart of step S103 of the traffic alerting method according to another embodiment of the present invention. Steps S301 and S302 in FIG. 5 are the same as steps S301 and S302 in FIG. 3, and details are not described herein again. Further, the traffic alerting method shown in FIG. 5 further includes the following steps after step S302.
  • an operation option corresponding to the software whose accumulated traffic exceeds the preset threshold is displayed, and the operation option includes prohibiting networking or uninstalling.
  • a selection instruction for the operation option is detected, and an operation indicated by the selection instruction is executed for software whose accumulated flow rate exceeds the preset threshold.
  • the operation options corresponding to the software can be displayed while the name of the software whose cumulative flow exceeds the preset threshold is displayed and its accumulated traffic.
  • the user can disable the network operation or uninstall operation for software whose accumulated traffic exceeds the preset threshold. In this way, the traffic consumption behavior of the malware can be eliminated, and the purpose of controlling the terminal traffic can be achieved.
  • the traffic generated by each software on the terminal when the screen of the terminal is in an inactive state can be monitored. Once the data traffic of some software is monitored to be excessively consumed, the traffic anomaly can be promptly alerted. With the embodiment of the present invention, the malware can be prevented from consuming the traffic of the terminal without the user's knowledge, thereby effectively controlling the traffic consumption of the terminal and reducing the traffic cost of the terminal.
  • the malware and the normal software can be effectively distinguished.
  • instant messaging software, microblogging, etc. software that needs to obtain messages periodically, it also needs to consume a certain stream when the screen of the terminal is inactive. the amount.
  • the user can determine that the software is not malware based on the displayed software name and its accumulated traffic. In this way, on the one hand, the validity of the traffic alert message is ensured, and on the one hand, for the mobile terminal, the situation that the power consumption of the mobile terminal is accelerated due to the excessive frequency of the message reminder is also avoided.
  • FIG. 6 is a structural block diagram of a traffic alerting apparatus according to an embodiment of the present invention.
  • the device may be located in a terminal such as a mobile phone, a tablet computer, a computer, a notebook computer, etc., for operating the traffic alerting method described in the embodiments of the present invention.
  • a terminal such as a mobile phone, a tablet computer, a computer, a notebook computer, etc.
  • Fig. 6 shows only the parts related to the present embodiment.
  • the monitoring unit 61 when detecting that the screen of the terminal is switched to the inactive state, monitors the accumulated traffic generated by each of the software in the terminal in the inactive state of the screen of the terminal.
  • the determining unit 62 determines whether the accumulated flow of the software exceeds the preset threshold.
  • the prompting unit 63 when it is determined that the accumulated traffic of the software exceeds the preset threshold, indicates that the traffic of the terminal is abnormal.
  • the inactive state includes a screen off state or a screen lock state.
  • the prompting unit 63 includes:
  • the first display subunit displays a notification that the traffic of the terminal is abnormal in the notification bar.
  • a second display subunit when detecting a click event occurring in the notification bar, displaying a name of the software whose accumulated traffic exceeds the preset threshold and the accumulated traffic.
  • the prompting unit 63 further includes:
  • the third display subunit displays an operation option corresponding to the software whose accumulated flow exceeds the preset threshold, and the operation option includes prohibiting networking or uninstalling.
  • the operation unit detects a selection instruction for the operation option, and performs an operation indicated by the selection instruction for the software whose accumulated flow rate exceeds the preset threshold.
  • the device further includes:
  • the synchronization unit periodically synchronizes the latest preset threshold value from the server.
  • FIG. 7 is a block diagram showing a partial structure of a mobile phone implementing a traffic alerting method according to an embodiment of the present invention.
  • the mobile phone includes: a radio frequency (RF) circuit 710, a memory 720, an input unit 730, a display unit 740, a sensor 750, an audio circuit 760, a wireless fidelity (WiFi) module 770, and a processor 780. , and power supply 790 and other components.
  • RF radio frequency
  • the structure of the handset shown in Figure 7 does not constitute a limitation to the handset, and the handset may include more or fewer components than those illustrated, or some components may be combined, or different components may be arranged.
  • the RF circuit 710 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, the RF circuit 710 is sent to the processor 780 for processing; and, in addition, the uplink data of the mobile phone is sent to the base station.
  • RF circuits include, but are not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 710 can also communicate with other devices over a wireless communication network.
  • the above wireless communication network may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), and Code Division Multiple Access (Code). Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), e-mail, Short Messaging Service (SMS), etc.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • Code Division Multiple Access Code Division Multiple Access
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short Messaging Service
  • Memory 720 can be used to store software programs as well as modules.
  • the processor 780 runs through the save The software programs and modules stored in the memory 720 perform various functions of the mobile phone and data processing.
  • the memory 720 mainly includes a storage program area and a storage data area, wherein the storage program area can store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.).
  • the storage data area stores data (such as audio data, phone book, etc.) created according to the use of the mobile phone.
  • memory 720 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 730 can be used to receive numeric or character information input by the user, as well as to generate key signal inputs related to user settings and function control of the handset.
  • the input unit 730 can include a touch panel 731 and other input devices 732.
  • a touch panel 731 also referred to as a touch screen, collects touch operations on or near the user and drives the corresponding connection device according to a predetermined program.
  • the touch operation may include an operation performed by the user on the touch panel 731 or near the touch panel 731 using any suitable object or accessory such as a finger, a stylus, or the like.
  • the touch panel 731 can include two parts: a touch detection device and a touch controller.
  • the touch detecting means detects the touch orientation of the user, and detects a signal generated according to the touch operation, and transmits a signal to the touch controller.
  • the touch controller receives the touch information from the touch detection device and converts it into contact coordinates, which is then sent to the processor 780 and can receive commands from the processor 780 and execute them.
  • the touch panel 731 can be implemented in various types such as a resistive type, a capacitive type, an infrared line, and a surface acoustic wave.
  • the input unit 730 can also include other input devices 732.
  • other input devices 732 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 740 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 740 can include a display panel 741.
  • a liquid crystal display (LCD) or an organic light emitting diode (Organic) can be used.
  • the display panel 741 is configured in the form of a Light-Emitting Diode, OLED or the like.
  • the touch panel 731 can cover the display panel 741. When the touch panel 731 detects a touch operation on or near it, the touch operation information is transmitted to the processor 780 to determine the type of the touch event. Processor 780 then provides a corresponding visual output on display panel 741 based on the type of touch event.
  • the touch panel 731 and the display panel 741 are used as two independent components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 731 and the display panel 741 may be set. Become a part to implement the input and output functions of your phone.
  • the handset can also include at least one type of sensor 750, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor can include an ambient light sensor and a proximity sensor.
  • the ambient light sensor can adjust the brightness of the display panel 741 according to the brightness of the ambient light.
  • the proximity sensor turns off the display panel 741 and/or backlight when the phone is moved to the ear.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping).
  • Other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, and the like that can be configured in the mobile phone are not described herein.
  • An audio circuit 760, a speaker 761, and a microphone 762 provide an audio interface between the user and the handset.
  • the audio circuit 760 can transmit the converted electrical data of the received audio data to the speaker 761, and the speaker 761 converts it into a sound signal output.
  • the microphone 762 converts the collected sound signal into an electrical signal, which is received by the audio circuit 760 and then converted into audio data, and then sent to the processor 780 for processing, and then transmitted to other devices via the RF circuit 710, such as another A handset, or audio data is output to memory 720 for further processing.
  • WiFi is a short-range wireless transmission technology.
  • the phone can help with the WiFi module 770 Users send and receive email, browse web pages and access streaming media, which provides users with wireless broadband Internet access.
  • FIG. 7 shows the WiFi module 770, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 780 is a control center for the handset, which connects various portions of the handset using various interfaces and lines, executes the handset by running or executing software programs and/or modules stored in the memory 720, and recalling data stored in the memory 720.
  • the various functions and processing of data so that the overall monitoring of the phone.
  • processor 780 can include one or more processing units.
  • the processor 780 can integrate an application processor and a modem processor.
  • the application processor mainly processes an operating system, a user interface, an application, etc.
  • the modem processor mainly processes wireless communication. It will be appreciated that the above described modem processor may not be integrated into the processor 780.
  • the phone also includes a power supply 790 (such as a battery) that powers the various components.
  • a power supply 790 (such as a battery) that powers the various components.
  • the power supply can be logically coupled to the processor 780 through a power management system to manage charging, discharging, and power management functions through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the processor 780 further has the following functions: performing a traffic alerting method, including:
  • the traffic of the terminal is prompted to be abnormal.
  • the inactive state includes a screen off state or a screen lock state.
  • the abnormality of the traffic indicating the terminal includes: Notifying the notification of abnormal traffic of the terminal in the notification bar;
  • the abnormality of the traffic indicating the terminal further includes:
  • a selection instruction for the operation option is detected, and an operation indicated by the selection instruction is executed for software whose accumulated flow exceeds the preset threshold.
  • the method further includes:
  • the latest preset threshold is periodically synchronized from the server.
  • the traffic generated by each software on the terminal when the screen of the terminal is in an inactive state can be monitored. Once the data traffic of some software is monitored to be excessively consumed, the traffic anomaly can be promptly alerted. With the embodiment of the present invention, the malware can be prevented from consuming the traffic of the terminal without the user's knowledge, thereby effectively controlling the traffic consumption of the terminal and reducing the traffic cost of the terminal.
  • Embodiments of the present invention provide a computer readable storage medium for storing instructions for causing a computer to perform the methods described herein.
  • the system or device provided by this embodiment has a storage medium in which computer readable program code is stored for implementing the functions of any of the above embodiments, and these systems or devices (or CPUs or MPUs) can read and Execute the program code stored on the storage medium.
  • the program code read from the storage medium can implement any of the above embodiments, and thus the program code and the storage medium storing the program code are part of the technical solution.
  • the storage medium for providing the program code includes a floppy disk, a hard disk, a magneto-optical disk, and an optical disk (for example) Such as CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-win, DVD+RW), disk, flash card, ROM, etc.
  • the program code can also be downloaded from the server via the communication network.
  • an operation at least partially implemented by the program code may be implemented by an operating system running on a computer, thereby implementing the technical solution of any of the above embodiments, wherein the computer is executed based on the program code. instruction.
  • the program code in the storage medium is written to the memory, wherein the memory is located in an expansion board inserted in the computer or in an expansion unit connected to the computer.
  • the CPU in the expansion board or the expansion unit performs at least part of the operation based on the program code according to the instruction, thereby implementing the technical solution of any of the above embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

本发明实施例提供了一种流量提醒方法、装置及终端。该方法包括:当检测到终端的屏幕被切换至非激活状态时,监控所述终端中每个软件在所述终端的屏幕处于所述非激活状态下联网所产生的累计流量;判断是否有软件的累计流量超过了预设阈值;当判断出有软件的累计流量超过了所述预设阈值时,提示所述终端的流量异常。在本发明实施例中,可以监控终端上的各个软件在终端的屏幕处于非激活状态下联网所产生的流量。一旦监控到某些软件的数据流量消耗过多,则能够及时地对流量异常的情况进行提醒。利用本发明实施例,可以防止恶意软件在用户不知情的情况下消耗终端的流量,从而有效地控制了终端的流量消耗,降低了终端的流量成本。

Description

流量提醒方法、 装置及终端
技术领域
本发明属于网络技术领域, 尤其涉及一种流量提醒方法、 装置及终 端。 发明背景
随着移动互联网技术的不断发展, 各类网络应用软件不断涌现。 通 过在终端上安装各式各样的软件, 用户能够随时随地地体验到丰富多彩 的移动互联业务, 从而为用户的工作、 学习、 休闲娱乐带来了便捷的享 出于流量成本的考虑, 现有的移动终端会对安装在其系统中的所有 软件联网所产生的数据流量进行监控, 且每隔一定时间 (例如每隔五分 钟)在移动终端的屏幕上对监控到的所有软件的流量情况进行显示, 达 到向用户提示移动终端当前流量消耗的目的。 然而, 上述流量监控仅在 移动终端的屏幕处于激活状态下才能进行, 且流量提醒仅以时间作为触 发点, 而部分恶意软件却可以在移动终端的屏幕处于锁屏状态或者关闭 状态时偷偷消耗掉大量的数据流量。 在这种情况下, 现有的流量监控和 提醒方式不能监控恶意软件的数据流量消耗, 也不能及时提醒用户, 从 而导致移动终端的流量消耗无法得到控制, 流量成本大大增加。 发明内容
本发明实施例提供了一种流量提醒方法, 旨在解决现有的流量提醒 方式容易导致终端的流量成本大大增加的问题。
一种流量提醒方法, 包括: 当检测到终端的屏幕被切换至非激活状态时, 监控所述终端中每个 软件在所述终端的屏幕处于所述非激活状态下联网所产生的累计流量; 判断是否有软件的累计流量超过了预设阔值;
当判断出有软件的累计流量超过了所述预设阔值时, 提示所述终端 的流量异常。
本发明实施例还提供了一种流量提醒装置, 包括:
监控单元, 用于当检测到终端的屏幕被切换至非激活状态时, 监控 所述终端中每个软件在所述终端的屏幕处于所述非激活状态下联网所 产生的累计流量;
判断单元, 用于判断是否有软件的累计流量超过了预设阔值; 提示单元,用于当判断出有软件的累计流量超过了所述预设阔值时, 提示所述终端的流量异常。
本发明实施例还提供了一种终端, 包括如上所述的流量提醒装置。 本发明实施例还提供了一种计算机存储介质,包括计算机程序代码, 用于执行上述方法的步骤。
在本发明实施例中, 可以监控终端上的各个软件在终端的屏幕处于 非激活状态下联网所产生的流量。 一旦监控到某些软件的数据流量消耗 过多, 则能够及时地对流量异常的情况进行提醒。 利用本发明实施例, 可以防止恶意软件在用户不知情的情况下消耗终端的流量, 从而有效地 控制了终端的流量消耗, 降低了终端的流量成本。 附图简要说明
图 1是本发明实施例提供的流量提醒方法的实现流程图;
图 2是本发明另一实施例提供的流量提醒方法的实现流程图; 图 3是本发明实施例提供的流量提醒方法的步骤 S103的具体实现流 程图;
图 4 是本发明实施例提供的实现流量提醒方法的提示界面的示意 图;
图 5是本发明另一实施例提供的流量提醒方法的步骤 S 103的具体实 现流程图;
图 6是本发明实施例提供的流量提醒装置的结构框图;
图 7是与本发明实施例提供的实现流量提醒方法的手机的部分结构 的框图。 实施本发明的方式
为了使本发明的技术方案及优点更加清楚明白, 以下结合附图及实 施例, 对本发明进行进一步详细说明。 应当理解, 此处所描述的具体实 施例仅仅用以解释本发明, 并不用于限定本发明。
在本发明实施例中, 流量提醒装置监控终端上的各个软件在终端的 屏幕处于非激活状态下联网所产生的流量。 一旦监控到某些软件消耗的 流量过多, 则流量提醒装置能够及时地对流量异常的情况进行提醒。 利 用本发明实施例, 可以防止恶意软件在用户不知情的情况下消耗终端的 流量, 从而有效地控制了终端的流量消耗, 降低了终端的流量成本。 在 本发明实施例中, 流量提醒装置可以是安装在终端上的模块或芯片。
图 1示出了本发明实施例提供的流量提醒方法的实现流程图。 如图 1所示, 该方法包括如下步骤。
在 S101中, 当检测到终端的屏幕被切换至非激活状态时,流量提醒 装置监控所述终端中每个软件在终端的屏幕处于所述非激活状态下联 网所产生的累计流量。
作为本发明的一个实施例, 所述非激活状态包括屏幕关闭状态。 当 用户通过物理按键或者虚拟按键关闭终端的屏幕, 或者当终端操作超时 而自动关闭屏幕, 终端的屏幕会被切换至屏幕关闭状态。 例如, 终端操 作超时可以是用户未触发终端的任何操作的时间超过了某一预设阔值。 具体地, 可以通过检测终端的屏幕是否处于通电状态来确定其是否被切 换至屏幕关闭状态。
作为本发明的另一实施例, 所述非激活状态包括屏幕锁定状态。 以 移动终端为例, 在某些情况下, 当移动终端自动关闭屏幕后, 或者当用 户通过物理按键或者虚拟按键触发锁屏指令之后, 移动终端的屏幕会进 入屏幕锁定状态。 在该屏幕锁定状态下, 即使点亮了移动终端的屏幕, 在不执行屏幕解锁操作之前, 移动终端的屏幕仍处于屏幕锁定状态, 从 而防止用户对移动终端产生的误操作。 在该屏幕锁定状态之下, 无法对 移动终端执行除解锁操作之外的任何操作。
而在本实施例中, 终端的屏幕处于激活状态即指终端的屏幕处于点 亮且屏幕未锁定的状态。 在本实施例中, 当检测到终端的屏幕由激活状 态被切换至非激活状态时, 流量提醒装置对终端中的每个软件在终端的 屏幕处于非激活状态下联网所产生的流量进行累计。
其中, 终端中的软件包括但不限于已经安装在终端中的应用软件和 系统软件, 同时还包括了下载或者存储在终端中的未安装的应用软件。 由于一些恶意软件只要被下载或者被存储至终端中, 无需执行安装就能 够联网产生流量, 因此, 需要对未安装软件也进行监控, 从而最大程度 地杜绝恶意软件消耗终端流量的现象。
具体地, 通过与各个软件建立应用程序接口 (Application Program Interface, API ), 流量提醒装置能够实时地获取到各个软件联网所产生 的上行流量及下行流量。并且, 自终端的屏幕被切换至非激活状态开始, 流量提醒装置对每个软件联网所产生的流量从零开始累计, 从而实时地 监控每个软件在终端的屏幕处于非激活状态下联网所产生的累计流量。 在本实施例中, 当终端的屏幕由非激活状态被切换至激活状态时, 流量提醒装置对每个软件的累计流量进行清零。 而当终端的屏幕再次被 切换至非激活状态时, 则流量提醒装置重新由零开始累计每个软件联网 所产生的流量。
在 S102中,流量提醒装置判断是否有软件的累计流量超过了预设阔 值。
在本实施例中, 预设阔值可以由系统设置, 也可以由终端的用户根 据终端当前的软件环境进行自定义, 还可以由服务器根据后台数据统计 结果确定后下发至终端。
如果预设阔值由服务器根据后台数据统计结果确定后下发至终端, 则该服务器可以收集终端上报的软件数据, 并根据收集到的软件数据来 确定预设阔值的大小。 例如, 服务器收集终端上报的各个软件的累计流 量, 计算出多个软件的累计流量的均值, 并将该累计流量均值设置为预 作为本发明的一个实施例, 当预设阔值是由服务器根据后台数据统 计结果确定时, 在 S101之前, 所述方法还包括如下步骤, 如图 2所示。
S 104, 流量提醒装置定期从服务器上同步最新的所述预设阔值。 件数据来进行调整的, 因此,服务器确定出的预设阔值也是实时变化的, 需要定期地从服务器上同步最新的预设阔值, 以保证预设阔值的准确性 和合理性。
在本实施例中,流量提醒装置可以每隔预设时间向服务器发起请求, 询问服务器是否更新了预设阔值。 若服务器更新了预设阔值, 则流量提 醒装置接收服务器更新后的预设阔值, 并将终端中存储的原先的预设阔 值替换为该更新后的预设阔值。 在另一实施例中, 也可以由服务器在每 次对预设阔值进行更新之后主动向终端下发更新后的预设阔值。 由此, 只要终端处于联网状态下, 即可以保证预设阔值得到实时更新。
在 S103中, 当判断出有软件的累计流量超过了所述预设阔值时, 流 量提醒装置提示所述终端的流量异常。
当判断出有软件的累计流量超过了预设阔值时, 表明此时可能有恶 意软件在消耗终端流量, 则流量提醒装置发出终端流量异常的提示。
作为本发明的一个实施例, 当判断出有软件的累计流量超过了所述 预设阔值时, S103的具体实现流程可以包括如下步骤, 如图 3所示。
在 S301中, 在通知栏显示所述终端的流量异常的通知。
若终端的屏幕当前处于屏幕关闭状态, 则点亮屏幕, 并在通知栏中 显示终端流量异常的通知。 以移动终端为例, 通知栏通常位于移动终端 屏幕界面的顶部。 若终端的屏幕当前处于点亮但锁定的状态, 则可以直 接在锁定的屏幕界面中弹出通知栏, 显示终端流量异常的通知。
在 S302中, 当检测到发生在所述通知栏的点击事件时,显示所述累 计流量超过了所述预设阈值的软件的名称及其所述累计流量。
由于在终端中, 用户可以通过点击通知栏进一步地查看通知的详细 内容, 因此, 当检测到发生在通知栏的点击事件时, 可以显示累计流量 超过了预设阔值的软件的名称及其对应的累计流量, 如图 4的提示界面 所示。 若通知栏是在终端的屏幕处于点亮但是锁定的状态下弹出的, 则 需要先检测到对终端屏幕的解锁指令之后, 发生在通知栏的点击事件才 能生效。
由此, 根据显示出的累计流量超过了预设阔值的软件的名称及其累 计流量, 用户可以判断出哪些软件消耗的流量是在用户预知的情况下消 耗掉的, 哪些软件消耗的流量是未经过用户许可的。 例如, 如果用户在 关闭屏幕之前开启了浏览器的下载功能下载文件, 则用户可以判断出浏 览器在屏幕的关闭状态下消耗掉的这部分流量是得到了用户许可的。 而 对于在用户未许可或者未知情况下消耗掉大于预设阔值的流量的软件, 用户可以判断该软件为恶意软件。
图 5是本发明另一实施例提供的流量提醒方法的步骤 S 103的具体实 现流程图。 其中, 图 5中的步骤 S301和 S302与图 3中的步骤 S301和 S302—致, 在此不再赘述。 进一步地, 图 5所示的流量提醒方法在步骤 S302之后, 还包括如下步骤。
在 S303中,显示所述累计流量超过了所述预设阔值的软件对应的操 作选项, 所述操作选项包括禁止联网或者卸载。
在 S304中,检测对所述操作选项的选择指令,对所述累计流量超过 了所述预设阔值的软件执行所述选择指令所指示的操作。
在本步骤中, 在显示累计流量超过了预设阔值的软件的名称及其累 计流量的同时, 可以显示这些软件对应的操作选项。 用户可以通过选择 这些操作选项, 来对累计流量超过了预设阔值的软件进行禁止联网操作 或者卸载操作。 这样, 就可以杜绝恶意软件的流量消耗行为, 达到控制 终端流量的目的。
在本发明实施例中, 可以监控终端上的各个软件在终端的屏幕处于 非激活状态下联网所产生的流量。 一旦监控到某些软件的数据流量消耗 过多, 则能够及时地对流量异常的情况进行提醒。 利用本发明实施例, 可以防止恶意软件在用户不知情的情况下消耗终端的流量, 从而有效地 控制了终端的流量消耗, 降低了终端的流量成本。
在本发明实施例中, 通过设置流量的预设阔值, 可以有效地区分出 恶意软件和正常软件。 例如, 对于即时通讯软件、 微博等需要定期获取 消息的软件, 其在终端的屏幕处于非激活状态下也需要消耗一定的流 量。 但是, 由于通常情况下这类软件消耗的流量不大, 所以通过设置预 设阔值, 能够很好地将这类软件与恶意软件区分开来。 而且, 即使这类 软件由于接收图片或视频等消息导致消耗的流量超过预设阔值, 用户也 可以根据所显示的软件名称及其累计流量确定该软件不是恶意软件。 这 样, 一方面保证了流量提醒消息的有效性, 一方面对于移动终端来说, 也避免了由于消息提醒频率过高, 加速移动终端电量消耗的情况出现。
图 6示出了本发明实施例提供的流量提醒装置的结构框图。 该装置 可以位于手机、 平板电脑、 计算机、 笔记本电脑等终端中, 用于运行本 发明图 1至图 5实施例所述的流量提醒方法。 为了便于说明, 图 6仅示 出了与本实施例相关的部分。
参照图 6, 在该装置中, 包括:
监控单元 61, 当检测到终端的屏幕被切换至非激活状态时, 监控所 述终端中每个软件在终端的屏幕处于所述非激活状态下联网所产生的 累计流量。
判断单元 62, 判断是否有软件的累计流量超过了预设阔值。
提示单元 63, 当判断出有软件的累计流量超过了所述预设阔值时, 提示所述终端的流量异常。
可选地, 所述非激活状态包括屏幕关闭状态或者屏幕锁定状态。 可选地, 所述提示单元 63包括:
第一显示子单元, 在通知栏显示所述终端的流量异常的通知。
第二显示子单元, 当检测到发生在所述通知栏的点击事件时, 显示 所述累计流量超过了所述预设阔值的软件的名称及其所述累计流量。
可选地, 所述提示单元 63还包括:
第三显示子单元, 显示所述累计流量超过了所述预设阔值的软件对 应的操作选项, 所述操作选项包括禁止联网或者卸载。 操作单元, 检测对所述操作选项的选择指令, 对所述累计流量超过 了所述预设阔值的软件执行选择指令所指示的操作。
可选地, 所述装置还包括:
同步单元, 定期从服务器上同步最新的所述预设阔值。
图 7示出的是本发明实施例提供的实现流量提醒方法的手机的部分 结构的框图。 参考图 7, 手机包括: 射频(Radio Frequency, RF ) 电路 710、 存储器 720、 输入单元 730、 显示单元 740、 传感器 750、 音频电 路 760、 无线保真 (wireless fidelity, WiFi )模块 770、 处理器 780、 以 及电源 790等部件。 本领域技术人员可以理解, 图 7中示出的手机结构 并不构成对手机的限定, 手机可以包括比图示更多或更少的部件, 或者 组合某些部件, 或者不同的部件布置。
下面结合图 7对手机的各个构成部件进行具体的介绍:
RF电路 710可用于收发信息或通话过程中信号的接收和发送,特别 地, 接收基站的下行信息后, 发送给处理器 780处理; 另外, 将手机的 上行数据发送给基站。 通常, RF 电路包括但不限于天线、 至少一个放 大器、 收发信机、耦合器、 低噪声放大器(Low Noise Amplifier, LNA )、 双工器等。 此外, RF电路 710还可以通过无线通信网络和其他设备通 信。 上述无线通信网络可以使用任一通信标准或协议, 包括但不限于全 球移动通讯系统 ( Global System of Mobile communication, GSM )、 通 用分组无线服务( General Packet Radio Service, GPRS )、码分多址( Code Division Multiple Access , CDMA )、 宽带码分多址 ( Wideband Code Division Multiple Access, WCDMA )、 长期演进 ( Long Term Evolution,LTE ))、电子邮件、短消息服务( Short Messaging Service, SMS ) 等。
存储器 720可用于存储软件程序以及模块。 处理器 780通过运行存 储在存储器 720的软件程序以及模块, 执行手机的各种功能以及数据处 理。 存储器 720主要包括存储程序区和存储数据区, 其中, 存储程序区 可存储操作系统、 至少一个功能所需的应用程序 (比如声音播放功能、 图像播放功能等)等。 存储数据区可存储根据手机的使用所创建的数据 (比如音频数据、 电话本等)。 此外, 存储器 720可以包括高速随机存 取存储器, 还可以包括非易失性存储器, 例如至少一个磁盘存储器件、 闪存器件、 或其他易失性固态存储器件。
输入单元 730可用于接收用户输入的数字或字符信息, 以及产生与 手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元 730 可包括触控面板 731以及其他输入设备 732。 触控面板 731, 也称为触 摸屏, 可收集用户在其上或附近的触摸操作, 并根据预先设定的程式驱 动相应的连接装置。 所述触摸操作可包括用户使用手指、 触笔等任何适 合的物体或附件在触控面板 731上或在触控面板 731附近所做的操作。 可选的, 触控面板 731可包括触摸检测装置和触摸控制器两个部分。 其 中, 触摸检测装置检测用户的触摸方位, 并检测根据触摸操作所生成的 信号, 将信号传送给触摸控制器。 触摸控制器从触摸检测装置上接收触 摸信息, 并将它转换成触点坐标, 再发送给处理器 780, 并能接收处理 器 780发来的命令并加以执行。 此外, 可以釆用电阻式、 电容式、 红外 线以及表面声波等多种类型实现触控面板 731。 除了触控面板 731, 输 入单元 730还可以包括其他输入设备 732。 具体地, 其他输入设备 732 可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、 轨迹球、 鼠标、 操作杆等中的一种或多种。
显示单元 740可用于显示用户输入的信息或提供给用户的信息以及 手机的各种菜单。 显示单元 740可包括显示面板 741。 可选的, 可以釆 用液晶显示器( Liquid Crystal Display, LCD )、有机发光二极管( Organic Light-Emitting Diode, OLED )等形式来配置显示面板 741。 进一步的, 触控面板 731可覆盖显示面板 741。 当触控面板 731检测到在其上或附 近的触摸操作后, 将触摸操作信息传送给处理器 780以确定触摸事件的 类型。 随后, 处理器 780根据触摸事件的类型在显示面板 741上提供相 应的视觉输出。 虽然在图 7中, 触控面板 731与显示面板 741是作为两 个独立的部件来实现手机的输入和输出功能的, 但是在某些实施例中, 可以将触控面板 731与显示面板 741集成为一个部件来实现手机的输入 和输出功能。
手机还可包括至少一种传感器 750, 比如光传感器、 运动传感器以 及其他传感器。 具体地, 光传感器可包括环境光传感器及接近传感器。 其中,环境光传感器可根据环境光线的明暗来调节显示面板 741的亮度。 接近传感器可在手机移动到耳边时, 关闭显示面板 741和 /或背光。作为 运动传感器的一种, 加速计传感器可检测各个方向上(一般为三轴)加 速度的大小, 静止时可检测出重力的大小及方向, 可用于识别手机姿态 的应用 (比如横竖屏切换、 相关游戏、 磁力计姿态校准)、 振动识别相 关功能(比如计步器、 敲击)等。 至于手机还可配置的陀螺仪、 气压计、 湿度计、 温度计、 红外线传感器等其他传感器, 在此不再赘述。
音频电路 760、扬声器 761、传声器 762可提供用户与手机之间的音 频接口。 音频电路 760可将接收到的音频数据转换后的电信号, 传输到 扬声器 761, 由扬声器 761转换为声音信号输出。 另一方面,传声器 762 将收集的声音信号转换为电信号, 由音频电路 760接收后转换为音频数 据, 再将音频数据发送给处理器 780处理后, 经 RF电路 710发送给其 它设备, 比如另一手机, 或者将音频数据输出至存储器 720以便进一步 处理。
WiFi属于短距离无线传输技术。 手机通过 WiFi模块 770可以帮助 用户收发电子邮件、 浏览网页和访问流式媒体, 它为用户提供了无线的 宽带互联网访问功能。 虽然图 7示出了 WiFi模块 770, 但是可以理解的 是, 其并不属于手机的必须构成, 完全可以根据需要在不改变发明的本 质的范围内而省略。
处理器 780是手机的控制中心, 利用各种接口和线路连接手机的各 个部分, 通过运行或执行存储在存储器 720内的软件程序和 /或模块, 以 及调用存储在存储器 720内的数据, 执行手机的各种功能和处理数据, 从而对手机进行整体监控。 可选的, 处理器 780可包括一个或多个处理 单元。优选的, 处理器 780可集成应用处理器和调制解调处理器。 其中, 应用处理器主要处理操作系统、 用户界面和应用程序等, 调制解调处理 器主要处理无线通信。 可以理解的是, 上述调制解调处理器也可以不集 成到处理器 780中。
手机还包括给各个部件供电的电源 790 (比如电池)。 优选的, 电源 可以通过电源管理系统与处理器 780逻辑相连, 从而通过电源管理系统 实现管理充电、 放电、 以及功耗管理等功能。
尽管未示出, 手机还可以包括摄像头、 蓝牙模块等, 在此不再赘述。 在本发明实施例中, 处理器 780还具有以下功能: 执行流量提醒方 法, 包括:
当检测到终端的屏幕被切换至非激活状态时, 监控所述终端中每个 软件在所述非激活状态下联网所产生的累计流量;
判断是否有软件的累计流量超过了预设阔值;
当判断出有软件的累计流量超过了所述预设阔值时, 提示所述终端 的流量异常。
进一步地, 所述非激活状态包括屏幕关闭状态或者屏幕锁定状态。 进一步的, 所述提示所述终端的流量异常包括: 在通知栏显示所述终端的流量异常的通知;
当检测到发生在所述通知栏的点击事件时, 显示所述累计流量超过 了所述预设阔值的软件的名称及其所述累计流量。
进一步的, 所述提示所述终端的流量异常还包括:
显示所述累计流量超过了所述预设阔值的软件对应的操作选项, 所 述操作选项包括禁止联网或者卸载;
检测对所述操作选项的选择指令, 对所述累计流量超过了所述预设 阔值的软件执行所述选择指令所指示的操作。
进一步的,在所述检测到所述终端的屏幕被切换至非激活状态之前, 所述方法还包括:
定期从服务器上同步最新的所述预设阔值。
在本发明实施例中, 可以监控终端上的各个软件在终端的屏幕处于 非激活状态下联网所产生的流量。 一旦监控到某些软件的数据流量消耗 过多, 则能够及时地对流量异常的情况进行提醒。 利用本发明实施例, 可以防止恶意软件在用户不知情的情况下消耗终端的流量, 从而有效地 控制了终端的流量消耗, 降低了终端的流量成本。
本发明实施例提供了一种计算机可读存储介质, 用于存储指令使得 计算机执行本文所述的方法。 具体地, 本实施例提供的系统或设备都具 有存储介质, 其中存储了计算机可读程序代码, 用于实现上述任意实施 例的功能, 并且这些系统或设备(或 CPU或 MPU ) 能够读取并且执行 存储在存储介质中的程序代码。
在这种情况下, 从存储介质中读取的程序代码可以实现上述任一实 施例, 因此该程序代码和存储该程序代码的存储介质是技术方案的一部 分。
用于提供程序代码的存储介质包括软盘、 硬盘、 磁光盘、 光盘 (例 如 CD-ROM、 CD-R, CD-RW、 DVD-ROM、 DVD-RAM、 DVD-勝、 DVD+RW ), 磁盘、 闪存卡、 ROM等等。 可选地, 程序代码也可以通过 通信网络从^ I良务器电脑上下载。
应该注意的是, 对于由计算机执行的程序代码, 至少部分由程序代 码实现的操作可以由运行在计算机上的操作系统实现, 从而实现上述任 一实施例的技术方案, 其中该计算机基于程序代码执行指令。
另外, 存储介质中的程序代码被写入存储器, 其中, 该存储器位于 插入在计算机中的扩展板中, 或者位于连接到计算机的扩展单元中。 在 本实施例中,扩展板或扩展单元中的 CPU根据指令,基于程序代码执行 至少部分操作, 从而实现上述任一实施例的技术方案。
以上所述仅为本发明的较佳实施例而已, 并不用以限制本发明, 凡 在本发明的精神和原则之内所作的任何修改、 等同替换和改进等, 均应 包含在本发明的保护范围之内。

Claims

权利要求书
1、 一种流量提醒方法, 其特征在于, 包括:
当检测到终端的屏幕被切换至非激活状态时, 监控所述终端中每个 软件在所述终端的屏幕处于所述非激活状态下联网所产生的累计流量; 判断是否有软件的累计流量超过了预设阔值;
当判断出有软件的累计流量超过了所述预设阔值时, 提示所述终端 的流量异常。
2、 如权利要求 1 所述的方法, 其特征在于, 所述非激活状态包括 屏幕关闭状态或者屏幕锁定状态。
3、 如权利要求 1 所述的方法, 其特征在于, 所述提示所述终端的 流量异常包括:
在通知栏显示所述终端的流量异常的通知;
当检测到发生在所述通知栏的点击事件时, 显示所述累计流量超过 了所述预设阔值的软件的名称及其所述累计流量。
4、 如权利要求 3 所述的方法, 其特征在于, 所述提示所述终端的 流量异常还包括:
显示所述累计流量超过了所述预设阔值的软件对应的操作选项, 所 述操作选项包括禁止联网或者卸载;
检测对所述操作选项的选择指令, 对所述累计流量超过了所述预设 阔值的软件执行所述选择指令所指示的操作。
5、 如权利要求 1~4任一项所述的方法, 其特征在于, 在所述检测 到所述终端的屏幕被切换至非激活状态之前, 所述方法还包括:
定期从服务器上同步最新的所述预设阔值。
6、 一种流量提醒装置, 其特征在于, 包括: 监控单元, 用于当检测到终端的屏幕被切换至非激活状态时, 监控 所述终端中每个软件在所述终端的屏幕处于所述非激活状态下联网所 产生的累计流量;
判断单元, 用于判断是否有软件的累计流量超过了预设阔值; 提示单元, 用于当判断出有软件的累计流量超过了所述预设阔值 时, 提示所述终端的流量异常。
7、 如权利要求 6所述的装置, 其特征在于, 所述非激活状态包括 屏幕关闭状态或者屏幕锁定状态。
8、 如权利要求 6所述的装置, 其特征在于, 所述提示单元包括: 第一显示子单元, 用于在通知栏显示所述终端的流量异常的通知; 第二显示子单元, 用于当检测到发生在所述通知栏的点击事件时, 显示所述累计流量超过了所述预设阈值的软件的名称及其所述累计流 量。
9、 如权利要求 8所述的装置, 其特征在于, 所述提示单元还包括: 第三显示子单元, 用于显示所述累计流量超过了所述预设阔值的软 件对应的操作选项, 所述操作选项包括禁止联网或者卸载;
操作单元, 用于检测对所述操作选项的选择指令, 对所述累计流量 超过了所述预设阔值的软件执行所述选择指令所指示的操作。
10、 如权利要求 6~9任一项所述的装置, 其特征在于, 所述装置还 包括:
同步单元, 用于定期从服务器上同步最新的所述预设阔值。
11、 一种终端, 其特征在于, 包括如权利要求 6~10任一项所述的 流量提醒装置。
12、 一种计算机存储介质, 其特征在于, 包括计算机程序代码, 用 于执行权利要求 1-5任一项所述的方法的步骤。
PCT/CN2014/081780 2013-07-08 2014-07-08 流量提醒方法、装置及终端 WO2015003601A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310284580.7 2013-07-08
CN201310284580.7A CN104135561B (zh) 2013-07-08 2013-07-08 一种终端的流量提醒方法、装置及终端

Publications (1)

Publication Number Publication Date
WO2015003601A1 true WO2015003601A1 (zh) 2015-01-15

Family

ID=51808081

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/081780 WO2015003601A1 (zh) 2013-07-08 2014-07-08 流量提醒方法、装置及终端

Country Status (2)

Country Link
CN (1) CN104135561B (zh)
WO (1) WO2015003601A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106471794A (zh) * 2015-04-14 2017-03-01 华为技术有限公司 终端的控制方法、装置及终端

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105281965B (zh) * 2014-06-12 2020-02-07 腾讯科技(深圳)有限公司 基于ios系统的流量获取方法和装置
CN104572177A (zh) * 2014-12-19 2015-04-29 龙凤娇 一种手机流量管理的方法及装置
CN105992169B (zh) * 2015-02-04 2019-09-27 中国移动通信集团云南有限公司 一种流量提醒方法、装置及系统
CN106332121B (zh) * 2015-06-25 2020-09-25 中兴通讯股份有限公司 一种VoLTE通话流量提示方法及装置
CN105302693A (zh) * 2015-10-28 2016-02-03 上海斐讯数据通信技术有限公司 一种时间管理方法、系统以及一种电子设备
CN105607979B (zh) * 2015-12-18 2018-05-08 小米科技有限责任公司 联网控制方法及装置
CN105573896A (zh) * 2015-12-21 2016-05-11 魅族科技(中国)有限公司 一种应用程序运行的提醒方法和装置
CN105873028B (zh) * 2016-03-28 2020-05-19 宇龙计算机通信科技(深圳)有限公司 终端控制方法、终端控制装置和终端
CN106060899A (zh) * 2016-05-20 2016-10-26 廖建强 一种流量控制方法和装置
CN106095547A (zh) * 2016-06-03 2016-11-09 北京小米移动软件有限公司 应用程序联网控制方法及装置
CN105933545A (zh) * 2016-06-30 2016-09-07 秦晓飞 一种实时流量及话费提醒装置与方法
WO2018023376A1 (zh) * 2016-08-02 2018-02-08 张阳 一种流量消耗监控技术的使用统计方法和手机
WO2018023377A1 (zh) * 2016-08-02 2018-02-08 张阳 一种流量监控技术的权益属性提示方法和手机
CN106331369A (zh) * 2016-09-14 2017-01-11 广东欧珀移动通信有限公司 一种信息同步的方法及终端
CN106412915A (zh) * 2016-10-31 2017-02-15 宇龙计算机通信科技(深圳)有限公司 伪无线接入点识别方法及系统
CN108075944B (zh) * 2016-11-16 2021-01-15 腾讯科技(深圳)有限公司 一种网络监控方法及装置
CN108243271A (zh) * 2016-12-23 2018-07-03 北京安云世纪科技有限公司 一种进行流量控制的方法、装置以及移动设备
CN109286505A (zh) * 2017-07-20 2019-01-29 中国移动通信集团陕西有限公司 一种流量提醒的方法及设备
CN108307337A (zh) * 2017-08-22 2018-07-20 深圳市爱培科技术股份有限公司 车载导航终端的流量监控方法、系统和存储装置
CN107634940B (zh) * 2017-08-30 2021-06-15 努比亚技术有限公司 一种流量使用的控制方法、终端、服务器及可读存储介质
CN109936829B (zh) * 2017-12-19 2021-05-14 中国电信股份有限公司 提高断网精度的方法、系统和计费系统
CN108616653B (zh) * 2018-03-30 2020-01-17 Oppo广东移动通信有限公司 信息处理方法、装置、移动终端和计算机可读存储介质
CN109743755A (zh) * 2018-12-19 2019-05-10 Oppo广东移动通信有限公司 链路聚合权限管理方法及相关产品
CN109660430B (zh) * 2018-12-27 2022-07-12 广州爱云信息技术有限公司 一种流量监控方法、终端及计算机可读存储介质
CN109726552B (zh) * 2018-12-29 2021-09-14 联想(北京)有限公司 一种控制方法、装置及电子设备
CN112152971B (zh) * 2019-06-28 2024-08-02 北京奇虎科技有限公司 控制网络使用行为的方法和装置、电子设备和介质
CN110636077A (zh) * 2019-10-12 2019-12-31 广元市公安局 一种基于统一平台的网络安全防护系统及方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183950A (zh) * 2006-11-14 2008-05-21 乐金电子(中国)研究开发中心有限公司 一种通信流量计费显示系统、终端和方法
CN101841605A (zh) * 2010-03-23 2010-09-22 中兴通讯股份有限公司 手机下载时流量告警的方法、装置及流量告警的手机
CN101854649A (zh) * 2010-05-20 2010-10-06 中兴通讯股份有限公司 移动终端、监控移动终端上网数据流量的方法及装置
CN102612084A (zh) * 2012-02-24 2012-07-25 中兴通讯股份有限公司 一种控制数据流量的方法和装置
CN102711098A (zh) * 2012-04-28 2012-10-03 广东欧珀移动通信有限公司 一种防止应用程序后台流量流失的方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102981878A (zh) * 2012-11-28 2013-03-20 广东欧珀移动通信有限公司 自动关闭后台程序的方法及其移动终端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183950A (zh) * 2006-11-14 2008-05-21 乐金电子(中国)研究开发中心有限公司 一种通信流量计费显示系统、终端和方法
CN101841605A (zh) * 2010-03-23 2010-09-22 中兴通讯股份有限公司 手机下载时流量告警的方法、装置及流量告警的手机
CN101854649A (zh) * 2010-05-20 2010-10-06 中兴通讯股份有限公司 移动终端、监控移动终端上网数据流量的方法及装置
CN102612084A (zh) * 2012-02-24 2012-07-25 中兴通讯股份有限公司 一种控制数据流量的方法和装置
CN102711098A (zh) * 2012-04-28 2012-10-03 广东欧珀移动通信有限公司 一种防止应用程序后台流量流失的方法

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106471794A (zh) * 2015-04-14 2017-03-01 华为技术有限公司 终端的控制方法、装置及终端
EP3276928A4 (en) * 2015-04-14 2018-05-09 Huawei Technologies Co. Ltd. Terminal control method, device and terminal
RU2686673C1 (ru) * 2015-04-14 2019-04-30 Хуавэй Текнолоджиз Ко., Лтд. Устройство и способ управления терминалом и терминал
CN106471794B (zh) * 2015-04-14 2020-01-17 华为技术有限公司 终端的控制方法、装置及终端
US10591981B2 (en) 2015-04-14 2020-03-17 Huawei Technologies Co., Ltd. Terminal control method and apparatus, and terminal
EP3761621A1 (en) * 2015-04-14 2021-01-06 Huawei Technologies Co. Ltd. Terminal control method and apparatus, and terminal
US11416061B2 (en) 2015-04-14 2022-08-16 Huawei Technologies Co., Ltd. Terminal control method and apparatus, and terminal

Also Published As

Publication number Publication date
CN104135561B (zh) 2016-03-16
CN104135561A (zh) 2014-11-05

Similar Documents

Publication Publication Date Title
WO2015003601A1 (zh) 流量提醒方法、装置及终端
US10732696B2 (en) Method and apparatus for wake-up control of intelligent terminal
WO2016150331A1 (zh) 一种运行游戏客户端的方法和装置
EP3270566B1 (en) Method for terminal and network device interaction and terminal
WO2018032581A1 (zh) 一种应用程序控制方法及装置
WO2018049897A1 (zh) 数据备份方法及设备
KR20190133079A (ko) 단말기 제어 방법 및 장치, 그리고 단말기
WO2014201863A1 (en) Volume adjusting method, volume adjusting apparatus and electronic device using the same
WO2016082109A1 (zh) 用户设备的电源管理方法和电源管理装置
CN106250223A (zh) 一种后台进程管理方法及终端设备
WO2015081664A1 (zh) 控制无线网络开关方法、装置、设备及系统
WO2018095130A1 (zh) 一种确定直播时长的方法和系统
JP7173669B2 (ja) 干渉報告制御方法およびユーザ機器
WO2014206138A1 (zh) 一种更新网页数据的方法、装置和终端设备
CN107577508A (zh) 应用程序处理方法、装置、可读存储介质和移动终端
CN108334345B (zh) 应用程序处理方法、装置、可读存储介质和移动终端
CN103699409A (zh) 一种电子设备切入唤醒状态的方法、装置和系统
CN106155788A (zh) 一种应用程序冻结方法及终端设备
WO2019034104A1 (zh) 终端自动释放后台进程占用资源的方法、存储介质及终端
WO2014094600A1 (zh) 移动终端及其降低功耗的方法
WO2017156754A1 (zh) 终端设备和用于终端设备的定位信息处理方法
WO2018120032A1 (zh) 小区切换方法和终端设备
CN110989816B (zh) 应用的处理方法、装置以及存储介质
WO2015062241A1 (zh) 应用程序保护方法、装置和终端
CN108712281B (zh) 触发检测管理应用更新的方法、装置、存储介质和终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14822495

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25.05.2016)

122 Ep: pct application non-entry in european phase

Ref document number: 14822495

Country of ref document: EP

Kind code of ref document: A1