WO2016029642A1 - 后台应用程序的控制方法、装置及终端设备 - Google Patents
后台应用程序的控制方法、装置及终端设备 Download PDFInfo
- Publication number
- WO2016029642A1 WO2016029642A1 PCT/CN2015/071367 CN2015071367W WO2016029642A1 WO 2016029642 A1 WO2016029642 A1 WO 2016029642A1 CN 2015071367 W CN2015071367 W CN 2015071367W WO 2016029642 A1 WO2016029642 A1 WO 2016029642A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identifier
- application
- current identifier
- duration
- current
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/485—Task life-cycle, e.g. stopping, restarting, resuming execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5011—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
- G06F9/5022—Mechanisms to release resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
Definitions
- the present disclosure relates to the field of terminal devices, and in particular, to a method, an apparatus, and a terminal device for controlling a background application.
- the method for controlling the background application in the related art is: setting a maximum threshold, and the terminal device monitors whether the number of background applications exceeds a maximum threshold. If the number of background applications is less than or equal to a maximum threshold, the background application is allowed to maintain the background running state; When the number of background applications is greater than the maximum threshold, the background application that consumes the most memory is ended.
- the maximum threshold is 25, and if the number of background applications is 24, the background application is allowed to remain in the background running state; if the number of background applications is 26, the background application that occupies the largest memory is ended to release the memory.
- the above method it is only determined whether to end a certain background application according to whether the number of background applications exceeds the maximum threshold.
- the background application is larger than the maximum threshold, the background application that occupies the largest memory is ended, and the maximum memory is occupied.
- the background application may be that the user wants to keep running in the background, and ending these background applications will affect the user experience. Therefore, the above method does not well control the background application of the terminal device and affects the user experience.
- the present disclosure provides a method, an apparatus, and a terminal device for controlling a background application.
- a method for controlling a background application includes:
- the traversed identifier is a current identifier, and determining whether the application corresponding to the current identifier is a background application;
- the application corresponding to the current identifier is a background application, determining whether the current identifier is saved in the preset whitelist, and whether the number of identifiers of the corresponding application in the program list is the background application exceeds a preset threshold, where the whitelist saves the identifier of the background application specified by the user;
- the corresponding application is selected from the program list as an identifier of the background application, and the application corresponding to the selected identifier is closed. program;
- the step of establishing a program list according to an application running in an operating system includes:
- the running state priority is sorted from high to low to foreground, visible, perceptible, and background;
- the application's identity is ranked in descending order of the application's operating state priority, resulting in a list of programs.
- the determining, by the determining, whether the application corresponding to the current identifier is a background application comprises:
- the selecting the corresponding one from the program list include:
- any identifier that is found is selected or the identifier that is found closest to the current identifier is selected;
- the current identifier is selected.
- the method further includes:
- the application corresponding to the current identifier is closed.
- the method further includes:
- the inactive duration exceeds the second preset duration
- the memory occupied by the user interface in the application corresponding to the current identifier is released, and the second preset duration is less than the first preset duration.
- the method further includes:
- the inactivity duration of the application corresponding to the current identifier is obtained;
- the memory occupied by the user interface in the application corresponding to the current identifier is released.
- the fifth possible implementation of the first aspect, or the sixth possible implementation of the first aspect in a seventh possible implementation of the first aspect includes:
- the duration of the statistics is determined as the inactivity duration of the application corresponding to the current identifier.
- a control device for a background application comprising:
- a establishing unit configured to establish a program list according to an application running in the operating system, where the program list at least saves an identifier of an application running in the operating system;
- a traversing unit for traversing an identifier in the program list
- a first determining unit configured to traverse the identifier into a current identifier, and determine whether the application corresponding to the current identifier is a background application
- a second determining unit configured to: when the application corresponding to the current identifier is a background application, determine whether the current identifier is saved in the preset whitelist, and the corresponding application in the program list is a background application Whether the number of identifiers exceeds a preset threshold, and the whitelist stores the identifier of the background application specified by the user;
- a first closing unit configured to: when the current identifier is saved in the whitelist, and the number exceeds the preset threshold, select a corresponding application from the program list as an identifier of a background application, Close the application corresponding to the selected identifier; when the current identifier is not saved in the whitelist and the number exceeds the preset threshold, the application is closed.
- the application corresponding to the current identifier when the current identifier is saved in the whitelist, and the number exceeds the preset threshold, select a corresponding application from the program list as an identifier of a background application, Close the application corresponding to the selected identifier; when the current identifier is not saved in the whitelist and the number exceeds the preset threshold, the application is closed. The application corresponding to the current identifier.
- the establishing unit includes:
- a computing sub-unit for calculating a running state priority of each application running in the operating system, the running state priority being sorted from high to low as foreground, visible, perceptible, and background;
- a sort subunit that arranges the application's identity in descending order of the application's running state priority to get a list of programs.
- the first determining unit includes:
- Obtaining a subunit configured to obtain an operating state priority of an application corresponding to the current identifier
- a first determining subunit configured to determine, when the running state priority of the application corresponding to the current identifier is the background, the application corresponding to the current identifier is a background application.
- the first closing unit includes:
- Searching a subunit configured to search, in the program list, an identifier that is located before the current identifier and that is not saved in the whitelist;
- Selecting a subunit configured to: when any at least one identifier that is not saved in the whitelist and that is not saved in the whitelist is found, select any identifier that is found or select a identifier that is closest to the current identifier. When the identifier that is located before the current identifier and is not saved in the whitelist is not found, the current identifier is selected.
- the device further includes:
- a first obtaining unit configured to: when the current identifier is saved in the whitelist, and the number does not exceed the preset threshold, obtain an inactivity duration of the application corresponding to the current identifier;
- a third determining unit configured to determine whether the inactivity duration exceeds a first preset duration
- the second closing unit is configured to close the application corresponding to the current identifier when the inactive duration exceeds the first preset duration.
- the device further includes:
- a detecting unit configured to detect whether the inactivity duration exceeds a second preset duration when the inactive duration does not exceed the first preset duration
- a first release unit configured to release, when the inactive duration exceeds the second preset duration, a memory occupied by a user interface in an application corresponding to the current identifier, where the second preset duration is less than The first preset duration is described.
- the device further includes:
- a second acquiring unit configured to: when the current identifier is not saved in the whitelist, and the number does not exceed the preset threshold When the value is obtained, obtaining an inactivity duration of the application corresponding to the current identifier;
- a fourth determining unit configured to determine whether the inactivity duration exceeds a third preset duration
- the second release unit is configured to release the memory occupied by the user interface in the application corresponding to the current identifier when the inactivity duration exceeds the third preset duration.
- the first obtaining unit and the second obtaining unit include:
- a statistic sub-unit configured to count the duration of the process of the application corresponding to the current identifier not interacting with other processes in the operating system
- a second determining subunit configured to determine a duration of the statistic as an inactivity duration of the application corresponding to the current identifier.
- a terminal device including:
- Memory for storing processor executable instructions:
- processor is configured to:
- the traversed identifier is a current identifier, and determining whether the application corresponding to the current identifier is a background application;
- the application corresponding to the current identifier is a background application, determining whether the current identifier is saved in the preset whitelist, and whether the number of identifiers of the corresponding application in the program list is the background application exceeds a preset threshold, where the whitelist saves the identifier of the background application specified by the user;
- the corresponding application is selected from the program list as an identifier of the background application, and the application corresponding to the selected identifier is closed. program;
- the technical solution provided by the embodiment of the present disclosure may include the following beneficial effects: when determining the background application to be closed, the terminal device not only considers whether the number of background applications exceeds a preset threshold, but also needs to consider whether the identifier of the background application is It is saved in the preset whitelist.
- the whitelist saves the identifier of the background application specified by the user.
- the background application corresponding to the identifier in these whitelists is the user who does not want to close, for the current traversal ID:
- a background application is selected and closed;
- the current identifier is not saved in the whitelist and the number of background applications exceeds the preset threshold , close the current standard
- FIG. 1 is a flowchart of a method for controlling a background application according to an exemplary embodiment.
- FIG. 2 is a flowchart of another method for controlling a background application according to an exemplary embodiment.
- FIG. 3 is a block diagram of a control device of a background application, according to an exemplary embodiment.
- FIG. 4 is a block diagram of a terminal device according to an exemplary embodiment.
- FIG. 1 is a flowchart of a method for controlling a background application according to an exemplary embodiment. As shown in FIG. 1 , the method is used in a terminal device, and includes the following steps.
- step S11 a program list is created based on the application running in the operating system.
- the operating system is usually installed on the terminal device. Android, Windows, IOS, etc. are commonly used. Many applications are usually installed on the terminal to meet the various needs of users. Users also install the applications they need. These applications need to be run in the operating system of the terminal device, so when controlling the background application, you can first create a list of programs based on the running application in the operating system, and save the identity of the running application in the operating system. In the program list, the identity of the application can be, but is not limited to, the name of the application, the icon, and the like.
- the program list can save the ID of the running application in the operating system, the time of the last activation, the priority of the running status, etc., and at least the identifier of the running application in the operating system.
- step S12 the identification in the program list is traversed.
- step S13 the traversed identifier is the current identifier, and it is determined whether the application corresponding to the current identifier is a background. Use the program.
- the identifier in the program list may be traversed, and the identifier traversed is the current identifier. Since the present invention controls the background application, it may first determine whether the application corresponding to the current identifier is a background application.
- step S14 it is determined whether the current whitelist is saved in the preset whitelist, and whether the number of the corresponding application in the program list is the background application exceeds the pre-predetermined number. Set the threshold.
- step S12 is performed.
- the whitelist saves the identifier of the background application specified by the user, that is, the identifier of the background application that the user does not want to close.
- the background application specified by the user is QQ, WeChat, Fetion, Baidu map, etc., in the white list. You can save the logo of QQ, WeChat, Fetion, Baidu map and other applications.
- the preset threshold can be set according to the hardware configuration and actual needs of the terminal device, for example, it can be set to 10, 20, 25, and the like.
- step S15 When the current identifier is saved in the white list and the number exceeds the preset threshold, in step S15, the corresponding application is selected as an identifier of the background application from the program list, and the application corresponding to the selected identifier is closed.
- a background application may be selected and the selection may be closed. Background application.
- step S16 the application corresponding to the current identifier is closed.
- the application corresponding to the current identifier may be directly closed, because the current identifier is not saved in the whitelist. That is to say, the application corresponding to the current identifier is not a background application specified by the user, so it can be directly closed, thereby saving memory resources and improving the user experience.
- step S12 is performed.
- the terminal device when determining the background application to be closed, not only considers whether the number of background applications exceeds a preset threshold, but also needs to consider whether the identifier of the background application is saved in a preset white list, and the white list.
- the identifier of the background application specified by the user is saved, that is, the background application corresponding to the identifier in the white list is that the user does not want to be closed.
- the current identifier is saved in the white list and the background is saved.
- a background application is selected and closed.
- the application corresponding to the current identifier is closed. It will easily close the user-specified background application, which is the largest and possibly user-specified background application compared to the related technology. The way to better control the background application and enhance the user experience.
- the step of establishing a program list according to an application running in the operating system in S11 includes:
- the application's identity is ranked in descending order of the application's operating state priority, resulting in a list of programs.
- the terminal device can calculate the running state priority of each application running in the operating system, and then run according to the application.
- the state priority ranks the application's identity in descending order, resulting in a list of programs.
- the terminal device can set a cycle to calculate the operating state priority of each application running in the operating system, and the setting period can be Set according to actual needs, for example, set to 30 seconds, 45 seconds, 60 seconds, and so on.
- the step of determining, in S13, whether the application corresponding to the current identifier is a background application comprises:
- the background application can be determined according to the running state priority of the application corresponding to the current identifier, and the application whose operating state priority is the background is determined. For the background application.
- the step of selecting the corresponding application as an identifier of the background application from the program list in S15 includes:
- any identifier that is found is selected or the identifier that is found closest to the current identifier is selected;
- the current identifier is selected.
- the corresponding application As an identifier of the background application in the program list, you can first find the identifier in the program list that is not saved in the whitelist before the current identifier, that is, first find a background application that is not specified by the user. If at least one identifier is found, the selected identifier may be selected or the closest identifier of the current identifier may be selected; if not, the background application corresponding to the identifier before the current identifier is the background specified by the user. Application, select the current ID.
- the method further includes:
- the inactivity duration of the application corresponding to the current identifier is obtained.
- the application corresponding to the current identifier is closed.
- the inactivity duration of the application corresponding to the current identifier may also be obtained, if the inactivity duration exceeds the first pre- If the duration is long, the application corresponding to the current identifier can be directly closed. That is, even if the current identifier is saved in the whitelist and the number does not exceed the preset threshold, the application corresponding to the current identifier is inactive for a long time. , can also be closed.
- the first preset duration can be set according to actual needs, for example, can be set to 3 minutes, 5 minutes, 10 minutes, and the like.
- the user turns to the background running state after using it. If the inactivity time is longer than 10 minutes, although the QQ identifier is saved in the whitelist, the QQ can be closed to save memory resources.
- the method further includes:
- the memory occupied by the user interface in the application corresponding to the current identifier is released, and the second preset duration is less than the first preset duration.
- the second preset duration is less than the first preset duration. If the duration is exceeded, the second preset duration is longer than the first preset duration.
- the memory occupied by the user interface in the application corresponding to the current identifier; if not exceeded, the next identifier in the program list may be traversed.
- the second preset duration can be set according to actual needs, for example, can be set to 3 minutes, 5 minutes, 10 minutes, and the like.
- the user turns to the background running state after using it. If the inactivity time exceeds 5 minutes, although the QQ identifier is saved in the whitelist, the memory occupied by the QQ user interface can still be released to save. Memory resources.
- An application generally consists of two parts: logic code and a user interface (UI).
- the UI usually includes elements such as images, animations, etc. Normally, both parts are stored in memory.
- the UI is mainly the application components (Acts), and the Activities is the container for the UI of the application. Since the logic code occupies less memory, the logic code of the application is not destroyed in the present invention, but the memory occupied by the UI of the application whose inactivity time exceeds the second preset duration is released, thereby saving a large amount of memory.
- the UI can be automatically rebuilt without affecting the user's use because the logic code of the application is saved.
- the method further includes:
- the inactivity duration of the application corresponding to the current identifier is obtained.
- the memory occupied by the user interface in the application corresponding to the current identifier is released.
- the inactivity duration of the application corresponding to the current identifier may also be obtained, if the inactivity duration exceeds the The three preset durations can release the memory occupied by the user interface in the application corresponding to the current identifier.
- the third preset duration can be set according to actual needs, for example, can be set to 3 minutes, 5 minutes, 10 minutes, and the like.
- the user turns to the background running state after using it. If the inactivity time exceeds 5 minutes, since the identifier of the calculator is not saved in the white list, the memory occupied by the calculator's user interface can be released to save. Memory resources.
- the step of obtaining the inactive duration of the application corresponding to the current identifier includes:
- the duration of the statistics is determined as the inactivity duration of the application corresponding to the current identifier.
- the inactive state of the application refers to a state in which the application's process does not interact with other processes in the operating system.
- the interaction may include sending a data request, responding to a data request sent by another process, a communication request, and the like.
- FIG. 2 is a flowchart of another method for controlling a background application according to an exemplary embodiment. As shown in FIG. 2, the method is used in a terminal device, and includes the following steps.
- step S21 the operational status priority of each application running in the operating system is calculated.
- the application's running state priority is sorted from high to low to foreground, visible, perceptible, and background.
- Different operating systems may have different methods for calculating the running state priority of an application.
- the operating state priority of the application may be calculated through an Activity Manager Service.
- step S22 the identification of the application is arranged in descending order of the operating state priorities of the application, and a program list is obtained.
- the identity of the application can be, but is not limited to, the name of the application, the icon, and the like.
- step S23 the identification in the program list is traversed.
- control process of the background application is the same each time the traversal is identifiable.
- step S24 the traversed identifier is the current identifier, and the running state priority of the application corresponding to the current identifier is obtained.
- step S25 the application corresponding to the current identifier is the background application, and S26 is executed.
- step S26 it is determined whether the current identifier is saved in the preset whitelist.
- the whitelist saves the identifier of the background application specified by the user, that is, the identifier of the background application that the user does not want to close.
- the background application specified by the user is QQ, WeChat, Fetion, Baidu map, etc., in the white list. You can save the logo of QQ, WeChat, Fetion, Baidu map and other applications.
- step S27 it is determined whether the corresponding application in the program list is the number of identifiers of the background application exceeds a preset threshold.
- the preset threshold can be set according to the hardware configuration and actual needs of the terminal device, for example, it can be set to 10, 20, 25, and the like.
- step S28 the identifier in the program list that is located before the current identifier and is not saved in the white list is searched for.
- step S29 When at least one of the identifiers is found, in step S29, any of the found identifiers or the found identifiers closest to the current identifier are selected, and S31 is performed.
- step S30 the current identification is selected, and S31 is executed.
- step S31 the application corresponding to the selected identifier is closed, and S40 is executed.
- step S32 the inactivity duration of the application corresponding to the current identifier is obtained.
- step S33 the application corresponding to the current identifier is closed, and S40 is executed.
- the inactivity duration of the application corresponding to the current identifier may also be obtained, if the inactivity duration exceeds the first pre- If the duration is long, the application corresponding to the current identifier can be directly closed. That is, even if the current identifier is saved in the whitelist and the number does not exceed the preset threshold, the application corresponding to the current identifier is inactive for a long time. , can also be closed.
- the first preset duration can be set according to actual needs, for example, can be set to 3 minutes, 5 minutes, 10 minutes, and the like.
- the user turns to the background running state after using it. If the inactivity time is longer than 10 minutes, although the QQ identifier is saved in the whitelist, the QQ can be closed to save memory resources.
- step S34 it is detected whether the inactivity duration exceeds the second preset duration.
- step S35 the memory occupied by the user interface in the application corresponding to the current identifier is released, and S40 is performed.
- the second preset duration is less than the first preset duration. If the duration is exceeded, the second preset duration is longer than the first preset duration.
- the memory occupied by the user interface in the application corresponding to the current identifier; if not exceeded, the next identifier in the program list may be traversed.
- the second preset duration can be set according to actual needs, for example, can be set to 3 minutes, 5 minutes, 10 minutes, and the like.
- step S36 it is determined whether the corresponding application in the program list is the number of identifiers of the background application exceeds a preset threshold.
- step S37 the application corresponding to the current identifier is closed, and S40 is executed.
- the application corresponding to the current identifier may be directly closed, because the current identifier is not saved in the whitelist. That is to say, the application corresponding to the current identifier is not a background application specified by the user, so it can be directly closed, thereby saving memory resources and improving the user experience.
- step S38 the inactivity duration of the application corresponding to the current identifier is obtained, and it is determined whether the inactivity duration exceeds the third preset duration.
- step S39 the memory occupied by the user interface in the application corresponding to the current identifier is released, and S40 is performed.
- the inactivity duration of the application corresponding to the current identifier may also be obtained, if the inactivity duration exceeds the The three preset durations can release the memory occupied by the user interface in the application corresponding to the current identifier.
- the third preset duration can be set according to actual needs, for example, can be set to 3 minutes, 5 minutes, 10 minutes, and the like.
- the user turns to the background running state after using it. If the inactivity time exceeds 5 minutes, since the identifier of the calculator is not saved in the white list, the memory occupied by the calculator's user interface can be released to save. Memory resources.
- step S40 it ends.
- FIG. 3 is a block diagram of a control device of a background application according to an exemplary embodiment.
- the apparatus includes an establishing unit 31, a traversing unit 32, a first determining unit 33, a second determining unit 34, and a first closing unit 35.
- the establishing unit 31 is configured to establish a program list based on an application running in the operating system, at least the identifier of the running application in the operating system is stored in the program list.
- the traversal unit 32 is configured to traverse the identification in the program list.
- the first determining unit 33 is configured to determine whether the application corresponding to the current identifier is a background application, and the identifier that is traversed is the current identifier.
- the second determining unit 34 is configured to: when the application corresponding to the current identifier is a background application, determine whether the current identifier is saved in the preset whitelist, and the corresponding application in the program list is the identifier of the background application. Whether the number exceeds the preset threshold, and the whitelist saves the identifier of the background application specified by the user.
- the first closing unit 35 is configured to: when the current identifier is saved in the white list and the number exceeds a preset threshold, select a corresponding application from the program list as an identifier of the background application, and close the selected identifier. The application is closed; when the current identifier is not saved in the whitelist and the number exceeds a preset threshold, the application corresponding to the current identifier is closed.
- the terminal device when determining the background application to be closed, not only considers whether the number of background applications exceeds a preset threshold, but also needs to consider whether the identifier of the background application is saved in a preset white list, and the white list.
- the identifier of the background application specified by the user is saved, that is, the background application corresponding to the identifier in the white list is that the user does not want to be closed.
- the current identifier is saved in the white list and the background is saved.
- a background application is selected and closed.
- the application corresponding to the current identifier is closed.
- the user-specified background application can be easily closed, and the background application can be better controlled and the user experience can be improved as compared with the related art method of ending the largest memory and possibly a user-specified background application.
- the establishing unit 31 includes a calculating subunit and a sorting subunit.
- the computing sub-unit is configured to calculate a running state priority of each application running in the operating system, and the running state priority is sorted from high to low to foreground, visible, perceptible, and background.
- the sorting subunit is configured to arrange the identification of the application in descending order of priority of the application's operating state to obtain a list of programs.
- the first determining unit 33 includes an obtaining subunit and a first determining subunit.
- the obtaining subunit is configured to obtain an operating state priority of an application corresponding to the current identifier.
- the first determining subunit is configured to determine that the application corresponding to the current identifier is a background application when the running state priority of the application corresponding to the current identifier is the background.
- the first closing unit 35 includes a searching subunit and a selecting subunit.
- the lookup subunit is configured to look in the program list for an identifier that is not in front of the current identity and that is not saved in the whitelist.
- the selecting sub-unit is configured to: when at least one identifier that is not saved in the white list before the current identifier is found, select any identifier that is found or select the identifier that is found closest to the current identifier; when not found Select the current ID when it is located before the current ID and is not saved in the whitelist.
- the device further includes a first acquiring unit, a third determining unit, and a second closing unit.
- the first obtaining unit is configured to obtain an inactivity duration of the application corresponding to the current identifier when the current identifier is saved in the whitelist and the number does not exceed the preset threshold.
- the third determining unit is configured to determine whether the inactivity duration exceeds the first preset duration.
- the second closing unit is configured to close the application corresponding to the current identifier when the inactivity time exceeds the first preset duration.
- the device further includes a detecting unit and a first releasing unit.
- the detecting unit is configured to detect whether the inactive duration exceeds the second preset duration when the inactive duration does not exceed the first preset duration.
- the first release unit is configured to release the memory occupied by the user interface in the application corresponding to the current identifier when the inactive duration exceeds the second preset duration, and the second preset duration is less than the first preset duration.
- the device further includes a second obtaining unit, a fourth determining unit and a second releasing unit.
- the second obtaining unit is configured to obtain an inactivity duration of the application corresponding to the current identifier when the current identifier is not saved in the whitelist and the number does not exceed the preset threshold.
- the fourth determining unit is configured to determine whether the inactivity duration exceeds a third preset duration.
- the second release unit is configured to release the memory occupied by the user interface in the application corresponding to the current identifier when the inactivity time exceeds the third preset duration.
- the first obtaining unit and the second obtaining unit comprise a statistical subunit and a second determining subunit.
- the statistic subunit is configured to count the duration of the process of the application corresponding to the current identifier not interacting with other processes in the operating system.
- the second determining subunit is configured to determine the duration of the statistics as the inactivity duration of the application corresponding to the current identifier.
- FIG. 4 is a block diagram of a control apparatus 800 for a background application, according to an exemplary embodiment.
- device 800 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, Medical equipment, fitness equipment, personal digital assistants, etc.
- apparatus 800 can include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, And a communication component 816.
- Processing component 802 typically controls the overall operation of device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
- Processing component 802 can include one or more processors 820 to execute instructions to perform all or part of the steps of the above described methods.
- processing component 802 can include one or more modules to facilitate interaction between component 802 and other components.
- processing component 802 can include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
- Memory 804 is configured to store various types of data to support operation at device 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phone book data, messages, pictures, videos, and the like.
- the memory 804 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable.
- SRAM static random access memory
- EEPROM electrically erasable programmable read only memory
- EPROM Electrically erasable programmable read only memory
- PROM Programmable Read Only Memory
- ROM Read Only Memory
- Magnetic Memory Flash Memory
- Disk Disk or Optical Disk.
- Power component 806 provides power to various components of device 800.
- Power component 806 can include a power control system, one or more power sources, and other components associated with generating, controlling, and distributing power for device 800.
- the multimedia component 808 includes a screen between the device 800 and the user that provides an output interface.
- the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
- the multimedia component 808 includes a front camera and/or a rear camera. When the device 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
- the audio component 810 is configured to output and/or input an audio signal.
- the audio component 810 includes a microphone (MIC) that is configured to receive an external audio signal when the device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
- the received audio signal may be further stored in memory 804 or transmitted via communication component 816.
- the audio component 810 also includes a speaker for outputting an audio signal.
- the I/O interface 812 provides an interface between the processing component 802 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
- Sensor assembly 814 includes one or more sensors for providing device 800 with a status assessment of various aspects.
- sensor component 814 can detect an open/end state of device 800, a relative positioning of components, such as the display and keypad of device 800, and sensor component 814 can also detect a change in position of one component of device 800 or device 800. The presence or absence of user contact with device 800, device 800 orientation or acceleration/deceleration, and temperature variation of device 800.
- Sensor assembly 814 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor assembly 814 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- Communication component 816 is configured to facilitate wired or wireless communication between device 800 and other devices.
- the device 800 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
- communication component 816 receives broadcast signals or broadcast associated information from an external broadcast control system via a broadcast channel.
- the communication component 816 also includes a near field communication (NFC) module to facilitate short range communication.
- NFC near field communication
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- device 800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable A gate array
- controller microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
- non-transitory computer readable storage medium comprising instructions, such as a memory 804 comprising instructions executable by processor 820 of apparatus 800 to perform the above method.
- the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
- a non-transitory computer readable storage medium when the instructions in the storage medium are executed by a processor of the terminal device, enabling the terminal device to perform a control method of the background application, the method comprising:
- the traversed identifier is a current identifier, and determining whether the application corresponding to the current identifier is a background application;
- the application corresponding to the current identifier is a background application, determining whether the current identifier is saved in the preset whitelist, and whether the number of identifiers of the corresponding application in the program list is the background application exceeds a preset threshold, where the whitelist saves the identifier of the background application specified by the user;
Abstract
Description
Claims (17)
- 一种后台应用程序的控制方法,其特征在于,包括:根据操作系统中正在运行的应用程序建立程序列表,所述程序列表中至少保存有所述操作系统中正在运行的应用程序的标识;遍历所述程序列表中的标识;遍历到的标识为当前标识,确定所述当前标识对应的应用程序是否为后台应用程序;当所述当前标识对应的应用程序为后台应用程序时,确定预设的白名单中是否保存所述当前标识、以及所述程序列表中对应的应用程序为后台应用程序的标识的个数是否超过预设阈值,所述白名单中保存的是用户指定的后台应用程序的标识;当所述白名单中保存所述当前标识且所述个数超过所述预设阈值时,从所述程序列表中选取对应的应用程序为后台应用程序的一个标识,关闭选取的标识对应的应用程序;当所述白名单中未保存所述当前标识且所述个数超过所述预设阈值时,关闭所述当前标识对应的应用程序。
- 根据权利要求1所述的方法,其特征在于,所述根据操作系统中正在运行的应用程序建立程序列表的步骤包括:计算操作系统中正在运行的每个应用程序的运行状态优先级,所述运行状态优先级由高到低排序为前台、可见、可感知、后台;按照应用程序的运行状态优先级由高到低的顺序排列应用程序的标识,得到程序列表。
- 根据权利要求2所述的方法,其特征在于,所述确定所述当前标识对应的应用程序是否为后台应用程序的步骤包括:获取所述当前标识对应的应用程序的运行状态优先级;当所述当前标识对应的应用程序的运行状态优先级为后台时,确定所述当前标识对应的应用程序为后台应用程序。
- 根据权利要求2或3所述的方法,其特征在于,所述从所述程序列表中选取对应的应用程序为后台应用程序的一个标识的步骤包括:在所述程序列表中查找位于所述当前标识之前且所述白名单中未保存的标识;当查找到至少一个位于所述当前标识之前且所述白名单中未保存的标识时,选取查找到的任一标识或者选取查找到的距离所述当前标识最近的标识;当未查找到位于所述当前标识之前且所述白名单中未保存的标识时,选取所述当前标识。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:当所述白名单中保存所述当前标识且所述个数未超过所述预设阈值时,获取所述当前标识对应的应用程序的不活跃时长;确定所述不活跃时长是否超过第一预设时长;当所述不活跃时长超过所述第一预设时长时,关闭所述当前标识对应的应用程序。
- 根据权利要求5所述的方法,其特征在于,所述方法还包括:当所述不活跃时长未超过所述第一预设时长时,检测所述不活跃时长是否超过第二预设时长;当所述不活跃时长超过所述第二预设时长时,释放所述当前标识对应的应用程序中的用户界面所占用的内存,所述第二预设时长小于所述第一预设时长。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:当所述白名单中未保存所述当前标识且所述个数未超过所述预设阈值时,获取所述当前标识对应的应用程序的不活跃时长;确定所述不活跃时长是否超过第三预设时长;当所述不活跃时长超过所述第三预设时长时,释放所述当前标识对应的应用程序中的用户界面所占用的内存。
- 根据权利要求5-7任一权利要求所述的方法,其特征在于,所述获取所述当前标识对应的应用程序的不活跃时长的步骤包括:统计所述当前标识对应的应用程序的进程未与所述操作系统中其他进程交互的时长;将统计的时长确定为所述当前标识对应的应用程序的不活跃时长。
- 一种后台应用程序的控制装置,其特征在于,包括:建立单元,用于根据操作系统中正在运行的应用程序建立程序列表,所述程序列表中至少保存有所述操作系统中正在运行的应用程序的标识;遍历单元,用于遍历所述程序列表中的标识;第一确定单元,用于遍历到的标识为当前标识,确定所述当前标识对应的应用程序是否为后台应用程序;第二确定单元,用于当所述当前标识对应的应用程序为后台应用程序时,确定预设的白名单中是否保存所述当前标识、以及所述程序列表中对应的应用程序为后台应用程序的标识的个数是否超过预设阈值,所述白名单中保存的是用户指定的后台应用程序的标识;第一关闭单元,用于当所述白名单中保存所述当前标识且所述个数超过所述预设阈值时,从所述程序列表中选取对应的应用程序为后台应用程序的一个标识,关闭选取的标识对应的应用程序;当所述白名单中未保存所述当前标识且所述个数超过所述预设阈值时,关闭所述当前标识对应的应用程序。
- 根据权利要求9所述的装置,其特征在于,所述建立单元包括:计算子单元,用于计算操作系统中正在运行的每个应用程序的运行状态优先级,所述运行状态优先级由高到低排序为前台、可见、可感知、后台;排序子单元,用于按照应用程序的运行状态优先级由高到低的顺序排列应用程序的标识,得到程序列表。
- 根据权利要求10所述的装置,其特征在于,所述第一确定单元包括:获取子单元,用于获取所述当前标识对应的应用程序的运行状态优先级;第一确定子单元,用于当所述当前标识对应的应用程序的运行状态优先级为后台时,确定所述当前标识对应的应用程序为后台应用程序。
- 根据权利要求10或11所述的装置,其特征在于,所述第一关闭单元包括:查找子单元,用于在所述程序列表中查找位于所述当前标识之前且所述白名单中未保存的标识;选取子单元,用于当查找到至少一个位于所述当前标识之前且所述白名单中未保存的标识时,选取查找到的任一标识或者选取查找到的距离所述当前标识最近的标识;当未查找到位于所述当前标识之前且所述白名单中未保存的标识时,选取所述当前标识。
- 根据权利要求9所述的装置,其特征在于,所述装置还包括:第一获取单元,用于当所述白名单中保存所述当前标识且所述个数未超过所述预设阈值时,获取所述当前标识对应的应用程序的不活跃时长;第三确定单元,用于确定所述不活跃时长是否超过第一预设时长;第二关闭单元,用于当所述不活跃时长超过所述第一预设时长时,关闭所述当前标识对应的应用程序。
- 根据权利要求13所述的装置,其特征在于,所述装置还包括:检测单元,用于当所述不活跃时长未超过所述第一预设时长时,检测所述不活跃时长是否超过第二预设时长;第一释放单元,用于当所述不活跃时长超过所述第二预设时长时,释放所述当前标识对应的应用程序中的用户界面所占用的内存,所述第二预设时长小于所述第一预设时长。
- 根据权利要求9所述的装置,其特征在于,所述装置还包括:第二获取单元,用于当所述白名单中未保存所述当前标识且所述个数未超过所述预设阈值时,获取所述当前标识对应的应用程序的不活跃时长;第四确定单元,用于确定所述不活跃时长是否超过第三预设时长;第二释放单元,用于当所述不活跃时长超过所述第三预设时长时,释放所述当前标识对应的应用程序中的用户界面所占用的内存。
- 根据权利要求13-15任一权利要求所述的装置,其特征在于,所述第一获取单元和所述第二获取单元包括:统计子单元,用于统计所述当前标识对应的应用程序的进程未与所述操作系统中其他进程交互的时长;第二确定子单元,用于将统计的时长确定为所述当前标识对应的应用程序的不活跃时长。
- 一种终端设备,其特征在于,包括:处理器;用于存储处理器可执行指令的存储器:其中,所述处理器被配置为:根据操作系统中正在运行的应用程序建立程序列表,所述程序列表中至少保存有所述操作系统中正在运行的应用程序的标识;遍历所述程序列表中的标识;遍历到的标识为当前标识,确定所述当前标识对应的应用程序是否为后台应用程序;当所述当前标识对应的应用程序为后台应用程序时,确定预设的白名单中是否保存所述当前标识、以及所述程序列表中对应的应用程序为后台应用程序的标识的个数是否超过预设阈值,所述白名单中保存的是用户指定的后台应用程序的标识;当所述白名单中保存所述当前标识且所述个数超过所述预设阈值时,从所述程序列表中选取对应的应用程序为后台应用程序的一个标识,关闭选取的标识对应的应用程序;当所述白名单中未保存所述当前标识且所述个数超过所述预设阈值时,关闭所述当前标识对应的应用程序。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MX2015003748A MX356378B (es) | 2014-08-29 | 2015-01-22 | Método y dispositivo para controlar una aplicación en segundo plano y un dispositivo de terminal. |
RU2015113734A RU2637474C2 (ru) | 2014-08-29 | 2015-01-22 | Способ и устройство для управления фоновым приложением и терминальным устройством |
KR1020157009919A KR101706359B1 (ko) | 2014-08-29 | 2015-01-22 | 백그라운드 애플리케이션을 제어하기 위한 방법 및 장치 |
BR112015008641A BR112015008641A2 (pt) | 2014-08-29 | 2015-01-22 | método e dispositivo para controlar um aplicativo em segundo plano, e, dispositivo de terminal |
JP2016544717A JP6134074B2 (ja) | 2014-08-29 | 2015-01-22 | バックグラウンドアプリケーションを制御する方法および装置ならびに端末装置 |
US14/696,486 US9588805B2 (en) | 2014-08-29 | 2015-04-27 | Method and terminal device for controlling background application |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410436455.8 | 2014-08-29 | ||
CN201410436455.8A CN104239094B (zh) | 2014-08-29 | 2014-08-29 | 后台应用程序的控制方法、装置及终端设备 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/696,486 Continuation US9588805B2 (en) | 2014-08-29 | 2015-04-27 | Method and terminal device for controlling background application |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016029642A1 true WO2016029642A1 (zh) | 2016-03-03 |
Family
ID=52227229
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/071367 WO2016029642A1 (zh) | 2014-08-29 | 2015-01-22 | 后台应用程序的控制方法、装置及终端设备 |
Country Status (9)
Country | Link |
---|---|
US (1) | US9588805B2 (zh) |
EP (1) | EP2993584B1 (zh) |
JP (1) | JP6134074B2 (zh) |
KR (1) | KR101706359B1 (zh) |
CN (1) | CN104239094B (zh) |
BR (1) | BR112015008641A2 (zh) |
MX (1) | MX356378B (zh) |
RU (1) | RU2637474C2 (zh) |
WO (1) | WO2016029642A1 (zh) |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015095219A (ja) * | 2013-11-14 | 2015-05-18 | ソニー株式会社 | 情報処理装置、情報処理方法および記憶媒体 |
CN105373419A (zh) * | 2014-08-26 | 2016-03-02 | 阿里巴巴集团控股有限公司 | 一种后台应用的操作方法及装置 |
CN104239094B (zh) * | 2014-08-29 | 2017-12-08 | 小米科技有限责任公司 | 后台应用程序的控制方法、装置及终端设备 |
CN104461725B (zh) * | 2014-12-30 | 2018-05-08 | 小米科技有限责任公司 | 控制应用进程启动的方法及装置 |
CN105828408B (zh) * | 2015-01-08 | 2020-12-22 | 中兴通讯股份有限公司 | 一种控制上网时间的方法和装置 |
CN104636144A (zh) * | 2015-02-26 | 2015-05-20 | 北京数字天域科技有限责任公司 | 一种移动终端后台程序管理方法及装置 |
CN104793846A (zh) * | 2015-04-27 | 2015-07-22 | 小米科技有限责任公司 | 应用程序的界面展示方法及装置 |
CN106371913A (zh) * | 2015-07-21 | 2017-02-01 | 赤子城网络技术(北京)有限公司 | 内存清理方法及装置 |
CN105373405B (zh) * | 2015-11-26 | 2019-05-10 | 努比亚技术有限公司 | 动态加载应用程序的装置及方法 |
CN105430726B (zh) * | 2015-11-28 | 2018-05-29 | 广东欧珀移动通信有限公司 | 一种通信终端的载波聚合功能控制方法及通信终端 |
CN106855826B (zh) * | 2015-12-08 | 2021-02-23 | 斑马智行网络(香港)有限公司 | 一种后台应用程序的控制方法及装置 |
CN106909407B (zh) * | 2015-12-23 | 2020-07-03 | 北京金山安全软件有限公司 | 一种后台应用程序的关闭方法、装置及终端 |
CN106909447B (zh) * | 2015-12-23 | 2019-11-15 | 北京金山安全软件有限公司 | 一种后台应用程序的处理方法、装置及终端 |
CN105653323B (zh) * | 2015-12-28 | 2019-07-02 | 小米科技有限责任公司 | 应用程序管理方法及装置 |
CN105786520A (zh) * | 2016-03-17 | 2016-07-20 | 北京百纳威尔科技有限公司 | 电子设备应用程序的管理方法和装置 |
CN105893146B (zh) * | 2016-03-28 | 2020-01-10 | 北京小米移动软件有限公司 | 内存处理方法及装置 |
CN106537344A (zh) * | 2016-03-30 | 2017-03-22 | 北京小米移动软件有限公司 | 一种应用程序调用管理的方法和装置 |
CN112882804A (zh) | 2016-08-17 | 2021-06-01 | 华为技术有限公司 | 一种启动应用的方法及装置 |
CN106293402B (zh) * | 2016-08-22 | 2019-11-29 | 珠海市魅族科技有限公司 | 应用程序控制方法及其装置 |
CN107783833B (zh) * | 2016-08-25 | 2020-04-28 | 华为技术有限公司 | 一种终端后台应用程序的管理方法及装置 |
CN106650430A (zh) * | 2016-12-01 | 2017-05-10 | 惠州Tcl移动通信有限公司 | 一种基于移动终端的应用程序状态锁定控制方法及系统 |
CN107066288B (zh) * | 2017-01-17 | 2020-06-26 | 北京光年无限科技有限公司 | 一种用于智能机器人的多模态交互方法及装置 |
CN107045443A (zh) * | 2017-04-14 | 2017-08-15 | 北京安云世纪科技有限公司 | 后台进程控制方法、装置及智能终端 |
JP6470344B2 (ja) * | 2017-04-28 | 2019-02-13 | Kddi株式会社 | 制御装置、制御方法、及びコンピュータプログラム |
CN107894917A (zh) * | 2017-11-10 | 2018-04-10 | 深圳天珑无线科技有限公司 | 终端及其关闭后台应用程序的方法、存储装置 |
CN107911831B (zh) * | 2017-11-16 | 2022-03-01 | 北京小米移动软件有限公司 | 提醒用户更换路由器的方法、装置、设备和存储介质 |
CN108304525B (zh) * | 2018-01-25 | 2022-02-11 | 创新先进技术有限公司 | 一种条件数据的确定方法及装置 |
CN108363591A (zh) * | 2018-01-25 | 2018-08-03 | 维沃移动通信有限公司 | 一种推送消息控制的方法及装置 |
CN110489171A (zh) * | 2018-05-11 | 2019-11-22 | 珠海市魅族科技有限公司 | 移动终端控制方法、移动终端及存储介质 |
KR102532696B1 (ko) * | 2018-07-11 | 2023-05-12 | 주식회사 케이티 | 어플리케이션의 포그라운드 서비스 실행시 보안을 제공하기 위한 통신 단말 및 방법 |
CN109117256A (zh) * | 2018-07-12 | 2019-01-01 | 维沃移动通信有限公司 | 一种后台应用程序的管理方法及终端 |
CN109688618A (zh) * | 2018-11-27 | 2019-04-26 | Oppo广东移动通信有限公司 | 视频处理方法、装置、电子设备及存储介质 |
CN109725702A (zh) | 2018-12-28 | 2019-05-07 | 三星电子(中国)研发中心 | 一种基于ai预测的智能终端节能方法和设备 |
CN109862184A (zh) * | 2019-01-28 | 2019-06-07 | 努比亚技术有限公司 | 终端及其资源管控方法、计算机可读存储介质 |
CN110069328B (zh) * | 2019-03-25 | 2021-11-09 | 维沃移动通信有限公司 | 应用关闭方法及终端设备 |
CN110716799A (zh) * | 2019-09-30 | 2020-01-21 | 深圳市九洲电器有限公司 | 一种应用程序管理方法及智能终端 |
US11561587B2 (en) | 2019-10-01 | 2023-01-24 | Microsoft Technology Licensing, Llc | Camera and flashlight operation in hinged device |
US11201962B2 (en) | 2019-10-01 | 2021-12-14 | Microsoft Technology Licensing, Llc | Calling on a multi-display device |
US11416130B2 (en) * | 2019-10-01 | 2022-08-16 | Microsoft Technology Licensing, Llc | Moving applications on multi-screen computing device |
KR20220038987A (ko) * | 2020-09-21 | 2022-03-29 | 삼성전자주식회사 | 전자장치 및 그 제어방법 |
CN112162783B (zh) * | 2020-09-27 | 2021-09-14 | 珠海格力电器股份有限公司 | 音乐播放应用保活处理方法、系统、存储介质及电子设备 |
CN115665311B (zh) * | 2022-10-25 | 2024-02-06 | 北京鸿途信达科技股份有限公司 | 一种手机定时优化后台进程的系统优化方法 |
CN117667364B (zh) * | 2024-02-02 | 2024-04-09 | 广东信聚丰科技股份有限公司 | 应用程序的管控方法及用户设备 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103164268A (zh) * | 2013-04-02 | 2013-06-19 | 北京奇虎科技有限公司 | 系统优化方法及装置 |
CN103902335A (zh) * | 2014-03-12 | 2014-07-02 | 上海天奕达电子科技有限公司 | 一种后台程序清理的方法及其系统 |
CN103914342A (zh) * | 2013-01-06 | 2014-07-09 | 联想(北京)有限公司 | 一种电子设备程序控制方法、系统及电子设备 |
CN104239094A (zh) * | 2014-08-29 | 2014-12-24 | 小米科技有限责任公司 | 后台应用程序的控制方法、装置及终端设备 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8954045B2 (en) * | 2006-09-29 | 2015-02-10 | Qualcomm Incorporated | Method and apparatus for managing resources at a wireless device |
CN101859261B (zh) * | 2010-06-09 | 2015-05-13 | 中兴通讯股份有限公司 | 一种释放内存的控制方法及控制设备 |
US8635630B2 (en) * | 2010-10-25 | 2014-01-21 | Microsoft Corporation | Application lifetime management |
WO2012127596A1 (ja) * | 2011-03-19 | 2012-09-27 | 富士通株式会社 | 端末装置、プロセス管理方法、およびプロセス管理プログラム |
US8886976B2 (en) * | 2011-04-11 | 2014-11-11 | Microsoft Corporation | Management of background tasks |
AU2012347871B2 (en) * | 2011-12-06 | 2017-11-23 | Domain Surgical Inc. | System and method of controlling power delivery to a surgical instrument |
US9319246B2 (en) * | 2012-06-25 | 2016-04-19 | Microsoft Technology Licensing, Llc | Voice-over-internet protocol (VOIP) application platform |
US20140007106A1 (en) * | 2012-07-02 | 2014-01-02 | Arnold S. Weksler | Display and Terminate Running Applications |
US8813177B2 (en) * | 2012-07-12 | 2014-08-19 | Microsoft Corporation | Background application management |
US9274832B2 (en) * | 2013-02-07 | 2016-03-01 | Htc Corporation | Method and electronic device for thread scheduling |
CN103164229A (zh) * | 2013-04-08 | 2013-06-19 | 北京奇虎科技有限公司 | 一种清理移动终端进程的方法及装置 |
CN103220427A (zh) * | 2013-04-16 | 2013-07-24 | 广东欧珀移动通信有限公司 | 手机后台程序清理方法及手机 |
US9690685B2 (en) * | 2014-05-30 | 2017-06-27 | Apple Inc. | Performance management based on resource consumption |
-
2014
- 2014-08-29 CN CN201410436455.8A patent/CN104239094B/zh active Active
-
2015
- 2015-01-22 KR KR1020157009919A patent/KR101706359B1/ko active IP Right Grant
- 2015-01-22 JP JP2016544717A patent/JP6134074B2/ja active Active
- 2015-01-22 BR BR112015008641A patent/BR112015008641A2/pt not_active IP Right Cessation
- 2015-01-22 MX MX2015003748A patent/MX356378B/es active IP Right Grant
- 2015-01-22 WO PCT/CN2015/071367 patent/WO2016029642A1/zh active Application Filing
- 2015-01-22 RU RU2015113734A patent/RU2637474C2/ru active
- 2015-04-27 US US14/696,486 patent/US9588805B2/en active Active
- 2015-05-22 EP EP15168933.8A patent/EP2993584B1/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103914342A (zh) * | 2013-01-06 | 2014-07-09 | 联想(北京)有限公司 | 一种电子设备程序控制方法、系统及电子设备 |
CN103164268A (zh) * | 2013-04-02 | 2013-06-19 | 北京奇虎科技有限公司 | 系统优化方法及装置 |
CN103902335A (zh) * | 2014-03-12 | 2014-07-02 | 上海天奕达电子科技有限公司 | 一种后台程序清理的方法及其系统 |
CN104239094A (zh) * | 2014-08-29 | 2014-12-24 | 小米科技有限责任公司 | 后台应用程序的控制方法、装置及终端设备 |
Also Published As
Publication number | Publication date |
---|---|
KR20160042398A (ko) | 2016-04-19 |
CN104239094A (zh) | 2014-12-24 |
MX356378B (es) | 2018-05-25 |
RU2015113734A (ru) | 2016-11-10 |
JP6134074B2 (ja) | 2017-05-24 |
RU2637474C2 (ru) | 2017-12-04 |
CN104239094B (zh) | 2017-12-08 |
EP2993584B1 (en) | 2018-03-21 |
EP2993584A1 (en) | 2016-03-09 |
JP2016538663A (ja) | 2016-12-08 |
KR101706359B1 (ko) | 2017-02-13 |
BR112015008641A2 (pt) | 2017-07-04 |
US9588805B2 (en) | 2017-03-07 |
MX2015003748A (es) | 2017-03-20 |
US20160062792A1 (en) | 2016-03-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016029642A1 (zh) | 后台应用程序的控制方法、装置及终端设备 | |
US10282561B2 (en) | Method and apparatus for managing application | |
JP6072362B2 (ja) | アプリケーションプログラムの処理方法、装置、プログラム及び記憶媒体 | |
US9860844B2 (en) | Method and apparatus of temperature control | |
EP3136793B1 (en) | Method and apparatus for awakening electronic device | |
WO2017071068A1 (zh) | 应用程序切换方法、装置及设备 | |
KR101722522B1 (ko) | 디스플레이 모드를 전환하기 위한 방법 및 장치 | |
JP6355735B2 (ja) | 省エネルギーモードを開始するための方法及び装置 | |
EP3151117A1 (en) | Method and device for delaying information broadcasting | |
US10216248B2 (en) | Method and device for controlling power consumption | |
US20190235745A1 (en) | Method and device for displaying descriptive information | |
US20170300211A1 (en) | Method and apparatus for displaying status information of application | |
CN110262692B (zh) | 一种触摸屏扫描方法、装置及介质 | |
CN105227426B (zh) | 一种应用界面切换方法、装置及终端设备 | |
EP2985697A1 (en) | Method and device for controlling router plug-in | |
US20170220401A1 (en) | Method, device, and computer-readable storage medium for calling a process | |
CN105553772B (zh) | 流量监控方法及装置 | |
US9740524B2 (en) | Method and terminal device for executing application chain | |
US9703662B2 (en) | Method for controlling plug-in by a router and the router thereof | |
CN107027110B (zh) | 流量控制方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2015/003748 Country of ref document: MX |
|
ENP | Entry into the national phase |
Ref document number: 2015113734 Country of ref document: RU Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20157009919 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2016544717 Country of ref document: JP Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15835124 Country of ref document: EP Kind code of ref document: A1 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112015008641 Country of ref document: BR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 112015008641 Country of ref document: BR Kind code of ref document: A2 Effective date: 20150416 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15835124 Country of ref document: EP Kind code of ref document: A1 |