WO2017101291A1 - 流量监控方法及装置 - Google Patents

流量监控方法及装置 Download PDF

Info

Publication number
WO2017101291A1
WO2017101291A1 PCT/CN2016/087526 CN2016087526W WO2017101291A1 WO 2017101291 A1 WO2017101291 A1 WO 2017101291A1 CN 2016087526 W CN2016087526 W CN 2016087526W WO 2017101291 A1 WO2017101291 A1 WO 2017101291A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
background application
network traffic
background
traffic
Prior art date
Application number
PCT/CN2016/087526
Other languages
English (en)
French (fr)
Inventor
魏赵栋
王斌
�田�浩
Original Assignee
小米科技有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 小米科技有限责任公司 filed Critical 小米科技有限责任公司
Publication of WO2017101291A1 publication Critical patent/WO2017101291A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/062Generation of reports related to network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/82Criteria or parameters used for performing billing operations
    • H04M15/8214Data or packet based
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/88Provision for limiting connection, or expenditure
    • H04M15/885Provision for limiting connection, or expenditure limit per application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a traffic monitoring method and apparatus.
  • a smart terminal is provided with a module for monitoring network traffic.
  • the network data option can be selected by starting the setting application, and then the network traffic consumed by each application can be checked.
  • viewing the network traffic consumed by the application in this way is cumbersome, and it takes a long time to find the pre-viewed application from all applications because it records the network traffic consumed by all applications.
  • the present disclosure provides a flow monitoring method and apparatus.
  • a traffic monitoring method comprising:
  • the traffic monitoring command is a task menu start command
  • the task menu is a menu that displays an application identifier of the background application
  • the outputting the correspondence between the application identifier of the background application and the corresponding network traffic includes:
  • the corresponding relationship between the application identifier of the background application and the corresponding network traffic is output on the task menu.
  • the outputting the correspondence between the application identifier of the background application and the corresponding network traffic includes:
  • the outputting the correspondence between the application identifier of the background application and the proportional value corresponding to the background application includes:
  • the outputting the correspondence between the application identifier of the background application and the corresponding network traffic includes:
  • the method further includes:
  • the permission When the permission is to allow access, the permission is switched to not allow access, and when the permission is not allowed to access, the permission is switched to allow access.
  • the receiving the permission switching command for the background application includes:
  • the receiving the permission switching command for the background application includes:
  • a flow monitoring apparatus including:
  • the network traffic obtaining module is configured to receive a traffic monitoring command to obtain network traffic consumed by each background application, where the background application is an application running in the background;
  • the correspondence output module is configured to output a correspondence between the application identifier of the background application and the corresponding network traffic.
  • the traffic monitoring command is a task menu start command
  • the task menu is a menu that displays an application identifier of the background application
  • the corresponding relationship output module includes:
  • the output submodule is configured to output, on the task menu, a correspondence between the application identifier of the background application and the corresponding network traffic.
  • the corresponding relationship output module includes:
  • a traffic screening sub-module configured to filter the maximum network traffic from the network traffic
  • a first ratio value calculation sub-module configured to calculate a proportion of network traffic consumed by each background application to the maximum network traffic, and obtain a proportional value corresponding to the background application
  • the first correspondence output sub-module is configured to output a correspondence between the application identifier of the background application and a proportional value corresponding to the background application.
  • the first correspondence output submodule includes:
  • a first display submodule configured to display an application identifier of the background application and the background response With a corresponding scale value, the scale value is displayed at the associated location of the application identifier.
  • the first correspondence output submodule includes:
  • a bar graph generation sub-module configured to generate a traffic ratio bar graph of the background application according to a scale value corresponding to the background application
  • the second display sub-module is configured to display an application identifier of the background application and the traffic ratio bar graph, where the traffic ratio bar graph is displayed at an associated location of the application identifier.
  • the corresponding relationship output module includes:
  • a traffic determining sub-module configured to calculate a sum of network traffic consumed by each of the background applications to obtain total network traffic
  • a second ratio value calculation sub-module configured to calculate a proportion of network traffic consumed by each background application to the total network traffic, and obtain a proportional value corresponding to the background application
  • the second correspondence output sub-module is configured to output a correspondence between the application identifier of the background application and a scale value corresponding to the background application.
  • the device further includes:
  • a command receiving module configured to receive a permission switching command for the background application
  • the privilege acquisition module is configured to acquire, according to the privilege switching command, the permission of the background application to access the mobile network
  • the privilege switching module is configured to switch the privilege to not allow access when the privilege is to allow access, and switch the privilege to allow access when the privilege is not allowed to access.
  • the command receiving module includes:
  • a trajectory detection sub-module configured to detect a sliding operation trajectory of an application identifier of the background application through the touch screen
  • the first command determining submodule is configured to determine that the right switching command for the background application is received when the sliding operation track is consistent with the preset sliding track.
  • the command receiving module includes:
  • a number detection sub-module configured to detect a number of taps of an application identifier of the background application through the touch screen
  • the second command determining submodule is configured to determine that the permission switching command for the background application is received when the number of taps is a preset number of times.
  • a flow monitoring apparatus including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the disclosure receives the traffic monitoring command, obtains the network traffic consumed by each background application, and outputs the correspondence between the application identifier of the background application and the corresponding network traffic, thereby reducing the scope of the application to be viewed to the background application, directly according to the corresponding
  • the relationship determines the network traffic consumed by the background application and improves the viewing efficiency.
  • the disclosure When receiving the task menu start command, acquires the network traffic consumed by each background application, and outputs the corresponding relationship between the application identifier of the background application and the corresponding network traffic on the task menu, so that the user can view the background application. Viewing the network traffic consumed by the background application, improving the efficiency of finding network traffic, and bringing convenience to users.
  • the disclosure calculates the proportion of the network traffic consumed by each background application to the maximum network traffic, obtains the scale value corresponding to the background application, and then outputs the correspondence between the application identifier of the background application and the scale value corresponding to the background application, thereby realizing the ratio value.
  • the method prompts the network traffic consumed by the background application, and the user can intuitively determine the proportion of the current application consumption network traffic according to the proportional value, which brings convenience to the user.
  • the disclosure directly shows the correspondence between the application identifier and the proportional value, and the user can determine the proportion of the network traffic consumed by each background application to the maximum network traffic according to the correspondence, thereby improving the readability of the relationship between the network traffic and the maximum network traffic, and providing the user with the readability. Brought convenience.
  • the disclosure directly displays the correspondence between the application identifier and the flow ratio bar graph, and the user can
  • the correspondence determines the proportion of network traffic consumed by each background application to the maximum network traffic, improves the readability of the relationship between network traffic and maximum network traffic, and brings convenience to users.
  • the present disclosure compares the network traffic consumed by the background application with the total network traffic to obtain a corresponding scale value, thereby outputting the correspondence between the application identifier of the background application and the corresponding scale value, and the user can intuitively determine the consumption of the background application according to the scale value.
  • Network traffic accounts for the proportion of total network traffic consumed by all background applications, thereby improving the efficiency of determining the relationship between network traffic consumed by each background application and total network traffic, which brings convenience to users.
  • the disclosure may obtain the permission of the background application to access the mobile network according to the permission switching command, and switch the permission according to the permission switching command. Therefore, the access rights of the background application can be quickly controlled, and the efficiency of the flow control of the background application is improved.
  • the method of determining whether the sliding operation track is consistent with the preset sliding track determines whether the right switching command is received for the background application, and when receiving the permission switching command, obtaining the permission of the background application to access the mobile network according to the permission switching command, The access rights are switched, so as to quickly control the access rights of the background application, and improve the efficiency of the flow control of the background application.
  • the method of determining whether the number of taps is consistent with the preset number of times determines whether the right switching command for the background application is received, and when receiving the permission switching command, obtaining the permission of the background application to access the mobile network according to the permission switching command, and The access rights are switched, so that the access rights of the background application are quickly controlled, and the efficiency of the flow control of the background application is improved.
  • FIG. 1A is a schematic diagram of viewing an application consuming network traffic in the related art.
  • FIG. 1B is a flowchart of a flow monitoring method according to an exemplary embodiment of the present disclosure.
  • FIG. 1C is a schematic diagram showing an output correspondence relationship according to an exemplary embodiment of the present disclosure.
  • FIG. 1D is a schematic diagram of another output correspondence relationship according to an exemplary embodiment of the present disclosure.
  • FIG. 2 is a flow chart of another flow monitoring method according to an exemplary embodiment of the present disclosure.
  • FIG. 3 is a block diagram of a flow monitoring device according to an exemplary embodiment of the present disclosure.
  • FIG. 4 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure.
  • FIG. 5 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure.
  • FIG. 6 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure.
  • FIG. 7 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure.
  • FIG. 8 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure.
  • FIG. 9 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure.
  • FIG. 10 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure.
  • FIG. 11 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure.
  • FIG. 12 is a block diagram of a flow monitoring device according to an exemplary embodiment.
  • first, second, third, etc. may be used in the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as second information without departing from the scope of the present disclosure.
  • second information may also be referred to as first information.
  • word "if” as used herein may be interpreted as "when” or “when” or “in response to a determination.”
  • FIG. 1A is a schematic diagram of a related art in which an application consumes network traffic.
  • the user can find the icon of the setting application from the desktop icon, click the "Settings" icon, and find the mobile network button from the settings (different operating system names are different), on the move Viewing the network traffic consumed by the application under the network is cumbersome, and it is inefficient to view the network traffic consumed by the target application from all applications.
  • Traffic monitoring applications such as network assistants, can also be installed in some terminals to collect network traffic consumed by each application through the network assistant. Since the network assistant records the network traffic consumed by all applications, the user can view the network traffic consumed by the target application from all applications, and the viewing efficiency is low.
  • FIG. 1B is a flowchart of a traffic monitoring method according to an exemplary embodiment of the present disclosure. The method may be used in a terminal, including the following steps 101 to 102:
  • step 101 a traffic monitoring command is received to obtain network traffic consumed by each background application, where the background application is an application running in the background.
  • step 102 a correspondence between the application identifier of the background application and the corresponding network traffic is output.
  • the terminal involved in the embodiment of the present disclosure may be a smart terminal, and the smart terminal may be a smart phone, a tablet computer, or the like.
  • the traffic monitoring command is a trigger command, and steps 101 to 102 are triggered.
  • the traffic monitoring command may be a new triggering command in the terminal.
  • a traffic monitoring command is generated by a certain button or a combination of multiple keys of the original undefined function, such as assuming that the volume plus key and the terminal primary key are simultaneously pressed.
  • the present disclosure can generate a traffic monitoring command when pressing the volume plus key and the terminal primary key at the same time, and trigger steps 101 to 102 to be executed.
  • the flow monitoring command is generated by a certain button
  • the method of the present disclosure can be installed in the terminal in an application manner, and triggering the generation of the traffic monitoring command by triggering the icon of the application, and triggering the execution of steps 101 to 102.
  • the traffic monitoring command can also be an existing trigger command in the terminal, and the function of triggering the existing trigger command is extended to implement the traffic monitoring function.
  • the traffic monitoring command may start a command for a task menu, that is, obtain network traffic consumed by each background application when receiving the task menu startup command, and output the message on the task menu. Correspondence between the application identifier of the background application and the corresponding network traffic.
  • the task menu is a menu for displaying an application identifier of a background application.
  • the application identifier may be an application icon, an application name, an application number, or the like indicating the identity of the background application.
  • Different operating systems can trigger the generation of task menu startup commands in different ways. For example, in the Apple system, the task menu startup command can be triggered by double-clicking the primary key to pop up the task menu. In the Android system, the task menu start command can be triggered by clicking the menu button to pop up the task menu.
  • the application icon of the background application is displayed in the task menu, and the user can release the background application by clicking the application icon and sliding up, that is, the background application is closed, and the user can switch to the corresponding icon of the application icon by clicking the application icon.
  • the background application switches the background application to the foreground.
  • the so-called hold the background application is locked, to avoid releasing the application when the "X" button is clicked; the so-called release hold, that is, the background application is unlocked, so that the application can be released when the "X” button is clicked.
  • the present disclosure when receiving the task menu start command, acquires the network traffic consumed by each background application, and outputs the corresponding relationship between the application identifier of the background application and the corresponding network traffic on the task menu, thereby realizing the user
  • the application running in the background may be determined first, and the application running in the background may be referred to as a background application, and after determining the background application, each background is obtained.
  • the application corresponds to the consumed network traffic.
  • the network traffic consumed by each background application can be determined according to the receiving amount and the sending amount of the traffic status interface.
  • network traffic is the amount of data transmitted on the network.
  • the network traffic monitored by the disclosure may be mobile network traffic, and the network corresponding to the mobile network traffic may be a 3G network, a 4G network, etc., because the user does not care about the usage of the network traffic under the wireless local area network. .
  • the application identifier may be an application icon, an application name, an application number, or the like indicating the identity of the background application. To improve the efficiency of identifying background applications, the application identifier can be an application icon.
  • the corresponding relationship between the application identifier of the background application and the corresponding network traffic is output, so that the user determines the network traffic consumed by the background application according to the corresponding relationship.
  • a prompt window may be popped up, and the corresponding relationship between the application identifier of the background application and the corresponding network traffic is outputted on the prompt window; when the traffic monitoring command is the task menu startup command It may be that the correspondence between the application identifier of the background application and the corresponding network traffic is output on the task menu.
  • the output form may be a voice form or a display form.
  • the application identifier of the background application is displayed, and the network traffic consumed by the background application is voiced when the application identifier is double-clicked, thereby implementing the correspondence between the application identifier of the output background application and the corresponding network traffic.
  • the corresponding relationship between the application identifier of the background application and the corresponding network traffic may be output through display.
  • display are a few ways to display:
  • the network traffic consumed by the background application may be displayed at an associated location of the application identifier of the background application.
  • the associated location is a location associated with the application identifier, and the user can determine, according to the associated location, that the network traffic is the network traffic corresponding to the application identifier.
  • the associated location may be below, to the left, above, etc. of the application identifier.
  • FIG. 1C is a schematic diagram of an output correspondence relationship according to an exemplary embodiment of the present disclosure. In this embodiment, an example is shown by showing network traffic under the application identifier and the application name. When the task menu start command is received, the network traffic consumed by the background application is displayed below the application identifier of the background application.
  • the outputting the correspondence between the application identifier of the background application and the corresponding network traffic includes:
  • the maximum network traffic is filtered out from the network traffic.
  • each background application corresponds to one network traffic
  • the maximum network traffic can be filtered out from all network traffic, and the maximum network traffic is used as a reference for comparison, and the network traffic consumed by each background application is calculated to occupy the maximum network traffic.
  • the proportion of the background application is obtained, and then the corresponding relationship between the application identifier of the background application and the scale value corresponding to the background application is output, so that the network traffic consumed by the background application is prompted by the proportional value, and the user can scale according to the ratio.
  • the value intuitively determines the proportion of current application consumption of network traffic, thereby improving the readability of the user and bringing convenience to the user.
  • the correspondence between the application identifier of the background application and the proportional value corresponding to the background application may be output on the task menu.
  • an application identifier of the background application and a scale value corresponding to the background application may be displayed, where the scale value is displayed at an associated location of the application identifier.
  • the associated location is a location associated with the application identifier, and the user can determine, according to the associated location, that the proportional value is a proportional value corresponding to the application identifier.
  • the associated location may be below, to the left, to the right, above, etc. of the application identifier.
  • the method directly displays the correspondence between the application identifier and the proportional value, and the user can determine the proportion of the network traffic consumed by each background application to the maximum network traffic according to the corresponding relationship, thereby improving the readability of the relationship between the network traffic and the maximum network traffic, and providing the user with the readability. Brought convenience.
  • the ratio of the application identifier of the background application and the ratio of the background application may be displayed on the task menu when the traffic monitoring command is the task menu startup command, where the ratio value is displayed at the associated location of the application identifier. .
  • a traffic ratio bar graph of the background application may be generated according to a scale value corresponding to the background application; an application identifier of the background application and the traffic ratio bar graph are displayed, and the traffic ratio is A bar graph is displayed at the associated location of the application identification.
  • the associated location is a location associated with the application identifier, and the user can determine, according to the associated location, that the traffic ratio bar graph is an application target Know the corresponding flow ratio bar chart. For example, the associated location may be below, to the left, above, etc. of the application identifier.
  • FIG. 1D is a schematic diagram of another output correspondence relationship according to an exemplary embodiment of the present disclosure.
  • the network traffic consumed by the background application is compared with the maximum network traffic, and the scale value corresponding to the background application is obtained, and the traffic ratio bar graph is generated according to the scale value corresponding to the background application. And display the traffic ratio bar chart below the app ID of the background app.
  • the method directly displays the correspondence between the application identifier and the traffic ratio bar graph.
  • the user can determine the proportion of network traffic consumed by each background application to the maximum network traffic according to the corresponding relationship, and improve the readability of the relationship between the network traffic and the maximum network traffic. Convenient for the user.
  • the outputting the correspondence between the application identifier of the background application and the corresponding network traffic includes:
  • the application identifier of the background application and the scale value corresponding to the background application may be displayed, or a proportional bar graph may be generated, and the application identifier and the flow ratio bar graph of the background application are displayed.
  • the network traffic consumed by the background application is compared with the total network traffic to obtain a corresponding proportional value, thereby outputting a correspondence between the application identifier of the background application and the corresponding proportional value, and the user can intuitively determine the background application consumption according to the proportional value.
  • the proportion of network traffic to the total network traffic consumed by all background applications increases the efficiency of determining the relationship between network traffic consumed by each background application and total network traffic, which brings convenience to users.
  • the outputting the correspondence between the application identifier of the background application and the corresponding network traffic includes:
  • all applications can be all applications installed locally in the terminal.
  • the network traffic consumed by the background application is compared with the total network traffic to obtain a corresponding proportional value, thereby outputting a correspondence between the application identifier of the background application and the corresponding proportional value, and the user can intuitively determine the background application consumption according to the proportional value.
  • the proportion of network traffic to the overall network traffic has brought convenience to users.
  • FIG. 2 is a flowchart of a traffic monitoring method according to an exemplary embodiment of the present disclosure.
  • the method may be used in a terminal, including the following steps 201 to 205:
  • step 201 a traffic monitoring command is received to obtain network traffic consumed by each background application, where the background application is an application running in the background.
  • step 202 a correspondence between the application identifier of the background application and the corresponding network traffic is output.
  • step 203 a permission switching command for the background application is received.
  • step 204 the right of the background application to access the mobile network is obtained according to the permission switching command.
  • step 205 when the permission is to allow access, the permission is switched to not allow access, and when the permission is not allowed to access, the permission is switched to allow access.
  • Steps 201 and 202 are similar to steps 101 and 102 in FIG. 1B above, and are not further described herein.
  • the permission of the background application to access the mobile network may be the permission of the background application to network with the server through the mobile network.
  • the background application can be networked through the mobile network, and when the permission is not allowed to access, the background application cannot be networked with the server through the mobile network.
  • the authority switching command for the background application may be received.
  • the application identifier of the background application through the touch screen can be detected. a sliding operation track; when the sliding operation track coincides with the preset sliding track, determining to receive the permission switching command for the background application.
  • the preset sliding track may be a sliding track that does not have a defined function. For example, when there is no corresponding trigger event in the task menu, the preset sliding track can be set as a downward trajectory. When the trigger event corresponding to the slide down in the task menu is to hold/release the background application, the trigger track of the trigger event can be changed to slide down and to the left, and the preset slide track can be set to slide down and to the right.
  • the preset sliding track may also be other tracks, for example, may be a circle-shaped track, a triangle track, a back-and-forth track, and the like.
  • the number of taps of the application identifier of the background application by the touch screen may be detected; when the number of taps is a preset number of times, it is determined that the permission switching command for the background application is received.
  • the preset number of times may be two or more times.
  • the present disclosure also provides an embodiment of the traffic monitoring device and the terminal to which it is applied.
  • FIG. 3 is a block diagram of a traffic monitoring apparatus according to an exemplary embodiment of the present disclosure.
  • the apparatus includes: a network traffic obtaining module 31 and a correspondence output module 32.
  • the network traffic obtaining module 31 is configured to receive a traffic monitoring command to obtain network traffic consumed by each background application, where the background application is an application running in the background.
  • the correspondence output module 32 is configured to output a correspondence between the application identifier of the background application and the corresponding network traffic.
  • the network traffic consumed by each background application is obtained, and the corresponding relationship between the application identifier of the background application and the corresponding network traffic is output, thereby narrowing the scope of the application to be viewed to the background application.
  • the network traffic consumed by the background application is directly determined according to the corresponding relationship, thereby improving the viewing efficiency.
  • FIG. 4 is a block diagram of another traffic monitoring apparatus according to an exemplary embodiment of the present disclosure.
  • the embodiment is based on the foregoing embodiment shown in FIG.
  • a menu start command the task menu is a menu showing an application identifier of a background application
  • the correspondence output module 32 includes an output sub-module 321 .
  • the output sub-module 321 is configured to output a correspondence between the application identifier of the background application and the corresponding network traffic on the task menu.
  • the network traffic consumed by each background application is obtained, and the corresponding relationship between the application identifier of the background application and the corresponding network traffic is outputted on the task menu, thereby realizing the user viewing the background.
  • the application is used, the network traffic consumed by the background application can be viewed, and the efficiency of finding the network traffic is improved, and the user is brought convenience.
  • FIG. 5 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure.
  • the embodiment is based on the foregoing embodiment shown in FIG.
  • the method includes a traffic screening sub-module 322, a first proportional value calculation sub-module 323, and a first correspondence relationship output sub-module 324.
  • the traffic filtering sub-module 322 is configured to filter the largest network from the network traffic. Network flow.
  • the first ratio value calculation sub-module 323 is configured to calculate a proportion of network traffic consumed by each background application to the maximum network traffic, and obtain a scale value corresponding to the background application.
  • the first correspondence output sub-module 324 is configured to output a correspondence between the application identifier of the background application and a proportional value corresponding to the background application.
  • FIG. 6 is a block diagram of another flow monitoring apparatus according to an exemplary embodiment of the present disclosure.
  • the first correspondence output is performed on the basis of the foregoing embodiment shown in FIG. 5 .
  • the submodule 324 includes: a first display module 3241.
  • the first display sub-module 3241 is configured to display an application identifier of the background application and a scale value corresponding to the background application, where the scale value is displayed at an associated location of the application identifier.
  • the corresponding relationship between the application identifier and the proportional value is directly displayed, and the user can determine the proportion of the network traffic consumed by each background application to the maximum network traffic according to the corresponding relationship, thereby improving the readability of the relationship between the network traffic and the maximum network traffic. Sex, bringing convenience to users.
  • FIG. 7 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure.
  • the first correspondence output is performed on the basis of the foregoing embodiment shown in FIG. 5 .
  • the submodule 324 includes a bar graph generation module 3242 and a second display module 3243.
  • the bar graph generation sub-module 3242 is configured to generate a traffic ratio bar graph of the background application according to the scale value corresponding to the background application.
  • the second display sub-module 3243 is configured to display an application identifier of the background application and the traffic ratio bar graph, where the traffic ratio bar graph is displayed at an associated location of the application identifier.
  • the correspondence between the application identifier and the traffic ratio bar graph is directly displayed, and the user can determine the ratio of the network traffic consumed by each background application to the maximum network traffic according to the corresponding relationship. For example, the readability of the relationship between network traffic and maximum network traffic is improved, which brings convenience to users.
  • FIG. 8 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure.
  • the embodiment is based on the foregoing embodiment shown in FIG.
  • the method includes a flow determination sub-module 325, a second proportional value calculation sub-module 326, and a second correspondence relationship output sub-module 327.
  • the traffic determining sub-module 325 is configured to calculate a sum of network traffic consumed by each of the background applications to obtain total network traffic.
  • the second ratio value calculation sub-module 326 is configured to calculate a proportion of the network traffic consumed by each background application to the total network traffic, and obtain a scale value corresponding to the background application.
  • the second correspondence output sub-module 327 is configured to output a correspondence between the application identifier of the background application and a scale value corresponding to the background application.
  • the corresponding proportional value is obtained, thereby outputting the correspondence between the application identifier of the background application and the corresponding proportional value, and the user can intuitively determine the ratio according to the proportional value.
  • the ratio of the network traffic consumed by the background application to the total network traffic consumed by all background applications increases the efficiency of determining the relationship between the network traffic consumed by each background application and the total network traffic, which brings convenience to the user.
  • FIG. 9 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure, which is based on any of the foregoing embodiments shown in FIG. 3 to FIG.
  • the device further includes: a command receiving module 33, a rights obtaining module 34, and a rights switching module 35.
  • the command receiving module 33 is configured to receive a permission switching command for the background application.
  • the privilege acquisition module 34 is configured to acquire the permission of the background application to access the mobile network according to the privilege switching command.
  • the privilege switching module 35 is configured to switch the privilege to not allow access when the privilege is to allow access, and to switch the privilege to allow access when the privilege is not allowed to access.
  • FIG. 10 is a block diagram of another flow monitoring apparatus according to an exemplary embodiment of the present disclosure.
  • the embodiment includes the command receiving module 33 according to the foregoing embodiment shown in FIG. : Trajectory detection sub-module 331 and first command determination sub-module 332.
  • the track detection sub-module 331 is configured to detect a sliding operation track of an application identifier applied to the background application through the touch screen.
  • the first command determining submodule 332 is configured to determine that the right switching command for the background application is received when the sliding operation track is consistent with the preset sliding track.
  • FIG. 11 is a block diagram of another flow monitoring device according to an exemplary embodiment of the present disclosure.
  • the embodiment includes the command receiving module 33 including the embodiment shown in FIG. 9 .
  • the number of times detection sub-module 333 is configured to detect the number of taps of the application identifier applied to the background application through the touch screen.
  • the second command determining submodule 334 is configured to determine that the right switching command for the background application is received when the number of taps is a preset number of times.
  • the present disclosure also provides a traffic monitoring device, the device comprising a processor; a memory for storing processor executable instructions; wherein the processor is configured to:
  • the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
  • the device embodiments described above are merely illustrative, wherein the modules described as separate components may or may not be physically separate, and the components displayed as modules may or may not be physical modules, ie may be located A place, or it can be distributed to multiple network modules. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present disclosure. Those of ordinary skill in the art can understand and implement without any creative effort.
  • FIG. 12 is a block diagram of a flow monitoring device 1200 according to an exemplary embodiment of the present disclosure.
  • the device 1200 can be a mobile phone with routing function, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
  • apparatus 1200 can include one or more of the following components: processing component 1202, memory 1204, power component 1206, multimedia component 1208, audio component 1210, input/output (I/O) interface 1212, sensor component 1214, And a communication component 1216.
  • Processing component 1202 typically controls the overall operation of device 1200, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • Processing component 1202 can include one or more processors 1220 to execute instructions to perform all or part of the steps described above.
  • processing component 1202 can include one or more modules to facilitate interaction between component 1202 and other components.
  • processing component 1202 can include a multimedia module to facilitate interaction between multimedia component 1208 and processing component 1202.
  • Memory 1204 is configured to store various types of data to support operation at device 1200. Examples of such data include instructions for any application or method operating on device 1200, contacting People data, phone book data, messages, pictures, videos, etc.
  • the memory 1204 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Disk Disk or Optical Disk.
  • Power component 1206 provides power to various components of device 1200.
  • Power component 1206 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1200.
  • Multimedia component 1208 includes a screen between the device 1200 and a user that provides an output interface.
  • the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
  • the multimedia component 1208 includes a front camera and/or a rear camera. When the device 1200 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 1210 is configured to output and/or input an audio signal.
  • audio component 1210 includes a microphone (MIC) that is configured to receive an external audio signal when device 1200 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in memory 1204 or transmitted via communication component 1216.
  • audio component 1210 also includes a speaker for outputting an audio signal.
  • the I/O interface 1212 provides an interface between the processing component 1202 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
  • Sensor assembly 1214 includes one or more sensors for providing various aspects to device 1200 State assessment.
  • sensor assembly 1214 can detect an open/closed state of device 1200, relative positioning of components, such as the display and keypad of device 1200, and sensor component 1214 can also detect the location of one of components 1200 or device 1200. The presence or absence of contact by the user with the device 1200, the orientation or acceleration/deceleration of the device 1200 and the temperature change of the device 1200.
  • Sensor assembly 1214 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 1214 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor assembly 1214 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 1216 is configured to facilitate wired or wireless communication between device 1200 and other devices.
  • the device 1200 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
  • communication component 1216 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
  • the communication component 1216 also includes a near field communication (NFC) module to facilitate short range communication.
  • NFC near field communication
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • device 1200 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A gate array
  • controller microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 1204 comprising instructions executable by processor 1220 of apparatus 1200 to perform the above method.
  • the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
  • the device 1100 when the instructions in the storage medium are executed by the processor, the device 1100 is enabled to perform a traffic monitoring method, including:

Abstract

本公开是关于流量监控方法及装置,所述方法包括:接收流量监控命令,获取每个后台应用消耗的网络流量,所述后台应用为在后台运行的应用程序;输出所述后台应用的应用标识与相应网络流量的对应关系。本公开通过接收流量监控命令,获取每个后台应用消耗的网络流量,并输出后台应用的应用标识与相应网络流量的对应关系,从而将待查看的应用程序的范围缩小为后台应用,直接根据对应关系确定后台应用消耗的网络流量,提高查看效率。

Description

流量监控方法及装置
本申请基于申请号为201510958973.0、申请日为2015年12月18日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及通信技术领域,尤其涉及流量监控方法及装置。
背景技术
随着信息时代发展,移动互联网信息产业经济蓬勃发展,网络的应用已经深入到社会的每个角落,智能终端的普及给人类生活带来了诸多的便利,伴随着3G时代、4G时代的到来,智能终端上各种应用程序的安装及运行耗费更多的流量。目前,智能终端中设置有监控网络流量的模块,例如,可通过启动设置应用,选择网络数据选项,进而查看每个应用程序耗费的网络流量。然而,采用这种方式查看应用程序耗费的网络流量,操作比较繁琐,并且,由于记录了所有应用程序耗费的网络流量,从所有应用程序中查找预查看的应用程序,耗时较长。
发明内容
为克服相关技术中存在的问题,本公开提供了流量监控方法及装置。
根据本公开实施例的第一方面,提供一种流量监控方法,所述方法包括:
接收流量监控命令,获取每个后台应用消耗的网络流量,所述后台应用为在后台运行的应用程序;
输出所述后台应用的应用标识与相应网络流量的对应关系。
可选的,所述流量监控命令为任务菜单启动命令,所述任务菜单为展示有后台应用的应用标识的菜单,所述输出所述后台应用的应用标识与相应网络流量的对应关系,包括:
在任务菜单上输出所述后台应用的应用标识与相应网络流量的对应关系。
可选的,所述输出所述后台应用的应用标识与相应网络流量的对应关系,包括:
从所述网络流量中筛选出最大网络流量;
计算每个后台应用消耗的网络流量占所述最大网络流量的比重,获得所述后台应用对应的比例值;
输出所述后台应用的应用标识与所述后台应用对应的比例值的对应关系。
可选的,所述输出所述后台应用的应用标识与所述后台应用对应的比例值的对应关系,包括:
显示所述后台应用的应用标识和所述后台应用对应的比例值,所述比例值显示在所述应用标识的关联位置处;
或,
根据所述后台应用对应的比例值生成所述后台应用的流量比例条形图;
显示所述后台应用的应用标识和所述流量比例条形图,所述流量比例条形图显示在所述应用标识的关联位置处。
可选的,所述输出所述后台应用的应用标识与相应网络流量的对应关系,包括:
计算各所述后台应用消耗的网络流量的总和,获得总网络流量;
计算每个后台应用消耗的网络流量占所述总网络流量的比重,获得所述后台应用对应的比例值;
输出所述后台应用的应用标识与所述后台应用对应的比例值的对应关系。
可选的,所述方法还包括:
接收对所述后台应用的权限切换命令;
根据所述权限切换命令获取所述后台应用访问移动网络的权限;
当所述权限为允许访问时,将所述权限切换为不允许访问,当所述权限为不允许访问时,将所述权限切换为允许访问。
可选的,所述接收对所述后台应用的权限切换命令,包括:
检测通过触摸屏对后台应用的应用标识的滑动操作轨迹;
当所述滑动操作轨迹与预设滑动轨迹一致时,确定接收到对所述后台应用的权限切换命令。
可选的,所述接收对所述后台应用的权限切换命令,包括:
检测通过触摸屏对后台应用的应用标识的敲击次数;
当所述敲击次数为预设次数时,确定接收到对所述后台应用的权限切换命令。
根据本公开实施例的第二方面,提供一种流量监控装置,包括:
网络流量获取模块,被配置为接收流量监控命令,获取每个后台应用消耗的网络流量,所述后台应用为在后台运行的应用程序;
对应关系输出模块,被配置为输出所述后台应用的应用标识与相应网络流量的对应关系。
可选的,所述流量监控命令为任务菜单启动命令,所述任务菜单为展示有后台应用的应用标识的菜单,所述对应关系输出模块包括:
输出子模块,被配置为在任务菜单上输出所述后台应用的应用标识与相应网络流量的对应关系。
可选的,所述对应关系输出模块包括:
流量筛选子模块,被配置为从所述网络流量中筛选出最大网络流量;
第一比例值计算子模块,被配置为计算每个后台应用消耗的网络流量占所述最大网络流量的比重,获得所述后台应用对应的比例值;
第一对应关系输出子模块,被配置为输出所述后台应用的应用标识与所述后台应用对应的比例值的对应关系。
可选的,所述第一对应关系输出子模块包括:
第一显示子模块,被配置为显示所述后台应用的应用标识和所述后台应 用对应的比例值,所述比例值显示在所述应用标识的关联位置处。
可选的,所述第一对应关系输出子模块包括:
条形图生成子模块,被配置为根据所述后台应用对应的比例值生成所述后台应用的流量比例条形图;
第二显示子模块,被配置为显示所述后台应用的应用标识和所述流量比例条形图,所述流量比例条形图显示在所述应用标识的关联位置处。
可选的,所述对应关系输出模块包括:
流量确定子模块,被配置为计算各所述后台应用消耗的网络流量的总和,获得总网络流量;
第二比例值计算子模块,被配置为计算每个后台应用消耗的网络流量占所述总网络流量的比重,获得所述后台应用对应的比例值;
第二对应关系输出子模块,被配置为输出所述后台应用的应用标识与所述后台应用对应的比例值的对应关系。
可选的,所述装置还包括:
命令接收模块,被配置为接收对所述后台应用的权限切换命令;
权限获取模块,被配置为根据所述权限切换命令获取所述后台应用访问移动网络的权限;
权限切换模块,被配置为当所述权限为允许访问时,将所述权限切换为不允许访问,当所述权限为不允许访问时,将所述权限切换为允许访问。
可选的,所述命令接收模块包括:
轨迹检测子模块,被配置为检测通过触摸屏对后台应用的应用标识的滑动操作轨迹;
第一命令确定子模块,被配置为当所述滑动操作轨迹与预设滑动轨迹一致时,确定接收到对所述后台应用的权限切换命令。
可选的,所述命令接收模块包括:
次数检测子模块,被配置为检测通过触摸屏对后台应用的应用标识的敲击次数;
第二命令确定子模块,被配置为当所述敲击次数为预设次数时,确定接收到对所述后台应用的权限切换命令。
根据本公开实施例的第三方面,提供一种流量监控装置,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收流量监控命令,获取每个后台应用消耗的网络流量,所述后台应用为在后台运行的应用程序;
输出所述后台应用的应用标识与相应网络流量的对应关系。
本公开的实施例提供的技术方案可以包括以下有益效果:
本公开通过接收流量监控命令,获取每个后台应用消耗的网络流量,并输出后台应用的应用标识与相应网络流量的对应关系,从而将待查看的应用程序的范围缩小为后台应用,直接根据对应关系确定后台应用消耗的网络流量,提高查看效率。
本公开在接收到任务菜单启动命令时,获取每个后台应用消耗的网络流量,并在任务菜单上输出后台应用的应用标识与相应网络流量的对应关系,从而实现用户在查看后台应用时即可查看到后台应用消耗的网络流量,提高查找网络流量的效率的同时,给用户带来了便利。
本公开计算每个后台应用消耗的网络流量占最大网络流量的比重,获得后台应用对应的比例值,然后输出后台应用的应用标识与后台应用对应的比例值的对应关系,从而实现通过比例值的方式对后台应用消耗的网络流量进行提示,用户可以根据比例值直观确定当前应用程序消耗网络流量的比例情况,给用户带来了便利。
本公开直接显示应用标识和比例值的对应关系,用户可以根据对应关系确定各后台应用消耗的网络流量占最大网络流量的比例,从而提高了网络流量与最大网络流量关系的可读性,给用户带来了便利。
本公开直接显示应用标识和流量比例条形图的对应关系,用户可以根据 对应关系确定各后台应用消耗的网络流量占最大网络流量的比例,提高了网络流量与最大网络流量关系的可读性,给用户带来了便利。
本公开通过将后台应用消耗的网络流量与总网络流量进行比较,获得相应的比例值,从而输出后台应用的应用标识与相应比例值的对应关系,用户可以根据比例值直观地确定后台应用消耗的网络流量占所有后台应用消耗的总网络流量的比例情况,从而提高了确定每个后台应用消耗的网络流量与总网络流量关系的效率,给用户带来了便利。
本公开在输出后台应用的应用标识与相应网络流量的对应关系后,若接收到对后台应用的权限切换命令,则可以根据权限切换命令获取后台应用访问移动网络的权限,并对权限进行切换,从而实现快速对后台应用的访问权限进行控制,提高对后台应用消耗流量控制的效率。
本公开通过检测滑动操作轨迹是否与预设滑动轨迹一致的方式,判断是否接收到对后台应用的权限切换命令,在接收到权限切换命令时,根据权限切换命令获取后台应用访问移动网络的权限,并对访问权限进行切换,从而实现快速对后台应用的访问权限进行控制,提高对后台应用消耗流量控制的效率。
本公开通过检测敲击次数是否与预设次数一致的方式,判断是否接收到对后台应用的权限切换命令,在接收到权限切换命令时,根据权限切换命令获取后台应用访问移动网络的权限,并对访问权限进行切换,从而实现快速对后台应用的访问权限进行控制,提高对后台应用消耗流量控制的效率。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。
图1A是相关技术中查看应用程序消耗网络流量的示意图。
图1B是本公开根据一示例性实施例示出的一种流量监控方法的流程图。
图1C是本公开根据一示例性实施例示出的一种输出对应关系的示意图。
图1D是本公开根据一示例性实施例示出的另一种输出对应关系的示意图。
图2是本公开根据一示例性实施例示出的另一种流量监控方法的流程图。
图3是本公开根据一示例性实施例示出的一种流量监控装置的框图。
图4是本公开根据一示例性实施例示出的另一种流量监控装置的框图。
图5是本公开根据一示例性实施例示出的另一种流量监控装置的框图。
图6是本公开根据一示例性实施例示出的另一种流量监控装置的框图。
图7是本公开根据一示例性实施例示出的另一种流量监控装置的框图。
图8是本公开根据一示例性实施例示出的另一种流量监控装置的框图。
图9是本公开根据一示例性实施例示出的另一种流量监控装置的框图。
图10是本公开根据一示例性实施例示出的另一种流量监控装置的框图。
图11是本公开根据一示例性实施例示出的另一种流量监控装置的框图。
图12本公开根据一示例性实施例示出的一种用于流量监控装置的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。
在本公开使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开。在本公开和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
相关技术中,如图1A所示,如图1A是相关技术中查看应用程序消耗网络流量的示意图。为了查看应用程序消耗网络流量的情况,用户可以从桌面图标中查找出设置应用程序的图标,并点击该“设置”图标,并从设置里查找移动网络按钮(不同操作系统命名不同),在移动网络下查看应用程序消耗的网络流量,步骤繁琐,并且要从所有应用程序中查看目标应用程序消耗的网络流量,查看效率低。在一些终端中也可以安装流量监控应用,例如网络助手,通过网络助手对各应用程序消耗的网络流量进行统计。由于网络助手中记录有所有应用程序消耗的网络流量情况,用户从所有应用程序中查看目标应用程序消耗的网络流量,查看效率低。
为了提高查看效率,本公开将查看应用程序的范围进行缩小。由于用户一般比较关注正在使用的应用程序消耗的网络流量,因此将后台运行的应用程序(后台应用)作为目标应用程序的查找对象,从而提高查看效率。如图1B所示,图1B是本公开根据一示例性实施例示出的一种流量监控方法的流程图,该方法可以用于终端中,包括以下步骤101至步骤102:
在步骤101中,接收流量监控命令,获取每个后台应用消耗的网络流量,所述后台应用为在后台运行的应用程序。
在步骤102中,输出所述后台应用的应用标识与相应网络流量的对应关系。
本公开实施例中所涉及的终端可以是智能终端,智能终端可以是智能手机、平板电脑等等。
其中,流量监控命令是一个触发命令,触发执行步骤101至102。流量监控命令可以是终端中的一种新触发命令,例如,通过原来未定义功能的某个按键或多个按键组合触发生成流量监控命令,如假定同时按音量加键和终端主键原 本没有额外功能的情况下,本公开可以在同时按音量加键和终端主键时生成流量监控命令,触发执行步骤101至102。又如,通过某个按钮触发生成流量监控命令,如本公开方法可以应用程序的方式安装在终端中,通过触发该应用程序的图标,实现触发生成流量监控命令,触发执行步骤101至102。
流量监控命令也可以是终端中已有的触发命令,通过扩展已有的触发命令触发实现的功能,从而实现增加流量监控功能。例如,在一个可选的实现方式中,所述流量监控命令可以为任务菜单启动命令,即在接收到任务菜单启动命令时,获取每个后台应用消耗的网络流量,在任务菜单上输出所述后台应用的应用标识与相应网络流量的对应关系。
其中,所述任务菜单为展示有后台应用的应用标识的菜单。应用标识可以是应用图标、应用名称、应用编号等指示该后台应用的标识。不同的操作系统可以通过不同的方式触发生成任务菜单启动命令,例如,在苹果系统中,可以通过双击主键触发生成任务菜单启动命令,从而弹出任务菜单。在安卓系统中,可以通过点击菜单按钮触发生成任务菜单启动命令,从而弹出任务菜单。在任务菜单中展示有后台应用的应用图标,用户可以通过点击应用图标并向上滑动,实现释放该后台应用,即关闭该后台应用,用户可以通过单击应用图标,实现切换到该应用图标对应的后台应用,将该后台应用切换为前台运行。在小米手机中,还可以通过点击应用图标下方的“X”按钮,实现一键释放所有后台应用。另外,还可以通过下滑后台应用的图标,实现保持/释放保持该后台应用。所谓保持,即将该后台应用锁定,避免在点击“X”按钮时将该应用释放;所谓释放保持,即将该后台应用解除锁定,以便在点击“X”按钮时能将该应用释放。
由上述实施例可见,本公开在接收到任务菜单启动命令时,获取每个后台应用消耗的网络流量,并在任务菜单上输出后台应用的应用标识与相应网络流量的对应关系,从而实现用户在查看后台应用时即可查看到后台应用消耗的网络流量,提高查找网络流量的效率的同时,给用户带来了便利。
关于步骤101,在接收到流量监控命令后,可以先确定后台运行的应用程序,后台运行的应用程序可以简称为后台应用,在确定后台应用后,获取每个后台 应用对应消耗的网络流量。作为其中一种获取方式,可以根据流量状态接口(traffic status)的接收量和发送量确定每个后台应用消耗的网络流量。其中,网络流量就是网络上传输的数据量。在一个实施例中,由于一般情况下用户并不在意无线局域网下网络流量的使用情况,因此本公开监控的网络流量可以是移动网络流量,移动网络流量对应的网络可以是3G网络、4G网络等。
关于步骤102,应用标识可以是应用图标、应用名称、应用编号等指示该后台应用的标识。为了提高识别后台应用的效率,应用标识可以是应用图标。
其中,输出后台应用的应用标识与相应网络流量的对应关系,以便用户根据对应关系确定后台应用消耗的网络流量。针对输出的方式,当由按键新组合触发生成流量监控命令时,可以弹出提示窗口,在提示窗口上输出后台应用的应用标识与相应网络流量的对应关系;当流量监控命令为任务菜单启动命令时,可以是在任务菜单上输出后台应用的应用标识与相应网络流量的对应关系等。
其中,输出形式可以是语音形式、显示形式。例如显示后台应用的应用标识,并在双击应用标识时语音提示该后台应用消耗的网络流量,从而实现输出后台应用的应用标识与相应网络流量的对应关系。为了实现网络流量的直观性,可以通过显示的方式输出后台应用的应用标识与相应网络流量的对应关系。以下列举几种显示方式:
在一个可选的实现方式中,可以在后台应用的应用标识的关联位置处显示该后台应用消耗的网络流量。所述关联位置是与应用标识有关联的位置,用户能根据该关联位置确定该网络流量是应用标识对应的网络流量。例如,关联位置可以是在应用标识的下方、左方、上方等位置。如图1C所示,图1C是本公开根据一示例性实施例示出的一种输出对应关系的示意图。在该实施例中,以在应用标识和应用名称下方显示网络流量为例进行举例说明。在接收到任务菜单启动命令时,将后台应用消耗的网络流量显示在后台应用的应用标识的下方。
在另一个可选的实现方式中,所述输出所述后台应用的应用标识与相应网络流量的对应关系,包括:
从所述网络流量中筛选出最大网络流量。
计算每个后台应用消耗的网络流量占所述最大网络流量的比重,获得所述后台应用对应的比例值。
输出所述后台应用的应用标识与所述后台应用对应的比例值的对应关系。
在该实现方式中,每个后台应用对应一个网络流量,则可以从所有网络流量中筛选出最大网络流量,将最大网络流量作为比较的基准,计算每个后台应用消耗的网络流量占最大网络流量的比重,获得后台应用对应的比例值,然后输出后台应用的应用标识与后台应用对应的比例值的对应关系,从而实现通过比例值的方式对后台应用消耗的网络流量进行提示,用户可以根据比例值直观确定当前应用程序消耗网络流量的比例情况,从而提高了用户的可读性,给用户带来了便利。
其中,当流量监控命令为任务菜单启动命令时,可以在任务菜单上输出后台应用的应用标识与后台应用对应的比例值的对应关系。
作为其中一种输出方式,可以显示所述后台应用的应用标识和所述后台应用对应的比例值,所述比例值显示在所述应用标识的关联位置处。所述关联位置是与应用标识有关联的位置,用户能根据该关联位置确定该比例值是应用标识对应的比例值。例如,关联位置可以是在应用标识的下方、左方、右方、上方等位置。
本方式直接显示应用标识和比例值的对应关系,用户可以根据对应关系确定各后台应用消耗的网络流量占最大网络流量的比例,从而提高了网络流量与最大网络流量关系的可读性,给用户带来了便利。
其中,当流量监控命令为任务菜单启动命令时,可以在任务菜单上显示所述后台应用的应用标识和所述后台应用对应的比例值,所述比例值显示在所述应用标识的关联位置处。
作为另一种输出方式,可以根据所述后台应用对应的比例值生成所述后台应用的流量比例条形图;显示所述后台应用的应用标识和所述流量比例条形图,所述流量比例条形图显示在所述应用标识的关联位置处。所述关联位置是与应用标识有关联的位置,用户能根据该关联位置确定该流量比例条形图是应用标 识对应的流量比例条形图。例如,关联位置可以是在应用标识的下方、左方、上方等位置。如图1D所示,图1D是本公开根据一示例性实施例示出的另一种输出对应关系的示意图。在该示意图中,在接收到任务菜单启动命令时,将后台应用消耗的网络流量与最大网络流量相比,获得后台应用对应的比例值,根据后台应用对应的比例值生成流量比例条形图,并将流量比例条形图显示在后台应用的应用标识的下方。
本方式直接显示应用标识和流量比例条形图的对应关系,用户可以根据对应关系确定各后台应用消耗的网络流量占最大网络流量的比例,提高了网络流量与最大网络流量关系的可读性,给用户带来了便利。
在另一个可选的实现方式中,所述输出所述后台应用的应用标识与相应网络流量的对应关系,包括:
计算各所述后台应用消耗的网络流量的总和,获得总网络流量。
计算每个后台应用消耗的网络流量占所述总网络流量的比重,获得所述后台应用对应的比例值。
输出所述后台应用的应用标识与所述后台应用对应的比例值的对应关系。
其中,在输出关系时,可以显示后台应用的应用标识和后台应用对应的比例值,也可以生成比例条形图,显示后台应用的应用标识和流量比例条形图等。
本实施例通过将后台应用消耗的网络流量与总网络流量进行比较,获得相应的比例值,从而输出后台应用的应用标识与相应比例值的对应关系,用户可以根据比例值直观地确定后台应用消耗的网络流量占所有后台应用消耗的总网络流量的比例情况,从而提高了确定每个后台应用消耗的网络流量与总网络流量关系的效率,给用户带来了便利。
在另一个可选的实现方式中,所述输出所述后台应用的应用标识与相应网络流量的对应关系,包括:
计算所有应用程序消耗的总网络流量。
计算每个后台应用消耗的网络流量占所述总网络流量的比重,获得所述后台应用对应的比例值。
输出所述后台应用的应用标识与所述后台应用对应的比例值的对应关系。
其中,所有应用程序可以是终端中本地安装的所有应用程序。
本实施例通过将后台应用消耗的网络流量与总网络流量进行比较,获得相应的比例值,从而输出后台应用的应用标识与相应比例值的对应关系,用户可以根据比例值直观地确定后台应用消耗的网络流量占整体网络流量的比例情况,给用户带来了便利。
应当理解的是,上述仅列举了其中几种输出后台应用的应用标识与相应网络流量的对应关系的方式,其它输出对应关系的方式也在本公开包含范围内,但是限于篇幅,未进行一一描述。
如图2所示,图2是本公开根据一示例性实施例示出的一种流量监控方法的流程图,该方法可以用于终端中,包括以下步骤201至步骤205:
在步骤201中,接收流量监控命令,获取每个后台应用消耗的网络流量,所述后台应用为在后台运行的应用程序。
在步骤202中,输出所述后台应用的应用标识与相应网络流量的对应关系。
在步骤203中,接收对所述后台应用的权限切换命令。
在步骤204中,根据所述权限切换命令获取所述后台应用访问移动网络的权限。
在步骤205中,当所述权限为允许访问时,将所述权限切换为不允许访问,当所述权限为不允许访问时,将所述权限切换为允许访问。
其中,步骤201和步骤202与上述图1B中步骤101和步骤102类似,在此不再一一赘述。关于后台应用访问移动网络的权限,可以是后台应用通过移动网络与服务器进行联网的权限。当权限为允许访问时,即该后台应用可以通过移动网络进行联网,当权限为不允许访问时,即该后台应用不能通过移动网络与服务器进行联网。
在输出后台应用的应用标识与相应网络流量的对应关系后,可以接收对后台应用的权限切换命令。
在一个可选的实现方式中,可以检测通过触摸屏对后台应用的应用标识 的滑动操作轨迹;当所述滑动操作轨迹与预设滑动轨迹一致时,确定接收到对所述后台应用的权限切换命令。
其中,预设滑动轨迹可以是原本没有定义功能的滑动轨迹。例如,当任务菜单中向下滑没有对应触发事件时,可以将预设滑动轨迹设置为向下滑的轨迹。当任务菜单中向下滑对应的触发事件是保持/释放保持后台应用时,可以将该触发事件的触发轨迹更改为向下并向左滑动,将预设滑动轨迹设置为向下并向右滑动。另外,预设滑动轨迹还可以是其他轨迹,例如,可以是一个圆圈型的轨迹、三角形的轨迹、来回晃动轨迹等。
本实现方式中,通过检测滑动操作轨迹是否与预设滑动轨迹一致的方式,判断是否接收到对后台应用的权限切换命令,在接收到权限切换命令时,根据权限切换命令获取后台应用访问移动网络的权限,并对访问权限进行切换,从而实现快速对后台应用的访问权限进行控制,提高对后台应用消耗流量控制的效率。
在另一个可选的实现方式中,可以检测通过触摸屏对后台应用的应用标识的敲击次数;当所述敲击次数为预设次数时,确定接收到对所述后台应用的权限切换命令。
其中,预设次数可以是两次或两次以上。
本实现方式中,通过检测敲击次数是否与预设次数一致的方式,判断是否接收到对后台应用的权限切换命令,在接收到权限切换命令时,根据权限切换命令获取后台应用访问移动网络的权限,并对访问权限进行切换,从而实现快速对后台应用的访问权限进行控制,提高对后台应用消耗流量控制的效率。
可以理解的是,本公开仅列举了其中几种确定接收到权限切换命令的实施例,还可以采用其他方式确定接收到权限切换命令,本公开不再一一赘述。
以上实施方式中的各种技术特征可以任意进行组合,只要特征之间的组合不存在冲突或矛盾,但是限于篇幅,未进行一一描述,因此上述实施方式中的各种技术特征的任意进行组合也属于本说明书公开的范围。
与前述流量监控方法的实施例相对应,本公开还提供了流量监控装置及其所应用的终端的实施例。
如图3所示,图3是本公开根据一示例性实施例示出的一种流量监控装置的框图,所述装置包括:网络流量获取模块31和对应关系输出模块32。
其中,网络流量获取模块31,被配置为接收流量监控命令,获取每个后台应用消耗的网络流量,所述后台应用为在后台运行的应用程序。
对应关系输出模块32,被配置为输出所述后台应用的应用标识与相应网络流量的对应关系。
由上述实施例可见,通过接收流量监控命令,获取每个后台应用消耗的网络流量,并输出后台应用的应用标识与相应网络流量的对应关系,从而将待查看的应用程序的范围缩小为后台应用,直接根据对应关系确定后台应用消耗的网络流量,提高查看效率。
如图4所示,图4是本公开根据一示例性实施例示出的另一种流量监控装置的框图,该实施例在前述图3所示实施例的基础上,所述流量监控命令为任务菜单启动命令,所述任务菜单为展示有后台应用的应用标识的菜单,所述对应关系输出模块32包括:输出子模块321。
其中,输出子模块321,被配置为在任务菜单上输出所述后台应用的应用标识与相应网络流量的对应关系。
由上述实施例可见,在接收到任务菜单启动命令时,获取每个后台应用消耗的网络流量,并在任务菜单上输出后台应用的应用标识与相应网络流量的对应关系,从而实现用户在查看后台应用时即可查看到后台应用消耗的网络流量,提高查找网络流量的效率的同时,给用户带来了便利。
如图5所示,图5是本公开根据一示例性实施例示出的另一种流量监控装置的框图,该实施例在前述图3所示实施例的基础上,所述对应关系输出模块32包括:流量筛选子模块322、第一比例值计算子模块323和第一对应关系输出子模块324。
其中,流量筛选子模块322,被配置为从所述网络流量中筛选出最大网 络流量。
第一比例值计算子模块323,被配置为计算每个后台应用消耗的网络流量占所述最大网络流量的比重,获得所述后台应用对应的比例值。
第一对应关系输出子模块324,被配置为输出所述后台应用的应用标识与所述后台应用对应的比例值的对应关系。
由上述实施例可见,计算每个后台应用消耗的网络流量占最大网络流量的比重,获得后台应用对应的比例值,然后输出后台应用的应用标识与后台应用对应的比例值的对应关系,从而实现通过比例值的方式对后台应用消耗的网络流量进行提示,用户可以根据比例值直观确定当前应用程序消耗网络流量的比例情况,给用户带来了便利。
如图6所示,图6是本公开根据一示例性实施例示出的另一种流量监控装置的框图,该实施例在前述图5所示实施例的基础上,所述第一对应关系输出子模块324包括:第一显示模块3241。
其中,第一显示子模块3241,被配置为显示所述后台应用的应用标识和所述后台应用对应的比例值,所述比例值显示在所述应用标识的关联位置处。
由上述实施例可见,直接显示应用标识和比例值的对应关系,用户可以根据对应关系确定各后台应用消耗的网络流量占最大网络流量的比例,从而提高了网络流量与最大网络流量关系的可读性,给用户带来了便利。
如图7所示,图7是本公开根据一示例性实施例示出的另一种流量监控装置的框图,该实施例在前述图5所示实施例的基础上,所述第一对应关系输出子模块324包括:条形图生成模块3242和第二显示模块3243。
其中,条形图生成子模块3242,被配置为根据所述后台应用对应的比例值生成所述后台应用的流量比例条形图。
第二显示子模块3243,被配置为显示所述后台应用的应用标识和所述流量比例条形图,所述流量比例条形图显示在所述应用标识的关联位置处。
由上述实施例可见,直接显示应用标识和流量比例条形图的对应关系,用户可以根据对应关系确定各后台应用消耗的网络流量占最大网络流量的比 例,提高了网络流量与最大网络流量关系的可读性,给用户带来了便利。
如图8所示,图8是本公开根据一示例性实施例示出的另一种流量监控装置的框图,该实施例在前述图3所示实施例的基础上,所述对应关系输出模块32包括:流量确定子模块325、第二比例值计算子模块326和第二对应关系输出子模块327。
其中,流量确定子模块325,被配置为计算各所述后台应用消耗的网络流量的总和,获得总网络流量。
第二比例值计算子模块326,被配置为计算每个后台应用消耗的网络流量占所述总网络流量的比重,获得所述后台应用对应的比例值。
第二对应关系输出子模块327,被配置为输出所述后台应用的应用标识与所述后台应用对应的比例值的对应关系。
由上述实施例可见,通过将后台应用消耗的网络流量与总网络流量进行比较,获得相应的比例值,从而输出后台应用的应用标识与相应比例值的对应关系,用户可以根据比例值直观地确定后台应用消耗的网络流量占所有后台应用消耗的总网络流量的比例情况,从而提高了确定每个后台应用消耗的网络流量与总网络流量关系的效率,给用户带来了便利。
如图9所示,图9是本公开根据一示例性实施例示出的另一种流量监控装置的框图,该实施例在前述图3至图8任一所示实施例的基础上,所述装置还包括:命令接收模块33、权限获取模块34和权限切换模块35。
其中,命令接收模块33,被配置为接收对所述后台应用的权限切换命令。
权限获取模块34,被配置为根据所述权限切换命令获取所述后台应用访问移动网络的权限。
权限切换模块35,被配置为当所述权限为允许访问时,将所述权限切换为不允许访问,当所述权限为不允许访问时,将所述权限切换为允许访问。
由上述实施例可见,在输出后台应用的应用标识与相应网络流量的对应关系后,若接收到对后台应用的权限切换命令,则可以根据权限切换命令获取后台应用访问移动网络的权限,并对权限进行切换,从而实现快速对后台 应用的访问权限进行控制,提高对后台应用消耗流量控制的效率。
如图10所示,图10是本公开根据一示例性实施例示出的另一种流量监控装置的框图,该实施例在前述图9所示实施例的基础上,所述命令接收模块33包括:轨迹检测子模块331和第一命令确定子模块332。
其中,轨迹检测子模块331,被配置为检测通过触摸屏对后台应用的应用标识的滑动操作轨迹。
第一命令确定子模块332,被配置为当所述滑动操作轨迹与预设滑动轨迹一致时,确定接收到对所述后台应用的权限切换命令。
由上述实施例可见,通过检测滑动操作轨迹是否与预设滑动轨迹一致的方式,判断是否接收到对后台应用的权限切换命令,在接收到权限切换命令时,根据权限切换命令获取后台应用访问移动网络的权限,并对访问权限进行切换,从而实现快速对后台应用的访问权限进行控制,提高对后台应用消耗流量控制的效率。
如图11所示,图11是本公开根据一示例性实施例示出的另一种流量监控装置的框图,该实施例在前述图9所示实施例的基础上,所述命令接收模块33包括:次数检测子模块333和第二命令确定子模块334。
其中,次数检测子模块333,被配置为检测通过触摸屏对后台应用的应用标识的敲击次数。
第二命令确定子模块334,被配置为当所述敲击次数为预设次数时,确定接收到对所述后台应用的权限切换命令。
由上述实施例可见,通过检测敲击次数是否与预设次数一致的方式,判断是否接收到对后台应用的权限切换命令,在接收到权限切换命令时,根据权限切换命令获取后台应用访问移动网络的权限,并对访问权限进行切换,从而实现快速对后台应用的访问权限进行控制,提高对后台应用消耗流量控制的效率。
相应的,本公开还提供一种流量监控装置,所述装置包括有处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:
接收流量监控命令,获取每个后台应用消耗的网络流量,所述后台应用为在后台运行的应用程序。
输出所述后台应用的应用标识与相应网络流量的对应关系。
上述装置中各个模块的功能和作用的实现过程具体详情见上述方法中对应步骤的实现过程,在此不再赘述。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理模块,即可以位于一个地方,或者也可以分布到多个网络模块上。可以根据实际的需要选择其中的部分或者全部模块来实现本公开方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
如图12所示,图12是本公开根据一示例性实施例示出的一种用于流量监控装置1200的框图。该装置1200可以是具有路由功能的移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等终端。
参照图12,装置1200可以包括以下一个或多个组件:处理组件1202,存储器1204,电源组件1206,多媒体组件1208,音频组件1210,输入/输出(I/O)的接口1212,传感器组件1214,以及通信组件1216。
处理组件1202通常控制装置1200的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件1202可以包括一个或多个处理器1220来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1202可以包括一个或多个模块,便于处理组件1202和其他组件之间的交互。例如,处理组件1202可以包括多媒体模块,以方便多媒体组件1208和处理组件1202之间的交互。
存储器1204被配置为存储各种类型的数据以支持在装置1200的操作。这些数据的示例包括用于在装置1200上操作的任何应用程序或方法的指令,联系 人数据,电话簿数据,消息,图片,视频等。存储器1204可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件1206为装置1200的各种组件提供电力。电源组件1206可以包括电源管理系统,一个或多个电源,及其他与为装置1200生成、管理和分配电力相关联的组件。
多媒体组件1208包括在所述装置1200和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件1208包括一个前置摄像头和/或后置摄像头。当装置1200处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件1210被配置为输出和/或输入音频信号。例如,音频组件1210包括一个麦克风(MIC),当装置1200处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1204或经由通信组件1216发送。在一些实施例中,音频组件1210还包括一个扬声器,用于输出音频信号。
I/O接口1212为处理组件1202和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件1214包括一个或多个传感器,用于为装置1200提供各个方面 的状态评估。例如,传感器组件1214可以检测到装置1200的打开/关闭状态,组件的相对定位,例如所述组件为装置1200的显示器和小键盘,传感器组件1214还可以检测装置1200或装置1200中一个组件的位置改变,用户与装置1200接触的存在或不存在,装置1200方位或加速/减速和装置1200的温度变化。传感器组件1214可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1214还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件1214还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件1216被配置为便于装置1200和其他设备之间有线或无线方式的通信。装置1200可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件1216经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件1216还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,装置1200可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器1204,上述指令可由装置1200的处理器1220执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
其中,当所述存储介质中的指令由所述处理器执行时,使得装置1100能够执行一种流量监控方法,包括:
接收流量监控命令,获取每个后台应用消耗的网络流量,所述后台应用为在后台运行的应用程序。
输出所述后台应用的应用标识与相应网络流量的对应关系。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开的其它实施方案。本公开旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。
以上所述仅为本公开的较佳实施例而已,并不用以限制本公开,凡在本公开的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本公开保护的范围之内。

Claims (5)

  1. 一种流量监控方法,其特征在于,所述方法包括:
    接收流量监控命令,获取每个后台应用消耗的网络流量,所述后台应用为在后台运行的应用程序;
    输出所述后台应用的应用标识与相应网络流量的对应关系。
  2. 根据权利要求1所述的方法,其特征在于,所述流量监控命令为任务菜单启动命令,所述任务菜单为展示有后台应用的应用标识的菜单,所述输出所述后台应用的应用标识与相应网络流量的对应关系,包括:
    在任务菜单上输出所述后台应用的应用标识与相应网络流量的对应关系。
  3. 根据权利要求1所述的方法,其特征在于,所述输出所述后台应用的应用标识与相应网络流量的对应关系,包括:
    从所述网络流量中筛选出最大网络流量;
    计算每个后台应用消耗的网络流量占所述最大网络流量的比重,获得所述后台应用对应的比例值;
    输出所述后台应用的应用标识与所述后台应用对应的比例值的对应关系。
  4. 根据权利要求3所述的方法,其特征在于,所述输出所述后台应用的应用标识与所述后台应用对应的比例值的对应关系,包括:
    显示所述后台应用的应用标识和所述后台应用对应的比例值,所述比例值显示在所述应用标识的关联位置处;
    或,
    根据所述后台应用对应的比例值生成所述后台应用的流量比例条形图;
    显示所述后台应用的应用标识和所述流量比例条形图,所述流量比例条形图显示在所述应用标识的关联位置处。
  5. 根据权利要求1所述的方法,其特征在于,所述输出所述后台应用
PCT/CN2016/087526 2015-12-18 2016-06-28 流量监控方法及装置 WO2017101291A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510958973.0 2015-12-18
CN201510958973.0A CN105553772B (zh) 2015-12-18 2015-12-18 流量监控方法及装置

Publications (1)

Publication Number Publication Date
WO2017101291A1 true WO2017101291A1 (zh) 2017-06-22

Family

ID=55832711

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/087526 WO2017101291A1 (zh) 2015-12-18 2016-06-28 流量监控方法及装置

Country Status (4)

Country Link
US (1) US20170180968A1 (zh)
EP (1) EP3182650A1 (zh)
CN (1) CN105553772B (zh)
WO (1) WO2017101291A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553772B (zh) * 2015-12-18 2020-03-17 小米科技有限责任公司 流量监控方法及装置
CN111459774B (zh) * 2019-01-21 2023-05-12 中国移动通信有限公司研究院 一种应用程序的流量的获取方法、装置、设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006576A (zh) * 2010-12-08 2011-04-06 东莞宇龙通信科技有限公司 一种上网流量显示的方法、系统及移动终端
CN104077208A (zh) * 2014-06-23 2014-10-01 小米科技有限责任公司 应用程序图标的显示方法及装置
CN104991767A (zh) * 2015-06-15 2015-10-21 联想(北京)有限公司 一种信息处理方法及电子设备
CN105101270A (zh) * 2014-05-12 2015-11-25 宇龙计算机通信科技(深圳)有限公司 用于终端的流量管理装置和流量管理方法
CN105553772A (zh) * 2015-12-18 2016-05-04 小米科技有限责任公司 流量监控方法及装置

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8484568B2 (en) * 2010-08-25 2013-07-09 Verizon Patent And Licensing Inc. Data usage monitoring per application
KR101337724B1 (ko) * 2010-12-27 2013-12-06 주식회사 팬택 어플리케이션별 데이터 사용량을 표시하는 이동 단말기 및 그 제어방법
EP2721804B1 (en) * 2011-06-15 2018-04-25 Orange Method of and apparatus for providing an indication of data consumption
US8478233B2 (en) * 2011-08-01 2013-07-02 Qualcomm Innovation Center, Inc. Mobile computing device application network use metric and monetary cost monitor and control
US9838287B2 (en) * 2012-01-27 2017-12-05 Microsoft Technology Licensing, Llc Predicting network data consumption relative to data usage patterns
CN102799374A (zh) * 2012-07-03 2012-11-28 宇龙计算机通信科技(深圳)有限公司 终端和应用程序的控制方法
US10223156B2 (en) * 2013-06-09 2019-03-05 Apple Inc. Initiating background updates based on user activity
CN104254097A (zh) * 2013-06-27 2014-12-31 腾讯科技(深圳)有限公司 一种流量控制方法和装置
CN104009892A (zh) * 2014-06-12 2014-08-27 北京奇虎科技有限公司 一种移动终端流量的监控方法、装置及客户端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006576A (zh) * 2010-12-08 2011-04-06 东莞宇龙通信科技有限公司 一种上网流量显示的方法、系统及移动终端
CN105101270A (zh) * 2014-05-12 2015-11-25 宇龙计算机通信科技(深圳)有限公司 用于终端的流量管理装置和流量管理方法
CN104077208A (zh) * 2014-06-23 2014-10-01 小米科技有限责任公司 应用程序图标的显示方法及装置
CN104991767A (zh) * 2015-06-15 2015-10-21 联想(北京)有限公司 一种信息处理方法及电子设备
CN105553772A (zh) * 2015-12-18 2016-05-04 小米科技有限责任公司 流量监控方法及装置

Also Published As

Publication number Publication date
US20170180968A1 (en) 2017-06-22
EP3182650A1 (en) 2017-06-21
CN105553772B (zh) 2020-03-17
CN105553772A (zh) 2016-05-04

Similar Documents

Publication Publication Date Title
WO2017071068A1 (zh) 应用程序切换方法、装置及设备
CN107919123B (zh) 多语音助手控制方法、装置及计算机可读存储介质
US10649648B2 (en) Method and apparatus for screen capture processing
US10884473B2 (en) Methods, electronic devices, and storage mediums for waking up an icon
US10242168B2 (en) Methods and apparatuses for controlling smart device
KR101722522B1 (ko) 디스플레이 모드를 전환하기 위한 방법 및 장치
WO2016029642A1 (zh) 后台应用程序的控制方法、装置及终端设备
WO2017152621A1 (zh) 温度控制方法及装置
EP3151117B1 (en) Method and device for delaying information broadcasting
WO2017113660A1 (zh) 应用程序管理方法及装置
US10610152B2 (en) Sleep state detection method, apparatus and system
WO2017035989A1 (zh) 唤醒电子设备的方法及装置
WO2016183992A1 (zh) 对账户与设备的控制关系进行管理的方法、装置和系统
WO2017000490A1 (zh) 报警方法及装置
WO2017193480A1 (zh) 报警方法及装置、控制设备及传感设备
WO2016155233A1 (zh) 智能场景删除方法和装置
WO2018000711A1 (zh) 输出图像的方法及装置
KR20160030462A (ko) 응용 프로그램 배지 추가 방법, 장치, 프로그램 및 기록매체
WO2017071077A1 (zh) 界面显示方法及装置
WO2017035994A1 (zh) 外接设备的连接方法及装置
WO2017020479A1 (zh) 界面显示方法及装置
WO2016155304A1 (zh) 无线访问接入点的控制方法及装置
WO2016061927A1 (zh) 描述信息的显示方法及装置、电子设备
WO2017088371A1 (zh) 闹钟设置方法及装置
WO2017008400A1 (zh) 控制智能设备的方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16874355

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16874355

Country of ref document: EP

Kind code of ref document: A1