WO2019137187A1 - 资源管理方法、装置、移动终端及计算机可读存储介质 - Google Patents

资源管理方法、装置、移动终端及计算机可读存储介质 Download PDF

Info

Publication number
WO2019137187A1
WO2019137187A1 PCT/CN2018/123047 CN2018123047W WO2019137187A1 WO 2019137187 A1 WO2019137187 A1 WO 2019137187A1 CN 2018123047 W CN2018123047 W CN 2018123047W WO 2019137187 A1 WO2019137187 A1 WO 2019137187A1
Authority
WO
WIPO (PCT)
Prior art keywords
resource
network
restriction level
application
network resource
Prior art date
Application number
PCT/CN2018/123047
Other languages
English (en)
French (fr)
Inventor
陈岩
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Publication of WO2019137187A1 publication Critical patent/WO2019137187A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/485Task life-cycle, e.g. stopping, restarting, resuming execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/4881Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • G06F9/5016Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals the resource being the memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • G06F9/5022Mechanisms to release resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • G06F9/5038Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the execution order of a plurality of tasks, e.g. taking priority or time dependency constraints into consideration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/48Indexing scheme relating to G06F9/48
    • G06F2209/482Application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/50Indexing scheme relating to G06F9/50
    • G06F2209/5021Priority
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/50Indexing scheme relating to G06F9/50
    • G06F2209/504Resource capping

Definitions

  • the present application relates to the field of computer technologies, and in particular, to a resource management method, apparatus, mobile terminal, and computer readable storage medium.
  • a resource management method, apparatus, mobile terminal, and computer readable storage medium are provided.
  • a resource management method including:
  • the network resource usage data of the foreground application is collected every preset time period
  • a resource management device comprising:
  • the collection module is configured to collect network resource usage data of the foreground application every preset time period when the current application has an application;
  • a level determining module configured to determine, according to the network resource usage data, a resource restriction level of the background application in the network resource
  • a configuration module configured to add the background application to a resource group corresponding to the resource restriction level under the network resource, and configure a resource usage priority that matches the resource group.
  • a mobile terminal includes a memory and a processor in which is stored a computer program that, when executed by the processor, causes the processor to implement the method as described above.
  • a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the method as described above.
  • the foregoing resource management method, device, mobile terminal, and computer readable storage medium when the current station has an application running, collect network resource usage data of the foreground application every preset time period, and determine a background application according to the network resource usage data of the foreground application.
  • the network resource used by the background application may be dynamically implemented differently.
  • the resource limit of the level reduces the stuck condition caused by the background application to seize the network resources of the foreground application, and improves the system performance.
  • FIG. 1 is a block diagram of a mobile terminal in one embodiment.
  • FIG. 2 is a system architecture diagram of a resource management method in an embodiment.
  • FIG. 3 is a schematic flow chart of a resource management method in an embodiment.
  • FIG. 4 is a schematic diagram of resource groups of network resources in an embodiment.
  • FIG. 5 is a schematic flowchart of determining a resource restriction level of a background application in a network resource in an embodiment.
  • FIG. 6 is a schematic flowchart of adding a background application to a resource group corresponding to a resource restriction level in a network resource in an embodiment.
  • FIG. 7 is a schematic flowchart of adding a background process in a background application to a resource group corresponding to a resource restriction level in a network resource in an embodiment.
  • Figure 8 is a block diagram of a resource management apparatus in one embodiment.
  • Figure 9 is a block diagram of a resource management apparatus in another embodiment.
  • Figure 10 is a block diagram of a mobile terminal in another embodiment.
  • first, second and the like may be used to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another.
  • a first resource group may be referred to as a second resource group without departing from the scope of the present application, and similarly, a second resource group may be referred to as a first resource group.
  • Both the first resource group and the second resource group are resource groups, but they are not the same resource group.
  • the mobile terminal includes a processor, a memory, a network interface, a display screen, and an input device connected through a system bus.
  • the memory may include a non-volatile storage medium and a processor.
  • the non-volatile storage medium of the mobile terminal stores an operating system and a computer program, which are executed by the processor to implement a resource management method provided in the embodiments of the present application.
  • the processor is used to provide computing and control capabilities to support the operation of the entire mobile terminal.
  • the internal memory in the mobile terminal provides an environment for the operation of a computer program in a non-volatile storage medium.
  • the network interface of the mobile terminal is used for data transmission with other terminals.
  • the display screen of the mobile terminal may be a liquid crystal display or an electronic ink display screen.
  • the input device may be a touch layer covered on the display screen, or may be a button, a trackball or a touchpad provided on the casing of the mobile terminal, or may be An external keyboard, trackpad, or mouse.
  • the mobile terminal can be a mobile phone, a tablet or a personal digital assistant or a wearable device.
  • FIG. 1 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation of the mobile terminal to which the solution of the present application is applied.
  • the specific mobile terminal may It includes more or fewer components than those shown in the figures, or some components are combined, or have different component arrangements.
  • the system architecture includes a JAVA spatial layer 210, a local framework layer 220, and a kernel space layer 230.
  • the JAVA spatial layer 210 can include a freeze management module 212.
  • the freeze management module 212 can implement a freeze policy for each running application, and freeze the related applications that consume more power in the background or preempt a large amount of system resources.
  • a resource priority and restriction manager 222 and a platform freeze manager 224 are included in the local framework layer 220.
  • the mobile terminal can maintain different applications in different resource usage priorities and different resource groups in real time through the resource priority and restriction manager 222, and adjust the resource group of the application according to the requirements of the upper layer to achieve optimized performance.
  • the mobile terminal can use the platform freeze manager 224 to allocate the freezeable application in the background to the freeze layer of the corresponding preset different levels according to the length of the entry freeze time.
  • the frozen layer may include three: a CPU limited sleep mode, a CPU freeze sleep mode, and a process deep freeze mode.
  • the CPU restricts the sleep mode to limit the CPU resources occupied by the related processes, so that the related processes occupy less CPU resources, and the free CPU resources are tilted to other unfrozen processes, thereby limiting the occupation of CPU resources.
  • the local framework layer 220 may further include an interface module, where the interface module includes a binder interface developed to the upper layer, and the upper layer framework or the application sends the resource restriction or the frozen instruction to the resource priority and the limit management through the provided binder interface.
  • the kernel space layer 230 may include a UID management module 231, a Cgroup module 233, a Binder management module 235, a process memory recovery module 237, and a freeze timeout exit module 239.
  • the UID management module 231 is configured to implement an application-based User Identifier (UID) to manage resources of a third-party application or freeze. Compared with the Process Identifier (PID) for process management and control, it is easier to uniformly manage the resources of a user's application through UID.
  • the Cgroup module 233 is used to provide a complete set of CPU, CPUSET, memory, input/output (I/O) and Net related resource restriction mechanisms.
  • the Binder management module 235 is used to implement the priority control of the background binder communication.
  • the process memory recovery module 237 is configured to implement the process deep freeze mode, so that when a third-party application is in a frozen state for a long time, the file area of the process is mainly released, thereby saving the memory module and speeding up the application next time.
  • the freeze timeout exit module 239 can be used to resolve an exception generated by the freeze timeout scenario.
  • a resource management method including the following operations:
  • the network resource usage data of the foreground application is collected every preset time period.
  • the mobile terminal can run one or more applications at the same time, and can include a foreground application running in the foreground and a background application running in the background.
  • the mobile terminal can monitor various running applications through the activity manager, and monitor the running state changes of each application.
  • the running status of the application may include, but is not limited to, startup, foreground running, background running, exiting, and the like.
  • the mobile terminal can obtain a list of all running applications through the activity manager's RunningAppProcessInfo class at intervals, for example, get a list of all running applications every 2 seconds, and judge each running in the application list one by one.
  • the running state of the application is running in the foreground or in the background.
  • the mobile terminal can also monitor the life cycle of each activity and obtain the running status of each running application according to the life cycle of each activity.
  • the mobile terminal can establish a global counter, and count each activity's call to onStart and onStop.
  • the global counter is incremented by 1.
  • the global counter is decremented by 1.
  • the application's global counter is greater than 0, it indicates that the application is running in the foreground.
  • the application's global counter is equal to 0, it indicates that the application is running in the background. It can be understood that the running state of the application can also be monitored in other ways, and is not limited to the above manners.
  • the network terminal may collect the network resource usage data of the foreground application running in the foreground in the preset time period.
  • the network resource usage data may include, but is not limited to, the network speed occupied by the foreground application in the time interval corresponding to the preset time period.
  • the proportion of network resources, etc., wherein the proportion of occupied network resources can refer to the ratio of occupied network bandwidth to total bandwidth.
  • Operation 320 determining, according to the network resource usage data, a resource restriction level of the background application in the network resource.
  • the mobile terminal may set different resource restriction levels according to actual requirements.
  • the resource restriction level may be used to indicate the extent to which the application usage resource is restricted. The higher the resource restriction level, the greater the degree of restriction. Restricted resources may include, but are not limited to, CPU resources, memory resources, I/O resources, network resources, and the like.
  • the mobile terminal may determine the resource restriction level of the background application in the network resource according to the network resource usage data. When the current network application occupies a network speed or a large proportion of occupied network resources in the time interval corresponding to the preset time period, it may be determined that the background application is a higher resource restriction level in the network resource, and the background application is restricted to the network resource.
  • the background application may use more networks. Resources.
  • the resource restriction level set by the mobile terminal may include an unrestricted level, a normal restriction level, a depth restriction level, a freeze level, and the like.
  • An unrestricted level can mean that the resources used by the application are not limited.
  • the normal restriction level may refer to an application that can use less resources, such as up to 50% of resources, but is not limited thereto.
  • the depth limit level may refer to an application that can use very few resources, such as a maximum of only 20% of resources, but is not limited thereto.
  • the freeze level refers to the behavior of the application that cannot use any resources and stop the application.
  • different types of resources may include the resource restriction levels set by the foregoing, and the mobile terminal may separately set resource restriction levels of the background application for different types of resources.
  • the different resource restriction levels of the network resources may correspond to different network resource usage data intervals.
  • the interval corresponding to the unrestricted level of the network resource may be that the proportion of the network resources occupied by the foreground application is less than 10%
  • the common restriction level corresponds to The interval of the network resource occupied by the foreground application is between 10% and 30%
  • the interval corresponding to the depth limit level may be that the proportion of the network resources occupied by the foreground application is between 30% and 70%
  • the interval corresponding to the freeze level may be The percentage of network resources occupied by the foreground application is greater than 70%, but is not limited thereto.
  • the background application is added to the resource group corresponding to the resource restriction level under the network resource, and the resource usage priority matching the resource group is configured.
  • the background application may be added to the resource group corresponding to the resource restriction level under the network resource, and the resource usage priority corresponding to the determined resource restriction level is configured.
  • the higher the resource restriction level the more restrictive the resource usage is, and the lower the resource usage priority.
  • the lower the resource limit level the weaker the resource usage limit, and the higher the resource usage priority.
  • the mobile terminal may divide different resource groups based on a kernel Cgroup (control group) mechanism, and set a resource usage priority of each resource group by using a file node write configuration manner, and is allocated to each resource group.
  • the application in the application is managed by the time or proportion of the resource.
  • the Cgroup is a physical resource (such as CPU, memory, I/O, network, etc.) that can be used to limit, record, and isolate the process.
  • Mechanisms For different kinds of resources, mobile terminals can be divided into different resource groups. The mobile terminal can load a configuration file of the Cgroup, and the configuration file can record the divided resource groups, the resource usage priorities of the resource groups, and the resource scheduling policies corresponding to the resource usage priorities.
  • the resource scheduling policy may include, but is not limited to, the time allocated by the process allocated to the resource group, the proportion of occupied resources, the resource identifier used, and the like.
  • the application of the resource group corresponding to the common restriction level of the network resource can occupy up to 20% of the network resources, and the application of the resource group corresponding to the common restriction level of the configurable CPU resource can be used within 1 minute. Seconds CPU resources, etc., but are not limited to this. When you need to add a new resource group, or modify the resource usage priority and resource scheduling policy of the resource group, you can modify the Cgroup configuration file.
  • the mobile terminal adds the background application to the resource group corresponding to the resource restriction level under the network resource, and configures the resource usage priority corresponding to the determined resource restriction level, and the background application can use the resource scheduling policy corresponding to the resource group.
  • Internet resources the mobile terminal collects network resource usage data of the foreground application every preset time period, and determines a resource restriction level of the background application according to the network resource usage data.
  • the mobile terminal may dynamically change the resource restriction level of the background application, and add the background application to the network resource corresponding to the resource restriction level determined this time.
  • the resource restriction level of the background application in the network resource may vary according to the change of the network resource usage data of the foreground application.
  • the mobile terminal can set four different resource restriction levels for the network resources, and is divided into four resource groups, wherein the first resource group corresponds to an unrestricted level, and the second resource group Corresponding to the common restriction level, the third resource group corresponds to the depth limit level, and the fourth resource group corresponds to the freeze level.
  • the four resource groups may respectively correspond to different resource usage priorities, the resource usage priority of the first resource group may be higher than the second resource group, and the resource usage priority of the second resource group may be higher than the third resource. In the group, the resource usage priority of the third resource group may be higher than the fourth resource group.
  • the first resource group of the unrestricted level does not limit the network resources used by the process.
  • the second resource group restriction process of the normal restriction level can use less network resources.
  • the third resource group limit process at the depth limit level uses very little network resources.
  • the fourth resource group restriction process of the freeze level cannot use network resources and the like.
  • the mobile terminal may determine the resource restriction level of the background application in the network resource according to the network resource usage data of the foreground application, and add the background application to the resource group corresponding to the resource restriction level to manage the network resource usage of the background application.
  • the network resource usage data of the foreground application is collected every preset time period, and the resource restriction level of the background application in the network resource is determined according to the network resource usage data of the foreground application, and
  • the background application is added to the resource group corresponding to the resource restriction level in the network resource, and the corresponding resource usage priority is configured, and the network resource used by the background application can dynamically implement different levels of resource limitation, thereby reducing preemption by the background application.
  • the performance of the system caused by the network resources of the foreground application increases the performance of the system.
  • Operation 502 Obtain resource usage information of each background application.
  • the mobile terminal may have one or more background applications running in the background at the same time, and may obtain resource usage information of each running background application, and the resource usage information may include occupation data of different resources in the background application running in the background, such as a background application.
  • the proportion of CPU usage, the proportion of memory used, the proportion of network resources occupied, etc. is not limited to this.
  • Operation 504 Acquire, according to the resource usage information, a resource type used by each background application, and select a background application whose resource category includes a network resource.
  • the mobile terminal can obtain the resource types used by each background application according to the resource usage information of each background application.
  • the mobile terminal may obtain the resource type used by the background application according to the resource occupation data included in the resource usage information. For example, if the resource usage information of the background application includes 30% of the CPU and 20% of the memory, the background application may be determined to be used.
  • the resource types include CPU and memory resources.
  • the mobile terminal may also set a usage threshold corresponding to each type of resource, for example, the usage threshold corresponding to the CPU resource is 5%, the usage threshold corresponding to the memory resource is 6%, and the usage threshold corresponding to the network resource is 3. %, etc., but not limited to this.
  • the mobile terminal may extract the occupied data of the different resources included in the resource usage information.
  • the mobile terminal may determine that the resource that is greater than the corresponding usage threshold is the resource type used by the background application. For example, if the resource usage information of the background application includes 30% of the CPU, 20% of the network, and the occupied CPU resources and network resources are greater than the preset usage threshold, the mobile terminal can determine that the resource type of the background application is CPU and network resources. .
  • Operation 506 determining, according to the network resource usage data, a resource restriction level of the selected background application in the network resource.
  • the mobile terminal may select a background application that uses the resource type including the network resource from each running background application, and determine the used resource type according to the network resource usage data of the foreground application, and the background application of the network resource includes the resource restriction level of the network resource. .
  • the mobile terminal may add a background application that uses the resource type to the network resource to the resource group corresponding to the determined resource restriction level under the network resource, and configure a resource usage priority that matches the resource group, and use the resource for the resource group.
  • the type of network resource usage of the background application containing network resources is managed.
  • the resource usage information of each background application is determined according to the resource usage information of each background application, and the background application that uses the resource category including the network resource is selected, and the background application of the used resource category including the network resource is used.
  • the network resources dynamically implement different levels of resource restrictions, and can more accurately control the network resources occupied by the background application to improve system performance.
  • the operation 330 adds the background application to the resource group corresponding to the resource restriction level in the network resource, and configures the resource usage priority that matches the resource group, including: acquiring the background application currently in the network resource. a resource restriction level, where the current resource restriction level is lower than the determined resource restriction level, the background application is added to the resource group corresponding to the determined resource restriction level under the network resource, and the resource matching the resource group is configured. Use priority.
  • the mobile terminal After determining, according to the network resource usage data of the foreground application, the mobile terminal obtains the resource restriction level of the network resource currently used by each background application, and obtains the resource restriction level of the network resource currently determined by the background application. The resource limit levels are compared.
  • the background application currently has a resource restriction level of the network resource higher than or equal to the determined resource restriction level
  • the background application current priority of the network resource is lower than or equal to the resource usage priority corresponding to the determined resource restriction level
  • the mobile terminal may not change the resource restriction level of the background application, so that the background application maintains the current resource restriction level in the network resource.
  • the background application current priority of the network resource is higher than the resource usage priority corresponding to the determined resource restriction level.
  • the mobile terminal may change the resource restriction level of the background application to the determined resource restriction level, and add the background application to the resource group corresponding to the determined resource restriction level under the network resource, and configure and determine the resource restriction level. The matching resource usage priority.
  • the mobile terminal determines, according to the network resource usage data of the foreground application, that the background application is in a resource restriction level of the network resource, and obtains a proportion of the network resources occupied by each background application.
  • the mobile terminal can determine whether the proportion of network resources occupied by the background application is greater than a preset threshold. When the proportion of the network resources occupied by the background application is less than or equal to the preset threshold, the mobile terminal may not limit the network resources used by the background application, and may not add the background application to the resources corresponding to the determined resource restriction level under the network resource. In the group.
  • the mobile terminal may add the background application to the resource group corresponding to the determined resource restriction level under the network resource, and configure the matching with the resource group, and The use of network resources for background applications is limited.
  • network resources used by the background application can be dynamically implemented to implement different levels of resource restrictions, thereby reducing the situation caused by the background application preempting the network resources of the foreground application and improving system performance.
  • the operation adds the background application to the resource group corresponding to the resource restriction level under the network resource, including the following operations:
  • Operation 602 Acquire user group information of the background application.
  • the mobile terminal can assign different user groups to the running application, and can manage the permissions of the application through the user group.
  • the mobile terminal adds the background application to the resource group corresponding to the determined resource restriction level in the network resource, and obtains the application identifier of the background application, and obtains the user group information of the background application according to the application identifier, where the application identifier may be One or more of numbers, letters, symbols, and the like.
  • the user group information may include a user group identifier or the like, wherein the user group identifier may be composed of one or more of numbers, letters, symbols, and the like.
  • Operation 604 querying a process identifier that has a mapping relationship with the user group information.
  • the mobile terminal can query the process identifier that has a mapping relationship with the user group information according to the user group information of the background application, thereby obtaining each process running under the background application.
  • the kernel space layer of the mobile terminal can collect the user group information to which the process belongs in real time. When the process is created or destroyed, the kernel can allocate and release the user group information to which the process belongs, and the process can also occur during the running process. The case where the user group information is changed.
  • the kernel space layer collects user group information of each process in real time, and can establish a mapping relationship between process information such as process ID and process name and user group information.
  • the process identifier with the mapping relationship may be directly queried according to the user group information of the background application, compared to traversing all running processes. Therefore, it is more convenient and quick to find the process running under the background application and directly find the process identifier that has the mapping relationship with the user group information.
  • Operation 606 Add a background process that matches the process identifier to a resource group corresponding to the resource restriction level under the network resource.
  • the mobile terminal After the mobile terminal searches for the process identifier with the mapping relationship according to the user group information of the background application, the mobile terminal can obtain all the processes running under the background application according to the process identifier.
  • the mobile terminal may add all the processes running in the background application to the resource group corresponding to the determined resource restriction level under the network resource, and configure the resource usage corresponding to the determined resource restriction level for all process running under the background application. Level, thereby achieving the purpose of configuring the background application to be a resource usage priority corresponding to the determined resource restriction level.
  • the operation 606 adds a background process that matches the process identifier to the resource group corresponding to the resource restriction level under the network resource, and includes the following operations:
  • Operation 702 collect the running characteristics of the background process that matches the process identifier.
  • Process is a computer program run on a set of data on the activities of the system is the basic unit of resource allocation and scheduling, is the underlying operating system architecture.
  • one application can run one or more processes, and different processes can be used to perform different tasks separately.
  • the mobile terminal After the mobile terminal obtains the process identifier that has a mapping relationship with the user group information of the background application, the mobile terminal can collect the running characteristics of the background process that matches the process identifier.
  • the operational characteristics may include, but are not limited to, tasks currently performed by the background process, communication events with other processes, types and proportions of resources currently occupied, and the like.
  • Operation 704 determining a resource type used by the matching background process according to the running characteristic.
  • the mobile terminal can analyze the collected running characteristics to determine the kind of resources used by the background process that matches the process identifier.
  • the mobile terminal may determine, according to the type and proportion of resources currently occupied by the background process, the type of the resource used by the background process. For example, if the background process currently occupies 30% of the CPU resource, the resource type used by the background process may be determined as a CPU resource. If the background process currently occupies 20% of the network resources and 20% of the CPU, the resource type used by the background process may be determined as the network and CPU resources, but is not limited thereto.
  • the mobile terminal may determine, according to the task currently executed by the background process, the type of the resource used by the background process.
  • the resource type used by the background process may be determined as a network resource, and the background is The task currently executed by the process is a data loading task, and the resource type used by the background process may be determined as a CPU and a memory resource, but is not limited thereto.
  • the background process that includes the resource type and includes the network resource is added to the resource group corresponding to the resource restriction level under the network resource.
  • the mobile terminal may select a background process that uses the resource type including the network resource from all the processes running in the background process, and add the background process that uses the resource type to include the network resource to the network resource and corresponding to the determined resource restriction level.
  • the resource usage priority corresponding to the determined resource restriction level is configured. Network resource usage restrictions can be restricted only for processes that use network resources in background applications, which can make resource management more accurate and improve system performance.
  • the process identifier with the mapping relationship may be found according to the user group information of the background application, and the background process matching the process identifier is added to the resource group corresponding to the determined resource restriction level under the network resource.
  • Unified network resource usage management can be performed on each process running under the background application according to the resource restriction level.
  • the resource group can also achieve different levels of resource limitation, optimize system performance, and save power consumption.
  • the network resource usage data of the foreground application is collected every preset time period, including: collecting network resource usage data of the foreground application in real time through the kernel space, and packaging the network resource usage data every preset time period.
  • the data packet is delivered to the user space.
  • the virtual space of the mobile terminal may include kernel space and user space, the kernel space may be used to store the code and data of the kernel, and the user space may be used to store the code and data of the application.
  • Kernel space has a high privilege level. Processes running in kernel space can have access to all hardware of the mobile terminal. User space has lower permissions. Processes running in user space can only use some resources of the system.
  • the network resource usage data of the foreground application may be collected in real time through the kernel space, and the network resource usage data is packaged into a data packet and transmitted to the user space every preset time period.
  • the mobile terminal may package the network resource usage data of the foreground application into a data packet according to the agreed packet format, and transmit the data to the user space.
  • Kernel space and user space can be netlink way asynchronous communication, between netlink is a special process to achieve a way to communicate with the kernel processes the user process communication.
  • the kernel space transmits the network resource usage data of the foreground application to the user space through asynchronous communication, which is faster and more convenient than the active query mode of the user space, and can improve the data transmission efficiency.
  • the user space may parse the data packet to obtain the network resource usage data of the foreground application within a preset time period.
  • the mobile terminal can analyze the network resource usage data of the foreground application in the preset time period through the user space, and determine the resource restriction level of the background application in the network resource, thereby limiting the network resource usage of the background application.
  • the network resource usage data of the foreground application can be collected through the kernel space, and the collected network resource usage data is transmitted to the user space for analysis, which can provide more clue basis for determining the resource restriction level, and can enable the background application.
  • the resource resource level adjustment of network resources is more accurate, and the resource management effect and system performance are improved.
  • a resource management method including the following operations:
  • Operation (2) determining a resource restriction level of the background application in the network resource according to the network resource usage data.
  • the operation (1) includes: collecting network resource usage data of the foreground application in real time through the kernel space, and packaging the network resource usage data into a data packet and transmitting the data to the user space every preset time period; operation (2), The method includes: analyzing the network resource usage data by using a user space, and determining a resource restriction level of the background application in the network resource.
  • the method further includes: acquiring resource usage information of each background application; acquiring resource types used by each background application according to the resource usage information, and selecting a background application whose resource category includes network resources; The method includes: determining, according to the network resource usage data, a resource restriction level of the selected background application in the network resource.
  • the background application is added to the resource group corresponding to the resource restriction level under the network resource, and the resource usage priority matching the resource group is configured.
  • the operation (3) includes: acquiring a resource restriction level of the network application currently in the network resource; adding the background application to the network resource and the determined resource when the current resource restriction level is lower than the determined resource restriction level; The resource group corresponding to the restriction level is configured, and the resource usage priority matching the resource group is configured.
  • the operation (3) includes: obtaining a proportion of network resources occupied by the background application; and when the proportion of the network resources is greater than a preset threshold, adding the background application to the resource group corresponding to the determined resource restriction level under the network resource. And configure resource usage priorities that match the resource group.
  • the background application is added to the resource group corresponding to the resource restriction level in the network resource, including: acquiring user group information of the background application; querying the process identifier that has a mapping relationship with the user group information; and matching the process identifier
  • the background process is added to the resource group corresponding to the resource restriction level under the network resource.
  • the background process that matches the process identifier is added to the resource group corresponding to the resource restriction level in the network resource, including: collecting an operation feature of the background process that matches the process identifier; and determining a matching background process according to the running feature.
  • the type of resource used; the background process that includes the resource type including the network resource is added to the resource group corresponding to the resource restriction level under the network resource.
  • the network resource usage data of the foreground application is collected every preset time period, and the resource restriction level of the background application in the network resource is determined according to the network resource usage data of the foreground application, and
  • the background application is added to the resource group corresponding to the resource restriction level in the network resource, and the corresponding resource usage priority is configured, and the network resource used by the background application can dynamically implement different levels of resource limitation, thereby reducing preemption by the background application.
  • the performance of the system caused by the network resources of the foreground application increases the performance of the system.
  • a resource management apparatus 800 including an acquisition module 810, a level determination module 820, and a configuration module 830.
  • the collecting module 810 is configured to collect network resource usage data of the foreground application every preset time period when the current station has the application running.
  • the level determining module 820 is configured to determine, according to the network resource usage data, a resource restriction level of the background application in the network resource.
  • the configuration module 830 is configured to add the background application to the resource group corresponding to the resource restriction level under the network resource, and configure the resource usage priority that matches the resource group.
  • the network resource usage data of the foreground application is collected every preset time period, and the resource restriction level of the background application in the network resource is determined according to the network resource usage data of the foreground application, and
  • the background application is added to the resource group corresponding to the resource restriction level in the network resource, and the corresponding resource usage priority is configured, and the network resource used by the background application can dynamically implement different levels of resource limitation, thereby reducing preemption by the background application.
  • the performance of the system caused by the network resources of the foreground application increases the performance of the system.
  • the resource management apparatus 800 includes an information acquisition module 840 and a selection module 850 in addition to the collection module 810 , the level determination module 820 , and the configuration module 830 .
  • the information obtaining module 840 is configured to obtain resource usage information of each background application.
  • the selecting module 850 is configured to obtain, according to the resource usage information, a resource type used by each background application, and select a background application whose resource category includes a network resource.
  • the resource usage information of each background application is determined according to the resource usage information of each background application, and the background application that uses the resource category including the network resource is selected, and the background application of the used resource category including the network resource is used.
  • the network resources dynamically implement different levels of resource restrictions, and can more accurately control the network resources occupied by the background application to improve system performance.
  • the configuration module 830 is further configured to obtain a resource restriction level of the network application currently in the network resource, and add the background application to the network resource and determine when the current resource restriction level is lower than the determined resource restriction level.
  • the resource group corresponding to the resource restriction level, and the resource usage priority that matches the resource group is configured.
  • the configuration module 830 is further configured to obtain a network resource ratio occupied by the background application; when the network resource ratio is greater than a preset threshold, add the background application to the resource group corresponding to the determined resource restriction level under the network resource. And configure resource usage priorities that match the resource group.
  • network resources used by the background application can be dynamically implemented to implement different levels of resource restrictions, thereby reducing the situation caused by the background application preempting the network resources of the foreground application and improving system performance.
  • the configuration module 830 includes an obtaining unit, a query unit, and an adding unit.
  • the obtaining unit is configured to obtain user group information of the background application.
  • the query unit is configured to query a process identifier that has a mapping relationship with the user group information.
  • An adding unit is configured to add a background process that matches the process identifier to a resource group corresponding to the resource restriction level under the network resource.
  • the adding unit includes a feature collecting subunit, a category determining subunit, and an adding subunit.
  • the feature collection sub-unit is configured to collect the running characteristics of the background process that matches the process identifier.
  • the category determining subunit is configured to determine, according to the running feature, a resource type used by the matching background process.
  • the process identifier with the mapping relationship may be found according to the user group information of the background application, and the background process matching the process identifier is added to the resource group corresponding to the determined resource restriction level under the network resource.
  • Unified network resource usage management can be performed on each process running under the background application according to the resource restriction level.
  • the resource group can also achieve different levels of resource limitation, optimize system performance, and save power consumption.
  • the collecting module 810 is further configured to collect network resource usage data of the foreground application in real time through the kernel space, and package the network resource usage data into a data packet and transmit the data to the user space every preset time period.
  • the level determining module 820 is further configured to analyze the network resource usage data by using the user space to determine a resource restriction level of the background application in the network resource.
  • the network resource usage data of the foreground application can be collected through the kernel space, and the collected network resource usage data is transmitted to the user space for analysis, which can provide more clue basis for determining the resource restriction level, and can enable the background application.
  • the resource resource level adjustment of network resources is more accurate, and the resource management effect and system performance are improved.
  • FIG. 10 is a block diagram showing a partial structure of a mobile phone related to a mobile terminal provided by an embodiment of the present application.
  • the mobile phone includes: a radio frequency (RF) circuit 1010, a memory 1020, an input unit 1030, a display unit 1040, a sensor 1050, an audio circuit 1060, a wireless fidelity (WiFi) module 1070, and a processor 1080. And power supply 1090 and other components.
  • RF radio frequency
  • the RF circuit 1010 can be used for receiving and transmitting signals during the transmission and reception of information or during a call.
  • the downlink information of the base station can be received and processed by the processor 1080.
  • the uplink data can also be sent to the base station.
  • RF circuits include, but are not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuit 1010 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to GSM, GPRS, Code Division Multiple Access (CDMA), W-CDMA, Long Term Evolution (LTE), email, Short Messaging Service (SMS), etc.
  • the memory 1020 can be used to store software programs and modules, and the processor 1080 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 1020.
  • the memory 1020 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application required for at least one function (such as an application of a sound playing function, an application of an image playing function, etc.);
  • the data storage area can store data (such as audio data, address book, etc.) created according to the use of the mobile phone.
  • memory 1020 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 1030 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the handset 1000.
  • the input unit 1030 may include a touch panel 1032 and other input devices 1034.
  • the touch panel 1032 which may also be referred to as a touch screen, can collect touch operations on or near the user (such as a user using a finger, a stylus, or the like on the touch panel 1032 or near the touch panel 1032. Operation) and drive the corresponding connection device according to a preset program.
  • the touch panel 1032 can include two portions of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1080 is provided and can receive commands from the processor 1080 and execute them.
  • the touch panel 1032 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 1030 can also include other input devices 1034.
  • other input devices 1034 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.).
  • the display unit 1040 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 1040 can include a display panel 1042.
  • the display panel 1042 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 1032 can cover the display panel 1042. When the touch panel 1032 detects a touch operation thereon or nearby, the touch panel 1032 transmits to the processor 1080 to determine the type of the touch event, and then the processor 1080 is The type of touch event provides a corresponding visual output on display panel 1042.
  • the touch panel 1032 and the display panel 1042 are used as two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 1032 can be integrated with the display panel 1042. Realize the input and output functions of the phone.
  • the handset 1000 can also include at least one type of sensor 1050, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1042 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1042 and/or when the mobile phone moves to the ear. Or backlight.
  • the motion sensor may include an acceleration sensor, and the acceleration sensor can detect the magnitude of the acceleration in each direction, and the magnitude and direction of the gravity can be detected at rest, and can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching), and vibration recognition related functions (such as Pedometer, tapping, etc.; in addition, the phone can also be equipped with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors.
  • the acceleration sensor can detect the magnitude of the acceleration in each direction, and the magnitude and direction of the gravity can be detected at rest, and can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching), and vibration recognition related functions (such as Pedometer, tapping, etc.; in addition, the phone can also be equipped with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors.
  • Audio circuitry 1060, speaker 1062, and microphone 1064 can provide an audio interface between the user and the handset.
  • the audio circuit 1060 can transmit the converted electrical data of the received audio data to the speaker 1062, and convert it into a sound signal output by the speaker 1062.
  • the microphone 1064 converts the collected sound signal into an electrical signal, and the audio circuit 1060. After receiving, it is converted into audio data, and then processed by the audio data output processor 1080, transmitted to another mobile phone via the RF circuit 1010, or outputted to the memory 1020 for subsequent processing.
  • WiFi is a short-range wireless transmission technology.
  • the mobile phone through the WiFi module 1070 can help users to send and receive e-mail, browse the web and access streaming media, etc. It provides users with wireless broadband Internet access.
  • FIG. 10 shows the WiFi module 1070, it can be understood that it does not belong to the essential configuration of the mobile phone 1000 and can be omitted as needed.
  • the processor 1080 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1020, and invoking data stored in the memory 1020, The phone's various functions and processing data, so that the overall monitoring of the phone.
  • processor 1080 can include one or more processing units.
  • the processor 1080 can integrate an application processor and a modem, wherein the application processor primarily processes an operating system, a user interface, an application, etc.; the modem primarily processes wireless communications. It will be appreciated that the above described modem may also not be integrated into the processor 1080.
  • the processor 1080 can integrate an application processor and a baseband processor, and the baseband processor and other peripheral chips can form a modem.
  • the mobile phone 1000 also includes a power source 1090 (such as a battery) for powering various components.
  • the power source can be logically coupled to the processor 1080 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the handset 1000 may also include a camera, a Bluetooth module, and the like.
  • the processor 880 included in the mobile terminal implements the foregoing resource management method when executing a computer program stored in a memory.
  • the mobile terminal can include a memory 1020 and a processor 1080.
  • the memory 1020 stores a computer program that, when executed by the processor 1080, causes the processor to perform the following operations:
  • the network resource usage data of the foreground application is collected every preset time period
  • a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the resource management method described above.
  • a computer program product comprising a computer program, when executed on a computer device, causes the computer device to perform the resource management method described above when executed.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or the like.
  • Non-volatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory can include random access memory (RAM), which acts as an external cache.
  • RAM is available in a variety of forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization.
  • SRAM static RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDR SDRAM dual data rate SDRAM
  • ESDRAM enhanced SDRAM
  • synchronization Link (Synchlink) DRAM (SLDRAM), Memory Bus (Rambus) Direct RAM (RDRAM), Direct Memory Bus Dynamic RAM (DRDRAM), and Memory Bus Dynamic RAM (RDRAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

一种资源管理方法,包括:当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据;根据所述网络资源使用数据确定后台应用在网络资源的资源限制等级;将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级。

Description

资源管理方法、装置、移动终端及计算机可读存储介质
相关申请的交叉引用
本申请要求于2018年01月10日提交中国专利局、申请号为201810023912.9、发明名称为“资源管理方法、装置、移动终端及计算机可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机技术领域,特别是涉及一种资源管理方法、装置、移动终端及计算机可读存储介质。
背景技术
随着互联网的飞速发展,智能移动终端已经成为许多用户最常用的电子设备,例如智能手机、平板电板等。用户可在智能移动终端上安装各式的应用程序进行使用,当应用程序在后台进行运行时,会与前台运行的应用程序抢占CPU(Central Processing Unit,中央处理器)、内存、带宽等系统资源,导致出现前台运行的应用卡顿、系统运行缓慢及移动终端发热等问题。
发明内容
根据本申请的各种实施例,提供一种资源管理方法、装置、移动终端及计算机可读存储介质。
一种资源管理方法,包括:
当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据;
根据所述网络资源使用数据确定后台应用在网络资源的资源限制等级;及
将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级。
一种资源管理装置,包括:
采集模块,用于当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据;
等级确定模块,用于根据所述网络资源使用数据确定后台应用在网络资源的资源限制等级;
配置模块,用于将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级。
一种移动终端,包括存储器及处理器,所述存储器中存储有计算机程序,所述计算机程序被所述处理器执行时,使得所述处理器实现如上所述的方法。
一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如上所述的方法。
上述资源管理方法、装置、移动终端及计算机可读存储介质,当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据,根据前台应用的网络资源使用数据确定后台应用在网络资源的资源限制等级,并将后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,同时配置相应的资源使用优先级,可以对后台应用使用的网络资源动态实现不同等级的资源限制,减少因后台应用抢占前台应用的网络资源造成的卡顿情况,提高系统性能。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为一个实施例中移动终端的框图。
图2为一个实施例中资源管理方法的系统架构图。
图3为一个实施例中资源管理方法的流程示意图。
图4为一个实施例中网络资源的资源组别的示意图。
图5为一个实施例中确定后台应用在网络资源的资源限制等级的流程示意图。
图6为一个实施例中将后台应用添加到网络资源下与资源限制等级对应的资源组别的流程示意图。
图7为一个实施例中将后台应用中的后台进程添加到网络资源下与资源限制等级对应的资源组别的流程示意图。
图8为一个实施例中资源管理装置的框图。
图9为另一个实施例中资源管理装置的框图。
图10为另一个实施例中移动终端的框图。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。
可以理解,本申请所使用的术语“第一”、“第二”等可在本文中用于描述各种元件,但这些元件不受这些术语限制。这些术语仅用于将第一个元件与另一个元件区分。举例来说,在不脱离本申请的范围的情况下,可以将第一资源组别称为第二资源组别,且类似地,可将第二资源组别称为第一资源组别。第一资源组别和第二资源组别两者都是资源组别,但其不是同一资源组别。
图1为一个实施例中移动终端的框图。如图1所示,该移动终端包括通过系统总线连接的处理器、存储器、网络接口、显示屏和输入装置。其中,存储器可包括非易失性存储介质及处理器。移动终端的非易失性存储介质存储有操作系统及计算机程序,该计算机程序被处理器执行时以实现本申请实施例中提供的一种资源管理方法。该处理器用于提供计算和控制能力,支撑整个移动终端的运行。移动终端中的内存储器为非易失性存储介质中的计算机程序的运行提供环境。移动终端的网络接口用于与其他终端进行数据传输。移动终端的显示屏可以是液晶显示屏或者电子墨水显示屏等,输入装置可以是显示屏上覆盖的触摸层,也可以是移动终端外壳上设置的按键、轨迹球或触控板,也可以是外接的键盘、触控板或鼠标等。该移动终端可以是手机、平板电脑或者个人数字助理或穿戴式设备等。本领域技术人员可以理解,图1中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的移动终端的限定,具体的移动终端可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
图2为一个实施例中资源管理方法的系统架构图。如图2所示,该系统架构中包括JAVA空间层210、本地框架层220以及内核(Kernel)空间层230。JAVA空间层210上可包含冻结管理模块212,移动终端可通过该冻结管理模块212来实现对运行的各个应用的冻结策略,对后台耗电较多或是抢占大量系统资源的相关应用进行冻结操作。本地框架层220中包含资源优先级和限制管理器222和平台冻结管理器224。移动终端可通过资源优先级和限制管理器222实时维护不同的应用处于不同的资源使用优先级和不同的资源组 别中,并根据上层的需求来调整应用程序的资源组别从而达到优化性能,节省功耗的作用。移动终端可通过平台冻结管理器224将后台可以冻结的应用按照进入冻结时间的长短,分配到对应预设的不同层次的冻结层。可选地,该冻结层可包括三个,分别是:CPU限制睡眠模式、CPU冻结睡眠模式、进程深度冻结模式。其中,CPU限制睡眠模式是指对相关进程所占用的CPU资源进行限制,使相关进程占用较少的CPU资源,将空余的CPU资源向其它未被冻结的进程倾斜,限制了对CPU资源的占用,也相应限制了进程对网络资源以及I/O接口资源的占用;CPU冻结睡眠模式是指禁止相关进程使用CPU,而保留对内存的占用,当禁止使用CPU资源时,相应的网络资源以及I/O接口资源也被禁止使用;进程深度冻结模式是指除禁止使用CPU资源之外,进一步对相关进程所占用的内存资源进行回收,回收的内存可供其它进程使用。可选地,本地框架层220还可包括接口模块,该接口模块包含开发给上层的binder接口,上层的框架或者应用通过提供的binder接口来发送资源限制或者冻结的指令给资源优先级和限制管理器222和平台冻结管理器224。
内核空间层230中可包括UID管理模块231、Cgroup模块233、Binder管控模块235、进程内存回收模块237以及冻结超时退出模块239。其中,UID管理模块231用于实现基于应用的用户身份标识(User Identifier,UID)来管理第三方应用的资源或进行冻结。相比较于基于进程身份标识(Process Identifier,PID)来进行进程管控,通过UID更便于统一管理一个用户的应用的资源。Cgroup模块233用于提供一套完善的CPU、CPUSET、内存(memory)、输入/输出(input/output,I/O)和Net相关的资源限制机制。Binder管控模块235用于实现后台binder通信的优先级的控制。进程内存回收模块237用于实现进程深度冻结模式,这样能当某个第三方应用长期处于冻结状态的时候,会主要释放掉进程的文件区,从而达到节省内存的模块,也加快该应用在下次启动时的速度。冻结超时退出模块239可用于解决出现冻结超时场景产生的异常。通过上述的系统架构,可实现本申请各个实施例中的资源管理方法。
如图3所示,在一个实施例中,提供一种资源管理方法,包括以下操作:
操作310,当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据。
移动终端上可同时运行有一个或多个应用程序,可包括在前台运行的前台应用及在后台运行的后台应用。移动终端可通过活动管理器对运行的各个应用程序进行监听,监听各个应用程序的运行状态变化。可选地,应用程序的运行状态可包括但不限于启动、前台运行、后台运行、退出等。移动终端可每隔一段时间通过活动管理器的RunningAppProcessInfo类获取正在运行的所有应用程序列表,例如,每隔2秒获取一次正在运行的所有应用程序列表,并逐一判断应用程序列表中各个正在运行的应用程序的运行状态是前台运行还是后台运行。
可选地,移动终端还可监听每个activity(活动)的生命周期,并根据每个activity的生命周期获取正在运行的各个应用程序的运行状态。移动终端可建立全局计数器,统计每个activity对onStart及onStop两个方法的调用,当应用程序调用一次onStart时,全局计数器加1,当应用程序调用一次onStop时,全局计数器减1。当应用程序的全局计数器大于0时,可说明应用程序在前台运行,当应用程序的全局计数器等于0时,可说明应用程序在后台运行。可以理解地,也可采用其他方式监听应用程序的运行状态,并不仅限于上述几种方式。
当移动终端检测到有应用程序的运行状态为前台运行时,可表示前台有应用在运行。移动终端可每隔预设时间段采集在前台运行的前台应用的网络资源使用数据,网络资源使用数据可包括但不限于前台应用在与预设时间段对应的时间间隔中占用的网速、占用的网络资源比例等,其中,占用的网络资源比例可指的是占用的网络带宽与总带宽的比值。
操作320,根据网络资源使用数据确定后台应用在网络资源的资源限制等级。
可选地,移动终端可根据实际需求设定不同的资源限制等级,资源限制等级可用于表示应用使用资源被限制的程度,资源限制等级越高,受限制的程度可越大。受限制的资源可包括但不限于CPU资源、内存资源、I/O资源、网络资源等。移动终端每隔预设时间段采集前台应用的网络资源使用数据后,可根据网络资源使用数据确定后台应用在网络资源的资源限制等级。当前台应用在与预设时间段对应的时间间隔中占用的网速或占用的网络资源比例较大时,可确定后台应用在网络资源为较高的资源限制等级,限制后台应用对网络资源的使用。当前台应用在与预设时间段对应的时间间隔中占用的网速或占用的网络资源比例较小时,可确定后台应用在网络资源为较低的资源限制等级,后台应用可使用较多的网络资源。
在一个实施例中,移动终端设定的资源限制等级可包括无限制级别、普通限制级别、深度限制级别及冻结级别等。无限制级别可指的是应用使用的资源不受限制。普通限制级别可指的是应用可使用较少的资源,比如最多仅可使用50%的资源等,但不限于此。深度限制级别可指的是应用可使用极少的资源,比如最多仅可使用20%的资源等,但不限于此。冻结级别指的是应用无法使用任何的资源,停止应用的一切行为。可选地,不同种类的资源均可包含上述设定的几种资源限制等级,移动终端可分别针对不同种类的资源设定后台应用的资源限制等级。
可选地,网络资源下不同的资源限制等级可对应不同的网络资源使用数据区间,例如,网络资源的无限制级别对应的区间可以是前台应用占用的网络资源比例小于10%,普通限制级别对应的区间可以是前台应用占用的网络资源比例在10%~30%之间,深度限制级别对应的区间可以是前台应用占用的网络资源比例在30%~70%之间,冻结级别对应的区间可以是前台应用占用的网络资源比例大于70%等,但不限于此。移动终端获取前台应用在预设时间段内的网络资源使用数据后,可根据网络资源使用数据所在的区间确定后台应用的资源限制等级。
操作330,将后台应用添加到网络资源下与资源限制等级对应的资源组别中,并配置与资源组别匹配的资源使用优先级。
移动终端确定后台应用在网络资源的资源限制等级后,可将后台应用添加到网络资源下与资源限制等级对应的资源组别中,并配置与确定的资源限制等级对应的资源使用优先级。资源限制等级越高,限制资源使用的程度越强,可对应较低的资源使用优先级。资源限制等级越低,限制资源使用的程度越弱,可对应较高的资源使用优先级。可选地,移动终端可基于内核Cgroup(control group)机制划分不同的资源组别,并可采用文件节点写配置的方式设置各个资源组别的资源使用优先级,对被分配到各个资源组别中的应用使用资源的时间或比例等进行管理,其中,Cgroup是内核中提供的一种可以限制、记录、隔离进程所使用的物理资源(比如:CPU、内存、I/O、网络等资源)的机制。针对不同种类的资源,移动终端可划分不同的资源组别。移动终端可加载Cgroup的配置文件,配置文件中可记录有划分的资源组别、各个资源组别的资源使用优先级及与资源使用优先级对应的资源调度策略。资源调度策略可包括但不限于被分配到资源组别中的进程使用资源的时间、占用资源比例、使用的资源标识等。例如,可配置网络资源下的普通限制级别对应的资源组别的应用最大可占用20%的网络资源,可配置CPU资源下的普通限制级别对应的资源组别的应用在1分钟内可使用30秒的CPU资源等,但不限于此。当需要添加新的资源组别,或是修改资源组别的资源使用优先级及资源调度策略,可通过修改Cgroup的配置文件。
移动终端将后台应用添加到网络资源下与资源限制等级对应的资源组别中,并配置与确定的资源限制等级对应的资源使用优先级,后台应用可按照该资源组别对应的资源调度策略使用网络资源。可选地,移动终端每隔预设时间段采集前台应用的网络资源使用数据,并根据网络资源使用数据确定后台应用的资源限制等级。当本次确定的资源限制等级与上 一次确定的资源限制等级不同时,移动终端可动态变更后台应用的资源限制等级,并将后台应用添加到网络资源下与本次确定的资源限制等级对应的资源组别中。后台应用在网络资源的资源限制等级可随着前台应用的网络资源使用数据的变化而变化。
图4为一个实施例中网络资源的资源组别的示意图。如图4所示,移动终端中可对网络资源设定有四个不同的资源限制等级,并划分有四个资源组别,其中,第一资源组别对应无限制级别,第二资源组别对应普通限制级别,第三资源组别对应深度限制级别,第四资源组别对应冻结级别。四个资源组别可分别对应不同的资源使用优先级,第一资源组别的资源使用优先级可高于第二资源组别,第二资源组别的资源使用优先级可高于第三资源组别,第三资源组别的资源使用优先级可高于第四资源组别。无限制级别的第一资源组别不限制进程使用的网络资源。普通限制级别的第二资源组别限制进程可使用较少的网络资源。深度限制级别的第三资源组别限制进程可使用极少的网络资源。冻结级别的第四资源组别限制进程不可使用网络资源等。移动终端可根据前台应用的网络资源使用数据确定后台应用在网络资源的资源限制等级,并将后台应用添加到该资源限制等级对应的资源组别中,对后台应用的网络资源使用进行管理。
在本实施例中,当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据,根据前台应用的网络资源使用数据确定后台应用在网络资源的资源限制等级,并将后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,同时配置相应的资源使用优先级,可以对后台应用使用的网络资源动态实现不同等级的资源限制,减少因后台应用抢占前台应用的网络资源造成的卡顿情况,提高系统性能。
如图5所示,在一个实施例中,在操作每隔预设时间段采集前台应用的网络资源使用数据之后,还包括以下操作:
操作502,获取各个后台应用的资源使用信息。
移动终端可能有一个或多个后台应用同时在后台运行,可获取各个正在运行的后台应用的资源使用信息,资源使用信息可包括后台应用在后台运行时在不同资源中的占用数据,比如后台应用占用CPU的比例、占用内存的比例、占用网络资源的比例等,但不限于此。
操作504,根据资源使用信息获取各个后台应用使用的资源种类,并选取资源种类包含网络资源的后台应用。
移动终端可根据各个后台应用的资源使用信息获取各个后台应用使用的资源种类。可选地,移动终端可根据资源使用信息中包含的资源占用数据获取后台应用使用的资源种类,比如,后台应用的资源使用信息包含占用CPU30%、占用内存20%,则可确定该后台应用使用的资源种类包含CPU及内存资源。可选地,移动终端也可设定每个种类的资源对应的使用阈值,比如,CPU资源对应的使用阈值为5%,内存资源对应的使用阈值为6%,网络资源对应的使用阈值为3%等,但不限于此。移动终端可提取资源使用信息中包含的不同资源的占用数据,当资源的占用数据大于对应的使用阈值时,移动终端可确定大于对应使用阈值的资源为后台应用使用的资源种类。比如,后台应用的资源使用信息包含占用CPU30%,占用网络20%等,占用的CPU资源及网络资源均大于预设的使用阈值,则移动终端可确定该后台应用的资源种类为CPU及网络资源。
操作506,根据网络资源使用数据确定选取的后台应用在网络资源的资源限制等级。
移动终端可从运行的各个后台应用中选取出使用的资源种类包含网络资源的后台应用,并根据前台应用的网络资源使用数据确定使用的资源种类包含网络资源的后台应用在网络资源的资源限制等级。移动终端可将使用的资源种类包含网络资源的后台应用添加到网络资源下与确定的资源限制等级对应的资源组别中,并配置与该资源组别匹配的资源使用优先级,对使用的资源种类包含网络资源的后台应用的网络资源使用进行管理。
在本实施例中,可根据各个后台应用的资源使用信息确定各个后台应用使用的资源种 类,并选取出使用的资源种类包含网络资源的后台应用,对使用的资源种类包含网络资源的后台应用使用的网络资源动态实现不同等级的资源限制,可以更加精准地后台应用占用的网络资源进行控制,提高系统性能。
在一个实施例中,操作330将后台应用添加到网络资源下与资源限制等级对应的资源组别中,并配置与资源组别匹配的资源使用优先级,包括:获取后台应用当前在网络资源的资源限制等级,在当前的资源限制等级低于确定的资源限制等级时,将该后台应用添加到网络资源下与确定的资源限制等级对应的资源组别中,并配置与资源组别匹配的资源使用优先级。
移动终端根据前台应用的网络资源使用数据确定后台应用在网络资源的资源限制等级后,可获取各个后台应用当前在网络资源的资源限制等级,并将后台应用当前在网络资源的资源限制等级与确定的资源限制等级进行比较。当后台应用当前在网络资源的资源限制等级高于或等于确定的资源限制等级时,该后台应用当前在网络资源的资源使用优先级低于或等于确定的资源限制等级对应的资源使用优先级,移动终端可不更改该后台应用的资源限制等级,使该后台应用在网络资源中保持当前的资源限制等级。当后台应用当前在网络资源的资源限制等级低于确定的资源限制等级时,该后台应用当前在网络资源的资源使用优先级高于确定的资源限制等级对应的资源使用优先级。移动终端可将该后台应用的资源限制等级更改为确定的资源限制等级,可将该后台应用添加到网络资源下与确定的资源限制等级对应的资源组别中,并配置与确定的资源限制等级匹配的资源使用优先级。
可选地,移动终端根据前台应用的网络资源使用数据确定后台应用在网络资源的资源限制等级后,可获取各个后台应用占用的网络资源比例。移动终端可判断后台应用占用的网络资源比例是否大于预设阈值。当后台应用占用的网络资源比例小于或等于预设阈值时,移动终端可不对该后台应用使用的网络资源进行限制,可以不将该后台应用添加到网络资源下与确定的资源限制等级对应的资源组别中。当后台应用占用的网络资源比例大于预设阈值时,移动终端可将该后台应用添加到网络资源下与确定的资源限制等级对应的资源组别中,并配置与资源组别匹配的,对该后台应用的网络资源使用进行限制。
在本实施例中,可以对后台应用使用的网络资源动态实现不同等级的资源限制,减少因后台应用抢占前台应用的网络资源造成的卡顿情况,提高系统性能。
如图6所示,在一个实施例中,操作将后台应用添加到网络资源下与资源限制等级对应的资源组别中,包括以下操作:
操作602,获取后台应用的用户组信息。
应用程序进行运行时,移动终端可为运行的应用程序分配不同的用户组,可通过用户组管理应用程序的权限等。移动终端将后台应用添加到网络资源下与确定的资源限制等级对应的资源组别,可获取该后台应用的应用标识,并根据应用标识获取该后台应用的用户组信息,其中,应用标识可以由数字、字母及符号等中的一种或多种组成。用户组信息可包括用户组标识等,其中,用户组标识可以由数字、字母及符号等中的一种或多种进行构成。
操作604,查询与用户组信息具备映射关系的进程标识。
移动终端可根据后台应用的用户组信息查询与用户组信息具备映射关系的进程标识,从而得到该后台应用下运行的各个进程。移动终端的内核空间层可实时对进程所属的用户组信息进行收集,当进程创建或销毁时,内核可对进程所属的用户组信息进行分配及释放等,进程在运行的过程中,也可以发生用户组信息改变的情况。内核空间层实时对各个进程所属的用户组信息进行收集,并可建立进程标识、进程名称等进程信息与用户组信息的映射关系。当移动终端需要将后台应用添加到网络资源下与确定的资源限制等级对应的资源组别时,可根据后台应用的用户组信息直接查询具备映射关系的进程标识,相比起遍历所有运行的进程从而找到后台应用下运行的进程,直接查找与用户组信息具备映射关系的 进程标识更加方便快捷。
操作606,将与进程标识匹配的后台进程添加到网络资源下与所述资源限制等级对应的资源组别中。
移动终端根据后台应用的用户组信息查询到具备映射关系的进程标识后,可根据进程标识获取后台应用下运行的所有进程。移动终端可将后台应用下运行的所有进程添加到网络资源下与确定的资源限制等级对应的资源组别中,并对后台应用下运行的所有进程配置与确定的资源限制等级对应的资源使用优先级,从而可实现配置该后台应用为与确定的资源限制等级对应的资源使用优先级的目的。
如图7所示,可选地,操作606将与进程标识匹配的后台进程添加到网络资源下与所述资源限制等级对应的资源组别中,包括以下操作:
操作702,采集与进程标识匹配的后台进程的运行特征。
进程(Process)是计算机中的程序关于某数据集合上的一次运行活动,是系统进行资源分配和调度的基本单位,是 操作系统结构的基础。一般地,一个应用下可运行有一个或多个进程,不同的进程可用于分别执行不同的任务。移动终端获取与后台应用的用户组信息具备映射关系的进程标识后,可采集与进程标识匹配的后台进程的运行特征。运行特征可包括但不限于后台进程当前执行的任务、与其他进程的通信事件、当前占用的资源种类及比例等。
操作704,根据运行特征确定匹配的后台进程使用的资源种类。
移动终端可对采集的运行特征进行分析,确定与进程标识匹配的后台进程使用的资源种类。可选地,移动终端可根据后台进程当前占用的资源种类及比例确定后台进程使用的资源种类,比如,后台进程当前占用CPU资源30%,则可确定该后台进程使用的资源种类为CPU资源,后台进程当前占用网络资源20%、占用CPU20%,则可确定该后台进程使用的资源种类为网络及CPU资源等,但不限于此。可选地,移动终端也可根据后台进程当前执行的任务确定后台进程使用的资源种类,比如,后台进程当前执行的任务为下载任务,则可确定该后台进程使用的资源种类为网络资源,后台进程当前执行的任务为数据加载任务,则可确定该后台进程使用的资源种类为CPU及内存资源等,但不限于此。
操作706,将资源种类包含网络资源的后台进程添加到网络资源下与资源限制等级对应的资源组别中。
移动终端可从后台进程下运行的所有进程中选取出使用的资源种类包含网络资源的后台进程,并将使用的资源种类包含网络资源的后台进程添加到网络资源下与确定的资源限制等级对应的资源组别中,配置与确定的资源限制等级对应的资源使用优先级。可仅对后台应用中使用网络资源的进程进行网络资源使用限制,可使资源管理更加准确,提高系统性能。
在本实施例中,可根据后台应用的用户组信息查找到具有映射关系的进程标识,并将与进程标识匹配的后台进程添加到网络资源下与确定的资源限制等级对应的资源组别中,可按照资源限制等级对后台应用下运行的各个进程进行统一的网络资源使用管理,通过资源组别的设置还可实现不同等级的资源限制,优化系统性能,节省功耗。
在一个实施例中,操作每隔预设时间段采集前台应用的网络资源使用数据,包括:通过内核空间实时采集前台应用的网络资源使用数据,并每隔预设时间段将网络资源使用数据打包成数据包传送给用户空间。
移动终端的虚拟空间中可包括有内核空间及用户空间,内核空间可用于存放内核的代码和数据,用户空间可用于存放应用程序的代码和数据。内核空间拥有较高的特权级别,在内核空间中运行的进程可拥有访问移动终端的所有硬件的权限,用户空间的权限则较低,在用户空间中运行的进程仅可使用系统的部分资源。
当移动终端检测到前台有应用在运行时,可通过内核空间实时采集前台应用的网络资 源使用数据,并每隔预设时间段将网络资源使用数据打包成数据包传送给用户空间。可选地,移动终端可按照约定的包格式将前台应用的网络资源使用数据打包成数据包,并传送给用户空间。内核空间与用户空间可采用异步的netlink的方式进行通信,netlink是一种可以实现用户进程与内核 进程通信的一种特殊的 进程间通信。内核空间通过异步通信的方式将前台应用的网络资源使用数据传输给用户空间,相比起用户空间主动查询的方式,更加快捷方便,可提高数据的传输效率。
用户空间接收到内核空间传输的数据包后,可对数据包进行解析,得到前台应用在预设时间段内的网络资源使用数据。移动终端可通过用户空间分析前台应用在预设时间段内的网络资源使用数据,并确定后台应用在网络资源的资源限制等级,从而对后台应用的网络资源使用进行限制。
在本实施例中,可通过内核空间采集前台应用的网络资源使用数据,并将采集的网络资源使用数据传输至用户空间进行分析,可提供更多资源限制等级确定的线索依据,可使后台应用在网络资源的资源限制等级调整更加准确,提高资源管理效果及系统性能。
在一个实施例中,提供一种资源管理方法,包括以下操作:
操作(1),当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据。
操作(2),根据网络资源使用数据确定后台应用在网络资源的资源限制等级。
可选地,操作(1),包括:通过内核空间实时采集前台应用的网络资源使用数据,并每隔预设时间段将网络资源使用数据打包成数据包传送给用户空间;操作(2),包括:通过用户空间分析所述网络资源使用数据,确定后台应用在网络资源的资源限制等级。
可选地,在操作(1)之后,还包括:获取各个后台应用的资源使用信息;根据资源使用信息获取各个后台应用使用的资源种类,并选取资源种类包含网络资源的后台应用;操作(2),包括:根据网络资源使用数据确定选取的后台应用在网络资源的资源限制等级。
操作(3),将后台应用添加到网络资源下与资源限制等级对应的资源组别中,并配置与资源组别匹配的资源使用优先级。
可选地,操作(3),包括:获取后台应用当前在网络资源的资源限制等级;在当前的资源限制等级低于确定的资源限制等级时,将后台应用添加到网络资源下与确定的资源限制等级对应的资源组别中,并配置与资源组别匹配的资源使用优先级。
可选地,操作(3),包括:获取后台应用占用的网络资源比例;当网络资源比例大于预设阈值时,将后台应用添加到网络资源下与确定的资源限制等级对应的资源组别中,并配置与资源组别匹配的资源使用优先级。
可选地,将后台应用添加到网络资源下与资源限制等级对应的资源组别中,包括:获取后台应用的用户组信息;查询与用户组信息具备映射关系的进程标识;将与进程标识匹配的后台进程添加到网络资源下与资源限制等级对应的资源组别中。
可选地,将与进程标识匹配的后台进程添加到网络资源下与资源限制等级对应的资源组别中,包括:采集与进程标识匹配的后台进程的运行特征;根据运行特征确定匹配的后台进程使用的资源种类;将资源种类包含网络资源的后台进程添加到网络资源下与资源限制等级对应的资源组别中。
在本实施例中,当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据,根据前台应用的网络资源使用数据确定后台应用在网络资源的资源限制等级,并将后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,同时配置相应的资源使用优先级,可以对后台应用使用的网络资源动态实现不同等级的资源限制,减少因后台应用抢占前台应用的网络资源造成的卡顿情况,提高系统性能。
应该理解的是,上述的流程示意图中的各个操作按照箭头的指示依次显示,但是这些操作并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些操作的执 行并没有严格的顺序限制,这些操作可以以其它的顺序执行。而且,上述的流程示意图中的至少一部分操作可以包括多个子操作或者多个阶段,这些子操作或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子操作或者阶段的执行顺序也不必然是依次进行,而是可以与其它操作或者其它操作的子操作或者阶段的至少一部分轮流或者交替地执行。
如图8所示,在一个实施例中,提供一种资源管理装置800,包括采集模块810、等级确定模块820及配置模块830。
采集模块810,用于当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据。
等级确定模块820,用于根据网络资源使用数据确定后台应用在网络资源的资源限制等级。
配置模块830,用于将后台应用添加到网络资源下与资源限制等级对应的资源组别中,并配置与资源组别匹配的资源使用优先级。
在本实施例中,当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据,根据前台应用的网络资源使用数据确定后台应用在网络资源的资源限制等级,并将后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,同时配置相应的资源使用优先级,可以对后台应用使用的网络资源动态实现不同等级的资源限制,减少因后台应用抢占前台应用的网络资源造成的卡顿情况,提高系统性能。
如图9所示,在一个实施例中,上述资源管理装置800,除了包括采集模块810、等级确定模块820及配置模块830,还包括信息获取模块840及选取模块850。
信息获取模块840,用于获取各个后台应用的资源使用信息。
选取模块850,用于根据资源使用信息获取各个后台应用使用的资源种类,并选取资源种类包含网络资源的后台应用。
在本实施例中,可根据各个后台应用的资源使用信息确定各个后台应用使用的资源种类,并选取出使用的资源种类包含网络资源的后台应用,对使用的资源种类包含网络资源的后台应用使用的网络资源动态实现不同等级的资源限制,可以更加精准地后台应用占用的网络资源进行控制,提高系统性能。
在一个实施例中,配置模块830,还用于获取后台应用当前在网络资源的资源限制等级,在当前的资源限制等级低于确定的资源限制等级时,将后台应用添加到网络资源下与确定的资源限制等级对应的资源组别中,并配置与资源组别匹配的资源使用优先级。
可选地,配置模块830,还用于获取后台应用占用的网络资源比例;当网络资源比例大于预设阈值时,将后台应用添加到网络资源下与确定的资源限制等级对应的资源组别中,并配置与资源组别匹配的资源使用优先级。
在本实施例中,可以对后台应用使用的网络资源动态实现不同等级的资源限制,减少因后台应用抢占前台应用的网络资源造成的卡顿情况,提高系统性能。
在一个实施例中,配置模块830,包括获取单元、查询单元及添加单元。
获取单元,用于获取后台应用的用户组信息。
查询单元,用于查询与用户组信息具备映射关系的进程标识。
添加单元,用于将与进程标识匹配的后台进程添加到网络资源下与资源限制等级对应的资源组别中。
可选地,添加单元,包括特征采集子单元、种类确定子单元及添加子单元。
特征采集子单元,用于采集与进程标识匹配的后台进程的运行特征。
种类确定子单元,用于根据运行特征确定匹配的后台进程使用的资源种类。
添加子单元,用于将资源种类包含网络资源的后台进程添加到网络资源下与资源限制 等级对应的资源组别中。
在本实施例中,可根据后台应用的用户组信息查找到具有映射关系的进程标识,并将与进程标识匹配的后台进程添加到网络资源下与确定的资源限制等级对应的资源组别中,可按照资源限制等级对后台应用下运行的各个进程进行统一的网络资源使用管理,通过资源组别的设置还可实现不同等级的资源限制,优化系统性能,节省功耗。
在一个实施例中,采集模块810,还用于通过内核空间实时采集前台应用的网络资源使用数据,并每隔预设时间段将网络资源使用数据打包成数据包传送给用户空间。
等级确定模块820,还用于通过用户空间分析网络资源使用数据,确定后台应用在网络资源的资源限制等级。
在本实施例中,可通过内核空间采集前台应用的网络资源使用数据,并将采集的网络资源使用数据传输至用户空间进行分析,可提供更多资源限制等级确定的线索依据,可使后台应用在网络资源的资源限制等级调整更加准确,提高资源管理效果及系统性能。
图10为与本申请实施例提供的移动终端相关的手机的部分结构的框图。参考图10,手机包括:射频(Radio Frequency,RF)电路1010、存储器1020、输入单元1030、显示单元1040、传感器1050、音频电路1060、无线保真(wireless fidelity,WiFi)模块1070、处理器1080、以及电源1090等部件。本领域技术人员可以理解,图10所示的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
其中,RF电路1010可用于收发信息或通话过程中,信号的接收和发送,可将基站的下行信息接收后,给处理器1080处理;也可以将上行的数据发送给基站。通常,RF电路包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路1010还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于GSM、GPRS、码分多址(Code Division Multiple Access,CDMA)、W-CDMA、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。
存储器1020可用于存储软件程序以及模块,处理器1080通过运行存储在存储器1020的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器1020可主要包括程序存储区和数据存储区,其中,程序存储区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能的应用程序、图像播放功能的应用程序等)等;数据存储区可存储根据手机的使用所创建的数据(比如音频数据、通讯录等)等。此外,存储器1020可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
输入单元1030可用于接收输入的数字或字符信息,以及产生与手机1000的用户设置以及功能控制有关的键信号输入。具体地,输入单元1030可包括触控面板1032以及其他输入设备1034。触控面板1032,也可称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1032上或在触控面板1032附近的操作),并根据预先设定的程式驱动相应的连接装置。在一个实施例中,触控面板1032可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1080,并能接收处理器1080发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1032。除了触控面板1032,输入单元1030还可以包括其他输入设备1034。具体地,其他输入设备1034可以包括 但不限于物理键盘、功能键(比如音量控制按键、开关按键等)等中的一种或多种。
显示单元1040可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元1040可包括显示面板1042。在一个实施例中,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板1042。在一个实施例中,触控面板1032可覆盖显示面板1042,当触控面板1032检测到在其上或附近的触摸操作后,传送给处理器1080以确定触摸事件的类型,随后处理器1080根据触摸事件的类型在显示面板1042上提供相应的视觉输出。虽然在图10中,触控面板1032与显示面板1042是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1032与显示面板1042集成而实现手机的输入和输出功能。
手机1000还可包括至少一种传感器1050,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1042的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1042和/或背光。运动传感器可包括加速度传感器,通过加速度传感器可检测各个方向上加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换)、振动识别相关功能(比如计步器、敲击)等;此外,手机还可配置陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器等。
音频电路1060、扬声器1062和传声器1064可提供用户与手机之间的音频接口。音频电路1060可将接收到的音频数据转换后的电信号,传输到扬声器1062,由扬声器1062转换为声音信号输出;另一方面,传声器1064将收集的声音信号转换为电信号,由音频电路1060接收后转换为音频数据,再将音频数据输出处理器1080处理后,经RF电路1010可以发送给另一手机,或者将音频数据输出至存储器1020以便后续处理。
WiFi属于短距离无线传输技术,手机通过WiFi模块1070可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图10示出了WiFi模块1070,但是可以理解的是,其并不属于手机1000的必须构成,可以根据需要而省略。
处理器1080是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1020内的软件程序和/或模块,以及调用存储在存储器1020内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。在一个实施例中,处理器1080可包括一个或多个处理单元。在一个实施例中,处理器1080可集成应用处理器和调制解调器,其中,应用处理器主要处理操作系统、用户界面和应用程序等;调制解调器主要处理无线通信。可以理解的是,上述调制解调器也可以不集成到处理器1080中。比如,该处理器1080可集成应用处理器和基带处理器,基带处理器与和其它外围芯片等可组成调制解调器。手机1000还包括给各个部件供电的电源1090(比如电池),优选的,电源可以通过电源管理系统与处理器1080逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
在一个实施例中,手机1000还可以包括摄像头、蓝牙模块等。
在本申请实施例中,该移动终端所包括的处理器880执行存储在存储器上的计算机程序时实现上述的资源管理方法。
在一个实施例中,该移动终端可包括存储器1020及处理器1080,存储器1020中存储有计算机程序,该计算机程序被处理器1080执行时,使得处理器执行如下操作:
当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据;
根据网络资源使用数据确定后台应用在网络资源的资源限制等级;
将后台应用添加到网络资源下与资源限制等级对应的资源组别中,并配置与资源组别匹配的资源使用优先级。
在一个实施例中,提供一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现上述的资源管理方法。
在一个实施例中,提供一种包含计算机程序的计算机程序产品,当其在计算机设备上运行时,使得计算机设备执行时实现上述的资源管理方法。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一非易失性计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等。
如此处所使用的对存储器、存储、数据库或其它介质的任何引用可包括非易失性和/或易失性存储器。合适的非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM),它用作外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDR SDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)。
以上所述实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。

Claims (20)

  1. 一种资源管理方法,包括:
    当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据;
    根据所述网络资源使用数据确定后台应用在网络资源的资源限制等级;及
    将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级。
  2. 根据权利要求1所述的方法,其特征在于,在所述每隔预设时间段采集前台应用的网络资源使用数据之后,所述方法还包括:
    获取各个后台应用的资源使用信息;及
    根据所述资源使用信息获取各个后台应用使用的资源种类,并选取资源种类包含网络资源的后台应用;
    所述根据所述网络资源使用数据确定后台应用在网络资源的资源限制等级,包括:
    根据所述网络资源使用数据确定选取的后台应用在网络资源的资源限制等级。
  3. 根据权利要求1所述的方法,其特征在于,所述将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级,包括:
    获取所述后台应用当前在网络资源的资源限制等级;及
    在当前的资源限制等级低于确定的资源限制等级时,将所述后台应用添加到网络资源下与所述确定的资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级。
  4. 根据权利要求1所述的方法,其特征在于,所述将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级,包括:
    获取所述后台应用占用的网络资源比例;及
    当所述网络资源比例大于预设阈值时,将所述后台应用添加到网络资源下与所述确定的资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级。
  5. 根据权利要求1至4任一所述的方法,其特征在于,所述将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,包括:
    获取所述后台应用的用户组信息;
    查询与所述用户组信息具备映射关系的进程标识;及
    将与所述进程标识匹配的后台进程添加到网络资源下与所述资源限制等级对应的资源组别中。
  6. 根据权利要求5所述的方法,其特征在于,所述将与所述进程标识匹配的后台进程添加到网络资源下与所述资源限制等级对应的资源组别中,包括:
    采集与所述进程标识匹配的后台进程的运行特征;
    根据所述运行特征确定所述匹配的后台进程使用的资源种类;及
    将资源种类包含网络资源的后台进程添加到网络资源下与所述资源限制等级对应的资源组别中。
  7. 根据权利要求1所述的方法,其特征在于,所述每隔预设时间段采集前台应用的网络资源使用数据,包括:
    通过内核空间实时采集前台应用的网络资源使用数据,并每隔预设时间段将所述网络资源使用数据打包成数据包传送给用户空间;
    所述根据所述网络资源使用数据确定后台应用在网络资源的资源限制等级,包括:
    通过所述用户空间分析所述网络资源使用数据,确定后台应用在网络资源的资源限制等级。
  8. 一种移动终端,包括存储器及处理器,所述存储器中存储有计算机程序,所述计算机程序被所述处理器执行时,使得所述处理器实现如下操作:
    当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据;
    根据所述网络资源使用数据确定后台应用在网络资源的资源限制等级;及
    将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级。
  9. 根据权利要求8所述的移动终端,其特征在于,所述处理器执行所述每隔预设时间段采集前台应用的网络资源使用数据之后,还执行如下操作:
    获取各个后台应用的资源使用信息;及
    根据所述资源使用信息获取各个后台应用使用的资源种类,并选取资源种类包含网络资源的后台应用;
    所述根据所述网络资源使用数据确定后台应用在网络资源的资源限制等级,包括:
    根据所述网络资源使用数据确定选取的后台应用在网络资源的资源限制等级。
  10. 根据权利要求8所述的移动终端,其特征在于,所述处理器执行所述将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级时,还执行如下操作:
    获取所述后台应用当前在网络资源的资源限制等级;及
    在当前的资源限制等级低于确定的资源限制等级时,将所述后台应用添加到网络资源下与所述确定的资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级。
  11. 根据权利要求8所述的移动终端,其特征在于,所述处理器执行所述将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级时,还执行如下操作:
    获取所述后台应用占用的网络资源比例;及
    当所述网络资源比例大于预设阈值时,将所述后台应用添加到网络资源下与所述确定的资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级。
  12. 根据权利要求8至11任一所述的移动终端,其特征在于,所述处理器执行所述将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中时,还执行如下操作:
    获取所述后台应用的用户组信息;
    查询与所述用户组信息具备映射关系的进程标识;及
    将与所述进程标识匹配的后台进程添加到网络资源下与所述资源限制等级对应的资源组别中。
  13. 根据权利要求12所述的移动终端,其特征在于,所述处理器执行所述将与所述进程标识匹配的后台进程添加到网络资源下与所述资源限制等级对应的资源组别中时,还执行如下操作:
    采集与所述进程标识匹配的后台进程的运行特征;
    根据所述运行特征确定所述匹配的后台进程使用的资源种类;及
    将资源种类包含网络资源的后台进程添加到网络资源下与所述资源限制等级对应的资源组别中。
  14. 根据权利要求8所述的移动终端,其特征在于,所述处理器执行所述每隔预设时间段采集前台应用的网络资源使用数据时,还执行如下操作:
    通过内核空间实时采集前台应用的网络资源使用数据,并每隔预设时间段将所述网络资源使用数据打包成数据包传送给用户空间;
    所述根据所述网络资源使用数据确定后台应用在网络资源的资源限制等级,包括:
    通过所述用户空间分析所述网络资源使用数据,确定后台应用在网络资源的资源限制等级。
  15. 一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时执行如下操作:
    当前台有应用在运行时,每隔预设时间段采集前台应用的网络资源使用数据;
    根据所述网络资源使用数据确定后台应用在网络资源的资源限制等级;及
    将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级。
  16. 根据权利要求15所述的计算机可读存储介质,其特征在于,所述计算机程序被所述处理器执行所述每隔预设时间段采集前台应用的网络资源使用数据之后,还执行如下操作:
    获取各个后台应用的资源使用信息;及
    根据所述资源使用信息获取各个后台应用使用的资源种类,并选取资源种类包含网络资源的后台应用;
    所述根据所述网络资源使用数据确定后台应用在网络资源的资源限制等级,包括:
    根据所述网络资源使用数据确定选取的后台应用在网络资源的资源限制等级。
  17. 根据权利要求15所述的计算机可读存储介质,其特征在于,所述计算机程序被所述处理器执行所述将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级时,还执行如下操作:
    获取所述后台应用当前在网络资源的资源限制等级;及
    在当前的资源限制等级低于确定的资源限制等级时,将所述后台应用添加到网络资源下与所述确定的资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级。
  18. 根据权利要求15所述的计算机可读存储介质,其特征在于,所述计算机程序被所述处理器执行所述将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级时,还执行如下操作:
    获取所述后台应用占用的网络资源比例;及
    当所述网络资源比例大于预设阈值时,将所述后台应用添加到网络资源下与所述确定的资源限制等级对应的资源组别中,并配置与所述资源组别匹配的资源使用优先级。
  19. 根据权利要求15至18任一所述的计算机可读存储介质,其特征在于,所述计算机程序被所述处理器执行所述将所述后台应用添加到网络资源下与所述资源限制等级对应的资源组别中时,还执行如下操作:
    获取所述后台应用的用户组信息;
    查询与所述用户组信息具备映射关系的进程标识;及
    将与所述进程标识匹配的后台进程添加到网络资源下与所述资源限制等级对应的资源组别中。
  20. 根据权利要求19所述的计算机可读存储介质,其特征在于,所述计算机程序被所述处理器执行所述将与所述进程标识匹配的后台进程添加到网络资源下与所述资源限制等级对应的资源组别中时,还执行如下操作:
    采集与所述进程标识匹配的后台进程的运行特征;
    根据所述运行特征确定所述匹配的后台进程使用的资源种类;及
    将资源种类包含网络资源的后台进程添加到网络资源下与所述资源限制等级对应的资源组别中。
PCT/CN2018/123047 2018-01-10 2018-12-24 资源管理方法、装置、移动终端及计算机可读存储介质 WO2019137187A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810023912.9A CN110018888A (zh) 2018-01-10 2018-01-10 资源管理方法、装置、移动终端及计算机可读存储介质
CN201810023912.9 2018-01-10

Publications (1)

Publication Number Publication Date
WO2019137187A1 true WO2019137187A1 (zh) 2019-07-18

Family

ID=67188154

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/123047 WO2019137187A1 (zh) 2018-01-10 2018-12-24 资源管理方法、装置、移动终端及计算机可读存储介质

Country Status (2)

Country Link
CN (1) CN110018888A (zh)
WO (1) WO2019137187A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111026456B (zh) * 2019-11-29 2023-07-18 惠州Tcl移动通信有限公司 应用管理方法、装置、存储介质及电子设备
CN116744329A (zh) * 2022-10-21 2023-09-12 荣耀终端有限公司 一种网络加速方法和电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090028127A1 (en) * 2007-07-26 2009-01-29 Gordon Kent Walker Methods and apparatus for providing computational load allocation in a network environment
CN103176842A (zh) * 2013-03-15 2013-06-26 广东欧珀移动通信有限公司 后台进程管理方法及其移动终端
CN106059952A (zh) * 2016-04-29 2016-10-26 宇龙计算机通信科技(深圳)有限公司 一种应用带宽管理方法及装置
CN107181700A (zh) * 2017-07-19 2017-09-19 努比亚技术有限公司 移动终端应用程序的控制方法、移动终端及存储介质

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10552179B2 (en) * 2014-05-30 2020-02-04 Apple Inc. Resource management with dynamic resource policies
WO2017075088A1 (en) * 2015-10-27 2017-05-04 Blackberry Limited Detecting resource access
CN106095547A (zh) * 2016-06-03 2016-11-09 北京小米移动软件有限公司 应用程序联网控制方法及装置
CN106533988B (zh) * 2016-10-26 2020-07-14 维沃移动通信有限公司 一种应用程序网速的控制方法及移动终端
CN106681475A (zh) * 2016-12-12 2017-05-17 北京珠穆朗玛移动通信有限公司 降低移动终端功耗的方法及移动终端
CN107193653B (zh) * 2017-04-28 2020-12-29 北京小米移动软件有限公司 带宽资源分配方法、装置及存储介质
CN107391241A (zh) * 2017-06-22 2017-11-24 努比亚技术有限公司 应用快速启动方法、终端及计算机可读存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090028127A1 (en) * 2007-07-26 2009-01-29 Gordon Kent Walker Methods and apparatus for providing computational load allocation in a network environment
CN103176842A (zh) * 2013-03-15 2013-06-26 广东欧珀移动通信有限公司 后台进程管理方法及其移动终端
CN106059952A (zh) * 2016-04-29 2016-10-26 宇龙计算机通信科技(深圳)有限公司 一种应用带宽管理方法及装置
CN107181700A (zh) * 2017-07-19 2017-09-19 努比亚技术有限公司 移动终端应用程序的控制方法、移动终端及存储介质

Also Published As

Publication number Publication date
CN110018888A (zh) 2019-07-16

Similar Documents

Publication Publication Date Title
WO2019128540A1 (zh) 资源管理方法、移动终端及计算机可读存储介质
US11099900B2 (en) Memory reclamation method and apparatus
CN107526640B (zh) 资源管理方法、装置、移动终端及计算机可读存储介质
WO2019137173A1 (zh) 资源管理方法、移动终端及计算机可读存储介质
WO2019137170A1 (zh) 信息处理方法、移动终端及计算机可读存储介质
CN107368400B (zh) Cpu监测方法、装置、计算机可读存储介质和移动终端
WO2019128571A1 (zh) 资源管理方法、装置、移动终端及计算机可读存储介质
CN110032429B (zh) 信息处理方法、装置、移动终端及计算机可读存储介质
WO2019128546A1 (zh) 应用程序处理方法、电子设备、计算机可读存储介质
US10719351B2 (en) Method for controlling states of processes and related device
WO2019128598A1 (zh) 应用处理方法、电子设备、计算机可读存储介质
WO2019137252A1 (zh) 内存处理方法、电子设备、计算机可读存储介质
CN108334345B (zh) 应用程序处理方法、装置、可读存储介质和移动终端
WO2019128537A1 (zh) 应用冻结方法、计算机设备和计算机可读存储介质
WO2019128588A1 (zh) 进程处理方法和装置、电子设备、计算机可读存储介质
CN112559390B (zh) 一种数据写入控制方法及存储设备
WO2019128573A1 (zh) 信息处理方法、装置、计算机设备和计算机可读存储介质
WO2019137187A1 (zh) 资源管理方法、装置、移动终端及计算机可读存储介质
WO2019128569A1 (zh) 应用程序冻结方法、装置、存储介质和终端
CN110046032A (zh) 应用程序处理方法和装置、电子设备、计算机可读存储介质
WO2019128586A1 (zh) 应用程序处理方法、电子设备、计算机可读存储介质
CN106776040A (zh) 一种资源分配方法及装置
CN117407133A (zh) 一种任务处理方法、装置及计算机可读存储介质
CN109375995B (zh) 应用冻结方法和装置、存储介质、电子设备
WO2019128570A1 (zh) 应用程序冻结方法、装置、存储介质和终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18900485

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18900485

Country of ref document: EP

Kind code of ref document: A1