WO2021043046A1 - Procédé et dispositif de gestion et de commande de ressources - Google Patents
Procédé et dispositif de gestion et de commande de ressources Download PDFInfo
- Publication number
- WO2021043046A1 WO2021043046A1 PCT/CN2020/111494 CN2020111494W WO2021043046A1 WO 2021043046 A1 WO2021043046 A1 WO 2021043046A1 CN 2020111494 W CN2020111494 W CN 2020111494W WO 2021043046 A1 WO2021043046 A1 WO 2021043046A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- application
- management
- critical
- resources
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/4881—Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
- G06F9/5038—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the execution order of a plurality of tasks, e.g. taking priority or time dependency constraints into consideration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- the embodiments of the present application relate to the field of electronic technology, and in particular to a method and equipment for resource management and control.
- an instant messaging application can receive messages in the background
- a navigation application can continue to navigate in the background
- a music application can play songs in the background.
- Background applications need to use resources while they are running.
- the resources involved in the application program are managed and controlled according to the package name of the application program package (package) or the user identity (UID) of the application program.
- This control method includes allowing the use of resources or restricting the use of resources.
- the prior art allows the background application program to use resources normally.
- the embodiments of the present application provide a resource management and control method and device, which can perform fine-grained management and control of resource usage according to processes in a background application, and can perform different levels of resource management and control for different processes, thereby reducing the burden of background applications.
- Resource consumption reduce the power consumption of electronic equipment.
- an embodiment of the present application provides a resource management and control method, including: an electronic device displays an interface of a first application program.
- the electronic device switches from running the first application program in the foreground to running the first application program in the background, and stops displaying the interface of the first application program.
- the electronic device determines the critical process and the non-critical process in the first application program.
- the electronic equipment adopts the first management and control method and the second management and control method respectively to process the resources of the critical process and the non-critical process.
- the second management and control method has a greater degree of resource management and control than the first management and control method.
- the mobile phone can perform fine-grained management and control of resource usage according to the process of the background application, and can perform different levels of resource management and control for the key and non-critical processes of the background application.
- the resource consumption of each application program in the background can be reduced, and the power consumption of the electronic device can be reduced.
- the electronic device determines the critical process and the non-critical process in the first application program, including: if the first process in the first application program is in the process whitelist, the electronic device determines that the first process is The key process. If the first process in the first application is in the process blacklist, the electronic device determines that the first process is a non-critical process.
- the electronic device can determine the critical process and the non-critical process according to the preset whitelist and blacklist.
- the electronic device can determine the critical process and the non-critical process according to the priority of the process in the first application.
- determining the critical process and non-critical process in the first application by the electronic device includes: if the ADJ value of the first process in the first application is less than or equal to FORREGROUND_APP_ADJ, the electronic device determines that the first process is a critical process. If the ADJ value of the first process in the first application is greater than FORREGROUND_APP_ADJ, the electronic device determines that the first process is a non-critical process.
- the electronic device can determine the critical process and the non-critical process through information that characterizes the priority of the process, such as the ADJ value.
- the electronic device determines the critical process and the non-critical process in the first application, including: if the first process in the first application is located in the SCHED_GROUP_BACKGROUND group, the electronic device determines that the first process is The key process. If the first process in the first application is located in another group, the electronic device determines that the first process is a non-critical process.
- the electronic device can determine the critical process and the non-critical process through the grouping of the process.
- the electronic device determines the critical process and the non-critical process in the first application program, including: if the first process in the first application program uses the foreground service, the electronic device determines that the first process is The key process. If the first process in the first application does not use the foreground service, the electronic device determines that the first process is a non-critical process.
- the electronic device can determine whether it is a critical process according to whether the process in the background application uses the foreground service.
- the electronic device determines the critical process and the non-critical process in the first application program, including: if the first process in the first application program meets the target characteristics, the electronic device determines that the first process is critical Process; where the target feature is a preset feature, or a feature obtained through training of an electronic device. If the first process in the first application program does not meet the target characteristics, the electronic device determines that the first process is a non-critical process.
- the electronic device can determine whether it is a critical process according to the characteristics of the process in the background application.
- the electronic device adopts the first management and control method and the second management and control method to process the resources of the key process and the non-critical process, including: the electronic device switches to the background operation in the first application program and experiences After the preset time period T, the electronic device adopts the first management and control mode and the second management and control mode respectively to process the resources of the critical process and the non-critical process.
- the electronic device may temporarily not perform resource management and control on the background first application program.
- the probability of the user using the first application program in the foreground again is small, and the electronic device can perform resource management and control on the background first application program.
- the method further includes: the electronic device is the first application program Process to apply for resources.
- the electronic device stores resource application information, and the resource application information includes the corresponding relationship between the process and the requested resource.
- Electronic equipment adopts the first management and control method and the second management and control method to process the resources of the key process and the non-critical process, including: the electronic equipment adopts the first and second management methods according to the resource application information, respectively, and controls the key process and the second control method.
- Non-critical processes handle resource processing.
- the electronic device can record the corresponding relationship between the process and the resource when the process applies for the resource, so as to subsequently perform resource management and control on the process according to the corresponding relationship.
- the first control method includes unifying key processes based on the heartbeat packet of the timing alarm Alarm, allowing key processes to use other resources.
- the second control method includes restricting the use of resources by non-critical processes.
- the key processes include the first level, the second level, and the third level.
- the first management and control method corresponding to the first-level key process includes allowing the key process to use resources.
- the first management and control method corresponding to the second-level key processes includes the first cycle of unifying key processes based on the heartbeat packet of the timing alarm Alarm, allowing key processes to use other resources.
- the first management and control method corresponding to the third-level key processes includes unifying the key processes in the second cycle based on the heartbeat packet of the timing alarm Alarm, allowing the key processes to use other resources, and the second cycle is greater than the first cycle.
- non-critical processes include the first level and the second level.
- the second management and control method corresponding to the non-critical processes of the first level includes periodically restricting the use of resources by the non-critical processes.
- the second control method corresponding to the second-level non-critical processes includes restricting the use of resources by non-critical processes.
- the first control method includes allowing the use of critical resources and restricting the use of non-critical resources.
- the resources include: navigation satellite system resources, network resources, Bluetooth resources, transmission control protocol (transmission control protocol, TCP) connection resources, audio resources, modem resources, timer alarm resources, wake-up Lock one or more of Wakelock resources, broadcast resources, delayed processing Job resources, or service resources.
- transmission control protocol transmission control protocol, TCP
- an embodiment of the present application provides an electronic device, including: a screen for displaying an interface; one or more processors; and a memory in which codes are stored.
- the electronic device When the code is executed by the electronic device, the electronic device is caused to perform the following steps: display the interface of the first application; switch from running the first application in the foreground to running the first application in the background, and stop displaying the interface of the first application; OK The critical and non-critical processes in the first application; the first and second control methods are used to process the resources of the critical and non-critical processes; the second control method has a greater degree of control over resources than the first control method The degree of control over resources.
- determining the critical process and the non-critical process in the first application program includes: if the first process in the first application program is in the process whitelist, determining the first process as the critical process. If the first process in the first application is in the process blacklist, it is determined that the first process is a non-critical process.
- determining the critical process and the non-critical process in the first application program includes: if the ADJ value of the first process in the first application program is less than or equal to FORegROUND_APP_ADJ, then determining that the first process is critical process. If the ADJ value of the first process in the first application is greater than FORREGROUND_APP_ADJ, it is determined that the first process is a non-critical process.
- determining the critical process and the non-critical process in the first application program includes: if the first process in the first application program is located in the SCHED_GROUP_BACKGROUND group, determining the first process as the critical process. If the first process in the first application is located in another group, it is determined that the first process is a non-critical process.
- determining the critical process and the non-critical process in the first application program includes: if the first process in the first application program uses the foreground service, determining the first process as the critical process. If the first process in the first application does not use the foreground service, it is determined that the first process is a non-critical process.
- determining the critical process and the non-critical process in the first application program includes: if the first process in the first application program meets the target characteristics, determining the first process as the critical process.
- the target feature is a preset feature, or a feature obtained by training of an electronic device. If the first process in the first application program does not meet the target characteristics, the first process is determined to be a non-critical process.
- the first management and control method and the second management and control method are used to process the resources of key processes and non-critical processes, including: switching the first application to run in the background and experiencing a preset duration of T After that, the first management and control method and the second management and control method are respectively adopted to process the resources of the critical process and the non-critical process.
- the electronic device when the code is executed by the electronic device, the electronic device is also made to perform the following steps: before the first and second control methods are used to process the resources of the critical process and the non-critical process, Apply for resources for the process in the first application. Save the resource application information.
- the resource application information includes the corresponding relationship between the process and the requested resource.
- the first and second control methods are used to process the resources of key and non-critical processes, including: according to the resource application information, the first and second control methods are used to process key and non-critical processes. Resource processing.
- the first control method includes unifying key processes based on the heartbeat packet of the timing alarm Alarm, allowing key processes to use other resources.
- the second control method includes restricting the use of resources by non-critical processes.
- the key processes include the first level, the second level, and the third level.
- the first management and control method corresponding to the first-level key process includes allowing the key process to use resources.
- the first management and control method corresponding to the second-level key processes includes the first cycle of unifying key processes based on the heartbeat packet of the timing alarm Alarm, allowing key processes to use other resources.
- the first management and control method corresponding to the third-level key processes includes unifying the key processes in the second cycle based on the heartbeat packet of the timing alarm Alarm, allowing the key processes to use other resources, and the second cycle is greater than the first cycle.
- non-critical processes include the first level and the second level.
- the second management and control method corresponding to the non-critical processes of the first level includes periodically restricting the use of resources by the non-critical processes.
- the second control method corresponding to the second-level non-critical processes includes restricting the use of resources by non-critical processes.
- the resources include: navigation satellite system resources, network resources, Bluetooth resources, transmission control protocol TCP connection resources, audio resources, modem resources, timing alarm resources, wakelock resources, broadcast resources , Delay processing of one or more of Job resources or Service resources.
- an embodiment of the present application provides a resource management and control device, which is included in an electronic device.
- the device has the function of realizing the behavior of the electronic device in any of the above aspects and possible design methods.
- This function can be realized by hardware, or by hardware executing corresponding software.
- the hardware or software includes at least one module or unit corresponding to the above-mentioned functions. For example, detecting modules/units, creating modules/units, saving modules/units, displaying modules/units, switching modules/units, determining modules/units, and controlling modules/units, etc.
- an embodiment of the present application provides a computer storage medium, including computer instructions, which when the computer instructions run on an electronic device, cause the electronic device to execute the resource management and control method in any one of the possible designs in the foregoing aspects.
- embodiments of the present application provide a computer program product, which when the computer program product runs on a computer, enables the computer to execute the resource management and control method in any one of the possible designs in the foregoing aspects.
- Figure 1A is a schematic diagram of an application resource provided by the prior art
- FIG. 1B is a schematic diagram of management of resource application information provided by the prior art
- FIG. 2 is a schematic diagram of the hardware structure of an electronic device provided by an embodiment of the application.
- FIG. 3 is a schematic diagram of the software structure of an electronic device provided by an embodiment of the application.
- FIG. 4 is a flowchart of a resource management and control method provided by an embodiment of the application.
- 5A-5B are schematic diagrams of a set of interfaces provided by an embodiment of the application.
- FIG. 6A is a schematic diagram of management of resource application information provided by an embodiment of this application.
- FIG. 6B is a schematic diagram of an application resource provided by an embodiment of the application.
- FIG. 7 is a schematic diagram of determining critical processes and non-critical processes according to process characteristics according to an embodiment of the application.
- FIG. 8 is a schematic diagram of a weak management and control method provided by an embodiment of the application.
- FIG. 9 is a schematic diagram of a heartbeat mechanism provided by an embodiment of this application.
- FIG. 10 is a schematic diagram of a strong management and control method provided by an embodiment of the application.
- first and second are only used for descriptive purposes, and cannot be understood as indicating or implying relative importance or implicitly indicating the number of indicated technical features. Therefore, the features defined with “first” and “second” may explicitly or implicitly include one or more of these features. In the description of the present embodiment, unless otherwise specified, "plurality" means two or more.
- the application can be identified by the package name of the application or the UID of the application user identity. Among them, each UID can correspond to one or more applications.
- the application can create multiple processes during the running process, and each process can apply for the use of resources according to its own business needs.
- the resources applied for by the process of the application program may include hardware resources and software resources.
- the hardware resources may include global navigation satellite system (GNSS) resources, network resources, bluetooth (BT) resources, transmission control protocol TCP connection resources, audio resources or modem resources, etc.
- GNSS resources can include global positioning system (GPS) resources, global navigation satellite system (GLONASS) resources, Beidou navigation satellite system (BDS) resources, and quasi-zenith Satellite system (quasi-zenith satellite system, QZSS) resources and/or satellite-based augmentation systems (satellite-based augmentation systems, SBAS) resources, etc.
- GPS global positioning system
- GLONASS global navigation satellite system
- BDS Beidou navigation satellite system
- QZSS quasi-zenith Satellite system
- SBAS satellite-based augmentation systems
- Network resources refer to resources that can be used for surfing the Internet, such as operators' mobile data service (2G/3G/4G/5G) resources or wireless fidelity (Wi-Fi) resources.
- the TCP connection can exchange information through the socket Socket link.
- Audio resources are used to implement audio playback, such as speaker resources or audio codec resources.
- the software resources may include timing alarm resources, wakelock resources, broadcast resources, delayed processing job resources or service service resources, etc.
- the Alarm resource can be used for system-level prompts according to the set time or cycle.
- Wakelock resources can be used to prevent the processor from sleeping.
- Broadcast resources can be used to transfer information between different applications or different components.
- Job resource is a resource in a library that can be processed in a delayed manner in the background.
- Service resource is an application component that can perform long-running operations in the background without a user interface.
- the resource manager in the electronic device running the application program may save the resource application information.
- the resource application information includes the package name and UID of the application requesting the resource, and the resource requesting the application.
- the resource application information may also include relevant information such as the application time and application duration of the resource. In other words, the prior art counts the resource application information of the process according to the package name and UID.
- the electronic device performs resource management and control according to the package name or UID of the application program.
- the electronic device allows the application program to enter the background to be able to use various resources normally.
- the package name of background application 1 is package name 1, and the corresponding UID is UID1.
- the electronic device allows the requested resource corresponding to package name 1 to be used normally; in another prior art, the electronic device allows the requested resource corresponding to UID1 to be used normally, so that the application Program 1 can run in the background.
- the existing technology allows each process in the background application program to use resources normally, but in fact the resources of some processes do not necessarily need to be used, so the existing technology adopts the solution As a result, the resource consumption and power consumption of the electronic device are relatively high.
- the embodiment of the present application provides a resource management and control method, which can be applied to electronic devices.
- Electronic devices can perform fine-grained management and control of resource usage based on processes in background applications.
- the electronic device can perform different levels of resource management and control.
- the electronic device can control the resources of some processes in the background application regardless of control or weak control, that is, the degree and intensity of control is small; and the resources of other processes can be strongly controlled, that is, the degree and intensity of control is greater. Therefore, compared with the prior art allowing each process in the background application program to use various resources normally, the resource management and control method provided by the embodiment of the present application can reduce the resource consumption of each background application program and reduce the power consumption of the electronic device.
- the electronic device may be a mobile phone, a tablet computer, a folding screen device, a netbook, a personal digital assistant (personal digital assistant, PDA), a wearable device, or augmented reality (AR)/virtual reality (VR) Devices, etc.
- PDA personal digital assistant
- AR augmented reality
- VR virtual reality
- FIG. 2 shows a schematic structural diagram of the electronic device 100.
- the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, and an antenna 2.
- Mobile communication module 150 wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, earphone jack 170D, sensor module 180, buttons 190, motor 191, indicator 192, camera 193, display screen 194, and Subscriber identification module (subscriber identification module, SIM) card interface 195, etc.
- SIM Subscriber identification module
- the sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light Sensor 180L, bone conduction sensor 180M, etc.
- the structure illustrated in the embodiment of the present application does not constitute a specific limitation on the electronic device 100.
- the electronic device 100 may include more or fewer components than shown, or combine certain components, or split certain components, or arrange different components.
- the illustrated components can be implemented in hardware, software, or a combination of software and hardware.
- the processor 110 may include one or more processing units.
- the processor 110 may include an application processor (AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (NPU) Wait.
- AP application processor
- modem processor modem processor
- GPU graphics processing unit
- image signal processor image signal processor
- ISP image signal processor
- controller memory
- video codec digital signal processor
- DSP digital signal processor
- NPU neural-network processing unit
- the different processing units may be independent devices or integrated in one or more processors.
- the controller may be the nerve center and command center of the electronic device 100.
- the controller can generate operation control signals according to the instruction operation code and timing signals to complete the control of fetching and executing instructions.
- a memory may also be provided in the processor 110 to store instructions and data.
- the memory in the processor 110 is a cache memory.
- the memory can store instructions or data that the processor 110 has just used or used cyclically. If the processor 110 needs to use the instruction or data again, it can be directly called from the memory. Repeated accesses are avoided, the waiting time of the processor 110 is reduced, and the efficiency of the system is improved.
- the processor 110 may include one or more interfaces.
- the interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, and a universal asynchronous transmitter receiver/transmitter, UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and / Or Universal Serial Bus (USB) interface, etc.
- I2C integrated circuit
- I2S integrated circuit built-in audio
- PCM pulse code modulation
- UART universal asynchronous transmitter receiver/transmitter
- MIPI mobile industry processor interface
- GPIO general-purpose input/output
- SIM subscriber identity module
- USB Universal Serial Bus
- the I2C interface is a bidirectional synchronous serial bus, which includes a serial data line (SDA) and a serial clock line (SCL).
- the processor 110 may include multiple sets of I2C buses.
- the processor 110 may couple the touch sensor 180K, the charger, the flash, the camera 193, etc., respectively through different I2C bus interfaces.
- the processor 110 may couple the touch sensor 180K through an I2C interface, so that the processor 110 and the touch sensor 180K communicate through an I2C bus interface to implement the touch function of the electronic device 100.
- the I2S interface can be used for audio communication.
- the processor 110 may include multiple sets of I2S buses.
- the processor 110 may be coupled with the audio module 170 through an I2S bus to implement communication between the processor 110 and the audio module 170.
- the audio module 170 may transmit audio signals to the wireless communication module 160 through an I2S interface, so as to realize the function of answering calls through a Bluetooth headset.
- the PCM interface can also be used for audio communication to sample, quantize and encode analog signals.
- the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface.
- the audio module 170 may also transmit audio signals to the wireless communication module 160 through the PCM interface, so as to realize the function of answering calls through the Bluetooth headset. Both I2S interface and PCM interface can be used for audio communication.
- the UART interface is a universal serial data bus used for asynchronous communication.
- the bus can be a two-way communication bus. It converts the data to be transmitted between serial communication and parallel communication.
- the UART interface is generally used to connect the processor 110 and the wireless communication module 160.
- the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to realize the Bluetooth function.
- the audio module 170 may transmit audio signals to the wireless communication module 160 through a UART interface, so as to realize the function of playing music through a Bluetooth headset.
- the MIPI interface can be used to connect the processor 110 with the display screen 194, the camera 193 and other peripheral devices.
- the MIPI interface includes a camera serial interface (camera serial interface, CSI), a display serial interface (display serial interface, DSI), and so on.
- the processor 110 and the camera 193 communicate through a CSI interface to implement the shooting function of the electronic device 100.
- the processor 110 and the display screen 194 communicate through a DSI interface to realize the display function of the electronic device 100.
- the GPIO interface can be configured through software.
- the GPIO interface can be configured as a control signal or as a data signal.
- the GPIO interface can be used to connect the processor 110 with the camera 193, the display screen 194, the wireless communication module 160, the audio module 170, the sensor module 180, and so on.
- the GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
- the USB interface 130 is an interface that complies with the USB standard specification, and specifically may be a Mini USB interface, a Micro USB interface, a USB Type C interface, and so on.
- the USB interface 130 can be used to connect a charger to charge the electronic device 100, and can also be used to transfer data between the electronic device 100 and peripheral devices. It can also be used to connect earphones and play audio through earphones. This interface can also be used to connect to other electronic devices, such as AR devices.
- the interface connection relationship between the modules illustrated in the embodiment of the present application is merely a schematic description, and does not constitute a structural limitation of the electronic device 100.
- the electronic device 100 may also adopt different interface connection modes in the foregoing embodiments, or a combination of multiple interface connection modes.
- the charging management module 140 is used to receive charging input from the charger.
- the charger can be a wireless charger or a wired charger.
- the charging management module 140 may receive the charging input of the wired charger through the USB interface 130.
- the charging management module 140 may receive the wireless charging input through the wireless charging coil of the electronic device 100. While the charging management module 140 charges the battery 142, it can also supply power to the electronic device through the power management module 141.
- the power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110.
- the power management module 141 receives input from the battery 142 and/or the charge management module 140, and supplies power to the processor 110, the internal memory 121, the external memory, the display screen 194, the camera 193, and the wireless communication module 160.
- the power management module 141 can also be used to monitor parameters such as battery capacity, battery cycle times, and battery health status (leakage, impedance).
- the power management module 141 may also be provided in the processor 110.
- the power management module 141 and the charging management module 140 may also be provided in the same device.
- the wireless communication function of the electronic device 100 can be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor, and the baseband processor.
- the antenna 1 and the antenna 2 are used to transmit and receive electromagnetic wave signals.
- Each antenna in the electronic device 100 can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
- Antenna 1 can be multiplexed as a diversity antenna of a wireless local area network.
- the antenna can be used in combination with a tuning switch.
- the mobile communication module 150 can provide a wireless communication solution including 2G/3G/4G/5G and the like applied to the electronic device 100.
- the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), etc.
- the mobile communication module 150 can receive electromagnetic waves by the antenna 1, and perform processing such as filtering, amplifying and transmitting the received electromagnetic waves to the modem processor for demodulation.
- the mobile communication module 150 can also amplify the signal modulated by the modem processor, and convert it into electromagnetic wave radiation via the antenna 1.
- at least part of the functional modules of the mobile communication module 150 may be provided in the processor 110.
- at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided in the same device.
- the modem processor may include a modulator and a demodulator.
- the modulator is used to modulate the low frequency baseband signal to be sent into a medium and high frequency signal.
- the demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal. Then the demodulator transmits the demodulated low-frequency baseband signal to the baseband processor for processing. After the low-frequency baseband signal is processed by the baseband processor, it is passed to the application processor.
- the application processor outputs a sound signal through an audio device (not limited to the speaker 170A, the receiver 170B, etc.), or displays an image or video through the display screen 194.
- the modem processor may be an independent device. In other embodiments, the modem processor may be independent of the processor 110 and be provided in the same device as the mobile communication module 150 or other functional modules.
- the wireless communication module 160 can provide applications on the electronic device 100 including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) networks), bluetooth (BT), and global navigation satellites.
- WLAN wireless local area networks
- BT wireless fidelity
- GNSS global navigation satellite system
- FM frequency modulation
- NFC near field communication technology
- infrared technology infrared, IR
- the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
- the wireless communication module 160 receives electromagnetic waves via the antenna 2, frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110.
- the wireless communication module 160 may also receive the signal to be sent from the processor 110, perform frequency modulation, amplify it, and convert it into electromagnetic waves to radiate through the antenna 2.
- the antenna 1 of the electronic device 100 is coupled with the mobile communication module 150, and the antenna 2 is coupled with the wireless communication module 160, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology.
- Wireless communication technologies can include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), and broadband code division. Multiple access (wideband code division multiple access, WCDMA), time-division code division multiple access (TD-SCDMA), long term evolution (LTE), BT, GNSS, WLAN, NFC, FM , And/or IR technology, etc.
- GSM global system for mobile communications
- GPRS general packet radio service
- CDMA code division multiple access
- CDMA broadband code division. Multiple access
- WCDMA wideband code division multiple access
- TD-SCDMA time-division code division multiple access
- LTE long term evolution
- BT GNSS
- WLAN Wireless Fidelity
- NFC NFC
- FM And/or IR technology
- GNSS may
- the electronic device 100 implements a display function through a GPU, a display screen 194, an application processor, and the like.
- the GPU is an image processing microprocessor, which is connected to the display screen 194 and the application processor.
- the GPU is used to perform mathematical and geometric calculations for graphics rendering.
- the processor 110 may include one or more GPUs, which execute program instructions to generate or change display information.
- the display screen 194 is used to display images, videos, and the like.
- the display screen 194 includes a display panel.
- the display panel can use liquid crystal display (LCD), organic light-emitting diode (OLED), active matrix organic light-emitting diode or active-matrix organic light-emitting diode (active-matrix organic light-emitting diode).
- LCD liquid crystal display
- OLED organic light-emitting diode
- active-matrix organic light-emitting diode active-matrix organic light-emitting diode
- AMOLED flexible light-emitting diode (FLED), Miniled, MicroLed, Micro-oLed, quantum dot light-emitting diode (QLED), etc.
- the electronic device 100 may include one or N display screens 194, and N is a positive integer greater than one.
- the electronic device 100 can realize a shooting function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, and an application processor.
- the ISP is used to process the data fed back by the camera 193. For example, when taking a picture, the shutter is opened, and light is transmitted to the photosensitive element of the camera through the lens, and the light signal is converted into an electrical signal. The photosensitive element of the camera transmits the electrical signal to the ISP for processing and transforms it into an image visible to the naked eye. ISP can also optimize the image noise, brightness, and skin color. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be provided in the camera 193.
- the camera 193 is used to capture still images or videos.
- the object generates an optical image through the lens and is projected to the photosensitive element.
- the photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
- CMOS complementary metal-oxide-semiconductor
- the photosensitive element converts the optical signal into an electrical signal, and then transfers the electrical signal to the ISP to convert it into a digital image signal.
- ISP outputs digital image signals to DSP for processing.
- DSP converts digital image signals into standard RGB, YUV and other formats of image signals.
- the electronic device 100 may include one or N cameras 193, and N is a positive integer greater than one.
- Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the energy of the frequency point.
- Video codecs are used to compress or decompress digital video.
- the electronic device 100 may support one or more video codecs. In this way, the electronic device 100 can play or record videos in multiple encoding formats, such as: moving picture experts group (MPEG) 1, MPEG2, MPEG3, MPEG4, and so on.
- MPEG moving picture experts group
- MPEG2 MPEG2, MPEG3, MPEG4, and so on.
- NPU is a neural-network (NN) computing processor.
- NN neural-network
- applications such as intelligent cognition of the electronic device 100 can be realized, such as image recognition, face recognition, voice recognition, text understanding, and so on.
- the external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the electronic device 100.
- the external memory card communicates with the processor 110 through the external memory interface 120 to realize the data storage function. For example, save music, video and other files in an external memory card.
- the internal memory 121 may be used to store computer executable program code, and the executable program code includes instructions.
- the processor 110 executes various functional applications and data processing of the electronic device 100 by running instructions stored in the internal memory 121.
- the internal memory 121 may include a storage program area and a storage data area.
- the storage program area can store an operating system, at least one application program (such as a sound playback function, an image playback function, etc.) required by at least one function.
- the data storage area can store data (such as audio data, phone book, etc.) created during the use of the electronic device 100.
- the internal memory 121 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash storage (UFS), and the like.
- a non-volatile memory such as at least one magnetic disk storage device, a flash memory device, a universal flash storage (UFS), and the like.
- the electronic device 100 can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the earphone interface 170D, and the application processor. For example, music playback, recording, etc.
- the audio module 170 is used to convert digital audio information into an analog audio signal for output, and is also used to convert an analog audio input into a digital audio signal.
- the audio module 170 can also be used to encode and decode audio signals.
- the audio module 170 may be provided in the processor 110, or part of the functional modules of the audio module 170 may be provided in the processor 110.
- the speaker 170A also called “speaker” is used to convert audio electrical signals into sound signals.
- the electronic device 100 can listen to music through the speaker 170A, or listen to a hands-free call.
- the receiver 170B also called “earpiece” is used to convert audio electrical signals into sound signals.
- the electronic device 100 answers a call or voice message, it can receive the voice by bringing the receiver 170B close to the human ear.
- the microphone 170C also called “microphone”, “microphone”, is used to convert sound signals into electrical signals.
- the user can make a sound by approaching the microphone 170C through the human mouth, and input the sound signal into the microphone 170C.
- the electronic device 100 may be provided with at least one microphone 170C. In other embodiments, the electronic device 100 may be provided with two microphones 170C, which can implement noise reduction functions in addition to collecting sound signals. In other embodiments, the electronic device 100 may also be provided with three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, and realize directional recording functions.
- the earphone interface 170D is used to connect wired earphones.
- the earphone interface 170D may be a USB interface 130, or a 3.5mm open mobile terminal platform (OMTP) standard interface, and a cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
- OMTP open mobile terminal platform
- CTIA cellular telecommunications industry association of the USA, CTIA
- the pressure sensor 180A is used to sense the pressure signal and can convert the pressure signal into an electrical signal.
- the pressure sensor 180A may be provided on the display screen 194.
- the capacitive pressure sensor may include at least two parallel plates with conductive material. When a force is applied to the pressure sensor 180A, the capacitance between the electrodes changes.
- the electronic device 100 determines the intensity of the pressure according to the change in capacitance.
- the electronic device 100 detects the intensity of the touch operation according to the pressure sensor 180A.
- the electronic device 100 may also calculate the touched position according to the detection signal of the pressure sensor 180A.
- touch operations that act on the same touch position but have different touch operation strengths may correspond to different operation instructions. For example, when a touch operation whose intensity of the touch operation is less than the first pressure threshold is applied to the short message application icon, an instruction to view the short message is executed. When a touch operation with a touch operation intensity greater than or equal to the first pressure threshold acts on the short message application icon, an instruction to create a new short message is executed.
- the gyro sensor 180B may be used to determine the movement posture of the electronic device 100.
- the angular velocity of the electronic device 100 around three axes ie, x, y, and z axes
- the gyro sensor 180B can be used for image stabilization.
- the gyro sensor 180B detects the shake angle of the electronic device 100, calculates the distance that the lens module needs to compensate according to the angle, and allows the lens to counteract the shake of the electronic device 100 through reverse movement to achieve anti-shake.
- the gyro sensor 180B can also be used for navigation and somatosensory game scenes.
- the air pressure sensor 180C is used to measure air pressure.
- the electronic device 100 calculates the altitude based on the air pressure value measured by the air pressure sensor 180C to assist positioning and navigation.
- the magnetic sensor 180D includes a Hall sensor.
- the electronic device 100 may use the magnetic sensor 180D to detect the opening and closing of the flip holster.
- the electronic device 100 can detect the opening and closing of the flip according to the magnetic sensor 180D.
- features such as automatic unlocking of the flip cover are set.
- the acceleration sensor 180E can detect the magnitude of the acceleration of the electronic device 100 in various directions (generally three axes). When the electronic device 100 is stationary, the magnitude and direction of gravity can be detected. It can also be used to identify the posture of electronic devices, and apply to applications such as horizontal and vertical screen switching, pedometers and so on.
- the electronic device 100 can measure the distance by infrared or laser. In some embodiments, when shooting a scene, the electronic device 100 may use the distance sensor 180F to measure the distance to achieve fast focusing.
- the proximity light sensor 180G may include, for example, a light emitting diode (LED) and a light detector such as a photodiode.
- the light emitting diode may be an infrared light emitting diode.
- the electronic device 100 emits infrared light to the outside through the light emitting diode.
- the electronic device 100 uses a photodiode to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object near the electronic device 100. When insufficient reflected light is detected, the electronic device 100 can determine that there is no object in the vicinity of the electronic device 100.
- the electronic device 100 can use the proximity light sensor 180G to detect that the user holds the electronic device 100 close to the ear to talk, so as to automatically turn off the screen to save power.
- the proximity light sensor 180G can also be used in leather case mode, and the pocket mode will automatically unlock and lock the screen.
- the ambient light sensor 180L is used to sense the brightness of the ambient light.
- the electronic device 100 can adaptively adjust the brightness of the display screen 194 according to the perceived brightness of the ambient light.
- the ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures.
- the ambient light sensor 180L can also cooperate with the proximity light sensor 180G to detect whether the electronic device 100 is in the pocket to prevent accidental touch.
- the fingerprint sensor 180H is used to collect fingerprints.
- the electronic device 100 can use the collected fingerprint characteristics to realize fingerprint unlocking, access application locks, fingerprint photographs, fingerprint answering calls, and so on.
- the temperature sensor 180J is used to detect temperature.
- the electronic device 100 uses the temperature detected by the temperature sensor 180J to execute a temperature processing strategy. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold value, the electronic device 100 reduces the performance of the processor located near the temperature sensor 180J, so as to reduce power consumption and implement thermal protection.
- the electronic device 100 when the temperature is lower than another threshold, the electronic device 100 heats the battery 142 to avoid abnormal shutdown of the electronic device 100 due to low temperature.
- the electronic device 100 boosts the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperature.
- Touch sensor 180K also called “touch panel”.
- the touch sensor 180K may be disposed on the display screen 194, and the touch screen is composed of the touch sensor 180K and the display screen 194, which is also called a “touch screen”.
- the touch sensor 180K is used to detect touch operations acting on or near it.
- the touch sensor can pass the detected touch operation to the application processor to determine the type of touch event.
- the visual output related to the touch operation can be provided through the display screen 194.
- the touch sensor 180K may also be disposed on the surface of the electronic device 100, which is different from the position of the display screen 194.
- the bone conduction sensor 180M can acquire vibration signals.
- the bone conduction sensor 180M can obtain the vibration signal of the vibrating bone mass of the human voice.
- the bone conduction sensor 180M can also contact the human pulse and receive the blood pressure pulse signal.
- the bone conduction sensor 180M may also be provided in the earphone, combined with the bone conduction earphone.
- the audio module 170 can parse the voice signal based on the vibration signal of the vibrating bone block of the voice obtained by the bone conduction sensor 180M, and realize the voice function.
- the application processor can analyze the heart rate information based on the blood pressure beating signal obtained by the bone conduction sensor 180M, and realize the heart rate detection function.
- the button 190 includes a power-on button, a volume button, and so on.
- the button 190 may be a mechanical button. It can also be a touch button.
- the electronic device 100 may receive key input, and generate key signal input related to user settings and function control of the electronic device 100.
- the motor 191 can generate vibration prompts.
- the motor 191 can be used for incoming call vibration notification, and can also be used for touch vibration feedback.
- touch operations that act on different applications can correspond to different vibration feedback effects.
- Acting on touch operations in different areas of the display screen 194, the motor 191 can also correspond to different vibration feedback effects.
- Different application scenarios for example: time reminding, receiving information, alarm clock, games, etc.
- the touch vibration feedback effect can also support customization.
- the indicator 192 may be an indicator light, which may be used to indicate the charging status, power change, or to indicate messages, missed calls, notifications, and so on.
- the SIM card interface 195 is used to connect to the SIM card.
- the SIM card can be inserted into the SIM card interface 195 or pulled out from the SIM card interface 195 to achieve contact and separation with the electronic device 100.
- the electronic device 100 may support one or N SIM card interfaces, and N is a positive integer greater than one.
- the SIM card interface 195 can support Nano SIM cards, Micro SIM cards, SIM cards, etc.
- the same SIM card interface 195 can insert multiple cards at the same time. The types of multiple cards can be the same or different.
- the SIM card interface 195 can also be compatible with different types of SIM cards.
- the SIM card interface 195 may also be compatible with external memory cards.
- the electronic device 100 interacts with the network through the SIM card to implement functions such as call and data communication.
- the electronic device 100 adopts an eSIM, that is, an embedded SIM card.
- the eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100.
- the processor 110 may run instructions stored in the internal memory 121 to perform fine-grained control of resource usage according to processes in the background application.
- the electronic device can perform different levels of resource management and control. Among them, the electronic device can control the resources of some processes in the background application regardless of control or weak control, and control the resources of other processes strongly. Therefore, compared with the prior art allowing each process in the background application program to use various resources normally, the resource management and control method provided by the embodiment of the present application can reduce the resource consumption of each background application program and reduce the power consumption of the electronic device.
- the software system of the electronic device 100 may adopt a layered architecture, an event-driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture.
- the embodiment of the present application takes an Android system with a layered architecture as an example to illustrate the software structure of the electronic device 100 by way of example.
- FIG. 3 is a software structure block diagram of the electronic device 100 according to an embodiment of the present application.
- the layered architecture divides the software into several layers, and each layer has a clear role and division of labor. Communication between layers through software interface.
- the Android system is divided into four layers, from top to bottom, the application layer, the application framework layer, the Android runtime and system library, and the kernel layer.
- the application layer can include a series of application packages.
- the application package may include applications such as camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, short message, etc.
- the application framework layer provides an application programming interface (application programming interface, API) and a programming framework for applications in the application layer.
- the application framework layer includes some predefined functions.
- the application framework layer can include a window manager, a content provider, a view system, a phone manager, a resource manager, a notification manager, and so on.
- the window manager is used to manage window programs.
- the window manager can obtain the size of the display, determine whether there is a status bar, lock the screen, take a screenshot, etc.
- the content provider is used to store and retrieve data and make these data accessible to applications.
- Data can include videos, images, audios, phone calls made and received, browsing history and bookmarks, phone book, etc.
- the view system includes visual controls, such as controls that display text, controls that display pictures, and so on.
- the view system can be used to build applications.
- the display interface can be composed of one or more views.
- a display interface that includes a short message notification icon may include a view that displays text and a view that displays pictures.
- the phone manager is used to provide the communication function of the electronic device 100. For example, the management of the call status (including connecting, hanging up, etc.).
- the resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, etc., and can also be used to fine-grain and control the resources of the background application according to the process.
- the notification manager enables the application to display notification information in the status bar, which can be used to convey notification-type messages, and it can disappear automatically after a short stay without user interaction.
- the notification manager is used to notify download completion, message reminders, and so on.
- the notification manager can also be a notification that appears in the status bar at the top of the system in the form of a chart or scroll bar text, such as a notification of an application running in the background, or a notification that appears on the screen in the form of a dialog window. For example, text messages are prompted in the status bar, prompt sounds, electronic devices vibrate, and indicator lights flash.
- Android Runtime includes core libraries and virtual machines. Android runtime is responsible for the scheduling and management of the Android system.
- the core library consists of two parts: one part is the function functions that the java language needs to call, and the other part is the core library of Android.
- the application layer and the application framework layer run in a virtual machine.
- the virtual machine executes the java files of the application layer and the application framework layer as binary files.
- the virtual machine is used to perform functions such as object life cycle management, stack management, thread management, security and exception management, and garbage collection.
- the system library can include multiple functional modules. For example: surface manager (surface manager), media library (Media Libraries), three-dimensional graphics processing library (for example: OpenGL ES), 2D graphics engine (for example: SGL), etc.
- the surface manager is used to manage the display subsystem and provides a combination of 2D and 3D layers for multiple applications.
- the media library supports playback and recording of a variety of commonly used audio and video formats, as well as still image files.
- the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
- the 3D graphics processing library is used to realize 3D graphics drawing, image rendering, synthesis, and layer processing.
- the 2D graphics engine is a drawing engine for 2D drawing.
- the kernel layer is the layer between hardware and software.
- the kernel layer contains at least display driver, camera driver, audio driver, and sensor driver.
- the kernel layer can also include some network protocols for controlling TCP connections and network resources.
- the resource manager in the application framework layer can perform fine-grained management and control of resource usage for the processes in the background application. Moreover, for different processes in the background application, the resource manager can perform resource management and control of different degrees and strengths. Therefore, compared with allowing each process in the background application program to use various resources normally, the resource management and control method provided in the embodiment of the present application can reduce the resource consumption of each background application program and reduce the power consumption of the electronic device.
- background applications may include critical processes and non-critical processes.
- the key process is an important process, or a process perceivable by the user.
- Electronic equipment can perform lesser and lesser resource management and control for key processes, and greater and more powerful resource management and control for non-critical processes.
- the electronic device as a mobile phone with the structure shown in FIG. 2 and FIG. 3 as an example to illustrate the resource management and control method provided in the embodiment of the present application.
- the method may include:
- the mobile phone After the mobile phone detects the first operation instructed by the user to open the first application, it runs the first application in the foreground.
- the first application program may be a system application program or a third-party application program, which is not limited in the embodiment of the present application.
- the user can instruct the mobile phone to open the first application by clicking on the icon of the first application program, voice commands, or gestures in the air, etc. in various ways.
- the first application is an instant messaging application, such as QQ, WeChat, facetime, or skype.
- the first application is QQ as an example for description.
- the mobile phone detects the first operation of the user clicking the QQ icon 501; in response to the first operation, the mobile phone starts the QQ application in the foreground.
- the mobile phone creates a process of the first application, and the process in the first application applies for resources.
- the process of the first application can be created.
- the mobile phone can create one or more of the QQ main process, the QQ tool process, the QQ space process, the QQ message receiving/sending process, and the download service process.
- the package name and the application program have a one-to-one correspondence and are fixed; each UID can correspond to one or more applications, and the UID corresponding to the application program may change after the application program is uninstalled and reinstalled.
- the mobile phone can create one or more of the WeChat main interface process, the WeChat message receiving/sending process, and the WeChat tool process.
- each process in the first application program may apply for resources, and the resources may include the above-mentioned software resources and/or hardware resources to support the normal operation of various functional services of the first application program.
- the mobile phone saves resource application information, where the resource application information includes the corresponding relationship between the process in the first application program and the requested resource.
- the resource application information can be saved through the resource manager.
- the resource application information includes the corresponding relationship between the process in the first application program and the requested resource.
- the resource application information includes the process identity document (PID) and/or process name in the first application, and the corresponding relationship between the requested resource.
- the corresponding relationship may also include the package name and/or UID of the application.
- the corresponding relationship may also include related information such as application time and application duration of the resource applied for by the process.
- the package name of the first application program is package name 1, and the UID corresponding to the first application program is UID1.
- UID1 the UID corresponding to the first application program
- the resource manager may include an application-level resource management module and a process-level resource management control module.
- the corresponding process of step 402 and step 403 can be seen in Fig. 6B.
- the mobile phone displays the interface of the first application program.
- the interface of the first application program can be displayed on the screen.
- a schematic diagram of the mobile phone displaying the QQ interface in the foreground can be seen in Fig. 5B.
- the first application may first apply for resources and then display the interface, or may display the interface before applying for resources, which is not limited in the embodiment of this application.
- the mobile phone switches from running the first application program in the foreground to running the first application program in the background, and stops displaying the interface of the first application program.
- the mobile phone can run the first application program from the foreground and switch to the background operation of the first application program.
- the mobile phone when the first application is running in the foreground of the mobile phone, if the mobile phone detects the user's instruction to open another application, the mobile phone switches from running the first application in the foreground to running the first application in the background.
- the mobile phone when the first application is running in the foreground of the mobile phone, if the mobile phone detects an operation instructing to open the desktop by the user, the mobile phone switches from running the first application in the foreground to running the first application in the background.
- the mobile phone when the first application program is running in the foreground of the mobile phone, if the mobile phone detects the operation of the user instructing the screen to rest, the mobile phone switches from running the first application program in the foreground to running the first application program in the background.
- the mobile phone when the first application is running in the foreground of the mobile phone, if the mobile phone detects that the user has not used the mobile phone for a long time and automatically turns off the screen, the mobile phone switches from running the first application in the foreground to running the first application in the background.
- each process in the first application may also apply for resources, and the mobile phone may save the resource application information in the manner described in step 403.
- the mobile phone determines the critical process and the non-critical process in the first application.
- the mobile phone can determine the critical process and non-critical process in the first application, so that the mobile phone can use different control methods for resource management and control for the critical process and the non-critical process.
- the key process is an important process, or a process perceivable by the user. There are many ways for a mobile phone to determine critical processes and non-critical processes.
- the mobile phone saves a list of critical processes and a list of non-critical processes.
- the mobile phone may determine the key process in the first application program according to the key process list, and determine the non-critical process in the first application program according to the non-critical process list.
- a process white list and a process black list are saved on the mobile phone.
- the process whitelist includes multiple critical processes of multiple applications
- the process blacklist includes multiple non-critical processes of multiple applications. If the first process in the first application is in the process whitelist, the mobile phone determines that the first process is a key process. If the first application program determines that the first process is in the process blacklist, the mobile phone determines that the first process is a non-critical process.
- the QQ message receiving/sending process in the QQ process is in the white list, and the QQ message receiving/sending process is the key process.
- the QQ tool process in the QQ process is in the blacklist, so it is a non-critical process.
- the QQ message receiving/sending process in the QQ process is in the whitelist, and the QQ message receiving/sending process is the key process.
- the main QQ process, the QQ tool process, and the QQ space process in the QQ process are in the blacklist, so they are non-critical processes.
- the process in the application program has a priority
- the mobile phone can determine whether the process in the first application program is a critical process or a non-critical process according to the priority of the process.
- the priority of a process can be represented by the ADJ value corresponding to the process.
- a process with an ADJ value less than or equal to the value of FORREGROUND_APP_ADJ is a critical process; a process with an ADJ value greater than the value of FORREGROUND_APP_ADJ is a non-critical process.
- the mobile phone may determine whether the process in the first background application is a critical process or a non-critical process according to the group to which the process belongs. For example, in the Android operating system, processes in the SCHED_GROUP_BACKGROUND group are non-critical processes, and processes in other groups (for example, the SCHED_GROUP_FOREGROUND group) are key processes.
- the mobile phone may determine whether the process in the first background application is a critical process or a non-critical process according to the service type used by the process. For example, in the Android operating system, the process that uses the foreground service in the first application program is a critical process, and the process that does not use the foreground service is a non-critical process.
- the mobile phone may determine the critical process and the non-critical process according to the function or type of the first application program. For example, if the first application is an instant messaging application, the message receiving/sending process is a key process. For another example, if the first application is a navigation application, the navigation process is a key process.
- the mobile phone can learn and recognize whether the process is a critical process or a non-critical process according to the characteristics of the process.
- the cloud server can learn and identify whether the process is a critical process or a non-critical process according to the characteristics of the process, and the mobile phone can obtain the identification result of the process from the cloud server.
- the key process can usually be a background process that is perceivable by the user. If the background processes meet the target characteristics shown in Table 3, which are usually associated with the user’s perception, the mobile phone can determine that these processes are user-perceivable message receiving/sending processes, alarm clock processes, uploading/downloading processes, and audio playback Key processes such as class process or navigation class process.
- the mobile phone can collect heartbeats and network data packets according to the process, record notifications, vibrations, or collect other related information about the process.
- the mobile phone recognizes whether the process characteristics shown in Table 3 are satisfied according to the relevant information; if it is satisfied, the mobile phone determines that the process is a critical process; if not, the mobile phone determines that the process is a non-critical process.
- having network authority means that the process has the authority to use network resources and can use network resources normally.
- the mobile phone can collect heartbeats and network data packets according to the process, record notifications, vibrations, or collect other related information of the process, and upload it to the cloud server.
- the cloud server recognizes whether the process characteristics shown in Table 3 are satisfied according to the relevant information of the process; if it is satisfied, the cloud server determines that the process is a critical process; if it is not satisfied, the cloud server determines that the process is a non-critical process.
- the cloud server returns the identification result of the process to the mobile phone.
- the process of a mobile phone background application has the following characteristics: continuous sound playback, network, resident notification bar (that is, it often resides in the notification bar), and I/O operations.
- the mobile phone can determine that the process is a key process of the audio playback process.
- the mobile phone or cloud service determines whether the process is a critical process or a non-critical process according to the process characteristics. This can be done every time the first application enters the background; it can also be learned and trained in advance, and the process recognition training can be saved result. For example, key processes obtained by pre-learning and training can be stored in the aforementioned process whitelist, and non-key processes obtained by pre-learning and training can be stored in the aforementioned process blacklist.
- the mobile phone After determining the critical process and non-critical process in the first background application, the mobile phone executes step 407 and step 408 for the critical process and the non-critical process, respectively.
- the mobile phone adopts the first management and control method for resource management and control for key processes.
- the mobile phone uses the second management and control method for resource management and control for non-critical processes, and the second management and control method has a greater degree of resource management and control than the first management and control method for resources.
- the mobile phone can perform fine-grained management and control of the resource usage of the background application from the perspective of the process, and can perform different levels of resource management and control for the key and non-critical processes of the background application. Therefore, compared with the prior art allowing the normal resources of each process in the background application program, the resource management and control method provided in the embodiment of the present application can reduce the resource consumption of each background application program and reduce the power consumption of the electronic device.
- the mobile phone uses resource management to process the first application in the background to protect the process of the first application without killing the process of the first application, so that the first application can continue to run in the background and in the background.
- the first application is switched from the background to the foreground again, there is no need to load the process again, which can increase the speed at which the first application is started in the foreground, so that the interface of the first application is quickly displayed in the foreground.
- the mobile phone After the first application has just switched to the background, there is a high probability that the user wants to use the first application in the foreground again in a short time. For example, when the user uses WeChat, the mobile phone receives a short message; when the user views the short message, WeChat switches to the background; when the user uses WeChat again after viewing the short message, WeChat switches to the foreground again. Therefore, in some embodiments, after the first application is switched to the background, the mobile phone may not immediately perform steps 407-408, so that when the mobile phone switches the first application from the background to the foreground again in a short time, it can be guaranteed The first application in the foreground can run normally.
- the mobile phone can perform step 407-step 408 to update the first application in the background.
- the preset duration T when the first application is switched from the foreground to the background when the mobile phone is on, the user is more likely to want to use the first application in the foreground again in a short period of time, and the preset duration T may be T1, T1 can be longer, for example, T1 can be 1 min. In the case that the first application is switched from the foreground to the background by the screen of the mobile phone, the probability that the user wants to use the first application in the foreground again in a short period of time is relatively small.
- the preset duration T can be T2, and T2 can be shorter. For example, T2 can be 6s.
- the phone When the phone is on, the first application is switched from the foreground to the background, and then the phone is off, if T1 ends before T2, the phone executes step 407-step 408 when T1 ends; if T2 ends before T1, Then the mobile phone executes step 407-step 408 at the end of T2.
- T1 is 1min
- T2 is 6s
- the first application is switched to the background at time t1; after 20s (less than T1) after t1, that is, at time t2, the phone screen is off; after the screen is off, 6s( That is, at time t3 after the preset time period T2), the mobile phone executes step 407 to step 408.
- the time interval between time t3 and time t1 is less than 1 min.
- the mobile phone may not immediately perform step 406; after the first application is switched to the background and the preset time period T has elapsed, the user may not want to be in the foreground again in a short time.
- the first application program is used, so the mobile phone can perform step 406 to step 408 to perform resource management and control on the key processes and non-critical processes in the background first application program.
- the first management and control method is that the mobile phone allows the key processes of the first application in the background to use various resources normally, including the normal use of the resources that have been applied for, and the normal application of various resources, so that the first application The key process can run normally in the background. That is to say, the mobile phone does not limit the resource usage of the key process of the first application, and the first management and control method may be a control-independent method. Among them, the mobile phone can determine the corresponding relationship between the key process and the requested resource according to the resource application information.
- the first management and control mode is a weak management and control mode. That is, the mobile phone controls the key processes of the first application program in the background to a lesser degree and with less intensity, so as to make the key processes of the first application program continue to run in the background as far as possible. Specifically, the mobile phone can perform weak control over the key process according to the process identifier or process name of the key process.
- the mobile phone's weak management and control methods for key processes can include: unify Alarm heartbeat according to the process; keep the TCP connection alive according to the process, and the TCP connection is continuously connected; does not limit the network permissions of the process; Use of resources such as job/broadcasting. In other words, weakly control the Alarm resources of key processes, allowing key processes to use other resources normally.
- Alarm heartbeat is a heartbeat mechanism based on Alarm resources.
- Unifying the Alarm heartbeat by process means that the heartbeat packets based on Alarm resources are unified by process, that is, the heartbeat packets in the current key process are sent according to the preset cycle T3.
- the heartbeat packet refers to a custom command word between the client and the server to notify the other party of their own status at regular intervals, which is similar to the heartbeat, so it is called the heartbeat packet.
- Keep-alive TCP connection by process means that the TCP connection of the current key process is kept alive, and the Socket link used to realize the TCP connection is not broken.
- the application (that is, the client (Client)) sends a keepalive data packet, that is, a heartbeat packet, to the server (Server).
- a keepalive data packet that is, a heartbeat packet
- the server sends a keepalive data packet to the server (Server).
- the client periodically wakes up the operating system through the Alarm. After the operating system is woken up, the client sends a heartbeat packet to the server, handshake with the server; and receives an acknowledgement (ACK) packet returned by the server.
- ACK acknowledgement
- the mobile phone running the client will remind the user, including multiple reminders such as notification bar message reminders, ring reminders or vibration reminders.
- the heartbeat packets of different key processes in the same application in the background can be sent in the same preset period T3 (for example, 5 min), which can reduce the number of times the operating system is awakened and reduce the power consumption of the mobile phone. .
- the heartbeat packets of different key processes in different applications in the background of the mobile phone can be sent in the same preset period T3, which can reduce the number of times the operating system is awakened and reduce the power consumption of the mobile phone.
- the second control method is a strong control method, that is, the mobile phone controls the non-critical processes of the first application program in the background to a greater degree and with greater intensity.
- the second control method is to restrict non-critical processes from using resources, including releasing resources requested by non-critical processes, that is, restrict non-critical processes from using resources that have been applied for, and restrict non-critical processes from applying for resources.
- resources including releasing resources requested by non-critical processes, that is, restrict non-critical processes from using resources that have been applied for, and restrict non-critical processes from applying for resources.
- the mobile phone can determine the correspondence between the non-critical process and the requested resource according to the resource application information.
- the strong control methods can include: pause Alarm heartbeat according to process; disconnect TCP connection according to process; limit network permissions according to process; buffer or discard broadcast according to process; pause GNSS/Wakelock/Job/ according to process Use of resources such as broadcasting.
- suspending the Alarm heartbeat by process means stopping the current non-critical process based on the Alarm heartbeat packet.
- the TCP connection is through the Socket link for information exchange, and the TCP connection is disconnected according to the process, that is, the Socket link corresponding to the TCP connection of the current non-critical process is disconnected.
- Restricting network permissions by process refers to restricting the use of network resources by current non-critical processes.
- Suspending resources such as GNSS/Wakelock/Job/broadcast by process means that the current non-critical processes are prohibited from using resources such as GNSS/Wakelock/Job/broadcast.
- suspending broadcast resources by process includes caching or discarding broadcast content of current non-critical processes.
- a process may include multiple Socket links.
- the Socket link is disconnected, a four-way handshake interaction is required between the mobile phone and the server, and multiple data packets need to be sent.
- the disconnection time of different Socket links in the process is different. For example, after the Socket link has no message interaction time greater than or equal to the preset duration T4 (for example, it can be 8 minutes), the four-way handshake can be disconnected.
- T4 for example, it can be 8 minutes
- the Socket links in the same non-critical process can be disconnected uniformly at the same time. For example, after determining that the current process is a critical process, and the first application program enters the background for T duration, the mobile phone may uniformly disconnect the Socket links in the non-critical process. When the unified link is disconnected, the mobile phone can send a reset message (or RST packet) to the server.
- the reset message includes the source and destination IP addresses and port numbers of the Socket links in the non-critical process to notify The server uniformly disconnects the Socket link in the process. Therefore, the disconnection process does not require multiple message interactions, consumes less resources, and consumes less power.
- each QQ process creates multiple Socket links for TCP connections. For example, each QQ process creates 28 Socket links for TCP connections, of which 27 Socket links are created by the tool process application, and the other Socket link is created by the message receiving/sending process. If the method in the prior art is adopted, after QQ enters the background, the mobile phone allows each process of QQ to use resources normally according to the package name or UID, that is, all 28 Socket links are reserved.
- the key process of QQ includes the message receiving/sending process
- the non-critical process includes the tool process.
- the mobile phone can allow the key process message receiving/sending process to normally use the 1 Socket link created, and disconnect the 27 Socket links created by the non-critical process tool process.
- the resource consumption of the background QQ can be reduced, and the power consumption of the mobile phone can be reduced.
- the Socket links in the non-critical processes in the same application can be disconnected at the same time.
- resource consumption can be reduced more, and the power consumption of the mobile phone can be reduced.
- the second management and control method is to restrict non-critical processes from using one or more resources.
- mobile phones can restrict non-critical processes from using Socket links and network resources, but allow non-critical processes to use Alarm resources normally.
- the mobile phone can further reduce resource consumption and power consumption. For example, if only the network permissions of non-critical processes are restricted and the TCP connection of non-critical processes is not disconnected, the mobile phone will still try to receive/send messages through the TCP connection. These messages are blocked at the network firewall of the mobile phone, but the mobile phone is still consumed. More resources and power consumption. If only the TCP connection of the non-critical process is disconnected, and the network permissions of the non-critical process are not restricted, the non-critical process may try to re-establish the TCP connection after disconnecting the TCP connection, which will consume more resources and power consumption of the mobile phone. .
- the key process may include multiple levels, the higher the level, the more important the key process, or the higher the level, the easier the function service of the key process is to be perceived by the user.
- Different levels of key processes can correspond to different first management and control methods.
- the higher the level of the key process the smaller the control intensity of the corresponding first control method. This can minimize the resource consumption of other processes and reduce the power consumption of the mobile phone on the basis of ensuring the normal operation of the key process with a high level.
- the key process includes the first level, the second level, and the third level in descending order.
- Alarm heartbeat as an example.
- the mobile phone In the first control mode corresponding to the first level, the mobile phone does not control the Alarm heartbeat cycle in this critical process, that is, it does not control the use of Alarm resources; in the second level, the first control mode corresponds to In the key process, the alarm heartbeat cycle is 5min; in the first control mode corresponding to the third level, the alarm heartbeat cycle in the key process is 10min.
- the non-critical process may include multiple levels, and the lower the level of the non-critical process is, the less important it is, or the higher the level of the key process, the less likely it is to be perceived by the user.
- Different levels of non-critical processes can correspond to different second management and control methods.
- the lower the level of non-critical processes the greater the control intensity of the corresponding second control method, which can minimize the resource consumption of unimportant non-critical processes and reduce the power consumption of mobile phones.
- non-critical processes include first and second levels ranked from high to low.
- the mobile phone periodically restricts the use of resources by non-critical processes, that is, periodically allows and restricts the use of resources by non-critical processes.
- the mobile phone in the second management and control mode corresponding to the first level, the mobile phone periodically restricts the network permissions of non-critical processes, that is, periodically allows and restricts the use of network resources by non-critical processes.
- the mobile phone restricts the use of resources (such as network resources, etc.) by non-critical processes.
- different key processes of the background application program may correspond to different key resources, and the key resources are used to support the main functions of the key process.
- the mobile phone can not control the key resources of the key process, and weakly or strongly control other resources, so as to reduce the resource and power consumption of the mobile phone by minimizing the use of resources.
- the message receiving/sending process is usually a key process, and the key resources corresponding to the message receiving/sending process include the TCP connection resources used to support the message receiving/sending function. , Network resources and Alarm resources.
- the mobile phone can allow the message receiving/sending process in the instant messaging application to use TCP connection resources, network resources, and Alarm resources normally; and weakly or strongly control other resources (such as GPS resources, broadcast resources, etc.) requested by the message receiving/sending process. Management and control (such as restricting or periodically restricting the use of other resources requested by the message receiving/sending process).
- the navigation process is usually a key process
- the key resources corresponding to the navigation process include GNSS resources and network resources for supporting navigation functions.
- the mobile phone can allow the navigation process in the navigation application program to use GNSS resources normally, and weakly or strongly control other resource processes applied for by the navigation process.
- the navigation application program 1 may include a navigation application main process, a navigation process, a push message process, and the like.
- the navigation process is a key process
- the key resources in the navigation process include GNSS resources and network resources.
- the navigation application 2 may include a navigation application main process, a map navigation process, a patch update process, and so on.
- the map navigation process is a key process, and the key resources of the navigation process include GNSS resources and network resources.
- the playback process is usually a key process
- the key resources corresponding to the playback process include audio resources for supporting the audio playback function.
- the key resource may also include network resources.
- the mobile phone can allow the playback process in the audio playback application to use audio resources normally, and weakly or strongly control other resource processes requested by the playback process.
- the audio playback application program 1 and the audio playback application program 2 may include an application main process and a playback process.
- the playback process is the key process
- the audio resources in the playback process are the key resources.
- the mobile phone may not perform resource management and control, or the mobile phone may use a preset resource management method (for example, the resource management method in the prior art) to control it. Carry out resource management and control.
- the QQ message receiving/sending process in QQ is a critical process
- the QQ tool process is a non-critical process
- other processes such as the QQ main process and the QQ space process are critical processes and other processes other than non-critical processes.
- the mobile phone may not perform resource management and control on other processes such as the QQ main process and the QQ space process, or the mobile phone may use the resource management method in the prior art to perform resource management and control on other processes such as the QQ main process and the QQ space process.
- the method may further include:
- the mobile phone switches from running the first application program in the background to running the first application program in the foreground.
- each process in the first application program can use various resources normally to realize various functions and services of the first application program.
- the mobile phone switches from running the first application program in the foreground to running the first application program in the background again.
- the mobile phone can use the resource management and control method described in the above embodiment to perform resource management and control on key processes and non-critical processes.
- the mobile phone can execute the direct step 407 and step 408, so as to check the information in the background first application. Resource management and control for critical and non-critical processes.
- the mobile phone can perform step 406-step 408 to determine the critical process and non-critical process of the first background application program, and compare the critical process and non-critical process of the first background application program. Carry out resource management and control.
- the above description is mainly based on an example in which the electronic device is a mobile phone.
- the resource management and control method provided in the embodiment of the present application can also be applied to other electronic devices such as tablets, and will not be repeated here.
- an embodiment of the present application also provides an electronic device, including a detection unit, a creation unit, a storage unit, a display unit, a switching unit, a determination unit, and a management and control unit.
- Each unit can cooperate with each other to make the electronic device perform the above-mentioned embodiments.
- Each step of the implementation of the above-mentioned resource management and control method is also provided.
- the embodiments of the present application also provide an electronic device, including one or more processors; a memory; and one or more computer programs.
- One or more computer programs are stored in the memory, and the one or more computer programs include instructions.
- the electronic device is caused to execute each step in the foregoing embodiment, so as to implement the foregoing resource management and control method.
- the embodiment of the present application also provides a computer storage medium, the computer storage medium stores computer instructions, when the computer instructions run on the electronic device, the electronic device executes the above-mentioned related method steps to realize the resource management and control in the above-mentioned embodiment method.
- the embodiments of the present application also provide a computer program product, which when the computer program product runs on a computer, causes the computer to execute the above-mentioned related steps, so as to realize the resource management and control method executed by the electronic device in the above-mentioned embodiment.
- the embodiments of the present application also provide a device.
- the device may specifically be a chip, component or module.
- the device may include a processor and a memory connected to each other.
- the memory is used to store computer execution instructions.
- the processor can execute the computer-executable instructions stored in the memory, so that the chip executes the resource management and control methods executed by the electronic device in the foregoing method embodiments.
- the electronic devices, computer storage media, computer program products, or chips provided in the embodiments of the present application are all used to execute the corresponding methods provided above. Therefore, the beneficial effects that can be achieved can refer to the corresponding methods provided above. The beneficial effects of the method are not repeated here.
- the disclosed device and method can be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods, for example, multiple units or components may be divided. It can be combined or integrated into another device, or some features can be omitted or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate parts may or may not be physically separate.
- the parts displayed as units may be one physical unit or multiple physical units, that is, they may be located in one place, or they may be distributed to multiple different places. . Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a readable storage medium.
- the technical solutions of the embodiments of the present application are essentially or the part that contributes to the prior art, or all or part of the technical solutions can be embodied in the form of a software product, and the software product is stored in a storage medium. It includes several instructions to make a device (may be a single-chip microcomputer, a chip, etc.) or a processor (processor) execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read only memory (read only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program codes.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Environmental & Geological Engineering (AREA)
- Telephone Function (AREA)
Abstract
La présente invention concerne un procédé et un dispositif de gestion et de commande de ressources, ceux-ci se rapportant au domaine technique de l'électronique. La granularité fine peut être gérée et commandée pour une utilisation de ressources selon un processus dans un programme d'application d'arrière-plan, ce qui permet de réduire la consommation de ressources du programme d'application d'arrière-plan et de réduire la consommation d'énergie d'un dispositif électronique. La solution spécifique comprend les étapes consistant à : afficher par un dispositif électronique une interface d'un premier programme d'application ; commuter le dispositif électronique entre un état dans lequel un premier plan exécute le premier programme d'application et un état dans lequel un arrière-plan exécute le premier programme d'application, et arrêter l'affichage de l'interface du premier programme d'application ; déterminer par le dispositif électronique un processus clé et un processus non-clé dans le premier programme d'application ; et effectuer par le dispositif électronique à l'aide respectivement d'un premier mode de gestion et de commande et d'un second mode de gestion et de commande, un traitement de ressources sur le processus clé et le processus non-clé, le degré de gestion et de commande du second mode de gestion et de commande pour des ressources étant supérieur à celui du premier mode de gestion et de commande. Les modes de réalisation de la présente invention sont utilisés pour la gestion et la commande de ressources.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910834397.7 | 2019-09-05 | ||
CN201910834397 | 2019-09-05 | ||
CN201910877656.4A CN110806926A (zh) | 2019-09-05 | 2019-09-17 | 一种资源管控方法及设备 |
CN201910877656.4 | 2019-09-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021043046A1 true WO2021043046A1 (fr) | 2021-03-11 |
Family
ID=69487530
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/111494 WO2021043046A1 (fr) | 2019-09-05 | 2020-08-26 | Procédé et dispositif de gestion et de commande de ressources |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110806926A (fr) |
WO (1) | WO2021043046A1 (fr) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110806926A (zh) * | 2019-09-05 | 2020-02-18 | 华为技术有限公司 | 一种资源管控方法及设备 |
CN113672445B (zh) * | 2020-05-13 | 2024-09-24 | 华为技术有限公司 | 记录目标程序运行状态信息的方法以及电子设备 |
CN114625525A (zh) * | 2020-12-14 | 2022-06-14 | 华为技术有限公司 | 一种资源管控方法及设备 |
CN113568748B (zh) * | 2021-07-27 | 2024-06-18 | Oppo广东移动通信有限公司 | 一种应用进程处理方法、装置、存储介质及电子设备 |
CN116567132A (zh) * | 2022-01-28 | 2023-08-08 | 荣耀终端有限公司 | 一种功耗控制方法及装置 |
CN116055546A (zh) * | 2022-07-21 | 2023-05-02 | 荣耀终端有限公司 | 进程管理方法、电子设备、存储介质及程序产品 |
CN117632393A (zh) * | 2022-08-12 | 2024-03-01 | 华为技术有限公司 | 资源管控方法、电子设备、存储介质及程序产品 |
CN117931418A (zh) * | 2022-10-26 | 2024-04-26 | 荣耀终端有限公司 | 资源管控方法、装置、芯片、电子设备及介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102981906A (zh) * | 2012-11-16 | 2013-03-20 | 广东欧珀移动通信有限公司 | 一种应用程序后台进程管理方法及装置 |
US20150347181A1 (en) * | 2014-05-30 | 2015-12-03 | Apple Inc. | Resource management with dynamic resource policies |
CN107479953A (zh) * | 2017-07-31 | 2017-12-15 | 广东欧珀移动通信有限公司 | 进程管理方法、装置、存储介质及电子设备 |
CN109992398A (zh) * | 2017-12-29 | 2019-07-09 | 广东欧珀移动通信有限公司 | 资源管理方法、装置、移动终端及计算机可读存储介质 |
CN110018905A (zh) * | 2018-01-10 | 2019-07-16 | 广东欧珀移动通信有限公司 | 信息处理方法、装置、计算机设备和计算机可读存储介质 |
CN110806926A (zh) * | 2019-09-05 | 2020-02-18 | 华为技术有限公司 | 一种资源管控方法及设备 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103164229A (zh) * | 2013-04-08 | 2013-06-19 | 北京奇虎科技有限公司 | 一种清理移动终端进程的方法及装置 |
CN104050035B (zh) * | 2014-05-14 | 2018-05-25 | 小米科技有限责任公司 | 应用程序的处理方法及装置 |
CN107807847B (zh) * | 2016-09-09 | 2022-04-29 | 华为技术有限公司 | 应用进程的管理方法和终端设备 |
CN108804207A (zh) * | 2017-04-28 | 2018-11-13 | 珠海全志科技股份有限公司 | 一种基于Android系统的进程管控方法 |
CN109992399B (zh) * | 2017-12-29 | 2021-04-23 | Oppo广东移动通信有限公司 | 资源管理方法、装置、移动终端及计算机可读存储介质 |
-
2019
- 2019-09-17 CN CN201910877656.4A patent/CN110806926A/zh active Pending
-
2020
- 2020-08-26 WO PCT/CN2020/111494 patent/WO2021043046A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102981906A (zh) * | 2012-11-16 | 2013-03-20 | 广东欧珀移动通信有限公司 | 一种应用程序后台进程管理方法及装置 |
US20150347181A1 (en) * | 2014-05-30 | 2015-12-03 | Apple Inc. | Resource management with dynamic resource policies |
CN107479953A (zh) * | 2017-07-31 | 2017-12-15 | 广东欧珀移动通信有限公司 | 进程管理方法、装置、存储介质及电子设备 |
CN109992398A (zh) * | 2017-12-29 | 2019-07-09 | 广东欧珀移动通信有限公司 | 资源管理方法、装置、移动终端及计算机可读存储介质 |
CN110018905A (zh) * | 2018-01-10 | 2019-07-16 | 广东欧珀移动通信有限公司 | 信息处理方法、装置、计算机设备和计算机可读存储介质 |
CN110806926A (zh) * | 2019-09-05 | 2020-02-18 | 华为技术有限公司 | 一种资源管控方法及设备 |
Also Published As
Publication number | Publication date |
---|---|
CN110806926A (zh) | 2020-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020259452A1 (fr) | Procédé d'affichage plein écran pour terminal mobile et appareil | |
WO2021043046A1 (fr) | Procédé et dispositif de gestion et de commande de ressources | |
WO2021052263A1 (fr) | Procédé et dispositif d'affichage d'assistant vocal | |
WO2021000807A1 (fr) | Procédé et appareil de traitement pour un scénario d'attente dans une application | |
EP4084486B1 (fr) | Procédé de projection de contenu inter-dispositif et dispositif électronique | |
WO2021185141A1 (fr) | Procédé et système d'établissement de liaison sensible au wi-fi, dispositif électronique et support de stockage | |
WO2021052410A1 (fr) | Procédé et appareil de gestion d'application | |
WO2021047567A1 (fr) | Procédé et dispositif de traitement de flux de rappel | |
WO2020150917A1 (fr) | Procédé de gestion d'autorisation d'application et dispositif électronique | |
WO2021253975A1 (fr) | Procédé et appareil de gestion d'autorisation pour application, et dispositif électronique | |
WO2022033320A1 (fr) | Procédé de communication bluetooth, équipement terminal et support d'enregistrement lisible par ordinateur | |
WO2022042770A1 (fr) | Procédé de commande d'état de service de communication, dispositif terminal et support de stockage lisible | |
WO2021258795A1 (fr) | Procédé d'invocation de capacité atomique et dispositif terminal | |
WO2021017935A1 (fr) | Procédé de gestion de verrouillage d'activation et dispositif électronique | |
WO2022170856A1 (fr) | Procédé d'établissement de connexion et dispositif électronique | |
WO2023005282A9 (fr) | Procédé et appareil de poussée de message | |
WO2022017474A1 (fr) | Procédé de traitement de tâches et appareil associé | |
WO2022042637A1 (fr) | Procédé de transmission de données à base de bluetooth et appareil associé | |
WO2022170854A1 (fr) | Procédé d'appel vidéo et dispositif associé | |
WO2021197071A1 (fr) | Système et procédé de communication sans fil | |
KR102524305B1 (ko) | 연결 구축 방법 및 단말 장치 | |
WO2022252972A1 (fr) | Procédé d'affichage de fenêtre et dispositif électronique | |
CN114500732B (zh) | 一种界面显示的方法和电子设备、存储介质 | |
WO2022188511A1 (fr) | Procédé et appareil d'activation d'assistant vocal | |
WO2023160205A1 (fr) | Procédé de commande de processus, dispositif électronique et support de stockage lisible |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20861479 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20861479 Country of ref document: EP Kind code of ref document: A1 |