CN107291543B - Application processing method and device, storage medium and terminal - Google Patents

Application processing method and device, storage medium and terminal Download PDF

Info

Publication number
CN107291543B
CN107291543B CN201710644138.9A CN201710644138A CN107291543B CN 107291543 B CN107291543 B CN 107291543B CN 201710644138 A CN201710644138 A CN 201710644138A CN 107291543 B CN107291543 B CN 107291543B
Authority
CN
China
Prior art keywords
application
closed
closing priority
closing
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201710644138.9A
Other languages
Chinese (zh)
Other versions
CN107291543A (en
Inventor
杜冰
张俊
林志泳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710644138.9A priority Critical patent/CN107291543B/en
Publication of CN107291543A publication Critical patent/CN107291543A/en
Application granted granted Critical
Publication of CN107291543B publication Critical patent/CN107291543B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/485Task life-cycle, e.g. stopping, restarting, resuming execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of a power-saving mode
    • G06F1/3234Power saving characterised by the action undertaken
    • G06F1/329Power saving characterised by the action undertaken by task scheduling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44594Unloading

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses an application program processing method, an application program processing device, a storage medium and a terminal; the method comprises the steps of acquiring the current background running time length of a background application program, adding the background application program into an application set to be closed when the current background running time length is longer than a preset time length, acquiring the security level of the application program to be closed in the application set, setting the closing priority of the application program to be closed according to the security level of the application program to be closed and the background running time length of the application program to be closed, and closing the application program to be closed in the application set according to the closing priority of the application program to be closed; according to the scheme, the background application program can be closed based on the security level of the background application program and the background running time, so that the security of the application program is improved, and the terminal resources are saved.

Description

Application processing method and device, storage medium and terminal
Technical Field
The invention relates to the field of mobile communication, in particular to an application program processing method, an application program processing device, a storage medium and a terminal.
Background
With the development of terminal technology, mobile terminals have begun to change from simply providing telephony devices to a platform for running general-purpose software. The platform no longer aims at providing call management, but provides an operating environment including various application software such as call management, game and entertainment, office events, mobile payment and the like, and with a great deal of popularization, the platform has been deeply developed to the aspects of life and work of people.
At present, when some important application programs run in the background of a terminal, if a terminal system is attacked from the outside, the security of the application programs can be seriously threatened.
Disclosure of Invention
The embodiment of the invention provides an application program processing method, an application program processing device, a storage medium and a terminal, which can improve the safety of an application program.
In a first aspect, an embodiment of the present invention provides an application processing method, including:
acquiring the current running time of a background application program in the background;
when the duration is longer than the preset duration, adding the background application program into an application set to be closed;
acquiring the security level of an application program to be closed in the application set;
setting the closing priority of the application program to be closed according to the security level of the application program to be closed and the background running time of the application program to be closed;
and closing the application programs to be closed in the application set according to the closing priority of the application programs to be closed.
In a second aspect, an embodiment of the present invention further provides an application processing apparatus, including:
the duration acquisition module is used for acquiring the current running duration of the background application program in the background;
the adding module is used for adding the background application program into an application set to be closed when the duration is greater than a preset duration;
the level acquisition module is used for acquiring the security level of the application program to be closed in the application set;
the level setting module is used for setting the closing priority of the application program to be closed according to the security level of the application program to be closed and the background running time of the application program to be closed;
and the closing module is used for closing the application programs to be closed in the application set according to the closing priority of the application programs to be closed.
In a third aspect, the present invention further provides a storage medium, where the storage medium stores instructions, and the instructions, when executed by a processor, implement the steps of the application processing method provided in any one of the embodiments of the present invention.
In a fourth aspect, an embodiment of the present invention further provides a terminal, including a memory and a processor, where the memory stores instructions, and the processor loads the instructions to execute the steps of the application processing method provided in any one of the embodiments of the present invention.
The method comprises the steps of acquiring the current background running time length of a background application program, adding the background application program into an application set to be closed when the current background running time length is longer than a preset time length, acquiring the security level of the application program to be closed in the application set, setting the closing priority of the application program to be closed according to the security level of the application program to be closed and the background running time length of the application program to be closed, and closing the application program to be closed in the application set according to the closing priority of the application program to be closed; according to the scheme, the background application program can be closed based on the security level of the background application program and the background running time, so that the security of the application program is improved, and the terminal resources are saved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart illustrating an application processing method according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a display interface of a background application according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of a display interface of a background application according to an embodiment of the present invention.
Fig. 4 is another flowchart illustrating an application processing method according to an embodiment of the present invention.
Fig. 5 is a schematic structural diagram of an application processing apparatus according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a second application processing apparatus according to an embodiment of the present invention.
Fig. 7 is a schematic structural diagram of a third application processing apparatus according to an embodiment of the present invention.
Fig. 8 is a schematic diagram of a fourth structure of an application processing apparatus according to an embodiment of the present invention.
Fig. 9 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Fig. 10 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
Referring to the drawings, wherein like reference numbers refer to like elements, the principles of the present invention are illustrated as being implemented in a suitable computing environment. The following description is based on illustrated embodiments of the invention and should not be taken as limiting the invention with regard to other embodiments that are not detailed herein.
In the description that follows, specific embodiments of the present invention are described with reference to steps and symbols executed by one or more computers, unless otherwise indicated. Accordingly, these steps and operations will be referred to, several times, as being performed by a computer, the computer performing operations involving a processing unit of the computer in electronic signals representing data in a structured form. This operation transforms the data or maintains it at locations in the computer's memory system, which may be reconfigured or otherwise altered in a manner well known to those skilled in the art. The data maintains a data structure that is a physical location of the memory that has particular characteristics defined by the data format. However, while the principles of the invention have been described in language specific to above, it is not intended to be limited to the specific form set forth herein, but on the contrary, it is to be understood that various steps and operations described hereinafter may be implemented in hardware.
The principles of the present invention are operational with numerous other general purpose or special purpose computing, communication environments or configurations. Examples of well known computing systems, environments, and configurations that may be suitable for use with the invention include, but are not limited to, hand-held telephones, personal computers, servers, multiprocessor systems, microcomputer-based systems, mainframe-based computers, and distributed computing environments that include any of the above systems or devices.
The details will be described below separately.
The embodiment will be described from the perspective of an application processing apparatus, which may be specifically integrated in a terminal, where the terminal may be an electronic device such as a smart phone and a tablet computer.
In an embodiment, an embodiment of the present invention provides an application processing method, and referring to fig. 1, a specific flow of the application processing method is as follows:
101. and acquiring the current running time of the background application program in the background.
The background application program is an application program which runs in the background of the terminal system at present.
The current background running time of the background application program is the time difference from the starting time of the background application program entering the background running to the current time.
In practical application, the current background running duration of each background application may be obtained, for example, referring to fig. 2, the current background running durations of the background application a, the background application B, the background application C, the background application D, and the background application E may be obtained respectively.
102. And when the duration is greater than the preset duration, adding the background application program into the application set to be closed.
That is, the application program which runs in the background currently and has the duration longer than the preset duration is selected from the background application programs and added into the application set to be closed.
The preset time period may be set according to actual requirements, such as 1 minute, 2 minutes, and the like.
For example, the duration of the background application a currently running in the background is 70s, and if the preset duration is 60s, the background application a may be added to the application set to be closed.
The application set is an application set needing to be closed, the initial stage of the application set can be an empty set, when a background application program is added, the application set comprises at least one background application program, and the background application program in the application set is the application program to be closed.
In one embodiment, the application set may not be empty in the initial stage, for example, including a specified background application to be closed, and so on.
For example, after adding background application A, B, C to an empty application set, the application set includes background application A, B, C, and background application A, B, C is the application to be closed.
In one embodiment, the application set may include not only background applications, but also foreground applications, and the like.
103. And acquiring the security level of the application program to be closed in the application set.
For example, the security level of each application to be closed in the application set may be obtained.
Wherein the security level indicates the security level of the application program, i.e. the importance level of the application program. Higher security levels represent higher importance programs of the application level, which need to be closed in time; whereas a lower security level indicates a lower importance of the application, such applications may be closed later.
The security level may be characterized by a level identifier, which may be a character, such as a number, a letter, a word, or the like. Wherein, the level of security can be represented by the relationship between the level identifiers.
For example, in one embodiment, the security levels may include: security level 1, security level 2, security level 3, etc., where the level may be represented by the size of the number. For another example, in one embodiment, the security level may include: security level a, security level b, security level c … …, wherein the level may be represented by letter sequence.
In one embodiment, the security level of the application program may be set based on the type of the application program, for example, the application program on the terminal may be classified, and then the security level of the application program may be set according to the type of the application program. That is, before step 101, the application processing method according to the embodiment of the present invention may further include:
acquiring the type of an application program in a terminal;
the security level of the application is set according to the type to which the application belongs.
The classification rule for classifying the application may be set according to actual requirements, and for example, the classification may be performed based on the application purpose, the provider of the application, the size of the application, the importance of the application, the type of the application, and the like.
For example, applications can be divided into: financial, social, reading, gaming, etc.; applications can also be divided according to importance into: generally important, more important, very important, etc.
For example, in application partitioning: the security level of the financial application program can be set to a first level, the security level of the social application program can be set to a second level, the security level of the reading application program can be set to the first level, the security level of the game application program can be set to the second level, and the like, wherein the levels of the first level, the second level, the first level and the second level can be sequentially decreased or sequentially increased, and the levels can be set according to actual requirements.
For example, when the application is classified into general important, relatively important, and very important, the security level of the very important application may be set to the highest level, the security level of the general important application may be set to the lowest level, and the relatively important security level may be set to the intermediate level.
104. And setting the closing priority of the application program to be closed according to the security level of the application program to be closed and the background running time length of the application program to be closed.
The closing priority of the application program represents the closing sequence of the application program, and the higher the closing priority, the more the application program is closed
The priority may be characterized by a priority identifier, which may be a character, such as a number, a letter, a word, or the like. Wherein, the high or low of the priority can be represented by the relationship between the identifiers.
For example, in one embodiment, the priorities may include: priority 1, priority 2, priority 3, etc., where the level of priority may be represented by the size of the number. For another example, in one embodiment, the security level may include: priority a, priority b, priority c … …, wherein the priority may be represented by letter order.
For example, in an embodiment, the applications may be sorted based on the security level and the background running duration, and then the closing priority of the application program to be closed is set based on the sorting result. For example, the step "setting the closing priority of the application to be closed according to the security level of the application to be closed and the time length of the application to be closed running in the background" may include:
acquiring a sequencing parameter of the application program to be closed according to the security level of the application program to be closed and the background running time of the application program to be closed;
sequencing the application programs to be closed in the application set according to the sequencing parameters of the application programs to be closed to obtain a sequencing result;
and setting the closing priority of the application programs to be closed in the application set according to the sequencing result.
The sorting parameter is a parameter for indicating the sorting of the applications to be closed, and may be a numerical value.
There are various ways to obtain the ranking parameters based on the security level of the background application and the running time length in the background, for example, quantizing the security level into a first value, quantizing the running time length in the background into a second value, and then obtaining the ranking parameters based on the first value and the second value. For example, an average of the first and second values or a weighted sum of the first and second values may be calculated, and the average or the weighted sum may be used as the ranking parameter.
For example, assuming that the security level of the application to be closed is 3 and the duration of the background operation is 67 seconds, the security level may be quantized to a first value of 3, the duration may be quantized to a second value of 67, and then the average value is calculated to be 35, and then the ranking parameter is 35.
In an embodiment, after the sorting, the closing priority of the application to be closed may be set according to the position of the application to be closed in the application set (e.g., the application list), for example, the closer the position of the application to be closed in the application set (e.g., the application list) is, the higher the closing priority of the application to be closed may be set; i.e., the higher the security level the higher the shutdown priority.
Alternatively, the closer the position of the application to be closed in the application set (e.g., the application list), the higher the closing priority of the application to be closed, that is, the lower the security level, the higher the closing priority.
For example, the security level of the application a to be closed is 1, the background running time is 63s, the security level of the application B to be closed is 3, the background running time is 41s, the security level of the application C to be closed is 2, the background running time is 54s, the security level of the application D to be closed is 4, and the background running time is 30 s. Through the sorting parameter algorithm, it can be calculated that the sorting value of the application program a to be closed is 32, the sorting value of the application program B to be closed is 22, the sorting value of the application program C to be closed is 28, and the sorting value of the application program D to be closed is 17.
After the sorting parameters are obtained, the application programs can be sorted from top to bottom according to the sorting number values, and a sorted application set { application program to be closed A, application program to be closed C, application program to be closed B, application program to be closed D } is obtained.
At this time, the closing priority of the application may be set from high to low according to the closing priority, for example, the closing priority of the application a to be closed is set to be the highest, that is, the priority is a, the closing priority of the application C to be closed is set to be the second highest closing priority, that is, the priority is C, the closing priority of the application B to be closed is set to be the first highest closing priority, that is, the priority is B, and the closing priority of the application D to be closed is set to be the lowest, that is, the priority is D.
In an embodiment, the closing priority may also be set based on a level range in which the security level falls and a duration range in which the background running duration falls; that is, the step "setting the closing priority of the application to be closed according to the security level of the application to be closed and the time length of the application to be closed running in the background" may include:
determining a preset grade range in which the safety grade falls;
determining a preset time length range in which the time length falls;
acquiring a first closing priority corresponding to a preset grade range and a second closing priority corresponding to a preset duration range;
and when the first closing priority is the same as the second closing priority, setting the closing priority of the application program to be closed as the first closing priority.
In this way, the closing priority of each application program to be closed in the application set can be set. The preset level range may be set according to actual requirements, for example, the preset level range may be a numerical range such as [1,3] when the security level is represented by a number, or a letter range such as [ b, g ] when the security level is represented by a letter, or the like. The duration range can also be set according to actual requirements, such as [20s, 40s ], and the like.
For example, the security level of the application program a to be closed is 2, the background running time length is 63s, the security level falls between the preset level ranges [1,3], the background running time length falls within the preset time length ranges [60s,120s ], at this time, the first closing priority corresponding to the preset level ranges [1,3] may be obtained as a, and the second closing priority corresponding to the preset time length ranges [60s,120s ] may also be obtained as a. As can be seen, the first closing priority is the same as the second closing priority, and is a, and at this time, the closing priority of the application a to be closed may be set to be a. The closing priority of the application to be closed B, C, D may be set in the same manner.
In an embodiment, if the first closing priority is different from the second closing priority, the closing priority of the application program to be closed can be set to be an intermediate priority between the first closing priority and the second closing priority; that is, the step "setting the closing priority of the application to be closed according to the security level of the application to be closed and the time length of the application to be closed running in the background" may further include:
when the first closing priority is different from the second closing priority, determining whether an intermediate closing priority exists between the first closing priority and the second closing priority;
if yes, selecting a target closing priority from the intermediate closing priorities;
and setting the closing priority of the application program to be closed as a target closing priority.
The intermediate closing priority is a closing priority lower than the first closing priority and higher than the second closing priority, or a closing priority higher than the first closing priority and lower than the second closing priority. For example, if the first closing priority is 1 higher than the second closing priority 5, then the intermediate closing priorities between the two are 2, 3, 4.
For example, the security level of the application program a to be closed is 2, the background running time length is 63s, the security level falls between the preset level ranges [1,3], the background running time length falls within the preset time length ranges [60s,120s ], at this time, the first closing priority corresponding to the preset level ranges [1,3] may be obtained as 1, and the second closing priority corresponding to the preset time length ranges [60s,120s ] may be obtained as 3. It can be seen that the first closing priority is different from the second closing priority, and at this time, it is determined that an intermediate closing priority 2 exists between the first closing priority and the second closing priority, and then the closing priority of the application a to be closed may be set to the intermediate closing priority 2. The closing priority of the application to be closed B, C, D may be set in the same manner.
In an embodiment, if there is no intermediate closing priority between the first closing priority and the second closing priority, the priority with the highest level of the two may also be selected as the closing priority of the application. That is, the step "setting the closing priority of the application to be closed according to the security level of the application to be closed and the time length of the application to be closed running in the background" may further include:
when it is determined that there is no intermediate closing priority between the first closing priority and the second closing priority; and setting the closing priority of the application program to be closed as the closing priority with the higher level in the first closing priority and the second closing priority.
For example, the security level of the application program a to be closed is 2, the background running time length is 63s, the security level falls between the preset level ranges [1,3], the background running time length falls within the preset time length ranges [60s,120s ], at this time, the first closing priority corresponding to the preset level ranges [1,3] may be obtained as 1, and the second closing priority corresponding to the preset time length ranges [60s,120s ] may be obtained as 2. At this time, the first closing priority 1 is higher than the second closing priority 2, and there is no intermediate priority therebetween, so the closing priority of the application a to be closed may be set to 1.
In an embodiment, if there is no intermediate closing priority between the first closing priority and the second closing priority, the closing priority of the application to be closed may also be set to be the lower closing priority of the first closing priority and the second closing priority.
105. And closing the application programs to be closed in the application set according to the closing priority of the application programs to be closed.
For example, according to the closing priority of the applications in the set, the applications to be closed in the set are closed in sequence. Referring to FIG. 3, after all applications in the application collection, application A, B, C, D, are closed, only application E remains with the background application.
In an embodiment, in consideration of the situation that the user uses background applications, the applications to be closed in the application set may be closed in sequence according to the closing priority and the closing interval duration. For example, the step "closing the application to be closed in the application set according to the closing priority of the application to be closed" may include:
when the application programs in the application set are started and closed, timing is started, and the current target application program to be closed is determined according to the closing priority;
closing the target program to be closed;
and when the timed duration reaches a preset time value, resetting the timing, and returning to the step of starting timing until all the application programs in the application set are closed.
In one embodiment, whether the current network environment is safe is determined based on whether the terminal is connected with the network in the common network connection area, if the terminal is not connected with the network in the common network connection area, the current network environment is possibly unsafe, and the application programs in the application set need to be closed immediately; therefore, the timeliness of closing the background application program can be improved, and the safety of the background application is improved. That is, the step "closing the application to be closed in the application set according to the closing priority of the application to be closed" may include:
acquiring the geographic position of a terminal;
determining whether the geographic location is within a common network connection area of the terminal;
if not, closing the application program to be closed in the application set according to the closing priority of the application program to be closed.
The common network connection area is a geographical area where the terminal frequently connects to the network in the past. It may be obtained by recording the historical geographical location of the terminal connected to the network.
In an embodiment, in order to facilitate a user to use a background application, the opening speed of the background application in the foreground is increased, and the background application can be closed at intervals when the terminal is connected to a network in a common network connection area, so that the situation that the background application is closed too fast and the user needs to restart the application when using the background application is avoided, and the switching speed of the background application to the foreground operation is increased.
In an embodiment, considering that some background applications may be switched to the foreground running during the time waiting for closing, if the applications of the current application set are closed, the applications running in the foreground are closed, which affects the user experience. In order to overcome the problem, the embodiment of the present invention may remove the background application running in the foreground in the preset time period from the set, and then close the application in the set, thereby avoiding the foregoing situation and improving the user experience. That is, the application processing method according to the embodiment of the present invention may further include:
when the geographic position is located in a common network connection area of the terminal, waiting for a given time length, and detecting whether the application program to be closed runs in a foreground within the given time length;
if so, removing the application program to be closed running in the foreground from the application set to obtain a removed application set;
and when the given time reaches, closing the application programs to be closed in the application set according to the closing priority of the application programs to be closed in the removed application set.
For example, when the application set is { application program D to be closed, application program B to be closed, application program C to be closed, application program a to be closed }, if the application programs D and B are switched to the foreground for operation within a certain waiting time, at this time, the application programs D and B are removed from the application set, and at this time, the removed application set is { application program C to be closed, application program a to be closed }. And when the waiting time reaches, closing the application programs in the set in sequence according to the closing priorities of the application program C to be closed and the application program A to be closed.
In an embodiment, in consideration of the situation that the user uses background applications, the applications to be closed in the application set may be closed in sequence according to the closing priority and the closing interval duration. For example, the step "closing the application to be closed in the application set according to the closing priority of the application to be closed" may include:
when the application programs in the application set are started and closed, timing is started, and the current target application program to be closed is determined according to the closing priority;
closing the target program to be closed;
and when the timed duration reaches a preset time value, resetting the timing, and returning to the step of starting timing until all the application programs in the application set are closed.
In one embodiment, whether the current network environment is safe is determined based on whether the terminal is connected with the network in the common network connection area, if the terminal is not connected with the network in the common network connection area, the current network environment is possibly unsafe, and the application programs in the application set need to be closed immediately; therefore, the timeliness of closing the background application program can be improved, and the safety of the background application is improved. That is, the step "closing the application to be closed in the application set according to the closing priority of the application to be closed" may include:
acquiring the geographic position of a terminal;
determining whether the geographic location is within a common network connection area of the terminal;
if not, closing the application program to be closed in the application set according to the closing priority of the application program to be closed.
The common network connection area is a geographical area where the terminal frequently connects to the network in the past. It may be obtained by recording the historical geographical location of the terminal connected to the network.
In an embodiment, in order to facilitate a user to use a background application, the opening speed of the background application in the foreground is increased, and the background application can be closed at intervals when the terminal is connected to a network in a common network connection area, so that the situation that the background application is closed too fast and the user needs to restart the application when using the background application is avoided, and the switching speed of the background application to the foreground operation is increased.
In an embodiment, considering that some background applications may be switched to the foreground running during the time waiting for closing, if the applications of the current application set are closed, the applications running in the foreground are closed, which affects the user experience. In order to overcome the problem, the embodiment of the present invention may remove the background application running in the foreground in the preset time period from the set, and then close the application in the set, thereby avoiding the foregoing situation and improving the user experience. That is, the application processing method according to the embodiment of the present invention may further include:
when the geographic position is located in a common network connection area of the terminal, waiting for a given time length, and detecting whether the application program to be closed runs in a foreground within the given time length;
if so, removing the application program to be closed running in the foreground from the application set to obtain a removed application set;
and when the given time reaches, closing the application programs to be closed in the application set according to the closing priority of the application programs to be closed in the removed application set.
For example, when the application set is { application program D to be closed, application program B to be closed, application program C to be closed, application program a to be closed }, if the application programs D and B are switched to the foreground for operation within a certain waiting time, at this time, the application programs D and B are removed from the application set, and at this time, the removed application set is { application program C to be closed, application program a to be closed }. And when the waiting time reaches, closing the application programs in the set in sequence according to the closing priorities of the application program C to be closed and the application program A to be closed.
As can be seen from the above, in the embodiment of the present invention, the current running time of the background application in the background is obtained, when the current running time is longer than the preset time, the background application is added into the application set to be closed, the security level of the application to be closed in the application set is obtained, the closing priority of the application to be closed is set according to the security level of the application to be closed and the running time of the application to be closed in the background, and the application to be closed in the application set is closed according to the closing priority of the application to be closed; according to the scheme, the background application program can be closed based on the security level of the background application program and the background running time, so that the security of the application program is improved, and the terminal resources are saved.
In addition, the closing priority of the background application can be set based on the security level and the background running time, so that the closing sequence of different security levels and different background running times is different, if the security level is higher and the background application with the higher background running time is closed preferentially, the closing timeliness of the important application can be improved, and the safety of the important application is ensured while the user normally uses the background application.
In an embodiment, another application processing method is further provided, as shown in fig. 4, a specific flow of the application processing method is as follows:
201. the terminal acquires the current running time of the background application program in the background.
The current background running time of the background application program is the time difference from the starting time of the background application program entering the background running to the current time.
202. And the terminal adds the background application program which runs in the background currently and has the time length longer than the preset time length into the application set to be closed.
The application set is an application set needing to be closed, the initial stage of the application set can be an empty set, when a background application program is added, the application set comprises at least one background application program, and the background application program in the application set is the application program to be closed.
In one embodiment, the application set may not be empty in the initial stage, for example, including a specified background application to be closed, and so on.
203. And the terminal acquires the security level of the application program to be closed in the application set.
Wherein the security level indicates the security level of the application program, i.e. the importance level of the application program. Higher security levels represent higher importance programs of the application level, which need to be closed in time; whereas a lower security level indicates a lower importance of the application, such applications may be closed later.
The security level may be characterized by a level identifier, which may be a character, such as a number, a letter, a word, or the like. Wherein, the level of security can be represented by the relationship between the level identifiers.
For example, in one embodiment, the security levels may include: security level 1, security level 2, security level 3, etc., where the level may be represented by the size of the number. For another example, in one embodiment, the security level may include: security level a, security level b, security level c … …, wherein the level may be represented by letter sequence.
In one embodiment, the security level of the application program may be set based on the type of the application program, for example, the application program on the terminal may be classified, and then the security level of the application program may be set according to the type of the application program.
For example, applications can be divided into: financial, social, reading, gaming, etc.; applications can also be divided according to importance into: generally important, more important, very important, etc.
For example, in application partitioning: financial, social, reading, gaming, etc., the security level of the financial application may be set to a first level, the security level of the social application may be set to a second level, the security level of the reading application may be set to a third level, the security level of the gaming application may be set to a fourth level, etc. The levels of the first level, the second level, the third level and the fourth level may be sequentially decreased or sequentially increased, which may be set according to actual requirements.
204. The terminal determines a preset grade range in which the safety grade of the application program to be closed falls and a preset duration range in which the background running duration falls.
The preset level range may be set according to actual requirements, for example, the preset level range may be a numerical value range such as [2,6] when the security level is represented by a number, or a letter range such as [ a, c ] when the security level is represented by a letter, or the like. The duration range can also be set according to actual requirements, such as [100s, 50s ], and the like.
205. The terminal obtains a first closing priority corresponding to a preset grade range and a second closing priority corresponding to a preset duration range.
The closing priority corresponding to each budget level range and the closing priority corresponding to each preset duration range can be preset, so that the subsequent terminal can acquire the corresponding closing priority when determining the level range in which the security level falls and the duration range in which the background running duration falls.
206. The terminal determines whether the first closing priority is the same as the second closing priority, if so, step 207 is executed, and if not, step 208 is executed.
207. The terminal sets the closing priority of the application program to be closed as a first closing priority.
For example, the security level of the application B to be closed is 3, the background running time length is 50s, the security level falls between the preset level ranges [2,4], the background running time length falls within the preset time length ranges [1s,60s ], at this time, the first closing priority corresponding to the preset level ranges [2,4] may be obtained as 1, the preset time length ranges [1s,60s ] are obtained, the corresponding second closing priority is also 1, it is visible that the first closing priority is the same as the second closing priority and is 1, and then the closing priority of the application B to be closed may be set as 1.
208. The terminal judges whether all the applications to be closed in the application set have set the closing priority, if not, the terminal returns to execute the step 203 to set the closing priority of the next application to be closed, and if so, the terminal executes the step 212.
209. The terminal determines whether an intermediate closing priority exists between the first closing priority and the second closing priority, if so, step 210 is executed, and if not, step 211 is executed.
210. The terminal selects a target closing priority from the intermediate closing priorities, sets the closing priority of the application program to be closed as the target closing priority, and skips to execute step 208.
For example, the security level of the application B to be closed is 3, the background running time length is 50s, the security level falls within the preset level range [2,4], the background running time length falls within the preset time length range [1s,60s ], at this time, the first closing priority corresponding to the preset level range [2,4] may be obtained as 1, the preset time length range [1s,60s ] is obtained, the corresponding second closing priority is 4, it is obvious that, if there are intermediate closing priorities such as 2 and 3 between the first closing priority and the second closing priority, the closing priority of the application B to be closed may be set as 2 or 3.
211. The terminal sets the closing priority of the application program to be closed as the closing priority with the higher level in the first closing priority and the second closing priority, and skips to execute the step 208.
For example, the security level of the application B to be closed is 3, the background running time length is 50s, the security level falls between the preset level ranges [2 and 4], the background running time length falls within the preset time length ranges [1s and 60s ], at this time, the first closing priority corresponding to the preset level ranges [2 and 4] may be obtained as 3, the preset time length ranges [1s and 60s ] are obtained, the corresponding second closing priority is 4, it is obvious that there is no intermediate closing priority between the first closing priority and the second closing priority, then the closing priority of the application B to be closed may be set as 4, and it is assumed that the second closing priority 4 is higher than the first closing priority 3.
212. And the terminal closes the application programs to be closed in the application set according to the closing priority of the application programs to be closed.
For example, the terminal sequentially closes the applications to be closed in the application set according to the closing priority of the applications in the set.
As can be seen from the above, in the embodiment of the present invention, the current running time of the background application in the background is obtained, when the current running time is longer than the preset time, the background application is added into the application set to be closed, the security level of the application to be closed in the application set is obtained, the closing priority of the application to be closed is set according to the security level of the application to be closed and the running time of the application to be closed in the background, and the application to be closed in the application set is closed according to the closing priority of the application to be closed; according to the scheme, the background application program can be closed based on the security level of the background application program and the background running time, so that the security of the application program is improved, and the terminal resources are saved.
In addition, the closing priority of the background application can be set based on the security level and the background running time, so that the closing sequence of different security levels and different background running times is different, if the security level is higher and the background application with the higher background running time is closed preferentially, the closing timeliness of the important application can be improved, and the safety of the important application is ensured while the user normally uses the background application.
In order to better implement the application processing method provided by the embodiment of the present invention, an application processing apparatus is further provided in an embodiment. The terms are the same as those in the above application processing method, and details of implementation may refer to the description in the method embodiment.
As shown in fig. 5, the application processing device 30 may include: a duration obtaining module 301, an adding module 302, a level obtaining module 303, a level setting module 304 and a closing module 305;
a duration obtaining module 301, configured to obtain a duration of a background application running in a background currently;
an adding module 302, configured to add the background application program into an application set to be closed when the duration is greater than a preset duration;
a level obtaining module 303, configured to obtain a security level of an application program to be closed in the application set;
a level setting module 304, configured to set a closing priority of the application to be closed according to the security level of the application to be closed and the time length of the application to be closed running in the background;
a closing module 305, configured to close the application to be closed in the application set according to the closing priority of the application to be closed.
In one embodiment, the level setting module 304 may be configured to:
acquiring a sequencing parameter of the application program to be closed according to the security level of the application program to be closed and the background running time of the application program to be closed;
sequencing the application programs to be closed in the application set according to the sequencing parameters of the application programs to be closed to obtain a sequencing result;
and setting the closing priority of the application programs to be closed in the application set according to the sequencing result.
In an embodiment, referring to fig. 6, the level setting module 304 may include:
a first determining submodule 3041 for determining a preset level range in which the security level falls and a preset duration range in which the duration falls;
an obtaining submodule 3042, configured to obtain a first closing priority corresponding to a preset level range and a second closing priority corresponding to a preset duration range;
the setting submodule 3043 is configured to, when the first closing priority is the same as the second closing priority, set the closing priority of the application to be closed to the first closing priority.
In an embodiment, referring to fig. 7, the level setting module 304 may further include:
a second determining submodule 3044 for determining whether there is an intermediate closing priority between the first closing priority and the second closing priority when the first closing priority is not the same as the second closing priority;
a selecting submodule 3045 configured to, when the second determining submodule 3044 determines that there is an intermediate closing priority, select a target closing priority from the intermediate closing priorities;
at this time, the setting sub-module 3043 is further configured to set the closing priority of the application to be closed as the target closing priority.
In an embodiment, a sub-module 3043 is provided for:
when it is determined that there is no intermediate closing priority between the first closing priority and the second closing priority; and setting the closing priority of the application program to be closed as the closing priority with the higher level in the first closing priority and the second closing priority.
In one embodiment, referring to fig. 8, the application processing device 30 may further include: a security level setting module 306; the security level setting module 306 is configured to: before the duration acquisition module 301 acquires the current running duration of the background application in the background, acquiring the type of the application in the terminal; the security level of the application is set according to the type to which the application belongs.
In specific implementation, the above modules may be implemented as independent entities, or may be combined arbitrarily to be implemented as the same or several entities, and specific implementation of the above modules may refer to the foregoing method embodiments, which are not described herein again.
As can be seen from the above, in the application processing apparatus 30 according to the embodiment of the present invention, the duration obtaining module 301 is used to obtain the current running duration of the background application in the background, when the duration is longer than the preset duration, the adding module 302 is used to add the background application into the application set to be closed, the level obtaining module 303 is used to obtain the security level of the application to be closed in the application set and the running duration of the application to be closed in the background, the level setting module 304 is used to set the closing priority of the application to be closed according to the security level of the application to be closed and the running duration of the application to be closed in the background, and the closing module 305 is used to close the application to be closed in the application set according to the closing priority of the application to be closed; according to the scheme, the background application program can be closed based on the security level of the background application program and the background running time, so that the security of the application program is improved, and the terminal resources are saved.
In an embodiment, the present invention further provides a storage medium, where the storage medium stores instructions, and the instructions, when executed by a processor, implement the steps of the application processing method provided in any one of the embodiments of the present invention.
In an embodiment, referring to fig. 9, the present invention further provides a terminal 400, including a memory 401 and a processor 402, where the memory 401 stores instructions, and the processor 402 loads the instructions to perform the steps of the application processing method according to any one of the embodiments of the present invention.
Referring to fig. 10, fig. 10 is a schematic view of a terminal structure according to an embodiment of the present invention. The terminal 500 may include Radio Frequency (RF) circuitry 501, memory 502 including one or more computer-readable storage media, input unit 503, display unit 504, sensor 505, audio circuitry 506, wireless fidelity (WiFi) module 507, processor 508 including one or more processing cores, and power supply 509. Those skilled in the art will appreciate that the terminal structure shown in fig. 10 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The rf circuit 501 may be used for receiving and transmitting information, or receiving and transmitting signals during a call, and in particular, receives downlink information of a base station and then sends the received downlink information to one or more processors 508 for processing; in addition, data relating to uplink is transmitted to the base station.
The memory 502 may be used to store applications and data. Memory 502 stores applications containing executable code. The application programs may constitute various functional modules. The processor 508 executes various functional applications and data processing by executing application programs stored in the memory 502. The memory 502 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal, etc. Further, the memory 502 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 502 may also include a memory controller to provide the processor 508 and the input unit 503 access to the memory 502.
The input unit 503 may be used to receive input numbers, character information, or user characteristic information (such as a fingerprint), and generate a keyboard, mouse, joystick, optical, or trackball signal input related to user setting and function control.
The display unit 504 may be used to display information input by or provided to the user and various graphical user interfaces of the terminal, which may be made up of graphics, text, icons, video, and any combination thereof. The display unit 504 may include a display panel.
The terminal may also include at least one sensor 505, such as light sensors, motion sensors, and other sensors.
The audio circuit 506 may provide an audio interface between the user and the terminal through a speaker, microphone.
Wireless fidelity (WiFi) belongs to short-distance wireless transmission technology, and the terminal can help the user to receive and send e-mail, browse web pages, access streaming media and the like through a wireless fidelity module 507, and provides wireless broadband internet access for the user. Although fig. 10 shows the wireless fidelity module 507, it is understood that it does not belong to the essential constitution of the terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 508 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, performs various functions of the terminal and processes data by running or executing an application program stored in the memory 502 and calling data stored in the memory 502, thereby performing overall monitoring of the terminal. Optionally, processor 508 may include one or more processing cores; preferably, the processor 508 may integrate an application processor, which primarily handles operating systems, user interfaces, application programs, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 508.
The terminal also includes a power supply 509 (such as a battery) for powering the various components.
Although not shown in fig. 10, the terminal may further include a camera, a bluetooth module, and the like, which are not described in detail herein.
Wherein the processor 508 loads instructions or programs in the memory 502 to implement the following steps:
acquiring the current running time of a background application program in the background;
when the duration is longer than the preset duration, adding the background application program into an application set to be closed;
acquiring the security level of an application program to be closed in the application set;
setting the closing priority of the application program to be closed according to the security level of the application program to be closed and the background running time of the application program to be closed;
and closing the application programs to be closed in the application set according to the closing priority of the application programs to be closed.
In one embodiment, the processor 508 may implement the following steps:
acquiring a sequencing parameter of the application program to be closed according to the security level of the application program to be closed and the background running time of the application program to be closed;
sequencing the application programs to be closed in the application set according to the sequencing parameters of the application programs to be closed to obtain a sequencing result;
and setting the closing priority of the application programs to be closed in the application set according to the sequencing result.
In one embodiment, the processor 508 may implement the following steps:
determining a preset grade range in which the safety grade falls;
determining a preset time length range in which the time length falls;
acquiring a first closing priority corresponding to a preset grade range and a second closing priority corresponding to a preset duration range;
and when the first closing priority is the same as the second closing priority, setting the closing priority of the application program to be closed as the first closing priority.
In one embodiment, the processor 508 may further implement the following steps:
when the first closing priority is different from the second closing priority, determining whether an intermediate closing priority exists between the first closing priority and the second closing priority;
if yes, selecting a target closing priority from the intermediate closing priorities;
and setting the closing priority of the application program to be closed as a target closing priority.
In one embodiment, the processor 508 may further implement the following steps:
when it is determined that there is no intermediate closing priority between the first closing priority and the second closing priority; and setting the closing priority of the application program to be closed as the closing priority with the higher level in the first closing priority and the second closing priority.
In one embodiment, the processor 508 may further implement the following steps:
before the current running time of the background application program in the background is obtained, the type of the application program in the terminal is obtained;
and dividing the safety level of the application program according to the type of the application program.
It should be noted that, as one of ordinary skill in the art would understand, all or part of the steps in the various methods of the above embodiments may be implemented by relevant hardware instructed by a program, where the program may be stored in a computer-readable storage medium, such as a memory of a terminal, and executed by at least one processor in the terminal, and during the execution, the flow of the embodiments such as the information distribution method may be included. Among others, the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
In the above, detailed descriptions are given to the application processing method, the application processing apparatus, the storage medium, and the terminal according to the embodiments of the present invention, and each functional module may be integrated in one processing chip, or each module may exist alone physically, or two or more modules may be integrated in one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for those skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (6)

1. An application processing method, comprising the steps of:
setting rules for classifying application programs in the terminal, and determining the types of the application programs in the terminal according to the rules;
acquiring the type of an application program in a terminal;
dividing the security level of the application program according to the type of the application program;
acquiring the current background running time of a background application program, wherein the current background running time of the background application program is the time difference from the starting time of the background application program entering the background running to the current time;
adding a specified application program to be closed into an application set to be closed, and adding the background application program into the application set when the duration is greater than a preset duration;
acquiring the security level of an application program to be closed in the application set;
quantizing the safety grade to obtain a first numerical value, and quantizing the duration to obtain a second numerical value; determining a sorting parameter of the application program to be closed according to the sum of the weighted value of the first numerical value and the weighted value of the second numerical value, and setting the closing priority of the application program to be closed according to the sorting parameter;
alternatively, the first and second electrodes may be,
determining a preset grade range in which the safety grade falls, and determining a first closing priority corresponding to the falling preset grade range; determining a preset duration range in which the duration falls, and determining a second closing priority corresponding to the falling preset duration range; when the first closing priority is the same as the second closing priority, setting the closing priority of the application program to be closed as the first closing priority; when the first closing priority is different from the second closing priority, determining whether an intermediate closing priority exists between the first closing priority and the second closing priority; if an intermediate closing priority exists between the first closing priority and the second closing priority, selecting a target closing priority from the intermediate closing priorities, and setting the target closing priority as the closing priority of the application program to be closed; if no intermediate closing priority exists between the first closing priority and the second closing priority, setting the closing priority of the application program to be closed as the closing priority with the higher priority in the first closing priority and the second closing priority;
and closing the application programs to be closed in the application set according to the closing priority of the application programs to be closed.
2. The application processing method of claim 1, wherein setting the closing priority of the application to be closed according to the sorting parameter comprises
Sequencing the application programs to be closed in the application set according to the sequencing parameters of the application programs to be closed to obtain a sequencing result;
and setting the closing priority of the application programs to be closed in the application set according to the sequencing result.
3. An application processing apparatus, comprising:
the safety level setting module is used for setting rules for classifying the application programs in the terminal and determining the types of the application programs in the terminal according to the rules; acquiring the type of an application program in a terminal; dividing the security level of the application program according to the type of the application program;
the device comprises a duration acquisition module, a background processing module and a processing module, wherein the duration acquisition module is used for acquiring the current running duration of a background application program in the background, and the current running duration of the background application program in the background is the time difference from the starting time of the background application program entering the background to the current time;
the adding module is used for adding the appointed application program to be closed into the application set to be closed, and adding the background application program into the application set when the duration is longer than the preset duration;
the level acquisition module is used for acquiring the security level of the application program to be closed in the application set;
the level setting module is used for quantizing the safety level to obtain a first numerical value and quantizing the duration to obtain a second numerical value; determining a sequencing parameter of the application program to be closed according to the sum of the weighted value of the first numerical value and the weighted value of the second numerical value, and setting the closing priority of the application program to be closed according to the sequencing parameter; or determining a preset grade range in which the safety grade falls, and determining a first closing priority corresponding to the falling preset grade range; determining a preset duration range in which the duration falls, and determining a second closing priority corresponding to the falling preset duration range; when the first closing priority is the same as the second closing priority, setting the closing priority of the application program to be closed as the first closing priority; when the first closing priority is different from the second closing priority, determining whether an intermediate closing priority exists between the first closing priority and the second closing priority; if an intermediate closing priority exists between the first closing priority and the second closing priority, selecting a target closing priority from the intermediate closing priorities, and setting the target closing priority as the closing priority of the application program to be closed; if no intermediate closing priority exists between the first closing priority and the second closing priority, setting the closing priority of the application program to be closed as the closing priority with the higher priority in the first closing priority and the second closing priority;
and the closing module is used for closing the application programs to be closed in the application set according to the closing priority of the application programs to be closed.
4. The application processing apparatus of claim 3, wherein the tier setting module is to:
sequencing the application programs to be closed in the application set according to the sequencing parameters of the application programs to be closed to obtain a sequencing result;
and setting the closing priority of the application programs to be closed in the application set according to the sequencing result.
5. A storage medium storing instructions which, when executed by a processor, carry out the steps of the method according to any one of claims 1-2.
6. A terminal comprising a memory storing instructions and a processor, the processor loading the instructions to perform the steps of the method according to any one of claims 1-2.
CN201710644138.9A 2017-07-31 2017-07-31 Application processing method and device, storage medium and terminal Expired - Fee Related CN107291543B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710644138.9A CN107291543B (en) 2017-07-31 2017-07-31 Application processing method and device, storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710644138.9A CN107291543B (en) 2017-07-31 2017-07-31 Application processing method and device, storage medium and terminal

Publications (2)

Publication Number Publication Date
CN107291543A CN107291543A (en) 2017-10-24
CN107291543B true CN107291543B (en) 2020-08-07

Family

ID=60105118

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710644138.9A Expired - Fee Related CN107291543B (en) 2017-07-31 2017-07-31 Application processing method and device, storage medium and terminal

Country Status (1)

Country Link
CN (1) CN107291543B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107870809B (en) * 2017-10-31 2020-02-11 Oppo广东移动通信有限公司 Application closing method and device, storage medium and electronic equipment
CN109032734B (en) * 2018-07-13 2020-09-01 维沃移动通信有限公司 Background application program display method and mobile terminal

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090158212A1 (en) * 2007-02-06 2009-06-18 Access Systems Americas, Inc. System and method for presenting recently-used and in-use applications for ease of navigation on an electronic device
CN103631661A (en) * 2013-11-27 2014-03-12 青岛海信电器股份有限公司 Internal storage management method and device
CN105354093A (en) * 2015-12-09 2016-02-24 广东欧珀移动通信有限公司 Memory management method and mobile terminal
CN105676987A (en) * 2014-11-19 2016-06-15 中兴通讯股份有限公司 Method for shutting down background application of mobile terminal, device and mobile terminal
CN105892613A (en) * 2015-12-04 2016-08-24 乐视移动智能信息技术(北京)有限公司 Method and apparatus for clearing background applications
CN105912370A (en) * 2016-05-03 2016-08-31 广东欧珀移动通信有限公司 Control method and apparatus for background application of mobile terminal and mobile terminal
CN106155695A (en) * 2016-07-28 2016-11-23 努比亚技术有限公司 The removing control device and method of background application
CN106325990A (en) * 2016-08-19 2017-01-11 宇龙计算机通信科技(深圳)有限公司 Control method of application program, control device and terminal
CN106371906A (en) * 2016-08-29 2017-02-01 珠海格力电器股份有限公司 Control method and device for background application software of intelligent equipment and processor
CN106445604A (en) * 2016-09-29 2017-02-22 深圳市邦华电子有限公司 Clearing method and device for applications
CN106569585A (en) * 2016-11-07 2017-04-19 深圳市金立通信设备有限公司 Method and terminal of managing application program process

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106572250B (en) * 2016-10-31 2021-06-15 努比亚技术有限公司 Method and device for cleaning background application program of mobile terminal

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090158212A1 (en) * 2007-02-06 2009-06-18 Access Systems Americas, Inc. System and method for presenting recently-used and in-use applications for ease of navigation on an electronic device
CN103631661A (en) * 2013-11-27 2014-03-12 青岛海信电器股份有限公司 Internal storage management method and device
CN105676987A (en) * 2014-11-19 2016-06-15 中兴通讯股份有限公司 Method for shutting down background application of mobile terminal, device and mobile terminal
CN105892613A (en) * 2015-12-04 2016-08-24 乐视移动智能信息技术(北京)有限公司 Method and apparatus for clearing background applications
CN105354093A (en) * 2015-12-09 2016-02-24 广东欧珀移动通信有限公司 Memory management method and mobile terminal
CN105912370A (en) * 2016-05-03 2016-08-31 广东欧珀移动通信有限公司 Control method and apparatus for background application of mobile terminal and mobile terminal
CN106155695A (en) * 2016-07-28 2016-11-23 努比亚技术有限公司 The removing control device and method of background application
CN106325990A (en) * 2016-08-19 2017-01-11 宇龙计算机通信科技(深圳)有限公司 Control method of application program, control device and terminal
CN106371906A (en) * 2016-08-29 2017-02-01 珠海格力电器股份有限公司 Control method and device for background application software of intelligent equipment and processor
CN106445604A (en) * 2016-09-29 2017-02-22 深圳市邦华电子有限公司 Clearing method and device for applications
CN106569585A (en) * 2016-11-07 2017-04-19 深圳市金立通信设备有限公司 Method and terminal of managing application program process

Also Published As

Publication number Publication date
CN107291543A (en) 2017-10-24

Similar Documents

Publication Publication Date Title
CN109213539B (en) Memory recovery method and device
CN108363593B (en) Application program preloading method and device, storage medium and terminal
US11429880B2 (en) Methods and systems for preloading applications and generating prediction models
CN108647052B (en) Application program preloading method and device, storage medium and terminal
WO2020108085A1 (en) Resource allocation method and apparatus, terminal, and storage medium
CN106528745B (en) Method and device for recommending resources on mobile terminal and mobile terminal
CN107861816B (en) Resource allocation method and device
CN106851010B (en) Interference processing method and terminal for target application
CN108491147A (en) A kind of man-machine interaction method and mobile terminal based on virtual portrait
WO2015078395A1 (en) Devices and methods for preventing user churn
CN108958828B (en) Application program preloading method and device, storage medium and terminal
CN108156508B (en) Barrage information processing method and device, mobile terminal, server and system
CN107506240B (en) Background application program control method and device, storage medium and electronic equipment
CN108804153B (en) Application program preloading method and device, storage medium and terminal
US20160357616A1 (en) Application management method and application management apparatus
CN107222914B (en) Application control method and related product
CN108762844B (en) Application program preloading method and device, storage medium and terminal
CN107479953B (en) Process management method, device, storage medium and electronic equipment
CN106250182B (en) File processing method and device and electronic equipment
CN108536480B (en) Input method configuration method and related product
CN107450951B (en) Application processing method and device, storage medium and terminal
CN107169555B (en) Gate prompting method and device, storage medium and terminal
CN107291543B (en) Application processing method and device, storage medium and terminal
CN110276404B (en) Model training method, device and storage medium
CN111918386A (en) Positioning method, positioning device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200807