CN109743755A - Link aggregation right management method and Related product - Google Patents
Link aggregation right management method and Related product Download PDFInfo
- Publication number
- CN109743755A CN109743755A CN201811566516.7A CN201811566516A CN109743755A CN 109743755 A CN109743755 A CN 109743755A CN 201811566516 A CN201811566516 A CN 201811566516A CN 109743755 A CN109743755 A CN 109743755A
- Authority
- CN
- China
- Prior art keywords
- application
- target
- illegal operation
- flow
- operation flow
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Telephone Function (AREA)
Abstract
This application discloses a kind of link aggregation right management method and Related products, are applied to electronic equipment, wherein this method comprises: obtaining at least one target application;The flow usage record for determining each application at least one described target application obtains at least one flow usage record, the corresponding flow usage record of each application;The corresponding illegal operation flow value of each application is determined according at least one described flow usage record, obtain at least one illegal operation flow value, the illegal operation flow value is in the case where not receiving any user instruction, and automatic execute operates consumed flow;The target illegal operation flow value for being greater than preset flow threshold value is chosen from least one described illegal operation flow value, and it is corresponding using link aggregation function to limit the target illegal operation flow value.The application may be implemented to be managed link aggregation permission, saves flow, also reduces equipment power dissipation.
Description
Technical field
This application involves fields of communication technology, and in particular to a kind of link aggregation right management method and Related product.
Background technique
With the development of mobile communication technology, demand of the user to data communication is higher and higher, at present electronics on the market
Equipment (such as mobile phone, tablet computer) is also increasingly tended to using link aggregation technology, therefore, how to link aggregation permission
The problem of being managed is urgently to be resolved.
Summary of the invention
The embodiment of the present application provides a kind of link aggregation right management method and Related product, may be implemented poly- to link
Permission is closed to be managed.
In a first aspect, the embodiment of the present application provides a kind of link aggregation right management method, it is applied to electronic equipment, it is described
Method includes:
Obtain at least one target application;
The flow usage record for determining each application at least one described target application obtains the use of at least one flow
Record, the corresponding flow usage record of each application;
Determine the corresponding illegal operation flow value of each application according at least one described flow usage record, obtain to
A few illegal operation flow value, the illegal operation flow value are in the case where not receiving any user instruction, to hold automatically
Row operates consumed flow;
The target illegal operation flow for being greater than preset flow threshold value is chosen from least one described illegal operation flow value
Value, it is corresponding using link aggregation function to limit the target illegal operation flow value.
Second aspect, the embodiment of the present application provide a kind of link aggregation rights management device, are applied to electronic equipment, described
Link aggregation rights management device includes acquiring unit, determination unit and limiting unit, wherein
The acquiring unit, for obtaining at least one target application;
The determination unit is obtained for determining the flow usage record of each application at least one described target application
To at least one flow usage record, the corresponding flow usage record of each application;And according at least one described flow
Usage record determines the corresponding illegal operation flow value of each application, obtains at least one illegal operation flow value, described non-
Method operation flow value is flow consumed by automatic execution operation in the case where not receiving any user instruction;
The limiting unit is greater than preset flow threshold value for choosing from least one described illegal operation flow value
It is corresponding using link aggregation function to limit the target illegal operation flow value for target illegal operation flow value.
The third aspect, the embodiment of the present application provide a kind of electronic equipment, including processor, memory, communication interface and
One or more programs, wherein said one or multiple programs are stored in above-mentioned memory, and are configured by above-mentioned
It manages device to execute, above procedure is included the steps that for executing the instruction in the embodiment of the present application first aspect.
Fourth aspect, the embodiment of the present application provide a kind of computer readable storage medium, wherein above-mentioned computer-readable
Storage medium storage is used for the computer program of electronic data interchange, wherein above-mentioned computer program executes computer such as
Step some or all of described in the embodiment of the present application first aspect.
5th aspect, the embodiment of the present application provide a kind of computer program product, wherein above-mentioned computer program product
Non-transient computer readable storage medium including storing computer program, above-mentioned computer program are operable to make to calculate
Machine executes the step some or all of as described in the embodiment of the present application first aspect.The computer program product can be one
A software installation packet.
As can be seen that link aggregation right management method and Related product described in the embodiment of the present application, are applied to
Electronic equipment obtains at least one target application, determines the flow usage record of each application at least one target application, obtains
To at least one flow usage record, the corresponding flow usage record of each application, according at least one flow usage record
It determines the corresponding illegal operation flow value of each application, obtains at least one illegal operation flow value, illegal operation flow value
In the case where not receiving any user instruction, automatic execute operates consumed flow, from least one illegal operation stream
The target illegal operation flow value for being greater than preset flow threshold value is chosen in magnitude, limited target illegal operation flow value is corresponding to answer
With link aggregation function is used, in this way, the illegal application for using flow can be identified, and limits it and polymerize using intelligence link
Function, realization are managed link aggregation permission, that is, save flow and also reduce equipment power dissipation.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Figure 1A is the example system architecture figure of wireless communication system locating for a kind of electronic equipment provided by the embodiments of the present application;
Figure 1B is a kind of flow diagram of link aggregation right management method provided by the embodiments of the present application;
Fig. 2 is the flow diagram of another link aggregation right management method provided by the embodiments of the present application;
Fig. 3 is the flow diagram of another link aggregation right management method provided by the embodiments of the present application;
Fig. 4 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application;
Fig. 5 A is a kind of functional unit composition block diagram of link aggregation rights management device provided by the embodiments of the present application;
Fig. 5 B is a kind of another functional unit composition frame of link aggregation rights management device provided by the embodiments of the present application
Figure;
Fig. 5 C is a kind of another functional unit composition frame of link aggregation rights management device provided by the embodiments of the present application
Figure;
Fig. 6 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that
It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have
It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap
Include other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments
It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
Electronic equipment involved by the embodiment of the present application can be the electronics for having link aggregation rights management capabilities and set
Standby, which may include the various handheld devices with wireless communication function, mobile unit, wearable device, calculating
Equipment or be connected to radio modem other processing equipments and various forms of user equipment (User
Equipment, UE), mobile station (Mobile Station, MS), terminal device (terminal device) etc..
It describes in detail below to the embodiment of the present application.
As shown in Figure 1A, herein described electronic equipment 101 can connect mobile data network 103, mobile data network
For the communication network for being used for transmission data service;Wi-Fi 102, Wi-Fi are that a kind of permission electronic equipment is connected to a wireless office
The technology of domain net;Usually using 2.4G UHF or 5G SHF ISM radio frequency band;And bluetooth 104, a kind of wireless technology standard,
The short-range data exchange etc. between fixed equipment, mobile device and building personal area network can be achieved.
Figure 1B is please referred to, Figure 1B is that the embodiment of the present application provides a kind of process signal of link aggregation right management method
Figure is applied to electronic equipment;As shown, this link aggregation right management method includes:
101, at least one target application is obtained.
Wherein, all applications in the available electronic equipment of electronic equipment, it is of course also possible to be certain applications.On
Stating target application can be following at least one: shopping application, instant messaging application, Video Applications, payment application, game application
Etc., it is not limited thereto.Certainly, above-mentioned target application can be only third-party application.
Optionally, above-mentioned steps 101 obtain at least one target application, it may include following steps:
Multiple third-party applications in A1, the acquisition electronic equipment;
A2, it determines the corresponding evaluation parameter of each third-party application in the multiple third-party application, obtains multiple evaluations
Evaluation parameter described in parameter includes download time and star index;
A3, each third-party application in the multiple third-party application is evaluated according to the multiple evaluation parameter,
Obtain multiple evaluations of estimate, the corresponding evaluation of estimate of each third-party application;
A4, the objective appraisal value for being less than default Evaluation threshold is chosen from the multiple evaluation of estimate, and obtain the target
The corresponding third-party application of evaluation of estimate is as the target application.
Wherein, above-mentioned default Evaluation threshold can be by user's self-setting or system default.Electronic equipment can be obtained first
It takes multiple third-party applications of the electronic equipment, and determines the corresponding evaluation of each third-party application in multiple third-party application
Parameter obtains multiple evaluation parameters, and each evaluation parameter may include download time and star index, and download time is more, then
Illustrate that application is more popular, star index is higher, then illustrates that applicating evaluating is higher, therefore, can refer to by download time and star
It is several that each third-party application in multiple third-party applications is evaluated, multiple evaluations of estimate are obtained, each application corresponding one is commented
Value can choose the objective appraisal value for being less than default Evaluation threshold, and obtain the objective appraisal in turn from multiple evaluations of estimate
It is worth corresponding third-party application as target application.
Still optionally further, above-mentioned steps A3, according to the multiple evaluation parameter to every in the multiple third-party application
One third-party application is evaluated, and is obtained multiple evaluations of estimate, be may include steps of:
A31, the download time i and star index i for obtaining third-party application i, the third-party application i are the multiple the
Any third-party application in tripartite's application;
A32, corresponding first weighted value of download time and corresponding second weighted value of star index are obtained;
A33, determine that the download time i is corresponding according to the first mapping relations between download time and the first evaluation of estimate
The first evaluation of estimate of target determines that the star refers to according to the second mapping relations between preset star index and the second evaluation of estimate
Corresponding the second evaluation of estimate of target of number i;
A34, according to first weighted value, second weighted value, the first evaluation of estimate of the target, the target second
Evaluation of estimate is weighted, and obtains the evaluation of estimate of the third-party application i.
Wherein, it can be preset in electronic equipment or corresponding first weighted value of system default download time, and
Corresponding second weighted value of star index, can also be stored in advance the first mapping relations between download time and the first evaluation of estimate
And preset second evaluation of estimate and the second mapping relations, in turn, in the concrete realization, for third-party application i, the third party
Using any third-party application that i is in multiple third-party applications, it can determine that download time i is corresponding according to the first mapping relations
The first evaluation of estimate of target, determine corresponding the second evaluation of estimate of target of the star index i according to the second mapping relations, in turn,
It can be weighted according to the first weighted value, the second weighted value, the first evaluation of estimate of target, the second evaluation of estimate of target, obtain
Tripartite applies the evaluation of estimate of i, the i.e. evaluation of estimate of third-party application i=first weighted value * target the+the second weight of the first evaluation of estimate
Value * the second evaluation of estimate of target.
Optionally, above-mentioned steps 101 obtain at least one target application, it may include following steps:
The service package of the user identity identification SIM card of B1, the acquisition electronic equipment;
B2, the service package be restricted unlimited flow package when, determine the restricted unlimited flow package pair
The default application identities collection answered;
B3, the application identities for obtaining multiple third-party applications in the electronic equipment, obtain multiple application identities, each
Third-party application corresponds to an application identities;
B4, the target application mark that the default application identities collection is not present in the multiple application identities is determined,
The target application is identified into corresponding third-party application as the target application.
Wherein, above-mentioned default application identities concentration may include at least one application identities, which can
To be arranged by user's confidence or system default.
The embodiment of the present application, it is contemplated that some applications may not limit flow, for example, Tencent's network interface card, under Tencent
Using then can not limit flow.Restricted unlimited flow package can be understood as the specified flow using SIM card not
Charge, alternatively, not limiting the SIM card flow of specified application.In the specific implementation, the use of the available electronic equipment of electronic equipment
The service package of family identification card (Subscriber Identification Module, SIM), is limited in the service package
When the unlimited flow package of property processed, then it can determine the corresponding default application identities collection of the restricted unlimited flow package, obtain electricity
The application identities of multiple third-party applications in sub- equipment obtain multiple application identities, and each third-party application corresponding one is answered
The target application mark that default application identities collection is not present in multiple application identities can be determined, by this in turn with mark
Target application identifies corresponding third-party application as target application.
Optionally, above-mentioned steps 101 obtain at least one target application, it may include following steps:
Obtain multiple third-party applications in the electronic equipment, the corresponding frequency of use of each third-party application;It will
The application that frequency of use is lower than default frequency of use in the multiple third-party application is used as the target application.
Wherein, in the specific implementation, the lower application of frequency of use is higher for the probability of rogue software, therefore, can pass through
Frequency of use identifies rogue software.Above-mentioned default frequency of use can be by user's self-setting or system default.
102, the flow usage record for determining each application at least one described target application, obtains at least one flow
Usage record, the corresponding flow usage record of each application.
Wherein, the flow of each application makes at least one target application in the available preset time period of electronic equipment
With record, at least one flow usage record, the corresponding flow usage record of each application are obtained.Preset time period can be by
System default, alternatively, user's self-setting.
103, the corresponding illegal operation flow value of each application is determined according at least one described flow usage record, obtain
To at least one illegal operation flow value, the illegal operation flow value is in the case where not receiving any user instruction, certainly
Dynamic execute operates consumed flow.
Wherein, in the embodiment of the present application, illegal operation flow value can be understood as the feelings for not receiving any user instruction
Under condition, automatic execute operates consumed flow, in the specific implementation, some rogue softwares then can be the case where user operate
Under, privately therefore in the embodiment of the present application, each answer can be determined according at least one flow usage record using flow
With corresponding illegal operation flow value, at least one illegal operation flow value is obtained, in turn, according at least one illegal operation
Whether flow value is that rogue software is identified to application.
104, the target illegal operation for being greater than preset flow threshold value is chosen from least one described illegal operation flow value
It is corresponding using link aggregation function to limit the target illegal operation flow value for flow value.
Wherein, above-mentioned preset flow threshold value can be by user's self-setting or system default.In the specific implementation, electronics is set
The standby target illegal operation flow value that can be chosen from least one illegal operation flow value greater than preset flow threshold value, usually
In the case of, general application may also can consume some flows because of system upgrade, and still, the flow of consumption is in a certain range
It is interior, therefore, can be corresponding using link aggregation function with limited target illegal operation flow value, for example, forbidding target non-
Method operation flow value is corresponding using link aggregation function, in another example, limited target illegal operation flow value is corresponding to answer
In designated time period use link aggregation function, the designated time period can by user's self-setting or system default,
In another example link aggregation function, specific bit can be used in designated position with corresponding apply of limited target illegal operation flow value
Setting can be by user's self-setting or system default, certainly, and limitation can also be other behaviors, be not limited thereto.
Under illustration, rogue software can illegally use flow, cause not to user in the case where user does not operate
Necessary flow consumption can be used for abuse Wi-Fi or the rogue software of the flow of mobile data network by flow
Record carries out abuse monitoring, and orients these softwares, and blacklist is added, and limits it using intelligence link and polymerize SLA function
Energy.
Optionally, before above-mentioned steps 101, can also include the following steps:
Whether C1, the detection electronic equipment are in and put out screen state;
C2, the electronic equipment be in put out screen state when, execute described at least one target application of acquisition the step of.
Wherein, electronic equipment is in and puts out under screen state, then illustrates that user does not operate electronic equipment, in this case, user
The Expenditure Levels of flow can be focused more on, therefore, are put out in the specific implementation, whether electronic equipment can detecte the electronic equipment and be in
Screen state can execute above-mentioned steps 101, in turn, identify rogue software, limit its use if it, which is in, puts out screen state
Link aggregation function, in order to avoid more flows are consumed, in this way, equipment power dissipation can be reduced.
Optionally, in above-mentioned steps 104, it is corresponding using link aggregation to limit the target illegal operation flow value
Before function, it can also include the following steps:
Whether the corresponding application of D1, the detection target illegal operation flow value is background application;
D2, when the corresponding application of the target illegal operation flow value is background application, execute the limitation mesh
The step of marking the illegal operation flow value corresponding function using link aggregation.
Wherein, if application is in foreground, very likely user is operating the application, if application illustrates in backstage
The application is temporarily not used in user, therefore, in the specific implementation, to can detecte target illegal operation flow value corresponding for electronic equipment
Using whether being background application, when the corresponding application of target illegal operation flow value is background application, the limitation institute is executed
The step of stating the target illegal operation flow value corresponding function using link aggregation, conversely, in target illegal operation flow
When to be worth corresponding application be foreground application, then can not execute the limitation target illegal operation flow value it is corresponding using
The step of link aggregation function.In this way, can carry out specific aim limitation third-party application depending on the user's operation uses link aggregation
Function meets user's habit to a certain extent, and saves flow, and reduce equipment power dissipation.
As can be seen that link aggregation right management method described in the embodiment of the present application, is applied to electronic equipment, obtains
At least one target application is taken, the flow usage record of each application at least one target application is determined, obtains at least one
Flow usage record, the corresponding flow usage record of each application, is determined each according at least one flow usage record
Using corresponding illegal operation flow value, at least one illegal operation flow value is obtained, illegal operation flow value is not receive
In the case where any user instruction, automatic execute operates consumed flow, chooses from least one illegal operation flow value
Greater than the target illegal operation flow value of preset flow threshold value, limited target illegal operation flow value is corresponding using link
Polymerizable functional in this way, the illegal application for using flow can be identified, and limits it using intelligence link polymerizable functional, realizes
Link aggregation permission is managed, that is, saves flow and also reduces equipment power dissipation.
Consistently with embodiment shown in above-mentioned Figure 1B, referring to Fig. 2, Fig. 2 is a kind of chain provided by the embodiments of the present application
Road polymerize the flow diagram of right management method, as shown, this link aggregation right management method includes:
201, it detects the electronic equipment and whether is in and put out screen state.
202, when the electronic equipment is in and puts out screen state, at least one target application is obtained.
203, the flow usage record for determining each application at least one described target application, obtains at least one flow
Usage record, the corresponding flow usage record of each application.
204, the corresponding illegal operation flow value of each application is determined according at least one described flow usage record, obtain
To at least one illegal operation flow value, the illegal operation flow value is in the case where not receiving any user instruction, certainly
Dynamic execute operates consumed flow.
205, the target illegal operation for being greater than preset flow threshold value is chosen from least one described illegal operation flow value
It is corresponding using link aggregation function to limit the target illegal operation flow value for flow value.
Wherein, the specific descriptions of above-mentioned steps 201-205 are referred to link aggregation rights management side described in Figure 1B
The corresponding steps of method, details are not described herein.
As can be seen that link aggregation right management method described in the embodiment of the present application, is applied to electronic equipment, inspection
It surveys electronic equipment and whether is in and put out screen state, when electronic equipment is in and puts out screen state, obtain at least one target application, determine
The flow usage record of each application at least one target application obtains at least one flow usage record, each application pair
A flow usage record is answered, determines the corresponding illegal operation flow of each application according at least one flow usage record
Value, obtains at least one illegal operation flow value, and illegal operation flow value is in the case where not receiving any user instruction, certainly
It moves to execute and operates consumed flow, chosen from least one illegal operation flow value non-greater than the target of preset flow threshold value
Method operates flow value, and limited target illegal operation flow value is corresponding using link aggregation function, in this way, at electronic equipment
In putting out under screen state, then illustrate that user does not operate electronic equipment, in this case, user can focus more on the consumption feelings of flow
Condition can identify the illegal application for using flow, if it, which is in, puts out screen state, and limit it and polymerize function using intelligence link
Can, realization is managed link aggregation permission, that is, saves flow and also reduce equipment power dissipation.
Consistently with embodiment shown in above-mentioned Figure 1B, referring to Fig. 3, Fig. 3 is a kind of chain provided by the embodiments of the present application
Road polymerize the flow diagram of right management method, as shown, this link aggregation right management method includes:
301, at least one target application is obtained.
302, the flow usage record for determining each application at least one described target application, obtains at least one flow
Usage record, the corresponding flow usage record of each application.
303, the corresponding illegal operation flow value of each application is determined according at least one described flow usage record, obtain
To at least one illegal operation flow value, the illegal operation flow value is in the case where not receiving any user instruction, certainly
Dynamic execute operates consumed flow.
304, the target illegal operation for being greater than preset flow threshold value is chosen from least one described illegal operation flow value
Flow value, detects whether the corresponding application of the target illegal operation flow value is background application.
305, it when the corresponding application of the target illegal operation flow value is background application, limits the target and illegally grasps
It is corresponding using link aggregation function to make flow value.
Wherein, the specific descriptions of above-mentioned steps 301-305 are referred to link aggregation rights management side described in Figure 1B
The corresponding steps of method, details are not described herein.
As can be seen that link aggregation right management method described in the embodiment of the present application, is applied to electronic equipment, obtains
At least one target application is taken, the flow usage record of each application at least one target application is determined, obtains at least one
Flow usage record, the corresponding flow usage record of each application, is determined each according at least one flow usage record
Using corresponding illegal operation flow value, at least one illegal operation flow value is obtained, illegal operation flow value is not receive
In the case where any user instruction, automatic execute operates consumed flow, chooses from least one illegal operation flow value
Greater than the target illegal operation flow value of preset flow threshold value, detect the corresponding application of target illegal operation flow value whether be after
Platform application, when the corresponding application of target illegal operation flow value is background application, limited target illegal operation flow value is corresponding
Using link aggregation function, in this way, if application be in foreground, very likely user operate the application, if using
In backstage, then illustrate that the application is temporarily not used in user, can identify the illegal application for using flow, and limit its use
Intelligence link polymerizable functional realizes and carrys out specific aim limitation third-party application depending on the user's operation using link aggregation function,
Meet user's habit to a certain extent, and saves flow, and reduce equipment power dissipation.
Consistently with above-mentioned Figure 1B, Fig. 2, embodiment shown in Fig. 3, referring to Fig. 4, Fig. 4 is that the embodiment of the present application provides
A kind of electronic equipment 400 structural schematic diagram, as shown, the electronic equipment 400 include processor 410, memory
420, communication interface 430 and one or more programs 421, wherein one or more of programs 421 are stored in above-mentioned deposit
In reservoir 420, and it is configured to be executed by above-mentioned processor 410, one or more of programs 421 include following for executing
The instruction of step:
Obtain at least one target application;
The flow usage record for determining each application at least one described target application obtains the use of at least one flow
Record, the corresponding flow usage record of each application;
Determine the corresponding illegal operation flow value of each application according at least one described flow usage record, obtain to
A few illegal operation flow value, the illegal operation flow value are in the case where not receiving any user instruction, to hold automatically
Row operates consumed flow;
The target illegal operation flow for being greater than preset flow threshold value is chosen from least one described illegal operation flow value
Value, it is corresponding using link aggregation function to limit the target illegal operation flow value.
As can be seen that electronic equipment described in the embodiment of the present application, obtains at least one target application, determine at least
The flow usage record of each application in one target application obtains at least one flow usage record, each application corresponding one
A flow usage record is determined the corresponding illegal operation flow value of each application according at least one flow usage record, is obtained
To at least one illegal operation flow value, illegal operation flow value is in the case where not receiving any user instruction, to hold automatically
Row operates consumed flow, and the target chosen from least one illegal operation flow value greater than preset flow threshold value is illegally grasped
Make flow value, limited target illegal operation flow value is corresponding using link aggregation function, in this way, can identify illegal
Using the application of flow, and it is limited using intelligence link polymerizable functional, realization is managed link aggregation permission, that is, saves
Flow also reduces equipment power dissipation.
In a possible example, in terms of described at least one target application of acquisition, one or more of programs
421 include the instruction for executing following steps:
Obtain multiple third-party applications in the electronic equipment;
It determines the corresponding evaluation parameter of each third-party application in the multiple third-party application, obtains multiple evaluations ginsengs
Number, the evaluation parameter includes download time and star index;
Each third-party application in the multiple third-party application is evaluated according to the multiple evaluation parameter, is obtained
Multiple evaluations of estimate, the corresponding evaluation of estimate of each third-party application;
The objective appraisal value for being less than default Evaluation threshold is chosen from the multiple evaluation of estimate, and obtains the objective appraisal
It is worth corresponding third-party application as the target application.
In a possible example, in terms of described at least one target application of acquisition, one or more of programs
421 include the instruction for executing following steps:
Obtain the service package of the user identity identification SIM card of the electronic equipment;
When the service package is restricted unlimited flow package, determine that the restricted unlimited flow package is corresponding
Default application identities collection;
The application identities for obtaining multiple third-party applications in the electronic equipment, obtain multiple application identities, and every 1
The corresponding application identities of tripartite's application;
The target application mark that the default application identities collection is not present in the multiple application identities is determined, by institute
It states target application and identifies corresponding third-party application as the target application.
In a possible example, one or more of programs 421 further include the instruction for executing following steps:
It detects the electronic equipment and whether is in and put out screen state;
The electronic equipment be in put out screen state when, execute described at least one target application of acquisition the step of.
In a possible example, one or more of programs 421 further include the instruction for executing following steps:
Detect whether the corresponding application of the target illegal operation flow value is background application;
When the corresponding application of the target illegal operation flow value is background application, it is non-to execute the limitation target
Method operates the step of flow value corresponding function using link aggregation.
It is above-mentioned that mainly the scheme of the embodiment of the present application is described from the angle of method side implementation procedure.It is understood that
, in order to realize the above functions, it comprises execute the corresponding hardware configuration of each function and/or software mould for electronic equipment
Block.Those skilled in the art should be readily appreciated that, in conjunction with each exemplary unit of embodiment description presented herein
And algorithm steps, the application can be realized with the combining form of hardware or hardware and computer software.Some function actually with
Hardware or computer software drive the mode of hardware to execute, the specific application and design constraint item depending on technical solution
Part.Professional technician can specifically realize described function to each using distinct methods, but this reality
Now it is not considered that exceeding scope of the present application.
The embodiment of the present application can carry out the division of functional unit according to above method example to electronic equipment, for example, can
With each functional unit of each function division of correspondence, two or more functions can also be integrated in a processing unit
In.Above-mentioned integrated unit both can take the form of hardware realization, can also realize in the form of software functional units.It needs
It is noted that be schematical, only a kind of logical function partition to the division of unit in the embodiment of the present application, it is practical real
It is current that there may be another division manner.
Fig. 5 A is the functional unit composition frame of link aggregation rights management device 500 involved in the embodiment of the present application
Figure.The link aggregation rights management device 500 is applied to electronic equipment, and the link aggregation rights management device 500 includes obtaining
Take unit 501, determination unit 502 and limiting unit 503, wherein
The acquiring unit 501, for obtaining at least one target application;
The determination unit 502, for determining the flow usage record of each application at least one described target application,
Obtain at least one flow usage record, the corresponding flow usage record of each application;And according at least one described stream
Amount usage record determines the corresponding illegal operation flow value of each application, obtains at least one illegal operation flow value, described
Illegal operation flow value is in the case where not receiving any user instruction, and automatic execute operates consumed flow;
The limiting unit 503 is greater than preset flow threshold for choosing from least one described illegal operation flow value
The target illegal operation flow value of value, it is corresponding using link aggregation function to limit the target illegal operation flow value.
As can be seen that link aggregation rights management device described in the embodiment of the present application, is applied to electronic equipment, obtains
At least one target application is taken, the flow usage record of each application at least one target application is determined, obtains at least one
Flow usage record, the corresponding flow usage record of each application, is determined each according at least one flow usage record
Using corresponding illegal operation flow value, at least one illegal operation flow value is obtained, illegal operation flow value is not receive
In the case where any user instruction, automatic execute operates consumed flow, chooses from least one illegal operation flow value
Greater than the target illegal operation flow value of preset flow threshold value, limited target illegal operation flow value is corresponding using link
Polymerizable functional in this way, the illegal application for using flow can be identified, and limits it using intelligence link polymerizable functional, realizes
Link aggregation permission is managed, that is, saves flow and also reduces equipment power dissipation.
In a possible example, in terms of described at least one target application of acquisition, the acquiring unit 501 is specific
For:
Obtain multiple third-party applications in the electronic equipment;
It determines the corresponding evaluation parameter of each third-party application in the multiple third-party application, obtains multiple evaluations ginsengs
Number, the evaluation parameter includes download time and star index;
Each third-party application in the multiple third-party application is evaluated according to the multiple evaluation parameter, is obtained
Multiple evaluations of estimate, the corresponding evaluation of estimate of each third-party application;
The objective appraisal value for being less than default Evaluation threshold is chosen from the multiple evaluation of estimate, and obtains the objective appraisal
It is worth corresponding third-party application as the target application.
In a possible example, in terms of described at least one target application of acquisition, the acquiring unit 501 is specific
For:
Obtain the service package of the user identity identification SIM card of the electronic equipment;
When the service package is restricted unlimited flow package, determine that the restricted unlimited flow package is corresponding
Default application identities collection;
The application identities for obtaining multiple third-party applications in the electronic equipment, obtain multiple application identities, and every 1
The corresponding application identities of tripartite's application;
The target application mark that the default application identities collection is not present in the multiple application identities is determined, by institute
It states target application and identifies corresponding third-party application as the target application.
In a possible example, as shown in Figure 5 B, Fig. 5 B is link aggregation rights management device shown in Fig. 5 A
Another modification structures can also include: first detection unit 504 compared with Fig. 5 A, specific as follows:
First detection unit 504 puts out screen state for detecting the electronic equipment and whether being in;By the acquiring unit
The step of 501 when the electronic equipment is in and puts out screen state, executes described at least one target application of acquisition.
In a possible example, as shown in Figure 5 C, Fig. 5 C is link aggregation rights management device shown in Fig. 5 A
Another modification structures can also include: second detection unit 505 compared with Fig. 5 A, specific as follows:
Second detection unit 505, for detecting whether the corresponding application of the target illegal operation flow value is that backstage is answered
With;
By the limiting unit 503, it is used for when the corresponding application of the target illegal operation flow value is background application,
The step of executing the limitation target illegal operation flow value corresponding function using link aggregation.
The embodiment of the present application also provides another electronic equipments, as shown in fig. 6, for ease of description, illustrate only with
The relevant part of the embodiment of the present application, it is disclosed by specific technical details, please refer to the embodiment of the present application method part.The electronics
Equipment can be include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS
Any terminal device such as (Point of Sales, point-of-sale terminal), vehicle-mounted computer, by taking electronic equipment is mobile phone as an example:
Fig. 6 shows the block diagram of the part-structure of mobile phone relevant to electronic equipment provided by the embodiments of the present application.Ginseng
Fig. 6 is examined, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 910, memory 920, input unit 930, display unit
940, sensor 950, voicefrequency circuit 960, Wireless Fidelity (Wireless Fidelity, Wi-Fi) module 970, processor 980,
And the equal components of power supply 990.It will be understood by those skilled in the art that handset structure shown in Fig. 6 is not constituted to mobile phone
It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Fig. 6 to mobile phone:
RF circuit 910 can be used for sending and receiving for information.In general, RF circuit 910 includes but is not limited to antenna, at least one
A amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition,
RF circuit 910 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication
Standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile
Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code it is point more
Location (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division
Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service
(Short Messaging Service, SMS) etc..
Memory 920 can be used for storing software program and module, and processor 980 is stored in memory 920 by operation
Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 920 can mainly include
Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function
Sequence etc.;Storage data area, which can be stored, uses created data etc. according to mobile phone.In addition, memory 920 may include high speed
Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or
Other volatile solid-state parts.
Input unit 930 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with
And the related key signals input of function control.Specifically, input unit 930 may include fingerprint recognition mould group 931 and other are defeated
Enter equipment 932.Fingerprint recognition mould group 931 can acquire the finger print data of user on it.In addition to fingerprint recognition mould group 931, input
Unit 930 can also include other input equipments 932.Specifically, other input equipments 932 can include but is not limited to touch-control
One of screen, physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc.
Or it is a variety of.
Display unit 940 can be used for showing information input by user or be supplied to user information and mobile phone it is various
Menu.Display unit 940 may include display screen 941, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the forms such as organic or inorganic light emitting diode (Organic Light-Emitting Diode, OLED) come
Configure display screen 941.
Mobile phone may also include at least one sensor 950, such as optical sensor, motion sensor, pressure sensor, temperature
Sensor and other sensors.Specifically, optical sensor may include ambient light sensor (also referred to as light sensor) and connect
Nearly sensor, wherein ambient light sensor can adjust the backlight illumination of mobile phone according to the light and shade of ambient light, and then adjust aobvious
The brightness of display screen 941, proximity sensor can close display screen 941 and/or backlight when mobile phone is moved in one's ear.As movement
One kind of sensor, accelerometer sensor can detect the size of (generally three axis) acceleration in all directions, static Shi Kejian
Size and the direction for measuring gravity, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, magnetometer pose calibrating),
Vibration identification correlation function (such as pedometer, percussion) etc.;Gyroscope, barometer, the hygrometer, temperature that can also configure as mobile phone
The other sensors such as meter, infrared sensor are spent, details are not described herein.
Voicefrequency circuit 960, loudspeaker 961, microphone 962 can provide the audio interface between user and mobile phone.Audio-frequency electric
Electric signal after the audio data received conversion can be transferred to loudspeaker 961, be converted to sound by loudspeaker 961 by road 960
Signal plays;On the other hand, the voice signal of collection is converted to electric signal by microphone 962, is turned after being received by voicefrequency circuit 960
It is changed to audio data, then by after the processing of audio data playback process device 980, such as another mobile phone is sent to through RF circuit 910,
Or audio data is played to memory 920 to be further processed.
Wi-Fi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics by Wi-Fi module 970
Mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 6 is shown
Wi-Fi module 970, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need completely not
Change in the range of the essence of invention and omits.
Processor 980 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 920, and call and be stored in memory 920
Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 980 can wrap
Include one or more processing units;Preferably, processor 980 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 980.
Mobile phone further includes the power supply 990 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 980 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.
Mobile phone can also include camera 9100, and camera 9100 is for shooting image and video, and by the image of shooting
It is handled with transmission of video to processor 980.
Mobile phone can be with bluetooth module etc., and details are not described herein.
In earlier figures 1B, Fig. 2, embodiment shown in Fig. 3, each step method process can be based on the structure reality of the mobile phone
It is existing.
The embodiment of the present application also provides a kind of computer storage medium, wherein computer storage medium storage is for electricity
The computer program of subdata exchange, the computer program make computer execute any as recorded in above method embodiment
Some or all of method step, above-mentioned computer include electronic equipment.
The embodiment of the present application also provides a kind of computer program product, and above-mentioned computer program product includes storing calculating
The non-transient computer readable storage medium of machine program, above-mentioned computer program are operable to that computer is made to execute such as above-mentioned side
Some or all of either record method step in method embodiment.The computer program product can be a software installation
Packet, above-mentioned computer includes electronic equipment.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because
According to the application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, related actions and modules not necessarily the application
It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of said units, it is only a kind of
Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit,
It can be electrical or other forms.
Above-mentioned unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If above-mentioned integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer-readable access to memory.Based on this understanding, the technical solution of the application substantially or
Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products
Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment
(can be personal computer, server or network equipment etc.) executes all or part of each embodiment above method of the application
Step.And memory above-mentioned includes: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory
The various media that can store program code such as (RAM, Random Access Memory), mobile hard disk, magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can store in a computer-readable memory, memory
May include: flash disk, read-only memory (English: Read-Only Memory, referred to as: ROM), random access device (English:
Random Access Memory, referred to as: RAM), disk or CD etc..
The embodiment of the present application is described in detail above, specific case used herein to the principle of the application and
Embodiment is expounded, the description of the example is only used to help understand the method for the present application and its core ideas;
At the same time, for those skilled in the art can in specific embodiments and applications according to the thought of the application
There is change place, in conclusion the contents of this specification should not be construed as limiting the present application.
Claims (10)
1. a kind of link aggregation right management method, which is characterized in that be applied to electronic equipment, which comprises
Obtain at least one target application;
The flow usage record for determining each application at least one described target application obtains at least one flow and uses note
Record, the corresponding flow usage record of each application;
The corresponding illegal operation flow value of each application is determined according at least one described flow usage record, obtains at least one
A illegal operation flow value, the illegal operation flow value are in the case where not receiving any user instruction, to execute behaviour automatically
Flow consumed by making;
The target illegal operation flow value for being greater than preset flow threshold value, limit are chosen from least one described illegal operation flow value
It is corresponding using link aggregation function to make the target illegal operation flow value.
2. the method according to claim 1, wherein described at least one target application of acquisition, comprising:
Obtain multiple third-party applications in the electronic equipment;
It determines the corresponding evaluation parameter of each third-party application in the multiple third-party application, obtains multiple evaluation parameters, institute
Stating evaluation parameter includes download time and star index;
Each third-party application in the multiple third-party application is evaluated according to the multiple evaluation parameter, is obtained multiple
Evaluation of estimate, the corresponding evaluation of estimate of each third-party application;
The objective appraisal value for being less than default Evaluation threshold is chosen from the multiple evaluation of estimate, and obtains the objective appraisal value pair
The third-party application answered is as the target application.
3. the method according to claim 1, wherein described at least one target application of acquisition, comprising:
Obtain the service package of the user identity identification SIM card of the electronic equipment;
When the service package is restricted unlimited flow package, determine that the restricted unlimited flow package is corresponding default
Application identities collection;
The application identities for obtaining multiple third-party applications in the electronic equipment obtain multiple application identities, each third party
Using a corresponding application identities;
The target application mark that the default application identities collection is not present in the multiple application identities is determined, by the mesh
The corresponding third-party application of application identities is marked as the target application.
4. method according to claim 1-3, which is characterized in that the method also includes:
It detects the electronic equipment and whether is in and put out screen state;
The electronic equipment be in put out screen state when, execute described at least one target application of acquisition the step of.
5. method according to claim 1-3, which is characterized in that the method also includes:
Detect whether the corresponding application of the target illegal operation flow value is background application;
When the corresponding application of the target illegal operation flow value is background application, executes the limitation target and illegally grasp
The step of making the flow value corresponding function using link aggregation.
6. a kind of link aggregation rights management device, which is characterized in that be applied to electronic equipment, the link aggregation rights management
Device includes acquiring unit, determination unit and limiting unit, wherein
The acquiring unit, for obtaining at least one target application;
The determination unit, for determining the flow usage record of each application at least one described target application, obtain to
A few flow usage record, the corresponding flow usage record of each application;And it is used according at least one described flow
Record determines the corresponding illegal operation flow value of each application, obtains at least one illegal operation flow value, the illegal behaviour
Making flow value is in the case where not receiving any user instruction, and automatic execute operates consumed flow;
The limiting unit, for choosing the target for being greater than preset flow threshold value from least one described illegal operation flow value
It is corresponding using link aggregation function to limit the target illegal operation flow value for illegal operation flow value.
7. device according to claim 6, which is characterized in that described in terms of described at least one target application of acquisition
Acquiring unit is specifically used for:
Obtain multiple third-party applications in the electronic equipment;
It determines the corresponding evaluation parameter of each third-party application in the multiple third-party application, obtains multiple evaluation parameters, institute
Stating evaluation parameter includes download time and star index;
Each third-party application in the multiple third-party application is evaluated according to the multiple evaluation parameter, is obtained multiple
Evaluation of estimate, the corresponding evaluation of estimate of each third-party application;
The objective appraisal value for being less than default Evaluation threshold is chosen from the multiple evaluation of estimate, and obtains the objective appraisal value pair
The third-party application answered is as the target application.
8. device according to claim 6, which is characterized in that described in terms of described at least one target application of acquisition
Acquiring unit is specifically used for:
Obtain the service package of the user identity identification SIM card of the electronic equipment;
When the service package is restricted unlimited flow package, determine that the restricted unlimited flow package is corresponding default
Application identities collection;
The application identities for obtaining multiple third-party applications in the electronic equipment obtain multiple application identities, each third party
Using a corresponding application identities;
The target application mark that the default application identities collection is not present in the multiple application identities is determined, by the mesh
The corresponding third-party application of application identities is marked as the target application.
9. a kind of electronic equipment, which is characterized in that including processor, memory, communication interface, and one or more programs,
One or more of programs are stored in the memory, and are configured to be executed by the processor, described program packet
Include the instruction for executing the step in the method according to claim 1 to 5.
10. a kind of computer readable storage medium, which is characterized in that storage is used for the computer program of electronic data interchange,
In, the computer program makes computer execute the method according to claim 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811566516.7A CN109743755A (en) | 2018-12-19 | 2018-12-19 | Link aggregation right management method and Related product |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811566516.7A CN109743755A (en) | 2018-12-19 | 2018-12-19 | Link aggregation right management method and Related product |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109743755A true CN109743755A (en) | 2019-05-10 |
Family
ID=66360878
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811566516.7A Pending CN109743755A (en) | 2018-12-19 | 2018-12-19 | Link aggregation right management method and Related product |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109743755A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110851819A (en) * | 2019-11-20 | 2020-02-28 | 杭州安恒信息技术股份有限公司 | Multi-application access authority control method and device and electronic equipment |
CN112187745A (en) * | 2020-09-15 | 2021-01-05 | 珠海格力电器股份有限公司 | Equipment monitoring method and device, storage medium and electronic device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103986719A (en) * | 2014-05-26 | 2014-08-13 | 厦门美图之家科技有限公司 | Method for preventing background flow of application programs from being wasted |
CN104135561A (en) * | 2013-07-08 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Method and device of reminding user of flow of terminal as well as terminal |
CN104808892A (en) * | 2014-01-28 | 2015-07-29 | ***通信集团公司 | Application icon ordering method, device, system and associated equipment |
CN105337783A (en) * | 2014-07-14 | 2016-02-17 | 北京奇虎科技有限公司 | Method of monitoring abnormal flow consumption of communication equipment and apparatus |
CN106068019A (en) * | 2016-05-24 | 2016-11-02 | 中国联合网络通信集团有限公司 | Authorization method, terminal unit and the server that focus is shared |
CN106651410A (en) * | 2015-10-29 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Application management method and application management device |
US20180183940A1 (en) * | 2016-12-27 | 2018-06-28 | At&T Mobility Ii Llc | Network-based per-application data usage limitations |
CN108990110A (en) * | 2018-07-26 | 2018-12-11 | Oppo广东移动通信有限公司 | Network flux management method, device, storage medium and terminal |
-
2018
- 2018-12-19 CN CN201811566516.7A patent/CN109743755A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104135561A (en) * | 2013-07-08 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Method and device of reminding user of flow of terminal as well as terminal |
CN104808892A (en) * | 2014-01-28 | 2015-07-29 | ***通信集团公司 | Application icon ordering method, device, system and associated equipment |
CN103986719A (en) * | 2014-05-26 | 2014-08-13 | 厦门美图之家科技有限公司 | Method for preventing background flow of application programs from being wasted |
CN105337783A (en) * | 2014-07-14 | 2016-02-17 | 北京奇虎科技有限公司 | Method of monitoring abnormal flow consumption of communication equipment and apparatus |
CN106651410A (en) * | 2015-10-29 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Application management method and application management device |
CN106068019A (en) * | 2016-05-24 | 2016-11-02 | 中国联合网络通信集团有限公司 | Authorization method, terminal unit and the server that focus is shared |
US20180183940A1 (en) * | 2016-12-27 | 2018-06-28 | At&T Mobility Ii Llc | Network-based per-application data usage limitations |
CN108990110A (en) * | 2018-07-26 | 2018-12-11 | Oppo广东移动通信有限公司 | Network flux management method, device, storage medium and terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110851819A (en) * | 2019-11-20 | 2020-02-28 | 杭州安恒信息技术股份有限公司 | Multi-application access authority control method and device and electronic equipment |
CN112187745A (en) * | 2020-09-15 | 2021-01-05 | 珠海格力电器股份有限公司 | Equipment monitoring method and device, storage medium and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107122760B (en) | Fingerprint identification method and Related product | |
CN107800651A (en) | Closing application program method, apparatus, storage medium and electronic equipment | |
CN107317916B (en) | Application control method and Related product | |
CN107277230A (en) | The voice broadcast method and Related product of message | |
CN107766139B (en) | Application management method and device | |
CN107222914A (en) | Application control method and related product | |
CN107302628A (en) | The control method and Related product of application function | |
CN108122528A (en) | Display control method and related product | |
CN106850983A (en) | One kind puts out screen control method, device and terminal | |
CN110209245A (en) | Face identification method and Related product | |
CN108429575A (en) | antenna switching method, mobile terminal and computer readable storage medium | |
CN108966296A (en) | Signal prompt method, mobile terminal and computer readable storage medium | |
CN109947248A (en) | Vibration control method, mobile terminal and computer readable storage medium | |
CN109618420A (en) | Link aggregation implementation method and Related product | |
CN106505699A (en) | Charge control method, device and terminal | |
CN109922539A (en) | Method for connecting network and Related product | |
CN107291327A (en) | Application control method and related product | |
CN107715449A (en) | A kind of account login method and relevant device | |
CN109640329A (en) | Link aggregation implementation method and Related product | |
CN107239332A (en) | A kind of process handling method, mobile terminal and computer-readable recording medium | |
CN109743755A (en) | Link aggregation right management method and Related product | |
CN110428782A (en) | Brightness adjusting method and Related product | |
CN107330867A (en) | Image combining method, device, computer-readable recording medium and computer equipment | |
CN106535249A (en) | Control method and control device for wireless local area networks, and terminal | |
CN108337370B (en) | Fault detection method and Related product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190510 |