CN110753909B - Service scheduling method and device, computer equipment and computer readable storage medium - Google Patents
Service scheduling method and device, computer equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN110753909B CN110753909B CN201780092177.0A CN201780092177A CN110753909B CN 110753909 B CN110753909 B CN 110753909B CN 201780092177 A CN201780092177 A CN 201780092177A CN 110753909 B CN110753909 B CN 110753909B
- Authority
- CN
- China
- Prior art keywords
- service
- target application
- white list
- foreground
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 81
- 238000012544 monitoring process Methods 0.000 claims description 14
- 230000008569 process Effects 0.000 description 22
- 238000010586 diagram Methods 0.000 description 17
- 230000006870 function Effects 0.000 description 12
- 238000012545 processing Methods 0.000 description 6
- 238000004590 computer program Methods 0.000 description 5
- 238000009434 installation Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000012217 deletion Methods 0.000 description 3
- 230000037430 deletion Effects 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
A service scheduling method comprises the following steps: if the target application service of the application program is detected to start foreground service in the terminal, a service white list corresponding to the application program is obtained, wherein the service white list comprises one or more service identifiers, and each service identifier is used for uniquely marking one application service of the application program; judging whether the service white list comprises a service identifier of the target application service or not; and if the service white list comprises the service identifier of the target application service, the application service is operated in the foreground. The method can prevent the malicious application service from occupying the foreground service at will, so that the system resources are occupied, and the utilization rate of the system resources is improved.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a service scheduling method and apparatus, a computer device, and a computer readable storage medium.
Background
In an intelligent terminal, there is a service without an interface, and the service is generally classified into a foreground service and a background service. When the foreground service is running, the foreground service has higher priority, and can not be actively closed by the terminal when the memory of the terminal system is insufficient and the occupancy rate of a CPU (Central Processing Unit ) is too high. The priority of the background service is low, and when the memory of the terminal system is insufficient and the CPU occupancy rate is too high, the background service may be closed by the terminal to recover resources. If the developer does not follow the rules of the foreground service, many useless application services in the terminal system run in the form of the foreground service, so that terminal resources are occupied.
Disclosure of Invention
The embodiment of the application provides a service scheduling method and device, computer equipment and a computer readable storage medium, which can reduce resource occupation.
A method of service scheduling, the method comprising:
if the target application service of the application program is detected to start foreground service in the terminal, a service white list corresponding to the application program is obtained, wherein the service white list comprises one or more service identifiers, and each service identifier is used for uniquely marking one application service of the application program;
judging whether the service white list comprises a service identifier of the target application service or not;
and if the service white list comprises the service identifier of the target application service, the foreground operates the target application service.
A service scheduling apparatus, the apparatus comprising:
the list acquisition module is used for acquiring a service white list corresponding to an application program if a target application service of the application program is detected in the terminal to start a foreground service, wherein the service white list comprises one or more service identifiers, and each service identifier is used for uniquely marking one application service of the application program;
The identification matching module is used for judging whether the service white list comprises the service identification of the target application service or not;
and the service running module is used for running the target application service in the foreground if the service white list comprises the service identifier of the target application service.
A computer device comprising a memory and a processor, the memory having stored therein computer readable instructions that, when executed by the processor, cause the processor to perform the steps of:
if the target application service of the application program is detected to start foreground service in the terminal, a service white list corresponding to the application program is obtained, wherein the service white list comprises one or more service identifiers, and each service identifier is used for uniquely marking one application service of the application program;
judging whether the service white list comprises a service identifier of the target application service or not;
and if the service white list comprises the service identifier of the target application service, the foreground operates the target application service.
One or more non-transitory computer-readable storage media containing computer-executable instructions that, when executed by one or more processors, cause the processors to perform the steps of:
If the target application service of the application program is detected to start foreground service in the terminal, a service white list corresponding to the application program is obtained, wherein the service white list comprises one or more service identifiers, and each service identifier is used for uniquely marking one application service of the application program;
judging whether the service white list comprises a service identifier of the target application service or not;
and if the service white list comprises the service identifier of the target application service, the foreground operates the target application service.
According to the service scheduling method and device, the computer equipment and the computer readable storage medium, when the target application service of the application program is detected in the terminal to start the foreground service, the service white list corresponding to the application program is obtained, and the running mode of the target application service is judged through the service white list. The method can prevent the malicious application service from occupying the foreground service at will, so that the system resources are occupied, and the utilization rate of the system resources is improved.
Drawings
For a clearer description of embodiments of the present application or of the solutions of the prior art, the drawings that are required to be used in the description of the embodiments or of the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without the need for inventive labour for a person skilled in the art;
FIG. 1 is an application environment diagram of a service scheduling method in one embodiment;
FIG. 2 is a flow diagram of a method of service scheduling in one embodiment;
FIG. 3 is a flow chart of a method of service scheduling in another embodiment;
FIG. 4 is a diagram of an input interface for invoking permissions in one embodiment;
FIG. 5 is a diagram of a terminal interface for modifying a service white list in one embodiment;
FIG. 6 is a flow chart of a method of service scheduling in yet another embodiment;
FIG. 7 is a schematic diagram of a service invocation apparatus in one embodiment;
FIG. 8 is a schematic diagram of a service invocation apparatus according to another embodiment;
FIG. 9 is a schematic diagram of an internal structure of a server in one embodiment;
fig. 10 is a block diagram of a part of a structure of a mobile phone related to a computer device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
FIG. 1 is an application environment diagram of a service scheduling method in one embodiment. As shown in fig. 1, the application environment includes a user terminal 102 and a server 104. The server 104 may send an installation package of the application program to the user terminal, and the user terminal 102 may install the application program through the installation package, and perform application interaction with the server 104 through the application program, and transmit application data. In the process of running an application program by the user terminal 102, if a target application service of the application program is detected in the terminal to start a foreground service, a service white list corresponding to the application program is obtained, wherein the service white list comprises one or more service identifiers, and each service identifier is used for uniquely marking one application service of the application program; judging whether the service white list comprises a service identifier of the target application service or not; and if the service white list comprises the service identifier of the target application service, the foreground operates the target application service. The user terminal 102 is an electronic device located at the outermost periphery of the computer network, and is mainly used for inputting user information and outputting processing results, and may be, for example, a personal computer, a mobile terminal, a personal digital assistant, a wearable electronic device, etc. Server 104 is a device, such as one or more computers, that responds to requests for services while providing computing services. It will be appreciated that in other embodiments provided herein, the service scheduling method may be implemented in an application environment that includes only the user terminal 102.
FIG. 2 is a flow diagram of a method of service scheduling in one embodiment. As shown in fig. 2, the service scheduling method includes steps 202 to 206. Wherein:
step 202, if it is detected in the terminal that the target application service of the application program starts the foreground service, a service white list corresponding to the application program is obtained, where the service white list includes one or more service identifiers, and each service identifier is used to uniquely identify an application service of the application program.
An application refers to software written for some application purpose in an electronic device, and the electronic device realizes a demand service for a user through the application. One or more Application programs can be installed in the terminal, and a user can realize Application purposes through operation of the Application programs, for example, the user can operate a shopping APP (Application) to purchase goods, can listen to music through a music APP, can play games through a game APP, and the like. When the application program runs at the terminal, the application operation is completed through an application service (service), and one application program can simultaneously enable one or more application services, for example, one application program can comprise a plurality of services such as a data updating service, a music playing service, a data transmission service and the like. In general, application services may be divided into a foreground service, which is a service running in the foreground of a terminal, and a background service, which is a service running in the background of the terminal. The foreground service has higher priority and cannot be actively closed in the running process of the terminal; background services have low priority and may be shut down by the system in the event of insufficient terminal resources.
In one embodiment, a service white list is stored in the terminal, and the service white list corresponds to the application program one by one, and is used for storing a service identifier corresponding to the application service allowed to run in a foreground service mode. It will be appreciated that one or more service identities may be included in the service whitelist, each service identity being for uniquely identifying one application service of the application. The service whitelist may be stored in a database of the terminal or in a file. And acquiring the corresponding service white list according to the application program identifier, and then acquiring the service identifier in the service white list. Application identification refers to a unique identification that distinguishes between different applications, and may be, but not limited to, the package name of an application, e.g., in an Android system, the package name of an application may be com. The service identity is a unique identity of the application service and may be, but is not limited to, a class name of the application service.
Step 204, it is determined whether the service white list includes the service identifier of the target application service.
In one embodiment, the service white list may be displayed through an interface of the terminal, and the user may view the service white list through the terminal interface, and may perform operations such as modification, addition, deletion, etc. on the service identifier in the service white list as required. Specifically, an operation instruction input by a user for modifying the service white list is received, and the service white list is modified according to the operation instruction input by the user. For example, the user may first select an application program to be operated through the terminal interface, the terminal displays a service white list corresponding to the application program and service identifiers of all application services, and then the user may edit the service white list through the terminal interface. It will be appreciated that the service whitelist may be pushed to the terminal by the server. Specifically, when the server sends an installation package of the application program to the terminal, the server simultaneously sends a corresponding service white list to the terminal. The service white list sent by the server to the terminal can store service identifiers of application services with higher priorities, and for the application services with higher priorities in the service white list, the user cannot change randomly.
And when the target application service is detected to start the foreground service, acquiring the service identification of the target application service. For example, in the Android system, the activitymanager, runningserviceinfo class encapsulates information of all application services, and may obtain a service identifier of the application service by calling the activitymanager, runningserviceinfo class. After the service identifier of the target application service is obtained, traversing the service identifiers in the service white list, comparing the service identifier corresponding to the target application service with the service identifiers in the service white list one by one, and judging whether the service white list contains the service identifier corresponding to the target application service.
In step 206, if the service white list includes the service identifier of the target application service, the foreground runs the target application service.
After comparing the service identification of the target application service with the service identifications in the service white list, a match may be found. Specifically, if a matching item exists, the service identifier of the target application service is included in the service white list, and the foreground runs the target application service. The foreground operation target application service refers to that the application service is operated in the form of a foreground service. If no matching item exists, the service identifier of the target application service is not included in the service white list, and the target application service is operated in the background or not operated. In general, if an application service is run in the form of a foreground service, the application service may be displayed in a notification bar of a terminal, and a user may view the application service run in the foreground service through the notification bar. When an application service is terminated, the relevant information of the application service displayed in the notification bar also disappears. If the application service is running in the form of a background service, the application service is not displayed in the notification bar.
According to the service scheduling method provided by the embodiment, when the fact that the target application service of the application program is started up to the foreground service is detected in the terminal, the service white list corresponding to the application program is obtained, and the running mode of the target application service is judged through the service white list. The method can prevent the malicious application service from occupying the foreground service at will, so that the system resources are occupied, and the utilization rate of the system resources is improved.
FIG. 3 is a flow chart of a service scheduling method in another embodiment. As shown in fig. 3, the service scheduling method includes steps 302 to 324. Wherein:
in step 302, if it is detected in the terminal that the target application service of the application program starts the foreground service, the service class of the target application service is obtained.
In one embodiment, when it is detected that the target application service is starting the foreground service, the service level of the target application service may be first acquired, and whether to run in the form of the foreground service may be determined according to the service level of the target application service. Application services may be prioritized in general, and the service class refers to the priority of the application service. The application services may be classified according to different criteria, and may be classified into a plurality of classes, which are not limited in this embodiment. For example, application services are classified according to an operation range, and may be classified into Local Service (Local Service) and Remote Service (Remote Service), and it may be defined that locally operated application services are ranked higher than remotely operated application services. The classification can be performed according to the importance of the application service, and the classification can be classified into three grades, namely grade 1, grade 2, grade 3 and the like.
Step 304, judging whether the service level is smaller than a preset level, if so, executing step 306; if not, go to step 318.
Judging whether the service level of the target application service is smaller than a preset level, if so, directly operating the target application service in a foreground service mode; and if the service identifier is smaller than the preset level, acquiring a service white list corresponding to the application program, and running according to a matching result of the service identifier of the target application service and the service white list.
Step 306, a service white list corresponding to the application program is obtained, where the service white list includes one or more service identifiers, and each service identifier is used to uniquely identify an application service of the application program.
In the embodiment provided by the application, the service whitelist can be stored in the form of a file, and each application program corresponds to one service whitelist file. The service white list file can be stored in a memory of the terminal, and the corresponding service white list file is obtained according to the package name of the application program. When a user needs to check the service white list, the terminal acquires the application program name input by the user, searches the corresponding application program package name according to the application program name, and then searches the corresponding service white list file in the memory according to the application program package name. And then the terminal reads the service identifier in the service white list file and displays the read service identifier in a terminal interface. The user can also add, delete and the like the service identification in the service white list through the terminal interface.
Step 308, obtain the service identifier of the target application service, and match the service identifier of the target application service with the service identifier in the service white list.
And acquiring a service identifier corresponding to the target application service, searching the service identifier in the service white list, matching the service identifier of the target application service with the service identifier in the service white list, and determining whether a matching item exists. For example, the service identifiers stored in the service white list include service 1, service 2, service 3, service 4, service 5, and service 6, and if the service identifier of the acquired application service is service 4, it indicates that the service identifier of the application service exists in the service white list.
Step 310, judging whether the service white list includes a service identifier of the target application service, if yes, executing step 318; if not, go to step 312.
Matching a service identifier of a target application service with a service identifier in a service white list, and if the service identifier corresponding to the target application service exists in the service white list, operating the application service in a form of a foreground service; and if the service identifier corresponding to the application service does not exist in the service white list, matching the service identifier with the service black list.
Step 312, judging whether the service blacklist includes a service identifier of the target application service, if yes, executing step 328; if not, go to step 314.
In one embodiment, the service white list and the service black list can be stored in the terminal at the same time, and the management of the application service is realized through the service white list and the service black list together. The service blacklist is used for storing service identifiers corresponding to application services which are forbidden to run in a foreground service mode. For example, some application services with high memory consumption may be configured to prohibit running in the form of a foreground service, add a service identifier of the application service to a service blacklist, and run directly in the form of a background service when the application service runs, or not run. The service identifier in the service blacklist can be set through the system, and the user can also perform custom setting.
Matching the service identifier of the target application service with the service identifier in the service blacklist, and if the service identifier of the target application service exists in the service blacklist, directly operating the target application service in a background service mode; if the service identifier of the target application service does not exist in the service blacklist, the service identifier of the target application service is indicated to not exist in the service blacklist and the service blacklist, and the running authority of the target application service can be set by a user.
And step 314, receiving the call permission input by the terminal.
Specifically, the user may input, through the terminal, a call right of the target application service, the call right being used to indicate whether the target application service is allowed to run in the form of a foreground service. If the user inputs permission call through the terminal, the target application service is operated in a foreground service mode; and if the user inputs the forbidden call through the terminal, the target application service is operated in the form of background service. FIG. 4 is a diagram of an input interface for invoking permissions in one embodiment. As shown in fig. 4, when the terminal detects that the target application service starts the foreground service, the terminal interface prompts the user to input the call permission in a popup window mode, the user selects whether to allow the target application service to run in the foreground service mode according to the popup window interface, if yes, the target application service is run in the foreground service mode, and the service identifier corresponding to the target application service is added into the service white list. If the user selects no, the target application service is operated in the form of background service, and the service identifier corresponding to the target application service is added into the service blacklist.
And step 316, if the calling authority is permission calling, adding the service identifier corresponding to the target application service into the service white list.
At step 318, the foreground runs the target application service.
If the user inputs permission call through the terminal, the user is stated to allow the target application service to run in the form of foreground service, the service identifier corresponding to the target application service is added into the service white list, and the target application service can be directly run in the form of foreground service when the foreground service is started again by the next time the target application service. Specifically, if the call permission input by the terminal is permission call, the target application service is operated in a foreground service mode, and a service identifier corresponding to the target application service is added into a service white list.
Step 320, if the duration of the target application service running in the foreground exceeds the duration threshold, the target application service is running in the background.
In one embodiment, a duration threshold, which refers to the length of time an application service is allowed to run in the form of a foreground service, may also be stored in the service whitelist. And the service identifiers in the service white list and the duration thresholds are in one-to-one correspondence, and the corresponding duration thresholds can be obtained according to the service identifiers. Specifically, timing is started from the moment that the target application service runs in a foreground mode, the running duration of the current moment is obtained in real time, and if the running duration exceeds a duration threshold, the target application service is converted into a background service mode to run. For example, the duration threshold corresponding to the application service 1 is 30 minutes, the application service 1 runs in the form of a foreground service from 12:00, and when the time reaches 12:30, the application service 1 is converted into the form of a background service to run.
Step 322, acquiring the resource occupancy rate of the terminal, acquiring the service identifier corresponding to the resource occupancy rate in the service white list, and running the application service corresponding to the acquired service identifier in the form of background service.
In one embodiment, the resource occupancy rate refers to a ratio of occupied terminal resources, and may specifically include a memory occupancy rate, a CPU occupancy rate, and the like, which is not limited herein. The CPU refers to a structure of an electronic device that provides operation and control functions, and may be a large-scale integrated circuit, which is mainly used for interpreting computer instructions and processing data in computer software. When the electronic device runs computer software, application events need to be processed through the CPU, and CPU resources are occupied by the application events. The CPU occupancy rate may refer to a ratio of occupied CPU resources to total CPU resources, or may refer to a ratio of time for a CPU to execute a task to total operating time. In general, the CPU occupancy rate may be embodied in the form of, but not limited to, a percentage, with a specific percentage value representing how much of a specific occupied CPU resource or how long the CPU resource is occupied. For example, a CPU occupancy of 50% indicates that 50% of the CPU resources are occupied, or that 50% of the CPU resources are occupied during the total operating time.
The corresponding relation between the resource occupancy rate and the service identifier can be established, and the corresponding relation between the resource occupancy rate and the service level can be established, so that the corresponding service identifier is obtained. And acquiring a corresponding service identifier according to the resource occupancy rate, and operating the application service corresponding to the acquired service identifier in a background service mode. For example, the service class is classified into a class 1, a class 2 and a class 3, and when the memory occupancy rate is greater than 50%, the application service corresponding to the class 3 is operated in the form of background service; when the memory occupancy rate is greater than 70%, operating the application services corresponding to the level 2 and the level 3 in a background service mode; and when the memory occupancy rate is greater than 90%, operating the application services corresponding to the level 1, the level 2 and the level 3 in the form of background services.
Specifically, the resource occupancy rate corresponding to each application program can be obtained, the corresponding service identifier is obtained according to the resource occupancy rate corresponding to each application program, and the application service corresponding to the obtained service identifier is operated in the form of background service. For example, if the CPU occupancy rate of a certain application is higher than 20%, the application service with the service class of level 3 corresponding to the application is operated in the background service form, so that the resources of the terminal can be managed reasonably.
In one embodiment, a monitoring log file may be obtained in a preset storage address, and the CPU occupancy rate may be obtained according to the monitoring log file. The preset storage address is a preset address for storing a monitoring log file, and the monitoring log file records the change of specific running conditions from starting to the current moment of the CPU. And searching the monitoring log file according to the monitoring log file identification in the preset storage address. The monitoring log file identification refers to a unique identification for distinguishing the monitoring log file, such as the name and the number of the monitoring log file. Specifically, the preset storage address may include a plurality of subfolders, where each process log file is stored in the subfolder. The process log files record the change of specific running conditions of the process from starting to the current moment, and the CPU resource occupied by the process can be acquired according to the process log files, so that the CPU occupancy rate of the process can be acquired. The process refers to a basic unit of scheduling of resource allocation by the CPU, and is also a basic unit of executing tasks by the CPU. Each application program comprises one or more processes, so that the CPU occupancy rate corresponding to each application program can be obtained according to the CPU occupancy rate of the process and the corresponding relation between the process and the application program.
For example, in the Android system, a monitoring log file storing the total occupation information of the CPU can be read in the/proc directory. The/proc directory contains a plurality of subfolders, and process log files of CPU occupation information corresponding to each process are stored in the subfolders. The file name of the monitoring log file stored in the proc directory is "stat", and the file name of the progress log file is "stat" stored in the subfolder in the proc directory. The stat file under the proc directory records the total occupation information of the CPU, and the stat file in the subfolder under the proc directory records the CPU occupation information of each process. For example, a stat file under the/proc/pid directory records CPU occupancy information for the pid process, where the pid is a process identification.
In step 324, if it is detected that the application is deleted, the service whitelist corresponding to the application is deleted.
In one embodiment, the service whitelist corresponds to an application, and when the application is detected to be deleted, the service whitelist corresponding to the application can be deleted at the same time. It will be appreciated that the service blacklist corresponds to the application, and when the application is detected to be deleted, the service blacklist corresponding to the application may be deleted. When the application is installed again, the corresponding service white list and service black list are updated.
And step 326, if the calling authority is forbidden, adding the service identifier corresponding to the target application service into the service blacklist.
In step 328, the target application service is run in the background.
If the user inputs the forbidden call through the terminal, the user is informed of prohibiting the target application service from running in the form of a foreground service, a service identifier corresponding to the target application service is added into a service blacklist, and when the target application service is started again for the next time, the target application service is prohibited from running in the form of the foreground service, and the target application service is directly run in the form of a background service. Specifically, if the call permission input by the terminal is forbidden, the target application service is operated in a background service mode, and a service identifier corresponding to the target application service is added into a service blacklist.
Fig. 5 is a diagram of a terminal interface for modifying a service white list in one embodiment. As shown in fig. 5, in the modification interface of the service white list, the user may select an application program to be modified, and then the terminal may select the service white list corresponding to the application program to display. The user can select the service identifier to be modified from the service white list, and click the delete button to delete the selected service identifier. The add button may also be clicked to add a new service identification.
According to the service scheduling method provided by the embodiment, when the fact that the target application service of the application program is started up to the foreground service is detected in the terminal, the service white list corresponding to the target application program is obtained, and the running mode of the target application service is judged through the service white list. The method can prevent the malicious application service from occupying the foreground service at will, so that the system resources are occupied, and the utilization rate of the system resources is improved.
Fig. 6 is a flowchart of a service scheduling method in yet another embodiment. The service scheduling method includes steps 602 to 614. Wherein:
in step 602, a target application service of an application program is detected to launch a foreground service.
Step 604, determining whether the target application service has a call authority, if yes, executing step 614; otherwise, step 606 is performed.
Acquiring a service identifier of a target application service, matching the service identifier of the target application service with a service identifier in a service white list, and if the service identifier of the target application service exists in the service white list, calling the target application service; if the service identifier of the target application service does not exist in the service white list, the target application service has no calling authority.
Step 606, determining whether the target application service has been refused to be invoked, if so, executing step 612; otherwise, step 608 is performed.
Matching the service identifier of the target application service with the service identifier in the service blacklist, and if the service identifier of the target application service exists in the service blacklist, indicating that the target application service is refused to call the foreground service; if the service identifier of the target application service does not exist in the service white list, the target application service is not refused to call the foreground service.
Step 608, receiving the call permission input by the user.
Step 610, determining whether the call permission input by the user is permission to call, if yes, executing step 614; otherwise, step 612 is performed.
In step 612, the target application service is run in the background.
At step 614, the foreground runs the target application service.
FIG. 7 is a schematic diagram of a service invocation apparatus in one embodiment. As shown in fig. 7, the service invocation apparatus 700 includes a list acquisition module 702, an identification matching module 704, and a service execution module 706. Wherein:
the list obtaining module 702 is configured to obtain a service white list corresponding to an application if a target application service of the application is detected to start a foreground service in a terminal, where the service white list includes one or more service identifiers, and each service identifier is used to uniquely identify an application service of the application.
And the identifier matching module 704 is configured to determine whether the service identifier of the target application service is included in the service white list.
And the service running module 706 is configured to run the target application service in the foreground if the service identifier of the target application service is included in the service white list.
The service scheduling device provided in the above embodiment obtains the corresponding service white list when detecting that the target application service with the application program is starting the foreground service in the terminal, and determines the running mode of the target application service through the service white list. The method can prevent the malicious application service from occupying the foreground service at will, so that the system resources are occupied, and the utilization rate of the system resources is improved.
Fig. 8 is a schematic structural diagram of a service invocation apparatus in another embodiment. As shown in fig. 7, the service invocation apparatus 800 includes a list acquisition module 802, an identification matching module 804, a service running module 806, a resource acquisition module 808, and a list deletion module 810. Wherein:
the list obtaining module 802 is configured to obtain a service white list corresponding to an application if a target application service of the application is detected to start a foreground service in a terminal, where the service white list includes one or more service identifiers, and each service identifier is used for uniquely identifying one application service of the application.
The identifier matching module 804 is configured to determine whether the service identifier of the target application service is included in the service white list.
And a service running module 806, configured to run the target application service in the foreground if the service identifier of the target application service is included in the service white list.
A resource obtaining module 808, configured to obtain a resource occupancy rate of a terminal, and obtain a service identifier corresponding to the resource occupancy rate in the service white list; and running the application service corresponding to the acquired service identifier in a background service mode.
The list deletion module 810 deletes the service white list corresponding to the application if detecting that the application is deleted.
The service scheduling device provided in the above embodiment obtains the corresponding service white list when detecting that the target application service with the application program is starting the foreground service in the terminal, and determines the running mode of the target application service through the service white list. The method can prevent the malicious application service from occupying the foreground service at will, so that the system resources are occupied, and the utilization rate of the system resources is improved.
In one embodiment, the list obtaining module 802 is further configured to obtain a service class of a target application service of an application if it is detected in the terminal that the target application service of the application starts a foreground service; and if the service grade is smaller than a preset grade, acquiring a service white list corresponding to the application program.
In one embodiment, the service running module 806 is further configured to run the target application service in the foreground if the service level is greater than or equal to a preset level.
In one embodiment, the service running module 806 is further configured to obtain a duration threshold corresponding to the service identifier in the service white list; and if the duration of the target application service running in the foreground exceeds the duration threshold, running the target application service in the background.
In one embodiment, the service running module 806 is further configured to run the target application service in the background if the service identifier of the target application service is not included in the service white list.
In one embodiment, if the service white list does not include the service identifier of the target application service, the service running module 806 receives a call permission input by the terminal, where the call permission is used to indicate whether to allow the foreground to run the permission of the target application service; and operating the target application service according to the calling authority.
In one embodiment, the service running module 806 is further configured to, if the service white list does not include the service identifier of the target application service, match the service identifier with a service black list, where the service black list is used to store the service identifier corresponding to the application service that is prohibited from running in the foreground; if the service blacklist does not comprise the service identifier of the target application service, receiving the calling authority input by the terminal; and operating the target application service according to the calling authority.
The division of the modules in the service invocation device is only used for illustration, and in other embodiments, the service invocation device may be divided into different modules as required to complete all or part of the functions of the service invocation device.
The embodiment of the application also provides a storage medium. One or more non-volatile storage media containing computer-executable instructions that, when executed by one or more processors, cause the processors to perform the steps of:
if the target application service of the application program is detected to start foreground service in the terminal, a service white list corresponding to the application program is obtained, wherein the service white list comprises one or more service identifiers, and each service identifier is used for uniquely marking one application service of the application program;
judging whether the service white list comprises a service identifier of the target application service or not;
and if the service white list comprises the service identifier of the target application service, the foreground operates the target application service.
In one embodiment, the obtaining, by the processor, the service white list corresponding to the application program if the target application service of the application program is detected in the terminal to start the foreground service includes:
If the target application service of the application program is detected to start the foreground service in the terminal, acquiring the service grade of the target application service;
and if the service grade is smaller than a preset grade, acquiring a service white list corresponding to the application program.
In one embodiment, the method performed by the processor further comprises:
and if the service grade is greater than or equal to a preset grade, the foreground operates the target application service.
In one embodiment, the method performed by the processor further comprises:
acquiring a duration threshold corresponding to the service identifier in the service white list;
and if the duration of the target application service running in the foreground exceeds the duration threshold, running the target application service in the background.
In one embodiment, the method performed by the processor further comprises:
and if the service white list does not comprise the service identifier of the target application service, the background operates the target application service.
In one embodiment, the method performed by the processor further comprises:
if the service white list does not comprise the service identifier of the target application service, receiving the calling authority input by the terminal, wherein the calling authority is used for indicating whether the foreground is allowed to run the authority of the target application service;
And operating the target application service according to the calling authority.
In one embodiment, the method performed by the processor further comprises:
if the service white list does not comprise the service identifier of the target application service, matching the service identifier with a service black list, wherein the service black list is used for storing the service identifier corresponding to the application service forbidden to run in the prior art;
if the service blacklist does not comprise the service identifier of the target application service, receiving the calling authority input by the terminal;
and operating the target application service according to the calling authority.
In one embodiment, the executing the target application service according to the call right by the processor includes:
if the calling authority is permission for calling, a service identifier corresponding to the target application service is added to the service white list, and the target application service is operated in the foreground;
and if the calling permission is forbidden, adding a service identifier corresponding to the target application service into the service blacklist, and running the target application service in the background.
In one embodiment, the method performed by the processor further comprises:
Acquiring the resource occupancy rate of a terminal, and acquiring a service identifier corresponding to the resource occupancy rate in the service white list;
and running the application service corresponding to the acquired service identifier in a background service mode.
In one embodiment, the method performed by the processor further comprises:
and if the application program is detected to be deleted, deleting the service white list corresponding to the application program.
FIG. 9 is a schematic diagram of an internal structure of a server in one embodiment. As shown in fig. 9, the server includes a processor, a nonvolatile storage medium, an internal memory, and a network interface connected by a system bus. Wherein the non-volatile storage medium of the server stores an operating system and a computer program. The computer program is executed by a processor to implement a service scheduling method. The processor of the server is used to provide computing and control capabilities, supporting the operation of the entire server. The network interface of the server is used for communicating with an external terminal through network connection, such as receiving an installation package acquisition request sent by the terminal, returning an installation package, a service white list and the like to the terminal. The server may be implemented as a stand-alone server or as a server cluster composed of a plurality of servers. It will be appreciated by those skilled in the art that the structure shown in fig. 9 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the server to which the present application is applied, and that a particular server may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
The embodiment of the invention also provides computer equipment. As shown in fig. 10, for convenience of explanation, only the portions related to the embodiments of the present invention are shown, and specific technical details are not disclosed, please refer to the method portions of the embodiments of the present invention. The computer device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant ), a POS (Point of Sales), a vehicle-mounted computer, a wearable device, and the like, taking the computer device as an example of the mobile phone:
fig. 10 is a block diagram of a part of a structure of a mobile phone related to a computer device according to an embodiment of the present invention. Referring to fig. 10, the mobile phone includes: radio Frequency (RF) circuitry 1010, memory 1020, input unit 1030, display unit 1040, sensor 1050, audio circuitry 1060, wireless fidelity (wireless fidelity, wiFi) module 1070, processor 1080, and power source 1090. It will be appreciated by those skilled in the art that the handset construction shown in fig. 10 is not limiting of the handset and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
The RF circuit 1010 may be used to receive and transmit information or receive and transmit signals during a call, and may receive downlink information of a base station and process the downlink information for the processor 1080; the uplink data may be transmitted to the base station. Typically, RF circuitry includes, but is not limited to, antennas, at least one amplifier, transceivers, couplers, low noise amplifiers (Low Noise Amplifier, LNAs), diplexers, and the like. In addition, the RF circuitry 1010 may also communicate with networks and other devices via wireless communications. The wireless communications may use any communication standard or protocol including, but not limited to, global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code division multiple access (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), email, short message service (Short Messaging Service, SMS), and the like.
The memory 1020 may be used to store software programs and modules that the processor 1080 performs various functional applications and data processing of the handset by executing the software programs and modules stored in the memory 1020. The memory 1020 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, application programs required for at least one function (such as an application program of a sound playing function, an application program of an image playing function, etc.), and the like; the data storage area may store data (such as audio data, address book, etc.) created according to the use of the cellular phone, etc. In addition, memory 1020 may include high-speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state memory device.
The input unit 1030 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the handset 1000. In particular, the input unit 1030 may include a touch panel 1031 and other input devices 1032. The touch panel 1031, which may also be referred to as a touch screen, may collect touch operations thereon or thereabout by a user (e.g., operations of the user on the touch panel 1031 or thereabout using any suitable object or accessory such as a finger, stylus, etc.), and drive the corresponding connection device according to a predetermined program. In one embodiment, touch panel 1031 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch azimuth of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device and converts it into touch point coordinates, which are then sent to the processor 1080 and can receive commands from the processor 1080 and execute them. Further, the touch panel 1031 may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 1030 may include other input devices 1032 in addition to the touch panel 1031. In particular, other input devices 1032 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), and the like.
The display unit 1040 may be used to display information input by a user or information provided to the user and various menus of the mobile phone. The display unit 1040 may include a display panel 1041. In one embodiment, the display panel 1041 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like. In one embodiment, touch panel 1031 may overlay display panel 1041, and when touch panel 1031 detects a touch operation thereon or thereabout, it is communicated to processor 1080 to determine the type of touch event, and processor 1080 then provides a corresponding visual output on display panel 1041 based on the type of touch event. Although in fig. 10, the touch panel 1031 and the display panel 1041 are two independent components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 1031 and the display panel 1041 may be integrated to implement the input and output functions of the mobile phone.
The handset 1000 may also include at least one sensor 1050, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1041 according to the brightness of ambient light, and the proximity sensor may turn off the display panel 1041 and/or the backlight when the mobile phone moves to the ear. The motion sensor can comprise an acceleration sensor, the acceleration sensor can detect the acceleration in all directions, the gravity and the direction can be detected when the motion sensor is static, and the motion sensor can be used for identifying the application of the gesture of a mobile phone (such as switching of a transverse screen and a vertical screen), vibration identification related functions (such as a pedometer and knocking) and the like; in addition, the mobile phone can be provided with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor and the like.
Audio circuitry 1060, speaker 1061, and microphone 1062 may provide an audio interface between a user and a cell phone. Audio circuit 1060 may transmit the received electrical signal after audio data conversion to speaker 1061 for conversion by speaker 1061 into an audio signal output; on the other hand, microphone 1062 converts the collected sound signals into electrical signals, which are received by audio circuit 1060 and converted into audio data, which are processed by audio data output processor 1080 and transmitted to another cell phone via RF circuit 1010 or output to memory 1020 for subsequent processing.
WiFi belongs to a short-distance wireless transmission technology, and a mobile phone can help a user to send and receive emails, browse webpages, access streaming media and the like through a WiFi module 1070, so that wireless broadband Internet access is provided for the user. Although fig. 10 shows a WiFi module 1070, it is understood that it is not a necessary component of the handset 1000 and may be omitted as desired.
Processor 1080 is the control center of the handset, connects the various parts of the entire handset using various interfaces and lines, and performs various functions and processes of the handset by running or executing software programs and/or modules stored in memory 1020, and invoking data stored in memory 1020, thereby performing overall monitoring of the handset. In one embodiment, processor 1080 may include one or more processing units. In one embodiment, processor 1080 may integrate an application processor and a modem processor, wherein the application processor primarily processes operating systems, user interfaces, application programs, and the like; the modem processor primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 1080.
The handset 1000 further includes a power source 1090 (e.g., a battery) for powering the various components, which may preferably be logically connected to the processor 1080 by a power management system for performing functions such as managing charge, discharge, and power consumption by the power management system.
In one embodiment, the handset 1000 may also include a camera, bluetooth module, etc.
In the embodiment of the present invention, the processor 1080 included in the mobile terminal implements the service scheduling method provided in the above embodiment when executing the computer program stored on the memory.
A computer program product comprising instructions which, when run on a computer, cause the computer to perform the service scheduling method provided by the above embodiments.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a non-volatile computer readable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), or the like.
Any reference to memory, storage, database, or other medium as used herein may include non-volatile and/or volatile memory. Suitable nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The foregoing examples illustrate only a few embodiments of the invention and are described in detail herein without thereby limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.
Claims (12)
1. A method of service scheduling, the method comprising:
if the target application service of the application program is detected to start the foreground service in the terminal, acquiring the service grade of the target application service; if the service grade is greater than or equal to a preset grade, the foreground operates the target application service; if the service level is smaller than a preset level, acquiring a service white list corresponding to the application program, wherein the service white list comprises one or more service identifiers, and each service identifier is used for uniquely marking one application service of the application program;
judging whether the service white list comprises a service identifier of the target application service or not;
if the service white list comprises the service identifier of the target application service, the foreground runs the target application service, a duration threshold corresponding to the service identifier in the service white list is obtained, and if the duration of the target application service running in the foreground exceeds the duration threshold, the background runs the target application service; if the service white list does not comprise the service identifier of the target application service, judging whether the target application service is refused to be called, if yes, running the target application service in the background, otherwise, receiving the calling authority input by the user, judging whether the calling authority input by the user is allowed to be called, if yes, running the target application service in the foreground, and if not, running the target application service in the background; the foreground operation refers to operation in the form of foreground service; the background operation refers to operation in the form of background service.
2. The service scheduling method according to claim 1, wherein the service whitelist is stored in a database of the terminal or in a file.
3. The service scheduling method according to claim 1, characterized in that the method further comprises:
and receiving an operation instruction which is input by a user and is used for modifying the service white list, and modifying the service white list according to the operation instruction.
4. The service scheduling method according to claim 1, characterized in that the method further comprises:
if the service white list does not comprise the service identifier of the target application service, receiving the calling authority input by the terminal, wherein the calling authority is used for indicating whether the foreground is allowed to run the authority of the target application service;
and operating the target application service according to the calling authority.
5. The service scheduling method according to claim 1, characterized in that the method further comprises:
if the service white list does not comprise the service identifier of the target application service, matching the service identifier with a service black list, wherein the service black list is used for storing the service identifier corresponding to the application service forbidden to run in the prior art;
If the service blacklist does not comprise the service identifier of the target application service, receiving the calling authority input by the terminal;
and operating the target application service according to the calling authority.
6. The service scheduling method according to claim 4 or 5, wherein the running the target application service according to the call authority includes:
if the calling authority is permission for calling, a service identifier corresponding to the target application service is added to the service white list, and the target application service is operated in the foreground;
and if the calling permission is forbidden, adding the service identifier corresponding to the target application service into a service blacklist, and running the target application service in the background.
7. The service scheduling method according to any one of claims 1 to 5, characterized in that the method further comprises:
acquiring the resource occupancy rate of a terminal, and acquiring a service identifier corresponding to the resource occupancy rate in the service white list;
and running the application service corresponding to the acquired service identifier in a background service mode.
8. The service scheduling method according to claim 7, characterized in that the method comprises:
Acquiring a monitoring log file from a preset storage address, and acquiring the CPU occupancy rate according to the monitoring log file; the resource occupancy rate includes a CPU occupancy rate.
9. The service scheduling method according to any one of claims 1 to 5, characterized in that the method further comprises:
and if the application program is detected to be deleted, deleting the service white list corresponding to the application program.
10. A service scheduling apparatus, the apparatus comprising:
the list acquisition module is used for acquiring the service grade of the target application service if the target application service of the application program is detected to start the foreground service in the terminal; if the service grade is greater than or equal to a preset grade, the foreground operates the target application service; if the service level is smaller than a preset level, acquiring a service white list corresponding to the application program, wherein the service white list comprises one or more service identifiers, and each service identifier is used for uniquely marking one application service of the application program;
the identification matching module is used for judging whether the service white list comprises the service identification of the target application service or not;
a service running module, configured to, if the service white list includes a service identifier of the target application service, run the target application service in the foreground, obtain a duration threshold corresponding to the service identifier in the service white list, and if a duration of running the target application service in the foreground exceeds the duration threshold, run the target application service in the background; if the service white list does not comprise the service identifier of the target application service, judging whether the target application service is refused to be called, if yes, running the target application service in the background, otherwise, receiving the calling authority input by the user, judging whether the calling authority input by the user is allowed to be called, if yes, running the target application service in the foreground, and if not, running the target application service in the background; the foreground operation refers to operation in the form of foreground service; the background operation refers to operation in the form of background service.
11. A computer device comprising a memory and a processor, the memory having stored therein computer readable instructions that, when executed by the processor, cause the processor to perform the service scheduling method of any one of claims 1 to 9.
12. One or more non-transitory computer-readable storage media containing computer-executable instructions that, when executed by one or more processors, cause the processors to perform the service scheduling method of any one of claims 1-9.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/108628 WO2019084783A1 (en) | 2017-10-31 | 2017-10-31 | Service scheduling method and apparatus, computer device, and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110753909A CN110753909A (en) | 2020-02-04 |
CN110753909B true CN110753909B (en) | 2024-04-02 |
Family
ID=66332823
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780092177.0A Active CN110753909B (en) | 2017-10-31 | 2017-10-31 | Service scheduling method and device, computer equipment and computer readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110753909B (en) |
WO (1) | WO2019084783A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112202728B (en) * | 2020-09-11 | 2023-06-23 | 广州宸祺出行科技有限公司 | Method and system for mobile terminal to call module through routing protocol |
CN113902415A (en) * | 2021-10-26 | 2022-01-07 | 中国工商银行股份有限公司 | Financial data checking method and device, computer equipment and storage medium |
CN115603993A (en) * | 2022-10-09 | 2023-01-13 | 中国工商银行股份有限公司(Cn) | Whitelist processing method, device and electronic equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103164269A (en) * | 2011-12-08 | 2013-06-19 | 中兴通讯股份有限公司 | Method and terminal achieving multi-window display of application programs |
CN105183135A (en) * | 2015-09-02 | 2015-12-23 | 北京奇虎科技有限公司 | Method for saving power consumption of smart phone and smart phone |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104699218B (en) * | 2013-12-10 | 2019-04-19 | 华为终端(东莞)有限公司 | A kind of task management method and equipment |
CN104135504B (en) * | 2014-02-11 | 2015-12-30 | 腾讯科技(深圳)有限公司 | A kind of service providing method, Apparatus and system based on application |
CN103927485A (en) * | 2014-04-24 | 2014-07-16 | 东南大学 | Android application program risk assessment method based on dynamic monitoring |
CN104298549B (en) * | 2014-09-30 | 2018-03-30 | 北京金山安全软件有限公司 | Method and device for cleaning application programs in mobile terminal and mobile terminal |
CN106909447B (en) * | 2015-12-23 | 2019-11-15 | 北京金山安全软件有限公司 | Background application processing method and device and terminal |
-
2017
- 2017-10-31 WO PCT/CN2017/108628 patent/WO2019084783A1/en active Application Filing
- 2017-10-31 CN CN201780092177.0A patent/CN110753909B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103164269A (en) * | 2011-12-08 | 2013-06-19 | 中兴通讯股份有限公司 | Method and terminal achieving multi-window display of application programs |
CN105183135A (en) * | 2015-09-02 | 2015-12-23 | 北京奇虎科技有限公司 | Method for saving power consumption of smart phone and smart phone |
Also Published As
Publication number | Publication date |
---|---|
CN110753909A (en) | 2020-02-04 |
WO2019084783A1 (en) | 2019-05-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10635449B2 (en) | Method and apparatus for running game client | |
CN109213539B (en) | Memory recovery method and device | |
CN108536783B (en) | Data processing method and apparatus, terminal, and computer-readable storage medium | |
CN107734616B (en) | Application program closing method and device, storage medium and electronic equipment | |
CN110532764B (en) | A kind of rights processing method, mobile terminal and readable storage medium | |
CN109992965B (en) | Process processing method and apparatus, electronic device, and computer-readable storage medium | |
CN108549698B (en) | File processing method, device, mobile terminal, and computer-readable storage medium | |
CN106570358A (en) | Application permission setting method and device | |
CN109445917B (en) | Application processing method and apparatus, electronic device, computer-readable storage medium | |
CN107357651B (en) | Application acceleration method and device and terminal | |
CN108090345B (en) | Linux system external command execution method and device | |
CN106713608B (en) | Application function state modification method and device and terminal | |
CN109992364B (en) | Application freezing method, apparatus, computer device, and computer-readable storage medium | |
CN108334345B (en) | Application processing method, device, readable storage medium and mobile terminal | |
EP2869604B1 (en) | Method, apparatus and device for processing a mobile terminal resource | |
CN110753909B (en) | Service scheduling method and device, computer equipment and computer readable storage medium | |
CN109992380B (en) | Application processing method and apparatus, electronic device, and computer-readable storage medium | |
CN110018886B (en) | Application state switching method and device, electronic equipment and readable storage medium | |
CN106020945B (en) | Shortcut item adding method and device | |
CN114115895B (en) | Code query method, device, electronic device and storage medium | |
CN109992362B (en) | Application processing method and apparatus, electronic device, and computer-readable storage medium | |
CN109992360B (en) | Process processing method and device, electronic equipment and computer readable storage medium | |
CN107463395B (en) | Component calling method and device | |
CN115225966B (en) | Application starting method, device, terminal equipment and storage medium | |
CN110213597B (en) | Method and device for entering live broadcast room through browser |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |