Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for clearing malicious power consumption applications, and user terminal

A technology of user terminal and cleaning method, which is applied in the field of user terminal equipment, can solve problems such as damage to battery life of smart terminals, inability to accurately locate bad applications, and high screen brightness, so as to improve battery life, avoid power consumption, and ensure use The effect of experience

Inactive Publication Date: 2013-09-25
HUAWEI TECH CO LTD
View PDF5 Cites 117 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In this way, the applications included in the ranking may be applications that users really want to use and frequently use. For example, an application that users often use to watch online videos. It needs to be connected to the Internet and consumes a lot of network resources. When users watch videos, the screen brightness is often relatively high. For this kind of application, high power consumption is a natural situation. From another point of view, this ranking method in the prior art cannot accurately locate those bad applications that maliciously consume power, and it cannot well avoid the impact of these bad applications on the battery life of smart terminals. Impairment of ability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for clearing malicious power consumption applications, and user terminal
  • Method and device for clearing malicious power consumption applications, and user terminal
  • Method and device for clearing malicious power consumption applications, and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following describes specific implementations of a method, device, and user terminal for cleaning malicious power-consuming applications provided in the embodiments of the present invention with reference to the drawings in the description.

[0050] Firstly, the method for cleaning malicious power-consuming applications provided by the embodiments of the present invention will be described in detail.

[0051] Starting from the methods of malicious power consumption in existing user terminals, the inventors found that malicious power consumption applications can usually consume the power of user terminals in the following two ways:

[0052] One way is that under normal use of the user terminal, the application uses resources unreasonably in the background, resulting in high power consumption;

[0053] Another way is that when the screen is turned off (that is, when the user does not need to use the mobile phone, also known as the black screen), a background applicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention provides a method and a device for clearing malicious power consumption applications, and a user terminal. Background work power consumption of applications running in the user terminal is periodically counted, the applications with the background work power consumption not lower than a power consumption threshold value are determined as the malicious power consumption applications, wake lock holding time of each application running in the user terminal with a screen closed is periodically counted, if a certain application with the holding time not shorter than a set time threshold value is a background work application, the application is determined as a malicious power consumption application unreasonably occupying resources in background, the applications with high power consumption but normally used by a user are not malicious power consumption applications, the malicious power consumption applications can be accurately positioned and detected, unnecessary power consumption of the user terminal is avoided while usage experience of the user is ensured, electric energy is saved, and the battery life of the user terminal is prolonged to a certain degree.

Description

technical field [0001] The present invention relates to the field of user terminal equipment, in particular to a cleaning method, device and user terminal for malicious power-consuming applications. Background technique [0002] At present, many user terminals, especially smart terminals, due to the improvement of processing capabilities, larger and larger screens, higher and higher resolutions, and the network supports high-speed wireless networks such as WIFI, 3G, and LTE, there are generally power-hungry For example, the longest standby time of many smartphones or tablet computers is usually less than one day. For users, frequent charging is required to ensure normal use, which is very inconvenient. [0003] In addition, because smart terminals can support a variety of applications, some open application markets are flooded with bad applications. After users download and install these applications, they will unreasonably occupy the system resources of smart terminals, inc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/46G06F1/32
CPCG06F1/3206G06F1/3234G06F1/329G06F21/52G06F21/56G06F2221/033G06F2221/2143H04W4/00Y02D10/00Y02D30/70
Inventor 勾军委李伟庄志山
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products