Method for preventing background traffic loss of application programs

A technology of application programs and background traffic, applied in the field of communication, can solve problems such as sneak traffic, abnormal traffic, and insufficient intelligence, and achieve the effect of avoiding traffic consumption and reducing losses

Active Publication Date: 2016-06-01
ANHUI ETUO COMM TECH GRP
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of mobile communication technology, especially the popularization and application of mobile networks and smart phones, the field of mobile Internet has developed rapidly, and mobile phone applications that have emerged continuously have attracted a large number of users. However, due to defects in the design of some applications or traffic control However, there is no thorough consideration in the application, which leads to abnormal traffic. How to effectively detect whether the application traffic is abnormal has become one of the concerns of users.
[0003] The implementation scheme of the existing technology is to perform statistical ranking on the Internet traffic consumed by the application programs on the mobile phone, and the user evaluates the amount of Internet traffic consumed by each application program, such as the 2G / 3G traffic consumed by the application program, but usually the application program A program that consumes a lot of traffic does not mean that its traffic consumption is abnormal. An application that steals traffic that users cannot distinguish is not smart enough, and abnormal traffic consumption is due to a sudden increase in traffic consumption in a short period of time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing background traffic loss of application programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The preferred modes of the present invention will be described in further detail below in conjunction with the examples.

[0015] Such as figure 1 As shown, a method for preventing the loss of application background traffic includes the following steps:

[0016] A1. Users add some applications in the terminal to the white list according to their usage habits, and the rest of the applications in the terminal are automatically added to the gray list.

[0017] A2. Record the traffic consumption speed S2 of each application program in the gray list when the terminal screen is on and the traffic consumption speed S3 of each application program in the gray list when the terminal screen is off.

[0018] A3. Compare the values ​​S2 and S3 of the corresponding application in the gray list with the preset value S1 of the traffic consumption speed of the corresponding application. The preset value S1 of the traffic consumption speed is preset by the system, and the user can modif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for preventing background traffic loss of application programs. The method comprises the following steps: A1, adding part of application programs in a terminal into a white list by a user according to own use habit, and automatically adding the remaining application programs in the terminal into a grey list; A2, recording the traffic depletion rate S2 of each application program in the grey list during lightening of a terminal screen and the traffic depletion rate S3 of each application program in the grey list during turnoff of the terminal screen; and A3, separately comparing the S2 and S3 values of the corresponding application program in the grey list with a preset value S1 of the corresponding application program, forbidding the application program to continuously access a network if S3 is greater than S1, querying the user whether to forbid the application program to access the network or not if S2 is greater than S1, and allowing the application program to continuously access the network if S3 is smaller than or equal to S1 or S2 is smaller than or equal to S1. Compared with the prior art, the method has the advantages of effectively monitoring abnormal traffic depletion, avoiding unnecessary traffic depletion for users and reducing the loss of the users.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a method for preventing background flow loss of application programs. Background technique [0002] With the development of mobile communication technology, especially the popularization and application of mobile networks and smart phones, the field of mobile Internet has developed rapidly, and mobile phone applications that have emerged continuously have attracted a large number of users. However, due to defects in the design of some applications or traffic control However, due to the lack of thorough consideration in the application, it leads to abnormal traffic. How to effectively detect whether the application traffic is abnormal has become one of the concerns of users. [0003] The implementation scheme of the existing technology is to perform statistical ranking on the Internet traffic consumed by the application programs on the mobile phone, and the user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04W24/02H04W24/08
CPCH04W24/02H04W24/08H04M1/72463
Inventor 吴强生陈玉兵
Owner ANHUI ETUO COMM TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products