Control method of application broadcast and terminal
A control method and terminal technology, applied in hardware monitoring, instrumentation, electrical digital data processing, etc., can solve the problems of power consumption and passive interception of mobile terminals
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 600
[0088] exist Figure 5 Corresponding example based on see Image 6 As shown, another embodiment 600 of a terminal provided by the present invention includes:
[0089] The application set includes a first whitelist, and the first whitelist includes a first target application, and the terminal further includes an execution module.
[0090] The determining module is further configured to determine the first target application in the first whitelist from the application set.
[0091] The executing module is configured to refuse to send a power-on broadcast to the first target application determined by the determining module.
[0092] Optionally, the application set includes a second whitelist, and the second whitelist includes a second target application;
[0093] The first sending module is further configured to send a first target broadcast to the second target application when the second target application retreats into the background, and the second target application is an...
Embodiment 700
[0094] exist Image 6 Corresponding example based on see Figure 7 As shown, another embodiment 700 of a terminal provided by the present invention includes:
[0095] Also includes a second sending module;
[0096] The second sending module is configured to send a second target broadcast to the second target application when the second target application is switched to the foreground, the second target broadcast is used to notify the second target application that the current The network is turned on, so that the second target application executes a function related to the network operating environment.
[0097] Optionally, the application set includes a third whitelist, and the third whitelist includes a third target application.
[0098] The first sending module is configured to send a third target broadcast to the third target application determined by the determination module when the third target application exits into the background, and the third target broadcast is ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


