Method and device for monitoring application flow use

A technology of application programs and traffic, which is applied in the field of computer communication, can solve problems such as sneaking traffic and undetermined applications

Inactive Publication Date: 2019-01-01
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when the Android system uses the ShareUserId mechanism, multiple applications in the Android terminal share the same UID, so that developers cannot determine the traffic usage of each application based on a UID, and thus cannot determine which application is running away flow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for monitoring application flow use
  • Method and device for monitoring application flow use
  • Method and device for monitoring application flow use

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0080] The terminology used in the present disclosure is for the purpose of describing particular embodiments only, and is not intended to limit the present disclosure. As used in this disclosure and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for monitoring application flow use. The method comprises steps: a network request forwarded by a virtual network card is acquired, wherein the network request is initiated by the application through adopting a ShareUserId mechanism, and the network request is sent to the virtual network card by the application through a physical network card; target information is acquired according to the network request, wherein the target information is used for indicating the application flow use; and the target information is stored, as the target informationplays a role of indicating the application flow use, the application and the application flow use condition can be determined according to the target information, and monitoring on the application flow use is realized. The monitoring method has the advantages of being simple and easy to do and the like.

Description

technical field [0001] The present disclosure relates to the technical field of computer communication, and in particular, to a method and device for monitoring usage traffic of application programs. Background technique [0002] During the use of the terminal, some applications will abnormally request the network after switching from the foreground to the background, such as uploading or downloading data that is not required for the normal operation of the application, causing traffic to sneak away, increasing traffic usage and usage fees . [0003] In the related technology, each application program in the Android terminal is configured with a UID (Unique Identification, unique identifier). After the developer obtains the operating system authority of the terminal, he can view the information of the application program that sends the network request stored in the operating system kernel. UID, you can count the traffic usage information of a corresponding application accor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26
CPCH04L43/0876H04L43/16
Inventor 王宝林
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products