CN104050417B - A kind of method and device detected in mobile terminal to application state - Google Patents
A kind of method and device detected in mobile terminal to application state Download PDFInfo
- Publication number
- CN104050417B CN104050417B CN201410318844.0A CN201410318844A CN104050417B CN 104050417 B CN104050417 B CN 104050417B CN 201410318844 A CN201410318844 A CN 201410318844A CN 104050417 B CN104050417 B CN 104050417B
- Authority
- CN
- China
- Prior art keywords
- software
- detection
- task
- information
- testing result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 88
- 238000001514 detection method Methods 0.000 claims abstract description 375
- 238000012360 testing method Methods 0.000 claims abstract description 196
- 238000009434 installation Methods 0.000 claims description 97
- 238000005457 optimization Methods 0.000 claims description 89
- 238000007689 inspection Methods 0.000 claims description 67
- 241000700605 Viruses Species 0.000 claims description 61
- 238000012545 processing Methods 0.000 claims description 57
- 230000009385 viral infection Effects 0.000 claims description 17
- 238000012544 monitoring process Methods 0.000 claims description 10
- 102000006479 Heterogeneous-Nuclear Ribonucleoproteins Human genes 0.000 claims description 9
- 108010019372 Heterogeneous-Nuclear Ribonucleoproteins Proteins 0.000 claims description 9
- 230000008859 change Effects 0.000 claims description 6
- 235000013399 edible fruits Nutrition 0.000 claims description 2
- 230000008569 process Effects 0.000 abstract description 16
- 230000000875 corresponding effect Effects 0.000 description 126
- 230000006870 function Effects 0.000 description 17
- 238000004140 cleaning Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 230000010365 information processing Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 239000013589 supplement Substances 0.000 description 4
- 230000015572 biosynthetic process Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000013522 software testing Methods 0.000 description 3
- 238000003786 synthesis reaction Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000002155 anti-virotic effect Effects 0.000 description 2
- 239000003086 colorant Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001035 drying Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000010008 shearing Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Debugging And Monitoring (AREA)
- Stored Programmes (AREA)
Abstract
The present invention is on a kind of method and device detected in mobile terminal to application state.Wherein, methods described includes:After the detection instruction for receiving user's triggering, according to default Detection task list, mounted software is detected, includes two or more task items in the Detection task list;After the completion of at least one task items detection, testing result corresponding to this task items is generated;According to the testing result, safe handling prompt message is generated, so that user carries out corresponding software operation according to the safe handling prompt message.Technical scheme user provided by the invention only needs once to trigger, you can realizes the multinomial detection to software, simplifies the complicated processes for needing to be operated respectively in the prior art using all kinds of management softwares, improve Consumer's Experience.
Description
Technical field
The present invention relates to a kind of computer realm, application state is detected in mobile terminal more particularly to a kind of
Method and device.
Background technology
At present, such as computer, smart mobile phone, palm PC, the use of tablet personal computer intelligent electronic device are more and more general
And.The various softwares run on intelligent electronic device are also in explosive growth, such as realize text editing, image procossing, chat
My god, the software of the various functions such as playing audio-video, greatly meet the use demand of user.User can be based on the need of itself
Ask and download all kinds of softwares and install and use.
In the prior art, user need to download the security classes softwares such as corresponding checking and killing virus engine and the software in equipment is carried out
Killing;Need it is irregular search without using software or spam software deleted manually;Need to when there is software upgrading prompting and
When manual updating operation etc. is carried out to software.The software installed in equipment is more, and user management is got up more cumbersome more tired
It is difficult.For the user that personal terminal is safeguarded using skilled and attention, aforesaid operations may not have difficulties, and can ensure
The normal operation of software;But for domestic consumer, aforesaid operations can be comparatively laborious, it is more likely that running software occurs and asks
Topic, influences the use of user.
The content of the invention
In view of the above problems, it is proposed that the present invention overcomes above mentioned problem or solved at least in part in order to provide one kind
The method and device detected in mobile terminal to application state of above mentioned problem.
According to the first aspect of the invention, there is provided a kind of method detected in mobile terminal to application state,
Including:
According to default Detection task list, mounted software is detected, included in the Detection task list
There are two or more task items;
After the completion of at least one task items detection, testing result corresponding to this task items is generated;
According to the testing result, safe handling prompt message is generated, so that user prompts to believe according to the safe handling
Breath carries out corresponding software operation.
Optionally, the foregoing method detected in mobile terminal to application state, wherein, the default detection is appointed
Business list includes:Checking and killing virus task items, malice ad ware task items, self-starting software task item, can move software task
Item, installation kit task items, upgradeable software task items, software vulnerability scan task item and system intialization software task item can be cleared up
In the combination of any two or multinomial;Accordingly,
It is described mounted software to be detected according to default Detection task list, including:
According to default Detection task list, checking and killing virus engine corresponding to the checking and killing virus task items is called to detect institute
State to have installed to whether there is in software and have virus;And/or
According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to examine
Install to whether there is in software described in surveying and had malice ad ware;And/or
According to default Detection task list, the second inspection policies corresponding to the self-starting software task item are called to detect
It is described to have installed in software with the presence or absence of there is self-starting software;And/or
According to default Detection task list, the 3rd inspection policies corresponding to software task item that can be moved described in calling detect
It is described to have installed in software with the presence or absence of there is the software that move;And/or
According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and are examined
Install to whether there is to have in software described in surveying and can clear up installation kit;And/or
According to default Detection task list, the 5th inspection policies corresponding to the upgradeable software task items are called to detect
It is described to have installed in software with the presence or absence of there is scalable software;And/or
According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to examine
Installed described in surveying and whether there is leaky software in software;And/or
According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to examine
Installed described in surveying in software with the presence or absence of the software for having system intialization.
Optionally, the foregoing method detected in mobile terminal to application state, wherein, the task
After the completion of item detection, testing result corresponding to this task items is generated, including:
If the checking and killing virus task items detection is completed, generation, which includes, to be needed killing amount of software and needs killing software
The testing result of software information;
If the malice ad ware task items detection is completed, generation includes the malice ad ware quantity detected
With the testing result of the software information of malice ad ware;
If self-starting software task item detection is completed, generation include the self-starting amount of software that detects and from
Start the testing result of the software information of software;
If the software task item detection of moving is completed, generation includes the amount of software and can of moving detected
The testing result of the software information of removal of home software;
If it is described clear up installation kit task items detection complete, generation include detect clear up installation kit quantity
With the testing result of the software information that can clear up installation kit;
If upgradeable software task items detection is completed, generation includes the upgradeable software quantity that detects and can
Upgrade the testing result of the software information of software;
If software vulnerability scan task item detection is completed, generation include the leaky amount of software that detects and
The testing result of the software information of leaky software;
If the system intialization software task item detection is completed, generation includes the system intialization amount of software detected
With the testing result of the software information of system intialization software.
After the completion of one task items detection, testing result corresponding to this task items is generated, including:
If the checking and killing virus task items detection is completed, generation, which includes, to be needed killing amount of software and needs killing software
The testing result of software information;
If the malice ad ware task items detection is completed, generation includes the malice ad ware quantity detected
With the testing result of the software information of malice ad ware;
If self-starting software task item detection is completed, generation include the self-starting amount of software that detects and from
Start the testing result of the software information of amount of software and self-starting software;
If the software task item detection of moving is completed, generation includes the amount of software and can of moving detected
The testing result of the software information of removal of home software;
If it is described clear up installation kit task items detection complete, generation include detect clear up installation kit quantity
With the testing result of the software information that can clear up installation kit;
If upgradeable software task items detection is completed, generation includes the upgradeable software quantity that detects and can
Upgrade the testing result of the software information of software;
If software vulnerability scan task item detection is completed, generation include the leaky amount of software that detects and
The testing result of the software information of leaky software;
If the system intialization software task item detection is completed, generation includes the system intialization amount of software detected
With the testing result of the software information of system intialization software.
Optionally, the foregoing method detected in mobile terminal to application state, in addition to:
Obtain testing result corresponding to all task items in the Detection task list;
According to testing result corresponding to all task items, comprehensive detection result is determined;
According to the comprehensive detection result, forms are presented to result and handled, be in corresponding different comprehensive detection results
Existing different forms.
Optionally, the foregoing method detected in mobile terminal to application state, wherein, it is described according to the synthesis
Testing result, forms are presented to result and handled, including:
If the comprehensive detection result to be safe for operation, by forms processing for it is safe for operation when the forms that present;
If the window that the comprehensive detection result potential safety hazard to be present, is presented when being and potential safety hazard be present by forms processing
Body;
If the comprehensive detection result be exist can optimization software, by forms processing be exist can be presented during optimization software
Forms;
If the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
Optionally, the foregoing method detected in mobile terminal to application state, in addition to:
Obtain testing result corresponding to all task items in the Detection task list;
According to testing result corresponding to all task items, comprehensive detection result is determined;
Judge whether the comprehensive detection result is safe for operation;
If so, then prompt message is completed in generation, so that user completes instruction according to the completion prompt message triggering;
Otherwise, key optimization operation prompt information is generated, is touched so that user optimizes operation prompt information according to a key
Send out key optimization operational order.
Optionally, the foregoing method detected in mobile terminal to application state, in addition to:
If receiving the key optimization operational order of user's triggering, according to the comprehensive detection result, one is performed
Key optimization operation;
Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine pair is called
It is described to need killing software to carry out killing;
If the comprehensive detection result includes the software information of self-starting software, obtain Root authority, and with
The self-starting function of the self-starting software is closed during Root authority;
If the comprehensive detection result includes the software information for the software that can move, obtain Root authority, and with
The software of moving is transferred under default target directory during Root authority;
If the comprehensive detection result includes the software information that can clear up installation kit, to being included in the testing result
Installation package informatin corresponding to installation kit cleared up;
If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information,
One in the software information of leaky software and the software information of system intialization software or any multinomial combination, then generate hand
Dynamic processing prompt message;
If the manual optimization operational order that user triggers according to the prompt message of triggering manually is received, according to
The software information and operation instruction carried manually in optimization operational order, is carried out using the operation instruction to the software information
Processing.
Optionally, the foregoing method detected in mobile terminal to application state, in addition to:
If receiving the completion instruction of user's triggering, generation optimization completes that information is presented;
If receiving the key optimization operational order of user's triggering, monitor key optimization operation progress and optimizing
After the completion of, generation optimization completes that information is presented.
Optionally, the foregoing method detected in mobile terminal to application state, in addition to:
During being detected to the mounted software, detection progress is monitored, and generate current detection progress pair
Information is presented in the progress answered.
Optionally, the foregoing method detected in mobile terminal to application state, in addition to:
The quantity for having installed software is obtained, and information is presented in generation quantity.
According to the second aspect of the invention, there is provided a kind of device detected in mobile terminal to application state,
Including:
Detection module, after the detection instruction for receiving user's triggering, according to default Detection task list, to having pacified
The software of dress is detected, and includes two or more task items in the Detection task list;
First generation module, for after the completion of the detection of at least one task items, generating and being detected corresponding to this task items
As a result;
Second generation module, for according to the testing result, safe handling prompt message being generated, so that user is according to institute
State safe handling prompt message and carry out corresponding software operation.
Optionally, the foregoing device detected in mobile terminal to application state, wherein, the default detection is appointed
Business list includes:Checking and killing virus task items, malice ad ware task items, self-starting software task item, can move software task
Item, installation kit task items, upgradeable software task items, software vulnerability scan task item and system intialization software task item can be cleared up
In the combination of any two or multinomial;Accordingly, the detection module, is specifically used for:
According to default Detection task list, checking and killing virus engine corresponding to the checking and killing virus task items is called to detect institute
State to have installed to whether there is in software and have virus;And/or
According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to examine
Install to whether there is in software described in surveying and had malice ad ware;And/or
According to default Detection task list, the second inspection policies corresponding to the self-starting software task item are called to detect
It is described to have installed in software with the presence or absence of there is self-starting software;And/or
According to default Detection task list, the 3rd inspection policies corresponding to software task item that can be moved described in calling detect
It is described to have installed in software with the presence or absence of there is the software that move;And/or
According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and are examined
Install to whether there is to have in software described in surveying and can clear up installation kit;And/or
According to default Detection task list, the 5th inspection policies corresponding to the upgradeable software task items are called to detect
It is described to have installed in software with the presence or absence of there is scalable software;And/or
According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to examine
Installed described in surveying and whether there is leaky software in software;And/or
According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to examine
Installed described in surveying in software with the presence or absence of the software for having system intialization.
Optionally, the foregoing device detected in mobile terminal to application state, wherein, the first generation mould
Block, it is specifically used for:
When the checking and killing virus task items, which detect, to be completed, generation, which includes, to be needed killing amount of software and needs killing software
The testing result of software information;
When the malice ad ware task items, which detect, to be completed, generation includes the malice ad ware quantity detected
With the testing result of the software information of malice ad ware;
When the self-starting software task item, which detects, to be completed, generation include the self-starting amount of software that detects and from
Start the testing result of the software information of software;
When the software task item detection of moving is completed, generation includes the amount of software and can of moving detected
The testing result of the software information of removal of home software;
When it is described clear up installation kit task items detection complete when, generation include detect clear up installation kit quantity
With the testing result of the software information that can clear up installation kit;
When the upgradeable software task items, which detect, to be completed, generation includes the upgradeable software quantity that detects and can
Upgrade the testing result of the software information of software;
When the software vulnerability scan task item, which detects, to be completed, generation include the leaky amount of software that detects and
The testing result of the software information of leaky software;
When the system intialization software task item, which detects, to be completed, generation includes the system intialization amount of software detected
With the testing result of the software information of system intialization software.
Optionally, the foregoing device detected in mobile terminal to application state, in addition to:
First acquisition module, for obtaining testing result corresponding to all task items in the Detection task list;
Determining module, for the testing result according to corresponding to all task items, determine comprehensive detection result;
Forms processing module, for according to the comprehensive detection result, forms being presented to result and handle, to correspond to not
Different forms are presented with comprehensive detection result.
Optionally, the foregoing device detected in mobile terminal to application state, the forms processing module, specifically
For:
When the comprehensive detection result for it is safe for operation when, by forms processing for it is safe for operation when the forms that present;
Window when the comprehensive detection result when potential safety hazard be present, to be presented when being and potential safety hazard be present by forms processing
Body;
When the comprehensive detection result be exist can optimization software when, by forms processing be exist can be presented during optimization software
Forms;
When the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
Optionally, the foregoing device detected in mobile terminal to application state, in addition to:
First acquisition module, for obtaining testing result corresponding to all task items in the Detection task list;
Determining module, for the testing result according to corresponding to all task items, determine comprehensive detection result;
Judge module, for judging whether the comprehensive detection result is safe for operation;
3rd generation module, for when the comprehensive detection result is safe for operation, generating and completing prompt message, so that
User completes instruction according to the completion prompt message triggering, when the comprehensive detection result is not safe for operation, generation one
Key optimizes operation prompt information, so that user optimizes operation prompt information according to a key triggers key optimization operational order.
Optionally, the foregoing device detected in mobile terminal to application state, in addition to:
Execution module, for when the key for receiving user's triggering optimizes operational order, being examined according to the synthesis
Result is surveyed, performs key optimization operation;
Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine pair is called
It is described to need killing software to carry out killing;
If the comprehensive detection result includes the software information of self-starting software, obtain Root authority, and with
The self-starting function of the self-starting software is closed during Root authority;
If the comprehensive detection result includes the software information for the software that can move, obtain Root authority, and with
The software of moving is transferred under default target directory during Root authority;
If the comprehensive detection result includes the software information that can clear up installation kit, to being included in the testing result
Installation package informatin corresponding to installation kit cleared up;
If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information,
One in the software information of leaky software and the software information of system intialization software or any multinomial combination, then generate hand
Dynamic processing prompt message;
If the manual optimization operational order that user triggers according to the prompt message of triggering manually is received, according to
The software information and operation instruction carried manually in optimization operational order, is carried out using the operation instruction to the software information
Processing.
Optionally, the foregoing device detected in mobile terminal to application state, in addition to:
4th generation module, for when receiving the completion instruction of user's triggering, generation optimization to complete that letter is presented
Breath;When the key for receiving user's triggering optimizes operational order, one key of monitoring optimization operation progress is simultaneously completed in optimization
Afterwards, generation optimization completes that information is presented.
Optionally, the foregoing device detected in mobile terminal to application state, in addition to:
Monitoring modular, during being detected to the mounted software, detection progress is monitored, and generate and work as
Information is presented in progress corresponding to preceding detection progress.
Optionally, the foregoing device detected in mobile terminal to application state, in addition to:
Second acquisition module, the quantity of software is installed for obtaining, and information is presented in generation quantity.
By above-mentioned technical proposal, technical scheme provided in an embodiment of the present invention at least has following advantages:
Technical scheme provided by the invention is after the detection instruction of user's triggering is received, i.e., according to default Detection task
List, mounted software is detected, such user only needs once to trigger, you can realize the multinomial detection to software, letter
Change the complicated processes for needing to be operated respectively in the prior art using all kinds of management softwares, improve Consumer's Experience;In addition, this
The technical scheme that invention provides is based on testing result corresponding to each task items, generates corresponding safe handling prompt message respectively,
To prompt user to make corresponding software operation, help user effectively to manage mounted software in equipment, realize one
Secondary triggering carries out repeated detection processing to having installed software, simplifies the operation of user, convenient for users.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, below with presently preferred embodiments of the present invention and coordinate accompanying drawing describe in detail as after.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area
Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows the one kind for the method detected in mobile terminal to application state that the embodiment of the present invention one provides
The schematic flow sheet of realization;
Fig. 2 shows in the method detected in mobile terminal to application state that the embodiment of the present invention one provides and cleared up
The schematic diagram of example is presented in prompt message;
Fig. 3 shows the another of the method detected in mobile terminal to application state that the embodiment of the present invention one provides
The schematic flow sheet that kind is realized;
Fig. 4 shows process in the method detected in mobile terminal to application state that the embodiment of the present invention one provides
The schematic diagram of the presentation example of information is presented;
Fig. 5 shows quantity in the method detected in mobile terminal to application state that the embodiment of the present invention one provides
The schematic diagram of the presentation example of information is presented;
Fig. 6 is shown in the method detected in mobile terminal to application state that the embodiment of the present invention one provides manually
Optimize the schematic diagram of interface example;
Fig. 7, which is shown in the method detected in mobile terminal to application state that the embodiment of the present invention one provides, to be terminated
The schematic diagram of interface example;
Fig. 8 shows in the method detected in mobile terminal to application state that the embodiment of the present invention one provides and is based on
High in the clouds carries out the example schematic of software killing;
Fig. 9 shows the one kind for the device detected in mobile terminal to application state that the embodiment of the present invention two provides
The structural representation of realization;
Figure 10 shows the another of the device detected in mobile terminal to application state that the embodiment of the present invention two provides
A kind of structural representation realized.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
As shown in figure 1, the stream for the method detected in mobile terminal to application state that the embodiment of the present invention one provides
Journey schematic diagram.Method described in the present embodiment one, including:
Step 101, receive user triggering detection instruction after, according to default Detection task list, to mounted
Software is detected.
Wherein, two or more task items are included in the Detection task list.It is specifically, described default
Detection task list can include:Checking and killing virus task items, malice ad ware task items, self-starting software task item, it can remove
Family's software task item, installation kit task items, upgradeable software task items, software vulnerability scan task item and system intialization can be cleared up
The combination of any two or multinomial in software task item.
Need exist for explanation be:This step can be according to the suitable of all task items included in the Detection task list
Sequence, sequentially mounted software is detected.This step can also be specified according to user in the Detection task list
Task items, sequentially mounted software is detected.Wherein, the information for the task items that the user specifies can carry
In the detection instruction of user's triggering, or in the configuration information that user pre-sets.For example, user is clicking to enter software
After the operation interface of detection, times that need to be detected to having installed software is determined into setting interface to choose task items
Business item.
Thus, this step may particularly include following steps:
According to default Detection task list, checking and killing virus engine corresponding to the checking and killing virus task items is called to detect institute
State to have installed to whether there is in software and have virus;And/or
According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to examine
Install to whether there is in software described in surveying and had malice ad ware;And/or
According to default Detection task list, the second inspection policies corresponding to the self-starting software task item are called to detect
It is described to have installed in software with the presence or absence of there is self-starting software;And/or
According to default Detection task list, the 3rd inspection policies corresponding to software task item that can be moved described in calling detect
It is described to have installed in software with the presence or absence of there is the software that move;And/or
According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and are examined
Install to whether there is to have in software described in surveying and can clear up installation kit;And/or
According to default Detection task list, the 5th inspection policies corresponding to the upgradeable software task items are called to detect
It is described to have installed in software with the presence or absence of there is scalable software;And/or
According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to examine
Installed described in surveying and whether there is leaky software in software;And/or
According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to examine
Installed described in surveying in software with the presence or absence of the software for having system intialization.
Need exist for supplement be:In above-mentioned steps, the first described inspection policies can be by based on malice advertisement text
What multiple logic judgments that the characteristics of part (the characteristics of specific can be found in content hereinafter) forms were formed, currently, described first
Inspection policies, which also can be directly multiplexed, to be used to detect the strategy that the inspection software of malice ad ware is applied in the prior art.Equally
, in above-mentioned steps, the second described inspection policies can be directly multiplexed first is answered with technology for detecting self-starting software
Strategy.3rd inspection policies can directly be multiplexed the plan of the prior art applied for detecting the software that can be moved
Slightly.4th inspection policies, which can be directly multiplexed, of the prior art to be used to detect and can clear up the strategy that installation kit is applied.Institute
State the 5th inspection policies can directly be multiplexed it is of the prior art be used for detect the strategy that upgradeable software is applied.6th inspection
Survey strategy can directly be multiplexed of the prior art for detecting the strategy that leaky software is applied.7th inspection policies can
Directly it is multiplexed the strategy of the prior art for being used for detection and having system intialization software to be applied.
After the completion of step 102, the detection of at least one task items, testing result corresponding to this task items is generated.
Wherein, when the default Detection task list includes:Checking and killing virus task items, malice ad ware task items,
Self-starting software task item, the software task item that can move, installation kit task items, upgradeable software task items, software leakage can be cleared up
During the combination of any two or multinomial in hole scan task item and system intialization software task item, this step 102 can be wrapped specifically
It is rapid to include following steps:
If the checking and killing virus task items detection is completed, generation, which includes, to be needed killing amount of software and needs killing software
The testing result of software information;
If the malice ad ware task items detection is completed, generation includes the malice ad ware quantity detected
With the testing result of the software information of malice ad ware;
If self-starting software task item detection is completed, generation include the self-starting amount of software that detects and from
Start the testing result of the software information of software;
If the software task item detection of moving is completed, generation includes the amount of software and can of moving detected
The testing result of the software information of removal of home software;
If it is described clear up installation kit task items detection complete, generation include detect clear up installation kit quantity
With the testing result of the software information that can clear up installation kit;
If upgradeable software task items detection is completed, generation includes the upgradeable software quantity that detects and can
Upgrade the testing result of the software information of software;
If software vulnerability scan task item detection is completed, generation include the leaky amount of software that detects and
The testing result of the software information of leaky software;
If the system intialization software task item detection is completed, generation includes the system intialization amount of software detected
With the testing result of the software information of system intialization software.
Need exist for supplement be:The malice ad ware in the above refers to the software with following behavior:
1st, without permission modifications main browser page, and can not change.2nd, the shortcut of desktop icons and start menu is distorted, during double-click
Advertisement webpage can be changed.3rd, BHO (Browser Helper Object, browser auxiliary object) is added to force to access user
Webpage redirect to the network address oneself specified.4th, in desktop, menu, collection addition great master's advertisement link, and it is not easy to delete.
5th, startup item is added, is started with system, forces to play advertisement or the access of abduction browser etc..Above-mentioned 1~5 point can be used as sentencing
Whether disconnected is malice promotional literature benchmark, and the first inspection policies can be determined based on above-mentioned 5 points.Opening certainly described in the above
Dynamic software refers to the software or program of start automatic running.Software of moving described in the above refers to that system disk is (special
Refer to C disks) after space takes, system operation can be caused slack-off, some operations can not be normally carried out, and need to be moved to other disks, and
After moving, software still can with normal use impregnable software.Installation kit of clearing up described in the above refers to
It has been installed and used that, the otiose installation kit that can be deleted.
Step 103, according to the testing result, safe handling prompt message is generated, so that user is according to the safe place
Manage prompt message and carry out corresponding software operation.
Specifically, based on above-mentioned content, it is rapid that this step 103 may particularly include following steps:
If the testing result is to include the testing result for the software information for needing killing amount of software and needing killing software,
Then generation carries the killing prompt message of the testing result;
If the testing result is to include the software letter of the malice ad ware quantity detected and malice ad ware
The testing result of breath, then what generation carried the testing result forbids prompt message;
If the testing result is to include the software information of the self-starting amount of software detected and self-starting software
Testing result, then generation carry the closing self-starting prompt message of the testing result;
If the testing result is to include the software information of move amount of software and the software that can move that detect
Testing result, then generation carry the removal of home prompt message of the testing result;
If the testing result is to include the software cleared up installation kit quantity and can the clear up installation kit letter detected
The testing result of breath, then generation carry the cleaning prompt message of the testing result;
If the testing result is to include the software information of the upgradeable software quantity detected and upgradeable software
Testing result, then generation carry the upgrade tip information of the testing result;
If the testing result is to include the software information of the leaky amount of software detected and leaky software
Testing result, then generation carry the leak of the testing result and check prompt message;
If the testing result is to include the software letter of the system intialization amount of software detected and system intialization software
The testing result of breath, then generation carry the software unloading prompt message of the testing result.
For example, the cleaning prompt message for carrying the testing result generated in the above in actual applications can table
The display information presented by region in Fig. 21 is levied, i.e. the display information shows the quantity that can clear up installation kit (in such as Fig. 2
Installation kit cleaning right side display 6) and can clear up the software information of installation kit.Wherein, the installation kit of clearing up can be following
The presentation mode of windowing is stretched to present.Drop-down expansion window is the window that user just deploys after the region 1 is triggered.
Likewise, above-mentioned killing prompt message, prompt message of forbidding, closing self-starting prompt message, removal of home prompt message, upgrade tip
Information, leak check prompt message and software unloading prompt message can use with characterized in above-mentioned Fig. 2 it is described cleaning prompting letter
The same mode is ceased to present.
The technical scheme that the present embodiment provides is appointed after the detection instruction of user's triggering is received according to default detection
Business list, is detected, such user only needs once to trigger to mounted software, you can the multinomial detection to software is realized,
The complicated processes for needing to be operated respectively in the prior art using all kinds of management softwares are simplified, improve Consumer's Experience;In addition,
The technical scheme that the present embodiment provides is based on testing result corresponding to each task items, generates corresponding safe handling prompting letter respectively
Breath, operated with prompting user to make corresponding software, help user effectively to manage mounted software in equipment, realize
Once trigger and carry out repeated detection processing to having installed software, simplify the operation of user, it is convenient for users.
Need exist for supplement be:The method detected in mobile terminal to application state that the present embodiment provides
Software installation detection process can also be included, to avoid installing terminal equipment from carrying the purpose of virulent application program.For example,
The present embodiment can be set in application layer monitors interface function using installation, and a service (such as safety clothes are provided in ccf layer
Business), and the preceding bag detection interface function of installation is set for the security service;As such, it is desirable to the application program identification information of installation can
Interface letter is monitored to be transferred to the application installation of application layer by wrapping detection interface function before the installation of the security service of ccf layer
Number.In application layer, the virus that can be supplied to application program identification information using installation monitoring interface function in terminal device
Scanning application program, (the virus scan application program is referred to as security management application program, and journey is applied in such as existing antivirus
Sequence etc.), and trigger virus scan application program and virus scan is carried out to application program corresponding to the application program identification information.
Due to application program when mounted, operating system (such as android system) can start bag management service, and assure reason
Can be called using mounting interface function in service, therefore, the present embodiment can be by existing application mounting interface letters
Specific implementation flow in number is transformed, and first the application program is entered before the installation operation of application program is performed with realizing
Row virus scan, to avoid installing terminal equipment from carrying the purpose of virulent application program.
Further, the methods described that above-described embodiment provides, as shown in figure 3, can also comprise the following steps:
Step 201, obtain testing result corresponding to all task items in the Detection task list.
Step 202, the testing result according to corresponding to all task items, determine comprehensive detection result.
Step 203, according to the comprehensive detection result, forms are presented to result and handled, it is described after being handled with presentation
As a result forms are presented.
Specifically, this step 203 may include following steps:
If the comprehensive detection result to be safe for operation, by forms processing for it is safe for operation when the forms that present;
If the window that the comprehensive detection result potential safety hazard to be present, is presented when being and potential safety hazard be present by forms processing
Body;
If the comprehensive detection result be exist can optimization software, by forms processing be exist can be presented during optimization software
Forms;
If the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
By above-mentioned steps 201~203, the present embodiment is realized based on different comprehensive detection results, is in using different
Existing forms, so that the open-and-shut quality for knowing software detection result of user.Wherein, different comprehensive detection result, it is in
Existing different forms can be the forms of different colours, it is of course also possible to be the forms for showing Different Results quality mark,
The present embodiment is to this and is not especially limited.For example, the forms that are presented when safe for operation and existing and can be presented during optimization software
Forms can be blue forms;The forms presented during potential safety hazard be present can be yellow forms;The window presented during virus infection
Body can be red forms.
Further, in the methods described that above-described embodiment provides, can also comprise the following steps:
During being detected to the mounted software, detection progress is monitored, and generate current detection progress pair
Information is presented in the progress answered.
Specifically, information, which is presented, in the process may be characterized as the form that region 2 is presented in Fig. 4, user can pass through observation
Information is presented in the process, knows detection progress.
Further, in the methods described that above-described embodiment provides, can also comprise the following steps:
The quantity for having installed software is obtained, and information is presented in generation quantity.
It can be the quantity that mounted software on current device is presented in user by above-mentioned steps, be set with helping user to understand
Standby software installation situation.Wherein, the quantity is presented information and may be characterized as the form that region 3 shown in Fig. 5 is presented.
Need exist for supplement be:Window shown in Fig. 5 can as described in the present embodiment in mobile terminal to software shape
The Entry Interface for the method corresponding intrument that state is detected.User can be by triggering " software issue analysis " in the Entry Interface
Button, into the software analysis interface shown in Fig. 4, the software analysis interface is during detection in real time according to the progress
Information is presented detection progress is presented, and after a task items have been detected, corresponding testing result is presented.All task items detections
After the completion of, interface is presented in the testing result that software analysis interface can enter shown in Fig. 2, and difference is presented according to comprehensive detection result
Forms (such as red forms, yellow forms or blue forms).In detection process, user is can not be by software analysis circle
What face was operated, only after the completion of all task items detect, user could be carried out corresponding by software analysis interface
Operate, killing, cleaning installation kit are such as carried out to existing virus, upgrades software, repairs leak, software removal of home, forbids malice wide
Accuse software etc..After the completion of all operations of user are equal, the software analysis interface is rendered as the end interface shown in Fig. 7, uses
It is the overall process for completing software detection that described " completion " button terminated in interface is clicked at family.The content of foregoing description is this reality
Interface change procedure of the method detected in mobile terminal to application state of example offer in detection process is provided.
Further, the methods described that above-described embodiment provides, can also include:
If receiving the operational order that user triggers according to the killing prompt message, the checking and killing virus engine is called
Killing is carried out to software corresponding to the software information that is included in the testing result;
If receiving user according to the operational order for forbidding prompt message to trigger, will be included in the testing result
Software information corresponding to software delete;
If receiving the operational order that user triggers according to the closing self-starting prompt message, Root authority is obtained,
And the self-starting function of software corresponding to the software information that will be included when with Root authority in the testing result is closed;
If receiving the operational order that user triggers according to the removal of home prompt message, Root authority is obtained, and having
There is the target directory carried during Root authority according to the operational order, the software information included in the testing result is corresponding
Software be transferred under the target directory;
If the operational order that user triggers according to the cleaning prompt message is received, to being included in the testing result
Installation package informatin corresponding to installation kit cleared up;
If receiving the operational order that user triggers according to the upgrade tip information, obtain and wrapped in the testing result
Software upgrade package corresponding to the software information contained, and updating operation is carried out to software according to the software upgrade package;
If receiving the operational order that user triggers according to the upgrade tip information, obtain and wrapped in the testing result
Software upgrade package corresponding to the software information contained, and updating operation is carried out to software according to the software upgrade package;
If receiving the operational order that user checks prompt message triggering according to the leak, the testing result is obtained
In the software information that includes correspond to the vulnerability information of software, and the vulnerability information is presented in order to which user checks;
If the operational order that user unloads prompt message triggering according to the software is received, by the testing result
Comprising software information correspond to software unloading.
In actual applications, above-mentioned steps can realize that is, user passes through in mobile terminal by the way of user chooses
Item of choosing on the software analysis interface of the method corresponding intrument detected to application state selects, with to testing result
In problematic software carry out the processing of selectivity, do not handled all, more selectivity can be so brought to user,
To meet the needs of different user.
Need exist for explanation be:Software on general operation smart mobile phone is required for obtaining Root authority, for example starts shooting
Self-starting software, software removal of home etc..Therefore, the operation in above-mentioned steps to self-starting software and the software that can move needs to obtain
Root authority, i.e., it need to first obtain Root authority and the self-starting function of self-starting software could be closed after Root authority is got
Close or the software that can move is moved to target directory.For as computers such as desktop computer or notebooks, self-starting is soft
Part, which is typically required, obtains what Root authority could operate to it, and the software that can move may not be just to be required for obtaining Root power
Limit could operate to it.And it is the software for needing to obtain Root authority that the software that can move why is limited in above-described embodiment
It is that the operation of the software for getting Root authority is needed in system disk is that can influence the toggle speed of computer because being generally in,
The performances such as EMS memory occupation, so needing the software for obtaining Root authority to use software removal of home function more meaningful for those.When
So, for those need not obtain the software of Root authority, after user inputs removal of home instruction, you can will be shifted by removal of home software
Moved to described under the target directory specified, and by under former catalogue can moving software deletion, i.e., similar to usually said
" shearing " operation.
Wherein, it can after receiving the operational order that user triggers, perform automatically to obtain Root authority;Can also be
User passes through on the Entry Interface of method corresponding intrument detected in mobile terminal to application state or software analysis interface
" acquisition Root authority " Touch control key obtain manually.It is either automatic in above-described embodiment to obtain what is still got manually
Root authority is temporary Root authority.
Certainly, except can use selectivity software is handled in addition to, can also by the way of a key optimization processing,
According to the testing result of all task items, corresponding optimization processing is all carried out to produced problem in all testing results, i.e., originally
The methods described that embodiment provides, may also include the steps of:
Step 301, obtain testing result corresponding to all task items in the Detection task list.
Step 302, the testing result according to corresponding to all task items, determine comprehensive detection result.
Step 303, judge whether the comprehensive detection result is safe for operation, if so, then prompt message is completed in generation, with
User is set to complete instruction according to the completion prompt message triggering;Otherwise, key optimization operation prompt information is generated, so that user
Operation prompt information is optimized according to a key and triggers key optimization operational order.
For example, above-mentioned key optimization operation prompt information may be characterized as the key optimization touch-control of the lower section of region 1 in Fig. 2
Key, user trigger a key by " key optimization " on touch-control software analysis interface and optimize operational order.
Further, after above-mentioned steps 303, also comprise the following steps:
If receiving the key optimization operational order of user's triggering, according to the comprehensive detection result, one is performed
Key optimization operation.
Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine pair is called
It is described to need killing software to carry out killing;
If the comprehensive detection result includes the software information of self-starting software, obtain Root authority, and with
The self-starting function of the self-starting software is closed during Root authority;
If the comprehensive detection result includes the software information for the software that can move, obtain Root authority, and with
The software of moving is transferred under default target directory during Root authority;
If the comprehensive detection result includes the software information that can clear up installation kit, to being included in the testing result
Installation package informatin corresponding to installation kit cleared up;
If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information,
One in the software information of leaky software and the software information of system intialization software or any multinomial combination, then generate hand
Dynamic processing prompt message;
If the manual optimization operational order that user triggers according to the prompt message of triggering manually is received, according to
The software information and operation instruction carried manually in optimization operational order, is carried out using the operation instruction to the software information
Processing.
Need exist for explanation be:The problematic software for having some task items to detect in the Detection task list is
Function can not be optimized by a key and realize processing automatically, it is malice ad ware as escribed above, upgradeable software, leaky soft
Part and system intialization software.These softwares need to carry out manual handle, so after the completion of the item of one key optimization processing of energy,
As shown in fig. 6, software analysis interface enters optimization interface manually, now need user to trigger respective items manually, come manually operated complete
The optimization processing of paired software.For example, " software removal of home " " cleaning of system intialization software " " software upgrading " listed in Fig. 6 is manual
Optimize button.User distinguishes touch-control and corresponds to button, i.e., into manual optimization process.User only need to according in mobile terminal to software
The optimization guide that device corresponding to the method that state is detected provides is operated manually.
Further, the above embodiments also comprise the following steps:
If receiving the completion instruction of user's triggering, generation optimization completes that information is presented;
If receiving the key optimization operational order of user's triggering, monitor key optimization operation progress and optimizing
After the completion of, generation optimization completes that information is presented.
Wherein, generated in above-mentioned steps optimization complete present information can embodiments be Fig. 7 shown in display information.
In mobile terminal corresponding to the method detected in mobile terminal to application state described in above-described embodiment
The device detected to application state can be specifically one be similar to security guard security classes application program, the security classes
Application program can be arranged in the terminals such as mobile phone, iPad.In actual applications, the structure such as shown in Fig. 8, can in terminal 100
Virus identification engine 101 and virus base 102 are installed, checking and killing virus is carried out to having installed software to realize.Have one on high in the clouds 200
The identification storehouse of individual user's killing.Terminal 100 can be by interacting, to realize the method for the killing based on high in the clouds 200 with high in the clouds.
, can be by the white list either mechanism such as gray list or blacklist specifically, the antivirus engine that high in the clouds and mobile phone terminal are local, can
With the bag name according to Android installation kits, and/or, version number, and/or, digital signature, and/or, Android components
Receiver feature, and/or, Android components service feature, and/or, Android components activity spy
Sign, and/or, instruction or character string in executable file, and/or, the MD5 values of each file under Android installation kit catalogues;Sentence
The security of disconnected file.
It should be noted that:For foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because
According to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know
Know, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention
It is necessary.
As shown in figure 9, the knot for the device detected in mobile terminal to application state that the embodiment of the present invention two provides
Structure schematic diagram.The device detected in mobile terminal to application state that the present embodiment provides can realize above-mentioned implementation
The method detected in mobile terminal to application state that example one provides.Specifically, described in the present embodiment in mobile terminal
The device application detected to application state is on the subscriber terminal.The dress detected in mobile terminal to application state
Put including:Detection module 10, the first generation module 20 and the second generation module 30.Wherein, the detection module 10 is used to receive
To after the detection instruction of user's triggering, according to default Detection task list, mounted software is detected, the detection
Include two or more task items in task list.First generation module 20 is used at least one task items
After the completion of detection, testing result corresponding to this task items is generated.Second generation module 30 is used to be tied according to the detection
Fruit, safe handling prompt message is generated, so that user carries out corresponding software operation according to the safe handling prompt message.
The technical scheme that the present embodiment provides is appointed after the detection instruction of user's triggering is received according to default detection
Business list, is detected, such user only needs once to trigger to mounted software, you can the multinomial detection to software is realized,
The complicated processes for needing to be operated respectively in the prior art using all kinds of management softwares are simplified, improve Consumer's Experience;In addition,
The technical scheme that the present embodiment provides is based on testing result corresponding to each task items, generates corresponding safe handling prompting letter respectively
Breath, operated with prompting user to make corresponding software, help user effectively to manage mounted software in equipment, realize
Once trigger and carry out repeated detection processing to having installed software, simplify the operation of user, it is convenient for users.
Further, default Detection task list includes described in above-described embodiment:Checking and killing virus task items, malice are wide
Accuse software task item, self-starting software task item, the software task item that can move, installation kit task items, upgradeable software can be cleared up
The combination of any two or multinomial in task items, software vulnerability scan task item and system intialization software task item;Accordingly,
Detection module 10 described in above-described embodiment is specifically used for:
According to default Detection task list, checking and killing virus engine corresponding to the checking and killing virus task items is called to detect institute
State to have installed to whether there is in software and have virus;And/or
According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to examine
Install to whether there is in software described in surveying and had malice ad ware;And/or
According to default Detection task list, the second inspection policies corresponding to the self-starting software task item are called to detect
It is described to have installed in software with the presence or absence of there is self-starting software;And/or
According to default Detection task list, the 3rd inspection policies corresponding to software task item that can be moved described in calling detect
It is described to have installed in software with the presence or absence of there is the software that move;And/or
According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and are examined
Install to whether there is to have in software described in surveying and can clear up installation kit;And/or
According to default Detection task list, the 5th inspection policies corresponding to the upgradeable software task items are called to detect
It is described to have installed in software with the presence or absence of there is scalable software;And/or
According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to examine
Installed described in surveying and whether there is leaky software in software;And/or
According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to examine
Installed described in surveying in software with the presence or absence of the software for having system intialization.
Further, the first generation module 20 described in above-described embodiment, is specifically used for:
When the checking and killing virus task items, which detect, to be completed, generation, which includes, to be needed killing amount of software and needs killing software
The testing result of software information;
When the malice ad ware task items, which detect, to be completed, generation includes the malice ad ware quantity detected
With the testing result of the software information of malice ad ware;
When the self-starting software task item, which detects, to be completed, generation include the self-starting amount of software that detects and from
Start the testing result of the software information of software;
When the software task item detection of moving is completed, generation includes the amount of software and can of moving detected
The testing result of the software information of removal of home software;
When it is described clear up installation kit task items detection complete when, generation include detect clear up installation kit quantity
With the testing result of the software information that can clear up installation kit;
When the upgradeable software task items, which detect, to be completed, generation includes the upgradeable software quantity that detects and can
Upgrade the testing result of the software information of software;
When the software vulnerability scan task item, which detects, to be completed, generation include the leaky amount of software that detects and
The testing result of the software information of leaky software;
When the system intialization software task item, which detects, to be completed, generation includes the system intialization amount of software detected
With the testing result of the software information of system intialization software.
Further, the second generation module 30 described in above-described embodiment, is specifically used for:
When the testing result is to include the testing result for the software information for needing killing amount of software and needing killing software
When, generation carries the killing prompt message of the testing result;
When the testing result is to include the software letter of the malice ad ware quantity detected and malice ad ware
During the testing result of breath, what generation carried the testing result forbids prompt message;
When the testing result is to include the software information of the self-starting amount of software detected and self-starting software
During testing result, generation carries the closing self-starting prompt message of the testing result;
When the testing result is to include the software information of move amount of software and the software that can move that detect
During testing result, generation carries the removal of home prompt message of the testing result;
When the testing result be include detect clear up installation kit quantity and can clear up installation kit software letter
During the testing result of breath, generation carries the cleaning prompt message of the testing result;
When the testing result is to include the software information of the upgradeable software quantity detected and upgradeable software
During testing result, generation carries the upgrade tip information of the testing result;
When the testing result is to include the software information of the leaky amount of software detected and leaky software
During testing result, the leak that generation carries the testing result checks prompt message;
When the testing result is to include the software letter of the system intialization amount of software detected and system intialization software
During the testing result of breath, generation carries the software unloading prompt message of the testing result.
Further, as shown in Figure 10, the dress detected in mobile terminal to application state described in above-described embodiment
Putting also includes:First acquisition module 40, determining module 50 and forms processing module 60.Wherein, first acquisition module 40 is used
The testing result corresponding to all task items in the acquisition Detection task list.The determining module 50 is used for according to the institute
There is testing result corresponding to task items, determine comprehensive detection result.The forms processing module 60 is used for according to the comprehensive inspection
Result is surveyed, forms, which are presented, to result is handled, and different forms are presented with corresponding different comprehensive detection results.
Further, the forms processing module 60 is specifically used for:
When the comprehensive detection result for it is safe for operation when, by forms processing for it is safe for operation when the forms that present;
Window when the comprehensive detection result when potential safety hazard be present, to be presented when being and potential safety hazard be present by forms processing
Body;
When the comprehensive detection result be exist can optimization software when, by forms processing be exist can be presented during optimization software
Forms;
When the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
Further, as shown in Figure 10, the dress detected in mobile terminal to application state described in above-described embodiment
Putting to include:Monitoring modular 70.Wherein, the monitoring modular 70 is used for the mistake detected to the mounted software
Cheng Zhong, detection progress is monitored, and generate progress corresponding to current detection progress and information is presented.
Further, as shown in Figure 10, the dress detected in mobile terminal to application state described in above-described embodiment
Putting to include:Second acquisition module 80.Wherein, second acquisition module 80 is used to obtain the quantity for having installed software,
And information is presented in generation quantity.
Further, the device detected in mobile terminal to application state shown in above-mentioned Fig. 9 can also include:The
One acquisition module, determining module, judge module and the 3rd generation module.Wherein, first acquisition module is described for obtaining
Testing result corresponding to all task items in Detection task list.The determining module is used for corresponding according to all task items
Testing result, determine comprehensive detection result.The judge module is used to judge whether the comprehensive detection result is operation peace
Entirely.3rd generation module is used for when the comprehensive detection result is safe for operation, and prompt message is completed in generation, to use
Instruction is completed in family according to the completion prompt message triggering, when the comprehensive detection result is not safe for operation, generates a key
Optimize operation prompt information, so that user optimizes operation prompt information according to a key triggers key optimization operational order.
Further, the device detected in mobile terminal to application state described in above-described embodiment also includes:
Execution module.The execution module is used for when the key for receiving user's triggering optimizes operational order, according to described comprehensive
Testing result is closed, performs key optimization operation;
Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine pair is called
It is described to need killing software to carry out killing;
If the comprehensive detection result includes the software information of self-starting software, obtain Root authority, and with
The self-starting function of the self-starting software is closed during Root authority;
If the comprehensive detection result includes the software information for the software that can move, obtain Root authority, and with
The software of moving is transferred under default target directory during Root authority;
If the comprehensive detection result includes the software information that can clear up installation kit, to being included in the testing result
Installation package informatin corresponding to installation kit cleared up;
If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information,
One in the software information of leaky software and the software information of system intialization software or any multinomial combination, then generate hand
Dynamic processing prompt message;
If the manual optimization operational order that user triggers according to the prompt message of triggering manually is received, according to
The software information and operation instruction carried manually in optimization operational order, is carried out using the operation instruction to the software information
Processing.
Further, the device detected in mobile terminal to application state described in above-described embodiment also includes:
4th generation module.4th generation module is used for when receiving the completion instruction of user's triggering, and generation has optimized
Into presentation information;When receive user triggering a key optimize operational order when, monitoring one key optimization operation progress and
After the completion of optimization, generation optimization completes that information is presented.
The device detected in mobile terminal to application state described in the present embodiment two can realize above-described embodiment
One method detected in mobile terminal to application state provided, specific implementation principle can be found in above-mentioned implementation one
Related content, here is omitted.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiment.
It is understood that the correlated characteristic in the above method and interchanger can be referred to mutually.In addition, above-described embodiment
In " first ", " second " etc. be to be used to distinguish each embodiment, and do not represent the quality of each embodiment.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein.
Various general-purpose systems can also be used together with teaching based on this.As described above, required by constructing this kind of system
Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that it can utilize various
Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention
Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect,
Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor
The application claims of shield features more more than the feature being expressly recited in each claim.It is more precisely, such as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself
Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment
Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any
Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power
Profit requires, summary and accompanying drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation
Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
One of meaning mode can use in any combination.
The all parts embodiment of the present invention can be realized with hardware, or to be run on one or more processor
Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice
Microprocessor or digital signal processor (DSP) according to embodiments of the present invention enter to realize in mobile terminal to application state
The some or all functions of some or all parts in the device of row detection.The present invention is also implemented as being used to perform
The some or all equipment or program of device of method as described herein are (for example, computer program and computer journey
Sequence product).It is such realize the present invention program can store on a computer-readable medium, either can have one or
The form of multiple signals.Such signal can be downloaded from internet website and obtained, either provide on carrier signal or
There is provided in the form of any other.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real
It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame
Claim.
A1, one aspect of the invention disclose a kind of method detected in mobile terminal to application state, including:
After the detection instruction for receiving user's triggering, according to default Detection task list, mounted software is carried out
Detection, includes two or more task items in the Detection task list;
After the completion of at least one task items detection, testing result corresponding to this task items is generated;
According to the testing result, safe handling prompt message is generated, so that user prompts to believe according to the safe handling
Breath carries out corresponding software operation.
A2, the method as described in A1, the default Detection task list include:Checking and killing virus task items, malice advertisement
Software task item, self-starting software task item, the software task item that can move, can clear up installation kit task items, upgradeable software appoint
The combination of any two or multinomial being engaged in item, software vulnerability scan task item and system intialization software task item;Accordingly,
It is described mounted software to be detected according to default Detection task list, including:
According to default Detection task list, checking and killing virus engine corresponding to the checking and killing virus task items is called to detect institute
State to have installed to whether there is in software and have virus;And/or
According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to examine
Install to whether there is in software described in surveying and had malice ad ware;And/or
According to default Detection task list, the second inspection policies corresponding to the self-starting software task item are called to detect
It is described to have installed in software with the presence or absence of there is self-starting software;And/or
According to default Detection task list, the 3rd inspection policies corresponding to software task item that can be moved described in calling detect
It is described to have installed in software with the presence or absence of there is the software that move;And/or
According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and are examined
Install to whether there is to have in software described in surveying and can clear up installation kit;And/or
According to default Detection task list, the 5th inspection policies corresponding to the upgradeable software task items are called to detect
It is described to have installed in software with the presence or absence of there is scalable software;And/or
According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to examine
Installed described in surveying and whether there is leaky software in software;And/or
According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to examine
Installed described in surveying in software with the presence or absence of the software for having system intialization.
A3, the method as described in A2, after the completion of the task items detection, generate and examined corresponding to this task items
Result is surveyed, including:
If the checking and killing virus task items detection is completed, generation, which includes, to be needed killing amount of software and needs killing software
The testing result of software information;
If the malice ad ware task items detection is completed, generation includes the malice ad ware quantity detected
With the testing result of the software information of malice ad ware;
If self-starting software task item detection is completed, generation include the self-starting amount of software that detects and from
Start the testing result of the software information of amount of software and self-starting software;
If the software task item detection of moving is completed, generation includes the amount of software and can of moving detected
The testing result of the software information of removal of home software;
If it is described clear up installation kit task items detection complete, generation include detect clear up installation kit quantity
With the testing result of the software information that can clear up installation kit;
If upgradeable software task items detection is completed, generation includes the upgradeable software quantity that detects and can
Upgrade the testing result of the software information of software;
If software vulnerability scan task item detection is completed, generation include the leaky amount of software that detects and
The testing result of the software information of leaky software;
If the system intialization software task item detection is completed, generation includes the system intialization amount of software detected
With the testing result of the software information of system intialization software.
A4, the method as any one of A1~A3, in addition to:
Obtain testing result corresponding to all task items in the Detection task list;
According to testing result corresponding to all task items, comprehensive detection result is determined;
According to the comprehensive detection result, forms are presented to result and handled, be in corresponding different comprehensive detection results
Existing different forms.
A5, the method as described in A4, it is described according to the comprehensive detection result, forms are presented to result and handled, are wrapped
Include:
If the comprehensive detection result to be safe for operation, by forms processing for it is safe for operation when the forms that present;
If the window that the comprehensive detection result potential safety hazard to be present, is presented when being and potential safety hazard be present by forms processing
Body;
If the comprehensive detection result be exist can optimization software, by forms processing be exist can be presented during optimization software
Forms;
If the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
A6, the method as described in any in A1~A3, in addition to:
Obtain testing result corresponding to all task items in the Detection task list;
According to testing result corresponding to all task items, comprehensive detection result is determined;
Judge whether the comprehensive detection result is safe for operation;
If so, then prompt message is completed in generation, so that user completes instruction according to the completion prompt message triggering;
Otherwise, key optimization operation prompt information is generated, is touched so that user optimizes operation prompt information according to a key
Send out key optimization operational order.
A7, the method as described in A6, in addition to:
If receiving the key optimization operational order of user's triggering, according to the comprehensive detection result, one is performed
Key optimization operation;
Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine pair is called
It is described to need killing software to carry out killing;
If the comprehensive detection result includes the software information of self-starting software, obtain Root authority, and with
The self-starting function of the self-starting software is closed during Root authority;
If the comprehensive detection result includes the software information for the software that can move, obtain Root authority, and with
The software of moving is transferred under default target directory during Root authority;
If the comprehensive detection result includes the software information that can clear up installation kit, to being included in the testing result
Installation package informatin corresponding to installation kit cleared up;
If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information,
One in the software information of leaky software and the software information of system intialization software or any multinomial combination, then generate hand
Dynamic processing prompt message;
If the manual optimization operational order that user triggers according to the prompt message of triggering manually is received, according to
The software information and operation instruction carried manually in optimization operational order, is carried out using the operation instruction to the software information
Processing.
A8, the method as described in A6 or A7, in addition to:
If receiving the completion instruction of user's triggering, generation optimization completes that information is presented;
If receiving the key optimization operational order of user's triggering, monitor key optimization operation progress and optimizing
After the completion of, generation optimization completes that information is presented.
A9, the method as any one of A1~A3, in addition to:
During being detected to the mounted software, detection progress is monitored, and generate current detection progress pair
Information is presented in the progress answered.
A10, the method as any one of A1~A3, in addition to:
The quantity for having installed software is obtained, and information is presented in generation quantity.
B1, another aspect of the invention disclose a kind of device detected in mobile terminal to application state, including:
Detection module, after the detection instruction for receiving user's triggering, according to default Detection task list, to having pacified
The software of dress is detected, and includes two or more task items in the Detection task list;
First generation module, for after the completion of the detection of at least one task items, generating and being detected corresponding to this task items
As a result;
Second generation module, for according to the testing result, safe handling prompt message being generated, so that user is according to institute
State safe handling prompt message and carry out corresponding software operation.
B2, the device as described in B1, the default Detection task list include:Checking and killing virus task items, malice advertisement
Software task item, self-starting software task item, the software task item that can move, can clear up installation kit task items, upgradeable software appoint
The combination of any two or multinomial being engaged in item, software vulnerability scan task item and system intialization software task item;Accordingly, institute
Detection module is stated, is specifically used for:
According to default Detection task list, checking and killing virus engine corresponding to the checking and killing virus task items is called to detect institute
State to have installed to whether there is in software and have virus;And/or
According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to examine
Install to whether there is in software described in surveying and had malice ad ware;And/or
According to default Detection task list, the second inspection policies corresponding to the self-starting software task item are called to detect
It is described to have installed in software with the presence or absence of there is self-starting software;And/or
According to default Detection task list, the 3rd inspection policies corresponding to software task item that can be moved described in calling detect
It is described to have installed in software with the presence or absence of there is the software that move;And/or
According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and are examined
Install to whether there is to have in software described in surveying and can clear up installation kit;And/or
According to default Detection task list, the 5th inspection policies corresponding to the upgradeable software task items are called to detect
It is described to have installed in software with the presence or absence of there is scalable software;And/or
According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to examine
Installed described in surveying and whether there is leaky software in software;And/or
According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to examine
Installed described in surveying in software with the presence or absence of the software for having system intialization.
B3, the device as described in B2, first generation module, are specifically used for:
When the checking and killing virus task items, which detect, to be completed, generation, which includes, to be needed killing amount of software and needs killing software
The testing result of software information;
When the malice ad ware task items, which detect, to be completed, generation includes the malice ad ware quantity detected
With the testing result of the software information of malice ad ware;
When the self-starting software task item, which detects, to be completed, generation include the self-starting amount of software that detects and from
Start the testing result of the software information of software;
When the software task item detection of moving is completed, generation includes the amount of software and can of moving detected
The testing result of the software information of removal of home software;
When it is described clear up installation kit task items detection complete when, generation include detect clear up installation kit quantity
With the testing result of the software information that can clear up installation kit;
When the upgradeable software task items, which detect, to be completed, generation includes the upgradeable software quantity that detects and can
Upgrade the testing result of the software information of software;
When the software vulnerability scan task item, which detects, to be completed, generation include the leaky amount of software that detects and
The testing result of the software information of leaky software;
When the system intialization software task item, which detects, to be completed, generation includes the system intialization amount of software detected
With the testing result of the software information of system intialization software.
B4, the device as any one of B1~B3, in addition to:
First acquisition module, for obtaining testing result corresponding to all task items in the Detection task list;
Determining module, for the testing result according to corresponding to all task items, determine comprehensive detection result;
Forms processing module, for according to the comprehensive detection result, forms being presented to result and handle, to correspond to not
Different forms are presented with comprehensive detection result.
B5, the device as described in B4, the forms processing module, are specifically used for:
When the comprehensive detection result for it is safe for operation when, by forms processing for it is safe for operation when the forms that present;
Window when the comprehensive detection result when potential safety hazard be present, to be presented when being and potential safety hazard be present by forms processing
Body;
When the comprehensive detection result be exist can optimization software when, by forms processing be exist can be presented during optimization software
Forms;
When the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
B6, the device as any one of B1~B3, in addition to:
First acquisition module, for obtaining testing result corresponding to all task items in the Detection task list;
Determining module, for the testing result according to corresponding to all task items, determine comprehensive detection result;
Judge module, for judging whether the comprehensive detection result is safe for operation;
3rd generation module, for when the comprehensive detection result is safe for operation, generating and completing prompt message, so that
User completes instruction according to the completion prompt message triggering, when the comprehensive detection result is not safe for operation, generation one
Key optimizes operation prompt information, so that user optimizes operation prompt information according to a key triggers key optimization operational order.
B7, the method as described in B6, in addition to:
Execution module, for when the key for receiving user's triggering optimizes operational order, being examined according to the synthesis
Result is surveyed, performs key optimization operation;
Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine pair is called
It is described to need killing software to carry out killing;
If the comprehensive detection result includes the software information of self-starting software, obtain Root authority, and with
The self-starting function of the self-starting software is closed during Root authority;
If the comprehensive detection result includes the software information for the software that can move, obtain Root authority, and with
The software of moving is transferred under default target directory during Root authority;
If the comprehensive detection result includes the software information that can clear up installation kit, to being included in the testing result
Installation package informatin corresponding to installation kit cleared up;
If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information,
One in the software information of leaky software and the software information of system intialization software or any multinomial combination, then generate hand
Dynamic processing prompt message;
If the manual optimization operational order that user triggers according to the prompt message of triggering manually is received, according to
The software information and operation instruction carried manually in optimization operational order, is carried out using the operation instruction to the software information
Processing.
B8, the method as described in B6 or B7, in addition to:
4th generation module, for when receiving the completion instruction of user's triggering, generation optimization to complete that letter is presented
Breath;When the key for receiving user's triggering optimizes operational order, one key of monitoring optimization operation progress is simultaneously completed in optimization
Afterwards, generation optimization completes that information is presented.
B9, the device as any one of B1~B3, in addition to:
Monitoring modular, during being detected to the mounted software, detection progress is monitored, and generate and work as
Information is presented in progress corresponding to preceding detection progress.
B10, the device as any one of B1~B3, in addition to:
Second acquisition module, the quantity of software is installed for obtaining, and information is presented in generation quantity.
Claims (20)
- A kind of 1. method detected in mobile terminal to application state, it is characterised in that including:After the detection instruction for receiving user's triggering, according to default Detection task list, mounted software is detected, The default Detection task list includes:Checking and killing virus task items, malice ad ware task items, self-starting software task Item, the software task item that can move, can clear up installation kit task items, upgradeable software task items, software vulnerability scan task item and The combination of any two or multinomial in system intialization software task item;After the completion of at least one task items detection, testing result corresponding to this task items is generated;According to the testing result, safe handling prompt message is generated, so that user enters according to the safe handling prompt message The corresponding software operation of row.
- 2. according to the method for claim 1, it is characterised in that it is described according to default Detection task list, to having installed Software detected, including:According to default Detection task list, call described in checking and killing virus engine detection corresponding to the checking and killing virus task items Whether there is in installation software has virus;And/orAccording to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to detect institute State to have installed to whether there is in software and have malice ad ware;And/orAccording to default Detection task list, call described in the second inspection policies detection corresponding to the self-starting software task item Install to whether there is in software and had self-starting software;And/orAccording to default Detection task list, can be moved described in calling described in the 3rd inspection policies detection corresponding to software task item Install to whether there is in software and had the software that can be moved;And/orAccording to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and detect institute State to have installed to whether there is to have in software and can clear up installation kit;And/orAccording to default Detection task list, call described in the 5th inspection policies detection corresponding to the upgradeable software task items Install to whether there is in software and had scalable software;And/orAccording to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to detect institute State to have installed and whether there is leaky software in software;And/orAccording to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to detect institute State and installed in software with the presence or absence of the software for having system intialization.
- 3. according to the method for claim 2, it is characterised in that after the completion of the task items detection, generation should Testing result corresponding to item task items, including:If the checking and killing virus task items detection is completed, generation includes the software for needing killing amount of software and needing killing software The testing result of information;If the malice ad ware task items detection is completed, generation includes the malice ad ware quantity and evil detected The testing result of the software information of meaning ad ware;If the self-starting software task item detection is completed, generation includes the self-starting amount of software detected and self-starting The testing result of the software information of amount of software and self-starting software;If the software task item detection of moving is completed, generation, which includes moving of detecting, amount of software and can move The testing result of the software information of software;Clear up the detection of installation kit task items if described and complete, generation include detect clear up installation kit quantity and can Clear up the testing result of the software information of installation kit;If upgradeable software task items detection is completed, generation includes the upgradeable software quantity that detects and scalable The testing result of the software information of software;If the software vulnerability scan task item detection is completed, generation includes the leaky amount of software detected and has leakage The testing result of the software information of hole software;If the system intialization software task item detection is completed, generation includes the system intialization amount of software detected and is Unite preset software software information testing result.
- 4. according to method according to any one of claims 1 to 3, it is characterised in that also include:Obtain testing result corresponding to all task items in the Detection task list;According to testing result corresponding to all task items, comprehensive detection result is determined;According to the comprehensive detection result, forms are presented to result and handled, are presented not with corresponding different comprehensive detection results Same forms.
- 5. according to the method for claim 4, it is characterised in that it is described according to the comprehensive detection result, result is presented Forms are handled, including:If the comprehensive detection result to be safe for operation, by forms processing for it is safe for operation when the forms that present;If the forms that the comprehensive detection result potential safety hazard to be present, is presented when being and potential safety hazard be present by forms processing;If the comprehensive detection result be exist can optimization software, by forms processing be exist can optimization software when the window that presents Body;If the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
- 6. the method according to any one of claims 1 to 3, it is characterised in that also include:Obtain testing result corresponding to all task items in the Detection task list;According to testing result corresponding to all task items, comprehensive detection result is determined;Judge whether the comprehensive detection result is safe for operation;If so, then prompt message is completed in generation, so that user completes instruction according to the completion prompt message triggering;Otherwise, key optimization operation prompt information is generated, so that user optimizes operation prompt information triggering one according to a key Key optimizes operational order.
- 7. according to the method for claim 6, it is characterised in that also include:If receiving the key optimization operational order of user's triggering, according to the comprehensive detection result, it is excellent to perform a key Change operation;Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine is called to described Killing software is needed to carry out killing;If the comprehensive detection result includes the software information of self-starting software, Root authority is obtained, and with Root The self-starting function of the self-starting software is closed during authority;If the comprehensive detection result includes the software information for the software that can move, Root authority is obtained, and with Root The software of moving is transferred under default target directory during authority;If the comprehensive detection result includes the software information that can clear up installation kit, to the peace included in the testing result Installation kit corresponding to dress package informatin is cleared up;If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information, have leakage One in the software information of hole software and the software information of system intialization software or any multinomial combination, then generation are located manually Manage prompt message;If receiving the manual optimization operational order that user triggers according to the manual handle prompt message, according to described manual The software information that carries and operation instruction in optimization operational order, using the operation instruction to the software information at Reason.
- 8. according to the method for claim 6, it is characterised in that also include:If receiving the completion instruction of user's triggering, generation optimization completes that information is presented;If receiving the key optimization operational order of user's triggering, monitor key optimization operation progress and completed in optimization Afterwards, generation optimization completes that information is presented.
- 9. according to method according to any one of claims 1 to 3, it is characterised in that also include:During being detected to the mounted software, detection progress is monitored, and generate corresponding to current detection progress Information is presented in progress.
- 10. according to method according to any one of claims 1 to 3, it is characterised in that also include:The quantity for having installed software is obtained, and information is presented in generation quantity.
- A kind of 11. device detected in mobile terminal to application state, it is characterised in that including:Detection module, after the detection instruction for receiving user's triggering, according to default Detection task list, to mounted Software is detected, and the default Detection task list includes:Checking and killing virus task items, malice ad ware task items, from Start software task item, the software task item that can move, installation kit task items, upgradeable software task items, software vulnerability can be cleared up The combination of any two or multinomial in scan task item and system intialization software task item;First generation module, for after the completion of the detection of at least one task items, generating testing result corresponding to this task items;Second generation module, for according to the testing result, safe handling prompt message being generated, so that user is according to the peace Full processing prompt message carries out corresponding software operation.
- 12. device according to claim 11, it is characterised in that the detection module, be specifically used for:According to default Detection task list, call described in checking and killing virus engine detection corresponding to the checking and killing virus task items Whether there is in installation software has virus;And/orAccording to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to detect institute State to have installed to whether there is in software and have malice ad ware;And/orAccording to default Detection task list, call described in the second inspection policies detection corresponding to the self-starting software task item Install to whether there is in software and had self-starting software;And/orAccording to default Detection task list, can be moved described in calling described in the 3rd inspection policies detection corresponding to software task item Install to whether there is in software and had the software that can be moved;And/orAccording to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and detect institute State to have installed to whether there is to have in software and can clear up installation kit;And/orAccording to default Detection task list, call described in the 5th inspection policies detection corresponding to the upgradeable software task items Install to whether there is in software and had scalable software;And/orAccording to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to detect institute State to have installed and whether there is leaky software in software;And/orAccording to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to detect institute State and installed in software with the presence or absence of the software for having system intialization.
- 13. device according to claim 12, it is characterised in that first generation module, be specifically used for:When the checking and killing virus task items, which detect, to be completed, generation includes the software for needing killing amount of software and needing killing software The testing result of information;When the malice ad ware task items, which detect, to be completed, generation includes the malice ad ware quantity and evil detected The testing result of the software information of meaning ad ware;When the self-starting software task item, which detects, to be completed, generation includes the self-starting amount of software detected and self-starting The testing result of the software information of software;When the software task item detection of moving is completed, generation, which includes moving of detecting, amount of software and can move The testing result of the software information of software;When it is described clear up the detection of installation kit task items and complete when, generation include detect clear up installation kit quantity and can Clear up the testing result of the software information of installation kit;When the upgradeable software task items, which detect, to be completed, generation includes the upgradeable software quantity that detects and scalable The testing result of the software information of software;When the software vulnerability scan task item, which detects, to be completed, generation includes the leaky amount of software detected and has leakage The testing result of the software information of hole software;When the system intialization software task item, which detects, to be completed, generation includes the system intialization amount of software detected and is Unite preset software software information testing result.
- 14. the device according to any one of claim 11~13, it is characterised in that also include:First acquisition module, for obtaining testing result corresponding to all task items in the Detection task list;Determining module, for the testing result according to corresponding to all task items, determine comprehensive detection result;Forms processing module, for according to the comprehensive detection result, forms being presented to result and handle, with corresponding different comprehensive Close testing result and different forms are presented.
- 15. device according to claim 14, it is characterised in that the forms processing module, be specifically used for:When the comprehensive detection result for it is safe for operation when, by forms processing for it is safe for operation when the forms that present;Forms when the comprehensive detection result when potential safety hazard be present, to be presented when being and potential safety hazard be present by forms processing;When the comprehensive detection result be exist can optimization software when, by forms processing be exist can optimization software when the window that presents Body;When the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
- 16. the device according to any one of claim 11~13, it is characterised in that also include:First acquisition module, for obtaining testing result corresponding to all task items in the Detection task list;Determining module, for the testing result according to corresponding to all task items, determine comprehensive detection result;Judge module, for judging whether the comprehensive detection result is safe for operation;3rd generation module, for when the comprehensive detection result is safe for operation, prompt message to be completed in generation, so that user Instruction is completed according to the completion prompt message triggering, when the comprehensive detection result is not safe for operation, one key of generation is excellent Change operation prompt information, so that user optimizes operation prompt information according to a key triggers key optimization operational order.
- 17. device according to claim 16, it is characterised in that also include:Execution module, for when receive user triggering a key optimize operational order when, according to the comprehensive detection knot Fruit, perform key optimization operation;Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine is called to described Killing software is needed to carry out killing;If the comprehensive detection result includes the software information of self-starting software, Root authority is obtained, and with Root The self-starting function of the self-starting software is closed during authority;If the comprehensive detection result includes the software information for the software that can move, Root authority is obtained, and with Root The software of moving is transferred under default target directory during authority;If the comprehensive detection result includes the software information that can clear up installation kit, to the peace included in the testing result Installation kit corresponding to dress package informatin is cleared up;If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information, have leakage One in the software information of hole software and the software information of system intialization software or any multinomial combination, then generation are located manually Manage prompt message;If receiving the manual optimization operational order that user triggers according to the manual handle prompt message, according to described manual The software information that carries and operation instruction in optimization operational order, using the operation instruction to the software information at Reason.
- 18. device according to claim 16, it is characterised in that also include:4th generation module, for when receiving the completion instruction of user's triggering, generation optimization to complete that information is presented;When When receiving the key optimization operational order of user's triggering, one key of monitoring optimizes operation progress and after the completion of optimization, raw Complete that information is presented into optimization.
- 19. the device according to any one of claim 11~13, it is characterised in that also include:Monitoring modular, during being detected to the mounted software, detection progress is monitored, and generate current inspection Information is presented in progress corresponding to survey progress.
- 20. the device according to any one of claim 11~13, it is characterised in that also include:Second acquisition module, the quantity of software is installed for obtaining, and information is presented in generation quantity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410318844.0A CN104050417B (en) | 2014-07-04 | 2014-07-04 | A kind of method and device detected in mobile terminal to application state |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410318844.0A CN104050417B (en) | 2014-07-04 | 2014-07-04 | A kind of method and device detected in mobile terminal to application state |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104050417A CN104050417A (en) | 2014-09-17 |
CN104050417B true CN104050417B (en) | 2018-03-27 |
Family
ID=51503234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410318844.0A Active CN104050417B (en) | 2014-07-04 | 2014-07-04 | A kind of method and device detected in mobile terminal to application state |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104050417B (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104573504B (en) * | 2014-12-24 | 2018-05-25 | 百度在线网络技术(北京)有限公司 | A kind of method and apparatus for running application in iOS related systems |
CN104462961B (en) * | 2014-12-24 | 2018-04-10 | 北京奇虎科技有限公司 | Mobile terminal and its privacy authority optimization method |
CN105320889A (en) * | 2015-02-10 | 2016-02-10 | 中国移动通信集团广东有限公司 | Security detection method and apparatus |
CN106156619B (en) * | 2015-04-23 | 2020-04-03 | 腾讯科技(深圳)有限公司 | Application security protection method and device |
CN104991794A (en) * | 2015-06-18 | 2015-10-21 | 上海斐讯数据通信技术有限公司 | Android intelligent terminal application remote management system |
CN106407098B (en) * | 2015-07-27 | 2021-06-11 | 腾讯科技(深圳)有限公司 | Application program state monitoring method and device |
CN106529290B (en) * | 2016-10-11 | 2020-02-18 | 北京金山安全软件有限公司 | Malicious software protection method and device and electronic equipment |
CN107153577A (en) * | 2017-04-21 | 2017-09-12 | 贵州省广播电视信息网络股份有限公司 | A kind of system optimization method for Android system |
CN107045609A (en) * | 2017-04-28 | 2017-08-15 | 努比亚技术有限公司 | Method, storage medium and the mobile terminal of detecting system security |
CN108647070B (en) * | 2018-04-18 | 2022-02-22 | Oppo广东移动通信有限公司 | Information reminding method and device, mobile terminal and computer readable medium |
CN110598409B (en) * | 2019-09-04 | 2020-06-02 | 南方电网数字电网研究院有限公司 | Storage medium access method and device, computer equipment and storage medium |
CN110674500B (en) * | 2019-09-04 | 2020-09-01 | 南方电网数字电网研究院有限公司 | Storage medium virus searching and killing method and device, computer equipment and storage medium |
CN112364349A (en) * | 2020-11-30 | 2021-02-12 | 江苏极鼎网络科技有限公司 | Cell-phone APP intellectual detection system equipment |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102279912A (en) * | 2011-06-03 | 2011-12-14 | 奇智软件(北京)有限公司 | Client program monitoring method and device and client |
CN102779257A (en) * | 2012-06-28 | 2012-11-14 | 奇智软件(北京)有限公司 | Security detection method and system of Android application program |
CN102799826A (en) * | 2012-07-19 | 2012-11-28 | 腾讯科技(深圳)有限公司 | Method and device for detecting application program installation package decompression process and client device |
CN102810143A (en) * | 2012-04-28 | 2012-12-05 | 天津大学 | Safety detecting system and method based on mobile phone application program of Android platform |
CN103092661A (en) * | 2013-01-31 | 2013-05-08 | 晨风云(北京)科技有限公司 | Intelligent mobile terminal software installation method and system |
CN103136091A (en) * | 2013-01-28 | 2013-06-05 | 北京奇虎科技有限公司 | Method and device for detecting safety state of terminal device |
CN103577757A (en) * | 2013-11-15 | 2014-02-12 | 北京奇虎科技有限公司 | Virus defending method and device |
CN103617106A (en) * | 2013-12-02 | 2014-03-05 | 广州金山网络科技有限公司 | Method and device for detecting electronic device |
CN103632096A (en) * | 2013-11-29 | 2014-03-12 | 北京奇虎科技有限公司 | Method and device for carrying out safety detection on equipment |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130152201A1 (en) * | 2011-12-12 | 2013-06-13 | Microsoft Corporation | Adjunct Computing Machine for Remediating Malware on Compromised Computing Machine |
CN102867147B (en) * | 2012-08-24 | 2016-01-06 | 北京奇虎科技有限公司 | A kind of method and apparatus of file scan |
CN102929762B (en) * | 2012-09-26 | 2015-09-16 | 北京奇虎科技有限公司 | The monitoring method of the health status of terminal device and device |
-
2014
- 2014-07-04 CN CN201410318844.0A patent/CN104050417B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102279912A (en) * | 2011-06-03 | 2011-12-14 | 奇智软件(北京)有限公司 | Client program monitoring method and device and client |
CN102810143A (en) * | 2012-04-28 | 2012-12-05 | 天津大学 | Safety detecting system and method based on mobile phone application program of Android platform |
CN102779257A (en) * | 2012-06-28 | 2012-11-14 | 奇智软件(北京)有限公司 | Security detection method and system of Android application program |
CN102799826A (en) * | 2012-07-19 | 2012-11-28 | 腾讯科技(深圳)有限公司 | Method and device for detecting application program installation package decompression process and client device |
CN103136091A (en) * | 2013-01-28 | 2013-06-05 | 北京奇虎科技有限公司 | Method and device for detecting safety state of terminal device |
CN103092661A (en) * | 2013-01-31 | 2013-05-08 | 晨风云(北京)科技有限公司 | Intelligent mobile terminal software installation method and system |
CN103577757A (en) * | 2013-11-15 | 2014-02-12 | 北京奇虎科技有限公司 | Virus defending method and device |
CN103632096A (en) * | 2013-11-29 | 2014-03-12 | 北京奇虎科技有限公司 | Method and device for carrying out safety detection on equipment |
CN103617106A (en) * | 2013-12-02 | 2014-03-05 | 广州金山网络科技有限公司 | Method and device for detecting electronic device |
Also Published As
Publication number | Publication date |
---|---|
CN104050417A (en) | 2014-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104050417B (en) | A kind of method and device detected in mobile terminal to application state | |
KR101246623B1 (en) | Apparatus and method for detecting malicious applications | |
KR102017756B1 (en) | Apparatus and method for detecting abnormal behavior | |
CN104517054B (en) | Method, device, client and server for detecting malicious APK | |
CN103607498B (en) | A kind of method and device showing Stranger Calls/de-electrifying number related information | |
CN103514019B (en) | Handle the method and its device of pop-up | |
CN106709346B (en) | Document handling method and device | |
CN104268473B (en) | Method and device for detecting application programs | |
JP2011192296A (en) | Help utility application program | |
CN105677561B (en) | The multi-platform test method of mobile product and system | |
CN108228321A (en) | A kind of Android system application method for closing and device | |
CN106569860A (en) | Application management method and terminal | |
CN110058850A (en) | A kind of development approach of application, device and storage medium | |
CN104123496B (en) | The hold-up interception method and device of a kind of rogue software, terminal | |
CN108170438A (en) | A kind of application program automatic installation method, terminal and computer-readable medium | |
CN109726601A (en) | The recognition methods of unlawful practice and device, storage medium, computer equipment | |
Meng et al. | Harvesting smartphone privacy through enhanced juice filming charging attacks | |
CN105975302A (en) | Application installation method and terminal | |
CN105205398B (en) | It is a kind of that shell side method is looked into based on APK shell adding software dynamic behaviours | |
CN106844182A (en) | Method, system and mobile terminal for recording user behavior | |
CN104915594B (en) | Application program operation method and device | |
KR20170107665A (en) | Malicious Code Analysis Module and Method therefor | |
CN104200164B (en) | Loader virus searching and killing method, device and terminal | |
CN107608707A (en) | Application detection method, terminal and readable storage medium storing program for executing with hot repair function | |
CN106709335B (en) | Vulnerability detection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220718 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |