CN104050417B - A kind of method and device detected in mobile terminal to application state - Google Patents

A kind of method and device detected in mobile terminal to application state Download PDF

Info

Publication number
CN104050417B
CN104050417B CN201410318844.0A CN201410318844A CN104050417B CN 104050417 B CN104050417 B CN 104050417B CN 201410318844 A CN201410318844 A CN 201410318844A CN 104050417 B CN104050417 B CN 104050417B
Authority
CN
China
Prior art keywords
software
detection
task
information
testing result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410318844.0A
Other languages
Chinese (zh)
Other versions
CN104050417A (en
Inventor
王源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410318844.0A priority Critical patent/CN104050417B/en
Publication of CN104050417A publication Critical patent/CN104050417A/en
Application granted granted Critical
Publication of CN104050417B publication Critical patent/CN104050417B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Debugging And Monitoring (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention is on a kind of method and device detected in mobile terminal to application state.Wherein, methods described includes:After the detection instruction for receiving user's triggering, according to default Detection task list, mounted software is detected, includes two or more task items in the Detection task list;After the completion of at least one task items detection, testing result corresponding to this task items is generated;According to the testing result, safe handling prompt message is generated, so that user carries out corresponding software operation according to the safe handling prompt message.Technical scheme user provided by the invention only needs once to trigger, you can realizes the multinomial detection to software, simplifies the complicated processes for needing to be operated respectively in the prior art using all kinds of management softwares, improve Consumer's Experience.

Description

A kind of method and device detected in mobile terminal to application state
Technical field
The present invention relates to a kind of computer realm, application state is detected in mobile terminal more particularly to a kind of Method and device.
Background technology
At present, such as computer, smart mobile phone, palm PC, the use of tablet personal computer intelligent electronic device are more and more general And.The various softwares run on intelligent electronic device are also in explosive growth, such as realize text editing, image procossing, chat My god, the software of the various functions such as playing audio-video, greatly meet the use demand of user.User can be based on the need of itself Ask and download all kinds of softwares and install and use.
In the prior art, user need to download the security classes softwares such as corresponding checking and killing virus engine and the software in equipment is carried out Killing;Need it is irregular search without using software or spam software deleted manually;Need to when there is software upgrading prompting and When manual updating operation etc. is carried out to software.The software installed in equipment is more, and user management is got up more cumbersome more tired It is difficult.For the user that personal terminal is safeguarded using skilled and attention, aforesaid operations may not have difficulties, and can ensure The normal operation of software;But for domestic consumer, aforesaid operations can be comparatively laborious, it is more likely that running software occurs and asks Topic, influences the use of user.
The content of the invention
In view of the above problems, it is proposed that the present invention overcomes above mentioned problem or solved at least in part in order to provide one kind The method and device detected in mobile terminal to application state of above mentioned problem.
According to the first aspect of the invention, there is provided a kind of method detected in mobile terminal to application state, Including:
According to default Detection task list, mounted software is detected, included in the Detection task list There are two or more task items;
After the completion of at least one task items detection, testing result corresponding to this task items is generated;
According to the testing result, safe handling prompt message is generated, so that user prompts to believe according to the safe handling Breath carries out corresponding software operation.
Optionally, the foregoing method detected in mobile terminal to application state, wherein, the default detection is appointed Business list includes:Checking and killing virus task items, malice ad ware task items, self-starting software task item, can move software task Item, installation kit task items, upgradeable software task items, software vulnerability scan task item and system intialization software task item can be cleared up In the combination of any two or multinomial;Accordingly,
It is described mounted software to be detected according to default Detection task list, including:
According to default Detection task list, checking and killing virus engine corresponding to the checking and killing virus task items is called to detect institute State to have installed to whether there is in software and have virus;And/or
According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to examine Install to whether there is in software described in surveying and had malice ad ware;And/or
According to default Detection task list, the second inspection policies corresponding to the self-starting software task item are called to detect It is described to have installed in software with the presence or absence of there is self-starting software;And/or
According to default Detection task list, the 3rd inspection policies corresponding to software task item that can be moved described in calling detect It is described to have installed in software with the presence or absence of there is the software that move;And/or
According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and are examined Install to whether there is to have in software described in surveying and can clear up installation kit;And/or
According to default Detection task list, the 5th inspection policies corresponding to the upgradeable software task items are called to detect It is described to have installed in software with the presence or absence of there is scalable software;And/or
According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to examine Installed described in surveying and whether there is leaky software in software;And/or
According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to examine Installed described in surveying in software with the presence or absence of the software for having system intialization.
Optionally, the foregoing method detected in mobile terminal to application state, wherein, the task After the completion of item detection, testing result corresponding to this task items is generated, including:
If the checking and killing virus task items detection is completed, generation, which includes, to be needed killing amount of software and needs killing software The testing result of software information;
If the malice ad ware task items detection is completed, generation includes the malice ad ware quantity detected With the testing result of the software information of malice ad ware;
If self-starting software task item detection is completed, generation include the self-starting amount of software that detects and from Start the testing result of the software information of software;
If the software task item detection of moving is completed, generation includes the amount of software and can of moving detected The testing result of the software information of removal of home software;
If it is described clear up installation kit task items detection complete, generation include detect clear up installation kit quantity With the testing result of the software information that can clear up installation kit;
If upgradeable software task items detection is completed, generation includes the upgradeable software quantity that detects and can Upgrade the testing result of the software information of software;
If software vulnerability scan task item detection is completed, generation include the leaky amount of software that detects and The testing result of the software information of leaky software;
If the system intialization software task item detection is completed, generation includes the system intialization amount of software detected With the testing result of the software information of system intialization software.
After the completion of one task items detection, testing result corresponding to this task items is generated, including:
If the checking and killing virus task items detection is completed, generation, which includes, to be needed killing amount of software and needs killing software The testing result of software information;
If the malice ad ware task items detection is completed, generation includes the malice ad ware quantity detected With the testing result of the software information of malice ad ware;
If self-starting software task item detection is completed, generation include the self-starting amount of software that detects and from Start the testing result of the software information of amount of software and self-starting software;
If the software task item detection of moving is completed, generation includes the amount of software and can of moving detected The testing result of the software information of removal of home software;
If it is described clear up installation kit task items detection complete, generation include detect clear up installation kit quantity With the testing result of the software information that can clear up installation kit;
If upgradeable software task items detection is completed, generation includes the upgradeable software quantity that detects and can Upgrade the testing result of the software information of software;
If software vulnerability scan task item detection is completed, generation include the leaky amount of software that detects and The testing result of the software information of leaky software;
If the system intialization software task item detection is completed, generation includes the system intialization amount of software detected With the testing result of the software information of system intialization software.
Optionally, the foregoing method detected in mobile terminal to application state, in addition to:
Obtain testing result corresponding to all task items in the Detection task list;
According to testing result corresponding to all task items, comprehensive detection result is determined;
According to the comprehensive detection result, forms are presented to result and handled, be in corresponding different comprehensive detection results Existing different forms.
Optionally, the foregoing method detected in mobile terminal to application state, wherein, it is described according to the synthesis Testing result, forms are presented to result and handled, including:
If the comprehensive detection result to be safe for operation, by forms processing for it is safe for operation when the forms that present;
If the window that the comprehensive detection result potential safety hazard to be present, is presented when being and potential safety hazard be present by forms processing Body;
If the comprehensive detection result be exist can optimization software, by forms processing be exist can be presented during optimization software Forms;
If the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
Optionally, the foregoing method detected in mobile terminal to application state, in addition to:
Obtain testing result corresponding to all task items in the Detection task list;
According to testing result corresponding to all task items, comprehensive detection result is determined;
Judge whether the comprehensive detection result is safe for operation;
If so, then prompt message is completed in generation, so that user completes instruction according to the completion prompt message triggering;
Otherwise, key optimization operation prompt information is generated, is touched so that user optimizes operation prompt information according to a key Send out key optimization operational order.
Optionally, the foregoing method detected in mobile terminal to application state, in addition to:
If receiving the key optimization operational order of user's triggering, according to the comprehensive detection result, one is performed Key optimization operation;
Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine pair is called It is described to need killing software to carry out killing;
If the comprehensive detection result includes the software information of self-starting software, obtain Root authority, and with The self-starting function of the self-starting software is closed during Root authority;
If the comprehensive detection result includes the software information for the software that can move, obtain Root authority, and with The software of moving is transferred under default target directory during Root authority;
If the comprehensive detection result includes the software information that can clear up installation kit, to being included in the testing result Installation package informatin corresponding to installation kit cleared up;
If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information, One in the software information of leaky software and the software information of system intialization software or any multinomial combination, then generate hand Dynamic processing prompt message;
If the manual optimization operational order that user triggers according to the prompt message of triggering manually is received, according to The software information and operation instruction carried manually in optimization operational order, is carried out using the operation instruction to the software information Processing.
Optionally, the foregoing method detected in mobile terminal to application state, in addition to:
If receiving the completion instruction of user's triggering, generation optimization completes that information is presented;
If receiving the key optimization operational order of user's triggering, monitor key optimization operation progress and optimizing After the completion of, generation optimization completes that information is presented.
Optionally, the foregoing method detected in mobile terminal to application state, in addition to:
During being detected to the mounted software, detection progress is monitored, and generate current detection progress pair Information is presented in the progress answered.
Optionally, the foregoing method detected in mobile terminal to application state, in addition to:
The quantity for having installed software is obtained, and information is presented in generation quantity.
According to the second aspect of the invention, there is provided a kind of device detected in mobile terminal to application state, Including:
Detection module, after the detection instruction for receiving user's triggering, according to default Detection task list, to having pacified The software of dress is detected, and includes two or more task items in the Detection task list;
First generation module, for after the completion of the detection of at least one task items, generating and being detected corresponding to this task items As a result;
Second generation module, for according to the testing result, safe handling prompt message being generated, so that user is according to institute State safe handling prompt message and carry out corresponding software operation.
Optionally, the foregoing device detected in mobile terminal to application state, wherein, the default detection is appointed Business list includes:Checking and killing virus task items, malice ad ware task items, self-starting software task item, can move software task Item, installation kit task items, upgradeable software task items, software vulnerability scan task item and system intialization software task item can be cleared up In the combination of any two or multinomial;Accordingly, the detection module, is specifically used for:
According to default Detection task list, checking and killing virus engine corresponding to the checking and killing virus task items is called to detect institute State to have installed to whether there is in software and have virus;And/or
According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to examine Install to whether there is in software described in surveying and had malice ad ware;And/or
According to default Detection task list, the second inspection policies corresponding to the self-starting software task item are called to detect It is described to have installed in software with the presence or absence of there is self-starting software;And/or
According to default Detection task list, the 3rd inspection policies corresponding to software task item that can be moved described in calling detect It is described to have installed in software with the presence or absence of there is the software that move;And/or
According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and are examined Install to whether there is to have in software described in surveying and can clear up installation kit;And/or
According to default Detection task list, the 5th inspection policies corresponding to the upgradeable software task items are called to detect It is described to have installed in software with the presence or absence of there is scalable software;And/or
According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to examine Installed described in surveying and whether there is leaky software in software;And/or
According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to examine Installed described in surveying in software with the presence or absence of the software for having system intialization.
Optionally, the foregoing device detected in mobile terminal to application state, wherein, the first generation mould Block, it is specifically used for:
When the checking and killing virus task items, which detect, to be completed, generation, which includes, to be needed killing amount of software and needs killing software The testing result of software information;
When the malice ad ware task items, which detect, to be completed, generation includes the malice ad ware quantity detected With the testing result of the software information of malice ad ware;
When the self-starting software task item, which detects, to be completed, generation include the self-starting amount of software that detects and from Start the testing result of the software information of software;
When the software task item detection of moving is completed, generation includes the amount of software and can of moving detected The testing result of the software information of removal of home software;
When it is described clear up installation kit task items detection complete when, generation include detect clear up installation kit quantity With the testing result of the software information that can clear up installation kit;
When the upgradeable software task items, which detect, to be completed, generation includes the upgradeable software quantity that detects and can Upgrade the testing result of the software information of software;
When the software vulnerability scan task item, which detects, to be completed, generation include the leaky amount of software that detects and The testing result of the software information of leaky software;
When the system intialization software task item, which detects, to be completed, generation includes the system intialization amount of software detected With the testing result of the software information of system intialization software.
Optionally, the foregoing device detected in mobile terminal to application state, in addition to:
First acquisition module, for obtaining testing result corresponding to all task items in the Detection task list;
Determining module, for the testing result according to corresponding to all task items, determine comprehensive detection result;
Forms processing module, for according to the comprehensive detection result, forms being presented to result and handle, to correspond to not Different forms are presented with comprehensive detection result.
Optionally, the foregoing device detected in mobile terminal to application state, the forms processing module, specifically For:
When the comprehensive detection result for it is safe for operation when, by forms processing for it is safe for operation when the forms that present;
Window when the comprehensive detection result when potential safety hazard be present, to be presented when being and potential safety hazard be present by forms processing Body;
When the comprehensive detection result be exist can optimization software when, by forms processing be exist can be presented during optimization software Forms;
When the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
Optionally, the foregoing device detected in mobile terminal to application state, in addition to:
First acquisition module, for obtaining testing result corresponding to all task items in the Detection task list;
Determining module, for the testing result according to corresponding to all task items, determine comprehensive detection result;
Judge module, for judging whether the comprehensive detection result is safe for operation;
3rd generation module, for when the comprehensive detection result is safe for operation, generating and completing prompt message, so that User completes instruction according to the completion prompt message triggering, when the comprehensive detection result is not safe for operation, generation one Key optimizes operation prompt information, so that user optimizes operation prompt information according to a key triggers key optimization operational order.
Optionally, the foregoing device detected in mobile terminal to application state, in addition to:
Execution module, for when the key for receiving user's triggering optimizes operational order, being examined according to the synthesis Result is surveyed, performs key optimization operation;
Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine pair is called It is described to need killing software to carry out killing;
If the comprehensive detection result includes the software information of self-starting software, obtain Root authority, and with The self-starting function of the self-starting software is closed during Root authority;
If the comprehensive detection result includes the software information for the software that can move, obtain Root authority, and with The software of moving is transferred under default target directory during Root authority;
If the comprehensive detection result includes the software information that can clear up installation kit, to being included in the testing result Installation package informatin corresponding to installation kit cleared up;
If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information, One in the software information of leaky software and the software information of system intialization software or any multinomial combination, then generate hand Dynamic processing prompt message;
If the manual optimization operational order that user triggers according to the prompt message of triggering manually is received, according to The software information and operation instruction carried manually in optimization operational order, is carried out using the operation instruction to the software information Processing.
Optionally, the foregoing device detected in mobile terminal to application state, in addition to:
4th generation module, for when receiving the completion instruction of user's triggering, generation optimization to complete that letter is presented Breath;When the key for receiving user's triggering optimizes operational order, one key of monitoring optimization operation progress is simultaneously completed in optimization Afterwards, generation optimization completes that information is presented.
Optionally, the foregoing device detected in mobile terminal to application state, in addition to:
Monitoring modular, during being detected to the mounted software, detection progress is monitored, and generate and work as Information is presented in progress corresponding to preceding detection progress.
Optionally, the foregoing device detected in mobile terminal to application state, in addition to:
Second acquisition module, the quantity of software is installed for obtaining, and information is presented in generation quantity.
By above-mentioned technical proposal, technical scheme provided in an embodiment of the present invention at least has following advantages:
Technical scheme provided by the invention is after the detection instruction of user's triggering is received, i.e., according to default Detection task List, mounted software is detected, such user only needs once to trigger, you can realize the multinomial detection to software, letter Change the complicated processes for needing to be operated respectively in the prior art using all kinds of management softwares, improve Consumer's Experience;In addition, this The technical scheme that invention provides is based on testing result corresponding to each task items, generates corresponding safe handling prompt message respectively, To prompt user to make corresponding software operation, help user effectively to manage mounted software in equipment, realize one Secondary triggering carries out repeated detection processing to having installed software, simplifies the operation of user, convenient for users.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, below with presently preferred embodiments of the present invention and coordinate accompanying drawing describe in detail as after.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows the one kind for the method detected in mobile terminal to application state that the embodiment of the present invention one provides The schematic flow sheet of realization;
Fig. 2 shows in the method detected in mobile terminal to application state that the embodiment of the present invention one provides and cleared up The schematic diagram of example is presented in prompt message;
Fig. 3 shows the another of the method detected in mobile terminal to application state that the embodiment of the present invention one provides The schematic flow sheet that kind is realized;
Fig. 4 shows process in the method detected in mobile terminal to application state that the embodiment of the present invention one provides The schematic diagram of the presentation example of information is presented;
Fig. 5 shows quantity in the method detected in mobile terminal to application state that the embodiment of the present invention one provides The schematic diagram of the presentation example of information is presented;
Fig. 6 is shown in the method detected in mobile terminal to application state that the embodiment of the present invention one provides manually Optimize the schematic diagram of interface example;
Fig. 7, which is shown in the method detected in mobile terminal to application state that the embodiment of the present invention one provides, to be terminated The schematic diagram of interface example;
Fig. 8 shows in the method detected in mobile terminal to application state that the embodiment of the present invention one provides and is based on High in the clouds carries out the example schematic of software killing;
Fig. 9 shows the one kind for the device detected in mobile terminal to application state that the embodiment of the present invention two provides The structural representation of realization;
Figure 10 shows the another of the device detected in mobile terminal to application state that the embodiment of the present invention two provides A kind of structural representation realized.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
As shown in figure 1, the stream for the method detected in mobile terminal to application state that the embodiment of the present invention one provides Journey schematic diagram.Method described in the present embodiment one, including:
Step 101, receive user triggering detection instruction after, according to default Detection task list, to mounted Software is detected.
Wherein, two or more task items are included in the Detection task list.It is specifically, described default Detection task list can include:Checking and killing virus task items, malice ad ware task items, self-starting software task item, it can remove Family's software task item, installation kit task items, upgradeable software task items, software vulnerability scan task item and system intialization can be cleared up The combination of any two or multinomial in software task item.
Need exist for explanation be:This step can be according to the suitable of all task items included in the Detection task list Sequence, sequentially mounted software is detected.This step can also be specified according to user in the Detection task list Task items, sequentially mounted software is detected.Wherein, the information for the task items that the user specifies can carry In the detection instruction of user's triggering, or in the configuration information that user pre-sets.For example, user is clicking to enter software After the operation interface of detection, times that need to be detected to having installed software is determined into setting interface to choose task items Business item.
Thus, this step may particularly include following steps:
According to default Detection task list, checking and killing virus engine corresponding to the checking and killing virus task items is called to detect institute State to have installed to whether there is in software and have virus;And/or
According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to examine Install to whether there is in software described in surveying and had malice ad ware;And/or
According to default Detection task list, the second inspection policies corresponding to the self-starting software task item are called to detect It is described to have installed in software with the presence or absence of there is self-starting software;And/or
According to default Detection task list, the 3rd inspection policies corresponding to software task item that can be moved described in calling detect It is described to have installed in software with the presence or absence of there is the software that move;And/or
According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and are examined Install to whether there is to have in software described in surveying and can clear up installation kit;And/or
According to default Detection task list, the 5th inspection policies corresponding to the upgradeable software task items are called to detect It is described to have installed in software with the presence or absence of there is scalable software;And/or
According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to examine Installed described in surveying and whether there is leaky software in software;And/or
According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to examine Installed described in surveying in software with the presence or absence of the software for having system intialization.
Need exist for supplement be:In above-mentioned steps, the first described inspection policies can be by based on malice advertisement text What multiple logic judgments that the characteristics of part (the characteristics of specific can be found in content hereinafter) forms were formed, currently, described first Inspection policies, which also can be directly multiplexed, to be used to detect the strategy that the inspection software of malice ad ware is applied in the prior art.Equally , in above-mentioned steps, the second described inspection policies can be directly multiplexed first is answered with technology for detecting self-starting software Strategy.3rd inspection policies can directly be multiplexed the plan of the prior art applied for detecting the software that can be moved Slightly.4th inspection policies, which can be directly multiplexed, of the prior art to be used to detect and can clear up the strategy that installation kit is applied.Institute State the 5th inspection policies can directly be multiplexed it is of the prior art be used for detect the strategy that upgradeable software is applied.6th inspection Survey strategy can directly be multiplexed of the prior art for detecting the strategy that leaky software is applied.7th inspection policies can Directly it is multiplexed the strategy of the prior art for being used for detection and having system intialization software to be applied.
After the completion of step 102, the detection of at least one task items, testing result corresponding to this task items is generated.
Wherein, when the default Detection task list includes:Checking and killing virus task items, malice ad ware task items, Self-starting software task item, the software task item that can move, installation kit task items, upgradeable software task items, software leakage can be cleared up During the combination of any two or multinomial in hole scan task item and system intialization software task item, this step 102 can be wrapped specifically It is rapid to include following steps:
If the checking and killing virus task items detection is completed, generation, which includes, to be needed killing amount of software and needs killing software The testing result of software information;
If the malice ad ware task items detection is completed, generation includes the malice ad ware quantity detected With the testing result of the software information of malice ad ware;
If self-starting software task item detection is completed, generation include the self-starting amount of software that detects and from Start the testing result of the software information of software;
If the software task item detection of moving is completed, generation includes the amount of software and can of moving detected The testing result of the software information of removal of home software;
If it is described clear up installation kit task items detection complete, generation include detect clear up installation kit quantity With the testing result of the software information that can clear up installation kit;
If upgradeable software task items detection is completed, generation includes the upgradeable software quantity that detects and can Upgrade the testing result of the software information of software;
If software vulnerability scan task item detection is completed, generation include the leaky amount of software that detects and The testing result of the software information of leaky software;
If the system intialization software task item detection is completed, generation includes the system intialization amount of software detected With the testing result of the software information of system intialization software.
Need exist for supplement be:The malice ad ware in the above refers to the software with following behavior: 1st, without permission modifications main browser page, and can not change.2nd, the shortcut of desktop icons and start menu is distorted, during double-click Advertisement webpage can be changed.3rd, BHO (Browser Helper Object, browser auxiliary object) is added to force to access user Webpage redirect to the network address oneself specified.4th, in desktop, menu, collection addition great master's advertisement link, and it is not easy to delete. 5th, startup item is added, is started with system, forces to play advertisement or the access of abduction browser etc..Above-mentioned 1~5 point can be used as sentencing Whether disconnected is malice promotional literature benchmark, and the first inspection policies can be determined based on above-mentioned 5 points.Opening certainly described in the above Dynamic software refers to the software or program of start automatic running.Software of moving described in the above refers to that system disk is (special Refer to C disks) after space takes, system operation can be caused slack-off, some operations can not be normally carried out, and need to be moved to other disks, and After moving, software still can with normal use impregnable software.Installation kit of clearing up described in the above refers to It has been installed and used that, the otiose installation kit that can be deleted.
Step 103, according to the testing result, safe handling prompt message is generated, so that user is according to the safe place Manage prompt message and carry out corresponding software operation.
Specifically, based on above-mentioned content, it is rapid that this step 103 may particularly include following steps:
If the testing result is to include the testing result for the software information for needing killing amount of software and needing killing software, Then generation carries the killing prompt message of the testing result;
If the testing result is to include the software letter of the malice ad ware quantity detected and malice ad ware The testing result of breath, then what generation carried the testing result forbids prompt message;
If the testing result is to include the software information of the self-starting amount of software detected and self-starting software Testing result, then generation carry the closing self-starting prompt message of the testing result;
If the testing result is to include the software information of move amount of software and the software that can move that detect Testing result, then generation carry the removal of home prompt message of the testing result;
If the testing result is to include the software cleared up installation kit quantity and can the clear up installation kit letter detected The testing result of breath, then generation carry the cleaning prompt message of the testing result;
If the testing result is to include the software information of the upgradeable software quantity detected and upgradeable software Testing result, then generation carry the upgrade tip information of the testing result;
If the testing result is to include the software information of the leaky amount of software detected and leaky software Testing result, then generation carry the leak of the testing result and check prompt message;
If the testing result is to include the software letter of the system intialization amount of software detected and system intialization software The testing result of breath, then generation carry the software unloading prompt message of the testing result.
For example, the cleaning prompt message for carrying the testing result generated in the above in actual applications can table The display information presented by region in Fig. 21 is levied, i.e. the display information shows the quantity that can clear up installation kit (in such as Fig. 2 Installation kit cleaning right side display 6) and can clear up the software information of installation kit.Wherein, the installation kit of clearing up can be following The presentation mode of windowing is stretched to present.Drop-down expansion window is the window that user just deploys after the region 1 is triggered. Likewise, above-mentioned killing prompt message, prompt message of forbidding, closing self-starting prompt message, removal of home prompt message, upgrade tip Information, leak check prompt message and software unloading prompt message can use with characterized in above-mentioned Fig. 2 it is described cleaning prompting letter The same mode is ceased to present.
The technical scheme that the present embodiment provides is appointed after the detection instruction of user's triggering is received according to default detection Business list, is detected, such user only needs once to trigger to mounted software, you can the multinomial detection to software is realized, The complicated processes for needing to be operated respectively in the prior art using all kinds of management softwares are simplified, improve Consumer's Experience;In addition, The technical scheme that the present embodiment provides is based on testing result corresponding to each task items, generates corresponding safe handling prompting letter respectively Breath, operated with prompting user to make corresponding software, help user effectively to manage mounted software in equipment, realize Once trigger and carry out repeated detection processing to having installed software, simplify the operation of user, it is convenient for users.
Need exist for supplement be:The method detected in mobile terminal to application state that the present embodiment provides Software installation detection process can also be included, to avoid installing terminal equipment from carrying the purpose of virulent application program.For example, The present embodiment can be set in application layer monitors interface function using installation, and a service (such as safety clothes are provided in ccf layer Business), and the preceding bag detection interface function of installation is set for the security service;As such, it is desirable to the application program identification information of installation can Interface letter is monitored to be transferred to the application installation of application layer by wrapping detection interface function before the installation of the security service of ccf layer Number.In application layer, the virus that can be supplied to application program identification information using installation monitoring interface function in terminal device Scanning application program, (the virus scan application program is referred to as security management application program, and journey is applied in such as existing antivirus Sequence etc.), and trigger virus scan application program and virus scan is carried out to application program corresponding to the application program identification information.
Due to application program when mounted, operating system (such as android system) can start bag management service, and assure reason Can be called using mounting interface function in service, therefore, the present embodiment can be by existing application mounting interface letters Specific implementation flow in number is transformed, and first the application program is entered before the installation operation of application program is performed with realizing Row virus scan, to avoid installing terminal equipment from carrying the purpose of virulent application program.
Further, the methods described that above-described embodiment provides, as shown in figure 3, can also comprise the following steps:
Step 201, obtain testing result corresponding to all task items in the Detection task list.
Step 202, the testing result according to corresponding to all task items, determine comprehensive detection result.
Step 203, according to the comprehensive detection result, forms are presented to result and handled, it is described after being handled with presentation As a result forms are presented.
Specifically, this step 203 may include following steps:
If the comprehensive detection result to be safe for operation, by forms processing for it is safe for operation when the forms that present;
If the window that the comprehensive detection result potential safety hazard to be present, is presented when being and potential safety hazard be present by forms processing Body;
If the comprehensive detection result be exist can optimization software, by forms processing be exist can be presented during optimization software Forms;
If the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
By above-mentioned steps 201~203, the present embodiment is realized based on different comprehensive detection results, is in using different Existing forms, so that the open-and-shut quality for knowing software detection result of user.Wherein, different comprehensive detection result, it is in Existing different forms can be the forms of different colours, it is of course also possible to be the forms for showing Different Results quality mark, The present embodiment is to this and is not especially limited.For example, the forms that are presented when safe for operation and existing and can be presented during optimization software Forms can be blue forms;The forms presented during potential safety hazard be present can be yellow forms;The window presented during virus infection Body can be red forms.
Further, in the methods described that above-described embodiment provides, can also comprise the following steps:
During being detected to the mounted software, detection progress is monitored, and generate current detection progress pair Information is presented in the progress answered.
Specifically, information, which is presented, in the process may be characterized as the form that region 2 is presented in Fig. 4, user can pass through observation Information is presented in the process, knows detection progress.
Further, in the methods described that above-described embodiment provides, can also comprise the following steps:
The quantity for having installed software is obtained, and information is presented in generation quantity.
It can be the quantity that mounted software on current device is presented in user by above-mentioned steps, be set with helping user to understand Standby software installation situation.Wherein, the quantity is presented information and may be characterized as the form that region 3 shown in Fig. 5 is presented.
Need exist for supplement be:Window shown in Fig. 5 can as described in the present embodiment in mobile terminal to software shape The Entry Interface for the method corresponding intrument that state is detected.User can be by triggering " software issue analysis " in the Entry Interface Button, into the software analysis interface shown in Fig. 4, the software analysis interface is during detection in real time according to the progress Information is presented detection progress is presented, and after a task items have been detected, corresponding testing result is presented.All task items detections After the completion of, interface is presented in the testing result that software analysis interface can enter shown in Fig. 2, and difference is presented according to comprehensive detection result Forms (such as red forms, yellow forms or blue forms).In detection process, user is can not be by software analysis circle What face was operated, only after the completion of all task items detect, user could be carried out corresponding by software analysis interface Operate, killing, cleaning installation kit are such as carried out to existing virus, upgrades software, repairs leak, software removal of home, forbids malice wide Accuse software etc..After the completion of all operations of user are equal, the software analysis interface is rendered as the end interface shown in Fig. 7, uses It is the overall process for completing software detection that described " completion " button terminated in interface is clicked at family.The content of foregoing description is this reality Interface change procedure of the method detected in mobile terminal to application state of example offer in detection process is provided.
Further, the methods described that above-described embodiment provides, can also include:
If receiving the operational order that user triggers according to the killing prompt message, the checking and killing virus engine is called Killing is carried out to software corresponding to the software information that is included in the testing result;
If receiving user according to the operational order for forbidding prompt message to trigger, will be included in the testing result Software information corresponding to software delete;
If receiving the operational order that user triggers according to the closing self-starting prompt message, Root authority is obtained, And the self-starting function of software corresponding to the software information that will be included when with Root authority in the testing result is closed;
If receiving the operational order that user triggers according to the removal of home prompt message, Root authority is obtained, and having There is the target directory carried during Root authority according to the operational order, the software information included in the testing result is corresponding Software be transferred under the target directory;
If the operational order that user triggers according to the cleaning prompt message is received, to being included in the testing result Installation package informatin corresponding to installation kit cleared up;
If receiving the operational order that user triggers according to the upgrade tip information, obtain and wrapped in the testing result Software upgrade package corresponding to the software information contained, and updating operation is carried out to software according to the software upgrade package;
If receiving the operational order that user triggers according to the upgrade tip information, obtain and wrapped in the testing result Software upgrade package corresponding to the software information contained, and updating operation is carried out to software according to the software upgrade package;
If receiving the operational order that user checks prompt message triggering according to the leak, the testing result is obtained In the software information that includes correspond to the vulnerability information of software, and the vulnerability information is presented in order to which user checks;
If the operational order that user unloads prompt message triggering according to the software is received, by the testing result Comprising software information correspond to software unloading.
In actual applications, above-mentioned steps can realize that is, user passes through in mobile terminal by the way of user chooses Item of choosing on the software analysis interface of the method corresponding intrument detected to application state selects, with to testing result In problematic software carry out the processing of selectivity, do not handled all, more selectivity can be so brought to user, To meet the needs of different user.
Need exist for explanation be:Software on general operation smart mobile phone is required for obtaining Root authority, for example starts shooting Self-starting software, software removal of home etc..Therefore, the operation in above-mentioned steps to self-starting software and the software that can move needs to obtain Root authority, i.e., it need to first obtain Root authority and the self-starting function of self-starting software could be closed after Root authority is got Close or the software that can move is moved to target directory.For as computers such as desktop computer or notebooks, self-starting is soft Part, which is typically required, obtains what Root authority could operate to it, and the software that can move may not be just to be required for obtaining Root power Limit could operate to it.And it is the software for needing to obtain Root authority that the software that can move why is limited in above-described embodiment It is that the operation of the software for getting Root authority is needed in system disk is that can influence the toggle speed of computer because being generally in, The performances such as EMS memory occupation, so needing the software for obtaining Root authority to use software removal of home function more meaningful for those.When So, for those need not obtain the software of Root authority, after user inputs removal of home instruction, you can will be shifted by removal of home software Moved to described under the target directory specified, and by under former catalogue can moving software deletion, i.e., similar to usually said " shearing " operation.
Wherein, it can after receiving the operational order that user triggers, perform automatically to obtain Root authority;Can also be User passes through on the Entry Interface of method corresponding intrument detected in mobile terminal to application state or software analysis interface " acquisition Root authority " Touch control key obtain manually.It is either automatic in above-described embodiment to obtain what is still got manually Root authority is temporary Root authority.
Certainly, except can use selectivity software is handled in addition to, can also by the way of a key optimization processing, According to the testing result of all task items, corresponding optimization processing is all carried out to produced problem in all testing results, i.e., originally The methods described that embodiment provides, may also include the steps of:
Step 301, obtain testing result corresponding to all task items in the Detection task list.
Step 302, the testing result according to corresponding to all task items, determine comprehensive detection result.
Step 303, judge whether the comprehensive detection result is safe for operation, if so, then prompt message is completed in generation, with User is set to complete instruction according to the completion prompt message triggering;Otherwise, key optimization operation prompt information is generated, so that user Operation prompt information is optimized according to a key and triggers key optimization operational order.
For example, above-mentioned key optimization operation prompt information may be characterized as the key optimization touch-control of the lower section of region 1 in Fig. 2 Key, user trigger a key by " key optimization " on touch-control software analysis interface and optimize operational order.
Further, after above-mentioned steps 303, also comprise the following steps:
If receiving the key optimization operational order of user's triggering, according to the comprehensive detection result, one is performed Key optimization operation.
Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine pair is called It is described to need killing software to carry out killing;
If the comprehensive detection result includes the software information of self-starting software, obtain Root authority, and with The self-starting function of the self-starting software is closed during Root authority;
If the comprehensive detection result includes the software information for the software that can move, obtain Root authority, and with The software of moving is transferred under default target directory during Root authority;
If the comprehensive detection result includes the software information that can clear up installation kit, to being included in the testing result Installation package informatin corresponding to installation kit cleared up;
If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information, One in the software information of leaky software and the software information of system intialization software or any multinomial combination, then generate hand Dynamic processing prompt message;
If the manual optimization operational order that user triggers according to the prompt message of triggering manually is received, according to The software information and operation instruction carried manually in optimization operational order, is carried out using the operation instruction to the software information Processing.
Need exist for explanation be:The problematic software for having some task items to detect in the Detection task list is Function can not be optimized by a key and realize processing automatically, it is malice ad ware as escribed above, upgradeable software, leaky soft Part and system intialization software.These softwares need to carry out manual handle, so after the completion of the item of one key optimization processing of energy, As shown in fig. 6, software analysis interface enters optimization interface manually, now need user to trigger respective items manually, come manually operated complete The optimization processing of paired software.For example, " software removal of home " " cleaning of system intialization software " " software upgrading " listed in Fig. 6 is manual Optimize button.User distinguishes touch-control and corresponds to button, i.e., into manual optimization process.User only need to according in mobile terminal to software The optimization guide that device corresponding to the method that state is detected provides is operated manually.
Further, the above embodiments also comprise the following steps:
If receiving the completion instruction of user's triggering, generation optimization completes that information is presented;
If receiving the key optimization operational order of user's triggering, monitor key optimization operation progress and optimizing After the completion of, generation optimization completes that information is presented.
Wherein, generated in above-mentioned steps optimization complete present information can embodiments be Fig. 7 shown in display information.
In mobile terminal corresponding to the method detected in mobile terminal to application state described in above-described embodiment The device detected to application state can be specifically one be similar to security guard security classes application program, the security classes Application program can be arranged in the terminals such as mobile phone, iPad.In actual applications, the structure such as shown in Fig. 8, can in terminal 100 Virus identification engine 101 and virus base 102 are installed, checking and killing virus is carried out to having installed software to realize.Have one on high in the clouds 200 The identification storehouse of individual user's killing.Terminal 100 can be by interacting, to realize the method for the killing based on high in the clouds 200 with high in the clouds. , can be by the white list either mechanism such as gray list or blacklist specifically, the antivirus engine that high in the clouds and mobile phone terminal are local, can With the bag name according to Android installation kits, and/or, version number, and/or, digital signature, and/or, Android components Receiver feature, and/or, Android components service feature, and/or, Android components activity spy Sign, and/or, instruction or character string in executable file, and/or, the MD5 values of each file under Android installation kit catalogues;Sentence The security of disconnected file.
It should be noted that:For foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because According to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know Know, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention It is necessary.
As shown in figure 9, the knot for the device detected in mobile terminal to application state that the embodiment of the present invention two provides Structure schematic diagram.The device detected in mobile terminal to application state that the present embodiment provides can realize above-mentioned implementation The method detected in mobile terminal to application state that example one provides.Specifically, described in the present embodiment in mobile terminal The device application detected to application state is on the subscriber terminal.The dress detected in mobile terminal to application state Put including:Detection module 10, the first generation module 20 and the second generation module 30.Wherein, the detection module 10 is used to receive To after the detection instruction of user's triggering, according to default Detection task list, mounted software is detected, the detection Include two or more task items in task list.First generation module 20 is used at least one task items After the completion of detection, testing result corresponding to this task items is generated.Second generation module 30 is used to be tied according to the detection Fruit, safe handling prompt message is generated, so that user carries out corresponding software operation according to the safe handling prompt message.
The technical scheme that the present embodiment provides is appointed after the detection instruction of user's triggering is received according to default detection Business list, is detected, such user only needs once to trigger to mounted software, you can the multinomial detection to software is realized, The complicated processes for needing to be operated respectively in the prior art using all kinds of management softwares are simplified, improve Consumer's Experience;In addition, The technical scheme that the present embodiment provides is based on testing result corresponding to each task items, generates corresponding safe handling prompting letter respectively Breath, operated with prompting user to make corresponding software, help user effectively to manage mounted software in equipment, realize Once trigger and carry out repeated detection processing to having installed software, simplify the operation of user, it is convenient for users.
Further, default Detection task list includes described in above-described embodiment:Checking and killing virus task items, malice are wide Accuse software task item, self-starting software task item, the software task item that can move, installation kit task items, upgradeable software can be cleared up The combination of any two or multinomial in task items, software vulnerability scan task item and system intialization software task item;Accordingly, Detection module 10 described in above-described embodiment is specifically used for:
According to default Detection task list, checking and killing virus engine corresponding to the checking and killing virus task items is called to detect institute State to have installed to whether there is in software and have virus;And/or
According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to examine Install to whether there is in software described in surveying and had malice ad ware;And/or
According to default Detection task list, the second inspection policies corresponding to the self-starting software task item are called to detect It is described to have installed in software with the presence or absence of there is self-starting software;And/or
According to default Detection task list, the 3rd inspection policies corresponding to software task item that can be moved described in calling detect It is described to have installed in software with the presence or absence of there is the software that move;And/or
According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and are examined Install to whether there is to have in software described in surveying and can clear up installation kit;And/or
According to default Detection task list, the 5th inspection policies corresponding to the upgradeable software task items are called to detect It is described to have installed in software with the presence or absence of there is scalable software;And/or
According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to examine Installed described in surveying and whether there is leaky software in software;And/or
According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to examine Installed described in surveying in software with the presence or absence of the software for having system intialization.
Further, the first generation module 20 described in above-described embodiment, is specifically used for:
When the checking and killing virus task items, which detect, to be completed, generation, which includes, to be needed killing amount of software and needs killing software The testing result of software information;
When the malice ad ware task items, which detect, to be completed, generation includes the malice ad ware quantity detected With the testing result of the software information of malice ad ware;
When the self-starting software task item, which detects, to be completed, generation include the self-starting amount of software that detects and from Start the testing result of the software information of software;
When the software task item detection of moving is completed, generation includes the amount of software and can of moving detected The testing result of the software information of removal of home software;
When it is described clear up installation kit task items detection complete when, generation include detect clear up installation kit quantity With the testing result of the software information that can clear up installation kit;
When the upgradeable software task items, which detect, to be completed, generation includes the upgradeable software quantity that detects and can Upgrade the testing result of the software information of software;
When the software vulnerability scan task item, which detects, to be completed, generation include the leaky amount of software that detects and The testing result of the software information of leaky software;
When the system intialization software task item, which detects, to be completed, generation includes the system intialization amount of software detected With the testing result of the software information of system intialization software.
Further, the second generation module 30 described in above-described embodiment, is specifically used for:
When the testing result is to include the testing result for the software information for needing killing amount of software and needing killing software When, generation carries the killing prompt message of the testing result;
When the testing result is to include the software letter of the malice ad ware quantity detected and malice ad ware During the testing result of breath, what generation carried the testing result forbids prompt message;
When the testing result is to include the software information of the self-starting amount of software detected and self-starting software During testing result, generation carries the closing self-starting prompt message of the testing result;
When the testing result is to include the software information of move amount of software and the software that can move that detect During testing result, generation carries the removal of home prompt message of the testing result;
When the testing result be include detect clear up installation kit quantity and can clear up installation kit software letter During the testing result of breath, generation carries the cleaning prompt message of the testing result;
When the testing result is to include the software information of the upgradeable software quantity detected and upgradeable software During testing result, generation carries the upgrade tip information of the testing result;
When the testing result is to include the software information of the leaky amount of software detected and leaky software During testing result, the leak that generation carries the testing result checks prompt message;
When the testing result is to include the software letter of the system intialization amount of software detected and system intialization software During the testing result of breath, generation carries the software unloading prompt message of the testing result.
Further, as shown in Figure 10, the dress detected in mobile terminal to application state described in above-described embodiment Putting also includes:First acquisition module 40, determining module 50 and forms processing module 60.Wherein, first acquisition module 40 is used The testing result corresponding to all task items in the acquisition Detection task list.The determining module 50 is used for according to the institute There is testing result corresponding to task items, determine comprehensive detection result.The forms processing module 60 is used for according to the comprehensive inspection Result is surveyed, forms, which are presented, to result is handled, and different forms are presented with corresponding different comprehensive detection results.
Further, the forms processing module 60 is specifically used for:
When the comprehensive detection result for it is safe for operation when, by forms processing for it is safe for operation when the forms that present;
Window when the comprehensive detection result when potential safety hazard be present, to be presented when being and potential safety hazard be present by forms processing Body;
When the comprehensive detection result be exist can optimization software when, by forms processing be exist can be presented during optimization software Forms;
When the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
Further, as shown in Figure 10, the dress detected in mobile terminal to application state described in above-described embodiment Putting to include:Monitoring modular 70.Wherein, the monitoring modular 70 is used for the mistake detected to the mounted software Cheng Zhong, detection progress is monitored, and generate progress corresponding to current detection progress and information is presented.
Further, as shown in Figure 10, the dress detected in mobile terminal to application state described in above-described embodiment Putting to include:Second acquisition module 80.Wherein, second acquisition module 80 is used to obtain the quantity for having installed software, And information is presented in generation quantity.
Further, the device detected in mobile terminal to application state shown in above-mentioned Fig. 9 can also include:The One acquisition module, determining module, judge module and the 3rd generation module.Wherein, first acquisition module is described for obtaining Testing result corresponding to all task items in Detection task list.The determining module is used for corresponding according to all task items Testing result, determine comprehensive detection result.The judge module is used to judge whether the comprehensive detection result is operation peace Entirely.3rd generation module is used for when the comprehensive detection result is safe for operation, and prompt message is completed in generation, to use Instruction is completed in family according to the completion prompt message triggering, when the comprehensive detection result is not safe for operation, generates a key Optimize operation prompt information, so that user optimizes operation prompt information according to a key triggers key optimization operational order.
Further, the device detected in mobile terminal to application state described in above-described embodiment also includes: Execution module.The execution module is used for when the key for receiving user's triggering optimizes operational order, according to described comprehensive Testing result is closed, performs key optimization operation;
Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine pair is called It is described to need killing software to carry out killing;
If the comprehensive detection result includes the software information of self-starting software, obtain Root authority, and with The self-starting function of the self-starting software is closed during Root authority;
If the comprehensive detection result includes the software information for the software that can move, obtain Root authority, and with The software of moving is transferred under default target directory during Root authority;
If the comprehensive detection result includes the software information that can clear up installation kit, to being included in the testing result Installation package informatin corresponding to installation kit cleared up;
If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information, One in the software information of leaky software and the software information of system intialization software or any multinomial combination, then generate hand Dynamic processing prompt message;
If the manual optimization operational order that user triggers according to the prompt message of triggering manually is received, according to The software information and operation instruction carried manually in optimization operational order, is carried out using the operation instruction to the software information Processing.
Further, the device detected in mobile terminal to application state described in above-described embodiment also includes: 4th generation module.4th generation module is used for when receiving the completion instruction of user's triggering, and generation has optimized Into presentation information;When receive user triggering a key optimize operational order when, monitoring one key optimization operation progress and After the completion of optimization, generation optimization completes that information is presented.
The device detected in mobile terminal to application state described in the present embodiment two can realize above-described embodiment One method detected in mobile terminal to application state provided, specific implementation principle can be found in above-mentioned implementation one Related content, here is omitted.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
It is understood that the correlated characteristic in the above method and interchanger can be referred to mutually.In addition, above-described embodiment In " first ", " second " etc. be to be used to distinguish each embodiment, and do not represent the quality of each embodiment.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with teaching based on this.As described above, required by constructing this kind of system Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that it can utilize various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield features more more than the feature being expressly recited in each claim.It is more precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit requires, summary and accompanying drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed One of meaning mode can use in any combination.
The all parts embodiment of the present invention can be realized with hardware, or to be run on one or more processor Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice Microprocessor or digital signal processor (DSP) according to embodiments of the present invention enter to realize in mobile terminal to application state The some or all functions of some or all parts in the device of row detection.The present invention is also implemented as being used to perform The some or all equipment or program of device of method as described herein are (for example, computer program and computer journey Sequence product).It is such realize the present invention program can store on a computer-readable medium, either can have one or The form of multiple signals.Such signal can be downloaded from internet website and obtained, either provide on carrier signal or There is provided in the form of any other.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.
A1, one aspect of the invention disclose a kind of method detected in mobile terminal to application state, including:
After the detection instruction for receiving user's triggering, according to default Detection task list, mounted software is carried out Detection, includes two or more task items in the Detection task list;
After the completion of at least one task items detection, testing result corresponding to this task items is generated;
According to the testing result, safe handling prompt message is generated, so that user prompts to believe according to the safe handling Breath carries out corresponding software operation.
A2, the method as described in A1, the default Detection task list include:Checking and killing virus task items, malice advertisement Software task item, self-starting software task item, the software task item that can move, can clear up installation kit task items, upgradeable software appoint The combination of any two or multinomial being engaged in item, software vulnerability scan task item and system intialization software task item;Accordingly,
It is described mounted software to be detected according to default Detection task list, including:
According to default Detection task list, checking and killing virus engine corresponding to the checking and killing virus task items is called to detect institute State to have installed to whether there is in software and have virus;And/or
According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to examine Install to whether there is in software described in surveying and had malice ad ware;And/or
According to default Detection task list, the second inspection policies corresponding to the self-starting software task item are called to detect It is described to have installed in software with the presence or absence of there is self-starting software;And/or
According to default Detection task list, the 3rd inspection policies corresponding to software task item that can be moved described in calling detect It is described to have installed in software with the presence or absence of there is the software that move;And/or
According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and are examined Install to whether there is to have in software described in surveying and can clear up installation kit;And/or
According to default Detection task list, the 5th inspection policies corresponding to the upgradeable software task items are called to detect It is described to have installed in software with the presence or absence of there is scalable software;And/or
According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to examine Installed described in surveying and whether there is leaky software in software;And/or
According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to examine Installed described in surveying in software with the presence or absence of the software for having system intialization.
A3, the method as described in A2, after the completion of the task items detection, generate and examined corresponding to this task items Result is surveyed, including:
If the checking and killing virus task items detection is completed, generation, which includes, to be needed killing amount of software and needs killing software The testing result of software information;
If the malice ad ware task items detection is completed, generation includes the malice ad ware quantity detected With the testing result of the software information of malice ad ware;
If self-starting software task item detection is completed, generation include the self-starting amount of software that detects and from Start the testing result of the software information of amount of software and self-starting software;
If the software task item detection of moving is completed, generation includes the amount of software and can of moving detected The testing result of the software information of removal of home software;
If it is described clear up installation kit task items detection complete, generation include detect clear up installation kit quantity With the testing result of the software information that can clear up installation kit;
If upgradeable software task items detection is completed, generation includes the upgradeable software quantity that detects and can Upgrade the testing result of the software information of software;
If software vulnerability scan task item detection is completed, generation include the leaky amount of software that detects and The testing result of the software information of leaky software;
If the system intialization software task item detection is completed, generation includes the system intialization amount of software detected With the testing result of the software information of system intialization software.
A4, the method as any one of A1~A3, in addition to:
Obtain testing result corresponding to all task items in the Detection task list;
According to testing result corresponding to all task items, comprehensive detection result is determined;
According to the comprehensive detection result, forms are presented to result and handled, be in corresponding different comprehensive detection results Existing different forms.
A5, the method as described in A4, it is described according to the comprehensive detection result, forms are presented to result and handled, are wrapped Include:
If the comprehensive detection result to be safe for operation, by forms processing for it is safe for operation when the forms that present;
If the window that the comprehensive detection result potential safety hazard to be present, is presented when being and potential safety hazard be present by forms processing Body;
If the comprehensive detection result be exist can optimization software, by forms processing be exist can be presented during optimization software Forms;
If the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
A6, the method as described in any in A1~A3, in addition to:
Obtain testing result corresponding to all task items in the Detection task list;
According to testing result corresponding to all task items, comprehensive detection result is determined;
Judge whether the comprehensive detection result is safe for operation;
If so, then prompt message is completed in generation, so that user completes instruction according to the completion prompt message triggering;
Otherwise, key optimization operation prompt information is generated, is touched so that user optimizes operation prompt information according to a key Send out key optimization operational order.
A7, the method as described in A6, in addition to:
If receiving the key optimization operational order of user's triggering, according to the comprehensive detection result, one is performed Key optimization operation;
Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine pair is called It is described to need killing software to carry out killing;
If the comprehensive detection result includes the software information of self-starting software, obtain Root authority, and with The self-starting function of the self-starting software is closed during Root authority;
If the comprehensive detection result includes the software information for the software that can move, obtain Root authority, and with The software of moving is transferred under default target directory during Root authority;
If the comprehensive detection result includes the software information that can clear up installation kit, to being included in the testing result Installation package informatin corresponding to installation kit cleared up;
If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information, One in the software information of leaky software and the software information of system intialization software or any multinomial combination, then generate hand Dynamic processing prompt message;
If the manual optimization operational order that user triggers according to the prompt message of triggering manually is received, according to The software information and operation instruction carried manually in optimization operational order, is carried out using the operation instruction to the software information Processing.
A8, the method as described in A6 or A7, in addition to:
If receiving the completion instruction of user's triggering, generation optimization completes that information is presented;
If receiving the key optimization operational order of user's triggering, monitor key optimization operation progress and optimizing After the completion of, generation optimization completes that information is presented.
A9, the method as any one of A1~A3, in addition to:
During being detected to the mounted software, detection progress is monitored, and generate current detection progress pair Information is presented in the progress answered.
A10, the method as any one of A1~A3, in addition to:
The quantity for having installed software is obtained, and information is presented in generation quantity.
B1, another aspect of the invention disclose a kind of device detected in mobile terminal to application state, including:
Detection module, after the detection instruction for receiving user's triggering, according to default Detection task list, to having pacified The software of dress is detected, and includes two or more task items in the Detection task list;
First generation module, for after the completion of the detection of at least one task items, generating and being detected corresponding to this task items As a result;
Second generation module, for according to the testing result, safe handling prompt message being generated, so that user is according to institute State safe handling prompt message and carry out corresponding software operation.
B2, the device as described in B1, the default Detection task list include:Checking and killing virus task items, malice advertisement Software task item, self-starting software task item, the software task item that can move, can clear up installation kit task items, upgradeable software appoint The combination of any two or multinomial being engaged in item, software vulnerability scan task item and system intialization software task item;Accordingly, institute Detection module is stated, is specifically used for:
According to default Detection task list, checking and killing virus engine corresponding to the checking and killing virus task items is called to detect institute State to have installed to whether there is in software and have virus;And/or
According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to examine Install to whether there is in software described in surveying and had malice ad ware;And/or
According to default Detection task list, the second inspection policies corresponding to the self-starting software task item are called to detect It is described to have installed in software with the presence or absence of there is self-starting software;And/or
According to default Detection task list, the 3rd inspection policies corresponding to software task item that can be moved described in calling detect It is described to have installed in software with the presence or absence of there is the software that move;And/or
According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and are examined Install to whether there is to have in software described in surveying and can clear up installation kit;And/or
According to default Detection task list, the 5th inspection policies corresponding to the upgradeable software task items are called to detect It is described to have installed in software with the presence or absence of there is scalable software;And/or
According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to examine Installed described in surveying and whether there is leaky software in software;And/or
According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to examine Installed described in surveying in software with the presence or absence of the software for having system intialization.
B3, the device as described in B2, first generation module, are specifically used for:
When the checking and killing virus task items, which detect, to be completed, generation, which includes, to be needed killing amount of software and needs killing software The testing result of software information;
When the malice ad ware task items, which detect, to be completed, generation includes the malice ad ware quantity detected With the testing result of the software information of malice ad ware;
When the self-starting software task item, which detects, to be completed, generation include the self-starting amount of software that detects and from Start the testing result of the software information of software;
When the software task item detection of moving is completed, generation includes the amount of software and can of moving detected The testing result of the software information of removal of home software;
When it is described clear up installation kit task items detection complete when, generation include detect clear up installation kit quantity With the testing result of the software information that can clear up installation kit;
When the upgradeable software task items, which detect, to be completed, generation includes the upgradeable software quantity that detects and can Upgrade the testing result of the software information of software;
When the software vulnerability scan task item, which detects, to be completed, generation include the leaky amount of software that detects and The testing result of the software information of leaky software;
When the system intialization software task item, which detects, to be completed, generation includes the system intialization amount of software detected With the testing result of the software information of system intialization software.
B4, the device as any one of B1~B3, in addition to:
First acquisition module, for obtaining testing result corresponding to all task items in the Detection task list;
Determining module, for the testing result according to corresponding to all task items, determine comprehensive detection result;
Forms processing module, for according to the comprehensive detection result, forms being presented to result and handle, to correspond to not Different forms are presented with comprehensive detection result.
B5, the device as described in B4, the forms processing module, are specifically used for:
When the comprehensive detection result for it is safe for operation when, by forms processing for it is safe for operation when the forms that present;
Window when the comprehensive detection result when potential safety hazard be present, to be presented when being and potential safety hazard be present by forms processing Body;
When the comprehensive detection result be exist can optimization software when, by forms processing be exist can be presented during optimization software Forms;
When the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
B6, the device as any one of B1~B3, in addition to:
First acquisition module, for obtaining testing result corresponding to all task items in the Detection task list;
Determining module, for the testing result according to corresponding to all task items, determine comprehensive detection result;
Judge module, for judging whether the comprehensive detection result is safe for operation;
3rd generation module, for when the comprehensive detection result is safe for operation, generating and completing prompt message, so that User completes instruction according to the completion prompt message triggering, when the comprehensive detection result is not safe for operation, generation one Key optimizes operation prompt information, so that user optimizes operation prompt information according to a key triggers key optimization operational order.
B7, the method as described in B6, in addition to:
Execution module, for when the key for receiving user's triggering optimizes operational order, being examined according to the synthesis Result is surveyed, performs key optimization operation;
Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine pair is called It is described to need killing software to carry out killing;
If the comprehensive detection result includes the software information of self-starting software, obtain Root authority, and with The self-starting function of the self-starting software is closed during Root authority;
If the comprehensive detection result includes the software information for the software that can move, obtain Root authority, and with The software of moving is transferred under default target directory during Root authority;
If the comprehensive detection result includes the software information that can clear up installation kit, to being included in the testing result Installation package informatin corresponding to installation kit cleared up;
If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information, One in the software information of leaky software and the software information of system intialization software or any multinomial combination, then generate hand Dynamic processing prompt message;
If the manual optimization operational order that user triggers according to the prompt message of triggering manually is received, according to The software information and operation instruction carried manually in optimization operational order, is carried out using the operation instruction to the software information Processing.
B8, the method as described in B6 or B7, in addition to:
4th generation module, for when receiving the completion instruction of user's triggering, generation optimization to complete that letter is presented Breath;When the key for receiving user's triggering optimizes operational order, one key of monitoring optimization operation progress is simultaneously completed in optimization Afterwards, generation optimization completes that information is presented.
B9, the device as any one of B1~B3, in addition to:
Monitoring modular, during being detected to the mounted software, detection progress is monitored, and generate and work as Information is presented in progress corresponding to preceding detection progress.
B10, the device as any one of B1~B3, in addition to:
Second acquisition module, the quantity of software is installed for obtaining, and information is presented in generation quantity.

Claims (20)

  1. A kind of 1. method detected in mobile terminal to application state, it is characterised in that including:
    After the detection instruction for receiving user's triggering, according to default Detection task list, mounted software is detected, The default Detection task list includes:Checking and killing virus task items, malice ad ware task items, self-starting software task Item, the software task item that can move, can clear up installation kit task items, upgradeable software task items, software vulnerability scan task item and The combination of any two or multinomial in system intialization software task item;
    After the completion of at least one task items detection, testing result corresponding to this task items is generated;
    According to the testing result, safe handling prompt message is generated, so that user enters according to the safe handling prompt message The corresponding software operation of row.
  2. 2. according to the method for claim 1, it is characterised in that it is described according to default Detection task list, to having installed Software detected, including:
    According to default Detection task list, call described in checking and killing virus engine detection corresponding to the checking and killing virus task items Whether there is in installation software has virus;And/or
    According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to detect institute State to have installed to whether there is in software and have malice ad ware;And/or
    According to default Detection task list, call described in the second inspection policies detection corresponding to the self-starting software task item Install to whether there is in software and had self-starting software;And/or
    According to default Detection task list, can be moved described in calling described in the 3rd inspection policies detection corresponding to software task item Install to whether there is in software and had the software that can be moved;And/or
    According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and detect institute State to have installed to whether there is to have in software and can clear up installation kit;And/or
    According to default Detection task list, call described in the 5th inspection policies detection corresponding to the upgradeable software task items Install to whether there is in software and had scalable software;And/or
    According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to detect institute State to have installed and whether there is leaky software in software;And/or
    According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to detect institute State and installed in software with the presence or absence of the software for having system intialization.
  3. 3. according to the method for claim 2, it is characterised in that after the completion of the task items detection, generation should Testing result corresponding to item task items, including:
    If the checking and killing virus task items detection is completed, generation includes the software for needing killing amount of software and needing killing software The testing result of information;
    If the malice ad ware task items detection is completed, generation includes the malice ad ware quantity and evil detected The testing result of the software information of meaning ad ware;
    If the self-starting software task item detection is completed, generation includes the self-starting amount of software detected and self-starting The testing result of the software information of amount of software and self-starting software;
    If the software task item detection of moving is completed, generation, which includes moving of detecting, amount of software and can move The testing result of the software information of software;
    Clear up the detection of installation kit task items if described and complete, generation include detect clear up installation kit quantity and can Clear up the testing result of the software information of installation kit;
    If upgradeable software task items detection is completed, generation includes the upgradeable software quantity that detects and scalable The testing result of the software information of software;
    If the software vulnerability scan task item detection is completed, generation includes the leaky amount of software detected and has leakage The testing result of the software information of hole software;
    If the system intialization software task item detection is completed, generation includes the system intialization amount of software detected and is Unite preset software software information testing result.
  4. 4. according to method according to any one of claims 1 to 3, it is characterised in that also include:
    Obtain testing result corresponding to all task items in the Detection task list;
    According to testing result corresponding to all task items, comprehensive detection result is determined;
    According to the comprehensive detection result, forms are presented to result and handled, are presented not with corresponding different comprehensive detection results Same forms.
  5. 5. according to the method for claim 4, it is characterised in that it is described according to the comprehensive detection result, result is presented Forms are handled, including:
    If the comprehensive detection result to be safe for operation, by forms processing for it is safe for operation when the forms that present;
    If the forms that the comprehensive detection result potential safety hazard to be present, is presented when being and potential safety hazard be present by forms processing;
    If the comprehensive detection result be exist can optimization software, by forms processing be exist can optimization software when the window that presents Body;
    If the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
  6. 6. the method according to any one of claims 1 to 3, it is characterised in that also include:
    Obtain testing result corresponding to all task items in the Detection task list;
    According to testing result corresponding to all task items, comprehensive detection result is determined;
    Judge whether the comprehensive detection result is safe for operation;
    If so, then prompt message is completed in generation, so that user completes instruction according to the completion prompt message triggering;
    Otherwise, key optimization operation prompt information is generated, so that user optimizes operation prompt information triggering one according to a key Key optimizes operational order.
  7. 7. according to the method for claim 6, it is characterised in that also include:
    If receiving the key optimization operational order of user's triggering, according to the comprehensive detection result, it is excellent to perform a key Change operation;
    Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
    If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine is called to described Killing software is needed to carry out killing;
    If the comprehensive detection result includes the software information of self-starting software, Root authority is obtained, and with Root The self-starting function of the self-starting software is closed during authority;
    If the comprehensive detection result includes the software information for the software that can move, Root authority is obtained, and with Root The software of moving is transferred under default target directory during authority;
    If the comprehensive detection result includes the software information that can clear up installation kit, to the peace included in the testing result Installation kit corresponding to dress package informatin is cleared up;
    If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information, have leakage One in the software information of hole software and the software information of system intialization software or any multinomial combination, then generation are located manually Manage prompt message;
    If receiving the manual optimization operational order that user triggers according to the manual handle prompt message, according to described manual The software information that carries and operation instruction in optimization operational order, using the operation instruction to the software information at Reason.
  8. 8. according to the method for claim 6, it is characterised in that also include:
    If receiving the completion instruction of user's triggering, generation optimization completes that information is presented;
    If receiving the key optimization operational order of user's triggering, monitor key optimization operation progress and completed in optimization Afterwards, generation optimization completes that information is presented.
  9. 9. according to method according to any one of claims 1 to 3, it is characterised in that also include:
    During being detected to the mounted software, detection progress is monitored, and generate corresponding to current detection progress Information is presented in progress.
  10. 10. according to method according to any one of claims 1 to 3, it is characterised in that also include:
    The quantity for having installed software is obtained, and information is presented in generation quantity.
  11. A kind of 11. device detected in mobile terminal to application state, it is characterised in that including:
    Detection module, after the detection instruction for receiving user's triggering, according to default Detection task list, to mounted Software is detected, and the default Detection task list includes:Checking and killing virus task items, malice ad ware task items, from Start software task item, the software task item that can move, installation kit task items, upgradeable software task items, software vulnerability can be cleared up The combination of any two or multinomial in scan task item and system intialization software task item;
    First generation module, for after the completion of the detection of at least one task items, generating testing result corresponding to this task items;
    Second generation module, for according to the testing result, safe handling prompt message being generated, so that user is according to the peace Full processing prompt message carries out corresponding software operation.
  12. 12. device according to claim 11, it is characterised in that the detection module, be specifically used for:
    According to default Detection task list, call described in checking and killing virus engine detection corresponding to the checking and killing virus task items Whether there is in installation software has virus;And/or
    According to default Detection task list, the first inspection policies corresponding to the malice ad ware task items are called to detect institute State to have installed to whether there is in software and have malice ad ware;And/or
    According to default Detection task list, call described in the second inspection policies detection corresponding to the self-starting software task item Install to whether there is in software and had self-starting software;And/or
    According to default Detection task list, can be moved described in calling described in the 3rd inspection policies detection corresponding to software task item Install to whether there is in software and had the software that can be moved;And/or
    According to default Detection task list, the 4th inspection policies corresponding to installation kit task items can be cleared up described in calling and detect institute State to have installed to whether there is to have in software and can clear up installation kit;And/or
    According to default Detection task list, call described in the 5th inspection policies detection corresponding to the upgradeable software task items Install to whether there is in software and had scalable software;And/or
    According to default Detection task list, the 6th inspection policies corresponding to the software vulnerability scan task item are called to detect institute State to have installed and whether there is leaky software in software;And/or
    According to default Detection task list, the 7th inspection policies corresponding to the system intialization software task item are called to detect institute State and installed in software with the presence or absence of the software for having system intialization.
  13. 13. device according to claim 12, it is characterised in that first generation module, be specifically used for:
    When the checking and killing virus task items, which detect, to be completed, generation includes the software for needing killing amount of software and needing killing software The testing result of information;
    When the malice ad ware task items, which detect, to be completed, generation includes the malice ad ware quantity and evil detected The testing result of the software information of meaning ad ware;
    When the self-starting software task item, which detects, to be completed, generation includes the self-starting amount of software detected and self-starting The testing result of the software information of software;
    When the software task item detection of moving is completed, generation, which includes moving of detecting, amount of software and can move The testing result of the software information of software;
    When it is described clear up the detection of installation kit task items and complete when, generation include detect clear up installation kit quantity and can Clear up the testing result of the software information of installation kit;
    When the upgradeable software task items, which detect, to be completed, generation includes the upgradeable software quantity that detects and scalable The testing result of the software information of software;
    When the software vulnerability scan task item, which detects, to be completed, generation includes the leaky amount of software detected and has leakage The testing result of the software information of hole software;
    When the system intialization software task item, which detects, to be completed, generation includes the system intialization amount of software detected and is Unite preset software software information testing result.
  14. 14. the device according to any one of claim 11~13, it is characterised in that also include:
    First acquisition module, for obtaining testing result corresponding to all task items in the Detection task list;
    Determining module, for the testing result according to corresponding to all task items, determine comprehensive detection result;
    Forms processing module, for according to the comprehensive detection result, forms being presented to result and handle, with corresponding different comprehensive Close testing result and different forms are presented.
  15. 15. device according to claim 14, it is characterised in that the forms processing module, be specifically used for:
    When the comprehensive detection result for it is safe for operation when, by forms processing for it is safe for operation when the forms that present;
    Forms when the comprehensive detection result when potential safety hazard be present, to be presented when being and potential safety hazard be present by forms processing;
    When the comprehensive detection result be exist can optimization software when, by forms processing be exist can optimization software when the window that presents Body;
    When the comprehensive detection result is virus infection, the forms that present when by forms processing being virus infection.
  16. 16. the device according to any one of claim 11~13, it is characterised in that also include:
    First acquisition module, for obtaining testing result corresponding to all task items in the Detection task list;
    Determining module, for the testing result according to corresponding to all task items, determine comprehensive detection result;
    Judge module, for judging whether the comprehensive detection result is safe for operation;
    3rd generation module, for when the comprehensive detection result is safe for operation, prompt message to be completed in generation, so that user Instruction is completed according to the completion prompt message triggering, when the comprehensive detection result is not safe for operation, one key of generation is excellent Change operation prompt information, so that user optimizes operation prompt information according to a key triggers key optimization operational order.
  17. 17. device according to claim 16, it is characterised in that also include:
    Execution module, for when receive user triggering a key optimize operational order when, according to the comprehensive detection knot Fruit, perform key optimization operation;
    Wherein, it is described according to the comprehensive detection result, key optimization operation is performed, is specially:
    If the comprehensive detection result includes the software information for needing killing software, the checking and killing virus engine is called to described Killing software is needed to carry out killing;
    If the comprehensive detection result includes the software information of self-starting software, Root authority is obtained, and with Root The self-starting function of the self-starting software is closed during authority;
    If the comprehensive detection result includes the software information for the software that can move, Root authority is obtained, and with Root The software of moving is transferred under default target directory during authority;
    If the comprehensive detection result includes the software information that can clear up installation kit, to the peace included in the testing result Installation kit corresponding to dress package informatin is cleared up;
    If the comprehensive detection result include the software information of malice ad ware, upgradeable software software information, have leakage One in the software information of hole software and the software information of system intialization software or any multinomial combination, then generation are located manually Manage prompt message;
    If receiving the manual optimization operational order that user triggers according to the manual handle prompt message, according to described manual The software information that carries and operation instruction in optimization operational order, using the operation instruction to the software information at Reason.
  18. 18. device according to claim 16, it is characterised in that also include:
    4th generation module, for when receiving the completion instruction of user's triggering, generation optimization to complete that information is presented;When When receiving the key optimization operational order of user's triggering, one key of monitoring optimizes operation progress and after the completion of optimization, raw Complete that information is presented into optimization.
  19. 19. the device according to any one of claim 11~13, it is characterised in that also include:
    Monitoring modular, during being detected to the mounted software, detection progress is monitored, and generate current inspection Information is presented in progress corresponding to survey progress.
  20. 20. the device according to any one of claim 11~13, it is characterised in that also include:
    Second acquisition module, the quantity of software is installed for obtaining, and information is presented in generation quantity.
CN201410318844.0A 2014-07-04 2014-07-04 A kind of method and device detected in mobile terminal to application state Active CN104050417B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410318844.0A CN104050417B (en) 2014-07-04 2014-07-04 A kind of method and device detected in mobile terminal to application state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410318844.0A CN104050417B (en) 2014-07-04 2014-07-04 A kind of method and device detected in mobile terminal to application state

Publications (2)

Publication Number Publication Date
CN104050417A CN104050417A (en) 2014-09-17
CN104050417B true CN104050417B (en) 2018-03-27

Family

ID=51503234

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410318844.0A Active CN104050417B (en) 2014-07-04 2014-07-04 A kind of method and device detected in mobile terminal to application state

Country Status (1)

Country Link
CN (1) CN104050417B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573504B (en) * 2014-12-24 2018-05-25 百度在线网络技术(北京)有限公司 A kind of method and apparatus for running application in iOS related systems
CN104462961B (en) * 2014-12-24 2018-04-10 北京奇虎科技有限公司 Mobile terminal and its privacy authority optimization method
CN105320889A (en) * 2015-02-10 2016-02-10 中国移动通信集团广东有限公司 Security detection method and apparatus
CN106156619B (en) * 2015-04-23 2020-04-03 腾讯科技(深圳)有限公司 Application security protection method and device
CN104991794A (en) * 2015-06-18 2015-10-21 上海斐讯数据通信技术有限公司 Android intelligent terminal application remote management system
CN106407098B (en) * 2015-07-27 2021-06-11 腾讯科技(深圳)有限公司 Application program state monitoring method and device
CN106529290B (en) * 2016-10-11 2020-02-18 北京金山安全软件有限公司 Malicious software protection method and device and electronic equipment
CN107153577A (en) * 2017-04-21 2017-09-12 贵州省广播电视信息网络股份有限公司 A kind of system optimization method for Android system
CN107045609A (en) * 2017-04-28 2017-08-15 努比亚技术有限公司 Method, storage medium and the mobile terminal of detecting system security
CN108647070B (en) * 2018-04-18 2022-02-22 Oppo广东移动通信有限公司 Information reminding method and device, mobile terminal and computer readable medium
CN110598409B (en) * 2019-09-04 2020-06-02 南方电网数字电网研究院有限公司 Storage medium access method and device, computer equipment and storage medium
CN110674500B (en) * 2019-09-04 2020-09-01 南方电网数字电网研究院有限公司 Storage medium virus searching and killing method and device, computer equipment and storage medium
CN112364349A (en) * 2020-11-30 2021-02-12 江苏极鼎网络科技有限公司 Cell-phone APP intellectual detection system equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102279912A (en) * 2011-06-03 2011-12-14 奇智软件(北京)有限公司 Client program monitoring method and device and client
CN102779257A (en) * 2012-06-28 2012-11-14 奇智软件(北京)有限公司 Security detection method and system of Android application program
CN102799826A (en) * 2012-07-19 2012-11-28 腾讯科技(深圳)有限公司 Method and device for detecting application program installation package decompression process and client device
CN102810143A (en) * 2012-04-28 2012-12-05 天津大学 Safety detecting system and method based on mobile phone application program of Android platform
CN103092661A (en) * 2013-01-31 2013-05-08 晨风云(北京)科技有限公司 Intelligent mobile terminal software installation method and system
CN103136091A (en) * 2013-01-28 2013-06-05 北京奇虎科技有限公司 Method and device for detecting safety state of terminal device
CN103577757A (en) * 2013-11-15 2014-02-12 北京奇虎科技有限公司 Virus defending method and device
CN103617106A (en) * 2013-12-02 2014-03-05 广州金山网络科技有限公司 Method and device for detecting electronic device
CN103632096A (en) * 2013-11-29 2014-03-12 北京奇虎科技有限公司 Method and device for carrying out safety detection on equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130152201A1 (en) * 2011-12-12 2013-06-13 Microsoft Corporation Adjunct Computing Machine for Remediating Malware on Compromised Computing Machine
CN102867147B (en) * 2012-08-24 2016-01-06 北京奇虎科技有限公司 A kind of method and apparatus of file scan
CN102929762B (en) * 2012-09-26 2015-09-16 北京奇虎科技有限公司 The monitoring method of the health status of terminal device and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102279912A (en) * 2011-06-03 2011-12-14 奇智软件(北京)有限公司 Client program monitoring method and device and client
CN102810143A (en) * 2012-04-28 2012-12-05 天津大学 Safety detecting system and method based on mobile phone application program of Android platform
CN102779257A (en) * 2012-06-28 2012-11-14 奇智软件(北京)有限公司 Security detection method and system of Android application program
CN102799826A (en) * 2012-07-19 2012-11-28 腾讯科技(深圳)有限公司 Method and device for detecting application program installation package decompression process and client device
CN103136091A (en) * 2013-01-28 2013-06-05 北京奇虎科技有限公司 Method and device for detecting safety state of terminal device
CN103092661A (en) * 2013-01-31 2013-05-08 晨风云(北京)科技有限公司 Intelligent mobile terminal software installation method and system
CN103577757A (en) * 2013-11-15 2014-02-12 北京奇虎科技有限公司 Virus defending method and device
CN103632096A (en) * 2013-11-29 2014-03-12 北京奇虎科技有限公司 Method and device for carrying out safety detection on equipment
CN103617106A (en) * 2013-12-02 2014-03-05 广州金山网络科技有限公司 Method and device for detecting electronic device

Also Published As

Publication number Publication date
CN104050417A (en) 2014-09-17

Similar Documents

Publication Publication Date Title
CN104050417B (en) A kind of method and device detected in mobile terminal to application state
KR101246623B1 (en) Apparatus and method for detecting malicious applications
KR102017756B1 (en) Apparatus and method for detecting abnormal behavior
CN104517054B (en) Method, device, client and server for detecting malicious APK
CN103607498B (en) A kind of method and device showing Stranger Calls/de-electrifying number related information
CN103514019B (en) Handle the method and its device of pop-up
CN106709346B (en) Document handling method and device
CN104268473B (en) Method and device for detecting application programs
JP2011192296A (en) Help utility application program
CN105677561B (en) The multi-platform test method of mobile product and system
CN108228321A (en) A kind of Android system application method for closing and device
CN106569860A (en) Application management method and terminal
CN110058850A (en) A kind of development approach of application, device and storage medium
CN104123496B (en) The hold-up interception method and device of a kind of rogue software, terminal
CN108170438A (en) A kind of application program automatic installation method, terminal and computer-readable medium
CN109726601A (en) The recognition methods of unlawful practice and device, storage medium, computer equipment
Meng et al. Harvesting smartphone privacy through enhanced juice filming charging attacks
CN105975302A (en) Application installation method and terminal
CN105205398B (en) It is a kind of that shell side method is looked into based on APK shell adding software dynamic behaviours
CN106844182A (en) Method, system and mobile terminal for recording user behavior
CN104915594B (en) Application program operation method and device
KR20170107665A (en) Malicious Code Analysis Module and Method therefor
CN104200164B (en) Loader virus searching and killing method, device and terminal
CN107608707A (en) Application detection method, terminal and readable storage medium storing program for executing with hot repair function
CN106709335B (en) Vulnerability detection method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220718

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.