CN102681873A - Method and device for ensuring normal running of software - Google Patents

Method and device for ensuring normal running of software Download PDF

Info

Publication number
CN102681873A
CN102681873A CN2012101484652A CN201210148465A CN102681873A CN 102681873 A CN102681873 A CN 102681873A CN 2012101484652 A CN2012101484652 A CN 2012101484652A CN 201210148465 A CN201210148465 A CN 201210148465A CN 102681873 A CN102681873 A CN 102681873A
Authority
CN
China
Prior art keywords
user data
damage
corresponding user
data
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101484652A
Other languages
Chinese (zh)
Other versions
CN102681873B (en
Inventor
范亮亮
叶润桂
林向耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201210148465.2A priority Critical patent/CN102681873B/en
Publication of CN102681873A publication Critical patent/CN102681873A/en
Application granted granted Critical
Publication of CN102681873B publication Critical patent/CN102681873B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a method and a device for ensuring normal running of software, which belong to the technical field of computers. The method comprises the following steps of: when the software is started up, detecting whether broken user data exist; and when broken user data are detected, repairing the broken user data. The device comprises a detection module and a repairing module. The presence of broken user data is detected, and broken user data are repaired when broken user data are detected, so that normal running of the software can be ensured without uninstalling the software, the software is reinstalled, user data are protected from being lost, and time of a user can be saved.

Description

Guarantee the method and apparatus of the normal operation of software
Technical field
The present invention relates to field of computer technology, particularly a kind of method and apparatus of guaranteeing the normal operation of software.
Background technology
The development of Along with computer technology can realize that the software of various functions emerges in an endless stream, like the chat software that can chat etc.In software running process, usually can use user data, and because a variety of causes (like the flash memory damage of storaging user data etc.) usually can make user data damage, cause software normally to move.
At present, when user data appearance damage, when software can't normally move, the method for employing was: with software unloading, the software of reloading then.
Yet in realizing process of the present invention, the inventor finds that there is following problem at least in prior art:
Existing method need unload software, can delete user data, causes user data loss; And unloading, the software of reloading then needs spended time, the waste user time.
Summary of the invention
For fear of user data loss, practice thrift user time, the embodiment of the invention provides a kind of method and apparatus of guaranteeing the normal operation of software.Said technical scheme is following:
A kind of method of guaranteeing the normal operation of software, said method comprises:
Behind software startup, detect the user data that whether has damage;
After detecting the user data that has damage, the user data that damages is repaired.
A kind of device of guaranteeing the normal operation of software, said device comprises:
Detection module is used for behind software startup, detects the user data that whether has damage;
Repair module, be used for after said detection module detects the user data that has damage, the user data that damages is repaired.
The beneficial effect of the technical scheme that the embodiment of the invention provides is:
Through detecting the user data that whether has damage; After detecting the user data that has damage, the user data that damages is repaired, thereby guaranteed that software can normally move; Need software not unloaded; The software of reloading has then been avoided user data loss, and can have been practiced thrift user time.
Description of drawings
Fig. 1 is a kind of method flow diagram of guaranteeing the normal operation of software that the embodiment of the invention 1 provides;
Fig. 2 is a kind of method flow diagram of guaranteeing the normal operation of software that the embodiment of the invention 2 provides;
Fig. 3 is first kind of apparatus structure synoptic diagram of guaranteeing the normal operation of software that the embodiment of the invention 3 provides;
Fig. 4 is second kind of apparatus structure synoptic diagram of guaranteeing the normal operation of software that the embodiment of the invention 3 provides;
Fig. 5 be the embodiment of the invention 3 provide the third guarantee the apparatus structure synoptic diagram of the normal operation of software;
Fig. 6 is the 4th kind of apparatus structure synoptic diagram of guaranteeing the normal operation of software that the embodiment of the invention 3 provides;
Fig. 7 is the 5th kind of apparatus structure synoptic diagram of guaranteeing the normal operation of software that the embodiment of the invention 3 provides.
Embodiment
For making the object of the invention, technical scheme and advantage clearer, will combine accompanying drawing that embodiment of the present invention is done to describe in detail further below.
Embodiment 1
Referring to Fig. 1, the embodiment of the invention provides a kind of method of guaranteeing the normal operation of software, and this method comprises:
101: behind software startup, detect the user data that whether has damage.
102: after detecting the user data that has damage, the user data that damages is repaired.
Further, this method also comprises:
On software, once in the operational process, when software reads user data, judge whether to read out corresponding user data;
In the time corresponding user data can not being read out, confirm that this corresponding user data damages;
The information of the user data that record damages;
Correspondingly, detecting the user data that whether has damage comprises:
Query note;
If inquire the information of the user data of damage, then confirm to have the user data of damage; Otherwise, confirm not exist the user data that damages.
Further, this method also comprises:
In the time corresponding user data can being read out, judge whether this corresponding user data meets data record format and professional requirement to data;
If do not meet data record format or professional requirement, confirm that this corresponding user data damages, then the step of the information of the user data of executive logging damage to data.
Further, judge whether corresponding user data meets before data record format and the professional requirement to data, and this method also comprises:
CRC CRC to corresponding user data carries out verification; Wherein, the CRC (CRC, Cyclic Redundancy Check) of corresponding user data is when preserving corresponding user data, to generate, and combines the back to preserve with corresponding user data;
Judge whether verification is successful;
If the verification failure confirms that then corresponding user data damages, then the step of the information of the user data of executive logging damage;
If verification succeeds is then carried out and is judged whether corresponding user data meets data record format and the step of business to the requirement of data.
Wherein, the user data that damages is repaired, being comprised:
Judge whether have in the server and the corresponding user data of the user data of this damage;
If have and the corresponding user data of the user data of this damage in the service, the file delete at the user data that then will damage place arrives the file copy with the corresponding user data of user data this damage place that exist in the server local.
Further, judge whether have in the server with the corresponding user data of the user data of this damage after, this method also comprises:
If there is not to exist the corresponding user data of user data with this damage in the server, then read out the valid data in the file at user data place of this damage, valid data are stored in the new file;
Replace the file at the user data place of this damage with new file.
Further, before the user data that damages repaired, this method also comprised:
Judge whether and to repair the user data that damages;
If need not repair to the user data that damages, the file delete at the user data place that then will damage.
The described method of guaranteeing the normal operation of software of the embodiment of the invention is through detecting the user data that whether has damage, after detecting the user data that has damage; User data to damaging is repaired; Thereby guarantee that software can normally move, need software not unloaded the software of reloading then; Avoid user data loss, and can practice thrift user time.And, can be through on software once in the operational process, the information of the user data of the damage of record detects the user data that whether has damage, and detection method is simple, can practice thrift the working time of software.Can be through copying to local method with the corresponding user data of user data this damage with that exist in the server; And the method that reads out the valid data in the file at user data place of this damage; User data is repaired, guaranteed the reparation of user data.
The embodiment of the invention is described guarantees the method for the normal operation of software, can be applied to the various softwares of various systems, for the ease of explanation, is that example is explained further with the little letter software (S60 version) that is applied to mobile phone below.
Embodiment 2
Referring to Fig. 2, the embodiment of the invention provides a kind of method of guaranteeing the normal operation of software, and this method comprises:
201: when little letter starts, detect whether have the user data of damage,, then carry out 202 if having; Otherwise, carry out 208.
Wherein, user data comprises configuration file, contacts list, little letter message, little letter voice, drift bottle data etc. in the embodiment of the invention.
Whether the embodiment of the invention is that whether (a preceding operational process of current startup) damages the record of being done to user data in the last operational process of little letter through being utilized in, come the judges data to damage, and is specific as follows:
In little letter operational process, when little letter reads user data, judge whether to read out corresponding user data;
In the time corresponding user data can not being read out, confirm that this corresponding user data damages;
The information of the user data that record damages;
Correspondingly, detecting the user data that whether has damage comprises:
Query note;
If inquire the information of the user data of damage, then confirm to have the user data of damage; Otherwise, confirm not exist the user data that damages.
Particularly; In little letter operational process; Can learn whether can read out corresponding user data, whether can read out corresponding user data through the API (Application Programming Interface, API) of calling system thereby judge.
Wherein, the information of the user data of damage comprises the routing information of the file at user data place, the positional information of user data place file etc.Particularly, can the information of the user data that damages be recorded in the file, in journal file, when detecting the user data that whether has damage, can query log files, thus learn the user data that whether has damage.
But; Because the user data of different software need have different data record formats; And need satisfy the different service requirement; When can reading out corresponding user data, if but corresponding user data does not meet data record format or professional requirement to data, and this user data also possibly be damaged.For example: the user data of mail is XML (Extensible Markup Language; Extend markup language) form; After reading out corresponding user data; Whether the user data that checking reads out meets the XML form, if do not meet the XML form, then this user data has been damaged exactly.If the user data that reads out meets the XML form, user data is resolved, obtain a lot of fields; For example sender, addressee, theme etc.; Because concerning mail service, the sender must have, the sender is sky in the field that obtains if separate; Then user data does not meet professional requirement to data, and this user data is to be damaged.So further, this method also comprises:
In the time corresponding user data can being read out, judge whether this corresponding user data meets data record format and professional requirement to data;
If do not meet data record format or professional requirement, confirm that this corresponding user data damages, then the step of the information of the user data of executive logging damage to data.
And, for the user data of the damage that guarantees to detect existence, further, judge whether corresponding user data meets before data record format and the professional requirement to data, and this method also comprises:
CRC CRC to corresponding user data carries out verification; Wherein, the CRC CRC of corresponding user data generates when preserving corresponding user data, and combines the back to preserve with corresponding user data;
Judge whether verification is successful;
If the verification failure confirms that then corresponding user data damages, then the step of the information of the user data of executive logging damage;
If verification succeeds is then carried out and is judged whether corresponding user data meets data record format and the step of business to the requirement of data.
202: judge whether and to repair the user data that damages, if desired, then carry out 203; Otherwise, carry out 207.
Particularly, can be provided with and whether need repair, need to repair after user data such as configuration file, contacts list damage as being provided with in the embodiment of the invention according to the severity level of user data to the user data that damages.
And, can the user data that need after damaging to repair be noted with the form of tabulation, after detecting the user data that has damage, whether inquiry is tabulation accordingly, need repair the user data of this damage to judge.
Need to prove, be not limited to mode, judge and whether need repair, can also adopt other any feasible modes to realize in the practical application, this is not done concrete qualification the user data that damages through Query List.
203: judge whether have in the server and the corresponding user data of the user data of this damage,, then carry out 204 if having; Otherwise, carry out 205.
Wherein, server is meant the server that respective service is provided for little letter software.
204: the file delete at the user data place that will damage, the file copy with the corresponding user data of user data this damage place that exist in the server is arrived this locality, carry out 206 then.
Particularly, the file copy with the corresponding user data of user data this damage place that exist in the server is arrived this locality, comprising:
Send the request message issue with the corresponding user data of user data of this damage to server.
After server receives request message, will be issued to this locality with the corresponding user data of the user data of this damage.
205: read out the valid data in the file at user data place of this damage, valid data are stored in the new file,, carry out 206 then with the file that the user data of new this damage of file replacement belongs to.
Need to prove; During valid data in the file at the user data place of reading this damage; User data in the file that may belong to the user data of this damage causes damage; The damage that user data is caused when above-mentioned situation takes place can be before the valid data in the file at the user data place of reading this damage, and the file at the user data place of this damage is backed up.
206: judge whether successfully to repair the user data of damage, if success then carries out 208; Otherwise, carry out 209.
For different repair modes, the method for user data that judges whether successfully to repair damage is also different, specific as follows:
For through the file copy at the corresponding user data of that exist in the server and user data this damage place repaired to the mode of this locality; When send the request message success issue with the corresponding user data of user data of this damage to server; Server receives the request message success; And in the time of will being issued to local success with the corresponding user data of the user data of this damage, judging and successfully repaired the user data that damages; When send the request message failure issue with the corresponding user data of user data of this damage to server; Server receives the request message failure; Or will be issued to local failure with the corresponding user data of the user data of this damage the time, judge and repair the user data failure that damages.
Repair for the mode of the valid data in the file that belongs to through the user data that reads damage; Valid data success in the file at the user data place that reads out this damage; Valid data are stored in success in the new file; And during with the file success at the user data place of this damage of new file replacement, judge the user data of successfully having repaired damage; Valid data failure in the file at the user data place that reads out this damage is stored in valid data in the new file and fails, and during with the file failure at the user data place of new this damage of file replacement, judges that repairing the user data that damages fails.
207: the file delete at the user data place that will damage, carry out 208 then.
208: little letter normally starts, and carries out initialization operation, finishes then.
Carrying out initialization operation comprises initialization UI (User Interface, user interface) interface, starts little communication service logic etc.
209: withdraw from little letter, finish then.
The described method of guaranteeing the normal operation of software of the embodiment of the invention is through detecting the user data that whether has damage, after detecting the user data that has damage; User data to damaging is repaired; Thereby guarantee that software can normally move, need software not unloaded the software of reloading then; Avoid user data loss, and can practice thrift user time.And, can be through on software once in the operational process, the information of the user data of the damage of record detects the user data that whether has damage, and detection method is simple, can practice thrift the working time of software.Can be through copying to local method with the corresponding user data of user data this damage with that exist in the server; And the method that reads out the valid data in the file at user data place of this damage; User data is repaired, guaranteed the reparation of user data.
Embodiment 3
Referring to Fig. 3, the embodiment of the invention provides a kind of device of guaranteeing the normal operation of software, and this device comprises:
Detection module 301 is used for behind software startup, detects the user data that whether has damage;
Repair module 302, be used for after detection module 301 detects the user data that has damage, the user data that damages is repaired.
Further, referring to Fig. 4, this device also comprises:
First judge module 303 is used on software once operational process, when software reads user data, judges whether to read out corresponding user data;
First determination module 304, the judged result that is used for when first judge module 303 is in the time of can not reading out corresponding user data, confirms that corresponding user data damages;
Logging modle 305 is used for after first determination module 304 confirms that corresponding user data damages the information of the user data that record damages;
Correspondingly, detection module 301 comprises:
Query unit is used for the record of query note module 305;
Processing unit is used for when query unit inquires the information of user data of damage, confirming to have the user data of damage; Otherwise, confirm not exist the user data that damages.
Further, referring to Fig. 5, this device also comprises:
Second judge module 306, the judged result that is used for when first judge module 303 is in the time of can reading out corresponding user data, judges whether corresponding user data meets data record format and professional requirement to data;
Second determination module 307; Be used for judged result when second judge module 306 and be corresponding user data and do not meet data record format or professional during the requiring of data; Confirm that corresponding user data damages, send the notification of information of the user data of executive logging damage then to logging modle 305.
Further, referring to Fig. 6, this device also comprises:
Verification module 308, the judged result that is used for when first judge module 303 is in the time of can reading out corresponding user data, and the CRC CRC of corresponding user data is carried out verification; Wherein, the CRC CRC of corresponding user data generates when preserving corresponding user data, and combines the back to preserve with corresponding user data;
The 3rd judge module 309 is used to judge whether verification is successful;
First notification module 310 is used for when the judged result of the 3rd judge module 309 is the verification failure, confirming that corresponding user data damages, and sends the notification of information of the user data of executive logging damage then to logging modle 305;
Second notification module 311 is used for when the judged result of the 3rd judge module 309 is verification succeeds, sends to carry out to second judge module 306 and judges whether corresponding user data meets data record format and the notice of business to the requirement of data.
Further, repairing module 302 comprises:
Judging unit is used for after detection module 301 detects the user data that has damage, judges the corresponding user data of user data that whether has in the server and damage;
The first reparation unit; The judged result that is used for when judging unit is when serving the corresponding user data of user data that has and damage; With the file delete at the user data place of damaging, the file copy that the corresponding user data of the user data with damaging that exists in the server is belonged to arrives local.
Further, repairing module 302 also comprises:
The second reparation unit when being used for judged result when judging unit and being server and not having to exist with the corresponding user data of user data that damages, reads out the valid data in the file at user data place of damage, and valid data are stored in the new file; The file that the user data that damages with new file replacement belongs to.
Further, referring to Fig. 7, this device also comprises:
The 4th judge module 312 is used for after detection module 301 detects the user data that has damage, judges whether to repair the user data that damages;
Removing module 313 is when being used for judged result when the 4th judge module 312 and being need not repairing the user data that damages, with the file delete at the user data place of damaging.
The described device of guaranteeing the normal operation of software of the embodiment of the invention is through detecting the user data that whether has damage, after detecting the user data that has damage; User data to damaging is repaired; Thereby guarantee that software can normally move, need software not unloaded the software of reloading then; Avoid user data loss, and can practice thrift user time.And, can be through on software once in the operational process, the information of the user data of the damage of record detects the user data that whether has damage, and detection method is simple, can practice thrift the working time of software.Can be through copying to local method with the corresponding user data of user data this damage with that exist in the server; And the method that reads out the valid data in the file at user data place of this damage; User data is repaired, guaranteed the reparation of user data.
All or part of content in the technical scheme that above embodiment provides can realize that through software programming its software program is stored in the storage medium that can read, storage medium for example: the hard disk in the computing machine, CD or floppy disk.
The above is merely preferred embodiment of the present invention, and is in order to restriction the present invention, not all within spirit of the present invention and principle, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (14)

1. guarantee the normal method of moving of software for one kind, it is characterized in that said method comprises:
Behind software startup, detect the user data that whether has damage;
After detecting the user data that has damage, the user data that damages is repaired.
2. the method for guaranteeing the normal operation of software according to claim 1 is characterized in that said method also comprises:
On said software, once in the operational process, when said software reads user data, judge whether to read out corresponding user data;
In the time corresponding user data can not being read out, confirm that corresponding user data damages;
The information of the user data that record damages;
Correspondingly, detecting the user data that whether has damage comprises:
Query note;
If inquire the information of the user data of damage, then confirm to have the user data of damage; Otherwise, confirm not exist the user data that damages.
3. the method for guaranteeing the normal operation of software according to claim 2 is characterized in that said method also comprises:
In the time corresponding user data can being read out, judge whether corresponding user data meets data record format and professional requirement to data;
If do not meet data record format or professional requirement to data, confirm that corresponding user data damages, carry out the step of the information of the user data that said record damages then.
4. the method for guaranteeing the normal operation of software according to claim 3 is characterized in that, judges whether corresponding user data meets before data record format and the professional requirement to data, and said method also comprises:
CRC CRC to corresponding user data carries out verification; Wherein, the CRC CRC of corresponding user data generates when preserving corresponding user data, and combines the back to preserve with corresponding user data;
Judge whether verification is successful;
If verification failure confirms that then corresponding user data damages, carry out the step of the information of the user data that said record damages then;
If verification succeeds is then carried out and is judged whether corresponding user data meets data record format and the step of business to the requirement of data.
5. the method for guaranteeing the normal operation of software according to claim 1 is characterized in that, the user data that damages is repaired, and comprising:
Judge whether have in the server and the corresponding user data of the user data of said damage;
If have and the corresponding user data of the user data of said damage in the service; Then with the file delete at the user data of said damage place, with the file copy at that exist in the server and the corresponding user data of user data said damage place to local.
6. the method for guaranteeing the normal operation of software according to claim 5 is characterized in that, judge whether have in the server with the corresponding user data of the user data of said damage after, said method also comprises:
If there is not to exist the corresponding user data of user data with said damage in the server, then read out the valid data in the file at user data place of said damage, valid data are stored in the new file;
Replace the file at the user data place of said damage with new file.
7. according to the described method of guaranteeing the normal operation of software of any claim of claim 1-6, it is characterized in that before the user data that damages was repaired, said method also comprised:
Judge whether and to repair the user data of said damage;
If need not repair, then with the file delete at the user data of said damage place to the user data of said damage.
8. guarantee the normal device that moves of software for one kind, it is characterized in that said device comprises:
Detection module is used for behind software startup, detects the user data that whether has damage;
Repair module, be used for after said detection module detects the user data that has damage, the user data that damages is repaired.
9. the device of guaranteeing the normal operation of software according to claim 8 is characterized in that said device also comprises:
First judge module is used on said software once operational process, when said software reads user data, judges whether to read out corresponding user data;
First determination module, the judged result that is used for when said first judge module is in the time of can not reading out corresponding user data, confirms that corresponding user data damages;
Logging modle is used for after said first determination module confirms that corresponding user data damages the information of the user data that record damages;
Correspondingly, said detection module comprises:
Query unit is used to inquire about the record of said logging modle;
Processing unit is used for when said query unit inquires the information of user data of damage, confirming to have the user data of damage; Otherwise, confirm not exist the user data that damages.
10. the device of guaranteeing the normal operation of software according to claim 7 is characterized in that said device also comprises:
Second judge module, the judged result that is used for when said first judge module is in the time of can reading out corresponding user data, judges whether corresponding user data meets data record format and professional requirement to data;
Second determination module; Be used for judged result when said second judge module and be corresponding user data and do not meet data record format or professional during the requiring of data; Confirm that corresponding user data damages, send the notification of information of the user data of carrying out said record damage then to said logging modle.
11. the device of guaranteeing the normal operation of software according to claim 10 is characterized in that said device also comprises:
The verification module, the judged result that is used for when said first judge module is in the time of can reading out corresponding user data, and the CRC CRC of corresponding user data is carried out verification; Wherein, the CRC CRC of corresponding user data generates when preserving corresponding user data, and combines the back to preserve with corresponding user data;
The 3rd judge module is used to judge whether verification is successful;
First notification module is used for when the judged result of said the 3rd judge module is the verification failure, confirming that corresponding user data damages, and sends the notification of information of the user data of carrying out said record damage then to said logging modle;
Second notification module is used for when the judged result of said the 3rd judge module is verification succeeds, sends to carry out to said second judge module and judges whether corresponding user data meets data record format and the notice of business to the requirement of data.
12. the device of guaranteeing the normal operation of software according to claim 8 is characterized in that said reparation module comprises:
Whether judging unit is used for after said detection module detects the user data that has damage, judge to have in the server and the corresponding user data of the user data of said damage;
The first reparation unit; When being used for judged result when said judging unit and being service and having the corresponding user data of user data with said damage; With the file delete at the user data of said damage place, with the file copy at that exist in the server and the corresponding user data of user data said damage place to local.
13. the device of guaranteeing the normal operation of software according to claim 12 is characterized in that said reparation module also comprises:
The second reparation unit; When being used for judged result when said judging unit and being server and not having to exist the corresponding user data of user data with said damage; Read out the valid data in the file at user data place of said damage, valid data are stored in the new file; Replace the file at the user data place of said damage with new file.
14. the described device of guaranteeing the normal operation of software of any according to Claim 8-13 claim is characterized in that said device also comprises:
The 4th judge module is used for after said detection module detects the user data that has damage, judges whether and need repair the user data of said damage;
Removing module is when being used for judged result when said the 4th judge module and being need not repairing the user data of said damage, with the file delete at the user data place of said damage.
CN201210148465.2A 2012-05-14 2012-05-14 Guarantee the method and apparatus that software normally runs Active CN102681873B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210148465.2A CN102681873B (en) 2012-05-14 2012-05-14 Guarantee the method and apparatus that software normally runs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210148465.2A CN102681873B (en) 2012-05-14 2012-05-14 Guarantee the method and apparatus that software normally runs

Publications (2)

Publication Number Publication Date
CN102681873A true CN102681873A (en) 2012-09-19
CN102681873B CN102681873B (en) 2016-04-13

Family

ID=46813846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210148465.2A Active CN102681873B (en) 2012-05-14 2012-05-14 Guarantee the method and apparatus that software normally runs

Country Status (1)

Country Link
CN (1) CN102681873B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239215A (en) * 2014-09-30 2014-12-24 北京奇虎科技有限公司 Method and device for investigating useless software

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340675A (en) * 2008-08-27 2009-01-07 深圳华为通信技术有限公司 Method and apparatus for implementing backup and recovery by mobile terminal
US20090138854A1 (en) * 2007-11-22 2009-05-28 Suresh Mani Software error detection method, software module, database and system
CN101458645A (en) * 2007-12-11 2009-06-17 英业达股份有限公司 Computer operating system, file data repairing system of software thereof and method thereof
CN102298548A (en) * 2011-09-22 2011-12-28 奇智软件(北京)有限公司 Method and device for recovering dependent file of executable program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090138854A1 (en) * 2007-11-22 2009-05-28 Suresh Mani Software error detection method, software module, database and system
CN101458645A (en) * 2007-12-11 2009-06-17 英业达股份有限公司 Computer operating system, file data repairing system of software thereof and method thereof
CN101340675A (en) * 2008-08-27 2009-01-07 深圳华为通信技术有限公司 Method and apparatus for implementing backup and recovery by mobile terminal
CN102298548A (en) * 2011-09-22 2011-12-28 奇智软件(北京)有限公司 Method and device for recovering dependent file of executable program

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239215A (en) * 2014-09-30 2014-12-24 北京奇虎科技有限公司 Method and device for investigating useless software
CN104239215B (en) * 2014-09-30 2018-02-02 北京奇虎科技有限公司 The investigation method and apparatus of garbageware

Also Published As

Publication number Publication date
CN102681873B (en) 2016-04-13

Similar Documents

Publication Publication Date Title
US9164748B2 (en) Information backup method and apparatus
US8590016B2 (en) Apparatus and method for removing malicious code inserted into file
CN102591745B (en) Method and device for system recovery based on android system and intelligent equipment
CN100426298B9 (en) A kind of cleaning garbage files method and system
CN102736978A (en) Method and device for detecting installation status of application program
CN101706851B (en) Method and system for controlling process of self-help terminal
CN107153559A (en) The application program updating method of a kind of electronic equipment
CN103150231A (en) Computer booting method and computer system
CN104536792A (en) Method and device for eliminating application program residual files
CN104584006A (en) De-duplicating attachments on message delivery and automated repair of attachments
CN101656627A (en) Method and device for restoring main program and network equipment
CN104866234A (en) Data migration method, device and system
CN102591680A (en) Method for automatically deleting and unloading software related files
CN103942126A (en) Electronic device and data backup method thereof
EP2479962A1 (en) Method and mobile terminal for recycling short messages
CN107864209B (en) Data writing method and device and server
CN107153569B (en) Processing method and device for read-write failure of virtual machine
CN104036188A (en) Android malicious program detection method, device and equipment
CN102681873A (en) Method and device for ensuring normal running of software
CN104765631A (en) Restoration method and device for application program of mobile terminal
US8887145B2 (en) Storage device and configuration-information storing method
CN108629566B (en) Information management method and device
CN104572943B (en) Exempt from installation procedure method for cleaning and device
CN108733753B (en) File reading method and application entity
US9104518B2 (en) Wireless communication terminal and method for securely running industry software

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant