CN102736978B - A kind of method and device detecting the installment state of application program - Google Patents

A kind of method and device detecting the installment state of application program Download PDF

Info

Publication number
CN102736978B
CN102736978B CN201210215997.3A CN201210215997A CN102736978B CN 102736978 B CN102736978 B CN 102736978B CN 201210215997 A CN201210215997 A CN 201210215997A CN 102736978 B CN102736978 B CN 102736978B
Authority
CN
China
Prior art keywords
application program
terminal
detected
configuration list
registry
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210215997.3A
Other languages
Chinese (zh)
Other versions
CN102736978A (en
Inventor
申朝辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing 360 Zhiling Technology Co ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201210215997.3A priority Critical patent/CN102736978B/en
Publication of CN102736978A publication Critical patent/CN102736978A/en
Application granted granted Critical
Publication of CN102736978B publication Critical patent/CN102736978B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention discloses a kind of detect the installment state of application program method and the wherein said method of device comprise: set up cloud database, wherein preserve the fixed reference feature code for the All Files collected by each application program; Maintenance terminal configured list, the condition code of all files that each application program wherein record the installation path of each application program that described terminal is installed, obtaining according to described installation path is installed and each file; The condition code extracting each file of application program to be detected according to described terminal configuration list is compared in database beyond the clouds, judges whether described application program to be detected is properly installed and feeds back to described terminal in described terminal according to comparison result.The present invention can carry out thorough, careful inspection in conjunction with the installation of multiple angles application programs.

Description

Method and device for detecting installation state of application program
Technical Field
The invention belongs to the field of computers, and particularly relates to a method and a device for detecting the installation state of an application program.
Background
Currently, the way to detect whether an application is installed correctly is mainly implemented by detecting the version of the file of the application and the version of the registry file of the application. However, it is not really detected whether the application program is installed correctly in this way.
First, it is not sufficient to detect only the file version of the application. Because the version of the file of the application program is correct, the content of the file is not tampered, for example, the content of the file can be tampered or even replaced by the current virus trojan or game plug-in, but the version number of the file cannot really reflect whether the application program is installed correctly or not at this time without changing the version of the file. In addition, except for the PE file (Portable execution file), other files of the application program are versioned, and at this time, the detection cannot be completed by checking the version number, and it cannot be detected whether the application program is installed correctly.
Furthermore, it is not sufficient to detect only the version of the registry file of the application. The registry file is static, and may not correspond to the real version of the file of the application at all, for example, if the file of an application is deleted and the version of the file is changed, but the registry file and the version thereof are not deleted correspondingly, at this time, the registry file of the application is not consistent with the real version of the file of the application, and whether the application is installed correctly or not can not be really detected by checking the version number of the registry file.
Disclosure of Invention
In view of the above, the technical problem to be solved by the present invention is to provide a method and an apparatus for detecting an installation status of an application, which can perform a thorough and detailed inspection on the installation of the application in combination with various angles.
In order to solve the technical problem, the invention discloses a method for detecting the installation state of an application program, which comprises the following steps: establishing a cloud database, wherein reference feature codes of all files collected by each application program are stored; maintaining a terminal configuration list, wherein an installation path of each application program installed on the terminal, all files installed by each application program obtained according to the installation path and a feature code of each file are recorded; extracting the feature codes of each file of the application program to be detected according to the terminal configuration list, comparing the feature codes in a cloud database, judging whether the application program to be detected is correctly installed on the terminal according to a comparison result, and feeding back the result to the terminal.
Further, the feature code is a feature code that uniquely identifies the file and the file content, and includes one or more of the following combinations: and the MD5 verification code, the secure hash algorithm check code and the cyclic redundancy check code are obtained through the operation of an information digest algorithm MD 5.
Further, the maintaining the terminal configuration list further includes: and when each application program adds a file and/or deletes the file and/or modifies the file content and/or modifies the file storage path, updating a corresponding record in the terminal configuration list.
Further, a reference key value written into a registry entry collected for each application program is also stored in the cloud database; the terminal configuration list also records a path of a registry key created by each application program installed on the terminal and a key value written into the registry key by each application program, which is obtained according to the path of the registry key; and extracting key values written into registry entries of the application program to be detected according to the terminal configuration list, comparing the key values in the cloud database, judging whether the application program to be detected is correctly set in the registry on the terminal according to a comparison result, and feeding back the result to the terminal.
Further, the maintaining the terminal configuration list further includes: and when each application program modifies the path of the registry key and/or adds the registry key and/or deletes the registry key and/or modifies the content of the system registry key, the corresponding record is also updated in the terminal configuration list.
Furthermore, a reference main process and a matched process and/or a whole dynamic link library and/or service created when each collected application program runs are also stored in the cloud database; the terminal configuration list also records a main process created when each application program installed on the terminal runs, and a process and/or a dynamic link library and/or a service called by the main process; and extracting a main process created when the application program to be detected runs and a process and/or a dynamic link library and/or a service called by the main process according to the terminal configuration list, comparing the main process and the process and/or the dynamic link library and/or the service in a cloud database, judging whether the application program to be detected runs correctly on the terminal according to a comparison result, and feeding back the correct operation to the terminal.
Further, the maintaining the terminal configuration list further includes: and when each application program adds a process and/or adds a matching process and/or adds a dynamic link library and/or adds a service and/or deletes a process, updating a corresponding record in the terminal configuration list.
Further, the feedback sent to the terminal when the application program to be detected is correctly installed on the terminal is judged according to the comparison result, and the feedback comprises: prompting that the application program to be detected is correctly installed on the terminal; and when the comparison result is used for judging that the application program to be detected is correctly set in the registry on the terminal, sending feedback to the terminal, wherein the feedback comprises the following steps: prompting that the application program to be detected is correctly set in a registry on the terminal; and judging feedback sent to the terminal when the application program to be detected runs correctly on the terminal according to the comparison result, wherein the feedback comprises the following steps: prompting the application program to be detected to operate correctly on the terminal; and when the application program to be detected is judged not to be correctly installed on the terminal and/or not to be correctly set in a registry on the terminal and/or not to be correctly operated on the terminal according to the comparison result, sending feedback to the terminal, wherein the feedback comprises one or more of the following combinations: prompting incorrect information of the application program to be detected, prompting to repair the application program to be detected, prompting to terminate operation of the application program to be detected, prompting to clean the application program to be detected, and prompting to reinstall the application program to be detected.
In order to solve the above technical problem, the present invention also discloses a device for detecting an installation state of an application program, comprising: the system comprises a cloud database, a cloud database management module, a terminal configuration list maintenance module and a comparison analysis module; the cloud database management module is used for establishing a cloud database; the cloud database is used for storing reference feature codes of all files collected by each application program; the terminal configuration list maintenance module is used for maintaining a terminal configuration list; the terminal configuration list is used for recording an installation path of each application program installed on the terminal, all files installed by each application program and feature codes of each file, wherein the files are obtained according to the installation path; and the comparison analysis module is used for extracting the feature codes of each file of the application program to be detected according to the terminal configuration list, comparing the feature codes in a cloud database, and judging whether the application program to be detected is correctly installed on the terminal according to a comparison result and feeding back the result to the terminal.
Further, the feature code extracted by the comparison analysis module is a feature code that uniquely identifies the file and the file content, and includes one or a combination of more of the following: and the MD5 verification code, the secure hash algorithm check code and the cyclic redundancy check code are obtained through the operation of an information digest algorithm MD 5.
Further, the terminal configuration list maintenance module is further configured to update a corresponding record in the terminal configuration list when a file is newly added and/or a file is deleted and/or a file content is modified and/or a file storage path is modified for each application program while maintaining the terminal configuration list.
Further, the cloud database is also used for storing reference key values written into registry entries collected by each application program; the terminal configuration list is further used for recording a path of a registry key created by each application program installed on the terminal and a key value written into the registry key by each application program, wherein the key value is acquired according to the path of the registry key; the comparison analysis module is further configured to extract key values written into the registry entry of the application program to be detected according to the terminal configuration list, compare the key values in the cloud database, and determine whether the application program to be detected is correctly set in the registry on the terminal according to a comparison result and feed the result back to the terminal.
Further, the terminal configuration list maintenance module is configured to, when maintaining the terminal configuration list, update a corresponding record in the terminal configuration list when each application modifies a path of a registry key and/or adds a registry key and/or deletes a registry key and/or modifies content of a system registry key.
Further, the cloud database is also used for storing a reference main process and a matched process and/or a whole dynamic link library and/or service which are created when each collected application program runs; the terminal configuration list is further used for recording a main process created when each application program installed on the terminal runs and a process and/or a dynamic link library and/or a service called by the main process; the comparison analysis module is further configured to extract a main process created when the application program to be detected runs according to the terminal configuration list, compare the process called by the main process and/or the dynamic link library and/or the service in a cloud database, determine whether the application program to be detected runs correctly on the terminal according to a comparison result, and feed back the result to the terminal.
Further, the terminal configuration list maintenance module is configured to, when maintaining the terminal configuration list, update a corresponding record in the terminal configuration list when each application adds a process and/or adds a matching process and/or adds a dynamic link library and/or adds a service and/or deletes a process.
Further, the comparing and analyzing module, according to the comparison result, determines the feedback sent to the terminal when the application program to be detected is correctly installed on the terminal, and includes: prompting that the application program to be detected is correctly installed on the terminal; the comparison analysis module is used for judging feedback sent to the terminal when the application program to be detected is correctly set in the registry on the terminal according to the comparison result, and the feedback comprises the following steps: prompting that the application program to be detected is correctly set in a registry on the terminal; the comparison analysis module is used for judging feedback sent to the terminal when the application program to be detected correctly runs on the terminal according to a comparison result, and comprises the following steps: prompting the application program to be detected to operate correctly on the terminal; the comparison analysis module is used for judging feedback sent to the terminal when the application program to be detected is not correctly installed on the terminal and/or is not correctly set in a registry on the terminal and/or is not correctly operated on the terminal according to a comparison result, and the feedback comprises one or more of the following combinations: prompting incorrect information of the application program to be detected, repairing the application program to be detected, terminating the operation of the application program to be detected, cleaning the application program to be detected, and reinstalling the application program to be detected.
Compared with the prior scheme, the invention has the following technical effects:
1) the application program is damaged due to virus trojan infection damage and poor fault tolerance of the application program, the non-PE data files such as dat files, lib files and the like, even system files can be damaged or lost at any time, the invention can identify the damage of the file content, and an intelligent, quick and convenient detection mode is particularly necessary.
2) The invention can identify the damage of the registry key, and can thoroughly trace whether the software can be basically and correctly started or not by the detection mode.
3) The invention can identify the damage of the memory loading item, thereby thoroughly tracing the reason that the memory loading item can not be correctly started after installation.
Drawings
FIG. 1 is a flow chart of a method of an embodiment of the present invention;
FIG. 2 is a flowchart of step S10 according to an embodiment of the present invention;
FIG. 3 is a flowchart of step S20 according to an embodiment of the present invention;
FIG. 4 is a flowchart of step S30 according to an embodiment of the present invention;
FIG. 5 is a diagram illustrating an apparatus according to an embodiment of the present invention.
Detailed Description
The following detailed description of the embodiments of the present invention will be provided in conjunction with the drawings and examples, so that how to implement the technical means for solving the technical problems and achieving the technical effects of the present invention can be fully understood and implemented.
The main idea of the present application
Respectively detecting the feature codes of each file of the application program to be detected, key values written into registry entries and memory loading entries in operation;
after the application program is installed, if the file content of the application program is modified by replacing other virus trojans or hooks, or the fault tolerance of the application program is poor, so that the file of the application program is damaged or deleted or replaced, the signature code can be verified.
After the application program is installed, different registry entries including an installation entry, a service entry, a startup entry, user registration information and the like are created in the registry, for example, the antivirus software loads the service entry with high priority before logging in after startup, the service entry needs to be started before the virus trojan is started, so that the normal operation of the antivirus software can be ensured, and therefore, key values written in the registry entries need to be detected.
After the application program is installed, the main process is started, then the main process can also call other matching processes, dynamic link libraries (dlls) and services by itself, under certain environments, the application program cannot normally start the process and load the matching processes, dlls and services, in addition, if other third party processes or dlls or other incorrect module application programs are injected, errors also occur, so that a memory loading item during operation needs to be detected, and the memory loading item comprises: the created host process and the process and/or dynamically linked library and/or service that the host process invokes.
Application scenarios of the present application
1) After the application program is installed by a user, a series of problems in use can be encountered, and even the software cannot be started; at the moment, the user often turns to customer service personnel, but the customer service personnel are difficult to trace the reason remotely, such as that the application program is not installed correctly or is damaged, or the functional problem of the application program is solved; the present invention is now suitable for intelligently checking whether a file is installed, whether registry entries (e.g., installation information, service entries, user information, etc.) are written, whether a process is started, dll modules are loaded, and services are started in a particular user environment.
2) When testing, a tester of an application program usually needs to test whether the application program is correctly installed, and then can further detect whether the function of the software is correct, for example, the installation of an office software which is large and reaches 1G, tens of thousands of files exist in the office software, thousands of registry entries need to be written, after the installation is finished, any link appears in the middle, whether the software is installed wrongly or is BUG of the software is difficult to trace, and the method is suitable for intelligently checking.
3) When the developers of the application program develop large-scale software, each developer is not responsible for the development of all modules, but is only responsible for the development and integrated debugging of partial modules, and in order to ensure the integrity of debugging, the method is suitable for intelligently checking whether the files are installed.
Of course, the present application is not limited to the above application scenarios, and there are other scenarios applicable to browsing mass data and editing data formats.
Description of the embodiments
The process of the present invention is illustrated below by way of an example. As shown in fig. 1, which is a flowchart of a method for detecting an installation state of an application according to an embodiment of the present invention, the following operations are performed:
and step S10, detecting the feature code of each file of the application program to be detected, and judging whether the application program to be detected is correctly installed on the terminal according to the detection result.
And step S20, detecting the key value written into the registry key by the application program to be detected, and judging whether the application program to be detected is correctly set on the terminal according to the detection result.
And step S30, detecting the memory loading item of the application program to be detected during operation, and judging whether the application program to be detected operates correctly on the terminal according to the detection result.
The installation state of the application program includes: whether the application program to be detected is correctly installed, correctly set and/or correctly operated on the terminal. The steps S10, S20, and S30 have no execution sequence, and may be executed simultaneously or sequentially in any sequence, so as to detect the status of the application to be detected from the above three parallel angles.
The above step S10 is explained below as an example. As shown in fig. 2, which is a flowchart of step S10 according to the embodiment of the present invention, the following operations are performed:
step S102, a cloud database is established, wherein reference feature codes of all files collected by each application program are stored;
the feature code is a feature code for uniquely identifying the file and the file content, and comprises one or more of the following combinations: the method comprises the steps of MD5 verification code obtained through operation of an information digest algorithm MD5, a secure hash algorithm SHA1 check code and a cyclic redundancy CRC check code.
The reference feature code can be a correct reference value which is judged to be correctly installed and is realized through a white list; the reference signature may also be a reference value that is erroneous and determined to be incorrectly installed, and is implemented by a blacklist.
Step S104, maintaining a terminal configuration list, wherein an installation path of each application program installed on the terminal, all files installed by each application program and feature codes of each file, which are obtained according to the installation path, are recorded;
acquiring an installation path of each application installed on the terminal through an API (application programming interface) function having a function of whether a file or a directory exists, such as a PathFileExists function for determining whether a path of a file system object of a file or a directory is valid; and acquiring all files installed by each application program, such as a FindFirstFile function and a FindNextFile function, by using the API function with the function of enumerating files or folders according to the installation path, wherein the FindFirstFile function is used for searching for files according to file names, and the FindNextFile function is used for searching for a next file according to a file name specified when the FindFirstFile function is called.
When each application program adds a file and/or deletes the file and/or modifies the file content (including the system file) and/or modifies the file storage path, the corresponding record is also updated in the terminal configuration list.
And step S106, extracting the feature codes of each file of the application program to be detected according to the terminal configuration list, comparing the feature codes in a cloud database, judging whether the application program to be detected is correctly installed on the terminal according to a comparison result, and feeding back the result to the terminal.
When the reference feature codes are stored in the white list of the cloud database, if the feature codes in the terminal configuration list are hit by the reference feature codes in the cloud database after comparison, it can be judged that the application program to be detected is correctly installed on the terminal; if the feature codes in one terminal configuration list are not hit by the reference feature codes in the cloud database after comparison, it can be determined that the application program to be detected is not correctly installed on the terminal.
When the reference feature codes are stored in the blacklist of the cloud database, if the comparison shows that only one feature code in the terminal configuration list is hit by the reference feature codes in the cloud database, the situation that the application program to be detected is not correctly installed on the terminal can be judged; and if the feature codes in the terminal configuration list are not hit by the reference feature codes in the cloud database after comparison, judging that the application program to be detected is correctly installed on the terminal.
And judging feedback sent to the terminal when the application program to be detected is correctly installed on the terminal according to the comparison result, wherein the feedback comprises the following steps: prompting that the application program to be detected is correctly installed on the terminal;
and judging feedback sent to the terminal when the application program to be detected is not correctly installed on the terminal according to the comparison result, wherein the feedback comprises one or more of the following combinations: prompting incorrect information of the application program to be detected, prompting to repair the application program to be detected, prompting to terminate operation of the application program to be detected, prompting to clean the application program to be detected, and prompting to reinstall the application program to be detected.
The above step S10 is explained below as an application example. The application program to be detected is exemplified by the position, the feature code is exemplified by the MD5, and the MD5 value can be obtained by a hash algorithm.
The cloud database holds reference MD5 values for all files collected by each application, where the reference MD5 value is the correct reference value, for example, including at least:
Fetion.exe&8af829e342a6b15696af9650ad5f805c
fxWebBrowser.exe&8af829e342a6b15696af9650ad5f8051
Fetion.lib&8af829e342a6b15696af9650ad5f8052
wherein, the version, fxwebbrowser. exe, version are files, 8af829e342a6b15696af9650ad5f805c is the MD5 value corresponding to the version, exe, 8af829e342a6b15696af9650ad5f8051 is the MD5 value corresponding to the fxwebbrowser. exe, and 8af829e342a6b15696af9650ad5f8052 is the MD5 value corresponding to the version.
The file path, the file and the MD5 value of the file are recorded in the terminal configuration list, for example:
File1="C:\ProgramFiles\ChinaMobile\Fetion\Fetion.exe"&8af829e342a6b15696af9650ad5f805c
File1="C:\ProgramFiles\ChinaMobile\Fetion\fxWebBrowser.exe"&8af829e342a6b15696af9650ad5f8051
File1="C:\ProgramFiles\ChinaMobile\Fetion\Fetion.lib"&8af829e342a6b15696af9650ad5f8052
in the above formats, the version, fxWebBrowser, exe and version are files, C \ Programfiles \ ChinaMobil \ version is a file path, 8af829e342a6b15696af9650ad5f805C is the MD5 value corresponding to the version, exe, 8af829e342a6b15696af9650ad5f8051 is the MD5 value corresponding to the fxWebBrowser, 8af829e342a6b 15996 af9650ad5f8051 is the MD5 value corresponding to the version, and the version is a non-PE file.
When the application program position adds a file (including a temporarily generated file), deletes the file, modifies the file content (including modifying a windows system file), and stores the path of the file, the parameters recorded in the terminal configuration list are automatically updated and adjusted.
Extracting the MD5 values of the position.exe, fxWebBrowser.exe and the position.lib of the position according to the terminal configuration list, comparing the values in a cloud database, and if the MD5 values in the terminal configuration list are hit by the reference MD5 value in the cloud database after comparison, judging that the application program to be detected is correctly installed on the terminal; if only one MD5 in the terminal configuration list is not hit by the reference MD5 value in the cloud database after comparison, it may be determined that the application to be detected is not correctly installed on the terminal.
The above step S20 is explained below as an example. As shown in fig. 3, which is a flowchart of step S20 according to the embodiment of the present invention, the following operations are performed:
step S202, a cloud database is established, wherein reference key values which are collected by each application program and written into registry entries are stored;
the reference key value can be a correct reference value which is judged to be correctly installed and is realized through a white list; the reference key value may also be a reference value that is erroneous and determined to be incorrectly installed, and is implemented by a blacklist.
Step S204, maintaining a terminal configuration list, wherein a path of a registry key created by each application program installed on the terminal and a key value written into the registry key by each application program obtained according to the path of the registry key are recorded;
acquiring a path of a registry key created by each application program and a key value written in the registry key, such as a SHGetValue function and a RegCreateKeyEx function, by using an API function having a function of performing read-write operation under a specified registry key, wherein the SHGetValue function is used for performing read-write operation under the specified registry key; the RegCreateKeyEx function is used in the Win32 environment for a complex way to create new items under a specified registry key.
And when each application program modifies the path of the registry key and/or adds the registry key and/or deletes the registry key and/or modifies the content of the system registry key, the corresponding record is also updated in the terminal configuration list.
Step S206, extracting key values written into registry entries of the application program to be detected according to the terminal configuration list, comparing the key values in the cloud database, judging whether the application program to be detected is correctly set in the registry on the terminal according to a comparison result, and feeding back the result to the terminal;
when the reference key values are stored in the white list of the cloud database, if the key values in the terminal configuration list are hit by the reference key values in the cloud database after comparison, it can be judged that the application program to be detected is correctly set on the terminal; if only one key value in the terminal configuration list is not hit by the reference key value in the cloud database after comparison, it can be determined that the application program to be detected is not correctly set on the terminal.
When the reference key values are stored in the blacklist of the cloud database, if the comparison shows that only one key value in the terminal configuration list is hit by the reference key value in the cloud database, the application program to be detected can be judged to be not correctly set on the terminal; if the key values in the terminal configuration list are not hit by the reference key values in the cloud database after comparison, it can be determined that the application program to be detected is correctly set on the terminal.
And when the comparison result is used for judging that the application program to be detected is correctly set in the registry on the terminal, sending feedback to the terminal, wherein the feedback comprises the following steps: prompting that the application program to be detected is correctly set in a registry on the terminal;
and feedback sent to the terminal when the application program to be detected is judged not to be correctly set in the registry on the terminal according to the comparison result, wherein the feedback comprises one or more of the following combinations: prompting incorrect information of the application program to be detected, prompting to repair the application program to be detected, prompting to terminate operation of the application program to be detected, prompting to clean the application program to be detected, and prompting to reinstall the application program to be detected.
The above step S20 is explained below as an application example. The application to be detected is for example the position.
The cloud database stores a reference key value of the write registry key collected for each application, where the reference key value is a correct reference value, and for example, the reference key value at least includes:
″\″C:\\Program Files\\China Mobile\\Fetion\\Fetion.exe\″\″%1\″″。
the terminal configuration list records a path of the registry key and a key value written into the registry key, for example:
[HKEY_CLASSES_ROOT\Applications\Fetion.exe\shell\open\command]="\"C:\\Program Files\\China Mobile\\Fetion\\Fetion.exe\″\″%1\″″
in the above formats, [ HKEY _ CLASSES _ ROOT \ Applications \ version \ \ shell \ open \ command ] is the path of the registry key, "\ \ Program Files \ China Mobile \ Fetion \ \ Fetion \. exe \" "% \ \ 1 \" is the key value of the registry key written.
When the application program position modifies the path of the registry, adds a registry key (including a temporarily generated registry key), deletes the registry key, and modifies the content of the registry key (including modifying the windows registry key), the parameters recorded in the terminal configuration list can be automatically updated and adjusted.
Extracting key values of registry entries written in by the position according to the terminal configuration list, comparing the key values in the registry entries in a cloud database, and if the key values in the terminal configuration list are hit by reference key values in the cloud database after comparison, judging that the application program to be detected is correctly set on the terminal; if only one key value in the terminal configuration list is not hit by the reference key value in the cloud database after comparison, it can be determined that the application program to be detected is not correctly set on the terminal.
The above step S30 is explained below as an example. As shown in fig. 4, which is a flowchart of step S30 according to the embodiment of the present invention, the following operations are performed:
step S302, a cloud database is established, wherein a reference main process and a matched process and/or all dynamic link libraries and/or services created when each collected application program runs are stored;
the reference main process and the matched processes and/or all dynamic link libraries and/or services can be correct reference values which are judged to be correctly installed and are realized through a white list; the reference main process and the matched processes and/or all dynamic link libraries and/or services can also be wrong reference values which are judged to be incorrectly installed, and the reference main process and the matched processes and/or all dynamic link libraries and/or services are realized through a blacklist.
Step S304, maintaining a terminal configuration list, wherein a main process created when each application program installed on the terminal runs and a process and/or a dynamic link library and/or a service called by the main process are recorded;
the method comprises the steps of obtaining a main process created by each application program during running and a process and/or a dynamic link library and/or a service called by the main process, such as a CreateToolhelp32Snapshot function, through an API function with a function of creating a Snapshot for a specified process, a HEAP used by the process, a MODULE and a THREAD, wherein the CreateToolhelp32Snapshot function is used for creating a Snapshot for the specified process, the HEAP used by the process [ HEAP ], the MODULE [ MODULE ] and the THREAD [ THREAD ].
And when each application program adds a process and/or adds a matching process and/or adds a dynamic link library and/or adds a service and/or deletes a process, updating a corresponding record in the terminal configuration list.
Step S306, extracting a main process created when the application program to be detected runs and a process and/or a dynamic link library and/or a service called by the main process according to the terminal configuration list, comparing the main process and the process and/or the dynamic link library and/or the service in a cloud database, judging whether the application program to be detected runs correctly on the terminal according to a comparison result, and feeding back the result to the terminal;
when the reference value is stored in the white list of the cloud database, if the main process in the terminal configuration list and the process and/or the dynamic link library and/or the service called by the main process are hit by the reference value in the cloud database after comparison, the application program to be detected can be judged to be correctly set on the terminal; if only one main process and the process and/or the dynamic link library and/or the service called by the main process are not hit by the reference value in the cloud database in the terminal configuration list after comparison, it can be judged that the application program to be detected is not correctly set on the terminal.
When the reference value is stored in the blacklist of the cloud database, if the comparison shows that only one main process and the process and/or the dynamic link library and/or the service called by the main process are hit by the reference key value in the cloud database in the terminal configuration list, it can be judged that the application program to be detected is not correctly set on the terminal; and if the main process in the terminal configuration list and the process and/or the dynamic link library and/or the service called by the main process are not hit by the reference key values in the cloud database after comparison, the application program to be detected can be judged to be correctly set on the terminal.
And judging feedback sent to the terminal when the application program to be detected runs correctly on the terminal according to the comparison result, wherein the feedback comprises the following steps: prompting the application program to be detected to operate correctly on the terminal;
and judging feedback sent to the terminal when the application program to be detected does not operate correctly on the terminal according to the comparison result, wherein the feedback comprises one or more of the following combinations: prompting incorrect information of the application program to be detected, prompting to repair the application program to be detected, prompting to terminate operation of the application program to be detected, prompting to clean the application program to be detected, and prompting to reinstall the application program to be detected.
The above step S30 is explained below as an application example. The application to be detected is for example the position.
The cloud database stores a reference main process and a matched process and/or a whole dynamic link library and/or service created when each collected application program runs, and the reference main process and the matched process and/or the whole dynamic link library and/or service are correct reference values, for example, the reference values at least include:
main process position.exe, supporting dynamic link library ADVAPI32.dll and Avatarx.dll.
The terminal configuration list records the main process created by each application program during operation and the process and/or dynamic link library and/or service called by the main process, such as:
Exe1=Fetion.exe&ADVAPI32.dll&AvatarX.dll
Exe2=…
in the above format, the position.exe is the main process, the advapi32.dll is the dynamic link library of the main process position.exe, and the avatar x.dll is also the dynamic link library of the main process position.exe.
When the application program position adds a process (including a temporarily loaded process), adds a matched dll (including a process or dll needing to be injected into a windows system), adds a matched service, and deletes the process, parameters recorded in the terminal configuration list can be automatically updated and adjusted.
Extracting a reference main process and a matched process and/or all dynamic link libraries and/or services created during the position operation according to the terminal configuration list, comparing the reference main process and the matched process and/or all dynamic link libraries and/or services in a cloud database, and if the main process and the matched process and/or all dynamic link libraries and/or services in the terminal configuration list are hit by a reference value in the cloud database after comparison, judging that the application program to be detected is correctly operated on the terminal; if the main process and the matched processes and/or all dynamic link libraries and/or services in the terminal configuration list are not hit by the reference value in the cloud database after comparison, it can be determined that the application program to be detected is not operated correctly on the terminal.
The device of the invention is described below in three embodiments of the device, which correspond to the above-mentioned method sequence, and for the disadvantages, reference is made to the above-mentioned method section. As shown in fig. 5, the apparatus for detecting the installation state of an application includes: the system comprises a cloud database 1, a cloud database management module 2, a terminal configuration list 3, a terminal configuration list maintenance module 4 and a comparison analysis module 5.
First apparatus embodiment
The cloud database management module 2 is used for establishing a cloud database 1;
the cloud database 1 is used for storing reference feature codes of all files collected by each application program;
the terminal configuration list maintenance module 4 is used for maintaining a terminal configuration list 3;
the terminal configuration list 3 is used for recording an installation path of each application program installed on the terminal, all files installed by each application program and feature codes of each file, wherein the files are obtained according to the installation path;
the comparison analysis module 5 is configured to extract a feature code of each file of the application program to be detected according to the terminal configuration list 3, compare the feature codes in the cloud database 1, and determine whether the application program to be detected is correctly installed on the terminal according to a comparison result and feed back the result to the terminal.
The terminal configuration list maintenance module 4 is further configured to obtain an installation path of each application program installed on the terminal through an application programming interface API function having a function of whether a file or a directory exists when maintaining the terminal configuration list 3; and further obtaining all files installed by each application program through an API function with a function of enumerating files or folders according to the installation path.
The terminal configuration list maintenance module 4 is further configured to update corresponding records in the terminal configuration list 3 when each application adds a file and/or deletes a file and/or modifies file contents (including system files) and/or modifies file storage paths while maintaining the terminal configuration list 3.
The feature code is a feature code for uniquely identifying the file and the file content, and comprises one or more of the following combinations: and the MD5 verification code, the secure hash algorithm check code and the cyclic redundancy check code are obtained through the operation of an information digest algorithm MD 5.
The comparison analysis module 5, which determines the feedback sent to the terminal when the application program to be detected is correctly installed on the terminal according to the comparison result, includes: prompting that the application program to be detected is correctly installed on the terminal; and judging feedback sent to the terminal when the application program to be detected is not correctly installed on the terminal according to the comparison result, wherein the feedback comprises one or more of the following combinations: prompting incorrect information of the application program to be detected, repairing the application program to be detected, terminating the operation of the application program to be detected, cleaning the application program to be detected, and reinstalling the application program to be detected.
Second apparatus embodiment
The cloud database management module 2 is used for establishing a cloud database 1;
the cloud database 1 is used for storing reference key values written into registry entries collected by each application program;
the terminal configuration list maintenance module 4 is used for maintaining a terminal configuration list 3;
the terminal configuration list 3 is used for recording a path of a registry key created by each application program installed on the terminal and a key value written into the registry key by each application program, which is obtained according to the path of the registry key;
the comparison analysis module 5 is configured to extract, according to the terminal configuration list 3, a key value written into a registry entry of the application to be detected, compare the key value in the cloud database 1, and determine, according to a comparison result, whether the application to be detected is correctly set in the registry on the terminal and feed back the result to the terminal.
The terminal configuration list maintenance module 4 is further configured to obtain, when maintaining the terminal configuration list 3, a path of the registry key created by each application program and a key value written in the registry key through an API function having a function of performing a read-write operation under a specified registry key.
The terminal configuration list maintenance module 4 is further configured to update a corresponding record in the terminal configuration list 3 when each application modifies a path of a registry key and/or adds a registry key and/or deletes a registry key and/or modifies content of a system registry key while maintaining the terminal configuration list 3.
The comparison analysis module 5, which sends feedback to the terminal when determining that the application to be detected is correctly set in the registry on the terminal according to the comparison result, includes: prompting that the application program to be detected is correctly set in a registry on the terminal; and feedback sent to the terminal when the application program to be detected is judged not to be correctly set in the registry on the terminal according to the comparison result, wherein the feedback comprises one or more of the following combinations: prompting incorrect information of the application program to be detected, repairing the application program to be detected, terminating the operation of the application program to be detected, cleaning the application program to be detected, and reinstalling the application program to be detected.
Third apparatus embodiment
The cloud database management module 2 is used for establishing a cloud database 1;
the cloud database 1 is used for storing a reference main process and matched processes and/or all dynamic link libraries and/or services which are created when each collected application program runs;
the terminal configuration list maintenance module 4 is used for maintaining a terminal configuration list 3;
the terminal configuration list 3 is further configured to record a main process created when each application installed on the terminal runs, and a process and/or a dynamic link library and/or a service called by the main process;
the comparison analysis module 5 is further configured to extract a main process created when the application to be detected runs and a process and/or a dynamic link library and/or a service called by the main process according to the terminal configuration list 3, compare the main process and the process and/or the dynamic link library and/or the service called by the main process in the cloud database 1, determine whether the application to be detected runs correctly on the terminal according to a comparison result, and feed back the result to the terminal.
The terminal configuration list maintenance module 4 is further configured to, when maintaining the terminal configuration list 3, obtain, through an API function having a function of creating a snapshot for a specified process, a heap used by the process, a module, and a thread, a main process created during the running of each application program, and a process and/or a dynamic link library and/or a service called by the main process.
The terminal configuration list maintenance module 4 is further configured to update a corresponding record in the terminal configuration list 3 when a new process and/or a new matching process and/or a new dynamic link library and/or a new service and/or a process deletion is performed on each application program while the terminal configuration list 3 is maintained.
The comparison analysis module 5, which determines the feedback sent to the terminal when the application program to be detected correctly runs on the terminal according to the comparison result, includes: prompting the application program to be detected to operate correctly on the terminal; and judging feedback sent to the terminal when the application program to be detected does not operate correctly on the terminal according to the comparison result, wherein the feedback comprises one or more of the following combinations: prompting incorrect information of the application program to be detected, repairing the application program to be detected, terminating the operation of the application program to be detected, cleaning the application program to be detected, and reinstalling the application program to be detected.
It should be noted that the embodiments and features of the embodiments of the present invention may be arbitrarily combined with each other without conflict.
The present invention is capable of other embodiments, and various changes and modifications may be made by one skilled in the art without departing from the spirit and scope of the invention.
It will be understood by those skilled in the art that all or part of the steps of the above methods may be performed by instructions of a program and associated hardware, and that the program may be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, and the like. Alternatively, all or part of the steps of the above embodiments may be implemented using one or more integrated circuits. Accordingly, each module/unit in the above embodiments may be implemented in the form of hardware, and may also be implemented in the form of a software functional module. The present invention is not limited to any specific form of combination of hardware and software.

Claims (14)

1. A method for detecting an installation status of an application, comprising:
establishing a cloud database, wherein reference feature codes of all files collected by each application program are stored;
maintaining a terminal configuration list, wherein an installation path of each application program installed on the terminal, all files installed by each application program obtained according to the installation path and a feature code of each file are recorded;
extracting feature codes of each file of the application program to be detected according to the terminal configuration list, comparing the feature codes in a cloud database, judging whether the application program to be detected is correctly installed on the terminal according to a comparison result, and feeding back the result to the terminal;
wherein,
the cloud database also stores reference key values written into registry entries collected by each application program;
the terminal configuration list also records a path of a registry key created by each application program installed on the terminal and a key value written into the registry key by each application program, which is obtained according to the path of the registry key;
and extracting key values written into registry entries of the application program to be detected according to the terminal configuration list, comparing the key values in the cloud database, judging whether the application program to be detected is correctly set in the registry on the terminal according to a comparison result, and feeding back the result to the terminal.
2. The method of claim 1,
the feature code is a feature code for uniquely identifying the file and the file content, and comprises one or more of the following combinations: and the MD5 verification code, the secure hash algorithm check code and the cyclic redundancy check code are obtained through the operation of an information digest algorithm MD 5.
3. The method of claim 1 or 2, wherein the maintaining a terminal configuration list further comprises:
and when each application program adds a file and/or deletes the file and/or modifies the file content and/or modifies the file storage path, updating a corresponding record in the terminal configuration list.
4. The method of claim 1, wherein the maintaining the terminal configuration list further comprises:
and when each application program modifies the path of the registry key and/or adds the registry key and/or deletes the registry key and/or modifies the content of the system registry key, the corresponding record is also updated in the terminal configuration list.
5. The method of claim 1,
the cloud database also stores a reference main process and matched processes and/or all dynamic link libraries and/or services which are created when each collected application program runs;
the terminal configuration list also records a main process created when each application program installed on the terminal runs, and a process and/or a dynamic link library and/or a service called by the main process;
and extracting a main process created when the application program to be detected runs and a process and/or a dynamic link library and/or a service called by the main process according to the terminal configuration list, comparing the main process and the process and/or the dynamic link library and/or the service in a cloud database, judging whether the application program to be detected runs correctly on the terminal according to a comparison result, and feeding back the correct operation to the terminal.
6. The method of claim 5, wherein the maintaining the terminal configuration list further comprises:
and when each application program adds a process and/or adds a matching process and/or adds a dynamic link library and/or adds a service and/or deletes a process, updating a corresponding record in the terminal configuration list.
7. The method of claim 5 or 6,
and judging feedback sent to the terminal when the application program to be detected is correctly installed on the terminal according to the comparison result, wherein the feedback comprises the following steps: prompting that the application program to be detected is correctly installed on the terminal;
and when the comparison result is used for judging that the application program to be detected is correctly set in the registry on the terminal, sending feedback to the terminal, wherein the feedback comprises the following steps: prompting that the application program to be detected is correctly set in a registry on the terminal;
and judging feedback sent to the terminal when the application program to be detected runs correctly on the terminal according to the comparison result, wherein the feedback comprises the following steps: prompting the application program to be detected to operate correctly on the terminal;
and when the application program to be detected is judged not to be correctly installed on the terminal and/or not to be correctly set in a registry on the terminal and/or not to be correctly operated on the terminal according to the comparison result, sending feedback to the terminal, wherein the feedback comprises one or more of the following combinations: prompting incorrect information of the application program to be detected, prompting to repair the application program to be detected, prompting to terminate operation of the application program to be detected, prompting to clean the application program to be detected, and prompting to reinstall the application program to be detected.
8. An apparatus for detecting an installation status of an application, comprising: the system comprises a cloud database, a cloud database management module, a terminal configuration list maintenance module and a comparison analysis module;
the cloud database management module is used for establishing a cloud database;
the cloud database is used for storing reference feature codes of all files collected by each application program;
the terminal configuration list maintenance module is used for maintaining a terminal configuration list;
the terminal configuration list is used for recording an installation path of each application program installed on the terminal, all files installed by each application program and feature codes of each file, wherein the files are obtained according to the installation path;
the comparison analysis module is used for extracting the feature codes of each file of the application program to be detected according to the terminal configuration list, comparing the feature codes in a cloud database, and judging whether the application program to be detected is correctly installed on the terminal and feeding back the result to the terminal according to the comparison result;
wherein,
the cloud database is also used for storing reference key values which are collected by each application program and written into registry entries;
the terminal configuration list is further used for recording a path of a registry key created by each application program installed on the terminal and a key value written into the registry key by each application program, wherein the key value is acquired according to the path of the registry key;
the comparison analysis module is further configured to extract key values written into the registry entry of the application program to be detected according to the terminal configuration list, compare the key values in the cloud database, and determine whether the application program to be detected is correctly set in the registry on the terminal according to a comparison result and feed the result back to the terminal.
9. The apparatus of claim 8,
the comparison analysis module extracts the feature codes which are unique feature codes for identifying the files and the file contents, and the comparison analysis module comprises one or more of the following combinations: and the MD5 verification code, the secure hash algorithm check code and the cyclic redundancy check code are obtained through the operation of an information digest algorithm MD 5.
10. The apparatus of claim 8 or 9,
the terminal configuration list maintenance module is used for updating corresponding records in the terminal configuration list when each application program adds a file newly and/or deletes the file and/or modifies the file content and/or modifies the file storage path when maintaining the terminal configuration list.
11. The apparatus of claim 8,
the terminal configuration list maintenance module is further configured to update a corresponding record in the terminal configuration list when each application modifies a path of a registry key and/or adds a registry key and/or deletes a registry key and/or modifies content of a system registry key while maintaining the terminal configuration list.
12. The apparatus of claim 8,
the cloud database is also used for storing a reference main process and matched processes and/or all dynamic link libraries and/or services which are created when each collected application program runs;
the terminal configuration list is further used for recording a main process created when each application program installed on the terminal runs and a process and/or a dynamic link library and/or a service called by the main process;
the comparison analysis module is further configured to extract a main process created when the application program to be detected runs according to the terminal configuration list, compare the process called by the main process and/or the dynamic link library and/or the service in a cloud database, determine whether the application program to be detected runs correctly on the terminal according to a comparison result, and feed back the result to the terminal.
13. The apparatus of claim 12,
the terminal configuration list maintenance module is used for updating corresponding records in the terminal configuration list when a new process and/or a new matching process and/or a new dynamic link library and/or a new service and/or a process is added to each application program when the terminal configuration list is maintained.
14. The apparatus of claim 12 or 13,
the comparison analysis module is used for judging feedback sent to the terminal when the application program to be detected is correctly installed on the terminal according to a comparison result, and the feedback comprises the following steps: prompting that the application program to be detected is correctly installed on the terminal;
the comparison analysis module is used for judging feedback sent to the terminal when the application program to be detected is correctly set in the registry on the terminal according to the comparison result, and the feedback comprises the following steps: prompting that the application program to be detected is correctly set in a registry on the terminal;
the comparison analysis module is used for judging feedback sent to the terminal when the application program to be detected correctly runs on the terminal according to a comparison result, and comprises the following steps: prompting the application program to be detected to operate correctly on the terminal;
the comparison analysis module is used for judging feedback sent to the terminal when the application program to be detected is not correctly installed on the terminal and/or is not correctly set in a registry on the terminal and/or is not correctly operated on the terminal according to a comparison result, and the feedback comprises one or more of the following combinations: prompting incorrect information of the application program to be detected, repairing the application program to be detected, terminating the operation of the application program to be detected, cleaning the application program to be detected, and reinstalling the application program to be detected.
CN201210215997.3A 2012-06-26 2012-06-26 A kind of method and device detecting the installment state of application program Active CN102736978B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210215997.3A CN102736978B (en) 2012-06-26 2012-06-26 A kind of method and device detecting the installment state of application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210215997.3A CN102736978B (en) 2012-06-26 2012-06-26 A kind of method and device detecting the installment state of application program

Publications (2)

Publication Number Publication Date
CN102736978A CN102736978A (en) 2012-10-17
CN102736978B true CN102736978B (en) 2015-09-30

Family

ID=46992519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210215997.3A Active CN102736978B (en) 2012-06-26 2012-06-26 A kind of method and device detecting the installment state of application program

Country Status (1)

Country Link
CN (1) CN102736978B (en)

Families Citing this family (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103001947B (en) * 2012-11-09 2015-09-30 北京奇虎科技有限公司 A kind of program processing method and system
CN102999606B (en) * 2012-11-21 2015-12-23 东莞宇龙通信科技有限公司 software deleting method and device
CN103023885B (en) * 2012-11-26 2015-09-16 北京奇虎科技有限公司 Secure data processing method and system
CN103067364B (en) 2012-12-21 2015-11-25 华为技术有限公司 Method for detecting virus and equipment
CN103077353B (en) * 2013-01-24 2015-12-02 北京奇虎科技有限公司 The method and apparatus of Initiative Defense rogue program
CN104102539B (en) * 2013-04-09 2019-06-28 腾讯科技(深圳)有限公司 Obtain the method and device in the bottom library that application program for mobile terminal calls
CN104113443B (en) * 2013-04-19 2018-10-02 南京中兴新软件有限责任公司 A kind of network device detection methods, device and cloud detection system
CN103235730A (en) * 2013-04-27 2013-08-07 天津长瑞华通科技发展有限公司 Portable management device based on C/S (client/server) client software and implementation method of device
US9591003B2 (en) * 2013-08-28 2017-03-07 Amazon Technologies, Inc. Dynamic application security verification
CN103473163B (en) * 2013-09-11 2016-10-26 腾讯科技(深圳)有限公司 application program detection method and device
CN103645922B (en) * 2013-12-25 2017-12-22 北京奇虎科技有限公司 It is a kind of that the method, apparatus and system for carrying out software cleaning are inquired about based on cloud
CN103701922B (en) * 2013-12-31 2017-06-06 曙光云计算技术有限公司 The method and system of the application security deployment of PAAS platforms
CN103810105B (en) * 2014-03-06 2016-08-31 中国工商银行股份有限公司 application version detection method and device
CN104932965B (en) * 2014-03-18 2019-05-28 北京奇虎科技有限公司 Object method for real-time monitoring and device
CN104317699A (en) * 2014-07-24 2015-01-28 小米科技有限责任公司 Application program verifying method and device
CN104219323A (en) * 2014-09-18 2014-12-17 深圳市中兴移动通信有限公司 Application downloading method and mobile terminal
CN104239215B (en) * 2014-09-30 2018-02-02 北京奇虎科技有限公司 The investigation method and apparatus of garbageware
CN104346206B (en) * 2014-10-30 2018-06-01 北京奇虎科技有限公司 A kind of method and system of unloaded software rejuvenation installation
CN105117644B (en) * 2015-08-26 2018-08-28 福建天晴数码有限公司 Acquire Android plug-in program method and system
US9870215B2 (en) 2015-11-30 2018-01-16 International Business Machines Corporation Tracking an application installation state
CN105487935B (en) * 2015-12-07 2017-06-23 中南大学 A kind of acquisition methods of taking the initiative in offering a hand based on environment sensing
CN105554096A (en) * 2015-12-11 2016-05-04 鹏博士电信传媒集团股份有限公司 Method and system for realizing cloud game cloud service
CN105631318B (en) * 2015-12-23 2019-04-05 珠海豹趣科技有限公司 A kind of acquisition methods and device of registration table key assignments
CN107786527B (en) * 2016-08-31 2021-11-05 阿里巴巴集团控股有限公司 Method and equipment for realizing service discovery
CN109376505A (en) * 2017-08-02 2019-02-22 武汉斗鱼网络科技有限公司 Guard method and device on a kind of andriod platform to so file
CN107766212B (en) * 2017-11-30 2021-06-01 北京小米移动软件有限公司 Method and device for determining installation state of application program
CN108563453A (en) * 2018-04-02 2018-09-21 郑州云海信息技术有限公司 A kind of recognition methods of application program installation and system
TWI730415B (en) * 2019-09-18 2021-06-11 財團法人工業技術研究院 Detection system, detection method, and an update verification method performed by using the detection method
CN112910882B (en) * 2021-01-28 2022-08-12 山东有人物联网股份有限公司 Network management method, device, system and computer readable storage medium
CN113052641A (en) * 2021-04-21 2021-06-29 湖南快乐阳光互动娱乐传媒有限公司 Processing method and device of activity reward data, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6560776B1 (en) * 2000-02-18 2003-05-06 Avaya Technology Corp. Software installation verification tool
CN1955971A (en) * 2005-10-27 2007-05-02 北京振戎融通通信技术有限公司 Safety installation method suitable for Java application program
CN101017435A (en) * 2006-04-14 2007-08-15 北京瑞星国际软件有限公司 Method and apparatus used for upgrading software
CN101789888A (en) * 2010-01-12 2010-07-28 腾讯科技(深圳)有限公司 Detection method and device for software installation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6560776B1 (en) * 2000-02-18 2003-05-06 Avaya Technology Corp. Software installation verification tool
CN1955971A (en) * 2005-10-27 2007-05-02 北京振戎融通通信技术有限公司 Safety installation method suitable for Java application program
CN101017435A (en) * 2006-04-14 2007-08-15 北京瑞星国际软件有限公司 Method and apparatus used for upgrading software
CN101789888A (en) * 2010-01-12 2010-07-28 腾讯科技(深圳)有限公司 Detection method and device for software installation

Also Published As

Publication number Publication date
CN102736978A (en) 2012-10-17

Similar Documents

Publication Publication Date Title
CN102736978B (en) A kind of method and device detecting the installment state of application program
US9910743B2 (en) Method, system and device for validating repair files and repairing corrupt software
CN106951345B (en) Consistency test method and device for disk data of virtual machine
CN110162977B (en) Android vehicle-mounted terminal system vulnerability detection system and method
CN103150231B (en) The method of computer booting and computer system
US9804933B2 (en) System differential upgrade method, apparatus, and mobile terminal
KR100868762B1 (en) Method of error detecting method for embedded sofeware
CN110348218B (en) Vulnerability testing method and device based on vehicle-mounted terminal system
CN107783776B (en) Processing method and device of firmware upgrade package and electronic equipment
US20090319653A1 (en) Server configuration management method
CN101382914B (en) Testing method and device for software update file
CN107346284B (en) Application program detection method and detection device
CN107818029B (en) Automatic test method for cloud hard disk data recovery consistency
CN103019722B (en) A kind of method and device extracting Java network application AKU
KR20100050380A (en) Automated firmware recovery
US8799716B2 (en) Heap dump occurrence detection
CN106708550B (en) Method and device for loading shared object library
Kröll et al. Aristoteles–dissecting apple’s baseband interface
JPWO2005103909A1 (en) Security maintenance method, data storage device, security maintenance server, and recording medium recording the program
CN104239112A (en) Device driver installation method and device
CN112579330A (en) Method, device and equipment for processing abnormal data of operating system
KR20180023575A (en) Firmware auto updating method and computer readable recording medium writing firmware auto updating method
CN106445737A (en) Multi-backup starting method
CN107220174B (en) Automatic testing method and device
CN110096888B (en) Method and system for accelerating verification and analyzing SMM potential safety hazard

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
ASS Succession or assignment of patent right

Owner name: QIZHI SOFTWARE (BEIJING) CO., LTD.

Effective date: 20120910

Owner name: BEIJING QIHU TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: QIZHI SOFTWARE (BEIJING) CO., LTD.

Effective date: 20120910

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100016 CHAOYANG, BEIJING TO: 100088 XICHENG, BEIJING

TA01 Transfer of patent application right

Effective date of registration: 20120910

Address after: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Applicant after: Qizhi software (Beijing) Co.,Ltd.

Address before: The 4 layer 100016 unit of Beijing city Chaoyang District Jiuxianqiao Road No. 14 Building C

Applicant before: Qizhi software (Beijing) Co.,Ltd.

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220720

Address after: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230703

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing Hongxiang Technical Service Co.,Ltd.

Address before: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee before: 3600 Technology Group Co.,Ltd.

CP03 Change of name, title or address

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing 360 Zhiling Technology Co.,Ltd.

Country or region after: China

Address before: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee before: Beijing Hongxiang Technical Service Co.,Ltd.

Country or region before: China