CN103065090A - Method and device for intercepting malicious advertisements of application program - Google Patents
Method and device for intercepting malicious advertisements of application program Download PDFInfo
- Publication number
- CN103065090A CN103065090A CN2012105629275A CN201210562927A CN103065090A CN 103065090 A CN103065090 A CN 103065090A CN 2012105629275 A CN2012105629275 A CN 2012105629275A CN 201210562927 A CN201210562927 A CN 201210562927A CN 103065090 A CN103065090 A CN 103065090A
- Authority
- CN
- China
- Prior art keywords
- application program
- malice
- malicious code
- advertising platform
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 230000000903 blocking effect Effects 0.000 claims description 22
- 230000008569 process Effects 0.000 claims description 7
- 238000011017 operating method Methods 0.000 claims 1
- 230000006855 networking Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention is applicable to the technical field of mobile terminals and provides a method and a device for intercepting malicious advertisements of an application program. The method includes scanning an application program installed on a mobile terminal; judging whether malicious advertisement platform codes are inlaid in the application program; and isolating a malicious advertisement platform in the application program when the malicious advertisement platform codes are inlaid in the application program so that the malicious advertisement platform codes are invalidated and the malicious advertisement platform can not operate. According to the method and the device for intercepting the malicious advertisements of the application program, when the malicious advertisement platform codes are detected to be inlaid in the application program, the malicious advertisement platform is isolated by means of a technical means so that when the application program is operated, code sections corresponding to the malicious advertisement platform are not executed, the problems of automatic networking and popping up of the malicious advertisements can be prevented, simultaneously, using of the application program can not be influenced, problems existing in background operation of the malicious advertisements are thoroughly solved, and a good using environment of the mobile terminal is provided for a user.
Description
Technical field
The invention belongs to field of mobile terminals, relate in particular to a kind of application program malice Ad blocking method and device.
Background technology
In recent years, intelligent mobile terminal is more and more universal, such as smart mobile phone, palm PC etc., application program obtains exponential growth, application program has increased the playability of portable terminal, the user can use portable terminal to see novel, see video, surf the web, play games etc., but some software developers are arranged for the advertisement promotion expense, meeting built-in malice advertising platform in the application program of oneself, when the user in portable terminal, installed be built-in with malice advertising platform application program after, the malice advertising platform can be at system's backstage automatic coupling network operation, push out some malice advertisements, the malice advertisement not only can be wasted user's flow, simultaneously also hindered the user normally to use portable terminal, such as when the user when using portable terminal, perhaps portable terminal is when standby, the malice advertisement pushes on the backstage and demonstrates an advertisement information, the user may think it is system message and check related content by mistake, advertisement information when just finding after but click is opened, this can have influence on the experience that the user uses portable terminal greatly, therefore some now also occur and detected the detection software whether application program comprises the malice advertisement, whether but this detection software can only detect application program comprises the malice advertisement, even detect also and can't process this application program, the user can only select to unload this application program, further, detect the network savvy that software can limit this application program, but must use the application program of network connection for some, if limit its network savvy, this application program has also just lost effect.
Summary of the invention
In view of the above problems, the object of the present invention is to provide a kind of application program malice Ad blocking method and device, be intended to solve existing malice purposes of commercial detection software and can only detect whether comprise the malice advertisement in the application program, can't under the prerequisite that does not affect the application program use, tackle the technical matters of malice advertisement.
On the one hand, described application program malice Ad blocking method comprises the steps:
The application program of installing on the scanning portable terminal;
Judge and whether be embedded with malice advertising platform code in the described application program;
When judgement is, isolate the malice advertising platform in the described application program, so that the code of described malice advertising platform lost efficacy, can't move.。
On the other hand, described application program malice Ad blocking device comprises:
The program scanning unit is used for the application program of installing on the scanning portable terminal;
The malicious code judging unit is used for judging whether described application program is embedded with malice advertising platform code;
Malice advertisement isolated location is used for isolating the malice advertising platform in the described application program when the malicious code judgment unit judges is, so that the code of described malice advertising platform lost efficacy, can't move.。
The invention has the beneficial effects as follows: in technical solution of the present invention, when in detecting application program, being embedded with malice advertising platform code, the operation technique means are isolated this malice advertising platform, so that when running application, do not carry out code segment corresponding to this malice advertising platform, the malice advertisement is networked automatically, the problems such as ejection with regard to not occurring like this, also can not have influence on simultaneously the use of this application program, thoroughly solved the running background problem of malice advertisement, for the user provides a good portable terminal environment for use.
Description of drawings
Fig. 1 is the process flow diagram of the application program malice Ad blocking method that provides of first embodiment of the invention;
Fig. 2 is the process flow diagram of the application program malice Ad blocking method that provides of second embodiment of the invention;
Fig. 3 is the block diagram of the application program malice Ad blocking device that provides of third embodiment of the invention;
Fig. 4 is the block diagram of the application program malice Ad blocking device that provides of fourth embodiment of the invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
For technical solutions according to the invention are described, describe below by specific embodiment.
Embodiment one:
Fig. 1 shows the flow process of the application program malice Ad blocking method that first embodiment of the invention provides, and only shows for convenience of explanation the part relevant with the embodiment of the invention.
The application program malice Ad blocking method that the present embodiment provides comprises the steps:
The application program of installing on step S101, the scanning portable terminal.
This step does not limit the concrete time of scanning application program, can be in set up applications, to scan this application program, also can be after being subjected to user's button triggering, begin each application program on the unified scanning portable terminal, be preferably and in set up applications, carry out program scanning.
Step S102, judge whether be embedded with malice advertising platform code in the described application program.
At present malice advertisement all has some malice advertising platform businessmans to provide, they can provide a cover built-in SDK(Software Development Kit, SDK (Software Development Kit)), institute's most is the jar form, so form is also arranged, be used for using built-in advertising to the third party, reach advertising goal.These malice advertising platform SDK is disclosed, therefore as long as preserve described malice advertising platform SDK in this locality or the server, by direct this locality relatively or networking relatively, can judge whether be embedded with malice advertising platform code in the described application program.
Step S103, when judgement is, isolate the malice advertising platform in the described application program so that the code of described malice advertising platform lost efficacy, can't move.
When in detecting application program, being embedded with malice advertising platform code, directly isolate described malice advertising platform, the code of malice advertising platform is not carried out, like this malice advertising platform with regard to can not network, ejection or advertisement, can thoroughly stop the advertisement behavior, this step is only isolated the malice advertising platform in the described application program simultaneously, can not have influence on the main part of application program, the user still can use this application program, nor can pop-up advertisement.
Embodiment two:
Fig. 2 shows the flow process of the application program malice Ad blocking method that second embodiment of the invention provides, and only shows for convenience of explanation the part relevant with the embodiment of the invention.
The application program malice Ad blocking method that the present embodiment provides comprises the steps:
Step S201, in the malice advertising database, upgrade the SDK (Software Development Kit) of malice advertising platform.
The ad content of the required propelling movement of malice advertising platform is not that one deck is constant yet, therefore advertiser can not timing upgrade, change malice advertising platform SDK content, also may increase new advertising platform, therefore we need to provide a cover mechanism in system, can dynamically collect and add these malice advertising platforms SDK, therefore in this step, the malice advertising platform SDK that collected is kept in the malice advertising database, its content is upgraded in not timing, so that the data in the malice advertising database are up-to-date all the time, improve the Ad blocking success ratio.
The application program of installing on step S202, the scanning portable terminal;
Step S203, analyze described application program;
Step S204, judge whether comprise the malicious code file that provides of SDK (Software Development Kit) in the malice advertising database in the described application program;
Step S205, when including the malicious code file in the described application program, pseudo-malicious code file like the built-in and described malicious code files classes in system.
Owing in the malice advertising database, having preserved malice advertising platform SDK, therefore by the source code of application program relatively and the malicious code file of malice advertising platform SDK, can judge and include the malicious code file in the described application program.
The SDK that present malice advertising platform provides, substantially all be the jar form, when the java virtual machine loads the class file, first in the class path of system, look for certain class, only having in the system path does not have, just can go to the path of application program to look for, for this reason according to above-mentioned thought, in step S205, at first need to be in system pseudo-malicious code file like the built-in and described malicious code files classes, for the malicious code file of jar form, here in system built-in one with similar pseudo-malicious code file, i.e. pseudo-jar file, similar pseudo-malicious code file described here equally also is the jar form, preferably, this puppet malicious code file is not carried out any operation, like this when opening application program, because system is built-in with pseudo-jar file, therefore will remove first to load this puppet jar file, and can not remove to carry out in the application program jar file of malice advertising platform, reach the purpose of the malicious code jar file of shielding malice advertising platform SDK.In order to isolate malice advertising platform as much as possible, also need to collect the malicious code jar file of detailed as far as possible malice advertising platform SDK, and be customized to similar pseudo-jar file and be built into system.
Equally, for malicious code so file, the order that linux loads so file also is well-regulated, equally also can finish by built-in pseudo-malicious code so file in system, shields malicious code so file that application program loads malice advertising platform SDK.
The present embodiment is on the basis of embodiment one, further realized and not timing to have upgraded the malice advertising database, improved the Ad blocking success ratio, a kind of embodiment that shields malice advertising platform code also is provided simultaneously, by the built-in pseudo-malicious code file of loading system, finish shielding malice advertising platform.
Embodiment three:
Fig. 3 shows the structure of the application program malice Ad blocking device that third embodiment of the invention provides, and only shows for convenience of explanation the part relevant with the embodiment of the invention.
The application program malice Ad blocking device that the present embodiment provides comprises:
Malicious code judging unit 302 is used for judging whether described application program is embedded with malice advertising platform code;
Malice advertisement isolated location 303 is used for isolating the malice advertising platform in the described application program when the malicious code judgment unit judges is, so that the code of described malice advertising platform lost efficacy, can't move.
Each functional unit 301-303 correspondence that the present embodiment provides has realized the step S101-S103 among the embodiment one, concrete, the application program of installing on the program scanning unit 301 scanning portable terminals, malicious code judging unit 302 judges whether be embedded with malice advertising platform code in the described application program again, when judgement is, malice advertising platform in the described application program of malice advertisement isolated location 303 isolation so that the code of described malice advertising platform lost efficacy, can't move.In the present embodiment, after in detecting application program, being embedded with malice advertising platform code, directly isolate described malice advertising platform, the code of malice advertising platform is not carried out, so maliciously advertising platform with regard to can not network, ejection or advertisement, can thoroughly stop the advertisement behavior, this step is only isolated the malice advertising platform in the described application program simultaneously, can not have influence on the main part of application program, the user still can use this application program, nor can pop-up advertisement.
Embodiment four:
Fig. 4 shows the structure of the application program malice Ad blocking device that fourth embodiment of the invention provides, and only shows for convenience of explanation the part relevant with the embodiment of the invention.
The application program malice Ad blocking device that the present embodiment provides comprises:
Data updating unit 41 is used for upgrading the maliciously SDK (Software Development Kit) of advertising platform at the malice advertising database.
Program scanning unit 42 is used for the application program of installing on the scanning portable terminal;
Malicious code judging unit 43 is used for judging whether described application program is embedded with malice advertising platform code;
Malice advertisement isolated location 44 is used for isolating the malice advertising platform in the described application program when the malicious code judgment unit judges is, so that the code of described malice advertising platform lost efficacy, can't move.
Wherein, described malicious code judging unit 43 comprises:
Process analysis module 431 is used for analyzing described application program;
Code judge module 432 is used for judging whether described application program comprises the malicious code file that SDK (Software Development Kit) provides in the malice advertising database.
Wherein, described malice advertisement isolated location 44 comprises:
Code built-in module 441 is used for when described application program includes the malicious code file pseudo-malicious code file like the built-in and described malicious code files classes in system.
Each functional unit that the present embodiment provides and functional module correspondence have realized each step among the embodiment two, on the other hand, originally be implemented on the basis of embodiment three, increased data updating unit 41, can not timing upgrade content in the malice advertising database, improve the Ad blocking success ratio, also provided simultaneously the concrete preferred structure of malicious code judging unit 43 and malice advertisement isolated location 44, by the built-in pseudo-malicious code file of loading system, finish shielding malice advertising platform, so not only can to the effect of shielding advertisement, also can not have influence on the concrete function of this application program.
One of ordinary skill in the art will appreciate that, realize that all or part of step in above-described embodiment method is to come the relevant hardware of instruction to finish by program, described program can be in being stored in a computer read/write memory medium, described storage medium is such as ROM/RAM, disk, CD etc.
The above only is preferred embodiment of the present invention, not in order to limiting the present invention, all any modifications of doing within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. an application program malice Ad blocking method is characterized in that, described method comprises:
The application program of installing on the scanning portable terminal;
Judge and whether be embedded with malice advertising platform code in the described application program;
When judgement is, isolate the malice advertising platform in the described application program, so that the code of described malice advertising platform lost efficacy, can't move.
2. method as claimed in claim 1 is characterized in that, describedly judges whether be embedded with malice advertising platform code steps in the described application program, specifically comprise:
Analyze described application program;
Judge and whether comprise the malicious code file that SDK (Software Development Kit) provides in the malice advertising database in the described application program.
3. method as claimed in claim 2 is characterized in that, describedly isolates the malice advertising platform in the described application program when judging when being, so that the code of described malice advertising platform lost efficacy, can't operating procedure, and specifically comprise:
When including the malicious code file in the described application program, pseudo-malicious code file like the built-in and described malicious code files classes in system.
4. method as claimed in claim 3 is characterized in that, described pseudo-malicious code file is identical with the structure form of described malicious code file, comprises jar file and so file.
5. such as claim 1-4 method as described in each, it is characterized in that, before the application program step of installing on the described scanning portable terminal, also comprise:
In the malice advertising database, upgrade the SDK (Software Development Kit) of malice advertising platform.
6. an application program malice Ad blocking device is characterized in that, described device comprises:
The program scanning unit is used for the application program of installing on the scanning portable terminal;
The malicious code judging unit is used for judging whether described application program is embedded with malice advertising platform code;
Malice advertisement isolated location is used for isolating the malice advertising platform in the described application program when the malicious code judgment unit judges is, so that the code of described malice advertising platform lost efficacy, can't move.
7. install as claimed in claim 6, it is characterized in that, described malicious code judging unit comprises:
The process analysis module is used for analyzing described application program;
The code judge module is used for judging whether described application program comprises the malicious code file that SDK (Software Development Kit) provides in the malice advertising database.
8. install as claimed in claim 7, it is characterized in that, described malice advertisement isolated location comprises:
The code built-in module is used for when described application program includes the malicious code file pseudo-malicious code file like the built-in and described malicious code files classes in system.
9. install as claimed in claim 7, it is characterized in that, described pseudo-malicious code file is identical with the structure form of described malicious code file, comprises jar file and so file.
10. such as claim 6-9 method as described in each, it is characterized in that, described device also comprises:
Data updating unit is used for upgrading the maliciously SDK (Software Development Kit) of advertising platform at the malice advertising database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210562927.5A CN103065090B (en) | 2012-12-20 | 2012-12-20 | A kind of application program malice Ad blocking method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210562927.5A CN103065090B (en) | 2012-12-20 | 2012-12-20 | A kind of application program malice Ad blocking method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103065090A true CN103065090A (en) | 2013-04-24 |
CN103065090B CN103065090B (en) | 2016-03-23 |
Family
ID=48107718
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210562927.5A Expired - Fee Related CN103065090B (en) | 2012-12-20 | 2012-12-20 | A kind of application program malice Ad blocking method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103065090B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103246511A (en) * | 2013-05-03 | 2013-08-14 | 惠州Tcl移动通信有限公司 | Mobile terminal and method for mobile terminal for processing suspicious harassment messages |
CN103353844A (en) * | 2013-06-25 | 2013-10-16 | 亿赞普(北京)科技有限公司 | Upgrading method and system of SDK (software development kit) |
CN103488502A (en) * | 2013-09-11 | 2014-01-01 | 天脉聚源(北京)传媒科技有限公司 | Method and device for loading data |
CN103544435A (en) * | 2013-10-18 | 2014-01-29 | 广东欧珀移动通信有限公司 | Method and device for preventing secret photography |
CN103942487A (en) * | 2014-04-11 | 2014-07-23 | 珠海市君天电子科技有限公司 | Integral wall information acquisition method and device |
CN104133894A (en) * | 2014-07-31 | 2014-11-05 | 珠海市君天电子科技有限公司 | Method and device for intercepting advertising windows |
CN104202346A (en) * | 2014-09-29 | 2014-12-10 | 联想(北京)有限公司 | Method for handling network connection request and device thereof |
WO2015014299A1 (en) * | 2013-07-31 | 2015-02-05 | 贝壳网际(北京)安全技术有限公司 | Method, device and mobile terminal for identifying malicious advertisements in mobile terminal |
CN104751051A (en) * | 2013-12-31 | 2015-07-01 | 贝壳网际(北京)安全技术有限公司 | Method, device and mobile terminal for identifying malicious advertisements |
CN105373728A (en) * | 2014-09-01 | 2016-03-02 | 深圳富泰宏精密工业有限公司 | Advertisement prompting system and method |
CN106126562A (en) * | 2016-06-15 | 2016-11-16 | 广东欧珀移动通信有限公司 | A kind of pop-up hold-up interception method and terminal |
CN110990833A (en) * | 2019-10-31 | 2020-04-10 | 重庆小雨点小额贷款有限公司 | SDK safety detection method and related equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010025453A1 (en) * | 2008-08-29 | 2010-03-04 | Avg Technologies Cz, S.R.O. | System and method for detection of malware |
CN101800754A (en) * | 2010-03-25 | 2010-08-11 | 中国科学院计算技术研究所 | Method for distributing patch |
CN102256242A (en) * | 2011-04-14 | 2011-11-23 | 中兴通讯股份有限公司 | System and method for processing service application |
-
2012
- 2012-12-20 CN CN201210562927.5A patent/CN103065090B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010025453A1 (en) * | 2008-08-29 | 2010-03-04 | Avg Technologies Cz, S.R.O. | System and method for detection of malware |
CN101800754A (en) * | 2010-03-25 | 2010-08-11 | 中国科学院计算技术研究所 | Method for distributing patch |
CN102256242A (en) * | 2011-04-14 | 2011-11-23 | 中兴通讯股份有限公司 | System and method for processing service application |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103246511B (en) * | 2013-05-03 | 2016-08-03 | 惠州Tcl移动通信有限公司 | A kind of method and mobile terminal processing suspicious harassing and wrecking information for mobile terminal |
CN103246511A (en) * | 2013-05-03 | 2013-08-14 | 惠州Tcl移动通信有限公司 | Mobile terminal and method for mobile terminal for processing suspicious harassment messages |
CN103353844A (en) * | 2013-06-25 | 2013-10-16 | 亿赞普(北京)科技有限公司 | Upgrading method and system of SDK (software development kit) |
CN103353844B (en) * | 2013-06-25 | 2016-11-23 | 亿赞普(北京)科技有限公司 | A kind of SDK upgrade method and system |
CN104346569B (en) * | 2013-07-31 | 2019-02-22 | 北京猎豹移动科技有限公司 | Method and device for identifying malicious advertisements in mobile terminal and mobile terminal |
WO2015014299A1 (en) * | 2013-07-31 | 2015-02-05 | 贝壳网际(北京)安全技术有限公司 | Method, device and mobile terminal for identifying malicious advertisements in mobile terminal |
CN104346569A (en) * | 2013-07-31 | 2015-02-11 | 贝壳网际(北京)安全技术有限公司 | Method and device for identifying malicious advertisements in mobile terminal and mobile terminal |
CN103488502A (en) * | 2013-09-11 | 2014-01-01 | 天脉聚源(北京)传媒科技有限公司 | Method and device for loading data |
CN103544435A (en) * | 2013-10-18 | 2014-01-29 | 广东欧珀移动通信有限公司 | Method and device for preventing secret photography |
CN104751051A (en) * | 2013-12-31 | 2015-07-01 | 贝壳网际(北京)安全技术有限公司 | Method, device and mobile terminal for identifying malicious advertisements |
CN103942487A (en) * | 2014-04-11 | 2014-07-23 | 珠海市君天电子科技有限公司 | Integral wall information acquisition method and device |
CN103942487B (en) * | 2014-04-11 | 2017-06-27 | 珠海市君天电子科技有限公司 | Integrate the acquisition methods and device of wall information |
CN104133894A (en) * | 2014-07-31 | 2014-11-05 | 珠海市君天电子科技有限公司 | Method and device for intercepting advertising windows |
CN105373728A (en) * | 2014-09-01 | 2016-03-02 | 深圳富泰宏精密工业有限公司 | Advertisement prompting system and method |
CN104202346A (en) * | 2014-09-29 | 2014-12-10 | 联想(北京)有限公司 | Method for handling network connection request and device thereof |
CN106126562A (en) * | 2016-06-15 | 2016-11-16 | 广东欧珀移动通信有限公司 | A kind of pop-up hold-up interception method and terminal |
CN110990833A (en) * | 2019-10-31 | 2020-04-10 | 重庆小雨点小额贷款有限公司 | SDK safety detection method and related equipment |
Also Published As
Publication number | Publication date |
---|---|
CN103065090B (en) | 2016-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103065090A (en) | Method and device for intercepting malicious advertisements of application program | |
CN107276789B (en) | Log uploading method and device and computer readable storage medium | |
CN104598809B (en) | Program monitoring method and defending method thereof, as well as relevant device | |
US20170026454A1 (en) | Methods and apparatus for monitoring a portable device | |
CN104462980A (en) | Authority management method, device and system of application programs and mobile terminal | |
CN104462952A (en) | Method and device for preventing self-starting of application | |
CN107622200A (en) | The safety detecting method and device of application program | |
CN103279706A (en) | Method and device for intercepting installation of Android application program in mobile terminal | |
CN109344616A (en) | A kind of mobile applications dynamically load behavior monitoring method and device | |
CN103002342B (en) | Television camera means of defence and system | |
CN108090360B (en) | Behavior feature-based android malicious application classification method and system | |
CN102200911A (en) | Variable closure | |
WO2022247301A1 (en) | Testing method, graphical interface and related apparatus | |
KR20110128632A (en) | Method and device for detecting malicious action of application program for smartphone | |
CN103093148A (en) | Detection method, system and device of malicious advertisements | |
CN104331488A (en) | Method, device and equipment for cleaning files based on floating windows | |
CN105678160A (en) | System and method for providing access to original routines of boot drivers | |
CN103268448A (en) | Method and system for dynamically detecting safety of mobile applications | |
CN102196308B (en) | Digital-television-based multi-hardware interface compatible driving system | |
US20090328075A1 (en) | Filter driver to enumerate smartcard nodes for plug and play | |
CN114282212A (en) | Rogue software identification method and device, electronic equipment and storage medium | |
CN106933636A (en) | Start method, device and the terminal device of plug-in services | |
CN103369532B (en) | A kind of black box detection method of mobile terminal from malicious software action | |
CN104992116A (en) | Monitoring method and system based on intent sniffer | |
CN108304697B (en) | Method and device for detecting APP secondary packaging and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523841 usha Beach Road No. 18 Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CP03 | Change of name, title or address | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160323 |
|
CF01 | Termination of patent right due to non-payment of annual fee |