CN103677882A - Virtual installation device and method of mobile phone program - Google Patents

Virtual installation device and method of mobile phone program Download PDF

Info

Publication number
CN103677882A
CN103677882A CN201210350498.5A CN201210350498A CN103677882A CN 103677882 A CN103677882 A CN 103677882A CN 201210350498 A CN201210350498 A CN 201210350498A CN 103677882 A CN103677882 A CN 103677882A
Authority
CN
China
Prior art keywords
installation
service end
client
malicious
behavioural information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210350498.5A
Other languages
Chinese (zh)
Inventor
卢争云
林坚明
赵闽
傅盛
徐鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Shell Internet Beijing Security Technology Co Ltd
Zhuhai Juntian Electronic Technology Co Ltd
Beijing Kingsoft Internet Science and Technology Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Shell Internet Beijing Security Technology Co Ltd
Zhuhai Juntian Electronic Technology Co Ltd
Beijing Kingsoft Internet Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd, Shell Internet Beijing Security Technology Co Ltd, Zhuhai Juntian Electronic Technology Co Ltd, Beijing Kingsoft Internet Science and Technology Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201210350498.5A priority Critical patent/CN103677882A/en
Publication of CN103677882A publication Critical patent/CN103677882A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a virtual installation device and a method of a mobile phone program, wherein the virtual installation device comprises an acquisition unit provided with a server; the operation unit is arranged at the server and used for executing installation of the installation files, operating the installation program and sending an operation interface of the installation program to the client; the simulation unit is arranged on the client and used for receiving an operation instruction aiming at the operation interface and sending the operation instruction to the server; the acquisition unit is arranged at the server and used for acquiring the operation behavior information of the installation program; and the analysis unit is arranged at the server and used for judging whether the operation behavior information is malicious operation behavior information or not and sending the malicious operation behavior information to the client. The invention simulates the functions of the mobile phone through the program installed on the server, thereby avoiding directly installing unnecessary programs on the mobile phone; meanwhile, program behaviors are detected, a behavior analysis report is generated, and the mobile phone is prevented from directly installing malicious programs.

Description

A kind of virtual installation apparatus and method of handset program
Technical field
The present invention relates to the virtual installation of handset program, especially a kind of virtual installation apparatus and method of handset program.
Background technology
In recent years, the customer volume of smart mobile phone increases sharply, and smart mobile phone has surpassed the quantity of functional mobile phone now.Smart mobile phone has independently operating system and good user interface, and it has very strong application scalability, can facilitate and optionally install and delete application program; Smart mobile phone has super large high definition touch-screen, can call at any time keyboard and touch hand-writtenly, can carry out multi-job operation, and have powerful multimedia, mail, function of surfing the Net, can substitute the conventional portable equipment as MP3, MP4 and PDA so completely; Smart mobile phone can substitute PC and process office work and other affairs, and it can keep seamless link constantly with network, can cut at any time network, and can with other device synchronization data such as computer, notebook computer.
Because smart mobile phone has so many advantages, so it is more and more universal, also more and more for the smart mobile phone software of smart mobile phone exploitation.At present due to the variation of intelligent mobile phone system, the development of the operating system of smart mobile phone also in the starting stage, a lot of problems do not solve.It is not the problems such as program that user needs that, installation rear section program clean such as installation procedure unloading cannot normally unload, install rear discovery.
Follow in addition the Virus in Smart Phone software in addition of smart mobile phone software development.Also be that variation, installation procedure renewal speed due to operation system of smart phone is too fast, different type of machines is used the different problems such as installation procedure, the development of Virus in Smart Phone also has variation, complicated feature.Therefore, a lot of Virus in Smart Phones exist does not allow detectable problem, and user's safety can not be guaranteed.
Summary of the invention
Object of the present invention, overcomes the deficiencies in the prior art exactly, and a kind of virtual installation apparatus and method of handset program are provided.This method and device can effectively solve handset program and be directly installed on the non-user's request program of virus, installation procedure that mobile phone terminal produces, unload the problems such as unclean, and can, by detecting installation procedure in the operation behavior of service end, analyze described installation procedure and whether have malicious operation behavior.
In order to achieve the above object, adopt following technical scheme:
A virtual installation device for handset program, comprise client, with the service end of the mutual communication of client, also comprise the acquiring unit of being located at service end, for obtaining, need the installation file of installing; Be located at the running unit of service end, for carrying out the installation of installation file, operation installation procedure is also sent to client the operation interface of installation procedure; Be located at the analogue unit of client, for receiving the operational order for operation interface, and described operational order be sent to service end; Be located at the collecting unit of service end, for gathering the operation behavior information of installation procedure; Whether, for decision operation behavioural information be malicious operation behavioural information, if so, send described malicious operation behavioural information to client if being located at the analytic unit of service end, if not, finish.
Further, described service end also comprises an installation file database, for storing installation file.
Further, described service end also comprises a malicious operation behavioural information storehouse, for storing malicious act information.
Further, described service end also comprises a reduction unit, while sending reduction request for client to service end, and the environment before reduction service end to installation file is installed.
Further, described client also comprises a reporting unit, for storing malicious operation behavioural information and generating malicious operation behavioural analysis report.
A virtual installation method for handset program, comprises the following steps: obtain the installation file that needs installation; Carry out the installation of installation file, operation installation procedure is also sent to client the operation interface of installation procedure; Reception is for the operational order of operation interface, and described operational order is sent to service end; Whether decision operation behavioural information is malicious operation behavioural information, if so, sends described malicious operation behavioural information to client, if not, finishes.
Further, described in obtain the installation file of need installing before, first judge whether service end exists described installation file; If exist, extract described installation file from service end; If do not exist, from client, extract described installation file to service end.
Further, the described malicious operation behavioural information of described transmission is to client, further comprising the steps of: client stores malicious operation behavioural information also generates malicious operation behavioural analysis report.
Further, described client stores malicious operation behavioural information according to the default malicious operation behavior extent of injury, divides hazard rating, generates malicious operation behavioural analysis report.
Further, described in obtain between the arbitrary steps after the installation file of need installing, further comprising the steps of: when client sends reduction request to service end, the environment before reduction service end to installation file is installed.
Compared with prior art, beneficial effect of the present invention is:
This method and device can effectively solve handset program and be directly installed on the non-user's request program of virus, installation procedure that mobile phone terminal produces, unload the problems such as unclean, and can, by detecting installation procedure in the operation behavior of service end, analyze described installation procedure and whether have malicious operation behavior.Before the installation procedure that enters mobile phone is installed, by the installation file database with service end, contrast, if find, in installation file database, there is described installation procedure, avoid uploading described installation procedure to service end.Can accelerate installation effectiveness like this, improve user's experience impression.
In addition, service end is provided with restoring function, can after client has been experienced described installation procedure, reduce the installation environment of service end.Service end just can save space like this, is other installation procedure service again.
Accompanying drawing explanation
Fig. 1 is the structural representation of the virtual installation device of handset program of the present invention;
Fig. 2 is the flow chart of steps of the virtual installation method of handset program of the present invention.
Diagram: 1-client; 11-analogue unit; 12-reporting unit;
2-service end; 21-running unit; 22-collecting unit; 23-analytic unit; 24-installation file database;
25-malicious operation behavioural information storehouse; 26-reduction unit, 27-acquiring unit.
Embodiment
Below in conjunction with accompanying drawing and specific implementation method, describe the present invention in detail, in exemplary embodiment and description of the present invention, be used for explaining the present invention, but not as a limitation of the invention.
As shown in Figure 1, the present invention mainly comprises client 1 and service end 2.Client 1 and the mutual communication of service end 2.In client 1, be provided with analogue unit 11 and reporting unit 12; Service end 2 is provided with running unit 21, collecting unit 22, analytic unit 23, installation file database 24, malicious operation behavioural information storehouse 25, reduction unit 26 and acquiring unit 27.
Described running unit 21 is for carrying out the installation of installation file, and operation installation procedure is also sent to client 1 the operation interface information of installation procedure.Installation file is installed on service end 2 by running unit 21, forms installation procedure.The running environment of service end 2 analogue mobile phones, makes installation procedure in service end 2 operations, and the operation interface of installation procedure is sent to client 1.Installation file is installed in the default installation path of service end 2, and the operation interface of installation is sent to client 1.The analogue unit 11 of client 1 receives user for the operational order of operation interface, and described operational order is sent to service end 2.By running unit 21, according to the operational order of client, produce identical operation behavior.For example: in the smart mobile phone of touch-screen, mobile phone is client 1.Mobile phone receives service end 2 and sends the operation interface of returning, show this operation interface, user carries out clicking operation to this operation interface, the coordinate that analogue unit 11 records are clicked, produce operational order and feed back to service end, by service end, according to the coordinate information of operational order, determine the position that user clicks, thereby move functional module corresponding to the corresponding function button in this position.The operation interface further producing returns to mobile phone again, is presented on mobile phone.Service end 2 and client 1 continue to circulate incessantly communication, realize the control of 1 pair of service end 2 of client.
In the process of running unit 21 operations, collecting unit 22 gathers all operations behavioural information of installation procedure in service end 2 simultaneously.These operation behavior information comprise the operational order of client 1 feedback, also comprise the operation behavior information of non-permission operation.For example, in installation procedure operational process, the mutual communication of client and service end, user carries out remote control by client to service end.User does not send networking instruction to service end in the pseudo operation process of client, and the service end at installation procedure place is not in the situation that client is sent networking instruction, produces the action of networking automatically.The action of described automatic networking belongs to the non-permission operation behavior of operation automatically.The operation behavior information that collecting unit 22 gathers comprises click function button, plays advertisement, networking automatically, photos and sending messages, collect personal information, delete content, interception is breathed out, change wifi state, read responsive record, delete installation procedure, automatic download file, install programs automatically etc.
First described service end judges whether the installation file database 24 of service end 2 exists described installation file before obtaining the installation file that needs to install; If exist, acquiring unit 27 extracts and installs described installation file from service end 2; If do not exist, acquiring unit 27 extracts described installation file from client 1 and is installed on service end 2.Described installation file is in installation file database 24, and running unit 21 is directly arranged on this installation file under default installation path.Described installation file, in client 1, is extracted into the installation file database 24 of service end by acquiring unit 27, then installs by running unit 21.Also can directly from internet, download and install file and be extracted into service end 2.
Whether analytic unit 23, be malicious operation behavioural information for decision operation behavioural information, if so, sends described malicious operation behavioural information to client, if not, finishes.For example, collecting unit 22 collects after an operation behavior information, analytic unit 23 is the malicious act comparison in these operation behaviors and malicious operation behavioural information storehouse 25, if comprise the malicious operation behavior in malicious operation behavioural information storehouse 25 in the operation behavior gathering, described malicious act information be sent to client 1.If there is no malicious operation behavior in the operation behavior information gathering, finish.Due to the operation behavior of installation procedure more than one, collecting unit 22 can continue next the operation behavior information gathering, and gives analytic unit 23 and process, until stop gathering analytic unit 23 power cut-offs.
In service end 2, be also provided with reduction unit 26, while sending reduction request for client to service end, the environment before reduction service end to installation file is installed.This principle and prior art one key reduction are similar.The operating environment of service end analogue mobile phone, backs up described operating environment.After installation procedure installation and operation, reduction unit 26 is received the reduction request of client 1, and described service end exits the operation of installation procedure.Now, reduction unit 26 is reduced to the initial operating environment that installation procedure is not installed the operating environment that installation procedure is installed.
Reporting unit 12, for storing malicious operation behavioural information and generating malicious operation behavioural analysis report.Client, according to the extent of injury of default malicious operation behavior, is divided different brackets malicious operation behavior.Client is corresponding with different brackets described malicious operation behavioural information, by default malicious operation behavior danger classes, generates malicious operation behavioural analysis report.User determines according to malicious operation behavioural analysis report whether relevant installation file can install.
A virtual installation method for handset program, comprises the following steps:
1) obtain the installation file that needs installation.
Before carrying out the installation of installation file, judge whether service end exists described installation file; If exist, extract described installation file from service end; If do not exist, from installation file described in client upload to service end, also can directly download and install file to service end from network.
The installation file of the present embodiment is preferably APK installation file.
2) carry out the installation of installation file, operation installation procedure is also sent to client the operation interface of installation procedure.
Specifically, in the default installation path of service end, described installation file is installed.Install after described installation file, form installation procedure.Service end is sent to client the operation interface of installation procedure.Described operation interface comprises fitting operation interface and functional module operation interface.For handset program, especially the smart mobile phone of Android system, can have corresponding installation suggestion information before each installation file installation.The described installation suggestion packets of information includes network communication information, memorizer information, phone information, hardware control information, the information such as system tool information.Described network service refers to routine access internet, described storer refers to revise or deletes USB and store content, described phone refers to read mobile phone state and ID, and described hardware control refers to change audio settings etc., and described system tool refers to forbid press-key lock, stops mobile phone to enter dormant state etc.Functional module operation interface refers to the feature operation interface in installation procedure operation.
3) receive the operational order for operation interface, and described operational order is sent to service end.
Specifically, the operation interface that client service end sends, user carries out clicking operation to operation interface in client, records this click coordinate, produces operational order, and this operational order is fed back to service end.For example: in the smart mobile phone of touch-screen, mobile phone is client.Mobile phone sends the operation interface of returning according to service end, this operation interface is carried out to clicking operation, the coordinate that record is clicked.According to user's operation, produce operational order and feed back to service end, by service end, according to the coordinate information of operational order, determining the position that user clicks, thereby move the corresponding function button in this position.The operation interface further producing returns to mobile phone again, is presented on mobile phone.So circulation communication, realizes the control of client to service end.
4) gather the operation behavior information of installation procedure.
The operation behavior information that gathers installation procedure specifically refers to, gathers the operation behavior of client feedback, and the operation behavior of service end installation procedure.In service end, the operation behavior of installation procedure comprises the operation behavior of client feedback, also comprises the operation behavior of non-permission operation.For example, in installation procedure operational process, the mutual communication of client and service end, user carries out remote control by client to service end.User does not send the instruction of networking in the pseudo operation process of client to service end, and the service end at installation procedure place is not in the situation that client is sent networking instruction, produces the action of networking automatically.The action of described automatic networking belongs to the operation behavior of non-permission operation.The operation behavior of collection comprises click function button, plays advertisement, networking, and photos and sending messages, collects personal information, deletes content, tackles and breathes out, and change wifi state, reads responsive record, deletes installation procedure, automatic download file, install programs automatically etc.
5) whether decision operation behavioural information is malicious operation behavioural information, if so, sends described malicious operation behavioural information to client, if not, finishes.
In service end, be provided with malicious operation behavioural information storehouse, by all operations behavioural information comparison with step 3 collection, whether decision operation behavior is the malicious operation behavior in malicious operation behavioural information storehouse.Particularly, under the normal operation of installation procedure, every single stepping is all the operation behavior that user moves and confirms, is the behavior that obtains subscriber authorisation.And the behavior of subscriber authorisation is the behavior of initiatively clicking through user, it not program behavior of self-starting without user allows.Determine whether that malicious operation behavior is mainly according to whether having through user and allow before program generation operation behavior.If the operation behavior information gathering comprises appliance for releasing single advertisement, networking automatically, automatic transfer breath, collects personal information without permission, automatically deletes content etc. without permission and the behavior of self-starting judges that described operation behavior is malicious operation behavior.
Service end is sent to client the malicious operation behavioural information that is judged as malicious operation behavior.By this result of client records and generate malicious operation behavioural analysis and report.Described client stores malicious operation behavioural information according to the default malicious operation behavior extent of injury, divides hazard rating, generates malicious operation behavioural analysis report.Client is corresponding with different brackets described malicious operation behavioural information, allows user determine according to malicious operation behavioural analysis report whether relevant installation file can install.
Operation behavior described in the present invention is the operation behavior information of encode.All operations behavior all and code matches.By cognizance code, know the operation behavior information that respective code is corresponding.
In addition, before or after the arbitrary steps after obtaining the installation file that needs to install, when client sends reduction request to service end, the environment before reduction service end to installation file is installed.User also can install the program that needs experience by service end, experiences phase function, and whether determine procedures satisfies the demands, in order to avoid mobile phone needs unloading after described program is installed, removes the problems such as vestige is installed.
As shown in Figure 2, for more clear understanding the present invention, below set forth a preferred embodiment.
1) prepare to upload installation file to service end.
2) judge whether service end exists described installation file, if do not exist, client upload installation file, to service end, if exist, is extracted described installation file from service end.
3) service end is installed described installation file at default installation path, and operation interface is sent to client; Described operation interface comprises the fitting operation interface of installation process and the operation interface after installation.
4) client user is for the operational order of operation interface and feed back to service end.The coordinate information specifically operating by record is realized the mutual communication between client and service end.
5) gather all operations behavioural information of installation procedure.
6) by the malicious operation behavioural information storehouse with default, malicious operation behavioural information is sent to client, if do not find malicious operation behavioural information, continues next operation behavior information of judgement.
7) client, according to malicious operation behavioural information, generates malicious operation behavioural analysis report.
8) when client sends reduction request to service end, the environment before reduction service end to installation file is installed.
The technical scheme above embodiment of the present invention being provided is described in detail, applied specific case herein the principle of the embodiment of the present invention and embodiment are set forth, the explanation of above embodiment is only applicable to help to understand the principle of the embodiment of the present invention; , for one of ordinary skill in the art, according to the embodiment of the present invention, in embodiment and range of application, all will change, in sum, this description should not be construed as limitation of the present invention meanwhile.

Claims (10)

1. a virtual installation device for handset program, comprise client, with the service end of the mutual communication of client, it is characterized in that, also comprise:
Be located at the acquiring unit of service end, for obtaining the installation file that needs installation;
Be located at the running unit of service end, for carrying out the installation of installation file, operation installation procedure is also sent to client the operation interface of installation procedure;
Be located at the analogue unit of client, for receiving the operational order for operation interface, and described operational order be sent to service end;
Be located at the collecting unit of service end, for gathering the operation behavior information of installation procedure;
Whether, for decision operation behavioural information be malicious operation behavioural information, if so, send described malicious operation behavioural information to client if being located at the analytic unit of service end, if not, finish.
2. the virtual installation device of handset program according to claim 1, is characterized in that: described service end also comprises an installation file database, for storing installation file.
3. the virtual installation device of handset program according to claim 1, is characterized in that: described service end also comprises a malicious operation behavioural information storehouse, for storing malicious operation behavioural information.
4. the virtual installation device of handset program according to claim 1, is characterized in that: described service end also comprises a reduction unit, while sending reduction request for client to service end, and the environment before reduction service end to installation file is installed.
5. the virtual installation device of handset program according to claim 1, is characterized in that: described client also comprises a reporting unit, for storing malicious operation behavioural information and generating malicious operation behavioural analysis report.
6. a virtual installation method for handset program, is characterized in that, comprises the following steps: obtain the installation file that needs installation; Carry out the installation of installation file, operation installation procedure is also sent to client the operation interface of installation procedure; Reception is for the operational order of operation interface, and described operational order is sent to service end; Whether decision operation behavioural information is malicious operation behavioural information, if so, sends described malicious operation behavioural information to client, if not, finishes.
7. the virtual installation method of handset program according to claim 6, is characterized in that: described in obtain the installation file that needs install before, first judge whether service end exists described installation file; If exist, extract described installation file from service end; If do not exist, from client, extract described installation file to service end.
8. the virtual installation method of handset program according to claim 6, it is characterized in that, the described malicious operation behavioural information of described transmission is to client, further comprising the steps of: client stores malicious operation behavioural information also generates malicious operation behavioural analysis report.
9. the virtual installation method of handset program according to claim 8, is characterized in that: described client stores malicious operation behavioural information according to the default malicious operation behavior extent of injury, divide hazard rating, and generate malicious operation behavioural analysis report.
10. the virtual installation method of handset program according to claim 6, it is characterized in that, before or after the described arbitrary steps obtaining after the installation file of need installing, further comprising the steps of: when client sends reduction request to service end, the environment before reduction service end to installation file is installed.
CN201210350498.5A 2012-09-18 2012-09-18 Virtual installation device and method of mobile phone program Pending CN103677882A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210350498.5A CN103677882A (en) 2012-09-18 2012-09-18 Virtual installation device and method of mobile phone program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210350498.5A CN103677882A (en) 2012-09-18 2012-09-18 Virtual installation device and method of mobile phone program

Publications (1)

Publication Number Publication Date
CN103677882A true CN103677882A (en) 2014-03-26

Family

ID=50315544

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210350498.5A Pending CN103677882A (en) 2012-09-18 2012-09-18 Virtual installation device and method of mobile phone program

Country Status (1)

Country Link
CN (1) CN103677882A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104881328A (en) * 2015-06-24 2015-09-02 联想(北京)有限公司 Data processing method and device
CN105302416A (en) * 2015-10-29 2016-02-03 崔东珠 Cartoon exhibition system
CN106055976A (en) * 2016-05-16 2016-10-26 杭州华三通信技术有限公司 Document detection method and sandbox controller
CN106372510A (en) * 2016-08-23 2017-02-01 广东欧珀移动通信有限公司 Operation information monitoring method and apparatus

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1570904A (en) * 2003-07-23 2005-01-26 张恒 Mobile remote computer access and control system and method thereof
CN101034993A (en) * 2006-03-07 2007-09-12 环达电脑(上海)有限公司 Remote program installation method
CN101127638A (en) * 2007-06-07 2008-02-20 飞塔信息科技(北京)有限公司 Active virus automatic prevention and control system and method
CN101145959A (en) * 2007-10-10 2008-03-19 中兴通讯股份有限公司 A method and system for automatic realization of network management function
CN101727548A (en) * 2008-10-27 2010-06-09 联想(北京)有限公司 Computer safety monitoring system, comprehensive deciding device and method thereof
CN102012987A (en) * 2010-12-02 2011-04-13 李清宝 Automatic behavioural analysis system for binary malicious codes
CN102331946A (en) * 2011-09-28 2012-01-25 宇龙计算机通信科技(深圳)有限公司 Method and system for installing application program
CN102591750A (en) * 2011-12-31 2012-07-18 曙光信息产业股份有限公司 Recovery method of cluster system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1570904A (en) * 2003-07-23 2005-01-26 张恒 Mobile remote computer access and control system and method thereof
CN101034993A (en) * 2006-03-07 2007-09-12 环达电脑(上海)有限公司 Remote program installation method
CN101127638A (en) * 2007-06-07 2008-02-20 飞塔信息科技(北京)有限公司 Active virus automatic prevention and control system and method
CN101145959A (en) * 2007-10-10 2008-03-19 中兴通讯股份有限公司 A method and system for automatic realization of network management function
CN101727548A (en) * 2008-10-27 2010-06-09 联想(北京)有限公司 Computer safety monitoring system, comprehensive deciding device and method thereof
CN102012987A (en) * 2010-12-02 2011-04-13 李清宝 Automatic behavioural analysis system for binary malicious codes
CN102331946A (en) * 2011-09-28 2012-01-25 宇龙计算机通信科技(深圳)有限公司 Method and system for installing application program
CN102591750A (en) * 2011-12-31 2012-07-18 曙光信息产业股份有限公司 Recovery method of cluster system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LIGANG7856: ""哈哈,全新的金山新毒霸2013出炉了!"", 《HTTPS://ZHIDAO.BAIDU.COM/QUESTION/471194461.HTML》 *
本站整理: ""xp如何实现远程控制"", 《HTTP://WWW.PC6.COM/INFOVIEW/ARTICLE_35363.HTML》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104881328A (en) * 2015-06-24 2015-09-02 联想(北京)有限公司 Data processing method and device
CN104881328B (en) * 2015-06-24 2019-02-05 联想(北京)有限公司 Data processing method and data processing equipment
CN105302416A (en) * 2015-10-29 2016-02-03 崔东珠 Cartoon exhibition system
CN106055976A (en) * 2016-05-16 2016-10-26 杭州华三通信技术有限公司 Document detection method and sandbox controller
CN106372510A (en) * 2016-08-23 2017-02-01 广东欧珀移动通信有限公司 Operation information monitoring method and apparatus
CN106372510B (en) * 2016-08-23 2019-04-16 Oppo广东移动通信有限公司 A kind of monitoring method and device of operation information

Similar Documents

Publication Publication Date Title
KR102105636B1 (en) Installing application remotely
CN103209087B (en) Distributed information log statistical processing methods and system
CN103810176B (en) A kind of info web prefetches access method and device
CN102566931A (en) Method and device for displaying suspended window
CN104268241B (en) Attribute display method in a kind of configuration database
CN102651856A (en) Method, system and device for improving Internet surfing security of terminal
CN104363247A (en) Flow saving method and device adopting saving-free application
US20150254090A1 (en) System and method for modifying allocated resources
CN103034498A (en) Method and system for collating application programs
CN103593613A (en) Method, terminal, server and system for computer virus detection
CN109062590A (en) A kind of method and system of game SDK online updating
CN111045893B (en) Method, device and system for executing monitoring task, storage medium and electronic device
CN101657793A (en) Method, system and computer program for configuring firewalls
CN103677882A (en) Virtual installation device and method of mobile phone program
CN109783335B (en) User operation recording and restoring method, device and equipment and readable storage medium
CN103593408A (en) Method and device for acquiring user subscription resources
CN109002249A (en) Method, storage medium, equipment and the system of present double hit are realized by long-pressing gesture
CN112799925A (en) Data acquisition method and device, electronic equipment and readable storage medium
CN109144834B (en) User behavior data acquisition method and device, android system and terminal equipment
CN116028321A (en) Buried point data acquisition method, system and storage medium
CN103686688A (en) Method and device for protecting user address list of mobile terminal and mobile terminal
CN102043705A (en) Statistical method and apparatus for input behavior
CN111177623A (en) Information processing method and device
CN102799609A (en) Data acquisition method based on data monitoring
CN107102876B (en) Application pushing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140326