CN104679562B - A kind of method and system of strength uninstall - Google Patents
A kind of method and system of strength uninstall Download PDFInfo
- Publication number
- CN104679562B CN104679562B CN201510085160.5A CN201510085160A CN104679562B CN 104679562 B CN104679562 B CN 104679562B CN 201510085160 A CN201510085160 A CN 201510085160A CN 104679562 B CN104679562 B CN 104679562B
- Authority
- CN
- China
- Prior art keywords
- software
- file
- mount message
- unloading
- uninstaller
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000004048 modification Effects 0.000 claims abstract description 25
- 238000012986 modification Methods 0.000 claims abstract description 25
- 238000011900 installation process Methods 0.000 claims abstract description 18
- 238000009434 installation Methods 0.000 claims description 15
- 238000012217 deletion Methods 0.000 claims description 12
- 230000037430 deletion Effects 0.000 claims description 12
- 238000001514 detection method Methods 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims 3
- 238000011084 recovery Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 238000007599 discharging Methods 0.000 description 2
- 206010016275 Fear Diseases 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Landscapes
- Stored Programmes (AREA)
Abstract
The present invention provides a kind of method and system of strength uninstall, and described method includes following steps:The mounted software of the machine is detected in client, including dbase and version information, corresponding unloading prompting is provided to have installed software per money;When detect user according to it is described unloading prompting selected the unloading operation of certain software after, according to the title and version of the software, preset mount message corresponding with the software is obtained from data file, the mount message includes the file that is added in installation process of the software and the modification to registration table and/or system file;According to the corresponding mount message, the file which is added in installation process and the modification of registration table and/or system file is deleted or recovered.The present invention has provided a kind of easy, unified and thorough software to the user and has unloaded mechanism.
Description
Present patent application be the applying date on 01 04th, 2011, it is Application No. 201110005069.X, entitled
A kind of divisional application of the Chinese invention patent application of " method and system of strength uninstall ".
Technical field
The present invention relates to software Unloading Technology field more particularly to a kind of method and systems of strength uninstall.
Background technology
With the development of computer and Internet technology, various application software also emerge in an endless stream.Most software is being pacified
It is all very easy to during dress and friendly, but in unloading, some softwares are for certain purpose or itself is lack of standardization, usually can not be thorough
It unloads and deletes in the slave user computer at bottom, and a large amount of garbage files under residual, cause very big puzzlement, while also shadow for user
The performance of computer is rung.
And solve the problems, such as this one method, it at present can only be different due to software type.Since every money software has its own
Characteristics in Compiling and installation process, therefore the mode of its Stub File and position are also different, which results in solve the problems, such as this
Mode it is mostly quite personalized.For example, for the unloading residue problem of certain software, someone sums up, and can be introduced into safety
Pattern subsequently into registration table, checks specific key assignments, deletes specific installation directory again afterwards;And for another money software
Residual, then need to perform specific order in order line.But these modes, not only need that there is phase to computer literacy
When understanding, and once slightly slip up, the operation of computer or safety will be caused greatly to damage.
In short, at present for the software that can not be thoroughly unloaded from user computer, lack a kind of simple, unified solution it
Road is not for special skilled user, not only for the layer in conventional uninstall process to the use of computer particularly with those
Layer choosing, which is selected, to be at a loss what to do and fears, and especially those cannot be unloaded with the software of deletion completely, and even more soft white hands is without plan.
Therefore, how a kind of method and system of strength uninstall is provided, make user can it is easy, thoroughly unload it is soft
Part has become industry urgent problem to be solved.
The content of the invention
The technical problems to be solved by the invention are to provide a kind of method and system of strength uninstall, so that user
Easy, thorough unloading the machine installation software.
In order to solve the above technical problems, the present invention provides a kind of method of strength uninstall, include the following steps:
The mounted software of the machine is detected in client, is that software has been installed per money including dbase and version information
Corresponding unloading prompting is provided;
When detect user according to it is described unloading prompting selected the unloading operation of certain software after, according to the name of the software
Title and version, obtain preset mount message corresponding with the software from data file, and the mount message includes the software
The file added in installation process and the modification to registration table and/or system file;
According to the corresponding mount message, the file which is added in installation process and to registration table and/
Or the modification of system file is deleted or recovered.
The present invention so a kind of system of strength uninstall is also provided, including:
Data module, for storing the mount message of different software, the mount message includes dbase and version, adds
The file added and the modification to registration table and/or system file;
Detection module is every including dbase and version information for detecting the mounted software of the machine in client
Money has installed software and provides corresponding unloading prompting;
Detecting module, for whether detecting user according to the unloading operation for unloading prompting and having selected certain software;
Data obtaining module detects user according to the unloading operation for unloading prompting and having selected certain software for working as
Afterwards, according to the title and version of the software, mount message corresponding with the software is obtained from data module;
Unload module, for according to the corresponding mount message, the file which is added in installation process and
The modification of registration table and/or system file is deleted or recovered.
Wherein, the data module can be located at client the machine or remote server.
The present invention need not occupy excessive client resource, and performing different unloadings for different software without user grasps
Make, provided a kind of easy, unified and thorough software to the user and unloaded mechanism.The present invention is applicable not only to desktop computer
Terminal, and it is also applied for other mobile clients such as mobile phone.
Description of the drawings
Fig. 1 is the method flow diagram of the strength uninstall according to the embodiment of the present invention.
Fig. 2 is the system schematic of the strength uninstall according to the embodiment of the present invention.
Fig. 3 is the structure diagram of the Unload module according to the embodiment of the present invention.
Fig. 4 is the structure diagram of the Unload module according to another embodiment of the present invention.
Fig. 5 is the structure diagram of the Unload module according to further embodiment of this invention.
Specific embodiment
Below in conjunction with the accompanying drawings, the embodiment of the present invention is described in detail.
As shown in Figure 1, it is the method flow diagram of the strength uninstall according to the embodiment of the present invention, first in client
Including dbase and version information, corresponding unloading is provided to have installed software per money for the detection mounted software of the machine in end
Prompt (step 101);When detect user according to it is described unloading prompting selected the unloading operation of certain software after, it is soft according to this
The title and version of part, obtain preset mount message corresponding with the software from data file, and the mount message includes
The file and the modification (step 102) to registration table and/or system file that the software adds in installation process;Root afterwards
According to the corresponding mount message, the file which is added in installation process and to registration table and/or system file
Modification deleted or recovered (step 103).
The data file can be the information formats such as the form of database or list or text.According to this hair
Bright embodiment, data file can be located at client the machine, can also be located at remote server.Here is with database shape
Formula is illustrated.
The installation process of client software is can be monitored by the one long-term program resided in client machine
, software installation behavior is recorded one by one, but this mode occupies the resource of client, can influence user experience, because
This, present invention preferably employs mode be after the installation process of software is simulated and analyzed in advance, to determine the software
Mount message, and the mount message is stored in a database.
The mount message determines, can include whether such as software is solar obligation in C disks or peace may be selected
Loaded on that under other drives, can establish what kind of file directory and path, which file is installation process can discharge, to registry entry or
System file has carried out which modification etc., these mount messages can be collected and determined in advance.It afterwards, can be in server
End one database of structure, the mount message of different software is summarized and is stored in database.
The present invention does not interfere the unloading selection of client user, if what user's selection was directly carried by software itself
Uninstaller is also possible to perform unloading, but can usually unload halfway feelings due to only performing this conventional unloading
Condition, therefore, the present invention or recommended user carry out software unloading using the unloading manner of the present invention.
When user selects to carry out software unloading using unloading manner provided by the invention, the present invention can pass through scanning
Detect the installed software of the machine, it is preferred that a list for having installed software can be further listed in, and to have been installed per money
Software provides a unloading prompting, such as can be a button, above with " strength unloads " printed words.
Next, can detect whether user presses " strength unloads " button, if there is corresponding button is chosen, then illustrate
User wishes to unload the software.But some softwares, may be due to shared by other programs, it is thus possible to lead in unloading
Cause can not be deleted normally, this is also an one of the major reasons for leading to not thorough uninstall.
For such case, according to an embodiment of the invention, when the unloading operation for detecting user and having selected certain software
Afterwards, relevant document or directly progress file deletion can be deleted or first carry out conventional unloading by performing conventional uninstall process
Stub File is deleted again, no matter which kind of mode used, before deletion action is performed, can first determine whether that the software document is
It is no shared by some other program, if it is, releasing between the software document to be unloaded and the occupancy program
Locking.
Can be scanned by process on the mode to unlock, the positive closing occupancy program, terminate its process or
The modes such as service are realized.
After locking between relieving and occupying program, you can it is normal to delete file, but which should specifically be deleted
A little files then need to determine according to the corresponding mount message of the software.The software has been recorded in mount message to install
The file once discharged in the process and the modification made to registration table and system file, therefore, as long as according in mount message
Record, perform anti-installation process.
But it should be noted that in mount message that some are fixed there are one problem, such as the modification to registry entry, but
Some are that user is allowed to select, such as installation drive and catalogue, can be by performing one for the content that user is allowed to select
A scanning search process determines the specific installation site in specific client end, determines to carry out after specific installation site
The anti-installation process of file.It is of course also possible to will likely installation file directory information be put into mount message, and perform accordingly
Scanning process.
If database is located at remote server, client obtains the mode of mount message from database, can have more
Kind, for example, before unloading is performed, believed first by user end to server request and the corresponding installation of the dbase and version
Breath;After server receives the request, the mount message of the software is sent to the client.But this mode requires client to exist
It has to online online with server end when performing unloading, has some limitations to use environment at that time.
For this purpose, according to another embodiment of the invention, can also be periodically the machine has been installed by client in advance it is soft
The title of part and version information notification server;Server will install the corresponding mount message of software with the client and be sent to
Client stores.So when client executing unloads, even if not online, the installation letter of local memory storage can also be directly recalled
Breath.
Certainly, client information storage can also be data file form, that is, data file be located at visitor
Family end the machine.
Mount message corresponding with the software is being obtained, and is being determined after the specific installation site of this client, i.e.,
By file that the software adds and the modification of registration table and/or system file can be deleted or recovered.The specific side of execution
Selection that there are many formulas, such as:The Uninstaller that the software can be called to carry first performs conventional unloading;It has been unloaded routinely
Cheng Hou searches for correspondence position according to the corresponding mount message, and inquiry is with the presence or absence of remaining file or registry entry, if deposited
Then it is directly being deleted.
By performing conventional unloading, although uninstall that can be more safe, speed may be relatively slow, especially in the presence of
During remaining file, it is also necessary to perform search again.Therefore, according to another embodiment of the present invention, conventional unload can not also be performed
It carries, but the catalogue and/or registry entry of installing software that may relate to directly is searched for according to the corresponding mount message;
If searching the content to match with the mount message, directly delete or recover.
In some application environments, such as the operating system of some mobile phones, it is desirable that when performing software unloading, it is necessary to pass through
Crossing the Uninstaller that the software carries could complete, although this can prevent from deleting software by mistake to a certain extent, also give one
A little rogue programs leave opportunity.For example, some rogue programs have distorted the Uninstaller that application software carries, cause one
Denier runs the Uninstaller just and can trigger the rogue program, thus can not complete deletion virus.For such case, the present invention
It is another that an embodiment is provided when performing unloading:The Uninstaller that the software is carried first is deleted, and is generated one and carried with original
Uninstaller new Uninstaller of the same name, and the new Uninstaller does not perform uninstall action after starting and exits, for example,
It is exited after startup without performing any action at once, in this way, operating system is considered as having performed the unloading that the software carries
Program;Then, after the new Uninstaller has been performed, further according to the corresponding mount message, the peace that may relate to is searched for
Fill the catalogue and/or registry entry of software;If searching the content to match with the mount message, directly delete or extensive
It is multiple.
It is of the present invention to the possible installation site of software and the installation software catalog and registry entry that may relate to
Etc. information search, can be by " Program Files " file under each drive, under root, " Documents
The position of the frequent releasing document of the installation files such as and Settings " files or frequent mounted file modification scans for,
Can be used to matched information can include the title of the software, icon, shortcut and the specific file for being specific to the software
Etc. information.
In order to avoid some softwares are to unloading or delete set special protection, such as need input validation code or needs
The obstacle caused by the measures such as unloading or deletion could be performed after unlock, it according to an embodiment of the invention, can be by directly will
The mode that file crushes is deleted by force and thoroughly, i.e., is packed into the data field for storing the file content to be deleted
This document Status Flag to cover former data, and is arranged to " delete " by hash in directory area.
And need that there is corresponding permission for the operation of some registry entries, therefore, according to an embodiment of the invention,
Before execution is deleted or recovered to the modification of registration table, the operating right of registration table can be changed automatically first, with
Obtain complete control.For example, " everyone " in registry entry operating right can be authorized to complete control.
It is above-mentioned be deleted or modified by force by way of uninstall, it is possible to some undesirable knots can be caused
Fruit for such case, can determine corrective measure, which be embodied in the corresponding installation of the software by analyzing its reason
In information, and database is stored in, is not in similar results to there is client to perform again when the software unloads.
It is corresponding with the strength discharging method of the present invention, the present invention also provides a kind of strength uninstalling system, as shown in Fig. 2,
Including data module 201, detection module 202, detecting module 203, data obtaining module 204, Unload module 205.Wherein:
Data module 201 can be located at client the machine, can also be located at remote server, for storing different software
Mount message, the mount message can be analyzed to determine by the installation process to software, including dbase and
Version, the file of addition and the modification to registration table and/or system file can also include possible installation file catalogue
Information;
Detection module 202, for detecting the mounted software of the machine in client, including dbase and version information,
Software is installed for every money, corresponding unloading prompting is provided;
Detecting module 203, for whether detecting user according to the unloading operation for unloading prompting and having selected certain software;
Data obtaining module 204 detects user according to the unloading for unloading prompting and having selected certain software for working as
After operation, according to the title and version of the software, mount message corresponding with the software is obtained from data module;
Unload module 205, for according to the corresponding mount message, the file which is added in installation process with
And the modification of registration table and/or system file is deleted or recovered.
The data module can be the information formats such as the form of database or list or text.According to this hair
Bright embodiment, data module can be located at client the machine, can also be located at remote server.Here is with database shape
Formula is illustrated.
Equally, in order to avoid the program or file that are unloaded just are occupied and dismount failure caused by possibility by other programs,
Whether Unload module of the present invention before unloading is performed, can first determine whether the software document by some program institute
It occupies, if it is, releasing the locking between the desire uninstall and the occupancy program.It unlocks may be employed and be scanned into
Journey closes and occupies program, terminates the modes such as its process or service.
Equally, the unloading manner of Unload module 205 can also there are many selections.
As shown in figure 3, the Unload module 205, can include conventional unloading unit 301 and remaining deletion unit 302,
Wherein:
Conventional unloading unit 301 for performing the Uninstaller that the software carries, carries out conventional unloading;
Whether remnants delete unit 302, for after the completion of routinely unloading, being deposited according to the corresponding mount message inquiry
In remaining file or registry entry, if it is present corresponding delete.
As shown in figure 4, the Unload module 205, can also be including search unit 401 and execution unit 402, wherein:
Search unit 401, for according to the corresponding mount message, searching for the catalogue for installing software that may relate to
And/or registry entry;
Execution unit 402 is deleted or recovered for after the content to match with the mount message is searched, performing.
As shown in figure 5, the Unload module 205, can also be that, including replacement unit 501, search unit 502 performs list
Member 503, wherein:
Replacement unit 501, the Uninstaller for the software to be carried are deleted, and generate a unloading journey carried with original
Sequence new Uninstaller of the same name, the new Uninstaller do not perform uninstall action after starting and exit;
Search unit 502, for after the new Uninstaller is performed, according to the corresponding mount message, search may
The catalogue and/or registry entry for the installation software being related to;
Execution unit 503, for when searching the content to match with the mount message, performing deletion or extensive to it
It is multiple.
The Unload module can be packed into when performing deletion in the data field for storing the file content to be deleted
This document Status Flag to cover former data, and is arranged to " delete ", it is possible thereby to reach thorough by hash in directory area
The effect of deletion;And when performing Registry Modifications, the operating right of registration table can be changed first, it is complete to obtain
Control.
The specific running of strength uninstalling system other parts of the present invention, the embodiment with the strength discharging method
The realization details of middle introduction is similar, and details are not described herein.
Claims (19)
- A kind of 1. method of strength uninstall, which is characterized in that include the following steps:The mounted software of the machine is detected in client, including dbase and version information, is provided to have installed software per money Corresponding unloading prompting;After detecting user and having selected the unloading operation of certain software according to the unloading prompting, according to the title of the software and Version, obtains preset mount message corresponding with the software from data file, and the mount message is being pacified including the software Fill the file added in the process and the modification to registration table and/or system file;Wherein, the mount message passes through advance The installation process of software is simulated and analysis obtains;According to the corresponding mount message, the file which is added in installation process and to registration table and/or it is The modification of system file is deleted or recovered.
- 2. the method as described in claim 1, which is characterized in that the data file is located at client the machine or remote service Device.
- 3. the method as described in claim 1, which is characterized in that before the delete step is performed, further comprise:Judge the software document whether shared by some program;If it is, release the locking of the desire uninstall and the occupancy program.
- 4. the method as described in claim 1, which is characterized in that it is described according to the corresponding mount message, which is added File and the step of the modification of registration table and/or system file is deleted or recovered, including:The Uninstaller that the software carries is performed, performs conventional unloading;After the completion of conventional unloading, according to the corresponding mount message inquiry with the presence or absence of remaining file or registry entry, if In the presence of then corresponding to delete.
- 5. the method as described in claim 1, which is characterized in that the mount message further comprises possible installation file mesh Record information.
- 6. such as claim 1-5 any one of them methods, which is characterized in that it is described according to the corresponding mount message, by this The file of software addition and the step of the modification of registration table and/or system file is deleted or recovered, including:According to the corresponding mount message, the catalogue and/or registry entry of installing software that may relate to are searched for;If searching the content to match with the mount message, directly delete or recover.
- 7. such as claim 1-5 any one of them methods, which is characterized in that it is described according to the corresponding mount message, by this The file of software addition and the step of the modification of registration table and/or system file is deleted or recovered, including:The Uninstaller that the software is carried is deleted, and generates a new Uninstaller of the same name with the former Uninstaller carried, The new Uninstaller does not perform uninstall action after starting and exits;After performing the new Uninstaller, according to the corresponding mount message, search for the installation software that may relate to catalogue and/ Or registry entry;If searching the content to match with the mount message, directly delete or recover.
- 8. the method as described in claim 1, which is characterized in that described the step of deleting file, including:Hash is packed into the data field for storing the file content to be deleted, to cover former data, and in directory area This document Status Flag is arranged to " delete ".
- 9. the method as described in claim 1, which is characterized in that the step that the modification to registration table is deleted or recovered Suddenly, including being changed automatically to the operating right of registration table first the step of, to obtain complete control.
- 10. a kind of system of strength uninstall, which is characterized in that including:Data module, for storing the mount message of different software, the mount message includes dbase and version, addition File and the modification to registration table and/or system file;Wherein, the mount message passes through the installation in advance to software Cheng Jinhang is simulated and analysis obtains;Detection module, for detecting the mounted software of the machine in client, including dbase and version information, be per money Software is installed, corresponding unloading prompting is provided;Detecting module, for whether detecting user according to the unloading operation for unloading prompting and having selected certain software;Data obtaining module, for when detect user according to it is described unloading prompting selected the unloading operation of certain software after, According to the title and version of the software, mount message corresponding with the software is obtained from data module;Unload module, for according to the corresponding mount message, the file which is added in installation process and to note The modification of volume table and/or system file is deleted or recovered.
- 11. system as claimed in claim 10, which is characterized in that the data module is located at client the machine or remote service Device.
- 12. system as claimed in claim 10, which is characterized in that the Unload module before deletion is performed, first determines whether this Whether software document is shared by some program, if it is, releasing the locking of the desire uninstall and the occupancy program.
- 13. system as claimed in claim 10, which is characterized in that the Unload module, including:Conventional unloading unit for performing the Uninstaller that the software carries, carries out conventional unloading;Remnants delete unit, for after the completion of routinely unloading, being inquired about according to the corresponding mount message with the presence or absence of remnants File or registry entry, if it is present corresponding delete.
- 14. system as claimed in claim 10, which is characterized in that the mount message further comprises possible installation file Directory information.
- 15. such as claim 10-14 any one of them systems, which is characterized in that the Unload module, including:Search unit, for according to the corresponding mount message, searching for the catalogue for installing software that may relate to and/or registration List item;Execution unit is deleted or recovered for after the content to match with the mount message is searched, performing.
- 16. such as claim 10-14 any one of them systems, which is characterized in that the Unload module, including:Replacement unit, the Uninstaller for the software to be carried are deleted, and generation one is of the same name with the former Uninstaller carried New Uninstaller, the new Uninstaller do not perform uninstall action after starting and exits;Search unit, for after the new Uninstaller is performed, according to the corresponding mount message, searching for the peace that may relate to Fill the catalogue and/or registry entry of software;Execution unit, for when searching the content to match with the mount message, deletion or recovery to be performed to it.
- 17. system as claimed in claim 10, which is characterized in that the Unload module is when performing deletion, described in storage The data field of the file content to be deleted is packed into hash, to cover former data, and in directory area by this document state mark Will is arranged to " delete ".
- 18. a kind of computer equipment, which is characterized in that including:It memory, processor and is stored on the memory and can be The computer program run on the processor realizes such as claim 1 when the computer program is performed by the processor To the strength uninstall any one of 9 method the step of.
- 19. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program, the computer program realize strength uninstall as claimed in any one of claims 1-9 wherein when being executed by processor Method the step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510085160.5A CN104679562B (en) | 2011-01-04 | 2011-01-04 | A kind of method and system of strength uninstall |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110005069.XA CN102043655B (en) | 2011-01-04 | 2011-01-04 | Method and system for carrying out advanced uninstall on software |
CN201510085160.5A CN104679562B (en) | 2011-01-04 | 2011-01-04 | A kind of method and system of strength uninstall |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110005069.XA Division CN102043655B (en) | 2011-01-04 | 2011-01-04 | Method and system for carrying out advanced uninstall on software |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104679562A CN104679562A (en) | 2015-06-03 |
CN104679562B true CN104679562B (en) | 2018-06-05 |
Family
ID=53314659
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510085160.5A Active CN104679562B (en) | 2011-01-04 | 2011-01-04 | A kind of method and system of strength uninstall |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104679562B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106155740A (en) * | 2016-06-30 | 2016-11-23 | 百度在线网络技术(北京)有限公司 | For the method and apparatus carrying out Unloading Control |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101256498A (en) * | 2008-03-25 | 2008-09-03 | 中兴通讯股份有限公司 | Method and device for unloading terminal drive |
CN101876914A (en) * | 2010-04-23 | 2010-11-03 | 中兴通讯股份有限公司 | Method for deleting files and mobile terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4082256B2 (en) * | 2003-03-25 | 2008-04-30 | ブラザー工業株式会社 | Information processing apparatus and program |
-
2011
- 2011-01-04 CN CN201510085160.5A patent/CN104679562B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101256498A (en) * | 2008-03-25 | 2008-09-03 | 中兴通讯股份有限公司 | Method and device for unloading terminal drive |
CN101876914A (en) * | 2010-04-23 | 2010-11-03 | 中兴通讯股份有限公司 | Method for deleting files and mobile terminal |
Non-Patent Citations (3)
Title |
---|
《软件卸载跟我学》;王彦博等;《电脑知识与技术》;20100430;第19-20页 * |
《软件完美卸载全攻略》;鞠华英等;《电脑知识与技术》;20061031;第27-29页 * |
《顽固程序,请你出局》;乔珊;《软件》;20051231;第39-40页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104679562A (en) | 2015-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102043655B (en) | Method and system for carrying out advanced uninstall on software | |
CN100426298B9 (en) | A kind of cleaning garbage files method and system | |
US7669059B2 (en) | Method and apparatus for detection of hostile software | |
JP4807970B2 (en) | Spyware and unwanted software management through autostart extension points | |
CN101641681B (en) | Self-managed processing device | |
US8407189B2 (en) | Finding and fixing stability problems in personal computer systems | |
CN104040496B (en) | Terminal and application recovery method | |
US20130160126A1 (en) | Malware remediation system and method for modern applications | |
CN105743730B (en) | The method and its system of real time monitoring are provided for the web service of mobile terminal | |
JP5363305B2 (en) | Method for determining the ID of an electronic device | |
CN106557384A (en) | Based on the data processing method of Linux, device and system | |
WO2011085647A1 (en) | Method and apparatus for detecting software installation | |
CN104536792A (en) | Method and device for eliminating application program residual files | |
EP1903468A1 (en) | Sharing management program, sharing management method, terminal, and sharing management system | |
WO2011130971A1 (en) | Method and mobile terminal for deleting files | |
JP2010026662A (en) | Information leakage prevention system | |
CN105868056B (en) | Obtain the method, apparatus and secure virtual machine of deleted document in Windows virtual machine | |
CN107766068B (en) | Application system patch installation method and device, computer equipment and storage medium | |
US9459976B1 (en) | Repair of computers that have software-related problems | |
CN104679562B (en) | A kind of method and system of strength uninstall | |
CN104200164B (en) | Loader virus searching and killing method, device and terminal | |
CN106897063B (en) | Method and system for permanently adding OS boot entry to BIOS based on EFI | |
KR101060596B1 (en) | Malicious file detection system, malicious file detection device and method | |
CN103795771A (en) | User terminal, reliability management server, and corresponding methods and programs | |
JP2008210151A (en) | Failure prediction system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220728 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |