CN105159710A - Software uninstalling method and apparatus - Google Patents
Software uninstalling method and apparatus Download PDFInfo
- Publication number
- CN105159710A CN105159710A CN201510548159.1A CN201510548159A CN105159710A CN 105159710 A CN105159710 A CN 105159710A CN 201510548159 A CN201510548159 A CN 201510548159A CN 105159710 A CN105159710 A CN 105159710A
- Authority
- CN
- China
- Prior art keywords
- software
- client
- project
- information
- unloading
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a software uninstalling method and apparatus. The method comprises: for software installed by a client, configuring a software installation information library and an uninstalling protection library in the client, wherein the software installation information library records installation information of installed software, the installation information comprises position information of an item added or modified in the installing process of the installed software, and the uninstalling protection library records uninstalling protection conditions of the installed software; and when detecting that a user performs uninstalling operation on the certain installed software, looking for the installation information and the uninstalling protection conditions corresponding to the installed software in the software installation information library and the uninstalling protection library, positioning the position of the item needed to be deleted according to the corresponding installation information, and if judging that the deletion of the item does not trigger the corresponding uninstalling protection condition, executing corresponding item deletion. According to the software uninstalling method and apparatus, the security and thoroughness of software uninstalling are enhanced.
Description
The divisional application that patented claim of the present invention is the applying date is on March 31st, 2012, application number is 201210092473.X, name is called the Chinese invention patent application of " a kind of software uninstalling method and device ".
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of software uninstalling method and device.
Background technology
Along with the development of computing machine and Internet technology, various application software also emerges in an endless stream.Most software is all very easy to and friendly when mounted, but when unloading, although self a Uninstaller substantially all can be provided, but some software is for certain object or self is lack of standardization, usually cannot unload from user computer thoroughly and delete, and residual lower a large amount of garbage files, even in registration table, go back legacy software information.These residual files or data may be the files retaining User Defined setting, but be also likely because Uninstaller imperfection, and the portion of residual file left over or data, this causes very large puzzlement for user, also have impact on the performance of computing machine simultaneously.
Although there is partial software can provide a prompting needing manually to delete after unloading at present, but for vast domestic consumer, can't understand and how go manually to delete to leave over file, therefore, how to provide a kind of sophisticated software to unload mechanism, become industry problem demanding prompt solution.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of software uninstalling method and device, to overcome the problem being difficult in prior art fully and completely be carried out by software unloading.
For solving the problems of the technologies described above, the invention provides a kind of software uninstalling method, comprising the steps:
For the mounted software of client, configure a software installation information storehouse and a unloading protecting storehouse in the client, wherein, described software installation information storehouse records the mount message of mounting software, the mounting software positional information of project of adding or revising in installation process described in described mount message comprises; The unloading protecting condition to described mounting software is recorded in described unloading protecting storehouse;
When detecting user and performing unloading operation for certain money mounting software; search in described software installation information storehouse and described unloading protecting storehouse this mounting software corresponding mount message and the unloading protecting condition of correspondence; mount message according to described correspondence locates the item destination locations that should remove; if judge that the removing of this project does not trigger the unloading protecting condition of described correspondence, then perform corresponding project and remove.
The present invention also provides a kind of software discharge mechanism, comprising:
Configuration module, for for the mounted software of client, configure a software installation information storehouse and a unloading protecting storehouse in the client, wherein, described software installation information storehouse records the mount message of mounting software, the mounting software positional information of project of adding or revising in installation process described in described mount message comprises; The unloading protecting condition to described mounting software is recorded in described unloading protecting storehouse;
Execution module; for when detecting user and performing unloading operation for certain money mounting software; the unloading protecting condition of this mount message that mounting software is corresponding and correspondence is searched in described software installation information storehouse and described unloading protecting storehouse; mount message according to described correspondence locates the item destination locations that should remove; if judge that the removing of this project does not trigger the unloading protecting condition of described correspondence, then perform corresponding project and remove.
The embodiment of application the application, both speed when software unloads and efficiency can have been improved, also security when software unloads and completeness can be strengthened, well make up the ubiquitous unloading defect of existing software, ensure that the clean and tidy of operating system from the direction of unloading for user, be also beneficial to the daily servicing of operating system.The embodiment of the application is by the cleaning to residual project; it also avoid the behavior of part Malware resident user system; and; because partial software can retain user's private data automatically; by the technical scheme of the application; can provide for user the function removing private file fast, privacy of user protection serves certain protective effect.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the software uninstalling method process flow diagram according to the embodiment of the application.
Fig. 2 is the software uninstalling method process flow diagram according to another embodiment of the application.
Fig. 3 is the concrete implementing procedure figure of Fig. 2.
Fig. 4 is the software discharge mechanism schematic diagram according to the embodiment of the application.
Fig. 5 is the software discharge mechanism schematic diagram according to another embodiment of the application.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
As shown in Figure 1, be the software uninstalling method process flow diagram according to the embodiment of the present application, comprise the steps:
Step 101: for the mounted software of client, configure a software installation information storehouse and a unloading protecting storehouse in the client, wherein, described software installation information storehouse records the mount message of mounting software, and described mount message comprises the positional information of the project that mounting software adds or revises in installation process; The unloading protecting condition to mounting software is recorded in described unloading protecting storehouse;
Step 102: when detecting user and performing unloading operation for certain money mounting software; this mount message that mounting software is corresponding and unloading protecting condition is searched in described software installation information storehouse and unloading protecting storehouse; mount message according to correspondence locates the item destination locations that should remove; if judge that the removing of this project does not trigger corresponding unloading protecting condition, then perform corresponding project and remove.
Wherein, action of configuration described in a step 101, can be the list of mounting software that regularly reported according to client by server end and the software installation information of correspondence is updated to corresponding client.And at server end, then can carry out ex ante analysis for the software that installation amount is larger, record its mount message, when client is according to its mount message of the software asks of self installing, by server end, the software installation information of correspondence is sent to client.
Described unloading protecting condition, comprises the restriction of quantity of documents under specific installation directory and/or size.The protection restriction provided by unloading protecting storehouse, can prevent user from missing deleted file when uninstall, as the quantity of documents interval regulation under certain software catalog, to the path etc. of some log files that user generates.Such as, can specify that the file under certain software installation files folder should be between 20-150, size is in 50M, go beyond the scope if super, then under this catalogue, file has exception, the document that the family oneself that comes in handy is preserved, and would not overall delete file like this, but the file in first kill file folder, then delete targetedly.
Described unloading protecting condition, can also comprise the download file preservation position that whether there is this software and provide, if existed, then retain this position.Such as, consider that certain software provides download function for user, and in time unloading this software, first can scan download file and preserve position, and retain this position, after unloading completes, prompting user downloads and preserves position.
Unloading protecting condition in above-mentioned unloading protecting storehouse is can at server end by obtain the ex ante analysis of conventional software equally, and is sent to client according to the request of client.
In addition, according to embodiments of the invention, before the above-mentioned unloading operation of execution, can also another kind of unloading manner be carried out, as shown in Figure 2, when detecting user and performing unloading operation for certain money mounting software, first can perform following steps:
Step 201: obtain software to be unloaded in client and be present in all items information in this client, and described project information is preserved;
Step 202: the Uninstaller calling described software to be unloaded self, performs and normally unloads flow process;
Step 203: after described normal unloading completes, judges whether to there is residual project according to the project information of described preservation, if existed, then removes described residual project.
In this embodiment, first can carry out depth scan analysis for software to be unloaded in terminal before unloading, the registry information of this software, program source file, operation are generated the projects such as document and all detect, and the project information such as the title of project and path preserved.Under existing computing machine mainstream configuration, the time that this software information is analyzed can be very of short duration, can not have influence on Consumer's Experience.
Another kind of mode is monitored and record its installation behavior when software is installed, and in this software later stage implementation, record is carried out to the document information generated, also can know the project information relevant with this software thus, but this mode can cause certain storage space to take undoubtedly.
Also have a kind of mode be recorded the relevant item information list of generation this software by the installation behavior of this software of ex ante analysis at server end, and when client-requested or timed sending to client, also can know the project information of this software thus.But which is need network environment on the one hand, on the other hand also be only applicable to general off-the-shelf software, for the software of some comparatively minorities, server end is difficult to accomplish comprehensive ex ante analysis, meanwhile, the procedure files such as the document that running software generates also are difficult to capture.
And can the most accurately the project information of software to be unloaded be detected by the mode of local scanning, the path simultaneously these projects existed and title are temporarily preserved, used for follow-up comparison.
After the project information obtaining software to be unloaded, namely can call Uninstaller that this software carries and perform and unload flow process normally.
Then, after software has normally unloaded, remaining project scanning comparison is carried out by the project information of preserving in advance, if find that the project full scale clearance of described preservation is complete, then illustrate and do not leave remaining project, otherwise, then illustrate and have the project do not removed, now, user can be pointed out to have Stub File to exist, title and the path of residual project can also be provided further, and the choice box of a correspondence is provided, the residual project brute force cleaning that will remove is selected to allow user, user is facilitated simply to clean out all remaining projects, also user is facilitated selectively to remove some specific residual project.
Such as, for some procedure file, the standard Uninstaller that this software carries possibly cannot be known also cannot perform deletion, but by the technical scheme of the application, existence and the position of relevant document is obtained by scanning in advance, at this moment, the position of this procedure file can be found according to prior scanning record and directly delete.And for the amendment of some registry information, its position also can be located according to prior scanning record and cleaning or reduction.
After disposing whole remaining project, namely the project information of interim preservation before can be deleted.
Specific embodiment below by Fig. 3 does further understanding to the application.
First, in step 301, scan the All Files of software to be unloaded, obtain the fileinfo of this software;
Then, in step 302, fileinfo is preserved temporarily;
In step 303, call the Uninstaller of this software self;
In step 304, perform and normally unload flow process, routine has unloaded;
In step 305, the fileinfo according to preserving scans client file again, judges whether to there is remaining file;
If there is no, then perform step 306, all unloaded, determined noresidue file;
If have Stub File, then perform step 307, powerful cleaning function is provided;
In step 308, clean remaining file, then terminate.
In practice, flow process connected applications can be unloaded by unloading described in Fig. 1 described in flow process and Fig. 2, namely when detecting user and will unloading certain software, first the unloading flow process described in Fig. 2 can be performed, first field scan is carried out to this band uninstall, obtain mount message, then call the Uninstaller that this software carries and carry out routine unloading, the mount message obtained according to scanning again after routine has unloaded scans again, judge whether to there is remaining project, if there is remaining project, then remaining project is removed; But; if when the remaining project comparatively obstinate to some can not unload successful completely; or when suspection still has remaining project to exist; unloading flow process as shown in Figure 1 can be called again; software installation information storehouse according to configured in advance is directly thoroughly removed installation project; meanwhile, apply unloading protecting storehouse to protect removing action.
Certainly, comparatively speaking, the above-mentioned unloading flow process combined is concerning safer safe software unloading operation, if but directly perform the unloading flow process shown in Fig. 1, then more can save discharge time, improve unloading efficiency, for most of software can in seconds moment thoroughly unloads, and for the Malware that cannot unload, also comparatively outstanding elimination effect is had, also save the operation steps of user simultaneously, save the process that common unloading is loaded down with trivial details, for user provides one-touch perfection unloading, the good experience of noresidue file.
In like manner, as shown in Figure 4, according to embodiments of the invention, also provide a kind of software discharge mechanism, comprise configuration module 401 and execution module 402, wherein:
Configuration module 401, for for the mounted software of client, configure a software installation information storehouse and a unloading protecting storehouse in the client, wherein, described software installation information storehouse records the mount message of mounting software, comprises the positional information of the project that software adds or revises in installation process; The unloading protecting condition to mounting software is recorded in described unloading protecting storehouse;
Execution module 402; for when detecting user and performing unloading operation for certain money mounting software; mount message and the unloading protecting condition of this software is searched in described software installation information storehouse and unloading protecting storehouse; the item location that should remove is located according to mount message; if judge that the removing of this project does not trigger unloading protecting condition, then perform corresponding project and remove.
The software installation information that described configuration module 401 obtains, the list of mounting software regularly reported according to client by server end and the software installation information of correspondence is updated to corresponding client.
Please refer to Fig. 5, is another software discharge mechanism schematic diagram provided according to the embodiment of the present application, comprises acquisition module 501, Unload module 502 and removes module 503, wherein:
Acquisition module 501, for when detecting user and performing unloading operation for certain money mounting software, first obtains software to be unloaded at client scan and is present in all items information in this client, and preserve described project information;
Unload module 502, for after preserving the project information obtained, calls the Uninstaller of described software to be unloaded self, performs and normally unloads flow process;
Remove module 503, for after described normal unloading completes, judge whether to there is residual project according to the project information of described preservation, if existed, then remove described residual project.
Wherein, described acquisition module 501, by scanning in described client, obtains all items information relevant with software to be unloaded.
In addition, as shown in Figure 5, can further include removing module 504, for deleting the project information of described preservation.
Described software to be unloaded is present in all items information of this client, can comprise the registry information of this software, program source file, operation generation document.
Described acquisition module 501, can preserve title and the path of described project.
Described removing module 503, can point out to user and there is residual project, and delete corresponding residual project according to the selection of user.
Described removing module 503, can also point out title and the path of residual project, and provide the choice box of a correspondence, select the residual project that will remove to allow user to user.
Described in each several part operational details of said apparatus embodiment and beneficial effect and the application, the appropriate section of embodiment of the method is similar, and therefore not to repeat here.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.
The application can describe in the general context of computer executable instructions, such as program module.Usually, program module comprises the routine, program, object, assembly, data structure etc. that perform particular task or realize particular abstract data type.Also can put into practice the application in a distributed computing environment, in these distributed computing environment, be executed the task by the remote processing devices be connected by communication network.In a distributed computing environment, program module can be arranged in the local and remote computer-readable storage medium comprising memory device.
Finally, also it should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, commodity or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, commodity or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, commodity or the equipment comprising described key element and also there is other identical element.
Be described in detail the embodiment of the application above, apply specific case herein and set forth the principle of the application and embodiment, the explanation of above embodiment is just for helping method and the core concept thereof of understanding the application; Meanwhile, for one of ordinary skill in the art, according to the thought of the application, all will change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the application.
Claims (12)
1. a software uninstalling method, is characterized in that, comprises the steps:
For the mounted software of client, configure a software installation information storehouse and a unloading protecting storehouse in the client, wherein, described software installation information storehouse records the mount message of mounting software, the mounting software positional information of project of adding or revising in installation process described in described mount message comprises; The unloading protecting condition to described mounting software is recorded in described unloading protecting storehouse;
When detecting user and performing unloading operation for certain money mounting software; the mount message that described in searching in described software installation information storehouse and described unloading protecting storehouse, mounting software is corresponding and the unloading protecting condition of correspondence; mount message according to described correspondence locates the item destination locations that should remove; if judge that the removing of described project does not trigger the unloading protecting condition of described correspondence, then perform corresponding project and remove.
2. the method for claim 1, is characterized in that, described configuration step, comprising: the list of mounting software regularly reported according to client by server end and the software installation information of correspondence is updated to corresponding client.
3. method as claimed in claim 1 or 2, it is characterized in that, described unloading protecting condition comprises:
Quantity of documents under specific installation directory relevant to described mounting software in described client and/or the restriction of size, if described quantity of documents and/or size exceed above-mentioned restriction, then do not remove above-mentioned specific installation directory; Or
The download file whether described in existing in described client mounting software provides preserves position, if existed, then preserves position to described download file and retains.
4. the method for claim 1, is characterized in that, when detecting user and performing unloading operation for certain money mounting software, comprises further: first perform following steps:
Obtain software to be unloaded in client and be present in all items information in this client, and described project information is preserved;
Call the Uninstaller of described software to be unloaded self, perform and normally unload flow process;
After described normal unloading completes, judge whether to there is residual project according to the project information of described preservation, if existed, then remove described residual project.
5. method as claimed in claim 4, it is characterized in that, described acquisition software to be unloaded is present in the step of all items information in this client, comprising: scan in described client, obtains all items information relevant with software to be unloaded.
6. method as claimed in claim 4, is characterized in that, comprise step further: the project information of deleting described preservation.
7. a software discharge mechanism, is characterized in that, comprising:
Configuration module, for for the mounted software of client, configure a software installation information storehouse and a unloading protecting storehouse in the client, wherein, described software installation information storehouse records the mount message of mounting software, the mounting software positional information of project of adding or revising in installation process described in described mount message comprises; The unloading protecting condition to described mounting software is recorded in described unloading protecting storehouse;
Execution module; for when detecting user and performing unloading operation for certain money mounting software; the mount message that described in searching in described software installation information storehouse and described unloading protecting storehouse, mounting software is corresponding and the unloading protecting condition of correspondence; mount message according to described correspondence locates the item destination locations that should remove; if judge that the removing of described project does not trigger corresponding unloading protecting condition, then perform corresponding project and remove.
8. device as claimed in claim 7, is characterized in that, the software installation information that described configuration module obtains, the list of mounting software regularly reported according to client by server end and the software installation information of correspondence is updated to corresponding client.
9. device as claimed in claim 7 or 8, it is characterized in that, described unloading protecting condition comprises:
Quantity of documents under specific installation directory relevant to described mounting software in described client and/or the restriction of size, if described quantity of documents and/or size exceed above-mentioned restriction, then do not remove above-mentioned specific installation directory; Or
The download file whether described in existing in described client mounting software provides preserves position, if existed, then preserves position to described download file and retains.
10. device as claimed in claim 7, is characterized in that, comprise further:
Acquisition module, for when detecting user and performing unloading operation for certain money mounting software, first obtains software to be unloaded at client scan and is present in all items information in this client, and preserve described project information;
Unload module, for after preserving the project information obtained, calls the Uninstaller of described software to be unloaded self, performs and normally unloads flow process;
Remove module, for after described normal unloading completes, judge whether to there is residual project according to the project information of described preservation, if existed, then remove described residual project.
11. devices as claimed in claim 10, is characterized in that, described acquisition module, for scanning in described client, obtain all items information relevant with software to be unloaded.
12. devices as claimed in claim 10, is characterized in that, comprise further: removing module, for deleting the project information of described preservation.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210092473.XA CN102662667B (en) | 2012-03-31 | 2012-03-31 | A kind of software uninstalling method and device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210092473.XA Division CN102662667B (en) | 2012-03-31 | 2012-03-31 | A kind of software uninstalling method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105159710A true CN105159710A (en) | 2015-12-16 |
Family
ID=46772168
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210092473.XA Active CN102662667B (en) | 2012-03-31 | 2012-03-31 | A kind of software uninstalling method and device |
CN201510548159.1A Pending CN105159710A (en) | 2012-03-31 | 2012-03-31 | Software uninstalling method and apparatus |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210092473.XA Active CN102662667B (en) | 2012-03-31 | 2012-03-31 | A kind of software uninstalling method and device |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN102662667B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105404537A (en) * | 2015-12-24 | 2016-03-16 | 北京金山安全软件有限公司 | Application program unloading method and device |
CN107729022A (en) * | 2016-08-11 | 2018-02-23 | 阿里巴巴集团控股有限公司 | Unload the method, apparatus and mobile terminal of application program |
CN108780482A (en) * | 2017-06-06 | 2018-11-09 | 华为技术有限公司 | The method and apparatus applied in management safety device |
WO2018223509A1 (en) * | 2017-06-06 | 2018-12-13 | 华为技术有限公司 | Method of managing application in secure device, and device |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103092687B (en) * | 2012-12-26 | 2017-10-20 | 上海斐讯数据通信技术有限公司 | A kind of application program management apparatus and method |
CN103064716B (en) * | 2013-01-14 | 2016-04-27 | 广东欧珀移动通信有限公司 | The method of mobile terminal device fast discharging application program |
CN103971056B (en) | 2013-01-31 | 2016-05-11 | 腾讯科技(深圳)有限公司 | A kind ofly prevent the unloaded method and apparatus of application program in operating system |
CN103176828B (en) * | 2013-03-29 | 2017-06-09 | 北京奇虎科技有限公司 | Delete the method and device of application program Stub File |
CN103345411A (en) * | 2013-07-09 | 2013-10-09 | 北京奇虎科技有限公司 | Method and device for uninstalling application program |
CN103500116A (en) * | 2013-10-29 | 2014-01-08 | 中科创达软件股份有限公司 | Method and system for clearing data generated by application program |
CN103645914B (en) * | 2013-11-26 | 2017-02-08 | 北京奇虎科技有限公司 | Software cleaning method and device |
CN103631603A (en) * | 2013-12-16 | 2014-03-12 | 北京奇虎科技有限公司 | Software cleaning method and system |
CN104102516A (en) * | 2014-07-21 | 2014-10-15 | 北京金山安全软件有限公司 | Application program unloading method and device |
CN105718278B (en) * | 2014-12-05 | 2019-02-12 | 北京奇虎科技有限公司 | Unloading cracks the method and device of edition application program |
CN104933332B (en) * | 2015-06-10 | 2018-07-13 | 北京北信源软件股份有限公司 | A kind of method and device for preventing software from illegally being unloaded |
CN105243102B (en) * | 2015-09-17 | 2018-11-23 | 北京金山安全软件有限公司 | Processing method and device for unloading residual file and terminal |
CN106557525B (en) * | 2015-09-30 | 2020-07-28 | 北京金山安全软件有限公司 | Method and device for cleaning application program residual file and electronic equipment |
CN105511932A (en) * | 2015-12-30 | 2016-04-20 | 广东欧珀移动通信有限公司 | Application unloading method and device |
CN106934277A (en) * | 2015-12-30 | 2017-07-07 | 北京金山安全软件有限公司 | Application program detection method and device and terminal |
CN106203084B (en) * | 2016-06-29 | 2019-05-10 | 珠海豹趣科技有限公司 | A kind of processing method of uninstall, device and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101206619A (en) * | 2006-12-21 | 2008-06-25 | 佳能株式会社 | Data processing apparatus and control method thereof |
US20110002571A1 (en) * | 2009-01-15 | 2011-01-06 | Ab Skf | Bearing Assembly with Elastomeric Sleeve Element |
CN102043655A (en) * | 2011-01-04 | 2011-05-04 | 奇智软件(北京)有限公司 | Method and system for carrying out advanced uninstall on software |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100399267C (en) * | 2005-03-18 | 2008-07-02 | 联想(北京)有限公司 | Method of managing software installation and unloading |
CN101876913A (en) * | 2010-01-05 | 2010-11-03 | 深圳中兴网信科技有限公司 | Software component management method and software component manager |
CN101984410B (en) * | 2010-11-12 | 2015-06-10 | 中兴通讯股份有限公司 | Method and device for generating and unloading software installation package |
-
2012
- 2012-03-31 CN CN201210092473.XA patent/CN102662667B/en active Active
- 2012-03-31 CN CN201510548159.1A patent/CN105159710A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101206619A (en) * | 2006-12-21 | 2008-06-25 | 佳能株式会社 | Data processing apparatus and control method thereof |
US20110002571A1 (en) * | 2009-01-15 | 2011-01-06 | Ab Skf | Bearing Assembly with Elastomeric Sleeve Element |
CN102043655A (en) * | 2011-01-04 | 2011-05-04 | 奇智软件(北京)有限公司 | Method and system for carrying out advanced uninstall on software |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105404537A (en) * | 2015-12-24 | 2016-03-16 | 北京金山安全软件有限公司 | Application program unloading method and device |
CN105404537B (en) * | 2015-12-24 | 2019-08-06 | 珠海豹趣科技有限公司 | A kind of discharging method and device of application program |
CN107729022A (en) * | 2016-08-11 | 2018-02-23 | 阿里巴巴集团控股有限公司 | Unload the method, apparatus and mobile terminal of application program |
CN107729022B (en) * | 2016-08-11 | 2021-06-08 | 阿里巴巴集团控股有限公司 | Method and device for unloading application program and mobile terminal |
CN108780482A (en) * | 2017-06-06 | 2018-11-09 | 华为技术有限公司 | The method and apparatus applied in management safety device |
WO2018223509A1 (en) * | 2017-06-06 | 2018-12-13 | 华为技术有限公司 | Method of managing application in secure device, and device |
CN108780482B (en) * | 2017-06-06 | 2020-10-27 | 华为技术有限公司 | Method and device for managing applications in a secure device |
Also Published As
Publication number | Publication date |
---|---|
CN102662667A (en) | 2012-09-12 |
CN102662667B (en) | 2015-09-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102662667B (en) | A kind of software uninstalling method and device | |
CN102043655B (en) | Method and system for carrying out advanced uninstall on software | |
CN103092664B (en) | Processing method and device for data file of android system | |
CN102736978B (en) | A kind of method and device detecting the installment state of application program | |
CN100426298B9 (en) | A kind of cleaning garbage files method and system | |
CN103577567A (en) | Method for uninstalling application and deleting garbage file in Android system | |
CN103176828A (en) | Method and device of deleting application program residual files | |
CN104461786B (en) | The restoration methods of android system and the recovery system of android system | |
CN104573515A (en) | Virus processing method, device and system | |
CN104199711A (en) | Method and device for creating root access | |
US20170316209A1 (en) | Method and device for preventing application in an operating system from being uninstalled | |
CN103034803B (en) | Dress software prompt system by mistake | |
CN103631628A (en) | Software cleaning method and system | |
CN103345411A (en) | Method and device for uninstalling application program | |
CN103761178A (en) | Method for realizing application uninstalling surveys | |
CN103793649A (en) | Method and device for cloud-based safety scanning of files | |
CN103902900A (en) | External extraction type detecting device and method for mobile terminal malicious code | |
CN103631603A (en) | Software cleaning method and system | |
CN103294951A (en) | Malicious code sample extraction method and system based on document type bug | |
CN105389509A (en) | Document scanning method and apparatus | |
CN110333876A (en) | A kind of data clearing method and control equipment | |
CN102999566B (en) | Remove the method and apparatus of equipment use vestige | |
CN104915593A (en) | Binding removing processing method and system for software | |
CN103473350A (en) | File processing method and equipment | |
CN105095754A (en) | Method, device and mobile terminal for processing virus applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151216 |
|
RJ01 | Rejection of invention patent application after publication |