CN105159710A - Software uninstalling method and apparatus - Google Patents

Software uninstalling method and apparatus Download PDF

Info

Publication number
CN105159710A
CN105159710A CN201510548159.1A CN201510548159A CN105159710A CN 105159710 A CN105159710 A CN 105159710A CN 201510548159 A CN201510548159 A CN 201510548159A CN 105159710 A CN105159710 A CN 105159710A
Authority
CN
China
Prior art keywords
software
client
project
information
unloading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510548159.1A
Other languages
Chinese (zh)
Inventor
邓鹏�
浦欣
胡文
刘义平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Publication of CN105159710A publication Critical patent/CN105159710A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a software uninstalling method and apparatus. The method comprises: for software installed by a client, configuring a software installation information library and an uninstalling protection library in the client, wherein the software installation information library records installation information of installed software, the installation information comprises position information of an item added or modified in the installing process of the installed software, and the uninstalling protection library records uninstalling protection conditions of the installed software; and when detecting that a user performs uninstalling operation on the certain installed software, looking for the installation information and the uninstalling protection conditions corresponding to the installed software in the software installation information library and the uninstalling protection library, positioning the position of the item needed to be deleted according to the corresponding installation information, and if judging that the deletion of the item does not trigger the corresponding uninstalling protection condition, executing corresponding item deletion. According to the software uninstalling method and apparatus, the security and thoroughness of software uninstalling are enhanced.

Description

A kind of software uninstalling method and device
The divisional application that patented claim of the present invention is the applying date is on March 31st, 2012, application number is 201210092473.X, name is called the Chinese invention patent application of " a kind of software uninstalling method and device ".
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of software uninstalling method and device.
Background technology
Along with the development of computing machine and Internet technology, various application software also emerges in an endless stream.Most software is all very easy to and friendly when mounted, but when unloading, although self a Uninstaller substantially all can be provided, but some software is for certain object or self is lack of standardization, usually cannot unload from user computer thoroughly and delete, and residual lower a large amount of garbage files, even in registration table, go back legacy software information.These residual files or data may be the files retaining User Defined setting, but be also likely because Uninstaller imperfection, and the portion of residual file left over or data, this causes very large puzzlement for user, also have impact on the performance of computing machine simultaneously.
Although there is partial software can provide a prompting needing manually to delete after unloading at present, but for vast domestic consumer, can't understand and how go manually to delete to leave over file, therefore, how to provide a kind of sophisticated software to unload mechanism, become industry problem demanding prompt solution.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of software uninstalling method and device, to overcome the problem being difficult in prior art fully and completely be carried out by software unloading.
For solving the problems of the technologies described above, the invention provides a kind of software uninstalling method, comprising the steps:
For the mounted software of client, configure a software installation information storehouse and a unloading protecting storehouse in the client, wherein, described software installation information storehouse records the mount message of mounting software, the mounting software positional information of project of adding or revising in installation process described in described mount message comprises; The unloading protecting condition to described mounting software is recorded in described unloading protecting storehouse;
When detecting user and performing unloading operation for certain money mounting software; search in described software installation information storehouse and described unloading protecting storehouse this mounting software corresponding mount message and the unloading protecting condition of correspondence; mount message according to described correspondence locates the item destination locations that should remove; if judge that the removing of this project does not trigger the unloading protecting condition of described correspondence, then perform corresponding project and remove.
The present invention also provides a kind of software discharge mechanism, comprising:
Configuration module, for for the mounted software of client, configure a software installation information storehouse and a unloading protecting storehouse in the client, wherein, described software installation information storehouse records the mount message of mounting software, the mounting software positional information of project of adding or revising in installation process described in described mount message comprises; The unloading protecting condition to described mounting software is recorded in described unloading protecting storehouse;
Execution module; for when detecting user and performing unloading operation for certain money mounting software; the unloading protecting condition of this mount message that mounting software is corresponding and correspondence is searched in described software installation information storehouse and described unloading protecting storehouse; mount message according to described correspondence locates the item destination locations that should remove; if judge that the removing of this project does not trigger the unloading protecting condition of described correspondence, then perform corresponding project and remove.
The embodiment of application the application, both speed when software unloads and efficiency can have been improved, also security when software unloads and completeness can be strengthened, well make up the ubiquitous unloading defect of existing software, ensure that the clean and tidy of operating system from the direction of unloading for user, be also beneficial to the daily servicing of operating system.The embodiment of the application is by the cleaning to residual project; it also avoid the behavior of part Malware resident user system; and; because partial software can retain user's private data automatically; by the technical scheme of the application; can provide for user the function removing private file fast, privacy of user protection serves certain protective effect.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the software uninstalling method process flow diagram according to the embodiment of the application.
Fig. 2 is the software uninstalling method process flow diagram according to another embodiment of the application.
Fig. 3 is the concrete implementing procedure figure of Fig. 2.
Fig. 4 is the software discharge mechanism schematic diagram according to the embodiment of the application.
Fig. 5 is the software discharge mechanism schematic diagram according to another embodiment of the application.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
As shown in Figure 1, be the software uninstalling method process flow diagram according to the embodiment of the present application, comprise the steps:
Step 101: for the mounted software of client, configure a software installation information storehouse and a unloading protecting storehouse in the client, wherein, described software installation information storehouse records the mount message of mounting software, and described mount message comprises the positional information of the project that mounting software adds or revises in installation process; The unloading protecting condition to mounting software is recorded in described unloading protecting storehouse;
Step 102: when detecting user and performing unloading operation for certain money mounting software; this mount message that mounting software is corresponding and unloading protecting condition is searched in described software installation information storehouse and unloading protecting storehouse; mount message according to correspondence locates the item destination locations that should remove; if judge that the removing of this project does not trigger corresponding unloading protecting condition, then perform corresponding project and remove.
Wherein, action of configuration described in a step 101, can be the list of mounting software that regularly reported according to client by server end and the software installation information of correspondence is updated to corresponding client.And at server end, then can carry out ex ante analysis for the software that installation amount is larger, record its mount message, when client is according to its mount message of the software asks of self installing, by server end, the software installation information of correspondence is sent to client.
Described unloading protecting condition, comprises the restriction of quantity of documents under specific installation directory and/or size.The protection restriction provided by unloading protecting storehouse, can prevent user from missing deleted file when uninstall, as the quantity of documents interval regulation under certain software catalog, to the path etc. of some log files that user generates.Such as, can specify that the file under certain software installation files folder should be between 20-150, size is in 50M, go beyond the scope if super, then under this catalogue, file has exception, the document that the family oneself that comes in handy is preserved, and would not overall delete file like this, but the file in first kill file folder, then delete targetedly.
Described unloading protecting condition, can also comprise the download file preservation position that whether there is this software and provide, if existed, then retain this position.Such as, consider that certain software provides download function for user, and in time unloading this software, first can scan download file and preserve position, and retain this position, after unloading completes, prompting user downloads and preserves position.
Unloading protecting condition in above-mentioned unloading protecting storehouse is can at server end by obtain the ex ante analysis of conventional software equally, and is sent to client according to the request of client.
In addition, according to embodiments of the invention, before the above-mentioned unloading operation of execution, can also another kind of unloading manner be carried out, as shown in Figure 2, when detecting user and performing unloading operation for certain money mounting software, first can perform following steps:
Step 201: obtain software to be unloaded in client and be present in all items information in this client, and described project information is preserved;
Step 202: the Uninstaller calling described software to be unloaded self, performs and normally unloads flow process;
Step 203: after described normal unloading completes, judges whether to there is residual project according to the project information of described preservation, if existed, then removes described residual project.
In this embodiment, first can carry out depth scan analysis for software to be unloaded in terminal before unloading, the registry information of this software, program source file, operation are generated the projects such as document and all detect, and the project information such as the title of project and path preserved.Under existing computing machine mainstream configuration, the time that this software information is analyzed can be very of short duration, can not have influence on Consumer's Experience.
Another kind of mode is monitored and record its installation behavior when software is installed, and in this software later stage implementation, record is carried out to the document information generated, also can know the project information relevant with this software thus, but this mode can cause certain storage space to take undoubtedly.
Also have a kind of mode be recorded the relevant item information list of generation this software by the installation behavior of this software of ex ante analysis at server end, and when client-requested or timed sending to client, also can know the project information of this software thus.But which is need network environment on the one hand, on the other hand also be only applicable to general off-the-shelf software, for the software of some comparatively minorities, server end is difficult to accomplish comprehensive ex ante analysis, meanwhile, the procedure files such as the document that running software generates also are difficult to capture.
And can the most accurately the project information of software to be unloaded be detected by the mode of local scanning, the path simultaneously these projects existed and title are temporarily preserved, used for follow-up comparison.
After the project information obtaining software to be unloaded, namely can call Uninstaller that this software carries and perform and unload flow process normally.
Then, after software has normally unloaded, remaining project scanning comparison is carried out by the project information of preserving in advance, if find that the project full scale clearance of described preservation is complete, then illustrate and do not leave remaining project, otherwise, then illustrate and have the project do not removed, now, user can be pointed out to have Stub File to exist, title and the path of residual project can also be provided further, and the choice box of a correspondence is provided, the residual project brute force cleaning that will remove is selected to allow user, user is facilitated simply to clean out all remaining projects, also user is facilitated selectively to remove some specific residual project.
Such as, for some procedure file, the standard Uninstaller that this software carries possibly cannot be known also cannot perform deletion, but by the technical scheme of the application, existence and the position of relevant document is obtained by scanning in advance, at this moment, the position of this procedure file can be found according to prior scanning record and directly delete.And for the amendment of some registry information, its position also can be located according to prior scanning record and cleaning or reduction.
After disposing whole remaining project, namely the project information of interim preservation before can be deleted.
Specific embodiment below by Fig. 3 does further understanding to the application.
First, in step 301, scan the All Files of software to be unloaded, obtain the fileinfo of this software;
Then, in step 302, fileinfo is preserved temporarily;
In step 303, call the Uninstaller of this software self;
In step 304, perform and normally unload flow process, routine has unloaded;
In step 305, the fileinfo according to preserving scans client file again, judges whether to there is remaining file;
If there is no, then perform step 306, all unloaded, determined noresidue file;
If have Stub File, then perform step 307, powerful cleaning function is provided;
In step 308, clean remaining file, then terminate.
In practice, flow process connected applications can be unloaded by unloading described in Fig. 1 described in flow process and Fig. 2, namely when detecting user and will unloading certain software, first the unloading flow process described in Fig. 2 can be performed, first field scan is carried out to this band uninstall, obtain mount message, then call the Uninstaller that this software carries and carry out routine unloading, the mount message obtained according to scanning again after routine has unloaded scans again, judge whether to there is remaining project, if there is remaining project, then remaining project is removed; But; if when the remaining project comparatively obstinate to some can not unload successful completely; or when suspection still has remaining project to exist; unloading flow process as shown in Figure 1 can be called again; software installation information storehouse according to configured in advance is directly thoroughly removed installation project; meanwhile, apply unloading protecting storehouse to protect removing action.
Certainly, comparatively speaking, the above-mentioned unloading flow process combined is concerning safer safe software unloading operation, if but directly perform the unloading flow process shown in Fig. 1, then more can save discharge time, improve unloading efficiency, for most of software can in seconds moment thoroughly unloads, and for the Malware that cannot unload, also comparatively outstanding elimination effect is had, also save the operation steps of user simultaneously, save the process that common unloading is loaded down with trivial details, for user provides one-touch perfection unloading, the good experience of noresidue file.
In like manner, as shown in Figure 4, according to embodiments of the invention, also provide a kind of software discharge mechanism, comprise configuration module 401 and execution module 402, wherein:
Configuration module 401, for for the mounted software of client, configure a software installation information storehouse and a unloading protecting storehouse in the client, wherein, described software installation information storehouse records the mount message of mounting software, comprises the positional information of the project that software adds or revises in installation process; The unloading protecting condition to mounting software is recorded in described unloading protecting storehouse;
Execution module 402; for when detecting user and performing unloading operation for certain money mounting software; mount message and the unloading protecting condition of this software is searched in described software installation information storehouse and unloading protecting storehouse; the item location that should remove is located according to mount message; if judge that the removing of this project does not trigger unloading protecting condition, then perform corresponding project and remove.
The software installation information that described configuration module 401 obtains, the list of mounting software regularly reported according to client by server end and the software installation information of correspondence is updated to corresponding client.
Please refer to Fig. 5, is another software discharge mechanism schematic diagram provided according to the embodiment of the present application, comprises acquisition module 501, Unload module 502 and removes module 503, wherein:
Acquisition module 501, for when detecting user and performing unloading operation for certain money mounting software, first obtains software to be unloaded at client scan and is present in all items information in this client, and preserve described project information;
Unload module 502, for after preserving the project information obtained, calls the Uninstaller of described software to be unloaded self, performs and normally unloads flow process;
Remove module 503, for after described normal unloading completes, judge whether to there is residual project according to the project information of described preservation, if existed, then remove described residual project.
Wherein, described acquisition module 501, by scanning in described client, obtains all items information relevant with software to be unloaded.
In addition, as shown in Figure 5, can further include removing module 504, for deleting the project information of described preservation.
Described software to be unloaded is present in all items information of this client, can comprise the registry information of this software, program source file, operation generation document.
Described acquisition module 501, can preserve title and the path of described project.
Described removing module 503, can point out to user and there is residual project, and delete corresponding residual project according to the selection of user.
Described removing module 503, can also point out title and the path of residual project, and provide the choice box of a correspondence, select the residual project that will remove to allow user to user.
Described in each several part operational details of said apparatus embodiment and beneficial effect and the application, the appropriate section of embodiment of the method is similar, and therefore not to repeat here.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.
The application can describe in the general context of computer executable instructions, such as program module.Usually, program module comprises the routine, program, object, assembly, data structure etc. that perform particular task or realize particular abstract data type.Also can put into practice the application in a distributed computing environment, in these distributed computing environment, be executed the task by the remote processing devices be connected by communication network.In a distributed computing environment, program module can be arranged in the local and remote computer-readable storage medium comprising memory device.
Finally, also it should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, commodity or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, commodity or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, commodity or the equipment comprising described key element and also there is other identical element.
Be described in detail the embodiment of the application above, apply specific case herein and set forth the principle of the application and embodiment, the explanation of above embodiment is just for helping method and the core concept thereof of understanding the application; Meanwhile, for one of ordinary skill in the art, according to the thought of the application, all will change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the application.

Claims (12)

1. a software uninstalling method, is characterized in that, comprises the steps:
For the mounted software of client, configure a software installation information storehouse and a unloading protecting storehouse in the client, wherein, described software installation information storehouse records the mount message of mounting software, the mounting software positional information of project of adding or revising in installation process described in described mount message comprises; The unloading protecting condition to described mounting software is recorded in described unloading protecting storehouse;
When detecting user and performing unloading operation for certain money mounting software; the mount message that described in searching in described software installation information storehouse and described unloading protecting storehouse, mounting software is corresponding and the unloading protecting condition of correspondence; mount message according to described correspondence locates the item destination locations that should remove; if judge that the removing of described project does not trigger the unloading protecting condition of described correspondence, then perform corresponding project and remove.
2. the method for claim 1, is characterized in that, described configuration step, comprising: the list of mounting software regularly reported according to client by server end and the software installation information of correspondence is updated to corresponding client.
3. method as claimed in claim 1 or 2, it is characterized in that, described unloading protecting condition comprises:
Quantity of documents under specific installation directory relevant to described mounting software in described client and/or the restriction of size, if described quantity of documents and/or size exceed above-mentioned restriction, then do not remove above-mentioned specific installation directory; Or
The download file whether described in existing in described client mounting software provides preserves position, if existed, then preserves position to described download file and retains.
4. the method for claim 1, is characterized in that, when detecting user and performing unloading operation for certain money mounting software, comprises further: first perform following steps:
Obtain software to be unloaded in client and be present in all items information in this client, and described project information is preserved;
Call the Uninstaller of described software to be unloaded self, perform and normally unload flow process;
After described normal unloading completes, judge whether to there is residual project according to the project information of described preservation, if existed, then remove described residual project.
5. method as claimed in claim 4, it is characterized in that, described acquisition software to be unloaded is present in the step of all items information in this client, comprising: scan in described client, obtains all items information relevant with software to be unloaded.
6. method as claimed in claim 4, is characterized in that, comprise step further: the project information of deleting described preservation.
7. a software discharge mechanism, is characterized in that, comprising:
Configuration module, for for the mounted software of client, configure a software installation information storehouse and a unloading protecting storehouse in the client, wherein, described software installation information storehouse records the mount message of mounting software, the mounting software positional information of project of adding or revising in installation process described in described mount message comprises; The unloading protecting condition to described mounting software is recorded in described unloading protecting storehouse;
Execution module; for when detecting user and performing unloading operation for certain money mounting software; the mount message that described in searching in described software installation information storehouse and described unloading protecting storehouse, mounting software is corresponding and the unloading protecting condition of correspondence; mount message according to described correspondence locates the item destination locations that should remove; if judge that the removing of described project does not trigger corresponding unloading protecting condition, then perform corresponding project and remove.
8. device as claimed in claim 7, is characterized in that, the software installation information that described configuration module obtains, the list of mounting software regularly reported according to client by server end and the software installation information of correspondence is updated to corresponding client.
9. device as claimed in claim 7 or 8, it is characterized in that, described unloading protecting condition comprises:
Quantity of documents under specific installation directory relevant to described mounting software in described client and/or the restriction of size, if described quantity of documents and/or size exceed above-mentioned restriction, then do not remove above-mentioned specific installation directory; Or
The download file whether described in existing in described client mounting software provides preserves position, if existed, then preserves position to described download file and retains.
10. device as claimed in claim 7, is characterized in that, comprise further:
Acquisition module, for when detecting user and performing unloading operation for certain money mounting software, first obtains software to be unloaded at client scan and is present in all items information in this client, and preserve described project information;
Unload module, for after preserving the project information obtained, calls the Uninstaller of described software to be unloaded self, performs and normally unloads flow process;
Remove module, for after described normal unloading completes, judge whether to there is residual project according to the project information of described preservation, if existed, then remove described residual project.
11. devices as claimed in claim 10, is characterized in that, described acquisition module, for scanning in described client, obtain all items information relevant with software to be unloaded.
12. devices as claimed in claim 10, is characterized in that, comprise further: removing module, for deleting the project information of described preservation.
CN201510548159.1A 2012-03-31 2012-03-31 Software uninstalling method and apparatus Pending CN105159710A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210092473.XA CN102662667B (en) 2012-03-31 2012-03-31 A kind of software uninstalling method and device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201210092473.XA Division CN102662667B (en) 2012-03-31 2012-03-31 A kind of software uninstalling method and device

Publications (1)

Publication Number Publication Date
CN105159710A true CN105159710A (en) 2015-12-16

Family

ID=46772168

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201210092473.XA Active CN102662667B (en) 2012-03-31 2012-03-31 A kind of software uninstalling method and device
CN201510548159.1A Pending CN105159710A (en) 2012-03-31 2012-03-31 Software uninstalling method and apparatus

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201210092473.XA Active CN102662667B (en) 2012-03-31 2012-03-31 A kind of software uninstalling method and device

Country Status (1)

Country Link
CN (2) CN102662667B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404537A (en) * 2015-12-24 2016-03-16 北京金山安全软件有限公司 Application program unloading method and device
CN107729022A (en) * 2016-08-11 2018-02-23 阿里巴巴集团控股有限公司 Unload the method, apparatus and mobile terminal of application program
CN108780482A (en) * 2017-06-06 2018-11-09 华为技术有限公司 The method and apparatus applied in management safety device
WO2018223509A1 (en) * 2017-06-06 2018-12-13 华为技术有限公司 Method of managing application in secure device, and device

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103092687B (en) * 2012-12-26 2017-10-20 上海斐讯数据通信技术有限公司 A kind of application program management apparatus and method
CN103064716B (en) * 2013-01-14 2016-04-27 广东欧珀移动通信有限公司 The method of mobile terminal device fast discharging application program
CN103971056B (en) 2013-01-31 2016-05-11 腾讯科技(深圳)有限公司 A kind ofly prevent the unloaded method and apparatus of application program in operating system
CN103176828B (en) * 2013-03-29 2017-06-09 北京奇虎科技有限公司 Delete the method and device of application program Stub File
CN103345411A (en) * 2013-07-09 2013-10-09 北京奇虎科技有限公司 Method and device for uninstalling application program
CN103500116A (en) * 2013-10-29 2014-01-08 中科创达软件股份有限公司 Method and system for clearing data generated by application program
CN103645914B (en) * 2013-11-26 2017-02-08 北京奇虎科技有限公司 Software cleaning method and device
CN103631603A (en) * 2013-12-16 2014-03-12 北京奇虎科技有限公司 Software cleaning method and system
CN104102516A (en) * 2014-07-21 2014-10-15 北京金山安全软件有限公司 Application program unloading method and device
CN105718278B (en) * 2014-12-05 2019-02-12 北京奇虎科技有限公司 Unloading cracks the method and device of edition application program
CN104933332B (en) * 2015-06-10 2018-07-13 北京北信源软件股份有限公司 A kind of method and device for preventing software from illegally being unloaded
CN105243102B (en) * 2015-09-17 2018-11-23 北京金山安全软件有限公司 Processing method and device for unloading residual file and terminal
CN106557525B (en) * 2015-09-30 2020-07-28 北京金山安全软件有限公司 Method and device for cleaning application program residual file and electronic equipment
CN105511932A (en) * 2015-12-30 2016-04-20 广东欧珀移动通信有限公司 Application unloading method and device
CN106934277A (en) * 2015-12-30 2017-07-07 北京金山安全软件有限公司 Application program detection method and device and terminal
CN106203084B (en) * 2016-06-29 2019-05-10 珠海豹趣科技有限公司 A kind of processing method of uninstall, device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101206619A (en) * 2006-12-21 2008-06-25 佳能株式会社 Data processing apparatus and control method thereof
US20110002571A1 (en) * 2009-01-15 2011-01-06 Ab Skf Bearing Assembly with Elastomeric Sleeve Element
CN102043655A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Method and system for carrying out advanced uninstall on software

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100399267C (en) * 2005-03-18 2008-07-02 联想(北京)有限公司 Method of managing software installation and unloading
CN101876913A (en) * 2010-01-05 2010-11-03 深圳中兴网信科技有限公司 Software component management method and software component manager
CN101984410B (en) * 2010-11-12 2015-06-10 中兴通讯股份有限公司 Method and device for generating and unloading software installation package

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101206619A (en) * 2006-12-21 2008-06-25 佳能株式会社 Data processing apparatus and control method thereof
US20110002571A1 (en) * 2009-01-15 2011-01-06 Ab Skf Bearing Assembly with Elastomeric Sleeve Element
CN102043655A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Method and system for carrying out advanced uninstall on software

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404537A (en) * 2015-12-24 2016-03-16 北京金山安全软件有限公司 Application program unloading method and device
CN105404537B (en) * 2015-12-24 2019-08-06 珠海豹趣科技有限公司 A kind of discharging method and device of application program
CN107729022A (en) * 2016-08-11 2018-02-23 阿里巴巴集团控股有限公司 Unload the method, apparatus and mobile terminal of application program
CN107729022B (en) * 2016-08-11 2021-06-08 阿里巴巴集团控股有限公司 Method and device for unloading application program and mobile terminal
CN108780482A (en) * 2017-06-06 2018-11-09 华为技术有限公司 The method and apparatus applied in management safety device
WO2018223509A1 (en) * 2017-06-06 2018-12-13 华为技术有限公司 Method of managing application in secure device, and device
CN108780482B (en) * 2017-06-06 2020-10-27 华为技术有限公司 Method and device for managing applications in a secure device

Also Published As

Publication number Publication date
CN102662667A (en) 2012-09-12
CN102662667B (en) 2015-09-30

Similar Documents

Publication Publication Date Title
CN102662667B (en) A kind of software uninstalling method and device
CN102043655B (en) Method and system for carrying out advanced uninstall on software
CN103092664B (en) Processing method and device for data file of android system
CN102736978B (en) A kind of method and device detecting the installment state of application program
CN100426298B9 (en) A kind of cleaning garbage files method and system
CN103577567A (en) Method for uninstalling application and deleting garbage file in Android system
CN103176828A (en) Method and device of deleting application program residual files
CN104461786B (en) The restoration methods of android system and the recovery system of android system
CN104573515A (en) Virus processing method, device and system
CN104199711A (en) Method and device for creating root access
US20170316209A1 (en) Method and device for preventing application in an operating system from being uninstalled
CN103034803B (en) Dress software prompt system by mistake
CN103631628A (en) Software cleaning method and system
CN103345411A (en) Method and device for uninstalling application program
CN103761178A (en) Method for realizing application uninstalling surveys
CN103793649A (en) Method and device for cloud-based safety scanning of files
CN103902900A (en) External extraction type detecting device and method for mobile terminal malicious code
CN103631603A (en) Software cleaning method and system
CN103294951A (en) Malicious code sample extraction method and system based on document type bug
CN105389509A (en) Document scanning method and apparatus
CN110333876A (en) A kind of data clearing method and control equipment
CN102999566B (en) Remove the method and apparatus of equipment use vestige
CN104915593A (en) Binding removing processing method and system for software
CN103473350A (en) File processing method and equipment
CN105095754A (en) Method, device and mobile terminal for processing virus applications

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151216

RJ01 Rejection of invention patent application after publication