CN106096414A - Application recovery method, device and terminal - Google Patents
Application recovery method, device and terminal Download PDFInfo
- Publication number
- CN106096414A CN106096414A CN201610474283.2A CN201610474283A CN106096414A CN 106096414 A CN106096414 A CN 106096414A CN 201610474283 A CN201610474283 A CN 201610474283A CN 106096414 A CN106096414 A CN 106096414A
- Authority
- CN
- China
- Prior art keywords
- application program
- operation information
- time point
- terminal
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
Abstract
The invention discloses a kind of application recovery method, device and terminal, wherein, application recovery method includes: the installation operation information of application program in monitor terminal;From installing the set-up time extracting application program operation information, the set-up time is recorded as the installation success time point that application program is corresponding, and application program and the corresponding relation installing successfully time point are stored to managing listings;According to user's operation information and managing listings, the application program in terminal is recovered.Utilize the technical scheme that the present invention provides, easily the application program in terminal is recovered according to managing listings, improve the recovery efficiency of application program, contribute to ensureing the information security in terminal.
Description
Technical field
The present invention relates to Internet technical field, be specifically related to a kind of application recovery method, device and terminal.
Background technology
In order to meet the various demands of user, application developer develops multiple application program and is available for user and selects and pacify
It is filled in the terminal such as mobile phone or PAD.Generally, except the most having installed successful application program during installing in terminal,
User can install and delete other application programs the most in the terminal.But some application program be user be not intended to it
Between install, and be sightless to user after mounting, especially malicious application, user is difficult to know in terminal peace
These application programs are filled, it is also difficult to from terminal, delete these application programs.But these application programs may be revealed end
User profile in end, even results in the systemic breakdown of terminal.
Such as, the installation link of some application program can be hidden in picture or webpage, when user clicks on picture or opens
During webpage, this application program will be mounted with unintentionally, and user is not aware that and oneself is mounted with this application program, owing to this should
Being sightless to user after mounting by program, by checking terminal, user also is difficult to find and delete this application program.
Summary of the invention
In view of the above problems, it is proposed that the present invention in case provide one overcome the problems referred to above or at least in part solve on
State application recovery method, device and the terminal of problem.
According to an aspect of the invention, it is provided a kind of application recovery method, the method includes:
The installation operation information of application program in monitor terminal;
From installing the set-up time extracting application program operation information, the set-up time is recorded as application program corresponding
Successfully time point is installed, and application program and the corresponding relation installing successfully time point are stored to managing listings;
According to user's operation information and managing listings, the application program in terminal is recovered.
According to a further aspect in the invention, it is provided that a kind of application recovery device, this device includes:
First monitoring module, is suitable to the installation operation information of application program in monitor terminal;
Logging modle, is suitable to, from installing the set-up time extracting application program operation information, will be recorded as the set-up time
The installation success time point that application program is corresponding, and application program and the corresponding relation installing successfully time point are stored to management
In list;
Recover module, be suitable to, according to user's operation information and managing listings, the application program in terminal be recovered.
According to another aspect of the invention, it is provided that a kind of terminal, including above-mentioned application recovery device.
The technical scheme provided according to the present invention, the installation operation information of application program in monitor terminal, then from installation
Operation information is extracted the set-up time of application program, the set-up time is recorded as the installation success time that application program is corresponding
Point, and application program and the corresponding relation installing successfully time point are stored to managing listings, then believe according to user operation
Breath and managing listings, recover the application program in terminal.Utilize the technical scheme that the present invention provides, it is possible to according to management
Application program in terminal is recovered by list easily, thus improves the recovery efficiency of application program, contributes to ensureing
Information security in terminal.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of description, and in order to allow above and other objects of the present invention, the feature and advantage can
Become apparent, below especially exemplified by the detailed description of the invention of the present invention.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various other advantage and benefit common for this area
Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as the present invention
Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical parts.In the accompanying drawings:
Fig. 1 shows the schematic flow sheet of application recovery method according to an embodiment of the invention;
Fig. 2 shows the schematic flow sheet of application recovery method in accordance with another embodiment of the present invention;
Fig. 3 shows the schematic flow sheet of the application recovery method according to another embodiment of the present invention;
Fig. 4 shows the structured flowchart of application recovery device according to an embodiment of the invention;
Fig. 5 shows the structured flowchart of application recovery device in accordance with another embodiment of the present invention.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although accompanying drawing shows the disclosure
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should be by embodiments set forth here
Limited.On the contrary, it is provided that these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
Fig. 1 shows the schematic flow sheet of application recovery method according to an embodiment of the invention, such as Fig. 1 institute
Showing, the method comprises the steps:
Step S100, the installation operation information of application program in monitor terminal.
Wherein, terminal can be mobile phone, PAD, apparatus such as computer.Owing to some application program is sightless to user,
So can clearly know which application program is terminal be mounted with for the ease of user, specifically, in the step s 100, can
By the installation operation information of application program in desktop starter monitor terminal.Wherein, operation information is installed and comprises the steps that application journey
The title of sequence, installation path and set-up time etc..Set-up time is the time successfully installing this application program.
Step S101, from installing the set-up time extracting application program operation information, will be recorded as application the set-up time
The installation success time point that program is corresponding, and application program and the corresponding relation installing successfully time point are stored to managing listings
In.
The set-up time of application program at extraction from installation operation information, owing to the set-up time is successfully to install this application
The time of program, therefore can be recorded as the installation success time point that application program is corresponding the set-up time, and by application program with
The corresponding relation installing successfully time point stores to managing listings, in order to be managed the application program in terminal.
Step S102, according to user's operation information and managing listings, recovers the application program in terminal.
After application program is stored to managing listings by step S101 with the corresponding relation installing successfully time point,
In step S102, according to user's operation information and managing listings, so that it may easily the application program in terminal is recovered.
The application recovery method provided according to the present embodiment, the installation operation information of application program in monitor terminal,
Then from installing the set-up time extracting application program operation information, is recorded as the installation that application program is corresponding the set-up time
Success time point, and application program is stored to managing listings with the corresponding relation installing successfully time point, then according to
Family operation information and managing listings, recover the application program in terminal.Utilize the technical scheme that the present invention provides, it is possible to
Easily the application program in terminal is recovered according to managing listings, thus improve the recovery efficiency of application program, have
Help ensure the information security in terminal.
Fig. 2 shows the schematic flow sheet of application recovery method in accordance with another embodiment of the present invention, such as Fig. 2 institute
Showing, the method comprises the steps:
Step S200, the installation operation information of application program in monitor terminal.
Owing to some application program is sightless to user, can clearly know in terminal therefore to be easy to user
It is mounted with which application program, specifically, in step s 200, the peace of application program in desktop starter monitor terminal can be passed through
Dress operation information.Wherein, operation information is installed and comprises the steps that the title of application program, installation path and set-up time etc..
Step S201, from installing the set-up time extracting application program operation information, will be recorded as application the set-up time
The installation success time point that program is corresponding, and application program and the corresponding relation installing successfully time point are stored to managing listings
In.
For the ease of the application program in terminal is managed, by application program and the corresponding pass installing successfully time point
System stores to managing listings.
Step S202, according to user's operation information, selects to install successfully time point from managing listings, installs as target
Success time point.
Such as, the successfully time point of installing in managing listings can be presented to user with the form of time shaft, and also can
The title installing the successfully application program that time point correspondence is installed is presented to user together, when user wants answering in terminal
When recovering by program, can select installing successfully time point in time shaft, then in step S202, according to
Family operation information, selects to install successfully time point from managing listings, installs successfully time point as target.
Step S203, installs the state before successful time point by the application recovery in terminal to target.
Determine target in step S202 and install successfully after time point, in step S203, by the application journey in terminal
Sequence recovers the state before installing successful time point to target.Specifically, can delete from terminal, in target, is installed the successfully time
Point is installed successful application program and installs in target and successfully install successful application program after time point.
Such as, managing listings stores 4 application programs the corresponding relation of successful time point is installed with it, wherein,
The installation success time point of application program 1 correspondence is time point 1, and the installation success time point of application program 2 correspondence is time point
2, the installation success time point of application program 3 correspondence is time point 3, and the installation success time point of application program 4 correspondence is the time
Putting 4, and time point 1 to time point 4 is arranged in order according to time order and function order, i.e. time point 1 is early than time point 2, time
Point 2 is early than time point 3 etc., and time point 3 is early than time point 4.If according to user's operation information in step S202, by time point
2 install successfully time point as target, install successfully before time point in target, are only mounted with application program 1 in this terminal, that
Application recovery in terminal to target is installed in step S203 the state before successful time point, i.e. terminal is only pacified
Fill the state of application program 1.Specifically, can delete from terminal time point 2 install successful application program and time
Between put after 2 successful application program be installed, say, that the most only retain application program 1, from terminal, delete application
Program 2, application program 3 and application program 4.
Alternatively, in a possible implementation, between step S201 and step S202, also include: step S2011
To step S2013, as shown in Figure 3:
Step S2011, the specified operation information of monitoring application program.
In order to find the existence of malicious application in time, in step S2011, the appointment of monitoring application program
Operation information.Specifically, can be by the specified operation information of desktop starter monitoring application program.Wherein, it is intended that operation information
Comprise the steps that the information such as upload operation information, deletion action information and amendment operation information.
Step S2012, according to the specified operation information of application program, it is judged that whether application program is malicious application;
The most then perform step S2013;If it is not, then perform step S202.
Wherein, can be according to the specified operation information of application program and predetermined registration operation information, it is judged that whether application program is evil
Meaning application program.Specifically, it is judged that whether the specified operation information of application program meets predetermined registration operation information, if application program
Specified operation information meet predetermined registration operation information, then explanation application program is not malicious application;If application program
Specified operation information does not meets predetermined registration operation information, then explanation application program is malicious application.Those skilled in the art can
According to actual needs predetermined registration operation information is configured, does not limits.
If it is determined that the program of being applied is malicious application, then perform step S2013;The journey if it is determined that be applied
Sequence is not malicious application, then perform step S202, according to user's operation information, when selecting to install successfully from managing listings
Between point, as target, successfully time point is installed.
Such as, when applying this method in mobile phone, if according to the specified operation information of application program, this application
Program is wanted the associated person information in mobile phone is uploaded to the Internet, then can determine whether that the program of being applied is malicious application journey
Sequence.
Step S2013, issues the user with malicious application information.
If judging that the program of being applied is malicious application through step S2012, in step S2013, send out to user
Go out malicious application information, in order to user knows the existence of malicious application in time, and then as early as possible in terminal
Application program recovers.
The application recovery method provided according to the present embodiment, the installation operation information of application program in monitor terminal,
Then from installing the set-up time extracting application program operation information, is recorded as the installation that application program is corresponding the set-up time
Success time point, and application program is stored to managing listings with the corresponding relation installing successfully time point, then according to
Family operation information, selects to install successfully time point from managing listings, installs successfully time point as target, by answering in terminal
With program recovery to target, the state before successful time point is installed.It addition, also monitor the specified operation information of application program, root
Specified operation information according to application program, it is judged that whether application program is malicious application, is judging that the program of being applied is
In the case of malicious application, issue the user with malicious application information.Utilize the technical scheme that the present invention provides,
Conveniently realize the recovery to the application program in terminal not only by selecting target to install successfully time point, improve application
The recovery efficiency of program, and, in the specified operation information according to application program, it is judged that the program of being applied is malicious application journey
During sequence, issue the user with malicious application information, in order to user knows the existence of malicious application, Jin Erjin in time
Early the application program in terminal is recovered, to eliminate potential safety hazard present in terminal, further help in guarantee terminal
In information security.
Fig. 4 shows the structured flowchart of application recovery device according to an embodiment of the invention, as shown in Figure 4,
This device includes: the first monitoring module 410, logging modle 420 and recovery module 430.
First monitoring module 410 is suitable to: the installation operation information of application program in monitor terminal.
Wherein, terminal can be mobile phone, PAD, apparatus such as computer.Owing to some application program is sightless to user,
So can clearly know which application program is terminal be mounted with for the ease of user, specifically, the first monitoring module 410
By desktop starter, the installation operation information of application program in terminal can be monitored.Wherein, operation information is installed can wrap
Include: the title of application program, installation path and set-up time etc..Set-up time is the time successfully installing this application program.
Logging modle 420 is suitable to: from installing the set-up time extracting application program operation information, will set-up time record
For the installation success time point that application program is corresponding, and application program and the corresponding relation installing successfully time point are stored to pipe
In reason list.
Logging modle 420 extracts the set-up time of application program from installing operation information, will be recorded as the set-up time should
With installation success time point corresponding to program, for the ease of the application program in terminal is managed, also by application program with
The corresponding relation installing successfully time point stores to managing listings.
Recover module 430 to be suitable to: according to user's operation information and managing listings, carry out extensive to the application program in terminal
Multiple.
Recover module 430 easily the application program in terminal to be carried out according to user's operation information and managing listings
Recover.
The application recovery device provided according to the present embodiment, the peace of application program in the first monitoring module monitor terminal
Dress operation information, logging modle is extracted the set-up time of application program, will be recorded as the set-up time answering from installing operation information
With installation success time point corresponding to program, and application program and the corresponding relation installing successfully time point are stored to managing and arrange
In table, the application program in terminal, according to user's operation information and managing listings, is recovered by recovery module.Utilize the present invention
The technical scheme provided, can recover the application program in terminal easily according to managing listings, thus improve application
The recovery efficiency of program, contributes to ensureing the information security in terminal.
Fig. 5 shows the structured flowchart of application recovery device in accordance with another embodiment of the present invention, such as Fig. 5 institute
Showing, this device includes: the first monitoring module 510, logging modle the 520, second monitoring module 530, judge module 540, prompting mould
Block 550 and recovery module 560.Wherein, recover module 560 to include: select unit 561 and recovery unit 562.
First monitoring module 510 is suitable to: the installation operation information of application program in monitor terminal.
Specifically, the first monitoring module 510 can be by the installation operation letter of application program in desktop starter monitor terminal
Breath.
Logging modle 520 is suitable to: from installing the set-up time extracting application program operation information, will set-up time record
For the installation success time point that application program is corresponding, and application program and the corresponding relation installing successfully time point are stored to pipe
In reason list.
Second monitoring module 530 is suitable to: the specified operation information of monitoring application program.
In order to find the existence of malicious application in time, the second monitoring module 530 monitors the finger of application program
Surely information is operated.Specifically, the second monitoring module 530 can be by the specified operation information of desktop starter monitoring application program.
Wherein, it is intended that operation information comprises the steps that the information such as upload operation information, deletion action information and amendment operation information.
Judge module 540 is suitable to: according to the specified operation information of application program, it is judged that whether application program is malicious application
Program.
Wherein, it is judged that module 540 can be according to the specified operation information of application program and predetermined registration operation information, it is judged that application journey
Whether sequence is malicious application.Predetermined registration operation information can be configured, herein by those skilled in the art according to actual needs
Do not limit.Judge module 540, according to the specified operation information of application program, can judge whether application program is evil effectively
Meaning application program.
Reminding module 550 is suitable to: if judge module 540 judges that the program of being applied is malicious application, then to user
Send malicious application information.
If it is determined that module 540 judges that the program of being applied is malicious application, then reminding module 550 issues the user with
Malicious application information, in order to user knows the existence of malicious application in time, and then as early as possible to answering in terminal
Recover by program.
The selection unit 561 recovered in module 560 is suitable to: according to user's operation information, selects to install from managing listings
Success time point, installs successfully time point as target.
Such as, the successfully time point of installing in managing listings can be presented to user with the form of time shaft, and also can
The title installing the successfully application program that time point correspondence is installed is presented to user together, when user wants answering in terminal
When recovering by program, can select installing successfully time point in time shaft, then select unit 561 according to user
Operation information, selects to install successfully time point from managing listings, installs successfully time point as target.
Recovery unit 562 is suitable to: the application recovery in terminal to target is installed the state before successful time point.
Specifically, recovery unit 562 is further adapted for: deletes from terminal and installs successfully time point in target and install successfully
Application program and install in target and successfully successful application program be installed after time point.
Utilize the application recovery device that the present embodiment provides, convenient not only by selecting target to install successfully time point
Achieve the recovery to the application program in terminal, improve the recovery efficiency of application program, and, according to application program
Specified operation information, it is judged that when the program of being applied is malicious application, issue the user with malicious application prompting letter
Breath, in order to user knows the existence of malicious application in time, and then recovers the application program in terminal as early as possible, to disappear
Except potential safety hazard present in terminal, further help in the information security ensured in terminal.
Present invention also offers a kind of terminal, this terminal includes above-mentioned application recovery device.The present invention provides
Application program in terminal can be recovered easily by terminal according to managing listings, thus improves application program in terminal
Recovery efficiency, contribute to ensureing the information security in terminal.
Algorithm and display are not intrinsic to any certain computer, virtual system or miscellaneous equipment relevant provided herein.
Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system
Structure be apparent from.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use various
Programming language realizes the content of invention described herein, and the description done language-specific above is to disclose this
Bright preferred forms.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that the enforcement of the present invention
Example can be put into practice in the case of not having these details.In some instances, it is not shown specifically known method, structure
And technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that one or more in order to simplify that the disclosure helping understands in each inventive aspect, exist
Above in the description of the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes
In example, figure or descriptions thereof.But, the method for the disclosure should not be construed to reflect an intention that i.e. required guarantor
The application claims feature more more than the feature being expressly recited in each claim protected.More precisely, as following
Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
The claims following detailed description of the invention are thus expressly incorporated in this detailed description of the invention, the most each claim itself
All as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment adaptively
Change and they are arranged in one or more equipment different from this embodiment.Can be the module in embodiment or list
Unit or assembly are combined into a module or unit or assembly, and can put them in addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit excludes each other, can use any
Combine all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed appoint
Where method or all processes of equipment or unit are combined.Unless expressly stated otherwise, this specification (includes adjoint power
Profit requires, summary and accompanying drawing) disclosed in each feature can be carried out generation by providing identical, equivalent or the alternative features of similar purpose
Replace.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include other embodiments
Some feature included by rather than further feature, but the combination of the feature of different embodiment means to be in the present invention's
Within the scope of and form different embodiments.Such as, in the following claims, embodiment required for protection appoint
One of meaning can mode use in any combination.
The all parts embodiment of the present invention can realize with hardware, or to run on one or more processor
Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that and can use in practice
Microprocessor or digital signal processor (DSP) realize according to embodiments of the present invention in some or all parts one
A little or repertoire.The present invention is also implemented as part or all set for performing method as described herein
Standby or device program (such as, computer program and computer program).The program of such present invention of realization can be deposited
Store up on a computer-readable medium, or can be to have the form of one or more signal.Such signal can be from because of spy
Download on net website and obtain, or provide on carrier signal, or provide with any other form.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference marks that should not will be located between bracket is configured to limitations on claims.Word " comprises " and does not excludes the presence of not
Arrange element in the claims or step.Word "a" or "an" before being positioned at element does not excludes the presence of multiple such
Element.The present invention and can come real by means of including the hardware of some different elements by means of properly programmed computer
Existing.If in the unit claim listing equipment for drying, several in these devices can be by same hardware branch
Specifically embody.Word first, second and third use do not indicate that any order.These word explanations can be run after fame
Claim.
The invention discloses:
A1, a kind of application recovery method, including:
The installation operation information of application program in monitor terminal;
From described installation operation information, extract the set-up time of described application program, the described set-up time is recorded as institute
State the installation success time point that application program is corresponding, and by described application program and the described corresponding relation installing successfully time point
Store to managing listings;
According to user's operation information and described managing listings, the application program in described terminal is recovered.
A2, according to the method described in A1, described according to user's operation information with described managing listings, in described terminal
Application program carries out recovery and farther includes:
According to user's operation information, select successfully time point is installed from described managing listings, install successfully as target
Time point;
Application recovery in described terminal to described target is installed the state before successful time point.
A3, according to the method described in A2, described application recovery in described terminal to described target is installed successfully
State before time point farther includes:
Delete from described terminal and in described target, successfully time point is installed successful application program and described is installed
Target is installed and is successfully installed successful application program after time point.
A4, according to the method described in any one of A1-A3, described according to user's operation information with described managing listings, right
Before application program in described terminal recovers, described method also includes:
Monitor the specified operation information of described application program;
Specified operation information according to described application program, it is judged that whether described application program is malicious application;
If judging, obtaining described application program is malicious application, then issue the user with malicious application prompting letter
Breath.
A5, according to the method described in A4, described specified operation information includes: upload operation information, deletion action information and
Amendment operation information.
B6, a kind of application recovery device, including:
First monitoring module, is suitable to the installation operation information of application program in monitor terminal;
Logging modle, is suitable to extract the set-up time of described application program from described installation operation information, by described peace
ETL estimated time of loading is recorded as the installation success time point that described application program is corresponding, and by described application program with described installation successfully time
Between point corresponding relation store to managing listings;
Recover module, be suitable to, according to user's operation information and described managing listings, the application program in described terminal be entered
Row recovers.
B7, according to the device described in B6, described recovery module includes: select unit and recovery unit;
Described selection unit is suitable to: according to user's operation information, selects to install successfully time point from described managing listings,
As target, successfully time point is installed;
Described recovery unit is suitable to: by the application recovery in described terminal to described target install successfully time point it
Front state.
B8, according to the device described in B7, described recovery unit is further adapted for:
Delete from described terminal and in described target, successfully time point is installed successful application program and described is installed
Target is installed and is successfully installed successful application program after time point.
B9, according to the device described in any one of B6-B8, described device also includes:
Second monitoring module, is suitable to monitor the specified operation information of described application program;
Judge module, is suitable to the specified operation information according to described application program, it is judged that whether described application program is evil
Meaning application program;
Reminding module, if being suitable to described judge module to judge that to obtain described application program be malicious application, then to
Family sends malicious application information.
B10, according to the device described in B9, described specified operation information includes: upload operation information, deletion action information and
Amendment operation information.
C11, a kind of terminal, including the application recovery device as described in any one of B6-B10.
Claims (10)
1. an application recovery method, including:
The installation operation information of application program in monitor terminal;
From described installation operation information, extract the set-up time of described application program, the described set-up time is recorded as described answering
With installation success time point corresponding to program, and described application program is stored with the described corresponding relation installing successfully time point
To managing listings;
According to user's operation information and described managing listings, the application program in described terminal is recovered.
Method the most according to claim 1, described according to user's operation information with described managing listings, in described terminal
Application program carry out recovery and farther include:
According to user's operation information, select successfully time point is installed from described managing listings, as target, is installed the successfully time
Point;
Application recovery in described terminal to described target is installed the state before successful time point.
Method the most according to claim 2, described is mounted to the application recovery in described terminal to described target
State before merit time point farther includes:
Delete from described terminal and in described target, successfully time point is installed successful application program and in described target is installed
Install and successfully successful application program is installed after time point.
4. according to the method described in any one of claim 1-3, described according to user's operation information with described managing listings, right
Before application program in described terminal recovers, described method also includes:
Monitor the specified operation information of described application program;
Specified operation information according to described application program, it is judged that whether described application program is malicious application;
If judging, obtaining described application program is malicious application, then issue the user with malicious application information.
Method the most according to claim 4, described specified operation information includes: upload operation information, deletion action information
With amendment operation information.
6. an application recovery device, including:
First monitoring module, is suitable to the installation operation information of application program in monitor terminal;
Logging modle, is suitable to extract the set-up time of described application program from described installation operation information, during by described installation
Between be recorded as the installation success time point that described application program is corresponding, and described application program is installed successfully time point with described
Corresponding relation store to managing listings;
Recover module, be suitable to, according to user's operation information and described managing listings, carry out extensive to the application program in described terminal
Multiple.
Device the most according to claim 6, described recovery module includes: select unit and recovery unit;
Described selection unit is suitable to: according to user's operation information, selects to install successfully time point from described managing listings, as
Target installs successfully time point;
Described recovery unit is suitable to: installed successfully before time point by the application recovery in described terminal to described target
State.
Device the most according to claim 7, described recovery unit is further adapted for:
Delete from described terminal and in described target, successfully time point is installed successful application program and in described target is installed
Install and successfully successful application program is installed after time point.
9., according to the device described in any one of claim 6-8, described device also includes:
Second monitoring module, is suitable to monitor the specified operation information of described application program;
Judge module, is suitable to the specified operation information according to described application program, it is judged that whether described application program is that malice should
Use program;
Reminding module, if being suitable to described judge module to judge that obtaining described application program is malicious application, then send out to user
Go out malicious application information.
10. a terminal, including the application recovery device as described in any one of claim 6-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610474283.2A CN106096414B (en) | 2016-06-24 | 2016-06-24 | Application program recovery method and device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610474283.2A CN106096414B (en) | 2016-06-24 | 2016-06-24 | Application program recovery method and device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106096414A true CN106096414A (en) | 2016-11-09 |
CN106096414B CN106096414B (en) | 2019-12-31 |
Family
ID=57252720
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610474283.2A Active CN106096414B (en) | 2016-06-24 | 2016-06-24 | Application program recovery method and device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106096414B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108388457A (en) * | 2018-03-08 | 2018-08-10 | 维沃移动通信有限公司 | A kind of Application Parameters setting method and mobile terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102789558A (en) * | 2011-05-20 | 2012-11-21 | 北京网秦天下科技有限公司 | Method and device for analyzing program installation and program operation in mobile device |
US20130055238A1 (en) * | 2011-08-25 | 2013-02-28 | Pantech Co., Ltd. | System and method for providing virus protection |
CN103428212A (en) * | 2013-08-08 | 2013-12-04 | 电子科技大学 | Malicious code detection and defense method |
US20140068767A1 (en) * | 2012-09-05 | 2014-03-06 | Symantec Corporation | Systems and methods for detecting illegitimate applications |
-
2016
- 2016-06-24 CN CN201610474283.2A patent/CN106096414B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102789558A (en) * | 2011-05-20 | 2012-11-21 | 北京网秦天下科技有限公司 | Method and device for analyzing program installation and program operation in mobile device |
US20130055238A1 (en) * | 2011-08-25 | 2013-02-28 | Pantech Co., Ltd. | System and method for providing virus protection |
US20140068767A1 (en) * | 2012-09-05 | 2014-03-06 | Symantec Corporation | Systems and methods for detecting illegitimate applications |
CN103428212A (en) * | 2013-08-08 | 2013-12-04 | 电子科技大学 | Malicious code detection and defense method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108388457A (en) * | 2018-03-08 | 2018-08-10 | 维沃移动通信有限公司 | A kind of Application Parameters setting method and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN106096414B (en) | 2019-12-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104009977B (en) | A kind of method and system of information protection | |
US10069856B2 (en) | System and method of comparative evaluation for phishing mitigation | |
CN103279706B (en) | Intercept the method and apparatus installing Android application program in the terminal | |
CN103744686B (en) | Control method and the system of installation is applied in intelligent terminal | |
CN104050417B (en) | A kind of method and device detected in mobile terminal to application state | |
CN103944757B (en) | The method and apparatus of Network anomaly detection | |
US9367695B2 (en) | Software vulnerability notification via icon decorations | |
CN104200159B (en) | Configure the method and device of the authority of application program | |
KR101143999B1 (en) | Apparatus and method for analyzing application based on application programming interface | |
CN104517054A (en) | Method, device, client and server for detecting malicious APK | |
CN105844155B (en) | Macro-virus searching and killing method and system | |
CN103823873B (en) | Reading/writing method, device and system of browser setting item | |
CN103973745B (en) | A kind of method and device of mobile terminal operating system upgrading | |
US9973525B1 (en) | Systems and methods for determining the risk of information leaks from cloud-based services | |
Sellwood et al. | Sleeping android: The danger of dormant permissions | |
CN106845223A (en) | Method and apparatus for detecting malicious code | |
CN106548065B (en) | Application program installation detection method and device | |
CN105488361A (en) | Pirate application detection method, device and system | |
CN110297776A (en) | Examining report generation, method of reseptance, device, equipment and storage medium | |
CN105975302A (en) | Application installation method and terminal | |
CN109818972B (en) | Information security management method and device for industrial control system and electronic equipment | |
KR101372906B1 (en) | Method and system to prevent malware code | |
CN106357684A (en) | Login method and device of game application | |
KR101052443B1 (en) | Malware Analysis Method and System | |
CN102156650A (en) | Method and device capable of implementing automatic analysis of patch |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220830 Address after: No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science and Technology Park, High-tech Zone, Binhai New District, Tianjin 300000 Patentee after: 3600 Technology Group Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |
|
TR01 | Transfer of patent right |