CN106096414A - Application recovery method, device and terminal - Google Patents

Application recovery method, device and terminal Download PDF

Info

Publication number
CN106096414A
CN106096414A CN201610474283.2A CN201610474283A CN106096414A CN 106096414 A CN106096414 A CN 106096414A CN 201610474283 A CN201610474283 A CN 201610474283A CN 106096414 A CN106096414 A CN 106096414A
Authority
CN
China
Prior art keywords
application program
operation information
time point
terminal
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610474283.2A
Other languages
Chinese (zh)
Other versions
CN106096414B (en
Inventor
修林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
3600 Technology Group Co ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610474283.2A priority Critical patent/CN106096414B/en
Publication of CN106096414A publication Critical patent/CN106096414A/en
Application granted granted Critical
Publication of CN106096414B publication Critical patent/CN106096414B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Abstract

The invention discloses a kind of application recovery method, device and terminal, wherein, application recovery method includes: the installation operation information of application program in monitor terminal;From installing the set-up time extracting application program operation information, the set-up time is recorded as the installation success time point that application program is corresponding, and application program and the corresponding relation installing successfully time point are stored to managing listings;According to user's operation information and managing listings, the application program in terminal is recovered.Utilize the technical scheme that the present invention provides, easily the application program in terminal is recovered according to managing listings, improve the recovery efficiency of application program, contribute to ensureing the information security in terminal.

Description

Application recovery method, device and terminal
Technical field
The present invention relates to Internet technical field, be specifically related to a kind of application recovery method, device and terminal.
Background technology
In order to meet the various demands of user, application developer develops multiple application program and is available for user and selects and pacify It is filled in the terminal such as mobile phone or PAD.Generally, except the most having installed successful application program during installing in terminal, User can install and delete other application programs the most in the terminal.But some application program be user be not intended to it Between install, and be sightless to user after mounting, especially malicious application, user is difficult to know in terminal peace These application programs are filled, it is also difficult to from terminal, delete these application programs.But these application programs may be revealed end User profile in end, even results in the systemic breakdown of terminal.
Such as, the installation link of some application program can be hidden in picture or webpage, when user clicks on picture or opens During webpage, this application program will be mounted with unintentionally, and user is not aware that and oneself is mounted with this application program, owing to this should Being sightless to user after mounting by program, by checking terminal, user also is difficult to find and delete this application program.
Summary of the invention
In view of the above problems, it is proposed that the present invention in case provide one overcome the problems referred to above or at least in part solve on State application recovery method, device and the terminal of problem.
According to an aspect of the invention, it is provided a kind of application recovery method, the method includes:
The installation operation information of application program in monitor terminal;
From installing the set-up time extracting application program operation information, the set-up time is recorded as application program corresponding Successfully time point is installed, and application program and the corresponding relation installing successfully time point are stored to managing listings;
According to user's operation information and managing listings, the application program in terminal is recovered.
According to a further aspect in the invention, it is provided that a kind of application recovery device, this device includes:
First monitoring module, is suitable to the installation operation information of application program in monitor terminal;
Logging modle, is suitable to, from installing the set-up time extracting application program operation information, will be recorded as the set-up time The installation success time point that application program is corresponding, and application program and the corresponding relation installing successfully time point are stored to management In list;
Recover module, be suitable to, according to user's operation information and managing listings, the application program in terminal be recovered.
According to another aspect of the invention, it is provided that a kind of terminal, including above-mentioned application recovery device.
The technical scheme provided according to the present invention, the installation operation information of application program in monitor terminal, then from installation Operation information is extracted the set-up time of application program, the set-up time is recorded as the installation success time that application program is corresponding Point, and application program and the corresponding relation installing successfully time point are stored to managing listings, then believe according to user operation Breath and managing listings, recover the application program in terminal.Utilize the technical scheme that the present invention provides, it is possible to according to management Application program in terminal is recovered by list easily, thus improves the recovery efficiency of application program, contributes to ensureing Information security in terminal.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of description, and in order to allow above and other objects of the present invention, the feature and advantage can Become apparent, below especially exemplified by the detailed description of the invention of the present invention.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various other advantage and benefit common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical parts.In the accompanying drawings:
Fig. 1 shows the schematic flow sheet of application recovery method according to an embodiment of the invention;
Fig. 2 shows the schematic flow sheet of application recovery method in accordance with another embodiment of the present invention;
Fig. 3 shows the schematic flow sheet of the application recovery method according to another embodiment of the present invention;
Fig. 4 shows the structured flowchart of application recovery device according to an embodiment of the invention;
Fig. 5 shows the structured flowchart of application recovery device in accordance with another embodiment of the present invention.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although accompanying drawing shows the disclosure Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should be by embodiments set forth here Limited.On the contrary, it is provided that these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Fig. 1 shows the schematic flow sheet of application recovery method according to an embodiment of the invention, such as Fig. 1 institute Showing, the method comprises the steps:
Step S100, the installation operation information of application program in monitor terminal.
Wherein, terminal can be mobile phone, PAD, apparatus such as computer.Owing to some application program is sightless to user, So can clearly know which application program is terminal be mounted with for the ease of user, specifically, in the step s 100, can By the installation operation information of application program in desktop starter monitor terminal.Wherein, operation information is installed and comprises the steps that application journey The title of sequence, installation path and set-up time etc..Set-up time is the time successfully installing this application program.
Step S101, from installing the set-up time extracting application program operation information, will be recorded as application the set-up time The installation success time point that program is corresponding, and application program and the corresponding relation installing successfully time point are stored to managing listings In.
The set-up time of application program at extraction from installation operation information, owing to the set-up time is successfully to install this application The time of program, therefore can be recorded as the installation success time point that application program is corresponding the set-up time, and by application program with The corresponding relation installing successfully time point stores to managing listings, in order to be managed the application program in terminal.
Step S102, according to user's operation information and managing listings, recovers the application program in terminal.
After application program is stored to managing listings by step S101 with the corresponding relation installing successfully time point, In step S102, according to user's operation information and managing listings, so that it may easily the application program in terminal is recovered.
The application recovery method provided according to the present embodiment, the installation operation information of application program in monitor terminal, Then from installing the set-up time extracting application program operation information, is recorded as the installation that application program is corresponding the set-up time Success time point, and application program is stored to managing listings with the corresponding relation installing successfully time point, then according to Family operation information and managing listings, recover the application program in terminal.Utilize the technical scheme that the present invention provides, it is possible to Easily the application program in terminal is recovered according to managing listings, thus improve the recovery efficiency of application program, have Help ensure the information security in terminal.
Fig. 2 shows the schematic flow sheet of application recovery method in accordance with another embodiment of the present invention, such as Fig. 2 institute Showing, the method comprises the steps:
Step S200, the installation operation information of application program in monitor terminal.
Owing to some application program is sightless to user, can clearly know in terminal therefore to be easy to user It is mounted with which application program, specifically, in step s 200, the peace of application program in desktop starter monitor terminal can be passed through Dress operation information.Wherein, operation information is installed and comprises the steps that the title of application program, installation path and set-up time etc..
Step S201, from installing the set-up time extracting application program operation information, will be recorded as application the set-up time The installation success time point that program is corresponding, and application program and the corresponding relation installing successfully time point are stored to managing listings In.
For the ease of the application program in terminal is managed, by application program and the corresponding pass installing successfully time point System stores to managing listings.
Step S202, according to user's operation information, selects to install successfully time point from managing listings, installs as target Success time point.
Such as, the successfully time point of installing in managing listings can be presented to user with the form of time shaft, and also can The title installing the successfully application program that time point correspondence is installed is presented to user together, when user wants answering in terminal When recovering by program, can select installing successfully time point in time shaft, then in step S202, according to Family operation information, selects to install successfully time point from managing listings, installs successfully time point as target.
Step S203, installs the state before successful time point by the application recovery in terminal to target.
Determine target in step S202 and install successfully after time point, in step S203, by the application journey in terminal Sequence recovers the state before installing successful time point to target.Specifically, can delete from terminal, in target, is installed the successfully time Point is installed successful application program and installs in target and successfully install successful application program after time point.
Such as, managing listings stores 4 application programs the corresponding relation of successful time point is installed with it, wherein, The installation success time point of application program 1 correspondence is time point 1, and the installation success time point of application program 2 correspondence is time point 2, the installation success time point of application program 3 correspondence is time point 3, and the installation success time point of application program 4 correspondence is the time Putting 4, and time point 1 to time point 4 is arranged in order according to time order and function order, i.e. time point 1 is early than time point 2, time Point 2 is early than time point 3 etc., and time point 3 is early than time point 4.If according to user's operation information in step S202, by time point 2 install successfully time point as target, install successfully before time point in target, are only mounted with application program 1 in this terminal, that Application recovery in terminal to target is installed in step S203 the state before successful time point, i.e. terminal is only pacified Fill the state of application program 1.Specifically, can delete from terminal time point 2 install successful application program and time Between put after 2 successful application program be installed, say, that the most only retain application program 1, from terminal, delete application Program 2, application program 3 and application program 4.
Alternatively, in a possible implementation, between step S201 and step S202, also include: step S2011 To step S2013, as shown in Figure 3:
Step S2011, the specified operation information of monitoring application program.
In order to find the existence of malicious application in time, in step S2011, the appointment of monitoring application program Operation information.Specifically, can be by the specified operation information of desktop starter monitoring application program.Wherein, it is intended that operation information Comprise the steps that the information such as upload operation information, deletion action information and amendment operation information.
Step S2012, according to the specified operation information of application program, it is judged that whether application program is malicious application; The most then perform step S2013;If it is not, then perform step S202.
Wherein, can be according to the specified operation information of application program and predetermined registration operation information, it is judged that whether application program is evil Meaning application program.Specifically, it is judged that whether the specified operation information of application program meets predetermined registration operation information, if application program Specified operation information meet predetermined registration operation information, then explanation application program is not malicious application;If application program Specified operation information does not meets predetermined registration operation information, then explanation application program is malicious application.Those skilled in the art can According to actual needs predetermined registration operation information is configured, does not limits.
If it is determined that the program of being applied is malicious application, then perform step S2013;The journey if it is determined that be applied Sequence is not malicious application, then perform step S202, according to user's operation information, when selecting to install successfully from managing listings Between point, as target, successfully time point is installed.
Such as, when applying this method in mobile phone, if according to the specified operation information of application program, this application Program is wanted the associated person information in mobile phone is uploaded to the Internet, then can determine whether that the program of being applied is malicious application journey Sequence.
Step S2013, issues the user with malicious application information.
If judging that the program of being applied is malicious application through step S2012, in step S2013, send out to user Go out malicious application information, in order to user knows the existence of malicious application in time, and then as early as possible in terminal Application program recovers.
The application recovery method provided according to the present embodiment, the installation operation information of application program in monitor terminal, Then from installing the set-up time extracting application program operation information, is recorded as the installation that application program is corresponding the set-up time Success time point, and application program is stored to managing listings with the corresponding relation installing successfully time point, then according to Family operation information, selects to install successfully time point from managing listings, installs successfully time point as target, by answering in terminal With program recovery to target, the state before successful time point is installed.It addition, also monitor the specified operation information of application program, root Specified operation information according to application program, it is judged that whether application program is malicious application, is judging that the program of being applied is In the case of malicious application, issue the user with malicious application information.Utilize the technical scheme that the present invention provides, Conveniently realize the recovery to the application program in terminal not only by selecting target to install successfully time point, improve application The recovery efficiency of program, and, in the specified operation information according to application program, it is judged that the program of being applied is malicious application journey During sequence, issue the user with malicious application information, in order to user knows the existence of malicious application, Jin Erjin in time Early the application program in terminal is recovered, to eliminate potential safety hazard present in terminal, further help in guarantee terminal In information security.
Fig. 4 shows the structured flowchart of application recovery device according to an embodiment of the invention, as shown in Figure 4, This device includes: the first monitoring module 410, logging modle 420 and recovery module 430.
First monitoring module 410 is suitable to: the installation operation information of application program in monitor terminal.
Wherein, terminal can be mobile phone, PAD, apparatus such as computer.Owing to some application program is sightless to user, So can clearly know which application program is terminal be mounted with for the ease of user, specifically, the first monitoring module 410 By desktop starter, the installation operation information of application program in terminal can be monitored.Wherein, operation information is installed can wrap Include: the title of application program, installation path and set-up time etc..Set-up time is the time successfully installing this application program.
Logging modle 420 is suitable to: from installing the set-up time extracting application program operation information, will set-up time record For the installation success time point that application program is corresponding, and application program and the corresponding relation installing successfully time point are stored to pipe In reason list.
Logging modle 420 extracts the set-up time of application program from installing operation information, will be recorded as the set-up time should With installation success time point corresponding to program, for the ease of the application program in terminal is managed, also by application program with The corresponding relation installing successfully time point stores to managing listings.
Recover module 430 to be suitable to: according to user's operation information and managing listings, carry out extensive to the application program in terminal Multiple.
Recover module 430 easily the application program in terminal to be carried out according to user's operation information and managing listings Recover.
The application recovery device provided according to the present embodiment, the peace of application program in the first monitoring module monitor terminal Dress operation information, logging modle is extracted the set-up time of application program, will be recorded as the set-up time answering from installing operation information With installation success time point corresponding to program, and application program and the corresponding relation installing successfully time point are stored to managing and arrange In table, the application program in terminal, according to user's operation information and managing listings, is recovered by recovery module.Utilize the present invention The technical scheme provided, can recover the application program in terminal easily according to managing listings, thus improve application The recovery efficiency of program, contributes to ensureing the information security in terminal.
Fig. 5 shows the structured flowchart of application recovery device in accordance with another embodiment of the present invention, such as Fig. 5 institute Showing, this device includes: the first monitoring module 510, logging modle the 520, second monitoring module 530, judge module 540, prompting mould Block 550 and recovery module 560.Wherein, recover module 560 to include: select unit 561 and recovery unit 562.
First monitoring module 510 is suitable to: the installation operation information of application program in monitor terminal.
Specifically, the first monitoring module 510 can be by the installation operation letter of application program in desktop starter monitor terminal Breath.
Logging modle 520 is suitable to: from installing the set-up time extracting application program operation information, will set-up time record For the installation success time point that application program is corresponding, and application program and the corresponding relation installing successfully time point are stored to pipe In reason list.
Second monitoring module 530 is suitable to: the specified operation information of monitoring application program.
In order to find the existence of malicious application in time, the second monitoring module 530 monitors the finger of application program Surely information is operated.Specifically, the second monitoring module 530 can be by the specified operation information of desktop starter monitoring application program. Wherein, it is intended that operation information comprises the steps that the information such as upload operation information, deletion action information and amendment operation information.
Judge module 540 is suitable to: according to the specified operation information of application program, it is judged that whether application program is malicious application Program.
Wherein, it is judged that module 540 can be according to the specified operation information of application program and predetermined registration operation information, it is judged that application journey Whether sequence is malicious application.Predetermined registration operation information can be configured, herein by those skilled in the art according to actual needs Do not limit.Judge module 540, according to the specified operation information of application program, can judge whether application program is evil effectively Meaning application program.
Reminding module 550 is suitable to: if judge module 540 judges that the program of being applied is malicious application, then to user Send malicious application information.
If it is determined that module 540 judges that the program of being applied is malicious application, then reminding module 550 issues the user with Malicious application information, in order to user knows the existence of malicious application in time, and then as early as possible to answering in terminal Recover by program.
The selection unit 561 recovered in module 560 is suitable to: according to user's operation information, selects to install from managing listings Success time point, installs successfully time point as target.
Such as, the successfully time point of installing in managing listings can be presented to user with the form of time shaft, and also can The title installing the successfully application program that time point correspondence is installed is presented to user together, when user wants answering in terminal When recovering by program, can select installing successfully time point in time shaft, then select unit 561 according to user Operation information, selects to install successfully time point from managing listings, installs successfully time point as target.
Recovery unit 562 is suitable to: the application recovery in terminal to target is installed the state before successful time point.
Specifically, recovery unit 562 is further adapted for: deletes from terminal and installs successfully time point in target and install successfully Application program and install in target and successfully successful application program be installed after time point.
Utilize the application recovery device that the present embodiment provides, convenient not only by selecting target to install successfully time point Achieve the recovery to the application program in terminal, improve the recovery efficiency of application program, and, according to application program Specified operation information, it is judged that when the program of being applied is malicious application, issue the user with malicious application prompting letter Breath, in order to user knows the existence of malicious application in time, and then recovers the application program in terminal as early as possible, to disappear Except potential safety hazard present in terminal, further help in the information security ensured in terminal.
Present invention also offers a kind of terminal, this terminal includes above-mentioned application recovery device.The present invention provides Application program in terminal can be recovered easily by terminal according to managing listings, thus improves application program in terminal Recovery efficiency, contribute to ensureing the information security in terminal.
Algorithm and display are not intrinsic to any certain computer, virtual system or miscellaneous equipment relevant provided herein. Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system Structure be apparent from.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use various Programming language realizes the content of invention described herein, and the description done language-specific above is to disclose this Bright preferred forms.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case of not having these details.In some instances, it is not shown specifically known method, structure And technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that one or more in order to simplify that the disclosure helping understands in each inventive aspect, exist Above in the description of the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.But, the method for the disclosure should not be construed to reflect an intention that i.e. required guarantor The application claims feature more more than the feature being expressly recited in each claim protected.More precisely, as following Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore, The claims following detailed description of the invention are thus expressly incorporated in this detailed description of the invention, the most each claim itself All as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment adaptively Change and they are arranged in one or more equipment different from this embodiment.Can be the module in embodiment or list Unit or assembly are combined into a module or unit or assembly, and can put them in addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit excludes each other, can use any Combine all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed appoint Where method or all processes of equipment or unit are combined.Unless expressly stated otherwise, this specification (includes adjoint power Profit requires, summary and accompanying drawing) disclosed in each feature can be carried out generation by providing identical, equivalent or the alternative features of similar purpose Replace.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include other embodiments Some feature included by rather than further feature, but the combination of the feature of different embodiment means to be in the present invention's Within the scope of and form different embodiments.Such as, in the following claims, embodiment required for protection appoint One of meaning can mode use in any combination.
The all parts embodiment of the present invention can realize with hardware, or to run on one or more processor Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that and can use in practice Microprocessor or digital signal processor (DSP) realize according to embodiments of the present invention in some or all parts one A little or repertoire.The present invention is also implemented as part or all set for performing method as described herein Standby or device program (such as, computer program and computer program).The program of such present invention of realization can be deposited Store up on a computer-readable medium, or can be to have the form of one or more signal.Such signal can be from because of spy Download on net website and obtain, or provide on carrier signal, or provide with any other form.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference marks that should not will be located between bracket is configured to limitations on claims.Word " comprises " and does not excludes the presence of not Arrange element in the claims or step.Word "a" or "an" before being positioned at element does not excludes the presence of multiple such Element.The present invention and can come real by means of including the hardware of some different elements by means of properly programmed computer Existing.If in the unit claim listing equipment for drying, several in these devices can be by same hardware branch Specifically embody.Word first, second and third use do not indicate that any order.These word explanations can be run after fame Claim.
The invention discloses:
A1, a kind of application recovery method, including:
The installation operation information of application program in monitor terminal;
From described installation operation information, extract the set-up time of described application program, the described set-up time is recorded as institute State the installation success time point that application program is corresponding, and by described application program and the described corresponding relation installing successfully time point Store to managing listings;
According to user's operation information and described managing listings, the application program in described terminal is recovered.
A2, according to the method described in A1, described according to user's operation information with described managing listings, in described terminal Application program carries out recovery and farther includes:
According to user's operation information, select successfully time point is installed from described managing listings, install successfully as target Time point;
Application recovery in described terminal to described target is installed the state before successful time point.
A3, according to the method described in A2, described application recovery in described terminal to described target is installed successfully State before time point farther includes:
Delete from described terminal and in described target, successfully time point is installed successful application program and described is installed Target is installed and is successfully installed successful application program after time point.
A4, according to the method described in any one of A1-A3, described according to user's operation information with described managing listings, right Before application program in described terminal recovers, described method also includes:
Monitor the specified operation information of described application program;
Specified operation information according to described application program, it is judged that whether described application program is malicious application;
If judging, obtaining described application program is malicious application, then issue the user with malicious application prompting letter Breath.
A5, according to the method described in A4, described specified operation information includes: upload operation information, deletion action information and Amendment operation information.
B6, a kind of application recovery device, including:
First monitoring module, is suitable to the installation operation information of application program in monitor terminal;
Logging modle, is suitable to extract the set-up time of described application program from described installation operation information, by described peace ETL estimated time of loading is recorded as the installation success time point that described application program is corresponding, and by described application program with described installation successfully time Between point corresponding relation store to managing listings;
Recover module, be suitable to, according to user's operation information and described managing listings, the application program in described terminal be entered Row recovers.
B7, according to the device described in B6, described recovery module includes: select unit and recovery unit;
Described selection unit is suitable to: according to user's operation information, selects to install successfully time point from described managing listings, As target, successfully time point is installed;
Described recovery unit is suitable to: by the application recovery in described terminal to described target install successfully time point it Front state.
B8, according to the device described in B7, described recovery unit is further adapted for:
Delete from described terminal and in described target, successfully time point is installed successful application program and described is installed Target is installed and is successfully installed successful application program after time point.
B9, according to the device described in any one of B6-B8, described device also includes:
Second monitoring module, is suitable to monitor the specified operation information of described application program;
Judge module, is suitable to the specified operation information according to described application program, it is judged that whether described application program is evil Meaning application program;
Reminding module, if being suitable to described judge module to judge that to obtain described application program be malicious application, then to Family sends malicious application information.
B10, according to the device described in B9, described specified operation information includes: upload operation information, deletion action information and Amendment operation information.
C11, a kind of terminal, including the application recovery device as described in any one of B6-B10.

Claims (10)

1. an application recovery method, including:
The installation operation information of application program in monitor terminal;
From described installation operation information, extract the set-up time of described application program, the described set-up time is recorded as described answering With installation success time point corresponding to program, and described application program is stored with the described corresponding relation installing successfully time point To managing listings;
According to user's operation information and described managing listings, the application program in described terminal is recovered.
Method the most according to claim 1, described according to user's operation information with described managing listings, in described terminal Application program carry out recovery and farther include:
According to user's operation information, select successfully time point is installed from described managing listings, as target, is installed the successfully time Point;
Application recovery in described terminal to described target is installed the state before successful time point.
Method the most according to claim 2, described is mounted to the application recovery in described terminal to described target State before merit time point farther includes:
Delete from described terminal and in described target, successfully time point is installed successful application program and in described target is installed Install and successfully successful application program is installed after time point.
4. according to the method described in any one of claim 1-3, described according to user's operation information with described managing listings, right Before application program in described terminal recovers, described method also includes:
Monitor the specified operation information of described application program;
Specified operation information according to described application program, it is judged that whether described application program is malicious application;
If judging, obtaining described application program is malicious application, then issue the user with malicious application information.
Method the most according to claim 4, described specified operation information includes: upload operation information, deletion action information With amendment operation information.
6. an application recovery device, including:
First monitoring module, is suitable to the installation operation information of application program in monitor terminal;
Logging modle, is suitable to extract the set-up time of described application program from described installation operation information, during by described installation Between be recorded as the installation success time point that described application program is corresponding, and described application program is installed successfully time point with described Corresponding relation store to managing listings;
Recover module, be suitable to, according to user's operation information and described managing listings, carry out extensive to the application program in described terminal Multiple.
Device the most according to claim 6, described recovery module includes: select unit and recovery unit;
Described selection unit is suitable to: according to user's operation information, selects to install successfully time point from described managing listings, as Target installs successfully time point;
Described recovery unit is suitable to: installed successfully before time point by the application recovery in described terminal to described target State.
Device the most according to claim 7, described recovery unit is further adapted for:
Delete from described terminal and in described target, successfully time point is installed successful application program and in described target is installed Install and successfully successful application program is installed after time point.
9., according to the device described in any one of claim 6-8, described device also includes:
Second monitoring module, is suitable to monitor the specified operation information of described application program;
Judge module, is suitable to the specified operation information according to described application program, it is judged that whether described application program is that malice should Use program;
Reminding module, if being suitable to described judge module to judge that obtaining described application program is malicious application, then send out to user Go out malicious application information.
10. a terminal, including the application recovery device as described in any one of claim 6-9.
CN201610474283.2A 2016-06-24 2016-06-24 Application program recovery method and device and terminal Active CN106096414B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610474283.2A CN106096414B (en) 2016-06-24 2016-06-24 Application program recovery method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610474283.2A CN106096414B (en) 2016-06-24 2016-06-24 Application program recovery method and device and terminal

Publications (2)

Publication Number Publication Date
CN106096414A true CN106096414A (en) 2016-11-09
CN106096414B CN106096414B (en) 2019-12-31

Family

ID=57252720

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610474283.2A Active CN106096414B (en) 2016-06-24 2016-06-24 Application program recovery method and device and terminal

Country Status (1)

Country Link
CN (1) CN106096414B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108388457A (en) * 2018-03-08 2018-08-10 维沃移动通信有限公司 A kind of Application Parameters setting method and mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102789558A (en) * 2011-05-20 2012-11-21 北京网秦天下科技有限公司 Method and device for analyzing program installation and program operation in mobile device
US20130055238A1 (en) * 2011-08-25 2013-02-28 Pantech Co., Ltd. System and method for providing virus protection
CN103428212A (en) * 2013-08-08 2013-12-04 电子科技大学 Malicious code detection and defense method
US20140068767A1 (en) * 2012-09-05 2014-03-06 Symantec Corporation Systems and methods for detecting illegitimate applications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102789558A (en) * 2011-05-20 2012-11-21 北京网秦天下科技有限公司 Method and device for analyzing program installation and program operation in mobile device
US20130055238A1 (en) * 2011-08-25 2013-02-28 Pantech Co., Ltd. System and method for providing virus protection
US20140068767A1 (en) * 2012-09-05 2014-03-06 Symantec Corporation Systems and methods for detecting illegitimate applications
CN103428212A (en) * 2013-08-08 2013-12-04 电子科技大学 Malicious code detection and defense method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108388457A (en) * 2018-03-08 2018-08-10 维沃移动通信有限公司 A kind of Application Parameters setting method and mobile terminal

Also Published As

Publication number Publication date
CN106096414B (en) 2019-12-31

Similar Documents

Publication Publication Date Title
CN104009977B (en) A kind of method and system of information protection
US10069856B2 (en) System and method of comparative evaluation for phishing mitigation
CN103279706B (en) Intercept the method and apparatus installing Android application program in the terminal
CN103744686B (en) Control method and the system of installation is applied in intelligent terminal
CN104050417B (en) A kind of method and device detected in mobile terminal to application state
CN103944757B (en) The method and apparatus of Network anomaly detection
US9367695B2 (en) Software vulnerability notification via icon decorations
CN104200159B (en) Configure the method and device of the authority of application program
KR101143999B1 (en) Apparatus and method for analyzing application based on application programming interface
CN104517054A (en) Method, device, client and server for detecting malicious APK
CN105844155B (en) Macro-virus searching and killing method and system
CN103823873B (en) Reading/writing method, device and system of browser setting item
CN103973745B (en) A kind of method and device of mobile terminal operating system upgrading
US9973525B1 (en) Systems and methods for determining the risk of information leaks from cloud-based services
Sellwood et al. Sleeping android: The danger of dormant permissions
CN106845223A (en) Method and apparatus for detecting malicious code
CN106548065B (en) Application program installation detection method and device
CN105488361A (en) Pirate application detection method, device and system
CN110297776A (en) Examining report generation, method of reseptance, device, equipment and storage medium
CN105975302A (en) Application installation method and terminal
CN109818972B (en) Information security management method and device for industrial control system and electronic equipment
KR101372906B1 (en) Method and system to prevent malware code
CN106357684A (en) Login method and device of game application
KR101052443B1 (en) Malware Analysis Method and System
CN102156650A (en) Method and device capable of implementing automatic analysis of patch

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220830

Address after: No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science and Technology Park, High-tech Zone, Binhai New District, Tianjin 300000

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right