CN106096414B - Application program recovery method and device and terminal - Google Patents
Application program recovery method and device and terminal Download PDFInfo
- Publication number
- CN106096414B CN106096414B CN201610474283.2A CN201610474283A CN106096414B CN 106096414 B CN106096414 B CN 106096414B CN 201610474283 A CN201610474283 A CN 201610474283A CN 106096414 B CN106096414 B CN 106096414B
- Authority
- CN
- China
- Prior art keywords
- application program
- operation information
- installation
- time point
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
Abstract
The invention discloses an application program recovery method, an application program recovery device and a terminal, wherein the application program recovery method comprises the following steps: monitoring installation operation information of an application program in a terminal; extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list; and restoring the application program in the terminal according to the user operation information and the management list. By utilizing the technical scheme provided by the invention, the application program in the terminal can be conveniently recovered according to the management list, the recovery efficiency of the application program is improved, and the information safety in the terminal is favorably ensured.
Description
Technical Field
The invention relates to the technical field of internet, in particular to an application program recovery method, an application program recovery device and a terminal.
Background
In order to meet various requirements of users, program developers develop various application programs which can be selected by the users and installed in terminals such as mobile phones or PADs. In general, a user can conveniently install and delete other applications in a terminal, except for an application that has been successfully installed during the installation of the terminal. However, some applications are installed unintentionally by the user and are invisible to the user after installation, especially malicious applications, and it is difficult for the user to know that the applications are installed in the terminal and to delete the applications from the terminal. However, these applications may reveal user information in the terminal and even cause the system of the terminal to crash.
For example, some application installation links are hidden in pictures or web pages, and when a user clicks on a picture or opens a web page, the application is installed unintentionally, and the user does not know that the application is installed.
Disclosure of Invention
In view of the above, the present invention is proposed in order to provide an application recovery method, apparatus and terminal that overcome or at least partially solve the above problems.
According to an aspect of the present invention, there is provided an application recovery method, including:
monitoring installation operation information of an application program in a terminal;
extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list;
and restoring the application program in the terminal according to the user operation information and the management list.
According to another aspect of the present invention, there is provided an application recovery apparatus, including:
the first monitoring module is suitable for monitoring the installation operation information of the application program in the terminal;
the recording module is suitable for extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into the management list;
and the recovery module is suitable for recovering the application program in the terminal according to the user operation information and the management list.
According to still another aspect of the present invention, there is provided a terminal including the above-mentioned application recovery apparatus.
According to the technical scheme provided by the invention, the installation operation information of the application program in the terminal is monitored, the installation time of the application program is extracted from the installation operation information, the installation time is recorded as the installation success time point corresponding to the application program, the corresponding relation between the application program and the installation success time point is stored in the management list, and then the application program in the terminal is recovered according to the user operation information and the management list. By utilizing the technical scheme provided by the invention, the application program in the terminal can be conveniently recovered according to the management list, so that the recovery efficiency of the application program is improved, and the information safety in the terminal is favorably ensured.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 shows a flow diagram of an application recovery method according to one embodiment of the invention;
FIG. 2 shows a flow diagram of an application recovery method according to another embodiment of the invention;
FIG. 3 illustrates a flow diagram of an application recovery method according to yet another embodiment of the invention;
FIG. 4 is a block diagram illustrating an architecture of an application recovery apparatus according to an embodiment of the present invention;
fig. 5 is a block diagram showing the construction of an application recovery apparatus according to another embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Fig. 1 is a flowchart illustrating an application recovery method according to an embodiment of the present invention, and as shown in fig. 1, the method includes the following steps:
and step S100, monitoring installation operation information of the application program in the terminal.
The terminal can be a mobile phone, a PAD, a computer and other devices. Since some applications are invisible to the user, in order to facilitate the user to clearly know which applications are installed in the terminal, specifically, in step S100, the installation operation information of the applications in the terminal may be monitored through the desktop launcher. Wherein the installation operation information may include: name of application, installation path and installation time, etc. The install time is the time the application was successfully installed.
Step S101, extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list.
And extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program as the installation time is the time for successfully installing the application program, and storing the corresponding relation between the application program and the installation success time point into a management list so as to manage the application program in the terminal.
And step S102, restoring the application program in the terminal according to the user operation information and the management list.
After the corresponding relationship between the application program and the installation success time point is stored in the management list in step S101, the application program in the terminal can be conveniently recovered according to the user operation information and the management list in step S102.
According to the application program recovery method provided by the embodiment, the installation operation information of the application program in the terminal is monitored, the installation time of the application program is extracted from the installation operation information, the installation time is recorded as the installation success time point corresponding to the application program, the corresponding relation between the application program and the installation success time point is stored in the management list, and then the application program in the terminal is recovered according to the user operation information and the management list. By utilizing the technical scheme provided by the invention, the application program in the terminal can be conveniently recovered according to the management list, so that the recovery efficiency of the application program is improved, and the information safety in the terminal is favorably ensured.
Fig. 2 is a flowchart illustrating an application recovery method according to another embodiment of the present invention, and as shown in fig. 2, the method includes the following steps:
and step S200, monitoring installation operation information of the application program in the terminal.
Since some applications are invisible to the user, in order to facilitate the user to clearly know which applications are installed in the terminal, specifically, in step S200, the installation operation information of the applications in the terminal may be monitored through the desktop launcher. Wherein the installation operation information may include: name of application, installation path and installation time, etc.
Step S201, extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relationship between the application program and the installation success time point in the management list.
In order to manage the application programs in the terminal, the corresponding relation between the application programs and the installation success time points is stored in a management list.
Step S202, according to the user operation information, selecting an installation success time point from the management list as a target installation success time point.
For example, the installation success time point in the management list may be presented to the user in the form of a time axis, and the name of the application installed corresponding to the installation success time point may also be presented to the user together, and when the user wants to recover the application in the terminal, the installation success time point may be selected in the time axis, and then in step S202, the installation success time point is selected from the management list as the target installation success time point according to the user operation information.
And step S203, restoring the application program in the terminal to the state before the target installation success time point.
After the target installation success time point is determined in step S202, the application in the terminal is restored to the state before the target installation success time point in step S203. Specifically, an application program successfully installed at the target installation success time point and an application program successfully installed after the target installation success time point may be deleted from the terminal.
For example, the management list stores the correspondence between 4 applications and their installation success time points, where the installation success time point corresponding to the application 1 is time point 1, the installation success time point corresponding to the application 2 is time point 2, the installation success time point corresponding to the application 3 is time point 3, the installation success time point corresponding to the application 4 is time point 4, and the time points 1 to 4 are arranged in time sequence, that is, time point 1 is earlier than time point 2, time point 2 is earlier than time point 3, and time point 3 is earlier than time point 4. If the time point 2 is set as the target installation success time point before which only the application 1 is installed in the terminal according to the user operation information in step S202, the application in the terminal is restored to the state before the target installation success time point, that is, the state in which only the application 1 is installed in the terminal in step S203. Specifically, the application program successfully installed at the time point 2 and the application program successfully installed after the time point 2 may be deleted from the terminal, that is, only the application program 1 remains in the terminal, and the application program 2, the application program 3, and the application program 4 are deleted from the terminal.
Optionally, in a possible implementation manner, between step S201 and step S202, the method further includes: step S2011 to step S2013, as shown in fig. 3:
in step S2011, the specified operation information of the application is monitored.
In order to be able to promptly find the presence of a malicious application, in step S2011, the specified operation information of the application is monitored. Specifically, the specified operation information of the application program can be monitored through the desktop launcher. Wherein the specifying the operation information may include: uploading operation information, deleting operation information, modifying operation information and the like.
Step S2012, judging whether the application program is a malicious application program according to the specified operation information of the application program; if yes, executing step S2013; if not, go to step S202.
The method comprises the steps of judging whether the application program is a malicious application program or not according to the specified operation information and the preset operation information of the application program. Specifically, whether the specified operation information of the application program accords with the preset operation information or not is judged, and if the specified operation information of the application program accords with the preset operation information, the application program is not a malicious application program; and if the specified operation information of the application program does not accord with the preset operation information, the application program is indicated to be a malicious application program. The preset operation information can be set by a person skilled in the art according to actual needs, and is not limited herein.
If the application program is judged to be a malicious application program, executing step S2013; if the application program is not judged to be the malicious application program, step S202 is executed, and the successful installation time point is selected from the management list as the target successful installation time point according to the user operation information.
For example, when the method is applied to a mobile phone, if the application program wants to upload the contact information in the mobile phone to the internet according to the specified operation information of the application program, it may be determined that the application program is a malicious application program.
And step S2013, sending malicious application program prompt information to the user.
If the application is determined to be a malicious application in step S2012, in step S2013, a malicious application prompt message is sent to the user, so that the user can know the existence of the malicious application in time, and the application in the terminal can be recovered as early as possible.
According to the application program recovery method provided by the embodiment, the installation operation information of the application program in the terminal is monitored, the installation time of the application program is extracted from the installation operation information, the installation time is recorded as the installation success time point corresponding to the application program, the corresponding relation between the application program and the installation success time point is stored in the management list, the installation success time point is selected from the management list according to the user operation information and is used as the target installation success time point, and the application program in the terminal is recovered to the state before the target installation success time point. In addition, the designated operation information of the application program is monitored, whether the application program is a malicious application program is judged according to the designated operation information of the application program, and malicious application program prompt information is sent to a user under the condition that the application program is judged to be the malicious application program. By utilizing the technical scheme provided by the invention, the recovery of the application program in the terminal is conveniently realized by selecting the successful time point of target installation, the recovery efficiency of the application program is improved, and in addition, when the application program is judged to be a malicious application program according to the specified operation information of the application program, malicious application program prompt information is sent to a user, so that the user can know the existence of the malicious application program in time, and further the application program in the terminal is recovered as early as possible, so that the potential safety hazard in the terminal is eliminated, and the information safety in the terminal is further facilitated to be ensured.
Fig. 4 is a block diagram illustrating a structure of an application recovery apparatus according to an embodiment of the present invention, and as shown in fig. 4, the apparatus includes: a first monitoring module 410, a recording module 420, and a recovery module 430.
The first monitoring module 410 is adapted to: and monitoring the installation operation information of the application program in the terminal.
The terminal can be a mobile phone, a PAD, a computer and other devices. Since some applications are invisible to the user, in order to enable the user to clearly know which applications are installed in the terminal, specifically, the first monitoring module 410 may monitor installation operation information of the applications in the terminal through the desktop launcher. Wherein the installation operation information may include: name of application, installation path and installation time, etc. The install time is the time the application was successfully installed.
The recording module 420 is adapted to: and extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list.
The recording module 420 extracts the installation time of the application program from the installation operation information, records the installation time as an installation success time point corresponding to the application program, and stores a corresponding relationship between the application program and the installation success time point in a management list in order to manage the application program in the terminal.
The recovery module 430 is adapted to: and restoring the application program in the terminal according to the user operation information and the management list.
The restoring module 430 can conveniently restore the application program in the terminal according to the user operation information and the management list.
According to the application program recovery device provided by the embodiment, the first monitoring module monitors installation operation information of an application program in the terminal, the recording module extracts installation time of the application program from the installation operation information, records the installation time as an installation success time point corresponding to the application program, stores a corresponding relation between the application program and the installation success time point into the management list, and the recovery module recovers the application program in the terminal according to user operation information and the management list. By utilizing the technical scheme provided by the invention, the application program in the terminal can be conveniently recovered according to the management list, so that the recovery efficiency of the application program is improved, and the information safety in the terminal is favorably ensured.
Fig. 5 is a block diagram illustrating a structure of an application recovery apparatus according to another embodiment of the present invention, which includes, as shown in fig. 5: a first monitoring module 510, a recording module 520, a second monitoring module 530, a determining module 540, a prompting module 550, and a recovering module 560. Wherein, the recovery module 560 includes: a selection unit 561 and a recovery unit 562.
The first monitoring module 510 is adapted to: and monitoring the installation operation information of the application program in the terminal.
Specifically, the first monitoring module 510 may monitor installation operation information of an application program in the terminal through the desktop launcher.
The recording module 520 is adapted to: and extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list.
The second monitoring module 530 is adapted to: the specified operation information of the application program is monitored.
In order to be able to timely discover the existence of a malicious application, the second monitoring module 530 monitors the designated operation information of the application. Specifically, the second monitoring module 530 may monitor the designated operation information of the application through the desktop launcher. Wherein the specifying the operation information may include: uploading operation information, deleting operation information, modifying operation information and the like.
The determining module 540 is adapted to: and judging whether the application program is a malicious application program or not according to the specified operation information of the application program.
The determining module 540 may determine whether the application is a malicious application according to the specified operation information and the preset operation information of the application. The preset operation information can be set by a person skilled in the art according to actual needs, and is not limited herein. The determining module 540 can effectively determine whether the application is a malicious application according to the specified operation information of the application.
The prompting module 550 is adapted to: if the determining module 540 determines that the obtained application is a malicious application, a malicious application prompt message is sent to the user.
If the determining module 540 determines that the obtained application is a malicious application, the prompting module 550 sends a malicious application prompting message to the user, so that the user can know the existence of the malicious application in time, and then recover the application in the terminal as soon as possible.
The selection unit 561 in the recovery module 560 is adapted to: and selecting the installation success time point from the management list as a target installation success time point according to the user operation information.
For example, the installation success time point in the management list may be presented to the user in the form of a time axis, and the names of the applications installed corresponding to the installation success time point may also be presented to the user together, and when the user wants to restore the applications in the terminal, the installation success time point may be selected in the time axis, and then the selection unit 561 selects the installation success time point from the management list as the target installation success time point according to the user operation information.
The recovery unit 562 is adapted to: and restoring the application program in the terminal to the state before the target installation success time point.
In particular, the recovery unit 562 is further adapted to: and deleting the application program which is successfully installed at the target installation successful time point and the application program which is successfully installed after the target installation successful time point from the terminal.
By using the application program recovery device provided by the embodiment, the recovery of the application program in the terminal is conveniently realized by selecting the successful time point of target installation, the recovery efficiency of the application program is improved, and in addition, when the application program is judged to be a malicious application program according to the specified operation information of the application program, malicious application program prompt information is sent to a user, so that the user can timely know the existence of the malicious application program, and then the application program in the terminal is recovered as early as possible, so that the potential safety hazard existing in the terminal is eliminated, and the information safety in the terminal is further facilitated to be ensured.
The invention also provides a terminal which comprises the application program recovery device. The terminal provided by the invention can conveniently recover the application program in the terminal according to the management list, thereby improving the recovery efficiency of the application program in the terminal and being beneficial to ensuring the information safety in the terminal.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components in accordance with embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
Claims (7)
1. An application recovery method comprising:
monitoring installation operation information of an application program in a terminal;
extracting installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list;
restoring the application program in the terminal according to the user operation information and the management list;
wherein, the restoring the application program in the terminal according to the user operation information and the management list further comprises: selecting an installation success time point from the management list as a target installation success time point according to the user operation information; restoring the application program in the terminal to the state before the target installation success time point;
the restoring the application program in the terminal to the state before the target installation success time point further comprises:
and deleting the application program which is successfully installed at the target installation successful time point and the application program which is successfully installed after the target installation successful time point from the terminal.
2. The method according to claim 1, before the restoring the application program in the terminal according to the user operation information and the management list, the method further comprising:
monitoring the appointed operation information of the application program;
judging whether the application program is a malicious application program or not according to the specified operation information of the application program;
and if the application program is judged to be the malicious application program, sending malicious application program prompt information to the user.
3. The method of claim 2, the specifying operational information comprising: uploading operation information, deleting operation information and modifying operation information.
4. An application recovery apparatus comprising:
the first monitoring module is suitable for monitoring the installation operation information of the application program in the terminal;
the recording module is suitable for extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list;
the recovery module is suitable for recovering the application program in the terminal according to the user operation information and the management list;
wherein the recovery module comprises: a selection unit and a recovery unit;
the selection unit is adapted to: selecting an installation success time point from the management list as a target installation success time point according to the user operation information;
the recovery unit is adapted to: restoring the application program in the terminal to the state before the target installation success time point;
the recovery unit is further adapted to:
and deleting the application program which is successfully installed at the target installation successful time point and the application program which is successfully installed after the target installation successful time point from the terminal.
5. The apparatus of claim 4, further comprising:
the second monitoring module is suitable for monitoring the specified operation information of the application program;
the judging module is suitable for judging whether the application program is a malicious application program or not according to the specified operation information of the application program;
and the prompting module is suitable for sending malicious application program prompting information to a user if the judging module judges that the application program is a malicious application program.
6. The apparatus of claim 5, the specifying operation information comprising: uploading operation information, deleting operation information and modifying operation information.
7. A terminal comprising an application retrieval device as claimed in any one of claims 4 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610474283.2A CN106096414B (en) | 2016-06-24 | 2016-06-24 | Application program recovery method and device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610474283.2A CN106096414B (en) | 2016-06-24 | 2016-06-24 | Application program recovery method and device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106096414A CN106096414A (en) | 2016-11-09 |
CN106096414B true CN106096414B (en) | 2019-12-31 |
Family
ID=57252720
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610474283.2A Active CN106096414B (en) | 2016-06-24 | 2016-06-24 | Application program recovery method and device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106096414B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108388457A (en) * | 2018-03-08 | 2018-08-10 | 维沃移动通信有限公司 | A kind of Application Parameters setting method and mobile terminal |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102789558A (en) * | 2011-05-20 | 2012-11-21 | 北京网秦天下科技有限公司 | Method and device for analyzing program installation and program operation in mobile device |
CN103428212A (en) * | 2013-08-08 | 2013-12-04 | 电子科技大学 | Malicious code detection and defense method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101389682B1 (en) * | 2011-08-25 | 2014-04-28 | 주식회사 팬택 | System and method that prevent virus damage |
US8732834B2 (en) * | 2012-09-05 | 2014-05-20 | Symantec Corporation | Systems and methods for detecting illegitimate applications |
-
2016
- 2016-06-24 CN CN201610474283.2A patent/CN106096414B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102789558A (en) * | 2011-05-20 | 2012-11-21 | 北京网秦天下科技有限公司 | Method and device for analyzing program installation and program operation in mobile device |
CN103428212A (en) * | 2013-08-08 | 2013-12-04 | 电子科技大学 | Malicious code detection and defense method |
Also Published As
Publication number | Publication date |
---|---|
CN106096414A (en) | 2016-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103744686B (en) | Control method and the system of installation is applied in intelligent terminal | |
CN108319662A (en) | Page processing method, device, electronic equipment and readable storage medium storing program for executing | |
CN103825938A (en) | Method of downloading resources and device | |
CN106897095B (en) | Method and device for hot repairing application program, readable storage medium and computing equipment | |
CN106250434A (en) | Load the method and device of webpage | |
US20140222761A1 (en) | Terminal Backup and Recovery Method | |
CN105471935B (en) | Information prompting method and device | |
CN105786839A (en) | Application data acquisition method and apparatus | |
CN108984339B (en) | Data recovery method and related product | |
CN106155746B (en) | A kind of installation file processing method and processing device, server | |
CN106020917B (en) | A kind of software installation method and device, user terminal | |
WO2016101761A1 (en) | Method and system for updating associated accounts | |
CN106096414B (en) | Application program recovery method and device and terminal | |
CN108762983B (en) | Multimedia data recovery method and device | |
CN104360880A (en) | Application installing method and electronic equipment | |
CN109032617B (en) | Control method and control device for automatically deleting installation package | |
CN111078382A (en) | Command timeout processing method and device | |
CN105975321A (en) | Application program installation package icon replacing method and device | |
CN111722850A (en) | Method, device and system for processing application among multiple systems | |
CN109472540B (en) | Service processing method and device | |
CN108572985B (en) | Page display method and device | |
CN111198725B (en) | Application starting processing method, computing equipment and computer storage medium | |
CN108322912B (en) | Method and device for distinguishing short messages | |
CN103714291A (en) | Information processing method and electronic equipment | |
CN106021501A (en) | Data storing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220830 Address after: No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science and Technology Park, High-tech Zone, Binhai New District, Tianjin 300000 Patentee after: 3600 Technology Group Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |