CN106096414B - Application program recovery method and device and terminal - Google Patents

Application program recovery method and device and terminal Download PDF

Info

Publication number
CN106096414B
CN106096414B CN201610474283.2A CN201610474283A CN106096414B CN 106096414 B CN106096414 B CN 106096414B CN 201610474283 A CN201610474283 A CN 201610474283A CN 106096414 B CN106096414 B CN 106096414B
Authority
CN
China
Prior art keywords
application program
operation information
installation
time point
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610474283.2A
Other languages
Chinese (zh)
Other versions
CN106096414A (en
Inventor
修林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
3600 Technology Group Co ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610474283.2A priority Critical patent/CN106096414B/en
Publication of CN106096414A publication Critical patent/CN106096414A/en
Application granted granted Critical
Publication of CN106096414B publication Critical patent/CN106096414B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Abstract

The invention discloses an application program recovery method, an application program recovery device and a terminal, wherein the application program recovery method comprises the following steps: monitoring installation operation information of an application program in a terminal; extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list; and restoring the application program in the terminal according to the user operation information and the management list. By utilizing the technical scheme provided by the invention, the application program in the terminal can be conveniently recovered according to the management list, the recovery efficiency of the application program is improved, and the information safety in the terminal is favorably ensured.

Description

Application program recovery method and device and terminal
Technical Field
The invention relates to the technical field of internet, in particular to an application program recovery method, an application program recovery device and a terminal.
Background
In order to meet various requirements of users, program developers develop various application programs which can be selected by the users and installed in terminals such as mobile phones or PADs. In general, a user can conveniently install and delete other applications in a terminal, except for an application that has been successfully installed during the installation of the terminal. However, some applications are installed unintentionally by the user and are invisible to the user after installation, especially malicious applications, and it is difficult for the user to know that the applications are installed in the terminal and to delete the applications from the terminal. However, these applications may reveal user information in the terminal and even cause the system of the terminal to crash.
For example, some application installation links are hidden in pictures or web pages, and when a user clicks on a picture or opens a web page, the application is installed unintentionally, and the user does not know that the application is installed.
Disclosure of Invention
In view of the above, the present invention is proposed in order to provide an application recovery method, apparatus and terminal that overcome or at least partially solve the above problems.
According to an aspect of the present invention, there is provided an application recovery method, including:
monitoring installation operation information of an application program in a terminal;
extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list;
and restoring the application program in the terminal according to the user operation information and the management list.
According to another aspect of the present invention, there is provided an application recovery apparatus, including:
the first monitoring module is suitable for monitoring the installation operation information of the application program in the terminal;
the recording module is suitable for extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into the management list;
and the recovery module is suitable for recovering the application program in the terminal according to the user operation information and the management list.
According to still another aspect of the present invention, there is provided a terminal including the above-mentioned application recovery apparatus.
According to the technical scheme provided by the invention, the installation operation information of the application program in the terminal is monitored, the installation time of the application program is extracted from the installation operation information, the installation time is recorded as the installation success time point corresponding to the application program, the corresponding relation between the application program and the installation success time point is stored in the management list, and then the application program in the terminal is recovered according to the user operation information and the management list. By utilizing the technical scheme provided by the invention, the application program in the terminal can be conveniently recovered according to the management list, so that the recovery efficiency of the application program is improved, and the information safety in the terminal is favorably ensured.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 shows a flow diagram of an application recovery method according to one embodiment of the invention;
FIG. 2 shows a flow diagram of an application recovery method according to another embodiment of the invention;
FIG. 3 illustrates a flow diagram of an application recovery method according to yet another embodiment of the invention;
FIG. 4 is a block diagram illustrating an architecture of an application recovery apparatus according to an embodiment of the present invention;
fig. 5 is a block diagram showing the construction of an application recovery apparatus according to another embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Fig. 1 is a flowchart illustrating an application recovery method according to an embodiment of the present invention, and as shown in fig. 1, the method includes the following steps:
and step S100, monitoring installation operation information of the application program in the terminal.
The terminal can be a mobile phone, a PAD, a computer and other devices. Since some applications are invisible to the user, in order to facilitate the user to clearly know which applications are installed in the terminal, specifically, in step S100, the installation operation information of the applications in the terminal may be monitored through the desktop launcher. Wherein the installation operation information may include: name of application, installation path and installation time, etc. The install time is the time the application was successfully installed.
Step S101, extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list.
And extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program as the installation time is the time for successfully installing the application program, and storing the corresponding relation between the application program and the installation success time point into a management list so as to manage the application program in the terminal.
And step S102, restoring the application program in the terminal according to the user operation information and the management list.
After the corresponding relationship between the application program and the installation success time point is stored in the management list in step S101, the application program in the terminal can be conveniently recovered according to the user operation information and the management list in step S102.
According to the application program recovery method provided by the embodiment, the installation operation information of the application program in the terminal is monitored, the installation time of the application program is extracted from the installation operation information, the installation time is recorded as the installation success time point corresponding to the application program, the corresponding relation between the application program and the installation success time point is stored in the management list, and then the application program in the terminal is recovered according to the user operation information and the management list. By utilizing the technical scheme provided by the invention, the application program in the terminal can be conveniently recovered according to the management list, so that the recovery efficiency of the application program is improved, and the information safety in the terminal is favorably ensured.
Fig. 2 is a flowchart illustrating an application recovery method according to another embodiment of the present invention, and as shown in fig. 2, the method includes the following steps:
and step S200, monitoring installation operation information of the application program in the terminal.
Since some applications are invisible to the user, in order to facilitate the user to clearly know which applications are installed in the terminal, specifically, in step S200, the installation operation information of the applications in the terminal may be monitored through the desktop launcher. Wherein the installation operation information may include: name of application, installation path and installation time, etc.
Step S201, extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relationship between the application program and the installation success time point in the management list.
In order to manage the application programs in the terminal, the corresponding relation between the application programs and the installation success time points is stored in a management list.
Step S202, according to the user operation information, selecting an installation success time point from the management list as a target installation success time point.
For example, the installation success time point in the management list may be presented to the user in the form of a time axis, and the name of the application installed corresponding to the installation success time point may also be presented to the user together, and when the user wants to recover the application in the terminal, the installation success time point may be selected in the time axis, and then in step S202, the installation success time point is selected from the management list as the target installation success time point according to the user operation information.
And step S203, restoring the application program in the terminal to the state before the target installation success time point.
After the target installation success time point is determined in step S202, the application in the terminal is restored to the state before the target installation success time point in step S203. Specifically, an application program successfully installed at the target installation success time point and an application program successfully installed after the target installation success time point may be deleted from the terminal.
For example, the management list stores the correspondence between 4 applications and their installation success time points, where the installation success time point corresponding to the application 1 is time point 1, the installation success time point corresponding to the application 2 is time point 2, the installation success time point corresponding to the application 3 is time point 3, the installation success time point corresponding to the application 4 is time point 4, and the time points 1 to 4 are arranged in time sequence, that is, time point 1 is earlier than time point 2, time point 2 is earlier than time point 3, and time point 3 is earlier than time point 4. If the time point 2 is set as the target installation success time point before which only the application 1 is installed in the terminal according to the user operation information in step S202, the application in the terminal is restored to the state before the target installation success time point, that is, the state in which only the application 1 is installed in the terminal in step S203. Specifically, the application program successfully installed at the time point 2 and the application program successfully installed after the time point 2 may be deleted from the terminal, that is, only the application program 1 remains in the terminal, and the application program 2, the application program 3, and the application program 4 are deleted from the terminal.
Optionally, in a possible implementation manner, between step S201 and step S202, the method further includes: step S2011 to step S2013, as shown in fig. 3:
in step S2011, the specified operation information of the application is monitored.
In order to be able to promptly find the presence of a malicious application, in step S2011, the specified operation information of the application is monitored. Specifically, the specified operation information of the application program can be monitored through the desktop launcher. Wherein the specifying the operation information may include: uploading operation information, deleting operation information, modifying operation information and the like.
Step S2012, judging whether the application program is a malicious application program according to the specified operation information of the application program; if yes, executing step S2013; if not, go to step S202.
The method comprises the steps of judging whether the application program is a malicious application program or not according to the specified operation information and the preset operation information of the application program. Specifically, whether the specified operation information of the application program accords with the preset operation information or not is judged, and if the specified operation information of the application program accords with the preset operation information, the application program is not a malicious application program; and if the specified operation information of the application program does not accord with the preset operation information, the application program is indicated to be a malicious application program. The preset operation information can be set by a person skilled in the art according to actual needs, and is not limited herein.
If the application program is judged to be a malicious application program, executing step S2013; if the application program is not judged to be the malicious application program, step S202 is executed, and the successful installation time point is selected from the management list as the target successful installation time point according to the user operation information.
For example, when the method is applied to a mobile phone, if the application program wants to upload the contact information in the mobile phone to the internet according to the specified operation information of the application program, it may be determined that the application program is a malicious application program.
And step S2013, sending malicious application program prompt information to the user.
If the application is determined to be a malicious application in step S2012, in step S2013, a malicious application prompt message is sent to the user, so that the user can know the existence of the malicious application in time, and the application in the terminal can be recovered as early as possible.
According to the application program recovery method provided by the embodiment, the installation operation information of the application program in the terminal is monitored, the installation time of the application program is extracted from the installation operation information, the installation time is recorded as the installation success time point corresponding to the application program, the corresponding relation between the application program and the installation success time point is stored in the management list, the installation success time point is selected from the management list according to the user operation information and is used as the target installation success time point, and the application program in the terminal is recovered to the state before the target installation success time point. In addition, the designated operation information of the application program is monitored, whether the application program is a malicious application program is judged according to the designated operation information of the application program, and malicious application program prompt information is sent to a user under the condition that the application program is judged to be the malicious application program. By utilizing the technical scheme provided by the invention, the recovery of the application program in the terminal is conveniently realized by selecting the successful time point of target installation, the recovery efficiency of the application program is improved, and in addition, when the application program is judged to be a malicious application program according to the specified operation information of the application program, malicious application program prompt information is sent to a user, so that the user can know the existence of the malicious application program in time, and further the application program in the terminal is recovered as early as possible, so that the potential safety hazard in the terminal is eliminated, and the information safety in the terminal is further facilitated to be ensured.
Fig. 4 is a block diagram illustrating a structure of an application recovery apparatus according to an embodiment of the present invention, and as shown in fig. 4, the apparatus includes: a first monitoring module 410, a recording module 420, and a recovery module 430.
The first monitoring module 410 is adapted to: and monitoring the installation operation information of the application program in the terminal.
The terminal can be a mobile phone, a PAD, a computer and other devices. Since some applications are invisible to the user, in order to enable the user to clearly know which applications are installed in the terminal, specifically, the first monitoring module 410 may monitor installation operation information of the applications in the terminal through the desktop launcher. Wherein the installation operation information may include: name of application, installation path and installation time, etc. The install time is the time the application was successfully installed.
The recording module 420 is adapted to: and extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list.
The recording module 420 extracts the installation time of the application program from the installation operation information, records the installation time as an installation success time point corresponding to the application program, and stores a corresponding relationship between the application program and the installation success time point in a management list in order to manage the application program in the terminal.
The recovery module 430 is adapted to: and restoring the application program in the terminal according to the user operation information and the management list.
The restoring module 430 can conveniently restore the application program in the terminal according to the user operation information and the management list.
According to the application program recovery device provided by the embodiment, the first monitoring module monitors installation operation information of an application program in the terminal, the recording module extracts installation time of the application program from the installation operation information, records the installation time as an installation success time point corresponding to the application program, stores a corresponding relation between the application program and the installation success time point into the management list, and the recovery module recovers the application program in the terminal according to user operation information and the management list. By utilizing the technical scheme provided by the invention, the application program in the terminal can be conveniently recovered according to the management list, so that the recovery efficiency of the application program is improved, and the information safety in the terminal is favorably ensured.
Fig. 5 is a block diagram illustrating a structure of an application recovery apparatus according to another embodiment of the present invention, which includes, as shown in fig. 5: a first monitoring module 510, a recording module 520, a second monitoring module 530, a determining module 540, a prompting module 550, and a recovering module 560. Wherein, the recovery module 560 includes: a selection unit 561 and a recovery unit 562.
The first monitoring module 510 is adapted to: and monitoring the installation operation information of the application program in the terminal.
Specifically, the first monitoring module 510 may monitor installation operation information of an application program in the terminal through the desktop launcher.
The recording module 520 is adapted to: and extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list.
The second monitoring module 530 is adapted to: the specified operation information of the application program is monitored.
In order to be able to timely discover the existence of a malicious application, the second monitoring module 530 monitors the designated operation information of the application. Specifically, the second monitoring module 530 may monitor the designated operation information of the application through the desktop launcher. Wherein the specifying the operation information may include: uploading operation information, deleting operation information, modifying operation information and the like.
The determining module 540 is adapted to: and judging whether the application program is a malicious application program or not according to the specified operation information of the application program.
The determining module 540 may determine whether the application is a malicious application according to the specified operation information and the preset operation information of the application. The preset operation information can be set by a person skilled in the art according to actual needs, and is not limited herein. The determining module 540 can effectively determine whether the application is a malicious application according to the specified operation information of the application.
The prompting module 550 is adapted to: if the determining module 540 determines that the obtained application is a malicious application, a malicious application prompt message is sent to the user.
If the determining module 540 determines that the obtained application is a malicious application, the prompting module 550 sends a malicious application prompting message to the user, so that the user can know the existence of the malicious application in time, and then recover the application in the terminal as soon as possible.
The selection unit 561 in the recovery module 560 is adapted to: and selecting the installation success time point from the management list as a target installation success time point according to the user operation information.
For example, the installation success time point in the management list may be presented to the user in the form of a time axis, and the names of the applications installed corresponding to the installation success time point may also be presented to the user together, and when the user wants to restore the applications in the terminal, the installation success time point may be selected in the time axis, and then the selection unit 561 selects the installation success time point from the management list as the target installation success time point according to the user operation information.
The recovery unit 562 is adapted to: and restoring the application program in the terminal to the state before the target installation success time point.
In particular, the recovery unit 562 is further adapted to: and deleting the application program which is successfully installed at the target installation successful time point and the application program which is successfully installed after the target installation successful time point from the terminal.
By using the application program recovery device provided by the embodiment, the recovery of the application program in the terminal is conveniently realized by selecting the successful time point of target installation, the recovery efficiency of the application program is improved, and in addition, when the application program is judged to be a malicious application program according to the specified operation information of the application program, malicious application program prompt information is sent to a user, so that the user can timely know the existence of the malicious application program, and then the application program in the terminal is recovered as early as possible, so that the potential safety hazard existing in the terminal is eliminated, and the information safety in the terminal is further facilitated to be ensured.
The invention also provides a terminal which comprises the application program recovery device. The terminal provided by the invention can conveniently recover the application program in the terminal according to the management list, thereby improving the recovery efficiency of the application program in the terminal and being beneficial to ensuring the information safety in the terminal.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components in accordance with embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (7)

1. An application recovery method comprising:
monitoring installation operation information of an application program in a terminal;
extracting installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list;
restoring the application program in the terminal according to the user operation information and the management list;
wherein, the restoring the application program in the terminal according to the user operation information and the management list further comprises: selecting an installation success time point from the management list as a target installation success time point according to the user operation information; restoring the application program in the terminal to the state before the target installation success time point;
the restoring the application program in the terminal to the state before the target installation success time point further comprises:
and deleting the application program which is successfully installed at the target installation successful time point and the application program which is successfully installed after the target installation successful time point from the terminal.
2. The method according to claim 1, before the restoring the application program in the terminal according to the user operation information and the management list, the method further comprising:
monitoring the appointed operation information of the application program;
judging whether the application program is a malicious application program or not according to the specified operation information of the application program;
and if the application program is judged to be the malicious application program, sending malicious application program prompt information to the user.
3. The method of claim 2, the specifying operational information comprising: uploading operation information, deleting operation information and modifying operation information.
4. An application recovery apparatus comprising:
the first monitoring module is suitable for monitoring the installation operation information of the application program in the terminal;
the recording module is suitable for extracting the installation time of the application program from the installation operation information, recording the installation time as an installation success time point corresponding to the application program, and storing the corresponding relation between the application program and the installation success time point into a management list;
the recovery module is suitable for recovering the application program in the terminal according to the user operation information and the management list;
wherein the recovery module comprises: a selection unit and a recovery unit;
the selection unit is adapted to: selecting an installation success time point from the management list as a target installation success time point according to the user operation information;
the recovery unit is adapted to: restoring the application program in the terminal to the state before the target installation success time point;
the recovery unit is further adapted to:
and deleting the application program which is successfully installed at the target installation successful time point and the application program which is successfully installed after the target installation successful time point from the terminal.
5. The apparatus of claim 4, further comprising:
the second monitoring module is suitable for monitoring the specified operation information of the application program;
the judging module is suitable for judging whether the application program is a malicious application program or not according to the specified operation information of the application program;
and the prompting module is suitable for sending malicious application program prompting information to a user if the judging module judges that the application program is a malicious application program.
6. The apparatus of claim 5, the specifying operation information comprising: uploading operation information, deleting operation information and modifying operation information.
7. A terminal comprising an application retrieval device as claimed in any one of claims 4 to 6.
CN201610474283.2A 2016-06-24 2016-06-24 Application program recovery method and device and terminal Active CN106096414B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610474283.2A CN106096414B (en) 2016-06-24 2016-06-24 Application program recovery method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610474283.2A CN106096414B (en) 2016-06-24 2016-06-24 Application program recovery method and device and terminal

Publications (2)

Publication Number Publication Date
CN106096414A CN106096414A (en) 2016-11-09
CN106096414B true CN106096414B (en) 2019-12-31

Family

ID=57252720

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610474283.2A Active CN106096414B (en) 2016-06-24 2016-06-24 Application program recovery method and device and terminal

Country Status (1)

Country Link
CN (1) CN106096414B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108388457A (en) * 2018-03-08 2018-08-10 维沃移动通信有限公司 A kind of Application Parameters setting method and mobile terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102789558A (en) * 2011-05-20 2012-11-21 北京网秦天下科技有限公司 Method and device for analyzing program installation and program operation in mobile device
CN103428212A (en) * 2013-08-08 2013-12-04 电子科技大学 Malicious code detection and defense method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101389682B1 (en) * 2011-08-25 2014-04-28 주식회사 팬택 System and method that prevent virus damage
US8732834B2 (en) * 2012-09-05 2014-05-20 Symantec Corporation Systems and methods for detecting illegitimate applications

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102789558A (en) * 2011-05-20 2012-11-21 北京网秦天下科技有限公司 Method and device for analyzing program installation and program operation in mobile device
CN103428212A (en) * 2013-08-08 2013-12-04 电子科技大学 Malicious code detection and defense method

Also Published As

Publication number Publication date
CN106096414A (en) 2016-11-09

Similar Documents

Publication Publication Date Title
CN103744686B (en) Control method and the system of installation is applied in intelligent terminal
CN108319662A (en) Page processing method, device, electronic equipment and readable storage medium storing program for executing
CN103825938A (en) Method of downloading resources and device
CN106897095B (en) Method and device for hot repairing application program, readable storage medium and computing equipment
CN106250434A (en) Load the method and device of webpage
US20140222761A1 (en) Terminal Backup and Recovery Method
CN105471935B (en) Information prompting method and device
CN105786839A (en) Application data acquisition method and apparatus
CN108984339B (en) Data recovery method and related product
CN106155746B (en) A kind of installation file processing method and processing device, server
CN106020917B (en) A kind of software installation method and device, user terminal
WO2016101761A1 (en) Method and system for updating associated accounts
CN106096414B (en) Application program recovery method and device and terminal
CN108762983B (en) Multimedia data recovery method and device
CN104360880A (en) Application installing method and electronic equipment
CN109032617B (en) Control method and control device for automatically deleting installation package
CN111078382A (en) Command timeout processing method and device
CN105975321A (en) Application program installation package icon replacing method and device
CN111722850A (en) Method, device and system for processing application among multiple systems
CN109472540B (en) Service processing method and device
CN108572985B (en) Page display method and device
CN111198725B (en) Application starting processing method, computing equipment and computer storage medium
CN108322912B (en) Method and device for distinguishing short messages
CN103714291A (en) Information processing method and electronic equipment
CN106021501A (en) Data storing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220830

Address after: No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science and Technology Park, High-tech Zone, Binhai New District, Tianjin 300000

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.