CN107145602A - Foreign intervention formula system file complementing method and device - Google Patents
Foreign intervention formula system file complementing method and device Download PDFInfo
- Publication number
- CN107145602A CN107145602A CN201710419541.1A CN201710419541A CN107145602A CN 107145602 A CN107145602 A CN 107145602A CN 201710419541 A CN201710419541 A CN 201710419541A CN 107145602 A CN107145602 A CN 107145602A
- Authority
- CN
- China
- Prior art keywords
- system file
- target terminal
- file
- inventory
- determined
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/14—Details of searching files based on file metadata
- G06F16/148—File search processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/172—Caching, prefetching or hoarding of files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Abstract
This application discloses a kind of foreign intervention formula system file complementing method and device.Methods described includes:Transmit and instruct to target terminal mailing list, for all applications for indicating to store in target terminal transfer destination terminal and the inventory of all system files;To the application on the inventory, determine to support the system file of the application operation one by one;Judge the system file determined whether in the system file of the inventory;If it is determined that system file not in the system file of the inventory, obtain determine system file;The system file of acquisition is sent to target terminal.The application can download the system file of missing automatically for terminal, mitigate terminal operation and also ensure that Terminal security.
Description
Technical field
The disclosure relates generally to computer realm, and in particular to the completion of computer system files, more particularly to a kind of outer
Intervene formula system file complementing method and device in portion.
Background technology
At present, many software applications, game application are necessarily required in terminal (including computer, mobile phone, PDA etc.)
There are some system files to run in terminal.However, in the operation of terminal, because user has deleted some comprising system text by mistake
The file of part, or internet worm intrude into terminal deletion some system files, often occur when some applications need
System file finds that these system files are lacked when supporting.User needs to arrive the Internet download phase according to the prompting oneself of terminal
The system file that should be lacked.So, two problems are brought:First, user's operation is comparatively laborious;Second, on user to internet
The system file of missing is downloaded, virus may can be downloaded to again, terminal security is threatened.
Accordingly, it would be desirable to which a kind of system file for downloading missing automatically for user, mitigates user's operation and also ensures that user and pacify
The scheme of full property.
The content of the invention
In view of drawbacks described above of the prior art or deficiency, expect to provide a kind of system text for downloading missing automatically for user
Part, mitigates the technology that user operates and also ensures that user security.
In a first aspect, the embodiment of the present application provides a kind of foreign intervention formula system file complementing method, methods described bag
Include:Transmit and instruct to target terminal mailing list, for indicate to store in target terminal transfer destination terminal it is all should
With the inventory with all system files;To the application on the inventory, determine to support the system file of the application operation one by one;Sentence
Whether the disconnected system file determined is in the system file of the inventory;If it is determined that system file be not in the inventory
Unite in file, obtain the system file determined;The system file of acquisition is sent to target terminal.
Second aspect, the embodiment of the present application provides a kind of foreign intervention formula system file complementing device, described device bag
Include:Instruction sending unit, is instructed for being transmitted to target terminal mailing list, for indicating that target terminal transfer destination is whole
All applications stored on end and the inventory of all system files;Determining unit, for the application on the inventory, one by one really
Surely the system file for supporting the application to run;Judging unit, for the system file that judges to determine whether in the inventory be
In system file;Acquiring unit, for if it is determined that system file not in the system file of the inventory, obtain determine be
System file;System file transmitting element, for the system file of acquisition to be sent into target terminal.
The third aspect, the embodiment of the present application provides a kind of equipment, including processor, memory and display;It is described to deposit
Reservoir is included can be caused the computing device by the instruction of the computing device:Passed to target terminal mailing list
Instruction is sent, for all applications for indicating to store in target terminal transfer destination terminal and the inventory of all system files;To institute
The application on inventory is stated, determines to support the system file of the application operation one by one;Judge the system file determined whether described
In the system file of inventory;If it is determined that system file not in the system file of the inventory, obtain determine system text
Part;The system file of acquisition is sent to target terminal.
Fourth aspect, the embodiment of the present application provides a kind of machine readable media, comprising computer program, the computer
Program includes being used to perform following program code:Transmit and instruct to target terminal mailing list, for indicating that target is whole
All applications stored in the transfer destination terminal of end and the inventory of all system files;To the application on the inventory, one by one really
Surely the system file for supporting the application to run;Judge the system file determined whether in the system file of the inventory;If
The system file of determination obtains the system file determined not in the system file of the inventory;The system file of acquisition is sent out
Give target terminal.
In the embodiment of the present invention, be not when software, game etc. application run when find lack some system files again by
User downloads from internet, but is intervened by special foreign intervention formula system file complementing device from outside.It is outside
Intervention formula system file complementing device order target terminal reports the inventory of all applications stored thereon and all system files,
To the application on the inventory, determine to support the system file of the application operation one by one, if it is determined that system file not in institute
In the system file for stating inventory, obtain the system file determined and be sent to target terminal.So, be achieved that for user it is automatic under
The system file of missing is carried, mitigates user's operation.In addition, obtained at special foreign intervention formula system file complementing device
System file all has safety guarantee, reduces user oneself and goes on internet to download caused insecurity.
Brief description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 shows the system environments schematic diagram of the application one embodiment application.
Fig. 2 shows the exemplary flow of the foreign intervention formula system file complementing method according to the application one embodiment
Figure;
Fig. 3 shows the example arrangement of the foreign intervention formula system file complementing device according to the application one embodiment
Block diagram;
Fig. 4 shows the structural representation suitable for being used for realizing the embodiment of the present application.
Embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that, in order to
It is easy to illustrate only the part related to invention in description, accompanying drawing.
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase
Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
As mentioned in the background art, at present, many software applications, game application are in terminal (including computer, mobile electricity
Words, PDA etc.) on necessarily require there are some system files to run in terminal.However, in the operation of terminal, due to user
Delete some files for including system file by mistake, or internet worm intrudes into terminal deletion some system files, often goes out
Now find that these system files are lacked when some applications need some system files to support.User needs carrying according to terminal
Show the system file oneself accordingly lacked to the Internet download.So, two problems are brought:First, user's operation is comparatively laborious;
Second, the system file of missing is downloaded on user to internet, virus may can be downloaded to again, terminal security is threatened.Therefore, need
A kind of system file for downloading missing automatically for user is wanted, mitigates the scheme that user operates and also ensures that user security.
In the embodiment of the present invention, be not when software, game etc. application run when find lack some system files again by
User downloads from internet, but is intervened by special foreign intervention formula system file complementing device from outside.It is outside
Intervention formula system file complementing device order target terminal reports the inventory of all applications stored thereon and all system files,
To the application on the inventory, determine to support the system file of the application operation one by one, if it is determined that system file not in institute
In the system file for stating inventory, obtain the system file determined and be sent to target terminal.So, be achieved that for user it is automatic under
The system file of missing is carried, mitigates user's operation.In addition, obtained at special foreign intervention formula system file complementing device
System file all has safety guarantee, reduces user oneself and goes on internet to download caused insecurity.
With reference to Fig. 1, it illustrates the system environments schematic diagram of the application one embodiment application.The environment includes multiple mesh
Mark terminal 110 and foreign intervention formula system file complementing device 300.The terminal that it will be its completion system file that target terminal, which is,.
It can be all-purpose computer, mobile phone, PDA, mobile unit etc..As long as it needs installation system file to support above
The operation of various applications, can turn into target terminal 110.Foreign intervention formula system file complementing device 300 is outside the application
Intervene the main body that formula system file complementing method is performed in portion.It can be a special equipment, can also be used as server
Part solidification is in the server.Here server includes home server, cloud server etc..Foreign intervention formula system text
Part complementing device 300 is often interacted with multiple target terminals 110, is responsible for the system file completion of multiple target terminals 110.
It can be connected between foreign intervention formula system file complementing device 300 and target terminal 110 by LAN, can also be by mutual
Networking is connected, and can be wired connection or wireless connection.
With reference to Fig. 2, it illustrates the foreign intervention formula system file complementing method according to the application one embodiment.
System file refers to the master file of operating system, is typically automatically created in installation operation systematic procedure and by phase
Close file to be placed in corresponding file, file here directly affects the normal operation of system, majority does not allow arbitrarily
Change.Its presence is to safeguarding that the stabilization of computer system plays an important roll.When operation is applied, some of them are generally required
The support of system file.
System file completion refers to supplement lacked system file when system file is lacked.
Foreign intervention formula refers to the system file completion to terminal by exterior of terminal initiation, rather than terminal itself initiation pair
The completion of the system file of itself.As shown in figure 1, foreign intervention formula system file complementing device 300 is in the outer of target terminal 110
Portion, the system file completion initiated by foreign intervention formula system file complementing device 300 is exactly the system file of foreign intervention formula
Completion.
As shown in Fig. 2 in step 210, transmitting and instructing to target terminal mailing list, for indicating target terminal
All applications stored in transfer destination terminal and the inventory of all system files.
Mailing list transmission instruction is all applications stored in requirement target terminal transfer destination terminal and owned
The instruction of the inventory of system file.
Can periodically it be performed to the transmission instruction of target terminal mailing list.So, if on a target terminal also
There is system file missing, be only missing from the system file after upper second periodicity completion and lost so that for general feelings
It is also not too large even if system file has missing after the method for employing the embodiment of the present invention for condition.For example, every morning
8:All target terminals 110 under 00 pair of foreign intervention formula system file complementing device 300 are performed one time.So, if 11:00
There is the missing of system file on certain station terminal, be only 8 on the day of:00-11:The missing newly formed between 00.
In addition, in one embodiment, it is in response to the transmission instruction of target terminal mailing list in receiving target
What the notice that terminal installs application was carried out.That is, the target under regulation foreign intervention formula system file complementing device 300 is whole
If end 110 is mounted with new opplication, it is necessary to send target terminal to foreign intervention formula system file complementing device 300 and install application
Notice, with trigger step 210-250 execution.Advantage of this is that:After new opplication is installed, often the new opplication needs vertical
Carve and perform, and if simply periodically carrying out completion to the system file of terminal, it is likely that need to perform after new opplication installation
Time point support its perform system file again because the reasons such as virus attack are lacked, cause body after user installation new opplication
Test not good.If after new opplication is installed, terminal notifies foreign intervention formula system file complementing device 300 to perform step at once
210-250, then can at once perform after new opplication installation, meet after application is installed and generally require the demand performed at once.
In a step 220, to the application on the inventory, determine to support the system file of the application operation one by one.
Foreign intervention formula system file complementing device 300 can safeguard the system file pair that a various applications are required with it
According to table.So, for the application on the inventory, it is possible to search the table of comparisons one by one, to determine to support its operation
System file.
In step 230, judge the system file determined whether in the system file of the inventory.
If all system files for a certain application operation of support that step 220 is determined all are that target terminal is possessed
, illustrate that the application can be lacked with trouble-free operation in the absence of system file.
If the system that a system file of a certain application operation of support that step 220 is determined is not possessed in terminal
In file, for explanation is for performing the application, it there occurs that system file is lacked.
In step 240, if it is determined that system file not in the system file of the inventory, obtain determine system
File.
If as described above, a system file of a certain application operation of support that step 220 is determined is not in terminal institute
It in the system file possessed, for explanation is for performing the application, there occurs that system file is lacked, then need to lack for its acquisition
The system file of mistake.
In one embodiment, step 240 includes:Judge whether the system file determined stores in preset system file
In storehouse;If it is determined that system file in preset system file thesaurus, obtain true from the system file thesaurus
Fixed system file;If it is determined that system file not in preset system file thesaurus, from internet download determine
System file.
System file thesaurus is the storehouse pre-set on foreign intervention formula system file complementing device 300, for putting
Put the various system files for being used to support application thinkable in advance.The system file of its inside storage is all by official channel
Obtain, with security.If it is determined that system file in preset system file thesaurus, it is possible to directly from system
The system file of determination is obtained in file repository, the system file security so obtained is high.If it is determined that system file
Not in preset system file thesaurus, at this moment system file will be obtained from other channels.One general way is
The system file of determination is downloaded from internet.
Because the system file downloaded from internet may have virus, exactly because also mention in the introduction existing
User oneself needs the way for the system file for downloading missing from internet to cause easily to cause virus attack, safety in technology
Property is poor, and therefore, in one embodiment, in order to improve the security of system file, methods described also includes:By acquisition
System file is sent to before target terminal, and the system file of acquisition is killed virus.Because the antivirus is in foreign intervention formula system
What file complementing device 300 was carried out automatically, user's sensory images is " transparent ", is ensured automatically on the premise of without user intervention
The security of the system file of completion.
In one embodiment, methods described also includes:After the system file of acquisition is killed virus, will be after antivirus
File storage unite into system file thesaurus.
Advantage of this is that, the system file carried on constantly improve foreign intervention formula system file complementing device 300
Thesaurus, makes system file thesaurus more and more complete, is not spent when needing and obtaining same system file next time on internet
Download, improve and obtain efficiency, so as to improve the efficiency of system file completion.
In addition, in one embodiment, step 240 includes:If it is determined that system file not in the system of the inventory
In file, inquiry request is sent to target terminal, for inquiring whether target terminal needs the system file of the completion determination;Such as
Fruit receives the response of the system file of the completion determination the need for the target terminal, obtains the system file determined.
That is, in the embodiment, if it is determined that system file be not vertical in the system file of the inventory, not
Carve as target terminal completion system file, but first whether hair request query target terminal needs completion.Come from if received
The response of the system file of the completion determination the need for target terminal, then obtain the system file of determination, is target terminal completion,
Otherwise it is not target terminal completion.Advantage of this is that, in fact, many users need to be mounted with that certain is applied, but it is probably
Install by mistake, such as overdue on the internet game download link of certain useful link that disguises oneself as causes to be mounted with a certain user simultaneously
Unwanted game, now detects user installation new opplication, so for user installation its missing system file be need not
Want, cause the waste of resource.In this way, the waste of resource is reduced, the reasonable disposition of resource is improved.
In step 250, the system file of acquisition is sent to target terminal.
The system file of acquisition is sent to target terminal, so that target terminal installs the system file, to support its phase
The application answered.
It should be noted that although the operation of the inventive method is described with particular order in the accompanying drawings, this is not required that
Or imply that these must be performed according to the particular order operates, or the operation having to carry out shown in whole could realize the phase
The result of prestige.On the contrary, the step of describing in flow chart can change execution sequence.Additionally or alternatively, it is convenient to omit some
Multiple steps are merged into a step execution, and/or a step is decomposed into execution of multiple steps by step.
With further reference to Fig. 3, it illustrates filled according to the foreign intervention formula system file completion of the application one embodiment
Put 300 exemplary block diagram.It includes instruction sending unit 310, determining unit 320, judging unit 330, acquiring unit
340th, system file transmitting element 350.
Instruction sending unit 310 is transmitted to target terminal mailing list and instructed, for indicating that target terminal transmits mesh
All applications stored in mark terminal and the inventory of all system files.
Mailing list transmission instruction is all applications stored in requirement target terminal transfer destination terminal and owned
The instruction of the inventory of system file.
Can periodically it be performed to the transmission instruction of target terminal mailing list.So, if on a target terminal also
There is system file missing, be only missing from the system file after upper second periodicity completion and lost so that for general feelings
It is also not too large even if system file has missing after the method for employing the embodiment of the present invention for condition.For example, every morning
8:All target terminals 110 under 00 pair of foreign intervention formula system file complementing device 300 are performed one time.So, if 11:00
There is the missing of system file on certain station terminal, be only 8 on the day of:00-11:The missing newly formed between 00.
In addition, in one embodiment, it is in response to the transmission instruction of target terminal mailing list in receiving target
What the notice that terminal installs application was carried out.That is, the target under regulation foreign intervention formula system file complementing device 300 is whole
If end 110 is mounted with new opplication, it is necessary to send target terminal to foreign intervention formula system file complementing device 300 and install application
Notice, with trigger the embodiment of the present invention system file completion process perform.Advantage of this is that:New opplication is being installed
Afterwards, often the new opplication needs to perform at once, and if simply periodically carrying out completion to the system file of terminal, it is likely that
New opplication needs the time point performed to support the system file that it is performed again because the reasons such as virus attack are lacked, to make after installing
Experience not good after into user installation new opplication.If after new opplication is installed, terminal notifies foreign intervention formula system file at once
Complementing device 300 performs the system file completion process of the embodiment of the present invention, then can at once be performed after new opplication installation, full
Foot application generally requires the demand performed at once after installing.
Application on 320 pairs of inventories of determining unit, determines to support the system file of the application operation one by one.
Foreign intervention formula system file complementing device 300 can safeguard the system file pair that a various applications are required with it
According to table.So, for the application on the inventory, it is possible to search the table of comparisons one by one, to determine to support its operation
System file.
Whether judging unit 330 judges the system file determined in the system file of the inventory.
If it is determined that all system files for a certain application operation of support that unit 320 is determined all are that target terminal is gathered around
Have, illustrate that the application can be lacked with trouble-free operation in the absence of system file.
If it is determined that what a system file of a certain application operation of support that unit 320 is determined was not possessed in terminal
In system file, for explanation is for performing the application, it there occurs that system file is lacked.
If it is determined that system file not in the system file of the inventory, acquiring unit 340 obtain determine system
File.
As described above, if it is determined that a system file of support a certain application operation be not what terminal was possessed
Unite in file, for explanation is for performing the application, there occurs that system file is lacked, then need for the system of its acquisition missing
File.
In one embodiment, acquiring unit 340 is further used for:Judge determine system file whether be in preset
In system file repository;If it is determined that system file in preset system file thesaurus, from the system file storage
The system file of determination is obtained in storehouse;If it is determined that system file not in preset system file thesaurus, from internet
It is upper to download the system file determined.
System file thesaurus is the storehouse pre-set on foreign intervention formula system file complementing device 300, for putting
Put the various system files for being used to support application thinkable in advance.The system file of its inside storage is all by official channel
Obtain, with security.If it is determined that system file in preset system file thesaurus, it is possible to directly from system
The system file of determination is obtained in file repository, the system file security so obtained is high.If it is determined that system file
Not in preset system file thesaurus, at this moment system file will be obtained from other channels.One general way is
The system file of determination is downloaded from internet.
Because the system file downloaded from internet may have virus, exactly because also mention in the introduction existing
User oneself needs the way for the system file for downloading missing from internet to cause easily to cause virus attack, safety in technology
Property is poor, and therefore, in one embodiment, in order to improve the security of system file, described device 300 also includes:Antivirus is single
Member, for before the system file of acquisition is sent into target terminal, the system file of acquisition to be killed virus.Because the antivirus is
Carried out automatically in foreign intervention formula system file complementing device 300, user's sensory images is " transparent ", without user intervention
On the premise of the automatic system file that ensure that completion security.
In one embodiment, described device 300 also includes:Kill virus file storage unit, for by the system of acquisition
After file antivirus, the system file after antivirus is stored into system file thesaurus.
Advantage of this is that, the system file carried on constantly improve foreign intervention formula system file complementing device 300
Thesaurus, makes system file thesaurus more and more complete, is not spent when needing and obtaining same system file next time on internet
Download, improve and obtain efficiency, so as to improve the efficiency of system file completion.
In addition, in one embodiment, acquiring unit 340 is further used for:If it is determined that system file not described
In the system file of inventory, inquiry request is sent to target terminal, for inquiring whether target terminal needs the completion determination
System file;If receiving the response of the system file of the completion determination the need for the target terminal, obtain determine be
System file.
That is, in the embodiment, if it is determined that system file be not vertical in the system file of the inventory, not
Carve as target terminal completion system file, but first whether hair request query target terminal needs completion.Come from if received
The response of the system file of the completion determination the need for target terminal, then obtain the system file of determination, is target terminal completion,
Otherwise it is not target terminal completion.Advantage of this is that, in fact, many users need to be mounted with that certain is applied, but it is probably
Install by mistake, such as overdue on the internet game download link of certain useful link that disguises oneself as causes to be mounted with a certain user simultaneously
Unwanted game, now detects user installation new opplication, so for user installation its missing system file be need not
Want, cause the waste of resource.In this way, the waste of resource is reduced, the reasonable disposition of resource is improved.
The system file of acquisition is sent to target terminal by system file transmitting element 350.
The system file of acquisition is sent to target terminal by system file transmitting element 350, and being installed so as to target terminal should
System file, to support it to apply accordingly.
Below with reference to Fig. 4, it illustrates suitable for for the structural representation for the computer system 400 for realizing the embodiment of the present application
Figure.
As shown in figure 4, computer system 400 includes CPU (CPU) 401, it can be read-only according to being stored in
Program in memory (ROM) 402 or be loaded into program in random access storage device (RAM) 403 from storage part 408 and
Perform various appropriate actions and processing.In RAM 403, the system that is also stored with 400 operates required various programs and data.
CPU 401, ROM 402 and RAM 403 are connected with each other by bus 404.Input/output (I/O) interface 405 is also connected to always
Line 404.
I/O interfaces 405 are connected to lower component:Importation 406 including keyboard, mouse etc.;Penetrated including such as negative electrode
The output par, c 407 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part 408 including hard disk etc.;
And the communications portion 409 of the NIC including LAN card, modem etc..Communications portion 409 via such as because
The network of spy's net performs communication process.Driver 410 is also according to needing to be connected to I/O interfaces 405.Detachable media 411, such as
Disk, CD, magneto-optic disk, semiconductor memory etc., are arranged on driver 410, in order to read from it as needed
Computer program be mounted into as needed storage part 408.
Especially, in accordance with an embodiment of the present disclosure, it may be implemented as computer software above with reference to Fig. 1 processes described
Program.For example, embodiment of the disclosure includes a kind of computer program product, it includes being tangibly embodied in machine readable media
On computer program, the computer program include be used for perform Fig. 1 method program code.
In such embodiments, the computer program can be downloaded and installed by communications portion 409 from network,
And/or be mounted from detachable media 411.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of various embodiments of the invention, method and computer journey
Architectural framework in the cards, function and the operation of sequence product.At this point, each square frame in flow chart or block diagram can generation
The part of one module of table, program segment or code, a part for the module, program segment or code is comprising one or more
Executable instruction for realizing defined logic function.It should also be noted that in some realizations as replacement, institute in square frame
The function of mark can also be with different from the order marked in accompanying drawing generation.For example, two square frames succeedingly represented are actual
On can perform substantially in parallel, they can also be performed in the opposite order sometimes, and this is depending on involved function.Also
It is noted that the combination of each square frame in block diagram and/or flow chart and the square frame in block diagram and/or flow chart, Ke Yiyong
Perform the special hardware based system of defined function or operation to realize, or can be referred to specialized hardware with computer
The combination of order is realized.
Being described in unit or module involved in the embodiment of the present application can be realized by way of software, can also
Realized by way of hardware.Described unit or module can also be set within a processor.These units or module
Title does not constitute the restriction to the unit or module in itself under certain conditions.
As on the other hand, present invention also provides a kind of computer-readable recording medium, the computer-readable storage medium
Matter can be the computer-readable recording medium included in device described in above-described embodiment;Can also be individualism, not
It is fitted into the computer-readable recording medium in equipment.Computer-readable recording medium storage has one or more than one journey
Sequence, described program is used for performing the formula input method for being described in the application by one or more than one processor.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.People in the art
Member should be appreciated that invention scope involved in the application, however it is not limited to the technology of the particular combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from the inventive concept, is carried out by above-mentioned technical characteristic or its equivalent feature
Other technical schemes formed by any combination.Such as features described above has similar work(with (but not limited to) disclosed herein
The technical characteristic of energy carries out technical scheme formed by replacement mutually.
Claims (10)
1. a kind of foreign intervention formula system file complementing method, it is characterised in that methods described includes:
Transmit and instruct to target terminal mailing list, for indicate to store in target terminal transfer destination terminal it is all should
With the inventory with all system files;
To the application on the inventory, determine to support the system file of the application operation one by one;
Judge the system file determined whether in the system file of the inventory;
If it is determined that system file not in the system file of the inventory, obtain determine system file;
The system file of acquisition is sent to target terminal.
2. according to the method described in claim 1, it is characterised in that the step of obtaining the system file determined includes:
Judge the system file determined whether in preset system file thesaurus;
If it is determined that system file in preset system file thesaurus, from the system file thesaurus obtain determine
System file;
If it is determined that system file not in preset system file thesaurus, downloaded from internet determination system text
Part.
3. method according to claim 1 or 2, it is characterised in that methods described also includes:
Before the system file of acquisition is sent into target terminal, the system file of acquisition is killed virus.
4. method according to claim 3, it is characterised in that methods described also includes:
After the system file of acquisition is killed virus, the system file after antivirus is stored into system file thesaurus.
5. according to the method described in claim 1, it is characterised in that it is described if it is determined that system file not in the inventory
In system file, the step of obtaining the system file determined includes:
If it is determined that system file not in the system file of the inventory, to target terminal send inquiry request, for asking
Ask whether target terminal needs the system file of the completion determination;
If receiving the response of the system file of the completion determination the need for the target terminal, the system text determined is obtained
Part.
6. according to the method described in claim 1, it is characterised in that be in response to the transmission instruction of target terminal mailing list
Carried out in the notice for receiving target terminal installation application.
7. a kind of foreign intervention formula system file complementing device, it is characterised in that described device includes:
Instruction sending unit, is instructed for being transmitted to target terminal mailing list, for indicating target terminal transfer destination
All applications stored in terminal and the inventory of all system files;
Determining unit, for the application on the inventory, determining to support the system file of the application operation one by one;
Judging unit, for judging the system file of determination whether in the system file of the inventory;
Acquiring unit, for if it is determined that system file not in the system file of the inventory, obtain determine system text
Part;
System file transmitting element, for the system file of acquisition to be sent into target terminal.
8. device according to claim 7, it is characterised in that acquiring unit is further used for:
Judge the system file determined whether in preset system file thesaurus;
If it is determined that system file in preset system file thesaurus, from the system file thesaurus obtain determine
System file;
If it is determined that system file not in preset system file thesaurus, downloaded from internet determination system text
Part.
9. the device according to claim 7 or 8, it is characterised in that described device also includes:
Antivirus unit, for before the system file of acquisition is sent into target terminal, the system file of acquisition to be killed virus.
10. device according to claim 9, it is characterised in that described device also includes:
Antivirus file storage unit, for after the system file of acquisition is killed virus, the system file storage after antivirus to be arrived
In system file thesaurus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710419541.1A CN107145602A (en) | 2017-06-06 | 2017-06-06 | Foreign intervention formula system file complementing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710419541.1A CN107145602A (en) | 2017-06-06 | 2017-06-06 | Foreign intervention formula system file complementing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107145602A true CN107145602A (en) | 2017-09-08 |
Family
ID=59780069
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710419541.1A Pending CN107145602A (en) | 2017-06-06 | 2017-06-06 | Foreign intervention formula system file complementing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107145602A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101931944A (en) * | 2010-07-23 | 2010-12-29 | 华为终端有限公司 | Method, device and system for updating terminal patches on line |
CN102843400A (en) * | 2011-06-23 | 2012-12-26 | 珠海市君天电子科技有限公司 | method and system for downloading file |
CN102937902A (en) * | 2012-10-17 | 2013-02-20 | 北京奇虎科技有限公司 | Method and device for installing driver |
CN103678032A (en) * | 2012-09-17 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Method and device for restoring system file |
CN104317672A (en) * | 2014-10-24 | 2015-01-28 | 北京奇虎科技有限公司 | System file repairing method, device and system |
CN104331660A (en) * | 2014-10-31 | 2015-02-04 | 北京奇虎科技有限公司 | Method, device and system for repairing system file |
-
2017
- 2017-06-06 CN CN201710419541.1A patent/CN107145602A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101931944A (en) * | 2010-07-23 | 2010-12-29 | 华为终端有限公司 | Method, device and system for updating terminal patches on line |
CN102843400A (en) * | 2011-06-23 | 2012-12-26 | 珠海市君天电子科技有限公司 | method and system for downloading file |
CN103678032A (en) * | 2012-09-17 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Method and device for restoring system file |
CN102937902A (en) * | 2012-10-17 | 2013-02-20 | 北京奇虎科技有限公司 | Method and device for installing driver |
CN104317672A (en) * | 2014-10-24 | 2015-01-28 | 北京奇虎科技有限公司 | System file repairing method, device and system |
CN104331660A (en) * | 2014-10-31 | 2015-02-04 | 北京奇虎科技有限公司 | Method, device and system for repairing system file |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102355500B (en) | Service push method and device | |
CN106817391A (en) | Document breakpoint transmission method and apparatus | |
CN105446750B (en) | The method and apparatus that WebApp starting runs, generates image file | |
CN107066609A (en) | Image display method and device | |
CN102314469A (en) | Method for implementing cross-domain request callback | |
CN104933363A (en) | Method and device for detecting malicious file | |
CN103916373A (en) | Data updating method, server, client side and system | |
CN104111944A (en) | Page processing method and device and page generating method and device | |
CN105553999B (en) | Application user behavioural analysis and method of controlling security and its corresponding device | |
CN103810268B (en) | Search result recommendation information loading method, device and system and URL detection method, device and system | |
CN109495433A (en) | Data download method and device, storage medium and electronic device | |
CN109391673A (en) | A kind of method, system and the terminal device of management update file | |
CN102833350A (en) | Processing method and processing device of WebApp updating | |
CN106980698A (en) | Browser static resource loading method, browser program and readable storage medium storing program for executing | |
CN104978358A (en) | Method for displaying web page fragment on desktop and system for capturing web page fragment to desktop for displaying | |
CN107547524A (en) | A kind of page detection method, device and equipment | |
CN104539605A (en) | Website XSS vulnerability detection method and equipment | |
CN104834534A (en) | Application program function extension method, device and system | |
CN102412993A (en) | Method and system for automatically displaying multiple terminals in XML (Extensive Makeup Language) interface | |
US10291718B2 (en) | Method and apparatus for implementing communication from web page to client | |
CN104361130B (en) | Method for searching local area network or specified network segment equipment in webpage | |
JP2005530258A (en) | System and method for resynchronization while refreshing a client device from a server | |
CN102754488B (en) | The control method of user's access, Apparatus and system | |
CN107733974A (en) | A kind of upgrade method of mobile terminal | |
CN104023073A (en) | Resource pushing method, system and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100083 Beijing, Haidian District Xueyuan Road 30 days building A 20 floor Applicant after: Beijing Bang Bang Safety Technology Co. Ltd. Address before: 100083 Beijing, Haidian District Xueyuan Road 30 days building A 20 floor Applicant before: Yangpuweiye Technology Limited |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170908 |
|
RJ01 | Rejection of invention patent application after publication |