CN110442354A - A kind of software method for cleaning and device - Google Patents
A kind of software method for cleaning and device Download PDFInfo
- Publication number
- CN110442354A CN110442354A CN201910693696.3A CN201910693696A CN110442354A CN 110442354 A CN110442354 A CN 110442354A CN 201910693696 A CN201910693696 A CN 201910693696A CN 110442354 A CN110442354 A CN 110442354A
- Authority
- CN
- China
- Prior art keywords
- software
- rogue
- information
- cloud server
- cleaning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
- G06F8/62—Uninstallation
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The present invention provides a kind of software method for cleaning and device, including scanning locally-installed program by cloud server, identify the mount message of rogue software, mount message is uploaded to cloud server, and receive the treatment advice of cloud server sending, treatment advice is the Prune Policies for being preset at cloud server, it further include following steps before the treatment advice for receiving cloud server sending, one, feed back the information of the associated process triggering of rogue software, close the process of rogue software, two, search calling process, delete malicious file, three, limit the permission of rogue software, four, compress rogue software file.The purpose of the invention is to make rogue software without being stealthy, cleaning is thorough.
Description
Technical field
The present invention relates to technical field of internet application, and in particular to a kind of software method for cleaning and device.
Background technique
As various application software emerge one after another, many softwares are during installation for a variety of different purposes, often certainly
Dynamic to bundle upper some other softwares and some other useless functions, user tends not to find when executing installation, and these
Other software are typically all running background, after main program is installed, are often also attached on computer, and these are soft
What part was not allowed to often, but these softwares occupy a large amount of space and resource in the case where computer is run, it is right
The equipment of user also results in serious influence, and the speed of service is caused to reduce.
At present for some rogue softwares or rogue's function program of this software itself binding, software manager is often
It cannot effectively clear up, because these rogue softwares can only exist in process, only representing it, currently backstage is operated, even if
You can find its installation procedure file, can not also delete it under the installation directory of original installation application software, because its
It can show and be called by relative program, is deleted even if we delete software using strength, it so only can be to these streams
Common people's software itself damages, and the operation of key procedure, or transfer process is often prevented with priority assignation, so not
Only be unable to thorough cleaning, also result in its hide it is deeper so that we can not clear up the rogue software of damage.
Summary of the invention
(1) the technical issues of solving
In view of the deficiencies of the prior art, the present invention provides a kind of software method for cleaning and device, the prior art is overcome not
Foot can prevent it from shifting and removing halfway harm so that clearing up thoroughly rogue software.
(2) technical solution
In order to achieve the above object, the present invention is achieved by the following technical programs:
A kind of software method for cleaning, including locally-installed program is scanned by cloud server, identify the installation of rogue software
Mount message is uploaded to cloud server by information, and receives the treatment advice of cloud server sending, and the treatment advice is
It is preset at the Prune Policies of cloud server, it is characterised in that: also wrap before the treatment advice for receiving cloud server sending
Include following steps, one, feed back rogue software associated process triggering information, close the process of rogue software, two, search and call
Process, delete malicious file, three, limit rogue software permission, four, compression rogue software file.
The mount message of the rogue software include creation registration table or creation file creation service or driver or
Creation process further includes file description information relevant to the mount message.
The Prune Policies include repairing software and cleaning software and reparation software and reduction software.
The information of the associated process triggering of the feedback rogue software includes the system process of desktop progress information and creation
Information.
The calling process of searching includes the process for searching the respective calls software program.
The treatment advice of the cloud server includes restoration updating suggestion or suggests retaining suggestion or removing immediately suggesting.
The restoration updating suggestion includes repairing and updating its installation procedure file, and will update restoration information feedback to cloud
Hold the information bank of server.
A kind of software cleaning plant, including rogue software request module, rogue software information searching module and information
Processing module, the rogue software request module take beyond the clouds for starting the request to rogue software and recalling storage
The scanner program for the rogue software being engaged on device, the rogue software information searching module are used to search the mount message of rogue software
And process associated by process or software information, the message processing module are used to track rogue's software installation information, place
Manage installation procedure file and processing associated process file.
The information searching module includes information storage module, and the information storage module is used for the related rogue that will be searched
The information of software is stored on the information bank of cloud server, is called for message processing module
The rogue software request module, rogue software information searching module and message processing module are mounted on cloud service
On device.
(3) beneficial effect
The embodiment of the invention provides a kind of software method for cleaning and devices.Have following the utility model has the advantages that soft by terminating rogue
Part process and related caller process, modify the permission of rogue software associated documents, repair rogue software and compression rogue
The method of software associated documents is convenient for thorough cleaning so that rogue software is thoroughly exposed without being stealthy.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is the flow diagram of heretofore described software method for cleaning.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
As shown in fig.1, the present invention provides a kind of software method for cleaning, including scanned by cloud server locally-installed
Program identifies the mount message of rogue software, and mount message is uploaded to cloud server, and receives cloud server sending
Treatment advice, treatment advice is the Prune Policies for being preset at cloud server, receive cloud server sending processing build
Further include following steps before view, one, feed back rogue software associated process triggering information, close the process of rogue software,
Two, search calling process, delete malicious file, three, limit rogue software permission, four, compression rogue software file.
Figure such as works as you and thinks that some software in your computer is rogue software, open first is that flow chart of the method for the present invention
The scanning search journey that scanner program automatically scanning and specific scanning or computer, mobile device inside cloud server carry
Sequence searches out the mount message of the rogue software, these mount messages are then uploaded to cloud server, and cloud server is anti-
The process of rogue software operation is fed out, processes or file associated when process is run, simultaneously closes off rogue software
Operation process such as reacts the desktop process of rogue's software desktop operation, must just pass through the program software of cloud server institute band
Or the desktop process of rogue software is closed in included the closings process software of computer system and is wrapped so that it is not called by process
Include its son, parent process, have certainly a little, parent process be do not allow it is detectable, will at this time use computer it is included or
The lookup calling process on cloud server is used, the process of related rogue's software context is found out, and deletes these calling process
File, such as utilize the order of tasklist relative program so that by the relative program for the rogue software being now currently running or into
Journey lists inventory, searches the associated process for calling rogue software one by one, is then shut off relevant father and son's process, while some rogues
Software at this time just needs to find the installation site of the file of rogue software, uniformly changes there is also insufficient permission is deleted
Become its permission inherited, be set as the common permission fully controlled, asking for insufficient permission will not be thus prompted when deleting
It inscribes.In addition some rogue softwares often shift automatically when you delete its installation file, cannot delete its source file or
Person causes file corruption, so that being not easy to delete, can at this time compress the file of rogue software, so that the text of rogue software
Part is compressed in a compressed package, while compress when deletes source file, and then deleting compressed package can.At this moment in institute
After thering is preparation to carry out, so that it may it is all to select to clear up relevant rogue software by the Prune Policies of cloud server
Mount message.
Preferably, the mount message of rogue software includes creation registration table or creation file or creation service or driver
Or creation process, it further include file description information relevant to mount message;Preferably, Prune Policies include repairing software and clear
It manages software and repairs software and reduction software, file can be prevented in some rogue softwares to be damaged in this way and do not opened, looked into
It does not look for, either temporarily it remains desirable that the text that we accidentally delete when must also need packing before or closing process lookup process
Part restores, also for it is preferably deleted later, so first restoring it, the probability accidentally deleted can be improved in this way or making again
It repeats to remove more thorough when processing;Searching calling process includes the process for searching the respective calls software program;Preferably, cloud
The treatment advice of end server includes restoration updating suggestion or suggests retaining suggestion or removing immediately suggesting, restoration updating suggestion packet
It includes reparation and updates its installation procedure file, and information bank of the restoration information feedback to cloud server will be updated, and it is above-mentioned clear
Reason strategy is identical, only makes cleaning more thorough when actual treatment.
A kind of software cleaning plant, including rogue software request module, rogue software information searching module and information
Processing module, rogue software request module are stored in cloud server for starting the request to rogue software and recalling
On rogue software scanner program, rogue software information searching module is used to search the mount message and process of rogue software
Associated process or software information, message processing module is for tracking rogue's software installation information, processing installation procedure text
Part and processing associated process file.Preferably, information searching module includes information storage module, and information storage module is used for will
The information of the related rogue software of lookup is stored on the information bank of cloud server, is called for message processing module, it is preferred that
Rogue software request module, rogue software information searching module and message processing module are mounted on cloud server.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments
Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation
Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or
Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of software method for cleaning, including locally-installed program is scanned by cloud server, identify the peace of rogue software
Information is filled, mount message is uploaded to cloud server, and receives the treatment advice of cloud server sending, the treatment advice
For the Prune Policies for being preset at cloud server, it is characterised in that: before the treatment advice for receiving cloud server sending also
Include the following steps, one, feed back rogue software associated process triggering information, close the process of rogue software, two, search and adjust
With process, malicious file is deleted, three, limit the permission of rogue software, four, compression rogue software file.
2. software method for cleaning as described in claim 1, it is characterised in that: the mount message of the rogue software includes creation
Registration table or creation file or creation service or driver or creation process, further include file relevant to the mount message
Description information.
3. software method for cleaning as described in claim 1, it is characterised in that: the Prune Policies include repairing software and cleaning
Software and reparation software and reduction software.
4. software method for cleaning as described in claim 1, it is characterised in that: the associated process triggering of the feedback rogue software
Information include desktop progress information and creation system process information.
5. software method for cleaning as described in claim 1, it is characterised in that: the lookup calling process includes searching corresponding adjust
With the process of the software program.
6. software method for cleaning as described in claim 1, it is characterised in that: the treatment advice of the cloud server includes repairing
Multiple more new suggested suggests retaining suggestion or removing immediately suggesting.
7. software method for cleaning as claimed in claim 6, it is characterised in that: the restoration updating suggestion includes repairing and updating it
Installation procedure file, and information bank of the restoration information feedback to cloud server will be updated.
8. a kind of software cleaning plant, it is characterised in that: including rogue software request module, rogue software information searching mould
Block and message processing module, the rogue software request module is for starting the request to rogue software and recalling storage
The scanner program of rogue software on server beyond the clouds, the rogue software information searching module is for searching rogue software
Process associated by mount message and process or software information, the message processing module is for tracking rogue's software installation
Information, processing installation procedure file and processing associated process file.
9. software cleaning plant as claimed in claim 8, it is characterised in that: information searching module includes information storage module,
The information storage module is used to for the information for the related rogue software searched being stored in the information bank of cloud server, for letter
Processing module is ceased to call.
10. the software cleaning plant stated such as claim 8, it is characterised in that: the rogue software request module, rogue are soft
Part information searching module and message processing module are mounted on cloud server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910693696.3A CN110442354A (en) | 2019-07-30 | 2019-07-30 | A kind of software method for cleaning and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910693696.3A CN110442354A (en) | 2019-07-30 | 2019-07-30 | A kind of software method for cleaning and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110442354A true CN110442354A (en) | 2019-11-12 |
Family
ID=68432178
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910693696.3A Pending CN110442354A (en) | 2019-07-30 | 2019-07-30 | A kind of software method for cleaning and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110442354A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111552671A (en) * | 2019-12-31 | 2020-08-18 | 远景智能国际私人投资有限公司 | Permission setting method, device and equipment of file directory and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103019778A (en) * | 2012-11-30 | 2013-04-03 | 北京奇虎科技有限公司 | Startups cleaning method and device |
CN103631628A (en) * | 2013-12-16 | 2014-03-12 | 北京奇虎科技有限公司 | Software cleaning method and system |
-
2019
- 2019-07-30 CN CN201910693696.3A patent/CN110442354A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103019778A (en) * | 2012-11-30 | 2013-04-03 | 北京奇虎科技有限公司 | Startups cleaning method and device |
CN103631628A (en) * | 2013-12-16 | 2014-03-12 | 北京奇虎科技有限公司 | Software cleaning method and system |
Non-Patent Citations (1)
Title |
---|
小编: ""教你如何手动驱逐流氓软件"", 《计算机与网络》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111552671A (en) * | 2019-12-31 | 2020-08-18 | 远景智能国际私人投资有限公司 | Permission setting method, device and equipment of file directory and storage medium |
CN111552671B (en) * | 2019-12-31 | 2024-01-05 | 远景智能国际私人投资有限公司 | File directory authority setting method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1623297B1 (en) | Api system, method and computer program product for accessing content/security analysis functionality in a mobile communication framework | |
EP1629360B1 (en) | Update system and method for updating a scanning subsystem in a mobile communication framework | |
EP3062234B1 (en) | System, method and computer program product for content/context sensitive scanning utilizing a mobile communication device | |
US8285267B2 (en) | Synchronization in unified messaging systems | |
CN103152740B (en) | A kind of anti-monitor method and system for mobile terminal | |
US6047046A (en) | Method and apparatus for automating the management of a database | |
CN109862025B (en) | Access control method, device and system based on black and white lists | |
CN104023108B (en) | The method and apparatus removing terminal failure contact person | |
CN102360410B (en) | User operation discovery method of file system and synchronous system utilizing the same | |
WO2013143393A1 (en) | Method and system utilizing cloud computation for scanning files of device | |
CN104021159B (en) | Client file cleaning method and device | |
CN103188097A (en) | Method, device and system achieving patch management | |
CN106844558A (en) | Intelligent question and answer method and system | |
CN105528543A (en) | Remote antivirus method, client, console and system | |
CN110442354A (en) | A kind of software method for cleaning and device | |
CN106648903A (en) | Method and system for calling distributed file system | |
CN103729243A (en) | Universal hardware abstract port implementing method and calling method for voice access equipment | |
CN108132815A (en) | A kind of method, apparatus and storage medium of configuration file dynamic load | |
CN105893152A (en) | Memory management method and device and mobile terminal | |
CN103701653B (en) | The processing method of a kind of interface hot plug configuration data and network configuration server | |
CN108121793A (en) | A kind of DB Backup dispositions method and device | |
CN106406747A (en) | Hard disk storage management method and apparatus for mobile terminal | |
CN107155167A (en) | Mobile terminal and its Bluetooth pairing name class processing method and storage device | |
CN103067246A (en) | Method and apparatus used for processing file received based on instant communication service | |
CN102799812B (en) | Method and device for processing application program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191112 |
|
RJ01 | Rejection of invention patent application after publication |