CN110442354A - A kind of software method for cleaning and device - Google Patents

A kind of software method for cleaning and device Download PDF

Info

Publication number
CN110442354A
CN110442354A CN201910693696.3A CN201910693696A CN110442354A CN 110442354 A CN110442354 A CN 110442354A CN 201910693696 A CN201910693696 A CN 201910693696A CN 110442354 A CN110442354 A CN 110442354A
Authority
CN
China
Prior art keywords
software
rogue
information
cloud server
cleaning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910693696.3A
Other languages
Chinese (zh)
Inventor
张富强
钱忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Chenhuang Software Technology Co Ltd
Original Assignee
Nanjing Chenhuang Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Chenhuang Software Technology Co Ltd filed Critical Nanjing Chenhuang Software Technology Co Ltd
Priority to CN201910693696.3A priority Critical patent/CN110442354A/en
Publication of CN110442354A publication Critical patent/CN110442354A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/62Uninstallation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention provides a kind of software method for cleaning and device, including scanning locally-installed program by cloud server, identify the mount message of rogue software, mount message is uploaded to cloud server, and receive the treatment advice of cloud server sending, treatment advice is the Prune Policies for being preset at cloud server, it further include following steps before the treatment advice for receiving cloud server sending, one, feed back the information of the associated process triggering of rogue software, close the process of rogue software, two, search calling process, delete malicious file, three, limit the permission of rogue software, four, compress rogue software file.The purpose of the invention is to make rogue software without being stealthy, cleaning is thorough.

Description

A kind of software method for cleaning and device
Technical field
The present invention relates to technical field of internet application, and in particular to a kind of software method for cleaning and device.
Background technique
As various application software emerge one after another, many softwares are during installation for a variety of different purposes, often certainly Dynamic to bundle upper some other softwares and some other useless functions, user tends not to find when executing installation, and these Other software are typically all running background, after main program is installed, are often also attached on computer, and these are soft What part was not allowed to often, but these softwares occupy a large amount of space and resource in the case where computer is run, it is right The equipment of user also results in serious influence, and the speed of service is caused to reduce.
At present for some rogue softwares or rogue's function program of this software itself binding, software manager is often It cannot effectively clear up, because these rogue softwares can only exist in process, only representing it, currently backstage is operated, even if You can find its installation procedure file, can not also delete it under the installation directory of original installation application software, because its It can show and be called by relative program, is deleted even if we delete software using strength, it so only can be to these streams Common people's software itself damages, and the operation of key procedure, or transfer process is often prevented with priority assignation, so not Only be unable to thorough cleaning, also result in its hide it is deeper so that we can not clear up the rogue software of damage.
Summary of the invention
(1) the technical issues of solving
In view of the deficiencies of the prior art, the present invention provides a kind of software method for cleaning and device, the prior art is overcome not Foot can prevent it from shifting and removing halfway harm so that clearing up thoroughly rogue software.
(2) technical solution
In order to achieve the above object, the present invention is achieved by the following technical programs:
A kind of software method for cleaning, including locally-installed program is scanned by cloud server, identify the installation of rogue software Mount message is uploaded to cloud server by information, and receives the treatment advice of cloud server sending, and the treatment advice is It is preset at the Prune Policies of cloud server, it is characterised in that: also wrap before the treatment advice for receiving cloud server sending Include following steps, one, feed back rogue software associated process triggering information, close the process of rogue software, two, search and call Process, delete malicious file, three, limit rogue software permission, four, compression rogue software file.
The mount message of the rogue software include creation registration table or creation file creation service or driver or Creation process further includes file description information relevant to the mount message.
The Prune Policies include repairing software and cleaning software and reparation software and reduction software.
The information of the associated process triggering of the feedback rogue software includes the system process of desktop progress information and creation Information.
The calling process of searching includes the process for searching the respective calls software program.
The treatment advice of the cloud server includes restoration updating suggestion or suggests retaining suggestion or removing immediately suggesting.
The restoration updating suggestion includes repairing and updating its installation procedure file, and will update restoration information feedback to cloud Hold the information bank of server.
A kind of software cleaning plant, including rogue software request module, rogue software information searching module and information Processing module, the rogue software request module take beyond the clouds for starting the request to rogue software and recalling storage The scanner program for the rogue software being engaged on device, the rogue software information searching module are used to search the mount message of rogue software And process associated by process or software information, the message processing module are used to track rogue's software installation information, place Manage installation procedure file and processing associated process file.
The information searching module includes information storage module, and the information storage module is used for the related rogue that will be searched The information of software is stored on the information bank of cloud server, is called for message processing module
The rogue software request module, rogue software information searching module and message processing module are mounted on cloud service On device.
(3) beneficial effect
The embodiment of the invention provides a kind of software method for cleaning and devices.Have following the utility model has the advantages that soft by terminating rogue Part process and related caller process, modify the permission of rogue software associated documents, repair rogue software and compression rogue The method of software associated documents is convenient for thorough cleaning so that rogue software is thoroughly exposed without being stealthy.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the flow diagram of heretofore described software method for cleaning.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
As shown in fig.1, the present invention provides a kind of software method for cleaning, including scanned by cloud server locally-installed Program identifies the mount message of rogue software, and mount message is uploaded to cloud server, and receives cloud server sending Treatment advice, treatment advice is the Prune Policies for being preset at cloud server, receive cloud server sending processing build Further include following steps before view, one, feed back rogue software associated process triggering information, close the process of rogue software, Two, search calling process, delete malicious file, three, limit rogue software permission, four, compression rogue software file.
Figure such as works as you and thinks that some software in your computer is rogue software, open first is that flow chart of the method for the present invention The scanning search journey that scanner program automatically scanning and specific scanning or computer, mobile device inside cloud server carry Sequence searches out the mount message of the rogue software, these mount messages are then uploaded to cloud server, and cloud server is anti- The process of rogue software operation is fed out, processes or file associated when process is run, simultaneously closes off rogue software Operation process such as reacts the desktop process of rogue's software desktop operation, must just pass through the program software of cloud server institute band Or the desktop process of rogue software is closed in included the closings process software of computer system and is wrapped so that it is not called by process Include its son, parent process, have certainly a little, parent process be do not allow it is detectable, will at this time use computer it is included or The lookup calling process on cloud server is used, the process of related rogue's software context is found out, and deletes these calling process File, such as utilize the order of tasklist relative program so that by the relative program for the rogue software being now currently running or into Journey lists inventory, searches the associated process for calling rogue software one by one, is then shut off relevant father and son's process, while some rogues Software at this time just needs to find the installation site of the file of rogue software, uniformly changes there is also insufficient permission is deleted Become its permission inherited, be set as the common permission fully controlled, asking for insufficient permission will not be thus prompted when deleting It inscribes.In addition some rogue softwares often shift automatically when you delete its installation file, cannot delete its source file or Person causes file corruption, so that being not easy to delete, can at this time compress the file of rogue software, so that the text of rogue software Part is compressed in a compressed package, while compress when deletes source file, and then deleting compressed package can.At this moment in institute After thering is preparation to carry out, so that it may it is all to select to clear up relevant rogue software by the Prune Policies of cloud server Mount message.
Preferably, the mount message of rogue software includes creation registration table or creation file or creation service or driver Or creation process, it further include file description information relevant to mount message;Preferably, Prune Policies include repairing software and clear It manages software and repairs software and reduction software, file can be prevented in some rogue softwares to be damaged in this way and do not opened, looked into It does not look for, either temporarily it remains desirable that the text that we accidentally delete when must also need packing before or closing process lookup process Part restores, also for it is preferably deleted later, so first restoring it, the probability accidentally deleted can be improved in this way or making again It repeats to remove more thorough when processing;Searching calling process includes the process for searching the respective calls software program;Preferably, cloud The treatment advice of end server includes restoration updating suggestion or suggests retaining suggestion or removing immediately suggesting, restoration updating suggestion packet It includes reparation and updates its installation procedure file, and information bank of the restoration information feedback to cloud server will be updated, and it is above-mentioned clear Reason strategy is identical, only makes cleaning more thorough when actual treatment.
A kind of software cleaning plant, including rogue software request module, rogue software information searching module and information Processing module, rogue software request module are stored in cloud server for starting the request to rogue software and recalling On rogue software scanner program, rogue software information searching module is used to search the mount message and process of rogue software Associated process or software information, message processing module is for tracking rogue's software installation information, processing installation procedure text Part and processing associated process file.Preferably, information searching module includes information storage module, and information storage module is used for will The information of the related rogue software of lookup is stored on the information bank of cloud server, is called for message processing module, it is preferred that Rogue software request module, rogue software information searching module and message processing module are mounted on cloud server.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of software method for cleaning, including locally-installed program is scanned by cloud server, identify the peace of rogue software Information is filled, mount message is uploaded to cloud server, and receives the treatment advice of cloud server sending, the treatment advice For the Prune Policies for being preset at cloud server, it is characterised in that: before the treatment advice for receiving cloud server sending also Include the following steps, one, feed back rogue software associated process triggering information, close the process of rogue software, two, search and adjust With process, malicious file is deleted, three, limit the permission of rogue software, four, compression rogue software file.
2. software method for cleaning as described in claim 1, it is characterised in that: the mount message of the rogue software includes creation Registration table or creation file or creation service or driver or creation process, further include file relevant to the mount message Description information.
3. software method for cleaning as described in claim 1, it is characterised in that: the Prune Policies include repairing software and cleaning Software and reparation software and reduction software.
4. software method for cleaning as described in claim 1, it is characterised in that: the associated process triggering of the feedback rogue software Information include desktop progress information and creation system process information.
5. software method for cleaning as described in claim 1, it is characterised in that: the lookup calling process includes searching corresponding adjust With the process of the software program.
6. software method for cleaning as described in claim 1, it is characterised in that: the treatment advice of the cloud server includes repairing Multiple more new suggested suggests retaining suggestion or removing immediately suggesting.
7. software method for cleaning as claimed in claim 6, it is characterised in that: the restoration updating suggestion includes repairing and updating it Installation procedure file, and information bank of the restoration information feedback to cloud server will be updated.
8. a kind of software cleaning plant, it is characterised in that: including rogue software request module, rogue software information searching mould Block and message processing module, the rogue software request module is for starting the request to rogue software and recalling storage The scanner program of rogue software on server beyond the clouds, the rogue software information searching module is for searching rogue software Process associated by mount message and process or software information, the message processing module is for tracking rogue's software installation Information, processing installation procedure file and processing associated process file.
9. software cleaning plant as claimed in claim 8, it is characterised in that: information searching module includes information storage module, The information storage module is used to for the information for the related rogue software searched being stored in the information bank of cloud server, for letter Processing module is ceased to call.
10. the software cleaning plant stated such as claim 8, it is characterised in that: the rogue software request module, rogue are soft Part information searching module and message processing module are mounted on cloud server.
CN201910693696.3A 2019-07-30 2019-07-30 A kind of software method for cleaning and device Pending CN110442354A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910693696.3A CN110442354A (en) 2019-07-30 2019-07-30 A kind of software method for cleaning and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910693696.3A CN110442354A (en) 2019-07-30 2019-07-30 A kind of software method for cleaning and device

Publications (1)

Publication Number Publication Date
CN110442354A true CN110442354A (en) 2019-11-12

Family

ID=68432178

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910693696.3A Pending CN110442354A (en) 2019-07-30 2019-07-30 A kind of software method for cleaning and device

Country Status (1)

Country Link
CN (1) CN110442354A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552671A (en) * 2019-12-31 2020-08-18 远景智能国际私人投资有限公司 Permission setting method, device and equipment of file directory and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103019778A (en) * 2012-11-30 2013-04-03 北京奇虎科技有限公司 Startups cleaning method and device
CN103631628A (en) * 2013-12-16 2014-03-12 北京奇虎科技有限公司 Software cleaning method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103019778A (en) * 2012-11-30 2013-04-03 北京奇虎科技有限公司 Startups cleaning method and device
CN103631628A (en) * 2013-12-16 2014-03-12 北京奇虎科技有限公司 Software cleaning method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
小编: ""教你如何手动驱逐流氓软件"", 《计算机与网络》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552671A (en) * 2019-12-31 2020-08-18 远景智能国际私人投资有限公司 Permission setting method, device and equipment of file directory and storage medium
CN111552671B (en) * 2019-12-31 2024-01-05 远景智能国际私人投资有限公司 File directory authority setting method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
EP1623297B1 (en) Api system, method and computer program product for accessing content/security analysis functionality in a mobile communication framework
EP1629360B1 (en) Update system and method for updating a scanning subsystem in a mobile communication framework
EP3062234B1 (en) System, method and computer program product for content/context sensitive scanning utilizing a mobile communication device
US8285267B2 (en) Synchronization in unified messaging systems
CN103152740B (en) A kind of anti-monitor method and system for mobile terminal
US6047046A (en) Method and apparatus for automating the management of a database
CN109862025B (en) Access control method, device and system based on black and white lists
CN104023108B (en) The method and apparatus removing terminal failure contact person
CN102360410B (en) User operation discovery method of file system and synchronous system utilizing the same
WO2013143393A1 (en) Method and system utilizing cloud computation for scanning files of device
CN104021159B (en) Client file cleaning method and device
CN103188097A (en) Method, device and system achieving patch management
CN106844558A (en) Intelligent question and answer method and system
CN105528543A (en) Remote antivirus method, client, console and system
CN110442354A (en) A kind of software method for cleaning and device
CN106648903A (en) Method and system for calling distributed file system
CN103729243A (en) Universal hardware abstract port implementing method and calling method for voice access equipment
CN108132815A (en) A kind of method, apparatus and storage medium of configuration file dynamic load
CN105893152A (en) Memory management method and device and mobile terminal
CN103701653B (en) The processing method of a kind of interface hot plug configuration data and network configuration server
CN108121793A (en) A kind of DB Backup dispositions method and device
CN106406747A (en) Hard disk storage management method and apparatus for mobile terminal
CN107155167A (en) Mobile terminal and its Bluetooth pairing name class processing method and storage device
CN103067246A (en) Method and apparatus used for processing file received based on instant communication service
CN102799812B (en) Method and device for processing application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191112

RJ01 Rejection of invention patent application after publication