WO2015062389A1 - 一种终端设备卸载系统应用的方法和装置 - Google Patents

一种终端设备卸载系统应用的方法和装置 Download PDF

Info

Publication number
WO2015062389A1
WO2015062389A1 PCT/CN2014/087711 CN2014087711W WO2015062389A1 WO 2015062389 A1 WO2015062389 A1 WO 2015062389A1 CN 2014087711 W CN2014087711 W CN 2014087711W WO 2015062389 A1 WO2015062389 A1 WO 2015062389A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
system application
user
specified
instruction
Prior art date
Application number
PCT/CN2014/087711
Other languages
English (en)
French (fr)
Inventor
毛磊
邱凯
田野
张龙
孟凡磊
殷凯
Original Assignee
北京奇虎科技有限公司
奇智软件(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京奇虎科技有限公司, 奇智软件(北京)有限公司 filed Critical 北京奇虎科技有限公司
Publication of WO2015062389A1 publication Critical patent/WO2015062389A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/62Uninstallation

Definitions

  • the present invention relates to the field of computers, and in particular, to a method and apparatus for uninstalling a system application on a terminal device.
  • the present invention has been made in order to provide a method and corresponding apparatus suitable for unloading a system application on a terminal device that overcomes the above problems or at least partially solves the above problems.
  • a method for uninstalling a system application on a terminal device includes:
  • the deletion instruction of deleting the specified system application issued by the user is received, and the corresponding specified system application file is deleted in the file directory according to the deletion instruction.
  • an apparatus for uninstalling a system application on a terminal device including:
  • the first instruction execution module is configured to execute the specified instruction, and the file directory attribute of the operating system is modified to be readable, wherein the system application file is stored in the file directory;
  • a file reading module configured to read a system application file stored in a file directory
  • a file output module configured to output the read system application file identifier to the user
  • An instruction receiving module configured to receive a delete instruction issued by a user to delete a specified system application
  • the second instruction execution module is configured to delete the corresponding specified system application file in the file directory according to the deletion instruction.
  • a computer program comprising computer readable code, when the computer readable code is run on a computing device, causing the computing device to perform according to any of the above A method of uninstalling a system application on a terminal device.
  • a computer readable medium wherein the computer program described above is stored.
  • the present invention provides a method and apparatus for uninstalling a system application on a terminal device.
  • a directory attribute for storing a system application file can be made readable, and then the system file is read and output to a user, and the user can
  • the system application file issues a delete command, and the corresponding system application file is deleted in the file directory of the operating system to achieve the purpose of deleting the system application, and the problem that the system application cannot be deleted in the traditional operating system is solved, and the rogue software is reduced for the terminal.
  • the CPU resource is occupied, the running speed is increased, the storage space of the terminal is saved, the memory usage of the rogue software is reduced, and the security problems such as background network downloading, sucking, stealing user information caused by rogue software are eliminated, and the user is provided with security guarantee.
  • FIG. 1 is a flow chart of a method for uninstalling a system application on a terminal device according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a specific method for uninstalling a system application on a terminal device according to an embodiment of the present invention
  • FIG. 3 is a block diagram showing the structure of an apparatus for uninstalling a system application on a terminal device according to an embodiment of the present invention
  • FIG. 4 is a block diagram schematically showing a computing device for performing a method of offloading a system application on a terminal device in accordance with the present invention
  • Fig. 5 schematically shows a storage unit for holding or carrying program code implementing a method of uninstalling a system application on a terminal device according to the present invention.
  • Embodiments of the present invention provide a method for uninstalling a system application on a terminal device.
  • the method is capable of supporting a user to uninstall a system application in a mobile terminal, which can be implemented by improving a device for uninstalling a system application on a terminal device.
  • the terminal device in this embodiment may be a user mobile terminal device such as a PC (Personal Computer), a mobile phone, or a handheld computer.
  • FIG. 1 is a flowchart of a method for uninstalling a system application on a terminal device according to an embodiment of the present invention, where the method includes steps S102 to S106.
  • S106 Receive a deletion instruction issued by the user to delete the specified system application, and delete the corresponding specified system application file in the file directory according to the deletion instruction.
  • Embodiments of the present invention provide a method for uninstalling a system application on a terminal device.
  • the directory attribute for storing the system application file can be made readable, and then the system file is read and output to the user, and the user can issue a delete instruction to the system application file, and the corresponding system application file is in the operating system file directory.
  • Deleted in order to achieve the purpose of deleting the system application solving the problem that the system cannot be deleted in the traditional operating system, reducing the occupation of the CPU resources of the terminal by the rogue software, improving the running speed, saving the storage space of the terminal, and reducing the rogue
  • the software occupies the memory and eliminates the security problems caused by rogue software, such as background network downloading, smoking, and stealing user information, and provides security for users.
  • This embodiment is a specific application scenario of the foregoing first embodiment. Through the embodiment, the method provided by the present invention can be more clearly and specifically illustrated.
  • the uninstallation of the system application on the user mobile terminal can be implemented by a device installed on the computer for uninstalling the system application on the terminal device.
  • the method provided in this embodiment is specifically described by taking the device for uninstalling the system application on the terminal device as the mobile phone assistant and the user mobile terminal as the mobile phone as an example. It should be noted that the embodiment is merely exemplary and does not limit the scope of the embodiments of the present invention.
  • FIG. 2 is a flowchart of a specific method for uninstalling a system application according to an embodiment of the present invention, and the method specifically includes steps S201 to S209.
  • the mobile phone assistant Before performing the method provided in this embodiment, it is necessary for the mobile phone assistant to confirm that the current user's mobile phone is connected to the computer.
  • the purpose of connecting the user's mobile phone to the computer is to enable the mobile phone and the computer to perform bidirectional data and control command transmission.
  • wireless the premise is that the phone and computer are connected to the network.
  • the computer makes the IP (Internet Protocol) protocol of the machine into a two-dimensional code, and the mobile phone scans the two-dimensional code to obtain the IP information of the computer. Then through the IP information mobile phone can access the computer, the latter principle is the same, the computer-side mobile phone assistant, through the network, send operation commands to the mobile phone.
  • IP Internet Protocol
  • the user can trigger the execution of the method. For example, the user can trigger by clicking a button of the user uninstalling the system application displayed by the mobile phone or the computer.
  • the method provided in this embodiment is specifically described below.
  • step S201 is performed.
  • step S201 it is detected whether the current user's mobile phone has root authority. If the root privilege of the user's mobile phone is obtained, and the root privilege of the mobile phone is obtained, the operation of step S203 is continued. Then, the operation of step S203 is directly performed.
  • the root privilege of the mobile phone is a limitation of the mobile phone manufacturer's access rights to the product, and it is not necessary to modify the file in the mobile phone at will. Since the method provided in this embodiment is designed to access the operating system file directory, it is necessary to detect whether the current user's mobile phone has root authority through step S201. If the root permission is obtained, the root permission of the mobile phone has been obtained. At this point, you can perform subsequent operations. If you do not have root privileges, you need to obtain root privileges before you can perform subsequent operations.
  • the root function of the mobile phone may be obtained by calling the root function of the mobile phone assistant computer.
  • the one-click root function is the assistant to help the user through another tool.
  • the principle of this tool to obtain root privileges is: After confirming that the mobile phone is connected, obtain the basic information of the mobile phone, and then obtain the corresponding root scheme from the server or the cloud to obtain root access to the mobile phone.
  • step S203 is performed.
  • the specified command is executed by using the root authority of the mobile phone, and the file directory attribute of the operating system is modified, so that the file directory attribute of the modified operating system is readable, wherein the file directory is used to store the system application file of the mobile phone. .
  • the specified instruction mentioned in this embodiment may be a su mount remount command
  • the path of the file directory may be /data/system/app.
  • the specific executable can be as follows:
  • the above command uses the adb shell command
  • the shell command uses su (high-privilege boot, such as root privileges) to add the target path (/system/app) to the mount-0 remount command to set /syatem/app Is the rw (read-write) state.
  • Path can be customized: such as /data/local
  • the root permission can be obtained, and the uninstallation of the system application can be completed even if the user does not have root authority for the system.
  • the attributes of the file directory may include: readable, writable, and executable.
  • at least the attribute of the file directory is set to be readable.
  • the system application files can be read from the file directory and output to the user.
  • step S204 is continued.
  • the system application file stored in the file directory is read, and an identifier is assigned to each system application according to the file of the read system application.
  • the system application file stored in the file directory may be read from the mobile terminal by the daemon process, and then the read system application file is transmitted to the server or the cloud for filtering, that is, The server or the cloud sends a network query request carrying the information of the system application to query whether the system application indicated by the information of the system application allows the uninstallation.
  • the server or the cloud will query whether the system application is allowed to be uninstalled according to the query indication, so as to assign an identifier to each system application, which may include the following three identifiers: uninstallable, carefully uninstalled, and non-uninstallable.
  • the above identifier is an interface return field provided by the server or the cloud to the client computer, and the field is associated with the application package name, for example, returning com.qihoo.mobile:0, com.qihoo.mobile:1, or com.qihoo. Mobile: 2.
  • the meaning of this logo is pre-negotiated by the client computer and server or the cloud. Among them, when the identifier com.qihoo.mobile: is 0, 1, 2, respectively, the package is unloadable, uninstallable, and carefully uninstalled.
  • system application file is distinguished by using the foregoing three types of identifiers, because there are three types of system applications in the file directory of the mobile phone, including:
  • system applications in the file directory can be uninstalled. However, if these system applications are uninstalled, some other system applications or some functions may not be able to implement the original functions, for example, the theme. Software, after the user uninstalls, the theme may not be replaced again, or the font may be abnormal. At this point, you can identify these system applications that can be uninstalled but have other effects after uninstallation as a cautious uninstall.
  • system applications in the file directory can be uninstalled, and will not affect other system applications or certain functions after uninstalling.
  • chat software that comes with Fetion and other systems can be used even after uninstalling. Free download and recovery will not have a stability impact on the operation of the system. At this point, you can identify these system applications that can be uninstalled and have no additional impact after uninstallation as uninstallable.
  • the application identifier is applied to each system, which is beneficial to the subsequent processing. It is enough to distinguish whether the system application can be uninstalled by using the logo, without having to filter each system application file again, which reduces the processing pressure and improves the processing efficiency.
  • the system application file having the uninstallable and cautious uninstallation identification is then output to the user by step S205, and is not output to the user if it is marked as non-unloadable in step S204.
  • system files may be displayed on the user's mobile phone, and the user may determine whether to uninstall one or some system applications according to the identifier of the system application.
  • the corresponding uninstall button is also displayed in the client.
  • the uninstall button corresponding to the system application to be uninstalled may be clicked.
  • step S206 After receiving the deletion instruction of the specified system application triggered by the user, the process proceeds to step S206, that is, the identifier of the system application corresponding to the deletion instruction is read, and the identifier type is determined.
  • step S207 When the identifier of the system application corresponding to the deletion instruction is a caution uninstallation, step S207 is continued.
  • step S208 is directly performed.
  • Step S207 prompting the user to apply the system as a carefully uninstalled application, and determining whether to continue the uninstall operation according to the execution instruction input by the user.
  • the execution instruction input by the user instructs to continue the uninstall operation
  • the operation of step S208 is performed.
  • the execution instruction input by the user does not indicate that the uninstall operation is to be continued, the current operation is ended.
  • Step S208 when the user confirms that the specific system application is deleted, the specified system application file is stored in the designated path of the computer by the backup instruction.
  • the function of the step S208 is to back up the system application file that the user is about to delete, so as to prevent the system from running unstable or accidentally deleting after the application is deleted.
  • the apk executable file corresponding to the system application file and the dex check file may be stored in a specified path of the computer.
  • the androidlauncher.apk and androidlauncher.dex in the /data/system/app directory need to be copied to the specified path of the computer through the adb cat command.
  • chat software includes the user's chat record. At this point, you need to save the application data when you back up.
  • Backup application data can be implemented by the tool busybox, which uses the tool to package the application data of the system application into a tar file, and then copy it to the specified directory of the computer through the adb cat command.
  • the user backup data saved on the computer can be identified by the IMEI (International Mobile Equipment Identity) of the mobile phone to avoid storing backup data of multiple mobile phones in the computer. After that, the recognition at the time of recovery cannot be performed.
  • IMEI International Mobile Equipment Identity
  • step S208 ensures that the user can recover from the backed up data even if some system applications are accidentally deleted.
  • step S209 the deletion operation of step S209 is continued.
  • step S209 the system application file corresponding to the deletion instruction is deleted in the operating system directory according to the deletion instruction issued by the user.
  • the uninstallation can be completed by deleting the corresponding apk file and the dex file of the system application in the system directory.
  • the user may also select to restore the deleted system application file, including the following process:
  • the recovery system application needs to read the application backed up by the mobile phone according to the IMEI of the mobile phone, and then display it to prompt the user to perform the restored system application, and the user can select.
  • step S208 the user can copy the apk file and the dex file of the system application to be restored to the /data/system/app in the mobile phone in the instruction path for backup, and then use the busybox to input the corresponding application data.
  • the file (that is, the .tar file packaged in step S208) is released to the mobile phone to complete the recovery of the system application.
  • Embodiments of the present invention provide a method for uninstalling a system application on a terminal device.
  • the directory attribute for storing the system application file can be made readable, and then the system file is read and output to the user, and the user can issue a delete instruction to the system application file, and the corresponding system application file is in the operating system file directory.
  • Deleted in order to achieve the purpose of deleting the system application, solving the problem that the system cannot be deleted in the traditional operating system, reducing the occupation of the CPU resources of the terminal by the rogue software, improving the running speed, saving the storage space of the terminal, and reducing the rogue
  • the software occupies memory and eliminates background network downloads caused by rogue software. Security issues such as smoking fees, stealing user information, etc., provide users with security.
  • FIG. 3 is a structural block diagram of an apparatus for uninstalling a system application on a terminal device according to an embodiment of the present invention.
  • the device 300 includes:
  • the first instruction execution module 310 is configured to execute the specified instruction, and modify the file directory attribute of the operating system to be readable, wherein the system application file is stored in the file directory;
  • the file reading module 320 is configured to read a system application file stored in a file directory
  • the file output module 330 is configured to output the read system application file identifier to the user;
  • the instruction receiving module 340 is configured to receive a delete instruction issued by the user to delete the specified system application
  • the second instruction execution module 350 is configured to delete the corresponding specified system application file in the file directory according to the deletion instruction.
  • the first instruction execution module 310 includes:
  • the authority detecting unit 311 is configured to detect whether it has root authority
  • the privilege obtaining unit 312 is configured to acquire the root privilege when the privilege detecting unit 311 detects that it does not have the root privilege;
  • the first instruction execution unit 313 is configured to execute the specified instruction with the root authority to modify the file directory attribute of the operating system.
  • the privilege obtaining unit 312 is further configured to obtain the root privilege by calling the preset tool, and when it is checked that the current user's ID level is a preset level, it is determined that the root privilege has been successfully obtained.
  • the file output module 330 includes:
  • the identifier allocation unit 331 is configured to apply an identifier to each system according to the file of the read system application, and the identifier includes uninstallable, carefully uninstalled, and not uninstallable;
  • the output unit 332 is configured to output a system application file having an uninstallable and cautious uninstallation identifier to the user.
  • the device 300 further includes:
  • the prompting module 360 is configured to prompt the user to apply the system as a carefully uninstalled application when the deletion instruction indicates that the deleted system application identifier is a caution uninstallation, and determine whether to continue the uninstall operation according to the execution instruction input by the user.
  • the device 300 further includes:
  • the backup module 370 is configured to store the specified system application file into the specified terminal path by using a backup instruction.
  • the backup instruction is an adb cat command.
  • the device 300 further includes:
  • the file restore module 380 is configured to copy the file of the specified system application in the specified terminal path to the file directory, and restore the data file of the specified system application to the local file.
  • command as the su mount remount command
  • file directory is /data/system/app.
  • system application files include:
  • the system applies the apk executable and the dex check file.
  • Embodiments of the present invention provide an apparatus for uninstalling a system application on a terminal device.
  • the directory attribute for storing the system application file can be made readable, and then the system file is read and output to the user, and the user can issue a delete instruction to the system application file, and the corresponding system application file is in the operating system file directory.
  • Deleted in order to achieve the purpose of deleting the system application solving the problem that the system cannot be deleted in the traditional operating system, reducing the occupation of the CPU resources of the terminal by the rogue software, improving the running speed, saving the storage space of the terminal, and reducing the rogue
  • the software occupies the memory and eliminates the security problems caused by rogue software, such as background network downloading, smoking, and stealing user information, and provides security for users.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
  • each feature disclosed in the specification, including the accompanying claims, the abstract and the drawings may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some or all of the components of the terminal device offloading system application in accordance with embodiments of the present invention.
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
  • Figure 4 illustrates a computing device that can implement a method of offloading a system application on a terminal device in accordance with the present invention.
  • the computing device conventionally includes a processor 410 and a computer program product or computer readable medium in the form of a memory 420.
  • the memory 420 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
  • Memory 420 has a memory space 430 for program code 431 for performing any of the method steps described above.
  • storage space 430 for program code may include various program code 431 for implementing various steps in the above methods, respectively.
  • the program code can be read from or written to one or more computer program products.
  • These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks. Such computer program products are typically portable or fixed storage units as described with reference to FIG.
  • the storage unit may have storage segments, storage spaces, and the like that are similarly arranged to memory 420 in the computing device of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit includes computer readable code 431', ie, code readable by a processor, such as 410, that when executed by a computing device causes the computing device to perform each of the methods described above step.

Abstract

本发明提供了一种在终端设备上卸载系统应用的方法和装置。该方法包括:执行指定指令,修改操作系统的文件目录属性为可读,其中,文件目录下存储有系统应用文件;读取文件目录下存储的系统应用文件,并将读取的系统应用文件标识输出给用户;接收用户发出的删除指定系统应用的删除指令,根据删除指令在文件目录中删除对应的指定系统应用文件。通过本发明,可以使得用于存储系统应用文件的目录属性为可读,进而读取系统文件并输出给用户,用户可对系统应用文件发出删除指令,将对应系统应用文件在操作系统的文件目录中删除,以达到删除系统应用的目的,解决了传统的操作系统中对于系统应用不能删除的问题。

Description

一种终端设备卸载系统应用的方法和装置 技术领域
本发明涉及本发明涉及计算机领域,具体涉及一种在终端设备上卸载系统应用的方法和装置。
背景技术
目前,由于android(安卓)系统的开发性,允许厂商可以对自己的手机或平板电脑等移动终端的操作系统进行深度定制。在其中加入具有自己特色的功能和应用。
但是,由于厂商很容易在定制自己的移动终端的操作系统中加入应用,因此,一些为了追求商业利益的厂商,经常会在自己的操作系统中加入一些具有商业价值的软件。而这些软件对用户来说非必需,占用手机内存空间,导致手机运行速度变慢,并且不少数具有扣费吸流量的恶意行为。
在目前情况下,由于厂商加入的这些应用具有系统属性,而导致用户虽然不需要,但是却无法卸载,占用CPU(Central Processing Unit,中央处理器)资源,影响手机的运行速度,占用手机存储空间和内存,且后台启动联网下载,造成浪费用户流量或吸费,窃取用户隐私等,造成用户体验差,还容易产生经济损失。还有一些厂商的预装软件在后台偷偷运行,在用户不知道的情况下,占用手机本来就很少的CPU,内存,存储空间等资源。并且,进一步的,潜在偷窃用户信息。预装软件是买完手机自带的,是有能力将用户的通信录,照片等个人信息进行窃取的,并且潜在花费用户资金,因为预装软件由于可以在后台运行,执行的操作,比如发送网络请求,当用户在2G/3G环境下,会占用用户的流量,相当于花费用户资金。
发明内容
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的适于在终端设备上卸载系统应用的方法和相应的装置。
依据本发明的一个方面,提供一种在终端设备上卸载系统应用的方法,包括:
执行指定指令,修改操作系统的文件目录属性为可读,其中,文件目录下存储有系统应用文件;
读取文件目录下存储的系统应用文件,并将读取的系统应用文件标识输出给用 户;
接收用户发出的删除指定系统应用的删除指令,根据删除指令在文件目录中删除对应的指定系统应用文件。
依据本发明的另一个方面,还提供了一种用于在终端设备上卸载系统应用的装置,包括:
第一指令执行模块,配置为执行指定指令,修改操作系统的文件目录属性为可读,其中,文件目录下存储有系统应用文件;
文件读取模块,配置为读取文件目录下存储的系统应用文件;
文件输出模块,配置为将读取的系统应用文件标识输出给用户;
指令接收模块,配置为接收用户发出的删除指定系统应用的删除指令;
第二指令执行模块,配置为根据删除指令在文件目录中删除对应的指定系统应用文件。
根据本发明的又一个方面,提供了一种计算机程序,其包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据上文任一个所述的在终端设备上卸载系统应用的方法。
根据本发明的再一个方面,提供了一种计算机可读介质,其中存储了上述的计算机程序。
本发明的有益效果为:
本发明提供了一种在终端设备上卸载系统应用的方法和装置,通过本发明,可以使得用于存储系统应用文件的目录属性为可读,进而读取系统文件并输出给用户,用户可对系统应用文件发出删除指令,将对应系统应用文件在操作系统的文件目录中删除,以达到删除系统应用的目的,解决了传统的操作系统中对于系统应用不能删除的问题,减少流氓软件对于终端的CPU资源的占用,提高运行速度、可节省终端的存储空间、减少流氓软件对内存的占用,并消除流氓软件造成的后台联网下载、吸费、窃取用户信息等安全问题,给用户提供安全保障。
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是 对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1是根据本发明一个实施例的一种在终端设备上卸载系统应用的方法流程图;
图2是根据本发明一个实施例的一种在终端设备上卸载系统应用的具体方法流程图;
图3是根据本发明一个实施例的一种用于在终端设备上卸载系统应用的装置结构框图;
图4示意性地示出了用于执行根据本发明的在终端设备上卸载系统应用的方法的计算设备的框图;以及
图5示意性地示出了用于保持或者携带实现根据本发明的在终端设备上卸载系统应用的方法的程序代码的存储单元。
具体实施方式
下面结合附图和具体的实施方式对本发明作进一步的描述。
实施例一
本发明实施例提供了一种在终端设备上卸载系统应用的方法。该方法对能够支持用户在移动终端中对系统应用进行卸载,其可以通过对用于在终端设备上卸载系统应用的装置进行改进来实现。例如,本实施例中的终端设备可以为PC(Personal Computer,个人计算机),手机,手持电脑等用户移动终端设备。
图1是根据本发明一个实施例提供的一种在终端设备上卸载系统应用的方法流程图,该方法包括步骤S102至S106。
S102,执行指定指令,修改操作系统的文件目录属性为可读,其中,文件目录下存储有系统应用文件。
S104,读取文件目录下存储的系统应用文件,并将读取的系统应用文件标识输出给用户。
S106,接收用户发出的删除指定系统应用的删除指令,根据删除指令在文件目录中删除对应的指定系统应用文件。
本发明实施例提供了一种在终端设备上卸载系统应用的方法。通过该方法,可以使得用于存储系统应用文件的目录属性为可读,进而读取系统文件并输出给用户,用户可对系统应用文件发出删除指令,将对应系统应用文件在操作系统的文件目录 中删除,以达到删除系统应用的目的,解决了传统的操作系统中对于系统应用不能删除的问题,减少流氓软件对于终端的CPU资源的占用,提高运行速度、可节省终端的存储空间、减少流氓软件对内存的占用,并消除流氓软件造成的后台联网下载、吸费、窃取用户信息等安全问题,给用户提供安全保障。
实施例二
本实施例为上述实施例一的一种具体应用场景,通过本实施例,能够更加清楚、具体地阐述本发明所提供的方法。在实现本实施例提供的方法时,可以通过安装在计算机上的用于在终端设备上卸载系统应用的装置来实现对用户移动终端上的系统应用的卸载。
下面,以用于在终端设备上卸载系统应用的装置为手机助手,且用户移动终端为手机为例来对本实施例提供的方法进行具体说明。需要说明的是,本实施例只是示例性的,并不限制本发明实施例所保护的范围。
图2是根据本发明一个实施例提供的一种卸载系统应用的具体方法流程图,该方法具体包括步骤S201至S209。
需要说明的是,在执行本实施例所提供的方法之前,需要由手机助手确认当前用户的手机已经连接至计算机。本实施例中将用户的手机与计算机进行连接的目的在于使得手机与计算机能够进行双向的数据、控制命令的传输。
例如,手机和计算机之间有两种连接方式:
1、usb(Universal Serial Bus,通用串行总线):使用usb线将手机和计算机连接起来,这个时候,计算机端的手机助手这个软件会通过安卓手机自身的机制调用手机上的手机助手这个软件,给手机助手这个软件发送一些操作指令。
2、无线:前提是手机和计算机都连接上网络了。计算机将本机的IP(Internet Protocol,网络之间互连的协议)信息制作成二维码,手机扫描二维码后,获取到计算机的IP信息。然后通过IP信息手机能访问计算机,后面原理相同,计算机端的手机助手,通过网络,将操作命令发送给手机。
在手机助手确认用户的手机已经连接至计算机之后,则可以用户来触发本方法的执行。例如,用户可以通过点击手机或者计算机所展示的用户卸载系统应用的按键来触发,下面具体介绍本实施例提供的方法。
首先,执行步骤S201。在步骤S201中,检测当前用户的手机是否具有root权限。如果不具有root权限,则通过执行步骤S202来获取用户手机的root权限,并在获取了手机的root权限之后,继续执行步骤S203的操作,如果具有root权限, 则直接执行步骤S203的操作。
需要说明的是,手机root权限是手机厂商对于产品访问权限的限制,避免随意对手机中的文件进行修改。由于本实施例所提供的方法设计了对操作系统文件目录的访问,所以,需要通过步骤S201来检测当前用户的手机是否具有root权限,如果具有root权限,则说明已经获取过该手机的root权限,此时,可执行后续操作,若不具有root权限,则需要先获取root权限,之后方可执行后续操作。
可选地,本实施例中,步骤S202在获取手机的root权限时,可以通过手机助手计算机端调用一键root功能来实现获取手机的root权限。其中,一键root功能是助手通过另一个工具来帮助用户完成的。这个工具获取root权限的原理是:当确认手机已连接后,获取手机的基本信息,然后从服务器或者云端获取对应的root方案来对手机进行root权限获取。
可选地,手机助手可以通过如下方式来判断是否已经获取了手机的root权限:手机助手会通过adb shell id的命令,获取当前手机用户的id级别,如果id=0,就代表手机已经获取root权限,通常,root就是获取手机系统的最高使用权限,id=0就代表已经获取到最高权限,即手机已经获取root权限。
在确定当前用户的手机具有root权限之后,执行步骤S203。在步骤S203中,利用手机的root权限执行指定指令,修改操作系统的文件目录属性,使得修改后的操作系统的文件目录属性为可读,其中,该文件目录用于存储该手机的系统应用文件。
可选地,本实施例中提及的指定指令可以为su mount remount命令,文件目录的路径可以是/data/system/app。
以安卓系统为例,具体的可执行如下指令:
shell:su-c mount-o remount rw/system/app/system/app
其中,上述命令利用的是adb的shell命令,shell命令里用su(高权限启动,例如root权限)来将目标路径(/system/app)加mount-0 remount命令,以将/syatem/app设为rw(可读写)状态。
path可以自定:比如/data/local
然后rw换成ro就变成只读状态
通过该步骤对于root权限的获取,即使用户不存在对于系统的root权限,也可以完成对系统应用的卸载。
需要说明的是,在使用linux内核的安卓系统中,文件目录的属性可包括:可读、可写、可执行三种。在本实施例中,至少要将文件目录的属性设置为可读,才 能将系统应用文件从文件目录中读出,并输出给用户。
相应地,也可同时将操作系统的文件目录同时设置为具有可读写、可读性且可执行的属性,也符合本发明对于文件目录的属性的要求。
在将操作系统的文件目录属性修改为可读之后,继续执行步骤S204。在步骤S204中,读取文件目录下存储的系统应用文件,并根据读取的系统应用的文件对每个系统应用分配标识。
本实施例在执行步骤S204时,首先可以通过守护进程从手机端读取文件目录下存储的系统应用文件,之后,将所读取的系统应用文件传到服务器或者云端做一次过滤,即可以向服务器或者云端发送携带有系统应用的信息的网络查询请求,以查询所述系统应用的信息所指示的系统应用是否允许卸载。服务器或者云端会根据查询指示来查询每个系统应用是否允许卸载,以对每个系统应用分配标识,具体可以包括如下三个标识:可卸载、谨慎卸载、不可卸载。
其中,上述标识是服务器或者云端提供给客户端计算机的一个接口返回字段,这个字段和应用包名关联,比如返回com.qihoo.mobile:0、com.qihoo.mobile:1、或者com.qihoo.mobile:2。这个标识的意义是客户端计算机和服务器或者云端预先协商好的。其中,当标识com.qihoo.mobile:为0、1、2时分别说明这个包是不可卸载、可卸载、谨慎卸载。
本实施例中,之所以将系统应用文件使用上述三种标识来进行区分,是因为在手机的文件目录中存在三种类型的系统应用,具体包括:
第一种,文件目录中有些系统应用是不可缺少的,一旦删除将导致手机的不可用,这些系统应用能够维持手机正常运行,例如,系统的时钟、拨号、短信功能都是不能缺少的,这时,则可以将这些不能够进行卸载的系统应用标识为不可卸载。
第二种,文件目录中还有些系统应用是可以卸载的,但是,如果将这些系统应用进行卸载之后,可能导致其他某些系统应用或者某些功能也不能够正常实现原有功能,例如,主题软件,用户卸载后,可能不能够再进行主题更换,或者导致字体异常。这时,则可以将这些能够进行卸载但是卸载后会造成其他影响的系统应用标识为谨慎卸载。
第三种,文件目录中还有些系统应用是可以卸载的,并且卸载之后不会对其他系统应用或者某些功能造成影响,例如,飞信等系统自带的聊天软件,用户即使卸载后,也可以随意下载恢复,也不会对系统的运行产生稳定性影响。这时,则可以将这些能够进行卸载且卸载后不会造成其他影响的系统应用标识为可卸载。
可见,本实施例中,对每个系统应用分配标识,有利于在后续的处理过程中能 够通过标识来区分系统应用是否可以进行卸载,而无需再次对每个系统应用文件进行过滤,减少了处理压力,同时提高了处理效率。
在为每个系统应用分配标识之后,接着由步骤S205将具有可卸载和谨慎卸载标识的系统应用文件输出给用户,而在步骤S204中被标记为不可卸载的则不会输出给用户。
本实施例中,可以将这些系统文件显示在用户的手机上,用户可以根据系统应用的标识来判断是否将某个或某些系统应用进行卸载。
另外,为了方便用户进行卸载操作,同时还会在客户端中显示相应地卸载按钮,当用户想要对某个或某些系统应用进行卸载时,可以点击欲卸载的系统应用所对应的卸载按钮来通过手机向手机助手发送删除指令。
在收到用户触发的删除指定系统应用的删除指令之后,继续执行步骤S206,即读取该删除指令所对应的系统应用的标识,并判断其标识类型。当该删除指令所对应的系统应用的标识为谨慎卸载时,继续执行步骤S207。而当该删除指令所对应的系统应用的标识为可卸载时,直接执行步骤S208。
步骤S207,提示用户该系统应用为谨慎卸载的应用,并根据用户输入的执行指令确定是否继续执行卸载操作。当用户输入的执行指令指示继续执行卸载操作时,执行步骤S208的操作。当用户输入的执行指令未指示继续执行卸载操作时,结束当前操作。
本实施例上述已经提及,将标记为谨慎卸载的系统应用进行卸载后,可能导致其他某些系统应用或者某些功能也不能够正常实现原有功能,所以,为了避免用户由于误操作导致将这些系统文件卸载,本实施例通过步骤S207来进一步提示用户该系统应用为谨慎卸载的应用,以便用户再次确认是否将其进行卸载,从而保证了用户对系统文件操作的安全性。
步骤S208,在用户确认对特定的系统应用进行删除时,通过备份指令将指定系统应用文件存储到计算机的指定路径中。
本步骤S208的作用是对用户即将删除的系统应用文件进行备份,以避免用户在将某个应用删除后,导致系统运行不稳定,或者发生误删除的情况。
可选地,在将指定系统应用文件存储到计算机的指定路径中时,可以将系统应用文件对应的apk可运行文件和dex校验文件一同存储在计算机的指定路径中。
例如,用户删除的系统应用为桌面启动器,则备份时需要将/data/system/app目录下的androidlauncher.apk和androidlauncher.dex通过adb cat命令共同拷贝到计算机的指定路径下。
需要说明的是,对于特定的系统应用,除了apk文件、dex文件之外,还包括有对应的应用数据,例如,聊天软件中就会包括用户的聊天记录等。此时,进行备份时还需要保存应用数据。
备份应用数据可以通过工具busybox实现,通过这个工具将系统应用的应用数据打包成一个tar文件,再通过adb cat命令拷贝到计算机的指定目录下。
需要说明的是,在本步骤中,对于计算机上保存的用户备份数据,可通过手机的IMEI(International Mobile Equipment Identity,国际移动设备身份码)进行标识,以避免计算机中保存多个手机的备份数据后,无法进行恢复时的识别。
步骤S208的备份操作,确保了用户即使将某些系统应用进行了误删除,也可通过备份的数据来进行恢复。
在进行上述备份操作之后,继续执行步骤S209的删除操作。在步骤S209中,根据用户发出的删除指令,将该删除指令对应的系统应用文件在操作系统目录中进行删除。
需要说明的是,在安卓系统中,只要将系统目录下于该系统应用对应的apk文件和dex文件删除,即可完成卸载。
进一步地,若用户发送对系统应用的误删除或反悔欲恢复时,还可以选择对已删除的系统应用文件进行恢复,包括如下过程:
将计算机中的指定路径下的指定系统应用的文件拷贝到手机的操作系统目录中,并将该指定系统应用的数据文件还原到本地。
进一步地,恢复系统应用需要根据手机的IMEI去读取这个手机备份过的应用,然后进行展示,以提示用户可进行恢复的系统应用,并供用户进行选择。
与步骤S208相对应的,用户可以在用于备份的指令路径中将欲恢复的系统应用的apk文件和dex文件拷到手机里的/data/system/app下,再用busybox将对应的应用数据文件(也即步骤S208中打包得到的.tar文件)释放到手机中,即可完成系统应用的恢复。
本发明实施例提供了一种在终端设备上卸载系统应用的方法。通过该方法,可以使得用于存储系统应用文件的目录属性为可读,进而读取系统文件并输出给用户,用户可对系统应用文件发出删除指令,将对应系统应用文件在操作系统的文件目录中删除,以达到删除系统应用的目的,解决了传统的操作系统中对于系统应用不能删除的问题,减少流氓软件对于终端的CPU资源的占用,提高运行速度、可节省终端的存储空间、减少流氓软件对内存的占用,并消除流氓软件造成的后台联网下载、 吸费、窃取用户信息等安全问题,给用户提供安全保障。
实施例三
图3是本发明一个实施例提供的一种用于在终端设备上卸载系统应用的装置结构框图,该装置300包括:
第一指令执行模块310,配置为执行指定指令,修改操作系统的文件目录属性为可读,其中,文件目录下存储有系统应用文件;
文件读取模块320,配置为读取文件目录下存储的系统应用文件;
文件输出模块330,配置为将读取的系统应用文件标识输出给用户;
指令接收模块340,配置为接收用户发出的删除指定系统应用的删除指令;
第二指令执行模块350,配置为根据删除指令在文件目录中删除对应的指定系统应用文件。
可选地,第一指令执行模块310包括:
权限检测单元311,配置为检测是否具有root权限;
权限获取单元312,配置为当权限检测单元311检测到不具有root权限时,获取root权限;
第一指令执行单元313,配置为利用root权限执行指定指令,修改操作系统的文件目录属性。
可选地,权限获取单元312还配置为通过调用预设工具来进行root权限的获取,且当检查到当前用户的ID级别为预设级别时,确定已经成功获取root权限。
可选地,文件输出模块330包括:
标识分配单元331,配置为根据读取的系统应用的文件对每个系统应用分配标识,标识包括可卸载、谨慎卸载、不可卸载;
输出单元332,配置为将具有可卸载和谨慎卸载标识的系统应用文件输出给用户。
可选地,该装置300还包括:
提示模块360,配置为当删除指令指示删除的系统应用的标识为谨慎卸载时,提示用户该系统应用为谨慎卸载的应用,并根据用户输入的执行指令确定是否继续执行卸载操作。
可选地,该装置300还包括:
备份模块370,配置为通过备份指令将指定系统应用文件存储到指定终端路径中。
可选地,备份指令为adb cat命令。
可选地,该装置300还包括:
文件还原模块380,配置将指定终端路径下的指定系统应用的文件拷贝到文件目录中,并将该指定系统应用的数据文件还原到本地。
可选地,指定指令为su mount remount命令,文件目录为/data/system/app。
可选地,系统应用文件包括:
该系统应用的apk可执行文件和dex校验文件。
本发明实施例提供了一种用于在终端设备上卸载系统应用的装置。通过该装置,可以使得用于存储系统应用文件的目录属性为可读,进而读取系统文件并输出给用户,用户可对系统应用文件发出删除指令,将对应系统应用文件在操作系统的文件目录中删除,以达到删除系统应用的目的,解决了传统的操作系统中对于系统应用不能删除的问题,减少流氓软件对于终端的CPU资源的占用,提高运行速度、可节省终端的存储空间、减少流氓软件对内存的占用,并消除流氓软件造成的后台联网下载、吸费、窃取用户信息等安全问题,给用户提供安全保障。
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非 另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的终端设备卸载系统应用的装置中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。
例如,图4示出了可以实现根据本发明的在终端设备上卸载系统应用的方法的计算设备。该计算设备传统上包括处理器410和以存储器420形式的计算机程序产品或者计算机可读介质。存储器420可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器420具有用于执行上述方法中的任何方法步骤的程序代码431的存储空间430。例如,用于程序代码的存储空间430可以包括分别用于实现上面的方法中的各种步骤的各个程序代码431。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为如参考图5所述的便携式或者固定存储单元。该存储单元可以具有与图4的计算设备中的存储器420类似布置的存储段、存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括计算机可读代码431’,即可以由例如诸如410之类的处理器读取的代码,这些代码当由计算设备运行时,导致该计算设备执行上面所描述的方法中的各个步骤。
本文中所称的“一个实施例”、“实施例”或者“一个或者多个实施例”意味着,结合实施例描述的特定特征、结构或者特性包括在本发明的至少一个实施例中。此外,请注意,这里“在一个实施例中”的词语例子不一定全指同一个实施例。
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利 要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。
此外,还应当注意,本说明书中使用的语言主要是为了可读性和教导的目的而选择的,而不是为了解释或者限定本发明的主题而选择的。因此,在不偏离所附权利要求书的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。对于本发明的范围,对本发明所做的公开是说明性的,而非限制性的,本发明的范围由所附权利要求书限定。

Claims (22)

  1. 一种在终端设备上卸载系统应用的方法,包括:
    执行指定指令,修改操作系统的文件目录属性为可读,其中,所述文件目录下存储有系统应用文件;
    读取所述文件目录下存储的系统应用文件,并将读取的所述系统应用文件标识输出给用户;
    接收所述用户发出的删除指定系统应用的删除指令,根据所述删除指令在所述文件目录中删除对应的指定系统应用文件。
  2. 根据权利要求1所述的方法,其中,所述修改操作系统的文件目录属性为可读,包括:
    检测是否具有root权限;
    当不具有root权限时,获取root权限;
    利用root权限执行指定指令,修改操作系统的文件目录属性。
  3. 根据权利要求2所述的方法,其中,所述获取root权限,包括:
    通过调用预设工具来进行root权限的获取,且当检查到当前用户的ID级别为预设级别时,确定已经成功获取root权限。
  4. 根据权利要求1至3任一项所述的方法,其中,所述将读取的所述系统应用文件标识输出给用户,包括:
    根据读取的所述系统应用的文件对每个系统应用分配标识,所述标识包括可卸载、谨慎卸载、不可卸载;
    将具有可卸载和谨慎卸载标识的系统应用文件输出给用户。
  5. 根据权利要求4所述的方法,其中,当所述删除指令指示删除的系统应用的标识为谨慎卸载时,在所述接收所述用户发出的删除指定系统应用的删除指令之后,还包括:
    提示用户该系统应用为谨慎卸载的应用;
    根据用户输入的执行指令确定是否继续执行卸载操作。
  6. 根据权利要求1至5任一项所述的方法,其中,在根据所述删除指令在所述文件目录中删除对应的指定系统应用文件之前,还包括:
    通过备份指令将所述指定系统应用文件存储到指定终端路径中。
  7. 根据权利要求6所述的方法,其中,所述备份指令为adb cat命令。
  8. 根据权利要求6或7所述的方法,其中,在根据所述删除指令在所述文件目 录中删除对应的指定系统应用文件之后,还包括:
    将所述指定终端路径下的指定系统应用的文件拷贝到所述文件目录中,并将该指定系统应用的数据文件还原到本地。
  9. 根据权利要求1至8任一项所述的方法,其中,所述指定指令为su mount remount命令,所述文件目录为/data/system/app。
  10. 根据权利要求1至9任一项所述的方法,其中,所述系统应用文件包括:
    该系统应用的apk可执行文件和dex校验文件。
  11. 一种用于在终端设备上卸载系统应用的装置,包括:
    第一指令执行模块,配置为执行指定指令,修改操作系统的文件目录属性为可读,其中,所述文件目录下存储有系统应用文件;
    文件读取模块,配置为读取所述文件目录下存储的系统应用文件;
    文件输出模块,配置为将读取的所述系统应用文件标识输出给用户;
    指令接收模块,配置为接收所述用户发出的删除指定系统应用的删除指令;
    第二指令执行模块,配置为根据所述删除指令在所述文件目录中删除对应的指定系统应用文件。
  12. 根据权利要求11所述的装置,其中,所述第一指令执行模块包括:
    权限检测单元,配置为检测是否具有root权限;
    权限获取单元,配置为当所述权限检测单元检测到不具有root权限时,获取root权限;
    第一指令执行单元,配置为利用root权限执行指定指令,修改操作系统的文件目录属性。
  13. 根据权利要求12所述的装置,其中,所述权限获取单元还配置为通过调用预设工具来进行root权限的获取,且当检查到当前用户的ID级别为预设级别时,确定已经成功获取root权限。
  14. 根据权利要求11至13任一项所述的装置,其中,所述文件输出模块包括:
    标识分配单元,配置为根据读取的所述系统应用的文件对每个系统应用分配标识,所述标识包括可卸载、谨慎卸载、不可卸载;
    输出单元,配置为将具有可卸载和谨慎卸载标识的系统应用文件输出给用户。
  15. 根据权利要求14所述的装置,其中,所述装置还包括:
    提示模块,配置为当所述删除指令指示删除的系统应用的标识为谨慎卸载时,提示用户该系统应用为谨慎卸载的应用,并根据用户输入的执行指令确定是否继续执行卸载操作。
  16. 根据权利要求11至15任一项所述的装置,其中,所述装置还包括:
    备份模块,配置为通过备份指令将所述指定系统应用文件存储到指定终端路径中。
  17. 根据权利要求16所述的装置,其中,所述备份指令为adb cat命令。
  18. 根据权利要求16或17所述的装置,其中,所述装置还包括:
    文件还原模块,配置将所述指定终端路径下的指定系统应用的文件拷贝到所述文件目录中,并将该指定系统应用的数据文件还原到本地。
  19. 根据权利要求11至18任一项所述的装置,其中,所述指定指令为su mount remount命令,所述文件目录为所述文件目录为/data/system/app。
  20. 根据权利要求11至19任一项所述的装置,其中,所述系统应用文件包括:
    该系统应用的apk可执行文件和dex校验文件。
  21. 一种计算机程序,包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据权利要求1至10中的任一个所述的在终端设备上卸载系统应用的方法。
  22. 一种计算机可读介质,其中存储了如权利要求21所述的计算机程序。
PCT/CN2014/087711 2013-11-01 2014-09-28 一种终端设备卸载系统应用的方法和装置 WO2015062389A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310535005.X 2013-11-01
CN201310535005.XA CN103631617A (zh) 2013-11-01 2013-11-01 一种终端设备卸载系统应用的方法和装置

Publications (1)

Publication Number Publication Date
WO2015062389A1 true WO2015062389A1 (zh) 2015-05-07

Family

ID=50212714

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/087711 WO2015062389A1 (zh) 2013-11-01 2014-09-28 一种终端设备卸载系统应用的方法和装置

Country Status (2)

Country Link
CN (1) CN103631617A (zh)
WO (1) WO2015062389A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109446166A (zh) * 2018-09-03 2019-03-08 平安普惠企业管理有限公司 文件目录的检测方法、计算机可读存储介质及终端设备
CN116737258A (zh) * 2022-09-30 2023-09-12 荣耀终端有限公司 卸载应用的方法及相关装置

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103631617A (zh) * 2013-11-01 2014-03-12 北京奇虎科技有限公司 一种终端设备卸载系统应用的方法和装置
CN104182255B (zh) * 2014-08-20 2017-11-21 青岛海信宽带多媒体技术有限公司 一种系统应用的库文件升级方法及终端
CN104239041B (zh) * 2014-09-03 2019-04-30 北京数字天域科技有限责任公司 一种生成处理方案和配置的方法和装置
CN104331307B (zh) * 2014-10-23 2017-12-12 北京奇虎科技有限公司 一种卸载预装应用的方法和系统
CN104573093B (zh) * 2015-01-29 2018-05-29 广东欧珀移动通信有限公司 一种管理文件目录的方法和装置
CN104991948A (zh) * 2015-07-14 2015-10-21 谢蓓 一种安卓手机的文件删除提示方法及系统
CN106406919A (zh) * 2015-07-27 2017-02-15 青岛海信移动通信技术股份有限公司 一种终端设备预装应用的管理方法和终端设备
CN105468411A (zh) * 2015-11-25 2016-04-06 北京金山安全软件有限公司 一种应用程序的处理方法、装置及电子设备
CN105653264A (zh) * 2015-12-24 2016-06-08 北京奇虎科技有限公司 在终端设备上的系统处理方法及装置
CN105446787B (zh) * 2015-12-30 2018-07-27 广东欧珀移动通信有限公司 一种应用程序的删除方法和装置
CN106934277A (zh) * 2015-12-30 2017-07-07 北京金山安全软件有限公司 一种应用程序检测方法、装置和终端
CN105760788A (zh) * 2016-02-05 2016-07-13 青岛海信移动通信技术股份有限公司 一种数据保护方法和装置
CN108182070B (zh) * 2016-12-08 2020-11-24 北京京东尚科信息技术有限公司 定制安卓系统rom的方法、装置及终端设备
CN106776148A (zh) * 2016-12-30 2017-05-31 维沃移动通信有限公司 一种应用程序的试用方法及移动终端
CN108170854A (zh) * 2018-01-19 2018-06-15 广东欧珀移动通信有限公司 文件清理方法、装置、存储介质及移动终端
CN108763357B (zh) * 2018-05-16 2022-04-22 Oppo广东移动通信有限公司 文件处理方法及相关装置
CN110347434A (zh) * 2019-05-31 2019-10-18 口碑(上海)信息技术有限公司 一种针对计算设备应用的处理方法以及装置
CN117724796A (zh) * 2024-02-07 2024-03-19 国家超级计算天津中心 基于工具栈的超级计算机控制方法、装置、设备和介质

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103631617A (zh) * 2013-11-01 2014-03-12 北京奇虎科技有限公司 一种终端设备卸载系统应用的方法和装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521031B (zh) * 2011-12-13 2014-11-05 华为终端有限公司 移动终端预置应用程序的管理方法和移动终端

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103631617A (zh) * 2013-11-01 2014-03-12 北京奇虎科技有限公司 一种终端设备卸载系统应用的方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PINGPING, DANDAN: "Manage Your Application Entering the World of Android APK Document", COMPUTER FUN, 15 October 2013 (2013-10-15), pages 66 - 67 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109446166A (zh) * 2018-09-03 2019-03-08 平安普惠企业管理有限公司 文件目录的检测方法、计算机可读存储介质及终端设备
CN109446166B (zh) * 2018-09-03 2023-11-17 国信金宏信息咨询有限责任公司 文件目录的检测方法、计算机可读存储介质及终端设备
CN116737258A (zh) * 2022-09-30 2023-09-12 荣耀终端有限公司 卸载应用的方法及相关装置

Also Published As

Publication number Publication date
CN103631617A (zh) 2014-03-12

Similar Documents

Publication Publication Date Title
WO2015062389A1 (zh) 一种终端设备卸载系统应用的方法和装置
US8880736B2 (en) Methods and systems for archiving and restoring securely installed applications on a computing device
US20160232374A1 (en) Permission control method and apparatus
USRE48311E1 (en) Apparatus and method for running multiple instances of a same application in mobile devices
WO2015030972A1 (en) Redirecting local storage to cloud storage
CN107209678B (zh) 用于移动设备的自适应克隆的系统和方法
US10216510B2 (en) Silent upgrade of software with dependencies
WO2016019893A1 (zh) 应用安装的方法和装置
CN110780930B (zh) 启动Android系统的方法、装置、电子设备及存储介质
WO2016183951A1 (zh) 一种系统升级方法及终端
US11269663B2 (en) Method and apparatus for adapting handle device to third-party application, and storage medium
WO2014089734A1 (zh) 终端和应用程序恢复方法
AU2016200072B2 (en) Apparatus and method for running multiple instances of the same application in mobile devices
CN111782416A (zh) 数据上报方法、装置、系统、终端及计算机可读存储介质
CN104035842A (zh) 一种删除和恢复内置应用程序的方法
CN107135462B (zh) Uefi固件的蓝牙配对方法及其计算系统
CN104036194A (zh) 一种应用程序中泄露隐私数据的漏洞检测方法及装置
CN111079125A (zh) 一种应用程序调用第三方库动态提升权限的方法及装置
CN103605538A (zh) 一种安装软件的方法和装置
WO2014012361A1 (zh) 一种创建外部设备控制界面的方法及装置
CN106484779B (zh) 文件操作方法及装置
US9513928B2 (en) Method of operating multiple operating systems and the electronic device thereof
US20180341426A1 (en) Method and device for clearing data and electronic device
CN111400091B (zh) 恢复出厂设置方法、恢复出厂设置装置及移动终端
US9887979B1 (en) Systems and methods for enabling users to launch applications without entering authentication credentials

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14858950

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14858950

Country of ref document: EP

Kind code of ref document: A1