Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious application processing method and apparatus, and terminal

A malicious application program and application program technology, applied in the computer field, can solve problems such as failed flashing, waste of storage space, inability to uninstall system-level malware, etc., to achieve the effect of saving space and memory and improving efficiency

Active Publication Date: 2016-06-29
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, it has been found in practice that when the user enables the factory reset mode in the terminal, it can only uninstall the application program APP installed by the user in the terminal, but cannot uninstall the system-level malware pre-installed in the terminal, resulting in a waste of storage space; In addition, flashing has relatively high technical threshold requirements for users. When the user flashes the phone by himself, the flashing fails, and the terminal after flashing destroys the original software flashing and ROOT logo set by the manufacturer, and the terminal will no longer enjoy the manufacturer's warranty. business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious application processing method and apparatus, and terminal
  • Malicious application processing method and apparatus, and terminal
  • Malicious application processing method and apparatus, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0043] The terms "first", "second" and "third" (if any) and the like in the description and claims of the present invention and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the term "comprise", as well as any variations thereof, is intended to cover a non-exclus...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a malicious application processing method and apparatus, and a terminal. The method comprises: when it is detected that a terminal is in a first application erasure mode, acquiring an APK signature of a system application installation package; if it is determined that the APK signature is an illegal manufacturer signature, loading identification information of the system application installation package corresponding to the APK signature into a blacklist file of the terminal; and when it is detected that the terminal is in a second application erasure mode, searching for and erasing the system application installation package corresponding to the identification information in the blacklist file. With adoption of the technical scheme provided by the present invention, spatial memory of the terminal can be saved, and efficiency of erasing malicious applications is improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method, device and terminal for processing malicious applications. Background technique [0002] At present, in order to promote the APPs developed by themselves, many application program operators often seek terminal sales vendors to install various application programs in the sales terminals. However, the user cannot uninstall the various APPs that are preinstalled in the terminal. In order to clear the pre-installed malicious software APP in the terminal, the user can clear the malicious software APP by enabling the factory reset mode in the terminal or by flashing the phone. [0003] However, it has been found in practice that when the user enables the factory reset mode in the terminal, it can only uninstall the application program APP installed by the user in the terminal, but cannot uninstall the system-level malware pre-installed in the terminal, resulting in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51G06F21/56
CPCG06F21/51G06F21/568G06F2221/033
Inventor 谭杨杨泽星何从华
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products