Virus deletion method and device and electronic equipment

A technology of electronic equipment and deletion method, which is applied in computer security devices, electronic digital data processing, software deployment, etc. It can solve problems such as missing command sets, inability to achieve anti-virus, and inability for users to uninstall applications directly, so as to improve the success rate.

Inactive Publication Date: 2018-11-27
BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing Android operating system, part of the command set of the Linux operating system is missing. In the Android client with root authority, in the existing related technologies, only by guiding the user to uninstall the application and delete the virus file, some stubborn Because the Trojan horse virus is registered as a device manager, or the read and write permissions of the virus file are modified, the user cannot directly uninstall the application, and the effect of complete antivirus cannot be achieved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virus deletion method and device and electronic equipment
  • Virus deletion method and device and electronic equipment
  • Virus deletion method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0039] The term "and / or" in this article is just an association relationship describing associated objects, which means that there can be three relationships, for example, A and / or B can mean: A exists alone, A and B exist simultaneously, and there exists alone B these three situations. In addition, the character " / " in this article generally indicates that the contextual objects are an "or" relationship.

[0040] figure 1 It is a flowchart of an embodiment of the deletion method ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virus deletion method and device and electronic equipment. The virus deletion method includes the steps that whether a Trojan virus application exists in the electronic equipment or not is detected; when the highest authority of an operating system installed in the electronic equipment is in an open state, an instruction set of a command-language interpreter is extended by loading a toolbox; instructions in the extended instruction set are used for deleting the Trojan virus application. The virus deletion method and device and the electronic equipment can increase thesuccess rate of Trojan virus deletion.

Description

technical field [0001] The present application relates to the technical field of mobile Internet applications, in particular to a virus deletion method, device and electronic equipment. Background technique [0002] The Android (Android) operating system is a free and open-source operating system based on the Linux operating system, which is mainly used in mobile devices, such as smart phones and tablet computers. [0003] In the existing Android operating system, part of the command set of the Linux operating system is missing. In the Android client with root authority, in the existing related technologies, only by guiding the user to uninstall the application and delete the virus file, some stubborn Because the Trojan horse virus is registered as a device manager, or the read and write permissions of the virus file are modified, the user cannot directly uninstall the application, and the effect of complete antivirus cannot be achieved. Contents of the invention [0004]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F8/61
CPCG06F8/62G06F21/568
Inventor 陈经浩
Owner BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products