[go: up one dir, main page]

CN105468423B - Device is deleted using delet method and application - Google Patents

Device is deleted using delet method and application Download PDF

Info

Publication number
CN105468423B
CN105468423B CN201511031247.0A CN201511031247A CN105468423B CN 105468423 B CN105468423 B CN 105468423B CN 201511031247 A CN201511031247 A CN 201511031247A CN 105468423 B CN105468423 B CN 105468423B
Authority
CN
China
Prior art keywords
application
function
detection result
detection
subroutine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201511031247.0A
Other languages
Chinese (zh)
Other versions
CN105468423A (en
Inventor
黄宏用
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201511031247.0A priority Critical patent/CN105468423B/en
Publication of CN105468423A publication Critical patent/CN105468423A/en
Application granted granted Critical
Publication of CN105468423B publication Critical patent/CN105468423B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/62Uninstallation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)
  • Stored Programmes (AREA)

Abstract

本发明提供一种应用删除方法,其包括:接收用户的应用删除请求,并根据应用删除请求,屏蔽设定应用的权限和功能;在屏蔽设定应用的权限和功能的终端系统中运行预设检测程序,以获取相应的检测结果;如检测结果为系统正常,则删除设定应用;如检测结果为系统异常,则解除对设定应用的权限和功能的屏蔽。本发明还提供一种应用删除装置,本发明的应用删除方法及应用删除装置在屏蔽设定应用的功能和权限后运行预设检测程序,通过检测结果是否为系统正常来判断设定应用是否能被删除,从而提高了应用删除的准确性。

The present invention provides an application deletion method, which includes: receiving a user's application deletion request, and according to the application deletion request, shielding and setting the authority and function of the application; Check the program to obtain the corresponding test results; if the test result shows that the system is normal, delete the setting application; if the test result shows that the system is abnormal, unblock the permissions and functions of the setting application. The present invention also provides an application deletion device. The application deletion method and the application deletion device of the present invention run a preset detection program after shielding the functions and permissions of the set application, and judge whether the set application can be set by checking whether the system is normal or not. is removed, which improves the accuracy of app removal.

Description

应用删除方法及应用删除装置Application deletion method and application deletion device

技术领域technical field

本发明涉及通信领域,特别是涉及一种应用删除方法及应用删除装置。The present invention relates to the communication field, in particular to an application deletion method and an application deletion device.

背景技术Background technique

随着科技的进步,手机、平板电脑等智能移动设备的功能越来越多,其上安装的应用也越来越多。With the advancement of technology, smart mobile devices such as mobile phones and tablet computers have more and more functions, and more and more applications are installed on them.

然而,这些应用往往大量占用智能移动设备的内存,使运行速度变慢。用户在清理这些应用时,无法有效的分辨哪些应用可以删除,哪些应用不能删除。例如,如果不小心删除系统应用,会导致系统无法启动、系统崩溃等情况;还有一些应用被删除后,会使其他应用的一些功能无法实现。However, these applications often occupy a large amount of memory of the smart mobile device, making the running speed slow down. When cleaning these applications, the user cannot effectively distinguish which applications can be deleted and which applications cannot be deleted. For example, if a system application is accidentally deleted, the system will fail to start, the system will crash, etc.; and some applications will make some functions of other applications unavailable after being deleted.

故有必要提供一种能有效判断应用是否能删除,从而提高应用删除准确性的应用删除方法。Therefore, it is necessary to provide an application deletion method that can effectively determine whether an application can be deleted, thereby improving the accuracy of application deletion.

发明内容Contents of the invention

本发明实施例提供一种可以有效判断应用能否删除,从而提高应用删除准确性的应用删除方法及应用删除装置;以解决现有的应用删除方法及应用删除装置盲目删除应用的技术问题。Embodiments of the present invention provide an application deletion method and application deletion device that can effectively determine whether an application can be deleted, thereby improving the accuracy of application deletion; to solve the technical problem of blindly deleting applications in the existing application deletion method and application deletion device.

本发明实施例提供一种应用删除方法,其包括:An embodiment of the present invention provides a method for deleting an application, which includes:

接收用户的应用删除请求,并根据应用删除请求,屏蔽设定应用的权限和功能;Receive the user's application deletion request, and block the permissions and functions of the application according to the application deletion request;

在屏蔽设定应用的权限和功能的终端系统中运行预设检测程序,以获取相应的检测结果;Run the preset detection program in the terminal system that blocks the permissions and functions of the set application to obtain the corresponding detection results;

如检测结果为系统正常,则删除设定应用;If the test result shows that the system is normal, delete the setting application;

如检测结果为系统异常,则解除对设定应用的权限和功能的屏蔽。If the detection result is that the system is abnormal, the permission and function of the set application will be unblocked.

本发明实施例还提供一种应用删除装置,其包括:An embodiment of the present invention also provides an application deletion device, which includes:

权限和功能屏蔽模块,用于接收用户的应用删除请求,并根据应用删除请求,屏蔽设定应用的权限和功能;The permission and function shielding module is used to receive the user's application deletion request, and block the permission and function of the set application according to the application deletion request;

检测结果获取模块,用于在屏蔽设定应用的权限和功能的终端系统中运行预设检测程序,以获取相应的检测结果;The detection result acquisition module is used to run the preset detection program in the terminal system that shields the permissions and functions of the set application, so as to obtain the corresponding detection result;

第一设定应用删除模块,用于在检测结果为系统正常时,删除设定应用;The first setting application deletion module is used to delete the setting application when the detection result shows that the system is normal;

权限和功能屏蔽解除模块,用于在检测结果为系统异常时,解除对设定应用的权限和功能的屏蔽。The permission and function shielding release module is used to release the shielding of the permission and function of the set application when the detection result is that the system is abnormal.

相对于现有技术的应用删除方法及应用删除装置,本发明中的应用删除方法及应用删除装置在屏蔽设定应用的功能和权限后运行一套预设检测程序,通过检测结果是否为系统正常来判断设定应用是否能被删除,从而提高了应用删除的准确性;解决了现有的应用删除方法及应用删除装置盲目删除应用的技术问题。Compared with the application deletion method and application deletion device in the prior art, the application deletion method and application deletion device in the present invention run a set of preset detection programs after shielding and setting the functions and permissions of the application, and check whether the system is normal through the detection result. Determine whether the set application can be deleted, thereby improving the accuracy of application deletion; solving the technical problem of blindly deleting applications in the existing application deletion method and application deletion device.

附图说明Description of drawings

图1为本发明的应用删除方法的第一优选实施例的流程图;FIG. 1 is a flowchart of a first preferred embodiment of the application deletion method of the present invention;

图2为本发明的应用删除方法的第二优选实施例的流程图;FIG. 2 is a flowchart of a second preferred embodiment of the application deletion method of the present invention;

图3为本发明的应用删除装置的第一优选实施例的结构示意图;FIG. 3 is a schematic structural diagram of a first preferred embodiment of the application deletion device of the present invention;

图4为本发明的应用删除装置的第二优选实施例的结构示意图;FIG. 4 is a schematic structural diagram of a second preferred embodiment of the application deletion device of the present invention;

图5为本发明的应用删除方法及应用删除装置的具体实施例的应用删除示意图。Fig. 5 is a schematic diagram of application deletion of a specific embodiment of the application deletion method and application deletion device of the present invention.

具体实施方式Detailed ways

请参照图式,其中相同的组件符号代表相同的组件,本发明的原理是以实施在一适当的运算环境中来举例说明。以下的说明是基于所例示的本发明具体实施例,其不应被视为限制本发明未在此详述的其它具体实施例。Referring to the drawings, wherein like reference numerals represent like components, the principles of the present invention are exemplified when implemented in a suitable computing environment. The following description is based on illustrated specific embodiments of the invention, which should not be construed as limiting other specific embodiments of the invention not described in detail herein.

在以下的说明中,本发明的具体实施例将参考由一部或多部计算机所执行之作业的步骤及符号来说明,除非另有述明。因此,其将可了解到这些步骤及操作,其中有数次提到为由计算机执行,包括了由代表了以一结构化型式中的数据之电子信号的计算机处理单元所操纵。此操纵转换该数据或将其维持在该计算机之内存系统中的位置处,其可重新配置或另外以本领域技术人员所熟知的方式来改变该计算机之运作。该数据所维持的数据结构为该内存之实体位置,其具有由该数据格式所定义的特定特性。但是,本发明原理以上述文字来说明,其并不代表为一种限制,本领域技术人员将可了解到以下所述的多种步骤及操作亦可实施在硬件当中。In the following description, specific embodiments of the present invention are described with reference to steps and symbols for operations performed by one or more computers, unless otherwise stated. Accordingly, it will be understood that the steps and operations, which at times are referred to as being performed by a computer, include manipulation by a computer processing unit of electronic signals representing data in a structured form. This manipulation transforms the data or maintains it at a location in the computer's memory system that can reconfigure or otherwise alter the operation of the computer in a manner well known to those skilled in the art. The data structures maintained by the data are physical locations in the memory that have specific characteristics defined by the data format. However, the principles of the present invention are described in the above words, which are not meant to be a limitation. Those skilled in the art will understand that the various steps and operations described below can also be implemented in hardware.

本发明的应用删除装置可使用各种电子设备进行实施,该电子设备包括但不限于个人计算机、服务器计算机、手持式或膝上型设备、移动设备(比如移动电话、个人数字助理、媒体播放器等等)、多处理器系统、消费型电子设备、小型计算机、大型计算机、包括上述任意系统或设备的分布式计算环境,等等。但该电子设备优选为智能移动设备,以便提高智能移动设备应用删除的准确性。The application removal apparatus of the present invention can be implemented using various electronic devices, including but not limited to personal computers, server computers, handheld or laptop devices, mobile devices (such as mobile phones, personal digital assistants, media players, etc.) etc.), multiprocessor systems, consumer electronics devices, minicomputers, mainframe computers, distributed computing environments including any of the above systems or devices, and the like. However, the electronic device is preferably a smart mobile device, so as to improve the accuracy of application deletion of the smart mobile device.

实施例一Embodiment one

请参照图1,图1为本发明的应用删除方法的第一优选实施例的流程图。该方法用于对终端进行应用删除,其中该终端可为手机、平板电脑等智能移动设备,本优选实施例的应用删除方法包括:Please refer to FIG. 1 , which is a flow chart of a first preferred embodiment of the application deletion method of the present invention. The method is used to delete an application from a terminal, where the terminal can be a smart mobile device such as a mobile phone or a tablet computer. The method for deleting an application in this preferred embodiment includes:

步骤S101,接收用户的应用删除请求,并根据应用删除请求,屏蔽设定应用的权限和功能;Step S101, receiving the application deletion request from the user, and blocking the permissions and functions of the set application according to the application deletion request;

步骤S102,在屏蔽设定应用的权限和功能的终端系统中运行预设检测程序,以获取相应的检测结果;Step S102, running a preset detection program in the terminal system that shields the permissions and functions of the set application to obtain corresponding detection results;

步骤S103,判断检测结果是否为系统正常;Step S103, judging whether the detection result indicates that the system is normal;

步骤S104,如检测结果为系统正常,则删除设定应用;Step S104, if the detection result is that the system is normal, delete the setting application;

步骤S105,如检测结果为系统异常,则解除对设定应用的权限和功能的屏蔽。Step S105, if the detection result is that the system is abnormal, unblock the permissions and functions of the set application.

下面详细说明本优选实施例的应用删除方法的各步骤的具体流程。The specific flow of each step of the application deletion method in this preferred embodiment will be described in detail below.

在步骤S101中,终端接收用户的应用删除请求,并根据应用删除请求,屏蔽设定应用的权限和功能。举例来说,用户发现由于手机安装的应用过多导致手机运行缓慢,故想删除一些应用释放内存空间,比如植物大战僵尸应用。手机接收到植物大战僵尸应用删除请求后,将植物大战僵尸应用的权限和功能屏蔽,即系统无法访问植物大战僵尸应用,也无法运行该应用。这样相当于删除了植物大战僵尸应用,从而可以进一步判断系统是否受到影响。随后转入步骤S102。In step S101, the terminal receives an application deletion request from a user, and blocks permissions and functions of the set application according to the application deletion request. For example, the user finds that the mobile phone runs slowly due to too many applications installed on the mobile phone, so he wants to delete some applications to free up memory space, such as the Plants vs. Zombies application. After receiving the request to delete the Plants vs. Zombies app, the mobile phone blocks the permissions and functions of the Plants vs. Zombies app, that is, the system cannot access the Plants vs. Zombies app, nor can it run the app. This is equivalent to deleting the Plants vs. Zombies application, which can further determine whether the system is affected. Then go to step S102.

在步骤S102中,屏蔽设定应用的权限和功能后,终端将运行一套预设检测程序,以获取相应的检测结果。该预设检测程序包括但不限于重启子程序、应用检测子程序以及系统检测子程序中至少一个。其中,重启子程序用于判断屏蔽设定应用的权限和功能后,终端系统重新启动后能否运行;应用检测子程序用于判断屏蔽设定应用的权限和功能后,终端中其他应用是否能正常启动且功能实现不受影响;系统检测子程序用于判断屏蔽设定应用的权限和功能后,系统能否正常运行,是否会出现死机情况。在这些子程序中,如预设检测程序中的任一子程序运行异常,则检测结果为系统异常;如预设检测程序中的所有子程序均运行正常,则检测结果为系统正常。举例来说,如果将手机定位应用的权限和功能屏蔽,由于微信中的分享实时位置功能需要调用手机定位应用中的相关模块来实现,因此会导致微信的分享实时位置功能无法实现。此时当运行应用检测子程序对微信进行分享实时位置功能检测时会发生中断,这样的中断就表明检测结果为系统异常。随后转入步骤S103。In step S102, after shielding and setting the permissions and functions of the application, the terminal will run a set of preset detection programs to obtain corresponding detection results. The preset detection program includes but not limited to at least one of a restart subroutine, an application detection subroutine and a system detection subroutine. Among them, the restart subroutine is used to determine whether the terminal system can run after restarting after the permission and function of the application are shielded and set; Normal startup and function realization are not affected; the system detection subroutine is used to judge whether the system can run normally and whether there will be a crash after shielding the permissions and functions of the set application. Among these subroutines, if any subroutine in the preset detection program runs abnormally, the detection result is system abnormality; if all the subroutines in the preset detection program run normally, the detection result is system normal. For example, if the permissions and functions of the mobile positioning application are blocked, since the real-time location sharing function in WeChat needs to be implemented by calling the relevant modules in the mobile positioning application, the real-time location sharing function of WeChat will not be realized. At this time, an interruption will occur when the application detection subroutine is run to detect the real-time location sharing function of WeChat. Such an interruption indicates that the detection result is a system abnormality. Then go to step S103.

在步骤S103中,终端判断检测结果是否为系统正常。如检测结果为系统正常,则转入步骤S104;如检测结果为系统异常,则转入步骤S105。In step S103, the terminal judges whether the detection result indicates that the system is normal. If the detection result is that the system is normal, then go to step S104; if the detection result is that the system is abnormal, then go to step S105.

在步骤S104中,如步骤S103中检测结果为系统正常,则说明删除设定应用不会对终端系统的正常运行造成影响,因此可以删除设定应用;In step S104, if the detection result in step S103 is that the system is normal, it means that deleting the setting application will not affect the normal operation of the terminal system, so the setting application can be deleted;

在步骤S105中,如步骤S103中检测结果为系统异常,则说明删除设定应用会对终端系统的正常运行造成影响,因此要解除对设定应用的权限和功能的屏蔽。In step S105, if the detection result in step S103 is that the system is abnormal, it means that deleting the setting application will affect the normal operation of the terminal system, so the permission and function shielding of the setting application should be released.

这样即完成了本优选实施例的应用删除方法的应用删除过程。In this way, the application deletion process of the application deletion method in this preferred embodiment is completed.

本优选实施例的应用删除方法在屏蔽设定应用的权限和功能的终端系统中运行预设检测程序,通过检测结果是否为系统正常来决定设定应用是否被删除,从而提高了应用删除的准确性。The application deletion method of this preferred embodiment runs a preset detection program in the terminal system that shields the permissions and functions of the set application, and determines whether the set application is deleted by checking whether the test result is normal, thereby improving the accuracy of application deletion. sex.

实施例二Embodiment two

请参照图2,图2为本发明的应用删除方法的第二优选实施例的流程图。该方法用于对终端进行应用删除,其中该终端可为手机、平板电脑等智能移动设备,本优选实施例的应用删除方法包括:Please refer to FIG. 2 , which is a flowchart of a second preferred embodiment of the application deletion method of the present invention. The method is used to delete an application from a terminal, where the terminal can be a smart mobile device such as a mobile phone or a tablet computer. The method for deleting an application in this preferred embodiment includes:

步骤S201,接收用户的应用删除请求,并根据应用删除请求,屏蔽设定应用的权限和功能;Step S201, receiving the user's application deletion request, and blocking the permissions and functions of the application according to the application deletion request;

步骤S202,在屏蔽设定应用的权限和功能的终端系统中运行预设检测程序,以获取相应的检测结果;Step S202, running a preset detection program in the terminal system that shields the permissions and functions of the set application to obtain corresponding detection results;

步骤S203,判断检测结果是否为系统正常;Step S203, judging whether the detection result indicates that the system is normal;

步骤S204,如检测结果为系统异常,则解除对设定应用的权限和功能的屏蔽;Step S204, if the detection result is that the system is abnormal, unblock the permissions and functions of the set application;

步骤S205,如检测结果为系统正常,则获取设定应用的功能分类标识;Step S205, if the detection result is that the system is normal, obtain the function classification identification of the set application;

步骤S206,获取设定应用的功能分类标识对应的功能应用;Step S206, obtaining the functional application corresponding to the functional classification identifier of the set application;

步骤S207,判断设定应用的功能分类标识对应的功能应用个数是否大于1;Step S207, judging whether the number of function applications corresponding to the function classification identifier of the set application is greater than 1;

步骤S208,如功能分类标识对应的功能应用个数等于1,则显示设定应用的功能,并提示用户慎重删除;Step S208, if the number of function applications corresponding to the function classification identifier is equal to 1, display the function of the set application, and prompt the user to delete carefully;

步骤S209,如功能分类标识对应的功能应用个数大于1,则删除设定应用。Step S209, if the number of function applications corresponding to the function classification identifier is greater than 1, delete the setting application.

下面详细说明本优选实施例的应用删除方法的各步骤的具体流程。The specific flow of each step of the application deletion method in this preferred embodiment will be described in detail below.

在步骤S201中,终端接收用户的应用删除请求,并根据应用删除请求,屏蔽设定应用的权限和功能。举例来说,用户发现由于手机安装的应用过多导致手机运行缓慢,故想删除一些应用释放内存空间,比如植物大战僵尸应用。手机接收到植物大战僵尸应用删除请求后,将植物大战僵尸应用的权限和功能屏蔽,即系统无法访问植物大战僵尸应用,也无法运行该应用。这样相当于删除了植物大战僵尸应用,从而可以进一步判断系统是否受到影响。随后转入步骤S202。In step S201, the terminal receives an application deletion request from a user, and blocks permissions and functions of the set application according to the application deletion request. For example, the user finds that the mobile phone runs slowly due to too many applications installed on the mobile phone, so he wants to delete some applications to free up memory space, such as the Plants vs. Zombies application. After receiving the request to delete the Plants vs. Zombies app, the mobile phone blocks the permissions and functions of the Plants vs. Zombies app, that is, the system cannot access the Plants vs. Zombies app, nor can it run the app. This is equivalent to deleting the Plants vs. Zombies application, which can further determine whether the system is affected. Then go to step S202.

在步骤S202中,屏蔽设定应用的权限和功能后,终端将运行一套预设检测程序,以获取相应的检测结果。该预设检测程序包括但不限于重启子程序、应用检测子程序以及系统检测子程序中至少一个。其中,重启子程序用于判断屏蔽设定应用的权限和功能后,终端系统重新启动后能否运行;应用检测子程序用于判断屏蔽设定应用的权限和功能后,终端中其他应用是否能正常启动且功能实现不受影响;系统检测子程序用于判断屏蔽设定应用的权限和功能后,系统能否正常运行,是否会出现死机情况。在这些子程序中,如预设检测程序中的任一子程序运行异常,则检测结果为系统异常;如预设检测程序中的所有子程序均运行正常,则检测结果为系统正常。举例来说,如果将手机定位应用的权限和功能屏蔽,由于微信中的分享实时位置功能需要调用手机定位应用中的相关模块来实现,因此会导致微信的分享实时位置功能无法实现。此时当运行应用检测子程序对微信进行分享实时位置功能检测时会发生中断,这样的中断就表明检测结果为系统异常。随后转入步骤S203。In step S202, after shielding and setting the permissions and functions of the application, the terminal will run a set of preset detection programs to obtain corresponding detection results. The preset detection program includes but not limited to at least one of a restart subroutine, an application detection subroutine and a system detection subroutine. Among them, the restart subroutine is used to determine whether the terminal system can run after restarting after the permission and function of the application are shielded and set; Normal startup and function realization are not affected; the system detection subroutine is used to judge whether the system can run normally and whether there will be a crash after shielding the permissions and functions of the set application. Among these subroutines, if any subroutine in the preset detection program runs abnormally, the detection result is system abnormality; if all the subroutines in the preset detection program run normally, the detection result is system normal. For example, if the permissions and functions of the mobile positioning application are blocked, since the real-time location sharing function in WeChat needs to be implemented by calling the relevant modules in the mobile positioning application, the real-time location sharing function of WeChat will not be realized. At this time, an interruption will occur when the application detection subroutine is run to detect the real-time location sharing function of WeChat. Such an interruption indicates that the detection result is a system abnormality. Then go to step S203.

在步骤S203中,终端判断检测结果是否为系统正常。如检测结果为系统异常,则转入步骤S204;如检测结果为系统正常,则转入步骤S205。In step S203, the terminal judges whether the detection result indicates that the system is normal. If the detection result is that the system is abnormal, then proceed to step S204; if the detection result is that the system is normal, then proceed to step S205.

在步骤S204中,如步骤S203中检测结果为系统异常,则终端解除对设定应用的权限和功能的屏蔽,并对预设检测程序中运行异常的子程序进行提示。In step S204, if the detection result in step S203 is that the system is abnormal, the terminal releases the shielding of the permissions and functions of the set application, and prompts the abnormal subroutine in the preset detection program.

在步骤S205中,如步骤S203中检测结果为系统正常,则进一步获取设定应用的功能分类标识。在终端中往往存在各种各样的应用,这些应用有点实现相同功能,有的实现不同功能。为了区分这些实现不同功能的应用,可以对他们设置不同的功能分类标识,其中具有相同功能的应用则设置相同的功能分类标识。虽然步骤S203中检测结果为系统正常,但若终端不存在与设定应用具有相同功能的参照应用,则删除设定应用后,终端将缺失一项功能,因此为了进一步提高应用删除的准确性,需要获取设定应用的功能分类标识来进行进一步的应用删除判断。随后转入步骤206。In step S205, if the detection result in step S203 is that the system is normal, the function classification identifier of the setting application is further acquired. Various applications often exist in the terminal, some of these applications implement the same function, and some of these applications implement different functions. In order to distinguish these applications implementing different functions, different function classification identifiers may be set for them, and the same function classification identifiers may be set for applications with the same function. Although the detection result in step S203 is that the system is normal, if the terminal does not have a reference application with the same function as the set application, after deleting the set application, the terminal will lack a function. Therefore, in order to further improve the accuracy of application deletion, It is necessary to obtain the function classification identifier of the setting application for further application deletion judgment. Then go to step 206 .

在步骤S206中,终端根据步骤S205中得到的设定应用的功能分类标识,进一步获取其对应的功能应用。随后转入步骤S207。In step S206, the terminal further acquires the corresponding function application according to the function classification identifier of the setting application obtained in step S205. Then go to step S207.

在步骤S207中,终端判断设定应用的功能分类标识对应的功能应用个数是否大于1。如功能分类标识对应的功能应用个数等于1,则转入步骤S208;如功能分类标识对应的功能应用个数大于1,则转入步骤S209。In step S207, the terminal determines whether the number of function applications corresponding to the function classification identifier of the set application is greater than 1. If the number of function applications corresponding to the function classification identifier is equal to 1, proceed to step S208; if the number of function applications corresponding to the function classification identifier is greater than 1, proceed to step S209.

在步骤S208中,如步骤S207中功能分类标识对应的功能应用个数等于1,说明如果删掉设定应用,终端将无法实现设定应用能执行的功能,因此需显示设定应用的功能,并提示用户慎重删除。举例来说,终端具有杀毒功能的应用只有360安全卫士,如果用户要删掉360安全卫士,则终端应提示用户360安全卫士具有杀毒功能,如果删除,终端将失去保护,是否确定删除,从而保护了终端功能的完整性。In step S208, if the number of function applications corresponding to the function classification identifier in step S207 is equal to 1, it means that if the setting application is deleted, the terminal will not be able to implement the functions that the setting application can perform, so the functions of the setting application need to be displayed. And remind users to delete carefully. For example, only 360 Security Guard has the antivirus function on the terminal. If the user wants to delete 360 Security Guard, the terminal should prompt the user that 360 Security Guard has the antivirus function. If deleted, the terminal will lose protection. Are you sure to delete it to protect The integrity of the terminal function is guaranteed.

在步骤S209中,如步骤S207中功能分类标识对应的功能应用个数大于1,说明在终端中还存在其他应用与设定应用执行相同功能,因此删除设定应用。由于应用删除后往往会残留一些安装文件、快捷方式和注册表信息,残留的安装文件会浪费终端磁盘空间,残留的注册表信息会影响终端反应速度,因此有必要检测出这些残留信息,并把他们清除。In step S209, if the number of function applications corresponding to the function classification identifier in step S207 is greater than 1, it means that there are other applications in the terminal that perform the same function as the setting application, so the setting application is deleted. Since some installation files, shortcuts, and registry information are often left after the application is deleted, the remaining installation files will waste the disk space of the terminal, and the remaining registry information will affect the response speed of the terminal. Therefore, it is necessary to detect these residual information and save them. They clear.

这样即完成了本优选实施例的应用删除方法的应用删除过程。In this way, the application deletion process of the application deletion method in this preferred embodiment is completed.

本优选实施例的应用删除方法在预设检测程序的检测结果为系统正常的情况下,进一步通过判断是否存在其他应用与设定应用执行相同功能来删除设定应用,进一步提高了应用删除的准确性。In the application deletion method of this preferred embodiment, when the detection result of the preset detection program is that the system is normal, it further deletes the setting application by judging whether there are other applications performing the same function as the setting application, which further improves the accuracy of application deletion. sex.

实施例三Embodiment three

请参照图3,图3为本发明的应用删除装置的第一优选实施例的结构图。该装置用于对终端进行应用删除,其中该终端可为手机、平板电脑等智能移动设备,本优选实施例的应用删除装置30包括权限和功能屏蔽模块31、检测结果获取模块32、第一设定应用删除模块33及权限和功能屏蔽解除模块34。其中,权限和功能屏蔽模块31用于接收用户的应用删除请求,并根据应用删除请求,屏蔽设定应用的权限和功能;检测结果获取模块32用于在屏蔽设定应用的权限和功能的终端系统中运行预设检测程序,以获取相应的检测结果;第一设定应用删除模块33用于在检测结果为系统正常时,删除设定应用;权限和功能屏蔽解除模块34用于在检测结果为系统异常时,解除对设定应用的权限和功能的屏蔽。Please refer to FIG. 3 . FIG. 3 is a structural diagram of a first preferred embodiment of an application deletion device according to the present invention. The device is used to delete applications from terminals, where the terminals can be smart mobile devices such as mobile phones and tablet computers. The application deletion device 30 in this preferred embodiment includes a permission and function shielding module 31, a detection result acquisition module 32, a first device Define the application deletion module 33 and the permission and function mask release module 34. Among them, the authority and function shielding module 31 is used to receive the user's application deletion request, and according to the application deletion request, shield the authority and function of the set application; the detection result acquisition module 32 is used to shield the terminal of the set application authority and function Run the preset detection program in the system to obtain corresponding detection results; the first setting application deletion module 33 is used to delete the setting application when the detection result is that the system is normal; When the system is abnormal, unblock the permissions and functions of the set application.

本应用删除装置30在使用时,首先权限和功能屏蔽模块31接收用户的应用删除请求,并根据应用删除请求,屏蔽设定应用的权限和功能。举例来说,用户发现由于手机安装的应用过多导致手机运行缓慢,故想删除一些应用释放内存空间,比如植物大战僵尸应用。权限和功能屏蔽模块31接收到植物大战僵尸应用删除请求后,将植物大战僵尸应用的权限和功能屏蔽,即系统无法访问植物大战僵尸应用,也无法运行该应用。这样相当于删除了植物大战僵尸应用,从而可以进一步判断系统是否受到影响。随后调用检测结果获取模块32。When the application deletion device 30 is in use, the permission and function masking module 31 first receives the user's application deletion request, and blocks the permissions and functions of the set application according to the application deletion request. For example, the user finds that the mobile phone runs slowly due to too many applications installed on the mobile phone, so he wants to delete some applications to free up memory space, such as the Plants vs. Zombies application. The permission and function shielding module 31 shields the permissions and functions of the Plants vs. Zombies application after receiving the deletion request of the Plants vs. Zombies application, that is, the system cannot access the Plants vs. Zombies application, nor can it run the application. This is equivalent to deleting the Plants vs. Zombies application, which can further determine whether the system is affected. Then the detection result acquisition module 32 is called.

然后,屏蔽设定应用的权限和功能后,检测结果获取模块32将运行一套预设检测程序,以获取相应的检测结果。该预设检测程序包括但不限于重启子程序、应用检测子程序以及系统检测子程序中至少一个。其中,重启子程序用于判断屏蔽设定应用的权限和功能后,终端系统重新启动后能否运行;应用检测子程序用于判断屏蔽设定应用的权限和功能后,终端中其他应用是否能正常启动且功能实现不受影响;系统检测子程序用于判断屏蔽设定应用的权限和功能后,系统能否正常运行,是否会出现死机情况。在这些子程序中,如预设检测程序中的任一子程序运行异常,则检测结果为系统异常;如预设检测程序中的所有子程序均运行正常,则检测结果为系统正常。举例来说,如果权限和功能屏蔽模块31将手机定位应用的权限和功能屏蔽,由于微信中的分享实时位置功能需要调用手机定位应用中的相关模块来实现,因此会导致微信的分享实时位置功能无法实现。此时当运行应用检测子程序对微信进行分享实时位置功能检测时会发生中断,检测结果获取模块32检测到应用检测子程序终端,则得到系统异常的检测结果。Then, after shielding the permissions and functions of the set application, the detection result acquisition module 32 will run a set of preset detection programs to obtain corresponding detection results. The preset detection program includes but not limited to at least one of a restart subroutine, an application detection subroutine and a system detection subroutine. Among them, the restart subroutine is used to determine whether the terminal system can run after restarting after the permission and function of the application are shielded and set; Normal startup and function realization are not affected; the system detection subroutine is used to judge whether the system can run normally and whether there will be a crash after shielding the permissions and functions of the set application. Among these subroutines, if any subroutine in the preset detection program runs abnormally, the detection result is system abnormality; if all the subroutines in the preset detection program run normally, the detection result is system normal. For example, if the permission and function shielding module 31 shields the permissions and functions of the mobile positioning application, since the function of sharing real-time location in WeChat needs to be implemented by calling related modules in the mobile positioning application, it will cause the function of sharing real-time location in WeChat. can not achieve. At this time, an interruption will occur when running the application detection subroutine to detect the real-time location sharing function of WeChat. The detection result acquisition module 32 detects the terminal of the application detection subroutine, and then obtains the detection result of system abnormality.

如检测结果获取模块32得到的检测结果为系统正常,则说明删除设定应用不会对终端系统的正常运行造成影响,因此调用第一设定应用删除模块33删除设定应用。If the detection result obtained by the detection result acquisition module 32 is that the system is normal, it means that deleting the setting application will not affect the normal operation of the terminal system, so the first setting application deletion module 33 is called to delete the setting application.

如检测结果获取模块32得到的检测结果为系统异常,则说明删除设定应用会对终端系统的正常运行造成影响,因此调用权限和功能屏蔽解除模块34解除对设定应用的权限和功能的屏蔽。If the detection result obtained by the detection result acquisition module 32 is that the system is abnormal, it means that deleting the setting application will affect the normal operation of the terminal system, so the calling authority and function mask release module 34 is released to remove the authority and function shielding of the setting application .

这样即完成了本优选实施例的应用删除装置的应用删除过程。In this way, the application deletion process of the application deletion device in this preferred embodiment is completed.

本优选实施例的应用删除装置在屏蔽设定应用的权限和功能的终端系统中运行预设检测程序,通过检测结果是否为系统正常来决定设定应用是否被删除,从而提高了应用删除的准确性。The application deletion device in this preferred embodiment runs a preset detection program in the terminal system that shields the permissions and functions of the set application, and determines whether the set application is deleted by checking whether the test result is normal, thereby improving the accuracy of application deletion. sex.

实施例四Embodiment Four

请参照图4,图4为本发明的应用删除装置的第二优选实施例的结构图。该装置用于对终端进行应用删除,其中该终端可为手机、平板电脑等智能移动设备,本优选实施例的应用删除装置40包括权限和功能屏蔽模块41、检测结果获取模块42、权限和功能屏蔽解除模块43、异常子程序提示模块44、功能分类标识获取模块45、对应功能应用获取模块46、对应功能应用个数判断模块47、慎重删除提示模块48及第二设定应用删除模块49,第二设定应用删除模块49还包括残留信息检测单元491和残留信息删除单元492。Please refer to FIG. 4 . FIG. 4 is a structural diagram of a second preferred embodiment of the application deletion device of the present invention. The device is used to delete applications from terminals, where the terminals can be smart mobile devices such as mobile phones and tablet computers. The application deletion device 40 in this preferred embodiment includes a permission and function shielding module 41, a detection result acquisition module 42, and a permission and function Shield release module 43, abnormal subroutine prompt module 44, function classification identification acquisition module 45, corresponding function application acquisition module 46, corresponding function application number judgment module 47, careful deletion prompt module 48 and second setting application deletion module 49, The second setting application deletion module 49 further includes a residual information detection unit 491 and a residual information deletion unit 492 .

其中,权限和功能屏蔽模块41用于接收用户的应用删除请求,并根据应用删除请求,屏蔽设定应用的权限和功能;检测结果获取模块42用于在屏蔽设定应用的权限和功能的终端系统中运行预设检测程序,以获取相应的检测结果;权限和功能屏蔽解除模块43用于在检测结果为系统异常时,解除对设定应用的权限和功能的屏蔽;异常子程序提示模块44用于在检测结果为系统异常时,对预设检测程序中运行异常的子程序进行提示;功能分类标识获取模块45用于在检测结果为系统正常时,获取设定应用的功能分类标识;对应功能应用获取模块46用于获取设定应用的功能分类标识对应的功能应用;对应功能应用个数判断模块47用于判断设定应用的功能分类标识对应的功能应用个数是否大于1;慎重删除提示模块48用于在功能分类标识对应的功能应用个数等于1时,显示设定应用的功能,并提示用户慎重删除;第二设定应用删除模块49用于在功能分类标识对应的功能应用个数大于1时,删除设定应用。其中残留信息检测单元491用于检测设定应用的残留信息;残留信息删除单元492用于删除设定应用的残留信息。Among them, the authority and function shielding module 41 is used to receive the user's application deletion request, and according to the application deletion request, shield the authority and function of the set application; the detection result acquisition module 42 is used to shield the terminal of the set application authority and function Run the preset detection program in the system to obtain the corresponding detection results; the authority and function mask release module 43 is used to remove the authority and function shielding of the set application when the detection result is abnormal in the system; the abnormal subroutine prompt module 44 It is used to prompt the abnormal subroutine in the preset detection program when the detection result is abnormal in the system; the function classification identification acquisition module 45 is used to obtain the function classification identification of the set application when the detection result is normal in the system; The functional application acquisition module 46 is used to obtain the functional application corresponding to the function classification identification of the setting application; the corresponding function application number judgment module 47 is used to determine whether the number of functional applications corresponding to the function classification identification of the setting application is greater than 1; delete carefully The prompt module 48 is used to display the function of the setting application when the number of function applications corresponding to the function classification identification is equal to 1, and prompt the user to delete carefully; the second setting application deletion module 49 is used to delete the function application corresponding to the function classification identification. When the number is greater than 1, delete the setting application. The residual information detecting unit 491 is used to detect the residual information of the setting application; the residual information deleting unit 492 is used to delete the residual information of the setting application.

本应用删除装置40在使用时,首先权限和功能屏蔽模块41接收用户的应用删除请求,并根据应用删除请求,屏蔽设定应用的权限和功能。举例来说,用户发现由于手机安装的应用过多导致手机运行缓慢,故想删除一些应用释放内存空间,比如植物大战僵尸应用。权限和功能屏蔽模块41接收到植物大战僵尸应用删除请求后,将植物大战僵尸应用的权限和功能屏蔽,即系统无法访问植物大战僵尸应用,也无法运行该应用。这样相当于删除了植物大战僵尸应用,从而可以进一步判断系统是否受到影响。随后调用检测结果获取模块42。When the application deletion device 40 is in use, the permission and function masking module 41 first receives the user's application deletion request, and blocks the permissions and functions of the set application according to the application deletion request. For example, the user finds that the mobile phone runs slowly due to too many applications installed on the mobile phone, so he wants to delete some applications to free up memory space, such as the Plants vs. Zombies application. The permission and function shielding module 41 shields the permissions and functions of the Plants vs. Zombies application after receiving the deletion request of the Plants vs. Zombies application, that is, the system cannot access the Plants vs. Zombies application, nor can it run the application. This is equivalent to deleting the Plants vs. Zombies application, which can further determine whether the system is affected. Then call the detection result acquisition module 42 .

然后,屏蔽设定应用的权限和功能后,检测结果获取模块42将运行一套预设检测程序,以获取相应的检测结果。该预设检测程序包括但不限于重启子程序、应用检测子程序以及系统检测子程序中至少一个。其中,重启子程序用于判断屏蔽设定应用的权限和功能后,终端系统重新启动后能否运行;应用检测子程序用于判断屏蔽设定应用的权限和功能后,终端中其他应用是否能正常启动且功能实现不受影响;系统检测子程序用于判断屏蔽设定应用的权限和功能后,系统能否正常运行,是否会出现死机情况。在这些子程序中,如预设检测程序中的任一子程序运行异常,则检测结果为系统异常;如预设检测程序中的所有子程序均运行正常,则检测结果为系统正常。举例来说,如果权限和功能屏蔽模块41将手机定位应用的权限和功能屏蔽,由于微信中的分享实时位置功能需要调用手机定位应用中的相关模块来实现,因此会导致微信的分享实时位置功能无法实现。此时当运行应用检测子程序对微信进行分享实时位置功能检测时会发生中断,检测结果获取模块42检测到应用检测子程序终端,则得到系统异常的检测结果。Then, after shielding the permissions and functions of the set application, the detection result acquisition module 42 will run a set of preset detection programs to obtain corresponding detection results. The preset detection program includes but not limited to at least one of a restart subroutine, an application detection subroutine and a system detection subroutine. Among them, the restart subroutine is used to determine whether the terminal system can run after restarting after the permission and function of the application are shielded and set; Normal startup and function realization are not affected; the system detection subroutine is used to judge whether the system can run normally and whether there will be a crash after shielding the permissions and functions of the set application. Among these subroutines, if any subroutine in the preset detection program runs abnormally, the detection result is system abnormality; if all the subroutines in the preset detection program run normally, the detection result is system normal. For example, if the permission and function shielding module 41 shields the permissions and functions of the mobile positioning application, since the function of sharing the real-time location in WeChat needs to be implemented by calling related modules in the mobile positioning application, it will cause the function of sharing the real-time location of WeChat to be implemented. can not achieve. At this time, an interruption will occur when running the application detection subroutine to detect the real-time location sharing function of WeChat, and the detection result acquisition module 42 detects the terminal of the application detection subroutine, and then obtains the detection result of system abnormality.

如检测结果获取模块42得到检测结果为系统异常,则调用权限和功能屏蔽解除模块43解除对设定应用的权限和功能的屏蔽,并调用异常子程序提示模块44对预设检测程序中运行异常的子程序进行提示。If the detection result acquisition module 42 obtains the detection result as a system abnormality, then the calling authority and function shielding release module 43 removes the shielding of the authority and the function of the set application, and calls the abnormal subroutine prompting module 44 to detect the abnormal operation in the preset detection program The subroutine prompts.

如检测结果获取模块42得到检测结果为系统正常,则功能分类标识获取模块45进一步获取设定应用的功能分类标识。在终端中往往存在各种各样的应用,这些应用有点实现相同功能,有的实现不同功能。为了区分这些实现不同功能的应用,可以对他们设置不同的功能分类标识,其中具有相同功能的应用则设置相同的功能分类标识。虽然检测结果获取模块42得到的检测结果为系统正常,但若终端不存在与设定应用具有相同功能的参照应用,则删除设定应用后,终端将缺失一项功能,因此为了进一步提高应用删除的准确性,需要调用功能分类标识获取模块45获取设定应用的功能分类标识来进行进一步的应用删除判断。随后调用对应功能应用获取模块46。If the detection result acquisition module 42 obtains the detection result that the system is normal, the function classification identifier acquisition module 45 further acquires the function classification identifier of the set application. Various applications often exist in the terminal, some of these applications implement the same function, and some of these applications implement different functions. In order to distinguish these applications implementing different functions, different function classification identifiers may be set for them, and the same function classification identifiers may be set for applications with the same function. Although the detection result obtained by the detection result acquisition module 42 is that the system is normal, if there is no reference application with the same function as the setting application in the terminal, after deleting the setting application, the terminal will lack a function. Therefore, in order to further improve the application deletion accuracy, it is necessary to call the function classification identification acquisition module 45 to obtain the function classification identification of the set application for further application deletion judgment. Then the corresponding function application obtaining module 46 is called.

接着,对应功能应用获取模块46根据功能分类标识获取模块45得到的设定应用的功能分类标识,进一步获取其对应的功能应用。随后调用对应功能应用个数判断模块47。Next, the corresponding function application acquisition module 46 further acquires its corresponding function application according to the function classification identification of the set application obtained by the function classification identification acquisition module 45 . Then call the corresponding function application number judgment module 47 .

其后,对应功能应用个数判断模块47判断设定应用的功能分类标识对应的功能应用个数是否大于1。如功能分类标识对应的功能应用个数等于1,则调用慎重删除提示模块48;如功能分类标识对应的功能应用个数大于1,则调用第二设定应用删除模块49。Thereafter, the judging module 47 for the number of corresponding function applications judges whether the number of function applications corresponding to the function classification identifier of the set application is greater than one. If the number of functional applications corresponding to the function classification identifier is equal to 1, the cautious deletion prompt module 48 is invoked; if the number of functional applications corresponding to the function classification identifier is greater than 1, the second setting application deletion module 49 is invoked.

如对应功能应用个数判断模块47判断功能分类标识对应的功能应用个数等于1,说明如果删掉设定应用,终端将无法实现设定应用能执行的功能,因此慎重删除提示模块48需显示设定应用的功能,并提示用户慎重删除。举例来说,终端具有杀毒功能的应用只有360安全卫士,如果用户要删掉360安全卫士,则慎重删除提示模块48应提示用户360安全卫士具有杀毒功能,如果删除,终端将失去保护,是否确定删除,从而保护了终端功能的完整性。If the corresponding function application number judging module 47 judges that the number of function applications corresponding to the function classification logo is equal to 1, it means that if the setting application is deleted, the terminal will not be able to implement the functions that the setting application can perform. Therefore, the deletion prompt module 48 needs to display Set the function of the application and remind the user to delete it carefully. For example, only 360 Security Guard is the only application with anti-virus function on the terminal. If the user wants to delete 360 Security Guard, delete the prompt module 48 carefully. It should remind the user that 360 Security Guard has the anti-virus function. deleted, thereby protecting the integrity of the terminal functionality.

如对应功能应用个数判断模块47判断功能分类标识对应的功能应用个数大于1,说明在终端中还存在其他应用与设定应用执行相同功能,因此第二设定应用删除模块49可将设定应用删除。由于应用删除后往往会残留一些安装文件、快捷方式和注册表信息,残留的安装文件会浪费终端磁盘空间,残留的注册表信息会影响终端反应速度,因此有必要调用第二设定应用删除模块49中的残留信息检测单元491检测出这些残留信息,再第二设定应用删除模块49中的残留信息删除单元492把他们清除。If the corresponding function application number judgment module 47 judges that the number of function applications corresponding to the function classification identifier is greater than 1, it means that there are other applications in the terminal that perform the same function as the setting application, so the second setting application deletion module 49 can delete the setting to delete the application. Since some installation files, shortcuts and registry information are often left after the application is deleted, the remaining installation files will waste the disk space of the terminal, and the remaining registry information will affect the response speed of the terminal, so it is necessary to call the second setting application deletion module The residual information detection unit 491 in 49 detects these residual information, and then the residual information deletion unit 492 in the second setting application deletion module 49 clears them.

这样即完成了本优选实施例的应用删除装置的应用删除过程。In this way, the application deletion process of the application deletion device in this preferred embodiment is completed.

本优选实施例的应用删除装置在预设检测程序的检测结果为系统正常的情况下,进一步通过判断是否存在其他应用与设定应用执行相同功能来删除设定应用,进一步提高了应用删除的准确性。The application deletion device of this preferred embodiment further deletes the setting application by judging whether there are other applications performing the same function as the setting application when the detection result of the preset detection program is normal, which further improves the accuracy of application deletion. sex.

实施例五Embodiment five

请参照图5,图5为本发明的应用删除方法及应用删除装置的具体实施例的流程图。Please refer to FIG. 5 . FIG. 5 is a flowchart of a specific embodiment of the application deletion method and the application deletion device of the present invention.

在步骤S501中,用户欲删除有道词典应用,通过长按手机桌面上的有道词典应用图标,选中该有道词典应用,并点击删除按钮,生成有道词典应用删除请求。In step S501, if the user wants to delete the Youdao dictionary application, long press the Youdao dictionary application icon on the desktop of the mobile phone, select the Youdao dictionary application, and click the delete button to generate a Youdao dictionary application deletion request.

在步骤S502中,手机接收到该有道词典应用删除请求后,将该有道词典应用的权限和功能屏蔽后,运行一套预设的检测程序。In step S502, after receiving the deletion request of the Youdao dictionary application, the mobile phone blocks the permissions and functions of the Youdao dictionary application, and then runs a set of preset detection procedures.

在步骤S503中,检测程序运行结果表明删除有道词典应用后手机系统运行正常,根据这个检测结果,继续搜索是否还存在具有语言翻译功能的应用。In step S503, the detection program running result shows that the mobile phone system runs normally after the Youdao dictionary application is deleted, and according to the detection result, continue to search whether there is still an application with language translation function.

在步骤S504中,手机发现还有金山词霸也具有语言翻译的功能,于是将有道词典应用删除。In step S504, the mobile phone finds that Kingsoft PowerWord also has the function of language translation, so it deletes the Youdao dictionary application.

在步骤S505中,手机将该迅雷应用删除后,再检测并删除其残留的一些安装文件、快捷方式和注册表信息。In step S505, after the mobile phone deletes the Thunder application, it detects and deletes some remaining installation files, shortcuts and registry information.

这样即完成了本优选实施例的应用删除方法及应用删除装置的应用删除过程。In this way, the application deletion process of the application deletion method and the application deletion device of the preferred embodiment is completed.

本优选实施例的应用删除方法及应用删除装置在确定删除设定应用不会影响终端系统正常运行的基础上,再通过判断是否存在其他应用与设定应用具有相同功能来决定是否删除设定应用,从而提高了应用删除的准确性。The application deletion method and application deletion device in this preferred embodiment determine whether to delete the setting application by judging whether there are other applications with the same function as the setting application on the basis of determining that deleting the setting application will not affect the normal operation of the terminal system , which improves the accuracy of app removal.

本发明实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。上述提到的存储介质可以是只读存储器,磁盘或光盘等。上述的各装置或系统,可以执行相应方法实施例中的方法。Each functional unit in the embodiment of the present invention may be integrated into one processing module, or each unit may physically exist separately, or two or more units may be integrated into one module. The above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules. If the integrated modules are realized in the form of software function modules and sold or used as independent products, they can also be stored in a computer-readable storage medium. The storage medium mentioned above may be a read-only memory, a magnetic disk or an optical disk, and the like. Each of the above devices or systems may execute the methods in the corresponding method embodiments.

综上所述,虽然本发明已以优选实施例揭露如上,但上述优选实施例并非用以限制本发明,本领域的普通技术人员,在不脱离本发明的精神和范围内,均可作各种更动与润饰,因此本发明的保护范围以权利要求界定的范围为准。In summary, although the present invention has been disclosed above with preferred embodiments, the above preferred embodiments are not intended to limit the present invention, and those of ordinary skill in the art can make various modifications without departing from the spirit and scope of the present invention. Therefore, the protection scope of the present invention shall be determined by the scope defined in the claims.

Claims (11)

1.一种应用删除方法,用于对终端上的应用进行删除操作,其特征在于,包括:1. A method for deleting an application, which is used to delete an application on a terminal, comprising: 接收用户的应用删除请求,并根据所述应用删除请求,屏蔽设定应用的权限和功能;Receive the user's application deletion request, and block the permissions and functions of the set application according to the application deletion request; 在屏蔽所述设定应用的权限和功能的终端系统中运行预设检测程序,以获取相应的检测结果;Run a preset detection program in the terminal system that shields the permissions and functions of the set application to obtain corresponding detection results; 如所述检测结果为系统正常,则删除所述设定应用;If the detection result is that the system is normal, then delete the setting application; 如所述检测结果为系统异常,则解除对所述设定应用的权限和功能的屏蔽。If the detection result is that the system is abnormal, the permission and function of the setting application are unblocked. 2.根据权利要求1所述的应用删除方法,其特征在于,所述预设检测程序包括但不限于重启子程序、应用检测子程序以及系统检测子程序中至少一个。2. The application deletion method according to claim 1, wherein the preset detection program includes but not limited to at least one of a restart subroutine, an application detection subroutine, and a system detection subroutine. 3.根据权利要求2所述的应用删除方法,其特征在于,3. The application deletion method according to claim 2, wherein: 如所述预设检测程序中的任一子程序运行异常,则所述检测结果为系统异常;以及If any subroutine in the preset detection program runs abnormally, the detection result is a system abnormality; and 如所述预设检测程序中的所有子程序均运行正常,则所述检测结果为系统正常。If all subroutines in the preset detection program run normally, the detection result is that the system is normal. 4.根据权利要求1所述的应用删除方法,其特征在于,还包括:4. The application deletion method according to claim 1, further comprising: 如所述检测结果为系统异常,则对所述预设检测程序中运行异常的子程序进行提示。If the detection result is that the system is abnormal, a prompt is given to the abnormally running subroutine in the preset detection program. 5.根据权利要求1所述的应用删除方法,其特征在于,还包括:5. The application deletion method according to claim 1, further comprising: 如所述检测结果为系统正常,则获取所述设定应用的功能分类标识;If the detection result is that the system is normal, then obtain the function classification identification of the set application; 获取所述设定应用的功能分类标识对应的功能应用;Acquire the functional application corresponding to the functional classification identifier of the set application; 判断所述设定应用的功能分类标识对应的功能应用个数是否大于1;Judging whether the number of function applications corresponding to the function classification identifier of the set application is greater than 1; 如所述功能分类标识对应的功能应用个数等于1,则显示所述设定应用的功能,并提示用户慎重删除;If the number of function applications corresponding to the function classification identifier is equal to 1, display the functions of the set applications and prompt the user to delete them carefully; 如所述功能分类标识对应的功能应用个数大于1,则删除所述设定应用。If the number of function applications corresponding to the function classification identifier is greater than 1, the setting application is deleted. 6.根据权利要求1或5所述的应用删除方法,其特征在于,所述删除所述设定应用步骤之后还包括:6. The application deletion method according to claim 1 or 5, characterized in that, after the step of deleting the set application, it further comprises: 检测所述设定应用的残留信息;detecting residual information of the setting application; 删除所述设定应用的残留信息。Residual information of the setting application is deleted. 7.一种应用删除装置,用于对终端上的应用进行删除操作,其特征在于,包括:7. An application deletion device, used for deleting an application on a terminal, characterized in that it comprises: 权限和功能屏蔽模块,用于接收用户的应用删除请求,并根据所述应用删除请求,屏蔽设定应用的权限和功能;A permission and function shielding module, configured to receive a user's application deletion request, and block the permissions and functions of the set application according to the application deletion request; 检测结果获取模块,用于在屏蔽所述设定应用的权限和功能的终端系统中运行预设检测程序,以获取相应的检测结果;A detection result acquisition module, configured to run a preset detection program in the terminal system that shields the permissions and functions of the set application, so as to obtain corresponding detection results; 第一设定应用删除模块,用于在所述检测结果为系统正常时,删除所述设定应用;A first setting application deletion module, configured to delete the setting application when the detection result shows that the system is normal; 权限和功能屏蔽解除模块,用于在所述检测结果为系统异常时,解除对所述设定应用的权限和功能的屏蔽。The permission and function shielding unblocking module is configured to unblock the permission and function of the set application when the detection result is that the system is abnormal. 8.根据权利要求7所述的应用删除装置,其特征在于,所述检测结果获取模块中的预设检测程序包括但不限于重启子程序、应用检测子程序以及系统检测子程序中至少一个。8. The application deletion device according to claim 7, wherein the preset detection program in the detection result acquisition module includes but not limited to at least one of restart subroutine, application detection subroutine and system detection subroutine. 9.根据权利要求8所述的应用删除装置,其特征在于,9. The application deletion device according to claim 8, wherein: 如所述检测结果获取模块中预设检测程序中的任一子程序运行异常,则所述检测结果为系统异常;以及If any subroutine in the preset detection program in the detection result acquisition module runs abnormally, the detection result is a system abnormality; and 如所述检测结果获取模块中预设检测程序中的所有子程序均运行正常,则所述检测结果为系统正常。If all subroutines in the preset detection program in the detection result acquisition module run normally, the detection result is that the system is normal. 10.根据权利要求7所述的应用删除装置,其特征在于,还包括:10. The application deletion device according to claim 7, further comprising: 异常子程序提示模块,用于在所述检测结果为系统异常时,对所述预设检测程序中运行异常的子程序进行提示。The abnormal subroutine prompting module is used for prompting the abnormal subroutine in the preset detection program when the detection result is system abnormality. 11.一种计算机可读存储介质,其存储有计算机程序,其中,所述计算机程序使得计算机执行如权利要求1至6任一项所述的方法。11. A computer-readable storage medium storing a computer program, wherein the computer program causes a computer to execute the method according to any one of claims 1 to 6.
CN201511031247.0A 2015-12-30 2015-12-30 Device is deleted using delet method and application Expired - Fee Related CN105468423B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511031247.0A CN105468423B (en) 2015-12-30 2015-12-30 Device is deleted using delet method and application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511031247.0A CN105468423B (en) 2015-12-30 2015-12-30 Device is deleted using delet method and application

Publications (2)

Publication Number Publication Date
CN105468423A CN105468423A (en) 2016-04-06
CN105468423B true CN105468423B (en) 2018-12-11

Family

ID=55606161

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511031247.0A Expired - Fee Related CN105468423B (en) 2015-12-30 2015-12-30 Device is deleted using delet method and application

Country Status (1)

Country Link
CN (1) CN105468423B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106371879B (en) * 2016-09-06 2018-12-07 惠州Tcl移动通信有限公司 A kind of method and system for the application that mobile terminal shielding can not be deleted
CN109543468B (en) * 2018-10-19 2023-05-05 西安闻泰电子科技有限公司 Password detection method and device of electronic equipment
CN113608753A (en) * 2021-07-13 2021-11-05 荣耀终端有限公司 Application uninstalling method, application recovery method, electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102043655A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Method and system for carrying out advanced uninstall on software
CN103544035A (en) * 2013-10-21 2014-01-29 北京奇虎科技有限公司 Application clearing method and device for mobile terminal
CN103699414A (en) * 2013-12-25 2014-04-02 北京奇虎科技有限公司 Software processing method and device
CN104035842A (en) * 2014-06-30 2014-09-10 上海斐讯数据通信技术有限公司 Method for deleting and recovering built-in application program
CN104951320A (en) * 2014-03-27 2015-09-30 宇龙计算机通信科技(深圳)有限公司 Application installing and uninstalling method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6389126B1 (en) * 1998-05-07 2002-05-14 Mci Communications Corporation Service provisioning system for interactive voice response services

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102043655A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Method and system for carrying out advanced uninstall on software
CN103544035A (en) * 2013-10-21 2014-01-29 北京奇虎科技有限公司 Application clearing method and device for mobile terminal
CN103699414A (en) * 2013-12-25 2014-04-02 北京奇虎科技有限公司 Software processing method and device
CN104951320A (en) * 2014-03-27 2015-09-30 宇龙计算机通信科技(深圳)有限公司 Application installing and uninstalling method and system
CN104035842A (en) * 2014-06-30 2014-09-10 上海斐讯数据通信技术有限公司 Method for deleting and recovering built-in application program

Also Published As

Publication number Publication date
CN105468423A (en) 2016-04-06

Similar Documents

Publication Publication Date Title
US11645383B2 (en) Early runtime detection and prevention of ransomware
EP3422238B1 (en) Detecting a malware process
EP3123311B1 (en) Malicious code protection for computer systems based on process modification
CN103559446B (en) Dynamic virus detection method and device for equipment based on Android system
WO2015115876A1 (en) Methods and apparatus for protecting operating system data
US20160224207A1 (en) Method and system for freezing and unfreezing applications
JP5832954B2 (en) Tag assignment device and tag assignment method
US11100242B2 (en) Restricted resource classes of an operating system
CN107368735B (en) Application installation method, mobile terminal and computer readable storage medium
WO2017172190A1 (en) Trusted execution of called function
CN105468423B (en) Device is deleted using delet method and application
US20140298462A1 (en) Restricted Software Automated Compliance
US9552481B1 (en) Systems and methods for monitoring programs
CN117272369A (en) Privacy compliance detection method and device, electronic equipment and storage medium
CN106529299A (en) Method for detecting and repairing malicious software Rootkit in linux system
US8938807B1 (en) Malware removal without virus pattern
CN107368738B (en) Anti-Root method and device for smart device
US10579794B1 (en) Securing a network device by automatically identifying files belonging to an application
CN106203087B (en) Injection protection method, system, terminal and storage medium
CN105700912A (en) Application deletion method and application deletion device
CN117668917A (en) Risk avoidance method, storage medium and equipment for database sensitive data
CN111783087A (en) Method and device, terminal and storage medium for detecting malicious execution of executable file
CN107316197B (en) Payment protection method, mobile terminal and computer readable storage medium
CN111639341B (en) Malicious program detection method and device, electronic equipment and storage medium
CN105653337A (en) Application deleting method andce

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CP01 Change in the name or title of a patent holder
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181211

CF01 Termination of patent right due to non-payment of annual fee