Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application self-protection and active defense method and application self-protection and active defense device

An application and active defense technology, applied in the direction of platform integrity maintenance, electrical digital data processing, instruments, etc., can solve problems such as inability to monitor behavior before uninstallation, inability to implement, etc.

Active Publication Date: 2015-02-25
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are several deficiencies in the above-mentioned existing methods: 1. Since the operating mechanism of the Android version 4.4 and above is different from that of the previous version, this method will no longer be applicable; 2. Only events after uninstallation can be monitored, and behaviors before uninstallation cannot be monitored ; 3. If the application needs to monitor and uninstall, operations such as some security software wanting to restore the user's system configuration and clean up resources cannot be realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application self-protection and active defense method and application self-protection and active defense device
  • Application self-protection and active defense method and application self-protection and active defense device
  • Application self-protection and active defense method and application self-protection and active defense device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0094] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0095] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application active defense method and an application active defense device, and takes an Android application context as an example. The method comprises the following steps of intercepting and capturing a behavior of unloading an application by using an unloading service process which is registered to the bottom of a system; notifying the behavior to a client side service process which is communicated with the unloading service process by using the unloading service process; restoring at least one part of data processed by the application by using the client side service process; and informing the unloading service process of releasing the behavior of unloading the application. In addition, the invention also discloses an application self-protection method and an application self-protection device on the basis of the application active defense method. By the application active defense method, the application active defense device, the application self-protection method and the application self-protection device, an application unloading process of an operation system can be monitored, the application active defense device and the application self-protection device can be unloaded before the application, so that related advanced treatment can be preformed, an active defense function in a safety technology is fulfilled essentially, and the application can be effectively protected.

Description

technical field [0001] The present invention relates to computer program activity control technology. On the one hand, it relates to an application program active defense method and device; on the other hand, it relates to an application program self-protection method and device. Background technique [0002] The application program in the computer operating system may be uninstalled for various reasons after being used for a period of time. As the developer of the application program, it is necessary to understand the reasons why the user uninstalls the application program, or to absorb relevant suggestions from the user, so it will investigate The reason for the user's uninstallation, and the relevant suggestions received from the user, etc. Applications that implement this tracking function are relatively common, and applications on almost all operating systems can theoretically implement this function. After the user uninstalls the application, the user will be directed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/54
CPCG06F21/54G06F2221/033
Inventor 杨威曹阳窦文科符传坚
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products