WO2016000541A1 - 垃圾文件自动识别的方法和装置 - Google Patents

垃圾文件自动识别的方法和装置 Download PDF

Info

Publication number
WO2016000541A1
WO2016000541A1 PCT/CN2015/082109 CN2015082109W WO2016000541A1 WO 2016000541 A1 WO2016000541 A1 WO 2016000541A1 CN 2015082109 W CN2015082109 W CN 2015082109W WO 2016000541 A1 WO2016000541 A1 WO 2016000541A1
Authority
WO
WIPO (PCT)
Prior art keywords
app
file
information
junk
generated
Prior art date
Application number
PCT/CN2015/082109
Other languages
English (en)
French (fr)
Inventor
袁国庆
张康宗
张楠
陈勇
徐鸣
Original Assignee
北京金山安全软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京金山安全软件有限公司 filed Critical 北京金山安全软件有限公司
Priority to US15/318,215 priority Critical patent/US10318479B2/en
Publication of WO2016000541A1 publication Critical patent/WO2016000541A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/122File system administration, e.g. details of archiving or snapshots using management policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/164File meta data generation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/122File system administration, e.g. details of archiving or snapshots using management policies
    • G06F16/125File system administration, e.g. details of archiving or snapshots using management policies characterised by the use of retention policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation

Definitions

  • the present invention relates to the field of mobile terminal technologies, and in particular, to a method and apparatus for automatic identification of junk files.
  • the identification of junk files is manually performed, manually downloading and running the corresponding APP (application) and using the different functions of the APP, recording the generated files, and then deleting the generated files, and then launching the APP to verify the deleted files. Whether it affects the use of the APP, such as crash or stuck. If the deleted file does not affect the use of the APP, the file can be considered as a junk file.
  • the prior art has at least the following problems: the method of manually identifying junk files is inefficient and costly, and the performance of the device is lowered because the junk files cannot be completely cleaned.
  • the present invention aims to solve at least one of the technical problems in the related art to some extent. To this end, it is an object of the present invention to provide a method for automatic identification of junk files. This method can reduce costs and improve recognition efficiency.
  • a second object of the present invention is to provide an apparatus for automatic identification of junk files.
  • a third object of the present invention is to provide a storage medium.
  • a fourth object of the present invention is to provide a mobile terminal.
  • a method for automatically identifying a junk file includes: acquiring an application APP to be identified; analyzing the APP, acquiring attribute information of a file generated by the APP; The attribute information of the file is matched with a preset junk file identification rule, and if the matching is successful, the file is identified as a junk file.
  • the method for automatically identifying the junk file acquires the document generated by the APP by analyzing the APP.
  • the attribute information of the piece and the attribute information of the file are matched with the preset junk file identification rule to identify whether the file generated by the APP is a junk file, thereby making the identification of the junk file faster, simpler and more intelligent, and reducing The cost increases the recognition efficiency.
  • an apparatus for automatically identifying a junk file includes: an obtaining module, configured to acquire an application APP to be identified; an analyzing module, configured to analyze the APP, and obtain the The attribute information of the file generated by the APP; and the processing module, configured to match the attribute information of the file with a preset junk file identification rule, and if the matching is successful, identify the file as a junk file.
  • the device for automatically identifying the junk file obtains the attribute information of the file generated by the APP by analyzing the APP, and matches the attribute information of the file with the preset junk file identification rule, thereby identifying the APP generated. Whether the file is a junk file makes the identification of junk files faster, simpler and more intelligent, which reduces costs and improves recognition efficiency.
  • a storage medium for storing an application for performing a method for automatically identifying a junk file according to the first aspect of the present invention.
  • a mobile terminal includes a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed in a space enclosed by the housing Internally, the processor and the memory are disposed on the circuit board; the power circuit is configured to supply power to each circuit or device of the mobile terminal; the memory is configured to store executable program code; The processor runs a program corresponding to the executable program code by reading executable program code stored in the memory, for performing the following steps: acquiring an application APP to be identified; analyzing the APP, Obtaining attribute information of the file generated by the APP; and matching the attribute information of the file with a preset junk file identification rule, and if the matching is successful, identifying the file as a junk file.
  • FIG. 1 is a flow chart of a method for automatic identification of junk files in accordance with one embodiment of the present invention.
  • FIG. 2 is a flow chart of a method for automatic identification of junk files in accordance with an embodiment of the present invention.
  • FIG. 3 is a flow chart of static analysis in accordance with an embodiment of the present invention.
  • FIG. 4 is a flow chart of a dynamic simulation in accordance with an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of an apparatus for automatically identifying a junk file according to an embodiment of the present invention.
  • FIG. 1 is a flow chart of a method for automatic identification of junk files in accordance with one embodiment of the present invention.
  • the method for automatic identification of junk files includes:
  • the APP can be obtained through a web crawler.
  • a web crawler For example: social apps, game apps, system apps, etc. in various Android markets.
  • S102 Analyze the APP, and obtain attribute information of the file generated by the APP.
  • the APP may first be statically analyzed to obtain information of the APP.
  • the installation package file of the APP such as an APK file, may be parsed to obtain basic information, permission information, control information, input and output function information, and the like of the APP.
  • the APP can be dynamically analyzed according to the obtained information to obtain attribute information of the file generated by the APP.
  • the device having the corresponding simulation environment may be selected according to the type of the APP, and then the APP is installed on the selected device, and the APP is triggered to run according to the information of the APP, and a file is generated. More specifically, the APP may be triggered to run according to the information of the APP, or the APP may be triggered by automatically simulating the click according to the information of the APP.
  • the attribute information of the file may include path information of the file, and the path information of the file may include a directory and a file name.
  • the path information of the file includes a preset keyword, or when the type of the APP is a preset type, determining whether the file name of the file generated by the APP includes a suffix, thereby The resulting file is identified.
  • the log file (the file in the log record format) generated during the installation of the APP
  • the *.tmp file temporary file generated at the runtime, and the like are junk files.
  • the feature of the junk file may be extracted, and the extracted feature is sent to the server to complete the update of the junk file feature library.
  • the method for automatically identifying the junk file in the embodiment of the present invention obtains the attribute information of the file generated by the APP by analyzing the APP, and matches the attribute information of the file with the preset junk file identification rule to identify the APP generated. Whether the file is a junk file makes the identification of junk files faster, simpler and more intelligent, which reduces costs and improves recognition efficiency.
  • FIG. 2 is a flow chart of a method for automatic identification of junk files in accordance with an embodiment of the present invention.
  • the automatic update method of the file feature library includes:
  • the latest application APP of each Android market can be obtained through a web crawler.
  • the process of statically analyzing the APP can be as shown in FIG. 3.
  • S2022 according to the analysis of the results of the Androidmanifest.xml file, can obtain the basic information, permission information, component information, etc. of the APP; according to the analysis of the results of the classes.dex file, the I/O (input and output interface) related function information can be obtained.
  • step S203 Determine whether the APP has a function of accessing external storage. If yes, go to step S204, otherwise end.
  • the process of dynamically analyzing the APP can be as shown in FIG. 4.
  • S2041 Select a device having a corresponding simulation environment according to the type of the APP.
  • the simulation triggers the installation of the APP.
  • step S2043 it is judged whether or not the simulation is completed. If the process is completed, the process proceeds to step S2044. If not, the process proceeds to step S2042.
  • step S2044 it is judged whether the simulation fails, if it fails, the process goes to step S2045, and if it succeeds, the process goes to step S2046.
  • S205 Automatically identify the generated file according to the junk file path rule.
  • the junk file path rule can be obtained.
  • junk file path rules may include white rules and black rules.
  • the generated file can be matched with the white rule. If it matches, the generated file is not a junk file; Match, if it matches, the resulting file is a junk file.
  • a social-like APP after filtering by white rules and black rules, can determine that a video file without a suffix name or an audio file without a suffix name is a junk file.
  • the method for automatically identifying the junk file in the embodiment of the present invention can automatically identify the junk file by performing static analysis on the APP first, and then acquiring the path related information of the generated file through the simulated installation APP, and matching the junk file path rule.
  • the feature is released to complete the update of the feature library, which reduces labor costs, improves the efficiency of recognition, and can identify and clean up junk files more quickly and accurately, ensuring the running speed of the user equipment.
  • the present invention also provides an apparatus for automatically identifying junk files.
  • FIG. 5 is a schematic structural diagram of an apparatus for automatically identifying a junk file according to an embodiment of the present invention.
  • the device for automatically identifying junk files includes: an obtaining module 110, an analyzing module 120, and a processing module 130.
  • the obtaining module 110 is configured to acquire an application APP to be identified.
  • the acquisition module 110 may acquire an APP through a web crawler.
  • a web crawler For example: social apps, game apps, system apps, etc. in various Android markets.
  • the analysis module 120 is configured to analyze the APP and obtain attribute information of the file generated by the APP.
  • the analysis module 120 may perform static analysis on the APP to obtain information of the APP.
  • the analysis module 120 may parse the installation package file of the APP, such as an APK file, and obtain basic information, permission information, control information, input and output function information, and the like of the APP. The analysis module 120 can then perform dynamic analysis on the APP according to the obtained information to obtain attribute information of the file generated by the APP.
  • the installation package file of the APP such as an APK file
  • the analysis module 120 may select a device having a corresponding simulation environment according to the type of the APP, then install the APP on the selected device, trigger the APP to run according to the information of the APP, and generate a file. More specifically, the analysis module 120 may trigger the APP to run according to the information of the APP by sending an event or trigger the APP to run according to the information of the APP by automatically simulating the click.
  • the processing module 130 is configured to match the attribute information of the file with the preset junk file identification rule, and if the matching is successful, identify the file as a junk file.
  • the attribute information of the file may include path information of the file, and the path information of the file may include a directory and a file name.
  • the processing module 130 may determine whether the path information of the file includes a preset keyword or when the type of the APP is a preset type, determine whether the file name of the file generated by the APP includes a suffix, thereby The file generated by the APP is identified.
  • the log file (the file in the log record format) generated during the installation of the APP
  • the *.tmp file temporary file generated at the runtime, and the like are junk files.
  • the apparatus for automatically identifying the junk file may further include an update module 140.
  • the update module 140 may extract the feature of the junk file and send the extracted feature to the server to complete the update of the junk file feature library.
  • the device for automatically identifying the junk file may further include a determining module 150.
  • the determining module 150 is configured to determine that the APP has a function of accessing external storage before the analyzing module 120 performs dynamic analysis on the APP according to the obtained information.
  • the device for automatically identifying the junk file obtains the attribute information of the file generated by the APP by analyzing the APP, and matches the attribute information of the file with the preset junk file identification rule, thereby identifying the APP generated. Whether the file is a junk file makes the identification of junk files faster, simpler and more intelligent, which reduces costs and improves recognition efficiency.
  • the present invention also provides a storage medium for storing an application for performing a method for automatically identifying junk files according to any of the embodiments of the present invention.
  • the present invention further provides a mobile terminal including a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside a space enclosed by the housing, The processor and the memory are disposed on the circuit board; the power circuit is configured to supply power to each circuit or device of the mobile terminal; the memory is configured to store executable program code; and the processor reads the memory stored in the memory by reading The executable program code runs a program corresponding to the above executable program code for performing the following steps:
  • the APP can be obtained through a web crawler.
  • a web crawler For example: social apps, game apps, system apps, etc. in various Android markets.
  • the APP may first be statically analyzed to obtain information of the APP.
  • the installation package file of the APP such as an APK file, may be parsed to obtain basic information, permission information, control information, input and output function information, and the like of the APP.
  • the APP can be dynamically analyzed according to the obtained information to obtain attribute information of the file generated by the APP.
  • the device having the corresponding simulation environment may be selected according to the type of the APP, and then the APP is installed on the selected device, and the APP is triggered to run according to the information of the APP, and a file is generated. More specifically, the APP may be triggered to run according to the information of the APP, or the APP may be triggered by automatically simulating the click according to the information of the APP.
  • the attribute information of the file may include path information of the file, and the path information of the file may include a directory and a file name.
  • the path information of the file includes a preset keyword or when the type of the APP is a preset type, determining whether the file name of the file generated by the APP includes a suffix, thereby generating the The file is identified.
  • the log file (the file in the log record format) generated during the installation of the APP
  • the *.tmp file temporary file generated at the runtime, and the like are junk files.
  • the feature of the junk file may be extracted, and the extracted feature is sent to the server to complete the update of the junk file feature library.
  • the mobile terminal in the embodiment of the present invention acquires the attribute information of the file generated by the APP by analyzing the APP, and matches the attribute information of the file with the preset junk file identification rule, thereby identifying whether the file generated by the APP is garbage. Files, which make the identification of junk files faster, simpler and more intelligent, reducing costs and improving recognition efficiency.
  • first and second are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated.
  • features defining “first” or “second” may include at least one of the features, either explicitly or implicitly.
  • the meaning of "a plurality” is at least two, such as two, three, etc., unless specifically defined otherwise.
  • a "computer-readable medium” can be any apparatus that can contain, store, communicate, propagate, or transport a program for use in an instruction execution system, apparatus, or device, or in conjunction with the instruction execution system, apparatus, or device.
  • computer readable media include the following: electrical connections (electronic devices) having one or more wires, portable computer disk cartridges (magnetic devices), random access memory (RAM), Read only memory (ROM), erasable editable read only memory (EPROM or flash memory), fiber optic devices, and portable compact disk read only memory (CDROM).
  • the computer readable medium may even be a paper or other suitable medium on which the program can be printed, as it may be optically scanned, for example by paper or other medium, followed by editing, interpretation or, if appropriate, other suitable The method is processed to obtain the program electronically and then stored in computer memory.
  • portions of the invention may be implemented in hardware, software, firmware or a combination thereof.
  • multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
  • a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
  • each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
  • the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Evolutionary Computation (AREA)
  • Geometry (AREA)
  • Stored Programmes (AREA)

Abstract

一种垃圾文件自动识别的方法和装置,其中垃圾文件自动识别的方法包括:获取待识别的APP;对APP进行分析,获取APP产生的文件的属性信息;以及将文件的属性信息和预设的垃圾文件识别规则进行匹配,若匹配成功,则将文件识别为垃圾文件。该垃圾文件自动识别的方法和装置使得对垃圾文件的识别更加快速、简单,降低了成本,提高了识别效率。

Description

垃圾文件自动识别的方法和装置
相关申请的交叉引用
本申请要求北京金山安全软件有限公司于2014年6月30日提交的、发明名称为“垃圾文件自动识别的方法和装置”的、中国专利申请号“201410309621.8”的优先权。
技术领域
本发明涉及移动终端技术领域,尤其涉及一种垃圾文件自动识别的方法和装置。
背景技术
随着科技的不断发展,终端设备日趋智能化,越来越多的用户开始使用安卓***的智能终端设备。由于智能终端设备的存储限制,需要经常性地清理垃圾文件以保证设备运行时具有足够空间,并使设备性能保持良好。
目前,对垃圾文件的识别均采用人工的方式,人工下载并运行对应的APP(应用程序)并使用APP的不同功能,记录产生的文件,然后将产生的文件删除,再次启动APP验证删除的文件是否对APP的使用产生影响,如崩溃或卡死等。如果删除的文件不会对APP的使用产生影响,则可认定该文件为垃圾文件。
但是,在实现本发明的过程中发明人发现现有技术至少存在以下问题:采用人工识别垃圾文件的方式效率低且成本高,并且,由于垃圾文件无法彻底清理而降低设备的性能。
发明内容
本发明旨在至少在一定程度上解决相关技术中的技术问题之一。为此,本发明的一个目的在于提出一种垃圾文件自动识别的方法。该方法能够降低成本,提高识别效率。
本发明的第二个目的在于提出一种垃圾文件自动识别的装置。
本发明的第三个目的在于提出一种存储介质。
本发明的第四个目的在于提出一种移动终端。
为了实现上述目的,本发明第一方面实施例的垃圾文件自动识别的方法,包括:获取待识别的应用程序APP;对所述APP进行分析,获取所述APP产生的文件的属性信息;以及将所述文件的属性信息和预设的垃圾文件识别规则进行匹配,若匹配成功,则将所述文件识别为垃圾文件。
本发明实施例的垃圾文件自动识别的方法,通过对APP进行分析,获取APP产生的文 件的属性信息,并将文件的属性信息和预设的垃圾文件识别规则进行匹配,以此识别APP产生的文件是否为垃圾文件,从而使对垃圾文件的识别更加快速、简单、智能化,降低了成本,提高了识别效率。
为了实现上述目的,本发明第二方面实施例的垃圾文件自动识别的装置,包括:获取模块,用于获取待识别的应用程序APP;分析模块,用于对所述APP进行分析,获取所述APP产生的文件的属性信息;以及处理模块,用于将所述文件的属性信息和预设的垃圾文件识别规则进行匹配,若匹配成功,则将所述文件识别为垃圾文件。
本发明实施例的垃圾文件自动识别的装置,通过对APP进行分析,获取APP产生的文件的属性信息,并将文件的属性信息和预设的垃圾文件识别规则进行匹配,以此识别APP产生的文件是否为垃圾文件,从而使对垃圾文件的识别更加快速、简单、智能化,降低了成本,提高了识别效率。
为了实现上述目的,本发明第三方面实施例的存储介质,用于存储应用程序,所述应用程序用于执行本发明第一方面实施例所述的垃圾文件自动识别的方法。
为了实现上述目的,本发明第四方面实施例的移动终端,该移动终端包括壳体、处理器、存储器、电路板和电源电路,其中,所述电路板安置在所述壳体围成的空间内部,所述处理器和所述存储器设置在所述电路板上;所述电源电路,用于为所述移动终端的各个电路或器件供电;所述存储器用于存储可执行程序代码;所述处理器通过读取所述存储器中存储的可执行程序代码来运行与所述可执行程序代码对应的程序,以用于执行以下步骤:获取待识别的应用程序APP;对所述APP进行分析,获取所述APP产生的文件的属性信息;以及将所述文件的属性信息和预设的垃圾文件识别规则进行匹配,若匹配成功,则将所述文件识别为垃圾文件。
本发明附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本发明的实践了解到。
附图说明
本发明上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中,
图1是根据本发明一个实施例的垃圾文件自动识别的方法的流程图。
图2是根据本发明一个具体实施例的垃圾文件自动识别的方法的流程图。
图3是根据本发明一个具体实施例的静态分析流程图。
图4是根据本发明一个具体实施例的动态模拟流程图。
图5是根据本发明一个实施例的垃圾文件自动识别的装置的结构示意图。
具体实施方式
下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本发明,而不能理解为对本发明的限制。
下面参考附图描述本发明实施例的垃圾文件自动识别的方法和装置。
图1是根据本发明一个实施例的垃圾文件自动识别的方法的流程图。
如图1所示,垃圾文件自动识别的方法包括:
S101,获取待识别的APP。
在本发明的实施例中,可通过网络爬虫获取APP。例如:各个安卓市场中的社交APP、游戏APP、***APP等。
S102,对APP进行分析,获取APP产生的文件的属性信息。
在本发明的实施例中,首先可对APP进行静态分析,获得APP的信息。
具体地,可对APP的安装包文件如APK文件进行解析,获得APP的基本信息、权限信息、控件信息和输入输出函数信息等。
然后,可确定APP是否具有访问外部存储的功能。如果具有访问外部存储的功能,则可根据获得的上述信息对APP进行动态分析,获得APP产生的文件的属性信息。
具体地,可根据APP的类型选择具有对应模拟环境的设备,然后将APP安装到选择的设备上,根据APP的信息触发APP运行,并产生文件。更具体地,可根据APP的信息通过发送事件的方式触发APP运行或者根据APP的信息通过自动模拟点击的方式触发APP运行。
S103,将文件的属性信息和预设的垃圾文件识别规则进行匹配,若匹配成功,则将文件识别为垃圾文件。
具体地,文件的属性信息可包括文件的路径信息,文件的路径信息可包括目录和文件名。
在本发明的实施例中,可判断文件的路径信息中是否包含预设关键字,也可以当APP的类型为预设类型时,判断APP产生的文件的文件名是否包含后缀,以此对APP产生的文件进行识别。举例来说,安装APP时产生的log文件(日志记录格式的文件)、运行时产生的*.tmp文件(临时文件)等为垃圾文件。
在本发明的实施例中,在确定上述文件被识别为垃圾文件后,可提取出该垃圾文件的特征,并向服务器发送提取的特征,以完成垃圾文件特征库的更新。
本发明实施例的垃圾文件自动识别的方法,通过对APP进行分析,获取APP产生的文件的属性信息,并将文件的属性信息和预设的垃圾文件识别规则进行匹配,以此识别APP产生的文件是否为垃圾文件,从而使对垃圾文件的识别更加快速、简单、智能化,降低了成本,提高了识别效率。
图2是根据本发明一个具体实施例的垃圾文件自动识别的方法的流程图。
如图2所示,文件特征库的自动更新方法包括:
S201,获取APP。
具体地,可通过网络爬虫的方式获取各个安卓市场的最新应用APP。
S202,静态分析APP。
具体地,静态分析APP的流程,可如图3所示。
S2021,分析Androidmanifest.xml文件和classes.dex文件。
S2022,根据分析Androidmanifest.xml文件的结果,可获取APP的基本信息、权限信息、组件信息等;根据分析classes.dex文件的结果,可获取I/O(输入输出接口)相关函数信息。
S2023,将上述信息存入数据库。
S203,判断APP是否具有访问外部存储的功能。如果是则跳转至步骤S204,否则结束。
S204,动态分析APP。
具体地,动态分析APP的流程,可如图4所示。
S2041,根据APP的类型选择具有对应模拟环境的设备。
S2042,模拟触发安装APP。
S2043,判断模拟是否结束,若结束则跳转至步骤S2044,若未结束则继续步骤S2042。
S2044,判断模拟是否失败,若失败则跳转至步骤S2045,若成功则跳转至步骤S2046。
S2045,动态分析失败。
S2046,获取文件路径相关信息。
S2047,将文件路径相关信息存入数据库。
S205,根据垃圾文件路径规则对产生的文件进行自动识别。
具体地,可获取垃圾文件路径规则。其中,垃圾文件路径规则可包括白规则和黑规则。可将产生的文件与白规则进行匹配,若匹配则产生的文件不是垃圾文件;与黑规则进行匹 配,若匹配则产生的文件是垃圾文件。
进一步地,还可进行人工校验,若没有问题则将该文件路径作为特征进行内部测试,然后发布到测试用户,经过一段时间测试后,如果有误报反馈则删除错误的特征并更新垃圾文件路径规则;如果没有误报反馈则可将特征发布至用户。举例来说,社交类的APP,经过白规则、黑规则的过滤后,可确定无后缀名的视频文件或无后缀名的音频文件为垃圾文件。
本发明实施例的垃圾文件自动识别的方法,通过先对APP进行静态分析,再通过模拟安装APP获取产生的文件的路径相关信息,与垃圾文件路径规则进行匹配,可自动地识别出垃圾文件并发布特征以完成特征库的更新,降低了人工成本,且提高了识别的效率,能更快速、准确地识别并清理垃圾文件,保证了用户设备的运行速度。
为了实现上述实施例,本发明还提出一种垃圾文件自动识别的装置。
图5是根据本发明一个实施例的垃圾文件自动识别的装置的结构示意图。
如图5所示,垃圾文件自动识别的装置包括:获取模块110、分析模块120和处理模块130。
获取模块110用于获取待识别的应用程序APP。
在本发明的实施例中,获取模块110可通过网络爬虫获取APP。例如:各个安卓市场中的社交APP、游戏APP、***APP等。
分析模块120用于对APP进行分析,获取APP产生的文件的属性信息。
在本发明的实施例中,分析模块120可对APP进行静态分析,获得APP的信息。
具体地,分析模块120可对APP的安装包文件如APK文件进行解析,获得APP的基本信息、权限信息、控件信息和输入输出函数信息等。然后分析模块120可根据获得的上述信息对APP进行动态分析,获得APP产生的文件的属性信息。
具体地,分析模块120可根据APP的类型选择具有对应模拟环境的设备,然后将APP安装到选择的设备上,根据APP的信息触发APP运行,并产生文件。更具体地,分析模块120可根据APP的信息通过发送事件的方式触发APP运行或者根据APP的信息通过自动模拟点击的方式触发APP运行。
处理模块130用于将文件的属性信息和预设的垃圾文件识别规则进行匹配,若匹配成功,则将文件识别为垃圾文件。
具体地,文件的属性信息可包括文件的路径信息,文件的路径信息可包括目录和文件名。
在本发明的实施例中,处理模块130可判断文件的路径信息中是否包含预设关键字或者当APP的类型为预设类型时,判断APP产生的文件的文件名是否包含后缀,以此对APP产生的文件进行识别。举例来说,安装APP时产生的log文件(日志记录格式的文件)、运行时产生的*.tmp文件(临时文件)等为垃圾文件。
此外,本发明实施例的垃圾文件自动识别的装置还可包括更新模块140。
具体地,当文件被识别为垃圾文件时,更新模块140可提取出该垃圾文件的特征,并向服务器发送提取的特征,以完成垃圾文件特征库的更新。
进一步地,本发明实施例的垃圾文件自动识别的装置还可包括确定模块150。
确定模块150用于在分析模块120根据获得的信息对APP进行动态分析之前,确定APP具有访问外部存储的功能。
本发明实施例的垃圾文件自动识别的装置,通过对APP进行分析,获取APP产生的文件的属性信息,并将文件的属性信息和预设的垃圾文件识别规则进行匹配,以此识别APP产生的文件是否为垃圾文件,从而使对垃圾文件的识别更加快速、简单、智能化,降低了成本,提高了识别效率。
为了实现上述实施例,本发明还提出了一种存储介质,用于存储应用程序,该应用程序用于执行本发明任一个实施例所述的垃圾文件自动识别的方法。
为了实现上述实施例,本发明还提出一种移动终端,该移动终端包括壳体、处理器、存储器、电路板和电源电路,其中,上述电路板安置在上述壳体围成的空间内部,上述处理器和上述存储器设置在上述电路板上;上述电源电路,用于为上述移动终端的各个电路或器件供电;上述存储器用于存储可执行程序代码;上述处理器通过读取上述存储器中存储的可执行程序代码来运行与上述可执行程序代码对应的程序,以用于执行以下步骤:
S101’,获取待识别的APP。
在本发明的实施例中,可通过网络爬虫获取APP。例如:各个安卓市场中的社交APP、游戏APP、***APP等。
S102’,对APP进行分析,获取APP产生的文件的属性信息。
在本发明的实施例中,首先可对APP进行静态分析,获得APP的信息。
具体地,可对APP的安装包文件如APK文件进行解析,获得APP的基本信息、权限信息、控件信息和输入输出函数信息等。
然后,可确定APP是否具有访问外部存储的功能。如果具有访问外部存储的功能,则可根据获得的上述信息对APP进行动态分析,获得APP产生的文件的属性信息。
具体地,可根据APP的类型选择具有对应模拟环境的设备,然后将APP安装到选择的设备上,根据APP的信息触发APP运行,并产生文件。更具体地,可根据APP的信息通过发送事件的方式触发APP运行或者根据APP的信息通过自动模拟点击的方式触发APP运行。
S103’,将文件的属性信息和预设的垃圾文件识别规则进行匹配,若匹配成功,则将文件识别为垃圾文件。
具体地,文件的属性信息可包括文件的路径信息,文件的路径信息可包括目录和文件名。
在本发明的实施例中,可判断文件的路径信息中是否包含预设关键字或者当APP的类型为预设类型时,判断APP产生的文件的文件名是否包含后缀,以此对APP产生的文件进行识别。举例来说,安装APP时产生的log文件(日志记录格式的文件)、运行时产生的*.tmp文件(临时文件)等为垃圾文件。
在本发明的实施例中,当上述文件被识别为垃圾文件时,可提取出该垃圾文件的特征,并向服务器发送提取的特征,以完成垃圾文件特征库的更新。
本发明实施例的移动终端,通过对APP进行分析,获取APP产生的文件的属性信息,并将文件的属性信息和预设的垃圾文件识别规则进行匹配,以此识别APP产生的文件是否为垃圾文件,从而使对垃圾文件的识别更加快速、简单、智能化,降低了成本,提高了识别效率。
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。
此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本发明的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。
流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分, 并且本发明的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本发明的实施例所属技术领域的技术人员所理解。
在流程图中表示或在此以其他方式描述的逻辑和/或步骤,例如,可以被认为是用于实现逻辑功能的可执行指令的定序列表,可以具体实现在任何计算机可读介质中,以供指令执行***、装置或设备(如基于计算机的***、包括处理器的***或其他可以从指令执行***、装置或设备取指令并执行指令的***)使用,或结合这些指令执行***、装置或设备而使用。就本说明书而言,"计算机可读介质"可以是任何可以包含、存储、通信、传播或传输程序以供指令执行***、装置或设备或结合这些指令执行***、装置或设备而使用的装置。计算机可读介质的更具体的示例(非穷尽性列表)包括以下:具有一个或多个布线的电连接部(电子装置),便携式计算机盘盒(磁装置),随机存取存储器(RAM),只读存储器(ROM),可擦除可编辑只读存储器(EPROM或闪速存储器),光纤装置,以及便携式光盘只读存储器(CDROM)。另外,计算机可读介质甚至可以是可在其上打印所述程序的纸或其他合适的介质,因为可以例如通过对纸或其他介质进行光学扫描,接着进行编辑、解译或必要时以其他合适方式进行处理来以电子方式获得所述程序,然后将其存储在计算机存储器中。
应当理解,本发明的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行***执行的软件或固件来实现。例如,如果用硬件来实现,和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。
本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,该程序在执行时,包括方法实施例的步骤之一或其组合。
此外,在本发明各个实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。
上述提到的存储介质可以是只读存储器,磁盘或光盘等。尽管上面已经示出和描述了本发明的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本发明的限制, 本领域的普通技术人员在本发明的范围内可以对上述实施例进行变化、修改、替换和变型。

Claims (20)

  1. 一种垃圾文件自动识别的方法,其特征在于,包括:
    获取待识别的应用程序APP;
    对所述APP进行分析,获取所述APP产生的文件的属性信息;以及
    将所述文件的属性信息和预设的垃圾文件识别规则进行匹配,若匹配成功,则将所述文件识别为垃圾文件。
  2. 根据权利要求1所述的方法,其特征在于,在所述将所述文件识别为垃圾文件之后,还包括:
    提取出所述垃圾文件的特征,并向服务器发送所述特征,以完成垃圾文件特征库的更新。
  3. 根据权利要求1所述的方法,其特征在于,所述文件的属性信息包括所述文件的路径信息,所述文件的路径信息包括目录和文件名。
  4. 根据权利要求1所述的方法,其特征在于,所述对所述APP进行分析,获取所述APP产生的文件的属性信息,包括:
    对所述APP进行静态分析,获得所述APP的信息;以及
    根据获得的所述信息对所述APP进行动态分析,获得所述APP产生的文件的属性信息。
  5. 根据权利要求3所述的方法,其特征在于,所述将所述文件的属性信息和预设的垃圾文件识别规则进行匹配,包括:
    判断所述文件的路径信息中是否包含预设关键字;或者
    当所述APP的类型为预设类型时,判断所述APP产生的所述文件的文件名是否包含后缀。
  6. 根据权利要求4所述的方法,其特征在于,在所述根据获得的所述信息对所述APP进行动态分析之前,还包括:
    确定所述APP具有访问外部存储的功能。
  7. 根据权利要求4所述的方法,其特征在于,所述对所述APP进行静态分析,获得所述APP的信息,包括:
    对所述APP的安装包文件进行解析,获得所述APP的信息。
  8. 根据权利要求7所述的方法,其特征在于,所述APP的信息包括:所述APP的基本信息、权限信息、控件信息和输入输出函数信息。
  9. 根据权利要求6-8任一权利要求所述的方法,其特征在于,所述根据获得的所述信息对所述APP进行动态分析,获得所述APP产生的文件的属性信息,包括:
    根据所述APP的类型选择具有对应模拟环境的设备;
    将所述APP安装到选择的所述设备上,根据所述APP的信息触发所述APP运行,并产生所述文件。
  10. 根据权利要求9所述的方法,其特征在于,所述根据所述APP的信息触发所述APP运行,包括:
    根据所述APP的信息通过发送事件的方式触发所述APP运行;或者
    根据所述APP的信息通过自动模拟点击的方式触发所述APP运行。
  11. 一种垃圾文件自动识别的装置,其特征在于,包括:
    获取模块,用于获取待识别的应用程序APP;
    分析模块,用于对所述APP进行分析,获取所述APP产生的文件的属性信息;以及
    处理模块,用于将所述文件的属性信息和预设的垃圾文件识别规则进行匹配,若匹配成功,则将所述文件识别为垃圾文件。
  12. 根据权利要求11所述的装置,其特征在于,还包括:
    更新模块,用于在所述将所述文件识别为垃圾文件之后,提取出所述垃圾文件的特征,并向服务器发送所述特征,以完成垃圾文件特征库的更新。
  13. 根据权利要求11所述的装置,其特征在于,所述文件的属性信息包括所述文件的路径信息,所述文件的路径信息包括目录和文件名。
  14. 根据权利要求11所述的装置,其特征在于,所述分析模块,具体用于:
    对所述APP进行静态分析,获得所述APP的信息;以及
    根据获得的所述信息对所述APP进行动态分析,获得所述APP产生的文件的属性信息。
  15. 根据权利要求13所述的装置,其特征在于,所述处理模块,具体用于:
    判断所述文件的路径信息中是否包含预设关键字;或者
    当所述APP的类型为预设类型时,判断所述APP产生的所述文件的文件名是否包含后缀。
  16. 根据权利要求14所述的装置,其特征在于,还包括:
    确定模块,用于在所述根据获得的所述信息对所述APP进行动态分析之前,确定所述APP具有访问外部存储的功能。
  17. 根据权利要求14所述的装置,其特征在于,所述分析模块,具体用于:
    对所述APP的安装包文件进行解析,获得所述APP的信息。
  18. 根据权利要求17所述的装置,其特征在于,所述APP的信息包括:所述APP的基本信息、权限信息、控件信息和输入输出函数信息。
  19. 根据权利要求16-18任一权利要求所述的装置,其特征在于,所述分析模块,具体用于:
    根据所述APP的类型选择具有对应模拟环境的设备;
    将所述APP安装到选择的所述设备上,根据所述APP的信息触发所述APP运行,并产生所述文件。
  20. 根据权利要求19所述的装置,其特征在于,所述分析模块,具体用于:
    根据所述APP的信息通过发送事件的方式触发所述APP运行;或者
    根据所述APP的信息通过自动模拟点击的方式触发所述APP运行。
PCT/CN2015/082109 2014-06-30 2015-06-23 垃圾文件自动识别的方法和装置 WO2016000541A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/318,215 US10318479B2 (en) 2014-06-30 2015-06-23 Method and device for automatically identifying junk file

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410309621.8 2014-06-30
CN201410309621.8A CN105224574B (zh) 2014-06-30 2014-06-30 垃圾文件自动识别的方法和装置

Publications (1)

Publication Number Publication Date
WO2016000541A1 true WO2016000541A1 (zh) 2016-01-07

Family

ID=54993543

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/082109 WO2016000541A1 (zh) 2014-06-30 2015-06-23 垃圾文件自动识别的方法和装置

Country Status (3)

Country Link
US (1) US10318479B2 (zh)
CN (1) CN105224574B (zh)
WO (1) WO2016000541A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105446987B (zh) * 2014-06-30 2019-03-26 北京金山安全软件有限公司 图片类垃圾文件的识别方法、装置和电子设备
CN108287860A (zh) * 2017-09-05 2018-07-17 腾讯科技(深圳)有限公司 模型生成方法、垃圾文件识别方法及装置
CN110019033A (zh) * 2017-09-21 2019-07-16 北京金山安全软件有限公司 一种垃圾特征获取方法、装置、服务器及可读存储介质
CN108038223A (zh) * 2017-12-21 2018-05-15 珠海市君天电子科技有限公司 垃圾文件信息库建立方法、垃圾文件识别方法及装置
CN108153676B (zh) * 2017-12-26 2021-08-20 Oppo广东移动通信有限公司 调试管理方法、装置、存储介质及终端设备
CN109753482B (zh) * 2018-12-29 2023-01-17 联想(北京)有限公司 文件管理方法及装置
CN110083576B (zh) * 2019-05-06 2021-07-23 珠海天燕科技有限公司 一种缓存目录的识别方法及装置
CN113126936B (zh) * 2021-04-23 2022-04-12 深圳市爱商在线科技有限公司 一种适配多种文档类型的打印控件

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102654872A (zh) * 2011-03-03 2012-09-05 腾讯科技(深圳)有限公司 一种清理应用程序产生的垃圾文件的方法及装置
CN103092664A (zh) * 2013-02-07 2013-05-08 珠海市君天电子科技有限公司 一种安卓***的数据文件的处理方法和装置
CN103369003A (zh) * 2012-03-30 2013-10-23 网秦无限(北京)科技有限公司 一种利用云计算扫描移动设备的冗余文件的方法和***
CN103365882A (zh) * 2012-03-30 2013-10-23 网秦无限(北京)科技有限公司 一种移动终端上垃圾文件清理的方法和***
CN104268220A (zh) * 2014-09-25 2015-01-07 北京金山安全软件有限公司 音视频类应用垃圾文件的清理方法及装置
CN104267986A (zh) * 2014-09-25 2015-01-07 北京金山安全软件有限公司 游戏类应用垃圾文件的清理方法及装置

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6209003B1 (en) * 1998-04-15 2001-03-27 Inktomi Corporation Garbage collection in an object cache
US7640305B1 (en) * 2001-06-14 2009-12-29 Apple Inc. Filtering of data
US8229979B2 (en) * 2006-04-28 2012-07-24 Sap Ag Method and system for inspecting memory leaks
US7734666B2 (en) * 2006-04-28 2010-06-08 Sap Ag Method and system for inspecting memory leaks and analyzing contents of garbage collection files
US8380676B1 (en) * 2009-05-27 2013-02-19 Google Inc. Automatic deletion of temporary files
CN101924761B (zh) * 2010-08-18 2013-11-06 北京奇虎科技有限公司 一种依据白名单进行恶意程序检测的方法
US10108501B2 (en) * 2011-09-30 2018-10-23 Beijing Qihoo Technology Company Limited Terminal backup and recovery method
CN102663059A (zh) * 2012-03-30 2012-09-12 奇智软件(北京)有限公司 一种自动清理计算机终端中的冗余项目的方法及***
CN103164268B (zh) * 2013-04-02 2016-04-20 北京奇虎科技有限公司 ***优化方法及装置
US9411817B2 (en) * 2013-09-23 2016-08-09 Google Inc. Programmatically choosing preferred storage parameters for files in large-scale distributed storage systems based on desired file reliability or availability
CN103631934B (zh) * 2013-12-06 2018-09-14 北京猎豹移动科技有限公司 垃圾文件检测方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102654872A (zh) * 2011-03-03 2012-09-05 腾讯科技(深圳)有限公司 一种清理应用程序产生的垃圾文件的方法及装置
CN103369003A (zh) * 2012-03-30 2013-10-23 网秦无限(北京)科技有限公司 一种利用云计算扫描移动设备的冗余文件的方法和***
CN103365882A (zh) * 2012-03-30 2013-10-23 网秦无限(北京)科技有限公司 一种移动终端上垃圾文件清理的方法和***
CN103092664A (zh) * 2013-02-07 2013-05-08 珠海市君天电子科技有限公司 一种安卓***的数据文件的处理方法和装置
CN104268220A (zh) * 2014-09-25 2015-01-07 北京金山安全软件有限公司 音视频类应用垃圾文件的清理方法及装置
CN104267986A (zh) * 2014-09-25 2015-01-07 北京金山安全软件有限公司 游戏类应用垃圾文件的清理方法及装置

Also Published As

Publication number Publication date
US10318479B2 (en) 2019-06-11
US20170124098A1 (en) 2017-05-04
CN105224574A (zh) 2016-01-06
CN105224574B (zh) 2019-02-19

Similar Documents

Publication Publication Date Title
WO2016000541A1 (zh) 垃圾文件自动识别的方法和装置
US9600403B1 (en) Method and system for creating functional model of test cases
WO2018010552A1 (zh) 测试方法和装置
US11960609B2 (en) Package dependencies representation
CN109271326B (zh) 云数据库的测试方法及其装置、设备和存储介质
WO2018120721A1 (zh) 用户界面的测试方法、***、电子装置及计算机可读存储介质
US10133568B2 (en) Embedding code anchors in software documentation
WO2016000546A1 (zh) 缓存文件删除影响的校验方法、装置及移动终端
CN109062794B (zh) 一种软件测评结果的确定方法、装置及电子设备
US20180203844A1 (en) Detection of meaningful changes in content
WO2017032265A1 (zh) 一种应用推送方法、装置及服务设备
US8965887B2 (en) Software system test case creation
CN105630802A (zh) 网页去重方法及装置
CN104036194A (zh) 一种应用程序中泄露隐私数据的漏洞检测方法及装置
CN112131573A (zh) 安全漏洞的检测方法、装置及存储介质
CN111666201A (zh) 回归测试方法、装置、介质及电子设备
US11557381B2 (en) Clinical trial editing using machine learning
US11868465B2 (en) Binary image stack cookie protection
CN114398673A (zh) 应用程序的合规检测方法、装置、存储介质与电子设备
WO2016000547A1 (zh) 应用程序中控件的触发方法、装置及移动终端
CN117407312A (zh) 应用测试方法、装置、计算机设备及存储介质
CN111949514A (zh) 一种模型预测方法、装置及存储介质
JP2016018227A (ja) 作業ログ編集方法、情報処理装置、およびプログラム
US20160085523A1 (en) Selectively loading precompiled header(s) and/or portion(s) thereof
CN115809267A (zh) 一种用于生成审计结果的方法、设备、介质及程序产品

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15814801

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 15318215

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 03/05/17)

122 Ep: pct application non-entry in european phase

Ref document number: 15814801

Country of ref document: EP

Kind code of ref document: A1