The disclosure relates to the field of internet technology, and particularly to a method, a system and a terminal device for scanning virus.
This section provides background information related to the present disclosure which is not necessarily prior art.
More and more software appears in a smart phone with the development of the smart phone technology. However, a virus (i.e. a malware) may be installed in some percentage of the software to promote an advertisement anonymously, to download software without authority, and even to charge secretly, which becomes a potential threat by stealing network traffic or charge from the smart phone. To eliminate the threat existed in the smart phone, a security software program can be provided to perform a virus scan. While in practical applications, a user needs to enable the security software program in the smart phone in person, and needs to manually perform the virus scan to find the virus. However, in practice, the user usually performs the virus scan in a long interval. Thus, the virus cannot be scanned in time, and an efficiency of virus scanning also can be reduced.
Exemplary embodiments of the present invention provide a method, a system and a terminal device for scanning virus, in which a virus can be scanned in time and the efficiency of virus scanning can be improved.
One embodiment of the present invention provides a method for scanning virus, comprising: monitoring whether a terminal device performs a lock screen operation; if the terminal device performs the lock screen operation, determining whether a virus scan has been performed on the terminal device during a period from a time at which a security software program is installed to a current time; and if the virus scan has never been performed on the terminal device during the period from the time at which the security software program is installed to the current time, enabling the security software program to perform the virus scan.
Another embodiment of the present invention provides a system for scanning virus, comprising: a monitoring unit configured to monitor whether a terminal device performs a lock screen operation; a first determining unit configured to determinate whether a virus scan has been performed on the terminal device during a period from a time at which a security software program is installed to a current time, when the monitoring unit detects the terminal device performs the lock screen operation; and a scan enabling unit configured to enable the security software program to perform the virus scan when the first determining unit determines that the virus scan has never been performed on the terminal device during the period from the time at which the security software program is installed to the current time.
Yet another embodiment of the present invention provides a terminal device, comprising a system for virus scanning described above.
In exemplary embodiments of the present invention, when a lock screen operation performed on a terminal device is detected, it can be determined whether a virus scan has been performed on the terminal device during a period from a time at which a security software program is installed to a current time. If the virus scan has never been performed on the terminal device during the period from the time at which the security software program is installed to the current time, the security software program can be enabled to perform the virus scan. The terminal device performs the lock screen operation automatically or under control of the user, which may cause the terminal device performing the lock screen operation frequently. Thus, when the terminal device performs the lock screen operation, it can be taken as a trigger condition. A virus can be scanned in time and an efficiency of virus scanning can be relatively improved.
In order to illustrate technical solutions according to embodiments of the disclosure, a brief description of drawings that assists the description of embodiments of the invention or existing art will be provided below. It would be apparent that the drawings in the following description are only for some of the embodiments of the invention. A person having ordinary skills in the art will be able to obtain other drawings on the basis of these drawings without paying any creative work.
Technical solutions in embodiments of the present invention will be illustrated clearly and entirely with the aid of the drawings in the embodiments of the invention. It is apparent that the illustrated embodiments are only some embodiments of the invention instead of all of them. Other embodiments that a person having ordinary skills in the art obtains based on the illustrated embodiments of the invention without paying any creative work should all be within the protection scope sought by the present invention.
A method, a system and a terminal device for scanning virus disclosed in exemplary embodiments can scan a virus in time and relatively improve the efficiency of virus scanning. The illustrations for the method, the system and the terminal device will be described respectively as below.
Referring to
Step S101 is: monitoring whether a terminal device performs a lock screen operation. If the lock screen operation performed by the terminal device is detected, step S102 can be executed; if the lock screen operation performed by the terminal device is not detected, the flow may come to the end.
In one embodiment of the invention, the terminal device can perform the lock screen operation automatically or under control of the user. For example, when the user has not actively use the terminal device for 5 minutes, 10 minutes, 15 minutes, or the like, the terminal device can perform the lock screen operation automatically; or the terminal device can perform the lock screen operation when receiving the control command from the user.
Step S102 is: if the terminal device performs the lock screen operation, determining whether a virus scan has been performed on the terminal device during a period from a time at which a security software program is installed to a current time. If the virus scan has never been performed on the terminal device during the period from the time at which the security software program is installed to the current time, step S105 can be executed; if the virus scan has been performed on the terminal device during the period from the time at which the security software program is installed to the current time, step S103 can be executed.
In one embodiment of the invention, the terminal device can record the time at which the security software program is installed after it may accomplish the installation of the security software program. And then, when the lock screen operation performed by the terminal device is detected, it may be determined whether the virus scan has been performed on the terminal device during the period from the time at which the security software is installed to the current time.
Step 103 is: if determining that the virus scan has been performed on the terminal device during the period from the time at which the security software program is installed to the current time, determining whether the virus scan has been performed on the terminal device during a period from a last time at which a virus database is updated to the current time. If the virus scan has never been performed on the terminal device during the period from the last time at which the virus database is updated to the current time, step S105 can be executed; if the virus scan has been performed on the terminal device during the period from the last time at which the virus database is updated to the current time, step S104 can be executed.
In one embodiment of the invention, the terminal device can record the last time at which the virus database is updated. Then, when it is determined that the virus scan has been performed during the period from the time at which the security software program is installed to the current time, it may be determined whether the virus scan has been performed during the period from the last time at which the virus database is updated to the current time.
Step S104 is: if determining that the virus scan has been performed on the terminal device during the period from the last time at which the virus database is updated to the current time, determining whether a time interval between a last time of virus scanning and the current time is greater than or equal to a preset time threshold. If the time interval between the last time of virus scanning and the current time is greater than or equal to the preset time threshold, step S105 can be executed; if the time interval between the last time of virus scanning and the current time is less than the preset time threshold, the flow may come to the end.
In one embodiment of the invention, the terminal device can record the last time of virus scanning. Then, when it is determined that the virus scan has been performed during the period from the last time at which the virus database is updated to the current, it may be determined whether the time interval between the last time of virus scanning and the current is greater than or equal to the preset time threshold (e.g. 1 day, 3 days, or 5 days).
Step S105 is: enabling the security software program to perform the virus scan.
In practical applications, it may consume a certain resource of the terminal device to enable the security software program to perform the virus scan. While in one embodiment of the invention, virus scanning can only be triggered at the condition when the screen of the terminal device is locked. Thus the running speed of the terminal device controlled by the user may not be influenced.
In one embodiment of the invention, the security software program can also perform the virus scan at the background, which means a security software interface may not need to be enabled. Thus, the consumed resource of the terminal device during the virus scan can be reduced; for example, the terminal device may consume power, etc.
In one embodiment of the invention, the method shown in
When the user selects the clearing operation, the terminal device may clear a detected virus; when the user selects the ignoring operation, the terminal device may ignore the detected virus.
In exemplary embodiments of the present invention, when a lock screen operation performed on a terminal device is detected, it may be determined whether a virus scan has been performed on the terminal device during a period from a time at which a security software program is installed to a current time. If the virus scan has never been performed on the terminal device during the period from the time at which the security software program is installed to the current time, the security software program can be enabled to perform the virus scan. The terminal device can perform the lock screen operation automatically or under control of the user, which may cause the terminal device performing the lock screen operation frequently. Thus, when the terminal device performs the lock screen operation, it can be taken as a trigger condition. A virus can be scanned in time and the efficiency of virus scanning can be relatively improved.
Referring to
Step S201 is: monitoring whether a terminal device performs a lock screen operation. If the lock screen operation performed by the terminal device is detected, step S202 can be executed; if the lock screen operation performed by the terminal device is not detected, the flow may come to the end.
In one embodiment of the invention, the terminal device can perform the lock screen operation automatically or under control of the user. For example, when the user has not actively use the terminal device for 5 minutes, 10 minutes, 15 minutes, or the like, the terminal device can perform the lock screen operation automatically; or the terminal device can perform the lock screen operation when receiving the control command from the user.
Step S202 is: if the terminal device performs the lock screen operation, determining whether a virus scan has been performed on the terminal device during a period from a time at which a security software program is installed to a current time. If the virus scan has never been performed on the terminal device during the period from the time at which the security software program is installed to the current time, step S206 can be executed; if the virus scan has been performed on the terminal device during the period from the time at which the security software program is installed to the current time, step S203 can be executed.
In one embodiment of the invention, the terminal device can record the time at which the security software program is installed after it may accomplish the installation of the security software program. And then, when the lock screen operation performed by the terminal device is detected, it may be determined whether the virus scan has been performed on the terminal device during the period from the time at which the security software is installed to the current time.
Step S203 is: if determining that the virus scan has been performed on the terminal device during the period from the time at which the security software program is installed to the current time, determining whether the virus scan has been performed on the terminal device during a period from a last time at which a virus database is updated to the current time. If the virus scan has never been performed on the terminal device during the period from the last time at which the virus database is updated to the current time, step S204 can be executed; if the virus scan has been performed on the terminal device during the period from the last time at which the virus database is updated to the current time, step S205 can be executed.
In one embodiment of the invention, the terminal device can record the last time at which the virus database is updated. Then, when it is determined that the virus scan has been performed during the period from the time at which the security software program is installed to the current time, it may be determined whether the virus scan has been performed during the period from the last time at which the virus database is updated to the current time.
Step S204 is: determining whether a time interval between a last time of virus scanning and the current time is greater than or equal to a first preset time threshold (e.g. 1 day). If the time interval between the last time of virus scanning and the current time is greater than or equal to the first preset time threshold, step S206 can be executed; if the time interval between the last time of virus scanning and the current time is less than the first preset time threshold, the flow may come to the end.
Step S205 is: if determining that the virus scan has been performed on the terminal device during the period from the last time at which the virus database is updated to the current time, determining whether a time interval between a last time of virus scanning and the current time is greater than or equal to a second preset time threshold, wherein the second preset time threshold is greater than the first preset time threshold. If the time interval between the last time of virus scanning and the current time is greater than or equal to the second preset time threshold, step S206 can be executed; if the time interval between the last time of virus scanning and the current time is less than the second preset time threshold, the flow may come to the end.
In one embodiment of the invention, the terminal device can record the last time of virus scanning. Then, when it is determined that the virus scan has been performed during the period from the last time at which the virus database is updated to the current, it may be determined whether the time interval between the last time of virus scanning and the current is greater than or equal to the second preset time threshold (e.g. 7 days).
Step S206 is: enabling the security software program to perform the virus scan.
In one embodiment of the invention, the security software program can also perform the virus scan at the background, which means a security software interface may not need to be enabled. Thus, the consumed resource of the terminal device during the virus scan can be reduced; for example, the terminal device may consume power, etc.
In one embodiment of the invention, the method shown in
When the user selects the clearing operation, the terminal device may clear a detected virus; when the user selects the ignoring operation, the terminal device may ignore the detected virus.
In the method shown in
Referring to
In the system for virus scanning shown in
Referring to
In one embodiment of the invention, the system shown in
In one embodiment of the invention, the system shown in
In one embodiment of the invention, the system shown in
In one embodiment of the invention, the system shown in
In the system shown in
Referring to
A person having ordinary skills in the art can realize that part or whole of the processes in the methods according to the above embodiments may be implemented by a computer program instructing relevant hardware. The program may be stored in a computer readable storage medium. When executed, the program may execute processes in the above-mentioned embodiments of methods. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), et al.
The above descriptions are some exemplary embodiments of the invention, and should not be regarded as limitation to the scope of related claims. A person having ordinary skills in a relevant technical field will be able to make improvements and modifications within the spirit of the principle of the invention. The improvements and modifications should also be incorporated in the scope of the claims attached below.
Number | Date | Country | Kind |
---|---|---|---|
201310208250.X | May 2013 | CN | national |
This application is a U.S. continuation application under 35 U.S.C. §111(a) claiming priority under 35 U.S.C. §§120 and 365(c) to International Application No. PCT/CN2014/074814 filed Apr. 4, 2014, which claims the priority benefit of Chinese Patent Application No. 201310208250.X filed May 30, 2013, the contents of which are incorporated by reference herein in their entirety for all intended purposes.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/CN2014/074814 | Apr 2014 | US |
Child | 14568387 | US |