Terms of Use

Effectiveness date: April, 2025

Please be sure to carefully read and understand all rights and restrictions stipulated in this Software License Agreement (hereinafter referred to as this "Agreement"). Unless you agree to the terms of this Agreement, you have no right to download, install, or use version xxx and its related services. Once you install, copy, download, access, or otherwise use this software product, it will be deemed acceptance of this Agreement, which means you agree to be bound by the terms of this Agreement. If you do not agree to the terms of this Agreement, do not install, copy, or use this software.

This Agreement is a legal agreement between you and Phone Cleaner which is owned and operated by Beijing Youzhu Hui Technology Co., Ltd., a private company holding TAX ID number 91110108MAE962BM95, and its registered office at Zhongguancun East Road, Haidian District, Beijing, China and contact email: admin@youzhuhuitech.com  (hereinafter referred to as “the App”).

1. Declaration of Rights

All intellectual property rights in and to the Software and all information content related to the Software, including, but not limited to, textual expressions and their combinations, icons, decorations, images, graphics, colors, interface designs, design frames, relevant data, add-on programs, printed materials or electronic documents, etc., are the property of the App and are protected by copyright law, international copyright treaties, and other intellectual property laws and regulations.

2. Scope of License

2.1 Download, Installation, and Use:  The App consists in offering Users the Smart Cleaning tool, for personal non-commercial use. Users may download, install, and use this software for non-commercial purposes and in unlimited quantities.

2.2 Copying, Distribution, and Distribution: Users may copy, distribute, and distribute this software product non-commercially and in unlimited quantities. However, each copy, distribution, and distribution must be guaranteed to be complete and authentic, including all software, electronic document copyrights, and trademarks related to this software product, as well as this Agreement.

3. Rights Restrictions

3.1 Prohibited Reverse Engineering, Decompilation, and Disassembly: Users shall not reverse engineer, decompile, or disassemble this software product, or modify any resources compiled within the program file. Except where the aforementioned activities are expressly permitted by law and regulation, users shall adhere to the restrictions in this agreement.

3.2 Separation of Components: This software product is licensed as a single product, and users may not separate its various parts for any purpose.

3.3 Individual Authorization: For commercial sales, reproduction, and distribution, including but not limited to software sales, pre-installation, and bundles, you must obtain written authorization and permission from our App. 

3.4 Reserved Rights: All other rights not expressly authorized in this Agreement remain the property of our App. Users must obtain written consent from our App when exercising other rights.

4. Instructions for Use

4.1 Software Functions: This software is developed based on the iOS system and offers, among others, functions such as mobile phone cleaning, antivirus, software management, privacy space, mobile phone backup, vibration, desktop floating window, etc. This software will be updated and its functions adjusted periodically. If some functions are not described in this agreement, please refer to the functions actually provided by this software.

4.1.1 This software includes a mobile phone health check function: After clicking to access this function, you can immediately, quickly, or comprehensively check the security and health of your mobile phone and perform a health score for the mobile phone based on the inspection results. After the health check, the user can choose to resolve all health security issues found with a single click, allowing the phone to quickly return to a healthy state. The mobile phone physical examination includes several security check items. During the physical examination, each item will be checked, the inspection results and scores will be delivered, and a solution will be provided with a single click. The mobile phone physical examination will not read information unrelated to the physical examination, nor will it read your private personal information.

After the physical examination, the App will perform a physical examination score based on the inspection results of the above items. You can select the target items to be cleaned based on actual usage, or click One-Click Clean to remove all dangerous items and repair items for optimization.

4.1.2 This software includes a mobile phone cleaning and speed-up feature: terminating background processes frees up more memory space to speed up the phone; you can disable the auto-start items of certain programs to ensure the phone runs smoothly in real time; You can also clear the cache generated after the system and software are launched to free up space. Currently, mobile phone cleanup and speedup includes the following features:

(1) Memory Usage Check: By calling the system interface to reflect current memory usage, you can understand how much memory is currently available.

(2) One-Click Cleanup: By calling the memory optimization function, the automatic startup item optimization function, and the junk cleanup function, you can quickly clean and optimize your phone, so you no longer need to open multiple pages to operate.

(3) Memory Optimization: Obtain currently running programs and services by calling system interfaces and closing unnecessary background processes and services through policies.

(4) Memory Optimization Ignore List: Add important system software, services, and user-defined software to the memory optimization ignore list. These programs and services will not be closed during the memory optimization process; the current foreground program and default input method will not be closed. 

(5) Cache Cleanup: Calling up the system interface clears files left in the system cache and software cache directory after using the software. Clearing the cache can free up internal storage space on your phone and increase its operating speed. 

(6) System Cleanup: Call the system interface, check the directory specified by the system, and delete useless temporary system files, junk files, or folders according to the rules. System Cleanup can free up internal storage space on your phone and increase its operating speed.

(7) Uninstall Residues: Call the configuration file to check and delete files left over from the uninstalled software in the phone's memory.

(8) Large File Cleanup: Mobile phone files are judged by their size. If they are larger than 10M, they are considered large files and are displayed so users can clean them based on their usage.

(9) Software Uninstallation: By calling the system interface to obtain a list of locally installed software, you can quickly uninstall and back up the software. By sorting and calling the system interface, you can read the software name, size, usage, version number, and other information, and you can sort and sort the software list.

4.1.3 This software includes software management functions: The software management function can quickly reflect the usage of the mobile phone's internal storage space, and can quickly update, uninstall, move, backup, install, check genuine versions, and delete installation packages of application software installed on the mobile phone. This ensures that the software on the mobile phone remains up-to-date and reduces the system space occupied by useless programs and installation packages. Software management includes the following functions:

(1) Mobile Phone Required: Call the configuration file provided by this software to view the list of recommended software, and users can freely choose to download and install it.

(2) Secure Market: The Secure Market provides secure and fast application downloads, convenient software installation, and easy software management on your mobile phone.

(3) Software Update: Obtain a list of locally installed software by calling the system interface and consult the App ​Security Center if an update is required, providing download and installation functions. 

(4) Software Uninstallation: By calling the system interface to obtain a list of locally installed software, you can quickly uninstall and back up software. By sorting and calling the system interface, you can read the software name, size, usage, version number, and other information, and you can sort and sort the software list. By calling the configuration file, the software can determine whether the locally installed software is genuine or safe, or whether it is a Trojan horse.

(5) Installation Package Management: Scans the specified local directory via the configuration file and displays information about all installation packages to the user based on whether they have been installed. This helps users quickly identify and delete useless installation packages to save space on their mobile phone.

4.1.4 This software contains a harassment blocking function: To block spam text messages, block harassing calls, and warn against fraudulent calls and text messages, this software contains a "harassment blocking" function module. After activation, when you receive a call or text message, the system will identify and label the call type and provide early warning reminders when you answer or speak to a fraudulent call for an extended period of time. At the same time, you can also choose to add the number to the blacklist and whitelist, and select the required blocking mode to achieve the desired blocking effect. Interception modes include standard mode, blacklist-only interception, contacts-only acceptance, whitelist-only acceptance, all interception, and custom mode. Depending on the mode selected by the user, corresponding processing methods will be adopted for the blacklist, whitelist, contact text messages, contact calls, stranger text messages, stranger calls, and hidden number calls. To determine whether incoming calls and text messages should be intercepted, the user's mobile phone contact list can be read for comparison. 

4.1.5 This software includes payment fraud prevention: To protect the security of users' mobile phone charges, this software provides functions to detect and eliminate fraudulent payment software, prevent traffic leakage, unauthorized sending of text messages, unauthorized making of phone calls, and detect and eliminate pirated payment software, thereby protecting the security of users' mobile phone charges. To perform these functions, with user confirmation, this software will update the online virus database to ensure the normal use of the aforementioned functions.

4.1.6 System vulnerability detection and repair: By scanning the version number of the user's mobile phone operating system and the version number of the system's pre-installed applications, the system can be scanned for known vulnerabilities. If they exist, this software will inform the user and provide the corresponding patch.

4.1.7 Payment environment protection: When this feature is enabled, when the paid software is run, a background program scan will be triggered to detect Trojan viruses or high-risk programs running in the background. If a Trojan virus is detected running in the background, this software will alert the user and suggest that the user uninstall it. If a high-risk program is detected running in the background, the software will automatically terminate its process and inform the user of the result. In addition, this software will also test the security of the Wi-Fi network. If there is a risk on the Wi-Fi router connected to the user's mobile phone, this software will issue a risk warning and suggest that the user switch to a 2G, 3G, or 4G network to complete the payment transaction.

4.1.8 Payment Software Protection: After enabling this feature, the software will find the payment software installed on the user's mobile phone through the built-in list and list the secure payment software in the corresponding interface. When these programs are run, they will detect their security and the security of the payment environment. At the same time, this software also provides program lock functions for this payment software. Users can add program locks for the listed payment software according to their needs; once the program lock is added, when the user runs the payment software, they will be required to enter the previously configured password before running the corresponding payment software.

4.1.9 Payment URL Protection: When enabled, this feature will detect the security of the URL (website) accessed by the user through a supported browser in real time. Once the URL is detected as dangerous, the software will prompt and recommend that the user stop accessing the URL.

5. Disclaimer and Limitation of Liability

5.1 Our App will continue to improve product features and provide users with a better product experience. Due to differences in hardware and software on users' mobile phones, this feature cannot guarantee absolute timeliness, accuracy, and technical completeness.

5.2 The user confirms that they are familiar with all functions of this software and the necessary operations performed by our App to implement the functions of this software. 

5.3 This software has been thoroughly tested, but it cannot be guaranteed to be fully compatible with all software and hardware systems, nor can it be guaranteed to be completely error-free. If the compatibility issue cannot be resolved, the user may delete this software.

5.4 The user confirms that they know and understand that the App has not made any express or implied commitments or warranties regarding the timeliness, accuracy, completeness, ability to achieve intended effects, or ability to meet the user's needs of the various functions of the software. If the user finds this software to be deficient, they may disable the relevant functions or uninstall this software at any time.

5.5 If a user violates the provisions of this Agreement, the App has the right to take measures including, but not limited to, termination of the user license, discontinuation of service provision, restriction of use, and initiation of legal proceedings.

6. Law and Dispute Resolution

6.1 This Agreement shall be governed by the laws of the People's Republic of China.

6.2 The parties shall resolve any dispute arising from or in connection with this Agreement through friendly negotiation. If negotiation fails, either party may file a lawsuit with the Chaoyang District People's Court of Beijing.

7. Other Terms

If any provision of this Agreement is wholly or partially invalid or unenforceable for any reason, or violates any applicable law, such provision shall be deemed severed, but the remaining provisions of this Agreement shall remain valid and binding.