CN103838601B - Junk data cleaning method and device - Google Patents

Junk data cleaning method and device Download PDF

Info

Publication number
CN103838601B
CN103838601B CN201310629926.2A CN201310629926A CN103838601B CN 103838601 B CN103838601 B CN 103838601B CN 201310629926 A CN201310629926 A CN 201310629926A CN 103838601 B CN103838601 B CN 103838601B
Authority
CN
China
Prior art keywords
data
file
monitoring
cleaning
registry
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310629926.2A
Other languages
Chinese (zh)
Other versions
CN103838601A (en
Inventor
袁任娜
李伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310629926.2A priority Critical patent/CN103838601B/en
Publication of CN103838601A publication Critical patent/CN103838601A/en
Application granted granted Critical
Publication of CN103838601B publication Critical patent/CN103838601B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Stored Programmes (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a junk data cleaning method and device which are used for cleaning junk data generated by application installation. The junk data cleaning method includes the steps of obtaining first monitoring data, second monitoring data and third monitoring data, wherein the first monitoring data comprise modification information of a system after application installation, the second monitoring data comprise modification information of the system after junk data cleaning is carried out on an application through a cleaning tool, and the third monitoring data comprise modification information preset according to the application in a preset library file of the cleaning tool; extracting related records from the first monitoring data, the second monitoring data and the third monitoring data to conduct comparison between any two kinds of data to obtain comparison results; modifying the cleaning tool according to the comparison results; conducting junk data cleaning with the modified cleaning tool. By means of the junk data cleaning method and device, the cleaning tool can be rapidly evaluated, the library file can be conveniently and rapidly maintained and perfected, and the cleaning function of the cleaning tool can be improved.

Description

A kind of garbage data cleaning method and device
Technical field
The present invention relates to technical field of data processing, and in particular to a kind of garbage data cleaning method, and a kind of rubbish Data scrubbing device.
Background technology
Many softwares when mounted, first have to the installation file of itself to be decompressed to a temp directory and then carry out again Install.If software design has, carelessness or system are problematic, and after installation terminates, these temporary files will become not " interim ", becomes the hurrock in hard disk, takes hard drive space.
Can with manual cleanup software installation when the garbage files that produce, but be not easy which file distinguished during deletion It is garbage files, which file is normal vital document, if delete incorrect may result in when some softwares are repaired occurred Unexpected problem, even results in software unavailable.Therefore, some software cleaning tools arise at the historic moment, but software cleaning tool is cleared up File also not necessarily accurately, accuracy evaluation for software cleaning tool and improve software cleaning tool according to assessment result Become the direction of industry effort.
At present some softwares track installation by carrying out single pass and snapshot (Snapshot) to system or unload soft The relevant change that system is arranged during hardware, including file, ini file, registration table key assignments etc..It is clear by system snapshot comparison software Difference before and after reason, and the result of different pieces of information is analyzed, confirm that software clears up the correctness of file.But difference is carried out by snapshot During the contrast of data, comparing result data volume is larger, and the later stage also needs to manual analyses, assessment accuracy it is not high and it is time-consuming compared with It is long.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome the problems referred to above or at least in part solve on State a kind of garbage data cleaning method and a kind of corresponding garbage data cleaning device of problem.
According to one aspect of the present invention, there is provided a kind of garbage data cleaning method, install for cleaning application and produced Raw junk data, described method includes:
The first monitoring data, the second monitoring data and the 3rd monitoring data are obtained, first monitoring data includes should With the modification information of system after installation, second monitoring data carries out garbage data cleaning including cleaning tool to the application The modification information of system afterwards, the 3rd monitoring data includes advance for the application in the default library file of cleaning tool The modification information of setting;First monitoring data, the second monitoring data and the 3rd monitoring data are according to predefined file Path field and/or registry entry identification field are organized;
According to identical file path field and/or registry entry identification field respectively from first monitoring data, second Relative recording is extracted in monitoring data and the 3rd monitoring data to be compared two-by-two, obtains comparison result;
The cleaning tool is changed according to the comparison result;
The cleaning of junk data is carried out using the cleaning tool of the modification.
Alternatively, methods described also includes:
The library file of the cleaning tool is updated according to the comparison result.
Alternatively, the step of the first monitoring data of the acquisition includes:
Obtain first file data and the first registry data of system before the application is installed;
Obtain second file data and the second registry data of system after the application is installed;
Comparison first file data and the second file data, obtain the first file of system before and after the application is installed Modification data, the first file modification data include file path field;
Comparison first registry data and the second registry data, obtain first of system before and after the application is installed Registration modification data, the first Registry Modifications data include registry entry identification field;
The data in the first file modification data under file path field are extracted as the first file monitor data;
The data under the registry entry identification field in the first Registry Modifications data are extracted as the first registration table Monitoring data;
The first file monitor data and the first registry monitoring data are organized into into the first monitoring data.
Alternatively, the first file modification data include newly-increased file and newly-increased file;First note Volume modification data include the newly-increased key of registration table, registration table newly-increased key assignments, Registry Modifications key assignments.
Alternatively, the step of the second monitoring data of the acquisition includes:
Obtain cleaning tool carries out clearing up the second file modification data for obtaining and the to the junk data of the application Two Registry Modifications data, the second file modification data include file path field, the second Registry Modifications data Including registry entry identification field;
The data in the second file modification data under file path field are extracted as the second file monitor data;
The data under the registry entry identification field in the second Registry Modifications data are extracted as the second registration table Monitoring data;
The second file monitor data and the second registry monitoring data are organized into into the second monitoring data.
Alternatively, the second file modification data include the file of the file and deletion deleted;Second note Volume table modification data include the registry key deleted, the registration table key assignments deleted, the registration table key assignments of modification.
Alternatively, the step of three monitoring data of the acquisition includes:
From the default library file of cleaning tool obtain for it is described using the 3rd file modification data set in advance and 3rd Registry Modifications data, the 3rd file modification data include file path field, the 3rd Registry Modifications number According to including registry entry identification field;
The data in the 3rd file modification data under file path field are extracted as the 3rd file monitor data;
The data under the registry entry identification field in the 3rd Registry Modifications data are extracted as the 3rd registration table Monitoring data;
The 3rd file monitor data and the 3rd registry monitoring data are organized into into the 3rd monitoring data.
Alternatively, the comparison result includes the first comparison result, the second comparison result and the 3rd comparison result, described According to identical file path field and/or registry entry identification field respectively from first monitoring data, the second monitoring data And the 3rd extract relative recording in monitoring data and compared two-by-two, include the step of obtain comparison result:
According to identical file path field and/or registry entry identification field respectively from first monitoring data with it is described Second monitoring data is extracted relative recording and is compared, and obtains the first comparison result, and first comparison result includes the first prison The first cleaning redundant data in the first installation redundant data, and the second monitoring data in control data;
According to identical file path field and/or registry entry identification field respectively from first monitoring data with it is described 3rd monitoring data is extracted relative recording and is compared, and obtains the second comparison result, and second comparison result includes the first prison The first cleaning redundant data in the second installation redundant data, and the 3rd monitoring data in control data;
According to identical file path field and/or registry entry identification field respectively from second monitoring data with it is described 3rd monitoring data is extracted relative recording and is compared, and obtains the 3rd comparison result, and the 3rd comparison result includes the second prison The second cleaning redundant data in the second cleaning redundant data, and the 3rd monitoring data in control data.
Alternatively, it is described the cleaning tool is updated according to the comparison result library file the step of include:
Increase in the library file of the cleaning tool in first monitoring data second installation redundant data and The second cleaning redundant data in second monitoring data;
Delete in the library file of the cleaning tool in the 3rd monitoring data first cleaning redundant data and The second cleaning redundant data in 3rd monitoring data.
According to another aspect of the present invention, there is provided a kind of garbage data cleaning device, install for cleaning application and produced Raw junk data, described device includes:
Monitoring data acquisition module, is suitable to obtain the first monitoring data, the second monitoring data and the 3rd monitoring data, institute Stating the first monitoring data includes applying the modification information of system after installation, second monitoring data to include cleaning tool to described Using the modification information for carrying out system after garbage data cleaning, the 3rd monitoring data includes the default library text in cleaning tool For described using modification information set in advance in part;First monitoring data, the second monitoring data and the 3rd monitoring Data are organized according to predefined file path field and/or registry entry identification field;
Comparison result acquisition module, be suitable to according to identical file path field and/or registry entry identification field respectively from Relative recording is extracted in first monitoring data, the second monitoring data and the 3rd monitoring data to be compared two-by-two, is obtained Comparison result;
Cleaning tool modified module, is suitable to change the cleaning tool according to the comparison result;
Data scrubbing module, being suitable for use with the cleaning tool of the modification carries out the cleaning of junk data.
Alternatively, described device also includes:
Library file update module, is suitable to update the library file of the cleaning tool according to the comparison result.
Alternatively, the monitoring data acquisition module is further adapted for:
Obtain first file data and the first registry data of system before the application is installed;
Obtain second file data and the second registry data of system after the application is installed;
Comparison first file data and the second file data, obtain the first file of system before and after the application is installed Modification data, the first file modification data include file path field;
Comparison first registry data and the second registry data, obtain first of system before and after the application is installed Registration modification data, the first Registry Modifications data include registry entry identification field;
The data in the first file modification data under file path field are extracted as the first file monitor data;
The data under the registry entry identification field in the first Registry Modifications data are extracted as the first registration table Monitoring data;
The first file monitor data and the first registry monitoring data are organized into into the first monitoring data.
Alternatively, the first file modification data include newly-increased file and newly-increased file;First note Volume modification data include the newly-increased key of registration table, registration table newly-increased key assignments, Registry Modifications key assignments.
Alternatively, the monitoring data acquisition module is further adapted for:
Obtain cleaning tool carries out clearing up the second file modification data for obtaining and the to the junk data of the application Two Registry Modifications data, the second file modification data include file path field, the second Registry Modifications data Including registry entry identification field;
The data in the second file modification data under file path field are extracted as the second file monitor data;
The data under the registry entry identification field in the second Registry Modifications data are extracted as the second registration table Monitoring data;
The second file monitor data and the second registry monitoring data are organized into into the second monitoring data.
Alternatively, the second file modification data include the file of the file and deletion deleted;Second note Volume table modification data include the registry key deleted, the registration table key assignments deleted, the registration table key assignments of modification.
Alternatively, the monitoring data acquisition module is further adapted for:
From the default library file of cleaning tool obtain for it is described using the 3rd file modification data set in advance and 3rd Registry Modifications data, the 3rd file modification data include file path field, the 3rd Registry Modifications number According to including registry entry identification field;
The data in the 3rd file modification data under file path field are extracted as the 3rd file monitor data;
The data under the registry entry identification field in the 3rd Registry Modifications data are extracted as the 3rd registration table Monitoring data;
The 3rd file monitor data and the 3rd registry monitoring data are organized into into the 3rd monitoring data.
Alternatively, the comparison result includes the first comparison result, the second comparison result and the 3rd comparison result, described Comparison result acquisition module is further adapted for:
According to identical file path field and/or registry entry identification field respectively from first monitoring data with it is described Second monitoring data is extracted relative recording and is compared, and obtains the first comparison result, and first comparison result includes the first prison The first cleaning redundant data in the first installation redundant data, and the second monitoring data in control data;
According to identical file path field and/or registry entry identification field respectively from first monitoring data with it is described 3rd monitoring data is extracted relative recording and is compared, and obtains the second comparison result, and second comparison result includes the first prison The first cleaning redundant data in the second installation redundant data, and the 3rd monitoring data in control data;
According to identical file path field and/or registry entry identification field respectively from second monitoring data with it is described 3rd monitoring data is extracted relative recording and is compared, and obtains the 3rd comparison result, and the 3rd comparison result includes the second prison The second cleaning redundant data in the second cleaning redundant data, and the 3rd monitoring data in control data.
Alternatively, the library file update module is further adapted for:
Increase in the library file of the cleaning tool in first monitoring data second installation redundant data and The second cleaning redundant data in second monitoring data;
Delete in the library file of the cleaning tool in the 3rd monitoring data first cleaning redundant data and The second cleaning redundant data in 3rd monitoring data.
Compared with background technology, the present invention has the advantages that:
In the present invention, the file and registry operations involved by the installation applied by analysis and scale removal process, will Cleaning tool be actually needed cleaning data (the first monitoring data), it is default cleaning data (the 3rd monitoring data), monitor To cleaning data (the second monitoring data) three between compared obtained comparison result two-by-two, realize to application cleaning knot The contrast in all directions of fruit, realizes the measurement in all directions to software clearing function, so as to judge cleaning tool scale removal process Whether operation is correct and thorough, and more quickly the clearing function of cleaning tool is estimated, in practice it has proved that, with manpower comparing pair Effect compare with efficiency, contrast correctness that the present invention is improved to the clearing function of cleaning tool and efficiency are more than 95%.
In addition, the present invention is analyzed by showing comparison result for scientific research personnel or operation maintenance personnel, can also more easily tie up Protect and improve library file, and the clearing function for improving cleaning tool accordingly.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the specific embodiment of the present invention.
Description of the drawings
By the detailed description for reading hereafter preferred implementation, various other advantages and benefit is common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as to the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
The step of Fig. 1 shows a kind of garbage data cleaning method embodiment of present invention flow chart;
Fig. 2 shows the schematic diagram of the application installation example in a kind of garbage data cleaning method embodiment of the present invention;
Fig. 3 is shown in a kind of garbage data cleaning method embodiment of the invention using file and registration table before and after installing Modification data display example schematic diagram;
Fig. 4 shows that process monitoring instrument arranges showing for example in a kind of garbage data cleaning method embodiment of the invention It is intended to;
Fig. 5 shows the signal of cleaning tool setting example in a kind of garbage data cleaning method embodiment of the invention Figure;
Fig. 6 shows that cleaning tool cleaning result shows example in a kind of garbage data cleaning method embodiment of the invention Schematic diagram;
Fig. 7 shows the monitored results exhibition of process monitoring instrument in a kind of garbage data cleaning method embodiment of the invention The schematic diagram of example;
Fig. 8 shows the signal of comparison result displaying example one in a kind of garbage data cleaning method embodiment of the invention Figure;
Fig. 9 shows the signal of comparison result displaying example two in a kind of garbage data cleaning method embodiment of the invention Figure;
Figure 10 shows that comparison result shows showing for example three in a kind of garbage data cleaning method embodiment of the invention It is intended to;
Figure 11 shows a kind of structured flowchart of garbage data cleaning device embodiment of the present invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here Limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
With reference to Fig. 1, flow chart the step of show a kind of garbage data cleaning method embodiment of the present invention, the rubbish Data clearing method is used for cleaning application and installs produced junk data, and the embodiment of the present invention may include steps of:
Step 101, obtains the first monitoring data, the second monitoring data and the 3rd monitoring data;
The embodiment of the present invention is applied to, first monitoring data includes the modification information using system after installing, described Second monitoring data includes that cleaning tool carries out the modification information of system after garbage data cleaning, the 3rd prison to the application Control data are included in the default library file of cleaning tool for described using modification information set in advance;Also, described One monitoring data, the second monitoring data and the 3rd monitoring data are according to predefined file path field and/or registry entry Identification field is organized.
In implementing, the acquisition process of first monitoring data, the second monitoring data and the 3rd monitoring data Can be respectively:
(1) in one preferred embodiment of the invention, the step of the first monitoring data of the acquisition can include as follows Sub-step:
Sub-step S11, obtains first file data and the first registry data of system before the application is installed;
Sub-step S12, obtains second file data and the second registry data of system after the application is installed;
Sub-step S13, comparison first file data and the second file data, obtain system before and after the application is installed The first file modification data, the first file modification data include file path field;
As a kind of preferred exemplary of the present embodiment, the first file modification data can include newly-increased file and Newly-increased file;The first registration modification data include the newly-increased key of registration table, registration table newly-increased key assignments, Registry Modifications key Value.
Sub-step S14, comparison first registry data and the second registry data, before and after obtaining the application installation First registration modification data of system, the first Registry Modifications data include registry entry identification field;
Sub-step S15, extracts the data in the first file modification data under file path field as the first file Monitoring data;
Sub-step S16, extracts the data conduct under the registry entry identification field in the first Registry Modifications data First registry monitoring data;
The first file monitor data and the first registry monitoring data are organized into the first monitoring by sub-step S17 Data.
In practice, can start using monitoring tools are installed to monitor the installation process of application, wherein, the application is Application to be installed.Specifically, before application is installed, first start application and the first number of files that monitoring tools obtain system is installed According to the first registry data (application install before file data and registry data), the installation then applied, After using installation, reuse using the second file data and the (application of the second registry data for installing monitoring tools acquisition system File data and registry data after installation), by relatively more described first file data and the second file data, and ratio First registry data and the second registry data, obtain the first file modification number of system before and after the application is installed According to this and first registration modification data.
Using the change for installing file and registration table before and after monitoring tools are installed by contrast application, obtain the first file and repair After changing data and the first registration modification data, the first file modification data and the first registration modification data can be led Go out, save as file (for example, saving as " xx is installed and applied the-the first file modification data .txt ").
The first file modification data in the embodiment of the present invention and the first registration modification data can using array, Any data structure of chained list, list, queue etc. is realized.Time (Time), process name can be included in derived file (Process Name), process ID (PID), operation (Operation), path (Path), installation results (result), data are detailed Feelings (Detail) etc. field information, in order to improve the efficiency of follow-up comparison, can extract the partial words in above-mentioned field information Section (if in above-mentioned field information is to two fields) obtains the first file monitor data and the first registry monitoring data, Carry out carrying out follow-up contrast using the first file monitor data and the first registry monitoring data, for example, for The file increased newly in one file modification data and newly-increased file, can be by the data under its path field (for example:C:\ Program Files\FolderName;C:Program Files FolderName FileName.png) extract, it is raw Into the first file monitor data (fileList 1);For the first Registry Modifications data, can be by the registration table of newly-increased modification Data under item identification field are extracted, and generate the first registry monitoring data (regList1).Repair with first file Change data and first registration modification data it is identical, the fileList 1 and regList1 can also using array, chained list, Any data structure of list, queue etc. is realized, and the fileList 1 and regList1 constitutes the first monitoring data.
(2) in one preferred embodiment of the invention, the step of the second monitoring data of the acquisition can include as follows Sub-step:
Sub-step S21, obtain cleaning tool carries out clearing up the second file modification for obtaining to the junk data of the application Data and the second Registry Modifications data, the second file modification data include file path field, second registration Table modification data include registry entry identification field;
As a kind of preferred exemplary of the present embodiment, the second file modification data can include the file deleted and The file of deletion;The second Registry Modifications data include the registry key, the registration table key assignments of deletion, modification deleted Registration table key assignments.
Sub-step S22, extracts the data in the second file modification data under file path field as the second file Monitoring data;
Sub-step S23, extracts the data conduct under the registry entry identification field in the second Registry Modifications data Second registry monitoring data;
The second file monitor data and the second registry monitoring data are organized into the second monitoring by sub-step S24 Data.
Specifically, junk data of the cleaning tool to the application of the installation can be monitored with launching process monitoring tools Scale removal process.Specifically, while launching process monitoring tools, the monitoring filtering of the process monitoring instrument can be selected Condition, the monitoring filtering condition can include one or more of following content:
a)Process Name:Process xxx.exe is specified in xxx.exe monitoring
b)Operation:Set Disposition Information File monitor file deletion action
c)Operation:RegDelete Key monitor the deletion action of registry key
d)Operation:RegDelete Value monitor the deletion action of registration table key assignments
e)Operation:The modification operation of RegSet Value monitoring registration table key assignments
After setting the monitoring filtering condition of process monitoring instrument, cleaning tool is opened, select clear in cleaning tool The application of reason is cleared up, now, the cleaning operation of process monitoring instrument monitor in real time cleaning tool, when cleaning tool is to selecting Application cleaning after the completion of, process monitoring instrument obtains monitored results, wherein, the monitored results can be repaiied including the second file Change data and the second Registry Modifications data.With the first file modification data and the first Registry Modifications data phase Seemingly, the second file modification data and the second registration modification data can be appointed using array, chained list, list, queue etc. What data structure realization, can include time (Time), process name (Process Name), process ID (PID), operation (Operation), path (Path), installation results (result), data details (Detail) etc. field information, described second Registry Modifications data can also include registry entry identification field.
In order to improve the efficiency of follow-up comparison and ensure the concordance of contrast, above-mentioned second file modification number can be extracted Part field according to this and in the field information of the second registration modification data is (if in above-mentioned field information is to two words Section) the second file monitor data and the second registry monitoring data are obtained, using the second file monitor data and the second note Volume table monitoring data carries out carrying out follow-up contrast, for example, if the extraction of the first file modification data is under path field Data, then the second file modification data also extract the data under path field, generate the second file monitor data (fileList 2);What if the first Registry Modifications data were extracted be increase newly, the data under the registry entry identification field changed, described second Registry Modifications data also extract the data under identical registry entry identification field, generate the second registry monitoring data (regList2), the fileList 2 and regList2 constitutes the second monitoring data.And the fileList 2 and RegList2 can also be realized using any data structure of array, chained list, list, queue etc..
It should be noted that the embodiment of the present invention can also first open cleaning tool, the application to be cleared up is selected, then opened Process monitoring instrument is monitored, and the present invention need not be any limitation as to cleaning tool with the opening sequence of process monitoring instrument.
(3) in one preferred embodiment of the invention, the step of three monitoring data of the acquisition can include as follows Sub-step:
Sub-step S31, obtains from the default library file of cleaning tool and is repaiied using the 3rd file set in advance for described Change data and the 3rd Registry Modifications data, the 3rd file modification data include file path field, the 3rd note Volume table modification data include registry entry identification field;
Sub-step S32, extracts the data in the 3rd file modification data under file path field as the 3rd file Monitoring data;
Sub-step S33, extracts the data conduct under the registry entry identification field in the 3rd Registry Modifications data 3rd registry monitoring data;
The 3rd file monitor data and the 3rd registry monitoring data are organized into the 3rd by sub-step S34 Monitoring data.
Specifically, cleaning tool safeguards in the server a library file, and the library file is an ini configuration text Part, it recites the application for installing set in advance needs the 3rd file modification data and the 3rd registration table of cleaning to repair Change the information such as data.
It is similar to the first file modification data and the first Registry Modifications data, the 3rd file modification data And the 3rd registration modification data can be realized using any data structure of array, chained list, list, queue etc., can include Time (Time), process name (Process Name), process ID (PID), operation (Operation), path (Path), installation knot Really (result), data details (Detail) etc. field information, the 3rd Registry Modifications data can also include registration List item identification field.
In order to improve the efficiency of follow-up comparison and ensure the concordance of contrast, above-mentioned 3rd file modification number can be extracted Part field according to this and in the field information of the 3rd registration modification data is (if in above-mentioned field information is to two words Section) the 3rd file monitor data and the 3rd registry monitoring data are obtained, using the 3rd file monitor data and the 3rd note Volume table monitoring data carries out carrying out follow-up contrast, for example, if the extraction of the first file modification data is under path field Data, then the 3rd file modification data also extract the data under path field, generate the 3rd file monitor data (fileList 3);What if the first Registry Modifications data were extracted be increase newly, the data under the registry entry identification field changed, the described 3rd Registry Modifications data also extract the data under identical registry entry identification field, generate the 3rd registry monitoring data (regList3), the fileList 3 and regList3 constitutes the 3rd monitoring data.And the fileList 3 and RegList3 can also be realized using any data structure of array, chained list, list, queue etc..
Step 102, according to identical file path field and/or registry entry identification field respectively from the described first monitoring number Compared two-by-two according to relative recording is extracted in, the second monitoring data and the 3rd monitoring data, obtained comparison result;
In one preferred embodiment of the invention, the comparison result can include that the first comparison result, second compare As a result and the 3rd comparison result, the step 102 can include following sub-step:
Sub-step S41, according to identical file path field and/or registry entry identification field respectively from the described first monitoring Data are extracted relative recording and are compared with second monitoring data, obtain the first comparison result, first comparison result Including the first cleaning redundant data in the first installation redundant data, and the second monitoring data in the first monitoring data;
Specifically, extract the record traversal fileList2 per bar of the fileList1 and extract described The record traversal regList2 per bar of regList1, draws and applies the file for increasing when installing or changing and registration table and answer With cleaning when the file being deleted or modified and registration table between the first comparison result, wherein, first comparison result can To include using the data of needs cleaning when installing than actual redundant data (i.e. first in the first monitoring data for clearing up data Installation redundant data), and the data of the actual cleaning of application are than redundant data (i.e. second monitoring of the data of installation needs cleaning The first cleaning redundant data in data).
Sub-step S42, according to identical file path field and/or registry entry identification field respectively from the described first monitoring Data are extracted relative recording and are compared with the 3rd monitoring data, obtain the second comparison result, second comparison result Including the first cleaning redundant data in the second installation redundant data, and the 3rd monitoring data in the first monitoring data;
Specifically, extract the record traversal fileList3 per bar of the fileList1 and extract described The record traversal regList3 per bar of regList1, the file for increasing when drawing installation or changing and registration table and fettler The second comparison result between the library file of tool, wherein, second comparison result can include applying needs cleaning when installing Data than presetting the redundant data (i.e. in the first monitoring data second installation redundant data) of the data for needing cleaning, and The default data for needing cleaning are than redundant data (first in the 3rd monitoring data using the data that cleaning is needed when installing Cleaning redundant data).
Sub-step S43, according to identical file path field and/or registry entry identification field respectively from the described second monitoring Data are extracted relative recording and are compared with the 3rd monitoring data, obtain the 3rd comparison result, the 3rd comparison result Including the second cleaning redundant data in the second cleaning redundant data, and the 3rd monitoring data in the second monitoring data.
Specifically, extract the record traversal fileList3 per bar of the fileList2 and extract described The record traversal regList3 per bar of regList2, deletion when showing that the library file of cleaning tool is cleared up with cleaning tool Or the 3rd comparison result between the file and registration table of modification, wherein, the 3rd comparison result can include actual cleaning Data than presetting the redundant data (i.e. in the second monitoring data second cleaning redundant data) of the data for needing cleaning, and in advance If needing the data of cleaning than the redundant data (i.e. the second cleaning redundant data in the 3rd monitoring data) of actual cleaning data.
Step 103, according to the comparison result cleaning tool is changed;
In implementing, after comparison result is obtained, the comparison result can be generated html file and be shown.Fortune Dimension personnel or research staff see after the comparison result that the corresponding problem of analysis can be done in many ways according to the comparison result The application or improvement in face.
In one preferred embodiment of the invention, the cleaning tool can be changed according to the comparison result.
Specifically, cleaning tool is actually needed the cleaning result that the result (the first monitoring data) of cleaning and monitoring are obtained (the second monitoring data) is often inconsistent, such as the file applied in installation process generation having, cleaning tool Itself and its lower All Files can be disposed, if other guide (such as chat record file) is also placed on this document by the application Will be deleted together under folder, at this moment monitoring the cleaning result for obtaining can show this difference, now then can be for cleaning Instrument is improved, in case here class is deleted by mistake.
In another preferred embodiment of the invention, the storehouse of the cleaning tool can be updated according to the comparison result File.It is specifically as follows:The second installation increased in the library file of the cleaning tool in first monitoring data is unnecessary The second cleaning redundant data in data and second monitoring data;Delete in the library file of the cleaning tool described The second cleaning redundant data in the first cleaning redundant data and the 3rd monitoring data in 3rd monitoring data.
Specifically, it is default in the cleaning result (the second monitoring data) that obtains of monitoring and library file to clear up data (the Three monitoring datas) it is also usually inconsistent, by default cleaning data in the monitored results and library file of process monitoring instrument During contrast, it can be found that some files for monitoring should be deleted, and library file does not include these files, now then should be by These files are added in library file, to improve library file.In brief, i.e., according to the comparison result of each relative analyses, The data that the data or monitoring for being actually needed cleaning are obtained add library file, removing for the data that need not be cleared up in library file Go, dynamically to safeguard the library file.
Step 104, using the cleaning tool of the modification cleaning of junk data is carried out.
Specifically, after to being improved after cleaning tool improvement or to the library file of cleaning tool, then using described clear Science and engineering tool carries out the cleaning of junk data, can improve the efficiency and accuracy of garbage data cleaning.
In order that those skilled in the art is better understood when the present invention, below by way of an instantiation to the present invention Principle be illustrated:
In this example, to broadcast software soon, it is Total that monitoring tools are installed in the application for the application to be installed Uninstall, the process monitoring instrument is Process Monitor, and the cleaning tool is that the software of 360 security guards is clear Reason function.This example can include following process:
A, opens Total Uninstall, and the installation process of software is broadcast soon in monitoring:
A1, starts Total Uninstall, installs broadcast software (as shown in Figure 2) soon manually;
A2, after installation, the first file modification data and the first Registry Modifications data before and after being installed are (as schemed Shown in 3);
A3, by the first file modification data and the first Registry Modifications data export, saves as and " broadcasts installation journey soon Sequence-modification .txt ", and analyze file modification information fileList1 therein and registry cleaner information regList1.
B, obtains the cleaning library file for broadcasting software soon in 360 security guard's softwares cleaning library file, analyzes it In file clean-up information fileList3 and registry cleaner information regList3.
C, monitors the file and registry operations of 360 security guard's software clearing functions:
C1, opens process monitoring instrument Process Monitor, selects monitoring filtering condition (as shown in Figure 4):
f)Process Name:Process 360safe.exe is specified in 360safe.exe monitoring
g)Operation:Set Disposition Information File monitor file deletion action
h)Operation:RegDelete Key monitor the deletion action of registry key
i)Operation:RegDelete Value monitor the deletion action of registration table key assignments
j)Operation:The modification operation of RegSet Value monitoring registration table key assignments
C2, opens 360 security guard's software clearing functions, chooses the software to be cleared up to be cleared up (such as Fig. 5 and Fig. 6 institutes Show);
C3, obtains the monitored results of Process Monitor, analyzes file operation information fileList2 and registration table Operation information regList2 (as shown in Figure 7).
D, contrasts three kinds of results
D1, fileList1/fileList2, regList1/regList2, the file for increasing when drawing installation or changing and The first comparison result between the file being deleted or modified and registration table when registration table and cleaning;
D2, fileList1/fileList3, regList1/regList3, the file for increasing when drawing installation or changing and The second comparison result between registration table and the library file of bodyguard's software cleaning;
D3, fileList2/fileList3, regList2/regList3, draw bodyguard's software clear up library file with it is clear The 3rd comparison result between the file being deleted or modified and registration table during reason.
E, shows three kinds of comparing results, analyzes corresponding problem (as shown in Fig. 8, Fig. 9 and Figure 10).
It should be noted that examples detailed above is a kind of example of the present invention, for explaining the present invention, but can not explain For limitation of the present invention.
In the present invention, the file and registry operations involved by the installation applied by analysis and scale removal process, will Cleaning tool be actually needed cleaning data (the first monitoring data), it is default cleaning data (the 3rd monitoring data), monitor To cleaning data (the second monitoring data) three between compared obtained comparison result two-by-two, realize to application cleaning knot The contrast in all directions of fruit, realizes the measurement in all directions to software clearing function, so as to judge cleaning tool scale removal process Whether operation is correct and thorough, and more quickly the clearing function of cleaning tool is estimated, in practice it has proved that, with manpower comparing pair Effect compare with efficiency, contrast correctness that the present invention is improved to the clearing function of cleaning tool and efficiency are more than 95%.
In addition, the present invention is analyzed by showing comparison result for scientific research personnel or operation maintenance personnel, can also more easily tie up Protect and improve library file, and the clearing function for improving cleaning tool accordingly.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of combination of actions, but this area Technical staff should know that the present invention is not limited by described sequence of movement, because according to the present invention, some steps can With using other order or while carry out.Secondly, those skilled in the art also should know, enforcement described in this description Example belongs to preferred embodiment, and involved action and the module not necessarily present invention is necessary.
With reference to Figure 11, a kind of structured flowchart of garbage data cleaning device embodiment of the present invention, the rubbish are shown Data scrubbing device is used for cleaning application and installs produced junk data, and the embodiment of the present invention can be included such as lower module:
Monitoring data acquisition module 201, is suitable to obtain the first monitoring data, the second monitoring data and the 3rd monitoring number According to first monitoring data includes the modification information using system after installing, and second monitoring data includes cleaning tool The modification information of system after garbage data cleaning is carried out to the application, the 3rd monitoring data is included in the pre- of cleaning tool If for described using modification information set in advance in library file;First monitoring data, the second monitoring data and Three monitoring datas are organized according to predefined file path field and/or registry entry identification field;
Comparison result acquisition module 202, is suitable to distinguish according to identical file path field and/or registry entry identification field Relative recording is extracted from first monitoring data, the second monitoring data and the 3rd monitoring data to be compared two-by-two, is obtained Obtain comparison result;
Cleaning tool modified module 203, is suitable to change the cleaning tool according to the comparison result;
Data scrubbing module 204, being suitable for use with the cleaning tool of the modification carries out the cleaning of junk data.
In one preferred embodiment of the invention, described device can also include:
Library file update module, is suitable to update the library file of the cleaning tool according to the comparison result.
In one preferred embodiment of the invention, the monitoring data acquisition module 201 is further adapted for:
Obtain first file data and the first registry data of system before the application is installed;
Obtain second file data and the second registry data of system after the application is installed;
Comparison first file data and the second file data, obtain the first file of system before and after the application is installed Modification data, the first file modification data include file path field;
Comparison first registry data and the second registry data, obtain first of system before and after the application is installed Registration modification data, the first Registry Modifications data include registry entry identification field;
The data in the first file modification data under file path field are extracted as the first file monitor data;
The data under the registry entry identification field in the first Registry Modifications data are extracted as the first registration table Monitoring data;
The first file monitor data and the first registry monitoring data are organized into into the first monitoring data.
Wherein, the first file modification data include newly-increased file and newly-increased file;First registration Modification data include the newly-increased key of registration table, registration table newly-increased key assignments, Registry Modifications key assignments.
In one preferred embodiment of the invention, the monitoring data acquisition module 201 is further adapted for:
Obtain cleaning tool carries out clearing up the second file modification data for obtaining and the to the junk data of the application Two Registry Modifications data, the second file modification data include file path field, the second Registry Modifications data Including registry entry identification field;
The data in the second file modification data under file path field are extracted as the second file monitor data;
The data under the registry entry identification field in the second Registry Modifications data are extracted as the second registration table Monitoring data;
The second file monitor data and the second registry monitoring data are organized into into the second monitoring data.
Wherein, the second file modification data include the file of the file and deletion deleted;Second registration Table modification data include the registry key deleted, the registration table key assignments deleted, the registration table key assignments of modification.
In one preferred embodiment of the invention, the monitoring data acquisition module 201 is further adapted for:
From the default library file of cleaning tool obtain for it is described using the 3rd file modification data set in advance and 3rd Registry Modifications data, the 3rd file modification data include file path field, the 3rd Registry Modifications number According to including registry entry identification field;
The data in the 3rd file modification data under file path field are extracted as the 3rd file monitor data;
The data under the registry entry identification field in the 3rd Registry Modifications data are extracted as the 3rd registration table Monitoring data;
The 3rd file monitor data and the 3rd registry monitoring data are organized into into the 3rd monitoring data.
In one preferred embodiment of the invention, the comparison result includes the first comparison result, the second comparison result And the 3rd comparison result, the comparison result acquisition module 202 is further adapted for:
According to identical file path field and/or registry entry identification field respectively from first monitoring data with it is described Second monitoring data is extracted relative recording and is compared, and obtains the first comparison result, and first comparison result includes the first prison The first cleaning redundant data in the first installation redundant data, and the second monitoring data in control data;
According to identical file path field and/or registry entry identification field respectively from first monitoring data with it is described 3rd monitoring data is extracted relative recording and is compared, and obtains the second comparison result, and second comparison result includes the first prison The first cleaning redundant data in the second installation redundant data, and the 3rd monitoring data in control data;
According to identical file path field and/or registry entry identification field respectively from second monitoring data with it is described 3rd monitoring data is extracted relative recording and is compared, and obtains the 3rd comparison result, and the 3rd comparison result includes the second prison The second cleaning redundant data in the second cleaning redundant data, and the 3rd monitoring data in control data.
In one preferred embodiment of the invention, the library file update module is further adapted for:
Increase in the library file of the cleaning tool in first monitoring data second installation redundant data and The second cleaning redundant data in second monitoring data;
Delete in the library file of the cleaning tool in the 3rd monitoring data first cleaning redundant data and The second cleaning redundant data in 3rd monitoring data.
For the device embodiment of Figure 11, due to its embodiment of the method basic simlarity with Fig. 1, so the ratio of description Relatively simple, related part is illustrated referring to the part of embodiment of the method.
Provided herein algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment. Various general-purpose systems can also be used together based on teaching in this.As described above, construct required by this kind of system Structure be obvious.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use it is various Programming language realizes the content of invention described herein, and the description done to language-specific above is to disclose this Bright preferred forms.
In description mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case of without these details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand one or more in each inventive aspect, exist Above in the description of the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The more features of feature that the application claims ratio of shield is expressly recited in each claim.More precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as the separate embodiments of the present invention.
Those skilled in the art are appreciated that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Unit or component organization into a module or unit or component, and can be divided in addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit is excluded each other, can adopt any Combine to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification is (including adjoint power Profit is required, summary and accompanying drawing) disclosed in each feature can it is identical by offers, be equal to or the alternative features of similar purpose carry out generation Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection appoint One of meaning can in any combination mode using.
The present invention all parts embodiment can be realized with hardware, or with one or more processor operation Software module realize, or with combinations thereof realization.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) to realize garbage data cleaning equipment according to embodiments of the present invention in one The some or all functions of a little or whole parts.The present invention is also implemented as performing method as described herein Some or all equipment or program of device (for example, computer program and computer program).Such realization The program of the present invention can be stored on a computer-readable medium, or can have the form of one or more signal.This The signal of sample can be downloaded from internet website and obtained, or be provided on carrier signal, or be carried in any other form For.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability Field technique personnel can design without departing from the scope of the appended claims alternative embodiment.In the claims, Any reference markss between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can come real by means of the hardware for including some different elements and by means of properly programmed computer It is existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and be run after fame Claim.

Claims (18)

1. a kind of garbage data cleaning method, for cleaning application produced junk data is installed, and described method includes:
The first monitoring data, the second monitoring data and the 3rd monitoring data are obtained, first monitoring data is included using peace The modification information of system after dress, second monitoring data application is carried out including cleaning tool be after garbage data cleaning The modification information of system, the 3rd monitoring data includes being preset for the application in the default library file of cleaning tool Modification information;First monitoring data, the second monitoring data and the 3rd monitoring data are according to predefined file path Field and/or registry entry identification field are organized;
According to identical file path field and/or registry entry identification field respectively from first monitoring data, the second monitoring Relative recording is extracted in data and the 3rd monitoring data to be compared two-by-two, obtains comparison result;
The cleaning tool is changed according to the comparison result;
The cleaning of junk data is carried out using the cleaning tool of the modification.
2. the method for claim 1, it is characterised in that also include:
The library file of the cleaning tool is updated according to the comparison result.
3. method as claimed in claim 1 or 2, it is characterised in that include the step of first monitoring data of acquisition:
Obtain first file data and the first registry data of system before the application is installed;
Obtain second file data and the second registry data of system after the application is installed;
Comparison first file data and the second file data, obtain the first file modification of system before and after the application is installed Data, the first file modification data include file path field;
Comparison first registry data and the second registry data, obtain the first registration of system before and after the application is installed Modification data, the first Registry Modifications data include registry entry identification field;
The data in the first file modification data under file path field are extracted as the first file monitor data;
The data under the registry entry identification field in the first Registry Modifications data are extracted as the first registry monitoring Data;
The first file monitor data and the first registry monitoring data are organized into into the first monitoring data.
4. method as claimed in claim 3, it is characterised in that the first file modification data include newly-increased file and Newly-increased file;The first registration modification data include the newly-increased key of registration table, registration table newly-increased key assignments, Registry Modifications key Value.
5. method as claimed in claim 1 or 2, it is characterised in that include the step of second monitoring data of acquisition:
Obtain cleaning tool carries out clearing up the second file modification data and the second note that obtain to the junk data of the application Volume table modification data, the second file modification data include file path field, and the second Registry Modifications data include Registry entry identification field;
The data in the second file modification data under file path field are extracted as the second file monitor data;
The data under the registry entry identification field in the second Registry Modifications data are extracted as the second registry monitoring Data;
The second file monitor data and the second registry monitoring data are organized into into the second monitoring data.
6. method as claimed in claim 5, it is characterised in that the second file modification data include the file deleted and The file of deletion;The second Registry Modifications data include the registry key, the registration table key assignments of deletion, modification deleted Registration table key assignments.
7. method as claimed in claim 1 or 2, it is characterised in that include the step of three monitoring data of the acquisition:
Obtain for described using the 3rd file modification data set in advance and the 3rd from the default library file of cleaning tool Registry Modifications data, the 3rd file modification data include file path field, the 3rd Registry Modifications packet Include registry entry identification field;
The data in the 3rd file modification data under file path field are extracted as the 3rd file monitor data;
The data under the registry entry identification field in the 3rd Registry Modifications data are extracted as the 3rd registry monitoring Data;
The 3rd file monitor data and the 3rd registry monitoring data are organized into into the 3rd monitoring data.
8. method as claimed in claim 2, it is characterised in that the comparison result includes that the first comparison result, second compare As a result and the 3rd comparison result, it is described according to identical file path field and/or registry entry identification field respectively from described Relative recording is extracted in first monitoring data, the second monitoring data and the 3rd monitoring data to be compared two-by-two, is compared As a result the step of, includes:
According to identical file path field and/or registry entry identification field respectively from first monitoring data and described second Monitoring data is extracted relative recording and is compared, and obtains the first comparison result, and first comparison result includes the first monitoring number The first cleaning redundant data in the first installation redundant data, and the second monitoring data according in;First monitoring data In the first installation redundant data be using the data of cleaning are needed when installing than the redundant data of actual cleaning data;Described The first cleaning redundant data in two monitoring datas is than installing the unnecessary of the data for needing cleaning using the data of actual cleaning Data;
According to identical file path field and/or registry entry identification field respectively from first monitoring data and the described 3rd Monitoring data is extracted relative recording and is compared, and obtains the second comparison result, and second comparison result includes the first monitoring number The first cleaning redundant data in the second installation redundant data, and the 3rd monitoring data according in;First monitoring data In second installation redundant data be using install when need cleaning data than preset need cleaning data redundant data; The first cleaning redundant data in 3rd monitoring data is to need cleaning when the data ratio application of default needs cleaning is installed Data redundant data;
According to identical file path field and/or registry entry identification field respectively from second monitoring data and the described 3rd Monitoring data is extracted relative recording and is compared, and obtains the 3rd comparison result, and the 3rd comparison result includes the second monitoring number The second cleaning redundant data in the second cleaning redundant data, and the 3rd monitoring data according in;Second monitoring data In the second cleaning redundant data be actual cleaning data than presetting the redundant data of the data that needs are cleared up;3rd monitoring The second cleaning redundant data in data is the default data for needing cleaning than the redundant data of actual cleaning data.
9. method as claimed in claim 8, it is characterised in that described to update the cleaning tool according to the comparison result The step of library file, includes:
Increase the second installation redundant data and described in first monitoring data in the library file of the cleaning tool The second cleaning redundant data in second monitoring data;
The first cleaning redundant data and described in the 3rd monitoring data is deleted in the library file of the cleaning tool The second cleaning redundant data in 3rd monitoring data.
10. a kind of garbage data cleaning device, for cleaning application produced junk data is installed, and described device includes:
Monitoring data acquisition module, is suitable to obtain the first monitoring data, the second monitoring data and the 3rd monitoring data, and described the One monitoring data includes the modification information using system after installing, and second monitoring data includes cleaning tool to the application The modification information of system after garbage data cleaning is carried out, the 3rd monitoring data is included in the default library file of cleaning tool For described using modification information set in advance;First monitoring data, the second monitoring data and the 3rd monitoring data Organized according to predefined file path field and/or registry entry identification field;
Comparison result acquisition module, is suitable to according to identical file path field and/or registry entry identification field respectively from described Relative recording is extracted in first monitoring data, the second monitoring data and the 3rd monitoring data to be compared two-by-two, is compared As a result;
Cleaning tool modified module, is suitable to change the cleaning tool according to the comparison result;
Data scrubbing module, being suitable for use with the cleaning tool of the modification carries out the cleaning of junk data.
11. devices as claimed in claim 10, also include:
Library file update module, is suitable to update the library file of the cleaning tool according to the comparison result.
12. devices as described in claim 10 or 11, the monitoring data acquisition module is further adapted for:
Obtain first file data and the first registry data of system before the application is installed;
Obtain second file data and the second registry data of system after the application is installed;
Comparison first file data and the second file data, obtain the first file modification of system before and after the application is installed Data, the first file modification data include file path field;
Comparison first registry data and the second registry data, obtain the first registration of system before and after the application is installed Modification data, the first Registry Modifications data include registry entry identification field;
The data in the first file modification data under file path field are extracted as the first file monitor data;
The data under the registry entry identification field in the first Registry Modifications data are extracted as the first registry monitoring Data;
The first file monitor data and the first registry monitoring data are organized into into the first monitoring data.
13. devices as claimed in claim 12, the first file modification data include newly-increased file and newly-increased text Part is pressed from both sides;The first registration modification data include the newly-increased key of registration table, registration table newly-increased key assignments, Registry Modifications key assignments.
14. devices as described in claim 10 or 11, the monitoring data acquisition module is further adapted for:
Obtain cleaning tool carries out clearing up the second file modification data and the second note that obtain to the junk data of the application Volume table modification data, the second file modification data include file path field, and the second Registry Modifications data include Registry entry identification field;
The data in the second file modification data under file path field are extracted as the second file monitor data;
The data under the registry entry identification field in the second Registry Modifications data are extracted as the second registry monitoring Data;
The second file monitor data and the second registry monitoring data are organized into into the second monitoring data.
15. devices as claimed in claim 14, the second file modification data include the text of the file and deletion deleted Part is pressed from both sides;The second Registry Modifications data include the registry key deleted, the registration table key assignments deleted, the registry key of modification Value.
16. devices as described in claim 10 or 11, the monitoring data acquisition module is further adapted for:
Obtain for described using the 3rd file modification data set in advance and the 3rd from the default library file of cleaning tool Registry Modifications data, the 3rd file modification data include file path field, the 3rd Registry Modifications packet Include registry entry identification field;
The data in the 3rd file modification data under file path field are extracted as the 3rd file monitor data;
The data under the registry entry identification field in the 3rd Registry Modifications data are extracted as the 3rd registry monitoring Data;
The 3rd file monitor data and the 3rd registry monitoring data are organized into into the 3rd monitoring data.
17. devices as claimed in claim 11, the comparison result includes the first comparison result, the second comparison result and the Three comparison results, the comparison result acquisition module is further adapted for:
According to identical file path field and/or registry entry identification field respectively from first monitoring data and described second Monitoring data is extracted relative recording and is compared, and obtains the first comparison result, and first comparison result includes the first monitoring number The first cleaning redundant data in the first installation redundant data, and the second monitoring data according in;First monitoring data In the first installation redundant data be using the data of cleaning are needed when installing than the redundant data of actual cleaning data;Described The first cleaning redundant data in two monitoring datas is than installing the unnecessary of the data for needing cleaning using the data of actual cleaning Data;
According to identical file path field and/or registry entry identification field respectively from first monitoring data and the described 3rd Monitoring data is extracted relative recording and is compared, and obtains the second comparison result, and second comparison result includes the first monitoring number The first cleaning redundant data in the second installation redundant data, and the 3rd monitoring data according in;First monitoring data In second installation redundant data be using install when need cleaning data than preset need cleaning data redundant data; The first cleaning redundant data in 3rd monitoring data is to need cleaning when the data ratio application of default needs cleaning is installed Data redundant data;
According to identical file path field and/or registry entry identification field respectively from second monitoring data and the described 3rd Monitoring data is extracted relative recording and is compared, and obtains the 3rd comparison result, and the 3rd comparison result includes the second monitoring number The second cleaning redundant data in the second cleaning redundant data, and the 3rd monitoring data according in;Second monitoring data In the second cleaning redundant data be actual cleaning data than presetting the redundant data of the data that needs are cleared up;3rd monitoring The second cleaning redundant data in data is the default data for needing cleaning than the redundant data of actual cleaning data.
18. devices as claimed in claim 17, the library file update module is further adapted for:
Increase the second installation redundant data and described in first monitoring data in the library file of the cleaning tool The second cleaning redundant data in second monitoring data;
The first cleaning redundant data and described in the 3rd monitoring data is deleted in the library file of the cleaning tool The second cleaning redundant data in 3rd monitoring data.
CN201310629926.2A 2013-11-29 2013-11-29 Junk data cleaning method and device Expired - Fee Related CN103838601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310629926.2A CN103838601B (en) 2013-11-29 2013-11-29 Junk data cleaning method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310629926.2A CN103838601B (en) 2013-11-29 2013-11-29 Junk data cleaning method and device

Publications (2)

Publication Number Publication Date
CN103838601A CN103838601A (en) 2014-06-04
CN103838601B true CN103838601B (en) 2017-04-19

Family

ID=50802134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310629926.2A Expired - Fee Related CN103838601B (en) 2013-11-29 2013-11-29 Junk data cleaning method and device

Country Status (1)

Country Link
CN (1) CN103838601B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104699513B (en) * 2015-03-31 2018-11-09 联想(北京)有限公司 A kind of document handling method and device
CN105260438A (en) * 2015-09-30 2016-01-20 联想(北京)有限公司 File management method and electronic device
CN107832155B (en) * 2017-11-14 2020-01-14 Oppo广东移动通信有限公司 Method and device for replacing algorithm, storage medium and electronic equipment
CN109800022B (en) * 2019-01-25 2022-07-08 郑州云海信息技术有限公司 Method, system, terminal and storage medium for automatically comparing BIOS information difference

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102043655A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Method and system for carrying out advanced uninstall on software
CN102495772A (en) * 2011-09-30 2012-06-13 奇智软件(北京)有限公司 Characteristic-based terminal program cloud backup and recovery methods
CN102915353A (en) * 2012-09-28 2013-02-06 浙江图讯科技有限公司 Method for cleaning junk data
CN102937990A (en) * 2012-10-30 2013-02-20 北京小米科技有限责任公司 Method and device for cleaning files
CN103092938A (en) * 2013-01-07 2013-05-08 浙江鸿程计算机系统有限公司 Method for intelligently cleaning garbage file of secure digital (SD) card of Android mobile phone
CN103176828A (en) * 2013-03-29 2013-06-26 北京奇虎科技有限公司 Method and device of deleting application program residual files
CN103345411A (en) * 2013-07-09 2013-10-09 北京奇虎科技有限公司 Method and device for uninstalling application program

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100426298B9 (en) * 2006-08-28 2016-10-26 华为技术有限公司 A kind of cleaning garbage files method and system
CN101876914A (en) * 2010-04-23 2010-11-03 中兴通讯股份有限公司 Method for deleting files and mobile terminal
CN102654872A (en) * 2011-03-03 2012-09-05 腾讯科技(深圳)有限公司 Method and device for cleaning junk files generated by application programs

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102043655A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Method and system for carrying out advanced uninstall on software
CN102495772A (en) * 2011-09-30 2012-06-13 奇智软件(北京)有限公司 Characteristic-based terminal program cloud backup and recovery methods
CN102915353A (en) * 2012-09-28 2013-02-06 浙江图讯科技有限公司 Method for cleaning junk data
CN102937990A (en) * 2012-10-30 2013-02-20 北京小米科技有限责任公司 Method and device for cleaning files
CN103092938A (en) * 2013-01-07 2013-05-08 浙江鸿程计算机系统有限公司 Method for intelligently cleaning garbage file of secure digital (SD) card of Android mobile phone
CN103176828A (en) * 2013-03-29 2013-06-26 北京奇虎科技有限公司 Method and device of deleting application program residual files
CN103345411A (en) * 2013-07-09 2013-10-09 北京奇虎科技有限公司 Method and device for uninstalling application program

Also Published As

Publication number Publication date
CN103838601A (en) 2014-06-04

Similar Documents

Publication Publication Date Title
US20150242431A1 (en) Computer system log file analysis based on field type identification
CN103838601B (en) Junk data cleaning method and device
US9984148B2 (en) Visualization of graphical representation of log files
US9038029B2 (en) Three-dimensional GUI object stores in automation test tools
US20120266246A1 (en) Pinpointing security vulnerabilities in computer software applications
US9128832B2 (en) Performing diagnostic tracing of an executing application to identify suspicious pointer values
US8930761B2 (en) Test case result processing
US9934132B2 (en) Determining code coverage of an application by test(S)
GB2521364A (en) Recording GUI data
CN106446685A (en) Methods and devices for detecting malicious documents
US8225298B2 (en) Tool for analyzing Siebel escripts
KR20120086926A (en) A visualization system for Forensics audit data
CN106886417A (en) A kind of universal parallel method for digging of linear temporal specification
CN112463957B (en) Method and device for abstracting abstract of unstructured text log stream
US9852048B2 (en) Simulating process variable changes during process runtime
AfzaliSeresht et al. An explainable intelligence model for security event analysis
US8249848B2 (en) Verifying a processor design using a processor simulation model
CN104239215B (en) The investigation method and apparatus of garbageware
US20100050162A1 (en) Automatically detecting non-modifying transforms when profiling source code
CN109582582A (en) A kind of automated testing method and system of web interface
DeMott et al. Towards an automatic exploit pipeline
Patri et al. Data mining with shapelets for predicting valve failures in gas compressors
US20130325382A1 (en) Side-channel analysis apparatus and method based on profile
JP5962779B2 (en) Flag access defect inspection device, flag access defect inspection method, flag access defect inspection program
Ravi et al. Unsupervised time series data analysis for error pattern extraction for predictive maintenance

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170419

Termination date: 20211129