CN104268184B - File delet method and terminal in a kind of mobile terminal - Google Patents

File delet method and terminal in a kind of mobile terminal Download PDF

Info

Publication number
CN104268184B
CN104268184B CN201410472987.7A CN201410472987A CN104268184B CN 104268184 B CN104268184 B CN 104268184B CN 201410472987 A CN201410472987 A CN 201410472987A CN 104268184 B CN104268184 B CN 104268184B
Authority
CN
China
Prior art keywords
memory space
file
overlapping operation
deleted
shared
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410472987.7A
Other languages
Chinese (zh)
Other versions
CN104268184A (en
Inventor
毕特
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN201410472987.7A priority Critical patent/CN104268184B/en
Publication of CN104268184A publication Critical patent/CN104268184A/en
Application granted granted Critical
Publication of CN104268184B publication Critical patent/CN104268184B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention discloses the file delet method in a kind of mobile terminal and terminal, it is related to data processing field, file erasing time can be saved on the basis of assuring data security.In the embodiment of the present invention, the memory space shared by file to be deleted is determined;Overlapping operation is carried out to the memory space of part in the memory space, wherein, the memory space for having carried out overlapping operation is distributed in whole memory spaces shared by file to be deleted;On the basis of it ensure that Information Security, file erasing time is effectively saved.

Description

File delet method and terminal in a kind of mobile terminal
Technical field
The present invention relates to the file delet method in data processing field, more particularly to a kind of mobile terminal and terminal.
Background technology
With the popularization of the smart machines such as computer, mobile phone, tablet personal computer, the Information Security of smart machine also gradually into For an important topic.Data on smart machine are typically stored in the memory space inside or outside smart machine, if thinking The data in memory space are deleted, then the file delet method for needing to use smart machine to provide.Current file delet method Can not be really by data from physically deleting, but be marked to storing the memory space shared by the data, For informing that smart machine can write other data in above-mentioned memory space again.When smart machine is not above-mentioned marked When new data are write in the memory space gone out, not deleted initial data is still preserved in above-mentioned memory space.Hacker can be with Above-mentioned not deleted initial data is collected, and the initial data is reduced, it is seen then that this file delet method is made in the prior art Into the hidden danger of data safety.
Another file delet method is additionally provided in the prior art, by by MFT (the Master File of file Table, MFT) index is emptied, and each byte of the memory space shared by the file that will need to delete is reset one by one, The memory space shared by file that will need to delete has carried out covering and rewritten, so as to realize the purpose for deleting this document.It is right , can be with quickly deleting file, but for larger file, to file institute using this file delet method in less file Whole memory spaces of occupancy, which carry out covering rewriting one by one, to be needed to consume the substantial amounts of time.
It can be seen that lacking a kind of file delet method in the prior art, can be saved on the basis of assuring data security File erasing time.
The content of the invention
The embodiment of the present invention provides file delet method and terminal in a kind of mobile terminal, effectively to prevent file While maliciously recovery, file erasing time is saved.
The embodiment of the present invention provides the file delet method in a kind of mobile terminal, and this method includes:
Determine the memory space shared by file to be deleted;
Overlapping operation is carried out to the memory space of part in the memory space;
Wherein, the memory space for having carried out overlapping operation is distributed in whole storages shared by file to be deleted In space.
The embodiment of the present invention provides a kind of mobile terminal, and the terminal includes:
Determining unit, for determining the memory space shared by file to be deleted;
Capping unit, for carrying out overlapping operation to the memory space of part in the memory space;
Wherein, the memory space for having carried out overlapping operation is distributed in whole storages shared by file to be deleted In space.
From such scheme as can be seen that the part memory space that overlapping operation is carried out in the embodiment of the present invention is point at interval Cloth in whole memory spaces shared by this document, can be it is evenly spaced or unevenly spaced, therefore, After the part memory space shared by file to be deleted has carried out overlapping operation, these capped memory spaces are deposited in original Store up in space and breakdown point one by one formed to original, due to breakdown point be spaced apart and distribution it is extensive, can recognize It is distributed for these breakdown points relatively uniform and enough, then file is just substantially reduced by recoverable possibility, and the present invention utilizes This mode realizes the complete deletion of file, so as to ensure that the Information Security of user;Simultaneously as the embodiment of the present invention Only need the memory space of part to carry out overlapping operation, shorten and the progress overlapping operation of whole memory spaces is reached in the prior art The time consumed to complete deletion file, so as to shorten the time for needing to wait when user selects to delete some file, lifting User experience.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment Accompanying drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this For the those of ordinary skill in field, without having to pay creative labor, it can also be obtained according to these accompanying drawings His accompanying drawing.
Fig. 1 is the schematic flow sheet of the file delet method in a kind of mobile terminal provided in an embodiment of the present invention;
Fig. 2 is to be deleted using the embodiment of the present invention compared with the structural representation after small documents;
Fig. 3 is that the structural representation after larger file is deleted using the embodiment of the present invention;
Fig. 4 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention.
Embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, the present invention is made below in conjunction with accompanying drawing into One step it is described in detail, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole implementation Example.Based on the embodiment in the present invention, what those of ordinary skill in the art were obtained under the premise of creative work is not made All other embodiment, belongs to the scope of protection of the invention.
The embodiment of the present invention is applied to the various smart machines for possessing storage device, such as mobile phone, tablet personal computer and desk-top meter Calculation machine etc. equipment.But in actual applications, due to the memory space of mobile terminal (such as mobile phone, tablet personal computer equipment) and interior Deposit relatively small, be generally loaded with multiple application programs, when user selects to delete the larger text stored in mobile terminal During part, in existing file deleting mechanism, the mode for all covering or filling in can undoubtedly make user wait longer time, even User is needed to exit some application programs, pending file is deleted completely, and the mode being only marked in memory space can not Ensure the completeness that file is deleted, recoverable leak be present, this generally carries the important pass of user to current mobile terminal It is a kind of very big potential safety hazard for the situation of the private data in terms of the person or property.Therefore, the embodiment of the present invention Mobile terminal is more suitable for, be particularly suitable for use in various smart mobile phones, tablet personal computer.
The part memory space that overlapping operation is carried out in the embodiment of the present invention is that being distributed in for interval is complete shared by this document Can be evenly spaced or unevenly spaced, therefore, when shared by file to be deleted in portion's memory space Part memory space carried out overlapping operation after, these capped memory spaces are in former memory space to original shape Into breakdown point one by one, due to breakdown point be spaced apart and distribution it is extensive, it is believed that these breakdown points are distributed phase To uniform and enough, then file is just substantially reduced by recoverable possibility;After the above step, the embodiment of the present invention is also Thread can be set up another the memory space of the remainder in addition to overlapping operation has been carried out is subjected to overlapping operation, realize text The complete deletion of part, so as to ensure that the Information Security of user;Simultaneously as the embodiment of the present invention set up another thread perform it is above-mentioned Operation, user are not felt by file deletion process and still carried out, and user can utilize other functions of mobile phone screen continuation mobile phone Use, the whole deletion process without being absorbed in pending file is finished, and wait required for deleting file is shortened for user Time, improve Consumer's Experience.On the other hand, because the embodiment of the present invention only needs the memory space of part to carry out covering behaviour Make, shorten the time that in the prior art whole memory spaces are carried out with overlapping operation consumption, deleted so as to shorten user's selection The time waited is needed during except some file, improves user experience.
The embodiment of the present invention is specifically described below.
Fig. 1 shows the schematic flow sheet of the file delet method in a kind of mobile terminal provided in an embodiment of the present invention, As shown in figure 1, this method includes:
Step 11:Determine the memory space shared by file to be deleted.
During specific implementation, the memory space shared by this document is determined, the size of this document, i.e. this document can also be determined The total bytes of shared memory space.
Step 12:Overlapping operation is carried out to the memory space of part in the memory space;Wherein, overlapping operation has been carried out Memory space is distributed in whole memory spaces shared by file to be deleted.
During specific implementation, using 1st byte of the file in memory space as starting point, with file in memory space most 1 byte is terminal afterwards, with N1Individual byte is interval, selects N2Individual byte carries out overlapping operation.Wherein, N1And N2It is adjustable Default positive integer, and N1、N2Total bytes respectively less than shared by file.That is, certain data point is chosen hereof Overlapping operation is carried out, can be fixed intervals between these data points, for example covering rewriting is carried out every the byte of fixed number, The byte number to be spaced can also be randomly generated, for the capped point of whole file, between there is no strict regularity, But capped point (breakdown point) is also relatively uniform as a whole.
It should be noted that N can be adjusted according to actual conditions1And N2Numerical value, due to N1And N2Numerical value difference, lead Cause file coverage rate different, the part being capped in the memory space of as above-mentioned file is not very identical, in the embodiment of the present invention In, file coverage rate (file destroyed rate can also be referred to as) ≈ N2/(N1+N2).For example, N is worked as1=12, N2=4, now File coverage rate ≈ 4/16=1/4=25%, it is believed that every 12 bytes, 4 successive bytes are just covered, until last 1 byte, due to the integral multiple of the size not necessarily 16 of memory space shared by file, therefore file coverage rate herein is about Equal to 25%.
Optionally, after above-mentioned steps 11, in addition to:Judge whether is storage size shared by file to be deleted Less than predetermined threshold value;Above-mentioned steps 12 are specially:When the memory space shared by file to be deleted is less than predetermined threshold value, to institute The memory space for stating part in memory space carries out overlapping operation;When the memory space shared by file to be deleted is not less than default During threshold value, for the N on head of the file in memory spaceaThe N of individual byte and afterbodybThe memory space of part enters in individual byte Row overlapping operation;Or overlapping operation is carried out to the memory space of part in the memory space.
During specific implementation, it is default can also to determine whether the storage size shared by file to be deleted is less than Threshold value;Wherein, above-mentioned predetermined threshold value is adjustable positive integer.
When the memory space shared by file to be deleted is less than predetermined threshold value, can be carried out by performing above-mentioned steps 12 Overlapping operation (i.e. file is deleted).
When the memory space shared by file to be deleted is not less than predetermined threshold value, for head of the file in memory space The N in portionaThe N of individual byte and afterbodybIndividual byte, overlapping operation can be carried out by performing above-mentioned steps 12 (i.e. file is deleted);Or Person,
When the memory space shared by file to be deleted is not less than predetermined threshold value, can be entered by performing above-mentioned steps 12 Row overlapping operation carries out overlapping operation (i.e. file is deleted).
It should be noted that N can be adjusted according to actual conditions1And N2Numerical value, due to N1And N2Numerical value difference, lead Cause file coverage rate different, the part being capped in the memory space of as above-mentioned file is not very identical.In the embodiment of the present invention In, when the memory space shared by file to be deleted is not less than predetermined threshold value, for head of the file in memory space NaThe N of individual byte and afterbodybIndividual byte, overlapping operation can be carried out by performing above-mentioned steps 12 (i.e. file is deleted);Wherein, NaAnd NbIt is adjustable default positive integer, and Na+NbLess than the total bytes shared by file.Generally, in each file File header and tail of file are stored with the vital document information related to this document, such as coded system, file type, this hair Bright embodiment is for larger file, its most important fileinfo of the destruction to stand in the breach, it is ensured that the file header of this document and Expendable overlapping operation has been carried out in afterbody, and whether reselection needs not covered the centre of this document afterwards The memory space of operation carries out overlapping operation, so as to guarantee more thoroughly to destroy the integrality of file to be deleted, reaches Delete file and the purpose for making the file of deletion to be resumed.For example, can be by text for the file larger to one Each 4K (in general, it can also be provided that each 2K sizes) of part head and the tail carries out overlapping operation by performing above-mentioned steps 12.
Above step is completed by the main thread of program, after above-mentioned steps have been performed, you can is completed file and is deleted Flow.It can be seen that file delet method provided in an embodiment of the present invention is without carrying out covering weight to each memory space in file Write, it is only necessary to overlapping operation is carried out to the memory space of part, especially when file to be deleted is larger, shortens and deletes file consumption Time, system effectiveness is improved, improve Consumer's Experience.
Optionally, in the N on the head for file in memory spaceaThe N of individual byte and afterbodybIndividual byte, is covered After operation, the memory space that file is not carried out to overlapping operation in memory space is labeled as memory space to be covered;Wherein, NaAnd NbIt is default positive integer, and Na+NbLess than the total bytes shared by the file.
Optionally, overlapping operation is carried out to part memory space in the memory space using first thread;By described in The memory space that file does not carry out overlapping operation in memory space is labeled as after memory space to be covered, uses the second thread Overlapping operation is carried out to the memory space that mark is;Wherein, second thread is after the first thread terminates Start and in running background.
During specific implementation, after the memory space to not carrying out overlapping operation marks, it can also be built again outside main thread A new thread is found, for carrying out overlapping operation, this mistake to the part memory space for not carrying out overlapping operation among this document Journey is performed in the thread outside main thread, will not increase the erasing time of file.Due to new thread (i.e. the second thread) The silent mode deleted can be used to be covered the part memory space for not carrying out overlapping operation among this document on backstage Operation, such user are not felt by the second thread and perform the file deletion consumed time, meanwhile, main thread (i.e. first thread) It can continue to perform other operations according to the instruction of user, therefore the time that user's pending file is deleted shortens, and improves use Experience at family.
Optionally, before above-mentioned steps 11, or, after above-mentioned steps 12, it can also include:Will using random number The filename of file to be deleted carries out renaming operation;And/or delete the file suffixes name of file to be deleted.
During specific implementation, by the filename of file to be deleted random letters renaming, and remove the suffix name of this document. In such manner, it is possible to effectively prevent hacker from guesing out file type from filename and suffix name, the security of data is further ensured.Than Such as, this file of vital document .doc can be represented with X, removed suffix and completed renaming.This step is not implementation of the present invention The core procedure of example, first step can be placed on and performed, final step execution can also be placed on.
It should be noted that the embodiment of the present invention can use random number to carry out overlapping operation, it can also use to reset and move Make (writing zero) and carry out overlapping operation;When being acted using clearing, if laws of use interval carries out overlapping operation simultaneously, easy quilt Hacker finds out regularity, therefore, if being acted with clearing and (being write zero) when carrying out overlapping operation, it is preferred to use randomly generate interval The mode of byte number is filled in.
For example, Fig. 2 is shown is deleted compared with the structural representation after small documents using the embodiment of the present invention, such as Fig. 2 institutes Show, 10K file is less than for file size, performs following operation successively from top of file:Producing 4 bytes, (INT is whole Number) random number, override preceding 4 bytes of file, 12 bytes of then jumping backward (i.e. 12 bytes of sky, 3 INT.This Place's citing is the data point of fixed intervals), then 4 byte random numbers are produced, 4 current bytes are covered, the like, until Tail of file.So amount to and destroyed 25% (because thering is a number to be written in interval 12 bytes, that is, four numbers, Therefore destructive rate is a quarter) file because breakdown point is uniform enough, file has become irrecoverable, can be considered and thoroughly deletes Except.
For example, Fig. 3 shows the structural representation deleted using the embodiment of the present invention after larger file, such as Fig. 2 institutes Show, 10K file is more than or equal to for file size, (in general, the head and tail of a file leads to by each 4K of file head and the tail The important information of file is often included, so preferentially this data at two is destroyed, and head and tail information is generally not too large, Therefore it can also be provided that each 2K sizes) by performing the progress overlapping operation of above-mentioned steps 12.
It can be seen from the above technical proposal that the part memory space that overlapping operation is carried out in the embodiment of the present invention is interval Be distributed in whole memory spaces shared by this document, can be it is evenly spaced or unevenly spaced, because This, after the part memory space shared by file to be deleted has carried out overlapping operation, these capped memory spaces exist Breakdown point one by one is formed to original in former memory space, due to breakdown point be spaced apart and distribution it is extensive, can To think that the distribution of these breakdown points is relatively uniform and enough, then file is just substantially reduced by recoverable possibility, the present invention The complete deletion of file is realized by means of which, so as to ensure that the Information Security of user;Meanwhile the embodiment of the present invention Overlapping operation only is carried out to the memory space of part, overlapping operation is carried out to whole memory spaces in the prior art so as to shorten Reach the time of complete deletion file consumption;The embodiment of the present invention can also be deleted according to file size is different using different files Except rule, therefore, there is the upper limit for larger file erasing time, rather than with file size linear increase;Further, The memory space for not carrying out overlapping operation in memory space can also be labeled as memory space to be covered by the embodiment of the present invention, be used Subsequently to carry out overlapping operation to having been labeled as memory space to be covered, so as to realize the purpose of complete deletion file.
Based on identical technical concept, the embodiment of the present invention additionally provides a kind of mobile terminal, and Fig. 4 shows of the invention real The structural representation of the mobile terminal of example offer is applied, as shown in figure 4, the terminal includes:
Determining unit 41, for determining the memory space shared by file to be deleted;
Capping unit 42, for carrying out overlapping operation to the memory space of part in the memory space;
Wherein, the memory space for having carried out overlapping operation is distributed in whole storages shared by file to be deleted In space.
Optionally, the capping unit 42 is specifically used for:Using 1st byte of the file in memory space as rise Point, using last 1 byte of the file in memory space as terminal, with N1Individual byte is interval, selects N2Individual byte is carried out Overlapping operation;Wherein, N1And N2It is default positive integer, and N1、N2Total bytes shared by respectively less than described file.
Optionally, the terminal also includes:Judging unit, for it is determined that memory space shared by file to be deleted it Afterwards, before the memory space progress overlapping operation to part in the memory space, judge shared by the file to be deleted Whether storage size is less than predetermined threshold value;The capping unit 42 is specifically used for:When shared by the file to be deleted When memory space is less than predetermined threshold value, overlapping operation is carried out to the memory space of part in the memory space;Wait to delete when described When being not less than predetermined threshold value except the memory space shared by file, by the N on head of the file in memory spaceaIndividual byte With the N of afterbodybIndividual byte is identified as needing the memory space for carrying out overlapping operation, needs to carry out overlapping operation to described The memory space of part carries out overlapping operation in memory space;
Wherein, the NaAnd NbIt is default positive integer, and Na+NbLess than the total bytes shared by the file.
Optionally, the terminal also includes:Indexing unit, for it is described need carry out overlapping operation memory space in After partial memory space carries out overlapping operation, the file is not carried out to the memory space of overlapping operation in memory space Labeled as memory space to be covered.
Optionally, the capping unit 42 is covered using first thread to part memory space in the memory space Operation;The terminal also includes:Unit is deleted, for empty in the storage that the file is not carried out to overlapping operation in memory space Between be labeled as memory space to be covered after, using the second thread to mark be memory space carry out overlapping operation; Wherein, second thread starts and in running background after the first thread terminates.
Optionally, the capping unit 42 is additionally operable to:The filename of the file to be deleted is subjected to weight using random number Naming operation;And/or delete the file suffixes name of the file to be deleted.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided Instruct the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices so that A stream in flow chart can be achieved by the instruction of the computing device of the computer or other programmable data processing devices The function of being specified in journey or multiple flows and/or one square frame of block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices, which provides, to be used to realize the flow or multiple flows and/or block diagram in flow chart A square frame or multiple square frames in specify function the step of.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (12)

1. the file delet method in a kind of mobile terminal, it is characterised in that this method includes:
Determine the memory space shared by file to be deleted;
Judge whether the storage size shared by the file to be deleted is less than predetermined threshold value;
Overlapping operation is carried out to the memory space of part in the memory space;
Wherein, the memory space for having carried out overlapping operation is distributed in whole memory spaces shared by file to be deleted In;
The memory space to part in the memory space carries out overlapping operation, specifically includes:
When the memory space shared by the file to be deleted is not less than predetermined threshold value, by the file in memory space The N on headaThe N of individual byte and afterbodybIndividual byte is identified as needing the memory space for carrying out overlapping operation, to the needs The memory space for carrying out part in the memory space of overlapping operation carries out overlapping operation;Wherein, the NaAnd NbIt is default just whole Number, and Na+NbLess than the total bytes shared by the file.
2. the method as described in claim 1, it is characterised in that the memory space to part in the memory space is carried out Overlapping operation, specifically include:
Using last 1 word of 1st byte of the file in memory space as starting point, with the file in memory space Save as terminal, with N1Individual byte is interval, selects N2Individual byte carries out overlapping operation;
Wherein, the N1And N2It is default positive integer, and N1、N2Total bytes shared by respectively less than described file.
3. method as claimed in claim 2, it is characterised in that the memory space to part in the memory space is carried out Overlapping operation, in addition to:
When the memory space shared by the file to be deleted is less than predetermined threshold value, the storage to part in the memory space Space carries out overlapping operation.
4. method as claimed in claim 3, it is characterised in that need to carry out in the middle part of the memory space of overlapping operation to described After the memory space divided carries out overlapping operation, further comprise:
The memory space that the file is not carried out to overlapping operation in memory space is labeled as memory space to be covered.
5. method as claimed in claim 4, it is characterised in that using first thread to partly storage is empty in the memory space Between carry out overlapping operation;Deposited in the memory space that the file is not carried out to overlapping operation in memory space labeled as to be covered After storing up space, further comprise:
Overlapping operation is carried out to the memory space that mark is using the second thread;
Wherein, second thread starts and in running background after the first thread terminates.
6. such as the method any one of claim 1-5, it is characterised in that this method also includes:
The filename of the file to be deleted is subjected to renaming operation using random number;And/or
Delete the file suffixes name of the file to be deleted.
7. a kind of mobile terminal, it is characterised in that the terminal includes:
Determining unit, for determining the memory space shared by file to be deleted;
Judging unit, for judging whether the storage size shared by the file to be deleted is less than predetermined threshold value;
Capping unit, for carrying out overlapping operation to the memory space of part in the memory space;
Wherein, the memory space for having carried out overlapping operation is distributed in whole memory spaces shared by file to be deleted In;
The capping unit, specifically for when the memory space shared by the file to be deleted is not less than predetermined threshold value, inciting somebody to action The N on head of the file in memory spaceaThe N of individual byte and afterbodybIndividual byte is identified as needing to carry out overlapping operation Memory space, to it is described need carry out overlapping operation memory space in part memory space carry out overlapping operation;Wherein, The NaAnd NbIt is default positive integer, and Na+NbLess than the total bytes shared by the file.
8. terminal as claimed in claim 7, it is characterised in that the capping unit is specifically used for:
Using last 1 word of 1st byte of the file in memory space as starting point, with the file in memory space Save as terminal, with N1Individual byte is interval, selects N2Individual byte carries out overlapping operation;
Wherein, the N1And N2It is default positive integer, and N1、N2Total bytes shared by respectively less than described file.
9. terminal as claimed in claim 8, it is characterised in that the capping unit, be additionally operable to work as the file institute to be deleted When the memory space of occupancy is less than predetermined threshold value, overlapping operation is carried out to the memory space of part in the memory space.
10. terminal as claimed in claim 9, it is characterised in that the terminal also includes:
Indexing unit, in the memory space for needing to carry out overlapping operation the memory space of part carry out covering behaviour After work, the memory space that the file is not carried out to overlapping operation in memory space is labeled as memory space to be covered.
11. terminal as claimed in claim 10, it is characterised in that the capping unit is empty to the storage using first thread Between middle part memory space carry out overlapping operation;The terminal also includes:
Unit is deleted, for the file not carried out to the memory space of overlapping operation in memory space labeled as to be covered After memory space, overlapping operation is carried out to the memory space that mark is using the second thread;
Wherein, second thread starts and in running background after the first thread terminates.
12. such as the terminal any one of claim 7-11, it is characterised in that the capping unit is additionally operable to:
The filename of the file to be deleted is subjected to renaming operation using random number;And/or delete the file to be deleted File suffixes name.
CN201410472987.7A 2014-09-16 2014-09-16 File delet method and terminal in a kind of mobile terminal Active CN104268184B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410472987.7A CN104268184B (en) 2014-09-16 2014-09-16 File delet method and terminal in a kind of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410472987.7A CN104268184B (en) 2014-09-16 2014-09-16 File delet method and terminal in a kind of mobile terminal

Publications (2)

Publication Number Publication Date
CN104268184A CN104268184A (en) 2015-01-07
CN104268184B true CN104268184B (en) 2017-11-21

Family

ID=52159706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410472987.7A Active CN104268184B (en) 2014-09-16 2014-09-16 File delet method and terminal in a kind of mobile terminal

Country Status (1)

Country Link
CN (1) CN104268184B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107943804A (en) * 2016-10-12 2018-04-20 中标软件有限公司 The system and method for data is periodically deleted on mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1532706A (en) * 2003-03-24 2004-09-29 ��ʿͨ��ʽ���� Task processor and data managing method in said device
CN1698130A (en) * 2003-02-04 2005-11-16 松下电器产业株式会社 Semiconductor memory card and computer readable program
CN101051317A (en) * 2007-05-11 2007-10-10 北京中星微电子有限公司 FAT file system and its processing method
CN103608866A (en) * 2013-03-15 2014-02-26 华为技术有限公司 Data wiping method and device for flash memory

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8438139B2 (en) * 2010-12-01 2013-05-07 International Business Machines Corporation Dynamic rewrite of files within deduplication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1698130A (en) * 2003-02-04 2005-11-16 松下电器产业株式会社 Semiconductor memory card and computer readable program
CN1532706A (en) * 2003-03-24 2004-09-29 ��ʿͨ��ʽ���� Task processor and data managing method in said device
CN101051317A (en) * 2007-05-11 2007-10-10 北京中星微电子有限公司 FAT file system and its processing method
CN103608866A (en) * 2013-03-15 2014-02-26 华为技术有限公司 Data wiping method and device for flash memory

Also Published As

Publication number Publication date
CN104268184A (en) 2015-01-07

Similar Documents

Publication Publication Date Title
US20150317246A1 (en) Memory Reclamation Method and Apparatus
CN103677977B (en) Method and device for cleaning temporary files in mobile terminal and the mobile terminal
CN105204781B (en) Compression method, device and equipment
CN105718272B (en) A kind of method and terminal of terminal factory reset
JP2008112445A (en) Apparatus and method for managing nonvolatile memory
CN106897141A (en) The processing method and processing device of information
CN105956035A (en) File storage method and device
EP3196767B1 (en) Method for writing data into flash memory device, flash memory device and storage system
CN103984743B (en) A kind of method and device of managing internal memory resource
WO2020233046A1 (en) Cache file management method and apparatus, computer device, and storage medium
CN107590144A (en) A kind of file memory method and terminal
CN106649146A (en) Memory release method and apparatus
CN105260674A (en) Screen capture processing method and apparatus and intelligent terminal
CN106126731A (en) A kind of method and device obtaining Elasticsearch paged data
CN104268184B (en) File delet method and terminal in a kind of mobile terminal
TW201617940A (en) Compression of cascading style sheet files
CN106598508A (en) Solid-state hard disc and write-in arbitrating method and system thereof
CN105068718A (en) Information processing method and electronic device
CN105487939A (en) Flash memory file data recovery method and apparatus
CN106569683A (en) Method and equipment for performing batch processing of applications on mobile terminal
CN107912063A (en) A kind of method for recovering internal storage and device
CN105302485B (en) A kind of safe method for deleting and device
CN103544302B (en) The partition maintenance method and device of database
CN106896990A (en) The discharging method and device of a kind of application program
CN103246426B (en) It is a kind of to realize the method and device handled multiple icons

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant